Tuesday, December 30, 2008

Discovering Computers 2008 or MCSA MCSE Self Paced Traning Kit Exam 70 350

Discovering Computers 2008: Complete

Author: Gary B Shelly

Discovering Computers 2008 delivers students an unparalleled learning experience by offering the most current and comprehensive information on computers and technology.



Table of Contents:
Introduction to Computers     2
A World of Computers     4
What is a Computer?     6
Data and Information     6
Information Processing Cycle     6
The Components of a Computer     7
Input Devices     7
Output Devices     8
System Unit     8
Storage Devices     8
Communication Devices     9
Advantages and Disadvantages of Using Computers     9
Looking Ahead: Medical Implants Can Enhance Lifestyles     9
Ethics & Issues: What Should Be Done about Identity Theft?     10
Networks and the Internet     11
The Internet     12
Ethics & Issues: Who is Responsible for the Accuracy of Web Pages?     14
Computer Software     15
System Software     15
Application Software     16
Ethics & Issues: Do Computer Games Do More Harm than Good?     16
Installing and Running Programs     17
Software Development     18
Categories of Computers     18
Personal Computers     19
Desktop Computers     20
Mobile Computers and Mobile Devices     20
Notebook Computers     20
Mobile Devices     21
Game Consoles     22
Servers     23
Mainframes     23
Supercomputers     23
Embedded Computers     24
Elements of an Information System     25
Examples of Computer Usage     26
Home User     26
Ethics & Issues: Who Should Monitor Online Social Networks?     27
Small Office/Home User     28
Mobile User     29
Power User     29
Large Business User     30
Putting It All Together     31
Computer Applications in Society     32
Looking Ahead: Robots Perform Mundane, Dangerous Tasks     32
Education     32
Finance     32
Government     33
Ethics & Issues: Should the Government Be Able to Perform Surveillance on All Electronic Communications?     33
Health Care     34
Science     34
Publishing     35
Travel     36
Manufacturing     36
Chapter Summary     37
High-Tech Talk     38
Analog versus Digital: Making the Conversion     38
Companies on the Cutting Edge     39
Dell     39
Apple Computer     39
Technology Trailblazers     39
Bill Gates     39
Anne Mulcahy     39
Chapter Review     40
Key Terms     42
Checkpoint     43
Learn It Online     46
Learn How To     48
Web Research     50
Case Studies     51
Special Feature: Timeline 2008     52
The Internet and World Wide Web     66
The Internet     68
History of the Internet     69
Looking Ahead: Internet Speeds into the Future     70
How the Internet Works     70
Connecting to the Internet     70
Access Providers     71
How Data Travels the Internet     72
Internet Addresses     73
The World Wide Web     75
Browsing the Web     75
Web Addresses     76
Navigating Web Pages     77
Searching for Information on the Web     78
Looking Ahead: Facing Up to Search Technology     81
Types of Web Sites     82
Ethics & Issues: Should You Trust a Wiki for Academic Research?      84
Evaluating a Web Site     84
Multimedia on the Web     85
Ethics & Issues: Who Should Control the Content of Your CDs, DVDs, and Media Files?     87
Web Publishing     89
E-Commerce     91
Looking Ahead: Grocery Shopping with a Buddy     92
Other Internet Services     92
E-Mail     92
Ethics & Issues: E-mail: Irritant or Liberator?     94
FTP     96
Newsgroups and Message Boards     96
Mailing Lists     97
Chat Rooms     98
Instant Messaging     98
Internet Telephony     99
Netiquette     100
Chapter Summary     101
Ethics & Issues: Should Companies Be Able to Track Your Online Habits?     101
High-Tech Talk     102
A Computer's Internet Protocol (IP) Address     102
Companies on the Cutting Edge     103
Google     103
Yahoo!     103
Technology Trailblazers     103
Tim Berners-Lee     103
Meg Whitman     103
Chapter Review     104
Key Terms     106
Checkpoint     107
Learn It Online     110
Learn How To     112
Web Research     114
Case Studies     115
Special Feature: Making Use of the Web     116
Application Software     132
Application Software     134
The Role of System Software     135
Working with Application Software     136
Looking Ahead: Touch Drive Your Computer Screen     137
Business Software     138
Word Processing Software     138
Developing a Document     141
Ethics & Issues: How Should Schools Deal with Internet Plagiarism?     141
Spreadsheet Software     142
Database Software     145
Presentation Graphics Software     146
Note Taking Software     147
Personal Information Manager Software     148
PDA Business Software     148
Software Suite     148
Project Management Software     149
Accounting Software     149
Document Management Software     150
Enterprise Computing Software     150
Graphics and Multimedia Software     151
Computer-Aided Design     151
Desktop Publishing Software (for the Professional)      152
Paint/Image Editing Software (for the Professional)     152
Photo Editing Software (for the Professional)     152
Ethics & Issues: Altering Digital Photographs - Art or Fraud?     153
Video and Audio Editing Software (for the Professional)     153
Multimedia Authoring Software     154
Web Page Authoring Software     154
Software for Home, Personal, and Educational Use     155
Software Suite (for Personal Use)     156
Personal Finance Software     156
Legal Software     157
Tax Preparation Software     157
Desktop Publishing Software (for Personal Use)     158
Paint/Image Editing Software (for Personal Use)     158
Photo Editing Software     159
Clip Art/Image Gallery     159
Video and Audio Editing Software (for Personal Use)     159
Home Design/Landscaping Software     160
Reference and Educational Software     160
Entertainment Software     160
Application Software for Communications     161
Ethics & Issues: Should Companies Monitor Employees' E-Mail and Internet Traffic?     161
Popular Utility Programs     162
Web-Based Software      163
Application Service Providers     164
Learning Aids and Support Tools for Application Software     164
Looking Ahead: 3-D Scans May Reduce Surgeries     164
Web-Based Training     165
Ethics & Issues: Will Patents Endanger E-Learning?     166
Chapter Summary!     167
Ethics & Issues: Copying Software - A Computer Crime!     167
High-Tech Talk     168
Computer Viruses: Delivery, Infection, and Avoidance     168
Companies on the Cutting Edge     169
Adobe Systems     169
Microsoft     169
Technology Trailblazers     169
Dan Bricklin     169
Masayoshi Son     169
Chapter Review     170
Key Terms     172
Checkpoint     173
Learn It Online     176
Learn How To     178
Web Research     180
Case Studies     181
The Components of the System Unit     182
The System Unit     184
The Motherboard     186
Processor     187
The Control Unit     187
Ethics & Issues: Can Computers Think?     187
The Arithmetic Logic Unit      188
Machine Cycle     188
Registers     189
The System Clock     189
Looking Ahead: Hybrid Technology to Power Supercomputer     190
Dual-Core and Multi-Core Processors     190
Comparison of Personal Computer Processors     190
Buying a Personal Computer     192
Heat Sinks, Heat Pipes, and Liquid Cooling     193
Ethics & Issues: Discarded Computer Components: Whose Problem Is It?     193
Parallel Processing     194
Data Representation     194
Memory     197
Bytes and Addressable Memory     197
Memory Sizes     197
Types of Memory     197
RAM     198
Ethics & Issues: Should Schools Supply Computers to All Students?     200
Cache     201
ROM     201
Flash Memory     202
CMOS     203
Memory Access Times     203
Expansion Slots and Adapter Cards     204
Flash Memory Cards, USB Flash Drives, PC Cards, and ExpressCards     205
Ports and Connectors     206
Serial Ports     207
Parallel Ports     208
USB Ports      208
FireWire Ports     209
Special Purpose Ports     209
Buses     211
Expansion Bus     212
Bays     212
Power Supply     213
Mobile Computers and Devices     213
Ethics & Issues: Should Notebook Computers Be Banned on Airplanes?     214
Putting It All Together     215
Looking Ahead: Healing Bodies with Nanotechnology     215
Keeping Your Computer Clean     216
Chapter Summary     217
High-Tech Talk     218
Random Access Memory (RAM); The Genius of Memory     218
Companies on the Cutting Edge     219
AMD     219
Intel     219
Technology Trailblazers     219
Jack Kilby     219
Gordon Moore     219
Chapter Review     220
Key Terms     222
Checkpoint     223
Learn It Online     226
Learn How To     228
Web Research     230
Case Studies     231
Input     232
What is Input?     234
What are Input Devices?     236
The Keyboard     236
Ethics & Issues: Keyboard Monitoring-Privacy Risk?     237
Keyboard Connections     238
Keyboard Ergonomics     238
Pointing Devices     239
Mouse     239
Mouse Types     239
Using a Mouse     240
Ethics & Issues: Are Employers Responsible for Medical Problems Related to Computer Use?     241
Other Pointing Devices     241
Trackball     241
Touchpad     241
Pointing Stick     242
Light Pen     242
Touch Screen     242
Pen Input     242
Controllers for Gaming and Media Players     244
Gamepads     244
Joysticks and Wheels     244
Light Guns     244
Dance Pads     244
Motion-Sensing Game Controllers     244
Touch Sensitive Pads     245
Voice Input     245
Audio Input     246
Input for PDAs, Smart Phones, and Tablet PCs     247
PDAs     247
Smart Phones     248
Tablet PCs     249
Ethics & Issues: Should Talking on a Cellular Phone While Driving Be Illegal?     249
Digital Cameras      250
Digital Camera Quality     252
Video Input     253
PC Video Cameras     253
Web Cams     254
Ethics & Issues: Should Cameras Be Able to Monitor Your Every Move?     254
Video Conferencing     254
Scanners and Reading Devices     255
Optical Scanners     255
Optical Readers     257
Bar Code Readers     258
Ethics & Issues: Scanner Errors at the Checkout Counter?     258
RFID Readers     259
Ethics & Issues: Will RFID Track Your Every Move?     259
Looking Ahead: Paying with Your Cellular Telephone     259
Magnetic Stripe Card Readers     260
MICR Readers     260
Data Collection Devices     261
Terminals     261
Point-of-Sale Terminals     261
Automated Teller Machines     262
Biometric Input     262
Putting It All Together     265
Input Devices for Physically Challenged Users     266
Chapter Summary     267
Looking Ahead: Paying with Your Cellular Telephone     259
High-Tech Talk     268
Biometrics: Personalized Security     268
Companies on the Cutting Edge     269
Logitech     269
Palm     269
Technology Trailblazers     269
Charles Walton     269
Douglas Englebart     269
Chapter Review     270
Key Terms     272
Checkpoint     273
Learn It Online     276
Learn How To     278
Web Research     280
Case Studies     281
Special Feature: Personal Mobile Devices     282
Output     282
What is Output?     300
Display Devices     302
Flat-Panel Displays     302
LCD Monitors and Screens     302
LCD Technology     304
Looking Ahead: Rollable Displays Lock and Role     304
LCD Quality     304
Graphics Chips, Ports, and LCD Monitors     305
Plasma Monitors     307
Televisions     307
CRT Monitors     308
Quality of a CRT Monitor     309
Graphics Chips and CRT Monitors     309
Printers     310
Producing Printed Output     311
Nonimpact Printers     312
Ink-Jet Printers      312
Ethics & Issues: Should Companies Prohibit Consumers from Refilling Ink Cartridges?     314
Photo Printers     314
Ethics & Issues: Who Is Responsible for Stopping Counterfeiting?     315
Laser Printers     315
Thermal Printers     317
Mobile Printers     317
Label and Postage Printers     318
Plotters and Large-Format Printers     318
Impact Printers     318
Speakers, Headphones, and Earphones     320
Ethics & Issues: Should Colleges Provide Free Access to Music for Students?     321
Other Output Devices     322
Fax Machines and Fax Modems     322
Multifunction Peripherals     323
Data Projectors     323
Looking Ahead: Ultra HDTV Puts Viewers in the Picture     324
Force-Feedback Joysticks, Wheels, and Gamepads     324
Putting It All Together     325
Output Devices for Physically Challenged Users     326
Ethics & Issues: Should Web Sites Be Held Accountable for Accessibility Levels for Physically Challenged People?     327
Chapter Summary     327
High-Tech Talk     328
Sound Cards: Bringing Your Computer to Life     328
Companies on the Cutting Edge      329
Hewlett-Packard     329
ViewSonic     329
Technology Trailblazers     329
Steve Jobs     329
Dorma Dubinsky     329
Chapter Review     330
Key Terms     332
Checkpoint     333
Learn It Online     336
Learn How To     338
Web Research     340
Case Studies     341
Special Feature: Digital Imaging and Video Technology     342
Storage     352
Storage     354
Magnetic Disks     357
Hard Disks     358
Looking Ahead: Heat Increases Disk Capacity     359
Floppy Disks     365
Optical Discs     366
Care of Optical Discs     368
Types of Optical Discs     368
CD-ROMs     369
Looking Ahead: Bookshelf Design Streamlines Entertainment Storage?     369
CD-Rs and CD-RWs     370
Ethics & Issues: Does Music and Movie Downloading Harm CD Sales?     371
DVD-ROMs     372
Ethics & Issues: Is the Blu-ray and HD DVD Competition Good for Consumers, BD-ROMs, and HD DVD-ROMs?     373
Recordable and Rewritable DVDs      373
Tape     374
PC Cards and Expresscards     374
Miniature Mobile Storage Media     375
Flash Memory Cards     376
USB Flash Drives     377
Smart Cards     378
Ethics & Issues: Should the World Become a Cashless Society?     378
Microfilm and Microfiche     379
Enterprise Storage     379
Putting It All Together     380
Chapter Summary     381
Ethics & Issues: Who Should Be Looking at Your Medical Records?     381
High-Tech Talk     382
Disk Formatting and File Systems     382
Companies on the Cutting Edge     383
Seagate Technology     383
SanDisk Corporation     383
Technology Trailblazers     383
Al Shugart     383
Mark Dean     383
Chapter Review     384
Key Terms     386
Checkpoint     387
Learn It Online     390
Learn How To     392
Web Research     394
Case Studies     395
Operating Systems and Utility Programs     396
System Software     398
Operating Systems      398
Operating System Functions     400
Starting a Computer     400
Providing a User Interface     402
Managing Programs     403
Managing Memory     405
Scheduling Jobs     406
Configuring Devices     407
Establishing an Internet Connection     409
Monitoring Performance     409
Ethics & Issues: What Should Be in an Operating System?     409
Providing File Management and Other Utilities     410
Controlling a Network     410
Administering Security     410
Ethics & Issues: Who Should Be Responsible for Notebook Computer Security?     411
Operating System Utility Programs     411
File Manager     412
Search Utility     412
Image Viewer     412
Personal Firewall     413
Uninstaller     413
Disk Scanner     414
Disk Defragmenter     414
Diagnostic Utility     414
Backup Utility     415
Screen Saver     415
Types of Operating Systems     415
Ethics & Issues: Does Windows Genuine Advantage Give an Advantage to Hackers?     416
Stand-Alone Operating Systems     416
Windows XP     417
Windows Vista     418
Mac OS X     420
Looking Ahead: Apple Marching to Its Own Tune     420
UNIX     420
Linux     421
Network Operating Systems     422
Windows Server 2003     422
UNIX     422
Linux     423
Solaris     423
Netware     423
Embedded Operating Systems     423
Windows CE     423
Windows Mobile     424
Palm OS     424
Blackberry     424
Embedded Linux     425
Symbian OS     425
Stand-Alone Utility Programs     425
Antivirus Programs     425
Spyware Removers     427
Internet Filters     427
File Conversion     427
File Compression     427
Media Player     428
CD/DVD Burning     428
Personal Computer Maintenance     429
Looking Ahead: Online Operating Systems Proposed     429
Chapter Summary     429
High-Tech Talk     430
Lossy vs. Lossless Data Compression: Using Compression Algorithms to Reduce File Size     430
Companies on the Cutting Edge     431
Red Hat     431
Research In Motion (RIM)     431
Technology Trailblazers     431
Alan Kay     431
Linus Torvalds     431
Chapter Review     432
Key Terms     434
Checkpoint     435
Learn It Online     438
Learn How To     440
Web Research     442
Case Studies     443
Special Feature: Buyer's Guide 2008     444
Communications and Networks     458
Communications     460
Uses of Computer Communications     462
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Fax     462
Wireless Messaging Services     462
Ethics & Issues: Should Cell Phones Be Banned in the Workplace?     462
Ethics & Issues: High-Tech Cheating via Wireless Messaging Services     464
Public Internet Access Points     464
Cybercafes     465
Global Positioning System     465
Collaboration     467
Groupware     468
Voice Mail      468
Web Services     468
Networks     469
LANs, MANs, and WANs     470
Network Architectures     472
Network Topologies     474
Intranets     475
Network Communications Standards     476
Ethernet     476
Token Ring     476
TCP/IP     477
802.11 (Wi-Fi)     478
Bluetooth     478
UWB     478
IrDA     478
RFID     479
WiMax     479
WAP     480
Communications Software     480
Ethics & Issues: Should You Worry about Cellular Antenna Radiation?     480
Communications Over the Telephone Network     481
Dial-Up Lines     481
Dedicated Lines     482
ISDN Lines     482
DSL     482
FTTH and FTTB     483
T-Carrier Lines     483
ATM     483
Communications Devices     484
Dial-Up Modems     485
ISDN and DSL Modems     485
Cable Modems     485
Wireless Modems     486
Network Cards      486
Wireless Access Points     487
Routers     488
Connecting Networks     488
Home Networks     489
Wired Home Networks     489
Wireless Home Networks     490
Communications Channel     491
Looking Ahead: Telepresence Expands Face-to-Face Communications     492
Physical Transmission Media     492
Twisted-Pair Cable     493
Coaxial Cable     493
Fiber-Optic Cable     493
Wireless Transmission Media     494
Ethics & Issues: Is It Ethical to Steal Wireless Internet Service?     494
Infrared     494
Broadcast Radio     494
Cellular Radio     494
Microwaves     495
Communications Satellite     496
Looking Ahead: Fighting Fires, Staying Healthy with Satellites     496
Chapter Summary     497
High-Tech Talk     498
OSI Reference Model: The Driving Force Behind Network Communications     498
Companies on the Cutting Edge     499
Cisco Systems     499
Qualcomm     499
Technology Trailblazers     499
Robert Metcalfe      499
Patricia Russo     499
Chapter Review     500
Key Terms     502
Checkpoint     503
Learn It Online     506
Learn How To     508
Web Research     510
Case Studies     511
Database Management     512
Databases, Data and Information     514
Ethics & Issues: Are Portable Storage Devices a Threat to Business?     516
Data Integrity     516
Qualities of Valuable Information     516
The Hierarchy of Data     517
Characters     518
Fields     518
Records     519
Files     519
Ethics & Issues: Is a National Identification Card Necessary for the Security of the Nation?     519
Maintaining Data     520
Adding Records     520
Changing Records     521
Deleting Records     522
Validating Data     522
File Processing Versus Databases     524
File Processing Systems     524
The Database Approach     524
Ethics & Issues: Should States Share Criminal Database?     525
Database Management Systems     526
Data Dictionary     527
File Retrieval and Maintenance     528
Looking Ahead: Archive an Entire Lifetime     528
Data Security     530
Ethics & Issues: Would You Carry a Contacties Smart Card?     531
Backup and Recovery     531
Relational, Object-Oriented, and Multidimensional Databases     532
Relational Databases     533
Object-Oriented Databases     534
Multidimensional Databases     535
Web Databases     536
Ethics & Issues: Can the Government Be Trusted with Personal Data?     537
Database Administration     537
Database Design Guidelines     537
Role of the Database Anaylsts and Administrators     538
Role of the Employee as User     538
Chapter Summary     539
Looking Ahead: Preserving Electronic Files for Future Generations     539
High-Tech Talk     540
Ensure Consistency of Your Data with Normalization     540
Companies on the Cutting Edge     541
Oracle     541
Sybase     541
Technology Trailblazers     541
E. F. Codd     541
Larry Ellison     541
Chapter Review      542
Key Terms     544
Checkpoint     545
Learn It Online     548
Learn How To     550
Web Research     552
Case Studies     553
Computer Security Ethics, and Privacy     554
Computer Security Risks     556
Internet and Network Attacks     558
Computer Viruses, Worms, and Trojan Horses     558
Ethics & Issues: How Should Virus Authors Be Punished?     558
Safeguards against Computer Viruses, Worms, and Trojan Horses     560
Botnets     562
Denial of Service Attacks     562
Back Doors     562
Spoofing     563
Safeguards against Botnets, DoS Attacks, Back Doors, and IP Spoofing     563
Firewalls     563
Intrusion Detection Software     564
Honeypots     564
Unauthorized Access and Use     564
Safeguards against Unauthorized Access and Use     565
Identifying and Authenticating Users     565
Ethics & Issues: Should Schools Use Biometric Devices?     568
Looking Ahead: Three-Dimensional Facial Recognition Software - A Step Forward for Security     568
Hardware Theft and Vandalism      569
Safeguards against Hardware Theft and Vandalism     569
Software Theft     570
Safeguards against Software Theft     570
Information Theft     571
Safeguards against Irrformation Theft     572
Encryption     572
System Failure     574
Safeguards against System Failure     574
Backing Up - The Ultimate Safeguard     576
Wireless Security     576
Ethics and Society     578
Information Accuracy     579
Intellectual Property Rights     579
Ethics & Issues: Should It Be Illegal to Sell Programs That Copy Movies from DVDs?     580
Codes of Conduct     580
Information Privacy     580
Electronic Profiles     581
Cookies     582
Spyware and Adware     583
Ethics & Issues: Who Should Spyware Be Legal?     583
Spam     584
Ethics & Issues: Who Should Protect You from Identity Theft?     584
Phishing     584
Privacy Laws     585
Social Engineering     586
Employee Monitoring     586
Content Filtering     586
Computer Forensics      587
Looking Ahead: Computer Knowledge Assessment Using Brain Fingerprinting     587
Health Concerns of Computer Use     587
Computers and Health Risks     587
Ergonomics and Workplace Design     589
Computer Addiction     589
Green Computing     590
Chapter Summary     591
High-Tech Talk     592
The Key(s) to Making Encryption Work     592
Companies on the Cutting Edge     593
McAfee     593
Symantec     593
Technology Trailblazers     593
Donn Parker     593
Clifford Stoll     593
Chapter Review     594
Key Terms     596
Checkpoint     597
Learn It Online     600
Learn How To     602
Web Research     604
Case Studies     605
Special Feature: Computer Forensics     606
Information System Development     618
What is the System Development Cycle?     620
Phases in the System Development Cycle     620
Guidelines for System Development     621
Who Participates in the System Development Cycle?     622
Looking Ahead: Strong Employment Opportunities for System Analysts     623
Project Management     623
Feasibility Assessment     625
Documentation     625
Data and Information Gathering Techniques     625
Ethics & Issues: Do You Work Harder When Someone Is Watching?     626
What Initiates the System Development Cycle?     626
Ethics & Issues: How Should Employees Combat Poor E-Mail Writing Skills?     627
Cyber Coast Cafe - A Case Study     628
Planning Phase     629
Planning at Cyber Coast Cafe     629
Analysis Phase     630
The Preliminary Investigation     630
Preliminary Investigation at Cyber Coast Cafe     631
Detailed Analysis     631
Process Modeling     632
Object Modeling     635
The System Proposal     635
Ethics & Issues: Is Outsourcing as Good as In-House Development?     637
Detailed Analysis at Cyber Coast Cafe     638
Design Phase     639
Acquiring Necessary Hardware and Software     639
Identifying Technical Specifications     639
Soliciting Vendor Proposals     639
Testing and Evaluating Vendor Proposals      640
Making a Decision     640
Hardware Acquisition at Cyber Coast Cafe     641
Detailed Design     641
Prototyping     642
Case Tools     642
Quality Review Techniques     643
Detailed Design at Cyber Coast Cafe     643
Implementation Phase     643
Develop Programs     643
Install and Test the New System     644
Looking Ahead: Training Delivery Becomes Flexible     644
Train Users     644
Convert to the New System     644
Implementation at Cyber Coast Cafe     645
Ethics & Issues: What Type of System Conversion Is Best?     645
Operation, Support, and Security Phase     646
Developing a Computer Security Plan     646
Operation, Support, and Security at Cyber Coast Cafe     647
Chapter Summary     647
High-Tech Talk     648
Benchmarking: Testing Performance through Calculations     648
Companies on the Cutting Edge     649
Computer Sciences Corporation (CSC)     649
Zebra Technologies     649
Technology Trailblazers     649
Ed Yourdon     649
Tom DeMarco      649
Chapter Review     650
Key Terms     652
Checkpoint     653
Learn It Online     656
Learn How To     658
Web Research     660
Case Studies     661
Programming Languages and ProgramDevelopment     662
Computer Programs and Programming Languages     664
Low-Level Languages     665
Procedural Languages     666
COBOL     668
C     668
Object-Oriented Programming Languages and Program Development Tools     669
Java     669
C++     670
C#     670
Visual studio     670
Delphi     672
PowerBuilder     673
Visual Programming Languages     673
Other Programming Languages     674
RPG     674
4GLs     674
Classic Programming Languages     675
Looking Ahead: The Future of Programming Languages     675
Other Program Development Tools     676
Application Generators     676
Macros     676
Ethics & Issues: Should All Students Be Required to Learn Computer Programming?     677
Web Page Development     678
HTML     678
Scripts, Applets, Servlets, and ActiveX Controls     679
Scripting Languages     680
Dynamic HTML     682
XHTML, XML, and WML     682
Ajax     683
Ruby on Rails     683
Web Page Authoring Software     683
Ethics & Issues: Should A Web Developer Know HTML?     683
Multimedia Program Development     684
The Program Development Cycle     685
What Initiates the Program Development Cycle?     685
Looking Ahead: Software Factories Provide Low-Cost Alternatives     686
Analyze Requirements     686
Design Solution     687
Structured Design     687
Object-Oriented Design     688
Control Structures     688
Design Tools     690
Validate Design     693
Implement Design     693
Extreme Programming     694
Test Solution     695
Ethics & Issues: Who Is Responsible for Bugs?     695
Ethics & Issues: Is Beta Testing Out of Hand?     696
Document Solution     696
Chapter Summary     697
High-Tech Talk      698
Structuring Data for the Web Using XML     698
Companies on the Cutting Edge     699
Electronic Arts     699
Sun Microsystems     699
Technology Trailblazers     699
Grace Hopper     699
James Gosling     699
Chapter Review     700
Key Terms     702
Checkpoint     703
Learn It Online     706
Learn How To     708
Web Research     710
Case Studies     711
Enterprise Computing     712
What is Enterprise Computing?     714
Organizational Structure of an Enterprise     716
Levels of Users in the Enterprise     717
Looking Ahead: The CEO of the Future     718
How Managers Use Information     718
Information Systems in the Enterprise     720
Information Systems within Functional Units     720
General Purpose Information Systems     725
Integrated Information Systems     730
Ethics & Issues: Should Companies Be Forced to Tell You What Information They Store about You?     730
Enterprise-Wide Technologies and Methodologies     733
Portals      733
Data Warehouses     734
Communications     734
Extranets     735
Web Services     735
Document Management Systems     736
Workflow     736
Virtual Private Network     736
E-Commerce     737
E-Retailing     737
Ethics & Issues: Would You Trust an Online Medical Diagnosis?     739
Finance     738
Travel     739
Entertainment and Media     739
Ethics & Issues: Who You Trust an Online Medical Diagnosis?     739
Health     739
Other Business Services     740
Enterprise Hardware     741
Raid     741
Network Attached Storage and Storage Area Networks     742
Enterprise Storage Systems     743
Ethics & Issues: How much Data Should Companies Be Required to Keep?     743
Blade Servers     744
Thin Clients     744
High-Availability Systems     745
Scalability     745
Utility and Grid Computing     745
Interoperability     746
Backup Procedures     746
Looking Ahead: Internet Systems Provide Backup Solutions      746
Disaster Recovery Plan     747
Chapter Summary     749
High-Tech Talk     750
Neural Networks: Learning from Experience     750
Companies on the Cutting Edge     751
EMC     751
IBM     751
Technology Trailbuzers     751
John Chambers     751
Jim Clark     751
Chapter Review     752
Key Terms     754
Checkpoint     755
Learn It Online     758
Learn How To     760
Web Research     762
Case Studies     763
Special Feature: Enterprise Order Processing: A Case Study     764
Computer Careers and Certification     774
The Computer Industry     776
Ethics & Issues: Outsourcing Computer Jobs - A Threat to American Workers?     777
Careers in the Computer Industry     778
General Business and Government Organizations and Their IT Departments     778
Looking Ahead: Tomorrow's Jobs in Information Technology     779
Computer Equipment Field     782
Ethics & Issues: Should Work Visas Be Issued to Foreign IT Workers?     782
Computer Software Field      782
Computer Service and Repair Field     783
Computer Sales     783
Computer Education and Training Field     784
IT Consulting     784
Preparing for a Career in the Computer Industry     785
Attending a Trade School     785
Attending a College or University     786
Ethics & Issues: Should Ethical Computer Hacking Be Illegal?     787
Searching for Computer-Related Jobs     787
Planning for Career Development     789
Professional Organizations     789
Looking Ahead: Women Connect Professionally Online     789
Professional Growth and Continuing Education     790
Computer Publications and Web Sites     791
Certification     792
Certification Benefits     792
Choosing a Certification     794
Preparing for Certification     794
Certification Examinations     795
A Guide to Certification     796
Ethics & Issues: Should Lifetime Certification Be Granted for Computer Professionals?     796
Application Software Certifications     796
Operating System Certifications     797
Programmer/Developer Certifications     797
Hardware Certifications      798
Networking Certifications     798
Computer Forensics Certifications     799
Security Certifications     799
Internet Certifications     800
Database System Certifications     800
Chapter Summary     801
High-Tech Talk     802
Companies on the Cutting Edge     803
Monster     803
ZDNet     803
Technology Trailblazers     803
Steve Ballmer     803
Steve Wozniak     803
Chapter Review     804
Key Terms     806
Checkpoint     807
Learn It Online     810
Learn How To     812
Web Research     814
Case Studies     815
Special Feature: Digital Entertainment     816
Coding Schemes and Number Systems     APP 1
Quiz Yourself Answers     APP 5
Computer Acronyms     APP 13
Glossary/Index     IND 1
Photo Credits     IND 37

New interesting textbook: Manufacturing Strategy or Productivity Inequality and the Digital Economy

MCSA/MCSE Self-Paced Traning Kit Exam 70-350: Implementing Microsoft Internet Security and Acceleration Server 2004

Author: Stan Reimer

Ace your preparation for MCP Exam 70-350-and expand your knowledge of Microsoft Internet Security and Acceleration Server (ISA) 2004, Microsoft's advanced application layer firewall, virtual private network (VPN), and Web cache solution. Designed to help maximize your performance on the exam, this TRAINING KIT packs the resources that exam candidates want most-including in-depth, self-paced training; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for the skills and expertise you can apply to the job.



1 comment:

  1. An Embedded Computers is a special-purpose computer system designed to perform dedicated functions. It is usually embedded as part of a complete device including hardware and mechanical parts. To get the exclusive and usefull information visit corvalent. Corvalent ensure satisfactory emebedded computers and services.

    ReplyDelete