Chapter 1 Introducing Computers to the Internet 2
Module1A Becoming Fluent with Computers and the Internet 4
The Need for Computer Fluency 6
What Is a Computer,Anyway? 7
Understanding the Computer:Basic Definitions 7
What Computers Can't Do(Yet) 8
The Information Processing Cycle in Action:Batch vs.Interactive Processing 10
So What? 11
Computer Systems 15
Introducing Hardware:The Computer's Physical Components 15
Input:Getting Data into the Computer 16
Processing:Transforming Data into Information 16
Output:Displaying the Information 17
Storage:Holding Programs and Data for Future Use 17
Communications Devices 18
Types of Computers 19
Introducing Software:Telling the Computer What to Do 21
Creating Software 21
Using Software 22
Types of Software 22
System Software 22
Operating System(OS) 22
System Utilities 22
Application Software 24
Packaged vs.Custom Software 24
Office Applications 24
The Internet 25
Module1B History of Computers and the Internet 30
Steps Toward Modern Computing 31
First Steps: Calculators 31
The Technological Edge:Electronics 31
Putting It All Together:The ENIAC 36
The Stored-Program Concept 36
The Computer's Family Tree 37
The First Generation(1950s) 37
The Second Generation(Early 1960s) 38
The Third Generation(Mid-1960s to Mid-1970s) 39
The Fourth Generation(1975 to the Present) 41
A Fifth Generation? 44
The Internet Revolution 45
Lessons Learned 48
Chapter 2 Exploring Computer Hardware:What's in the Box? 54
Module2A Inside the System Unit 56
Hardware vs.Software 57
Macs and PCs 57
Describing Hardware Performance 58
Bits and Bytes 58
Thousands′Millions′and More 59
Introducing the System Unit 59
What's on the Outside of the Box? 60
Power Switch 60
Connectors 60
Front Panel 64
Inside the System Unit 64
What's on the Motherboard? 65
System Clock 66
The Microprocessor 66
Benchmarks 74
Memoy 75
Chipset 77
Input/Output(I/O)Buses 77
How Computers Represent Data 77
Digital/Analog Representation 78
Numbering Systems 78
Representing Numbers 79
Representing Very Large and Very Small Numbers 80
Representing Characters 80
Module2B Storing Data:ElectronicFiling Cabinets 88
Memory vs.Storage 89
Why Is Storage Necessary? 89
Types of Storage Devices 90
Read/Write Media vs.Read-Only Media 91
Sequential vs.Random Access Storage 91
Storage Technologies:Magnetic and Optical 91
The Storage Hierarchy 92
Capacity of Storage Devices 93
Speed of Storage Devices(Access Time) 93
Floppy Disks and Floppy Disk Drives 94
What Does “Floppy” Mean? 94
Storage Capacities of Floppy Disks 94
Protecting Your Data 95
Floppy Disk Drives 95
How Floppy Drives Work 95
Formatting:Preparing Disks for Use 96
Beyond the Floppy:High-Capacity Disks and Drives 97
Hard Disks 98
Why Are Hard Disks Needed? 98
How Hard Disks Work 98
Factors Affecting Hard Disk Performance 99
Hard Disk Interfaces 99
Disk Caches:Improving a Hard Disks Performance 100
Hard Disk Longevity 101
RAID 101
Removable Hard Disks 101
Magnetic Tape:Still Useful 102
CD-ROM Discs and Drives 102
CD-R and CD-RW Discs and Recorders 103
DVD-ROM Discs and Drives 103
More Optical Storage Technologies 104
Storage Horizons 105
FMD-ROM 107
Storage Area Networks(SAN) 107
Module2C Input and Output:Data In′Information Out 112
Understanding Input:Not Just Data Entry 113
Input Devices:The Computer's“Senses” 113
Introducing Keyboards 114
Using a Computer Keyboard 114
Alternative Keyboards 117
Entering International Characters 117
Health Risks of Keyboard Use 118
Speech Recognition 119
Pointing Devices 120
Types of Mice 123
Health Risks of Mouse Usage 123
More Ways to Control the Computer 124
More Ways to Get Data Into the Computer 125
Input Devices in Business′Industry and Science 128
Understanding Output: Making Data Meaningful 129
Output Devices: Engaging Our Senses 131
Visual Display Systems 131
Data Projectors 134
Printers 135
Plotters 137
Fax Output 137
Audio Output:Sound Cards and Speakers 137
Tactile Feedback 137
Chapter 3The World of Computer Software 144
Module3A System Software:Keeping the Computer Running Smoothly 146
Operating System(OS):The Computer's Traffic Cop 147
Managing Programs 148
Managing Memory 149
Handling Input and Output 150
User Interface 150
Exploring Popular Operating Systems:A Guided Tour 152
UNIX 152
Xerox PARC and the First GUI 153
MS-DOS 153
Mac OS 153
Microsoft Windows 3.x 154
Microsoft Windows 95 and98 154
Microsoft Windows CE 155
Microsoft Windows NT 155
Microsoft Windows 2000 156
Linux 156
Starting the Computer 157
The BIOS Screen and Setup Program 157
The Power-On Self-Test (POST) 157
Loading the OS 158
Authentication 159
System Utilities:Tools for Housekeeping 159
File Management 159
File Finders 160
Backup Utilities 160
Antivirus Software 161
File Compression Utilities 161
Disk Scanning Utilities 161
File Defragmentation Programs 162
Module3B Application Software:Essentials for Knowledge Workers 167
Horizontal vs. Vertical Applications 168
Types of Application Soft ware 168
System Requirements 169
Commercial Programs′Shareware′and Freeware 169
Software Licenses 169
Distribution Methods 171
Documentation 171
Software Versions 171
Installation 171
Registration 171
Visual Metaphors:Working in Familiar Ways 173
Integrated Programs and Suites:The All-in-One Approach 174
Using Application Software 175
Installing Applications 176
Launching Applications 176
Understanding the Application's Window 176
Getting Help 178
Understanding Menus 178
Choosing Preferences 178
Using Popup Menus 179
Using Wizards 179
Creating New Documents 179
Open an Existing Document 179
Saving Your Work 180
Exiting the Application 180
Shutting Down Your System 180
Web Integration:A New Way to Get the Word Out 181
Chapter 4Concepts of Application Software 186
Module4A Writing with Word Processing Soft ware 188
Word Processing Software:The Electronic Scribe 189
Composing Your Document 189
Editing Your Document 193
Formatting 197
Printing 202
The Internet Connection 202
Desktop Publishing 202
Module4B Creating Electronic Spreadsheets 208
Introducing Spreadsheet Software 209
Exploring the Worksheet 209
Using a Spreadsheet Program 210
Selecting Cells 211
Entering Data in the Worksheet 212
Editing Data 213
Formatting Data 214
Entering Formulas 214
Editing the Worksheet Structure 222
Printing Your Worksheet 222
Designing an Effective Worksheet 222
Creating Worksheet Charts 224
Advanced Spreadsheet Features 225
Spreadsheet Risks 227
Module4C Designing Presentations 231
Introducing Presentation Graphics Software 232
Presentation Graphics vs.Analytical Graphics 232
Exploring the Application Window 233
Creating a Presentation 235
Choosing a Template 235
Choosing the Slide Layout 236
Using Placeholders 236
Inserting Charts′Clip Art′and Drawings 237
Viewing and Organizing Your Presentation 238
Producing the Output Media 238
Additional Features for On-Screen Presentations 239
The Internet Connection 239
Using Visual Aids Effectively 241
Module4D Building Databases 246
Database Concepts: The Essentials 247
Records and Fields 247
The Ideal Database System 248
Types of Database Programs 249
File Management Programs 249
Database Management Systems 249
Data Warehousing and Data Mining 250
Introducing Database Software 250
Database Objects 251
Designing a Database 252
Understanding Data Types 253
Creating a Table with the Table Wizard 253
Creating a Form with the Form Wizard 254
Creating a Query with the Query Wizard 255
Creating Reports with the Report Wizard 257
Client/Server Database Systems 258
The Internet Connection:Going Public with Data 260
Chapter 5Multimedia and Virtual Reality 266
Module5A Multimedia:Lights!Cameras!Action! 268
Introducing Multimedia 269
Multimedia Hardware 269
Multimedia Applications 270
Multimedia Resources:Introducing the Cast 270
Compression and Decompression(Codecs) 270
Paint Programs 272
Image Editors 272
Drawing Programs 273
Animation Programs 273
3-D Rendering Programs 275
Video Editors 275
Audio Software 275
Multimedia Authoring Systems:Writing the Script 276
Module5B Virtual Environments 281
Virtual Reality:Toward the Holodeck? 282
Enhancing the Immersive Experience:VR Hardware 282
Bringing VR to the Internet:VRML 283
Practical Applications of VR 283
Computer Games 283
The VR Factor 283
Too Much Violence? 284
MUDs 285
Chapter 6Data Communications 290
Module6A Telecommunications:Exchanging Data via the Telephone System 292
Understanding the Telephone System 293
Quality of Service 293
Local Exchange Carriers (LECs) 293
Long-Distance Transmission Media 294
Standards and Regulations 295
More Ways to Access the System 296
The PSTN in Perspective 296
Modems:From Digital to Analog and Back 297
How Modems Work 297
Asynchronous Communication 298
Modulation Protocols 298
Fax 299
Digital Telephony:Living with Twisted Pair 299
Bandwidth 300
Last Mile Technologies 300
Alternatives to Digital Telephony 302
Direct Broadcast Satellite(DBS) 302
Cable Modems 302
Electrical Power Systems 302
Convergence: Is It a Phone or a Computer? 304
The Everything PC 304
TV Internet Set-Tops 304
Personal Communication Service(PCS) 304
Internet Telephony 305
Internet Faxing 307
Module6B Networks:Superhighways for Digital Information 312
Introducing Computer Networks:Synergy at Work 313
What Is a Computer Network? 313
Types of Computer Networks:LANs and WANs 314
Networking Synergies in a Nutshell 314
Network Fundamentals 315
Physical Media 315
Switching and Routing Techniques 315
Protocols 317
Network Layers 318
Local Area Networks(LANs):Limited Reach,Fast Connections 319
Networking Hardware:Network Interface Cards(NICs) 319
Networking Software 320
Media 320
LAN Topologies 321
LAN Technologies 322
LAN Protocols 323
Wide Area Networks(WANs):Long-Haul Carriers 323
How WANs Work 325
How WANs Are Organized 326
WAN Protocols 326
WAN Applications 326
Chapter 7The Internet and the Web:Welcome to Cyberspace 334
Module7A Understanding the Internet 336
Introducing the Internet:The Network of Networks 337
A Galactic Network 338
Interoperability 338
Leave the Lower Layers to the LANs and WANs 339
The Internet vs.Online Services 339
The Internet's History 340
Internet Software: Clients and Servers 341
Exploring Internet Services 342
Electronic Mail(Email):Staying in Touch 342
The World Wide Web(WWW):Accessing Information 343
FTP:Transferring Files 343
Usenet:Joining Online Discussions 344
IRC:Text Chatting in Real Time 347
Internet Telephony:Real-Time Voice and Video 347
More Internet Services 348
How the Internet Works:A Geography of Cyberspace 349
Configuring Your Computer for Internet Access 349
Accessing the Internet 349
Internet Service Providers(ISPs) 350
Backbones 350
The Internet Protocols(TCP/IP) 350
The Domain Name System 351
Intranets:Using TCP/IP Inside the Enterprise 352
The Future of the Internet 352
More Internet Addresses 352
More Bandwidth 352
Module7B The World Wide Web and E-Commerce 357
Welcome to the Web 358
The Hypertext Concept 358
Web Browsers and Web Servers 359
Web Addresses(URLs) 359
Web Protocols 360
Web Page Design Tools 360
Browsing the Web 361
Exploring Your Browser′s Window 361
Default Start Page 361
Accessing Web Pages 362
Using the Back and Forward Buttons 362
Using Navigation Aids 362
History List 362
Favorites and Bookmarks 362
Finding Information on the Web 363
Understanding Information Discovery Tools 363
Subject Guides 363
Search Engines 363
Search Techniques 364
Inclusion and Exclusion 364
Wildcards 365
Phrase and Boolean Searches 365
Evaluating the Information You've Found 366
Rules for Critically Evaluating Web Pages 366
Locating Material in Published Works 367
Authoritative Sources Online 367
Electronic Commerce 367
Business-to-Business E-Commerce 367
Online Shopping 367
Secure Electronic Transactions(SET) 370
Online Banking 372
Online Stock Trading 372
E-Postage 374
Module 7C Using Email 378
Email Fundamentals 379
Email Servers and Clients 379
Email Addresses 379
Email Protocols 380
Introducing Email Clients 380
Getting an Account 380
Setting Up Your Email Client 381
Exploring Your Email Clien's Window 382
Composing′ Receiving′ and Forwarding Email 382
Logging On to the Mail Server 382
Receiving Email 382
Replying Directly to the Author 383
Replying to All 383
Composing Email 383
Email Tips 384
Forwarding Email 385
Receiving Attachments:Beware! 385
Sending Attachments:Be Courteous 385
Managing Email 386
Organizing Your Mail 386
Filtering Incoming Mail 386
Mailing Lists 387
Subscribing to a Mailing List 387
Participating in a Mailing List 388
Unsubscribing 388
Using Email Responsibly 388
Using Email at Work 388
Backup Tapes 388
Additional Risks 389
How to Stay out of Trouble 389
Module7D Creating a Web Page 394
The Web Publishing Process 395
Defining Your Purpose 395
Defining Your Audience:Who's Reading Your Page? 397
Introducing HTML 397
Content vs.Structure 397
Structure vs.Presentation 398
HTML Markup vs.Word Processing Formats 398
Introducing HTML Elements 399
Tools for Creating HTML 400
Making Design Decisions 400
Creating Your Page 401
Choosing Your HTML Editor 401
Entering the Global Structure 401
Defining the Head 402
Creating the Body 403
Adding Hyperlinks 408
Adding Images 410
Testing Your Page 411
Publishing Your Page 411
Web Publishing Horizons 411
Learning More HTML 411
XML:The Web's Next Language 412
Introducing XML 412
How XML Works 413
Introducing XHTML 414
Chapter 8Creating Information Systems 420
Module8A Introducing Information Systems 422
Computerized Information Systems(CIS):Serving an Organization's Needs 423
Understanding Complex Organizations:The Power Pyramid 424
Functional Divisions of an Organization 424
Chain of Command 425
Information:The Good Kind and the Other Kind 427
Characteristics of Valuable Information 427
Techniques of Information Reduction 427
Information Systems in Organizations:A Survey 429
Transaction Processing System(TPS) 429
Management Information System(MIS) 429
Decision Support System(DSS) 430
Executive Information System(EIS) 430
Expert System 430
Knowledge Management System 430
Computer-Supported Cooperative Work(CSCW) 431
Workflow Automation 431
Business Process Reengineering(BPR) 431
Data Warehousing and Data Mining 433
Computers in the Retail Sector 433
At the Checkout Stand 433
Retail the Wal-Mart Way 434
Module8B3 Systems Analysis and Design 439
System Analysts:Communication Counts 440
The Systems Development Life Cycle(SDLC):A Problem-Solving Approach 440
The Five Phases of SDLC 441
Avoiding Mistakes 441
The Watertall Model 443
Phase1:Identifying the Problem and Opportunities 443
Recognizing the Need for the System 443
Defining the Problem 443
Identifying Opportunities 444
Developing a Plan 444
Determining Feasibility 444
Preparing the Project Proposal 446
Phase2:Analyzing and Documenting the Existing Information System 446
Analyzing the Existing System 446
Determining the New System's Requirements 446
Phase3:Designing the System 446
Phase4:Implementing the System 448
Deciding to Build or Buy 448
Developing the Software 448
Testing 449
Training 449
Converting Systems 449
Phase5:Supporting the System 449
Module8C Programming Languages and Program Development 453
First-Generation Languages:1s and Os 454
Second-Generation Languages:A Little Easier 454
Third-Generation Languages:Programming Comes of Age 455
Compilers and Interpreters 455
Spaghetti Code and the Great Software Crisis 456
Structured Programming Languages 456
Modular Programming Languages 456
Fourth-Generation Languages:Getting Away from Procedure 456
Object Oriented Programming:A Revolution in the Making? 457
Eliminating the Program vs.Data Distinction 457
What Is an Object? 458
Classes 458
Inheritance 458
Rapid Application Development(RAD) 458
Middleware(Objects Across the Enterprise) 458
A Guide to Programming Languages:One Size Doesn't Fit All 459
COBOL and Fortran:For Some People,Retro Rules! 459
Structured and Modular Languages 460
Object-Oriented(OO)Languages 462
Introducing the Program Development Life Cycle 464
Phase1:Defining the Problem 465
Phase2:Designing the Program 465
Phase3:Coding the Program 468
Phase4:Testing and Debugging the Program 468
Phase5:Formalizing the Solution 468
Phase6:Implementing and Maintaining the Program 468
Chapter 9Social and Ethical Issues of Computing 476
Module9A Privacy and Encryption 478
Privacy and Anonymity in Cyberspace 479
The Problem:Collection of Information Without Consent 480
The Internet Factor 480
Protecting Privacy: Basic Principles 481
Anonymity 481
How Is Technology Eroding Privacy and Anonymity? 482
Cookies 482
Global Unique Identifiers (GUIDs) 483
Is Self-Regulation Sufficient? 484
Privacy at Work 484
Protecting Your Privacy Online 485
The Encryption Debate 486
Encryption Basics 486
The Problem of Key Interception 486
Public-Key Encryption 487
Security Issues of Strong Encryption 487
Export Restrictions 488
The Global Dimension 489
Module9B Computer Crime and Security 494
Scope of the Problem 495
Computer and Internet Crime:Tools and Techniques 495
Tricks for Obtaining Passwords 496
Salami Shaving and Data Diddling 496
Forgery 497
Security Loophole Detection Programs 497
Computer Viruses 497
More Rogue Programs 498
Meet the Attackers 499
Crackers,Cyber Gangs,and Virus Authors 499
Disgruntled Employees 500
Spies 500
Swindlers 501
Shills 501
Cyberstalkers and Sexual Predators 502
Enemies and Terrorists 502
What's at Stake? 503
Consumption of Staff Time 503
Downtime 503
Fraud and Theft 503
Adverse Publicity 505
Vandalism 505
Character Assassination 505
Loss of Privacy 505
Risks to Public Safety 506
Denial of Service 506
Playing It Safe 506
Protecting Computers from Power-Related Problems 506
Controlling Access 507
Using Firewalls 507
Using Encryption 508
Using Antivirus Programs 508
Backing Up Data 508
Avoiding Scams 509
Preventing Cyberstalkers 510
Module9C Ethics:Doing the Right Thing 514
Avoiding Computer-Related Legal Problems 515
Plagiarism 515
Software Piracy 516
Copyright Infringement 517
Introducing Ethics 518
Moral Dilemmas 518
Ethical Principles 518
Thinking Through Moral Dilemmas 519
Computer Ethics for Computer Users 520
Ten Commandments for Computer Ethics 520
Netiquette 520
Computer Ethics for Computer Professionals 521
Safety First 521
Additional Ethical Responsibilities 522
The ACM Code of Conduct 522
Programmer Liability 522
Computer Ethics in Business 524
Whistle-Blowing 524
Chapter 10Computers and You 530
Module10A Buying and Upgrading Your Computer System 532
Get Started the Right Way 533
Notebook or Desktop? 533
Mac or PC? 534
Top-of-the-Line or Bargain Bin Special? 535
Anticipate Your Software Needs 535
Choose the Right Hardware 535
Processors 536
Memory 536
Hard Disks 536
Video Cards and Monitors 537
Modems 538
Network Cards 538
Sound 538
Keyboard and Mouse 538
Uninterruptible Power Supply(UPS) 540
Get the Right Printer 540
Shop Wisely 540
Buying Used 542
Name-Brand Windows PCs 542
Generic Windows PCs 542
Building Your Own Windows PC 542
Caring for Your Computer System 542
Upgrading Your System 543
Removing the Cover 543
Adding Expansion Boards 544
Upgrading Memory 544
Replacing the Cover 546
Module10B Avoiding Risks to Your Health 550
Eyesight Problems 551
Computer Vision Syndrome(CVS) 551
Preventing CVS 551
Accessories for Eye Protection 552
Cumulative Trauma Disorders 552
Computer-Related CTDs 554
Symptoms 554
How Serious Are CTDs? 554
Preventing Cumulative Trauma Disorder 555
Accessories for CTD Prevention 555
Improving Computer Access for People with Disabilities 556
Module10C Careers and Certification 561
Traditional Information Technology(IT)Career Paths 562
Training for Traditional IT Careers 563
Traditional Methods of Continuing Education 565
Jobs for Nondegreed IT Workers 566
New Information Technology (IT) Career Paths 566
Sought-After Business Skills 567
Sought-After Technology Skills 568
New Technologies,New Jobs 569
Certification 569
The Effect of Computers on Overall Emp+loyment 571
Module10D Emerging Technologies 576
Tomorrow's Hardware:Faster,Cheaper,Connected 577
The Short Term 578
The Long Term 578
The Limits of Trend Extrapolation 578
Artificial Intelligence:Toward the Smart Machine? 579
Defining Intelligence 579
The Turing Test 580
Brute Force 581
AI Achievements 581
Strong AI 585
Selected Solutions 593
Acronym Finder 597
GlossaryG 599
Illustration Credits 629
Index 633