Original PDF Visualizing Technology Complete 6th Edition by Debra Geoghan PDF
Original PDF Visualizing Technology Complete 6th Edition by Debra Geoghan PDF
Original PDF Visualizing Technology Complete 6th Edition by Debra Geoghan PDF
Something Special for You 246 A Picture Is Worth a Thousand Words 292
Objective 4 Compare Specialized Operating Systems 246 Objective 3 Identify Several Ways to Edit and Print
Embedded Operating Systems 247 Photos 292
Editing Photos 293
The NOS Knows 250 Printing and Sharing Photos 294
Objective 5 Compare the Most Common Network Operating
Systems 250 How to Edit a Photo Using the Windows Photos or
What is an NOS? 251 macOS Photos App 298
CONTENTS vii
Chapter 7 Chapter 8
The Internet 336 Communicating and Sharing: The
Social Web 386
Internet Timeline 338
Objective 1 Recognize the Importance of the Internet 338 Talk to Me 388
How It All Got Started 339 Objective 1 Compare Different Forms of Synchronous Online
World Wide Web 339 Communication 388
Internet2 340 Chat and IM 389
VoIP 391
Get Connected 342
Objective 2 Compare Types of Internet Connections 342 Leave a Message 392
How Do You Get Connected? 343 Objective 2 Compare Different Forms of Asynchronous
Access for All 347 Online Communication 392
How do You Read and Send Email? 393
Surf’s Up 348 Parts of an Email Message 394
Objective 3 Compare Popular Web Browsers 348 Text and Multimedia Messaging 396
Browsers 349 Forums and Discussion Boards 397
Configuring Your Web Browser 352
Add-Ons, Plug-Ins, and Toolbars 353 There’s a Place for Everyone . . . 398
Objective 3 Discuss the Impact of Social Media in Society 398
How to Use Google Drive 354 Social Media 399
Social Video, Image, and Music Sites 401
Navigating the Net 358
Presenting Yourself Online 404
Objective 4 Demonstrate How to Navigate the Web 358
Web Addresses 359 How to Create a LinkedIn Profile 406
Smart Searching 361
Get Your Word Out 410
How to Create a Website Using Wix 364 Objective 4 Locate User-Generated Content in the Form
Would I Lie to You? 372 of a Blog or Podcast 410
Blogs 411
Objective 5 Discuss How to Evaluate the Credibility
Podcasts 412
of Information Found on the Web 372
RSS 413
Who Wrote It? 373
Crowdfunding 413
What About the Design? 374
Objectives Recap 377 How to Create a Blog with Blogger 414
Key Terms 377
The Wisdom of the Crowd 418
Summary 377
Objective 5 Discuss How Wikis and Other Social Media Sites
Application Projects 382 Rely on the Wisdom of the Crowd 418
Wikis 419
Social Review Sites 420
Social Bookmarking and News Sites 420
viii CONTENTS
E-Commerce 422 Software and Protocols 466
Objective 6 Explain the Influence of Social Media on Objective 4 List and Describe Network Software and
E-commerce 422 Protocols 466
Types of E-Commerce 423 Peer-to-Peer Network Software 467
How Safe Is My Credit Card? 425 Client–Server Network Software 469
Network Protocols 470
Online Tools for Business 426
Objective 7 Compare Social Media and Other Online How to Check Your System Security Software 474
Technologies Used in Business 426 Protecting Your Network 478
Facebook Pages 427
Twitter 428
Objective 5 Explain How to Protect a Network 478
Layer 1: The Fence 479
Search Engines 429
Layer 2: Door Locks 480
Digital Communication Tools 430
Layer 3: Alarm Systems 481
Objectives Recap 435
Layer 4: Guard Dogs 482
Key Terms 435
Objective Recap 485
Summary 435
Key Terms 485
Application Projects 440
Summary 485
Application Projects 490
Chapter 9
Networks and Communication 444 Chapter 10
Security and Privacy 494
From Sneakernet to Hotspots 446
Objective 1 Discuss the Importance of Computer Cybercrime: They Are Out to Get You 496
Networks 446
Objective 1 Recognize Different Types of Cybercrime 496
Peer-to-Peer Networks 447
Personal Cybercrime 497
Client–Server Networks 449
Cybercrime against Organizations 500
How to Examine Network and Sharing Settings 450
How to Configure Secure Browser Settings Using
LANs and WANs 454 Google Chrome 502
Objective 2 Compare Different Types of LANs and WANs 454 Malware: Pick Your Poison 506
Small Networks 455
LAN Topologies 456
Objective 2 Differentiate between Various Types of
Large Networks 457 Malware 506
Spam and Cookies 507
Network Hardware 460 Adware and Spyware 508
Objective 3 List and Describe the Hardware Used in Both Viruses, Worms, Trojans, and Rootkits 509
Wired and Wireless Networks 460 Shields Up! 512
Network Adapters 461
Network Connectivity Hardware 463
Objective 3 Explain How to Secure a Computer 512
CONTENTS ix
Software 513 How to Create a Form Using Google Drive 560
Hardware 515
Operating System 516 The Tools of the Trade 564
Objective 3 Explain Database Management Systems 564
An Ounce of Prevention 518 Creating a Database 565
Objective 4 Practice Safe Computing 518 Data Validation 566
User Accounts 519 SQL 567
Securing Accounts 520 Output 568
Encryption 522
Safely Installing Software 523 How to Create a Customer Database 570
Updating and Uninstalling Software 524
Data In . . . Information Out 576
Acceptable Use Policies 525
Objective 4 Discuss Important Types of Information
How to Secure a Microsoft Word Document 528 Systems 576
Office Support Systems 577
The Law Is on Your Side 534 Transaction Processing 577
Objective 5 Discuss Laws Related to Computer Security and Management Information Systems 578
Privacy 534 Decision Support Systems 578
The Enforcers 535 Business Intelligence and Big Data 579
Current Laws 535 Expert Systems and Artificial Intelligence 579
Objectives Recap 539
Key Terms 539
Real-World Databases 582
Summary 539
Objective 5 List Examples of Databases Used in Law
Enforcement and Research 582
Application Projects 544
Law Enforcement 583
Science 585
Objectives Recap 589
Chapter 11 Key Terms 589
Databases 548 Summary 589
Application Projects 594
Database Basics 550
Objective 1 Identify the Parts of a Database 550
Tables, Fields, and Records 551 Chapter 12
Forms, Queries, and Reports 552
Program Development 598
A Database for Every Purpose 556
Objective 2 Compare the Four Types of Databases 556 Getting from Idea to Product 600
Flat Databases 557 Objective 1 Describe the System Development Life
Relational Databases 557 Cycle 600
Object-Oriented Databases 558 System Development Life Cycle (SDLC) 601
Multidimensional Databases 558 Other Development Models 605
x CONTENTS
Coding the System 608 Artificial Intelligence 632
Objective 2 Describe the Program Development Objective 4 Explain the Term Artificial Intelligence 632
Cycle 608 Applications 633
Program Development Cycle 609 Expert Systems 633
Neural Networks 634
How to Create a Flowchart 614
Objectives Recap 637
Tools of the Trade 618 Key Terms 637
Objective 3 Compare Various Programming Summary 637
Languages 618 Application Projects 642
Programming Languages 619
Programming Tools 620 Appendix A Microsoft® Office 2016 Applications
Web Programming 621 Projects 646
Mobile App Development 622
Appendix B Using Mind Maps 648
How to Automate a Task by Using Glossary 650
a Macro in Word 624
Index 667
CONTENTS xi
What’s New in This Edition?
Visualizing Technology Sixth Edition
Visualizing Technology is a highly visual, engaging computer concepts textbook. Filled with all the important topics you need to cover,
but unlike other textbooks, you won’t find pages full of long paragraphs. Instead, you’ll find a text written the way students are hardwired
to think: it has smaller sections of text that use images creatively for easier understanding, and chapters are organized as articles with
catchy headlines. The sixth edition continues to provide a hands-on approach to learning computer concepts in which students learn
a little and then apply what they are learning in a project, simulation, or watch a Viz Clip video to dive deeper. Each chapter has two
How-To projects focused on Digital Literacy and Essential Job Skills so that students are gaining the skills needed for professional and
personal success. They learn about the important topics of ethics, green computing, and careers in every chapter. And, as technology
continually evolves, so does the content. In this new edition, all of the content has been reviewed and updated to cover the latest tech-
nology, including Windows 10, macOS Sierra, and more coverage of troubleshooting and security.
The optimal way to experience Visualizing Technology is with MyITLab. All of the instruction, practice, review, and assessment re-
sources are in one place, allowing you to arrange your course from an instructional perspective that gives students a consistent, measur-
able learning experience from chapter to chapter.
Highlights of What’s New in This Edition • Added a variety of Infographics to illustrate complex topics
visually
• New Digital Competency Badge offered through MyITLab • Updated Viz Clip videos as needed
• New Pearson etext 2.0 provides an interactive and accessible • Added coverage of Windows 10, macOS Sierra
learning experience • Included more coverage of Troubleshooting and Security
• Updated all content for currency
instruction practice
Prepare visual and kinesthetic learners Engage students with hands-on activities
with a variety of instructional resources and simulations that demonstrate
• Pearson etext 2.0 provides an environment in which students understanding
can interact with the learning resources directly. • How-To Projects provide two active-learning projects per
• Viz Intro Videos provide overview of chapter objectives. chapter—a Digital Literacy Project and an Essential Job Skill
• Viz Clip Videos dig deeper into key topics in a YouTube-like Project. Each project focuses on skills students need for
style. personal and professional success. Topics include basic
• PowerPoint Presentation – to use for in-class, online lecture, website creation, mobile application creation, video creation,
or student review lecture. and using social media for brand marketing.
• Audio PowerPoint Presentations deliver audio versions of • How-To Videos show students how to complete the
PPTs—lecture option for online students. projects.
• TechBytes Weekly provides ready-to-use current news • IT Simulations provide 12 hands-on scenarios that students
articles, including discussion questions and course activities. work through in an active learning environment to demonstrate
understanding.
• Windows 10 high-fidelity training simulations allow students
to explore Windows in a safe, guided environment that
provides feedback and Learning Aids (Watch and Practice)
if they need help.
changes by chapter
Chapter 1 What Is a Computer? Chapter 8 Communicating and Sharing:
• Added coverage of Chromebooks The Social Web
• Changed Objective 7 to cover online tools used in business
Chapter 2 Application Software • Added SharePoint, Slack, and other tools
• Updated all software versions
• Added more coverage of Windows 10 Settings tools Chapter 9 Networks and Communication
• Added more information about antivirus software and malware
Chapter 3 File Management • Added more information about wireless security
• Added Cortana and Siri
Chapter 10 Security and Privacy
Chapter 4 Hardware • Updated images
• Removed reference to obsolete connectors and ports
• Added Thunderbolt2 Chapter 11 Databases
• Updated images
Chapter 5 System Software
• Added new objective - Troubleshooting and Maintenance Chapter 12 Program Development
• Added more coverage of Artificial Intelligence (AI)
Chapter 6 Digital Devices and Multimedia
• Expanded discussion of digital assistants, added Appendix A Microsoft® Office 2016 Applications
Amazon’s Echo Projects
Chapter 7 The Internet Appendix B Using Mind Maps
• Updated to most recent browser versions
• Increased discussion of browser security
Learning Objectives clearly outlined Learning Outcomes are Chapter Intro Video Explanation of the
in chapter opener and restated at the clearly defined at the introduces the main Running Project for
beginning of each article beginning of each chapter. concepts of the chapter that chapter
Objectives
1 Identify Types and Uses of Business Productivity
Software
2
ChAPTEr application software and
6 Install, Uninstall, and Update Software how to obtain it. Look for
instructions as you complete
each article. For most articles,
there’s a series of questions
for you to research. At the
52 52 53 53
The Windows Optimize Drives utility optimizes and that’s more than 10 percent fragmented. Figure 5.21 shows the
defragments hard drives automatically on a weekly basis, and Optimize Drives utility. Like the Disk Check utility, the Optimize
optimizes SSD drives monthly. You can also run it manually if Drives utility can be accessed from the Tools tab of the disk’s
you need to. Microsoft recommends that you defragment a drive Properties dialog box.
A Place for Everything FIGURE 5.21 The Windows Optimize Drives utility is scheduled to run automatically.
Objective
FInD OUT MOrE
1 Create Folders to Organize Files
One of the most important things that you need to do when working with
computers is called file management: opening, closing, saving, naming,
deleting, and organizing digital files. In this article, we discuss organizing your
Is defragmenting a hard disk really
necessary? Some people say no. Use the
Internet to research the controversy. Do you agree
with the contention? Why or why not? What webpages
digital files, creating new folders, and navigating through the folder structure of did you find supporting this argument? What credentials
File
your computer. does the author have that make you trust the information
Management
you found? Make sure you’re using recent information.
VISUAL WALKTHROUGH xv
Images are used to represent con-
cepts that help students learn and
retain ideas Green Computing provides
eco-friendly tips for using technology
GrEEn COMPUTInG
Moore’s Law Smart Homes
In 1965, Intel cofounder Gordon Moore observed that the number [generational improvement] every three years. Everyone in the
of transistors that could be placed on an integrated circuit had industry recognizes that if you don’t stay on essentially that curve
doubled roughly every two years. This observation, known as they will fall behind. So it sort of drives itself.” Thus, Moore’s Law The efficient and eco-friendly use of computers and other money and help energy utility companies manage the power
Moore’s Law, predicted this exponential growth would continue. became a technology plan that guides the industry. Over the past electronics is called green computing. Smart homes and grid, potentially reducing the need for new power plants.
The law was never intended to be a true measure, but rather several decades, the end of Moore’s Law has been predicted. smart appliances help save energy and, as a result, are good Can’t make your home a smart home overnight? No worries!
an illustration, of the pace of technology advancement. The Each time, new technological advances have kept it going, but as for both the environment and your pocketbook. You can take some small steps without investing in an entire
increase in the capabilities of integrated circuits directly affects new ideas and technologies have emerged, sticking to Moore’s Smart homes use home automation to control lighting, smart home system. Try installing a programmable thermostat,
the processing speed and storage capacity of modern electronic Law has become increasingly less practical or important. Moore heating and cooling, security, entertainment, and appliances. putting lights on timers or motion sensors, and running
Such a system can be programmed to turn various components appliances during off-peak hours.
devices. As a result of new technologies, such as building 3D himself admits that exponential growth can’t continue forever.
on and off at set times to maximize energy efficiency. So, the Smart appliances can monitor signals from the power
silicon processors or using carbon nanotubes in place of silicon In less than a century, computers have gone from being
heat can turn up, and the house can be warm right before you company transmitted over the smart grid—a network for
(Figure 1.7), this pace held true for roughly 50 years, but by 2016 massive, unreliable, and costly machines to being an integral part of
get home from work, while not wasting the energy to keep it delivering electricity to consumers that includes communication
most experts agreed this pace is no longer viable. The increase in almost everything we do. As technology has improved, the size and
warm all day while you’re away. If you’re away on vacation or technology to manage electricity distribution efficiently. When
the capabilities of integrated circuits directly affects the processing costs have dropped as the speed, power, and reliability have grown.
have to work late, you can remotely activate a smart home by the electric grid system is stressed, smart appliances can react
speed and storage capacity of modern electronic devices. Today, the chip inside your cell phone has more processing power phone or over the Internet. Some utility companies offer lower by reducing power consumption. Although these advances are
Moore stated in a 1996 article, “More than anything, once than the first microprocessor developed in 1971. Technology that rates during off-peak hours, so programming your dishwasher called smart home technology, the same technologies can also
something like this gets established, it becomes more or less a was science fiction just a few decades ago is now commonplace. and other appliances to run during those times can save you be found in commercial buildings.
self-fulfilling prophecy. The Semiconductor Industry Association From Engines of Innovation: U.S. Industrial Research at the End of an Era, Richard S. Rosenbloom
puts out a technology road map, which continues this and William J. Spencer (Eds.), published by Harvard Business School Press, © 1996.
Running Project
Use the Internet to look up current microprocessors. What
FIGURE 1.7 Carbon nanotubes
may someday replace silicon in companies produce them? Visit computer.howstuffworks.com
integrated circuits. /microprocessor.htm and read the article. How many transistors
were found on the first home computer processor? What was the
name of the processor, and when was it introduced?
Adrian Sherratt/Alamy
smart appliance
• Fourth-generation computers use tronic Numerical
Integrator and smart grid
Ogwen/Fotolia
microprocessors.
• Moore’s Law states that the number
of transistors that can be placed on an
Computer) smart home
green computing transistor
integrated circuit doubles roughly every two
years—although today it is closer to every integrated circuit vacuum tube
18 months.
14 CHAPTER 1 Objective 2 15
Social Review Sites Three of the most popular social news sites are reddit, Digg,
and Slashdot. Digg doesn’t publish content but allows the
Social review sites such as TripAdvisor let users review hotels, movies, community to submit content they discover on the web and puts it
games, books, and other products and services. Yelp allows users to review in one place for everyone to see and to discuss. reddit (Figure 8.25)
local businesses and places with physical addresses such as parks. allows community members to submit content and to vote that
Figure 8.23 shows a Yelp map of Times Square restaurants on the iPad app. content up or down, as well as discuss it. reddit is organized into
The reviews are from regular people, not expert food critics, and can help you categories called subreddits. Celebrities often participate in AMA—
decide where to eat. You can use the Yelp app on a mobile device to get ask me anything—interviews on reddit. Slashdot, which focuses
information when you are right in the area. primarily on technology topics, produces some content but also
accepts submissions from its readers. Whatever your interests,
also search the bookmarks of others. It’s a great way to quickly find out crowdsourcing
his friends and family members cre- crowd rather than that of an expert.
what other people find interesting and important right now. The links are
organized into topics, or tags, to make it easier for you to find links. You can ate accounts and Digg his post? Is it • Anybody can edit a wiki. social bookmarking site
click the Follow button if you have a Delicious account, but you don’t need ethical? Does it violate the terms of
use? Is it fair to other bloggers?
• Social bookmarking and news sites help
users find content that others recommend.
social news site
an account to browse Delicious.
Social news sites are different from traditional mass media news sites social review site
in that at least some of the content is submitted by users. Social news is FIGURE 8.24 Pinterest
interactive in a way that traditional media isn’t. It’s like having millions of wiki
friends sharing their finds with you. Content that’s submitted more frequently
or gets the most votes is promoted to the front page.
Tool that you can use to capture documents, and annotate and
HOW TO a screenshot. Macs include the highlight them. If necessary,
VIDEO
Grab tool. download the student data files
A useful skill is creating screen
The Windows Snipping Tool from pearsonhighered.com Career Spotlight—Each chapter
can capture four types of snips: /viztech. From your student data
shots of your desktop. For
Free-form, Rectangular, Window, files, open the vt_ch01_howto1_ provides an interesting career
example, it’s helpful for providing
or Full-screen. The Mac Grab tool answersheet file and save the file
directions on how to do something
can capture three types of grabs: as lastname_firstname_ch01_
option based on chapter content
or for keeping a record of an
Selection, Window, or Screen. howto1_answersheet.
error message that appears on
You can save your screenshots,
your screen. Windows includes
email them, paste them into
a program called the Snipping
2 Debra Geoghan
Unlike a Facebook profile, which is linked to a person, a Facebook To create a Facebook Page, you need a personal Facebook
In the Windows
Page is used to promote an organization,
A Facebook Page can have more
a product,search box account. Facebook’s Terms of Service permit you to have only one
or a service. SPOTLIGhT
on than
the one
taskbar, type snip
administrator, so youand personal Facebook account, but you can create multiple Facebook
can share the responsibilities among several people or Pages. So, for example, a college representative might create a
then, in the Search results, click
departments. The Facebook Page for this textbook can be found page for each department, club, or office. Once you are logged in SOFTWArE TrAInErS Software trainers—sometimes
Snipping .Tool
at facebook.com/visualizingtechnology . is public, so it
A Page to your personal account, the option Create Page can be found in called corporate trainers—are in demand as companies deploy
can be viewed by anyone, even those who are not logged in to the menu options. You can choose from several page categories more software programs. This high-paying career may involve
Facebook. (Figure 8.29). A page for a business or an organization will have some travel and requires good computer skills, organization,
and communication skills. Software trainers usually have at
least a bachelor’s degree and on-the-job training. Some com-
panies offer train-the-trainer courses that can lead to certifica-
tion. You might work for a training company, in the training
department of a large company, or as a consultant to many Spotmatikphoto/Fotolia
companies.
• File
Facebook Inc.
Create a Compressed
Essential Job Skill (Zipped) Folder 3 Select ch03_isaac_animals, click
the Share tab, and then click Zip to
create a zipped archive. Press
to accept the default file name.
4
HOW TO you can compress the files into a data files from pearsonhighered
VIDEO
single zipped folder and send them .com/viztech. From your student Right-click the compressed folder
all at once. In this activity, you’ll data files, open vt_ch03_howto2_ and click Properties. Compare the
Have you ever tried to email a compress a folder that contains answersheet and save it in your size to the original folder. Take a
bunch of photos to a friend? If several files to make it easier to Chapter 3 folder as lastname_ screenshot of the open dialog box
and paste it into your answer sheet.
you want to send more than a email them or to submit them firstname_ch03_howto2_
Type up your answers, save, and
couple images, you usually wind electronically to your teacher. answersheet. submit as directed by your instructor.
2
Get Info. How big is the folder? How many files and folders does it
In the File Explorer Navigation pane, contain?
ce
additional study materials in MyITLab
en punch card 5 (ubicomp) 38
converg • Be sure to check out the Tech Bytes weekly news feed for server 33 Unicode 17
UBIQUITOUS moore’s law current topics to review and discuss SIM card (Subscriber Identity universal design 25
embedded Module) 29 unmanned aircraft system
COMPUTING S
ects that have students working TER
computers smart appliance 15 (UAS) 41
U
MP smart grid 15 vacuum tube 11
CO Objectives Recap smart home 15 video game system 30
internet of things OF smartphone 29 volunteer computing 36
ION
independently, collaboratively, and 1
EV
OLU
T 1. Explain the Functions of a Computer
2. Describe the Evolution of Computer Hardware
3. Describe How Computers Represent Data Using Binary Codes
stylus 22
subnotebook 22
wearable 29
workstation 21
online
sup 7
er
com 2
4. List the Various Types and Characteristics of Personal
Computers Summary
p ute 2 5. Give Examples of Other Personal Computing Devices 1. Explain the Functions of a Computer
rs 1
6. List the Various Types and Characteristics of Multiuser A computer is a device that converts raw data into information
measuring dat Computers using the information processing cycle. The four steps of the
a
MULTIUSER
6
WHAT IS A 7. Explain Ubiquitous Computing and Convergence IPC are input, processing, storage, and output. Computers can
be programmed to perform different tasks.
B I T S A N D BYT E S
COMPUTERS
COMPUTER ? Key Terms
2. Describe the Evolution of Computer hardware
The earliest computers used vacuum tubes, which are
3 1 0 1 0 100 01 inefficient, large, and prone to failure. Second-generation
1 1 0 11 011 all-in-one computer 21 ENIAC (Electronic Numerical computers used transistors, which are small electric switches.
100
10011 01 Analytical Engine 5 Integrator and Computer) 11 Third-generation computers used integrated circuits, which
101 artificial intelligence 5 enterprise server 34 are silicon chips that contain multiple tiny transistors. Fourth-
Summary continued 9. ______ is a field of study in which information technology is 10. A(n) _____________ is an example of convergence.
0010110011
ASCII (American Standard ergonomics 24 generation computers use microprocessors, which are complex
servers applied to the field of biology. a. smart grid
4. List the Various Types and Characteristics of Personal mainframe computers, and enterprise servers. Supercomputers 5 01 0 1 10 01 Code for Information game controller 30 integrated circuits that contain the central processing unit (CPU)
a. Bioinformatics 4 b. smartphone Interchange) 17 geocaching 30 of a computer.
Computers perform complex mathematical calculations.grid computing
They perform binary code
b. Distributed computing c. traffic light binary code 17 GPS (global positioning Moore’s Law states that the number of transistors that can
Personal computers include desktop computers, which offer a limited number of tasks as quickly as possible. Distributed 01 0 binary (base 2) number system) 29 be placed on an integrated circuit has doubled roughly every
the most speed, power, and upgradability for the lowest cost; computing uses the processing of multiple computers to c. Ergonomics 1 1 0 10 01d. ubicomp
system 16 green computing 15 two years. The increase in the capabilities of integrated circuits
workstations, which are high-end desktop computers; and perform complex tasks. d. Ubicomp 101011 bioinformatics 19 grid computing 36 directly affects the processing speed and storage capacity of
all-in-ones, which are compact desktop computers with the 7. Explain Ubiquitous Computing and Convergence bit 17 information 4 modern electronic devices.
computer case integrated into the monitor. Portable personal Ubiquitous computing means the technology recedes tablets into the byte 17 information processing cycle 3. Describe how Computers represent Data Using Binary
computers include notebooks and tablets.
5. Give Examples of Other Personal Computing Devices
background so you no longer notice it as you interact with it.
The Internet of Things is the connection of the physical world wearables
True or False central processing unit
(CPU) 13
(IPC) 7
integrated circuit 12
Codes
A single bit (or switch) has two possible states—on or off—and
Other computing devices include smartphones, wearables, to the Internet. Convergence is the integration of multiple
smartphone Answer the following questions with TPERSONAL
for true or F for COMPUTERS Chromebook
5. Unicode contains codes for 23 Internet
most of the languages in of Things (IoT) 39
can be used for situations with two possibilities such as yes/no
GPS, video game systems, and simulators. technologies, such as cell phones, cameras, and MP3 players, false for more practice with key terms and concepts from use today. client 33 laptop 22
or true/false. Digital data is represented by 8-bit binary code on
on a single device. this chapter. desktop computer 4 Mac 23
6. List the Various Types and Characteristics of Multiuser 6. Bioinformaticsconvergence
allows you to40 design a workspacemainframe
for most modern computers. The 8-bit ASCII system originally had
34
Answer the multiple-choice questions below for more practice with 5. What are desktop computers attached1 to a network in a 4. Moore’s Law states that the number of transistors personal computers.
42 CHAPTER that can be placed on an integrated circuit will double End of Chapter 43
key terms and concepts from this chapter. business setting called? 10. The idea that computers are all around us is called
roughly every 18 years.
1. The _______ is a measure of a computer’s ability to display a. Tablets convergence.
Application Project
intelligent behavior. b. Mainframes
Step Instructions
a. Analytical Engine c. Supercomputers
b. Artificial intelligence d. Workstations Fill in the Blank
c. Bernoulli numbers program 6. What type of portable computer is thin and light, has high-end 1
Start Word. From your student data files, open the file named vt_ch01_word.
Fill in the blanks with key terms from this chapter. Save the document as lastname_firstname_ch01_word
6. ________ is a system that represents digital data as a series of
d. Turing test processing and video capabilities, and a 13–15 inch screen? 0s and 1s that can be understood by a computer.
1. A computer is a programmable machine that converts raw line of the document, type Anna Sanchez, Intern to complete
Office
2. First-generation computers used ________ 2016data.
to process Application Projects
a. Convertible notebook
__________ into useful __________. 2
On the last
7. A ___________ consists of 8 bits and is used to represent a
b. Netbook the letter.
a. integrated circuits Word 2016: Intern report 2. The ____________ was a mechanical computer designed, but
single character in modern computer systems.
b. microprocessors c. Subnotebook
c. transistors
Project Description: In the following
d. Tablet Babbage. 3
not built, in the early 19th century by mathematician
SelectCharles
address, and then apply
8. ___________
the first four lines are computers
of the document
Internet
the Noaccess,
containingthat
Spacingemail,
theprovide
name andservices,
street such as
style.or file and print services, to client
d. vacuum tubes 7. _________ consists of 24 satellites that transmit signals to systems.
Microsoft Word project, you will create 3. __________ is the branch of science concerned with making
3. A _______is a complex integrated circuit that
a letter
central processing unit (CPU) of a computer.
contains
telling
determine the receiver’s current location, time, and velocity
the boss about the
your new through triangulation of the signals.
things you have learned in this class. In the
computers behave like humans.
4. Developed in the 1960s, __________ are chips that
4
Format the entire document as Times
9. __________
computers.
Newthe
shares Roman, 12 pt. of a task across a group of
processing
ch01_ethics_answersheet.
Collaboration
10
project, and submit it to your instructor as directed. the market—one from each mobile platform: Use iOS, Android,and Grammar dialog box to correct the misspelling of the
the Spelling
and Windows. Complete the following table, comparing the
word beleive to believe. Use the Internet to find a school program that supplies all
features of each device. Use this research to decide which students with tablets or notebooks. What are the goals of With a group of three to five students, research a famous computer
Ignore all other spelling and grammar suggestions. pioneer. Write and perform a news interview of this person. If possible,
Do It Yourself 1 device would best meet your personal needs. Which device
should you buy and why? What other accessories will you
the program? How was it funded? Has it been successful?
How has its success or failure been measured? Do you think video record the interview. Present your newscast to the class.
What device did you choose? Is it a desktop, notebook, tablet, The Project: As a team, prepare a dialog depicting a news reporter
or some other type of system? Where is it located? How long interviewing this person. Use at least three references. Use Google
have you had it? Did you research the computer before you Device 1: Device 2: Device 3: On the Web Drive or Microsoft Office to prepare the presentation and provide
made your purchase? What made you purchase it? iOS Android Windows documentation that all team members have contributed to the
There are many important people and events that led to our mod- project.
What do you use the computer for the most? What are five Website or store ern computers. In this exercise, you will create a timeline that illus-
features you use most frequently? Why? What are three you Brand trates the ones you feel are most significant. From your student Outcome: Perform the interview in a newscast format using the
use the least? Why? How could this device be improved to data files, open the file vt_ch01_web_answersheet and save the file dialog you have written. The interview should be 3 to 5 minutes
make your life more convenient? Describe one way life would Model as lastname_firstname_ch01_web_answersheet. long. If possible, record the interview, and share the newscast with
be easier and one way your life would be more difficult without the rest of the class. Save this video as teamname_ch01_video.
Price Visit computerhope.com/history and under Timeline click
this device. Save your answers and submit your work as Turn in a final text version of your presentation named teamname_
directed by your instructor. the link to open the time period that includes the year you
Phone ch01_interview. Be sure to include the name of your presentation
were born. Create a timeline showing five to seven important
milestones in the development of computers that occurred and a list of all team members. Submit your presentation to your
Calendar
48 CHAPTER 1 in this decade. Use a free online timeline generator, such as
Application
instructor as directed.
Project 49
Do It Yourself 2 Camera/video
GPS
Use an online mind mapper or presentation tool such as Mind-
omo, MindMeister, or Prezi, to create a mind map to compare Games
desktop, notebook, and mobile devices. A mind map is a visual
Video player
outline. More information about using mind maps can be found in
Appendix B. From your student data files, open the file vt_ch01_ MP3 player
DIY2_answersheet and save the file as lastname_firstname_
ch01_DIy2_answersheet. Internet
xx VISUAL WALKTHROUGH
CLOUD
COMPUTING Install
uninstall,
update software
Infrastructure-as-a-Service
BUSINESS PRODUCTIVITY Mind maps are visual out-
Platform-as-a-Service SOFTWARE office suites
lines of the chapter content,
Software-as-a-Service 6 other business
5 software organized by objectives.
1
sources
free They help students organize
financial document project and remember the informa-
management management
3 2
OBTAINING SOFTWARE
PERSONAL SOFTWARE
SOFTWARE
office apps
finance
COMPATIBILITY
education and
portable reference
system specs entertainment
mobile
apps
Pearson Education, Inc.
system requirements Summary
Learn It Online 1. Identify Types and Uses of Business Productivity Software
• Visit pearsonhighered.com/viztech for student data files The most common business software is an office application
• Find simulations, VizClips, and additional study materials suite—which may include a word processor, spreadsheet,
102 CHAPTER 2
in MyITLab presentation program, database, and personal information
manager. Other business applications include financial
• Be sure to check out the Tech Bytes weekly news feed for
software, document management, and project management
current topics to review and discuss
software.
DEDICATION xxiii
Reviewers of All Editions
Phil Valvalides Guilford Technical Community College Bernice Eng Brookdale Community College
Svetlana Marzelli Atlantic Cape Community College Deb Fells Mesa Community College
Pat Lyon Tomball College Karen Allen Bunker Hill Community College
Arta Szathmary Bucks County Community College Beverly Amer Northern Arizona University
June Lane Bucks County Community College Michael Beddoes Salt Lake Community College
Ralph Hunsberger Bucks County Community College Leilani Benoit New Mexico State University
Sue McCrory Missouri State Gina Bowers Harrisburg Area Community College
Laura White University of West Florida Linda Collins Mesa Community College
Karen Allen Communtiy College of RI Fred D’Angelo Pima Community College
Ralph Argiento Guilford Technical Community College Robert Devoe Peterson Fresno City College
Kuan Chen Purdue University Calumet Hedy Fossenkemper Paradise Valley Community College
Carin Chuang Purdue University North Central Rachelle Hall Glendale Community College
Christie Jahn Hovey Lincoln Land Community College Terri Helfand Chaffey College
Dr. Seth Powless University of Toledo Ilga Higbee Black Hawk College
Amiya K. Samantray Marygrove College Kay Johnson Community College of Rhode Island
Darrel Karbginsky Chemeketa Community College
Special thanks to Lisa Hawkins, Susan Katz University of Bridgeport
Frederick Community College Sherry Kersey Hillsborough Community College
Mimi Spain Southern Maine Community College Ellen Kessler Harrisburg Area Community College
Kathie O’Brien North Idaho College Kate Legrand Broward Community College
Pat Franco Los Angeles Valley College Mike Lehrfeld Brevard Community College
Claire Amorde Florida Institute Of Technology Jian Lin Eastern Connecticut State University
Michael Haugrud Minnesota State University Moorhead Nicole Lytle California State University, San Bernadino
Anjay Adhikari Miami Dade College Peggy Menna Community College of Rhode Island
Lynne Lyon Durham College Deborah Meyer Saint Louis Community College, Forest Park
Kate Le Grand Broward College Pam Silvers Asheville-Buncombe Technical Community College
Carolyn Barren Macomb Community College Will Smith Tulsa Community College
Bob Benavedis Collins College Lynne Stuhr Trident Technical College
Theresa Hayes Broward College Ann Taff Tulsa Community College
Mary Fleming Ivy Tech Community College Jim Taggart Atlantic Cape Community College
Penny Cypert Tarrant County College Michelle Vlaich Lee Greenville Technical College
Language: English
By CHARLES L. FONTENAY
Illustrated by KLUGA
Pushing Makki's body down the hatch toward the airlock at the other
side of the personnel sphere would have been an easy task for one
man, but Lefler wanted Taat and Robwood to watch each other. He
didn't want an "accidental" push to send the prime bit of evidence
drifting away into space. When they had disappeared down the hatch
with the corpse, he eased himself into the control chair and played
back the log from the end of Robwood's last shift at 1000 hours.
Makki had recorded the usual observations of the solar, stellar and
planetary positions when he went on duty. There was nothing else on
the tape.
Lefler stared gloomily at the silent log-recorder. It seemed incredible
to him that never again, except on tape, would he hear Makki's harsh,
sardonic voice. The almost inaudible hum of machinery deep in the
ship only emphasized the oppressive stillness of space outside its
thin walls.
With a sigh, he picked up the log-recorder microphone and pulled the
star sextant down to eye level. He would record the bare facts of
Makki's death after the initial position observations.
"Marsward IV, bound Marsport from White Sands," he recited in a
monotone. "Earth-time, October 29, 2048, 1931 hours. Lefler
reporting for duty and assuming command as per conversation with
White Sands, to be recorded this date."
He squinted into the sextant.
"Positions: Sun-Mars, 24°28'42". Sun-Earth—"
He broke off. Where was Earth? Then he remembered.
"Damn!" he muttered. "The transit! A murder sure messes up the
records around here."
The Earth transit was an event of considerable importance to an
astrogator on a hop between Earth and Mars. Marsbound it began on
the 73rd day out, Earthbound on the 187th day. Timing it, spaceship
observers not only checked the accuracy of the ship's orbit, but also
contributed data to the mass of knowledge available on the
movements of Earth and Mars.
Lefler found the black disc of Earth in the smoked glass that
automatically fell across the sextant lens when it swept by the sun.
He checked the angle between the black spot and the leading edge
of the solar disc.
"Earth transit already under way," he said into the mike. "Angle with
leading edge, two minutes, forty seconds...."
He went around the sky, recording planetary and key stellar positions.
He had just finished and switched the tape of his conversation with
Earth to record in the log when Taat and Robwood returned.
"Makki's body will keep out there as well as in a refrigerator," said
Taat with evident satisfaction. "Robwood tied the airlock into the
alarm system so nobody can go out and cut the body free without
arousing the others."
"You're both mighty cooperative for one of you to be a murderer,"
remarked Lefler.
"Maybe neither of us is," said Robwood. "As far as I'm concerned,
you may be the man."
"Or, as Robwood suggested earlier, Makki may have shot himself,"
added Taat.
"Robwood, you and I are going to have to do twelve-hour watches
from here to Mars, since Taat doesn't know how to operate the
controls," said Lefler. "I'll stay on duty till 0600, and you'd better get
some sleep after you've radioed your statement to White Sands."
"Okay," said Robwood. "But are we still going to record star positions
in the log every eight hours, or just every twelve hours now?"
"Twelve, I think. But the Earth transit's on right now, and until Terra
swings across that half a degree of the sun's face, we'd better take
readings on that every four hours, anyhow."
"Well, that's just for a little more than two days," said Robwood.
"Look, Lefler, I'm overdue on my sleeping time anyway, so how about
letting me make my statement on ... on Makki first?"
"Blast away," said Lefler. "The mike's yours. We'll leave the control
room so you'll feel freer to talk."
Lefler munched thoughtfully on a hot sandwich. Across the control
room, in the astrogator's chair, Taat sucked at a bulb of coffee.
"Nice of you to fix up this lunch, Taat," said Lefler. "I'm not tied strictly
to the control room during my watch, you know. But little things like
this relax the tension."
"Yes, it's a peculiar situation, Lefler," said Taat in a tone that indicated
he had been thinking about it. "Psychologically, I mean. Now if there
were only the two of us, and Makki drifting out there dead, both of us
would know who shot him. With three of us, it's different.
"You and I are sitting here talking as though neither of us killed Makki.
Maybe you hadn't thought of it, but that means that tacitly, for now,
we're assuming Robwood killed him. But, for all I know, you did. And,
if you didn't, for all you know, I did."
"Until we find out, I have to suspect you both," said Lefler flatly.
"I could say the same thing," murmured Taat. "But one of us may be
lying."
"Of course, Makki could have shot himself, as Robwood suggested,"
said Lefler. "If he had relaxed his grip on the heat-gun after pressing
the trigger, it would have drifted up away from him. There were the
gloves, you know."
"Why wouldn't Makki want his fingerprints on the gun if he were
committing suicide?" objected Taat. "I'll concede that Makki had
strong sadistic tendencies, but my guess is that the murderer put
those gloves on him just to raise the possibility of suicide."
Taat finished his coffee and left the control room. Lefler washed down
the last bit of his sandwich with his own coffee and called White
Sands on the radio. When he received an acknowledgment after the
inevitable delay, he began to dictate his statement.
Lefler told of waking from his sleep period and finding himself forty
minutes late for his watch. He described his discovery of Makki's
body, what followed, and everything he could remember of what Taat
and Robwood had said when they came to the control room.
"Makki was thoroughly detested by every member of the crew," Lefler
related. "He did not fraternize and no one wanted to fraternize with
him, because he was treacherous. In the midst of an apparently
friendly conversation, he would suddenly unveil his authority with
some biting and belittling remark. He never let anyone forget he was
captain.
"Robwood was afraid of him and hated him intensely. Robwood had
told me privately he intended to ask for a transfer to another ship after
this hop to Mars. Makki held Robwood in considerable scorn because
Robwood is a timid man, and a slow thinker outside his own field of
engineering. Makki made no effort to conceal that scorn.
"Taat was as contemptuous of Makki as Makki was of Robwood.
Makki was ruthless with any open attempt to question his judgment,
but Taat could do it with a raised eyebrow, his tone of voice or a well-
chosen phrase. Makki sensed this, and alternated between treating
Taat as more of an equal than either Robwood or me and 'riding' Taat
harder than anyone else.
"Robwood and Taat have been aboard with us for the last five hops,
but I've been with Makki since both of us graduated from the Space
Academy. We were boys together, but I have never liked Makki. He
always had too little respect for human dignity. He was a good space
captain because he was a genius with such impersonal things as
machinery and astrogation, and I have never known him to slip up on
a record or let a ship get a single second off course. But mankind is
better off without him."
Lefler signed off and laid the microphone down. He realized suddenly
that he was perspiring and his hands were trembling. The statement
had been a major emotional strain.
Unstrapping himself from the control chair, he floated down past the
astrogation deck and looked in on the centerdeck. Both Taat and
Robwood were strapped to their bunks, apparently asleep.
Satisfied, Lefler returned to the control room. He wanted to listen,
without embarrassing interruptions, to Taat's and Robwood's
statements as he transferred them from the radio recording tape to
the ship's log.
The tapes rolled on the two connected machines, the log tape slowly,
the radio tape at a faster clip. A loudspeaker was plugged into the
radio-tape machine. Lefler kept it turned low, though the centerdeck
was two decks down.
"I woke Makki at 0930 hours." It was Robwood's low voice on the
tape. "He relieved me right at 1000 hours. I went down to the
centerdeck and had a late lunch. Lefler strapped himself in for his
sleeping period while I was eating. Taat ate lunch with me, and then
we played cards for about an hour. We do that almost every day
when Taat's sleeping periods are on the same schedule as mine. He
changes his, because he's a psychologist and wants to watch all the
crew members.
"I check the rocket engines and the fuel tanks every twenty-five days.
When the Earth transit is coming up, I always do it two days ahead of
time in case there are any corrections to be made in the ship's orbit. I
got into a spacesuit and spent the rest of my free period outside the
personnel sphere doing that. I took a break for supper, I'd say about
1600 hours, and went back to my inspection. Taat ate with me and
Lefler was asleep. Makki didn't eat with us. He did sometimes, but not
often. He usually wanted to eat alone. With the Earth transit about
due, I figured he'd already eaten and gone back to the control room.
"I was late for my sleeping period, but I wanted to finish my
inspection. I had just gotten back through the airlock and was taking
my spacesuit off when I heard Lefler call from the control room. He
and Taat were both there when I got there.
"I didn't like Makki, but neither did Taat and Lefler. I suppose it'll come
out, so I might as well tell about it. Makki broke up my engagement
with a girl back on Earth several years ago. I wasn't going to sign on
for the Mars hop because I was going to get married. Makki couldn't
find an engineer to replace me, and he smooth-talked her out of it. He
told me about it a long time afterward and laughed at me. I haven't
ever seen her again.
"Lefler and Taat are both decent fellows and I don't think either one of
them killed Makki. I think he shot himself. He ought to have!"
Robwood's final words were spoken in an outburst of concentrated
bitterness. Lefler stared thoughtfully at the unwinding tapes as he
waited for Taat's report to tune in. He hadn't known that about
Robwood's fiancée, but it was the sort of thing Makki wouldn't
hesitate to do.
"The last time I saw Makki," came Taat's calm, controlled voice from
the loudspeaker, "was 1615 hours. He had just finished lunch and
was going back to the control room when I came onto the centerdeck
from the storage deck below. Robwood came up from below a couple
of minutes later and we ate supper together.
"Robwood and I usually play a round of cards after supper when
we're on the same schedule, but he was busy and I was in the middle
of an experiment in the lab I have set up on the storage deck. We
went down to the storage deck together. He went on below to the
airlock and I started the moving picture camera again on my
experiment.
"I didn't go up again until Lefler sounded the alarm. He was alone
with Makki in the control room when I got there, and Makki was dead.
"I must admit it is my personal feeling that whichever of my
colleagues killed Makki is a benefactor to the human race, and I hope
he escapes punishment. I did not know Makki before Robwood and I
signed up together on the Marsward IV five voyages ago. I made the
mistake of entering into a business transaction with him on our first
Mars trip. He needed my capital and we became partners in
purchasing a block of stock in a private dome enterprise. He accused
me several times afterward of cheating him, but he handled the
dividends and I think he was cheating me.
"As a psychologist, I would say that Lefler is more likely to have killed
Makki coldly and deliberately, but Robwood is more likely to have
killed him in the heat of an argument."
Taat's voice stopped. Lefler turned off the machines and
disconnected them.
An argument. He had heard shouting in his dreams. Was that what
had awakened him?
He tried to bring the dream into focus. It barely eluded him. All he
could remember was that it was something about Makki.
Both Taat and Robwood were up by 0400 hours. They brought their
breakfasts to the control room, along with coffee for Lefler.
It was a pleasant meal for the three of them. No one really seemed to
care that one of the others was a murderer, Lefler thought. They
talked and acted more like companions in crime—or like the murderer
was none of them, but someone lurking somewhere else in the ship.
He wished he did not feel impelled to find out, if he could, who killed
Makki. But he knew that Taat would be trying to find out, too—if Taat
hadn't done it—because Taat was a psychologist and would look at it
as a scientific problem. Robwood was the only one who might be
temperamentally inclined to let the solution wait until they reached
Mars.
When Robwood took over duty watch at 0600 hours, Lefler found
Taat listening to a tape on criminal psychology on the centerdeck.
"Taat, didn't I hear you say you were working on some sort of an
experiment on the storage deck while Makki was on watch
yesterday?" asked Lefler.
Taat switched off the player.
"That's what I was doing," he said carefully, "but I don't remember
saying anything about it."
"I listened to the reports you and Robwood made while I was
recording them in the log," admitted Lefler. "I was interested in your
estimate of Robwood's and my comparative abilities to commit
murder."
Taat removed his spectacles, polished them and put them in his
breast pocket before answering.
"I'm not surprised that you listened, Lefler—whether you're guilty or
innocent," said Taat. "You probably noted that I mentioned I was
recording my experiments on film. If you'll go below with me, I'd like
for you to see that film."
Together, they pulled themselves down to the storage deck. Over
near the main electrical switchboard, Robwood had torn out three
empty spacesuit lockers and built a compact laboratory for Taat. A
dozen white mice and some hamsters floated in cages attached to
the wall.
For Taat's convenience, Robwood had moved the storage deck
chronometer from the other side of the deck to the lab. It read 0607.
Taat unrolled a screen against one of the spacesuit lockers, attached
the film roll to the projector, darkened the deck and began the
showing.
The film began on Taat's face, blurred and enormously enlarged, as
he switched on the camera. Taat stepped backward until he was in
focus, and picked up the microphone that tied into the sound track.
"This is an experiment with white mice in a maze under conditions of
zero gravity," said the Taat on the screen. Stepping aside, he waved a
hand at a wire contraption on a table. "I have here a three-
dimensional maze. The chronometer is visible above it, so we can
check the reaction time."
Lefler noted the chronometer reading. It was 1500. In the "day"
square just below its center was the figure 73.
Lefler checked the chronometer in the picture as the film ran on.
There was an announced break between 1612 and 1654. Other than
that, it ran continuously to 1851, when his own voice sounded faintly,
calling, "Blue alert! All hands to control room. Blue alert!" At that,
Taat's startled face loomed up again before the lens and the film
stopped abruptly.
Throughout the approximately three hours, Taat was always in the
camera's view, running his mice through the maze and explaining his
methods.
"What was that forty-minute break, Taat?" asked Lefler when Taat
switched the lights on once again.
"Supper," said Taat. "Robwood and I ate together, and came back
down from the centerdeck together. I saw Makki leave the centerdeck
when I went up, but Robwood got there a minute or two later and I
don't think he saw Makki."
"You seem to have established a pretty good alibi," said Lefler slowly.
"How about Robwood?"
"Lefler, for your sake, I hate to say this. The only time Robwood was
above the storage deck from the time I started this film was when we
had supper together. I'd have seen him if he'd passed through, and
the only way he could have gotten into the control room would have
been through one of the ports."
"He couldn't, without breaking it and setting off an alarm," said Lefler.
"Are you trying to tell me you think I killed Makki, Taat?"
"I was here," said Taat, waving his hand at the projector. "I was
between Robwood and the control room all the time. You're the only
one who could have gotten there without my seeing you, Lefler, and I
found you alone with him fifteen minutes after he died."
"You're sure about that fifteen minutes?"
"Within a pretty narrow range. The dilation of the pupils is an accurate
gauge. I don't say you killed him, Lefler. I hope they rule it was
suicide."
Silently, Lefler went back to the centerdeck, undressed and strapped
himself into his bunk. He found it hard to get to sleep. Something was
nagging at the back of his mind. He hoped he wouldn't dream of
Makki again.