ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Technology In Action Complete (16th Edition)

دانلود کتاب فناوری در عمل کامل (نسخه شانزدهم)

Technology In Action Complete (16th Edition)

مشخصات کتاب

Technology In Action Complete (16th Edition)

ویرایش: 16 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 0135435196, 9780135435199 
ناشر: Pearson 
سال نشر: 2019 
تعداد صفحات: 625 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 84 مگابایت 

قیمت کتاب (تومان) : 36,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 15


در صورت تبدیل فایل کتاب Technology In Action Complete (16th Edition) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری در عمل کامل (نسخه شانزدهم) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فناوری در عمل کامل (نسخه شانزدهم)



برای دوره های مقدماتی مفاهیم کامپیوتر، سواد دیجیتال، یا سواد کامپیوتر، اغلب شامل آموزش در Microsoft® Office.

استفاده از فناوری برای آموزش فناوری
پرفروش‌ترین تکنولوژی در عمل کامل از محتوای عملی و پروژه‌های عملی استفاده می‌کند تا دانش‌آموزان را در انجام وظایف محاسباتی و مهارت‌هایی که می‌توانند درگیر کنند. در محل کار، کلاس یا خانه درخواست دهید. این متن که برای دانش‌آموزان باهوش تکنیکی امروزی طراحی شده است، مفاهیم دشوار را در مراحل اولیه معرفی می‌کند، سپس با تسلط دانش‌آموزان، این مهارت‌ها را گسترش می‌دهد. نسخه شانزدهم به‌روزرسانی‌های محتوایی نوآورانه را ارائه می‌کند، از جمله پوشش جدیدی از اخلاق، هوش مصنوعی، و مدیریت سبک زندگی دیجیتال، و همچنین چندین ویژگی جدید که تفکر انتقادی را تشویق می‌کند.

همچنین. در دسترس با MyLab IT
با ترکیب محتوای نویسنده قابل اعتماد با ابزارهای دیجیتال و یک پلت فرم منعطف، MyLab IT تجربه یادگیری را شخصی‌سازی می‌کند و به دانش‌آموزان کمک می‌کند تا مفاهیم کلیدی دوره را جذب و حفظ کنند و در عین حال مهارت‌هایی را که کارفرمایان به دنبال آن هستند، توسعه دهند.



b>
توجه: شما در حال خرید یک محصول مستقل هستید. MyLab IT با این محتوا همراه نیست. دانشجویانی که علاقه مند به خرید این عنوان با MyLab IT هستند، از استاد خود بخواهید تا ISBN و Course ID صحیح بسته را تایید کند. مدرسان، برای اطلاعات بیشتر با نماینده پیرسون خود تماس بگیرید.

اگر می خواهید هم متن فیزیکی و هم MyLab IT را بخرید، جستجو کنید:

0135756766 / 9780135756768
< b> تکنولوژی در عمل، کامل، 16e MyLab IT 2019 w/ Pearson eText, 16/e
بسته شامل:

< ul>
  • 0135435129 / 9780135435120 MyLab IT with Pearson eText -- Access Card -- for Technology in Action, 16/e
  • 0135435196 / 978013543519 Technology> کامل، 16/e

  • تکنولوژی در عمل، ویرایش شانزدهم نیز موجود است از طریق Revel، یک محیط یادگیری تعاملی که دانش‌آموزان را قادر می‌سازد تا در یک تجربه مداوم بخوانند، تمرین کنند و مطالعه کنند. Revel دانش‌آموزان را برای شرکت معنادار در کلاس آماده می‌کند و مهارت‌هایی را که برای داشتن سواد دیجیتالی در محل کار و زندگی روزمره خود نیاز دارند، فراهم می‌کند.


    توضیحاتی درمورد کتاب به خارجی

    For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft® Office.

    Using technology to teach technology
    Best-selling Technology in Action Complete uses practical content and hands-¿on projects to engage students in computing tasks and skills they can apply at work, in class, or at home. Designed for today’s technically savvy students, the text introduces difficult concepts at a basic level early on, then expands upon these skills as students build mastery. The 16th edition brings innovative content updates, including new coverage of ethics, artificial intelligence, and managing a digital lifestyle, as well as several new features encouraging critical thinking.

    Also available with MyLab IT
    By combining trusted author content with digital tools and a flexible platform, MyLab IT personalizes the learning experience and helps students absorb and retain key course concepts while developing skills that employers seek.

    Note:
    You are purchasing a standalone product; MyLab IT does not come packaged with this content. Students, if interested in purchasing this title with MyLab IT, ask your instructor to confirm the correct package ISBN and Course ID. Instructors, contact your Pearson representative for more information.

    If you would like to purchase both the physical text and MyLab IT, search for:

    0135756766 / 9780135756768
    Technology in Action, Complete, 16e + MyLab IT 2019 w/ Pearson eText, 16/e
    Package consists of:

    • 0135435129 / 9780135435120 MyLab IT with Pearson eText -- Access Card -- for Technology in Action, 16/e
    • 0135435196 / 9780135435199 Technology In Action Complete, 16/e

    Technology in Action, 16th Edition, is also available via Revel, an interactive learning environment that enables students to read, practice, and study in one continuous experience. Revel prepares students to meaningfully participate in class and provides the skills they need to be digitally literate in the workplace and in their everyday lives.



    فهرست مطالب

    Cover
    Inside Front Cover
    Title page
    Copyright page
    Contents at a Glance
    Contents
    Learn Technology by Using Technology in Action 16e
    Letter from the Authors
    About the Authors
    Acknowledgments
    Chapter 1 The Impact of Technology in a Changing World
    	Part 1: Technology in Society
    	Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national and global issues
    		Technology in a Global Society
    			Impact of Tools of Modern Technology
    			Objective 1.1 Describe various technological tools being used to impact national and global issues
    			Global Issues
    			Objective 1.2 Describe various global social issues that are being affected by technology
    		Technology Connects Us with Others
    			Technology Impacts How and Why We Connect and Collaborate
    			Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others
    			Technology Impacts How We Consume
    			Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services
    		The Importance of Computer Literacy
    			Computer Literacy
    			Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate
    			Helpdesk: Technology Impacts
    			Sound Byte: Virtual Computer Tour
    			Try This: What Does Facebook Know about You?
    			Make This: TOOL: IFTTT.com (If This Then That)
    	Part 2: Emerging Technologies and Ethical Computing
    	Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how technology creates new ethical debates
    		Artificial Intelligence
    			Artificial Intelligence Basics
    			Objective 1.6 Describe artificial intelligence systems and explain their main goals
    			Helpdesk: The Impact of Artificial Intelligence
    			Ethics in IT: Ethics in Computing
    		Working with Artificial Intelligence and Other Information Technologies
    			Technology and Your Career
    			Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers
    			Bits&Bytes: Is It AI or Human? Take a Turing Test!
    			Dig Deeper: Augmented and Virtual Realities
    		Ethical Computing
    			Defining Ethics
    			Objective 1.8 Define ethics and examine various ethical systems
    			Sound Byte: How to Debate Ethical Issues
    			Personal Ethics
    			Objective 1.9 Describe influences on the development of your personal ethics
    			Ethics and Technology
    			Objective 1.10 Present examples of how technology creates ethical challenges
    			Solve This: How Technology Is Used on the World Stage and in Your Personal Life
    Chapter 2 Looking at Computers: Understanding the Parts
    	Part 1: Understanding Digital Components
    	Learning Outcome 2.1 You will be able to describe the devices that make up a computer system
    		Understanding Your Computer
    			Computers Are Data Processing Devices
    			Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information
    			Binary: The Language of Computers
    			Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed
    			Sound Byte: Binary Numbers Interactive
    			Types of Computers
    			Objective 2.3 List common types of computers, and discuss their main features
    			Active Helpdesk: Understanding Bits and Bytes
    			Bits&Bytes: Today’s Supercomputers: Faster Than Ever
    		Input Devices
    			Physical Keyboards and Touch Screens
    			Objective 2.4 Identify the main types of keyboards and touch screens
    			Mice and Other Pointing Devices
    			Objective 2.5 Describe the main types of mice and pointing devices
    			Dig Deeper: How Touch Screens Work
    			Bits&Bytes: Distributed Computing: Putting Your Computer to Work While You Sleep
    			Image, Sound, and Sensor Input
    			Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices
    			Output Devices
    			Image and Audio Output
    			Objective 2.7 Describe options for outputting images and audio from computing devices
    			Bits&Bytes: Near Field Communication (NFC): Pay (or Get Paid) Anywhere with Your Phone
    			Printers
    			Objective 2.8 Describe various types of printers, and explain when you would use them
    			Bits&Bytes: Medical Devices and 3D Printing
    			Try This: What’s Inside My Computer?
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Processing, Storage, and Connectivity
    	Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices connect to a computer system
    		Processing and Memory on the Motherboard
    			The Motherboard and Memory
    			Objective 2.9 Describe the functions of the motherboard and RAM
    			Sound Byte: Smartphones Are Really Smart
    			Processing
    			Objective 2.10 Explain the main functions of the CPU
    			Storing Data and Information
    			Storage Options on Computing Devices
    			Objective 2.11 Describe the various means of storing data and information with computing devices
    			Ethics in IT: What Is Ethical Computing?
    			Trends In IT: Green Computing (Green IT)
    		Connecting Peripherals to the Computer
    			Computer Ports
    			Objective 2.12 Describe common types of ports used today
    			Helpdesk: Exploring Storage Devices and Ports
    		Power Management and Ergonomics
    			Power Controls and Power Management
    			Objective 2.13 Describe how to manage power consumption on computing devices
    			Setting It All Up: Ergonomics
    			Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices
    			Bits&Bytes: Sleep Better and Avoid Eyestrain: Use Less Blue Light
    			Solve This: Technology Wish List
    Chapter 3 Using the Internet: Making the Most of the Web’s Resources
    	Part 1: Collaborating and Working on the Web
    	Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for ­collaboration, communication, commerce, and entertainment purposes
    		The Internet and How It Works
    			The Origin of the Internet
    			Objective 3.1 Describe how the Internet got its start
    			How the Internet Works
    			Objective 3.2 Explain how data travels on the Internet
    		Collaborating and Communicating on the Web
    			Collaborating with Web Technologies
    			Objective 3.3 Evaluate the tools and technologies used to collaborate on the web
    			Bits&Bytes: Secure Messaging Apps
    			Sound Byte: Blogging
    			Communicating over the Web
    			Objective 3.4 Summarize the technologies used to communicate over the web
    		Conducting Business on the Web
    			Conducting Business Online
    			Objective 3.5 Describe how business is conducted using the Internet
    			E-Commerce Safeguards
    			Objective 3.6 Summarize precautions you should take when doing business online
    			Dig Deeper: How Cloud Computing Works
    			Bits&Bytes: Looking for Extra Money? Try a Side Hustle
    			Helpdesk: Doing Business Online
    			Bits&Bytes: Bitcoin: A Form of Virtual Currency
    			Try This: Use OneDrive to Store and Share Your Files in the Cloud
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Using the Web Effectively
    	Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web
    		Accessing and Moving Around the Web
    			Web Browsers
    			Objective 3.7 Explain what web browsers are, and describe their common features
    			URLs, Protocols, and Domain Names
    			Objective 3.8 Explain what a URL is and discuss its main parts
    			Navigating the Web
    			Objective 3.9 Describe tools used to navigate the web
    			Bits&Bytes: Maintain Your Privacy While Searching the Web
    		Searching the Web Effectively
    			Using Search Engines
    			Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results
    			Bits&Bytes: Digital Assistants and Predictive Search
    			Sound Byte: Finding Information on the Web
    			Evaluating Websites
    			Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes
    			Helpdesk: Evaluating Websites
    			Trends In IT: Linked Data and the Semantic Web
    			Bits&Bytes: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?
    		Using the Web Ethically
    			Digital Activism
    			Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism
    			Geolocation
    			Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices
    			Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare?
    			Ethics in IT: Cyber Harassment
    			Solve This: Create a Report: Conducting Research on the Web
    Chapter 4 Application Software: Programs That Let You Work and Play
    	Part 1: Accessing, Using, and Managing Software
    	Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage your software
    		Software Basics
    			Application vs. System Software
    			Objective 4.1 Compare application software and system software
    			Distributing Software
    			Objective 4.2 Explain the differences between commercial software and open source software and describe models for software distribution
    			Bits&Bytes: Finding Alternative Software
    		Managing Your Software
    			Purchasing Software
    			Objective 4.3 Explain the different options for purchasing software
    			Trends In IT: Mobile Payment Apps: The Power of M-Commerce
    			Helpdesk: Buying and Installing Software
    			Installing and Uninstalling Software
    			Objective 4.4 Describe how to install and uninstall software
    			Bits&Bytes: Ridding Your Computer of “Bloat”
    			Upgrading Software
    			Objective 4.5 Explain the considerations around the decision to upgrade your software
    			Dig Deeper: How Number Systems Work
    			Software Licenses
    			Objective 4.6 Explain how software licenses function
    			Sound Byte: Where Does Binary Show Up?
    			Ethics in IT: Can I Borrow Software That I Don’t Own?
    			Try This: Citing Website Sources
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Application Software
    	Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia
    		Productivity and Business Software
    			Productivity Software
    			Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses and features
    			Bits&Bytes: Productivity Software Tips and Tricks
    			Bits&Bytes: How to Open Unknown File Types
    			Bits&Bytes: Going Beyond PowerPoint
    			Sound Byte: Programming for End Users
    			Business Software
    			Objective 4.8 Summarize the types of software that large and small businesses use
    			Bits&Bytes: Need to Work as a Team? Try These Collaboration Tools
    		Multimedia and Educational Software
    			Digital Multimedia Software
    			Objective 4.9 Describe the uses and features of digital multimedia software
    			Digital Audio Software
    			Objective 4.10 Describe the uses and features of digital audio software
    			Helpdesk: Choosing Software
    			App Creation Software
    			Objective 4.11 Describe the features of app creation software
    			Bits&Bytes: Mirror, Mirror . . .
    			Educational and Reference Software
    			Objective 4.12 Categorize educational and reference software and explain their features
    			Solve This: Analyzing Benchmark Data
    Chapter 5 System Software: The Operating System, Utility Programs, and File Management
    	Part 1: Understanding System Software
    	Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the steps in the boot process
    		Operating System Fundamentals
    			Operating System Basics
    			Objective 5.1 Discuss the functions of the operating system
    			Operating Systems for Personal Use
    			Objective 5.2 Explain the most popular operating systems for personal use
    			Bits&Bytes: Open Source Operating Systems
    			Bits&Bytes: Operating Systems for the Smart Home
    			Operating Systems for Machinery, Networks, and Business
    			Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business
    			Ethics in IT: The Great Debate: Is macOS Safer Than Windows?
    		What the Operating System Does
    			The User Interface
    			Objective 5.4 Explain how the operating system provides a means for users to interact with the computer
    			Hardware Coordination
    			Objective 5.5 Explain how the operating system helps manage hardware such as the ­processor, memory, storage, and peripheral devices
    			Sound Byte: Using Windows Task ­Manager to Evaluate System Performance
    			Software Application Coordination
    			Objective 5.6 Explain how the operating system interacts with application software
    			Trends In IT: Are Personal Computers Becoming More Human?
    		Starting Your Computer
    			The Boot Process
    			Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled
    			Helpdesk: Starting the Computer: The Boot Process
    			Try This: Using Virtual Desktops in Windows 10
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Using System Software
    	Learning Outcome 5.2 You will be able to describe how to use system software, including the user ­interface, file management capabilities, and utility programs
    		The Windows Interface
    			Using Windows 10
    			Objective 5.8 Describe the main features of the Windows interface
    			Bits&Bytes: The Snipping Tool
    		File Management
    			Organizing Your Files
    			Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders
    			Bits&Bytes: Save Files in the Cloud
    			Bits&Bytes: Tips for Organizing Your Files
    			Helpdesk: Organizing Your Computer: File Management
    		Utility Programs
    			Windows Administrative Utilities
    			Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility
    			Dig Deeper: How Disk Defragmenting Utilities Work
    			Sound Byte: Hard Disk Anatomy
    			Solve This: Operating Systems: Analyzing Market Share
    Chapter 6 Understanding and Assessing Hardware: Evaluating Your System
    	Part 1: Evaluating Key Subsystems
    	Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the CPU and memory subsystems
    		Your Ideal Computing Device
    			Moore’s Law
    			Objective 6.1 Describe the changes in CPU performance over the past several decades.
    			Selecting a Computing Device
    			Objective 6.2 Compare and contrast a variety of computing devices.
    		Evaluating the CPU Subsystem
    			How the CPU Works
    			Objective 6.3 Describe how a CPU is designed and how it operates.
    			Bits&Bytes: Liquid Cooling
    			Measuring CPU Performance
    			Objective 6.4 Describe tools used to measure and evaluate CPU performance.
    			Dig Deeper: The Machine Cycle
    		Evaluating the Memory Subsystem
    			Random Access Memory
    			Objective 6.5 Discuss how RAM is used in a computer system.
    			Adding RAM
    			Objective 6.6 Evaluate whether adding RAM to a system is desirable.
    			Helpdesk: Evaluating Your CPU and RAM
    			Sound Byte: Installing RAM
    			Try This: Measure Your System Performance
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Evaluating Other Subsystems and Making a Decision
    	Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem, and reliability and decide whether to purchase a new system or upgrade an existing one
    		Evaluating the Storage Subsystem
    			Types of Storage Drives
    			Objective 6.7 Classify and describe the major types of nonvolatile storage drives
    			Sound Byte: Installing an SSD Drive
    			Dig Deeper: How Storage Devices Work
    			Storage Needs
    			Objective 6.8 Evaluate the amount and type of storage needed for a system
    			Bits&Bytes: How Much Storage to Buy?
    		Evaluating the Media Subsystems
    			Video Cards
    			Objective 6.9 Describe the features of video cards
    			Bits&Bytes: Graphics Cards with SSD on Board
    			Trends In IT: USB 3.1 and USB-C
    			Sound Cards
    			Objective 6.10 Describe the features of sound cards
    			Helpdesk: Evaluating Computer System Components
    		Evaluating System Reliability and Moving On
    			Maintaining System Reliability
    			Objective 6.11 Describe steps you can take to optimize your system’s reliability
    			Getting Rid of Your Old Computer
    			Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer
    			Ethics in IT: Free Hardware for All
    			Solve This: Laptop Alternatives
    Chapter 7 Networking: Connecting Computing Devices
    	Part 1: How Networks Function
    	Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to create a network, and describe the different ways a network can connect to the Internet
    		Networking Fundamentals
    			Understanding Networks
    			Objective 7.1 Describe computer networks and their pros and cons
    			Helpdesk: Understanding Networking
    		Network Architectures
    			Network Designs
    			Objective 7.2 Explain the different ways networks are defined
    			Dig Deeper: P2P File Sharing
    		Network Components
    			Transmission Media
    			Objective 7.3 Describe the types of transmission media used in networks
    			Sound Byte: Installing a Home Computer Network
    			Basic Network Hardware
    			Objective 7.4 Describe the basic hardware devices necessary for networks
    			Network Software
    			Objective 7.5 Describe the type of software necessary for networks
    			Trends In IT: How Smart Is Your Home?
    		Connecting to the Internet
    			Broadband Internet Connections
    			Objective 7.6 Summarize the broadband options available to access the Internet
    			Bits&Bytes: Net Neutrality
    			Bits&Bytes: Who’s Not on Broadband?
    			Wireless Internet Access
    			Objective 7.7 Summarize how to access the Internet wirelessly
    			Try This: Testing Your Internet Connection Speed
    			Make This: TOOL: Ping and Telnet
    	Part 2: Your Home Network
    	Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home ­network and how to manage and secure a wireless network
    		Installing and Configuring Home Networks
    			Planning Your Home Network
    			Objective 7.8 Explain what should be considered before creating a home network
    			Bits&Bytes: Power Your Devices—Wirelessly
    			Connecting Devices to a Network
    			Objective 7.9 Describe how to set up a home network
    			Bits&Bytes: Mesh Networks: An Emerging Alternative
    			Bits&Bytes: Analyzing Network Problems
    		Managing and Securing Wireless Networks
    			Troubleshooting Wireless Network Problems
    			Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them
    			Securing Wireless Networks
    			Objective 7.11 Describe how to secure wireless home networks
    			Sound Byte: Securing Wireless Networks
    			Helpdesk: Managing and Securing Your Wireless Network
    			Solve This: Home Networking Guide
    Chapter 8 Managing Your Digital Lifestyle: Challenges and Ethics
    	Part 1: The Impact of Digital Information
    	Learning Outcome 8.1 You will be able to describe the nature of digital signals
    		Digital Basics
    			Digital Convergence and the Internet of Things
    			Objective 8.1 Describe how digital convergence and the Internet of Things have evolved
    			Digital versus Analog
    			Objective 8.2 Explain the differences between digital and analog signals
    		Digital Publishing
    			e-Readers
    			Objective 8.3 Describe the different types of e-readers
    			Using e-Texts
    			Objective 8.4 Explain how to purchase, borrow, and publish e-texts
    			Helpdesk: Managing Digital Media
    		Digital Music
    			Creating and Storing Digital Music
    			Objective 8.5 Describe how digital music is created and stored
    			Distributing Digital Music
    			Objective 8.6 Summarize how to listen to and publish digital music
    		Digital Media
    			Digital Photography
    			Objective 8.7 Explain how best to create, print, and share digital photos
    			Sound Byte: Enhancing Photos with Image-Editing Software
    			Digital Video
    			Objective 8.8 Describe how to create, edit, and distribute digital video
    			Trends In IT: Digital Asset Managers Needed!
    		Managing Your Digital Lifestyle
    			Digital Challenges and Dilemmas
    			Objective 8.9 Discuss the challenges in managing an active digital lifestyle
    			Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?
    			Bits&Bytes: The Rise of Wearable Technology
    			Try This: Creating and Publishing a Movie
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Ethical Issues of Living in the Digital Age
    	Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain your digital reputation
    		Protection of Digital Property
    			Intellectual Property
    			Objective 8.10 Describe the various types of intellectual property
    			Copyright Basics
    			Objective 8.11 Explain how copyright is obtained and the rights granted to the owners
    			Helpdesk: Understanding Intellectual Property and Copyright
    			Copyright Infringement
    			Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material
    			Bits&Bytes: Software Piracy: It’s More Than Just Downloading and Copying
    			Bits&Bytes: Your Tax Dollars at Work: Free Media without Permission!
    		Living Ethically in the Digital Era
    			Plagiarism
    			Objective 8.13 Explain plagiarism and strategies for avoiding it
    			Hoaxes and Digital Manipulation
    			Objective 8.14 Describe hoaxes and digital manipulation
    			Sound Byte: Plagiarism and Intellectual Property
    			Protecting Your Online Reputation
    			Objective 8.15 Describe what comprises your online reputation and how to protect it
    			Bits&Bytes: Celebrity Photographic Rights
    			Ethics in IT: Acceptable Use Policies: What You Can and Can’t Do
    			Solve This: Intellectual Property and Copyright Basics
    Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
    	Part 1: Threats to Your Digital Assets
    	Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats they pose to your digital security
    		Identity Theft and Hackers
    			Identity Theft
    			Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate
    			Hacking
    			Objective 9.2 Describe the different types of hackers and the tools they use
    			Bits&Bytes: Hackers Wanted
    		Computer Viruses
    			Virus Basics
    			Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display
    			Sound Byte: Protecting Your Computer
    			Types of Viruses
    			Objective 9.4 List the different categories of computer viruses, and describe their behaviors
    		Online Annoyances and Social Engineering
    			Online Annoyances
    			Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security
    			Social Engineering
    			Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them
    			Bits&Bytes: I Received a Data Breach Letter . . . Now What?
    			Ethics in IT: You’re Being Watched . . . But Are You Aware You’re Being Watched?
    			Helpdesk: Threats to Your Digital Life
    			Trends In IT: Spear Phishing: The Bane of Data Breaches
    			Try This: Testing Your Network Security
    			Make This: App Inventor 2 or Thunkable
    	Part 2: Protecting Your Digital Property
    	Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption
    		Restricting Access to Your Digital Assets
    			Firewalls
    			Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers
    			Preventing Virus Infections
    			Objective 9.8 Explain how to protect your computer from virus infection
    			Helpdesk: Understanding Firewalls
    			Authentication: Passwords and Biometrics
    			Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication
    			Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots
    			Anonymous Web Surfing: Hiding from Prying Eyes
    			Objective 9.10 Describe ways to surf the Web anonymously
    			Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords!
    		Keeping Your Data Safe
    			Protecting Your Personal Information
    			Objective 9.11 Describe the types of information you should never share online
    			Sound Byte: Managing Computer Security with Windows Tools
    			Backing Up Your Data
    			Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files
    		Protecting Your Physical Computing Assets
    			Environmental Factors and Power Surges
    			Objective 9.13 Explain the negative effects environment and power surges can have on computing devices
    			Preventing and Handling Theft
    			Objective 9.14 Describe the major concerns when a device is stolen and strategies for ­solving the problems
    			Dig Deeper: Computer Forensics: How It Works
    			Solve This: Computer Security
    Chapter 10 Behind the Scenes: Software Programming
    	Part 1: Understanding Programming
    	Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the program development life cycle
    		Life Cycle of an Information System
    			The Importance of Programming
    			Objective 10.1 Describe the importance of programming to both software developers and users
    			System Development Life Cycle
    			Objective 10.2 Summarize the stages of the system development life cycle
    			Bits&Bytes: Let Them See Your Work
    		Life Cycle of a Program
    			The Program Development Life Cycle
    			Objective 10.3 Define programming and list the steps in the program development life cycle
    			The Problem Statement
    			Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task
    			Sound Byte: Using the Arduino Microcontroller
    			Helpdesk: Understanding Software Programming
    			Algorithm Development
    			Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms
    			Bits&Bytes: Hackathons
    			Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operators
    			Coding
    			Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment in coding
    			Debugging
    			Objective 10.7 Identify the role of debugging in program development
    			Bits&Bytes: Many Languages on Display
    			Testing and Documentation
    			Objective 10.8 Explain the importance of testing and documentation in program development
    			Try This: Programming with Corona
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Programming Languages
    	Learning Outcome 10.2 You will understand the factors programmers consider when selecting an ­appropriate programming language for a specific problem and will be familiar with some modern programming languages
    		Many Programming Languages
    			Need for Diverse Languages
    			Objective 10.9 Discuss the driving factors behind the popularity of various programming languages
    			Sound Byte: Programming with the Processing Language
    			Selecting the Right Language
    			Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting
    			Bits&Bytes: Coding for Zombies
    			Ethics in IT: When Software Runs Awry
    		Exploring Programming Languages
    			Tour of Modern Languages
    			Objective 10.11 Compare and contrast modern programming languages
    			Bits&Bytes: Your Software Portfolio
    			Trends In IT: Emerging Technologies: Unite All Your Video Game Design Tools
    			Future of Programming Languages
    			Objective 10.12 State key principles in the development of future programming languages
    			Helpdesk: A Variety of Programming Languages
    			Solve This: Time Sheets
    Chapter 11 Behind the Scenes: Databases and Information Systems
    	Part 1: Database Fundamentals
    	Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of databases and the functions and components of relational databases in particular
    		The Need for Databases
    			Database Basics
    			Objective 11.1 Explain what a database is and why databases are useful
    		Database Types
    			Flat Databases
    			Objective 11.2 Describe features of flat databases.
    			Relational Databases
    			Objective 11.3 Describe features of relational databases
    			Object-Oriented Databases
    			Objective 11.4 Describe features of object-oriented databases
    			Bits&Bytes: Normal Forms
    			Multidimensional Databases
    			Objective 11.5 Describe features of multidimensional databases
    			Helpdesk: Using Databases
    			NoSQL Databases
    			Objective 11.6 Describe how Web 2.0 data is managed in a database
    		Using Databases
    			Relational Database Components and Functions
    			Objective 11.7 Describe how relational databases organize and define data
    			Sound Byte: Creating and Querying an Access Database
    			Bits&Bytes: Music Streaming Services Use Databases
    			Inputting and Managing Data
    			Objective 11.8 Describe how data is inputted and managed in a database
    			Dig Deeper: Structured Query Language (SQL)
    			Bits&Bytes: Data Dashboards: Useful Visualization Tools
    			Try This: Using Excel’s Database Functions
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: How Businesses Use Databases
    	Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to manage data and how business information systems and business intelligence are used to make business decisions
    		Data Warehousing and Storage
    			Data Warehouses and Data Marts
    			Objective 11.9 Explain what data warehouses and data marts are and how they are used
    			Helpdesk: How Businesses Use Databases
    			Bits&Bytes: Data Warehouses Are Going to the Cloud
    			Data Mining
    			Objective 11.10 Describe data mining and how it works
    			Bits&Bytes: Hadoop: How Big Data Is Being Managed
    			Ethics in IT: Data, Data Everywhere—But Is It Protected?
    		Using Databases to Make Business Decisions
    			Business Information Systems
    			Objective 11.11 Describe the main types of business information systems and how they are used by business managers
    			Sound Byte: Analyzing Data with Microsoft Power BI Suite
    			Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web
    			Trends In IT: Mobile Business Intelligence
    			Solve This: College Database
    Chapter 12 Behind the Scenes: Networking and Security in the Business World
    	Part 1: Client/Server Networks and Topologies
    	Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them, and network topologies used to construct them
    		Client/Server Network Basics
    			Networking Advantages
    			Objective 12.1 List the advantages for businesses of installing a network
    			Comparing Client/Server and Peer-to-Peer Networks
    			Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network
    			Types of Client/Server Networks
    			Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use
    			Bits&Bytes: Your Car Network Can Be Hacked!
    		Servers and Network Topologies
    			Servers
    			Objective 12.4 List the common types of servers found on client/server networks
    			Helpdesk: Using Servers
    			Trends In IT: Virtualization: Making Servers Work Harder
    			Network Topologies
    			Objective 12.5 Describe the common types of network topologies and the advantages and ­disadvantages of each one
    			Sound Byte: Network Topology and ­Navigation Devices
    			Try This: Sharing Printers on a Network Using Windows
    			Make This: TOOL: App Inventor 2 or Thunkable
    	Part 2: Setting Up Business Networks
    	Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network navigation devices and explain major threats to network security and how to mitigate them
    		Transmission Media
    			Wired and Wireless Transmission Media
    			Objective 12.6 Describe the types of wired and wireless transmission media used in networks
    			Bits&Bytes: Go Green with Mobile Apps
    		Network Adapters and Navigation Devices
    			Network Adapters
    			Objective 12.7 Describe how network adapters help data move around a network
    			MAC Addresses
    			Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network
    			Switches, Bridges, and Routers
    			Objective 12.9 List the various network navigation devices, and explain how they help route data through networks
    			Helpdesk: Transmission Media and ­Network Adapters
    		Network Operating Systems and Network Security
    			Network Operating Systems
    			Objective 12.10 Explain why network operating systems are necessary for networks to function
    			Bits&Bytes: Smart Lighting for Smart Homes
    			Client/Server Network Security
    			Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats
    			Dig Deeper: The OSI Model: Defining Protocol Standards
    			Sound Byte: A Day in the Life of a Network Technician
    			Ethics in IT: How Should Companies Handle Data Breaches?
    			Bits&Bytes: Are Your Photos Helping Criminals Target You?
    			Solve This: Cyber-Security Flyer and Mail Merge
    Chapter 13 Behind the Scenes: How the Internet Works
    	Part 1: Inner Workings of the Internet
    	Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is transmitted across the Internet
    		Internet Management and Networking
    			Management
    			Objective 13.1 Describe the management of the Internet
    			Networking Components
    			Objective 13.2 Explain how the Internet’s networking components interact
    			Data Transmission
    			Objective 13.3 List and describe the Internet protocols used for data transmission
    			Bits&Bytes: A Free Cloud-Based Server for You
    		Internet Identity
    			IP Addresses
    			Objective 13.4 Explain how each device connected to the Internet is assigned a unique address
    			Helpdesk: Understanding IP Addresses, Domain Names, and Protocols
    			Bits&Bytes: What’s Your IP Address?
    			Bits&Bytes: Internet of Things Goes Shopping
    			Sound Byte: Creating Web Pages with Squarespace
    			Dig Deeper: Connection-Oriented Versus Connectionless Protocols
    			Domain Names
    			Objective 13.5 Discuss how a numeric IP address is changed into a readable name
    			Bits&Bytes: Scale Up for Success
    			Try This: Ping Me
    			Make This: TOOL App Inventor 2 or Thunkable
    	Part 2: Coding and Communicating on the Internet
    	Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications
    		Web Technologies
    			Web Development
    			Objective 13.6 Compare and contrast a variety of web development languages
    			Bits&Bytes: CodePen: An Editing Community for Web Designers
    			Application Architecture
    			Objective 13.7 Compare and contrast server-side and client-side application software
    			Sound Byte: Client-Side Web Page Development
    			Bits&Bytes: Free Code Camp
    		Communications over the Internet
    			Types of Internet Communication
    			Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging
    			Bits&Bytes: AI and Your Inbox
    			Encryption
    			Objective 13.9 Explain how data encryption improves security
    			Bits&Bytes: Numbers: We Wouldn’t Have Encryption Without Them!
    			Ethics in IT: Do We Really Want Strong Encryption?
    			Helpdesk: Keeping E-Mail Secure
    			Trends In IT: Cognitive Computing
    			Solve This: Creating an HTML Document
    Appendix A The History of thePersonal Computer
    Appendix B Careers in IT
    Glossary
    	A
    	B
    	C
    	D
    	E
    	F
    	G
    	H
    	I
    	J
    	K
    	L
    	M
    	N
    	O
    	P
    	Q
    	R
    	S
    	T
    	U
    	V
    	W
    	Z
    Index
    	A
    	B
    	C
    	D
    	E
    	F
    	G
    	H
    	I
    	J
    	K
    	L
    	M
    	N
    	O
    	P
    	Q
    	R
    	S
    	T
    	U
    	V
    	W
    	X
    	Y
    	Z




    نظرات کاربران