Technology In Action Complete, Global Edition
5.490 kr.
Lýsing:
For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft® Office. Using technology to teach technology Best-selling Technology in Action Complete uses practical content and hands-on projects to engage students in computing tasks and skills they can apply at work, in class, or at home. Designed for today’s technically savvy students, the text introduces difficult concepts at a basic level early on, then expands upon these skills as students build mastery.
Annað
- Höfundar: Alan Evans, Kendall Martin, Mary Anne Poatsy
- Útgáfa:16
- Útgáfudagur: 2020-07-27
- Hægt að prenta út 2 bls.
- Hægt að afrita 2 bls.
- Format:Page Fidelity
- ISBN 13: 9781292349633
- Print ISBN: 9781292349626
- ISBN 10: 1292349638
Efnisyfirlit
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- Chapter 1 The Impact of Technology in a Changing World
- Part 1: Technology in Society
- Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on nat
- Technology in a Global Society
- Impact of Tools of Modern Technology
- Objective 1.1 Describe various technological tools being used to impact national and global issues.
- Global Issues
- Objective 1.2 Describe various global social issues that are being affected by technology.
- Technology Connects Us with Others
- Technology Impacts How and Why We Connect and Collaborate
- Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others
- Technology Impacts How We Consume
- Objective 1.4 Summarize how technology has impacted the way we choose and consume products and servi
- The Importance of Computer Literacy
- Computer Literacy
- Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate
- Helpdesk: Technology Impacts
- Sound Byte: Virtual Computer Tour
- Try This: What Does Facebook Know about You?
- Make This: TOOL: IFTTT.com (If This Then That)
- Part 1: Technology in Society
- Part 2: Emerging Technologies and Ethical Computing
- Artificial Intelligence
- Artificial Intelligence Basics
- Objective 1.6 Describe artificial intelligence systems and explain their main goals.
- Helpdesk: The Impact of Artificial Intelligence
- Ethics in IT: Ethics in Computing
- Working with Artificial Intelligence and Other Information Technologies
- Technology and Your Career
- Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in
- Bits&Bytes: Is It AI or Human? Take a Turing Test!
- Dig Deeper: XR Extended Reality
- Ethical Computing
- Defining Ethics
- Objective 1.8 Define ethics and examine various ethical systems.
- Sound Byte: How to Debate Ethical Issues
- Personal Ethics
- Objective 1.9 Describe influences on the development of your personal ethics.
- Ethics and Technology
- Objective 1.10 Present examples of how technology creates ethical challenges.
- Solve This: How Technology Is Used on the World Stage and in Your Personal Life
- Artificial Intelligence
- Part 1: Understanding Digital Components
- Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
- Understanding Your Computer
- Computers Are Data Processing Devices
- Objective 2.1 Describe the four main functions of a computer system and how they interact with data
- Binary: The Language of Computers
- Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
- Sound Byte: Binary Numbers Interactive
- Types of Computers
- Objective 2.3 List common types of computers, and discuss their main features.
- Active Helpdesk: Understanding Bits and Bytes
- Bits&Bytes: Today’s Supercomputers: Faster Than Ever
- Input Devices
- Physical Keyboards and Touch Screens
- Objective 2.4 Identify the main types of keyboards and touch screens.
- Mice and Other Pointing Devices
- Objective 2.5 Describe the main types of mice and pointing devices.
- Dig Deeper: How Touch Screens Work
- Bits&Bytes: Distributed Computing: Putting Your Computer to Work While You Sleep
- Image, Sound, and Sensor Input
- Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
- Output Devices
- Image and Audio Output
- Objective 2.7 Describe options for outputting images and audio from computing devices.
- Bits&Bytes: Foldable Phones Are Here
- Printers
- Objective 2.8 Describe various types of printers, and explain when you would use them.
- Bits&Bytes: CPUs That Fight Back
- Try This: What’s Inside My Computer?
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 2.2 You will be able to describe how computers process and store data and how devic
- Processing and Memory on the Motherboard
- The Motherboard and Memory
- Objective 2.9 Describe the functions of the motherboard and RAM.
- Sound Byte: Smartphones Are Really Smart
- Processing
- Objective 2.10 Explain the main functions of the CPU.
- Storing Data and Information
- Storage Options on Computing Devices
- Objective 2.11 Describe the various means of storing data and information with computing devices.
- Ethics in IT: What Is Ethical Computing?
- Trends In IT: Green Computing (Green IT)
- Connecting Peripherals to the Computer
- Computer Ports
- Objective 2.12 Describe common types of ports used today.
- Helpdesk: Exploring Storage Devices and Ports
- Power Management and Ergonomics
- Power Controls and Power Management
- Objective 2.13 Describe how to manage power consumption on computing devices.
- Setting It All Up: Ergonomics
- Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
- Bits&Bytes: Coming Soon: USB 4 and DisplayPort 2
- Solve This: Technology Wish List
- Part 1: Collaborating and Working on the Web
- Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for colla
- The Internet and How It Works
- The Origin of the Internet
- Objective 3.1 Describe how the Internet got its start.
- How the Internet Works
- Objective 3.2 Explain how data travels on the Internet.
- Collaborating and Communicating on the Web
- Collaborating with Web Technologies
- Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
- Bits&Bytes: Secure Messaging Apps
- Sound Byte: Blogging
- Communicating over the Web
- Objective 3.4 Summarize the technologies used to communicate over the web.
- Conducting Business on the Web
- Conducting Business Online
- Objective 3.5 Describe how business is conducted using the Internet.
- E-Commerce Safeguards
- Objective 3.6 Summarize precautions you should take when doing business online.
- Dig Deeper: How Cloud Computing Works
- Bits&Bytes: Looking for Extra Money? Try a Side Hustle
- Helpdesk: Doing Business Online
- Bits&Bytes: Bitcoin: A Form of Virtual Currency
- Try This: Use OneDrive to Store and Share Your Files in the Cloud
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and
- Accessing and Moving Around the Web
- Web Browsers
- Objective 3.7 Explain what web browsers are, and describe their common features.
- URLs, Protocols, and Domain Names
- Objective 3.8 Explain what a URL is and discuss its main parts.
- Navigating the Web
- Objective 3.9 Describe tools used to navigate the web.
- Bits&Bytes: Maintain Your Privacy While Searching the Web
- Searching the Web Effectively
- Using Search Engines
- Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to
- Bits&Bytes: Digital Assistants and Predictive Search
- Sound Byte: Finding Information on the Web
- Evaluating Websites
- Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research pu
- Helpdesk: Evaluating Websites
- Trends In IT: Linked Data and the Semantic Web
- Bits&Bytes: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?
- Using the Web Ethically
- Digital Activism
- Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
- Geolocation
- Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applic
- Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare?
- Ethics in IT: Cyber Harassment
- Solve This: Create a Report: Conducting Research on the Web
- Part 1: Accessing, Using, and Managing Software
- Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe ho
- Software Basics
- Application vs. System Software
- Objective 4.1 Compare application software and system software.
- Distributing Software
- Objective 4.2 Explain the differences between commercial software and open source software and descr
- Bits&Bytes: Finding Alternative Software
- Managing Your Software
- Purchasing Software
- Objective 4.3 Explain the different options for purchasing software.
- Trends In IT: Mobile Payment Apps: The Power of M-Commerce
- Helpdesk: Buying and Installing Software
- Installing and Uninstalling Software
- Objective 4.4 Describe how to install and uninstall software.
- Bits&Bytes: Ridding Your Computer of “Bloat”
- Upgrading Software
- Objective 4.5 Explain the considerations around the decision to upgrade your software.
- Dig Deeper: How Number Systems Work
- Software Licenses
- Objective 4.6 Explain how software licenses function.
- Sound Byte: Where Does Binary Show Up?
- Ethics in IT: Can I Install Software That I Don’t Own?
- Try This: Citing Website Sources
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 4.2 Describe the different types of application software used for productivity and
- Productivity and Business Software
- Productivity Software
- Objective 4.7 Categorize the types of application software used to enhance productivity and describe
- Bits&Bytes: Productivity Software Tips and Tricks
- Bits&Bytes: How to Open Unknown File Types
- Bits&Bytes: Going Beyond PowerPoint
- Sound Byte: Programming for End Users
- Business Software
- Objective 4.8 Summarize the types of software that large and small businesses use.
- Bits&Bytes: Need to Work as a Team? Try These Collaboration Tools
- Multimedia and Educational Software
- Digital Multimedia Software
- Objective 4.9 Describe the uses and features of digital multimedia software.
- Digital Audio Software
- Objective 4.10 Describe the uses and features of digital audio software.
- Helpdesk: Choosing Software
- App Creation Software
- Objective 4.11 Describe the features of app creation software.
- Bits&Bytes: Mirror, Mirror . . .
- Educational and Reference Software
- Objective 4.12 Categorize educational and reference software and explain their features.
- Solve This: Analyzing Benchmark Data
- Part 1: Understanding System Software
- Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and ex
- Operating System Fundamentals
- Operating System Basics
- Objective 5.1 Discuss the functions of the operating system.
- Operating Systems for Personal Use
- Objective 5.2 Explain the most popular operating systems for personal use.
- Bits&Bytes: Quick Assist
- Bits&Bytes: Operating Systems for the Smart Home
- Operating Systems for Machinery, Networks, and Business
- Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
- Ethics in IT: The Great Debate: Is macOS Safer Than Windows?
- What the Operating System Does
- The User Interface
- Objective 5.4 Explain how the operating system provides a means for users to interact with the compu
- Hardware Coordination
- Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory,
- Sound Byte: Using Windows Task Manager to Evaluate System Performance
- Software Application Coordination
- Objective 5.6 Explain how the operating system interacts with application software.
- Trends In IT: Are Personal Computers Becoming More Human?
- Starting Your Computer
- The Boot Process
- Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors
- Helpdesk: Starting the Computer: The Boot Process
- Try This: Using Virtual Desktops in Windows 10
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 5.2 You will be able to describe how to use system software, including the user int
- The Windows Interface
- Using Windows 10
- Objective 5.8 Describe the main features of the Windows interface.
- Bits&Bytes: Snip and Sketch
- File Management
- Organizing Your Files
- Objective 5.9 Summarize how the operating system helps keep your computer organized and manages file
- Bits&Bytes: Save Files in the Cloud
- Bits&Bytes: Using Storage Sense
- Helpdesk: Organizing Your Computer: File Management
- Utility Programs
- Windows Administrative Utilities
- Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide acc
- Dig Deeper: How Disk Defragmenting Utilities Work
- Sound Byte: Hard Disk Anatomy
- Solve This: Operating Systems: Analyzing Market Share
- Part 1: Evaluating Key Subsystems
- Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, inc
- Your Ideal Computing Device
- Moore’s Law
- Objective 6.1 Describe the changes in CPU performance over the past several decades.
- Selecting a Computing Device
- Objective 6.2 Compare and contrast a variety of computing devices.
- Evaluating the CPU Subsystem
- How the CPU Works
- Objective 6.3 Describe how a CPU is designed and how it operates.
- Bits&Bytes: Liquid Cooling
- Measuring CPU Performance
- Objective 6.4 Describe tools used to measure and evaluate CPU performance.
- Dig Deeper: The Machine Cycle
- Evaluating the Memory Subsystem
- Random Access Memory
- Objective 6.5 Discuss how RAM is used in a computer system.
- Adding RAM
- Objective 6.6 Evaluate whether adding RAM to a system is desirable.
- Helpdesk: Evaluating Your CPU and RAM
- Sound Byte: Installing RAM
- Try This: Measure Your System Performance
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media
- Evaluating the Storage Subsystem
- Types of Storage Drives
- Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
- Sound Byte: Installing an SSD Drive
- Dig Deeper: How Storage Devices Work
- Storage Needs
- Objective 6.8 Evaluate the amount and type of storage needed for a system.
- Bits&Bytes: How Hot Is My GPU?
- Evaluating the Media Subsystems
- Video Cards
- Objective 6.9 Describe the features of video cards.
- Bits&Bytes: Make Your Tablet a Second Monitor
- Trends In IT: USB 3.2 C Ports: One Port to Rule Them All!
- Sound Cards
- Objective 6.10 Describe the features of sound cards.
- Helpdesk: Evaluating Computer System Components
- Evaluating System Reliability and Moving On
- Maintaining System Reliability
- Objective 6.11 Describe steps you can take to optimize your system’s reliability.
- Getting Rid of Your Old Computer
- Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
- Ethics in IT: Free Hardware for All
- Solve This: Laptop Alternatives
- Part 1: How Networks Function
- Learning Outcome 7.1 You will be able to explain the basics of networking, including the components
- Networking Fundamentals
- Understanding Networks
- Objective 7.1 Describe computer networks and their pros and cons.
- Helpdesk: Understanding Networking
- Network Architectures
- Network Designs
- Objective 7.2 Explain the different ways networks are defined.
- Dig Deeper: P2P File Sharing
- Network Components
- Transmission Media
- Objective 7.3 Describe the types of transmission media used in networks.
- Sound Byte: Installing a Home Computer Network
- Basic Network Hardware
- Objective 7.4 Describe the basic hardware devices necessary for networks.
- Network Software
- Objective 7.5 Describe the type of software necessary for networks.
- Trends In IT: How Smart Is Your Home?
- Connecting to the Internet
- Broadband Internet Connections
- Objective 7.6 Summarize the broadband options available to access the Internet.
- Bits&Bytes: Net Neutrality
- Bits&Bytes: Who’s Not on Broadband?
- Wireless Internet Access
- Objective 7.7 Summarize how to access the Internet wirelessly.
- Try This: Testing Your Internet Connection Speed
- Make This: TOOL: Ping and Telnet
- Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home
- Installing and Configuring Home Networks
- Planning Your Home Network
- Objective 7.8 Explain what should be considered before creating a home network.
- Bits&Bytes: Power Your Devices—Wirelessly
- Connecting Devices to a Network
- Objective 7.9 Describe how to set up a home network.
- Bits&Bytes: Mesh Networks: An Emerging Alternative
- Bits&Bytes: Analyzing Network Problems
- Managing and Securing Wireless Networks
- Troubleshooting Wireless Network Problems
- Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them.
- Securing Wireless Networks
- Objective 7.11 Describe how to secure wireless home networks.
- Sound Byte: Securing Wireless Networks
- Helpdesk: Managing and Securing Your Wireless Network
- Solve This: Home Networking Guide
- Part 1: The Impact of Digital Information
- Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technol
- Digital Basics
- Digital Convergence and the Internet of Things
- Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
- Digital versus Analog
- Objective 8.2 Explain the differences between digital and analog signals.
- Digital Publishing
- e-Readers
- Objective 8.3 Describe the different types of e-readers.
- Using e-Texts
- Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
- Helpdesk: Managing Digital Media
- Digital Music
- Creating and Storing Digital Music
- Objective 8.5 Describe how digital music is created and stored.
- Distributing Digital Music
- Objective 8.6 Summarize how to listen to and publish digital music.
- Digital Media
- Digital Photography
- Objective 8.7 Explain how best to create, print, and share digital photos.
- Sound Byte: Enhancing Photos with Image-Editing Software
- Digital Video
- Objective 8.8 Describe how to create, edit, and distribute digital video.
- Trends In IT: Digital Asset Managers Needed!
- Managing Your Digital Lifestyle
- Digital Challenges and Dilemmas
- Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
- Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?
- Bits&Bytes: The Rise of Wearable Technology
- Bits&Bytes: Goodbye Net Neutrality. . .Hello Bandwidth Throttling
- Try This: Creating and Publishing a Movie
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways
- Protection of Digital Property
- Intellectual Property
- Objective 8.10 Describe the various types of intellectual property.
- Copyright Basics
- Objective 8.11 Explain how copyright is obtained and the rights granted to the owners.
- Helpdesk: Understanding Intellectual Property and Copyright
- Copyright Infringement
- Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe si
- Bits&Bytes: Software Piracy: It’s More Than Just Downloading and Copying
- Bits&Bytes: Your Tax Dollars at Work: Free Media without Permission!
- Living Ethically in the Digital Era
- Plagiarism
- Objective 8.13 Explain plagiarism and strategies for avoiding it.
- Hoaxes and Digital Manipulation
- Objective 8.14 Describe hoaxes and digital manipulation.
- Sound Byte: Plagiarism and Intellectual Property
- Protecting Your Online Reputation
- Objective 8.15 Describe what comprises your online reputation and how to protect it.
- Bits&Bytes: Celebrity Photographic Rights
- Ethics in IT: Acceptable Use Policies: What You Can and Can’t Do
- Solve This: Intellectual Property and Copyright Basics
- Part 1: Threats to Your Digital Assets
- Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and
- Identity Theft and Hackers
- Identity Theft
- Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpe
- Hacking
- Objective 9.2 Describe the different types of hackers and the tools they use.
- Bits&Bytes: Next Generation White Hat Hackers
- Computer Viruses
- Virus Basics
- Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing
- Sound Byte: Protecting Your Computer
- Types of Viruses
- Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
- Online Annoyances and Social Engineering
- Online Annoyances
- Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
- Social Engineering
- Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey t
- Bits&Bytes: I Received a Data Breach Letter . . . Now What?
- Ethics in IT: You’re Being Watched . . . But Are You Aware You’re Being Watched?
- Helpdesk: Threats to Your Digital Life
- Trends In IT: Spear Phishing: The Bane of Data Breaches
- Try This: Testing Your Network Security
- Make This: App Inventor 2 or Thunkable
- Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and
- Restricting Access to Your Digital Assets
- Firewalls
- Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
- Preventing Virus Infections
- Objective 9.8 Explain how to protect your computer from virus infection.
- Helpdesk: Understanding Firewalls
- Authentication: Passwords and Biometrics
- Objective 9.9 Describe how passwords and biometric characteristics can be used for user authenticati
- Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots
- Anonymous Web Surfing: Hiding from Prying Eyes
- Objective 9.10 Describe ways to surf the Web anonymously.
- Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords!
- Keeping Your Data Safe
- Protecting Your Personal Information
- Objective 9.11 Describe the types of information you should never share online.
- Sound Byte: Managing Computer Security with Windows Tools
- Backing Up Your Data
- Objective 9.12 List the various types of backups you can perform on your computing devices, and expl
- Protecting Your Physical Computing Assets
- Environmental Factors and Power Surges
- Objective 9.13 Explain the negative effects environment and power surges can have on computing devic
- Preventing and Handling Theft
- Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the pr
- Dig Deeper: Computer Forensics: How It Works
- Solve This: Computer Security
- Part 1: Understanding Programming
- Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify
- Life Cycle of an Information System
- The Importance of Programming
- Objective 10.1 Describe the importance of programming to both software developers and users.
- System Development Life Cycle
- Objective 10.2 Summarize the stages of the system development life cycle.
- Bits&Bytes: The Agile Scrum
- Life Cycle of a Program
- The Program Development Life Cycle
- Objective 10.3 Define programming and list the steps in the program development life cycle.
- The Problem Statement
- Objective 10.4 Describe how programmers construct a complete problem statement from a description of
- Sound Byte: Using the Arduino Microcontroller
- Helpdesk: Understanding Software Programming
- Algorithm Development
- Objective 10.5 Explain how programmers use flow control and design methodologies when developing alg
- Bits&Bytes: Coding with a Purpose
- Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operator
- Coding
- Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the
- Debugging
- Objective 10.7 Identify the role of debugging in program development.
- Bits&Bytes: Many Languages on Display
- Testing and Documentation
- Objective 10.8 Explain the importance of testing and documentation in program development.
- Try This: Programming with Corona
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropr
- Many Programming Languages
- Need for Diverse Languages
- Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
- Sound Byte: Programming with the Processing Language
- Selecting the Right Language
- Objective 10.10 Summarize the considerations in identifying an appropriate programming language for
- Bits&Bytes: Learn to Code for Free at freeCodeCamp
- Ethics in IT: When Software Runs Awry
- Exploring Programming Languages
- Tour of Modern Languages
- Objective 10.11 Compare and contrast modern programming languages.
- Bits&Bytes: Your Software Portfolio
- Trends In IT: Emerging Technologies: Unite All Your Video Game Design Tools
- Future of Programming Languages
- Objective 10.12 State key principles in the development of future programming languages.
- Helpdesk: A Variety of Programming Languages
- Solve This: Time Sheets
- Part 1: Database Fundamentals
- Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common
- The Need for Databases
- Database Basics
- Objective 11.1 Explain what a database is and why databases are useful.
- Database Types
- Flat Databases
- Objective 11.2 Describe features of flat databases.
- Relational Databases
- Objective 11.3 Describe features of relational databases.
- Bits&Bytes: Normal Forms
- Object-Oriented Databases
- Objective 11.4 Describe features of object-oriented databases.
- Multidimensional Databases
- Objective 11.5 Describe features of multidimensional databases.
- Helpdesk: Using Databases
- NoSQL Databases
- Objective 11.6 Describe how Web 2.0 data is managed in a database.
- Using Databases
- Relational Database Components and Functions
- Objective 11.7 Describe how relational databases organize and define data.
- Sound Byte: Creating and Querying an Access Database
- Bits&Bytes: Music Streaming Services Use Databases
- Inputting and Managing Data
- Objective 11.8 Describe how data is inputted and managed in a database.
- Dig Deeper: Structured Query Language (SQL)
- Bits&Bytes: Data Dashboards: Useful Visualization Tools
- Try This: Using Excel’s Database Functions
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, an
- Data Warehousing and Storage
- Data Warehouses and Data Marts
- Objective 11.9 Explain what data warehouses and data marts are and how they are used.
- Helpdesk: How Businesses Use Databases
- Bits&Bytes: Data Warehouses Are Going to the Cloud
- Data Mining
- Objective 11.10 Describe data mining and how it works.
- Bits&Bytes: Hadoop: How Big Data Is Being Managed
- Ethics in IT: Data, Data Everywhere—But Is It Protected?
- Using Databases to Make Business Decisions
- Business Information Systems
- Objective 11.11 Describe the main types of business information systems and how they are used by bus
- Sound Byte: Analyzing Data with Microsoft Power BI Suite
- Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web
- Trends In IT: Mobile Business Intelligence
- Solve This: College Database
- Part 1: Client/Server Networks and Topologies
- Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers f
- Client/Server Network Basics
- Networking Advantages
- Objective 12.1 List the advantages for businesses of installing a network.
- Comparing Client/Server and Peer-to-Peer Networks
- Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
- Types of Client/Server Networks
- Objective 12.3 Describe the common types of client/server networks as well as other networks busines
- Bits&Bytes: Make Your Browser Protect You!
- Servers and Network Topologies
- Servers
- Objective 12.4 List the common types of servers found on client/server networks.
- Helpdesk: Using Servers
- Trends In IT: Virtualization: Making Servers Work Harder
- Network Topologies
- Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages
- Sound Byte: Network Topology and Navigation Devices
- Try This: Sharing Printers on a Network Using Windows
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 12.2 You will be able to describe transmission media, network operating system soft
- Transmission Media
- Wired and Wireless Transmission Media
- Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
- Bits&Bytes: Guidance on Green Computing
- Network Adapters and Navigation Devices
- Network Adapters
- Objective 12.7 Describe how network adapters help data move around a network.
- MAC Addresses
- Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
- Switches, Bridges, and Routers
- Objective 12.9 List the various network navigation devices, and explain how they help route data thr
- Helpdesk: Transmission Media and Network Adapters
- Network Operating Systems and Network Security
- Network Operating Systems
- Objective 12.10 Explain why network operating systems are necessary for networks to function.
- Bits&Bytes: Extending Smart Homes: Smart Yards Coming Soon!
- Client/Server Network Security
- Objective 12.11 List major security threats to networks, and explain how network administrators miti
- Dig Deeper: The OSI Model: Defining Protocol Standards
- Sound Byte: A Day in the Life of a Network Technician
- Ethics in IT: How Should Companies Handle Data Breaches?
- Bits&Bytes: Logging in? Try Finger Vein Recognition
- Solve This: Cyber-Security Flyer and Mail Merge
- Part 1: Inner Workings of the Internet
- Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how
- Internet Management and Networking
- Management
- Objective 13.1 Describe the management of the Internet.
- Networking Components
- Objective 13.2 Explain how the Internet’s networking components interact.
- Data Transmission
- Objective 13.3 List and describe the Internet protocols used for data transmission.
- Bits&Bytes: A Free Cloud-Based Server for You
- Internet Identity
- IP Addresses
- Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
- Helpdesk: Understanding IP Addresses, Domain Names, and Protocols
- Bits&Bytes: What’s Your IP Address?
- Bits&Bytes: Amazing Applications of IoT
- Sound Byte: Creating Web Pages with Squarespace
- Dig Deeper: Connection-Oriented Versus Connectionless Protocols
- Domain Names
- Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
- Bits&Bytes: Scale Up for Success
- Try This: Ping Me
- Make This: TOOL: App Inventor 2 or Thunkable
- Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applicat
- Web Technologies
- Web Development
- Objective 13.6 Compare and contrast a variety of web development languages.
- Bits&Bytes: CodePen: An Editing Community for Web Designers
- Application Architecture
- Objective 13.7 Compare and contrast server-side and client-side application software.
- Sound Byte: Client-Side Web Page Development
- Bits&Bytes: Repl It
- Communications over the Internet
- Types of Internet Communication
- Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
- Bits&Bytes: AI and Your Inbox
- Encryption
- Objective 13.9 Explain how data encryption improves security.
- Bits&Bytes: Numbers: We Wouldn’t Have Encryption Without Them!
- Ethics in IT: Do We Really Want Strong Encryption?
- Helpdesk: Keeping E-Mail Secure
- Trends In IT: Cognitive Computing
- Solve This: Creating an HTML Document
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- Z
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- X
- Y
- Z
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 9611
- Útgáfuár : 2020
- Leyfi : 380