Discovering Computers
Discovering Computers
- ISBN 13:
9781423912095
- ISBN 10:
1423912098
- Format: Paperback
- Copyright: 02/21/2007
- Publisher: Cengage Learning
- Newer Edition
Rent
Sorry, this item is currently unavailable.
Free Shipping On Every Order
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Extend or Purchase Your Rental at Any Time
Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.
Summary
This fourth edition, from the Shelly Cashman Series, covers the same breadth, but with less depth as Discovering Computers 2008: Complete. This title is ideal for beginning coverage of computer concepts. With the Shelly Cashman Series' project-oriented, step-by-step pedagogy, and full-color screenshots, this book includes new exercises, and tools on the Online Companion. Updated for currency, the latest trends in technology and computer concepts are covered.
Table of Contents
Read moreIntroduction to Computers | p. 1 |
A World of Computers | p. 2 |
What is a Computer? | p. 3 |
Data and Information | p. 3 |
Advantages of Using Computers | p. 5 |
Disadvantages of Using Computers | p. 5 |
Looking Ahead: Medical Implants Can Enhance Lifestyles | p. 5 |
Information Processing Cycle | p. 5 |
The Components of a Computer | p. 6 |
Input Devices | p. 6 |
Output Devices | p. 7 |
System Unit | p. 7 |
Storage Devices | p. 7 |
Communication Devices | p. 8 |
Networks and the Internet | p. 8 |
Computer Software | p. 10 |
System Software | p. 10 |
Application Software | p. 11 |
Ethics & Issues: Do Computer Games Do More Harm than Good? | p. 11 |
Installing and Running Programs | p. 11 |
Software Development | p. 12 |
Categories of Computers | p. 13 |
Personal Computers | p. 14 |
Desktop Computers | p. 14 |
Mobile Computers and Mobile Devices | p. 14 |
Notebook Computers | p. 14 |
Mobile Devices | p. 15 |
Game Consoles | p. 16 |
Servers | p. 16 |
Mainframes | p. 17 |
Supercomputers | p. 17 |
Embedded Computers | p. 17 |
Examples of Computer Usage | p. 18 |
Home User | p. 18 |
Ethics & Issues: Who Should Monitor Online Social Networks? | p. 19 |
Small Office/Home Office User | p. 20 |
Mobile User | p. 20 |
Power User | p. 21 |
Large Business User | p. 21 |
Computer Applications in Society | p. 22 |
Looking Ahead: Robots Perform Mundane, Dangerous Tasks | p. 22 |
Education | p. 22 |
Finance | p. 23 |
Government | p. 23 |
Health Care | p. 23 |
Science | p. 24 |
Publishing | p. 25 |
Travel | p. 25 |
Manufacturing | p. 25 |
Chapter Summary | p. 26 |
Companies on the Cutting Edge | p. 27 |
Dell | p. 27 |
Apple Computer | p. 27 |
Technology Trailblazers | p. 27 |
Bill Gates | p. 27 |
Anne Mulcahy | p. 27 |
Chapter Review | p. 28 |
Key Terms | p. 29 |
Checkpoint | p. 30 |
Web Research | p. 31 |
Learn How To | p. 32 |
Learn It Online | p. 34 |
Special Feature: Timeline: Milestones in Computer History | p. 35 |
The Internet and World Wide Web | p. 49 |
The Internet | p. 50 |
How the Internet Works | p. 51 |
Connecting to the Internet | p. 51 |
Access Providers | p. 52 |
How Data Travels the Internet | p. 52 |
Internet Addresses | p. 53 |
The World Wide Web | p. 54 |
Browsing the Web | p. 54 |
Web Addresses | p. 56 |
Navigating Web Pages | p. 57 |
Looking Ahead: Internet Speeds into the Future | p. 57 |
Searching for Information on the Web | p. 57 |
Types of Web Sites | p. 61 |
Ethics & Issues: Should You Trust a Wiki for Academic Research? | p. 63 |
Evaluating a Web Site | p. 63 |
Multimedia on the Web | p. 64 |
Web Publishing | p. 66 |
E-Commerce | p. 67 |
Other Internet Services | p. 68 |
p. 69 | |
FTP | p. 71 |
Newsgroups and Message Boards | p. 71 |
Mailing Lists | p. 71 |
Chat Rooms | p. 71 |
Instant Messaging | p. 72 |
Internet Telephony | p. 73 |
Netiquette | p. 73 |
Chapter Summary | p. 74 |
Ethics & Issues: Should Companies Be Able to Tract Your Online Habits? | p. 74 |
Companies on the Cutting Edge | p. 75 |
p. 75 | |
Yahoo! | p. 75 |
Technology Trailblazers | p. 75 |
Tim Berners-Lee | p. 75 |
Meg Whitman | p. 75 |
Chapter Review | p. 76 |
Key Terms | p. 77 |
Checkpoint | p. 78 |
Web Research | p. 79 |
Learn How To | p. 80 |
Learn It Online | p. 82 |
Special Feature: Making Use of the Web | p. 83 |
Application Software | p. 99 |
Application Software | p. 100 |
The Role of System Software | p. 101 |
Working with Application Software | p. 102 |
Looking Ahead: Touch Drive Your Computer Screen | p. 103 |
Business Software | p. 104 |
Word Processing Software | p. 105 |
Developing a Document | p. 106 |
Spreadsheet Software | p. 107 |
Database Software | p. 108 |
Presentation Graphics Software | p. 109 |
Note Taking Software | p. 110 |
Personal Information Manager Software | p. 110 |
PDA Business Software | p. 110 |
Software Suite | p. 110 |
Project Management Software | p. 111 |
Accounting Software | p. 111 |
Document Management Software | p. 111 |
Enterprise Computing Software | p. 112 |
Graphics and Multimedia Software | p. 112 |
Computer-Aided Design | p. 113 |
Desktop Publishing Software (for the Professional) | p. 113 |
Paint/Image Editing Software (for the Professional) | p. 113 |
Video and Audio Editing Software (for the Professional) | p. 114 |
Ethics & Issues: What Should Be Done to Prevent Music and Video File Sharing? | p. 114 |
Multimedia Authoring Software | p. 114 |
Web Page Authoring Software | p. 114 |
Software for Home, Personal, and Educational Use | p. 115 |
Software Suite (for Personal Use) | p. 116 |
Personal Finance Software | p. 116 |
Legal Software | p. 117 |
Tax Preparation Software | p. 117 |
Desktop Publishing Software (for Personal Use) | p. 117 |
Paint/Image Editing Software (for Personal Use) | p. 118 |
Clip Art/Image Gallery | p. 118 |
Video and Audio Editing Software (for Personal Use) | p. 119 |
Home Design/Landscaping Software | p. 119 |
Educational and Reference Software | p. 119 |
Entertainment Software | p. 120 |
Application Software for Communications | p. 120 |
Looking Ahead: 3-D Scans May Reduce Surgeries | p. 122 |
Popular Utility Programs | p. 121 |
Web-Based Software | p. 121 |
Learning Aids and Support Tools for Application Software | p. 122 |
Ethics & Issues: Should Companies Monitor Employees' E-Mail and Internet Traffic? | p. 122 |
Web-Based Training | p. 123 |
Chapter Summary | p. 124 |
Ethics & Issues: Copying Software - A Computer Crime! | p. 124 |
Companies on the Cutting Edge | p. 125 |
Adobe Systems | p. 125 |
Microsoft | p. 125 |
Technology Trailblazers | p. 125 |
Dan Bricklin | p. 125 |
Masayoshi Son | p. 125 |
Chapter Review | p. 126 |
Key Terms | p. 127 |
Checkpoint | p. 128 |
Web Research | p. 129 |
Learn How To | p. 130 |
Learn It Online | p. 132 |
The Components of the System Unit | p. 133 |
The System Unit | p. 134 |
The Motherboard | p. 136 |
Processor | p. 137 |
The Control Unit | p. 137 |
The Arithmetic Logic Unit | p. 137 |
Machine Cycle | p. 138 |
The System Clock | p. 138 |
Looking Ahead: Hybrid Technology to Power Supercomputer | p. 139 |
Dual-Core and Multi-Core Processors | p. 139 |
Comparison of Personal Computer Processors | p. 139 |
Buying a Personal Computer | p. 139 |
Ethics & Issues: Discarded Computer Components: Whose Problem Is It? | p. 139 |
Data Representation | p. 140 |
Memory | p. 142 |
Bytes and Addressable Memory | p. 142 |
Memory Sizes | p. 142 |
Types of Memory | p. 142 |
RAM | p. 143 |
Ethics & Issues: Should Schools Supply Computers to All Students? | p. 144 |
Cache | p. 144 |
ROM | p. 145 |
Flash Memory | p. 145 |
CMOS | p. 146 |
Memory Access Times | p. 146 |
Expansion Slots and Adapter Cards | p. 147 |
Flash Memory Cards, USB Flash Drives, PC Cards, and ExpressCards | p. 147 |
Ports and Connectors | p. 148 |
Serial Ports | p. 149 |
Parallel Ports | p. 149 |
USB Ports | p. 149 |
FireWire Ports | p. 150 |
Special Purpose Ports | p. 150 |
Buses | p. 151 |
Bays | p. 151 |
Power Supply | p. 152 |
Mobile Computers and Devices | p. 152 |
Putting It All Together | p. 153 |
Looking Ahead: Healing Bodies with Nanotechnology | p. 154 |
Keeping Your Computer Clean | p. 155 |
Chapter Summary | p. 156 |
Companies on the Cutting Edge | p. 157 |
AMD | p. 157 |
Intel | p. 157 |
Technology Trailblazers | p. 157 |
Jack Kilby | p. 157 |
Gordon Moore | p. 157 |
Chapter Review | p. 158 |
Key Terms | p. 159 |
Checkpoint | p. 160 |
Web Research | p. 161 |
Learn How To | p. 162 |
Learn It Online | p. 164 |
Input and Output | p. 165 |
What is Input? | p. 166 |
Keyboard and Pointing Devices | p. 167 |
The Keyboard | p. 168 |
Mouse | p. 169 |
Ethics & Issues: Are Employees Responsible for Medical Problems Related to Computer Use? | p. 169 |
Trackball | p. 170 |
Touchpad | p. 170 |
Pointing Stick | p. 170 |
Light Pen | p. 170 |
Touch Screen | p. 171 |
Pen Input | p. 171 |
Gaming and Media Player Controllers | p. 172 |
Gamepads | p. 172 |
Joystick and Wheels | p. 172 |
Light Guns | p. 172 |
Dance Pads | p. 172 |
Motion-Sensing Game Controllers | p. 172 |
Touch-Sensitive Pads | p. 172 |
Other Types of Input | p. 173 |
Looking Ahead: Controlling Games by Thinking | p. 173 |
Voice Input | p. 173 |
Input for PDAs, Smart Phones, and Tablet PCs | p. 174 |
Digital Cameras | p. 175 |
Video Input | p. 176 |
Scanners and Reading Devices | p. 177 |
Ethics & Issues: Scanner Errors at the Checkout Counter? | p. 178 |
Looking Ahead: Paying with Your Cellular Telephone | p. 179 |
Terminals | p. 180 |
Biometric Input | p. 181 |
What is Output? | p. 182 |
Display Devices | p. 183 |
LCD Monitors and Screens | p. 184 |
Plasma Monitors | p. 185 |
CRT Monitors | p. 186 |
Printers | p. 187 |
Producing Printed Output | p. 188 |
Nonimpact Printers | p. 189 |
Ink-Jet Printers | p. 189 |
Ethics & Issues: Should Companies Prohibit Consumers from Refilling Ink Cartridges? | p. 190 |
Photo Printers | p. 190 |
Laser Printers | p. 190 |
Thermal Printers | p. 191 |
Mobile Printers | p. 192 |
Plotters and Large-Format Printers | p. 192 |
Impact Printers | p. 192 |
Other Output Devices | p. 193 |
Speakers, Headphones, and Earphones | p. 193 |
Fax Machines and Fax Modems | p. 194 |
MultiFunction Peripherals | p. 194 |
Data Projectors | p. 195 |
Looking Ahead: Ultra HDTV Puts Viewers in the Picture | p. 195 |
Putting It All Together | p. 196 |
Input and Output Devices for Physically Challenged Users | p. 197 |
Ethics & Issues: Should Web Sites Be Held Accountable for Accessibility Levels for Physically Challenged People? | p. 197 |
Chapter Summary | p. 198 |
Companies on the Cutting Edge | p. 199 |
Logitech | p. 199 |
Hewlett-Packard | p. 199 |
Technology Trailblazers | p. 199 |
Douglas Engelbart | p. 199 |
Donna Dubinsky | p. 199 |
Chapter Review | p. 200 |
Key Terms | p. 202 |
Checkpoint | p. 203 |
Web Research | p. 204 |
Learn How To | p. 205 |
Learn It Online | p. 207 |
Special Feature: Digital Imaging and Video Technology | p. 208 |
Storage | p. 219 |
Storage | p. 220 |
Magnetic Disks | p. 222 |
Hard Disks | p. 223 |
Looking Ahead: Heat Increases Disk Capacity | p. 223 |
Floppy Disks | p. 228 |
Optical Discs | p. 229 |
CD-ROMs | p. 231 |
CD-Rs and CD-RWs | p. 232 |
Ethics & Issues: Is the Blu-Ray and HD DVD Competition Good for Consumers? | p. 233 |
DVD-ROMs, BD-ROMs, and HD DVD-ROMs | p. 233 |
Looking Ahead: Bookshelf Design Streamlines Entertainment Storage | p. 233 |
Recordable and Rewritable DVDs | p. 234 |
Tape | p. 234 |
PC Cards and Expresscards | p. 235 |
Miniature Mobile Storage Media | p. 235 |
Flash Memory Cards | p. 236 |
USB Flash Drives | p. 236 |
Smart Cards | p. 237 |
Ethics & Issues: Should the World Become a Cashless Society? | p. 237 |
Microfilm and Microfiche | p. 238 |
Enterprise Storage | p. 238 |
Putting It All Together | p. 239 |
Ethics & Issues: Who Should Be Looking at Your Medical Records? | p. 239 |
Chapter Summary | p. 240 |
Companies on the Cutting Edge | p. 241 |
Seagate Technology | p. 241 |
SanDisk Corporation | p. 241 |
Technology Trailblazers | p. 241 |
Al Shugart | p. 241 |
Mark Dean | p. 241 |
Chapter Review | p. 242 |
Key Terms | p. 243 |
Checkpoint | p. 244 |
Web Research | p. 245 |
Learn How To | p. 246 |
Learn It Online | p. 248 |
Operating Systems and Utility Programs | p. 249 |
System Software | p. 250 |
Operating Systems | p. 251 |
Operating System Functions | p. 252 |
Starting a Computer | p. 252 |
Providing a User Interface | p. 253 |
Managing Programs | p. 253 |
Managing Memory | p. 255 |
Scheduling Jobs | p. 255 |
Configuring Devices | p. 256 |
Establishing an Internet Connection | p. 256 |
Monitoring Performance | p. 257 |
Providing File Management and Other Utilities | p. 257 |
Controlling a Network | p. 257 |
Administering Security | p. 258 |
Ethics & Issues: Who Should Be Responsible for Notebook Computer Security? | p. 258 |
Operating System Utility Programs | p. 259 |
File Manager | p. 259 |
Search Utility | p. 259 |
Image Viewer | p. 259 |
Personal Firewall | p. 260 |
Uninstaller | p. 260 |
Disk Scanner | p. 260 |
Disk Defragmenter | p. 261 |
Diagnostic Utility | p. 261 |
Backup Utility | p. 261 |
Screen Saver | p. 261 |
Types of Operating Systems | p. 262 |
Stand-Alone Operating Systems | p. 262 |
Windows XP | p. 262 |
Windows Vista | p. 263 |
Mac OS X | p. 264 |
UNIX | p. 264 |
Linux | p. 265 |
Looking Ahead: Apple Marching to Its Own Tune | p. 265 |
Ethics & Issues: Closed Source vs. Open Source Operating Systems | p. 265 |
Network Operating Systems | p. 266 |
Embedded Operating Systems | p. 266 |
Stand-Alone Utility Programs | p. 267 |
Antivirus Programs | p. 267 |
Spyware Removers | p. 268 |
Internet Filters | p. 268 |
File Compression | p. 269 |
File Conversion | p. 269 |
Media Player | p. 269 |
CD/DVD Burning | p. 269 |
Personal Computer Maintenance | p. 270 |
Chapter Summary | p. 270 |
Companies on the Cutting Edge | p. 271 |
Red Hat | p. 271 |
Research in Motion (RIM) | p. 271 |
Technology Trailblazers | p. 271 |
Alan Kay | p. 271 |
Linus Torvalds | p. 271 |
Chapter Review | p. 272 |
Key Terms | p. 273 |
Checkpoint | p. 274 |
Web Research | p. 275 |
Learn How To | p. 276 |
Learn It Online | p. 278 |
Special Feature: Buyer's Guide: How to Purchase a Personal Computer | p. 279 |
Communications and Networks | p. 295 |
Communications | p. 296 |
Uses of Computer Communications | p. 297 |
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Fax | p. 298 |
Wireless Messaging Services | p. 298 |
Ethics & Issues: High Tech Cheating via Wireless Messaging Services? | p. 299 |
Wireless Internet Access Points | p. 300 |
Cybercafes | p. 301 |
Global Positioning System | p. 301 |
Collaboration | p. 302 |
Groupware | p. 302 |
Voice Mail | p. 302 |
Web Services | p. 302 |
Networks | p. 303 |
LANs, MANs, and WANs | p. 303 |
Network Architectures | p. 305 |
Network Topologies | p. 306 |
Intranets | p. 307 |
Network Communications Standards | p. 308 |
Ethics & Issues: Should You Worry about Cellular Phone and Cellular Antenna Radiation? | p. 309 |
Communications Software | p. 310 |
Communications Over the Telephone Network | p. 310 |
Dial-Up Lines | p. 311 |
Dedicated Lines | p. 311 |
Communications Devices | p. 312 |
Dial-Up Modems | p. 313 |
ISDN and DSL Modems | p. 314 |
Cable Modems | p. 314 |
Wireless Modems | p. 314 |
Network Cards | p. 315 |
Wireless Access Points | p. 315 |
Routers | p. 315 |
Home Networks | p. 316 |
Wired Home Networks | p. 316 |
Wireless Home Networks | p. 316 |
Communications Channel | p. 317 |
Looking Ahead: Teleprescence Expands Face-to-Face Communication | p. 319 |
Physical Transmission Media | p. 319 |
Twisted-Pair Cable | p. 319 |
Coaxial Cable | p. 320 |
Fiber-Optic Cable | p. 320 |
Wireless Transmission Media | p. 320 |
Infrared | p. 321 |
Broadcast Radio | p. 321 |
Cellular Radio | p. 321 |
Microwaves | p. 321 |
Communications Satellite | p. 321 |
Looking Ahead: Fighting Fires, Savings Lives with Satellites | p. 322 |
Chapter Summary | p. 322 |
Companies on the Cutting Edge | p. 323 |
Cisco Systems | p. 323 |
QUALCOMM | p. 323 |
Technology Trailblazers | p. 323 |
Robert Metcalfe | p. 323 |
Patricia Russo | p. 323 |
Chapter Review | p. 324 |
Key Terms | p. 325 |
Checkpoint | p. 326 |
Web Research | p. 327 |
Learn How To | p. 328 |
Learn It Online | p. 330 |
Database Management | p. 331 |
Databases, Data, and Information | p. 332 |
Data Integrity | p. 333 |
Qualities of Valuable Information | p. 334 |
The Hierarchy of Data | p. 334 |
Characters | p. 335 |
Fields | p. 335 |
Records | p. 336 |
Files | p. 336 |
Ethics & Issues: Are Portable Storage Devices a Threat to Businesses? | p. 336 |
Maintaining Data | p. 336 |
Adding Records | p. 336 |
Changing Records | p. 338 |
Deleting Records | p. 338 |
Validating Data | p. 339 |
File Processing Versus Databases | p. 340 |
File Processing Systems | p. 341 |
The Database Approach | p. 341 |
Database Management Systems | p. 343 |
Data Dictionary | p. 343 |
File Retrieval and Maintenance | p. 344 |
Looking Ahead: Archive an Entire Lifetime | p. 345 |
Backup and Recovery | p. 346 |
Data Security | p. 346 |
Ethics & Issues: Would You Carry a Contactless Smart Card? | p. 346 |
Relational, Object-Oriented, and Multidimensional Databases | p. 347 |
Relational Databases | p. 347 |
Object-Oriented Databases | p. 349 |
Multidimensional Databases | p. 349 |
Web Databases | p. 350 |
Ethics & Issues: Can the Government Be Trusted with Personal Data? | p. 350 |
Database Administration | p. 351 |
Database Design Guidelines | p. 351 |
Role of the Database Anaylsts and Administrators | p. 351 |
Role of the Employee as User | p. 351 |
Chapter Summary | p. 352 |
Looking Ahead: Preserving Electronic Files for Future Generations | p. 352 |
Companies on the Cutting Edge | p. 353 |
Oracle | p. 353 |
Sybase | p. 353 |
Technology Trailblazers | p. 353 |
E. F. Codd | p. 353 |
Larry Ellison | p. 353 |
Chapter Review | p. 354 |
Key Terms | p. 355 |
Checkpoint | p. 356 |
Web Research | p. 357 |
Learn How To | p. 358 |
Learn It Online | p. 360 |
Computer Security, Ethics, and Privacy | p. 361 |
Computer Security Risks | p. 362 |
Internet and Network Attacks | p. 364 |
Computer Viruses, Worms, and Trojan Horses | p. 364 |
Safeguards against Computer Viruses, Worms, and Trojan Horses | p. 365 |
Denial of Service Attacks | p. 367 |
Back Doors | p. 367 |
Spoofing | p. 367 |
Safeguards against Botnets, DoS Attacks, Back Doors, and Spoofing | p. 367 |
Firewalls | p. 367 |
Intrusion Detection Software | p. 368 |
Unauthorized Access and Use | p. 368 |
Safeguards against Unauthorized Access and Use | p. 368 |
Identifying and Authenticating Users | p. 368 |
Looking Ahead: Three Dimensional Facial Recognition Software - A Step Forward for Security | p. 370 |
Hardware Theft and Vandalism | p. 371 |
Safeguards against Hardware Theft and Vandalism | p. 371 |
Software Theft | p. 372 |
Safeguards against Software Theft | p. 372 |
Information Theft | p. 373 |
Safeguards against Information Theft | p. 373 |
Encryption | p. 373 |
System Failure | p. 374 |
Safeguards against System Failure | p. 374 |
Backing Up - the Ultimate Safeguard | p. 375 |
Wireless Security | p. 375 |
Ethics and Society | p. 376 |
Information Accuracy | p. 377 |
Intellectual Property Rights | p. 378 |
Ethics & Issues: Should It Be Illegal to Sell Programs That Copy Movies from DVDs? | p. 379 |
Information Privacy | p. 379 |
Electronic Profiles | p. 380 |
Cookies | p. 380 |
Spyware and Adware | p. 381 |
Ethics & Issues: Should Spyware Be Legal? | p. 381 |
Phishing | p. 381 |
Spam | p. 382 |
Privacy Laws | p. 382 |
Socail Engineering | p. 384 |
Employee Monitoring | p. 384 |
Content Filtering | p. 384 |
Computer Forensics | p. 385 |
Looking Ahead: Computer Knowledge Assessment Using Brain Fingerprinting | p. 385 |
Health Concerns of Computer Use | p. 385 |
Computers and Health Risks | p. 385 |
Ergonomics and Workplace Design | p. 386 |
Computer Addiction | p. 387 |
Green Computing | p. 387 |
Chapter Summary | p. 388 |
Companies on the Cutting Edge | p. 389 |
McAfee | p. 389 |
Symantec | p. 389 |
Technology Trailblazers | p. 389 |
Donn Parker | p. 389 |
Clifford Stoll | p. 389 |
Chapter Review | p. 390 |
Key Terms | p. 391 |
Checkpoint | p. 392 |
Web Research | p. 393 |
Learn How To | p. 394 |
Learn It Online | p. 396 |
Special Feature: Digital Entertainment | p. 397 |
Information System Development and Programming Languages | p. 405 |
The System Development Cycle | p. 406 |
Who Participates in the System Development Cycle? | p. 407 |
Looking Ahead: Strong Employment Opportunities for System Analysts | p. 408 |
Project Management | p. 408 |
Feasibility Assessment | p. 409 |
Documentation | p. 409 |
Data and Information Gathering Techniques | p. 410 |
Ethics & Issues: Do You Work Harder When Someone Is Watching? | p. 410 |
What Initiates the System Development Cycle? | p. 410 |
Ethics & Issues: How Should Employees Combat Poor E-mail Writing Skills? | p. 411 |
Cyber Coast Cafe - A Case Study | p. 412 |
Planning Phase | p. 412 |
Planning at Cyber Coast Cafe | p. 413 |
Analysis Phase | p. 413 |
Preliminary Investigation at Cyber Coast Cafe | p. 414 |
Detailed Analysis at Cyber Coast Cafe | p. 416 |
Design Phase | p. 416 |
Hardware Acquisition at Cyber Coast Cafe | p. 418 |
Detailed Design at Cyber Coast Cafe | p. 420 |
Implementation Phase | p. 420 |
Looking Ahead: Training Delivery Becomes Flexible | p. 420 |
Implementation at Cyber Coast Cafe | p. 421 |
Operation, Support, and Security Phase | p. 422 |
Operation, Support, and Security at Cyber Coast Cafe | p. 422 |
Programming Languages | p. 423 |
Low-Level Languages | p. 424 |
Procedural Languages | p. 425 |
Object-Oriented Programming Languages and Program Development Tools | p. 427 |
Other Programming Languages | p. 430 |
Classic Programming Languages | p. 431 |
Other Program Development Tools | p. 431 |
Ethics & Issues: Should All Students Be Required to Learn Computer Programming? | p. 432 |
Web Page Development | p. 433 |
Multimedia Program Development | p. 437 |
The Program Development Cycle | p. 438 |
Ethics & Issues: Who is Responsible for Bugs | p. 439 |
What Initiates the Program Development Cycle? | p. 439 |
Looking Ahead: Software Factories Provide Low-Cost Programming Alternatives | p. 439 |
Control Structures | p. 440 |
Chapter Summary | p. 442 |
Companies on the Cutting Edge | p. 443 |
Computer Sciences Corporation (CSC) | p. 443 |
Electronic Arts (EA) | p. 443 |
Technology Trailblazers | p. 443 |
Grace Hopper | p. 443 |
James Gosling | p. 443 |
Chapter Review | p. 444 |
Key Terms | p. 445 |
Checkpoint | p. 446 |
Web Research | p. 447 |
Learn How To | p. 448 |
Learn It Online | p. 450 |
Enterprise Computing | p. 451 |
What is Enterprise Computing? | p. 452 |
Types of Enterprise | p. 454 |
Organizational Structure of an Enterprise | p. 454 |
Looking Ahead: The CEO of the Future | p. 455 |
Levels of Users in the Enterprise | p. 455 |
How Managers Use Information | p. 456 |
Information Systems in the Enterprise | p. 456 |
Information Systems within Functional Units | p. 457 |
General Purpose Information Systems | p. 461 |
Integrated Information Systems | p. 465 |
Enterprise-Wide Technologies and Methodologies | p. 467 |
Portals | p. 467 |
EDI | p. 468 |
Data Warehouses | p. 468 |
Extranets | p. 469 |
Web Services | p. 469 |
Workflow | p. 469 |
Virtual Private Network | p. 470 |
E-Commerce | p. 470 |
E-Retailing | p. 470 |
Ethics & Issues: Can You Trust When Making Purchases Online? | p. 471 |
Finance | p. 472 |
Health | p. 472 |
Ethics & Issues: Would You Trust an Online Medical Diagnosis? | p. 472 |
Entertainment and Media | p. 472 |
Travel | p. 473 |
Other Business Services | p. 473 |
Enterprise Hardware | p. 474 |
RAID | p. 474 |
Network Attached Storage and Storage Area Networks | p. 474 |
Enterprise Storage Systems | p. 476 |
Ethics & Issues: How Much Data Should Companies Be Required to Keep? | p. 476 |
Blade Servers | p. 477 |
High-Availability Systems | p. 477 |
Scalability | p. 477 |
Utility and Grid Computing | p. 478 |
Interoperability | p. 478 |
Backup Procedures and Security | p. 478 |
Looking Ahead: Internet Systems Provide Backup Solutions | p. 478 |
Disaster Recovery Plan | p. 479 |
Chapter Summary | p. 480 |
Companies on the Cutting Edge | p. 481 |
EMC | p. 481 |
IBM | p. 481 |
Technology Trailblazers | p. 481 |
John Chambers | p. 481 |
Jim Clark | p. 481 |
Chapter Review | p. 482 |
Key Terms | p. 483 |
Checkpoint | p. 484 |
Web Research | p. 485 |
Learn How To | p. 486 |
Learn It Online | p. 488 |
Quiz Yourself Answers | p. APP 1 |
Glossary/Index | p. IND 1 |
Photo Credits | p. IND 29 |
Table of Contents provided by Ingram. All Rights Reserved. |
Supplemental Materials
Read moreWhat is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Write a Review
Currently unavailable