Gain a thorough understanding of today's ever-changing world of technology as you learn how to apply technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and fe
Discovering Computers: Digital Technology, Data, and Devices (MindTap Course List)
β Scribed by Jennifer T. Campbell, Mark Ciampa, Steven M. Freund, Mark Frydenberg, Susan L. Sebok
- Publisher
- Cengage Learning
- Year
- 2022
- Tongue
- English
- Leaves
- 457
- Edition
- 17
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
DISCOVERING COMPUTERS: DIGITAL TECHNOLOGY, DATA, AND DEVICES, 17th edition, teaches you not only the basics of technology, but also how you will use it -- and the responsibilities that go along with being a digital citizen. Focusing on current technology, the content addresses convergence of devices and platforms. Each module integrates practical how-to tips, ethics issues and security topics, while Consider This boxes woven throughout help you sharpen your critical-thinking skills. A variety of end-of-module activities -- checkpoint questions, small group activities and problem-solving exercises -- enable you to put what you learn into practice. MindTap digital learning solution is also available. Using an inviting approach that ensures understanding, DISCOVERING COMPUTERS equips you with the information you need for success at home, school and work.
β¦ Table of Contents
Table of Contents
Module 1: Being a Digital Citizen: At Home, School, and Work
How Technology Impacts You
A Day in the Life of a Digital Citizen
How Technology Impacts Society
The Internet of Things
The History of Computers
The Digital Divide
Secure IT: Protect Your Privacy
To Protect Your Privacy
How Technology Impacts the Professional World
Technology in K-12 Education
Technology in Higher Education
Technology in Health Care
Technology in the Transportation Industry
Technology in Manufacturing
How To: Use Technology in Your Job Search
Create a Professional Online Presence
Achieve Technology Certifications
How Convergence Impacts Technology
Computer Devices
Mobile Devices
Media and Gaming Devices
What Does It Mean to Be a Digital Citizen?
Legal and Ethical Responsibilities of a Digital Citizen
How Companies and Schools Can Protect Themselves
Green Computing
Ethics & Issues: Who Is Responsible for Providing Assistive Technologies?
Assistlve Technologies
Legal Requirements
Module 2: The Internet: Connecting and Communicating Online
The Internet Evolution
History of the Internet and the Web
Using the World Wide Web
Web Basics
Accessing Web Content
How Data Travels the Internet
How To: Connect to the Internet
Selecting an Internet Service Provider
Choosing a Network Type
Connecting to a Wireless Network
Explore Websites, Web Apps, and E-Commerce
Website Categories
Web Apps
E-Commerce
Secure IT: Stay Safe Online
Online Safety Tips
Make Secure E-Commerce Payments
Communicating Online
Email
Messaging Apps
Podcasts
Online Conferencing
Voice over Internet Protocol (VoIP)
FTP
Use Social Networks
Social Media and Social Networks
Business Uses of Online Social Networks
Personal Uses of Online Social Networks
Types of Social Networks
Privacy and Security Risks with Online Social Networks
Business Uses of Social Media
Apply Information Literacy Standards to Web Searches
Define Information Literacy
How Search Engines Work
Use Search Tools and Strategies
Refine Web Searches
Conduct Online Research
Ethics & Issues: Using Online Content Responsibly
Gather Content from Online Sources
Apply Information Literacy Standards
Student Assignments
Module 3: Evaluating Hardware: For Home and Work
How Do You Select a Device?
Define Each Component of Computer Hardware
What Hardware Features Should You Consider?
Which Type of Computer Is Right for You?
Mobile Computer Buyerβs Guide
Desktop Buyerβs Guide
Input and Output Devices
How Computers Represent Data
Input Devices
Output Devices
Install and Evaluate Hardware
Evaluate the Performance of Computer Hardware
Secure IT: Reducing Hardware Risks
Avoid Hardware Theft
Maintain Computer Hardware
Protect Computer Equipment
Restore a Device
Perform Data Backups
Internal, External, and Cloud-Based Storage Solutions
Network Hardware
Network Connection Components
Network Communication Devices
Inside the Case
Cases
The Arithmetic Logic Unit
Machine Cycle
How To: Protect Yourself When Using Devices
Define and Prevent Risks to Physical Health
Define and Prevent Risks to Behavioral Health
Define and Prevent Risks to Social Health
Ethics & Issues: Dispose of Hardware Responsibly
Student Assignments
Module 4: Programs and Apps: Using Apps for Productivity, Graphics, and Security
How Do You Use Programs and Apps?
Types of Apps
Common Features of Apps
Use Mobile Apps
Current Trends in App Development
Ethics and Issues: Acquire Programs and Apps Responsibly
Legal Protections for Programs and Apps
Distributing Programs and Apps
Install, Update, and Uninstall Programs and Apps
Acquire Legitimate Programs and Apps
Productivity Apps
Word Processing
Spreadsheet
Presentation
Databases
Common Database Tasks
Productivity Suite
Enterprise Computing
Computer-Aided Technology
Graphics and Media Applications
Types of Digital Media
Digital Graphics
Digital Animation
Digital Media Creation and Editing Apps
Digital Media on the Web
Smart TVs and Streaming Devices
Stream Digital Audio
Virtual and Augmented Reality and Artificial Intelligence
Virtual and Augmented Reality
Artificial Intelligence
Personal Interest Applications
Secure IT: Security Tools
How To: Use System Management Tools
Student Assignments
Module 5: Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats
Risks Associated with Technology Use
Cybercrime
Digital Detox
Cybercrimes and Criminals
Ethics and Society
Information Accuracy
Intellectual Property Rights
Green Computing
Internet and Network Attacks
Malware
Botnets
Denial of Service Attacks
Back Doors
Spoofing
Protection from Viruses and Other Malware
Secure IT: Protect Yourself and Your Data
Information Theft
Firewalls
Unauthorized Access and Use
Access Controls
Backing Up
Wireless Security
Protect Mobile Devices
Secure Your Wireless Network
Cloud Data Privacy
Information Privacy
Use Strong Authentication
Biometrics
Two-Factor Authentication
CAPTCHAs
Encryption
Protect Yourself while Online
Privacy Laws
How To: Establish Policies to Ensure Safety
Establishing Policies
Disaster Recovery
Ethics and Issues: Inclusivity and Digital Access
Digital Inclusion
Student Assignments
Technology Timeline
Module 6: Input and Output: Entering Data and Producing Information
Input and Output
How Do You Use Input?
How Do You Use Output?
Manual Input
Typing and Pointing Input
Touch Input
Pen Input
Digital Input
Voice Input
Video Input
Motion Input
Scanners and Reading Devices
Physical Output
Nonimpact Printers
Digital Output
Displays
HDTVs and Smart TVs
Other Output Devices
Ethics & Issues: Assistive Technology Input and Output
Adaptive Input Devices
Adaptive Output Devices
Creating Accessible Content
How To: Customize and Manage Input and Output Devices
Customize System Software
Customize Input and Output Devices Using System Software
Secure IT: Reduce E-Waste Risks
Student Assignments
Module 7: Digital Storage: Preserving Your Content
Storage and Memory Uses
Storage Media
Storage Capacity
Storage Access Times
Storage Hardware
Hard Drives
Optical Media
Cloud Storage
Cloud Storage Advantages
Services Offered by Cloud Storage Providers
Other Cloud Services
Cloud Storage Options
Evaluating Providers
Select a Cloud Storage Provider
Secure IT: Secure Your Data on the Cloud
Enterprise and Other Storage Options
How Memory Relates to Storage
Bytes and Addressable Memory
Types of Memory
Ethics & Issues: Internet of Things and Privacy
Student Assignments
Module 8: Operating Systems: Managing, Coordinating, and Monitoring Resources
Operating Systems
GUIs
Operating System Functions
How an Operating System Works
The Purpose of an Operating System
How an Operating System Manages Memory
How Operating Systems Manage Input and Output
How Operating Systems Manages Programs
Types of Operating Systems
Desktop Operating Systems
Server Operating Systems
Mobile Operating Systems
Mobile versus Desktop Operating Systems
Other Characteristics of Operating Systems
Ethics and Issues: Licensing an Operating System
Manage Files and Folders
File Properties
File Compression
Manage Folder Names and Folder Placement
Organize Files
Use Operating System Management Utilities
Use Administrative Utilities
Customize an Operating System
Manage Desktop Windows
Secure IT: Securing an Operating System
Using an Operating Systemβs Security Utilities
Manage User Accounts
How To: Use Virtual Machines
Set Up and Use a Virtual Machine
Student Assignments
Module 9: Networks and Network Devices: Communicating and Connecting
How Do You Interact with a Network?
Networks as Communications Systems
Network Uses
Home and Business Networks
Wired and Wireless Networks
Cellular Networks
GPS
Communications Software
Network Structures
Network Standards and Protocols
Network Standards
Internet Protocols
Close-Distance Communications Protocols
Network Connection Hardware
Communications Lines
How To: Set Up a Network
Set Up a Home Wireless Network
Add a Printer to a Network
Strengthen Your Wireless Signal
Secure IT: Secure a Network
Secure Network Data
Detecting an Intruder to a Network
Ethics & Issues: Responsibilities of a Network Professional
Student Assignments
Module 10: Databases: Understanding Data Storage
Interacting with a Database
Why Use a Database?
Interact with Data
File Processing Systems and the Database Approach
Web Databases
Database Components
Elements of a Database
Data Type
Database Functions
Data Dictionary
File Retrieval and Maintenance
User Privileges
Backup and Recovery
Relational Databases
Nonrelational Databases
Use a Database System
Popular Database Management Systems
Front-End and Back-End Databases
Organize Data
Primary Keys
Indexes
How To: Set Up a Database
Create a Table
Create Other Database Objects
Secure IT: Database Integrity
Validating Data
Secure a Database
Maintain a Database
Back Up and Recover a Database
Protect Data
Ethics and Issues: Using Data Responsibly
Big Data
Sources of Big Data
Business Intelligence
Student Assignments
Module 11: Program Development: Creating Systems and Applications
What Does a Developer Do?
Reasons for Development
Managing Development Changes
User Experience
Phases and Methods of Development
Planning Phase
Analysis Phase
Design Phase
Implementation Phase
Support and Security Phase
Development Methodologies
System Development Tools and Strategies
Gantt and PERT Charts
Select Project Management Software
Data and Information Gathering Techniques
System Development Tasks and Roles
System Development Participants
Project Leadership and Management
Obtain Hardware and Software
Development Languages and Tools
Programming Language Generations
Types of Programming Tools
Object-Oriented Programming
Secure IT: Designing Secure Systems and Applications
Tests During Development
Tests at the End of Development
How To: Place Your App in an App Store
Using an App Store
Ethics and Issues: The Social and Ethical Obligations of a Developer
Problem Solving and Decision Making
Student Assignments
Module 12: Web Development: Creating and Publishing Online Content
Plan a Website
Create a Design Plan
How To: Use Tools for Developing a Website
Website Builders and Content Management Systems
Use HTML and XML
HTML Syntax
Format Page Content
Webpage File Names
Add Links
Add Lists
Add Images
Add Multimedia
Use CSS
Embedded and Inline Styles
Add Colors
Secure IT: Protect Your Website
Hypertext Transfer Protocol Secure (HTTPS)
Other Security Techniques
Publish a Website
Web Analytics
Uploading Website Files
Ethics & Issues: Follow Accessibility Guidelines
Student Assignments
Module 13: Technology Careers: Exploring and Preparing for Opportunities
Careers in the Technology Industry
Technology Job Titles and Descriptions
Information Systems in the Enterprise
Ensuring Information Has Value
Typical Enterprise Information Systems
Secure IT: Careers in Security
Technology Certifications
Application Software Certifications
Data Analysis and Database Certifications
Hardware Certifications
Networking Certifications
Operating System Certifications
Programmer/Developer Certifications
Security Certifications
How To: Create an Office for Telecommuting
Ethics & Issues: Using Your Available Resources to Find a Job
Career Websites
Start Your Job Search Online
Student Assignments
Appendix: Technology Acronyms
Index
π SIMILAR VOLUMES
<span>West's COMPTIA CLOUD+ GUIDE TO CLOUD COMPUTING, 2nd Edition, prepares you for certification exam and career success. Fully updated content maps to objectives of the CompTIA Cloud+ (CVO-003) exam, which now has less emphasis on physical host configuration and more emphasis on cloud infrastructu
<span>West's COMPTIA CLOUD+ GUIDE TO CLOUD COMPUTING, 2nd Edition, prepares you for certification exam and career success. Fully updated content maps to objectives of the CompTIA Cloud+ (CVO-003) exam, which now has less emphasis on physical host configuration and more emphasis on cloud infrastructu
Learn the principles of MIS as you explore the latest developments and industry trends with MIS 10. This practically focused approach helps you master foundational MIS concepts that will guide your career. You examine the latest topics, such as cloud computing, AR/VR, quantum computing and blockchai
<span>PFIN7 relates personal finance to studentsοΏ½ day-to-day lives. It provides decision-making frameworks and up-to-date information on key topics that include buying a home or car, setting up and maintaining a budget, handling student loans, insuring your life, health and property, investing to me
<span>Gain an understanding of today's marketing principles with Pride/Ferrell's engaging MARKETING. Develop the knowledge and decision-making skills to succeed as in-depth coverage highlights fundamental marketing concepts and strategies. Practical applications and examples emphasize the latest soc