Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers,...

37
Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents Tap or click any topic below to view its content. TABLE OF CONTENTS.............................................................................................................................................. 1 DISCLAIMER ........................................................................................................................................................... 3 ELECTRONIC COMPONENTS AND CIRCUITRY OF A COMPUTER .............................................................................. 4 MINI FEATURE 1-1: GAMING AND DIGITAL HOME ................................................................................................. 6 GAMING.......................................................................................................................................................................6 Popular Games ...................................................................................................................................................... 6 Types of Gaming Accessories ................................................................................................................................ 6 HOME AUTOMATION ...................................................................................................................................................... 6 Popular Universal Remotes and Apps ...................................................................................................................6 Popular Programmable Thermostats .................................................................................................................... 7 Popular Smart Home Appliances........................................................................................................................... 7 Popular Security Systems ......................................................................................................................................7 Popular Robotic Vacuums .....................................................................................................................................8 MEDIA STORAGE CAPACITY ................................................................................................................................... 9 Storage Terms and Their Byte Equivalents ...........................................................................................................9 Various Memory Cards ........................................................................................................................................10 SECURE IT 1-1: BACKING UP COMPUTERS AND MOBILE DEVICES ......................................................................... 11 Cloud Storage Services ........................................................................................................................................11 SEARCH ENGINES ................................................................................................................................................. 12 TECHNOLOGY INNOVATORS: FACEBOOK AND MARK ZUCKERBERG ..................................................................... 13 TECHNOLOGY INNOVATOR: TWITTER .................................................................................................................. 14 ETHICS & ISSUES 1-2: SHOULD YOU BE REQUIRED TO OBTAIN PERMISSION BEFORE POSTING PHOTOS OF OTHERS? .............................................................................................................................................................. 15 Websites about Photo Permissions ..................................................................................................................... 15 SECURE IT 1-2: PROTECTION FROM VIRUSES AND OTHER MALWARE .................................................................. 16 SECURE IT 1-3: CREATING STRONG PASSWORDS ................................................................................................. 17 TECHNOLOGY INNOVATORS: MICROSOFT AND BILL GATES ................................................................................. 18 TECHNOLOGY INNOVATORS: APPLE, STEVE JOBS, AND STEVE WOZNIAK ............................................................ 19 APPLE ........................................................................................................................................................................19 STEVE JOBS .................................................................................................................................................................19 STEVE WOZNIAK .......................................................................................................................................................... 19 EXPANDED TABLE 1-2: CATEGORIES OF APPLICATIONS ........................................................................................ 20 CELLULAR TRANSMISSIONS ................................................................................................................................. 23 MINI FEATURE 1-2: STAYING IN SYNC .................................................................................................................. 24 Websites about Wired Setups ............................................................................................................................. 24

Transcript of Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers,...

Page 1: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 1

Table of Contents Tap or click any topic below to view its content.

TABLE OF CONTENTS .............................................................................................................................................. 1

DISCLAIMER ........................................................................................................................................................... 3

ELECTRONIC COMPONENTS AND CIRCUITRY OF A COMPUTER .............................................................................. 4

MINI FEATURE 1-1: GAMING AND DIGITAL HOME ................................................................................................. 6

GAMING ....................................................................................................................................................................... 6 Popular Games ...................................................................................................................................................... 6 Types of Gaming Accessories ................................................................................................................................ 6

HOME AUTOMATION ...................................................................................................................................................... 6 Popular Universal Remotes and Apps ................................................................................................................... 6 Popular Programmable Thermostats .................................................................................................................... 7 Popular Smart Home Appliances........................................................................................................................... 7 Popular Security Systems ...................................................................................................................................... 7 Popular Robotic Vacuums ..................................................................................................................................... 8

MEDIA STORAGE CAPACITY ................................................................................................................................... 9

Storage Terms and Their Byte Equivalents ........................................................................................................... 9 Various Memory Cards ........................................................................................................................................ 10

SECURE IT 1-1: BACKING UP COMPUTERS AND MOBILE DEVICES ......................................................................... 11

Cloud Storage Services ........................................................................................................................................ 11

SEARCH ENGINES ................................................................................................................................................. 12

TECHNOLOGY INNOVATORS: FACEBOOK AND MARK ZUCKERBERG ..................................................................... 13

TECHNOLOGY INNOVATOR: TWITTER .................................................................................................................. 14

ETHICS & ISSUES 1-2: SHOULD YOU BE REQUIRED TO OBTAIN PERMISSION BEFORE POSTING PHOTOS OF

OTHERS? .............................................................................................................................................................. 15

Websites about Photo Permissions ..................................................................................................................... 15

SECURE IT 1-2: PROTECTION FROM VIRUSES AND OTHER MALWARE .................................................................. 16

SECURE IT 1-3: CREATING STRONG PASSWORDS ................................................................................................. 17

TECHNOLOGY INNOVATORS: MICROSOFT AND BILL GATES ................................................................................. 18

TECHNOLOGY INNOVATORS: APPLE, STEVE JOBS, AND STEVE WOZNIAK ............................................................ 19

APPLE ........................................................................................................................................................................ 19 STEVE JOBS ................................................................................................................................................................. 19 STEVE WOZNIAK .......................................................................................................................................................... 19

EXPANDED TABLE 1-2: CATEGORIES OF APPLICATIONS ........................................................................................ 20

CELLULAR TRANSMISSIONS ................................................................................................................................. 23

MINI FEATURE 1-2: STAYING IN SYNC .................................................................................................................. 24

Websites about Wired Setups ............................................................................................................................. 24

Page 2: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 2

Websites about Wireless Syncing........................................................................................................................ 24 Cloud Storage Services ........................................................................................................................................ 24

TECHNOLOGY TREND: MASSIVE OPEN ONLINE COURSES (MOOCS) ..................................................................... 25

MINI FEATURE 1-3: DIGITAL SCHOOL ................................................................................................................... 26

Websites about Digital Technologies in Classrooms ........................................................................................... 26

ONLINE INVESTING .............................................................................................................................................. 27

MOBILE PAYMENTS ............................................................................................................................................. 28

SECURE IT 1-4: SHOPPING SAFELY ONLINE ........................................................................................................... 29

Websites about Shopping Safely Online.............................................................................................................. 29

TECHNOLOGY TREND: QR CODES ......................................................................................................................... 30

HIGH-TECH TALK: TRIANGULATION ...................................................................................................................... 31

HIGH-TECH TALK: NEURAL NETWORKS ................................................................................................................ 33

ETHICS & ISSUES 1-4: SHOULD WIKIS BE ALLOWED AS VALID SOURCES FOR ACADEMIC RESEARCH? ................... 35

ETHICS & ISSUES 1-5: SHOULD EMPLOYEES BE HELD ACCOUNTABLE FOR THEIR ONLINE SOCIAL NETWORK POSTS?

............................................................................................................................................................................ 36

Websites about Online Social Networks ............................................................................................................. 36

TECHNOLOGY @ WORK: HEALTH CARE ................................................................................................................ 37

Websites about Technology in Health Care ........................................................................................................ 37

Page 3: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 3

Disclaimer Cengage Learning and the Shelly Cashman authoring team do not support and are not responsible for

the content of material in third-party or external web/Internet sites. Opinions expressed at third-party

or external web/Internet sites do not necessarily reflect that of Cengage Learning or the Shelly Cashman

authoring team.

The Free Resources include links to web addresses at dscov.com. Web addresses with this domain will

redirect to the actual websites or resources listed and are provided as abbreviated links for students

who wish to type them into a browser.

Tap or click here to return to the Table of Contents.

Page 4: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 4

Electronic Components and Circuitry of a Computer The electronic components and circuitry of a computer usually are part of or are connected to a

motherboard (Figure 1). The motherboard, sometimes called a system board, is the main circuit board of

a personal computer. Many electronic components attach to the motherboard; others are built into it.

Two main components on the motherboard are the processor and memory. Many motherboards also

integrate sound, video, and networking capabilities.

Figure 1: Motherboard in a laptop.

Many components, such as the processor, are chips that can attach to a motherboard or other circuit

board. A computer chip is a small piece of semiconducting material, usually silicon, on which integrated

circuits are etched (Figure 2). An integrated circuit contains many microscopic pathways capable of

carrying electrical current. Each integrated circuit can contain millions of elements such as resistors,

capacitors, and transistors. A transistor, for example, can act as an electronic switch that opens or closes

the circuit for electrical charges. Today's computer chips contain millions or billions of transistors. Most

chips are no bigger than one-half-inch square.

Figure 2: Computer chip.

A processor, also called a CPU (central processing unit), is the electronic component that interprets and

carries out the basic instructions that operate a computer or mobile device. The processor significantly

impacts overall computing power and manages most of a computer or mobile device's operations. On

larger computers, the various functions performed by the processor extend over many separate chips

and often multiple circuit boards. On smaller computers or devices, all functions of the processor usually

are on a single chip.

Page 5: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 5

Memory consists of electronic components that store instructions waiting to be executed by the

processor, data needed by those instructions, and the results of processing the data (information).

Memory usually consists of one or more chips on the motherboard or some other circuit board in the

computer or mobile device. RAM (random access memory), also called main memory, consists of

memory chips that can be read from and written to by the processor and other devices. Users typically

are referring to RAM when discussing computer memory.

Answer the following question by tapping or clicking the best response, which will open a browser

window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when

you are finished viewing it.

Which of the following interprets and carries out the basic instructions that operate a computer or

mobile device?

a. memory

b. transistor

c. processor

d. RAM

Tap or click here to return to the Table of Contents.

Page 6: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 6

Mini Feature 1-1: Gaming and Digital Home The following sections discuss gaming and home automation.

Gaming The tables below list popular games by genre and types of gaming accessories. You can find additional

information by entering search text from the tables’ Name or Description columns.

Popular Games

Name Description

Bejeweled Puzzle and Strategy

Bike Race Racing and Sports

Just Dance (Community and World Dance Floor features) Music and Fitness

My Fitness Coach Music and Fitness

Need for Speed Racing and Sports

SimCity Simulation

The Legend of Zelda Action-Adventure

Trivia Crack Puzzle and Strategy

Words with Friends Puzzle and Strategy

World of Warcraft Role Playing

Types of Gaming Accessories

Name Description

Body balancer Wii Balance Board – Nintendo

Body sensor Kinect for Xbox

Dance Master Dance Pad – DDR

Eyeware Gunnar advanced gaming eyeware

Gamepad Handheld game controller – Nintendo

Headphones Ear Force – Turtle Beach

Joystick Flight Stick – Thrustmaster

Musical Guitar Hero – System Skins

Shooting Sharp shooter – Sony

Wireless wheel Wireless racing wheel – Mad Catz

Home Automation The tables below list popular universal remotes and apps, programmable thermostats, smart home

appliances, and security systems. You can find additional information by entering search text from the

tables’ Name or Description columns.

Popular Universal Remotes and Apps

Name Description

Acoustic Research Remote control hardware

Logitech

Monster

Phillips

Page 7: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 7

Sony

Harmony Smart Control App that controls home theater devices

Loxone Smart Home App that controls lighting, heating, curtains, blinds, music, and alarm system

Peel App that provides television viewing recommendations

Smart Remote (for Samsung Galaxy)

Infrared emitter on phone controls television and electronics

WeMo Products to control home electronics, lighting, and appliances and to monitor energy consumption

Popular Programmable Thermostats

Name Description

Ecobee Smart Learns household’s heating and cooling cycles to save energy. Many include mobile apps for remote monitoring and controlling. Honeywell Wi-Fi

Smart

Lux

Nest Learning

Venstar Wi-Fi

Popular Smart Home Appliances

Name Description

Clothes Washer Wi-Fi enabled connections to mobile devices – Samsung

Dishwasher Programmable dishwasher – Meiko

Oven

Zipel oven with Android app – Samsung

Wi-Fi enabled oven – GE

Refrigerator

Wi-Fi enabled with Twitter and Facebook apps – Samsung

Device-to-device connectivity and connections to mobile devices – LG

Popular Security Systems

Name Description

ADT Home and business monitoring service

Devon Security

Pinnacle Security

Vivint

Frontpoint Security Home monitoring service with remote mobile device apps

LifeShield Security Home monitoring service

Logitech Security system hardware and automation

Lorex

Samsung

Schlage

Stanley

Page 8: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 8

Popular Robotic Vacuums The following list identifies popular robotic vacuums. You can find additional information by entering the

list items as search text.

iRobot Roomba

LG HOM-BOT

Neato Robotics

Samsung Smart Tango

Thyme Vacuum Cleaning Robot

Discover More: To display search results about home automation in a new browser window or tab, tap

or click this link: dscov.com/16/01m1. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 9: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 9

Media Storage Capacity Capacity is the number of bytes (or characters) a storage medium can hold. The table below identifies

the terms manufacturers use to define the capacity of storage media.

Storage Terms and Their Byte Equivalents

Storage Terms Exact Number of Bytes Approximate Number of Bytes

Kilobyte (KB) 210or 1,024 1 thousand

Megabyte (MB) 220 or 1,048,576 1 million

Gigabyte (GB) 230 or 1,073,741,824 1 billion

Terabyte (TB) 240 or 1,099,511,627,776 1 trillion

Petabyte (PB) 250 or 1,125,899,906,842,624 1 quadrillion

Exabyte (EB) 260 or 1,152,921,504,606,846,976 1 quintillion

Zettabyte (ZB) 270 or 1,180,591,620,717,411,303,424 1 sextillion

Yottabyte (YB) 280 or1,208,925,819,614,629,174,706,176 1 septillion

Examples of storage media include hard drives (hard disks and solid-state drives), optical

discs, USB flash drives, and memory cards.

Hard Drives

o Current hard disks that are housed inside laptops or desktops have storage

capacities from 500 GB to 4 TB and more.

o Storage capacities of current SSDs in laptops or desktops range from 16 GB to 512

GB and more.

o External hard drives have storage capacities up to 4 TB and more.

Optical Discs

o A typical CD-ROM has a storage capacity from 650 MB to 1 GB.

o DVDs have storage capacities ranging from 4.7 GB to 17 GB.

o Blu-ray Discs (BDs) have storage capacities of 100 GB, 200 GB, and more.

USB Flash Drives

o Current USB flash drives have storage capacities ranging from 2 GB to 1 TB, with the

latter being extremely expensive.

Memory Cards

o Common types of memory cards include SDHC (Secure Digital High Capacity), SDXC

(Secure Digital Extended Capacity), microSDHC, microSDXC, CF (CompactFlash), xD

Picture Card, Memory Stick Pro Duo, and M2 (Memory Stick Micro). The table below

compares storage capacities of these media.

Page 10: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 10

Various Memory Cards

Media Type

Typical Current Storage Capacities

Sample Image

SDHC SDXC

4 to 32 GB 64 GB to 2 TB

microSDHC microSDXC

4 to 32 GB 16 GB to 2 TB

CF 4 to 512 GB

xD Picture Card 256 MB to 2 GB

Memory Stick Pro Duo M2

4 to 32 GB 2 to 16 GB

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

A hard drive with a 20 GB storage capacity can store more items than one with a 20 TB storage capacity.

True

False

Tap or click here to return to the Table of Contents.

Page 11: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 11

Secure IT 1-1: Backing Up Computers and Mobile Devices Cloud Storage Services The following list identifies popular cloud storage services. You can find additional information by

entering the list items as search text.

Box

Dropbox

Google Drive

IDrive

JustCloud

OneDrive

SugarSync

ZipCloud

Discover More: To display search results about cloud storage services in a new browser window or

tab, tap or click this link: dscov.com/16/01s1. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 12: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 12

Search Engines The following lists identify popular general-purpose and question-and-answer search engines. You can

find additional information by entering the list items as search text.

General-Purpose Search Engines

o Bing

o Google

o Yahoo! Search

Question-and-Answer Search Engines

o About.com

o Ask

o eHow

Discover More: To display search results about search engines in a new browser window or tab, tap or

click this link: dscov.com/16/01r3. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 13: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 13

Technology Innovators: Facebook and Mark Zuckerberg With more than 1 billion active users per month, Facebook lives up to its mission “to make the world

more open and connected.” Mark Zuckerberg founded the company in 2004 and became one of the

youngest self-made billionaires in history.

Both Microsoft and Aol had recruited Zuckerberg during his senior year in high school in New

Hampshire. He declined their job offers and decided to attend Harvard. In college, he and some friends

developed several projects, laying the foundation that led to Facebook’s eventual start. Tyler and

Cameron Winklevoss and Divya Narendra argued that Zuckerberg stole their idea for the website and

sued Zuckerberg. The ensuing litigation and settlement were the subject of the movie, The Social

Network.

Zuckerberg had instant success launching Facebook from his dorm room, and the website’s popularity

quickly spread to other Ivy League and Boston-area colleges and then worldwide. He left his studies at

Harvard University in 2004 and moved to California.

Facebook employees work in a “hacker culture,” which involves developing new products and solving

problems creatively and quickly. Posters on walls remind them that “this journey is 1% finished,”

meaning that many projects remain to continue keeping people connected worldwide.

Do you have a Facebook account? If so, what new products have been introduced since you became a

member of the Facebook community? If not, why do you choose to not join? What qualities make

Facebook such a popular website?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Mark Zuckerberg launched Facebook from dorm room at Harvard University.

True

False

Tap or click here to return to the Table of Contents.

Page 14: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 14

Technology Innovator: Twitter Twitter helps people from nearly every country in the world obtain up-to-the-minute information about

the things that matter most in their lives via 140-character Tweets. This social media site has become

one of the more popular websites since it was formed in 2006. The more than 280 million monthly

active users can post messages and include photos, videos, news stories, and other ideas. Businesses

also use Twitter to deliver information and advertisements about products and services and to obtain

feedback from customers.

Jack Dorsey developed the idea behind Twitter, initially called twttr, while studying at New York

University. Then, while running his web-based company that dispatched taxis and couriers, he

collaborated with board members of a podcasting company who were interested in Internet and text

messaging. Several months after Dorsey sent his first Tweet, the cofounders introduced the service to

the public.

Notable Tweets have been sent by NASA astronauts at the International Space Station, Lady Gaga, Justin

Bieber, Barack Obama, Oprah Winfrey, and World Wide Web creator Tim Berners-Lee.

Do you have a Twitter account? If so, who or what do you follow? If not, why do you choose to not

join? What qualities contribute to Twitter’s popularity?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Jack Dorsey’s initial name for Twitter was twttr.

True

False

Tap or click here to return to the Table of Contents.

Page 15: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 15

Ethics & Issues 1-2: Should You Be Required to Obtain Permission before

Posting Photos of Others? The resources listed in the table below contain more information about obtaining permission before

posting pictures of others online. As an alternative to tapping, clicking, or entering the web address, you

can find desired information by entering search text from the table’s Website Name or Description

column.

Websites about Photo Permissions

Website Name Description Web Address

Better Business Bureau Article titled “Facebook: Permission before Posting?”

dscov.com/16/01e2a

Facebook Statement of Rights and Responsibilities dscov.com/16/01e2b

Tap or click here to return to the Table of Contents.

Page 16: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 16

Secure IT 1-2: Protection from Viruses and Other Malware The following list identifies popular antivirus tools. You can find additional information by entering the

list items as search text.

Avast

Avira

AVG AntiVirus

Kaspersky Internet Security

Intel Security

Microsoft Security Essentials

Norton Security

Panda Security

Trend Micro

ZoneAlarm

Discover More: To display search results about antivirus tools in a new browser window or tab, tap or

click this link: dscov.com/16/01s2. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 17: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 17

Secure IT 1-3: Creating Strong Passwords The following list identifies popular online tools to evaluate password strength. You can find additional

information by entering the list items as search text.

How Secure Is My Password

Microsoft Password Strength Tester

OWASP Passfault

Strength Test – Rumkin

The Password Meter

The Password Security Checker – Estatis

Yahoo! Password Strength Test

Discover More: To display search results about creating strong passwords in a new browser window or

tab, tap or click this link: dscov.com/16/01s3. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 18: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 18

Technology Innovators: Microsoft and Bill Gates Bill Gates learned to program computers when he was 13 years old. Early in his career, he tailored the

BASIC programming language for the MITS Altair, one of the first microcomputers. He founded

Microsoft in 1975 with Paul Allen, three programmers, and one product. Five years later they licensed

the first operating system, called PC-DOS, to IBM for $80,000. This decision to license, rather than sell,

the software is considered one of the wisest business decisions Gates ever made. The company now

employs more than 128,000 people and has annual revenues in excess of $86 billion.

In the mid-1980s, Microsoft’s MS-DOS operating system was a huge success. Microsoft followed MS-

DOS with Microsoft Windows, a graphical user interface (GUI) operating system, and the Internet

Explorer browser. In addition to its success in the operating system market, Microsoft has the popular

productivity software suite, Office, which is available for both PC and Mac computers and includes

products for word processing, presentations, spreadsheets, and databases.

Microsoft also has other diverse assets, including the acquisition of Skype; in the mobile phone industry

with its Windows Phone OS; the MSNBC cable television network; SharePoint, a web app platform used

primarily to manage documents; and gaming software, including Flight Simulator and Halo. Microsoft

also develops hardware, such as the Surface tablet, Xbox, mouse devices, keyboards, fingerprint

readers, webcams, and game controllers.

Although Bill Gates retired in 2008 from his role as Microsoft’s chief software architect, he remains on

the company’s board of directors and is an advisor on key development projects. He devotes much of

his time codirecting the Bill & Melinda Gates Foundation, a philanthropic organization working to help

people worldwide lead healthy, productive lives. His foundation awards grants with the goal of using

technology to improve health, to help reduce poverty, and to improve education and graduation rates,

with an emphasis on online learning.

He has authored two books, Business @ the Speed of Thought and The Road Ahead, both of which

remained on The New York Times bestseller list for many weeks. He also is the founder and chairman of

Corbis, a company that provides photos, illustrations, video, and merchandise for newspapers,

magazines, and other media, and also preserves historic photographs in climate-controlled facilities.

Which Microsoft products have you used? Why would Bill Gates retire from Microsoft and devote his

energies toward furthering his philanthropic interests?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Bill Gates retired from Microsoft in 2008 but remains on the company’s board of directors and is an

advisor on key development projects.

True

False

Tap or click here to return to the Table of Contents.

Page 19: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 19

Technology Innovators: Apple, Steve Jobs, and Steve Wozniak Fortune called Steve Jobs the “greatest entrepreneur of our time.” Those words are a fitting tribute to

the man who cofounded Apple in 1976 with Steve Wozniak. Five years later, he was worth $200 million

and on the cover of Time at the age of 26. By that time he had helped build the first desktop computer,

marketed an innovative operating system, and cofounded the Apple Computer Corporation.

Apple Apple is noted for introducing groundbreaking products, starting with the Apple I, a circuit board

developed in Jobs’ parents’ garage. The Apple II was the first mass-marketed personal computer in

1977, and the Macintosh, which featured a graphical user interface, was introduced seven years later.

Under Jobs’ direction as CEO, Apple then developed the iOS and OS X operating systems; iLife for

working with photos, music, videos, and websites; and iWork, a collection of business programs. Apple

also has led the digital media revolution with its iPod mobile devices, iPad tablets with Retina display,

iTunes online music and app store, and iTunes U free educational content from schools, libraries,

museums, and organizations.

Steve Jobs Jobs used his personality traits and motivational skills to lead Apple to become one of the world’s top

consumer electronics companies. Until his death from a pancreatic tumor in 2011, he was instrumental

in introducing original products and branding the company’s image. He also revolutionized music

distribution by guiding the evolution of the iTunes store. As Apple’s CEO, he earned a salary of $1 per

year. Jobs also cofounded Pixar Animation Studios, which merged with The Walt Disney Company in

2006. He then became a member of Disney’s board of directors and the company’s largest shareholder.

Steve Wozniak Mixing fun with work comes naturally for Wozniak. He says his computer designing career began as, and

still continues to be, a hobby filled with creativity, humor, games, and education. In his opinion, Apple

was successful because he designed computers that had minimal parts and maximum performance. He

was inducted into the Consumer Electronics Hall of Fame and the National Inventors Hall of Fame. One

of his current passions is applying artificial intelligence to the area of robotics. He also is a member of

the Silicon Valley Aftershocks, a polo team that plays using Segway electric transportation devices, and

competed on the television program Dancing with the Stars.

Which Apple products have you used? What qualities make Apple products popular in the

marketplace?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Steve Jobs’ salary as Apple’s CEO was $1 per year.

True

False

Tap or click here to return to the Table of Contents.

Page 20: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 20

Expanded Table 1-2: Categories of Applications The table below includes elements from and expands on Table 1-2 in the book.

Category Sample Applications Sample Uses

Productivity

Word Processing Create letters, reports, and other documents.

Presentation Create visual aids for presentations.

Spreadsheet Organize data in columns and rows, and perform calculations.

Database Organize data to allow access, retrieval, and use of that data.

Note Taking Enter typed text, handwritten comments, drawings, sketches, photos, and links.

Calendar and Contact Management

Organize appointments and contact lists, and share this information with others.

Project Management Plan, schedule, track, and analyze events, resources, and costs of a project.

Accounting Record and report financial transactions.

Personal Finance Balance checkbook, pay bills, and track income and expenses.

Tax Preparation Guide you through the process of filing taxes.

Legal Assist in preparation of legal documents.

Document Management Provide means for sharing, distributing and searching through documents.

Enterprise Computing Support functional units in a large organization.

Support Services Make business or personal tasks, such as shopping and traveling, easier.

Graphics and Media

Computer-Aided Design (CAD) Create engineering, architectural, and scientific designs and models.

Desktop Publishing Create publications that contain text, graphics, and colors.

Paint/Image Editing Create and modify graphics.

Photo Editing and Photo Management

Modify, view, organize, and share digital photos.

Video and Audio Editing Modify recorded movie clips, add music, etc.

Multimedia and Website Authoring

Combine text, graphics, audio, video, and animation in an interactive application.

Media Player View images, listen to audio/music, and watch videos.

Page 21: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 21

Disc Burning Write files on a disc.

Personal Interest

Lifestyle Access news, check weather, compose music, locate points of interest, and more.

Medical Research, establish fitness program, track activity, monitor sleep patterns, and more.

Entertainment Listen to music, view photos, watch videos, play games, and more.

Convenience Obtain directions, set an alarm, use a personal assistant, and more.

Educational Access guides, learn a skill, support academics, and more.

Communications

Blog Read time-stamped articles.

Browser Access and view webpages.

Chat Room Participate in live, online typed conversation with many others.

Online Discussion View online areas where users have written discussions.

Email Send and receive messages.

FTP Transfer items to and from other computers on the Internet.

Internet Phone (or VoIP) Speak to other users over the Internet.

Internet Messaging Exchange real-time messages with another user.

Mobile Messaging Send and receive short text, picture, or video messages, mainly on mobile devices.

Videoconference Meeting between geographically separated people via a network.

Web Feeds Keeps track of changes made to websites.

Security

Personal Firewall Detect and protects against unauthorized intrusions.

Antivirus Protect a computer against viruses.

Spyware, Adware, and Other Malware Removers

Detect and deletes spyware, adware, and other malware.

Internet Filters Remove or blocks certain items from being displayed or received.

File, Disk, and System Management

File Manager Display and organize files on storage media.

Search Locate files and other items on storage media.

Page 22: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 22

Image Viewer Display, copy, and print contents of graphics files.

Uninstaller Remove a program.

Disk Cleanup Search for and remove unnecessary files.

Disk Defragmenter Reorganize files and unused space on a computer’s hard disk.

Screen Saver Cause a display device’s screen to show a moving image or blank screen after a period of no keyboard or mouse activity.

File Compression Shrink the size of a file.

PC Maintenance Identify and fixes operating system problems.

Backup and Restore Copy files or contents of a drive, and if necessary, returns backed up files to original form.

Answer the following question by tapping or clicking the best response, which will open a browser

window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when

you are finished viewing it.

Which of the following applications enables users to view images, listen to audio/music, and watch

videos?

a. media player

b. database

c. FTP

d. personal firewall

Tap or click here to return to the Table of Contents.

Page 23: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 23

Cellular Transmissions Cellular data transfer rates are stated in Kbps (kilobits per second, or thousand bits per second), Mbps

(megabits per second, or million bits per second), and Gbps (gigabits per second, or billion bits per

second). Several categories of cellular transmissions exist, defining the development of cellular

networks. Although the definitions of these categories may vary by mobile service providers, below are

some general guidelines:

1G (first generation of cellular transmissions)

o Transmits analog data at speeds up to 14.4 Kbps

2G (second generation of cellular transmissions)

o Transmits digital data at speeds from 9.6 Kbps to 144 Kbps

o Improved voice transmissions, added data communications, and added SMS (short

message service) or text messaging services

o Standards include GSM (Global System for Mobile Communications) and GPRS

(General Packet Radio Service)

3G (third generation of cellular transmissions)

o Transmits digital data at speeds from 144 Kbps to 3.84 Mbps

o Improved data transmissions, added MMS (multimedia message services)

o Standards include UMTS (Universal Mobile Telecommunications System), CDMA

(Code Division Multiple Access), EDGE (Enhanced Data GSM Environment), and

EVDO (Evolution Data Optimized)

4G (fourth generation of cellular transmissions)

o Transmits digital data at speeds up to 100 Mbps

o Improved video transmissions

o Standards include Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), and

IEEE 802.16 (WiMAX)

5G (fifth generation of cellular transmissions)

o Future generation of cellular transmissions

o Expected to improve bandwidth and transmission speeds (hundreds of times faster

than 4G LTE)

o Fewer dead zones expected

o Expected to provide artificial intelligence capabilities on wearable devices

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

A 4G cellular device should transmit data faster than a 3G cellular device.

True

False

Tap or click here to return to the Table of Contents.

Page 24: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 24

Mini Feature 1-2: Staying in Sync The resources listed in the tables below contain more information about setting up a home network and

wireless syncing. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the tables’ Website Name or Description columns.

Websites about Wired Setups

Website Name Description Web Address

About.com Article titled “Home Network Setup – Networking Advisor”

dscov.com/16/01m2a

eHow Article titled “How to Network Your Computers”

dscov.com/16/01m2b

HowStuffWorks Article titled “How Home Networking Works”

dscov.com/16/01m2c

YouTube Video titled “How to set up a wired network”

dscov.com/16/01m2d

Websites about Wireless Syncing

Website Name Description Web Address

gizmag Article titled “Apple's iCloud enables automatic, wireless syncing between devices”

dscov.com/16/01m2e

HowStuffWorks Article titled “How to Sync Your Phone to Your Computer”

dscov.com/16/01m2f

PCWorld Article titled “How to sync files and folders across two PCs”

dscov.com/16/01m2g

YouTube Video titled “How to AUTO SYNC Photos, Contacts, Notes, Calendar Between iPhone, MAC, PC, iPad, iPod”

dscov.com/16/01m2h

Cloud Storage Services The following list identifies popular cloud storage services. You can find additional information by

entering the list items as search text.

Box

Dropbox

Google Drive

IDrive

JustCloud

OneDrive

SugarSync

ZipCloud

Tap or click here to return to the Table of Contents.

Page 25: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 25

Technology Trend: Massive Open Online Courses (MOOCs) The thought of having more than 2,000 students enrolled in a single class may seem daunting, but this

enormous course existed nearly 10 years ago. It was one of the first massive open online courses

(MOOCs) and was a pioneer in opening access to quality education anywhere the Internet is available.

Since that time, millions of people worldwide have registered for credit and noncredit classes taught by

experts ranging from corporate CEOs to yoga masters. One of the more popular courses, Introduction to

Artificial Intelligence, had more than 150,000 students enroll.

The MOOC format can vary depending upon the subject matter and instructor’s expertise, but most

involve videos of lectures, assigned readings, assignments, and interactive discussions. Some instructors

open their courses to anyone interested in attending, and they invite people to share the course

content. Other instructors, however, keep the course closed and maintain strict control of their

resources. Khan Academy is one of the more popular MOOCs, and the short video instructions on

thousands of topics have been translated into 40 languages.

MOOC completion rates generally are quite low, often around 10 percent. Critics also note that

instructors do not know if the enrolled students actually are completing the assignments themselves,

which is an issue in most online classes. In general, however, the concepts of providing wider access to

education and the opportunity to learn from experts are valuable outcomes from this form of online

instruction.

Have you participated in a MOOC? If so, describe your experiences and what you learned in the

course. If not, what subjects would be interesting to study in a MOOC? Why are the completion rates so

low in these courses?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The Khan Academy is a popular MOOC.

True

False

Tap or click here to return to the Table of Contents.

Page 26: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 26

Mini Feature 1-3: Digital School The resources listed in the table below contain more information about technologies integrated in

classrooms. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Digital Technologies in Classrooms

Website Name Description Web Address

National Math + Science Initiative

Article titled “Technology in the Classroom: The Benefits of Blended Learning”

dscov.com/16/01m3a

The Huffington Post Article titled “Technology in the Classroom” dscov.com/16/01m3b

U.S. Department of Education

Article titled “Effects of Technology on Classrooms and Students”

dscov.com/16/01m3c

U.S. News & World Report Article titled “Technology in the Classroom” dscov.com/16/01m3d

Tap or click here to return to the Table of Contents.

Page 27: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 27

Online Investing The following list identifies popular online investing websites. You can find additional

information by entering the list items as search text.

Charles Schwab

E-Trade

Fidelity

Firstrade

Merrill Lynch

Scottrade

TD Ameritrade

Vanguard

Discover More: To display search results about investing websites in a new browser window or tab, tap

or click this link: dscov.com/16/01r6. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 28: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 28

Mobile Payments Many technology companies are investing millions of dollars to develop digital wallets that enable

mobile payments. Instead of using credit cards or cash to pay for purchases, customers can use an app

on their smartphones or enter personal information in a keypad at the checkout register. Coupons and

loyalty cards are linked to the accounts, and customers can link their smartphones to their current credit

cards.

Square, PayPal, Apple, Samsung, and Microsoft are among the companies implementing mobile

payments. Starbucks and Whole Foods are two of the more popular merchants using the Square

technology. Dollar General, Famous Footwear, and Home Depot accept PayPal payments at their stores.

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

To pay for an item using a mobile payment app, the customer swipes his or her mobile payment card

through the retailer’s card reader.

True

False

Tap or click here to return to the Table of Contents.

Page 29: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 29

Secure IT 1-4: Shopping Safely Online The resources listed in the table below contain more information about safe online shopping

techniques. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Shopping Safely Online

Website Name Description Web Address

CNET Article titled “How to shop safely online” dscov.com/16/01s4a

US-CERT Article titled “Security Tip: Shopping Safely Online”

dscov.com/16/01s4b

wikiHow Article titled “How to Shop Online Safely” dscov.com/16/01s4c

Tap or click here to return to the Table of Contents.

Page 30: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 30

Technology Trend: QR Codes Marketing and advertising executives use QR codes as an effective method of engaging readers and

consumers. According to comScore, a digital analytics company, the most commonly scanned QR codes

are found in magazines and newspapers or on product packaging. People are most likely to scan them at

home or in stores.

While retailers realize the benefits of using the codes to share product details, other industries are

devising creative uses for these codes. In particular, the medical field is finding this technology is a

practical and efficient method of disseminating information and educational materials, such as facility

maps, hospital tours, and health services. For example, patients with chronic medical conditions can

store their personal health history in a QR code on their medical records, so that first responders can

access this information quickly in an emergency. In other cases, a code on the back of an insurance card

can give information about drug reactions to chemicals, patients can watch videos describing how to

perform therapy exercises or care for wounds, and nutritionists can add meal plans and diets.

Medical personnel, in general, have found patients have a positive attitude toward seeing the QR codes.

The front-desk staff can create QR codes for appointment reminders to scan into the patients’

smartphones. Patients are likely to recall seeing the information and can retrieve the details on their

smartphones quickly and conveniently, without having to search for an appointment card or for written

instructions.

Have you scanned QR codes? If so, which ones? What information did you obtain? Which products do

you use that have these codes?

Answer the following question by tapping or clicking the best response, which will open a browser

window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when

you are finished viewing it.

In which location are people most apt to scan QR codes?

a. at home

b. at school

c. on public transportation

d. at sporting events

Tap or click here to return to the Table of Contents.

Page 31: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 31

High-Tech Talk: Triangulation Have you wondered how a Nintendo Wii game console is able to determine the precise location of a Wii

Remote while you interact with a game? How does the Wii console know where you are pointing the Wii

Remote, swinging it like a golf club, or motioning as if you are throwing a bowling ball? The answer is

triangulation.

Triangulation is the process by which you can use trigonometry to determine the location of an object

by measuring the angles from two or more fixed points. Surveyors often use triangulation to measure

distance. Starting at a known location and elevation, surveyors measure a predetermined length to

create a base line and then use an instrument called a theodolite to measure the angle to the unknown

point from each side of the base line. The length of the base line along with the two known angles

allows a computer or individual to determine the exact location of the third point (Figure 3). Electronic

theodolites calculate angles automatically and then send the calculated angles to a computer for

analysis.

Figure 3: Example of triangulation.

In Figure 3, the distance between points A and B is known. The theodolite calculates angle CAB (α) and

also calculates angle ABC (ß). A human or computer can calculate the location of point C by determining

the distance between points A and C and between points B and C. The formula used to determine the

location of an object will vary depending upon the number of fixed points used in the measurement.

With two fixed points, a relatively simple formula calculates the location of the third point. As the

number of fixed points increases, the calculation becomes more complex.

Similarly, the Nintendo Wii game console uses triangulation to determine the location of a Wii Remote.

When you set up a Wii game system, you place a sensor bar, which contains two infrared transmitters,

near or on top of a television set. While you are using a Wii Remote, the Wii console determines the

Page 32: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 32

remote's location by calculating the distance and angles between the Wii Remote and the two

transmitters on the sensor bar. Determining the location of a Wii Remote is relatively simple because

the sensor bar contains only two fixed points: the transmitters.

A more complex application of triangulation occurs in global positioning systems. A global positioning

system (GPS) is a navigation system that consists of one or more earth-based receivers that accept and

analyze signals sent by satellites in order to determine the receiver's geographic location. GPS receivers

are found in handheld navigation devices and many vehicles. GPS receivers use triangulation to

determine their location relative to at least three geostationary satellites. Geostationary satellites, the

fixed points in the triangulation formula, remain in the same location above the earth. At least 24

operational geostationary GPS satellites orbit the earth at any given time, although at this time, 31

operational satellites are in orbit. A GPS receiver can increase its accuracy by using more than three of

these satellites to determine its location. This is done by measuring the distance from each of the

satellites, which always are a fixed distance apart, that are in range. In addition to determining position,

GPS receivers also are able to calculate the speed of a moving object by recording its change in location

from each satellite during a period of time. For instance, if a GPS receiver determines that you travel

two-hundredths of a mile in one second, it automatically would be able to calculate that you are

traveling at a rate of 72 miles per hour.

Another form of triangulation also can be used to determine the exact location of certain mobile

phones, usually after a caller dials for emergency assistance. Although some mobile phones are not

equipped with a GPS receiver, computers still can determine the phone's distance from other known

locations, which might include cell towers. Because the location of two or more cell towers within range

are known, computers easily can calculate the location of the mobile phone. Even if you think the

position of your mobile phone can be determined automatically, always be prepared to give your

location to an emergency dispatcher.

The next time you are passing a surveyor, playing a Nintendo Wii, following a prescribed route on a

vehicle's navigation system, or observing emergency personnel respond to an accident, keep in mind

that none of it might have been possible without the concept of triangulation.

Where else have you seen examples of triangulation?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

At least 31 operational GPS satellites are always in orbit.

True

False

Tap or click here to return to the Table of Contents.

Page 33: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 33

High-Tech Talk: Neural Networks A neural network is a type of artificial intelligence system that attempts to emulate the way the human

brain works. Neural networks are named after neurons, which are the billons of cells in the human brain

that perform intelligent operations. Each neuron is like a small computer with basic capabilities. When

billions of neurons are connected together, however, these cells are the intellectual capacity in the

human brain, the most intelligent system known.

Neural networks are modeled on the human brain. A neural network uses an interconnected system of

hundreds or thousands of specially designed circuits, also called artificial neurons. Like the brain's

neurons, these circuits are connected together. Neural networks also are called artificial neural

networks (ANNs) to differentiate the network of artificial neurons from the network of biological

neurons in the human brain.

A neural network uses these circuits to create connections between inputs and outputs. The most

common neural network model is the multilayer perceptron (MLP), which consists of at least three

layers of circuits: a layer of input circuits, which is connected to one or more layers of hidden circuits,

which are connected to a layer of output circuits (Figure 4). The knowledge of a neural network is

housed in the hidden layers, which store the information that defines relationships between inputs and

outputs.

Figure 4: Common multilayer perceptron (MLP) neural network model.

Just as people do, neural networks learn from experience. Some neural networks are trained using a

process called backpropagation, as shown in Figure 4. During backpropagation, the input data, which is

the information used to make a decision, repeatedly is presented to the neural network via the input

Page 34: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 34

layer. The neural network then generates an output, which is the resulting decision, prediction, or

response, based on the weighted connections between the inputs and outputs, as stored in the hidden

layers.

The output of the neural network then is compared with the desired output, and the error is calculated

based on historical or known data. This error then is fed back, or backpropagated, to the hidden layer to

adjust the weights of the connection. During each repetition, the neural network learns to associate the

weight of the relationship between certain inputs and outputs. It then adjusts the weights of the

connections between the inputs and outputs accordingly. The hidden layers thus store a neural

network's knowledge as weighted connections between inputs and outputs, which are known as

synaptic weights. As training continues, the extent of the error decreases with each iteration, until the

neural network reaches a fully trained state where it reliably produces the desired output. The neural

network then is ready to produce outputs when the desired output is unknown.

Unlike humans, once trained fully, a neural network recognizes and classifies patterns in huge quantities

of complex data, at high speeds that humans cannot duplicate. Uses of neural networks include a wide

range of applications, such as sorting mail at the U.S. Postal Service, determining the number of jurors to

call at county courthouses, and identifying police officers with a potential for misconduct. Scientists use

neural networks to predict rainfall and forecast air quality. Manufacturers benefit from neural networks

that allow them to test the quality of plastics and welding and determine which type of concrete to use

on a highway. In health care, neural networks help predict heart attacks and cancer risk, while helping to

improve treatment.

In which applications might neural networks be useful in higher education environments?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The most common neural network model is the multilayer backpropagation (MLB).

True

False

Tap or click here to return to the Table of Contents.

Page 35: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 35

Ethics & Issues 1-4: Should Wikis Be Allowed as Valid Sources for

Academic Research? By protecting a wiki's contents, administrators ensure that the content follows the guidelines of the

wiki; it also reduces the wiki's vulnerability to vandalism.

The following list identifies several strategies wiki administrators use to evaluate and monitor new and

changed content.

Require editors to register

Recognize accurate editors and contributors

Limit the number of changes a new editor can make

Approve new editors' content before posting

Manage disruptive editors

Warn or ignore editors who contribute content that does not fit the guidelines or whose

behavior is disruptive

Discourage edit warring, which occurs when multiple editors disagree with each other's content

and make continual changes to the page

Monitor edits

Review recently edited pages

Enable administrators and editors to undo changes

Watch pages with content that is changed frequently or is susceptible to vandalism, such as for

celebrities or public figures in the midst of a scandal

Lock or protect pages

Enable only registered editors to change certain pages

Limit the number of pages that can be created, moved, or uploaded

Use applications

Detect and reverse vandalism using Huggle, Twinkle, Igloo, STiki, and other applications that

provide content management tools, such as tracking of recently edited pages, and the ability to

rollback a page to before it was edited

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Requiring editors to register before editing a wiki can help ensure the wiki’s accuracy.

True

False

Tap or click here to return to the Table of Contents.

Page 36: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 36

Ethics & Issues 1-5: Should Employees Be Held Accountable for Their

Online Social Network Posts? The resources listed in the table below contain more information about employers’ monitoring of

employees or potential employees’ social media activities. As an alternative to tapping, clicking, or

entering the web address, you can find desired information by entering search text from the table’s

Website Name or Description column.

Websites about Online Social Networks

Website Name Description Web Address

Career Builder Article titled “Think before you post: Your online presence can cost you your job”

dscov.com/16/01e5a

Workforce Article titled “Should you Check Your Employees’ Social Media Accounts?”

dscov.com/16/01e5b

Tap or click here to return to the Table of Contents.

Page 37: Table of Contents - Cengage · Chapter 1 Free Resources INTRODUING TODAY’S TEHNOLOGIES: omputers, Devices, and the Web Discovering Computers 2016 Page 1 Table of Contents ... Discovering

Chapter 1 Free Resources INTRODUCING TODAY’S TECHNOLOGIES: Computers, Devices, and the Web

Discovering Computers 2016 Page 37

Technology @ Work: Health Care The resources listed in the table below contain more information about how the health care industry

uses technology. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Technology in Health Care

Website Name Description Web Address

Becker’s Health IT & CIO Review

Article titled “10 Biggest Technological Advancements for Healthcare in the Last Decade”

dscov.com/16/01w1a

Forbes Article titled “5 Ways Technology Is Transforming Health Care”

dscov.com/16/01w1b

referral md Article titled “The 7 Biggest Innovations in Health Care Technology”

dscov.com/16/01w1c

Tap or click here to return to the Table of Contents.