Gain Access to the Discovering Computers: Fundamentals, Fifth Edition Online Companion! Powered by To create a new student user profile COURSE Gaining access to the interactive learning activities on this Online Companion is easy— all you need to do is create a user profile. This simple, one-time process establishes you as a user in the CoursePort authentication system. Students and instructors can then reinforce the concepts they're covering in the texts with interactive learning activities. • Visit http://login.course.com • Click New User Registration. • Enter the required, basic information on the New User Registration screen. You should see a Registration Successful screen. Please click the Continue button. • You will then be brought to the Choose Your Product page. • Check the box next to the title of the text and upon clicking Submit (at the bottom of the page), you’re in!! • From the My Account page, click the name of product to launch the Online Companion. • As a student, you can view your own progress in the Universal Gradebook, accessed from the My Account tab. Click View My Grades at the bottom of the page. • NOTE: If your instructor has chosen to track your activities in the CoursePort Universal Gradebook, you may need to Join a Class from the My Account tab. Features of the Discovering Computers: Fundamentals, Fifth Edition Online Companion include: • Additional information and unparalleled currency on important topics; • Discussion Forum and Learn How To visual demonstrations; • Key Terms page complete with definitions, Web links, audio and illustrative animations; • Discovering Computers Timeline; • Learn It Online exercises, online videos, practice tests, learning games, and Web-based activities; • CoursePort personalized home page and the Universal Gradebook. What you’ll gain access to C6671_IFC_pp.qxd 1/30/08 12:55 PM Page b
1. Gain Access to the Discovering Computers: Fundamentals,
Fifth Edition Online Companion! Powered by To create a new student
user profile COURSE Gaining access to the interactive learning
activities on this Online Companion is easy all you need to do is
create a user profile. This simple, one-time process establishes
you as a user in the CoursePort authentication system. Students and
instructors can then reinforce the concepts they're covering in the
texts with interactive learning activities. Visit
http://login.course.com Click New User Registration. Enter the
required, basic information on the New User Registration screen.
You should see a Registration Successful screen. Please click the
Continue button. You will then be brought to the Choose Your
Product page. Check the box next to the title of the text and upon
clicking Submit (at the bottom of the page), youre in!! From the My
Account page, click the name of product to launch the Online
Companion. As a student, you can view your own progress in the
Universal Gradebook, accessed from the My Account tab. Click View
My Grades at the bottom of the page. NOTE: If your instructor has
chosen to track your activities in the CoursePort Universal
Gradebook, you may need to Join a Class from the My Account tab.
Features of the Discovering Computers: Fundamentals, Fifth Edition
Online Companion include: Additional information and unparalleled
currency on important topics; Discussion Forum and Learn How To
visual demonstrations; Key Terms page complete with definitions,
Web links, audio and illustrative animations; Discovering Computers
Timeline; Learn It Online exercises, online videos, practice tests,
learning games, and Web-based activities; CoursePort personalized
home page and the Universal Gradebook. What youll gain access to
C6671_IFC_pp.qxd 1/30/08 12:55 PM Page b
4. Discovering Computers Gary B. Shelly Misty E. Vermaat
Contributing Authors Jeffrey J. Quasney Susan L. Sebok Jeffrey J.
Webb Steven M. Freund Fundamentals Fifth Edition Australia Brazil
Japan Korea Mexico Singapore Spain United Kingdom United States
Shelly Cashman Series An imprint of Course Technology, Cengage
Learning C6671_FM_pp6.qxd 1/30/08 1:14 PM Page iii
5. Discovering Computers: Fundamentals, Fifth Edition Gary B.
Shelly Misty E. Vermaat Executive Editor: Alexandra Arnold Senior
Product Manager: Reed Curry Associate Product Manager: Klenda
Martinez Editorial Assistant: Jon Farnham Marketing Director:
Tristen Kendall Marketing Coordinator: Julie Schuster Print Buyer:
Julio Esperas Content Project Manager: Matthew Hutchinson
Consultant: Joel Sadagursky Researcher: F. William Vermaat
Development Editor: Lyn Markowicz Proofreader: Nancy Lamm Final
Reader: Pam Baxter Management Services: Pre-PressPMG Interior
Designer: Pre-PressPMG Art Director: Bruce Bond Cover and Text
Design: Joel Sadagursky Cover Photos: Jon Chomitz Illustrator:
Pre-PressPMG Compositor: Pre-PressPMG Printer: RRD Menasha 2008
Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of
this work covered by the copyright herein may be reproduced,
transmitted, stored or used in any form or by any means graphic,
electronic, or mechanical, including but not limited to
photocopying, recording, scanning, digitizing, taping, Web
distribution, information net- works, or information storage and
retrieval systems, except as permitted under Section 107 or 108 of
the 1976 United States Copyright Act, without the prior written
permission of the publisher. ISBN-10: 1-4239-2702-8 ISBN-13:
978-1-4239-2702-0 Course Technology 25 Thomson Place Boston, MA
02210 USA Cengage Learning is a leading provider of customized
learning solutions with office locations around the globe,
including Singapore, the United Kingdom, Australia, Mexico, Brazil
and Japan. Locate your local office at:
international.cengage.com/region Cengage Learning products are
represented in Canada by Nelson Education, Ltd. For your lifelong
learning solutions, visit course.cengage.com For product
information and technology assistance, contact us at Cengage
Learning Academic Resource Center, 1-800-423-0563 For permission to
use material from this text or product, submit all requests online
at cengage.com/permissions Further permissions questions can be
emailed to [email protected] Printed in the United
States of America 1 2 3 4 5 6 7 14 13 12 11 10 09 08
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page iv
6. v Contents CHAPTER 1 Introduction to Computers
................................1 A WORLD OF
COMPUTERS....................................................................2
WHAT IS A
COMPUTER?........................................................................3
Data and Information
....................................................................4
Advantages and Disadvantages of Using Computers ..............4
LOOKING AHEAD: Paying by Cell Phone
............................................................5
Information Processing Cycle
......................................................5 THE
COMPONENTS OF A COMPUTER
................................................6 Input Devices
..................................................................................7
Output
Devices................................................................................7
System
Unit......................................................................................7
Storage
Devices................................................................................7
Communication
Devices................................................................8
NETWORKS AND THE
INTERNET..........................................................8
COMPUTER SOFTWARE
......................................................................10
System Software
............................................................................10
Application Software
....................................................................11
ETHICS & ISSUES: What Can Be Done to Combat Computer Addiction?
..............11 Installing and Running Programs
..............................................11 Software
Development
................................................................12
CATEGORIES OF
COMPUTERS............................................................13
PERSONAL
COMPUTERS......................................................................14
Desktop
Computers......................................................................14
MOBILE COMPUTERS AND MOBILE DEVICES
................................14 Notebook Computers
..................................................................14
Mobile Devices
..............................................................................15
GAME
CONSOLES..................................................................................16
SERVERS
................................................................................................16
MAINFRAMES
........................................................................................17
SUPERCOMPUTERS..............................................................................17
EMBEDDED COMPUTERS
....................................................................17
EXAMPLES OF COMPUTER USAGE
..................................................18 Home User
....................................................................................18
ETHICS & ISSUES: What Should Be Done about Identity Theft?
..........................19 Small Office/Home Office User
..................................................20 Mobile
User....................................................................................20
Power User
....................................................................................21
Large Business
User......................................................................21
COMPUTER APPLICATIONS IN SOCIETY
..........................................22 LOOKING AHEAD: Robots
Perform Mundane, Dangerous Tasks ............................22
Education........................................................................................22
Finance............................................................................................23
Government
..................................................................................23
Health Care
....................................................................................23
Science
............................................................................................24
Publishing
......................................................................................25
Travel
..............................................................................................25
Manufacturing
..............................................................................25
CHAPTER
SUMMARY............................................................................26
COMPANIES ON THE CUTTING EDGE
................................................27 Dell
..................................................................................................27
Apple Computer
..........................................................................27
TECHNOLOGY TRAILBLAZERS
............................................................27 Bill
Gates
........................................................................................27
Anne Mulcahy
..............................................................................27
Chapter Review
..................................................................................28
Key
Terms............................................................................................29
Checkpoint
..........................................................................................30
Web Research
......................................................................................31
Learn How To
....................................................................................32
Learn It
Online....................................................................................34
Special Feature T I M E L I N E : M I L E S T O N E S I N C O M P U
T E R H I S T O R Y 35 CHAPTER 2 The Internet and World Wide
Web........49 THE INTERNET
......................................................................................50
HOW THE INTERNET WORKS
..............................................................51
Connecting to the Internet
..........................................................51 Access
Providers............................................................................52
How Data Travels the
Internet....................................................52
Internet Addresses
........................................................................53
THE WORLD WIDE WEB
......................................................................54
Browsing the Web
........................................................................54
Web Addresses
..............................................................................56
Navigating Web
Pages..................................................................57
LOOKING AHEAD: Internet Speeds into the Future
............................................57 Searching for
Information on the Web ......................................58
Types of Web Sites
........................................................................61
ETHICS & ISSUES: Should You Trust a Wiki for Academic Research?
....................63 Evaluating a Web Site
..................................................................63
Multimedia on the
Web................................................................64
Web
Publishing..............................................................................66
E-Commerce
..................................................................................67
Discovering Computers Fundamentals Fifth Edition C6671_FM_pp6.qxd
1/30/08 1:14 PM Page v
7. vi DISCOVERING COMPUTERS: Fundamentals, Fifth Edition OTHER
INTERNET SERVICES
..............................................................68
E-Mail..............................................................................................69
Mailing Lists
..................................................................................71
Instant Messaging
........................................................................71
Chat
Rooms....................................................................................71
VoIP
................................................................................................72
FTP
..................................................................................................72
Newsgroups and Message
Boards..............................................73 NETIQUETTE
..........................................................................................73
CHAPTER
SUMMARY............................................................................74
ETHICS & ISSUES: Should Companies Be Able to Track Your Online
Habits? ..........74 COMPANIES ON THE CUTTING EDGE
................................................75 Google
............................................................................................75
Yahoo!..............................................................................................75
TECHNOLOGY TRAILBLAZERS
............................................................75 Tim
Berners-Lee
............................................................................75
Meg
Whitman................................................................................75
Chapter Review
..................................................................................76
Key
Terms............................................................................................77
Checkpoint
..........................................................................................78
Web Research
......................................................................................79
Learn How To
....................................................................................80
Learn It
Online....................................................................................82
Special Feature M A K I N G U S E O F T H E W E B 83 CHAPTER 3
Application
Software................................................99
APPLICATION SOFTWARE
..................................................................100
The Role of System Software
....................................................101 Working
with Application Software
........................................102 LOOKING AHEAD: Touch
Drive Your Computer Screen
......................................103 BUSINESS
SOFTWARE........................................................................104
Word Processing Software
........................................................105
Developing a Document
............................................................106
Spreadsheet Software
................................................................107
Database Software
......................................................................108
Presentation Graphics
Software................................................109 Note
Taking Software
................................................................110
Personal Information Manager Software
................................110 Personal Mobile Device Business
Software ............................110 Software Suite
..............................................................................110
Project Management Software
..................................................111 Accounting
Software
..................................................................111
Document Management Software
............................................111 Enterprise
Computing Software
..............................................112 GRAPHICS AND
MULTIMEDIA SOFTWARE......................................112
Computer-Aided
Design............................................................113
Desktop Publishing Software (for the Professional)
............................................................113
Paint/Image Editing Software (for the Professional)
............................................................113
Video and Audio Editing Software (for the Professional)
............................................................114
ETHICS & ISSUES: Should It Be Legal to Share Copyrighted Music
or Video Files over a Network?
..................................................................................114
Multimedia Authoring Software
..............................................114 Web Page
Authoring Software
..................................................114 SOFTWARE FOR
HOME, PERSONAL, AND EDUCATIONAL
USE........................................................................115
Software Suite (for Personal Use)
............................................116 Personal Finance
Software
........................................................116 Legal
Software
............................................................................117
Tax Preparation Software
..........................................................117
Desktop Publishing Software (for Personal
Use)..................................................................117
Paint/Image Editing Software (for Personal
Use)..................................................................118
Clip Art/Image
Gallery..............................................................118
Video and Audio Editing Software (for Personal
Use)..................................................................119
Home Design/Landscaping
Software......................................119 Travel and
Mapping Software
..................................................119 Educational
and Reference Software........................................119
Entertainment
Software..............................................................120
APPLICATION SOFTWARE FOR COMMUNICATIONS ....................120
ETHICS & ISSUES: Should Companies Monitor Employees E-Mail and
Internet Traffic?
..........................................................................121
POPULAR UTILITY PROGRAMS
........................................................121
WEB-BASED SOFTWARE
....................................................................122
LOOKING AHEAD: Using Semantics with Web 3.0
............................................122 LEARNING AIDS AND
SUPPORT TOOLS FOR APPLICATION SOFTWARE
............................................................123
Web-Based Training
....................................................................123
CHAPTER
SUMMARY..........................................................................124
ETHICS & ISSUES: Copying Software A Computer
Crime!..............................124 COMPANIES ON THE CUTTING
EDGE ..............................................125 Adobe
Systems
............................................................................125
Microsoft
......................................................................................125
TECHNOLOGY TRAILBLAZERS
..........................................................125 Dan
Bricklin
................................................................................125
Masayoshi Son
............................................................................125
Chapter Review
................................................................................126
Key
Terms..........................................................................................127
Checkpoint
........................................................................................128
Web Research
....................................................................................129
Learn How To
..................................................................................130
Learn It
Online..................................................................................132
CHAPTER 4 The Components of the System Unit
........................................................................133
THE SYSTEM UNIT
..............................................................................134
The Motherboard
........................................................................136
PROCESSOR
........................................................................................137
The Control Unit
........................................................................137
The Arithmetic Logic Unit
........................................................138 Machine
Cycle
............................................................................138
The System
Clock........................................................................138
LOOKING AHEAD: Fastest Supercomputer Will Have Petaflop Speed
..................139 Comparison of Personal Computer
Processors......................139 Buying a Personal Computer
....................................................139 ETHICS
& ISSUES: Discarded Computer Components: Whose Problem Is It?
......139 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page vi
8. CONTENTS viiCONTENTS DATA REPRESENTATION
....................................................................140
MEMORY
..............................................................................................142
Bytes and Addressable Memory
..............................................142 Memory Sizes
..............................................................................142
Types of Memory
........................................................................142
RAM
..............................................................................................143
ETHICS & ISSUES: Should Schools Supply Computers to All
Students?..............144 Cache
............................................................................................144
ROM
..............................................................................................145
Flash
Memory..............................................................................145
CMOS............................................................................................146
Memory Access
Times................................................................146
EXPANSION SLOTS AND ADAPTER
CARDS....................................147 Flash Memory Cards,
USB Flash Drives, PC Cards, and ExpressCard
Modules..................................147 PORTS AND
CONNECTORS................................................................148
Serial
Ports....................................................................................149
Parallel
Ports................................................................................149
USB
Ports......................................................................................149
FireWire Ports
..............................................................................150
Special-Purpose Ports
................................................................150
BUSES....................................................................................................151
BAYS
......................................................................................................151
POWER SUPPLY
..................................................................................152
MOBILE COMPUTERS AND DEVICES
..............................................152 PUTTING IT ALL
TOGETHER
..............................................................154
LOOKING AHEAD: Body Heat May Power Notebook Computers
..........................154 KEEPING YOUR COMPUTER CLEAN
................................................155 CHAPTER
SUMMARY..........................................................................156
COMPANIES ON THE CUTTING EDGE
..............................................157
AMD..............................................................................................157
Intel................................................................................................157
TECHNOLOGY TRAILBLAZERS
..........................................................157 Jack
Kilby......................................................................................157
Gordon Moore
............................................................................157
Chapter Review
................................................................................158
Key
Terms..........................................................................................159
Checkpoint
........................................................................................160
Web Research
....................................................................................161
Learn How To
..................................................................................162
Learn It
Online..................................................................................164
CHAPTER 5 Input and Output
..........................................................165 WHAT
IS
INPUT?..................................................................................166
KEYBOARD AND POINTING DEVICES
..............................................167 The Keyboard
..............................................................................168
Mouse............................................................................................169
ETHICS & ISSUES: Are Employers Responsible for Medical Problems
Related to Computer
Use?..............................................................169
Trackball........................................................................................170
Touchpad
......................................................................................170
Pointing Stick
..............................................................................170
Light Pen
......................................................................................170
Touch Screen
................................................................................170
Pen Input
......................................................................................171
GAMING AND MEDIA PLAYER CONTROLLERS
..............................172 Gamepads
....................................................................................172
Joystick and
Wheels....................................................................172
Light
Guns....................................................................................172
Dance Pads
..................................................................................172
Motion-Sensing Game Controllers
..........................................172 Touch-Sensitive Pads
..................................................................172
OTHER TYPES OF
INPUT....................................................................173
LOOKING AHEAD: Controlling Games by Thinking
............................................173 Voice Input
..................................................................................173
Input for Smart Phones, PDAs, and Tablet PCs
....................174 Digital Cameras
..........................................................................175
Video Input
..................................................................................176
Scanners and Reading Devices
................................................177 ETHICS &
ISSUES: Is Using the Self-Checkout Saving Anybody Time or Money?
....178 LOOKING AHEAD: Clothing, Appliances Show RFID Uses
..................................179 Terminals
......................................................................................180
Biometric
Input............................................................................181
WHAT IS OUTPUT?
..............................................................................182
DISPLAY
DEVICES................................................................................183
LCD Monitors and LCD Screens
..............................................184 Plasma
Monitors..........................................................................185
CRT Monitors
..............................................................................186
PRINTERS..............................................................................................187
Producing Printed Output
........................................................188
Nonimpact Printers
....................................................................189
Ink-Jet Printers
............................................................................189
Photo Printers
..............................................................................190
LOOKING AHEAD: Talking Paper Provides Information, Warnings
........................190 Laser Printers
..............................................................................190
Thermal
Printers..........................................................................191
Mobile Printers
............................................................................192
Plotters and Large-Format
Printers..........................................192 Impact
Printers
............................................................................192
OTHER OUTPUT DEVICES
..................................................................193
Speakers, Headphones, and Earphones
..................................193 Fax Machines and Fax Modems
..............................................194 Multifunction
Peripherals..........................................................194
Data Projectors
............................................................................195
Interactive Whiteboards
............................................................195
PUTTING IT ALL TOGETHER
..............................................................196
INPUT AND OUTPUT DEVICES FOR PHYSICALLY CHALLENGED
USERS....................................................................197
ETHICS & ISSUES: Should Web Sites Be Held Accountable for
Accessibility Levels for Physically Challenged People?
......................................197 CHAPTER
SUMMARY..........................................................................198
COMPANIES ON THE CUTTING EDGE
..............................................199 Logitech
........................................................................................199
Hewlett-Packard..........................................................................199
TECHNOLOGY TRAILBLAZERS
..........................................................199
Douglas Engelbart
......................................................................199
Donna Dubinsky
........................................................................199
Chapter Review
................................................................................200
Key
Terms..........................................................................................202
Checkpoint
........................................................................................203
Web Research
....................................................................................204
Learn How To
..................................................................................205
Learn It
Online..................................................................................207
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page vii
9. viii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
Special Feature D I G I TA L I M A G I N G A N D V I D E O T E C H
N O L O G Y 208 CHAPTER 6
Storage........................................................................................219
STORAGE
..............................................................................................220
MAGNETIC
DISKS................................................................................222
Hard
Disks....................................................................................223
LOOKING AHEAD: Heat Increases Disk
Capacity..............................................223 Floppy
Disks
................................................................................228
OPTICAL
DISCS....................................................................................229
LOOKING AHEAD: Interactive Gift Cards Provide Marketing
Opportunities ............231 CD-ROMs
....................................................................................231
CD-Rs and
CD-RWs....................................................................232
DVD-ROMs, BD-ROMs, and HD DVD-ROMs ......................233 ETHICS
& ISSUES: Is the Blu-Ray and HD DVD Competition Good for
Consumers?..................................................................................233
Recordable and Rewritable
DVDs............................................234 TAPE
......................................................................................................234
PC CARDS AND EXPRESSCARD MODULES
..................................235 MINIATURE MOBILE STORAGE
MEDIA............................................235 Flash Memory
Cards
..................................................................236
USB Flash Drives
........................................................................236
Smart
Cards..................................................................................237
ETHICS & ISSUES: Should the World Become a Cashless
Society?....................237 MICROFILM AND MICROFICHE
........................................................238
ENTERPRISE STORAGE
......................................................................238
PUTTING IT ALL TOGETHER
..............................................................239
ETHICS & ISSUES: Who Should Be Looking at Your Medical Records?
..............239 CHAPTER
SUMMARY..........................................................................240
ETHICS & ISSUES: Who Is Responsible for Maintaining Your Online
Storage? ......240 COMPANIES ON THE CUTTING EDGE
..............................................241 Seagate
Technology
....................................................................241
SanDisk Corporation
..................................................................241
TECHNOLOGY TRAILBLAZERS
..........................................................241 Al
Shugart
....................................................................................241
Mark
Dean....................................................................................241
Chapter Review
................................................................................242
Key
Terms..........................................................................................243
Checkpoint
........................................................................................244
Web Research
....................................................................................245
Learn How To
..................................................................................246
Learn It
Online..................................................................................248
CHAPTER 7 Operating Systems and Utility Programs
............................................................249
SYSTEM SOFTWARE
..........................................................................250
OPERATING SYSTEMS
........................................................................251
OPERATING SYSTEM FUNCTIONS
....................................................252 Starting a
Computer
..................................................................252
Providing a User Interface
........................................................253
Managing Programs
..................................................................253
Managing Memory
....................................................................255
Coordinating Tasks
....................................................................255
Configuring Devices
..................................................................256
Establishing an Internet
Connection........................................256 Monitoring
Performance............................................................257
Providing File Management and Other
Utilities....................257 Controlling a Network
..............................................................257
Administering Security
..............................................................258
ETHICS & ISSUES: Who Should Be Responsible for Notebook
Computer
Security?....................................................................................................258
OPERATING SYSTEM UTILITY PROGRAMS
....................................259 File Manager
................................................................................259
Search
Utility................................................................................259
Image Viewer
..............................................................................259
Personal Firewall
........................................................................260
Uninstaller....................................................................................260
Disk Scanner
................................................................................260
Disk
Defragmenter......................................................................261
Diagnostic Utility
........................................................................261
Backup
Utility..............................................................................261
Screen Saver
................................................................................261
TYPES OF OPERATING SYSTEMS
....................................................262 STAND-ALONE
OPERATING SYSTEMS..............................................262
Windows XP
................................................................................262
Windows Vista
............................................................................263
Mac OS
X......................................................................................264
UNIX
............................................................................................264
Linux
............................................................................................265
ETHICS & ISSUES: Closed Source vs. Open Source Operating
Systems
......................................................................................265
LOOKING AHEAD: Open-Source Projects Promote Digital Identity
Sharing............265 NETWORK OPERATING SYSTEMS
....................................................266 EMBEDDED
OPERATING
SYSTEMS..................................................266
STAND-ALONE UTILITY PROGRAMS
................................................267 Antivirus
Programs
....................................................................267
Spyware and Adware Removers
..............................................268 Internet
Filters..............................................................................268
File Compression
........................................................................269
File
Conversion............................................................................269
Media
Player................................................................................269
CD/DVD Burning
......................................................................269
Personal Computer Maintenance
............................................270 CHAPTER
SUMMARY..........................................................................270
COMPANIES ON THE CUTTING EDGE
..............................................271 Red Hat
........................................................................................271
Research in Motion
(RIM)..........................................................271
TECHNOLOGY TRAILBLAZERS
..........................................................271 Alan
Kay
......................................................................................271
Linus Torvalds
............................................................................271
Chapter Review
................................................................................272
Key
Terms..........................................................................................273
Checkpoint
........................................................................................274
Web Research
....................................................................................275
Learn How To
..................................................................................276
Learn It
Online..................................................................................278
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page viii
10. CONTENTS ixCONTENTS Special Feature B U Y E R S G U I D E :
H O W T O P U R C H A S E A P E R S O N A L C O M P U T E R 279
CHAPTER 8 Communications and Networks..............295
COMMUNICATIONS
............................................................................296
USES OF COMPUTER
COMMUNICATIONS......................................297 Internet,
Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Blogs,
Wikis, RSS, VoIP, FTP, Web Folders, Video Conferencing, and Fax
..............................298 Wireless Messaging Services
....................................................298 ETHICS
& ISSUES: High-Tech Cheating via Wireless Messaging Services
............299 Wireless Internet Access Points
................................................300 Cybercafs
....................................................................................301
Global Positioning Systems
......................................................301
Collaboration
..............................................................................302
Groupware
..................................................................................302
Voice Mail
....................................................................................302
Web Services
................................................................................302
NETWORKS
..........................................................................................303
LANs, MANs, and WANs
........................................................303 Network
Architectures
..............................................................305
Network
Topologies....................................................................306
Intranets........................................................................................307
Network Communications Standards
....................................308 ETHICS & ISSUES: Should
You Worry about Cell Phone and Cellular Antenna Radiation?
..................................................................309
COMMUNICATIONS
SOFTWARE........................................................310
COMMUNICATIONS OVER THE TELEPHONE NETWORK ..............310 Dial-Up
Lines
..............................................................................311
Dedicated Lines
..........................................................................311
COMMUNICATIONS
DEVICES............................................................312
Dial-Up Modems
........................................................................313
ISDN and DSL Modems
............................................................314
Cable Modems
............................................................................314
Wireless Modems
........................................................................314
Network Cards
............................................................................315
Wireless Access
Points................................................................315
Routers..........................................................................................315
HOME NETWORKS
..............................................................................316
Wired Home Networks
..............................................................316
Wireless Home Networks
..........................................................316
COMMUNICATIONS CHANNEL
..........................................................317
LOOKING AHEAD: Technology Curbs Impaired Drivers
......................................319 PHYSICAL TRANSMISSION
MEDIA ..................................................319
Twisted-Pair
Cable......................................................................319
Coaxial Cable
..............................................................................320
Fiber-Optic Cable
........................................................................320
WIRELESS TRANSMISSION
MEDIA..................................................320 Infrared
........................................................................................321
Broadcast Radio
..........................................................................321
Cellular
Radio..............................................................................321
LOOKING AHEAD: Femto Base Stations Enhance Cell Phone
Signals..................321 Microwaves
..................................................................................321
Communications Satellite
..........................................................322
CHAPTER
SUMMARY..........................................................................322
COMPANIES ON THE CUTTING EDGE
..............................................323 Cisco Systems
..............................................................................323
Qualcomm....................................................................................323
TECHNOLOGY TRAILBLAZERS
..........................................................323
Robert
Metcalfe............................................................................323
Patricia Russo
..............................................................................323
Chapter Review
................................................................................324
Key
Terms..........................................................................................325
Checkpoint
........................................................................................326
Web Research
....................................................................................327
Learn How To
..................................................................................328
Learn It
Online..................................................................................330
CHAPTER 9 Database Management
......................................331 DATABASES, DATA, AND
INFORMATION ........................................332 Data
Integrity
..............................................................................333
Qualities of Valuable Information
............................................334 THE HIERARCHY OF
DATA
................................................................334
Characters
....................................................................................335
Fields
............................................................................................335
Records..........................................................................................336
Files................................................................................................336
ETHICS & ISSUES: Are Portable Storage Devices a Threat to
Businesses? ..........336 MAINTAINING DATA
............................................................................336
Adding Records
..........................................................................336
Changing Records
......................................................................338
Deleting Records
........................................................................338
Validating
Data............................................................................339
FILE PROCESSING VERSUS
DATABASES........................................340 File
Processing
Systems..............................................................341
The Database Approach
............................................................341
DATABASE MANAGEMENT
SYSTEMS..............................................343 Data
Dictionary
..........................................................................343
File Retrieval and Maintenance
................................................344 LOOKING AHEAD:
Archive an Entire Lifetime
..................................................345 Backup and
Recovery
................................................................346
Data
Security................................................................................346
ETHICS & ISSUES: Should People Be Punished for Accidently
Accessing Stolen
Data?..............................................................................................346
RELATIONAL, OBJECT-ORIENTED, AND MULTIDIMENSIONAL DATABASES
..............................................347 Relational
Databases
..................................................................347
Object-Oriented Databases
........................................................349
Multidimensional Databases
....................................................349 WEB
DATABASES
................................................................................350
ETHICS & ISSUES: Who Should Be Held Accountable for the Rash of
Database Security Breaches?
......................................................................350
DATABASE
ADMINISTRATION............................................................351
Database Design
Guidelines......................................................351
Role of the Database Anaylsts and Administrators
......................................................................351
Role of the Employee as User
..................................................351 CHAPTER
SUMMARY..........................................................................352
LOOKING AHEAD: Barcodes Identify Worlds Animal, Plant Species
....................352 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page
ix
11. x DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
COMPANIES ON THE CUTTING EDGE
..............................................353 Oracle
............................................................................................353
Sybase............................................................................................353
TECHNOLOGY TRAILBLAZERS
..........................................................353 E. F.
Codd
....................................................................................353
Larry Ellison
................................................................................353
Chapter Review
................................................................................354
Key
Terms..........................................................................................355
Checkpoint
........................................................................................356
Web Research
....................................................................................357
Learn How To
..................................................................................358
Learn It
Online..................................................................................360
CHAPTER 10 Computer Security, Ethics, and
Privacy............................................................................361
COMPUTER SECURITY RISKS
..........................................................362
INTERNET AND NETWORK ATTACKS
..............................................364 Computer Viruses,
Worms, and Trojan Horses ......................364 Safeguards
against Computer Viruses, Worms, and Trojan Horses
................................................................365
Botnets
..........................................................................................367
Denial of Service Attacks
..........................................................367 Back
Doors
..................................................................................367
Spoofing........................................................................................367
Safeguards against Botnets, DoS Attacks, Back Doors, and
Spoofing..........................................................................367
Firewalls........................................................................................367
Intrusion Detection Software
....................................................368
UNAUTHORIZED ACCESS AND USE
................................................368 Safeguards
against Unauthorized Access and Use
..................................................................................368
Identifying and Authenticating Users
....................................368 LOOKING AHEAD: Biometric
Software Aids Behavior Detection ..........................370
HARDWARE THEFT AND
VANDALISM..............................................371
Safeguards against Hardware Theft and Vandalism
..............................................................................371
SOFTWARE THEFT
..............................................................................372
Safeguards against Software Theft
..........................................372 INFORMATION
THEFT..........................................................................373
Safeguards against Information
Theft......................................373
Encryption....................................................................................373
SYSTEM FAILURE
................................................................................374
Safeguards against System Failure
..........................................374 BACKING UP THE
ULTIMATE SAFEGUARD................................375 WIRELESS
SECURITY
........................................................................375
ETHICS AND SOCIETY
........................................................................376
Information Accuracy
................................................................377
Intellectual Property Rights
......................................................378 ETHICS
& ISSUES: Is It Illegal to Delete Some Files from Your Own
Computer?..........................................................................................379
INFORMATION PRIVACY
....................................................................379
Electronic
Profiles........................................................................380
Cookies..........................................................................................380
Spyware and Adware
................................................................381
ETHICS & ISSUES: Should Spyware Be
Legal?................................................381 Phishing
........................................................................................381
Spam..............................................................................................382
Privacy
Laws................................................................................382
Social Engineering
......................................................................384
Employee Monitoring
................................................................384
Content Filtering
........................................................................384
Computer
Forensics....................................................................385
LOOKING AHEAD: Computer Knowledge Assessment Using Brain
Fingerprinting
............................................................................385
HEALTH CONCERNS OF COMPUTER USE
......................................385 Computers and Health
Risks ....................................................385
Ergonomics and Workplace Design
........................................386 Computer Addiction
..................................................................387
Green
Computing........................................................................387
CHAPTER
SUMMARY..........................................................................388
ETHICS & ISSUES: What Can Be Done to Stop the Growing Threat of
Cybercrime?
..........................................................................................388
COMPANIES ON THE CUTTING EDGE
..............................................389
McAfee..........................................................................................389
Symantec
......................................................................................389
TECHNOLOGY TRAILBLAZERS
..........................................................389 Donn
Parker
................................................................................389
Clifford Stoll
................................................................................389
Chapter Review
................................................................................390
Key
Terms..........................................................................................391
Checkpoint
........................................................................................392
Web Research
....................................................................................393
Learn How To
..................................................................................394
Learn It
Online..................................................................................396
Special Feature D I G I TA L E N T E R TA I N M E N T 397 CHAPTER
11 Information System Development and Programming Languages
....................405 THE SYSTEM DEVELOPMENT CYCLE
..............................................406 Who Participates
in the System Development Cycle? ..........407 LOOKING AHEAD:
Right-Brain Skills Essential for Analysts
Success....................408 Project Management
..................................................................408
Feasibility
Assessment................................................................409
Documentation
............................................................................409
Data and Information Gathering Techniques
........................410 ETHICS & ISSUES: Do You Work Harder
When Someone Is Watching? ................410 What Initiates the
System Development Cycle? ....................410 ETHICS &
ISSUES: How Can Workers Overcome Writers Block When Preparing
Documentation?
..........................................................................411
Cyber Coast Caf A Case Study
..........................................412 Planning Phase
............................................................................412
Planning at Cyber Coast Caf
..................................................413 Analysis
Phase
............................................................................413
Preliminary Investigation at Cyber Coast
Caf......................414 Detailed Analysis at Cyber Coast
Caf....................................416 Design
Phase................................................................................416
Hardware Acquisition at Cyber Coast
Caf............................418 Detailed Design at Cyber Coast
Caf ......................................420 Implementation
Phase................................................................420
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page x
12. xiCONTENTSCONTENTS LOOKING AHEAD: Training Delivery Becomes
Flexible ......................................421 Implementation
at Cyber Coast Caf ......................................421
Operation, Support, and Security Phase
................................422 Operation, Support, and
Security at Cyber Coast Caf ........422 PROGRAMMING LANGUAGES AND
PROGRAM DEVELOPMENT TOOLS
......................................................................423
Low-Level Languages
................................................................424
Procedural
Languages................................................................425
Object-Oriented Programming Languages and Program Development Tools
..............................................................427
Other Programming Languages
..............................................430 Classic
Programming Languages
............................................431 Other Program
Development Tools ........................................431
ETHICS & ISSUES: Who Should Be Held Accountable for Macro
Security Threats?
........................................................................................432
Web Page Development
............................................................433
Multimedia Program Development
........................................437 THE PROGRAM DEVELOPMENT
CYCLE ..........................................438 ETHICS &
ISSUES: Who Is Responsible for Bugs?
..........................................439 What Initiates the
Program Development Cycle?..................439 LOOKING AHEAD:
Software Factories Provide Low-Cost Programming Alternatives
............................................................................439
Control Structures
......................................................................440
CHAPTER
SUMMARY..........................................................................442
COMPANIES ON THE CUTTING EDGE
..............................................443 Computer Sciences
Corporation (CSC) ..................................443 Electronic
Arts (EA)
....................................................................443
TECHNOLOGY TRAILBLAZERS
..........................................................443 Grace
Hopper
..............................................................................443
James Gosling
..............................................................................443
Chapter Review
................................................................................444
Key
Terms..........................................................................................445
Checkpoint
........................................................................................446
Web Research
....................................................................................447
Learn How To
..................................................................................448
Learn It
Online..................................................................................450
CHAPTER 12 Enterprise
Computing............................................451 WHAT IS
ENTERPRISE
COMPUTING?..............................................452 Types
of Enterprise
....................................................................454
Organizational Structure of an Enterprise
..............................454 LOOKING AHEAD: The CEO of the
Future........................................................455
Levels of Users in the
Enterprise..............................................455 How
Managers Use
Information..............................................456
INFORMATION SYSTEMS IN THE ENTERPRISE
............................456 Information Systems within
Functional Units........................457 General Purpose
Information Systems ....................................461
Integrated Information Systems
..............................................465 ENTERPRISE-WIDE
TECHNOLOGIES AND METHODOLOGIES ......467 Portals
..........................................................................................467
Communications
........................................................................468
Data Warehouses
........................................................................468
Extranets
......................................................................................469
Web Services
................................................................................469
Workflow
......................................................................................469
Virtual Private Network
............................................................470
E-COMMERCE
......................................................................................470
E-Retailing....................................................................................470
ETHICS & ISSUES: Who Can You Trust When Making Purchases
Online? ............471
Finance..........................................................................................472
Health............................................................................................472
LOOKING AHEAD: Health Devices Automate Patients
Care................................472 Entertainment and
Media..........................................................472
ETHICS & ISSUES: Does Availability of News on the Web Threaten
the Daily
Newspaper?..................................................................................473
Travel
............................................................................................473
Other Business
Services..............................................................473
ENTERPRISE HARDWARE
..................................................................474
RAID..............................................................................................474
Network Attached Storage and Storage Area Networks
......................................................................475
Enterprise Storage Systems
......................................................476 ETHICS
& ISSUES: How Much Data Should Companies Be Required to
Keep?....476 Blade
Servers................................................................................477
High-Availability Systems
........................................................477
Scalability
....................................................................................477
Utility and Grid
Computing......................................................478
Virtualization
..............................................................................478
Interoperability............................................................................478
BACKUP
PROCEDURES......................................................................478
Disaster Recovery Plan
..............................................................479
CHAPTER
SUMMARY..........................................................................480
COMPANIES ON THE CUTTING EDGE
..............................................481 EMC
..............................................................................................481
IBM
................................................................................................481
TECHNOLOGY TRAILBLAZERS
..........................................................481 John
Chambers
............................................................................481
Jim Clark
......................................................................................481
Chapter Review
................................................................................482
Key
Terms..........................................................................................483
Checkpoint
........................................................................................484
Web Research
....................................................................................485
Learn How To
..................................................................................486
Learn It
Online..................................................................................488
APPENDIX A: QUIZ YOURSELF ANSWERS
................................APP 1
GLOSSARY/INDEX..........................................................................IND
1 PHOTO CREDITS
..........................................................................IND
29 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xi
13. Online Companion Use the Online Companion at
scsite.com/dcf5e to bring unparalleled currency to the learning
experience. Access additional information about important topics
and make use of online learning games, practice tests, and
additional reinforcement. Gain access to this dynamic site through
CoursePort, Course Technologys login page. xii DISCOVERING
COMPUTERS: Fundamentals, Fifth Edition Ethics and Issues Ethics and
Issues boxes raise controversial, computer-related topics of the
day, challenging readers to closely consider general concerns of
computers in society. Learn How To Apply the concepts presented in
the chapter to every day life with these hands-on activ- ities. See
the Learn How To activities in action with visual demonstrations on
the Online Companion. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page
xii
14. xiiiABOUT THE BOOK Career Corner Each chapter ends with a
Career Corner feature that introduces a computer career opportunity
relating to a topic covered in the chapter. Companies on the
Cutting Edge Everyone who interacts with computers should be aware
of the key computer- related companies. Each chapter profiles two
of these key companies. Technology Trailblazers The Technology
Trailblazers section in each chapter offers a glimpse into the life
and times of the more famous leaders of the computer industry. Quiz
Yourself Three Quiz Yourself boxes per chapter help ensure
retention by reinforcing sections of the chapter material, rather
than waiting for the end of the chap- ter to test. Use Appendix A
for a quick check of the answers, and access additional Quiz
Yourself quizzes on the Online Companion for interactivity and easy
use. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xiii
15. xiv DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
Learn It Online The Learn It Online exercises, which include brand
new online videos, practice tests, interactive labs, learning
games, and Web-based activities, offer a wealth of online
reinforcement. Looking Ahead The Looking Ahead boxes offer a
glimpse of the latest advances in computer technology that will be
available, usually within five years. FAQ FAQ (frequently asked
questions) boxes offer common questions and answers about subjects
related to the topic at hand. Web Link Obtain current information
and a different perspective about key terms and concepts by
visiting the Web addresses in the Web Links found in the margins
throughout the book. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xiv
16. xvABOUT THE BOOK Chapter Review Use the Chapter Review
before taking an examination to ensure familiarity with the
computer concepts presented. This section includes each objective,
followed by a one- or two-paragraph summary. Key Terms Before
taking a test, use the Key Terms page as a checklist of terms to
know. Visit a Key Terms page on the Online Companion and click any
term for additional information. Checkpoint Use these multiple
choice, true/false, matching, short answer, and working together
exercises to reinforce understanding of the topics presented in the
chapter. Web Research Each Web Research exercise requires follow-up
research on the Web, and suggests writing a short article or
presenting the findings of the research to the class.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xv
17. xvi DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
Chapter Objectives and Table of Contents Before reading the
chapter, carefully read through the Objectives and Contents to
discover knowledge that will be gleaned from chapter. Initial
Chapter Figure Carefully study the first figure in each chapter
because it provides an easy-to-follow overview of the major purpose
of the chapter. Step Figures Each chapter includes numerous step
figures that present the more complex computer concepts using a
step-by-step pedagogy. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page
xvi
18. xviiABOUT THE BOOK Glossary/Index The Glossary/Index at the
back of the book not only provides page references, it also offers
definitions for all the key terms included in the text and boxed
features. Special Features Five special features following Chapters
1, 2, 5, 7, and 10 encompass topics from the history of computers,
to whats hot on the Web, to a buyers guide, to the latest in new
technology. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xvii
19. xviii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
Preface The Shelly Cashman Series offers the finest textbooks in
computer education. This book is our answer to the many requests we
have received from instructors and students for a textbook that
provides a succinct, yet thorough, introduction to computers. In
Discovering Computers: Fundamentals, Fifth Edition, you will find
an educationally sound, highly visual, and easy-to-follow pedagogy
that presents a complete, yet to the point, treatment of
introductory computer subjects. Students will finish the course
with a solid understanding of computers, how to use computers, and
how to access information on the World Wide Web. NEW TO THIS
EDITION Discovering Computers: Fundamentals, Fifth Edition includes
exciting new features, certain to engage and challenge students,
making learning with Discovering Computers: Fundamentals, Fifth
Edition an enriched experience. These new features include:
Comprehensive updates for currency, including coverage of new
hardware and software, digital communications, social networking
and other societal issues, career opportunities, and industry
trends. Brand new CNET At the Movies videos highlight current
events of interest to students in the world of technology, bringing
relevance to the concepts course. Brand new Blogging exercise on
the Web Research page engages students and brings relevance to the
concepts course. Revised chapter features such as Ethics and
Issues, Looking Ahead, FAQ, Web Links, Companies on the Cutting
Edge, and Technology Trailblazers include the most relevant and
interesting examples to students. Updated Checkpoint exercises
reinforce students understanding of key concepts presented in the
chapters. OBJECTIVES OF THIS TEXTBOOK Discovering Computers:
Fundamentals, Fifth Edition is intended for use as a stand-alone
textbook or in combination with an applications, Internet, or
programming textbook in a one-quarter or one-semester introductory
computer course. No experience with computers is assumed. The
objectives of this book are to: Provide a concise, yet
comprehensive introduction to computers Present the most-up-to-date
technology in an ever-changing discipline Give students an
understanding of why computers are essential components in business
and society Teach the fundamentals of computers and computer
nomenclature, particularly with respect to personal computer
hardware and software, the World Wide Web, and enterprise computing
Present the material in a visually appealing and exciting manner
that motivates students to learn Present strategies for purchasing
a notebook computer, a Tablet PC, and a PDA Offer alternative
learning techniques and reinforcement via the Web Offer
distance-education providers a textbook with a meaningful and
exercise-rich Online Companion C6671_FM_pp6.qxd 1/30/08 1:15 PM
Page xviii
20. xixPREFACE DISTINGUISHING FEATURES To date, more than six
million students have learned about computers using a Discovering
Computers textbook. With the additional World Wide Web integration
and interactivity, stream- ing up-to-date audio and video,
extraordinary step-by-step visual drawings and photographs,
unparalleled currency, and the Shelly and Cashman touch, this book
will make your computer concepts course exciting and dynamic.
Distinguishing features of this book include: A Proven Pedagogy
Careful explanations of complex concepts, educationally-sound
elements, and reinforcement highlight this proven method of
presentation. Essential Computer Concepts Coverage This book offers
the same breadth of topics as our well-known Discovering Computers
2009: Complete, but the depth of coverage focuses on the basic
knowledge required to be computer literate in todays digi- tal
world. A Visually Appealing Book that Maintains Student Interest
The latest technology, pictures, drawings, and text are combined
art- fully to produce a visually appealing and easy-to-understand
book. Many of the figures include a step-by-step presentation (see
page 141), which simplifies the more complex computer concepts.
Pictures and drawings reflect the latest trends in computer
technology. Latest Technologies and Terms The technologies and
terms your students see in this book are those they will encounter
when they start using computers. Only the latest application
software packages are shown throughout the book. World Wide Web
Enhanced This book uses the World Wide Web as a major supplement.
The purpose of integrating the World Wide Web into the book is to
(1) offer students additional information and currency on important
topics; (2) use its interactive capabilities to offer cre- ative
reinforcement and online quizzes; (3) make available alternative
learning techniques with Web-based learning games, practice tests,
and interactive labs; (4) underscore the relevance of the World
Wide Web as a basic information tool that can be used in all facets
of society; (5) introduce stu- dents to doing research on the Web;
and (6) offer instructors the opportunity to organize and
administer their traditional campus-based or
distance-education-based courses on the Web using the Blackboard
platform. This textbook, however, does not depend on Web access to
be used successfully. The Web access adds to the already complete
treatment of topics within the book. Extensive End-of-Chapter
Materials A notable strength of this book is the extensive student
activi- ties at the end of each chapter. Well-structured student
activities can make the difference between students merely
participating in a class and students retaining the information
they learn. The activities in this book include: Chapter Review,
Key Terms, Checkpoint, Web Research, Learn How To, and Learn It
Online. C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xix
21. xx DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
ORGANIZATION OF THIS TEXTBOOK Discovering Computers: Fundamentals,
Fifth Edition provides a thorough, but succinct, introduction to
computers. The material is divided into twelve chapters, five
special features, and a glossary/index. Chapter 1 Introduction to
Computers In Chapter 1, students are introduced to basic computer
concepts, such as what a computer is, how it works, and what makes
it a powerful tool. Special Feature Timeline: Milestones in
Computer History In this special feature, students learn about the
major computer technology developments during the past 72 years.
Chapter 2 The Internet and World Wide Web In Chapter 2, students
learn about the Internet, World Wide Web, browsers, e-mail, FTP,
and instant messaging. Special Feature Making Use of the Web In
this special feature, more than 150 popular up-to-date Web sites
are listed and described. Now includes a section on Online Social
Networks and Media Sharing. Basic searching techniques are also
introduced. Chapter 3 Application Software In Chapter 3, students
are introduced to a variety of business software, graphics and
multimedia software, home/personal/educational software, and
communications software. Chapter 4 The Components of the System
Unit In Chapter 4, students are introduced to the components of the
system unit; how memory stores data, instructions, and information;
and how the system unit executes an instruction. Chapter 5 Input
and Output Chapter 5 describes the various methods of input and
output, and commonly used input and output devices. Special Feature
Digital Imaging and Video Technology In this special feature,
students are introduced to using a personal computer, digital
camera, and digital video camera to manipulate and distribute
photographs and video. Chapter 6 Storage In Chapter 6, students
learn about various storage media and storage devices.
C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xx
22. Chapter 7 Operating Systems and Utility Programs In Chapter
7, students learn about a variety of stand-alone operating systems,
network operating systems, and embedded operating systems. Special
Feature Buyers Guide: How to Purchase a Personal Computer In this
special feature, students are introduced to purchasing a desktop
computer, notebook computer, and Tablet PC. Chapter 8
Communications and Networks Chapter 8 provides students with an
overview of communications technology and applications. Chapter 9
Database Management Chapter 9 presents students with the advantages
of organizing data in a data- base and describes various types of
data. Chapter 10 Computer Security, Ethics, and Privacy In Chapter
10, students learn about computer and Internet risks, ethical
issues surrounding information accuracy, intellectual property
rights, codes of conduct, information privacy, and computer-related
health issues. Special Feature: Digital Entertainment In this
special feature, students are introduced to the personal computer
as a digital entertainment device. Chapter 11 Information System
Development and Programming Languages In Chapter 11, students are
introduced to the system development cycle and guide- lines for
system development. This chapter also presents the program
development cycle, program design meth- ods, and popular
programming languages. Chapter 12 Enterprise Computing In Chapter
12, students learn about the special computing requirements used in
an enterprise-sized organization. Appendix A Quiz Yourself Answers
Appendix A provides the answers for the Quiz Yourself questions in
the text. Glossary/Index The Glossary/Index includes a definition
and page references for every key term presented in the book.
xxiPREFACE C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xxi
23. xxii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition
SHELLY CASHMAN SERIES INSTRUCTOR RESOURCES The Shelly Cashman
Series is dedicated to providing you with all of the tools you need
to make your class a success. The contents of the Instructor
Resources and Course Presenter discs (1-4239-2703-6) are described
below. Information on all supplementary materials is available
through your Course Technology representative or by calling one of
the following telephone numbers: Colleges, Universities, Continuing
Education Departments, Post-Secondary Vocational Schools, and
Career Colleges, Business, Industry, Government, Trade, Retailer,
Wholesaler, Library, and Resellers, 1-800-648-7450; K-12 Schools,
Secondary Vocational Schools, Adult Education, and School
Districts, 1-800-824-5179; Canada, 1-800-268-2222. Instructor
Resources The Instructor Resources includes both teaching and
testing aids. Instructors Manual The Instructors Manual is made up
of Microsoft Word files, which include lecture notes that summarize
the sections of the chapters, figures and boxed elements found in
the chapters, teacher tips, classroom activities, and lab
activities. Syllabus Sample syllabus, which can be customized
easily to a course, is included. The syllabus covers policies,
class and lab assignments and exams, and procedural information.
Figure Files Illustrations for every figure in the textbook are
available in electronic form. Figures are provided both with and
without callouts. Use this ancillary to present a slide show in
lecture or to print transparencies for use in lecture with an
overhead projector. If you have a personal computer and LCD device,
this ancillary can be an effective tool for presenting lectures.
Solutions to Exercises Solutions are included for all
end-of-chapter exercises. Test Bank & Test Engine The ExamView
test bank includes 112 questions for every chapter (40
multiple-choice, 5 modified multiple-choice, 25 true/false, 5
modified true/false, 20 com- pletion, 10 matching, 3 essays and 2
cases with 2 case-based questions each). The test bank also
includes page number references, and when appropriate, figure
references. The test bank comes with a copy of the test engine,
ExamView, the ultimate tool for your objective-based testing needs.
Printed Test Bank A Rich Text Format (.rtf) version of the test
bank you can print also is included. Data Files for Students All
the files that are required by students to complete the exercises
are included. You can distribute the files on the Instructor
Resources disc to your students over a network, or you can have
them follow the instructions on the inside back cover of this book
to obtain the Data Files for Students. Course Presenter Course
Presenter is a one-click-per-slide presentation system on disc that
provides PowerPoint slides for every subject in each chapter. Use
this presentation system to give interesting, well-organized, and
knowledge-based lectures. Several brand new computer- related video
clips are available for optional presentation. Course Presenter
provides consistent coverage for multiple lecturers.
C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xxii
24. xxiiiPREFACE Student Edition Labs Our Web-based interactive
labs help students master hundreds of computer concepts, including
input and output devices, file management and desktop applications,
com- puter ethics, virus protection, and much more. Featuring
up-to-the-minute content, eye-popping graphics, and rich animation,
the highly interactive Student Edition Labs offer students an
alternative way to learn through dynamic observation, step-by-step
practice, and challenging review questions. Access the free Student
Edition Labs from the Discovering Computers: Fundamentals, Fifth
Edition Online Companion at scsite.com/dcf5e or see the Student
Edition Lab exercises on the Learn It Online pages at the end of
each chapter. Also available on CD at an additional cost. Online
Content Blackboard is the leading distance learning solution
provider and class-management platform today. Course Technology has
partnered with Blackboard to bring you pre- mium online content.
Instructors: Content for use with Discovering Computers:
Fundamentals, Fifth Edition is available in a Blackboard Course
Cartridge and includes topic reviews, case projects, review
questions, test banks, practice tests, custom syllabus, and more.
Thomson Course Technology also has solutions for several other
learning management systems. Please visit http://www.course.com
today to see whats available for this title. SAM 2007 Add more
flexibility to your course with SAM. SAM (Skills Assessment
Manager) helps you energize your training assignments by allowing
students to train and test on important computer skills in an
active, hands-on environment. By adding SAM to your curriculum, you
can: Reinforce your students knowledge of key skills with hands-on
application exercises. Allow your students to learn by listening
with rich audio in their computer labs. Build computer concepts
exams from a test bank of more than 50,000 objective-based
questions. Schedule your students assignments with powerful
administrative tools. Track student exam grades and training
progress using helpful reports by class or by student. SAM features
assessment, training, and project-grading solutions for skills in
both Microsoft Office 2003 and Office 2007. Let SAM save you time
in grading, while students get hands-on practice on valuable
real-world skills. CourseCasts Learning on the Go. Always
available. . . always relevant. Want to keep up with the latest
technology trends relevant to you? Visit our site to find a library
of podcasts, CourseCasts, featuring a CourseCast of the Week, and
download them to your mp3 player at http://coursecasts.course.com
Our fast-paced world is driven by technology. You know because
youre an active participant always on the go, always keeping up
with technological trends, and always learning new ways to embrace
technology to power your life. Ken Baldauf, a faculty member of the
Florida State University Computer Science Department, is
responsible for teaching technology classes to thousands of FSU
students each year. He knows what you know; he knows what you want
to learn. Hes also an expert in the latest technology and will sort
through and aggregate the most pertinent news and information so
you can spend your time enjoying technology, rather than trying to
figure it out. Visit us at http://coursecasts.course.com to learn
on the go! C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xxiii
25. Learning styles of students have changed, but the Shelly
Cashman Series dedication to their success has remained steadfast
for over 30 years. We are committed to continually updating our
approach and content to reflect the way todays students learn and
experience new technology. This focus on the user is reflected in
our bold cover design, which features photographs of real students
using the Shelly Cashman Series in their courses. Each book
features a different user, reflecting the many ages, experiences,
and backgrounds of all of the students learning with our books.
When you use the Shelly Cashman Series, you can be assured that you
are learning computer skills using the most effective courseware
available. We would like to thank the administration and faculty at
the participating schools for their help in making our vision a
reality. Most of all, wed like to thank the wonderful students from
all over the world who learn from our tex