دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 16 نویسندگان: Alan Evans, Kendall Martin, Mary Anne Poatsy سری: ISBN (شابک) : 0135435196, 9780135435199 ناشر: Pearson سال نشر: 2019 تعداد صفحات: 625 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 84 مگابایت
در صورت تبدیل فایل کتاب Technology In Action Complete (16th Edition) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوری در عمل کامل (نسخه شانزدهم) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
برای دوره های مقدماتی مفاهیم کامپیوتر، سواد دیجیتال، یا
سواد کامپیوتر، اغلب شامل آموزش در Microsoft®
Office.
استفاده از فناوری برای آموزش فناوری
پرفروشترین
تکنولوژی در عمل کامل از محتوای عملی و
پروژههای عملی استفاده میکند تا دانشآموزان را در انجام
وظایف محاسباتی و مهارتهایی که میتوانند درگیر کنند. در محل
کار، کلاس یا خانه درخواست دهید. این متن که برای دانشآموزان
باهوش تکنیکی امروزی طراحی شده است، مفاهیم دشوار را در مراحل
اولیه معرفی میکند، سپس با تسلط دانشآموزان، این مهارتها را
گسترش میدهد. نسخه شانزدهم بهروزرسانیهای
محتوایی نوآورانه را ارائه میکند، از جمله پوشش جدیدی از
اخلاق، هوش مصنوعی، و مدیریت سبک زندگی دیجیتال، و همچنین چندین
ویژگی جدید که تفکر انتقادی را تشویق میکند.
همچنین. در دسترس با MyLab IT
با ترکیب محتوای نویسنده
قابل اعتماد با ابزارهای دیجیتال و یک پلت فرم منعطف، MyLab IT
تجربه یادگیری را شخصیسازی میکند و به دانشآموزان کمک میکند
تا مفاهیم کلیدی دوره را جذب و حفظ کنند و در عین حال
مهارتهایی را که کارفرمایان به دنبال آن هستند، توسعه
دهند.
b>
توجه: شما در حال خرید یک محصول مستقل هستید. MyLab IT با این
محتوا همراه نیست. دانشجویانی که علاقه مند به خرید این عنوان
با MyLab IT هستند، از استاد خود بخواهید تا ISBN و Course ID
صحیح بسته را تایید کند. مدرسان، برای اطلاعات بیشتر با نماینده
پیرسون خود تماس بگیرید.
اگر می خواهید هم متن فیزیکی و هم MyLab IT را بخرید، جستجو
کنید:
0135756766 / 9780135756768 < b> تکنولوژی در عمل،
کامل، 16e MyLab IT 2019 w/ Pearson eText,
16/e
بسته شامل:
تکنولوژی در عمل، ویرایش شانزدهم نیز موجود است
از طریق Revel™، یک محیط یادگیری تعاملی
که دانشآموزان را قادر میسازد تا در یک تجربه مداوم بخوانند،
تمرین کنند و مطالعه کنند. Revel دانشآموزان را برای شرکت
معنادار در کلاس آماده میکند و مهارتهایی را که برای داشتن
سواد دیجیتالی در محل کار و زندگی روزمره خود نیاز دارند، فراهم
میکند.
For introductory courses in computer concepts, digital
literacy, or computer literacy, often including instruction
in Microsoft® Office.
Using technology to teach technology
Best-selling
Technology in Action Complete uses
practical content and hands-¿on projects to engage students
in computing tasks and skills they can apply at work, in
class, or at home. Designed for today’s technically savvy
students, the text introduces difficult concepts at a basic
level early on, then expands upon these skills as students
build mastery. The 16th edition brings
innovative content updates, including new coverage of ethics,
artificial intelligence, and managing a digital lifestyle, as
well as several new features encouraging critical
thinking.
Also available with MyLab IT
By combining trusted
author content with digital tools and a flexible platform,
MyLab IT personalizes the learning experience and helps
students absorb and retain key course concepts while
developing skills that employers seek.
Note: You are purchasing a standalone product; MyLab IT
does not come packaged with this content. Students, if
interested in purchasing this title with MyLab IT, ask your
instructor to confirm the correct package ISBN and Course ID.
Instructors, contact your Pearson representative for more
information.
If you would like to purchase both the physical text and
MyLab IT, search for:
0135756766 / 9780135756768 Technology in Action,
Complete, 16e + MyLab IT 2019 w/ Pearson eText,
16/e
Package consists of:
Technology in Action, 16th Edition, is also
available via Revel™, an interactive
learning environment that enables students to read, practice,
and study in one continuous experience. Revel prepares
students to meaningfully participate in class and provides
the skills they need to be digitally literate in the
workplace and in their everyday lives.
Cover Inside Front Cover Title page Copyright page Contents at a Glance Contents Learn Technology by Using Technology in Action 16e Letter from the Authors About the Authors Acknowledgments Chapter 1 The Impact of Technology in a Changing World Part 1: Technology in Society Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national and global issues Technology in a Global Society Impact of Tools of Modern Technology Objective 1.1 Describe various technological tools being used to impact national and global issues Global Issues Objective 1.2 Describe various global social issues that are being affected by technology Technology Connects Us with Others Technology Impacts How and Why We Connect and Collaborate Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others Technology Impacts How We Consume Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services The Importance of Computer Literacy Computer Literacy Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate Helpdesk: Technology Impacts Sound Byte: Virtual Computer Tour Try This: What Does Facebook Know about You? Make This: TOOL: IFTTT.com (If This Then That) Part 2: Emerging Technologies and Ethical Computing Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how technology creates new ethical debates Artificial Intelligence Artificial Intelligence Basics Objective 1.6 Describe artificial intelligence systems and explain their main goals Helpdesk: The Impact of Artificial Intelligence Ethics in IT: Ethics in Computing Working with Artificial Intelligence and Other Information Technologies Technology and Your Career Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers Bits&Bytes: Is It AI or Human? Take a Turing Test! Dig Deeper: Augmented and Virtual Realities Ethical Computing Defining Ethics Objective 1.8 Define ethics and examine various ethical systems Sound Byte: How to Debate Ethical Issues Personal Ethics Objective 1.9 Describe influences on the development of your personal ethics Ethics and Technology Objective 1.10 Present examples of how technology creates ethical challenges Solve This: How Technology Is Used on the World Stage and in Your Personal Life Chapter 2 Looking at Computers: Understanding the Parts Part 1: Understanding Digital Components Learning Outcome 2.1 You will be able to describe the devices that make up a computer system Understanding Your Computer Computers Are Data Processing Devices Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information Binary: The Language of Computers Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed Sound Byte: Binary Numbers Interactive Types of Computers Objective 2.3 List common types of computers, and discuss their main features Active Helpdesk: Understanding Bits and Bytes Bits&Bytes: Today’s Supercomputers: Faster Than Ever Input Devices Physical Keyboards and Touch Screens Objective 2.4 Identify the main types of keyboards and touch screens Mice and Other Pointing Devices Objective 2.5 Describe the main types of mice and pointing devices Dig Deeper: How Touch Screens Work Bits&Bytes: Distributed Computing: Putting Your Computer to Work While You Sleep Image, Sound, and Sensor Input Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices Output Devices Image and Audio Output Objective 2.7 Describe options for outputting images and audio from computing devices Bits&Bytes: Near Field Communication (NFC): Pay (or Get Paid) Anywhere with Your Phone Printers Objective 2.8 Describe various types of printers, and explain when you would use them Bits&Bytes: Medical Devices and 3D Printing Try This: What’s Inside My Computer? Make This: TOOL: App Inventor 2 or Thunkable Part 2: Processing, Storage, and Connectivity Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices connect to a computer system Processing and Memory on the Motherboard The Motherboard and Memory Objective 2.9 Describe the functions of the motherboard and RAM Sound Byte: Smartphones Are Really Smart Processing Objective 2.10 Explain the main functions of the CPU Storing Data and Information Storage Options on Computing Devices Objective 2.11 Describe the various means of storing data and information with computing devices Ethics in IT: What Is Ethical Computing? Trends In IT: Green Computing (Green IT) Connecting Peripherals to the Computer Computer Ports Objective 2.12 Describe common types of ports used today Helpdesk: Exploring Storage Devices and Ports Power Management and Ergonomics Power Controls and Power Management Objective 2.13 Describe how to manage power consumption on computing devices Setting It All Up: Ergonomics Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices Bits&Bytes: Sleep Better and Avoid Eyestrain: Use Less Blue Light Solve This: Technology Wish List Chapter 3 Using the Internet: Making the Most of the Web’s Resources Part 1: Collaborating and Working on the Web Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration, communication, commerce, and entertainment purposes The Internet and How It Works The Origin of the Internet Objective 3.1 Describe how the Internet got its start How the Internet Works Objective 3.2 Explain how data travels on the Internet Collaborating and Communicating on the Web Collaborating with Web Technologies Objective 3.3 Evaluate the tools and technologies used to collaborate on the web Bits&Bytes: Secure Messaging Apps Sound Byte: Blogging Communicating over the Web Objective 3.4 Summarize the technologies used to communicate over the web Conducting Business on the Web Conducting Business Online Objective 3.5 Describe how business is conducted using the Internet E-Commerce Safeguards Objective 3.6 Summarize precautions you should take when doing business online Dig Deeper: How Cloud Computing Works Bits&Bytes: Looking for Extra Money? Try a Side Hustle Helpdesk: Doing Business Online Bits&Bytes: Bitcoin: A Form of Virtual Currency Try This: Use OneDrive to Store and Share Your Files in the Cloud Make This: TOOL: App Inventor 2 or Thunkable Part 2: Using the Web Effectively Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web Accessing and Moving Around the Web Web Browsers Objective 3.7 Explain what web browsers are, and describe their common features URLs, Protocols, and Domain Names Objective 3.8 Explain what a URL is and discuss its main parts Navigating the Web Objective 3.9 Describe tools used to navigate the web Bits&Bytes: Maintain Your Privacy While Searching the Web Searching the Web Effectively Using Search Engines Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results Bits&Bytes: Digital Assistants and Predictive Search Sound Byte: Finding Information on the Web Evaluating Websites Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes Helpdesk: Evaluating Websites Trends In IT: Linked Data and the Semantic Web Bits&Bytes: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper? Using the Web Ethically Digital Activism Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism Geolocation Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare? Ethics in IT: Cyber Harassment Solve This: Create a Report: Conducting Research on the Web Chapter 4 Application Software: Programs That Let You Work and Play Part 1: Accessing, Using, and Managing Software Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage your software Software Basics Application vs. System Software Objective 4.1 Compare application software and system software Distributing Software Objective 4.2 Explain the differences between commercial software and open source software and describe models for software distribution Bits&Bytes: Finding Alternative Software Managing Your Software Purchasing Software Objective 4.3 Explain the different options for purchasing software Trends In IT: Mobile Payment Apps: The Power of M-Commerce Helpdesk: Buying and Installing Software Installing and Uninstalling Software Objective 4.4 Describe how to install and uninstall software Bits&Bytes: Ridding Your Computer of “Bloat” Upgrading Software Objective 4.5 Explain the considerations around the decision to upgrade your software Dig Deeper: How Number Systems Work Software Licenses Objective 4.6 Explain how software licenses function Sound Byte: Where Does Binary Show Up? Ethics in IT: Can I Borrow Software That I Don’t Own? Try This: Citing Website Sources Make This: TOOL: App Inventor 2 or Thunkable Part 2: Application Software Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia Productivity and Business Software Productivity Software Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses and features Bits&Bytes: Productivity Software Tips and Tricks Bits&Bytes: How to Open Unknown File Types Bits&Bytes: Going Beyond PowerPoint Sound Byte: Programming for End Users Business Software Objective 4.8 Summarize the types of software that large and small businesses use Bits&Bytes: Need to Work as a Team? Try These Collaboration Tools Multimedia and Educational Software Digital Multimedia Software Objective 4.9 Describe the uses and features of digital multimedia software Digital Audio Software Objective 4.10 Describe the uses and features of digital audio software Helpdesk: Choosing Software App Creation Software Objective 4.11 Describe the features of app creation software Bits&Bytes: Mirror, Mirror . . . Educational and Reference Software Objective 4.12 Categorize educational and reference software and explain their features Solve This: Analyzing Benchmark Data Chapter 5 System Software: The Operating System, Utility Programs, and File Management Part 1: Understanding System Software Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the steps in the boot process Operating System Fundamentals Operating System Basics Objective 5.1 Discuss the functions of the operating system Operating Systems for Personal Use Objective 5.2 Explain the most popular operating systems for personal use Bits&Bytes: Open Source Operating Systems Bits&Bytes: Operating Systems for the Smart Home Operating Systems for Machinery, Networks, and Business Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business Ethics in IT: The Great Debate: Is macOS Safer Than Windows? What the Operating System Does The User Interface Objective 5.4 Explain how the operating system provides a means for users to interact with the computer Hardware Coordination Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices Sound Byte: Using Windows Task Manager to Evaluate System Performance Software Application Coordination Objective 5.6 Explain how the operating system interacts with application software Trends In IT: Are Personal Computers Becoming More Human? Starting Your Computer The Boot Process Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled Helpdesk: Starting the Computer: The Boot Process Try This: Using Virtual Desktops in Windows 10 Make This: TOOL: App Inventor 2 or Thunkable Part 2: Using System Software Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file management capabilities, and utility programs The Windows Interface Using Windows 10 Objective 5.8 Describe the main features of the Windows interface Bits&Bytes: The Snipping Tool File Management Organizing Your Files Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders Bits&Bytes: Save Files in the Cloud Bits&Bytes: Tips for Organizing Your Files Helpdesk: Organizing Your Computer: File Management Utility Programs Windows Administrative Utilities Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility Dig Deeper: How Disk Defragmenting Utilities Work Sound Byte: Hard Disk Anatomy Solve This: Operating Systems: Analyzing Market Share Chapter 6 Understanding and Assessing Hardware: Evaluating Your System Part 1: Evaluating Key Subsystems Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the CPU and memory subsystems Your Ideal Computing Device Moore’s Law Objective 6.1 Describe the changes in CPU performance over the past several decades. Selecting a Computing Device Objective 6.2 Compare and contrast a variety of computing devices. Evaluating the CPU Subsystem How the CPU Works Objective 6.3 Describe how a CPU is designed and how it operates. Bits&Bytes: Liquid Cooling Measuring CPU Performance Objective 6.4 Describe tools used to measure and evaluate CPU performance. Dig Deeper: The Machine Cycle Evaluating the Memory Subsystem Random Access Memory Objective 6.5 Discuss how RAM is used in a computer system. Adding RAM Objective 6.6 Evaluate whether adding RAM to a system is desirable. Helpdesk: Evaluating Your CPU and RAM Sound Byte: Installing RAM Try This: Measure Your System Performance Make This: TOOL: App Inventor 2 or Thunkable Part 2: Evaluating Other Subsystems and Making a Decision Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem, and reliability and decide whether to purchase a new system or upgrade an existing one Evaluating the Storage Subsystem Types of Storage Drives Objective 6.7 Classify and describe the major types of nonvolatile storage drives Sound Byte: Installing an SSD Drive Dig Deeper: How Storage Devices Work Storage Needs Objective 6.8 Evaluate the amount and type of storage needed for a system Bits&Bytes: How Much Storage to Buy? Evaluating the Media Subsystems Video Cards Objective 6.9 Describe the features of video cards Bits&Bytes: Graphics Cards with SSD on Board Trends In IT: USB 3.1 and USB-C Sound Cards Objective 6.10 Describe the features of sound cards Helpdesk: Evaluating Computer System Components Evaluating System Reliability and Moving On Maintaining System Reliability Objective 6.11 Describe steps you can take to optimize your system’s reliability Getting Rid of Your Old Computer Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer Ethics in IT: Free Hardware for All Solve This: Laptop Alternatives Chapter 7 Networking: Connecting Computing Devices Part 1: How Networks Function Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to create a network, and describe the different ways a network can connect to the Internet Networking Fundamentals Understanding Networks Objective 7.1 Describe computer networks and their pros and cons Helpdesk: Understanding Networking Network Architectures Network Designs Objective 7.2 Explain the different ways networks are defined Dig Deeper: P2P File Sharing Network Components Transmission Media Objective 7.3 Describe the types of transmission media used in networks Sound Byte: Installing a Home Computer Network Basic Network Hardware Objective 7.4 Describe the basic hardware devices necessary for networks Network Software Objective 7.5 Describe the type of software necessary for networks Trends In IT: How Smart Is Your Home? Connecting to the Internet Broadband Internet Connections Objective 7.6 Summarize the broadband options available to access the Internet Bits&Bytes: Net Neutrality Bits&Bytes: Who’s Not on Broadband? Wireless Internet Access Objective 7.7 Summarize how to access the Internet wirelessly Try This: Testing Your Internet Connection Speed Make This: TOOL: Ping and Telnet Part 2: Your Home Network Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home network and how to manage and secure a wireless network Installing and Configuring Home Networks Planning Your Home Network Objective 7.8 Explain what should be considered before creating a home network Bits&Bytes: Power Your Devices—Wirelessly Connecting Devices to a Network Objective 7.9 Describe how to set up a home network Bits&Bytes: Mesh Networks: An Emerging Alternative Bits&Bytes: Analyzing Network Problems Managing and Securing Wireless Networks Troubleshooting Wireless Network Problems Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them Securing Wireless Networks Objective 7.11 Describe how to secure wireless home networks Sound Byte: Securing Wireless Networks Helpdesk: Managing and Securing Your Wireless Network Solve This: Home Networking Guide Chapter 8 Managing Your Digital Lifestyle: Challenges and Ethics Part 1: The Impact of Digital Information Learning Outcome 8.1 You will be able to describe the nature of digital signals Digital Basics Digital Convergence and the Internet of Things Objective 8.1 Describe how digital convergence and the Internet of Things have evolved Digital versus Analog Objective 8.2 Explain the differences between digital and analog signals Digital Publishing e-Readers Objective 8.3 Describe the different types of e-readers Using e-Texts Objective 8.4 Explain how to purchase, borrow, and publish e-texts Helpdesk: Managing Digital Media Digital Music Creating and Storing Digital Music Objective 8.5 Describe how digital music is created and stored Distributing Digital Music Objective 8.6 Summarize how to listen to and publish digital music Digital Media Digital Photography Objective 8.7 Explain how best to create, print, and share digital photos Sound Byte: Enhancing Photos with Image-Editing Software Digital Video Objective 8.8 Describe how to create, edit, and distribute digital video Trends In IT: Digital Asset Managers Needed! Managing Your Digital Lifestyle Digital Challenges and Dilemmas Objective 8.9 Discuss the challenges in managing an active digital lifestyle Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go? Bits&Bytes: The Rise of Wearable Technology Try This: Creating and Publishing a Movie Make This: TOOL: App Inventor 2 or Thunkable Part 2: Ethical Issues of Living in the Digital Age Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain your digital reputation Protection of Digital Property Intellectual Property Objective 8.10 Describe the various types of intellectual property Copyright Basics Objective 8.11 Explain how copyright is obtained and the rights granted to the owners Helpdesk: Understanding Intellectual Property and Copyright Copyright Infringement Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material Bits&Bytes: Software Piracy: It’s More Than Just Downloading and Copying Bits&Bytes: Your Tax Dollars at Work: Free Media without Permission! Living Ethically in the Digital Era Plagiarism Objective 8.13 Explain plagiarism and strategies for avoiding it Hoaxes and Digital Manipulation Objective 8.14 Describe hoaxes and digital manipulation Sound Byte: Plagiarism and Intellectual Property Protecting Your Online Reputation Objective 8.15 Describe what comprises your online reputation and how to protect it Bits&Bytes: Celebrity Photographic Rights Ethics in IT: Acceptable Use Policies: What You Can and Can’t Do Solve This: Intellectual Property and Copyright Basics Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Part 1: Threats to Your Digital Assets Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats they pose to your digital security Identity Theft and Hackers Identity Theft Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate Hacking Objective 9.2 Describe the different types of hackers and the tools they use Bits&Bytes: Hackers Wanted Computer Viruses Virus Basics Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display Sound Byte: Protecting Your Computer Types of Viruses Objective 9.4 List the different categories of computer viruses, and describe their behaviors Online Annoyances and Social Engineering Online Annoyances Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security Social Engineering Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them Bits&Bytes: I Received a Data Breach Letter . . . Now What? Ethics in IT: You’re Being Watched . . . But Are You Aware You’re Being Watched? Helpdesk: Threats to Your Digital Life Trends In IT: Spear Phishing: The Bane of Data Breaches Try This: Testing Your Network Security Make This: App Inventor 2 or Thunkable Part 2: Protecting Your Digital Property Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption Restricting Access to Your Digital Assets Firewalls Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers Preventing Virus Infections Objective 9.8 Explain how to protect your computer from virus infection Helpdesk: Understanding Firewalls Authentication: Passwords and Biometrics Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots Anonymous Web Surfing: Hiding from Prying Eyes Objective 9.10 Describe ways to surf the Web anonymously Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords! Keeping Your Data Safe Protecting Your Personal Information Objective 9.11 Describe the types of information you should never share online Sound Byte: Managing Computer Security with Windows Tools Backing Up Your Data Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files Protecting Your Physical Computing Assets Environmental Factors and Power Surges Objective 9.13 Explain the negative effects environment and power surges can have on computing devices Preventing and Handling Theft Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems Dig Deeper: Computer Forensics: How It Works Solve This: Computer Security Chapter 10 Behind the Scenes: Software Programming Part 1: Understanding Programming Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the program development life cycle Life Cycle of an Information System The Importance of Programming Objective 10.1 Describe the importance of programming to both software developers and users System Development Life Cycle Objective 10.2 Summarize the stages of the system development life cycle Bits&Bytes: Let Them See Your Work Life Cycle of a Program The Program Development Life Cycle Objective 10.3 Define programming and list the steps in the program development life cycle The Problem Statement Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task Sound Byte: Using the Arduino Microcontroller Helpdesk: Understanding Software Programming Algorithm Development Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms Bits&Bytes: Hackathons Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operators Coding Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment in coding Debugging Objective 10.7 Identify the role of debugging in program development Bits&Bytes: Many Languages on Display Testing and Documentation Objective 10.8 Explain the importance of testing and documentation in program development Try This: Programming with Corona Make This: TOOL: App Inventor 2 or Thunkable Part 2: Programming Languages Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropriate programming language for a specific problem and will be familiar with some modern programming languages Many Programming Languages Need for Diverse Languages Objective 10.9 Discuss the driving factors behind the popularity of various programming languages Sound Byte: Programming with the Processing Language Selecting the Right Language Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting Bits&Bytes: Coding for Zombies Ethics in IT: When Software Runs Awry Exploring Programming Languages Tour of Modern Languages Objective 10.11 Compare and contrast modern programming languages Bits&Bytes: Your Software Portfolio Trends In IT: Emerging Technologies: Unite All Your Video Game Design Tools Future of Programming Languages Objective 10.12 State key principles in the development of future programming languages Helpdesk: A Variety of Programming Languages Solve This: Time Sheets Chapter 11 Behind the Scenes: Databases and Information Systems Part 1: Database Fundamentals Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of databases and the functions and components of relational databases in particular The Need for Databases Database Basics Objective 11.1 Explain what a database is and why databases are useful Database Types Flat Databases Objective 11.2 Describe features of flat databases. Relational Databases Objective 11.3 Describe features of relational databases Object-Oriented Databases Objective 11.4 Describe features of object-oriented databases Bits&Bytes: Normal Forms Multidimensional Databases Objective 11.5 Describe features of multidimensional databases Helpdesk: Using Databases NoSQL Databases Objective 11.6 Describe how Web 2.0 data is managed in a database Using Databases Relational Database Components and Functions Objective 11.7 Describe how relational databases organize and define data Sound Byte: Creating and Querying an Access Database Bits&Bytes: Music Streaming Services Use Databases Inputting and Managing Data Objective 11.8 Describe how data is inputted and managed in a database Dig Deeper: Structured Query Language (SQL) Bits&Bytes: Data Dashboards: Useful Visualization Tools Try This: Using Excel’s Database Functions Make This: TOOL: App Inventor 2 or Thunkable Part 2: How Businesses Use Databases Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to manage data and how business information systems and business intelligence are used to make business decisions Data Warehousing and Storage Data Warehouses and Data Marts Objective 11.9 Explain what data warehouses and data marts are and how they are used Helpdesk: How Businesses Use Databases Bits&Bytes: Data Warehouses Are Going to the Cloud Data Mining Objective 11.10 Describe data mining and how it works Bits&Bytes: Hadoop: How Big Data Is Being Managed Ethics in IT: Data, Data Everywhere—But Is It Protected? Using Databases to Make Business Decisions Business Information Systems Objective 11.11 Describe the main types of business information systems and how they are used by business managers Sound Byte: Analyzing Data with Microsoft Power BI Suite Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web Trends In IT: Mobile Business Intelligence Solve This: College Database Chapter 12 Behind the Scenes: Networking and Security in the Business World Part 1: Client/Server Networks and Topologies Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them, and network topologies used to construct them Client/Server Network Basics Networking Advantages Objective 12.1 List the advantages for businesses of installing a network Comparing Client/Server and Peer-to-Peer Networks Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network Types of Client/Server Networks Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use Bits&Bytes: Your Car Network Can Be Hacked! Servers and Network Topologies Servers Objective 12.4 List the common types of servers found on client/server networks Helpdesk: Using Servers Trends In IT: Virtualization: Making Servers Work Harder Network Topologies Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one Sound Byte: Network Topology and Navigation Devices Try This: Sharing Printers on a Network Using Windows Make This: TOOL: App Inventor 2 or Thunkable Part 2: Setting Up Business Networks Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network navigation devices and explain major threats to network security and how to mitigate them Transmission Media Wired and Wireless Transmission Media Objective 12.6 Describe the types of wired and wireless transmission media used in networks Bits&Bytes: Go Green with Mobile Apps Network Adapters and Navigation Devices Network Adapters Objective 12.7 Describe how network adapters help data move around a network MAC Addresses Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network Switches, Bridges, and Routers Objective 12.9 List the various network navigation devices, and explain how they help route data through networks Helpdesk: Transmission Media and Network Adapters Network Operating Systems and Network Security Network Operating Systems Objective 12.10 Explain why network operating systems are necessary for networks to function Bits&Bytes: Smart Lighting for Smart Homes Client/Server Network Security Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats Dig Deeper: The OSI Model: Defining Protocol Standards Sound Byte: A Day in the Life of a Network Technician Ethics in IT: How Should Companies Handle Data Breaches? Bits&Bytes: Are Your Photos Helping Criminals Target You? Solve This: Cyber-Security Flyer and Mail Merge Chapter 13 Behind the Scenes: How the Internet Works Part 1: Inner Workings of the Internet Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is transmitted across the Internet Internet Management and Networking Management Objective 13.1 Describe the management of the Internet Networking Components Objective 13.2 Explain how the Internet’s networking components interact Data Transmission Objective 13.3 List and describe the Internet protocols used for data transmission Bits&Bytes: A Free Cloud-Based Server for You Internet Identity IP Addresses Objective 13.4 Explain how each device connected to the Internet is assigned a unique address Helpdesk: Understanding IP Addresses, Domain Names, and Protocols Bits&Bytes: What’s Your IP Address? Bits&Bytes: Internet of Things Goes Shopping Sound Byte: Creating Web Pages with Squarespace Dig Deeper: Connection-Oriented Versus Connectionless Protocols Domain Names Objective 13.5 Discuss how a numeric IP address is changed into a readable name Bits&Bytes: Scale Up for Success Try This: Ping Me Make This: TOOL App Inventor 2 or Thunkable Part 2: Coding and Communicating on the Internet Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications Web Technologies Web Development Objective 13.6 Compare and contrast a variety of web development languages Bits&Bytes: CodePen: An Editing Community for Web Designers Application Architecture Objective 13.7 Compare and contrast server-side and client-side application software Sound Byte: Client-Side Web Page Development Bits&Bytes: Free Code Camp Communications over the Internet Types of Internet Communication Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging Bits&Bytes: AI and Your Inbox Encryption Objective 13.9 Explain how data encryption improves security Bits&Bytes: Numbers: We Wouldn’t Have Encryption Without Them! Ethics in IT: Do We Really Want Strong Encryption? Helpdesk: Keeping E-Mail Secure Trends In IT: Cognitive Computing Solve This: Creating an HTML Document Appendix A The History of thePersonal Computer Appendix B Careers in IT Glossary A B C D E F G H I J K L M N O P Q R S T U V W Z Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z