Technology in Action, Global Edition

Lýsing:
Technology in Action uses practical content and hands-on projects to teach students computing tasks and skills they can apply at work, in class, or at home. Designed for today's technically savvy student, the text introduces difficult concepts at a basic level early on, then expands upon these skills as you build mastery. You’ll come away with current, practical knowledge that will help you manage your digital lifestyle and pursue a career in technology.
The coverage in the 18th Edition includes updated information on Windows 11 and reflect advancements in Wi-Fi 6e, 5G mobile broadband, and more. Content on home networks now emphasizes how to evaluate systems with a secondary focus on installation. Moreover, material on new smart home communication protocol matter has also been included. The edition also has two new exercises focusing on digital careers and security provide additional insight and practice.
Annað
- Höfundar: Alan Evans, Kendall Martin, Mary Anne Poatsy
- Útgáfa:18
- Útgáfudagur: 2023-06-30
- Hægt að prenta út 2 bls.
- Hægt að afrita 2 bls.
- Format:Page Fidelity
- ISBN 13: 9781292459943
- Print ISBN: 9781292728209
- ISBN 10: 1292459948
Efnisyfirlit
- Title Page
- Copyright
- Pearson’s Commitment to Diversity, Equity, and Inclusion
- Contents at a Glance
- Contents
- Learn Technology by Using Technology in Action 18e
- Instructor Teaching Resources
- Letter from the Authors
- About the Authors
- Acknowledgments
- Don’t just read about technology. Interact with it in MyLab IT
- Chapter 1. The Impact of Technology in a Changing World
- Part 1: Technology in Society
- Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on nat
- Technology in a Global Society
- Impact of Tools of Modern Technology
- Objective 1.1 Describe various technological tools being used to impact national and global issues
- Global Issues
- Objective 1.2 Describe various global social issues that are being affected by technology
- Impact of Tools of Modern Technology
- Technology in a Global Society
- Technology Connects Us with Others
- Technology Impacts How and Why We Connect and Collaborate
- Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others
- Technology Impacts How We Consume
- Objective 1.4 Summarize how technology has impacted the way we choose and consume products and servi
- Technology Impacts How and Why We Connect and Collaborate
- The Importance of Computer Literacy
- Computer Literacy
- Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate
- Helpdesk: Technology Impacts
- Sound Byte: Virtual Computer Tour
- Try This: Artificially Intelligent Artwork
- Make This: Tool: IFTTT.com (If This Then That)
- Computer Literacy
- Artificial Intelligence
- Artificial Intelligence Basics
- Objective 1.6 Describe artificial intelligence systems and explain their main goals
- Helpdesk: The Impact of Artificial Intelligence
- Bits&Bytes: Hands-On Artificial Intelligence
- Bits&Bytes: Machine Learning to Create New Instruments
- Ethics In It: Ethics in Computing
- Artificial Intelligence Basics
- The Impact of Technology on Your Career
- Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in
- Bits&Bytes: Is It AI or Human? Take a Turing Test!
- Dig Deeper: XR Extended Reality
- Defining Ethics
- Objective 1.8 Define ethics and describe various ethical systems
- Sound Byte: How to Debate Ethical Issues
- Personal Ethics
- Objective 1.9 Describe influences on the development of your personal ethics
- Ethics and Technology
- Objective 1.10 Present examples of how technology creates ethical challenges
- Solve This: How Technology Is Used on the World Stage and in Your Personal Life
- Part 1: Understanding Digital Components
- Learning Outcome 2.1 You will be able to describe the devices that make up a computer system
- Understanding Your Computer
- Computers Are Data Processing Devices
- Objective 2.1 Describe the four main functions of a computer system and how they interact with data
- Binary: The Language of Computers
- Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed
- Sound Byte: Binary Numbers Interactive
- Types of Computers
- Objective 2.3 List common types of computers, and discuss their main features
- Active Helpdesk: Understanding Bits and Bytes
- Bits&Bytes: Today’s Supercomputers: Faster Than Ever
- Computers Are Data Processing Devices
- Understanding Your Computer
- Input Devices
- Physical Keyboards and Touch Screens
- Objective 2.4 Identify the main types of keyboards and touch screens
- Mice and Other Pointing Devices
- Objective 2.5 Describe the main types of mice and pointing devices
- Bits&Bytes: Foldable Glass Is Making Foldable Phones Better!
- Image, Sound, and Sensor Input
- Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices
- Physical Keyboards and Touch Screens
- Image and Audio Output
- Objective 2.7 Describe options for outputting images and audio from computing devices
- Bits&Bytes: Teraflops in Your Living Room: Gaming on Overdrive
- Printers
- Objective 2.8 Describe various types of printers, and explain when you would use them
- Bits&Bytes: CPUs That Fight Back
- Try This: What’s Inside My Computer?
- Make This: Tool: App Inventor 2
- Processing and Memory on the Motherboard
- The Motherboard and Memory
- Objective 2.9 Describe the functions of the motherboard and RAM
- Sound Byte: Smartphones Are Really Smart
- Processing
- Objective 2.10 Explain the main functions of the CPU
- The Motherboard and Memory
- Storage Options on Computing Devices
- Objective 2.11 Describe the various means of storing data and information with computing devices
- Ethics In It: What Is Ethical Computing?
- Trends In It: Green Computing (Green IT)
- Computer Ports
- Objective 2.12 Describe common types of ports used today
- Helpdesk: Exploring Storage Devices and Ports
- Power Controls and Power Management
- Objective 2.13 Describe how to manage power consumption on computing devices
- Bits&Bytes: Smart Coral Reefs
- Dig Deeper: Building Your Own Gaming Computer
- Setting It All Up: Ergonomics
- Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices
- Solve This with Excel: Technology Wish List
- Part 1: Collaborating and Working on the Web
- Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for colla
- The Internet and How It Works
- The Origin of the Internet
- Objective 3.1 Describe how the Internet got its start
- How the Internet Works
- Objective 3.2 Explain how data travels on the Internet
- The Origin of the Internet
- The Internet and How It Works
- Collaborating and Communicating on the Web
- Mass Communication and Collaboration
- Objective 3.3 Evaluate the tools and technologies used to communicate and collaborate with large gro
- Bits&Bytes: Social Media Influencers
- Sound Byte: Blogging
- Personal Communication on the Web
- Objective 3.4 Summarize the technologies used for personal communications over the web
- Mass Communication and Collaboration
- Being Productive with Cloud Technologies
- Objective 3.5 Describe how cloud technologies are used to create, store, and share files
- Dig Deeper: Artificial Intelligence and Cloud Computing
- Conducting Business Online
- Objective 3.6 Describe how business is conducted using the Internet
- Bits&Bytes: Looking for Extra Money? Try a Side Hustle
- E-Commerce Safeguards
- Objective 3.7 Summarize precautions you should take when doing business online
- Helpdesk: Doing Business Online
- Bits&Bytes: Bitcoin: A Form of Virtual Currency
- Try This: Use OneDrive to Store and Share Your Files in the Cloud
- Make This: Tool: App Inventor 2
- Accessing and Moving Around the Web
- Web Browsers
- Objective 3.8 Explain what web browsers are and describe their common features
- URLs, Protocols, and Domain Names
- Objective 3.9 Explain what a URL is and discuss its main parts
- Navigating the Web
- Objective 3.10 Describe tools used to navigate the web
- Web Browsers
- Using Search Engines
- Objective 3.11 Describe the types of tools used to search the web and summarize strategies used to r
- Bits&Bytes: Maintain Your Privacy While Searching the Web
- Sound Byte: Finding Information on the Web
- Evaluating Websites
- Objective 3.12 Describe how to evaluate a website to ensure it is appropriate to use for research pu
- Helpdesk: Evaluating Websites
- Trends In It: Linked Data and the Semantic Web
- Ethical Issues on the Internet
- Objective 3.13 Demonstrate an understanding of Internet-related ethical issues
- Bits&Bytes: Did He Really Say That?
- Using the Internet Ethically
- Objective 3.14 Demonstrate an ability to conduct yourself on the Internet in an ethical manner
- Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare?
- Ethics In It: Cyber Harassment
- Solve This: Effective Internet Research
- Part 1: Accessing, Using, and Managing Software
- Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe ho
- Software Basics
- Types of Software
- Objective 4.1 Compare application and system software and describe the different types of applicatio
- Purchasing Software
- Objective 4.2 Explain the different options for purchasing software
- Bits&Bytes: Useful Apps to Help you Focus while Working or Learning Remotely
- Trends In It: Artificial Intelligence in Health Care
- Types of Software
- Software Basics
- Managing Your Software
- Installing and Uninstalling Software
- Objective 4.3 Describe how to install and uninstall software
- Helpdesk: Buying and Installing Software
- Bits&Bytes: Ridding Your Computer of Bloat
- Upgrading Software
- Objective 4.4 Explain the considerations around the decision to upgrade your software
- Dig Deeper: How Number Systems Work
- Software Licenses
- Objective 4.5 Explain how software licenses function
- Sound Byte: Where Does Binary Show Up?
- Ethics In It: Can I Use Software on My Device When I Don’t Own the License?
- Try This: Citing Website Sources
- Make This: Tool: App Inventor 2
- Installing and Uninstalling Software
- Productivity and Business Software
- Productivity Software
- Objective 4.6 Categorize the types of application software used to enhance productivity and describe
- Bits&Bytes: Productivity Software Tips and Tricks
- Bits&Bytes: How to Open Unknown File Types
- Bits&Bytes: Going Beyond PowerPoint
- Sound Byte: Programming for End Users
- Business Software
- Objective 4.7 Summarize the types of software that small and large businesses use
- Productivity Software
- Multimedia Software
- Objective 4.8 Describe the uses and features of multimedia software
- Bits&Bytes: Scalable Vector Graphics: Text-Based Images
- Audio Software
- Objective 4.9 Describe the uses and features of audio software
- Helpdesk: Choosing Software
- App Creation Software
- Objective 4.10 Describe the features of app creation software
- Bits&Bytes: Mirror, Mirror . . .
- Educational and Reference Software
- Objective 4.11 Categorize educational and reference software and explain their features
- Solve This with Excel: Computer and Information Technology Jobs Outlook
- Part 1: Understanding System Software
- Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and ex
- Operating System Fundamentals
- Operating System Basics
- Objective 5.1 Discuss the functions of the operating system
- Operating Systems for Personal Use
- Objective 5.2 Explain the most popular operating systems for personal use
- Bits&Bytes: Taking Control Remotely
- Operating Systems for Machinery, Networks, and Business
- Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business
- Ethics In It: The Great Debate: Is macOS Safer Than Windows?
- Operating System Basics
- Operating System Fundamentals
- What the Operating System Does
- The User Interface
- Objective 5.4 Explain how the operating system provides a means for users to interact with the compu
- Hardware Coordination
- Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory,
- Sound Byte: Using Windows Task Manager to Evaluate System Performance
- Software Application Coordination
- Objective 5.6 Explain how the operating system interacts with application software
- Trends In It: Ethical Hacking
- The User Interface
- The Boot Process
- Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors
- Helpdesk: Starting the Computer: The Boot Process
- Try This: Using Virtual Desktops in Windows
- Make This: Tool: App Inventor 2
- The Windows Interface
- Using Windows 11
- Objective 5.8 Describe the main features of the Windows interface
- Bits&Bytes: Smartphone and OS Integration
- Using Windows 11
- Organizing Your Files
- Objective 5.9 Summarize how the operating system helps keep your computer organized and manages file
- Bits&Bytes: Manage Files in macOS
- Bits&Bytes: Save Files in the Cloud
- Helpdesk: Organizing Your Computer: File Management
- Windows Administrative Utilities
- Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide acc
- Sound Byte: Hard Disk Anatomy
- Dig Deeper: Windows Tricks and Shortcuts
- Solve This: Operating Systems: Analyzing Market Share
- Part 1: Evaluating Key Subsystems
- Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, inc
- Your Ideal Computing Device
- Moore’s Law
- Objective 6.1 Describe the changes in CPU performance over the past several decades
- Selecting a Computing Device
- Objective 6.2 Compare and contrast a variety of computing devices
- Moore’s Law
- Your Ideal Computing Device
- Evaluating the CPU Subsystem
- How the CPU Works
- Objective 6.3 Describe how a CPU is designed and how it operates
- Measuring CPU Performance
- Objective 6.4 Describe tools used to measure and evaluate CPU performance
- Bits&Bytes: Liquid Cooling
- How the CPU Works
- Random Access Memory
- Objective 6.5 Discuss how RAM is used in a computer system
- Helpdesk: Evaluating Your CPU and RAM
- Adding RAM
- Objective 6.6 Evaluate whether adding RAM to a system is desirable
- Sound Byte: Installing RAM
- Bits&Bytes: Your Next Job Might Be Totally VR!
- Try This: Measure Your System Performance
- Make This: Tool: App Inventor 2
- Evaluating the Storage Subsystem
- Types of Storage Drives
- Objective 6.7 Classify and describe the major types of nonvolatile storage drives
- Sound Byte: Installing an SSD Drive
- Storage Needs
- Objective 6.8 Evaluate the amount and type of storage needed for a system
- Bits&Bytes: Intel’s EVO Platform: What Exactly Does It Mean?
- Types of Storage Drives
- Video Cards
- Objective 6.9 Describe the features of video cards
- Bits&Bytes: How Hot Is My GPU?
- Bits&Bytes: Multiple Devices Made Easy: macOS Universal Control
- Trends In It: Thunderbolt and USB Ports: Which Ones Do I Need?
- Sound Cards
- Objective 6.10 Describe the features of sound cards
- Helpdesk: Evaluating Computer System Components
- Maintaining System Reliability
- Objective 6.11 Describe steps you can take to optimize your system’s reliability
- Getting Rid of Your Old Computer
- Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer
- Ethics In It: Bridging the Digital Divide: Hardware for the Masses
- Solve This with Excel: Laptop Alternatives
- Part 1: How Networks Function
- Learning Outcome 7.1 You will be able to explain the basics of networking, including the components
- Networking Fundamentals
- Understanding Networks
- Objective 7.1 Describe networks and their pros and cons
- Helpdesk: Understanding Networking
- Understanding Networks
- Networking Fundamentals
- Network Architectures
- Network Designs
- Objective 7.2 Explain the different ways networks are defined
- Dig Deeper: P2P Blockchain Networks
- Bits&Bytes: Watch Out for WiGig and HaLow
- Network Designs
- Transmission Media
- Objective 7.3 Describe the types of transmission media used in networks
- Basic Network Hardware
- Objective 7.4 Describe the basic hardware devices necessary for networks
- Sound Byte: Installing a Home Computer Network
- Network Software
- Objective 7.5 Describe the type of software necessary for networks
- Broadband Internet Connections
- Objective 7.6 Summarize the broadband options available to access the Internet
- Bits&Bytes: Who’s Not on Broadband?
- Wireless Internet Access
- Objective 7.7 Summarize how to access the Internet wirelessly
- Bits&Bytes: Net Neutrality: The Debate Continues
- Try This: Testing Your Internet Connection Speed
- Make This: Tool: Ping and Telnet
- Evaluating Home Networks
- Evaluating Your Home Network
- Objective 7.8 Explain what should be considered when evaluating a home network
- Bits&Bytes: Power Your Devices—Wirelessly
- Devices on a Home Network
- Objective 7.9 Describe how a home network is set up
- Trends In It: A Common Protocol for Your Smart Home Devices
- Evaluating Your Home Network
- Troubleshooting Wireless Network Problems
- Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them
- Bits&Bytes: Analyzing Network Problems
- Securing Wireless Networks
- Objective 7.11 Describe how to secure wireless home networks
- Sound Byte: Securing Wireless Networks
- Helpdesk: Managing and Securing Your Wireless Network
- Solve This with Word: Home Networking Guide
- Part 1: The Impact of Digital Information
- Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technol
- Digital Basics
- Digital Convergence and the Internet of Things
- Objective 8.1 Describe how digital convergence and the Internet of Things have evolved
- Digital versus Analog
- Objective 8.2 Explain the differences between digital and analog signals
- Digital Convergence and the Internet of Things
- Digital Basics
- Digital Publishing
- E-readers
- Objective 8.3 Describe the different types of e-readers
- Borrowing and Publishing e-Books
- Objective 8.4 Explain how to borrow and publish e-books
- Helpdesk: Managing Digital Media
- Bits&Bytes: Libraries versus Publishers: Battle over Digital Books
- E-readers
- Creating and Storing Digital Music
- Objective 8.5 Describe how digital music is created and stored
- Distributing Digital Music
- Objective 8.6 Summarize how to listen to and publish digital music
- Digital Photography
- Objective 8.7 Explain how best to create, print, and share digital photos
- Sound Byte: Enhancing Photos with Image-Editing Software
- Digital Video
- Objective 8.8 Describe how to create, edit, and distribute digital video and establish an online dig
- Bits&Bytes: Becoming a Social Media Influencer
- Trends In It: Digital Asset Managers Needed!
- Digital Challenges and Dilemmas
- Objective 8.9 Discuss the challenges in managing an active digital lifestyle
- Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?
- Bits&Bytes: Novel Approach: Using Copyrighted Music to Prevent Video Uploads
- Try This: Creating and Publishing a Movie
- Make This: Tool: App Inventor 2
- Protection of Digital Property
- Intellectual Property
- Objective 8.10 Describe the various types of intellectual property
- Copyright Basics
- Objective 8.11 Explain how copyright is obtained and the rights granted to the owners
- Helpdesk: Understanding Intellectual Property and Copyright
- Copyright Infringement
- Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe si
- Bits&Bytes: Your Tax Dollars at Work: Free Media Without Permission!
- Bits&Bytes: Fair Use Applies to Educational Music Videos . . . or Does It?
- Intellectual Property
- Plagiarism
- Objective 8.13 Explain plagiarism and strategies for avoiding it
- Sound Byte: Plagiarism and Intellectual Property
- Hoaxes and Digital Manipulation
- Objective 8.14 Describe hoaxes and digital manipulation
- Protecting Your Online Reputation
- Objective 8.15 Describe what comprises your online reputation and how to protect it
- Bits&Bytes: Celebrity Photographic Rights
- Ethics In It: Acceptable Use Policies: What You Can and Can’t Do
- Solve This with Powerpoint: Intellectual Property and Copyright Basics
- Part 1: Threats to Your Digital Assets
- Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and
- Identity Theft and Hackers
- Identity Theft
- Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpe
- Hacking
- Objective 9.2 Describe the different types of hackers and the tools they use
- Bits&Bytes: Weaponization of DDoS Attacks
- Identity Theft
- Identity Theft and Hackers
- Computer Viruses
- Virus Basics
- Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing
- Sound Byte: Protecting Your Computer
- Types of Viruses
- Objective 9.4 List the different categories of computer viruses, and describe their behaviors
- Virus Basics
- Online Annoyances
- Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security
- Social Engineering
- Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey t
- Bits&Bytes: A Site I Use Was Breached . . . Now What?
- Ethics In It: Working from Home . . . and Being Watched from Home
- Ransomware and Scareware
- Helpdesk: Threats to Your Digital Life
- Trends In It: Spear Phishing: The Bane of Data Breaches
- Try This: Testing Your Network Security
- Make This: App Inventor 2
- Restricting Access to Your Digital Assets
- Firewalls
- Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers
- Preventing Virus Infections
- Objective 9.8 Explain how to protect your computer from virus infection
- Helpdesk: Understanding Firewalls
- Authentication: Passwords and Biometrics
- Objective 9.9 Describe how passwords and biometric characteristics can be used for user authenticati
- Bits&Bytes: BitLocker Encryption from Windows
- Anonymous Web Surfing: Hiding from Prying Eyes
- Objective 9.10 Describe ways to surf the web anonymously
- Bits&Bytes: Browser Safety Check
- Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords!
- Firewalls
- Protecting Your Personal Information
- Objective 9.11 Describe the types of information you should never share online
- Sound Byte: Managing Computer Security with Windows Tools
- Backing Up Your Data
- Objective 9.12 List the various types of backups you can perform on your computing devices, and expl
- Environmental Factors and Power Surges
- Objective 9.13 Explain the negative effects environment and power surges can have on computing devic
- Preventing and Handling Theft
- Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the pr
- Dig Deeper: Digital Forensics: How It Works
- Solve This: Computer Security
- Part 1: Understanding Programming
- Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify
- Life Cycle of an Information System
- The Importance of Programming
- Objective 10.1 Describe the importance of programming to both software developers and users
- System Development Life Cycle
- Objective 10.2 Summarize the stages of the system development life cycle
- Bits&Bytes: Many Paths to a Tech Career
- The Importance of Programming
- Life Cycle of an Information System
- Life Cycle of a Program
- The Program Development Life Cycle
- Objective 10.3 Define programming and list the steps in the program development life cycle
- The Problem Statement
- Objective 10.4 Describe how programmers construct a complete problem statement from a description of
- Sound Byte: Using the Arduino Microcontroller
- Helpdesk: Understanding Software Programming
- Algorithm Development
- Objective 10.5 Explain how programmers use flow control and design methodologies when developing alg
- Bits&Bytes: Build a Coding Portfolio
- Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operator
- Coding
- Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the
- Debugging
- Objective 10.7 Identify the role of debugging in program development
- Bits&Bytes: Coding with a Purpose
- Testing and Documentation
- Objective 10.8 Explain the importance of testing and documentation in program development
- Try This: Programming with Corona Solar2D
- Make This: Tool: App Inventor 2
- The Program Development Life Cycle
- Many Programming Languages
- Need for Diverse Languages
- Objective 10.9 Discuss the driving factors behind the popularity of various programming languages
- Sound Byte: Programming with the Processing Language
- Selecting the Right Language
- Objective 10.10 Summarize the considerations in identifying an appropriate programming language for
- Bits&Bytes: Learn Programming with Patch Cords
- Ethics In It: When Software Runs Awry
- Need for Diverse Languages
- Tour of Modern Languages
- Objective 10.11 Compare and contrast modern programming languages
- Bits&Bytes: Repl.It
- Trends In It: Emerging Technologies: Unite All Your Video Game Design Tools
- Future of Programming Languages
- Objective 10.12 State key principles in the development of future programming languages
- Helpdesk: A Variety of Programming Languages
- Solve This: Time Sheets
- Part 1: Database Fundamentals
- Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common
- The Need for Databases
- Database Basics
- Objective 11.1 Explain what a database is and why databases are useful
- Database Basics
- The Need for Databases
- Database Types
- Flat Databases
- Objective 11.2 Describe features of flat databases
- Relational Databases
- Objective 11.3 Describe features of relational databases
- Bits&Bytes: Normal Forms
- Helpdesk: Using Databases
- Object-Oriented Databases
- Objective 11.4 Describe features of object-oriented databases
- Bits&Bytes: Use a Graph Database to Track Social Network Data
- Multidimensional Databases
- Objective 11.5 Describe features of multidimensional databases
- NoSQL Databases
- Objective 11.6 Describe how dynamic, web-created data is managed in a database
- Bits&Bytes: No-Code and Low-Code Databases
- Flat Databases
- Relational Database Components and Functions
- Objective 11.7 Describe how relational databases organize and define data
- Sound Byte: Creating and Querying an Access Database
- Bits&Bytes: Music Streaming Services Use Databases
- Inputting and Managing Data
- Objective 11.8 Describe how data is inputted and managed in a database
- Dig Deeper: Structured Query Language (SQL)
- Try This: Using Excel’s Database Functions
- Make This: Tool: App Inventor 2
- Data Warehousing and Storage
- Data Warehouses and Data Marts
- Objective 11.9 Explain what data warehouses and data marts are and how they are used
- Helpdesk: How Businesses Use Databases
- Bits&Bytes: Data Dashboards: Useful Visualization Tools
- Data Mining
- Objective 11.10 Describe data mining and how it works
- Bits&Bytes: Hadoop: How Big Data Is Being Managed
- Ethics In It: Data, Data Everywhere—But Is It Protected?
- Data Warehouses and Data Marts
- Business Information Systems
- Objective 11.11 Describe the main types of business information systems and how they are used by bus
- Sound Byte: Analyzing Data with Microsoft Power BI Suite
- Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web
- Trends In It: Mobile Business Intelligence
- Solve This: College Database
- Part 1: Client/Server Networks and Topologies
- Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers f
- Client/Server Network Basics
- Networking Advantages
- Objective 12.1 List the advantages for businesses of installing a network
- Comparing Client/Server and Peer-to-Peer Networks
- Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network
- Types of Client/Server Networks
- Objective 12.3 Describe the common types of client/server networks as well as other networks busines
- Bits&Bytes: Do Free VPNs Protect You Adequately?
- Networking Advantages
- Client/Server Network Basics
- Servers and Network Topologies
- Servers
- Objective 12.4 List the common types of servers found on client/server networks
- Helpdesk: Using Servers
- Trends In It: Protecting Privacy in Your Home Office
- Network Topologies
- Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages
- Sound Byte: Network Topology and Navigation Devices
- Try This: Fixing “No Internet Access” in Windows
- Make This: Tool: App Inventor 2
- Servers
- Transmission Media
- Wired and Wireless Transmission Media
- Objective 12.6 Describe the types of wired and wireless transmission media used in networks
- Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots
- Wired and Wireless Transmission Media
- Network Adapters
- Objective 12.7 Describe how network adapters help data move around a network
- MAC Addresses
- Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network
- Switches, Bridges, and Routers
- Objective 12.9 List the various network navigation devices, and explain how they help route data thr
- Helpdesk: Transmission Media and Network Adapters
- Network Operating Systems
- Objective 12.10 Explain why network operating systems are necessary for networks to function
- Bits&Bytes: Amazon Sidewalk: Extending Your Reach Outside Your Home
- Dig Deeper: Intent-Based Networking (IBN): Networks That Think for Themselves
- Client/Server Network Security
- Objective 12.11 List major security threats to networks, and explain how network administrators miti
- Sound Byte: A Day in the Life of a Network Technician
- Ethics In It: How Should Companies Handle Data Breaches?
- Bits&Bytes: Logging On? Try Finger Vein Recognition
- Solve This with Word: Cyber-Security Flyer and Mail Merge
- Part 1: Inner Workings of the Internet
- Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how
- Internet Management and Networking
- Management
- Objective 13.1 Describe the management of the Internet
- Networking Components
- Objective 13.2 Explain how the Internet’s networking components interact
- Data Transmission
- Objective 13.3 List and describe the Internet protocols used for data transmission
- Bits&Bytes: A Free Cloud-Based Server for You
- Bits&Bytes: Packet Analysis
- Management
- Internet Management and Networking
- Internet Identity
- IP Addresses
- Objective 13.4 Explain how each device connected to the Internet is assigned a unique address
- Bits&Bytes: What’s Your IP Address?
- Helpdesk: Understanding IP Addresses, Domain Names, and Protocols
- Bits&Bytes: Amazing Applications of IoT
- Sound Byte: Creating Web Pages with Squarespace
- Dig Deeper: Connection-Oriented Versus Connectionless Protocols
- Domain Names
- Objective 13.5 Discuss how a numeric IP address is changed into a readable name
- Try This: Ping Me
- Make This: Tool: App Inventor 2
- IP Addresses
- Web Technologies
- Web Development
- Objective 13.6 Compare and contrast a variety of web development languages
- Bits&Bytes: CodePen: An Editing Community for Web Designers
- Application Architecture
- Objective 13.7 Compare and contrast server-side and client-side application software
- Sound Byte: Client-Side Web Page Development
- Bits&Bytes: Editors for Web Development
- Web Development
- Types of Internet Communication
- Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging
- Bits&Bytes: AI and Your Inbox
- Encryption
- Objective 13.9 Explain how data encryption improves security
- Bits&Bytes: Random Numbers: We Wouldn’t Have Encryption Without Them!
- Helpdesk: Keeping E-Mail Secure
- Ethics In It: Do We Really Want Strong Encryption?
- Trends In It: Cognitive Computing
- Solve This: Creating an HTML Document
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- Z
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- X
- Y
- Z
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 9611
- Útgáfuár : 2019
- Leyfi : 380