Discovering Computers: Fundamentals, Fifth Edition

553
Gain Access to the Discovering Computers: Fundamentals, Fifth Edition Online Companion! Powered by To create a new student user profile COURSE Gaining access to the interactive learning activities on this Online Companion is easy— all you need to do is create a user profile. This simple, one-time process establishes you as a user in the CoursePort authentication system. Students and instructors can then reinforce the concepts they're covering in the texts with interactive learning activities. Visit http://login.course.com Click New User Registration. Enter the required, basic information on the New User Registration screen. You should see a Registration Successful screen. Please click the Continue button. You will then be brought to the Choose Your Product page. Check the box next to the title of the text and upon clicking Submit (at the bottom of the page), you’re in!! From the My Account page, click the name of product to launch the Online Companion. As a student, you can view your own progress in the Universal Gradebook, accessed from the My Account tab. Click View My Grades at the bottom of the page. NOTE: If your instructor has chosen to track your activities in the CoursePort Universal Gradebook, you may need to Join a Class from the My Account tab. Features of the Discovering Computers: Fundamentals, Fifth Edition Online Companion include: Additional information and unparalleled currency on important topics; Discussion Forum and Learn How To visual demonstrations; Key Terms page complete with definitions, Web links, audio and illustrative animations; Discovering Computers Timeline; Learn It Online exercises, online videos, practice tests, learning games, and Web-based activities; CoursePort personalized home page and the Universal Gradebook. What you’ll gain access to C6671_IFC_pp.qxd 1/30/08 12:55 PM Page b

Transcript of Discovering Computers: Fundamentals, Fifth Edition

  1. 1. Gain Access to the Discovering Computers: Fundamentals, Fifth Edition Online Companion! Powered by To create a new student user profile COURSE Gaining access to the interactive learning activities on this Online Companion is easy all you need to do is create a user profile. This simple, one-time process establishes you as a user in the CoursePort authentication system. Students and instructors can then reinforce the concepts they're covering in the texts with interactive learning activities. Visit http://login.course.com Click New User Registration. Enter the required, basic information on the New User Registration screen. You should see a Registration Successful screen. Please click the Continue button. You will then be brought to the Choose Your Product page. Check the box next to the title of the text and upon clicking Submit (at the bottom of the page), youre in!! From the My Account page, click the name of product to launch the Online Companion. As a student, you can view your own progress in the Universal Gradebook, accessed from the My Account tab. Click View My Grades at the bottom of the page. NOTE: If your instructor has chosen to track your activities in the CoursePort Universal Gradebook, you may need to Join a Class from the My Account tab. Features of the Discovering Computers: Fundamentals, Fifth Edition Online Companion include: Additional information and unparalleled currency on important topics; Discussion Forum and Learn How To visual demonstrations; Key Terms page complete with definitions, Web links, audio and illustrative animations; Discovering Computers Timeline; Learn It Online exercises, online videos, practice tests, learning games, and Web-based activities; CoursePort personalized home page and the Universal Gradebook. What youll gain access to C6671_IFC_pp.qxd 1/30/08 12:55 PM Page b
  2. 2. Discovering Computers Fundamentals Fifth Edition C6671_FM_pp6.qxd 1/30/08 1:14 PM Page i
  3. 3. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page ii
  4. 4. Discovering Computers Gary B. Shelly Misty E. Vermaat Contributing Authors Jeffrey J. Quasney Susan L. Sebok Jeffrey J. Webb Steven M. Freund Fundamentals Fifth Edition Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States Shelly Cashman Series An imprint of Course Technology, Cengage Learning C6671_FM_pp6.qxd 1/30/08 1:14 PM Page iii
  5. 5. Discovering Computers: Fundamentals, Fifth Edition Gary B. Shelly Misty E. Vermaat Executive Editor: Alexandra Arnold Senior Product Manager: Reed Curry Associate Product Manager: Klenda Martinez Editorial Assistant: Jon Farnham Marketing Director: Tristen Kendall Marketing Coordinator: Julie Schuster Print Buyer: Julio Esperas Content Project Manager: Matthew Hutchinson Consultant: Joel Sadagursky Researcher: F. William Vermaat Development Editor: Lyn Markowicz Proofreader: Nancy Lamm Final Reader: Pam Baxter Management Services: Pre-PressPMG Interior Designer: Pre-PressPMG Art Director: Bruce Bond Cover and Text Design: Joel Sadagursky Cover Photos: Jon Chomitz Illustrator: Pre-PressPMG Compositor: Pre-PressPMG Printer: RRD Menasha 2008 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information net- works, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. ISBN-10: 1-4239-2702-8 ISBN-13: 978-1-4239-2702-0 Course Technology 25 Thomson Place Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil and Japan. Locate your local office at: international.cengage.com/region Cengage Learning products are represented in Canada by Nelson Education, Ltd. For your lifelong learning solutions, visit course.cengage.com For product information and technology assistance, contact us at Cengage Learning Academic Resource Center, 1-800-423-0563 For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to [email protected] Printed in the United States of America 1 2 3 4 5 6 7 14 13 12 11 10 09 08 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page iv
  6. 6. v Contents CHAPTER 1 Introduction to Computers ................................1 A WORLD OF COMPUTERS....................................................................2 WHAT IS A COMPUTER?........................................................................3 Data and Information ....................................................................4 Advantages and Disadvantages of Using Computers ..............4 LOOKING AHEAD: Paying by Cell Phone ............................................................5 Information Processing Cycle ......................................................5 THE COMPONENTS OF A COMPUTER ................................................6 Input Devices ..................................................................................7 Output Devices................................................................................7 System Unit......................................................................................7 Storage Devices................................................................................7 Communication Devices................................................................8 NETWORKS AND THE INTERNET..........................................................8 COMPUTER SOFTWARE ......................................................................10 System Software ............................................................................10 Application Software ....................................................................11 ETHICS & ISSUES: What Can Be Done to Combat Computer Addiction? ..............11 Installing and Running Programs ..............................................11 Software Development ................................................................12 CATEGORIES OF COMPUTERS............................................................13 PERSONAL COMPUTERS......................................................................14 Desktop Computers......................................................................14 MOBILE COMPUTERS AND MOBILE DEVICES ................................14 Notebook Computers ..................................................................14 Mobile Devices ..............................................................................15 GAME CONSOLES..................................................................................16 SERVERS ................................................................................................16 MAINFRAMES ........................................................................................17 SUPERCOMPUTERS..............................................................................17 EMBEDDED COMPUTERS ....................................................................17 EXAMPLES OF COMPUTER USAGE ..................................................18 Home User ....................................................................................18 ETHICS & ISSUES: What Should Be Done about Identity Theft? ..........................19 Small Office/Home Office User ..................................................20 Mobile User....................................................................................20 Power User ....................................................................................21 Large Business User......................................................................21 COMPUTER APPLICATIONS IN SOCIETY ..........................................22 LOOKING AHEAD: Robots Perform Mundane, Dangerous Tasks ............................22 Education........................................................................................22 Finance............................................................................................23 Government ..................................................................................23 Health Care ....................................................................................23 Science ............................................................................................24 Publishing ......................................................................................25 Travel ..............................................................................................25 Manufacturing ..............................................................................25 CHAPTER SUMMARY............................................................................26 COMPANIES ON THE CUTTING EDGE ................................................27 Dell ..................................................................................................27 Apple Computer ..........................................................................27 TECHNOLOGY TRAILBLAZERS ............................................................27 Bill Gates ........................................................................................27 Anne Mulcahy ..............................................................................27 Chapter Review ..................................................................................28 Key Terms............................................................................................29 Checkpoint ..........................................................................................30 Web Research ......................................................................................31 Learn How To ....................................................................................32 Learn It Online....................................................................................34 Special Feature T I M E L I N E : M I L E S T O N E S I N C O M P U T E R H I S T O R Y 35 CHAPTER 2 The Internet and World Wide Web........49 THE INTERNET ......................................................................................50 HOW THE INTERNET WORKS ..............................................................51 Connecting to the Internet ..........................................................51 Access Providers............................................................................52 How Data Travels the Internet....................................................52 Internet Addresses ........................................................................53 THE WORLD WIDE WEB ......................................................................54 Browsing the Web ........................................................................54 Web Addresses ..............................................................................56 Navigating Web Pages..................................................................57 LOOKING AHEAD: Internet Speeds into the Future ............................................57 Searching for Information on the Web ......................................58 Types of Web Sites ........................................................................61 ETHICS & ISSUES: Should You Trust a Wiki for Academic Research? ....................63 Evaluating a Web Site ..................................................................63 Multimedia on the Web................................................................64 Web Publishing..............................................................................66 E-Commerce ..................................................................................67 Discovering Computers Fundamentals Fifth Edition C6671_FM_pp6.qxd 1/30/08 1:14 PM Page v
  7. 7. vi DISCOVERING COMPUTERS: Fundamentals, Fifth Edition OTHER INTERNET SERVICES ..............................................................68 E-Mail..............................................................................................69 Mailing Lists ..................................................................................71 Instant Messaging ........................................................................71 Chat Rooms....................................................................................71 VoIP ................................................................................................72 FTP ..................................................................................................72 Newsgroups and Message Boards..............................................73 NETIQUETTE ..........................................................................................73 CHAPTER SUMMARY............................................................................74 ETHICS & ISSUES: Should Companies Be Able to Track Your Online Habits? ..........74 COMPANIES ON THE CUTTING EDGE ................................................75 Google ............................................................................................75 Yahoo!..............................................................................................75 TECHNOLOGY TRAILBLAZERS ............................................................75 Tim Berners-Lee ............................................................................75 Meg Whitman................................................................................75 Chapter Review ..................................................................................76 Key Terms............................................................................................77 Checkpoint ..........................................................................................78 Web Research ......................................................................................79 Learn How To ....................................................................................80 Learn It Online....................................................................................82 Special Feature M A K I N G U S E O F T H E W E B 83 CHAPTER 3 Application Software................................................99 APPLICATION SOFTWARE ..................................................................100 The Role of System Software ....................................................101 Working with Application Software ........................................102 LOOKING AHEAD: Touch Drive Your Computer Screen ......................................103 BUSINESS SOFTWARE........................................................................104 Word Processing Software ........................................................105 Developing a Document ............................................................106 Spreadsheet Software ................................................................107 Database Software ......................................................................108 Presentation Graphics Software................................................109 Note Taking Software ................................................................110 Personal Information Manager Software ................................110 Personal Mobile Device Business Software ............................110 Software Suite ..............................................................................110 Project Management Software ..................................................111 Accounting Software ..................................................................111 Document Management Software ............................................111 Enterprise Computing Software ..............................................112 GRAPHICS AND MULTIMEDIA SOFTWARE......................................112 Computer-Aided Design............................................................113 Desktop Publishing Software (for the Professional) ............................................................113 Paint/Image Editing Software (for the Professional) ............................................................113 Video and Audio Editing Software (for the Professional) ............................................................114 ETHICS & ISSUES: Should It Be Legal to Share Copyrighted Music or Video Files over a Network? ..................................................................................114 Multimedia Authoring Software ..............................................114 Web Page Authoring Software ..................................................114 SOFTWARE FOR HOME, PERSONAL, AND EDUCATIONAL USE........................................................................115 Software Suite (for Personal Use) ............................................116 Personal Finance Software ........................................................116 Legal Software ............................................................................117 Tax Preparation Software ..........................................................117 Desktop Publishing Software (for Personal Use)..................................................................117 Paint/Image Editing Software (for Personal Use)..................................................................118 Clip Art/Image Gallery..............................................................118 Video and Audio Editing Software (for Personal Use)..................................................................119 Home Design/Landscaping Software......................................119 Travel and Mapping Software ..................................................119 Educational and Reference Software........................................119 Entertainment Software..............................................................120 APPLICATION SOFTWARE FOR COMMUNICATIONS ....................120 ETHICS & ISSUES: Should Companies Monitor Employees E-Mail and Internet Traffic? ..........................................................................121 POPULAR UTILITY PROGRAMS ........................................................121 WEB-BASED SOFTWARE ....................................................................122 LOOKING AHEAD: Using Semantics with Web 3.0 ............................................122 LEARNING AIDS AND SUPPORT TOOLS FOR APPLICATION SOFTWARE ............................................................123 Web-Based Training ....................................................................123 CHAPTER SUMMARY..........................................................................124 ETHICS & ISSUES: Copying Software A Computer Crime!..............................124 COMPANIES ON THE CUTTING EDGE ..............................................125 Adobe Systems ............................................................................125 Microsoft ......................................................................................125 TECHNOLOGY TRAILBLAZERS ..........................................................125 Dan Bricklin ................................................................................125 Masayoshi Son ............................................................................125 Chapter Review ................................................................................126 Key Terms..........................................................................................127 Checkpoint ........................................................................................128 Web Research ....................................................................................129 Learn How To ..................................................................................130 Learn It Online..................................................................................132 CHAPTER 4 The Components of the System Unit ........................................................................133 THE SYSTEM UNIT ..............................................................................134 The Motherboard ........................................................................136 PROCESSOR ........................................................................................137 The Control Unit ........................................................................137 The Arithmetic Logic Unit ........................................................138 Machine Cycle ............................................................................138 The System Clock........................................................................138 LOOKING AHEAD: Fastest Supercomputer Will Have Petaflop Speed ..................139 Comparison of Personal Computer Processors......................139 Buying a Personal Computer ....................................................139 ETHICS & ISSUES: Discarded Computer Components: Whose Problem Is It? ......139 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page vi
  8. 8. CONTENTS viiCONTENTS DATA REPRESENTATION ....................................................................140 MEMORY ..............................................................................................142 Bytes and Addressable Memory ..............................................142 Memory Sizes ..............................................................................142 Types of Memory ........................................................................142 RAM ..............................................................................................143 ETHICS & ISSUES: Should Schools Supply Computers to All Students?..............144 Cache ............................................................................................144 ROM ..............................................................................................145 Flash Memory..............................................................................145 CMOS............................................................................................146 Memory Access Times................................................................146 EXPANSION SLOTS AND ADAPTER CARDS....................................147 Flash Memory Cards, USB Flash Drives, PC Cards, and ExpressCard Modules..................................147 PORTS AND CONNECTORS................................................................148 Serial Ports....................................................................................149 Parallel Ports................................................................................149 USB Ports......................................................................................149 FireWire Ports ..............................................................................150 Special-Purpose Ports ................................................................150 BUSES....................................................................................................151 BAYS ......................................................................................................151 POWER SUPPLY ..................................................................................152 MOBILE COMPUTERS AND DEVICES ..............................................152 PUTTING IT ALL TOGETHER ..............................................................154 LOOKING AHEAD: Body Heat May Power Notebook Computers ..........................154 KEEPING YOUR COMPUTER CLEAN ................................................155 CHAPTER SUMMARY..........................................................................156 COMPANIES ON THE CUTTING EDGE ..............................................157 AMD..............................................................................................157 Intel................................................................................................157 TECHNOLOGY TRAILBLAZERS ..........................................................157 Jack Kilby......................................................................................157 Gordon Moore ............................................................................157 Chapter Review ................................................................................158 Key Terms..........................................................................................159 Checkpoint ........................................................................................160 Web Research ....................................................................................161 Learn How To ..................................................................................162 Learn It Online..................................................................................164 CHAPTER 5 Input and Output ..........................................................165 WHAT IS INPUT?..................................................................................166 KEYBOARD AND POINTING DEVICES ..............................................167 The Keyboard ..............................................................................168 Mouse............................................................................................169 ETHICS & ISSUES: Are Employers Responsible for Medical Problems Related to Computer Use?..............................................................169 Trackball........................................................................................170 Touchpad ......................................................................................170 Pointing Stick ..............................................................................170 Light Pen ......................................................................................170 Touch Screen ................................................................................170 Pen Input ......................................................................................171 GAMING AND MEDIA PLAYER CONTROLLERS ..............................172 Gamepads ....................................................................................172 Joystick and Wheels....................................................................172 Light Guns....................................................................................172 Dance Pads ..................................................................................172 Motion-Sensing Game Controllers ..........................................172 Touch-Sensitive Pads ..................................................................172 OTHER TYPES OF INPUT....................................................................173 LOOKING AHEAD: Controlling Games by Thinking ............................................173 Voice Input ..................................................................................173 Input for Smart Phones, PDAs, and Tablet PCs ....................174 Digital Cameras ..........................................................................175 Video Input ..................................................................................176 Scanners and Reading Devices ................................................177 ETHICS & ISSUES: Is Using the Self-Checkout Saving Anybody Time or Money? ....178 LOOKING AHEAD: Clothing, Appliances Show RFID Uses ..................................179 Terminals ......................................................................................180 Biometric Input............................................................................181 WHAT IS OUTPUT? ..............................................................................182 DISPLAY DEVICES................................................................................183 LCD Monitors and LCD Screens ..............................................184 Plasma Monitors..........................................................................185 CRT Monitors ..............................................................................186 PRINTERS..............................................................................................187 Producing Printed Output ........................................................188 Nonimpact Printers ....................................................................189 Ink-Jet Printers ............................................................................189 Photo Printers ..............................................................................190 LOOKING AHEAD: Talking Paper Provides Information, Warnings ........................190 Laser Printers ..............................................................................190 Thermal Printers..........................................................................191 Mobile Printers ............................................................................192 Plotters and Large-Format Printers..........................................192 Impact Printers ............................................................................192 OTHER OUTPUT DEVICES ..................................................................193 Speakers, Headphones, and Earphones ..................................193 Fax Machines and Fax Modems ..............................................194 Multifunction Peripherals..........................................................194 Data Projectors ............................................................................195 Interactive Whiteboards ............................................................195 PUTTING IT ALL TOGETHER ..............................................................196 INPUT AND OUTPUT DEVICES FOR PHYSICALLY CHALLENGED USERS....................................................................197 ETHICS & ISSUES: Should Web Sites Be Held Accountable for Accessibility Levels for Physically Challenged People? ......................................197 CHAPTER SUMMARY..........................................................................198 COMPANIES ON THE CUTTING EDGE ..............................................199 Logitech ........................................................................................199 Hewlett-Packard..........................................................................199 TECHNOLOGY TRAILBLAZERS ..........................................................199 Douglas Engelbart ......................................................................199 Donna Dubinsky ........................................................................199 Chapter Review ................................................................................200 Key Terms..........................................................................................202 Checkpoint ........................................................................................203 Web Research ....................................................................................204 Learn How To ..................................................................................205 Learn It Online..................................................................................207 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page vii
  9. 9. viii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition Special Feature D I G I TA L I M A G I N G A N D V I D E O T E C H N O L O G Y 208 CHAPTER 6 Storage........................................................................................219 STORAGE ..............................................................................................220 MAGNETIC DISKS................................................................................222 Hard Disks....................................................................................223 LOOKING AHEAD: Heat Increases Disk Capacity..............................................223 Floppy Disks ................................................................................228 OPTICAL DISCS....................................................................................229 LOOKING AHEAD: Interactive Gift Cards Provide Marketing Opportunities ............231 CD-ROMs ....................................................................................231 CD-Rs and CD-RWs....................................................................232 DVD-ROMs, BD-ROMs, and HD DVD-ROMs ......................233 ETHICS & ISSUES: Is the Blu-Ray and HD DVD Competition Good for Consumers?..................................................................................233 Recordable and Rewritable DVDs............................................234 TAPE ......................................................................................................234 PC CARDS AND EXPRESSCARD MODULES ..................................235 MINIATURE MOBILE STORAGE MEDIA............................................235 Flash Memory Cards ..................................................................236 USB Flash Drives ........................................................................236 Smart Cards..................................................................................237 ETHICS & ISSUES: Should the World Become a Cashless Society?....................237 MICROFILM AND MICROFICHE ........................................................238 ENTERPRISE STORAGE ......................................................................238 PUTTING IT ALL TOGETHER ..............................................................239 ETHICS & ISSUES: Who Should Be Looking at Your Medical Records? ..............239 CHAPTER SUMMARY..........................................................................240 ETHICS & ISSUES: Who Is Responsible for Maintaining Your Online Storage? ......240 COMPANIES ON THE CUTTING EDGE ..............................................241 Seagate Technology ....................................................................241 SanDisk Corporation ..................................................................241 TECHNOLOGY TRAILBLAZERS ..........................................................241 Al Shugart ....................................................................................241 Mark Dean....................................................................................241 Chapter Review ................................................................................242 Key Terms..........................................................................................243 Checkpoint ........................................................................................244 Web Research ....................................................................................245 Learn How To ..................................................................................246 Learn It Online..................................................................................248 CHAPTER 7 Operating Systems and Utility Programs ............................................................249 SYSTEM SOFTWARE ..........................................................................250 OPERATING SYSTEMS ........................................................................251 OPERATING SYSTEM FUNCTIONS ....................................................252 Starting a Computer ..................................................................252 Providing a User Interface ........................................................253 Managing Programs ..................................................................253 Managing Memory ....................................................................255 Coordinating Tasks ....................................................................255 Configuring Devices ..................................................................256 Establishing an Internet Connection........................................256 Monitoring Performance............................................................257 Providing File Management and Other Utilities....................257 Controlling a Network ..............................................................257 Administering Security ..............................................................258 ETHICS & ISSUES: Who Should Be Responsible for Notebook Computer Security?....................................................................................................258 OPERATING SYSTEM UTILITY PROGRAMS ....................................259 File Manager ................................................................................259 Search Utility................................................................................259 Image Viewer ..............................................................................259 Personal Firewall ........................................................................260 Uninstaller....................................................................................260 Disk Scanner ................................................................................260 Disk Defragmenter......................................................................261 Diagnostic Utility ........................................................................261 Backup Utility..............................................................................261 Screen Saver ................................................................................261 TYPES OF OPERATING SYSTEMS ....................................................262 STAND-ALONE OPERATING SYSTEMS..............................................262 Windows XP ................................................................................262 Windows Vista ............................................................................263 Mac OS X......................................................................................264 UNIX ............................................................................................264 Linux ............................................................................................265 ETHICS & ISSUES: Closed Source vs. Open Source Operating Systems ......................................................................................265 LOOKING AHEAD: Open-Source Projects Promote Digital Identity Sharing............265 NETWORK OPERATING SYSTEMS ....................................................266 EMBEDDED OPERATING SYSTEMS..................................................266 STAND-ALONE UTILITY PROGRAMS ................................................267 Antivirus Programs ....................................................................267 Spyware and Adware Removers ..............................................268 Internet Filters..............................................................................268 File Compression ........................................................................269 File Conversion............................................................................269 Media Player................................................................................269 CD/DVD Burning ......................................................................269 Personal Computer Maintenance ............................................270 CHAPTER SUMMARY..........................................................................270 COMPANIES ON THE CUTTING EDGE ..............................................271 Red Hat ........................................................................................271 Research in Motion (RIM)..........................................................271 TECHNOLOGY TRAILBLAZERS ..........................................................271 Alan Kay ......................................................................................271 Linus Torvalds ............................................................................271 Chapter Review ................................................................................272 Key Terms..........................................................................................273 Checkpoint ........................................................................................274 Web Research ....................................................................................275 Learn How To ..................................................................................276 Learn It Online..................................................................................278 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page viii
  10. 10. CONTENTS ixCONTENTS Special Feature B U Y E R S G U I D E : H O W T O P U R C H A S E A P E R S O N A L C O M P U T E R 279 CHAPTER 8 Communications and Networks..............295 COMMUNICATIONS ............................................................................296 USES OF COMPUTER COMMUNICATIONS......................................297 Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Blogs, Wikis, RSS, VoIP, FTP, Web Folders, Video Conferencing, and Fax ..............................298 Wireless Messaging Services ....................................................298 ETHICS & ISSUES: High-Tech Cheating via Wireless Messaging Services ............299 Wireless Internet Access Points ................................................300 Cybercafs ....................................................................................301 Global Positioning Systems ......................................................301 Collaboration ..............................................................................302 Groupware ..................................................................................302 Voice Mail ....................................................................................302 Web Services ................................................................................302 NETWORKS ..........................................................................................303 LANs, MANs, and WANs ........................................................303 Network Architectures ..............................................................305 Network Topologies....................................................................306 Intranets........................................................................................307 Network Communications Standards ....................................308 ETHICS & ISSUES: Should You Worry about Cell Phone and Cellular Antenna Radiation? ..................................................................309 COMMUNICATIONS SOFTWARE........................................................310 COMMUNICATIONS OVER THE TELEPHONE NETWORK ..............310 Dial-Up Lines ..............................................................................311 Dedicated Lines ..........................................................................311 COMMUNICATIONS DEVICES............................................................312 Dial-Up Modems ........................................................................313 ISDN and DSL Modems ............................................................314 Cable Modems ............................................................................314 Wireless Modems ........................................................................314 Network Cards ............................................................................315 Wireless Access Points................................................................315 Routers..........................................................................................315 HOME NETWORKS ..............................................................................316 Wired Home Networks ..............................................................316 Wireless Home Networks ..........................................................316 COMMUNICATIONS CHANNEL ..........................................................317 LOOKING AHEAD: Technology Curbs Impaired Drivers ......................................319 PHYSICAL TRANSMISSION MEDIA ..................................................319 Twisted-Pair Cable......................................................................319 Coaxial Cable ..............................................................................320 Fiber-Optic Cable ........................................................................320 WIRELESS TRANSMISSION MEDIA..................................................320 Infrared ........................................................................................321 Broadcast Radio ..........................................................................321 Cellular Radio..............................................................................321 LOOKING AHEAD: Femto Base Stations Enhance Cell Phone Signals..................321 Microwaves ..................................................................................321 Communications Satellite ..........................................................322 CHAPTER SUMMARY..........................................................................322 COMPANIES ON THE CUTTING EDGE ..............................................323 Cisco Systems ..............................................................................323 Qualcomm....................................................................................323 TECHNOLOGY TRAILBLAZERS ..........................................................323 Robert Metcalfe............................................................................323 Patricia Russo ..............................................................................323 Chapter Review ................................................................................324 Key Terms..........................................................................................325 Checkpoint ........................................................................................326 Web Research ....................................................................................327 Learn How To ..................................................................................328 Learn It Online..................................................................................330 CHAPTER 9 Database Management ......................................331 DATABASES, DATA, AND INFORMATION ........................................332 Data Integrity ..............................................................................333 Qualities of Valuable Information ............................................334 THE HIERARCHY OF DATA ................................................................334 Characters ....................................................................................335 Fields ............................................................................................335 Records..........................................................................................336 Files................................................................................................336 ETHICS & ISSUES: Are Portable Storage Devices a Threat to Businesses? ..........336 MAINTAINING DATA ............................................................................336 Adding Records ..........................................................................336 Changing Records ......................................................................338 Deleting Records ........................................................................338 Validating Data............................................................................339 FILE PROCESSING VERSUS DATABASES........................................340 File Processing Systems..............................................................341 The Database Approach ............................................................341 DATABASE MANAGEMENT SYSTEMS..............................................343 Data Dictionary ..........................................................................343 File Retrieval and Maintenance ................................................344 LOOKING AHEAD: Archive an Entire Lifetime ..................................................345 Backup and Recovery ................................................................346 Data Security................................................................................346 ETHICS & ISSUES: Should People Be Punished for Accidently Accessing Stolen Data?..............................................................................................346 RELATIONAL, OBJECT-ORIENTED, AND MULTIDIMENSIONAL DATABASES ..............................................347 Relational Databases ..................................................................347 Object-Oriented Databases ........................................................349 Multidimensional Databases ....................................................349 WEB DATABASES ................................................................................350 ETHICS & ISSUES: Who Should Be Held Accountable for the Rash of Database Security Breaches? ......................................................................350 DATABASE ADMINISTRATION............................................................351 Database Design Guidelines......................................................351 Role of the Database Anaylsts and Administrators ......................................................................351 Role of the Employee as User ..................................................351 CHAPTER SUMMARY..........................................................................352 LOOKING AHEAD: Barcodes Identify Worlds Animal, Plant Species ....................352 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page ix
  11. 11. x DISCOVERING COMPUTERS: Fundamentals, Fifth Edition COMPANIES ON THE CUTTING EDGE ..............................................353 Oracle ............................................................................................353 Sybase............................................................................................353 TECHNOLOGY TRAILBLAZERS ..........................................................353 E. F. Codd ....................................................................................353 Larry Ellison ................................................................................353 Chapter Review ................................................................................354 Key Terms..........................................................................................355 Checkpoint ........................................................................................356 Web Research ....................................................................................357 Learn How To ..................................................................................358 Learn It Online..................................................................................360 CHAPTER 10 Computer Security, Ethics, and Privacy............................................................................361 COMPUTER SECURITY RISKS ..........................................................362 INTERNET AND NETWORK ATTACKS ..............................................364 Computer Viruses, Worms, and Trojan Horses ......................364 Safeguards against Computer Viruses, Worms, and Trojan Horses ................................................................365 Botnets ..........................................................................................367 Denial of Service Attacks ..........................................................367 Back Doors ..................................................................................367 Spoofing........................................................................................367 Safeguards against Botnets, DoS Attacks, Back Doors, and Spoofing..........................................................................367 Firewalls........................................................................................367 Intrusion Detection Software ....................................................368 UNAUTHORIZED ACCESS AND USE ................................................368 Safeguards against Unauthorized Access and Use ..................................................................................368 Identifying and Authenticating Users ....................................368 LOOKING AHEAD: Biometric Software Aids Behavior Detection ..........................370 HARDWARE THEFT AND VANDALISM..............................................371 Safeguards against Hardware Theft and Vandalism ..............................................................................371 SOFTWARE THEFT ..............................................................................372 Safeguards against Software Theft ..........................................372 INFORMATION THEFT..........................................................................373 Safeguards against Information Theft......................................373 Encryption....................................................................................373 SYSTEM FAILURE ................................................................................374 Safeguards against System Failure ..........................................374 BACKING UP THE ULTIMATE SAFEGUARD................................375 WIRELESS SECURITY ........................................................................375 ETHICS AND SOCIETY ........................................................................376 Information Accuracy ................................................................377 Intellectual Property Rights ......................................................378 ETHICS & ISSUES: Is It Illegal to Delete Some Files from Your Own Computer?..........................................................................................379 INFORMATION PRIVACY ....................................................................379 Electronic Profiles........................................................................380 Cookies..........................................................................................380 Spyware and Adware ................................................................381 ETHICS & ISSUES: Should Spyware Be Legal?................................................381 Phishing ........................................................................................381 Spam..............................................................................................382 Privacy Laws................................................................................382 Social Engineering ......................................................................384 Employee Monitoring ................................................................384 Content Filtering ........................................................................384 Computer Forensics....................................................................385 LOOKING AHEAD: Computer Knowledge Assessment Using Brain Fingerprinting ............................................................................385 HEALTH CONCERNS OF COMPUTER USE ......................................385 Computers and Health Risks ....................................................385 Ergonomics and Workplace Design ........................................386 Computer Addiction ..................................................................387 Green Computing........................................................................387 CHAPTER SUMMARY..........................................................................388 ETHICS & ISSUES: What Can Be Done to Stop the Growing Threat of Cybercrime? ..........................................................................................388 COMPANIES ON THE CUTTING EDGE ..............................................389 McAfee..........................................................................................389 Symantec ......................................................................................389 TECHNOLOGY TRAILBLAZERS ..........................................................389 Donn Parker ................................................................................389 Clifford Stoll ................................................................................389 Chapter Review ................................................................................390 Key Terms..........................................................................................391 Checkpoint ........................................................................................392 Web Research ....................................................................................393 Learn How To ..................................................................................394 Learn It Online..................................................................................396 Special Feature D I G I TA L E N T E R TA I N M E N T 397 CHAPTER 11 Information System Development and Programming Languages ....................405 THE SYSTEM DEVELOPMENT CYCLE ..............................................406 Who Participates in the System Development Cycle? ..........407 LOOKING AHEAD: Right-Brain Skills Essential for Analysts Success....................408 Project Management ..................................................................408 Feasibility Assessment................................................................409 Documentation ............................................................................409 Data and Information Gathering Techniques ........................410 ETHICS & ISSUES: Do You Work Harder When Someone Is Watching? ................410 What Initiates the System Development Cycle? ....................410 ETHICS & ISSUES: How Can Workers Overcome Writers Block When Preparing Documentation? ..........................................................................411 Cyber Coast Caf A Case Study ..........................................412 Planning Phase ............................................................................412 Planning at Cyber Coast Caf ..................................................413 Analysis Phase ............................................................................413 Preliminary Investigation at Cyber Coast Caf......................414 Detailed Analysis at Cyber Coast Caf....................................416 Design Phase................................................................................416 Hardware Acquisition at Cyber Coast Caf............................418 Detailed Design at Cyber Coast Caf ......................................420 Implementation Phase................................................................420 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page x
  12. 12. xiCONTENTSCONTENTS LOOKING AHEAD: Training Delivery Becomes Flexible ......................................421 Implementation at Cyber Coast Caf ......................................421 Operation, Support, and Security Phase ................................422 Operation, Support, and Security at Cyber Coast Caf ........422 PROGRAMMING LANGUAGES AND PROGRAM DEVELOPMENT TOOLS ......................................................................423 Low-Level Languages ................................................................424 Procedural Languages................................................................425 Object-Oriented Programming Languages and Program Development Tools ..............................................................427 Other Programming Languages ..............................................430 Classic Programming Languages ............................................431 Other Program Development Tools ........................................431 ETHICS & ISSUES: Who Should Be Held Accountable for Macro Security Threats? ........................................................................................432 Web Page Development ............................................................433 Multimedia Program Development ........................................437 THE PROGRAM DEVELOPMENT CYCLE ..........................................438 ETHICS & ISSUES: Who Is Responsible for Bugs? ..........................................439 What Initiates the Program Development Cycle?..................439 LOOKING AHEAD: Software Factories Provide Low-Cost Programming Alternatives ............................................................................439 Control Structures ......................................................................440 CHAPTER SUMMARY..........................................................................442 COMPANIES ON THE CUTTING EDGE ..............................................443 Computer Sciences Corporation (CSC) ..................................443 Electronic Arts (EA) ....................................................................443 TECHNOLOGY TRAILBLAZERS ..........................................................443 Grace Hopper ..............................................................................443 James Gosling ..............................................................................443 Chapter Review ................................................................................444 Key Terms..........................................................................................445 Checkpoint ........................................................................................446 Web Research ....................................................................................447 Learn How To ..................................................................................448 Learn It Online..................................................................................450 CHAPTER 12 Enterprise Computing............................................451 WHAT IS ENTERPRISE COMPUTING?..............................................452 Types of Enterprise ....................................................................454 Organizational Structure of an Enterprise ..............................454 LOOKING AHEAD: The CEO of the Future........................................................455 Levels of Users in the Enterprise..............................................455 How Managers Use Information..............................................456 INFORMATION SYSTEMS IN THE ENTERPRISE ............................456 Information Systems within Functional Units........................457 General Purpose Information Systems ....................................461 Integrated Information Systems ..............................................465 ENTERPRISE-WIDE TECHNOLOGIES AND METHODOLOGIES ......467 Portals ..........................................................................................467 Communications ........................................................................468 Data Warehouses ........................................................................468 Extranets ......................................................................................469 Web Services ................................................................................469 Workflow ......................................................................................469 Virtual Private Network ............................................................470 E-COMMERCE ......................................................................................470 E-Retailing....................................................................................470 ETHICS & ISSUES: Who Can You Trust When Making Purchases Online? ............471 Finance..........................................................................................472 Health............................................................................................472 LOOKING AHEAD: Health Devices Automate Patients Care................................472 Entertainment and Media..........................................................472 ETHICS & ISSUES: Does Availability of News on the Web Threaten the Daily Newspaper?..................................................................................473 Travel ............................................................................................473 Other Business Services..............................................................473 ENTERPRISE HARDWARE ..................................................................474 RAID..............................................................................................474 Network Attached Storage and Storage Area Networks ......................................................................475 Enterprise Storage Systems ......................................................476 ETHICS & ISSUES: How Much Data Should Companies Be Required to Keep?....476 Blade Servers................................................................................477 High-Availability Systems ........................................................477 Scalability ....................................................................................477 Utility and Grid Computing......................................................478 Virtualization ..............................................................................478 Interoperability............................................................................478 BACKUP PROCEDURES......................................................................478 Disaster Recovery Plan ..............................................................479 CHAPTER SUMMARY..........................................................................480 COMPANIES ON THE CUTTING EDGE ..............................................481 EMC ..............................................................................................481 IBM ................................................................................................481 TECHNOLOGY TRAILBLAZERS ..........................................................481 John Chambers ............................................................................481 Jim Clark ......................................................................................481 Chapter Review ................................................................................482 Key Terms..........................................................................................483 Checkpoint ........................................................................................484 Web Research ....................................................................................485 Learn How To ..................................................................................486 Learn It Online..................................................................................488 APPENDIX A: QUIZ YOURSELF ANSWERS ................................APP 1 GLOSSARY/INDEX..........................................................................IND 1 PHOTO CREDITS ..........................................................................IND 29 C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xi
  13. 13. Online Companion Use the Online Companion at scsite.com/dcf5e to bring unparalleled currency to the learning experience. Access additional information about important topics and make use of online learning games, practice tests, and additional reinforcement. Gain access to this dynamic site through CoursePort, Course Technologys login page. xii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition Ethics and Issues Ethics and Issues boxes raise controversial, computer-related topics of the day, challenging readers to closely consider general concerns of computers in society. Learn How To Apply the concepts presented in the chapter to every day life with these hands-on activ- ities. See the Learn How To activities in action with visual demonstrations on the Online Companion. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xii
  14. 14. xiiiABOUT THE BOOK Career Corner Each chapter ends with a Career Corner feature that introduces a computer career opportunity relating to a topic covered in the chapter. Companies on the Cutting Edge Everyone who interacts with computers should be aware of the key computer- related companies. Each chapter profiles two of these key companies. Technology Trailblazers The Technology Trailblazers section in each chapter offers a glimpse into the life and times of the more famous leaders of the computer industry. Quiz Yourself Three Quiz Yourself boxes per chapter help ensure retention by reinforcing sections of the chapter material, rather than waiting for the end of the chap- ter to test. Use Appendix A for a quick check of the answers, and access additional Quiz Yourself quizzes on the Online Companion for interactivity and easy use. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xiii
  15. 15. xiv DISCOVERING COMPUTERS: Fundamentals, Fifth Edition Learn It Online The Learn It Online exercises, which include brand new online videos, practice tests, interactive labs, learning games, and Web-based activities, offer a wealth of online reinforcement. Looking Ahead The Looking Ahead boxes offer a glimpse of the latest advances in computer technology that will be available, usually within five years. FAQ FAQ (frequently asked questions) boxes offer common questions and answers about subjects related to the topic at hand. Web Link Obtain current information and a different perspective about key terms and concepts by visiting the Web addresses in the Web Links found in the margins throughout the book. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xiv
  16. 16. xvABOUT THE BOOK Chapter Review Use the Chapter Review before taking an examination to ensure familiarity with the computer concepts presented. This section includes each objective, followed by a one- or two-paragraph summary. Key Terms Before taking a test, use the Key Terms page as a checklist of terms to know. Visit a Key Terms page on the Online Companion and click any term for additional information. Checkpoint Use these multiple choice, true/false, matching, short answer, and working together exercises to reinforce understanding of the topics presented in the chapter. Web Research Each Web Research exercise requires follow-up research on the Web, and suggests writing a short article or presenting the findings of the research to the class. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xv
  17. 17. xvi DISCOVERING COMPUTERS: Fundamentals, Fifth Edition Chapter Objectives and Table of Contents Before reading the chapter, carefully read through the Objectives and Contents to discover knowledge that will be gleaned from chapter. Initial Chapter Figure Carefully study the first figure in each chapter because it provides an easy-to-follow overview of the major purpose of the chapter. Step Figures Each chapter includes numerous step figures that present the more complex computer concepts using a step-by-step pedagogy. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xvi
  18. 18. xviiABOUT THE BOOK Glossary/Index The Glossary/Index at the back of the book not only provides page references, it also offers definitions for all the key terms included in the text and boxed features. Special Features Five special features following Chapters 1, 2, 5, 7, and 10 encompass topics from the history of computers, to whats hot on the Web, to a buyers guide, to the latest in new technology. C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xvii
  19. 19. xviii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition Preface The Shelly Cashman Series offers the finest textbooks in computer education. This book is our answer to the many requests we have received from instructors and students for a textbook that provides a succinct, yet thorough, introduction to computers. In Discovering Computers: Fundamentals, Fifth Edition, you will find an educationally sound, highly visual, and easy-to-follow pedagogy that presents a complete, yet to the point, treatment of introductory computer subjects. Students will finish the course with a solid understanding of computers, how to use computers, and how to access information on the World Wide Web. NEW TO THIS EDITION Discovering Computers: Fundamentals, Fifth Edition includes exciting new features, certain to engage and challenge students, making learning with Discovering Computers: Fundamentals, Fifth Edition an enriched experience. These new features include: Comprehensive updates for currency, including coverage of new hardware and software, digital communications, social networking and other societal issues, career opportunities, and industry trends. Brand new CNET At the Movies videos highlight current events of interest to students in the world of technology, bringing relevance to the concepts course. Brand new Blogging exercise on the Web Research page engages students and brings relevance to the concepts course. Revised chapter features such as Ethics and Issues, Looking Ahead, FAQ, Web Links, Companies on the Cutting Edge, and Technology Trailblazers include the most relevant and interesting examples to students. Updated Checkpoint exercises reinforce students understanding of key concepts presented in the chapters. OBJECTIVES OF THIS TEXTBOOK Discovering Computers: Fundamentals, Fifth Edition is intended for use as a stand-alone textbook or in combination with an applications, Internet, or programming textbook in a one-quarter or one-semester introductory computer course. No experience with computers is assumed. The objectives of this book are to: Provide a concise, yet comprehensive introduction to computers Present the most-up-to-date technology in an ever-changing discipline Give students an understanding of why computers are essential components in business and society Teach the fundamentals of computers and computer nomenclature, particularly with respect to personal computer hardware and software, the World Wide Web, and enterprise computing Present the material in a visually appealing and exciting manner that motivates students to learn Present strategies for purchasing a notebook computer, a Tablet PC, and a PDA Offer alternative learning techniques and reinforcement via the Web Offer distance-education providers a textbook with a meaningful and exercise-rich Online Companion C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xviii
  20. 20. xixPREFACE DISTINGUISHING FEATURES To date, more than six million students have learned about computers using a Discovering Computers textbook. With the additional World Wide Web integration and interactivity, stream- ing up-to-date audio and video, extraordinary step-by-step visual drawings and photographs, unparalleled currency, and the Shelly and Cashman touch, this book will make your computer concepts course exciting and dynamic. Distinguishing features of this book include: A Proven Pedagogy Careful explanations of complex concepts, educationally-sound elements, and reinforcement highlight this proven method of presentation. Essential Computer Concepts Coverage This book offers the same breadth of topics as our well-known Discovering Computers 2009: Complete, but the depth of coverage focuses on the basic knowledge required to be computer literate in todays digi- tal world. A Visually Appealing Book that Maintains Student Interest The latest technology, pictures, drawings, and text are combined art- fully to produce a visually appealing and easy-to-understand book. Many of the figures include a step-by-step presentation (see page 141), which simplifies the more complex computer concepts. Pictures and drawings reflect the latest trends in computer technology. Latest Technologies and Terms The technologies and terms your students see in this book are those they will encounter when they start using computers. Only the latest application software packages are shown throughout the book. World Wide Web Enhanced This book uses the World Wide Web as a major supplement. The purpose of integrating the World Wide Web into the book is to (1) offer students additional information and currency on important topics; (2) use its interactive capabilities to offer cre- ative reinforcement and online quizzes; (3) make available alternative learning techniques with Web-based learning games, practice tests, and interactive labs; (4) underscore the relevance of the World Wide Web as a basic information tool that can be used in all facets of society; (5) introduce stu- dents to doing research on the Web; and (6) offer instructors the opportunity to organize and administer their traditional campus-based or distance-education-based courses on the Web using the Blackboard platform. This textbook, however, does not depend on Web access to be used successfully. The Web access adds to the already complete treatment of topics within the book. Extensive End-of-Chapter Materials A notable strength of this book is the extensive student activi- ties at the end of each chapter. Well-structured student activities can make the difference between students merely participating in a class and students retaining the information they learn. The activities in this book include: Chapter Review, Key Terms, Checkpoint, Web Research, Learn How To, and Learn It Online. C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xix
  21. 21. xx DISCOVERING COMPUTERS: Fundamentals, Fifth Edition ORGANIZATION OF THIS TEXTBOOK Discovering Computers: Fundamentals, Fifth Edition provides a thorough, but succinct, introduction to computers. The material is divided into twelve chapters, five special features, and a glossary/index. Chapter 1 Introduction to Computers In Chapter 1, students are introduced to basic computer concepts, such as what a computer is, how it works, and what makes it a powerful tool. Special Feature Timeline: Milestones in Computer History In this special feature, students learn about the major computer technology developments during the past 72 years. Chapter 2 The Internet and World Wide Web In Chapter 2, students learn about the Internet, World Wide Web, browsers, e-mail, FTP, and instant messaging. Special Feature Making Use of the Web In this special feature, more than 150 popular up-to-date Web sites are listed and described. Now includes a section on Online Social Networks and Media Sharing. Basic searching techniques are also introduced. Chapter 3 Application Software In Chapter 3, students are introduced to a variety of business software, graphics and multimedia software, home/personal/educational software, and communications software. Chapter 4 The Components of the System Unit In Chapter 4, students are introduced to the components of the system unit; how memory stores data, instructions, and information; and how the system unit executes an instruction. Chapter 5 Input and Output Chapter 5 describes the various methods of input and output, and commonly used input and output devices. Special Feature Digital Imaging and Video Technology In this special feature, students are introduced to using a personal computer, digital camera, and digital video camera to manipulate and distribute photographs and video. Chapter 6 Storage In Chapter 6, students learn about various storage media and storage devices. C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xx
  22. 22. Chapter 7 Operating Systems and Utility Programs In Chapter 7, students learn about a variety of stand-alone operating systems, network operating systems, and embedded operating systems. Special Feature Buyers Guide: How to Purchase a Personal Computer In this special feature, students are introduced to purchasing a desktop computer, notebook computer, and Tablet PC. Chapter 8 Communications and Networks Chapter 8 provides students with an overview of communications technology and applications. Chapter 9 Database Management Chapter 9 presents students with the advantages of organizing data in a data- base and describes various types of data. Chapter 10 Computer Security, Ethics, and Privacy In Chapter 10, students learn about computer and Internet risks, ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, information privacy, and computer-related health issues. Special Feature: Digital Entertainment In this special feature, students are introduced to the personal computer as a digital entertainment device. Chapter 11 Information System Development and Programming Languages In Chapter 11, students are introduced to the system development cycle and guide- lines for system development. This chapter also presents the program development cycle, program design meth- ods, and popular programming languages. Chapter 12 Enterprise Computing In Chapter 12, students learn about the special computing requirements used in an enterprise-sized organization. Appendix A Quiz Yourself Answers Appendix A provides the answers for the Quiz Yourself questions in the text. Glossary/Index The Glossary/Index includes a definition and page references for every key term presented in the book. xxiPREFACE C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xxi
  23. 23. xxii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition SHELLY CASHMAN SERIES INSTRUCTOR RESOURCES The Shelly Cashman Series is dedicated to providing you with all of the tools you need to make your class a success. The contents of the Instructor Resources and Course Presenter discs (1-4239-2703-6) are described below. Information on all supplementary materials is available through your Course Technology representative or by calling one of the following telephone numbers: Colleges, Universities, Continuing Education Departments, Post-Secondary Vocational Schools, and Career Colleges, Business, Industry, Government, Trade, Retailer, Wholesaler, Library, and Resellers, 1-800-648-7450; K-12 Schools, Secondary Vocational Schools, Adult Education, and School Districts, 1-800-824-5179; Canada, 1-800-268-2222. Instructor Resources The Instructor Resources includes both teaching and testing aids. Instructors Manual The Instructors Manual is made up of Microsoft Word files, which include lecture notes that summarize the sections of the chapters, figures and boxed elements found in the chapters, teacher tips, classroom activities, and lab activities. Syllabus Sample syllabus, which can be customized easily to a course, is included. The syllabus covers policies, class and lab assignments and exams, and procedural information. Figure Files Illustrations for every figure in the textbook are available in electronic form. Figures are provided both with and without callouts. Use this ancillary to present a slide show in lecture or to print transparencies for use in lecture with an overhead projector. If you have a personal computer and LCD device, this ancillary can be an effective tool for presenting lectures. Solutions to Exercises Solutions are included for all end-of-chapter exercises. Test Bank & Test Engine The ExamView test bank includes 112 questions for every chapter (40 multiple-choice, 5 modified multiple-choice, 25 true/false, 5 modified true/false, 20 com- pletion, 10 matching, 3 essays and 2 cases with 2 case-based questions each). The test bank also includes page number references, and when appropriate, figure references. The test bank comes with a copy of the test engine, ExamView, the ultimate tool for your objective-based testing needs. Printed Test Bank A Rich Text Format (.rtf) version of the test bank you can print also is included. Data Files for Students All the files that are required by students to complete the exercises are included. You can distribute the files on the Instructor Resources disc to your students over a network, or you can have them follow the instructions on the inside back cover of this book to obtain the Data Files for Students. Course Presenter Course Presenter is a one-click-per-slide presentation system on disc that provides PowerPoint slides for every subject in each chapter. Use this presentation system to give interesting, well-organized, and knowledge-based lectures. Several brand new computer- related video clips are available for optional presentation. Course Presenter provides consistent coverage for multiple lecturers. C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xxii
  24. 24. xxiiiPREFACE Student Edition Labs Our Web-based interactive labs help students master hundreds of computer concepts, including input and output devices, file management and desktop applications, com- puter ethics, virus protection, and much more. Featuring up-to-the-minute content, eye-popping graphics, and rich animation, the highly interactive Student Edition Labs offer students an alternative way to learn through dynamic observation, step-by-step practice, and challenging review questions. Access the free Student Edition Labs from the Discovering Computers: Fundamentals, Fifth Edition Online Companion at scsite.com/dcf5e or see the Student Edition Lab exercises on the Learn It Online pages at the end of each chapter. Also available on CD at an additional cost. Online Content Blackboard is the leading distance learning solution provider and class-management platform today. Course Technology has partnered with Blackboard to bring you pre- mium online content. Instructors: Content for use with Discovering Computers: Fundamentals, Fifth Edition is available in a Blackboard Course Cartridge and includes topic reviews, case projects, review questions, test banks, practice tests, custom syllabus, and more. Thomson Course Technology also has solutions for several other learning management systems. Please visit http://www.course.com today to see whats available for this title. SAM 2007 Add more flexibility to your course with SAM. SAM (Skills Assessment Manager) helps you energize your training assignments by allowing students to train and test on important computer skills in an active, hands-on environment. By adding SAM to your curriculum, you can: Reinforce your students knowledge of key skills with hands-on application exercises. Allow your students to learn by listening with rich audio in their computer labs. Build computer concepts exams from a test bank of more than 50,000 objective-based questions. Schedule your students assignments with powerful administrative tools. Track student exam grades and training progress using helpful reports by class or by student. SAM features assessment, training, and project-grading solutions for skills in both Microsoft Office 2003 and Office 2007. Let SAM save you time in grading, while students get hands-on practice on valuable real-world skills. CourseCasts Learning on the Go. Always available. . . always relevant. Want to keep up with the latest technology trends relevant to you? Visit our site to find a library of podcasts, CourseCasts, featuring a CourseCast of the Week, and download them to your mp3 player at http://coursecasts.course.com Our fast-paced world is driven by technology. You know because youre an active participant always on the go, always keeping up with technological trends, and always learning new ways to embrace technology to power your life. Ken Baldauf, a faculty member of the Florida State University Computer Science Department, is responsible for teaching technology classes to thousands of FSU students each year. He knows what you know; he knows what you want to learn. Hes also an expert in the latest technology and will sort through and aggregate the most pertinent news and information so you can spend your time enjoying technology, rather than trying to figure it out. Visit us at http://coursecasts.course.com to learn on the go! C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xxiii
  25. 25. Learning styles of students have changed, but the Shelly Cashman Series dedication to their success has remained steadfast for over 30 years. We are committed to continually updating our approach and content to reflect the way todays students learn and experience new technology. This focus on the user is reflected in our bold cover design, which features photographs of real students using the Shelly Cashman Series in their courses. Each book features a different user, reflecting the many ages, experiences, and backgrounds of all of the students learning with our books. When you use the Shelly Cashman Series, you can be assured that you are learning computer skills using the most effective courseware available. We would like to thank the administration and faculty at the participating schools for their help in making our vision a reality. Most of all, wed like to thank the wonderful students from all over the world who learn from our tex