Williams & Sawyer 2015 Using information technology _ a practical introduction to computers & communications
Williams & Sawyer 2015 Using information technology _ a practical introduction to computers & communications
Technology
This page intentionally left blank
1 2 3 4 5 6 7 8 9 0 DOW/DOW 1 0 9 8 7 6 5 4
ISBN 978-0-07-351688-2
MHID 0-07-351688-0
All credits appearing on page or at the end of the book are considered to be an extension of the copyright page.
The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website
does not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education
does not guarantee the accuracy of the information presented at these sites.
www.mhhe.com
Brief Contents
TO THE INSTRUCTORxv
Brief Contents
v
This page intentionally left blank
To the Instructor xv Desktop Computer: Basic Knowledge of How a Computer
Works 28
1
Input Hardware: Keyboard & Mouse 28
Processing & Memory Hardware: Inside the System Cabinet
30
INTRODUCTION TO INFORMATION
Storage Hardware: Hard Drive & CD/DVD Drive 30 Output
TECHNOLOGY: THE FUTURE NOW 1
Hardware: Video & Sound Cards, Monitor, Speakers, & Printer
32
UNIT 1A: The Mobile World, Information Communications Hardware: Modem 33
Technology, & Your Life 2 Software 33
1.1 Information Technology & Your Life: The Future 1.6 Where Is Information Technology
Now 4 Headed? 34
Two Parts of IT: Computers & Communications 4 Education: Computers: Miniaturization, Speed, & Affordability 34
The Promise of More Interactive & Individualized Learning 4 Communications: Connectivity, Interactivity,
Health: High Tech for Wellness 6 & Multimedia 35
Money & Business: Toward the Cashless Society 10 Government When Computers & Communications Converge: Portability,
& Electronic Democracy: Participating in the Civic Realm 10 Personalization, Collaboration, Cloud Computing, &
Artificial Intelligence 36
Jobs & Careers 12
“E” Also Stands for Ethics 38
Your Personal Life 14
Contents
Internet Communications: Protocols, Packets,
& IP Addresses 60
Who Runs the Internet? 62
UNIT 4A: Processing: The System Unit, UNIT 5A: Input Hardware 249
Microprocessors, & Main Memory 192 Contents
4.1 Microchips, Miniaturization, & Mobility 5.1 Keyboards 249
193 The Different Types of Keyboards 250
ix
Miniaturization Miracles: Microchips Terminals 252
& Microprocessors 193
5.2 Pointing Devices 252
Miniaturization Leads to Mobility 195
The Mouse 253
The System Unit 196
Variations on the Mouse: Trackball, Touchpad, &
4.2 Representing Data Electronically 197 Pointing Stick 254
The Binary System: Using On/Off Electrical States to Touch Screen 256
Represent Data & Instructions 197 Multitouch Screen 256
Machine Language 200 Pen Input 258
Future Developments in Processing 232
Future Developments in Secondary Storage 235 5.3 Source Data-Entry Devices 260 Scanning &
Reading Devices 260
5
Image-Capture Devices 265
HARDWARE: INPUT & OUTPUT—
Audio-Input Devices 268
TAKING CHARGE OF COMPUTING Sensors 270
& COMMUNICATIONS 247 Biometric-Input Devices 271
5.7 Mixed Output: Sound, Voice, UNIT 6B: Cyberthreats, Security, & Privacy Issues
& Video 286 343
Sound Output 287
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
Voice Output 287
343
Video Output 287
Trolls 343
5.8 The Future of Output 288 Spies 344
More Unusual Forms of Output 288 Hackers 344
More Data Used in Output 288 Thieves 345
More Realistic Output 288
6.6 Cyberattacks & Malware 347
Contents Online Safety 350
5.9 Quality of Life: Health
& Ergonomics 290 6.7 Concerns about Privacy & Identity Theft 352 The Threat
Health Matters 290 to Privacy 353
x Identity Theft 354
Ergonomics: Design with People in Mind 292
6 COMMUNICATIONS, NETWORKS,
&
7 PERSONAL TECHNOLOGY:
The Tablet: What It Is, What It Does 378 8.3 Database Models 416
The E-Reader: The Reading Machine 380 The Benefits Hierarchical Database 416
of E-Readers 380 Network Database 418
How an E-Reader Works 381 Relational Database 419
The Drawbacks of E-Readers 382 Object-Oriented Database 422
7.4 Portable Media Players 382 Multidimensional Database 423
Contents
Recording Music: From Analog Life to Digital Life 308 “Gotcha,
Thief!” & Other Uses of GPS 334
Microsoft Pays “Bug Bounties” to White-Hat Hackers
345
Too-Good-to-Be-True Deals Online 346 The Love
Bug & Other Viruses 348
Famous Worms: Klez, Conficker, & Stuxnet 348 The Weird
Experience of Identity Theft 354 The Ruggedized Tablet for
Splashes & Spills 379 The Rise of the Selfie: What Does It
Mean? 392 Pandora’s Music Genome Project 395
Using Your Xbox to Order Pizza 400
Databases Everywhere 409
How Amazon.com Used Databases to Become the
World’s Largest Online Bookstore 413
The Uses of Data Mining 427
The Brute Force of Weak AI 439
Some Interestingly Named Expert Systems 439
Using Virtual Reality & Simulation for Training,
Treatment, & Research 444
All Types of Robots 446
xiv
To the Instructor
• The explosion of mobile computing: In the United States there are now more
smartphones, tablets, laptops, and other such portable devices than there are
people.
• The rise of “the cloud”: Moving data storage and processing from desktops and
laptops to online servers is changing the economics and availability of computing
power.
• The boom in Big Data: The growth in servers, software sophistication, and data
collection methods results in 2.5 quintillion bytes of data being created every day.
The evolution of artificial intelligence: Supercomputers, mammoth databases, and
•
powerhouse software make AI a force that’s sure to alter nearly every field of human
endeavor.
• The acceleration in computer threats: Every day the efforts of black-hat hackers,
virus writers, and cyberwar makers threaten to sabotage our major institutions.
• The shrinking of privacy: Search companies, mobile carriers, and retailers track
To the Instructor
our Internet patterns, cellphone usage, and shopping habits to learn more and more
about us.
xv
PRESENTATION CHANGES IN THIS EDITION: Making
the Material Easier to Learn
To help students realize the valuable education they have paid for, we have done our best
to make this text practical, readable, and current by presenting information in ways that
motivate, entertain, and get quickly to the point by using the following new features:
cal matters.
Examples: “How to Be a Successful
Online Student,” “Evaluating & Sourcing
Information Found on the Web,” “Tips for
Avoiding Spy
PRACTICAL ACTION
How to Be a Successful Online Student
ware,” “Utility Programs: Specialized Programs
to Make Computing Easier,” “Social Network ing:
The Downside,” “Help in Building Your Web
Page,” “Storing Your Stuff: How Long Will
Digitized Data Last?,” “Starting Over with Your
1. Familiarize yourself with the computer and software. Be comfortable with the computer, Internet,
email, web browser, and search engine software. Use tutorials to become familiar with the software
used by your online school.
Take advantage of technology. Learn the various ways of communicating on the web. Blogging, podcast
ing, video conferencing, and chatting (discussed later
Survival Tips
In the margins throughout we present utilitarian Survival Tips to aid
students’ explora tions of the infotech world.
Examples: “Broadband: Riskier for Security,” “Connection Speeds,” “
Finding Things on a Web Page or in a Web Document,” “Urban Legends &
Lies on the Inter net,” “ Social-Networking Privacy,” “Control Those
Cookies!” “New Software & Compatibility,” “What RAM for Your PC?,”
“ATMs & Fraud/Safety,” “Firewalls,” “E-Book Cautions,” “Alleviating
Info-Mania,” “Fraud Baiters,” and “What Happens to Your Smartphone
Data?”
Actually, studies have found that textbooks written in an imaginative style signifi
cantly improve students’ ability to retain information. Both instructors and students have
commented on the distinctiveness of the writing in this book. In this edition, we have
added Tech Tales, stories or mini-cases, to illustrate concepts. We also employ a number
of journalistic devices—colorful anecdotes, short biographical sketches, and interesting
observations—to make the material as engaging as possible. In addition we use real anec
dotes and examples rather than fictionalized ones.
Finally, unlike most computer concepts books, we provide references for our
sources—see the endnotes in the back of the book. Many of these are from the year
preceding publication. We see no reason why introductory computer books shouldn’t
To the Instructor
practice good scholarship by revealing their information sources. And we see no reason
why good scholarship can’t go along with good writing—scholarship need not mean
stuffiness.
ethics Tracking
Cellphone companies may be tracking your every move and compiling information about
you . . .
www.bloomberg.com/
news/2013-06-06/carriers-sell users- tracking-data-in-5-5-
billion-market.html
FEATURE 3: Currentness
Reviewers have applauded previous editions of UIT for being more up to date than other
texts. For example, we have traditionally ended many chapters with a forward-looking
section that offers a preview of technologies to come—some of which are realized even as
students are using the book.
Among the new topics and terms covered in this edition are: Accelerated Graphics
Port (ACP) bus, air mouse, AMOS, Apple iCloud, apps, Big Data, Bootcamp, booting from
the cloud, Bring Your Own Device (BYOD) policy, bug bounty, business-to-consumer (B2C)
commerce, Chrome, Chrome OS, Chromebook, cloud-based apps, computational AI, con
densed keyboards, consumer-to-consumer (C2C) commerce, conventional AI, convertible
tablets, cyberattacks, Dashboard, data centers, Detrx keyboard, distributed denial of ser
vice, drones, email bombs, embedded Linux OS, EMV cards, eSATA ports, ethical hackers,
ExpressCards, FireWire bus, FISA court, Google Apps, Google Glass, heuristics, hybrid
tablets/PCs, Instagram, iPhone 5, iPhone iOS, KALC keyboard, Kinect, Leap Motion, LTE
telecommunication standards, machine learning, massive open online courses (MOOCs),
mesh networks, metadata, Microsoft Xbox One, Mountain Lion, Mozilla Firefox OS, multi
touch screens, National Security Agency (NSA), Nintendo Wii U, octa-core processors, online
dating, passphrases, personal browser, Pinterest, Pokki, power-line network, predictive
search apps, robots grouped by application, robots grouped by locomotion, Privacy and
Civil Liberties Oversight Board, self-driving cars, selfies, semantic markup, showroom
ing, slate tablets, Snapkeys Si, Sony PlayStation 4, Spotlight, Surface tablet, T3 lines, T4
lines, T5 lines, texting, threaded discussion, tree networks, trolls, wearable technology,
Web 1.0, Web 3.0, Web app, WiMax, Windows 7, Windows 8, Windows Phone 8, Windows
RT, Windows Server 2012, and wireless Internet service provider (WISP).
Material has also been updated on the following: Android, artificial intelligence (AI),
cellphone malware, cloud computing, cyberwarfare, data collection on consumers by
business, e-readers, gesture interface, government spying, image-capture devices, image
compression technology, improved digital cameras, Internet usage, Mac OS X, malware,
metadata mining, mobile-payment services, nanotechnology, online (distance) learning,
passwords, privacy, 3-D printers, and tablets.
A complete update of the chapter-by-chapter changes from the previous edition
begins on p. xx.
To the Instructor
Stage 1 Learning—Memorization: “I Can Recognize
and Recall Information”
Using self-test questions, multiple-choice questions, and true-false questions, we enable
students to test how well they recall basic terms and concepts.
Instructor’s Manual
The electronic Instructor’s Manual, which is available as part of the Instructor’s Resource
Kit, helps instructors create effective lectures. The Instructor’s Manual is easy to navigate
and simple to understand. Each chapter contains a chapter overview, lecture outline, teach
ing tips, additional information, and answers to end-of-chapter questions and exercises.
Testbank
The format of the Testbank allows instructors to effectively pinpoint areas of content
within each chapter on which to test students. The test questions include learning difficulty
level, answers, and text page numbers, as well as the learning objective head under which
the question content falls and the level of Bloom’s Taxonomy that applies to the question.
EZ Test
McGraw-Hill’s EZ Test is a flexible and easy-to-use electronic testing program. The pro
gram allows instructors to create tests from book-specific items. It accommodates a wide
range of question types, and instructors may add their own questions. Multiple versions
of the test can be created and any test can be exported for use with course management
systems such as WebCT, BlackBoard, or PageOut. EZ Test Online is a new service and
gives you a place to easily administer your EZ Test–created exams and quizzes online. The
program is available for Windows and Macintosh environments.
PowerPoint Presentation
The PowerPoint presentation includes material that expands on main topics from the text,
allowing instructors to create engaging classroom sessions. Each chapter’s presentation
includes helpful illustrations that emphasize important concepts.
To the Instructor
CHAPTER-BY-CHAPTER CHANGES FROM
THE PREVIOUS EDITION
1. Introduction to Information Technology: The Future Now
UNIT 1A: THE MOBILE WORLD, INFORMATION TECHNOLOGY, & YOUR LIFE.
Chapter introduction and Section 1.1 repurposed to stress importance of mobile com
puting. Smartphones, tablet computers, and social networks introduced. Concept of
xx
database introduced. Material updated on high-paying salaries and attractiveness of IT
careers. N ew material added: “Starting Up Your Own Venture,” social media in job
hunting, and technology in your personal life, including online dating sites. Obsolete
chart deleted on technology areas that people devote their time to. Subsections deleted on
leisure and on college students and the e-world.
UNIT 1B: THE BASICS OF INFORMATION TECHNOLOGY. Former Section 1.1,
“The Practical User,” now Section 1.3. Material updated on fastest supercomputers. New
material added on mobile devices, Big Data, machine learning, algorithms, and over
view of artificial intelligence.
Tech Tales added: “The Rise of Mobile Computing: The Getting-Smarter Smartphone,”
“Technology in Education: Adjusting Instructor Presentations to the Students,” “New
Telemedicine: The Doctor Will See You Now—Right Now,” “What Apps Do You Really
Need?,” and “Artificial Intelligence: The Use of Algorithms to Create a Hit Song.”
xxiv
Tech Tales added: “Databases Everywhere,” “How Amazon.com Used Databases to
Become the World’s Largest Online Bookstore,” “The Uses of Data Mining,” “The Brute
Force of Weak AI,” “Some Interestingly Named Expert Systems,” “Using Virtual Reality
& Simulation for Training, Treatment, & Research,” “All Types of Robots,” “Applying
Fuzzy Logic to Elevators,” and “A Scene from the Turing Test.”
xxv
10. Building Systems & Applications: Software Development,
Programming, & Languages
UNIT 10A: SYSTEMS DEVELOPMENT & PROGRAMMING. Introductory material
replaced by new material on how learning systems development and programming
can be a great career booster. Under “10.1 Systems Development & the Life Cycle of a
Software Project,” introductory material added on creation of apps. New material:
Developing a businesswide plan to utilize mobile devices is applied to the six phases of
systems development.
UNIT 10B: PROGRAMMING LANGUAGES. New introductory material on
software developers being in explosive demand.
Tech Tales added: “‘Bring Your Own Device’ to Work: Applying Systems Analysis
& Design to the BYOD Trend,” “Stumbles on the Road to Progress: When Big Systems
Fail,” “Who Decides When Programs Are Okay to Go? The Release Engineer,” and
“Student Entrepreneurs Create a New App in Five Days with ‘Premade Programming
Lego Blocks.’”
ACKNOWLEDGMENTS
This book has only two names on its title page, but we are extraordinarily grateful for the
many others who have been important contributors to its development. First, we wish to
thank our brand manager, Wyatt Morris, and our development editor, Alan Palmer, for
their help in rolling out this edition. Thanks also go to our marketing champion, Tiffany
Russell, and to Jean Starr, our content project manager. We also thank Kevin White and
Thuan Vinh for their media and digital support.
Outside McGraw-Hill we want to state our appreciation for the contributions of Judy
Mason, our San Francisco Bay Area photo researcher, whose history with us goes back
many, many years. We also thank Chet Gottfried, copyeditor; Mary Carole Hollingsworth,
Georgia Perimeter College, and Beverly Swisshelm, Cumberland University, technical
readers of the revised manuscript; Sharon O’Donnell, our excellent proofreader; and
James Minkin, our stalwart and sensitive indexer.
Finally, we are grateful to the following reviewers for helping to make this the most
market-driven book possible.
xxvii
xxviii
Jan Harris Georgia Perimeter College
Lewis & Clark Community College Michael Hasset Stan Honacki
Fort Hays State University Moraine Valley Community College Wayne Horn
Carson Haury Pensacola Junior College
Central Oregon Community College Richard Hauser Tom Hrubec
East Carolina University Waubonsee Community College Jerry Humphrey
Cheryl R. Heemstra Tulsa Junior College
Anne Arundel Community College Julie Heine Christopher Hundhausen
Southern Oregon State College University of Oregon
Richard Hewer Alan Iliff
Ferris State University North Park College
Marilyn Hibbert Washington James
Salt Lake Community College Collin County Community College–Plano John Jansma
Ron Higgins Palo Alto College
Grand Rapids Community College Martin Hochhauser Jim Johnson
Dutchess Community College Valencia Community College
Don Hoggan Linda Johnsonius
Solano Community College Murray State University
James D. Holland Julie Jordahl
Okaloosa-Waltoon Community College Marie Carole Hollingsworth Rock Valley College
Laleh Kalantari
Western Illinois University Acknowledgments
Jan Karasz Gina Long
Cameron University Southwestern Community College
Linda Kavanaugh Varga John Longstreet
Robert Morris University Harold Washington College
Hak Joon Kim Paul Lou
Southern Connecticut State University Diablo Valley College
Jorene Kirkland
Amarillo College
Linda Kliston
Broward College–North
Paul Koester
Tarrant County College
Kurt W. Kominek
Northeast State Community College
Shawn Krest
Genesee Community College
Victor Lafrenz
Mohawk Valley Community College
Jackie Althea Lamoureux
Central New Mexico Community College
Sheila Lancaster
Gadsden State Community College
David Lee Largent
Ball State University
Dana Lasher
North Carolina State University
Dawn D. Laux
Purdue University–West Lafayette
Stephen Leach
Florida State University
Paul Leidig
Grand Valley State University
Mary Levesque
University of Nebraska
Andrew Levin
Delaware Valley College
Chang-Yang Lin
Eastern Kentucky University
Janet D. Lindner
Midlands Technical College
Nicholas Lindquist
Arizona State University
Donna Lohn
Lakeland Community College
xxix
Veronica F. McGowan Salt Lake Community College
Acknowledgments Delaware Valley College
Beata Lovelace Wanda Nolden
Pulaski Technical College Todd McLeod Delgado Community College
Fresno City College E. Gladys Norman
Pamela Luckett
Barry University Curtis Meadow Linn-Benton Community College George
University of Maine Novotny
Deborah Ludford
Glendale Community College Evelyn Lulis Jennifer Merritt Ferris State University
Park University
DePaul University Janet Olpert
Timothy Meyer Cameron University
Peter MacGregor Edinboro University
Estrella Mountain Community College Warren Pat Ormond
Michael Michaelson Utah Valley State College
Mack Palomar College
Northwest Vista College, San Antonio Donna John Panzica
Cindy Minor Community College of Rhode Island Rajesh
Madsen John A. Logan College
Parekh
Kirkwood Community College Ed Mannion Alanah Mitchell
California State University–Chico Alan Maples Iowa State University
Appalachian State University
Cedar Valley College Norman Muller Bettye Jewel Parham
Greenfield Community College Daytona Beach Community College Merrill
Kenneth E. Martin
University of North Florida Rebecca Mundy Parker
University of California, Los Angeles, and Chattanooga State Technical Community
Thomas Martin
University of Southern California Paul Murphy College
Shasta College
Massachusetts Bay Community College Michelle Parker
Roberta Mae Marvel
Kathleen Murray Indiana Purdue University
Casper College
Jerry Matejka Drexel University James Gordon Patterson
Adelphi University Marry Murray Paradise Valley Community College David E.
Portland Community College Pence
Diane Mayne-Stafford
Grossmont College Sonia Nayle Moberly Area Community College Teresa Marie
Los Angeles City College Peterman
Elizabeth McCarthy
Kirkwood Community College Sue A. McCrory Charles Nelson Grand Valley State University
Missouri State University Rock Valley College Marie Planchard
Jacob McGinnis Bruce Neubauer Massachusetts Bay Community College Jim
Park University Pittsburgh State University Potter
Philip H. Nielson California State University–Hayward
xxx
Tammy Potter Western Illinois University
West Kentucky Community & Technical College Jane Ritter
Leonard Presby University of Oregon
William Patterson State College William Pritchard Fernando Rivera
Wayne State University University of Puerto Rico–Mayaguez Campus
Delores Pusins Donald Robertson
Hillsborough Community College Janak Rajani Florida Community College–Jacksonville Stan Ross
Howard Community College Newbury College
Eugene Rathswohl Russell Sabadosa
University of San Diego Manchester Community College Glen Sagers
Alan Rea Illinois State University
Western Michigan University Behrooz Saghafi
Carol B. Reed Chicago State University
Mount Wachusett Community College Jerry Reed Greg Saxon
Valencia Community College New Jersey Institute of Technology Barbara Scantlebury
John Rezac Mohawk Valley Community College Judy Scheeren
Johnson County Community College Pattie Riden Westmoreland County Community College Al Schroeder
Richland College
Acknowledgments
Dick Schwartz David Trimble
Macomb County Community College Earl Schweppe Park University
University of Kansas Jack VanDeventer
Susan Sells
Washington State University
Wichita State University
Sue VanBoven
Tom Seymour
Paradise Valley Community College
Minot State University
Naj Shaik
Heartland Community College
Harry D. Shea
Missouri State University
Morgan Shepherd
University of Colorado–Colorado Springs
Elaine Shillito
Clark State Community College
Jack Shorter
Texas A&M University
James Sidbury
University of Scranton
Bonnie Sue Specht Smith
Fresno City College
Maureen Smith
Saddleback College
Stephanie Spike
Tallahassee Community College
Diane Mayne-Stafford
Grossmont College
Esther Steiner
New Mexico State University
Randy Stolze
Marist College
Kathleen Tamerlano
Cuyahoga Community College
Kasia Taylor
Anne Arundel Community College
Susan Taylor
Mount Wachusett Community College
Charlotte Thunen
Foothill College
Denis Tichenell
Los Angeles City College
Angela Tilaro
Butte College
Martha Tillman
College of San Mateo
DeLyse Totten
Portland Community College
xxxi
Melinda White Siena College
Seminole State College of Florida Anita Whitehill
Pauline White Foothill College
Edward Winter
Acknowledgments
Salem State College
James Van Tassel
Floyd Winters Mission College
Manatee Community College Michelle Vlaich-Lee
Nancy Ann Woolridge Greenville Technical College Jim Vogel
Fullerton College Sanford Brown College
Israel Yost Dale Walikainen
University of New Hampshire Christopher Newport University Reneva Walker
Alfred Zimermann Valencia Community College Ron Wallace
Hawai’i Pacific University Blue Mountain Community College Nancy Webb
Eileen Zisk City College of San Francisco Steve Wedwick
Community College of Rhode Island Heartland Community College Sandra M. (Sandy) Week
Mary Ann Zlotow University of Nevada–Reno Patricia Lynn Wermers
College of DuPage North Shore Community College Cora Lee Whitcomb
Bentley College
Doug White
Western Michigan University
xxxii
1
INTRODUCTION
to INFORMATION
TECHNOLOGY: The Future Now
Chapter Topics & Key Questions
UNIT 1A: The Mobile World, Information Technology, & Your Life
1.1 Information Technology & Your Life: The Future Now What is information
technology, and how does it affect education, health, money, leisure, government,
and careers?
1.2 Information Technology Is Pervasive: Cellphones, Email, the Internet,
& the E-World How does information technology facilitate email, networks, and
the use of the Internet and the web; what is the meaning of the term cyberspace?
So writes Michael Saylor, author of The Mobile Wave.1 The information revolution that
began with writing on clay tablets, then continued through the invention of the print
ing press, radio and TV, and room-size and desktop computers, is now at a “tipping
point,” he asserts. Now mobile devices such as smartphones — cellphones with built-in
applications, multimedia capability, and Internet access —and tablet computers —
wireless portable computers primarily operated by a touch screen —are changing
nearly everything we do.
Consider the example below, the first in a number of “mini-cases,” business related and
otherwise, that we present in this book:
Chapter 1
and a bank debit card (instead of cash). “But I’m confident,” he says, “that
those, too, will disappear someday” and become part of the smartphone.
It would be simplistic, however, to predict that we’ll be doing all our computing
on just smartphones and tablets anytime soon. As one writer points out, “Heavier pro
ductivity tasks—like, you know, typing—are still much easier to pull off on standard
2
laptops and desktops.” 3 Moreover, the uses of smartphones and other portable devices
cannot be truly mastered without understanding their huge supporting
infrastructure of computing and communications technologies—the
subjects of the rest of this book.
Even so, people ages 16 to 39, members of the “Millennial Generation,”
who generally spend eight hours a day or more looking at various screens
—on cellphones, on computers, on TVs—generally have a head start on
computer technology. 4
They are, as one anthropologist called them, “digital natives” or computer-
technology natives, constantly busy with text messag ing, email, and the
Internet, the global “network of networks,” and its most well-known
feature, the multimedia World Wide Web —the “Web” or “web,” with its
massive collection of web sites, or related collections of files. 5 Indeed,
among college students, 98% are Internet users and 92% are wireless
(laptop or cellphone) users. 6 While their parents continue to shop in retail
stores (often using clipped-out paper coupons), Millennials are more likely
than older shoppers (by 50% vs. 21% 7 ) to check out
“Well, I keep
COMPUTER TECHNOLOGY You likely know what a computer is, but to get to a formal
definition: a computer is a programmable, multiuse machine that accepts data—raw
facts and figures—and processes, or manipulates, it into information we can use,
such as summaries, totals, or reports. Its main purpose is to speed up problem solving and
increase productivity.
Avatar. The
simulated depictions of humans are a staple not only of videogames but also of
computerized training programs. (What culture does “avatar” come from? See
www.answers.com/topic/avatar?cat 5technology . )
Introduction to Information Technology Institute, Kaplan University, Strayer University, and the University of
edX, Udacity, and Udemy, which feature offerings from Princeton, Phoenix. More than a third of institutions of higher education—and 97% of
Stanford, Brown, Duke, Columbia, and other universities. public universities—offer online courses, and many have attracted on-
E-learning has also propelled the rise of for profit institutions, such as campus students, who say they like the
Colorado Technical flexibility of not having to attend their
Interactive education. Interactive whiteboard math class. A whiteboard is a white classes at a set time. 23
surface with multitouch, multiuser, and pen/stylus functionalities that also
E-learning has been put to such varied uses
displays the contents of a computer screen. A projector projects the computer’s
as bringing career and technical courses to
desktop onto the board’s surface. The board is typically 5
mounted to a wall or floor stand. The following websites provide
detailed information about get
ting college degrees online:
www.onlinecollegedegrees.net/
www.earnmydegree.com/index.
html
www.classesusa.com/indexall/?ca
mpusType 5 online
www.guidetoonlineschools.com/
www.usdla.org/
http://distancelearn.about.com/
(includes information about bad
programs, called diploma mills )
www.distancelearning.com/
www.elearners.com/resources/
more info!
Carnegie Learning’s
more info! Online Colleges Cognitive Tutor
Software
www.carnegielearning.com/specs/
cognitive-tutor-overview/
Chapter 1
high school students in remote prairie towns, pairing gifted science students
with master teachers in other parts of the country, and helping busy
professionals obtain further cre dentials outside business hours.
TUTORING, SIMULATION, & AVATARS But the reach of information
technology into education has only begun. “Intelligent tutoring systems”
software is now available that gives students individualized instruction
when personal attention is scarce—such as the software Cognitive Tutor,
which not only helps high school students to improve their performance in
math but also sparks them to enjoy a subject they might have once disliked.
In colleges, more students may use interactive simulation games, such as
McGraw Hill’s Business Strategy Game, to apply their knowledge to real-
world kinds of prob lems. And employees in company training programs
may find themselves engaged in mock conversations with avatars —
computer depictions of humans, as are often found in online videogames
—that represent imaginary customers and coworkers, combining the best
parts of computer-based learning with face-to-face interaction. An avatar is
also part of your online representation of yourself; it gives other users a
“face” to go with your username (“online name”).
PRACTICAL ACTION
How to Be a Successful Online Student
1. Familiarize yourself with the computer and software. Be comfortable communication process.
with the computer, Internet, email, web browser, and search engine 8. Pay attention to detail, particularly when following written
software. Use tutorials to become familiar with the software used directions. Assignments, projects, and so on are posted in written form.
by your online school. Grades are drawn from work accomplished as directed. When grading
Take advantage of technology. Learn the various ways of assignments, the instructor will look for competence in the work
communicating on the web. Blogging, podcast ing, submitted. This means that all the required steps were followed
videoconferencing, and chatting (discussed later in the book) are and presented in a professional manner.
tools that will help you with online studying.
9. Create a private study area. This will help you to focus on your
2. Do you have regular access to the Internet? Do you have your own studies without distractions and ensure that others do not to disturb
email account? It is necessary to maintain regular communication you while you are in your study area. Keep all your study materials
with the instructor with whom you are taking the course. You must be here, so you know where to look for them.
able to answer your email quickly during the school week, which
means within 24 hours after receipt. And you should be able to suc 10. Interact with your peers. Contribute and exchange your ideas,
cessfully send and receive email with attachments. Stu dents must perspective, and comments with your
have a reliable Internet service provider (ISP) and email account online classmates. Join online student communities and blogs.
before the start of class. (Students are often required to use a school 11. Interact with your faculty. Constantly stay in touch with your
email account.) professors. Consult them if you have technical diffi culties or
3. Read every document within your syllabus within the first five days of problems in understanding something related to the course. Since
your online course. This is usually the time to begin introducing your professors cannot see you,
yourself to your classmates and instructor and to start asking
questions concerning the expectations described in the syllabus. You Introduction to Information Technology
need to know what is expected of you. you must be absolutely clear in expressing your ideas and needs.
Know how to find assignments and course material, as well as 12. Evaluate and test yourself. Take tests after thor ough
be able to participate in and post to discus sions and send emails preparation. Don’t hurry to take the tests; time them carefully. Have
with attachments. your work evaluated by fellow
4. Are you comfortable working on your own? Are you self-motivated? classmates.
You will have flexible use of the time to spend on course work. Due 13. Netiquette: Remember the dos and don’ts. When you are online,
dates are set by the instruc tor. Flexibility and independence are be careful of netiquette (online etiquette). Both the real world and the
agreeable to some, but for others it is difficult to self-start. Be honest virtual world are inhabited by people, so the same rules apply. Never
with yourself about your capabilities. be rude or disrespectful. Respect the privacy of other people.
It is the student’s responsibility to take the course seriously and
to be able to budget time to receive a suc cessful grade. Make a Source: Adapted from www.olhcc.edu/Documents/academics/ 1%20Online
schedule and stick to it. %20Courses%20Are%20You%20Ready.pdf ; www
5. Can you make deadlines? Your instructor is counting on you to finish .brighthub.com/education/online-learning/articles/26877.aspx ; and
your work on time. Your communication may be virtual (online), but www.onlinedegreedirect.com/onlinedegreedirect-articles/10- 7
your tasks and assigned deadlines are not. Easy-Ways-to-Become-a-Good-Online-Student.htm .
Be consistent in the amount of time you take to read and study.
Every week you will be expected to read sec tions in your textbook.
Try not to get behind in your class work; try to stay on course or
ahead. Some online learning programs move at an advanced rate;
missing one week is like missing two in a traditional classroom.
6. Is this the right time for you to take an online class? You should be
confident that you can set aside enough time for your online course
assignments and study
time. You may feel that taking
an online course will free up your
time for other tasks. If you are feeling
overwhelmed by other responsibilities, such as work or family
obligations, then perhaps you had better
postpone your involvement. Online courses require as much and
often more personal preparation time than on- campus courses.
Everything that you would normally communicate by speech in class
must be typed in an online course.
7. You will need good written communication skills. Remem ber, your
primary means of communication is through writing. Being able to
send well-structured messages and essays will help with the
Hi
TECH TALES New Telemedicine: The Doctor Will See You Now—Right Now
info! New York technology writer Michael Wolff had a rotten cold and his regular
more doctor was on vacation. So he used a program called ZocDoc. “I entered
my particulars: my ZIP code, my malady, my insurance,” he wrote. “And
Health Websites bingo, I had my choice of doctors in the vicinity and available
appointments that day. I chose an ear-nose-and-throat man a 10-minute
Some reliable sources:
walk from my house.” 25
www.medlineplus.gov
www.nimh.nih.gov Similarly, Anna Keyes, an employee of a Houston-based Caterpillar dealer,
www.womenshealth.gov/ who couldn’t shake chest congestion, walked down the office hallway and,
www.mayoclinic.com
with the help of a clinical paramedic, connected to a physician 20 minutes
www.nationalhealthcouncil.org
away, who examined her with an Internet-linked stethoscope and a
handheld video camera. In 20 minutes, she was back at her desk with the
www.yourdiseaserisk.wustl.edu/
diagnosis of an allergy and a prescription to cope with it. 26
Image transfer technology allows radiologic images such as CT scans and
MRIs to be immediately transmitted to electronic charts and physicians’
offices. 27 Patients in intensive care, who are usually monitored by nurses
during off-times, can also be watched over by doctors in remote “control
towers” miles away. Recent telemedicine innovations include use of
smartphones to enable doctors to take an electrocardiogram almost
Chapter 1 anywhere and to help patients track for signs of skin cancer. 28
8 Electronic medical records and other computerized tools enable heart attack
patients to get follow-up drug treatment and diabetics to have their blood
sugar measured. Software can compute a woman’s breast cancer risk.
TUG, and HelpMate—help free medical workers for more critical tasks. The four
armed da Vinci Si surgical robot, for instance, can do the smallest incisions and stitches
for complex surgery deep inside the body, so that surgery is less traumatic and recov
ery time faster. 29 Hydraulics and computers are being used to help artificial limbs get
“smarter,” 30 and pressure-sensitive artificial skin made of tiny circuits is expected to
Introduction to Information Technology
improve limbs’ effectiveness. 31 An international team of researchers at of Tel Aviv
University is working on a biomimetic computer chip for brain stimulation that is pro
grammable, responsive to neural activity, and capable of bridging broken connections
in the brain. This device could be used to replace diseased or damaged brain tissue,
restore brain functions lost to aging, and even treat epilepsy, chronic pain, http://financialsoft.about.com/
od/morefinancialsoftware/tp/
and Parkin son’s disease. 32
Online_Software_List.htm
www.financialcalculators.com/
HEALTH SELF-HELP Want to calculate the odds on how long you will live? www.finance.yahoo.com
Go to www. livingto100.com , an online calculator developed by longevity www.fool.com
researchers at Harvard Medical School and Boston Medical Center. Want www.ragingbull.com
to gather your family health history to see if you’re at risk for particular www.usatoday.com/money/default.
inherited diseases? Go to www.hhs.gov/familyhistory to find out how. htm
One in three Americans has also gone online to figure out a medical
condition, and 59% of adults say they have looked online for health
information in the past year. 33 (How ever, some online health information
can be misleading and even dangerous.) Some cancer patients have created
fund-raising sites on the web to raise money to pay for their out-of pocket
costs, an activity known as crowdfunding.34 more info!
more info! Showrooming Articles
Crowdfunding http://bits.blogs.nytimes.
com/2013/02/27/more-retailers
Some information on success at-risk-of-amazon-showrooming/
ful crowdfunding: http://blogs.seattletimes.com/
www.cfpa.org/ monica-guzman/2013/05/04/
smart-shopping-or-petty
http://mashable.com/category/
theft-caught-in-the-act-of
crowdfunding/
showrooming/
www.startupexemption.
www.forbes.com/sites/
com/crowdfunding
abrambrown/2013/04/04/a-new
101#axzz2NR6m7NJa/
move-by-best-buy-to-eliminate
9 showrooming-trap/
more info!
Financial Information
The Internet contains lots of
financial information. Some of
the better sources:
assignments.
Chapter 1 (See Gigwalk, EasyShift, or TaskRabbit.)
10
• Putting your experience to work as a tutor. (See Smartthinking or Tutor.)
Money & Business: Toward the Cashless Society
Information technology is reducing the use of traditional Government & Electronic Democracy: Participating in
the Civic Realm
money.
Information technology is helping governments to deliver
“The future of money is increasingly digital, likely virtual, and possibly services and affecting political activism.
universal,” says one writer. 35 Virtual means that something is created,
simulated, or carried on by means of a computer or a computer The Internet and other information technology have helped government
network but also that it seems almost real. We certainly have come a deliver better ser vices and have paved the way for making governmental
long way toward becoming a cashless—and virtual money—society. operations more transparent to the public. They have also changed the
Besides currency, paper checks, and credit and debit cards, the things that nature of politics.
serve as “money” include cash-value cards (such as subway fare cards),
automatic transfers (such as direct IMPROVING GOVERNMENT SERVICES In Boston, the next time your car
deposit paychecks), and digital money (“electronic wallet” accounts such as hits a pothole, you can use a feature (called Street Bump) to report it to
PayPal). someone in city
panel 1.2
Jobs & Careers
People now use computers to post résumés and find jobs.
Whether ordinary jobs in which computers are used as ordinary tools or
specialized jobs involving advanced computer and professional training,
almost every occupation today requires computer skills of some sort.
Among the top 12 occupations with a promising future and requiring at
least a bach elor’s degree are five in information technology: programmer,
software developer, systems analyst, network and computer systems
administrator, and information security analyst/ web developer/computer
network architect. 56 Other top-paying jobs also require good computer
skills: accounting, market research, human resources, specialized sales,
mechan ical engineering, industrial engineering, and financial analysis. 57
ries for jobs most college graduates are apt to
The average starting sala
consider are shown below. (
• See Panel 1.2.)
“Most jobs today require a working knowledge of certain computer skills,”
says one analyst. “Employers seek and reward employees with the skills
and knowledge to send messages across the country via email; use a
spreadsheet to create a graph and paste it into a report; add and edit data in
a database; understand the implications of file sizes, memory limitations,
and network arrangements; and recognize the function and features of
modern computer components. Any job candidate who already possesses
these skills will stand above those who do not” (University of Central
Florida Continuing Education; www.ce.ucf .edu/Program/3121/Computer-
Skills-For-The-Workplace/ ).
Chapter 1 12
Marketing
Computer science
Chemistry
Political science
Biology
Criminal justice
English
Psychology
Physics
Communications (not IT)
Elementary education
|||||||||||||||||| $59–61,000
||||||||||||||||| $47–49,000
|||||||||||||||| $44,500 |||||||||||||||
$40,400 ||||||||||||||| $40,100 ||||||||||||||
$38–40,000 |||||||||||||| $38,900
||||||||||||| $35,200
|||||||||||| $33,600
31,000
corporations used to be able to afford,” he says. “You don’t need nearly as
much money to start up a business as you used to—and there are many
businesses that a recent college grad can launch with little more equipment
than that old college computer.”
Among the possibilities are photography, home design, travel, food
preparation and delivery, fashion, financial planning, tutoring, educational
counseling services, fitness training, child care, or any number of other
activities. The best method is to consider the needs and problems of your
friends and neighbors and build a small business around sat
isfying those needs. In particular, look toward solving the problem of
bottling the “hose of the Internet,” filtering, organizing, and customizing
the torrent of information so people can benefit from it. The life you build
that way will probably be more satisfying, says Mead, “and may well be
substantially more remunerative than anything a traditional, off-the-shelf
career has to offer.”
reers. ( left ) Front-desk workers at many hotels use computers to check in guests. ( right ) A technician cycles in the Large
Hadron Collider (LHC) at the European Organization for Nuclear Research (CERN) in the French village of Cessy near Geneva in Switzerland. As
hundreds of engineers and workers start two years of work to fit out the giant LHC particle collider to reach deep into unknown realms of
nature, CERN physicists look to the vast machine to unveil by the end of the decade the nature of the mysterious dark matter that makes up a
quarter of the universe and perhaps find new dimensions of space. Introduction to Information Technology
Police work. Syracuse, New
York: An Onondaga County
sheriff’s deputy enters
information into a laptop in his
squad car as he issues a ticket
for an uninspected vehicle.
13
more info!
Beyond.com: www.beyond.com
CareerBuilder: www.careeronestop.org Computer Basic Skills Test
CareerOneStop: www.careeronestop.org CollegeGrad: Job Hunter: A computer basic skills test is
usually a prerequisite for a job
www.collegegrad.com Dice: www. dice.com or for placement companies:
FedWorld (U.S. government jobs): www.fedworld.gov FindTheRightJob: www.cvtips.com/interview/
www.findtherightjob.com NationJob Network: www.nationjob.com computer-basic-skills-test-job
interview-tips.html
Indeed.com: www.indeed.com
Yahoo! Careers: http://us.careers.yahoo.com
Jobs.com: www.jobs.com
JobsOnline: www.jobsonline.com
MonsterCollege: http://college.monster.com/?wt.mc_n=monstertrak Monster:
www. monster.com
Simply Hired: www. simplyhired.com
U.S. Dept. of Labor: www.bls.gov/oco/
panel 1.3
Some websites that post job listings
Black People Meet, Asian People Meet), religion (ChristianMingle, JDate
Chapter 1 for Jewish daters), occupations ( FarmersOnly.com ), and over 50 (Senior
14 Friend Finder). 68 There are also niche sites for smokers, vegetarians, dog
therapists in Atlanta, models in Florida, and English teachers in China. lovers, and so on. One website, Find Your
Most online job boards—Monster, Craigslist, CareerBuilder, and others—
many require that you fill out an online
are free to job seekers, although
registration form. (
• See Panel 1.3.) More com panies are also turning to
social media, such as Twitter, Facebook, and the professional site LinkedIn
as a way to broadcast job openings. 59 Facebook, for instance, offers a fea
tured called the Social Jobs App for a central hub for members to find
postings to about 1.7 million open jobs in the United States. 60
WAYS FOR EMPLOYERS TO FIND YOU Posting your résumé online for
prospective employ ers to see has to be done with some care. Besides
featuring a succinct summary of your top achievements and related skills, it
should also include links or web addresses to social-media profiles and
online portfolios (as of projects you have done). If you’re applying for a
specific job, your résumé should include applicable keywords from the
employer’s job description. 61 Indeed, some companies now use tracking
programs to scan résumés for keywords, former employers, years of
experience, and schools attended to identify candidates of likely interest. 62
Some companies are even ditching résumés and the conventional job
interview process for “Twitterviews”—interviews on Twitter. 63 Indeed,
says one account, some “recruiters are filling openings faster by relying on
new tools that scour social networks and target work ers who aren’t
necessarily looking for jobs,” one example being Recruiter by LinkedIn. 64
Obviously, if you want to be found, you need to make yourself visible.
Thus, some experts suggest you need to set up a Facebook page that allows
you to interact with others on a professional level, to participate in Twitter,
and to write comments (posts) on other people’s online journals—their
blogs (weblogs), frequently updated sites on the World Wide Web
intended for public consumption that contain a writer’s observations,
opinions, images, and links to other websites.65 Also , your personal
Facebook page should be pro fessional, because companies now do searches
to examine a job candidate’s web presence (
http://online.wsj.com/article/SB10000872396390443759504577631410093
879278.html ).
Introduction to Information
Technology
panel 1.4
Grandparent and offspring:
ENIAC ( left) is the grandpar
ent of today’s iPad ( right).
15
Smartphones. ( left ) Apple 5G iPhone; ( middle ) Android Samsung Galaxy III
smartphone; ( right ) Nexus smartphone
mobile subscriber numbers may top 7 billion in 2014 (about the total
population of the planet). 76 About 88% of Americans 18 and older owned a
cellphone in 2012. 77 It has taken more than 100 years for the telephone to
get to this point—getting smaller, acquiring push buttons, and losing its
cord connection. In 1964, the * and # keys were added to the keypad. In
1973, the first cellphone call was processed.
In its most basic form the telephone is still so simply designed that even a
young child can use it. However, as a smartphone, it is now becoming more
versatile and complex—a way of connecting to the Internet and the World
Wide Web and
allowing you not only to make voice calls but also to send
and receive email and text messages, take and send photos
and videos, get map directions, and obtain news, research,
music, photos, movies, and TV programs.
Chapter 1
Inhabitants of
the first known
civilization in
Sumer keep
records of
commercial
transactions on clay
tablets
Phoenicians develop
an alphabet;
Sumerians develop
cuneiform writing;
Egyptians develop
hieroglyphic writing
Abacus is invented in
Babylonia
First
encyclopedia (Syria)
First
postal service
(China)
Greeks start
Young people are more apt to send instant messages and to do texting , or text messaging — sending and receiving short written messages between
mobile phones or other portable or fixed devices.82
What is interesting, though, is that in these times, when images often seem to overwhelm words, email is actually reactionary. “The Internet is the first
new medium to move decisively backward,” points out one writer, because it essentially involves writing. Twenty years ago, “even the most literate of
us wrote maybe a half a dozen letters a year; the rest of our lives took place on the telephone.” 83 Email has changed all that—and has put pressure on
busi
nesspeople in particular to sharpen their writing skills. (A countertrend, unfortunately, is that the informal style of electronic messages, especially
texting, is showing up in schoolwork.) 84
The Internet, the World Wide Web, & the “Plumbing of Cyberspace”
The net, the web, and cyberspace are not the same things.
As the success of the smartphone shows, communications has extended into every nook and cranny of civilization (with poorer nations actually the
leaders in cellphone growth), a development called the “plumbing of cyberspace.” The term cyberspace was coined by William Gibson in his novel
Neuromancer (1984) to describe a futuristic computer net
work into which users plug their brains. ( Cyber comes from “cybernetics,” a term coined in 1948 to apply to the comparative study of automatic
control systems, such as the brain and the nervous system and mechanical-electrical communication systems.) In everyday use, this term has a rather
different meaning.
Today many people equate cyberspace with the Internet. But it is much more than that. Cyberspace includes not only the web, chat rooms, online
diaries and articles (blogs), and social networking—all features we explain in this book—but also such things as conference calls and automated teller
machines (ATMs). We may say, then, that cyberspace encompasses not only the online world and the Internet in particular but also the whole
wired and wireless
panel 1.5
Timeline
Overview of some of the historical developments in information technology. In upcoming chapters we modify the timelines to show you more
about the people and advances contributing to developments in
information technology.
17
PRACTICAL ACTION
Managing Email
constantly checking email: Process email for 5 to 10 minutes each hour
D
rather than as
espite the popularity of texting and social network ing, email is still the messages come in or at times
when you can’t really send a reply.
Incidentally, research has shown that stu
preferred way for people to com
municate at work. Some people receive as dents who engage in very high email usage also often show depressive
many symptoms. 88 Conversely, other research finds that people who do not
as 300 emails a day—with perhaps 200 being junk email (spam), look at email frequently at work were less stressed and more productive
unwanted email (“social spam,” such as alerts from social networks), bad than others. 89
jokes, or irrelevant memos (the “cc” or “courtesy copy”). One study found • Avoid using “Reply All”: People hate getting all those “thanks” and
that the average knowledge worker spends 28% of the workweek writing, “appreciated” emails, as well as the deluge of “reply alls” with messages
read of only minimal interest to them. Avoid using this feature unless your
ing, or responding to email. 85 message is really important. 90
Shayne Hughes, CEO at Learning for Leadership, man dated the
unthinkable—forcing his workers to communicate for one week the old- • Don’t send long attachments: Attachments—computer files of long
fashioned way, face to face, which actu ally boosted productivity. Hughes documents or images attached to an email— are supposed to be a
believes dealing with email distracts employees from strategic thinking and convenience, but large files often just clog the mail system.
discussions. He also argues that “there’s a feeling senders get when • Don’t open attachments you don’t recognize: Some dangerous computer
emailing someone with a problem or issue—a misplaced feel ing of relief.” He viruses—renegade programs that can damage your computer—have been
adds, “It’s as if that person is simply detail ing the problem, clicking send, spread by email attachments that automatically activate the virus when
and all of sudden that problem is now someone else’s.” 86 they are opened.
Some tips: 87 • Be aware that anyone might read the emails you send: Don’t send a
message electronically you would be ashamed of if a third party read it.
• Send less email, and send better email: The more email you send, the Email messages are not written with disappearing ink; they remain in a
more you’ll get. Put short messages in the subject line so that recipients computer system long after they have been sent. “Delete” removes the
don’t have to open the email to read the note. Make one point per email. email from the visible list, but the messages remain on your hard disk
Don’t reply to every email message you get. Don’t “cc” (copy to) people and some serv
unless absolutely necessary. Don’t send chain let ers and can be retrieved by experts. (Special software,
ters or lists of jokes. Don’t overuse the high-priority flag. • Don’t waste time
more info!
Apple Cloze
world of communications in general —the nonphysical terrain created by Cloze, a free Apple iPhone app,
computer and com munications systems. Cyberspace is where you go when functions as an inbox-analyzing
you go online with your computer. expert. Cloze studies emails
and other social-network
interactions, sorts messages
THE NET & WEB DEFINED The two most important aspects of cyberspace according to who sent them,
are the Internet and that part of the Internet known as the World Wide and prioritizes those from
Web. To give them formal definition: people it thinks matter most
to you.
• The Internet—the heart of the Information Age: Called “the mother of all0014241278873243386045783281
http://online.wsj.com/article/SB10
net 90148068924.html
works,” the Internet (the “Net” or “net”) is a worldwide computer
network that connects hundreds of thousands of smaller networks.
These networks link educa tional, commercial, nonprofit, and military
entities, as well as individuals.
The World Wide Web—the multimedia part of the Internet: The
•
Internet has
been around for more than 40 years. But what made it popular,
apart from email, was the development in the early 1990s of the World
Wide Web , often called simply the “Web” or the “web”—an
interconnected system of Internet computers (called servers) that
support specially formatted documents in multimedia form. The word
multimedia, from “multiple media,” refers to technology that presents
information in more than one medium, such as text, still images, moving Introduction to Information Technology
images, and sound. In other words, the web provides information in more
1844 Washington Investigation 1876 processing project— transmitted robot,
to Baltimore on the Laws Hollerith’s automatic 1907 derived
Samuel Morse sends a 1854 of Thought,” Alexander census-tabulating from
telegraph a system Graham machine (used First the Czech
message from George Boole publishes for symbolic Bell punched regular word for
“An and logical patents the cards) radio compulsory labor, is
reasoning that will telephone 1895 broadcasts, from first used
become 1890 New York to mean a
the basis for First 1920–1921 humanlike
computer Electricity used for first radio
machine
time in a data signal The word
design
19
info!
www.isoc.org/internet/history/ brief.shtml
more
20
student may have no use for them. Students will, however, probably benefit
from adding the following free or low-cost apps to their smartphones or
tablets: 93
Swype, SwiftKey 3, Path Input Pro: Make typing on a smartphone or
touch-screen tablet faster and more accurate; some of these even make
corrections as you type.
Skype, FaceTime: Allow you to video chat for free with others throughout
the world, using your device’s front- or rear-facing cameras.
Evernote: Write, type, or speak your ideas to Evernote, which helps you to
stay organized.
Google Earth: Lets you explore the world through satellite and ground
level photos.
Pocket: Lets you save content you like, so you can read it later.
Snapguide: Provides user-created how-to guides.
UPGRADE YOUR EQUIPMENT & INTEGRATE NEW TECHNOLOGY New gadgetry and
software are constantly being developed. A knowledgeable user learns under what conditions
to upgrade, how to do so, and when to start over by buying a new machine or mobile device.
21
from retail to recreation. We hope you will come away from this book with ideas about
how the technology can benefit you in whatever work you choose.
Along the way—in the Experience Boxes, Practical Action boxes, Survival Tips, and
More Info! features—we offer many kinds of practical advice that we hope will help you
to become truly computer smart in a variety of ways, large and small.
1
introduced game 1975 Apple I 4 IBM computer
Chapter 1 for storing (Pong) computer 5" introduces 1982
1970 data; first First micro (first personal floppy disk; personal
dynamic computer computer sold in Atari home computer; Portable
Micro RAM chip (MIT’s assembled videogame; mouse computers
processor 1972 Altair form) first spam email sent becomes
chips come into use; 8800) 1978 1981 regular
floppy disk First video 1976 part of a
22
1.Titan 17.6–20 petaflops U.S.A. 2.Sequoia 16.32 petaflops U.S.A. 3.K- danger
Computer 10.51 petaflops Japan 4.Mira 10.1 petaflops U.S.A. 5.Juqueen 5 ously loud”; “anyone spending more than 15 minutes in the
petaflops Germany same room with the Titan supercomputer must wear earplugs or
risk permanent hearing damage. The din in the room [does] not
come from the computer’s 40,000 whirring processors, but from
Source: From CNN Money, “The 5 Fastest Supercomputers,”
http://money.cnn.com/gallery/technology/ the fans and water pipes cooling them.” 95
enterprise/2012/11/12/fastest-supercomputer/index.html , July 21, 2013. Supercomputers are still the most powerful computers, but
a new generation may be coming that relies on nanotechnol
ogy , in which molecule-size nanostructures are used to cre
can be generally classified according to their processing power:
supercomputers, mainframe computers, workstations, microcomputers, and ate tiny machines for holding data or performing tasks.
microcontrollers. We also consider servers. ( Nano means “one-billionth.”) Computers the size of a pencil
eraser could become available that work 10 times faster than
today’s fastest supercomputer. Eventually
Supercomputers nanotech could
Supercomputers are used in very special situations. panel 1.6
Typically priced from $1 million to more than $350 million, Top five supercomputers
supercomputers are high- capacity machines with thousands of
processors that can perform more than several quadrillion calculations
per second. These are the most expensive and fastest computers
available. “Supers,” as they are called, have been used for tasks requiring
the processing of enormous volumes of data, such as doing the U.S. census
count, forecasting weather, designing aircraft, modeling molecules, and more info!
breaking encryption codes. More recently they have been employed for
business purposes—for instance, sifting demographic marketing Flops
information—and for film animation. The fastest computer in the world, In computing, FLOPS is an
costing $100 million to build and with roughly the computing power of .5 abbreviation of Floating-point
million of today’s most powerful laptops, is the Titan supercomputer, Operations Per Second. Flops
capable of 17.6–20 petaflops (17.6–20 quadrillion calculations per second) , is used as a measure of a
computer’s performance,
Ridge National Laboratory in the Tennessee Valley. ( especially in fields of scientific
located at the Oak • See calculations. With floating
Panel 1.6.) This almost unimagina point encoding, extremely
ble computational capability is about equal to 7 billion people solving 3 long numbers can be handled
relatively easily. Computers
million math problems per second. It would take 60,000 years for 1,000 operate in the trillions of flops;
people working at a rate of one calculation per second to complete the for comparison, any response
number of calculations that Titan can process in a single second. 94 time below 0.1 second is expe
The cost of electricity for the Titan is more than was $9 million a year. rienced as instantaneous by a
human operator, so a simple
“The sound of 20 quadrillion calculations happening every second is pocket calculator could be said
to operate at about 10 flops.
Humans are even worse float
ing-point processors. If it takes
a person a quarter of an hour
to carry out a pencil-and-paper
long division with 10 significant
digits, that person would be cal
culating in the milliflops range.
Introduction to
Information Technology
show up in every device and appliance in your life.
The Titan. This is the world’s fastest supercomputer.
1984
1990
1994
1998
2000
2001
2002
2003
Apple
Macintosh; first
personal laser
printer
Laptops become
very
popular
Apple and IBM
introduce PCs with
full-motion video built
in; wireless data
transmission for
small portable
computers; first web
browser invented
PayPal is founded
The “Y2K”
nonproblem; the first
U.S. presidential
webcast
Dell computers
becomes the
largest PC maker
Friendster
Facebook; MySpace
23
used to be called minicomputers, although today the term is seldom used.
Mainframes are used by large organizations—such as banks, airlines,
insurance companies, and colleges—for processing millions of
transactions. Often users access a mainframe by means of a terminal ,
which has a display screen and a keyboard and can input and output
data but cannot by itself process data. Mainframes process billions of
instructions per second.
Workstations
IBM zEnterprise mainframe computer Workstations are used for graphics, special effects, and
certain professional applications.
Introduced in the early 1980s, workstations are expensive, powerful
personal computers usually used for complex scientific, mathematical,
and engi neering calculations and for computer-aided design and
computer-aided manufacturing; they are usually connected to a network
. Providing many capabilities comparable to those of midsize mainframes,
workstations are used for such tasks as designing airplane fuselages,
developing prescription drugs, and creating movie special effects.
Workstation
Workstations have caught the eye of the public mainly for their graphics
capabilities, which are used to breathe three dimensional life into movies
such as Avatar, Harry Potter, Iron Man, and Lord of the Rings. The
capabilities of low-end workstations overlap those of high-end desktop
microcomputers.
Microcomputers
Microcomputers are used by individuals as well as
businesses, and they can be connected to networks of
larger computers. There are many types of
microcomputers.
Desktop PC
Microcomputers , also called personal computers (PCs), which cost
$500 to over $5,000, can fit next to a desk or on a desktop or can be
carried around. They either are stand-alone machines or are connected to
a computer network, such as a local area network. A local area network
(LAN) connects, usually by special cable and also wirelessly, a group of
desktop PCs and other devices, such as printers, in an office or a
building.
Tower PC (with speakers, Microcomputers are of several types: desktop PCs, tower PCs, notebooks
(laptops) and netbooks, tablets, mobile devices, and personal digital
keyboard, and mouse) assistants—handheld computers or palmtops. Also, some microcomputers
are powerful enough be used as workstations.
Chapter 1IBM PC sold DESKTOP PCS Desktop PCs are the original style of microcomputers
Mainframe Computers whose case or main housing sits on a desk, with keyboard in front and
monitor (screen) often on top.
Mainframe computers are used in many large businesses.
The only type of computer available until the late 1960s, mainframes are TOWER PCS Tower PCs are microcomputers whose case sits as a
water- or air cooled computers that cost $5,000–$5 million and vary in “tower,” often on the floor beside a desk, thus freeing up desk space.
size from small, to medium, to large, depending on their use. Small Some desktop computers, such as Apple’s iMac, no longer have a boxy
mainframes ($5,000–$200,000) are often called midsize computers; they housing; most of the computer components are built into the back of the
flat-panel display screen.
24 2004 to Lenovo Group; Flickr 2005 You Tube; Wii 2006 Twitter 2007
Skype; introduces 2008 become popular Apple 2015 computers Teleportation?; intelligence The
Apple iPhone 2010 releases iPad 2017 self-aware 2030–2045 Singularity
Netbooks Foldable machine
also called laptop computers, are lightweight portable computers with
built-in monitor, key board, hard-disk drive, CD/DVD drive, battery,
and AC adapter that can be plugged into an electric outlet; they weigh
anywhere from 1.8 to 12 pounds.
Netbooks are mini-notebooks—low-cost, light weight, small computers
with functions designed for basic tasks, such as web searching, email,
and word processing. They weigh anywhere from 2.25 to 3.2 pounds,
Small! The Mac Mini has the smallest desktop cost generally between $200 and $400, have less processing power than
notebooks, and have screens between 7 and 10 inches wide diag onally.
Netbooks are being used less now in favor of tablets and smaller laptops,
microcomputer case, just 6.5 inches square and 1.25 inches tall. such as Chromebooks.
NOTEBOOKS AND NETBOOKS Notebook comput ers ,
Servers
Servers are computers having special
software dedicated to providing
services to other computers.
The word server describes not a size of computer
but rather a particular way in which a computer is
used. Nevertheless, because servers have become
so important to tele communications, especially
with the rise of the Internet and the web, they
deserve mention here.
A server , or network server, is a central
computer that holds collections of data
(databases) and programs for connecting or
supplying services to PCs, worksta tions, and
other devices, which are called clients . These
clients are linked by a wired or wireless
Servers network. The entire network is called a client-
. (top) Lead technician services different companies’ server network. In small organizations, servers
Internet servers at Switch and Data PAIX in Palo Alto,
California. Switch and Data PAIX is one of the primary can store files, provide printing stations, and
Internet exchange points in North America, serving transmit email. In large organizations, servers
hundreds of businesses servers. (bottom) A group of may also house enormous libraries of financial,
networked servers that are housed in one location is sales, and product information.
called a server farm or a server cluster.
You may never lay eyes on a supercomputer or
mainframe or even a tiny microcon troller. But
most readers of this book already have seen and
used a personal computer. We consider this
machine next.
1.5 UNDERSTANDING YOUR
COMPUTER
All computers use four basic
operations and can be connected to
various types of devices.
Perhaps you know how to drive a car. But do you • Hardware: Hardware consists of all the Sur vival Tip
know what to do when it runs badly? And you’ve machinery and equipment in a computer
probably been using a personal computer. But do
you know what to do when it doesn’t act right— system. The hardware includes, among other Input is
covered in detail in
when, for example, it suddenly crashes (shuts devices, the keyboard, the screen, the printer, Chapter 5.
down)? and the “box”—the computer or processing
device itself. Hardware is useless without Introduction to
Cars are now so complicated that professional
mechanics are often required for even the smallest software. Information
problems. With personal computers, however, Software: Software , or programs, consists of
there are still many things you can do yourself— •
Technology 27
and should learn to do, so that, as we’ve all the electronic instructions that
tell the
suggested, you can be effective, efficient, and computer how to perform a task. These
employable. To do so, you first need to know how instructions come from a software developer in a
computers work. form (such as a CD, or compact disk, or an
Internet download) that will be accepted by the
How Computers Work: Three Key computer. Examples are Microsoft Windows 7
Concepts and Windows 8, Microsoft Office 2013, and
Apple Mac OS X Mountain Lion and Mavericks.
All computer users must understand
three basic principles: (1) Data is 3. THE BASIC OPERATIONS OF A COMPUTER.
turned into information; (2) hardware Regardless of type and size, all computers use the
own specific same four basic operations: (1) input, (2)
and software have their
functions; and (3) all computers involve processing, (3) storage, and (4) output. To this we
add (5) communications.
input, process
ing, storage, and output, Input operation: Input is whatever is put in
plus communications. •
(“input”) to a computer system. Input
can be
Do you always have to buy an off-the-shelf nearly any kind of data—letters, numbers,
computer? No. Could you customize your own symbols, shapes, colors, temperatures, sounds,
personal computer? Yes. Many ordinary users pressure, light beams, or whatever raw material
order their own customized PCs. Let’s con sider needs processing. When you type some words or
how you might do this. numbers on a keyboard, those words are
We’re not going to ask you to actually order a PC considered input data.
—just to pretend to do so. The purpose of this
exercise is to give you a basic overview of how a
computer works. This information will help you
when you go shopping for a new system. It will
also help you understand how your existing
system works, if you have one.
Before you begin, you need to understand three
key concepts.
5 or other device.
Communications: Often data
or information can be transmitted
4
by modem to or from other
computers, as via email or
posting to a website.
modem
(This one is external
and wireless.
monitor
Modems are usually
internal—on a circuit card
letters, numbers, and other
inside the system unit.) characters into electrical signals
readable by the processor. A microcomputer key board looks like a
typewriter keyboard, but besides having
ponents are assembled, the keyboard will be plugged into the back of the the motherboard.
computer in a socket intended for that purpose. (Cordless keyboards work
differently, as, of course, do smartphone keypads.) The brains of the computer are the processing and memory devices, which
are installed in the case, also called the system cabinet or system unit.
MOUSE A mouse is a nonkeyboard input device (“pointing device”) that
is used to manipulate objects viewed on the CASE & POWER SUPPLY Also known as the system unit , the case or
computer display screen. The mouse cord is system cabinet is the box that houses the processor chip (CPU), the
plugged into the back of the computer or into the memory chips, the motherboard (main circuit board), the power
back of the supply, and some secondary-storage devices —hard disk drive and CD or
keyboard after the other components are DVD drive, as we will explain. The case generally
assembled. Cordless comes in desktop or tower models. It includes a
mice are also available. power supply unit and a fan to keep the circuitry
In the next few years, it’s possible the mouse will from overheating.
be made
obsolete by the touch-screen interface, as with the Asus Vivo PROCESSOR CHIP It may be small and not look
Book laptop and Lenovo’s ThinkPad Twist, and even the gesture like much,
interface, with our hands, moving through the air, sending com but it could be the most expensive hardware
component of
panel 1.7 a build-it-yourself PC—and doubtless the most
Basic operations of a computer. (Many more components can be added; important.
these operations are illustrated in more detail in Chapters 4, 5, and 6.) A processor chip (CPU, for central processing
unit) is a
tiny piece of silicon that contains millions of
miniature
electronic circuits. The speed at which a chip processes
Mouse information is expressed in megahertz (MHz), millions of
mands to the computer. 98 (We discuss this further in Chapter 5.) processing cycles per second, or gigahertz (GHz), billions
29 of processing cycles per second. The faster the processor, the
more expensive it is.
Case
Memory chips mounted
on module
Connecting strip that
plugs into a socket in
the motherboard
Memory chip
known as RAM (random access memory) chips, represent primary
storage, or temporary, storage; they hold data before processing and
Processor chip information after processing, before it is sent along to an out put or
storage device. You’ll want enough memory chips to hold at least 2–5
Processing & Memory Hardware: Inside the System gigabytes, or roughly 2–5 billion characters, of data, which is adequate for
most student purposes. Students into heavy graphics use and game playing
A computer’s processing and memory devices are will need more memory. (We will explain the numbers used to measure
Cabinet storage capacities in a moment.)
inside the com
puter case on the main circuit board, called MOTHERBOARD Also called the system board, the motherboard is the
main circuit board in the computer. This is the big (usually) green circuitboard to which everything else—such as the keyboard,
mouse, and printer—attaches through connections (called ports ) in the back of the com
puter. The processor chip and memory chips are also installed on the motherboard.
The motherboard has expansion slots —for expanding the PC’s capabilities—which
give you places to plug in additional or upgraded circuit boards, such as those for
video, sound, and communications (modem). (
• See Panel 1.8.)
PUTTING THE COMPONENTS TOGETHER Now the components can be put together.
As the illustration at right shows, ❶ the memory chips are plugged into the motherboard.
Then ❷ the processor chip is plugged into the motherboard. Now ❸ the motherboard is
attached to the system cabinet. Then ❹ the power supply unit is connected to the system
cabinet. Finally, ❺ the wire for the power switch, which turns the computer on and off, is
connected to the motherboard.
Expansion
slots
2
BIOS chip
Plug microprocessor chip into motherboard
5
1
Plug memory
chips into
Built-in fan to cool
motherboard the microprocessor
CD/DVD
drive
3
Power
switch
4 Connect power
supply unit
(includes fan)
Hard-disk
Processor, memory,
hard-disk drive, video card, sound card, and
Hard-disk drive
Monitor Speaker CD/DVD drive panel 1.9
modem are Storage
Completely assembled
inside the system cabinet
Output
Processing
Output
basic PC hardware system (Some of the components will be without wires—that is, will be connected wirelessly.)
Introduction to Information Technology
Output Communications
Memory Input Input
Printer 33
System unit Keyboard Mouse
System software. A
System software for the PC. A version of Microsoft
version of Apple’s OS X system software
source onto the system’s hard disk and some special chips, so that you can Windows 7
have direct access to your hardware.)
Software is what makes the computer worthwhile, what makes it
functional for the user. There are two types— system software and
application software.
Creative Suite, which, among other things, is used to create art, manipulate
photos, and
build websites
Chapter 1
34
The Apple Macintosh microcomputer has its own software, as we explain in
Chapter 3. After the system software is installed, setup software for the
hard drive, the video and sound cards, and the modem must be installed.
These setup programs ( drivers, discussed in Chapter 3) often come on CDs
and can also be downloaded from the Internet.
1.6 WHERE IS INFORMATION TECHNOLOGY can perform calculations that once required a computer filling an entire
HEADED? room. And with nanotechnology, the trend can only continue. 99
Computers are headed in three basic directions—
miniaturization, faster speeds, and greater affordability— SPEED Thanks to miniaturization and new material used in making
and communications are improving connectivity, processors, computer makers can cram more hardware components into
interactivity, and support of multimedia. their machines, providing faster pro cessing speeds and more data storage
capacity.
How far we have come. At the beginning of the 20th century, most people
thought they would live the same life their parents did. Today most people AFFORDABILITY Processor costs today are only a fraction of what they
aren’t surprised by the pre diction that the Information Age will probably were 15 years ago. A state-of-the-art processor costing less than $1,000
transform their lives beyond recognition. Let’s consider the trends in the provides the same processing power as a huge 1980s computer costing
development of computers and communications and, most exciting, the more than $1 million.
area where they intersect.
These are the three major trends in computers. What about
Computers: Miniaturization, Speed, & Affordability communications?
Computers are becoming smaller, faster, and cheaper.
Since the days of ENIAC, computers have developed in three directions— Communications: Connectivity, Interactivity, &
and are continu ing to do so. Multimedia
Information technology systems are becoming more
MINIATURIZATION Everything has become smaller. ENIAC’s old-
connected and interactive, and they support more and
fashioned radio-style vacuum tubes gave way after 1947 to the smaller, more kinds of multimedia.
faster, more reliable transistor. A transis tor is a small device used as a
gateway to transfer electrical signals along predetermined paths (circuits). Once upon a time, we had the voice telephone system—a one-to-one
The next step was the development of tiny integrated circuits. Integrated medium. You could talk to your Uncle Joe, he could talk to you, and with
circuits are entire collections of electric circuits or pathways that are now special arrangements (conference calls) more than two people could talk
etched on tiny squares (chips) of silicon half the size of your thumbnail. with one another. We also had radio and television systems—one-to-many
Silicon is a natural element found in sand. In its pure form, it is the base media (or mass media). News announcers could talk to you on a single
material for computer processing devices. (All these items are discussed in medium such as television, but you couldn’t talk to them.
detail in Chapter 4.) Three recent developments in communications include:
The miniaturized processor, or microprocessor, in a personal desktop
CONNECTIVITY Connectivity refers to the connection of computers to
one another by a communications line in order to provide online
information access and/or the shar ing of peripheral devices. The
connectivity resulting from the expansion of computer net works has made
possible email and online shopping, for example.
PORTABILITY In the 1980s portability, or mobility, meant trading off computing power
and convenience in return for smaller size and weight. Today, however, we are at the point
where we don’t have to give up anything. As a result, experts have predicted that small,
powerful, wireless personal electronic devices will transform our lives far more than the
personal computer has done so far. “The new generation of machines will be truly personal
computers, designed for our mobile lives,” wrote one journalist two decades ago. “We
will read office memos between strokes on the golf course and answer messages from our
children in the middle of business meetings.” 100 Today, of course, smartphones and tablets
make such activities commonplace.
COLLABORATION A more recent trend is mass collaboration. Says technology writer John
Markoff, “A remarkable array of software systems makes it simple to share anything instantly,
and sometimes enhance it along the way.” 101 Another writer observed that the huge numbers of
people “online worldwide—along with their shared knowledge, social contacts, online reputa
tions, computing power, and more—are rapidly becoming a collective force of unprecedented
power.” 102 Examples are file-sharing, photo-sharing websites, calendar-sharing services,
group-edited informational (encyclopedic) sites called wikis, social-networking services, and
so-called citizen-journalism sites, in which average people write their own news items on the
Internet and comment on what other people post—an interactive, democratic form of mass
media. 103 Pooled ratings, for instance, enable people to create personalized Internet music
radio stations or Amazon.com’s millions of customer-generated product reviews.
Chapter 1
CLOUD COMPUTING: THE GLOBAL COMPUTER Previously called on-demand
computing, grid computing, or software as a service, cloud computing basically
means that instead of storing your software and/or data on your own PC or your
own company’s computers, you store it on servers on the Internet.104 You don’t
36
info!
managed by the provider (the consumer/user needs
nothing but a more
personal
computer/mobile More on Cloud
device and Computing
Internet access). A
“cloud” (the server www.20thingsilearned.com/ cloud-computing/1/
Cloud computing involves delivering services over the http://searchcloudcomputing. techtarget.com/definition/ cloud-
business
Internet. The name cloud computing was inspired by computing/
connected to the
the cloud symbol that’s often used to represent the www.wikinvest.com/concept/ Cloud_Computing/
Internet) can be
Internet in professional diagrams. Cloud services are www.youtube.com/
private or public.
usually sold on demand, typically by the minute or the watch?v 5 uYGQcmZUTaw
hour; users can have as much or as little of a service as
they want at any given time; and the service is fully
care where the servers are located; they’re out there somewhere— “in the cloud”—run by special cloud-service businesses, such as Amazon Web
Services, Rackspace, Google, and Microsoft. The idea here is that companies can tap into computers/servers as they are needed, just as they do now
with the electric power grid, split ting their computing workload among data centers in different parts of the world. The expectation of technology
experts is that companies will find cloud computing cheaper and easier than man aging their own microcomputers, servers, and software (although
security is a worry). 105 Google, says one technology writer, is bet ting that its touch-screen Chromebook laptop will “propel the shift toward a
computing model where most of our applications and data live online” in the cloud. 106
“BIG DATA” & ARTIFICIAL INTELLIGENCE Ninety percent of the data in the world today was created in just the last two years, accord ing to an IBM
source. “This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase
transaction records, and cellphone . . . signals, to name a few. This data is Big Data. ” 107
More formally, Big Data is data that is so large and complex that it cannot be processed using conventional methods, such as ordinary database
management software. The data may consist of not only traditional sources for the study of words, such as books, news articles, and academic journals,
but also websites, Twitter messages, and blog posts. 108 With companies doing computing “in the cloud” and providing tools for mobile users, the
economics of processing huge amounts of data or providing access for millions of users has become considerably cheaper. 109
The combination of cloud-computing storage of Big Data, along
According to inventor and futurist Raymond Kurzweil, technological change will become so rapid and so profound that human bodies and brains will merge with
machines.
37
www.epa.gov/epawaste/conserve/ materials/ecycling/ language.
Chapter 1 38 www.recycles.org/
Sur vival Tip http://ww1.pcdisposal.com/
“E” Also Stands for Ethics
www.computerhope.com/disposal. htm
Be
Many important ethical issues are
Ethical about
Disposing of Old involved in the use of informa
Computer
tion
Equipment ethics technology.
Just got a new
computer?
Every computer user will have to wrestle with
Where to donate or ethical issues related to the use of informa tion
recycle your old one? technology. Ethics is defined as a set of moral
Check with
schools, after-school more
programs, churches,
info! values or principles that govern the conduct of
an individual or a group. Because ethical
and the following questions arise so often in connec tion with
websites: The 10 Commandments of Computer Ethics information technology, we will note them,
www.crc.org/ The Computer Ethics Institute says: wherever they appear in this book, with the
symbol shown at left. Below, for example, are
1. Thou shalt not use a com puter to harm other people. 2.
http://ngm.nationalgeographic. com/geopedia/E-Waste Thou shalt not interfere with other people’s computer work. 3.
some important ethical concerns pointed out by
http://earth911.com/recycling/ electronics/computers/ Thou shalt not snoop around in other people’s computer files. Tom Forester and Perry Morrison in their book
4. Thou shalt not use a com puter to steal. Computer Ethics.112 These considerations are only
5. Thou shalt not use a com puter to bear false witness. 6.
Thou shalt not copy or use proprietary software for which you
a few of many; we’ll discuss others in subsequent
have not paid. chapters.
7. Thou shalt not use other people’s computer resources
without authorization or proper compensation. SPEED & SCALE Great amounts of information
8. Thou shalt not appropriate other people’s intellectual
output. 9. Thou shalt think about the social consequences of can be stored, retrieved, and transmitted at a
the program you are writing or the system you are designing. speed and on a scale not possible before,
10. Thou shalt always use a computer in ways that ensure especially now in the era of cloud comput ing and
consideration and respect for your fellow humans. Big Data. Despite the benefits, this has serious
Source: http://computerethics institute.org/images/ The Ten implications “for data security and personal
Commandments Of Computer Ethics.pdf.
TECH TALES Artificial Intelligence: The Use of privacy,” as well as employment, Forester and
Morrison say, because information technology
Algorithms to Create a Hit Song
can never be considered totally secure against
In 2004, guitarist-songwriter New Zealander Ben unauthorized access.
Novak, hoping to land a record deal, came across
a website that claimed, for $50, to provide an UNPREDICTABILITY Computers and
algorithm that would find hit songs. The communications are pervasive, touching nearly
algorithm, which compared the structure of his every aspect of our lives. However, at this point,
song with those of the past, gave his song, “Turn compared to other pervasive technologies— such
Your Car Around,” a high rating for hit potential— as electricity, television, and automobiles—
on a level with such standards as the Eagles’
information technology seems a lot less
“Take It Easy” and Steppenwolf’s “Born to Be
predictable and reliable.
Wild.” The algorithm’s owner, Mike McCready,
connected Novak with a record label, and the
song eventually ended up near the top of the COMPLEXITY Computer systems are often
European popular music charts. incredibly complex—some so complex that they
are not always understood even by their creators.
The same algorithm, incidentally, predicted the “This,” say Forester and Morrison, “often makes
success of the band Maroon 5 and the artist
them completely unmanageable,” producing
Norah Jones before they became stars. 111
massive foul-ups or spectacu larly out-of-control
There are several fields of AI, among them the costs.
following. Pattern recognition identi fies recurring
patterns and recognizes the connections between Ethics and security can often be talked about in
the patterns and similar patterns stored in a the same breath, since secure computer systems
database, as was the case with the McReady obviously go a long way toward keeping people
algorithm. Virtual reality is computer-generated ethical and honest. When we discuss security,
artificial reality that projects a person into a you will see the icon below.
sensation of three dimensional space. Robotics is
the development and study of machines that can
perform work that is normally done by people.
Natural language processing is the study of ways
for computers to recognize and understand human
SECURITY
EXPERIENCE BOX
Better Organization & Time Management:
Dealing with the Information Deluge in
College—& in Life
Devote the First 1½ Hours of Your Day
A
to Your Most Important Task. Writing a
paper? Studying a hard subject? Make it your first task of the day,
and concentrate on it for 90 minutes. After that, your brain will
n Experience Box appears at the end of each chapter. probably need a rest, and you can answer email, return phone calls,
and so on. But until that first break, don’t do anything else, because
Each box offers you the opportunity to acquire useful experience it can take the brain 20 minutes to refocus.
that directly applies to the Digital Age. This first box illustrates
skills that will benefit you in college,
Improving Your Memory Ability
in this course and others. (Students reading the first 10 edi tions of our
book have told us they received substantial benefit from these Memorizing is, of course, one of the principal requirements for
suggestions.) succeeding in college. And it’s a great help for success in life afterward.
Some suggestions:
“How on earth am I going to be able to keep up with what’s required of Space Your Studying, Rather Than Cramming. Cramming— making a
me?” you may ask yourself. “How am I going to handle the information frantic, last-minute attempt to memorize massive amounts of
glut?” The answer is by learning how to learn. By building your skills as a material—is probably the least effective means
learner, you certainly help yourself do better in college, and you also train of absorbing information. Research shows that it’s best to space out
yourself to be an information manager in the future. your studying of a subject over successive days. A series of study
sessions over several days is preferable to trying to do it all during the
Using Your “Prime Study Time” same number of hours on one day. It is repetition that helps to move
Each of us has a different energy cycle. The trick is to use it effectively. infor mation into your long-term memory bank.
That way, your hours of best performance will coin cide with your heaviest Review Information Repeatedly—Even “Overlearn” It. By repeatedly
academic demands. For example, if your energy level is high during the reviewing information—known as “ rehearsing”—you can improve both
evenings, you should plan to do your studying then. your retention and your understanding of it. Overlearning is continuing
To capitalize on your prime study time, take the following steps: (1) to review material even after you appear to have absorbed it. Also,
Make a study schedule for the entire term, and indicate the times each recent research studies show that taking a test after reading a block of
day during which you plan to study. (2) Find some good places to study— material improves recall of the mate rial, even a week later. This
places where you can avoid distractions. (3) Avoid time wasters, but give method seems to work better than simple reading, reading the block in
yourself frequent rewards for studying, such as a TV show, a favorite piece segments, and concept mapping (creating a diagram of the concepts
of music, or a conversation with a friend.
Introduction to Information Technology
Learning to Focus after one has finished reading the block of material). 117 Use
Multitasking is shifting focus from one task to another in rapid Memorizing Tricks. There are several ways to orga nize information so
succession. When you read this textbook while listening to music and that you can retain it better. For exam ple, you can make drawings or
watching TV, you may think you’re simultaneously doing three separate diagrams (as of the parts of a computer system). Some methods of
tasks, but you’re really not. “It’s like playing tennis with three balls,” says establishing associations between items you want to remember are
one expert. 113 Today multitasking is easy and focus is hard because of all
the things demanding our attention—phone calls, email, text messages, given on the next page . (
music, radio, TV, Twitter, MySpace, Facebook, various blogs and websites.
• See Panel 1.10 .)
“You can drive yourself crazy trying to multitask and answer every email
message instantly,” says one writer. “Or you can rec ognize your brain’s Improving Your Reading Ability: The SQ3R Method SQ3R stands
finite capacity for processing information.” 114 for “survey, question, read, recite, and review.” 118 The strategy behind
Here are some tips on learning to concentrate: 115 the method is to break down a reading assignment into small segments
and master each before moving on. The five steps of the SQ3R method
Choose What to Focus On. “People don’t realize that attention is a are as follows:
finite resource, like money,” one expert says. “Do you want to invest
your cognitive cash on end less Twittering or Net surfing or couch 1. Survey the chapter before you read it: Get an overview of the chapter
potatoing [watching TV]?” She adds, “Where did the idea come from before you begin reading it. If you have a sense of what the material is
that any one who wants to contact you can do so at any time? You about before you begin read
need to take charge of what you pay attention to instead of responding 39
to the latest stimuli.” 116 For example, to block out noise, you can wear ing it, you can predict where it is going. In this text, we
earplugs while reading.
• Mental and physical imagery: Use your visual and other senses to construct a personal image of what you want to
remember. Indeed, it helps to make the image humorous, action-filled, or outrageous in order to establish a
personal connection. Example: To remember the name of the 21st president of the United States, Chester
Arthur, you might visualize an author writing the number “21” on a wooden chest. This mental image helps you
associate chest (Chester), author (Arthur), and 21 (21st president).
• Acronyms and acrostics: An acronym is a word created from the first letters of items in a list. For instance, Roy G.
Biv helps you remember the colors of the rainbow in order: red, orange, yellow, green, blue, indigo, violet. An
acrostic is a phrase or sentence created from the first letters of items on a list. For example, Every Good Boy
Does Fine helps you remember that the order of musical notes on the treble staff is E-G-B-D-F.
• Location: Location memory occurs when you associate a concept with a place or imaginary place. For example,
you could learn the parts of a computer system by imagining a walk across campus. Each building you pass could
be associated with a part of the computer system.
• Word games: Jingles and rhymes are devices frequently used by advertisers to get people to remember their
products. You may recall the spelling rule “I before E except after C or when sounded like A as in neighbor or
weigh.” You can also use narrative methods, such as making up a story.
panel 1.10
Some memorizing tricks
offer on the first page of every chapter a list of the main headings 40
and accompanying key questions. At the end of each chapter we you formulated.
offer a review of terms and explanations. Clearly the SQ3R method takes longer than simply reading with a
2. Question the segment in the chapter before you read it: This step is rapidly moving color marker or underlining pencil. How ever, the technique
easy to do, and the point, again, is to get you involved in the material. is far more effective because it requires your involvement and
After surveying the entire chapter, go to the first segment—whether a understanding. These are the keys to all effective learning.
whole section, a sub section, or even just a paragraph, depending on the
level of difficulty and density of information. Look at the topic head ing Learning from Lectures
of that segment (or first sentence of a very difficult para graph). In your Does attending lectures really make a difference? Research concludes
mind, restate the heading as a question. that students with grades of B or above were more apt to have better
After you have formulated the question, go to steps 3 and 4 class attendance than students with grades of C– or below. 119
(read and recite). Then proceed to the next segment of the Some tips for getting the most out of lectures:
chapter, and restate the heading there as a question, and so on. Take Effective Notes by Listening Actively. Research shows that good
3. Read the segment about which you asked the question: When you
test performance is related to good note taking. 120 And good note
read the segment you asked the question about, read with purpose, to
taking requires that you listen actively—that is, participate in the
answer the question you formulated. Underline or color-mark sentences
lecture process. Here are some ways to take good lecture notes:
that you think are important, if they help you to answer the ques tion.
Read this portion of the text more than once, if necessary, until you can • Read ahead and anticipate the lecturer: Try to antici pate what the
answer the question. In addition, determine whether the segment instructor is going to say, based on your previous reading. Having
covers any other signifi cant questions, and formulate answers to these background knowledge makes learning more efficient.
too. After you have read the segment, proceed to step 4. (Perhaps you • Listen for signal words: Instructors use key phrases such as, “The most
can see where this is all leading. If you read in terms of questions and important point is . . . ,” “There are four reasons for . . . ,” “The chief
answers, you will be better prepared when you see exam questions reason . . . ,” “Of special importance . . . ,” “Consequently. . . .” When you
about the material later.) hear such signal phrases, mark your notes with a ! or *.
4. Recite the main points of the segment: Recite means “say aloud.” • Take notes in your own words: Instead of just being a stenographer, try
Thus, you should speak out loud (or softly) the answer to the principal to restate the lecturer’s thoughts in your own words, which will
question or questions about make you pay attention more.
Chapter 1 • Ask questions: By asking questions during the lecture, you necessarily
the segment and any other main points. participate in it and increase your understanding.
5. Review the entire chapter by repeating questions: After you have Review Your Notes Regularly. Make it a point to review your notes
read the chapter, go back through it and review the main points. Then, without regularly—perhaps on the afternoon after the lecture, or once or twice
a week. We cannot emphasize enough the importance of this kind of
looking at the book, test your memory by repeating the questions and answers
reviewing.
algorithm (p. 37) Formula, procedure, or set of steps for solving a particular application software (p. 34) Software that enables you to per form specific
problem. Why it’s important: Algorithms are essen tially the foundation, the tasks—solve problems, perform work, or entertain yourself. Why it’s
building blocks, of computer science. Much of AI is based on the use of important: Application software such as word processing, spreadsheet,
algorithms, as is software code. database management, graphics, and communications packages are
commonly used tools for increas ing people’s productivity. ( Apps is short for
“applications.”) communications lines to provide online informa tion access and/or the
sharing of peripheral devices. Why it’s important: Connectivity is the
artificial intelligence (AI) (p. 37) Group of related technologies used for foundation of the advances in the Information Age. It provides online
developing machines to emulate human qualities, such as learning, access to countless types of information and services. The connectivity
reasoning, communicating, seeing, and hearing. Why it’s important: Given the resulting from the expansion of computer networks has made possible
potential of artificial intelligence, it will likely have far-reaching effects on email and online shopping, for example.
human life in the years to come; the studies of the creation of intelligence
involve a con tinual process to eventually solve many problems. cyberspace (p. 17) Area that includes not only the online world and the
Internet in particular but also the whole wired and wire less world of
avatar (p. 6) Computer depiction of a human, often found in online communications in general. Why it’s important: More and more human
videogames. Why it’s important: Avatars can be helpful in training, such as by activities take place in cyberspace.
representing imaginary customers.
data (p. 27) Raw facts and figures that are processed into information. Why
Big Data (p. 37) Data that is so large and complex that it cannot be processed it’s important: Users need data to create useful information.
using conventional methods. Why it’s important: The amount of data in our
world has been exploding, and analyzing large data sets—Big Data—has database (p. 11) Computer system with a collection of inter related files that is
become a key basis of business competition, productivity growth, and
designed and built for a specific purpose; technology for pulling together facts that
innovation. Managing Big Data has also become critical to the functioning of
allows the slicing and dicing and mixing and matching of data. Why it’s important:
government.
Introduction to Information Technology
blogs (weblogs) (p. 14) Frequently updated sites on the World Wide Web
Businesses and organizations build databases to help them to track and
intended for public consumption that contain a writer’s observations,
manage their affairs. In addition, online database services put enormous
opinions, images, and links to other web sites. Why it’s important: Blogs are
research resources at the user’s disposal.
used, for example, for low cost marketing, improving writing skills, trying out
new ideas with people, getting experience in certain areas before looking for
a job, satisfying one’s need for creativity, and for putting something desktop PC (p. 24) Microcomputer unit that sits on a desk, with the
interesting out into the world. keyboard in front and the monitor often on top. Why it’s important: Desktop
PCs and tower PCs are the most commonly used types of microcomputer.
case (p. 30) Also known as the system unit or system cabinet; the box that
houses the processor chip (CPU), the memory chips, the motherboard, the distance learning (p. 5) Also known as e-learning and online learning; name
power supply, and storage devices— hard-disk drive and CD or DVD drive. Why given to online education programs. Why it’s important: Provides students
it’s important: The case protects many important processing and storage increased flexibility because they do not have to be in an actual classroom.
components. Online classes are becom ing increasingly popular.
CD (compact disk) drive (p. 32) Storage device that uses laser technology to downloading (p. 20) Transferring data from a remote computer to one’s own
read data from optical disk. Why it’s important: New software is often supplied computer. Why it’s important: Allows text, music, 41
on CDs, in addition to being down loaded from websites. The newest version is and images to be transferred quickly by telecommunications.
called DVD (digital video disk). The DVD format stores more data than the CD DVD (digital video disk) drive See CD (compact disk) drive. e-learning See
format.
distance learning.
central processing unit (CPU) See processor chip. chip See
email (electronic mail) (p. 5) Messages transmitted over a computer
processor chip.
network, most often the Internet. Why it’s important: Email has become
universal and is heavily used in business and professional work.
clients (p. 26) Computers and other devices connected to a server, a central
computer. Why it’s important: Client-server networks are used in many e-readers (e-book readers) (p. 25) Electronic devices that can download e-
organizations for sharing databases, devices, and programs. books—digital versions of regular books, articles, and magazines from
cloud computing (p. 36) Method of storing your software and/ or data not various suppliers. Why it’s important: E-books are cheaper than print books,
on your own PC or company’s computers but rather on servers on the and e-readers can easily be put in a purse or a pocket. They can download
Internet. Why it’s important: Users could tap into computers as they are books via a wireless network almost anywhere or from a computer and are
needed, distributing computing work load among data centers in different relatively inexpensive.
parts of the world, perhaps
making computing cheaper and more reliable.
ethics (p. 38) Set of moral values or principles that govern the conduct of
an individual or a group. Why it’s important: Ethical questions arise often in
communications technology (p. 4) Also called telecommunica tions connection with information technology.
technology; consists of electromagnetic devices and sys tems for
communicating over any distance. Why it’s important: Communications expansion slots (p. 30) Internal “plugs” used to expand the PC’s
systems using electronic connections have helped expand human capabilities. Why it’s important: Expansion slots give you places to plug in
communication beyond face-to-face meetings. additional circuit boards, such as those for video, sound, and
communications (modem).
computer (p. 4) Programmable, multiuse machine that accepts data—raw
facts and figures—and processes (manipulates) it into useful information, hard-disk drive (p. 32) Device that stores billions of characters of data on a
such as summaries and totals. Why it’s important: Computers greatly nonremovable disk platter usually inside the com puter case. Why it’s
speed up problem solving and other tasks, increasing users’ productivity. important: Hard disks have a very large stor age capacity. Nearly all
microcomputers use hard disks as their principal secondary-storage
connectivity (p. 35) Ability to connect computers to one another by medium.
hardware (p. 27) All the machinery and equipment in a com puter system. on screen, but viewers still want more pocket-size portability than is possible
Why it’s important: Hardware runs under the control of software and is with a laptop.
useless without it. However, hardware contains the circuitry that allows
processing. modem (p. 33) Device that sends and receives data over tele phone lines or
cable lines, or wirelessly over a network, to and from computers. Why it’s
information (p. 27) Data that has been summarized or other wise important: A modem enables users to transmit data from one computer to
transformed for use in decision making. Why it’s important: The whole another.
purpose of a computer (and communications) system is to produce (and
transmit) usable information. monitor (p. 32) Display device that takes the electrical signals from the video
card and forms an image using points of colored light on the screen. Why it’s
information technology (IT) (p. 3) Technology that helps pro duce, important: Monitors enable users to view output without printing it out.
manipulate, store, communicate, and/or disseminate information. Why it’s
important: Information technology is bring ing about the fusion of several motherboard (p. 30) Also called the system board; main circuit board in the
important industries dealing with computers, telephones, televisions, and computer. Why it’s important: This is the big green circuit board to which
various handheld devices. everything else — such as the keyboard, mouse, and printer — is attached. The
processor chip and memory chips are also installed on the motherboard.
input (p. 27) Whatever is put in (“input”) to a computer system. Input
devices include the keyboard, the touch screen, and the mouse. Why it’s mouse (p. 29) Nonkeyboard input device, called a “pointing device,” used to
important: Useful information cannot be pro duced without input data. manipulate objects viewed on the computer display screen. Why it’s
important: For many purposes, a mouse is easier to use than a keyboard
interactivity (p. 35) Two-way communication; a user can respond to for inputting com mands. Also, the mouse is used extensively in many
information he or she receives and modify the process. Why it’s important: graphics programs.
Interactive devices allow the user to actively partici pate in a technological process multimedia (p. 35) From “multiple media”; technology that presents
information in more than one medium—including text, graphics, animation,
instead of just reacting to it. Chapter 1 video, and sound—in a single integrated communication. Why it’s important:
Internet (the “Net” or “net”) (p. 19) Worldwide computer net work that Multimedia is used increas ingly in business, the professions, and education
connects hundreds of thousands of smaller networks linking computers at to improve the way information is communicated.
academic, scientific, and commercial insti tutions, as well as individuals. Why it’s
important: Thanks to the Internet, millions of people around the world can share all nanotechnology (p. 23) Technology whereby molecule-size
types 42 nanostructures are used to create tiny machines for holding data or
of information and services. performing tasks. Why it’s important: Could result in tremendous
keyboard (p. 28) Input device that uses keys to convert letters, numbers, and computer power in molecular-size devices. ( Nano means “one-billionth.”)
other characters into electrical signals readable by the processor. Why it’s
important: Keyboards are the most common kind of input device. netbook (p. 25) Low-cost, lightweight computer with tiny dimen sions and
with functions designed for basic tasks, such as web searching, email, and
local area network (LAN) (p. 24) Network that connects, usu ally by special word processing; weighs 2.25–3.2 pounds. Why it’s important: These
cable and also wirelessly, a group of desktop PCs and other devices, such as cheaper computers fill a tech nological category between notebooks and
printers, in an office or a building. Why it’s important: LANs have replaced handheld devices.
mainframes for many functions and are considerably less expensive.
network (p. 4) Communications system connecting two or more computers.
mainframe (p. 24) Second-largest computer available, after the Why it’s important: Networks allow users to share applications and data
supercomputer; capable of great processing speeds and data storage. Small and to use email. The Internet is the largest network.
mainframes are often called midsize computers. Why it’s important:
Mainframes are used by large organizations (banks, airlines, insurance notebook computer (p. 25) Also called laptop computer; light weight portable
companies, universities) that need to process millions of transactions. computer with a built-in monitor, keyboard, hard disk drive, battery, and
adapter; weighs 1.8–12 pounds. Why it’s important: Notebooks and other
memory chip (p. 30) Also known as RAM (for “random access memory”) small computers have provided users with computing capabilities in the field
chip; primary (temporary) storage. Why it’s important: Holds data before and on the road; however, they are now being displaced by tablets.
processing and information after processing, before it is sent along to an
output or storage device. online (p. 4) Use of a computer or some other information device, connected
through a network, to access information and services from another computer
microcomputer (p. 24) Also called personal computer ( PC ) ; small computer or information device. Why it’s important: Online communication is widely
that fits on or next to a desk or can be carried around. Why it’s important: The used by businesses, services, individuals, and educational institutions.
microcomputer reduced the reli ance on mainframes and has provided more
ordinary users with access to computers. It can be used as a stand-alone online learning See distance learning.
machine or connected to a network and is essential in many businesses and
professions. online relationship site (p. 14) Electronic forum that people may join in the
hope of meeting compatible companions or mates. Why it’s important:
microcontroller (p. 26) Also called an embedded computer; the smallest This is an example of how informa tion technology is changing people’s
category of computer. Why it’s important: Microcon trollers are the tiny, personal lives.
specialized microprocessors built into “smart” electronic devices, such as
appliances and automobiles. output (p. 28) Whatever is output from (“put out of”) the com puter system;
the results of processing. Why it’s important: People use output to help
mobile device (p. 25) Fully Internet-integrated, handheld multi media them make decisions. Without output devices, computer users would not
computer highly compatible with desktop microcomputers and laptops. Why be able to view or use the results of processing.
it’s important: Some mobile devices are too small to adequately view images
peripheral device (p. 32) Any component or piece of equipment that expands speakers (p. 32) Devices that play sounds transmitted as elec trical signals
a computer’s input, storage, or output capabilities. Examples include printers from the sound card. Speakers are connected to a single wire plugged into
and disk drives. Why it’s important: Most computer input and output functions the back of the computer, or they are built into the computer. Why it’s
are performed by peripheral devices. important: See sound card.
43
personal digital assistant (PDA) (p. 25) Also known as hand held computer; supercomputer (p. 23) High-capacity computer with thousands of
used as a schedule planner and address book and to prepare to-do lists and processors; the fastest calculating device ever invented. Costs up to $350
send email and faxes. Why it’s important: PDAs make it easier for people to million or more. Why it’s important: Supercom puters are used primarily for
do business and communicate while traveling. research purposes, airplane design, oil exploration, weather forecasting, and
other activities that can not be handled by mainframes and other less
primary storage (p. 28) Also called memory; internal computer circuitry that powerful machines.
temporarily holds data waiting to be processed.
Why it’s important: By holding data, primary storage enables the processor system software (p. 34) Software that enables the computer to perform
to process. essential operating tasks. Why it’s important: Appli cation software cannot
run without system software. System software consists of several programs.
printer (p. 33) Output device that produces text and graphics on paper. Why The most important is the operating system, the master control program
it’s important: Printers provide one of the principal forms of computer that runs the computer. Examples of operating system software for the PC
output. are various Microsoft programs (Windows), Unix, Linux, and the Macin tosh
operating system.
processing (p. 28) The manipulation a computer does to trans form data
into information. Why it’s important: Processing is the essence of the system unit See case.
computer, and the processor is the computer’s “brain.”
tablet computer (pp. 2, 25) Wireless portable computer, such as Apple’s
processor chip (p. 30) Also called the processor, the CPU (cen tral iPad, primarily operated via a touch screen. Why it’s important: Tablet
processing unit), or simply chip; tiny piece of silicon that con tains millions computers are easy to use and easy to carry around, and they don’t require
of miniature electronic circuits used to process data. Why it’s important: a keyboard. The screen is a 7- to 10-inch touch screen (one can manipulate
Chips have made possible the develop ment of small computers. the screen contents
directly with one’s hand or a stylus.) Tablet computers support
robot (p. 8) Automatic device that performs functions ordinar ily performed multimedia.
by human beings. Why it’s important: Robots help perform tasks that
humans find difficult or impossible to do. terminal (p. 24) Input and output device that uses a keyboard for input and
a monitor for output; it cannot process data. Why it’s important: Terminals
secondary storage (p. 28) Also called storage; devices and media that are generally used to input data to and receive data from a mainframe
store data and programs permanently—such as disks and disk drives, tape computer system.
and tape drives, CDs and CD drives. Why it’s important: Without secondary
storage, users would not be able to save their work. Storage also holds the texting (text messaging) (p. 17) Sending and receiving short written
computer’s software. messages between mobile phones or other portable or
server (p. 26) Also called network server; central computer in a network
that holds collections of data (databases) and programs for connecting
PCs, workstations, and other devices, which are called clients. Why it’s CHAPTER REVIEW
important: Servers enable many users to share equipment, programs, and
data (linked together in a client-server network).
More and more educators are favoring an approach to learn ing
smartphone (p. 2) Cellphone with built-in applications, multi media
(presented by Benjamin Bloom and his colleagues in Tax onomy of
capability, and Internet access. Why it’s important: The smartphone has
Educational Objectives) that follows a hierarchy of six critical-thinking
made almost everything we do more portable and immediate.
skills: (a) two lower-order skills—memori zation and comprehension—and
(b) four higher-order skills— application, analysis, synthesis, and
social network (p. 3) Site on the World Wide Web (such as Facebook and Twitter) evaluation. While you may be able to get through many introductory
that allows users to interact and develop communities around similar interests— college courses by simply memorizing facts and comprehending the
and use mobile devices to research products and compare prices. Why it’s basic ideas, to advance further you will probably need to employ the
four higher-order thinking skills.
important: Introduction to Information Technology
In the Chapter Review at the end of each chapter, we have
Social networks—for good or ill—are affecting almost every way people implemented this hierarchy in a three-stage approach, as follows:
interact and how all their personal information is used.
• Stage 1 learning—memorization: “I can recognize and recall
software (p. 27) Also called programs; step-by-step electroni cally encoded information.” Self-test questions, multiple-choice
instructions that tell the computer hardware how to perform a task. Why
it’s important: Without software, hard ware is useless.
sound card (p. 32) Special circuit board that enhances the com puter’s
Chapter 1
fixed devices. Why it’s important: Text messaging is the most widely used
sound-generating capabilities by allowing sound to be output through
data application.
speakers. Why it’s important: Sound is used in multimedia applications.
Also, many users like to listen to music CDs on their computers.
tower PC (p. 24) Microcomputer unit that sits as a “tower,” often on the floor,
freeing up desk space. Why it’s important: Tower PCs and desktop PCs are the
most commonly used types of microcomputer. of Internet servers that support specially formatted documents in multimedia
form—sounds, photos, and video as well as text. Why it’s important: The web
uploading (p. 20) Transferring data from one’s own computer to a remote is the most widely known part of the Internet.
computer. Why it’s important: Allows text, music, and images to be
transferred quickly by telecommunications.
video card (p. 32) Circuit board that converts the processor’s output
information into a video signal for transmission through a cable to the
monitor. Why it’s important: Virtually all computer users need to be able to
view video output on the monitor. questions, and true-false questions enable you to test how well you
recall basic terms and concepts. • Stage 2 learning—comprehension: “I
virtual (p. 10) Something that is created, simulated, or carried on by means of can recall informa tion in my own terms and explain it to a friend.” Using
a computer or a computer network. Why it’s important: Allows actual objects
open-ended, short-answer questions, we ask you to reex press terms and
to be represented in computer-based form.
concepts in your own words.
workstation (p. 24) Smaller than a mainframe; expensive, pow erful computer • Stage 3 learning—applying, analyzing, synthesizing, evaluating: “I can
generally used for complex scientific, mathemati cal, and engineering apply what I’ve learned, relate these ideas to other concepts, build on
calculations and for computer-aided design other knowledge, and use all these thinking skills to form a
judgment.” In this part of the Chapter Review, we ask you to put the
and computer-aided manufacturing. Why it’s important: The power of
ideas into effect using the activities described, some of which
workstations is needed for specialized applications too large and complex to
include Internet activities. The purpose is to help you take possession
be handled by PCs.
of the ideas, make them your own, and apply them realistically to
your life.
World Wide Web (the “Web” or the “web”) (p. 19) The inter connected system
44
s
MEMORIZATION
ta
g
e 1 LEARNING
“I can recognize and recall information.”
3. Briefly define cyberspace. 11. Describe some ways that information technology can be used to help
people find jobs and to help jobs find people.
4. What is the difference between software and hardware? 5. What is a local
12. Compare the use of email to the use of the telephone and of
area network? conventional letters sent via the postal system. Which kinds of
6. What is multimedia? communications are best suited for which medium?
13. What is the basic meaning of cloud computing?
s g
ta e
3 LEARNING