| |
| |
| |
Computers and Digital Basics | |
| |
| |
| |
All Things Digital | |
| |
| |
The Digital Revolution | |
| |
| |
Convergence | |
| |
| |
Digital Society | |
| |
| |
QuickCheck A | |
| |
| |
| |
Digital Devices | |
| |
| |
Computer Basics | |
| |
| |
Personal Computers, Servers, Mainframes, and Supercomputers | |
| |
| |
PDAs, Portable Players, and Smart Phones | |
| |
| |
Microcontrollers | |
| |
| |
QuickCheck B | |
| |
| |
| |
Digital Data Representation | |
| |
| |
Data Representation Basics | |
| |
| |
Representing Numbers, Text, and Pictures | |
| |
| |
Quantifying Bits and Bytes | |
| |
| |
Circuits and Chips | |
| |
| |
QuickCheck C | |
| |
| |
| |
Digital Processing | |
| |
| |
Programs and Instruction Sets | |
| |
| |
Processor Logic | |
| |
| |
QuickCheck D | |
| |
| |
| |
Password Security | |
| |
| |
Authentication Protocols | |
| |
| |
Password Hacks | |
| |
| |
Secure Passwords | |
| |
| |
QuickCheck E | |
| |
| |
Issue: Are You Being Tracked? | |
| |
| |
Computers in Context: Marketing | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Computer Hardware | |
| |
| |
| |
Personal Computer Basics | |
| |
| |
Personal Computer Systems | |
| |
| |
Desktop and Portable Computers | |
| |
| |
Home, Media, Game, and Small Business Systems | |
| |
| |
Buying Computer System Components | |
| |
| |
QuickCheck A | |
| |
| |
| |
Microprocessors and Memory | |
| |
| |
Microprocessor Basics | |
| |
| |
Today's Microprocessors | |
| |
| |
Random Access Memory | |
| |
| |
Read-Only Memory | |
| |
| |
EEPROM | |
| |
| |
QuickCheck B | |
| |
| |
| |
Storage Devices | |
| |
| |
Storage Basics | |
| |
| |
Magnetic Disk and Tape Technology | |
| |
| |
CD and DVD Technology | |
| |
| |
Solid State Storage | |
| |
| |
Storage Wrapup | |
| |
| |
QuickCheck C | |
| |
| |
| |
Input and Output Devices | |
| |
| |
Basic Input Devices | |
| |
| |
Display Devices | |
| |
| |
Printers | |
| |
| |
Installing Peripheral Devices | |
| |
| |
QuickCheck D | |
| |
| |
| |
Hardware Security | |
| |
| |
Anti-Theft Devices | |
| |
| |
Surge Protection and Battery Backup | |
| |
| |
Basic Maintenance | |
| |
| |
Troubleshooting and Repair | |
| |
| |
QuickCheck E | |
| |
| |
Issue: Where Does All the e-Garbage Go? | |
| |
| |
Computers in Context: Military | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Software Key Terms | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Computer Software | |
| |
| |
| |
Software Basics | |
| |
| |
Software Categories | |
| |
| |
Application Software | |
| |
| |
Utility Software | |
| |
| |
Device Drivers | |
| |
| |
QuickCheck A | |
| |
| |
| |
Popular Applications | |
| |
| |
Document Production Software | |
| |
| |
Spreadsheet Software | |
| |
| |
"Number Crunching" Software | |
| |
| |
Database Software | |
| |
| |
Graphics Software | |
| |
| |
Music Software | |
| |
| |
Video Editing and DVD Authoring Software | |
| |
| |
Educational and Reference Software | |
| |
| |
Entertainment Software | |
| |
| |
Business Software | |
| |
| |
QuickCheck B | |
| |
| |
| |
Buying Software | |
| |
| |
Consumer Basics | |
| |
| |
Software Copyrights and Licenses | |
| |
| |
QuickCheck C | |
| |
| |
| |
Installing Software and Upgrades | |
| |
| |
Installation Basics | |
| |
| |
Installing Local Applications | |
| |
| |
Installing Portable Software and Web Apps | |
| |
| |
Software Updates | |
| |
| |
Uninstalling Software | |
| |
| |
QuickCheck D | |
| |
| |
| |
Security Software | |
| |
| |
Security Software Basics | |
| |
| |
Security Suites | |
| |
| |
Antivirus Modules | |
| |
| |
QuickCheck E | |
| |
| |
Issue: How Serious Is Software Piracy? | |
| |
| |
Computers in Context: Journalism | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Software Key Terms | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Operating Systems and File Management | |
| |
| |
| |
Operating System Basics | |
| |
| |
Operating System Activities | |
| |
| |
User Interfaces | |
| |
| |
The Boot Process | |
| |
| |
QuickCheck A | |
| |
| |
| |
Today's Operating Systems | |
| |
| |
Microsoft Windows | |
| |
| |
Mac OS | |
| |
| |
UNIX and Linux | |
| |
| |
DOS | |
| |
| |
Handheld Operating Systems | |
| |
| |
QuickCheck B | |
| |
| |
| |
File Basics | |
| |
| |
File Names and Extensions | |
| |
| |
File Directories and Folders | |
| |
| |
File Formats | |
| |
| |
QuickCheck C | |
| |
| |
| |
File Management | |
| |
| |
Application-based File Management | |
| |
| |
File Management Utilities | |
| |
| |
File Management Metaphors | |
| |
| |
Windows Explorer | |
| |
| |
File Management Tips | |
| |
| |
Physical File Storage | |
| |
| |
QuickCheck D | |
| |
| |
| |
Backup Security | |
| |
| |
Backup Basics | |
| |
| |
Data File Backup | |
| |
| |
System Backup | |
| |
| |
Boot and Recovery Disks | |
| |
| |
QuickCheck E | |
| |
| |
Issue: Cyberterrorists or Pranksters? | |
| |
| |
Computers in Context: Law Enforcement | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
LANS And WLANS | |
| |
| |
| |
Network Building Blocks | |
| |
| |
Network Classifications | |
| |
| |
LAN Standards | |
| |
| |
Network Devices | |
| |
| |
Clients, Servers, and Peers | |
| |
| |
Physical Topology | |
| |
| |
Network Links | |
| |
| |
Communications Protocols | |
| |
| |
QuickCheck A | |
| |
| |
| |
Wired Networks | |
| |
| |
Wired Network Basics | |
| |
| |
HomePNA and Powerline Networks | |
| |
| |
Ethernet | |
| |
| |
Ethernet Equipment | |
| |
| |
Ethernet Setup | |
| |
| |
QuickCheck B | |
| |
| |
| |
Wireless Networks | |
| |
| |
Wireless Basics | |
| |
| |
Bluetooth | |
| |
| |
Wi-Fi | |
| |
| |
Wi-Fi Equipment | |
| |
| |
Wi-Fi Setup | |
| |
| |
QuickCheck C | |
| |
| |
| |
Using LANs | |
| |
| |
LAN Advantages and Challenges | |
| |
| |
Sharing Files | |
| |
| |
Sharing Printers | |
| |
| |
LAN Parties | |
| |
| |
QuickCheck D | |
| |
| |
| |
Security Through Encryption | |
| |
| |
Wi-Fi Security | |
| |
| |
Encryption | |
| |
| |
QuickCheck E | |
| |
| |
Issue: Who's Stealing My Signals? | |
| |
| |
Computers in Context: Education | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
The Internet | |
| |
| |
| |
Internet Technology | |
| |
| |
Background | |
| |
| |
Internet Infrastructure | |
| |
| |
Internet Protocols, Addresses, and Domains | |
| |
| |
Connection Speed | |
| |
| |
QuickCheck A | |
| |
| |
| |
Fixed Internet Access | |
| |
| |
Dial-up Connections | |
| |
| |
DSL, ISDN, and Dedicated Lines | |
| |
| |
Cable Internet Service | |
| |
| |
Satellite Internet Service | |
| |
| |
Fixed Wireless Service | |
| |
| |
Fixed Internet Connection Roundup | |
| |
| |
QuickCheck B | |
| |
| |
| |
Portable and Mobile Internet Access | |
| |
| |
Internet to Go | |
| |
| |
Wi-Fi Hotspots | |
| |
| |
Portable and Mobile WIMAX | |
| |
| |
Portable Satellite Service | |
| |
| |
Cellular Data Services | |
| |
| |
QuickCheck C | |
| |
| |
| |
Internet Services | |
| |
| |
Real-Time Messaging | |
| |
| |
Voice Over IP | |
| |
| |
Grid Computing | |
| |
| |
FTP | |
| |
| |
File Sharing | |
| |
| |
QuickCheck D | |
| |
| |
| |
Internet Security | |
| |
| |
Intrusion Attempts | |
| |
| |
Securing Ports | |
| |
| |
Routers and NAT | |
| |
| |
Virtual Private Networks | |
| |
| |
QuickCheck E | |
| |
| |
Issue: What's Happening to Free Speech? | |
| |
| |
Computers in Context: Banking | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
The Web and E-Mail | |
| |
| |
| |
Web Technology | |
| |
| |
Web Basics | |
| |
| |
HTML | |
| |
| |
HTTP | |
| |
| |
Web Browsers | |
| |
| |
Cookies | |
| |
| |
Web Page Authoring | |
| |
| |
HTML Scripts | |
| |
| |
QuickCheck A | |
| |
| |
| |
Search Engines | |
| |
| |
Search Engine Basics | |
| |
| |
Formulating Searches | |
| |
| |
Citing Web-based Source Material | |
| |
| |
QuickCheck B | |
| |
| |
| |
E-commerce | |
| |
| |
E-commerce Basics | |
| |
| |
Online Shopping | |
| |
| |
Online Auctions | |
| |
| |
Online Payment | |
| |
| |
QuickCheck C | |
| |
| |
| |
E-mail | |
| |
| |
E-mail Overview | |
| |
| |
Netiquette | |
| |
| |
E-mail Technology | |
| |
| |
QuickCheck D | |
| |
| |
| |
Web and E-mail Security | |
| |
| |
Cookie Exploits | |
| |
| |
Fake Sites | |
| |
| |
Spam | |
| |
| |
Phishing | |
| |
| |
QuickCheck E | |
| |
| |
Issue: Who's Reading Your E-mail? | |
| |
| |
Computers in Context: Fashion Industry | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Digital Media | |
| |
| |
| |
Digital Sound | |
| |
| |
Digital Audio Basics | |
| |
| |
Portable Audio Players | |
| |
| |
MIDI Music | |
| |
| |
Speech Recognition and Synthesis | |
| |
| |
| |
| |
| |
| |
Bitmap Graphics | |
| |
| |
Bitmap Basics | |
| |
| |
Scanners and Cameras | |
| |
| |
Image Resolution | |
| |
| |
Color Depth and Palettes | |
| |
| |
Image Compression | |
| |
| |
Bitmap Graphics Formats | |
| |
| |
| |
| |
| |
| |
Vector and 3-D Graphics | |
| |
| |
Vector Graphics Basics | |
| |
| |
Vector-to-Bitmap Conversion | |
| |
| |
Vector Graphics on the Web | |
| |
| |
3-D Graphics | |
| |
| |
| |
| |
| |
| |
Digital Video | |
| |
| |
Digital Video Basics | |
| |
| |
Producing Video Footage | |
| |
| |
Video Transfer | |
| |
| |
Video Editing | |
| |
| |
Video Output | |
| |
| |
Desktop, PDA, and Web Video | |
| |
| |
DVD-Video | |
| |
| |
| |
| |
| |
| |
Digital Rights Management | |
| |
| |
DRM Basics | |
| |
| |
Signal Scrambling and Digital Watermarks | |
| |
| |
CD Copy Protection | |
| |
| |
DVD DRM | |
| |
| |
DRM for Digital Downloads | |
| |
| |
| |
| |
| |
Issue: What Happened to Fair Use? | |
| |
| |
Computers in Context: Film | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
The Computer Industry: History, Careers, and Ethics | |
| |
| |
| |
Computer History | |
| |
| |
Manual Calculators | |
| |
| |
Mechanical Calculators | |
| |
| |
Computer Prototypes | |
| |
| |
Generations of Computers | |
| |
| |
Personal Computers | |
| |
| |
| |
| |
| |
| |
The Computer and IT Industries | |
| |
| |
Industry Overview | |
| |
| |
Economic Factors | |
| |
| |
Product Development | |
| |
| |
Market Share | |
| |
| |
Marketing Channels | |
| |
| |
Industry Regulation | |
| |
| |
| |
| |
| |
| |
Careers for Computer Professionals | |
| |
| |
Jobs and Salaries | |
| |
| |
Education and Certification | |
| |
| |
Job Hunting Basics | |
| |
| |
Resumes and Web Portfolios | |
| |
| |
Job Listings | |
| |
| |
| |
| |
| |
| |
Professional Ethics | |
| |
| |
Ethics Basics | |
| |
| |
IT Ethics | |
| |
| |
Ethical Decision Making | |
| |
| |
Whistleblowing | |
| |
| |
| |
| |
| |
| |
Work Area Safety and Ergonomics | |
| |
| |
Radiation Risks | |
| |
| |
Repetitive Stress Injuries | |
| |
| |
Eye Strain | |
| |
| |
Back Pain | |
| |
| |
Sedentary Lifestyle | |
| |
| |
| |
| |
| |
Issue: Are Tech Jobs Heading Offshore? | |
| |
| |
Computers in Context: Travel | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Information Systems Analysis and Design | |
| |
| |
| |
Information Systems | |
| |
| |
Information Systems in Organizations | |
| |
| |
Transaction Processing Systems | |
| |
| |
Management Information Systems | |
| |
| |
Decision Support Systems | |
| |
| |
Expert Systems and Neural Networks | |
| |
| |
| |
| |
| |
| |
Systems Analysis | |
| |
| |
System Development Life Cycle | |
| |
| |
Planning Phase | |
| |
| |
Analysis Phase | |
| |
| |
Documentation Tools | |
| |
| |
| |
| |
| |
| |
System Design | |
| |
| |
Design Phase | |
| |
| |
Evaluation and Selection | |
| |
| |
Application Specifications | |
| |
| |
| |
| |
| |
| |
Implementation and Maintenance | |
| |
| |
Implementation Phase | |
| |
| |
Development and Testing | |
| |
| |
Documentation and Training | |
| |
| |
Conversion and Cutover | |
| |
| |
Maintenance Phase | |
| |
| |
| |
| |
| |
| |
Corporate Data Security | |
| |
| |
Information System Data Vulnerabilities | |
| |
| |
Information System Data Security | |
| |
| |
Corporate Identity Theft | |
| |
| |
| |
| |
| |
Issue: What's Wrong with Online Voting? | |
| |
| |
Computers in Context: Architecture and Construction | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Databases | |
| |
| |
| |
File and Database Concepts | |
| |
| |
Database Basics | |
| |
| |
Database Models | |
| |
| |
| |
| |
| |
| |
Data Management Tools | |
| |
| |
Data Management Software | |
| |
| |
Database Management Systems | |
| |
| |
Databases and the Web | |
| |
| |
XML | |
| |
| |
| |
| |
| |
| |
Database Design | |
| |
| |
Defining Fields | |
| |
| |
Normalization | |
| |
| |
Organizing Records | |
| |
| |
Designing the Interface | |
| |
| |
Designing Report Templates | |
| |
| |
Loading Data | |
| |
| |
| |
| |
| |
| |
SQL | |
| |
| |
SQL Basics | |
| |
| |
Adding Records | |
| |
| |
Searching for Information | |
| |
| |
Updating Fields | |
| |
| |
Joining Tables | |
| |
| |
| |
| |
| |
| |
Database Security | |
| |
| |
Database Vulnerabilities | |
| |
| |
Database Security Measures | |
| |
| |
Database Security Regulations | |
| |
| |
What Individuals Can Do | |
| |
| |
| |
| |
| |
Issue: Do You Want a National ID Card? | |
| |
| |
Computers in Context: Medicine | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
| |
Computer Programming | |
| |
| |
| |
Programming Basics | |
| |
| |
Computer Programming and Software Engineering | |
| |
| |
Programming Languages and Paradigms | |
| |
| |
Program Planning | |
| |
| |
Program Coding | |
| |
| |
Program Testing and Documentation | |
| |
| |
| |
| |
| |
| |
Procedural Programming | |
| |
| |
Algorithms | |
| |
| |
Expressing an Algorithm | |
| |
| |
Sequence, Selection, and Repetition Controls | |
| |
| |
Procedural Languages and Applications | |
| |
| |
| |
| |
| |
| |
Object-Oriented Programming | |
| |
| |
Objects and Classes | |
| |
| |
Inheritance | |
| |
| |
Methods and Messages | |
| |
| |
Object-Oriented Program Structure | |
| |
| |
Object-Oriented Languages and Applications | |
| |
| |
| |
| |
| |
| |
Declarative Programming | |
| |
| |
The Declarative Paradigm | |
| |
| |
Prolog Facts | |
| |
| |
Prolog Rules | |
| |
| |
Input Capabilities | |
| |
| |
Declarative Languages and Applications | |
| |
| |
| |
| |
| |
| |
Secure Programming | |
| |
| |
Black Hat Exploits | |
| |
| |
Secure Software Development | |
| |
| |
Mitigation | |
| |
| |
| |
| |
| |
Issue: Who's Minding the Asylum? | |
| |
| |
Computers in Context: Agriculture | |
| |
| |
New Perspectives Labs | |
| |
| |
Review Activities | |
| |
| |
Key Terms | |
| |
| |
Interactive Summary | |
| |
| |
Interactive Situation Questions | |
| |
| |
Interactive Practice Tests | |
| |
| |
Study Tips and Concept Map | |
| |
| |
Projects | |
| |
| |
On the Web | |
| |
| |
Quickcheck Answers | |
| |
| |
Credits | |
| |
| |
Glossary | |
| |
| |
Index | |