Discovering Computers 2008: Complete
Author: Gary B Shelly
Discovering Computers 2008 delivers students an unparalleled learning experience by offering the most current and comprehensive information on computers and technology.
Table of Contents:
Introduction to Computers 2A World of Computers 4
What is a Computer? 6
Data and Information 6
Information Processing Cycle 6
The Components of a Computer 7
Input Devices 7
Output Devices 8
System Unit 8
Storage Devices 8
Communication Devices 9
Advantages and Disadvantages of Using Computers 9
Looking Ahead: Medical Implants Can Enhance Lifestyles 9
Ethics & Issues: What Should Be Done about Identity Theft? 10
Networks and the Internet 11
The Internet 12
Ethics & Issues: Who is Responsible for the Accuracy of Web Pages? 14
Computer Software 15
System Software 15
Application Software 16
Ethics & Issues: Do Computer Games Do More Harm than Good? 16
Installing and Running Programs 17
Software Development 18
Categories of Computers 18
Personal Computers 19
Desktop Computers 20
Mobile Computers and Mobile Devices 20
Notebook Computers 20
Mobile Devices 21
Game Consoles 22
Servers 23
Mainframes 23
Supercomputers 23
Embedded Computers 24
Elements of an Information System 25
Examples of Computer Usage 26
Home User 26
Ethics & Issues: Who Should Monitor Online Social Networks? 27
Small Office/Home User 28
Mobile User 29
Power User 29
Large Business User 30
Putting It All Together 31
Computer Applications in Society 32
Looking Ahead: Robots Perform Mundane, Dangerous Tasks 32
Education 32
Finance 32
Government 33
Ethics & Issues: Should the Government Be Able to Perform Surveillance on All Electronic Communications? 33
Health Care 34
Science 34
Publishing 35
Travel 36
Manufacturing 36
Chapter Summary 37
High-Tech Talk 38
Analog versus Digital: Making the Conversion 38
Companies on the Cutting Edge 39
Dell 39
Apple Computer 39
Technology Trailblazers 39
Bill Gates 39
Anne Mulcahy 39
Chapter Review 40
Key Terms 42
Checkpoint 43
Learn It Online 46
Learn How To 48
Web Research 50
Case Studies 51
Special Feature: Timeline 2008 52
The Internet and World Wide Web 66
The Internet 68
History of the Internet 69
Looking Ahead: Internet Speeds into the Future 70
How the Internet Works 70
Connecting to the Internet 70
Access Providers 71
How Data Travels the Internet 72
Internet Addresses 73
The World Wide Web 75
Browsing the Web 75
Web Addresses 76
Navigating Web Pages 77
Searching for Information on the Web 78
Looking Ahead: Facing Up to Search Technology 81
Types of Web Sites 82
Ethics & Issues: Should You Trust a Wiki for Academic Research? 84
Evaluating a Web Site 84
Multimedia on the Web 85
Ethics & Issues: Who Should Control the Content of Your CDs, DVDs, and Media Files? 87
Web Publishing 89
E-Commerce 91
Looking Ahead: Grocery Shopping with a Buddy 92
Other Internet Services 92
E-Mail 92
Ethics & Issues: E-mail: Irritant or Liberator? 94
FTP 96
Newsgroups and Message Boards 96
Mailing Lists 97
Chat Rooms 98
Instant Messaging 98
Internet Telephony 99
Netiquette 100
Chapter Summary 101
Ethics & Issues: Should Companies Be Able to Track Your Online Habits? 101
High-Tech Talk 102
A Computer's Internet Protocol (IP) Address 102
Companies on the Cutting Edge 103
Google 103
Yahoo! 103
Technology Trailblazers 103
Tim Berners-Lee 103
Meg Whitman 103
Chapter Review 104
Key Terms 106
Checkpoint 107
Learn It Online 110
Learn How To 112
Web Research 114
Case Studies 115
Special Feature: Making Use of the Web 116
Application Software 132
Application Software 134
The Role of System Software 135
Working with Application Software 136
Looking Ahead: Touch Drive Your Computer Screen 137
Business Software 138
Word Processing Software 138
Developing a Document 141
Ethics & Issues: How Should Schools Deal with Internet Plagiarism? 141
Spreadsheet Software 142
Database Software 145
Presentation Graphics Software 146
Note Taking Software 147
Personal Information Manager Software 148
PDA Business Software 148
Software Suite 148
Project Management Software 149
Accounting Software 149
Document Management Software 150
Enterprise Computing Software 150
Graphics and Multimedia Software 151
Computer-Aided Design 151
Desktop Publishing Software (for the Professional) 152
Paint/Image Editing Software (for the Professional) 152
Photo Editing Software (for the Professional) 152
Ethics & Issues: Altering Digital Photographs - Art or Fraud? 153
Video and Audio Editing Software (for the Professional) 153
Multimedia Authoring Software 154
Web Page Authoring Software 154
Software for Home, Personal, and Educational Use 155
Software Suite (for Personal Use) 156
Personal Finance Software 156
Legal Software 157
Tax Preparation Software 157
Desktop Publishing Software (for Personal Use) 158
Paint/Image Editing Software (for Personal Use) 158
Photo Editing Software 159
Clip Art/Image Gallery 159
Video and Audio Editing Software (for Personal Use) 159
Home Design/Landscaping Software 160
Reference and Educational Software 160
Entertainment Software 160
Application Software for Communications 161
Ethics & Issues: Should Companies Monitor Employees' E-Mail and Internet Traffic? 161
Popular Utility Programs 162
Web-Based Software 163
Application Service Providers 164
Learning Aids and Support Tools for Application Software 164
Looking Ahead: 3-D Scans May Reduce Surgeries 164
Web-Based Training 165
Ethics & Issues: Will Patents Endanger E-Learning? 166
Chapter Summary! 167
Ethics & Issues: Copying Software - A Computer Crime! 167
High-Tech Talk 168
Computer Viruses: Delivery, Infection, and Avoidance 168
Companies on the Cutting Edge 169
Adobe Systems 169
Microsoft 169
Technology Trailblazers 169
Dan Bricklin 169
Masayoshi Son 169
Chapter Review 170
Key Terms 172
Checkpoint 173
Learn It Online 176
Learn How To 178
Web Research 180
Case Studies 181
The Components of the System Unit 182
The System Unit 184
The Motherboard 186
Processor 187
The Control Unit 187
Ethics & Issues: Can Computers Think? 187
The Arithmetic Logic Unit 188
Machine Cycle 188
Registers 189
The System Clock 189
Looking Ahead: Hybrid Technology to Power Supercomputer 190
Dual-Core and Multi-Core Processors 190
Comparison of Personal Computer Processors 190
Buying a Personal Computer 192
Heat Sinks, Heat Pipes, and Liquid Cooling 193
Ethics & Issues: Discarded Computer Components: Whose Problem Is It? 193
Parallel Processing 194
Data Representation 194
Memory 197
Bytes and Addressable Memory 197
Memory Sizes 197
Types of Memory 197
RAM 198
Ethics & Issues: Should Schools Supply Computers to All Students? 200
Cache 201
ROM 201
Flash Memory 202
CMOS 203
Memory Access Times 203
Expansion Slots and Adapter Cards 204
Flash Memory Cards, USB Flash Drives, PC Cards, and ExpressCards 205
Ports and Connectors 206
Serial Ports 207
Parallel Ports 208
USB Ports 208
FireWire Ports 209
Special Purpose Ports 209
Buses 211
Expansion Bus 212
Bays 212
Power Supply 213
Mobile Computers and Devices 213
Ethics & Issues: Should Notebook Computers Be Banned on Airplanes? 214
Putting It All Together 215
Looking Ahead: Healing Bodies with Nanotechnology 215
Keeping Your Computer Clean 216
Chapter Summary 217
High-Tech Talk 218
Random Access Memory (RAM); The Genius of Memory 218
Companies on the Cutting Edge 219
AMD 219
Intel 219
Technology Trailblazers 219
Jack Kilby 219
Gordon Moore 219
Chapter Review 220
Key Terms 222
Checkpoint 223
Learn It Online 226
Learn How To 228
Web Research 230
Case Studies 231
Input 232
What is Input? 234
What are Input Devices? 236
The Keyboard 236
Ethics & Issues: Keyboard Monitoring-Privacy Risk? 237
Keyboard Connections 238
Keyboard Ergonomics 238
Pointing Devices 239
Mouse 239
Mouse Types 239
Using a Mouse 240
Ethics & Issues: Are Employers Responsible for Medical Problems Related to Computer Use? 241
Other Pointing Devices 241
Trackball 241
Touchpad 241
Pointing Stick 242
Light Pen 242
Touch Screen 242
Pen Input 242
Controllers for Gaming and Media Players 244
Gamepads 244
Joysticks and Wheels 244
Light Guns 244
Dance Pads 244
Motion-Sensing Game Controllers 244
Touch Sensitive Pads 245
Voice Input 245
Audio Input 246
Input for PDAs, Smart Phones, and Tablet PCs 247
PDAs 247
Smart Phones 248
Tablet PCs 249
Ethics & Issues: Should Talking on a Cellular Phone While Driving Be Illegal? 249
Digital Cameras 250
Digital Camera Quality 252
Video Input 253
PC Video Cameras 253
Web Cams 254
Ethics & Issues: Should Cameras Be Able to Monitor Your Every Move? 254
Video Conferencing 254
Scanners and Reading Devices 255
Optical Scanners 255
Optical Readers 257
Bar Code Readers 258
Ethics & Issues: Scanner Errors at the Checkout Counter? 258
RFID Readers 259
Ethics & Issues: Will RFID Track Your Every Move? 259
Looking Ahead: Paying with Your Cellular Telephone 259
Magnetic Stripe Card Readers 260
MICR Readers 260
Data Collection Devices 261
Terminals 261
Point-of-Sale Terminals 261
Automated Teller Machines 262
Biometric Input 262
Putting It All Together 265
Input Devices for Physically Challenged Users 266
Chapter Summary 267
Looking Ahead: Paying with Your Cellular Telephone 259
High-Tech Talk 268
Biometrics: Personalized Security 268
Companies on the Cutting Edge 269
Logitech 269
Palm 269
Technology Trailblazers 269
Charles Walton 269
Douglas Englebart 269
Chapter Review 270
Key Terms 272
Checkpoint 273
Learn It Online 276
Learn How To 278
Web Research 280
Case Studies 281
Special Feature: Personal Mobile Devices 282
Output 282
What is Output? 300
Display Devices 302
Flat-Panel Displays 302
LCD Monitors and Screens 302
LCD Technology 304
Looking Ahead: Rollable Displays Lock and Role 304
LCD Quality 304
Graphics Chips, Ports, and LCD Monitors 305
Plasma Monitors 307
Televisions 307
CRT Monitors 308
Quality of a CRT Monitor 309
Graphics Chips and CRT Monitors 309
Printers 310
Producing Printed Output 311
Nonimpact Printers 312
Ink-Jet Printers 312
Ethics & Issues: Should Companies Prohibit Consumers from Refilling Ink Cartridges? 314
Photo Printers 314
Ethics & Issues: Who Is Responsible for Stopping Counterfeiting? 315
Laser Printers 315
Thermal Printers 317
Mobile Printers 317
Label and Postage Printers 318
Plotters and Large-Format Printers 318
Impact Printers 318
Speakers, Headphones, and Earphones 320
Ethics & Issues: Should Colleges Provide Free Access to Music for Students? 321
Other Output Devices 322
Fax Machines and Fax Modems 322
Multifunction Peripherals 323
Data Projectors 323
Looking Ahead: Ultra HDTV Puts Viewers in the Picture 324
Force-Feedback Joysticks, Wheels, and Gamepads 324
Putting It All Together 325
Output Devices for Physically Challenged Users 326
Ethics & Issues: Should Web Sites Be Held Accountable for Accessibility Levels for Physically Challenged People? 327
Chapter Summary 327
High-Tech Talk 328
Sound Cards: Bringing Your Computer to Life 328
Companies on the Cutting Edge 329
Hewlett-Packard 329
ViewSonic 329
Technology Trailblazers 329
Steve Jobs 329
Dorma Dubinsky 329
Chapter Review 330
Key Terms 332
Checkpoint 333
Learn It Online 336
Learn How To 338
Web Research 340
Case Studies 341
Special Feature: Digital Imaging and Video Technology 342
Storage 352
Storage 354
Magnetic Disks 357
Hard Disks 358
Looking Ahead: Heat Increases Disk Capacity 359
Floppy Disks 365
Optical Discs 366
Care of Optical Discs 368
Types of Optical Discs 368
CD-ROMs 369
Looking Ahead: Bookshelf Design Streamlines Entertainment Storage? 369
CD-Rs and CD-RWs 370
Ethics & Issues: Does Music and Movie Downloading Harm CD Sales? 371
DVD-ROMs 372
Ethics & Issues: Is the Blu-ray and HD DVD Competition Good for Consumers, BD-ROMs, and HD DVD-ROMs? 373
Recordable and Rewritable DVDs 373
Tape 374
PC Cards and Expresscards 374
Miniature Mobile Storage Media 375
Flash Memory Cards 376
USB Flash Drives 377
Smart Cards 378
Ethics & Issues: Should the World Become a Cashless Society? 378
Microfilm and Microfiche 379
Enterprise Storage 379
Putting It All Together 380
Chapter Summary 381
Ethics & Issues: Who Should Be Looking at Your Medical Records? 381
High-Tech Talk 382
Disk Formatting and File Systems 382
Companies on the Cutting Edge 383
Seagate Technology 383
SanDisk Corporation 383
Technology Trailblazers 383
Al Shugart 383
Mark Dean 383
Chapter Review 384
Key Terms 386
Checkpoint 387
Learn It Online 390
Learn How To 392
Web Research 394
Case Studies 395
Operating Systems and Utility Programs 396
System Software 398
Operating Systems 398
Operating System Functions 400
Starting a Computer 400
Providing a User Interface 402
Managing Programs 403
Managing Memory 405
Scheduling Jobs 406
Configuring Devices 407
Establishing an Internet Connection 409
Monitoring Performance 409
Ethics & Issues: What Should Be in an Operating System? 409
Providing File Management and Other Utilities 410
Controlling a Network 410
Administering Security 410
Ethics & Issues: Who Should Be Responsible for Notebook Computer Security? 411
Operating System Utility Programs 411
File Manager 412
Search Utility 412
Image Viewer 412
Personal Firewall 413
Uninstaller 413
Disk Scanner 414
Disk Defragmenter 414
Diagnostic Utility 414
Backup Utility 415
Screen Saver 415
Types of Operating Systems 415
Ethics & Issues: Does Windows Genuine Advantage Give an Advantage to Hackers? 416
Stand-Alone Operating Systems 416
Windows XP 417
Windows Vista 418
Mac OS X 420
Looking Ahead: Apple Marching to Its Own Tune 420
UNIX 420
Linux 421
Network Operating Systems 422
Windows Server 2003 422
UNIX 422
Linux 423
Solaris 423
Netware 423
Embedded Operating Systems 423
Windows CE 423
Windows Mobile 424
Palm OS 424
Blackberry 424
Embedded Linux 425
Symbian OS 425
Stand-Alone Utility Programs 425
Antivirus Programs 425
Spyware Removers 427
Internet Filters 427
File Conversion 427
File Compression 427
Media Player 428
CD/DVD Burning 428
Personal Computer Maintenance 429
Looking Ahead: Online Operating Systems Proposed 429
Chapter Summary 429
High-Tech Talk 430
Lossy vs. Lossless Data Compression: Using Compression Algorithms to Reduce File Size 430
Companies on the Cutting Edge 431
Red Hat 431
Research In Motion (RIM) 431
Technology Trailblazers 431
Alan Kay 431
Linus Torvalds 431
Chapter Review 432
Key Terms 434
Checkpoint 435
Learn It Online 438
Learn How To 440
Web Research 442
Case Studies 443
Special Feature: Buyer's Guide 2008 444
Communications and Networks 458
Communications 460
Uses of Computer Communications 462
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Fax 462
Wireless Messaging Services 462
Ethics & Issues: Should Cell Phones Be Banned in the Workplace? 462
Ethics & Issues: High-Tech Cheating via Wireless Messaging Services 464
Public Internet Access Points 464
Cybercafes 465
Global Positioning System 465
Collaboration 467
Groupware 468
Voice Mail 468
Web Services 468
Networks 469
LANs, MANs, and WANs 470
Network Architectures 472
Network Topologies 474
Intranets 475
Network Communications Standards 476
Ethernet 476
Token Ring 476
TCP/IP 477
802.11 (Wi-Fi) 478
Bluetooth 478
UWB 478
IrDA 478
RFID 479
WiMax 479
WAP 480
Communications Software 480
Ethics & Issues: Should You Worry about Cellular Antenna Radiation? 480
Communications Over the Telephone Network 481
Dial-Up Lines 481
Dedicated Lines 482
ISDN Lines 482
DSL 482
FTTH and FTTB 483
T-Carrier Lines 483
ATM 483
Communications Devices 484
Dial-Up Modems 485
ISDN and DSL Modems 485
Cable Modems 485
Wireless Modems 486
Network Cards 486
Wireless Access Points 487
Routers 488
Connecting Networks 488
Home Networks 489
Wired Home Networks 489
Wireless Home Networks 490
Communications Channel 491
Looking Ahead: Telepresence Expands Face-to-Face Communications 492
Physical Transmission Media 492
Twisted-Pair Cable 493
Coaxial Cable 493
Fiber-Optic Cable 493
Wireless Transmission Media 494
Ethics & Issues: Is It Ethical to Steal Wireless Internet Service? 494
Infrared 494
Broadcast Radio 494
Cellular Radio 494
Microwaves 495
Communications Satellite 496
Looking Ahead: Fighting Fires, Staying Healthy with Satellites 496
Chapter Summary 497
High-Tech Talk 498
OSI Reference Model: The Driving Force Behind Network Communications 498
Companies on the Cutting Edge 499
Cisco Systems 499
Qualcomm 499
Technology Trailblazers 499
Robert Metcalfe 499
Patricia Russo 499
Chapter Review 500
Key Terms 502
Checkpoint 503
Learn It Online 506
Learn How To 508
Web Research 510
Case Studies 511
Database Management 512
Databases, Data and Information 514
Ethics & Issues: Are Portable Storage Devices a Threat to Business? 516
Data Integrity 516
Qualities of Valuable Information 516
The Hierarchy of Data 517
Characters 518
Fields 518
Records 519
Files 519
Ethics & Issues: Is a National Identification Card Necessary for the Security of the Nation? 519
Maintaining Data 520
Adding Records 520
Changing Records 521
Deleting Records 522
Validating Data 522
File Processing Versus Databases 524
File Processing Systems 524
The Database Approach 524
Ethics & Issues: Should States Share Criminal Database? 525
Database Management Systems 526
Data Dictionary 527
File Retrieval and Maintenance 528
Looking Ahead: Archive an Entire Lifetime 528
Data Security 530
Ethics & Issues: Would You Carry a Contacties Smart Card? 531
Backup and Recovery 531
Relational, Object-Oriented, and Multidimensional Databases 532
Relational Databases 533
Object-Oriented Databases 534
Multidimensional Databases 535
Web Databases 536
Ethics & Issues: Can the Government Be Trusted with Personal Data? 537
Database Administration 537
Database Design Guidelines 537
Role of the Database Anaylsts and Administrators 538
Role of the Employee as User 538
Chapter Summary 539
Looking Ahead: Preserving Electronic Files for Future Generations 539
High-Tech Talk 540
Ensure Consistency of Your Data with Normalization 540
Companies on the Cutting Edge 541
Oracle 541
Sybase 541
Technology Trailblazers 541
E. F. Codd 541
Larry Ellison 541
Chapter Review 542
Key Terms 544
Checkpoint 545
Learn It Online 548
Learn How To 550
Web Research 552
Case Studies 553
Computer Security Ethics, and Privacy 554
Computer Security Risks 556
Internet and Network Attacks 558
Computer Viruses, Worms, and Trojan Horses 558
Ethics & Issues: How Should Virus Authors Be Punished? 558
Safeguards against Computer Viruses, Worms, and Trojan Horses 560
Botnets 562
Denial of Service Attacks 562
Back Doors 562
Spoofing 563
Safeguards against Botnets, DoS Attacks, Back Doors, and IP Spoofing 563
Firewalls 563
Intrusion Detection Software 564
Honeypots 564
Unauthorized Access and Use 564
Safeguards against Unauthorized Access and Use 565
Identifying and Authenticating Users 565
Ethics & Issues: Should Schools Use Biometric Devices? 568
Looking Ahead: Three-Dimensional Facial Recognition Software - A Step Forward for Security 568
Hardware Theft and Vandalism 569
Safeguards against Hardware Theft and Vandalism 569
Software Theft 570
Safeguards against Software Theft 570
Information Theft 571
Safeguards against Irrformation Theft 572
Encryption 572
System Failure 574
Safeguards against System Failure 574
Backing Up - The Ultimate Safeguard 576
Wireless Security 576
Ethics and Society 578
Information Accuracy 579
Intellectual Property Rights 579
Ethics & Issues: Should It Be Illegal to Sell Programs That Copy Movies from DVDs? 580
Codes of Conduct 580
Information Privacy 580
Electronic Profiles 581
Cookies 582
Spyware and Adware 583
Ethics & Issues: Who Should Spyware Be Legal? 583
Spam 584
Ethics & Issues: Who Should Protect You from Identity Theft? 584
Phishing 584
Privacy Laws 585
Social Engineering 586
Employee Monitoring 586
Content Filtering 586
Computer Forensics 587
Looking Ahead: Computer Knowledge Assessment Using Brain Fingerprinting 587
Health Concerns of Computer Use 587
Computers and Health Risks 587
Ergonomics and Workplace Design 589
Computer Addiction 589
Green Computing 590
Chapter Summary 591
High-Tech Talk 592
The Key(s) to Making Encryption Work 592
Companies on the Cutting Edge 593
McAfee 593
Symantec 593
Technology Trailblazers 593
Donn Parker 593
Clifford Stoll 593
Chapter Review 594
Key Terms 596
Checkpoint 597
Learn It Online 600
Learn How To 602
Web Research 604
Case Studies 605
Special Feature: Computer Forensics 606
Information System Development 618
What is the System Development Cycle? 620
Phases in the System Development Cycle 620
Guidelines for System Development 621
Who Participates in the System Development Cycle? 622
Looking Ahead: Strong Employment Opportunities for System Analysts 623
Project Management 623
Feasibility Assessment 625
Documentation 625
Data and Information Gathering Techniques 625
Ethics & Issues: Do You Work Harder When Someone Is Watching? 626
What Initiates the System Development Cycle? 626
Ethics & Issues: How Should Employees Combat Poor E-Mail Writing Skills? 627
Cyber Coast Cafe - A Case Study 628
Planning Phase 629
Planning at Cyber Coast Cafe 629
Analysis Phase 630
The Preliminary Investigation 630
Preliminary Investigation at Cyber Coast Cafe 631
Detailed Analysis 631
Process Modeling 632
Object Modeling 635
The System Proposal 635
Ethics & Issues: Is Outsourcing as Good as In-House Development? 637
Detailed Analysis at Cyber Coast Cafe 638
Design Phase 639
Acquiring Necessary Hardware and Software 639
Identifying Technical Specifications 639
Soliciting Vendor Proposals 639
Testing and Evaluating Vendor Proposals 640
Making a Decision 640
Hardware Acquisition at Cyber Coast Cafe 641
Detailed Design 641
Prototyping 642
Case Tools 642
Quality Review Techniques 643
Detailed Design at Cyber Coast Cafe 643
Implementation Phase 643
Develop Programs 643
Install and Test the New System 644
Looking Ahead: Training Delivery Becomes Flexible 644
Train Users 644
Convert to the New System 644
Implementation at Cyber Coast Cafe 645
Ethics & Issues: What Type of System Conversion Is Best? 645
Operation, Support, and Security Phase 646
Developing a Computer Security Plan 646
Operation, Support, and Security at Cyber Coast Cafe 647
Chapter Summary 647
High-Tech Talk 648
Benchmarking: Testing Performance through Calculations 648
Companies on the Cutting Edge 649
Computer Sciences Corporation (CSC) 649
Zebra Technologies 649
Technology Trailblazers 649
Ed Yourdon 649
Tom DeMarco 649
Chapter Review 650
Key Terms 652
Checkpoint 653
Learn It Online 656
Learn How To 658
Web Research 660
Case Studies 661
Programming Languages and ProgramDevelopment 662
Computer Programs and Programming Languages 664
Low-Level Languages 665
Procedural Languages 666
COBOL 668
C 668
Object-Oriented Programming Languages and Program Development Tools 669
Java 669
C++ 670
C# 670
Visual studio 670
Delphi 672
PowerBuilder 673
Visual Programming Languages 673
Other Programming Languages 674
RPG 674
4GLs 674
Classic Programming Languages 675
Looking Ahead: The Future of Programming Languages 675
Other Program Development Tools 676
Application Generators 676
Macros 676
Ethics & Issues: Should All Students Be Required to Learn Computer Programming? 677
Web Page Development 678
HTML 678
Scripts, Applets, Servlets, and ActiveX Controls 679
Scripting Languages 680
Dynamic HTML 682
XHTML, XML, and WML 682
Ajax 683
Ruby on Rails 683
Web Page Authoring Software 683
Ethics & Issues: Should A Web Developer Know HTML? 683
Multimedia Program Development 684
The Program Development Cycle 685
What Initiates the Program Development Cycle? 685
Looking Ahead: Software Factories Provide Low-Cost Alternatives 686
Analyze Requirements 686
Design Solution 687
Structured Design 687
Object-Oriented Design 688
Control Structures 688
Design Tools 690
Validate Design 693
Implement Design 693
Extreme Programming 694
Test Solution 695
Ethics & Issues: Who Is Responsible for Bugs? 695
Ethics & Issues: Is Beta Testing Out of Hand? 696
Document Solution 696
Chapter Summary 697
High-Tech Talk 698
Structuring Data for the Web Using XML 698
Companies on the Cutting Edge 699
Electronic Arts 699
Sun Microsystems 699
Technology Trailblazers 699
Grace Hopper 699
James Gosling 699
Chapter Review 700
Key Terms 702
Checkpoint 703
Learn It Online 706
Learn How To 708
Web Research 710
Case Studies 711
Enterprise Computing 712
What is Enterprise Computing? 714
Organizational Structure of an Enterprise 716
Levels of Users in the Enterprise 717
Looking Ahead: The CEO of the Future 718
How Managers Use Information 718
Information Systems in the Enterprise 720
Information Systems within Functional Units 720
General Purpose Information Systems 725
Integrated Information Systems 730
Ethics & Issues: Should Companies Be Forced to Tell You What Information They Store about You? 730
Enterprise-Wide Technologies and Methodologies 733
Portals 733
Data Warehouses 734
Communications 734
Extranets 735
Web Services 735
Document Management Systems 736
Workflow 736
Virtual Private Network 736
E-Commerce 737
E-Retailing 737
Ethics & Issues: Would You Trust an Online Medical Diagnosis? 739
Finance 738
Travel 739
Entertainment and Media 739
Ethics & Issues: Who You Trust an Online Medical Diagnosis? 739
Health 739
Other Business Services 740
Enterprise Hardware 741
Raid 741
Network Attached Storage and Storage Area Networks 742
Enterprise Storage Systems 743
Ethics & Issues: How much Data Should Companies Be Required to Keep? 743
Blade Servers 744
Thin Clients 744
High-Availability Systems 745
Scalability 745
Utility and Grid Computing 745
Interoperability 746
Backup Procedures 746
Looking Ahead: Internet Systems Provide Backup Solutions 746
Disaster Recovery Plan 747
Chapter Summary 749
High-Tech Talk 750
Neural Networks: Learning from Experience 750
Companies on the Cutting Edge 751
EMC 751
IBM 751
Technology Trailbuzers 751
John Chambers 751
Jim Clark 751
Chapter Review 752
Key Terms 754
Checkpoint 755
Learn It Online 758
Learn How To 760
Web Research 762
Case Studies 763
Special Feature: Enterprise Order Processing: A Case Study 764
Computer Careers and Certification 774
The Computer Industry 776
Ethics & Issues: Outsourcing Computer Jobs - A Threat to American Workers? 777
Careers in the Computer Industry 778
General Business and Government Organizations and Their IT Departments 778
Looking Ahead: Tomorrow's Jobs in Information Technology 779
Computer Equipment Field 782
Ethics & Issues: Should Work Visas Be Issued to Foreign IT Workers? 782
Computer Software Field 782
Computer Service and Repair Field 783
Computer Sales 783
Computer Education and Training Field 784
IT Consulting 784
Preparing for a Career in the Computer Industry 785
Attending a Trade School 785
Attending a College or University 786
Ethics & Issues: Should Ethical Computer Hacking Be Illegal? 787
Searching for Computer-Related Jobs 787
Planning for Career Development 789
Professional Organizations 789
Looking Ahead: Women Connect Professionally Online 789
Professional Growth and Continuing Education 790
Computer Publications and Web Sites 791
Certification 792
Certification Benefits 792
Choosing a Certification 794
Preparing for Certification 794
Certification Examinations 795
A Guide to Certification 796
Ethics & Issues: Should Lifetime Certification Be Granted for Computer Professionals? 796
Application Software Certifications 796
Operating System Certifications 797
Programmer/Developer Certifications 797
Hardware Certifications 798
Networking Certifications 798
Computer Forensics Certifications 799
Security Certifications 799
Internet Certifications 800
Database System Certifications 800
Chapter Summary 801
High-Tech Talk 802
Companies on the Cutting Edge 803
Monster 803
ZDNet 803
Technology Trailblazers 803
Steve Ballmer 803
Steve Wozniak 803
Chapter Review 804
Key Terms 806
Checkpoint 807
Learn It Online 810
Learn How To 812
Web Research 814
Case Studies 815
Special Feature: Digital Entertainment 816
Coding Schemes and Number Systems APP 1
Quiz Yourself Answers APP 5
Computer Acronyms APP 13
Glossary/Index IND 1
Photo Credits IND 37
New interesting textbook: Manufacturing Strategy or Productivity Inequality and the Digital Economy
MCSA/MCSE Self-Paced Traning Kit Exam 70-350: Implementing Microsoft Internet Security and Acceleration Server 2004
Author: Stan Reimer
Ace your preparation for MCP Exam 70-350-and expand your knowledge of Microsoft Internet Security and Acceleration Server (ISA) 2004, Microsoft's advanced application layer firewall, virtual private network (VPN), and Web cache solution. Designed to help maximize your performance on the exam, this TRAINING KIT packs the resources that exam candidates want most-including in-depth, self-paced training; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for the skills and expertise you can apply to the job.
An Embedded Computers is a special-purpose computer system designed to perform dedicated functions. It is usually embedded as part of a complete device including hardware and mechanical parts. To get the exclusive and usefull information visit corvalent. Corvalent ensure satisfactory emebedded computers and services.
ReplyDelete