Title:
Discovering computers : fundamentals
Personal Author:
Series:
Shelly Cashman series
Edition:
2nd ed.
Publication Information:
Boston, MA : Thomson/Course Technology, 2005
ISBN:
9780619255091
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000004583989 | QA76.5 S535 2005 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Equip students with all the tools necessary to succeed in your classroom with this new edition. For the past three decades, the Shelly Cashman Series has effectively introduced computers to millions of students-consistently providing the highest quality, most up-to-date, and innovative materials in computer education. This new text employs the proven Shelly Cashman approach to learning, presents fundamental computer concepts in a clear writing style, and includes new Learn How To exercises, Web Research exercises, an on-line discussion forum, and new dynamic games on the Companion Web site. Engage your students with these useful tools and help them experience successful learning with the Shelly Cashman Series.
Table of Contents
Chapter 1 Introduction to Computers | p. 1 |
A World of Computers | p. 2 |
What is a Computer? | p. 3 |
Data and Information | p. 3 |
Advantages and Disadvantages of Using Computers | p. 4 |
Information Processing Cycle | p. 5 |
The Components of a Computer | p. 6 |
Input Devices | p. 6 |
Output Devices | p. 7 |
System Unit | p. 7 |
Storage Devices | p. 7 |
Communication Devices | p. 8 |
Networks and the Internet | p. 8 |
The Internet | p. 8 |
Computer Software | p. 10 |
System Software | p. 10 |
Application Software | p. 11 |
Installing and Running Programs | p. 11 |
Software Development | p. 12 |
Categories of Computers | p. 14 |
Personal Computers | p. 14 |
Desktop Computers | p. 14 |
MObile Computers | p. 14 |
Notebook Computers | p. 14 |
Mobile Devices | p. 15 |
Midrange Servers | p. 16 |
Mainframes | p. 17 |
Supercomputers | p. 17 |
Embedded Computers | p. 17 |
Examples of Computer Usage | p. 18 |
Home User | p. 18 |
Small Office/Home User | p. 20 |
Mobile User | p. 20 |
Power User | p. 21 |
Large Business User | p. 21 |
Computer Applications in Society | p. 22 |
Education | p. 22 |
Finance | p. 23 |
Government | p. 23 |
Health Care | p. 23 |
Science | p. 24 |
Publishing | p. 25 |
Travel | p. 25 |
Industry | p. 25 |
Chapter Summary | p. 26 |
Companies on the Cutting Edge | p. 27 |
Dell | p. 27 |
Apple Computer | p. 27 |
Technology Trailblazers | p. 27 |
Bill Gates | p. 27 |
Carly Fiorina | p. 27 |
Chapter Review | p. 28 |
Key Terms | p. 29 |
Checkpoint | p. 30 |
Web Research | p. 31 |
Learn How to | p. 32 |
Learn it Online | p. 34 |
Special Feature: Timeline: Milestones in Computer History | p. 35 |
Chapter 2 The Internet and World Wide Web | p. 49 |
The Internet | p. 50 |
How the Internet Works | p. 51 |
Connecting to the Internet | p. 51 |
Access Providers | p. 52 |
How Data Travels the Internet | p. 52 |
Internet Addresses | p. 53 |
The World Wide Web | p. 54 |
Browsing the Web | p. 54 |
Web Addresses | p. 56 |
Navigating Web Pages | p. 57 |
Searching for Information on the Web | p. 57 |
Types of Web Sites | p. 61 |
Evaluating a Web Site | p. 63 |
Multimedia on the Web | p. 64 |
Web Publishing | p. 66 |
E-Commerce | p. 67 |
Other Internet Services | p. 68 |
p. 69 | |
FTP | p. 71 |
Newsgroups and Message Boards | p. 71 |
Mailing Lists | p. 71 |
Chat Rooms | p. 71 |
Instant Messaging | p. 72 |
Internet Telephony | p. 73 |
Netiquette | p. 73 |
Chapter Summary | p. 74 |
Companies on the Cutting Edge | p. 75 |
p. 75 | |
Yahoo | p. 75 |
Technology Trailblazers | p. 75 |
Tim Berners-Lee | p. 75 |
Meg Whitman | p. 75 |
Chapter Review | p. 76 |
Key Terms | p. 77 |
Checkpoint | p. 78 |
Web Research | p. 79 |
Learn How to | p. 80 |
Learn it Online | p. 82 |
Special Feature: Making Use of the Web | p. 83 |
Chapter 3 Application Software | p. 99 |
Application Software | p. 100 |
The Role of System Software | p. 101 |
Working with Application Software | p. 102 |
Business Software | p. 104 |
Word Processing Software | p. 105 |
Developing a Document | p. 106 |
Spreadsheet Software | p. 107 |
Database Software | p. 108 |
Presentation Graphics Software | p. 109 |
Note Taking Software | p. 110 |
Personal Information Manager Software | p. 110 |
PDA Business Software | p. 110 |
Software Suite | p. 110 |
Project Management Software | p. 111 |
Accounting Software | p. 111 |
Enterprise Computing Software | p. 111 |
Graphics and Multimedia Software | p. 112 |
Computer-Aided Design | p. 112 |
Desktop Publishing Software (for the Professional) | p. 113 |
Paint/Image Editing Software (for the Professional) | p. 113 |
Video and Audio Editing Software (for the Professional) | p. 114 |
Multimedia Authoring Software | p. 114 |
Web Page Authoring Software | p. 114 |
Software for Home, Personal, and Educational Use | p. 115 |
Software Suite (for Personal Use) | p. 116 |
Personal Finance Software | p. 116 |
Legal Software | p. 117 |
Tax Preparation Software | p. 117 |
Desktop Publishing Software (for Personal Use) | p. 117 |
Paint/Image Editing Software (for Personal Use) | p. 118 |
Clip Art/Image Gallery | p. 118 |
Video and Audio Editing Software (for Personal Use) | p. 119 |
Home Design/Landscaping Software | p. 119 |
Educational and Reference Software | p. 119 |
Entertainment Software | p. 120 |
Application Software for Communications | p. 120 |
Popular Stand-Alone Utility Programs | p. 122 |
Learning Aids and Support Tools for Application Software | p. 122 |
Web-Based Training | p. 123 |
Chapter Summary | p. 124 |
Companies on the Cutting Edge | p. 125 |
Adobe Systems | p. 125 |
Microsoft | p. 125 |
Technology Trailblazers | p. 125 |
Dan Bricklin | p. 125 |
Masayoshi Son | p. 125 |
Chapter Review | p. 126 |
Key Terms | p. 127 |
Checkpoint | p. 128 |
Web Research | p. 129 |
Learn How to | p. 130 |
Learn it Online | p. 132 |
Chapter 4 The Components of the System Unit | p. 133 |
The System Unit | p. 134 |
The Motherboard | p. 136 |
Processor | p. 137 |
The Control Unit | p. 137 |
The Arithmetic Logic Unit | p. 137 |
Machine Cycle | p. 138 |
The System Clock | p. 138 |
Comparison of Personal Computer Processors | p. 139 |
Buying a Personal Computer | p. 139 |
Data Representation | p. 140 |
Memory | p. 142 |
Bytes and Addressable Memory | p. 142 |
Memory Sizes | p. 142 |
Types of Memory | p. 142 |
RAM | p. 143 |
Cache | p. 144 |
ROM | p. 145 |
Flash Memory | p. 145 |
CMOS | p. 146 |
Memory Access Times | p. 146 |
Expansion Slots and Adapter Cards | p. 147 |
PC Cards, Flash Memory Cards, and USB Flash Drives | p. 147 |
Ports and Connectors | p. 148 |
Serial Ports | p. 149 |
Parallel Ports | p. 149 |
USB Ports | p. 149 |
FireWire Ports | p. 150 |
Special Purpose Ports | p. 150 |
Buses | p. 151 |
Bays | p. 151 |
Power Supply | p. 152 |
Mobile Computers and Devices | p. 152 |
Putting it All Together | p. 154 |
Keeping Your Computer Clean | p. 155 |
Chapter Summary | p. 156 |
Companies on the Cutting Edge | p. 157 |
AMD | p. 157 |
Intel | p. 157 |
Technology Trailblazers | p. 157 |
Jack Kilby | p. 157 |
Gordon Moore | p. 157 |
Chapter Review | p. 158 |
Key Terms | p. 159 |
Checkpoint | p. 160 |
Web Research | p. 161 |
Learn How to | p. 162 |
Learn It Online | p. 164 |
Chapter 5 Input and Output | p. 165 |
What Is Input? | p. 166 |
Keyboard and Pointing Devices | p. 167 |
The Keyboard | p. 168 |
Mouse | p. 169 |
Trackball | p. 170 |
Touchpad | p. 170 |
Pointing Stick | p. 170 |
Joystick and Wheel | p. 171 |
Light Pen | p. 171 |
Touch Screen | p. 171 |
Pen Input | p. 172 |
Other Types of Input | p. 173 |
Voice Input | p. 173 |
Input for PDAs, Smart Phones, and Tablet PCs | p. 174 |
Digital Cameras | p. 175 |
Video Input | p. 176 |
Scanners and Reading Devices | p. 177 |
Terminals | p. 180 |
Biometric Input | p. 181 |
What Is Output? | p. 185 |
Display Devices | p. 183 |
LCD Monitors and Screens | p. 184 |
Plasma Monitors | p. 185 |
CRT Monitors | p. 186 |
Printers | p. 187 |
Producing Printed Output | p. 188 |
Nonimpact Printers | p. 189 |
Ink-Jet Printers | p. 189 |
Photo Printers | p. 190 |
Laser Printers | p. 190 |
Thermal Printers | p. 191 |
Mobile Prinnters | p. 192 |
Plotters and Large-Format Printers | p. 192 |
Impact Printers | p. 192 |
Other Output Devices | p. 193 |
Speakers and Headsets | p. 193 |
Fax Machines and Fax Modems | p. 194 |
MultiFunction Peripherals | p. 194 |
Data Projectors | p. 195 |
Putting It All Together | p. 196 |
Input and Output Devices for Physically Challenged Users | p. 197 |
Chapter Summary | p. 198 |
Companies On the Cutting Edge | p. 199 |
Logitech | p. 199 |
Hewlett-Packard | p. 199 |
Technology Trailblazers | p. 199 |
Douglas Engelbart | p. 199 |
Donna Dubinsky | p. 199 |
Chapter Review | p. 200 |
Key Terms | p. 202 |
Checkpoint | p. 203 |
Web Research | p. 204 |
Learn How To | p. 205 |
Learn It Online | p. 207 |
Special Feature: Digital' Imaging and Video Technology | p. 208 |
Chapter 6 Storage | p. 219 |
Storage | p. 220 |
Magnetic Disks | p. 222 |
Floppy Disks | p. 223 |
Zip Disks | p. 223 |
Hard Disks | p. 224 |
Optical Discs | p. 229 |
CD-ROMs | p. 231 |
CD-Rs and CD-RWs | p. 232 |
DVD-ROMs | p. 233 |
Recordable and Rewritable DVDs | p. 234 |
Tape | p. 234 |
PC Cards | p. 235 |
Miniature Mobile Storage Media | p. 235 |
Flash Memory Cards | p. 236 |
USB Flash Drives | p. 236 |
Smart Cards | p. 237 |
Microfilm and Microfiche | p. 238 |
Enterprise Storage | p. 238 |
Putting It All Together | p. 239 |
Chapter Summary | p. 240 |
Companies On the Cutting Edge | p. 241 |
Maxtor | p. 241 |
SanDisk Corporation | p. 241 |
Technology Trailblazers | p. 241 |
Al Shugart | p. 241 |
Mark Dean | p. 241 |
Chapter Review | p. 242 |
Key Terms | p. 243 |
Checkpoint | p. 244 |
Web Research | p. 245 |
Learn How To | p. 246 |
Learn It Online | p. 248 |
Chapter 7 Operating Systems and Utility Programs | p. 249 |
System Software | p. 250 |
Operating Systems | p. 251 |
Operating System Functions | p. 252 |
Starting a Computer | p. 252 |
Providing a User Interface | p. 253 |
Managing Programs | p. 253 |
Managing Memory | p. 255 |
Scheduling Jobs | p. 255 |
Configuring Devices | p. 256 |
Establishing a Connection | p. 256 |
Monitoring Performance | p. 257 |
Providing File Management and Other Utilities | p. 257 |
Controlling a Network | p. 257 |
Administering Security | p. 258 |
Operating System Utility Programs | p. 259 |
File Manager | p. 259 |
Image Viewer | p. 259 |
Personal Firewall | p. 260 |
Uninstaller | p. 260 |
Disk Scanner | p. 260 |
Disk Defragmenter | p. 261 |
Diagnostic Utility | p. 261 |
Backup Utility | p. 261 |
Screen Saver | p. 261 |
Types of Operating Systems | p. 262 |
Stand-Alone Operating Systems | p. 262 |
DOS | p. 262 |
Windows XP | p. 262 |
Mac OS X | p. 264 |
UNIX | p. 264 |
Linux | p. 265 |
Network Operating Systems | p. 266 |
Embedded Operating Systems | p. 266 |
Stand-Alone Utility Programs | p. 267 |
Antivirus Programs | p. 267 |
Spyware Removers | p. 268 |
Internet Filters | p. 268 |
File Compression | p. 269 |
File Conversion | p. 269 |
CD/DVD Burning | p. 269 |
Personal Computer Maintenance | p. 270 |
Chapter Summary | p. 270 |
Companies on the Cutting Edge | p. 271 |
Red Hat | p. 271 |
Symbian | p. 271 |
Technology Trailblazers | p. 271 |
Alan Kay | p. 271 |
Linus Torvalds | p. 271 |
Chapter Review | p. 272 |
Key Terms | p. 273 |
Checkpoint | p. 274 |
Web Research | p. 275 |
Learn How To | p. 276 |
Learn It Online | p. 278 |
Special Feature: Buyer's Guide: How to Purchase A Personal Computer | p. 279 |
Chapter 8 Communications and Networks | p. 295 |
Communications | p. 296 |
Uses of Computer Communications | p. 297 |
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Fax | p. 298 |
Wireless Messaging Services | p. 298 |
Public Internet Access Points | p. 300 |
Global Positioning System | p. 301 |
Collaboration | p. 302 |
Groupware | p. 302 |
Voice Mail | p. 302 |
Web Services | p. 302 |
Networks | p. 303 |
LANs, MANs, and WANs | p. 303 |
Network Architectures | p. 305 |
Network Topologies | p. 306 |
Intranets | p. 307 |
Network Communications Standards | p. 308 |
Communications Software | p. 310 |
Communications Over the Telephone Network | p. 310 |
Dial-Up Lines | p. 311 |
Dedicated Lines | p. 311 |
Communications Devices | p. 312 |
Dial-Up Modems | p. 313 |
ISDN and DSL Modems | p. 314 |
Cable Modems | p. 314 |
Wireless Modems | p. 314 |
Network Cards | p. 315 |
Wireless Access Points | p. 315 |
Routers | p. 315 |
Home Networks | p. 316 |
Wired Home Networks | p. 316 |
Wireless Home Networks | p. 316 |
Communications Channel | p. 317 |
Physical Transmission Media | p. 319 |
Twisted-Pair Cable | p. 319 |
Coaxial Cable | p. 320 |
Fiber-Optic Cable | p. 320 |
Wireless Transmission Media | p. 320 |
Infrared | p. 321 |
Broadcast Radio | p. 321 |
Cellular Radio | p. 321 |
Microwaves | p. 321 |
Communications Satellite | p. 321 |
Chapter Summary | p. 322 |
Companies on the Cutting Edge | p. 323 |
Cisco Systems | p. 323 |
Qualcomm | p. 323 |
Technology Tralblazers | p. 323 |
Robert Metcalfe | p. 323 |
Patricia Russo | p. 323 |
Chapter Review | p. 324 |
Key Terms | p. 325 |
Checkpoint | p. 326 |
Web Research | p. 327 |
Learn How To | p. 328 |
Learn It Online | p. 330 |
Chapter 9 Database Management | p. 331 |
Databases, Data and Information | p. 332 |
Data Integrity | p. 333 |
Qualities of Valuable Information | p. 334 |
The Hierarchy of Data | p. 334 |
Characters | p. 335 |
Fields | p. 335 |
Records | p. 336 |
Files | p. 336 |
Maintaining Data | p. 336 |
Adding Records | p. 336 |
Changing Records | p. 338 |
Deleting Records | p. 338 |
Validating Data | p. 339 |
File Processing Versus Databases | p. 341 |
File Processing Systems | p. 341 |
The Database Approach | p. 341 |
Database Management Systems | p. 343 |
Data Dictionary | p. 343 |
File Retrieval and Maintenance | p. 344 |
Data Security | p. 346 |
Backup and Recovery | p. 346 |
Relational, Object-oriented, and Multidimensional Databases | p. 347 |
Relational Databases | p. 347 |
Object-Oriented Databases | p. 349 |
Multidimensional Databases | p. 349 |
Web Databases | p. 350 |
Database Administration | p. 351 |
Database Design Guidelines | p. 351 |
Role of the Database Analylsts and Administrators | p. 351 |
Role of the Employee as User | p. 351 |
Chapter Summary | p. 352 |
Companies on the Cutting Edge | p. 353 |
Oracle | p. 353 |
Sybase | p. 353 |
Technology Trailblazers | p. 353 |
E. F. Codd | p. 353 |
Larry Ellison | p. 353 |
Chapter Review | p. 354 |
Key Terms | p. 355 |
Checkpoint | p. 356 |
Web Research | p. 357 |
Learn How to | p. 358 |
Learn it Online | p. 360 |
Chapter 10 Computer Security, Ethics, and Privacy | p. 361 |
Computer Security Risks | p. 362 |
Internet and Network Attacks | p. 364 |
Computer Viruses, Worms, and Trojan Horses | p. 364 |
Safeguards against Computer Viruses, Worms, and Trojan Horses | p. 365 |
Denial of Service Attacks | p. 367 |
Back Doors | p. 367 |
Spoofing | p. 367 |
Safeguards against DoS Attacks, Back Doors, and Spoofing | p. 367 |
Firewalls | p. 367 |
Intrusion Detection Software | p. 368 |
Unauthorized Access and Use | p. 368 |
Safeguards against Unauthorized Access and Use | p. 368 |
Identifying and Authenticating Users | p. 368 |
Hardware Theft and Vandalism | p. 371 |
Safeguards against Hardware Theft and Vandalism | p. 371 |
Software Theft | p. 372 |
Safeguards against Software Theft | p. 372 |
Information Theft | p. 373 |
Safeguards against Information Theft | p. 373 |
Encryption | p. 373 |
System Failure | p. 374 |
Safeguards against System Failure | p. 374 |
Backing Up - The Ultimate Safeguard | p. 375 |
Wireless Security | p. 375 |
Ethics and Society | p. 376 |
Information Accuracy | p. 377 |
Intellectual Property Rights | p. 378 |
Information Privacy | p. 379 |
Electronic Profiles | p. 380 |
Cookies | p. 380 |
Spyware and Adware | p. 381 |
Phishing | p. 381 |
Spam | p. 382 |
Privacy Laws | p. 382 |
Computer Forensics | p. 384 |
Employee Monitoring | p. 384 |
Content Filtering | p. 384 |
Health Concerns of Computer Use | p. 385 |
Computers and Health Risks | p. 385 |
Ergonomics and Workplace Design | p. 386 |
Computer Addiction | p. 387 |
Green Computing | p. 387 |
Chapter Summary | p. 388 |
Companies on the Cutting Edge | p. 389 |
McAfee | p. 389 |
Symantec | p. 389 |
Technology Trailblazers | p. 389 |
Donn Parker | p. 389 |
Cliff Stoll | p. 389 |
Chapter Review | p. 390 |
Key Terms | p. 391 |
Checkpoint | p. 392 |
Web Research | p. 393 |
Learn How To | p. 394 |
Learn It Online | p. 396 |
Special Feature: Digital Entertainment | p. 397 |
Chapter 11 Information System Development and Programming Languages | p. 405 |
The System Development Cycle | p. 406 |
Who Participates in the System Development Cycle? | p. 407 |
Project Management | p. 408 |
Feasibility Assessment | p. 409 |
Documentation | p. 409 |
Data and Information Gathering Techniques | p. 410 |
What Initiates the System Development Cycle? | p. 410 |
Planning Phase | p. 412 |
Analysis Phase | p. 413 |
Design Phase | p. 416 |
Implementation Phase | p. 420 |
Support Phase | p. 422 |
Information System Security | p. 422 |
Programming Languages | p. 423 |
Low-Level Languages | p. 424 |
Procedural Languages | p. 425 |
Object-Oriented Programming Languages | p. 427 |
Other Programming Languages | p. 430 |
Other Program Development Tools | p. 431 |
Web Page Development | p. 433 |
Multimedia Program Development | p. 437 |
The Program Development Cycle | p. 438 |
What Initiates the Program Development Cycle? | p. 439 |
Control Structures | p. 440 |
Chapter Summary | p. 442 |
Companies on the Cutting Edge | p. 443 |
Computer Associates | p. 443 |
Macromedia | p. 443 |
Technology Trailblazers | p. 443 |
Grace Hopper | p. 443 |
James Gosling | p. 443 |
Chapter Review | p. 444 |
Key Terms | p. 445 |
Checkpoint | p. 446 |
Web Research | p. 447 |
Learn How To | p. 448 |
Learn It Online | p. 450 |
Chapter 12 Enterprise Computing | p. 451 |
What Is Enterprise Computing? | p. 452 |
Organizational Structure of an Enterprise | p. 454 |
Levels of Users | p. 455 |
How Managers Use Information | p. 456 |
Information Systems in the Enterprise | p. 456 |
Information Systems within Functional Units | p. 457 |
General Purpose Information Systems | p. 461 |
Integrated Information Systems | p. 465 |
Enterprise-Wide Technologies | p. 467 |
Portals | p. 467 |
EDI | p. 468 |
Data Warehouses | p. 468 |
Extranets | p. 469 |
Web Services | p. 469 |
Workflow | p. 469 |
Virtual Private Network | p. 470 |
E-Commerce | p. 470 |
E-Retailing | p. 470 |
Finance | p. 472 |
Health | p. 472 |
Entertainment and Media | p. 472 |
Travel | p. 473 |
Other Business Services | p. 473 |
Enterprise Hardware | p. 474 |
RAID | p. 474 |
Network Attached Storage and Storage Area Networks | p. 476 |
Enterprise Storage Systems | p. 476 |
Blade Servers | p. 477 |
High-Availability Systems | p. 477 |
Scalability | p. 477 |
Utility and Grid Computing | p. 478 |
Interoperability | p. 478 |
Backup Procedures | p. 478 |
Disaster Recovery Plan | p. 479 |
Chapter Summary | p. 480 |
Companies on the Cutting Edge | p. 481 |
SAP | p. 481 |
IBM | p. 481 |
Technology Trailblazers | p. 481 |
Tom Siebel | p. 481 |
Jim Clark | p. 481 |
Chapter Review | p. 482 |
Key Terms | p. 483 |
Checkpoint | p. 484 |
Web Research | p. 485 |
Learn How To | p. 486 |
Learn it Online | p. 488 |
Appendix A Quiz Yourself Answers | p. 1 |
Glossary/Index | p. 1 |
Photo Credits | p. 28 |