Question Bank for the Mid-Term Exams

Use all those ppt answer the questions.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Questions are in GSAS+222+OB.PDF

1

GSAS 222

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Question Bank for the Mid-Term Exams

Short-Answer Questions

1. What does online mean?

2. What is the difference between system software and application software?

3. Briefly define cyberspace.

4. What is the difference between software and hardware?

5. What is multimedia?

6. What is the difference between microcomputers and supercomputers?

7. What is the function of RAM?

8. What does downloading mean?

9. What is meant by connectivity?

10. Describe some ways that information technology can be used to help people find jobs and to

help jobs find people.

11. Compare the use of email to the use of the telephone and of conventional letters sent via the

postal system. Which kinds of communications are best suited for which medium?

12. What is the basic meaning of cloud computing?

II.

13. Name three methods of data transmission that are faster than a dial-up connection.

14. What is netiquette, and why is it

important?

15. Briefly define bandwidth.

16. Many web documents are “linked.” What does that mean?

17. Compare and contrast a cable modem service to a DSL service.

18. Explain the basics of how the Internet works.

19. Briefly explain TCP/IP..

20. What’s the difference between a dynamic IP address and a static IP address?

21. State your answer to a person who asks you the question, “Who owns the Internet?”

22. How does the Internet affect your life?

III.

23. Briefly define booting.

24. What is the difference between a command-driven interface and a graphical user interface

(GUI)?

25. Why can’t you run your computer without system software?

26. Why is multitasking useful?

27. What is a device driver?

28. What is a utility program?

29. What are the three components of system software? What is the basic function of each?

30. What is open-source software?

31. What are the following types of application software used for?

a. project management software

2

b. desktop-publishing software

c. database software

d. spreadsheet software

e. word processing software

32. Explain what computer-aided design (CAD) programs do.

IV

33. What is ASCII, and what do the letters stand for?

34. Why should measures of capacity matter to computer users?

35. What’s the difference between RAM and ROM?

36. What is the significance of the term gigahertz?

37. What is a motherboard? Name at least four components of a motherboard.

38. What are the most convenient forms of backup storage? Why?

39. Why is it important for your computer to be expandable?

40. What is nanotechnology?

41. What are the uses of a surge protector, voltage regulator, and UPS, and why are these devices

important?

42. Explain the binary system.

43. What is Unicode?

V.

44. What is a common use of dumb terminals?

45. What characteristics determine the clarity of a computer screen?

46. Describe two situations in which scanning is useful.

47. What is source data entry?

48. What is pixel short for? What is a pixel?

49. Discuss the different types of printers and their features.

50. What is OCR used for?

3

Long Answer Questions

1. Do you wish there was an invention to make your life easier or better? Describe it. What would

it do for you? Come up with ideas on how that device may be constructed.

2. From what you’ve read and what you have experienced and/or observed in your life, do you

have a positive, negative, or impartial view of our rapidly converging technological society?

Why? Reevaluate your answers as you work through the course.

3. Computers are almost everywhere, and they affect most walks of life—business, education,

government, military, hobbies, shopping, socializing, research, and so on. What aspects of your

life can you think of that still seem relatively unaffected by computers and technology? Is this a

good thing or a bad thing, and is it likely to last? What aspects of your life have been the most

conspicuously affected by technology? Has anything been made worse or harder in your life by

the advance of computers? What about things that have been made better or easier?

4. Have you become extremely dependent on some technologies? Some people no longer write

down telephone numbers anywhere; instead, they simply program them into their cellphones.

Some people feel helpless in a foreign country unless they have a calculator in hand to compute

currency conversions. Many people rely on their email archive or cellphone to hold essential

information, such as addresses and appointments. When any of these technologies fails us, we

can feel lost.

5. Make a list of technologies that have become indispensable to your life. Imagine the

consequences if any of these technologies should fail you. What can you do to protect yourself

against such failure?

6. Write down what you think are the advantages and disadvantages of social networking (for

example, Facebook).

7. It has been said that the computer is a “meta medium” because it can simulate (behave as) any

other medium. Thus a computer can present text that can be read from virtual “pages” as if it

were a book; it can let you compose and print text as if it were a typewriter; it can play music

like an MP3 player; it can display video as if it were a television set; it can make telephone calls

as if it were a telephone; it can let you “draw” and “paint”; it can be programmed to serve as an

answering machine; and so forth.

8. Imagine a future in which digital electronic devices have replaced all the things they can

emulate. What benefits to your life can you see in such a future? What things might be worse?

What dangers can you see? Do you think this kind of radical convergence is likely? If so, how

long do you think it will take?

9. Distance learning uses electronic links to extend college campuses to people who otherwise

would not be able to take college courses. Are you, or is someone you know, involved in

distance learning? If so, research the system’s components and uses. What hardware and

software do students need in order to communicate with the instructor and classmates? What

courses are offered? Discuss the pros and cons of distance learning compared to classroom-

based learning.

10. As more and more homes get high-speed broadband Internet connections, the flow of data will

become exponentially faster and will open up many new possibilities for sharing large files such

as video. What types of interactive services can you envision for the future?

11. Draw a diagram of what happens when you log onto your ISP; include all the connections you

think possible for your situation.

4

12. How do the latest smartphones incorporate the Internet into their functions? What functions

could be improved? Have any of these extra functions affected your daily life?

13. Imagine that a relative or friend wants to start using the Internet for the first time. You want to

help this beginner get started, but you need to be careful not to get carried away and bombard

him or her with more information than he or she can use. What three or four things would you

tell and show this person first? What things do you think will be hardest for him or her to

master? How do you think using the Internet is likely to change this person’s life?

14. How do you think you will obtain software for your computer in the future? Explain your

answer.

15. Design your own handheld. Draw what your ideal handheld would look like, and draw screens of

what your user interface would look like. Describe the key features of your handheld.

16. What sorts of tasks do operating systems not do that you would like them to do?

17. If you were in the market for a new microcomputer today, what application software would you

want to use on it? Why? What are some “dream” applications that you would like that have not

yet been developed?

18. Several websites include libraries of shareware programs. Visit the www.5star-shareware.com

site, and identify three shareware programs that interest you. State the name of each program,

the operating system it runs on, and its capabilities. Also, describe the contribution you must

make to receive technical support. What about freeware? Check out www.freewarehome.com.

19. How do you think you could use desktop publishing at home? For personal items? Family

occasions? Holidays? What else? What hardware and software would you have to buy?

20. Think of three new ways that software companies could prevent people from pirating their

software.

21. What is your favorite application software program of all? Why?

22. Storing humans: If the human genome is 800 million bytes (according to Raymond Kurzweil),

how many humans could you fit on a 120-GB hard drive?

23. Paperless office is a term that has been around for some time. However, the paperless office has

not yet been achieved. Do you think the paperless office is a good idea? Do you think it’s

possible? Why do you think it has not yet been achieved?

24. Compare and contrast the pros and cons of different types of monitors. Decide which one is best

for you, and explain why.

25. Biometrics: Which form of biometric technology do you prefer for identification purposes:

fingerprints, voice intonation, facial characteristics, or retinal identification? Which do you think

will become most commonly used in the future?

Chapter 6

Communications, Networks, & Cyberthreats

© 20

1

5 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Introduction to Information Technology

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1

Chapter Topics

2
UNIT 6A: Networks & Wired & Wireless Data
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Data
6.4 Wireless Communications Media
UNIT 6B: Cyberthreats, Security, & Privacy Issues
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
6.6 Cyberattacks & Malware
6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Digital convergence is the gradual merger of computing and communications into a new information environment, in which the same information is exchanged among many kinds of equipment, using the language of computers.
At the same time, there has been a convergence of several important industries—computers, telecommunications, consumer electronics, entertainment, mass media— producing new electronic products that perform multiple functions.
3

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.1 From the Analog
to the Digital Age
4

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Digital
Computers use digital signals—0s and 1s, off and on.
All the data that a computer processes is a series of
0s and 1s.
Each signal is a bit.
Analog
But most phenomena in life are analog.
Analog signals use wave variations, continuously changing.
Sound, light, and temperature are analog forms.
Traditional TV and radio use analog signals.
Humans’ vision operates in analog mode.
But analog data can be converted into digital form. Even though digital data is not as exact as analog data, it is easier to manipulate.
5

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

For data transmission over telephone lines and cables, modems are needed to convert analog data into digital data that computers can use.
Modem is short for modulate/demodulate. Modems modulate (convert) a computer’s digital data to analog data, transmit it, then demodulate (reconvert) it back to digital data for the receiving computer.
Modems can convert data by modulating either a analog wave’s amplitude or its frequency.
6

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

7

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter Topics
8
UNIT 6A: Networks & Wired & Wireless Data
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Data
6.4 Wireless Communications Media
UNIT 6B: Cyberthreats, Security, & Privacy Issues
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
6.6 Cyberattacks & Malware
6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.2 Networks
9

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Network: system of interconnected computers, telephones, and/or other communications devices that can communicate with one another and share applications and data.
Benefits of Networks
Share peripheral devices, such as printers, scanners, disk drives
Share software
Share data and information
Better communications
Accessing databases
Centralized communications
Security of information, because of improved backup systems
10

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Types of networks: WANs, MANs, & Others
Wide area network (WAN): Communications network that covers a wide geographic area, such as a country or the world. Most long-distance and regional telephone companies are WANs. WANs are used to connect local area networks. The best example of a WAN is the Internet.
Metropolitan area network (MAN): Communications network covering a city or a suburb. Many cellphone systems are MANs.
Local area network (LAN): Connects computers and devices in a limited geographic area, such as one office, one building, or a group of buildings close together. LANs are the basis for most office networks, and the organization that runs the LAN owns it. WANs and MANs generally use a common carrier—a telecommunications company that hires itself out to the public to provide communications transmission services—for at least part of its connections. (A home area network is a LAN.)
11
(continued)

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

12
UPDATE

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Network Architecture: How Networks Are Structured
1. Client/Server
Consists of clients, which are computers that request data, and servers, which are computers that supply data.
File servers act like a network-based shared disk drive.
Database servers store data but don’t store programs.
Print servers connect one or more printers and schedule and control print jobs.
Mail servers manage email.
2. Peer-to-Peer (P2P)
All computers on the network are “equal” and communicate directly with one another, without relying on servers.

13

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

14

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Intranets, Extranets, & VPNs: Use the Internet as their base
Intranets—use infrastructure and standards of the Internet and the web, but for an organization’s internal use only.
Extranets—similar to intranets but allows use by selected outside entities, such as suppliers.
VPNs (virtual private networks): use a public network (usually the Internet) plus intranets and extranets to connect an organization’s various sites) but on a private basis, via encryption and authentication; regular Internet users do not have access to the VPN’s data and information.
All use firewalls for security, a system of hardware and/or software that protects the system from intruders.
15

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Network Components — all networks have several things in common:
wired = twisted-pair, coaxial cable, fiber-optic cable
wireless = infrared, microwave, radio, Wi-Fi, satellite
Hosts and Nodes: Client/server network has a host computer, which controls the network; a node is any device attached to the network.
Packets—fixed-length blocks of data for transmission, reassembled after transmission.
Protocols—set of conventions, or rules, governing the exchange of data between hardware and/or software components in the network; built into the hardware or software you are using. (continued)

16

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Each packet, or electronic message, carries four types of information that will help it get to its destination;
the sender’s address (IP)
the intended receiver’s address
how many packets the complete message has been broken into
the number of this particular packet. The packets carry the data in the protocols that the Internet uses—that is, TCP/IP

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Network topology: The layout (shape) of a network
Star – all nodes are connected through a central network switch
Ring – all nodes are connected in a continuous loop
Bus – all nodes are connected to a single wire or cable
Tree – a bus network of star networks
Mesh – messages sent to the destination can take any possible shortest, easiest route to reach its destination. There must be at least two paths to any individual computer to create a mesh network. (Wireless networks are often implemented as a mesh, and the Internet is a mesh.)
18

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

20

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Star Network

21

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Ring Network

22

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Bus Network

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Ethernet
Ethernet is a LAN technology that can be used with almost any kind of computer and that describes how data can be sent between computers and other networked devices usually in close proximity.
Commonly used in star topologies.
25

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter Topics
26
UNIT 6A: Networks & Wired & Wireless Data
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Data
6.4 Wireless Communications Media
UNIT 6B: Cyberthreats, Security, & Privacy Issues
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
6.6 Cyberattacks & Malware
6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.3 Wired Communications Media
27

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Communications media are the means of interchanging or transmitting and receiving information.
A. Twisted-Pair Wire (dial-up connections)
2 strands of insulated copper wire twisted around each other
Twisting reduces interference (crosstalk) from electrical signals
Data rates are 1 – 128 megabits per second (slow)
B. Coaxial Cable
Insulated copper wire wrapped in a metal shield and then in an external plastic cover
Used for cable TV and cable Internet electric signals
Carries voice and data up to 200 megabits per second
C. Fiber-optic cable
Dozens or hundreds of thin strands of glass or plastic that transmit pulses of light, not electricity
Can transmit up to 2 gigabits per second (very fast)
Have lower error rate than twisted-pair or coax
More expensive than twisted-pair or coax
Lighter and more durable than twisted-pair or coax
More difficult to tap into than twisted-pair or coax
28

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter Topics
29
UNIT 6A: Networks & Wired & Wireless Data
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Data
6.4 Wireless Communications Media
UNIT 6B: Cyberthreats, Security, & Privacy Issues
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
6.6 Cyberattacks & Malware
6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.4 Wireless Communications Media
30

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Electromagnetic spectrum of radiation is the basis of all telecommunications signals, wired and wireless.
Radio-frequency (RF) spectrum is the part of the electromagnetic spectrum
that carries most communications signals.
31

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Bandwidth: range (band) of frequencies that a transmission medium can carry in a given period of time
Analog bandwidth is expressed in hertz, digital bandwidth usually in bits per second (bps)
Narrowband (voiceband): used for regular telephone communications
Transmission rate 1.5 megabits per second or less
Broadband: For high-speed data and high-quality audio and video; wide band of frequencies
Transmission rate 1.5 megabits per second to 1 gigabit per second or more
33

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

TC/IP (Ch. 2) is the protocol for getting wired devices connected to the Internet
WAP (wireless application protocol): Wireless handheld devices such as cellphones use the Wireless Application Protocol for connecting wireless users to the Web. Just as the protocol TCP/IP was designed to provide a wired connection to your Internet access provider, WAP is a standard designed to link nearly all mobile devices telecommunications carriers’ wireless networks and content providers.
34

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Infrared Transmission
Sends signals using infrared light (TV remotes)
Frequencies are too low to see (1-16 megabits per second)
Broadcast Radio
AM/FM, CB, cellphones, police radio
Sends data over long distances using a transmitter and a receiver (up to 2 megabits per second)
Cellular Radio
Form of broadcast radio
Widely used in cellphones and wireless modems
Transmits voice and digital messages
Microwave Radio
Superhigh-frequency radio transmit voice and data at 45 megabits per second
Requires line-of-sight transmitters and receivers
More than ½ of today’s telephones systems use microwave
Communications Satellites
Microwave relay stations in orbit around the earth
Basis for Global Positioning Systems (GPS)
Cover broad service area
35
Five Types of Wireless Communications Media

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Communications Satellites (continued)
Can be placed at different heights: GEO, MEO, LEO
GEO – geostationary earth orbit
22,300 miles above earth; travel at the same speed as the earth and so appear to us to be stationary
Always above equator
Transmission delay (latency) can make conversations difficult; not good for applications requiring real-time user input
MEO – medium-earth orbit
5,000 – 10,000 miles up
LEO – low-earth orbit
200 – 1,000 miles up
Has no signal delay
36

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Long-Distance Wireless: One-Way Communication
GPS (Global Positioning System)
24 to 32 MEO satellites continuously transmitting timed radio signals to identify Earth locations
Each satellite circles earth twice each day at 11,000 miles up
GPS receivers pick up transmissions from up to 4 satellites and pinpoint the receiver’s location
Accurate within 3 – 50 feet, with a norm of 10 feet accuracy
Not all services based on GPS technology are reliable
37

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Long-Distance Wireless: One-Way Communication (continued)
One-way Pagers: radio receivers that receive data sent from a special radio transmitter
Radio transmitter sends out signals over the special frequency; pagers are tuned to that frequency
When a particular pager hears its own code, it receives and displays the message
Often used in hospitals and areas where smartphones are not allowed
38

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Long-Distance Wireless: Two-Way Communication
1G: First-Generation Cellular Service
Analog cellphones
Designed for voice communication using a system of hexagonal ground-area cells around transmitter-receiver cell towers
Good for voice – less effective for data because of handing off
2G: Second-Generation Cellular Service
Uses digital signals
First digital voice cellular network
39

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Long-Distance Wireless: Two-Way Communication (continued)
3G: Third-Generation Cellular Service
Broadband technology
Carries data at high speeds: 144 kilobits per second up to 3.1 megabits per second
Accepts e-mail with attachments
Displays color video and still pictures
Plays music
40

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Long-Distance Wireless: Two-Way Communication (continued)
4G: Fourth-Generation Cellular Service
A nationwide 4G network is in development; up to 100 megabits/second
Enables faster Internet surfing
Includes LTE (Long Term Evolution), an international standard widely adopted in the United States and several countries in Europe and Asia. LTE supports data transfer rates of up to 100 megabits per second over cellular networks.
41

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

42

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Cellphone Connections

Short-Range Wireless: Two-Way Communication
Local Area Networks
Range 100 – 228 feet
Include Wi-Fi (802.11) type networks
Wi-Fi n is the latest and fastest Wi-Fi technology
Personal Area Networks
Range 30 – 33 feet
Use Bluetooth, ultra wideband, and wireless USB
Home Automation networks
Range 100 – 150 feet
Use Insteon, ZigBee, and Z-Wave standards
43

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

44
Wi-Fi setup in a restaurant

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

45

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

General Wi-Fi Network

UNIT 6B: Cyberthreats: Trolls, Spies, & Hackers & Thieves
The ongoing dilemma of the Digital Age is balancing convenience against security.
Security consists of safeguards for protecting information technology against unauthorized access, system failures, and disasters that can result in damage or loss.

46

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter Topics
47
UNIT 6A: Networks & Wired & Wireless Data
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Data
6.4 Wireless Communications Media
UNIT 6B: Cyberthreats, Security, & Privacy Issues
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
6.6 Cyberattacks & Malware
6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.5 Cyberintruders
Trolls, Spies, Hackers, & Thieves

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Trolls aren’t necessarily destructive, but they can be disruptive on online comment boards.
A troll is a person who posts intentionally offensive, incendiary, or off-topic comments online, to upset people.
Many companies have extensive data-collection efforts that constantly track (spy on) our personal activities.

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Malicious hackers break into computers for malicious purposes.
Script kiddies are technically unsophisticated teenagers who use downloadable software for perform break-ins.
Hacktivists are hacker activists who break into systems for a political or a socially motivated purpose.
Black-hat hackers break into computers to steal or destroy information or to use it for illegal profit.
Cyberterrorists attack computer systems so as to bring physical, political or financial harm to groups, companies, or nations.
Benign hackers (thrill-seeker hackers) illegally access computer systems simply for the challenge of it, not to damage or steal anything; their reward is the achievement of breaking in.
Benevolent hackers (ethical hackers or white-hat hackers) are usually computer professionals who break into computer systems and networks with the knowledge of their owners to expose security flaws that can then be fixed.
50

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Thieves may be a company’s employees or suppliers or professionals.
Employees
Outside partners & suppliers
Hardware thieves
Con artists, scammers, & counterfeiters

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter Topics
52
UNIT 6A: Networks & Wired & Wireless Data
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Data
6.4 Wireless Communications Media
UNIT 6B: Cyberthreats, Security, & Privacy Issues
6.5 Cyberintruders: Trolls, Spies, Hackers, & Thieves
6.6 Cyberattacks & Malware
6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.6 Cyberattacks & Malware

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Networks and computer systems are susceptible to attacks by all kinds of malware.
Some common cyberthreats are denial-of-service attacks; viruses; worms; Trojan horses; rootkits and backdoors; blended threats; zombies; ransomware; and time, logic, and email bombs.
54

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Cyberthreats:
Denial of Service Attack
Consists of making repeated requests of a computer or network device, thereby overloading it and denying access to legitimate users.
Used to target particular companies or individuals.
Virus
Deviant program that hides in a file or a program on a disk, flash memory drive, in an e-mail, or in a web link and that causes unexpected effects such as destroying or corrupting data.
Usually attached to an executable file that you must run or open (to activate the virus).

55

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Cyberthreats (continued)
Worms
A program that copies itself repeatedly into a computer’s memory or disk drive.
May copy itself so much it crashes the infected computer.
Trojan Horses
Programs that pretend to be a useful program such as a free game or a screensaver but that carry viruses or malicious instructions that damage your computer or install a backdoor or spyware.
Backdoors and spyware allow others to access your computer without your knowledge.
56

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Cyberthreats (continued)
Cellphone Malware
Spread via Internet downloads, MMS attachments, and Bluetooth transfers
Usually show up disguised as applications such as games, security patches, add-on functionalities, erotica, and free programs
Protect your phone:
Turn off Bluetooth discoverable mode
Check security updates to learn about filenames to watch out for
Install security software
57

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Cyberthreats (continued)
How they spread
Via e-mail attachments
By infected disks and flash drives
By clicking on infiltrated websites
By downloading infected files from websites
Through infiltrated Wi-Fi hotspots
From one infected PC on a LAN to another
What can you do about it?
Install antivirus and firewall software
Subscribe to the manufacturer’s automatic antivirus
update service
58

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Online Safety
Use antivirus software, and keep it current
Install a firewall to monitor network traffic and filter out undesirable types of traffic and undesirable sites
Don’t use the same password for multiple sites
Don’t give out any password information
Use robust passwords:
Minimum 8 characters with letters, numbers, characters
4cats is not a good password; f0UrK@tTz is safer
Use biometric identification
Use encryption
59

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Online Safety (continued)
Install antispyware software
Encrypt financial and personal records so only you can read them
Back up your data, so if your PC is attacked and must be reformatted, you can restore your data
Never download from a website you don’t trust
Consider biometric authentication
60

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Online Safety (continued)
Encryption
Process of altering readable data into unreadable form to prevent unauthorized access
Uses powerful mathematical ciphers to create coded messages that are difficult to break
Unencrypted messages are known as plain text
Encrypted text is known as cybertext
You use an encryption key to encrypt and decrypt codded messages
61

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

6.7 Concerns about Privacy & Identity Theft

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

63

The proliferation of networks and databases have put privacy under great pressure.
Privacy is the right of people not to reveal information about themselves.
Some threats to privacy:
Name migration
Résumé rustling & online snooping
Government prying & spying

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Identity (ID) theft, or theft of identity (TOI), is a crime in which thieves hijack your name and identity and use your information and credit rating to get cash or buy things.
Wallet or purse theft
Mail theft
Mining the trash
Telephone solicitation
Insider access to database
Outsider access to database

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

If ID theft happens, contact:
Credit card companies
Your bank
Department of Automotive Vehicles
Utility companies
Phone companies
Local police
Federal Trade Commission
Other organizations you belong to

Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter

3

Software: Tools for Productivity
& Creativity

3

© 20

1

5 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1

Chapter Topics

2
UNIT 3A: System Software: The Power behind the Power
3.1 The Operating System: What It Does
3.2 Other System Software: Device Drivers & Utility Programs
3.3 Common Features of the User Interface
3.4 Common Operating Systems
UNIT 3B: Application Software: Getting Started
3.5 Application Software: Where to Get It, How to Use It
3.6 Data Files & Program Files
3.7 Word Processing Software
3.8 Spreadsheet Programs
3.9 Database Software
3.10 Office Suites & Integrated Packages
3.11 Specialty Application Software

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 3A: System Software: The Power behind the Power
System software runs at the most basic level of your computer and enables the application software to interact with the computer and helps the computer to manage its internal and external resources, as well as manage the hardware. Three basic components of system software that you need to know about: Operating Systems, Device Drivers, Utility Programs
Application software is software that has been developed to solve a particular problem for users—to perform useful work on specific tasks
or to provide entertainment.

3

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1. Operating systems: An operating system is the principal component of system software
in any computing system.
2. Device drivers: Device drivers help the computer control peripheral devices.
3. Utility programs: Utility programs are generally used to support, enhance, or expand
existing programs in a computer system.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.1 The Operating System
What It Does
5

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The operating system manages the entire computer system.
The operating system (OS) consists of the low-level, master system of programs that manage the basic operations of the computer.
Every general-purpose computer must have OS to run other programs.
OS allows users to concentrate on applications rather than on complexities of the computer.
Each application program is written to run on top of a particular OS.
The OS manages:
• Booting
• CPU management
• File management
• Task management
• Security management
6

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Booting
The process of loading an OS into the computer’s main memory
Booting involves four steps:
Turn the computer on.
Diagnostic routines test main memory, CPU, and other hardware.
Basic Input/Output System (BIOS) programs are copied to main memory.
BIOS contains instructions for operating the hardware.
The computer needs those instructions to operate the hardware and find a copy of the OS.
Boot program obtains the OS and loads it into computer’s main memory.
7

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
8
Panel 3.2
Page 117

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cold boot—turn on computer’s “on” system
Warm boot—restart a computer that is already on
Boot disk—use a CD or flash drive containing all files to launch OS
Boot from the cloud
9

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
CPU Management
CPU is the central processing unit.
Supervisor (kernel) is the software that manages CPU
Remains in memory while the computer runs
Directs other programs not in memory to perform tasks that support application programs
Memory Management
OS keeps track of memory locations to prevent programs and data from overlapping each other
Swaps portions of programs and data into the same memory but at different times
Keeps track of virtual memory
10

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
CPU Management (continued)
Queues, Buffers, Spooling
Queue: First-in, first-out (FIFO) sequence of data or programs that waits in line for its turn to be processed
Buffer: The place where the data or programs sit while they are waiting
To spool: The act of placing a print job into a buffer. (Needed because the CPU is faster than printers. The CPU can work on other tasks while the print jobs wait.)
11

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
File Management
A file is either a
Data File: a named collection of data
Program File: a program that exists in a
computer’s secondary storage
Files are located in many places on secondary
storage devices; OS locates files and facilitates
access to them
The file system arranges files in a
hierarchical manner
Top level is directories (folders)
Subdirectories come below folders
Find files using their pathname. Example:
C:/MyDocuments/Termpaper/section1
12

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Task Management
Computers are required to perform many different tasks at once—to do task management.
Task: An operation such as storing, printing, or calculating
Multitasking: Handling more than one program concurrently
Example: You do word processing while playing music on your computer.
OS directs processor to alternate time on each program until processing is complete.
13

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Security Management
Operating Systems permit users to control access to their computers.
Users gain access using an ID and password.
You set the password the first time you boot up a new computer.
After that, when you boot up, you’ll be prepared to type in your username and password.
14

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.2 Other System Software
Device Drivers & Utility Programs
15

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Drivers and utility programs add functionality to your computer and help it perform better.
Device Drivers
Specialized software programs that allow input and output devices to communicate with the rest of the computer system.
When you buy a computer, many device drivers come with the system software.
Device drivers also come with new hardware (on CDs/DVDs) or can be downloaded from the manufacturer’s website.
Utilities
Service programs that perform tasks related to the control and allocation of computer resources.
Examples: Backup, virus protection, data recovery, data compression, file defragmentation, disk cleanup, remove temp files
Some come with the OS, others can be bought separately (e.g., Norton SystemWorks, McAfee Utilities).
16

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.3 Common Features of the User Interface
17

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
User-interface features use graphics to facilitate a person’s interaction with the computer.
User Interface
The user-controllable display screen you use to interact with the computer, using keyboard or mouse.
Keyboard & Mouse
Special-purpose keys: used to enter, delete, edit data, and to execute commands.
Function keys (F1, F2, etc.): used to execute commands specific to the software being used.
Macros: keyboard shortcuts to activate series of commands.
Mouse pointer: moved to particular place on screen or to point to little symbol icons.
18

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Panel 3.6
Pages 126-127

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Graphical User Interface (GUI)
Allows you to use a mouse or keystrokes to select icons and commands from menus.
Three main features of GUI are desktop, icons, and menus.
Desktop: The system’s main interface screen.
Icons: Small pictorial figures that represent programs, data files, or procedures.
Rollover: A small text box that explains the icon when you roll your mouse over it.
Menus: Lists of built-in commands and/or options from which to choose pull-down, cascading, pull-up, pop-up.
20

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Menus

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Most operating systems use GUIs with the following:
Title Bar: runs across the top of the display window and shows the name of the folder you are in.
Menu Bar: shows the names of the pull-down menus available.
Toolbar: Displays menus and icons representing frequently used options or commands.
Taskbar: The bar across the bottom of the Windows screen that contains the Start button and icons that show open files/programs.
windows: Rectangular portion of the display screen through which you can view a file of data or an application program.
22

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
23
Page 132
window
Programs pinned to taskbar

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Windows 7 and Windows 8 taskbars

Minimize, Maximize, Restore Down, and Close

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.4 Common Operating Systems
25

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The main operating systems for general computer users are Windows, Mac OS, and Unix/Linux.
Platform
The particular processor model and operating system on which a computer system is based.
Three principle categories of operating systems:
Stand-alone
Network
Embedded
26

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1. Stand-alone operating systems
Often called a desktop operating system, an operating system that works on a single desktop or notebook (laptop) computer.
Two principal stand-alone systems:
Mac platforms—run Apple Macintosh
PC platforms—run Microsoft Windows
Some legacy systems still used—outdated but still functional
DOS (Disk Operating System) (original Microsoft OS)—hard-to-use command-driven user interface

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Mac OS X (“Ten”)
OS that runs on Apple Macintosh computers; is popular for desktop publishing , graphics, and educational settings
Pioneered the easy-to-use GUI (based on work done at Xerox)
Proprietary OS
Mac OS X from 2000 is based on Unix
Mac OS 10.8 = Mountain Lion (2011)
Mac OS 10.9 = Mavericks (2013)
Apple iOS runs mobile devices
28

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Microsoft Windows
Most common operating system for desktop and portable PCs.
Windows early versions:
95, 98, 2000, ME, XP, Vista
Windows 7: still most commonly used OS
Windows 8: Has both desktop (“classic”) and tile views
Tile view allows gesture manipulation of on-screen items (touch screens)

29

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2. Network operating systems
Novell’s Open Enterprise Server (OES)
Used for coordinating microcomputer-based local area networks (LANs) throughout a company or campus
Network OS usually located on a main server
Windows Server
Designed to run on network servers in businesses of all sizes
Multiple users share resources, such as data, programs, printers
30

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
(Network operating systems)
Unix, Solaris, BSD
Unix is a multitasking operating system with multiple users that has built-in networking capability and versions for all kinds of computers
Is particularly stable—used to run backbone of Internet
Used by large organizations—for airplane design, currency trading
Versions include Solaris, BSD
Unix interface is command-line interface
31

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
(Network operating systems)
Linux
Free (nonproprietary) version of Unix
Continual improvements from thousands of volunteer programmers
Linux is open-source software—anyone may make suggested improvements
May legally be downloaded and used for free
May legally be modified for free, as long as modifications aren’t copyrighted
Uses command-line-interface or GUI
Linux vendors give away software but sell services, products
Is the basis of Google’s Chrome OS
32

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. Embedded Operating Systems
Embedded OS—resides on CPU chip
Specialized system that is part of larger system or machine
Used in mobile devices: Google Android, BlackBerry, Windows Phone, iOS, Embedded Linux
33

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 3B: Application Software—Getting Started
People interact with the application software, which interacts with the system software, which interacts with the computer.

34

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.5 Application Software
Where to Get It, How to Use It

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Application software comprises the programs that do the work that users are directly interested in.
The availability of software depends on how it is
licensed or copyrighted by its creators or owners.

Software can be obtained in a variety of ways:
36

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1. Custom Software
Tailor-made software crafted by an individual or team of programmers for a particular function or business purpose.
2. Packaged software
Copyrighted, mass-produced software that’s offered for sale in stores or on the web to a variety of users. [See next slides.]
3. Public-domain software
Software that is not protected by copyright and thus may be duplicated by anyone at will, with no fear of legal prosecution.
4. Freeware
Copyrighted software that is distributed free of charge
5. Shareware
Copyrighted software that is distributed free for a trial period, but users must then pay the software developer to continue using it.
6. Rentalware
Online software that users lease for a fee and download whenever they want it.
7. Web application (web app) Software that runs on a remote Internet server rather than on a person’s own personal computer.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Commercial (packaged) software is copyrighted — users must get license from owner and sign a contract in which they agree not to make copies of the software to give away or resell.
Software license types:
Site licenses allow software to be used on all computers at a specific location
Concurrent-user licenses—allow a number of copies to be used at one time
Multiple-user license—specifies number of people who may use the software
Single-user license—limits software to one user at a time
38

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pirated software: Software obtained illegally in violation of copyright

Abandonware: Software that is no longer being sold or supported by its publisher (but may still not be legally copied)
39

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tutorials & Documentation
Tutorial: Instruction book or program that helps you learn to use the product by taking you through a series of steps
Documentation: All information that describes a product to users, including a user guide or reference manual that provides a narrative and graphical description of the program
40

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Types of Application Software
May be classified as entertainment, personal, education/references, productivity, and specialized uses
Productivity software: Purpose is to make users more productive at particular tasks.
Word processing, spreadsheets, database managers
May be bundled in office suite
41

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
42
Productivity software

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.6 Data Files & Program Files
43

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Data files: Data files contain data, such as words, number, pictures, and sounds—for example (extensions):

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Program files: Program files contain software instructions that execute, or run, when the program is opened.
Source program files: Source program files contain high-level computer instructions in the original form written by the computer programmer.
Executable files: To be made useful to the computer for processing, a source program file must be translated into an executable file, which contains the instructions that tell the computer how to perform a particular task. You use an executable file by running it, as when you select the spreadsheet program Microsoft Excel from your on-screen menu and open it.
.exe
.dll
.drv
.bas
.java

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Exchanging files
Importing: getting data from another source and then converting it into a format compatible with the program in which you are currently working
Exporting: transforming data into a format that can be used in another program and then transmitting it
46

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Data compression is a method of removing repetitive elements from a data file so that it requires less storage space and therefore less time to transmit. Later the data is decompressed—the repeated patterns are restored.
Lossless compression uses mathematical techniques to replace repetitive patterns of bits with a kind of coded summary. During decompression, the coded summaries are replaced with the original patterns of bits — the data that comes out is exactly the same as what went in. Lossless techniques are used when it’s important that nothing be lost—for instance, for computer data, database records, spreadsheets, and word processing files.
Lossy compression techniques permanently discard some data during compression. Lossy data compression involves a certain loss of accuracy in exchange for a high degree of compression. Examples of two lossy compression file formats are and .mpeg, used for graphics files and sound files.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.7 Word Processing Software

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Word Processing uses computers to create, edit, format, print, and store text.
Microsoft Word best known
Others: Corel WordPerfect, Apple iWork Pages, Google Apps, Zoho Writer
Word processing allows you to delete, insert, and replace text
Additional features: creating, formatting, printing, saving
49

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cursor: movable symbol to show where to enter text
Scrolling: moving quickly up, down, or sideways
Word wrap: automatically continues text
to next line
Head hierarchy: Outline View puts tags on headings within a document to organize it according to head level
Footnote numbering can be done automatically
50

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Editing : Making alterations in content
Inserting: adding text to documents
Deleting: removing text from documents
Find & Replace
Find: lets you go straight to any text in your document
Replace: lets you automatically replace it with something else
Cut, Copy, & Paste
Select the text you want to move
Copy (or cut) to clipboard, then paste in new location
51

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spelling Checker: tests for incorrectly spelled words
[Note: Do not rely on spelling and grammar checkers to be 100% accurate!]
Grammar Checker: highlights poor grammar, wordiness, incomplete sentences, and awkward phrases
Thesaurus: offers suggestions for alternative words with the same meaning
52

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Spelling checker
Grammar checker

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Formatting Documents with the Help of Templates
Formatting: determining appearance of a document
A template is a preformatted “form” that provides basic tools for structuring a final document—text, layout, page design, etc.
Every word processing program comes with standard templates (for letters, memos, etc.)
55

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Examples of Word templates

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Aspects of Formatting
Font
The typeface and size of the text you use
Also lets you specify underlined, italic, or bold and color
Spacing & Columns
Choose the line spacing (single- or double-spaced, or other)
Choose single-column or multi-columned text for your document
Margins & Justification
Indicate width of left, right, top, and bottom margins
Justify text left, right, or center
57

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Headers, footers, page numbers
A header is text printed at the very top of the page
A footer is text (like page number) at the page bottom
Other Formatting
You can specify borders, shading, tables, and footnotes
You can also import graphics, such as clip art
Default Settings
These are the settings automatically used by the program unless you change them
58

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Output: Printing, Faxing, or Emailing Documents
Print individual pages, the whole document, or several copies
You can fax or email finished documents
Previewing: gives you a look at how document will look when printed, before you print
Saving documents: store a document as an electronic file on, e.g., hard disk, CD or flash drive. [SAVE your work often!!!!!!!!!!!]
Word processing allows formatting of documents in HTML (for the web)
59

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.8 Spreadsheet Programs
60

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
A spreadsheet program uses rectangular grids for laying out linked, usually financial, data in a very organized fashion.
Spreadsheets are used to create tables and financial schedules.
Enter data and formulas into rows and columns on screen
Microsoft Excel, Corel Quattro Pro, Lotus 1-2-3, Apple iWork Numbers
Organized into columns and rows on a worksheet
Labels are descriptive text
Cells are where a row and a column meet
Cell address is the position of the cell
Range is a group of adjacent cells
Values are numbers or dates entered into a cell
Cell pointer shows where data is to be entered
61

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
62

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Formulas, Functions, Recalculation, What-If Analysis
Formulas are instructions for calculations
Define mathematically how one cell relates to another
Example: @SUM(A5:A15) sums the values of the cells A5, A6, A7, and so forth up through cell A15
Functions are built-in formulas, such as SUM()
Recalculation is the process of re-computing values
What-if analysis allows users to see what happens to totals when one or more numbers change in cells
Worksheet templates—custom-designed for particular work
Multidimensional spreadsheets—link one to another
63

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Analytical Graphics: Worksheet and workbook data can be displayed in graphic form.
Spreadsheet programs allow you to automatically create graphs
Graphical forms make numeric data easier to analyze
Examples of types of analytical graphics:
Column charts
Bar charts
Line graphs
Pie charts
Scatter charts
64

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. 9 Database Software
65

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
A database is a collection of data that is organized so that its contents can easily be accessed, managed, and updated.
Database: Structured collection of interrelated files
in a computer system.
Database software sets up and controls the structure of a database and access to data.
Principal microcomputer databases: Microsoft Access, FileMaker Pro
Benefits of databases:
Data redundancy is minimized.
Data is integrated and stored in a structured fashion.
Data in databases has more integrity.
Data may include text, numbers, and graphics.
66

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The main type of microcomputer database program is the
relational database.
Relational database: Data organized into related tables
Each table contains rows (records) & columns (fields)
Key is field used to sort data
Most frequent key field is social security number
Tables with the same key field are linked together
Querying and displaying records
Database software offers a quick way to locate records
Saving, Formatting, Printing, Copying, Transmitting
Can save results, format them in different ways, print as reports, copy to other documents, & transmit as email

67

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
68
Some database program functions

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Sample Access database templates

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.10 Software Suites & Integrated Packages

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Software suite: Collection of individual programs bundled together in a single package.
Most popular are productivity suites (office suites), professional-level application programs frequently used in business—usually word processing, spreadsheet, database management, and presentation programs.
Best-known productivity suite is Microsoft Office. Others are Apple iWork, Corel WordPerfect Office, Lotus SmartSuite, and StarOffice.
Cloud suites, or online office suites, include Microsoft Web Apps, Google Docs, and Zoho.
Integrated package: Single program for microcomputers that combines the functionality of word processing, spreadsheet, and database management.
Personal information manager: Software that helps you keep track of and manage information used on a daily basis, such as addresses, telephone numbers, appointments, to-do lists, and miscellaneous notes.
Microsoft Outlook, Lotus Notes

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3.11 Specialty Application Software
72

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Some special applications:
Presentation graphics
Financial
Desktop publishing
Drawing & painting
Video/audio editing
Animation
Multimedia authoring
Web page design/authoring
Project management
Portable Document Format (PDF)
Computer-aided design
73

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Presentation Graphics Software
Uses graphics, animation, sound, data, and information to make visual presentations
Some packages: Microsoft PowerPoint, Corel Presentations, Harvard Graphics
Includes design and content templates
Allows presentation to be dressed up with clip art, sound clips, special visual effects, animation, and video clips
74

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Financial Software
Ranges from personal-finance managers to entry-level accounting programs to business financial-management packages
Personal-finance programs include Quicken, Moneydance, YNAB
Common features of financial software
Track income & expenses
Allow checkbook management
Do financial reporting
Offer tax categories to assist with tax recordkeeping
May offer financial planning & portfolio management
Tax, accounting, investment software also available
75

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Desktop Publishing
Involves mixing text & graphics to produce high-quality output for commercial printing
Uses a mouse, scanner, printer, and DTP software
Professional DTP programs: QuarkXPress, Adobe InDesign
Has the following features
Mix of text with graphics
Offers varied type & layout styles
Allows import of files from other programs
Becoming a DTP professional requires training
76

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
77
Desktop publishing overview

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Drawing Programs
Graphics software used to design & illustrate objects & products
Create vector images—created from geometrical formulas
Examples: CorelDRAW, Adobe Illustrator
Painting Programs
Graphics programs that allow users to simulate painting on-screen
Produce bit-mapped or raster images (tiny dots)
78

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Common Graphics File Formats
.bmp (BitMaP) – used on PCs (Native to MS Windows)
.gif (Graphic Interchange Format) – format used in web pages
(Joint Photographic Experts Group) – used in high-resolution images, especially photos
(Tagged Image File Formats) – used on PCs & Macs for high-resolution images to print
(Portable Network Graphics) – used as alternative to .gif
79

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Video-Editing Software
Allows import to and editing of video footage on computer
Some video editing packages: Adobe Premiere Elements, Corel Video Studio, Sony Pictures Digital Vegas, Apple Final Cut Express, Pinnacle Studio DV, & Ulead VideoStudio
Audio-Editing Software
Allows import to and editing of sound files on computer
Sound editing packages: Windows Sound Recorder, Sony Pictures Sound Forge, Audacity (freeware), Felt Tip Software’s Sound Studio (shareware), GoldWave, & WavePad.
80

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Animation Software
Simulates movement by rapidly displaying a series of still pictures, or frames
Computer animation: Creation of moving images by means of computer
GIF animation: First format to be widely used for web pages
Packages: GIF Construction Professional, 3D GIF Designer, Easy GIF Animator
81

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Multimedia Authoring Software
Combines text, graphics, video, animation, and sound in an integrated way to create stand-alone multimedia applications
Content can be put on CDs/DVDs or delivered via the web
Two examples: Adobe Director & Macromedia Authorware
82
Adobe Director

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web Page Design/Authoring Software
Used to create web pages with sophisticated multimedia features.
Packages: Adobe Dreamweaver, Seamonkey, Coffee Cup, RealMac Rapid Weaver, etc.
Packages also provided by
internet access
providers; free
& easy to use.
83

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Project Management Software
A program used to plan and schedule the people, costs, and resources required to complete a project on time
Packages: Mindjet MindManager, MatchWare MindView, Microsoft Project, etc.
84

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Portable Document Format (PDF)
Multiplatform file format developed by Adobe Systems that allows documents to be used with any operating system.
Captures text, graphic, and formatting information from a variety of applications on different platforms, making it possible to send documents and have them appear on the recipient’s monitor as they were intended to be viewed.
Today, used for virtually any data that needs to be exchanged among applications and users.
85

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computer-Aided Design (CAD)
Programs intended for 2D and 3D design of products, structures, civil engineering drawings, and maps.
Examples include Autodesk, AutoCAD, TurboCAD, Alibre Design, and PowerCADD.
CAD programs help design buildings, cars, planes, electronic devices, roadways, bridges, subdivisions.
CAD/CAM programs: allow CAD programs to be input into computer-aided manufacturing systems that make products.
86

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter

Hardware: Input & Output

5

© 20

1

5 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1

Chapter Topics

2
UNIT 5A: Input Hardware
5.1 Keyboards
5.2 Pointing Devices
5.3 Source Data-Entry Devices
5.4 The Future of Input
UNIT 5B: Output Hardware
5.5 Softcopy Output: Display Screens
5.6 Hardcopy Output: Printers
5.7 Mixed Output: Sound, Voice, & Video
5.8 The Future of Output
5.9 Quality of Life: Health & Ergonomics

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Input Hardware
Devices that translate data into a form the computer can process
Translates words, numbers, sounds, and pictures into binary 0s and 1s (off or on electrical signals or light pulses)
Output Hardware
Devices that translate information processed by the computer into a form humans can understand
Translates binary code into words,
numbers, sounds, and pictures
3

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 5A: Input Hardware
The three major types of input hardware are keyboards, pointing devices, and source data-entry devices.

4

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.1 Keyboards
6

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Keyboards: convert letters, numbers,
and characters into electrical signals
English keyboards differ from foreign language keyboards
How keyboards work:
You press a key
This interrupts the current flowing through the circuits
Processor determines where the break occurs
It compares the location of the break with the (x,y) character map for the language on the keyboard’s ROM chip
A character is stored in keyboard memory
7
(continued)

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Keyboards (continued)
The character is then sent to PC as a data stream via wire or wireless connection
OS interprets its own operating-system-specific commands and sends the others to the application for interpretation
Most keyboards are QWERTY – named for the first six letters on the top left of the keyboard.
Keyboards are either tactile (physical) or touch screen (virtual)
8

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Keyboard types
104 – 108 keys desktop standard
80 – 85 keys for laptops
Wired
Connect to CPU via a serial or USB port
Wireless use either
IR (infrared) technology
Radio Frequency (RF) technology

9

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Terminal Types
Dumb Terminals
a.k.a. Video Display Terminal (VDT)
Has display screen and keyboard
Can do input and output only – no data processing
Intelligent Terminals
Has screen, processor, keyboard, and memory
Can perform some independent functions
Automated teller machine; point-of-sale terminal; mobile data terminal
10

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.2 Pointing Device

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pointing devices include the mouse and its variants, the touch screen, and various forms of pen input.
Pointing devices control the position of the cursor or pointer on the screen and allow the user to select options displayed on the screen.
Mouse is the principal pointing device.
Mechanical mouse: a ball inside the mouse touches the desktop surface and rolls with the mouse.
Optical mouse: uses laser beams and special chips to encode data for the computer.
The mouse controls the mouse pointer on the screen – for example, an arrow, rectangle, pointing finger.
When the mouse pointer changes to an I-beam, that indicates that text can be entered.
The mouse has one to five buttons, used for various functions, such as clicking on and dragging items on the screen.
12

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pointing Devices (continued)
Trackball
A movable ball mounted on top of a stationary device
Good for locations where a mouse can’t move around enough
Touchpad
To use: slide your finger over this small flat surface
Click by tapping you finger on the surface
May require more practice to use than a mouse
Used on laptops
Pointing stick
Located between the keys on a laptop keyboard, a pointing stick is a pressure-sensitive device that allows the user to control the pointer by directing the stick with one finger.
13

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pointing Devices (continued)
Touch Screens
A video display screen sensitized to receive input from a finger touch.
Used in ATMs, information, kiosks, reservation kiosks, voting machines, cellphones, tablets, and e-books.
Multitouch Screens
Display screens that allow two or more fingers or other gestures such as pinching motions to be recognized as input at any one time. It allows pinching and stretching gestures on the screen to control zooming.
Pen input
Uses a pen-like stylus for input.
Uses handwriting recognition to translate cursive writing into data (handwriting recognition).
14

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pointing Devices (continued)
Light pen
A light-sensitive penlike device that uses a wired connection to a computer terminal
Bring the pen to the desired point on the display screen and press a button to identify the screen location
Used by graphics artists, engineers, and in situations that require covered hands
Digitizer
Uses an electronic pen or puck to convert drawings
and photos to digital data
Digitizing tablets are often used in architecture
15

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Pointing Devices (continued)
Digital Pen
Writing instrument
Writers can write on paper
A tiny camera in the pen tip captures the writing
A microchip in the pen converts the pen to digital ink
The writing is sent as an image file to the computer
Some versions require special paper
16

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.3 Source Data-Entry Devices

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Scanning & Reading Devices—Source data-entry devices that create machine-readable data and feed it directly into the computer (no keyboard is used)
Scanners
Use light-sensing equipment to translate images of text, drawings, and photos into digital form
Image scanners are used in electronic imaging
Resolution refers to the image sharpness, measured in dots per inch (dpi)
Flatbed scanners work like photocopiers – the image is placed on the glass surface, then scanned
Other types are sheet-fed, handheld, and drum
18

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Bar-Code Readers (source data entry)
Photoelectric (optical) scanners that translate bar code symbols into digital code
The digital code is then sent to a computer
The computer looks up the item and displays its name and associated information
Bar code types
1D (regular vertical stripes) holds up to 16 ASCII characters
2D (different-sized rectangles) can hold 1,000 to 2,000 ASCII characters
3D is “bumpy” code that differentiates by symbol height
Can be used on metal, hard rubber, other tough surfaces
19

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Radio-Frequency Identification (RFID)
Based on an identifying tag bearing a microchip that contains specific code numbers. These code numbers are read by the radio waves of a scanner linked to a database.
Active RFID tags have their own power source and can transmit signals over a distance to a reader device.
Passive RFID tags have no battery power of their own and must be read by some sort of scanner.
RFID tags of both types are used for a wide range of purposes and are starting to replace bar codes in many situations.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Mark Recognition Readers (source data entry)
MICR – magnetic-ink character recognition
Uses special magnetized inks
Must be read by a special scanner that reads this ink
Used on bank checks
OMR – optical mark recognition
Uses a special scanner that reads
bubble (pencil) marks
Used in standardized tests such as the
SAT and GRE
OCR – optical character recognition
Converts scanned text from images (pictures of the text) to an editable text format
21

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Image-Capture Devices
Digital Cameras
Use a light-sensitive processor chip to capture photographic images in digital form and store them on a small disk in the camera or on flash memory cards.
Most can be connected to a PC by USB; smartphones include digital cameras.
Webcams
Video cameras attached to a computer to record live moving images then post them to a website in real time.
Can be attached externally or built into the computer/device.
Frame-grabber video card
Can capture and digitize 1 frame at a time
Full-motion video card
Can convert analog to digital signals at rates up to 30 frames per second
Looks like a motion picture
22

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
23

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Digital Camera

Audio-Input Devices
Record analog sound and translate it into digital files for storage and processing
Two ways to digitize audio (often via microphone)
Sound Board
An add-on board in a computer that converts analog sound to digital sound, stores it, and plays it back to speakers or amp
MIDI Board
Stands for Musical Instrument Digital Exchange
Uses a standard for the interchange between musical instruments, synthesizers, and computers
24

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Speech-Recognition Systems
Use a microphone or telephone as an input device. Converts a person’s speech into digital signals by comparing against 200,000 or so stored patterns.
Used in places where people need their hands free – warehouses, car radios, stock exchange trades.
Helpful for people with visual or physical disabilities that prevent them from using other input devices.
25

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Speech Recognition

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Sensors
Input device that collects specific data directly from the environment and transmits it to a computer.
Can be used to detect speed, movement, weight, pressure, temperature, humidity, wind, current, fog, gas, smoke, light, shapes, images, earthquakes, etc.
27

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Biometric-Input Devices
Biometrics is the science of measuring individual body characteristics, then using them to identify a person through a fingerprint, hand, eye, voice, or facial characteristics.
Example: notebook computers equipped with biometric sensors that read fingerprints, instead of passwords, before allowing access to networks.
Airport and building security systems use biometrics.
28

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.4 The Future of Input

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Data will be input from more and more locations.
Use of source data entry will increase.
Better input devices for people with disabilities
Better speech recognition
Better touch and gesture-recognition input
Pattern recognition and improved biometrics
Brainwave input devices

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 5B: Output Hardware
Softcopy = data shown on a display screen or is in audio or voice form; it exists only electronically. This kind of output is not tangible; it cannot be touched. You can touch disks on which programs are stored, but the software itself is intangible.
Hardcopy = tangible output, usually printed. The principal examples are printouts, whether text or graphics, from printers. Film, including microfilm and microfiche, is also considered hardcopy output.

31

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.5 Softcopy Output
Display Screens

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Features of display screens to consider include screen dimension, screen clarity, and color and resolution standards.
Screen size & aspect ratio
The active display area is the size of a computer screen measured diagonally from corner to corner in inches.
Desktop computers are commonly 15–30 inches (laptops 12–18 inches, tablets 8.4–14.1 inches, and smartphones 2.5–4.1 inches).

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The aspect ratio is the proportional relationship of a display screen’s width and height.
Standard displays have a 4:3 aspect ratio (4 units wide to 3 units high); wide-screen displays have 16:9 or 16:10.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Screen Clarity
Dot pitch (dp) is the amount of space between adjacent pixels (square picture elements) on screen.
The closer the pixels, the crisper the image.
Get .25 dp or better.
Resolution refers to the image sharpness.
The more pixels, the better the resolution.
Expressed in dots per inch (dpi) .
35
pixel

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Screen Clarity (continued)
Color depth (bit depth) is the number of bits stored in a dot (pixel).
The higher the number the more true the colors.
24-bit color depth is better than 8-bit color depth, but it needs more video card memory.
Refresh rate is the number of times per second the pixels are recharged – a higher rate gives less flicker.
36
Standard bit depths
for color
8-bit—256 colors
16-bit—65,536 colors
24-bit—16,777,216 colors

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Microcomputers come with graphics cards (video cards) that work with the screen.
Graphics cards have their own memory (VRAM), which stores each pixel’s information.
The more VRAM, the higher the resolution you can use.
Desktop publishers, graphics artists, and gamers need lots of VRAM.

37

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Types of Display Devices
The most common type of display screens, flat-panel displays are made up of two plates of glass separated by a layer of a substance in which light is manipulated.
One type of flat-panel display is the liquid crystal display (LCD), in which molecules of liquid crystal line up in a way that alters their optical properties, creating images on the screen by transmitting or blocking light.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Other types of displays:
Plasma displays: A layer of gas is sandwiched between two glass plates, and when voltage is applied, the gas releases ultraviolet light, which activates the pixels on the screen and forms an image. Although expensive, plasma monitors offer brighter colors and screen sizes up to 150 inches wide; however, they usually do not last as long as other display types.
Cathode-ray tube (CRT) and others: Falling out of use.
Multiple screens: Splitting the monitor display area into multiple screens, to view different documents at once.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.6 Hardcopy Output
Printers

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Printers print text and graphics on paper or other hardcopy materials.
Printer resolution is measured by dpi (dots per inch); 1,200 x 1,200 is the most common for microcomputers.
Printers are either impact or nonimpact – impact printers (dot-matrix printer) print by striking the paper directly; nonimpact printers (such as laser printers and inkjet printers) do not have direct contact with the hardcopy medium.
41

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Like a dot-matrix printer, a laser printer creates images with dots. However, as in a photocopying machine, these images are produced on a drum, treated with an electrically charged inklike toner (powder), and then transferred from drum to paper.
Laser printers run with software called a page description language (PDL) , which tells the printer how to lay out the printed page and supports various fonts.
A laser printer comes with one or both types of PDL: PostScript or PCL (Printer Control Language. In desktop publishing, PostScript is the preferred PDL.
Laser printers have their own CPU, ROM, and memory (RAM), usually 16 megabytes (expandable generally up to 512 megabytes for higher-cost printers).
When you need to print out graphics-heavy color documents, your printer will need more memory.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
43

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Laser Printer

Inkjet printers spray onto paper small, electrically charged droplets of ink from four or more nozzles through holes in a matrix at high speed.
Like laser and dot-matrix printers, inkjet printers form images with little dots. Inkjet printers commonly have a dpi of 4,800 x 1,200; they spray ink onto the page a line at a time, in both high-quality black-and-white text and high-quality color graphics.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
45

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Inkjet Printer

Nonimpact printers also include:
Thermal printers: Low- to medium-resolution printers that use a type of coated paper that darkens when heat is applied to it; typically used in business for bar-code label applications and for printing cash register receipts.
Thermal wax-transfer printers: Print a wax-based ink onto paper. After it becomes cool, the wax adheres permanently to the paper. Because of their waterfastness, these labels find uses in industrial label printing.
Photo printers: Specialized machines for printing continuous-tone photo prints , with special paper and color dyes.
46

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Multifunction printers
Printers that combine several capabilities:
Printing
Scanning
Copying
Faxing
Cost less and take up less space than buying the four separate office machines.
But if one component malfunctions, so will the other functions.
47

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Plotters : Designed for large-format printing
Specialized output device designed to produce large high-quality, 3-D graphics in a variety of colors.
Used by architects, engineers, and map-makers.
Pen plotters use one or more colored pens.
Electrostatic plotters lie partially flat on a table and use toner as photocopiers do.
Large-format plotters are large-scale inkjet printers used by graphic artists.
48

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.7 MIXED OUTPUT: SOUND, VOICE, & VIDEO

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Mixed Output: Sound, Voice, & Video
Sound output—produces digitized sounds, even “3-D” sound.
You need a sound card and sound software.
Good speakers can improve the sound.
Voice output—converts digital data into speechlike sounds.
Used in phone trees, cars, toys and games, GPS systems, and TTS (text-to-speech) systems for hearing-impaired people.
Video output—photographic images played quickly enough to appear as full-motion.
Requires powerful processor and video card.
Video files are large, so a lot of storage is needed, too.
Videoconferencing is a form of video output.
50

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.8 The Future of Output
51

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
More unusual forms of output
More data used in (Big Data)
More realistic output
Better and cheaper display screens
Printers that use less ink
Movie-quality video for PCs
Increased use of 3D output

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5.9 Quality of Life
Health & Ergonomics

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Health Matters
Overuse injuries and repetitive stress injuries:
Result when muscle groups are forced through fast, repetitive motions.
May effect data-entry operators who average 15,000 keystrokes an hour.
May effect computer users whose monitor, keyboard, and workstation are not arranged for comfort.
Carpal tunnel syndrome: Caused by pressure on the median nerve in the wrist, through short repetitive movements.
Eyestrain, headaches, back and neck pains can be problems.
Electromagnetic fields may be harmful.
54

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ergonomics is the methodology of designing a workplace to make working conditions and equipment safer and more efficient.
Keyboards must be placed at the correct height depending on each worker’s size; detachable keyboards are useful.
Monitor refresh rates must be fast enough to avoid eyestrain.
Monitor heights must be correct for comfortable viewing; use a tilting screen.
Wrist rests may help avoid carpal tunnel syndrome.
55

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter

4

Hardware: The CPU & Storage

4

© 20

1

5 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1

CPU and Storage

Part I

How a computer processes data?

Transistors

Microchips

Electronic representation of data

Types of main memory

Expansion Cards, Bus lines, Ports

Part 2

Devices that store data

Hard Discs

Optical Discs (CD, DVD, Blue Ray)

Flash and Solid State Memory

Smart Cards

Cloud based or online storage

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
CPU and Storage

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Integrated Circuits (IC) -> Chip

CPU

Memory

(1. ALU & 2. CU)
3. Registers
4. Buses

*Expansion Slots
*Ports: USB; FireWire; Ethernet; eSATA

1. RAM
2. ROM
3. CMOS
4. Flash

Chapter Topics
4
UNIT 4A: Processing: The System Unit, Microprocessors, & Main Memory
4.1 Microchips, Miniaturization, & Mobility
4.2 Representing Data Electronically
4.3 Inside the System Unit: Power Supply, Motherboard, & Microprocessors
4.4 The Central Processing Unit & the Machine Cycle
4.5 Memory
4.6 Expansion Cards, Bus Lines, & Ports
UNIT 4B: Secondary Storage
4.7 Secondary Storage
4.8 Future Developments in Processing & Storage

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 4A: Processing: The System Unit, Microprocessors, & Main Memory
Electronic circuitry has remained basically the same over recent years.
A circuit is a closed path followed or capable of being followed by an electric current.
Vacuum tubes used wire circuits inside them to facilitate the flow of electrons.
Transistors have replaced vacuum tubes.

5

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
4.1 Microchips, Miniaturization,
& Mobility
6

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Since the early 1970s, microchips have gotten smaller and smaller yet more and more powerful and faster.
A transistor is a tiny electronic switch that can be turned “on” or “off” millions of times per second.
Transistors form part of an integrated circuit: all the parts of an electronic circuit embedded on a single silicon chip.
Integrated circuits are solid state (no moving parts).
7

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Silicon: A semiconductor made of clay and sand.
Semiconductor: A material whose electrical properties are intermediate between a good conductor and a nonconductor of electricity.
Perfect underlayer for highly conductive,
complex circuits.
Microchips (Microprocessors) are made
from semiconductors.
Chip: A tiny piece of silicon that contains
millions of microminiature integrated
electronic circuits.
8

Chip

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Miniaturization
Microchips
Store and process data in electronic devices
Microprocessors
The miniaturized circuitry of an entire computer processor (“brain”) on a single chip
Contains the central processing unit (CPU), which processes data into information
The development of microchips and processors has enabled the development of small, mobile electronic devices.
9

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
System Unit
The case that contains the computer’s electronic components used to process data.
PCs: Tower or desktop; monitor is separate.
Laptops: Monitor is attached to the system unit, like a clamshell.
Tablets: Usually includes a touch-screen interface.
Smartphones: Handheld system units.
10

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
4.2 Representing Data Electronically
11

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
12

Binary System: the basic data-representation method for computers uses just two numbers: 0 and 1, representing the off/on states of electricity or light pulses.
Data is represented in a computer by binary code.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
All data and program instructions in the computer are represented as binary.
Bit: each 0 or 1 is a bit
Byte: a group of 8 bits = 1 character, digit, or other value
Kilobyte (KB): 1,000 (1,024) bytes
Megabyte (MB): 1 million (1,048,576) bytes
Gigabyte (GB): 1 billion (1,073,741,824) bytes
Terabyte (TB): 1 trillion (1,009,511,627,776) bytes
Petabyte (PB): 1 quadrillion bytes
Exabyte (EB): 1 quintillion bytes
13
Measuring Capacity

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Binary coding schemes assign a unique binary code to each character.
ASCII (American Standard Code for Information Interchange)
Requires 7 or 8 bits per character, depending on the version
8-bit Extended ASCII provides 256 characters
Commonly used for microcomputers
Unicode
Requires 16 bits per character
Handles 65,536 characters—used for Chinese and Japanese
EBCDIC (Extended Binary Coded Decimal Interchange Code)
Requires 8 bits per character
Used for IBM mainframes
14

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
15

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Machine Language: The computer’s “native language”
A binary-type programming language (0s and 1s) built into the CPU that is run directly by the computer.
Each CPU type has its own machine language; thus each computer’s machine language is brand-dependent.
Language Translators: The computer’s system software converts higher-level language instructions and data into machine language so that the processor can “understand” what to do.
16

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
4.3 Inside the System Unit
Power Supply, Motherboard, & Microprocessors

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Terms

Definitions
Bay
Power Supply
Surge Protector
UPS
Motherboard
Microprocessor
Chipset
Opening in the computer cabinet used for the installation of electrical equipment.
This converts AC to DC to run the computer.
Protects the computer from being damaged by power spikes. Plug your computer into one.
Uninterruptible Power Supply. Battery-operated device that provides power for a limited time when there is a blackout.
Main system board of the computer (also systemboard).
Miniaturized circuitry of a computer processor.
Groups of interconnected chips on the motherboard that control information flow between the microprocessor and other system components connected to the motherboard.
.18

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
19
Lets look inside the CPU

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
20
View of a Motherboard

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

A Mac motherboard
Hard drive
Expansion cards
Motherboard
CD drive
Power supply
RAM slots

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
22

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
CPU and Storage

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Integrated Circuits (IC) -> Chip

CPU

Memory

(1. ALU & 2. CU)
3. Registers
4. Buses

*Expansion Slots
*Ports: USB; FireWire; Ethernet; eSATA

1. RAM
2. ROM
3. CMOS
4. Flash

Traditional microcomputer microprocessors are Intel and AMD.
Multicore processors (2, 4, 6, 8) have more than one
processor “core” on a single silicon chip, which
allows computers to run faster.
Special processors are made for portable devices.
A graphics processing unit (GPU) is a specialized processor used to manipulate three-dimensional (3-D) computer graphics.
24

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Processing Speeds
Every microprocessor contains a system clock, which controls how fast all the operations within a computer take place (the chip’s processing speed).
Older CPU processing speeds are in megahertz.
1 MHz = 1 million cycles per second
Current CPU processing speeds are in gigahertz.
1 GHz = 1 billion cycles per second
The faster a CPU runs, the more power it consumes, and the more heat it generates.
25

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
4.4 The Central Processing Unit & the Machine Cycle
26

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
27
The CPU, for central processing unit, is the “brain” of the computer; it follows the instructions of the software (program) to manipulate data into information.
The CPU consists of two parts—(1) the control unit and (2) the arithmetic/logic unit (ALU), both of which contain registers, or high-speed storage areas.
All are linked by a kind of electronic “roadway” called a bus.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The control unit deciphers each instruction stored in the CPU and then carries out the instruction. It directs the movement of electronic signals between main memory and the arithmetic/logic unit. It also directs these electronic signals between main memory and the input and output devices.
For every instruction, the control unit carries out four basic operations, known as the machine cycle. In the machine cycle, the CPU (1) fetches an instruction, (2) decodes the instruction, (3) executes the instruction, and (4) stores the result (see next slide)..

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
30
Each time the central processing unit executes an instruction, it takes a series of steps. The complete series of steps is called a machine cycle.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The arithmetic/logic unit (ALU) performs arithmetic operations and logical operations and controls the speed of those operations.
Arithmetic operations are the fundamental math operations: addition, subtraction, multiplication, and division.
Logical operations are comparisons–the ALU compares two pieces of data to see whether one is equal to ( = ), greater than (>), greater than or equal to ( >= ), less than (<), less than or equal to ( <= ), or not equal to ( ≠ ) the other. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. The control unit and the ALU also use registers, special CPU areas that enhance the computer’s performance. Registers are high-speed storage areas that temporarily store data during processing. They may store a program instruction while it is being decoded, store data while it is being processed by the ALU, or store the results of a calculation. All data must be represented in a register before it can be processed. The number of registers that a CPU has and the size of each (number of bits) help determine the power and speed of a CPU. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Buses are electrical data “roadways” through which bits are transmitted within the CPU and between the CPU and other components of the motherboard. In most computers, the bus width is the same as the computer’s word size, the number of bits that the processor can process at any one time. The more bits in a word, usually the faster the computer. A 32-bit-word computer will transfer data within each microprocessor chip in 32-bit chunks. A 64-bit-word computer is faster, transferring data in 64-bit chunks at a time. (Most, but not all, 32-bit software will run on a 64-bit system, but 64-bit software will not run on a 32-bit system.) Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 4.5 Memory Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Memory Two type of storage: primary and secondary. Primary storage = “memory,” “main memory,” “RAM”; this type of memory is temporary and volatile. Secondary storage = hard disks and flash memory units; this type of memory is relatively permanent and nonvolatile. 35 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Memory Chips RAM ROM CMOS Flash Explanation Random Access Memory chips are volatile and hold: Software instructions Data before & after the CPU processes it Read Only Memory Cannot be written on or erased without special equipment Are loaded at factory with fixed (permanent) start-up instructions (BIOS), that tell the computer how to load the operating system Complementary Metal Oxide Semiconductor Powered by a battery Contains time, date, calendar, boot password Nonvolatile memory that can be erased and reprogrammed more than once Doesn’t require a battery Used in newer PCs for BIOS instructions 36 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Speeding up Processing: Cache The CPU works much faster than RAM, so it often must wait for information Cache temporarily stores instructions and data that the processor uses frequently to speed up processing Level 1 cache is part of the microprocessor Holds 8 to 128 KB Faster than Level 2 cache Level 2 cache is external cache Holds 64 kb to 16 MB Level 3 cache is on the motherboard Comes on very high-end computers Holds 2 to 8 MB 37 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Virtual Memory—also used to speed up processing. This type of memory is unused hard disk or optical (CD) space that the processor uses to extend the capacity of RAM. The processor goes first to L1 cache, then L2 cache, then RAM, then virtual memory. Each type of memory is slower than its predecessor. 38 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 4.6 Expansion Cards, Bus Lines, & Ports Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Expansion cards plug into slots on the motherboard that are connected by buses to ports that the user can access. Expansion cards are circuit boards that provide more memory or that control peripheral devices (for graphics, sound, video, network interface, wireless connection, etc.). Buses connect the expansion cards to ports. A port is a connecting socket or jack on the outside of the computer unit or device into which are plugged different kinds of cables that connect peripheral devices. 40 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Expansion Cards: If a computer uses closed architecture, no expansion cards can be added; if the computer uses open architecture, expansion cards can be inserted in expansion slots inside the computer, connected to the motherboard. 41 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. An expansion bus is not the same as the frontside bus: Frontside bus: The bus that connects the CPU within itself and to main memory. Expansion bus: Buses that connect the CPU with expansion slots on the motherboard and thus via ports with peripheral devices. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Types of expansion buses: PCI: High-speed bus that has been widely used to connect PC graphics cards, sound cards, modems, and high-speed network cards. PCI Express: Doubles the speed of the original PCI bus . PCIe is the latest standard for expansion cards available on mainstream personal computers. Accelerated Graphics: Transmits data at twice the speed of a PCI bus and is designed to support video and 3-D graphics. Universal Serial Bus (USB): Does away with the need to install cards in expansion slots. USB devices can connect one to another outside the system unit, and then the USB bus connects to the PCI bus on the motherboard. Firewire: Resembles the USB bus but is used for more specialized purposes, such as to connect audio and video equipment to the motherboard. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Port Type Serial port Parallel port USB port Description Used to transmit data slowly over long distances Sends data sequentially, one bit at a time Used to connect older keyboards, mouse, monitors, dial-up modems For transmitting data quickly over short distances Transmits 8 bytes simultaneously Connects printers, external disks, tape backups Universal Serial Bus high-speed hardware standard for interfacing peripheral devices, such as scanners and printers, to computers without a need for special expansion cards or other hardware modifications to the computer. USB is replacing many varieties of serial and parallel ports. 44 A port is a socket for some kind of plug, of which there are many types. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Specialized Expansion Ports Port Type FireWire Intended for multiple devices working with lots of data and requiring fast transmission speeds, such as DVD drives, digital video cameras, and gaming consoles. Ethernet Supports a network standard for linking a wired local area network and connecting it to a DSL or a cable modem for high-speed Internet access. Graphics Connects digital monitors and multimedia digital devices, such as TVs and DVD players. eSATA External Serial Advanced Technology Attachment; allows the attachment of an eSATA hard disk, which has fast data transmission speeds. Bluetooth Connects devices that use short-range radio waves that transmit up to 30 feet. IrDA Transfers data via infrared light waves between directly aligned devices, as between a smartphone and a desktop computer. HDMI High-Definition Multimedia Interface; carries both video and audio signals and is used for connecting HDTVs, DVD players, and game consoles to computers, laptops, and other devices. MIDI Musical Instrument Digital Interface; used to connect electronic musical instruments to a sound card that converts the signals to digital instructions that can be saved or manipulated. 45 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 46 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 47 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. UNIT 4B: Secondary storage hardware includes devices that permanently hold data and information as well as programs. Online, or cloud, storage is also available, but we still use secondary storage hardware. 48 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 4.7 Secondary Storage 49 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Hard Disks: Still the major secondary-storage device for desktop/tower computers. Thin, rigid metal, glass, or ceramic platters covered with a substance that allows data to be held in the form of magnetized spots. The more platters there are, the higher the drive capacity. Store data in tracks, sectors, and clusters. Formatting creates a file allocation table that maps files to clusters. Drive heads ride on .000001” cushion of air, and can crash! Important data should always be backed up! 50 read/write head Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 51 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Hard Disks (continued) Hard Disk Types: Nonremovable hard disk – Also known as a fixed disk; is housed in the microcomputer system unit and is used to store nearly all programs and most data files. Usually consists of several metallic or glass platters, from 1 to 5.25 inches (most commonly 3.5 inches) in diameter, stacked on a spindle, with data stored on both sides. Read/write heads, one for each side of each platter, are mounted on an access arm that moves back and forth to the right location on the platter. External hard disk – Freestanding disk drive (portable); usually connected via USB. RAID – redundant array of independent disks; for large computer systems. 52 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 53 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Optical Disks CDs (compact disks) and DVDs (digital versatile/video disks) are optical disks. DVDs hold more data then CDs do. Data is written and read using lasers, not a disk read/write head. CD-ROM is Compact Disk Read-Only Memory; content is prerecorded. CD-R (compact disk-recordable) is used for recording only once. CD-RW (compact disk-rewritable)is an erasable optical disk that can both record and erase data over and over again. 54 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Optical Disks (continued) DVD is a CD-style disk with extremely high capacity. DVD-R (DVD-recordable) is used for recording only once. DVD-RW, DVD-RAM, DVD+RW are reusable DVDs. Blu-ray is an optical-disk format used to record, rewrite, and play back high-definition (HD) video, as well as to store large amounts of data. 55 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Flash & Solid-State Storage Flash memory and solid-state memory have become the most important form of mobile secondary storage. Disk drives (hard disks or CDs/DVDs) all involve some moving parts—and moving parts can break. By contrast, flash memory has no moving parts; it is “solid state.” Flash memory is also nonvolatile—it retains data even when the power is turned off. Flash memory media are available in three forms: Some tablets, laptops, desktops, and servers feature a solid-state drive (SSD), which uses flash memory to store data, instructions ,and information. Flash memory cards, or flash RAM cards, are removable and reusable storage media that are inserted into a flash memory slot in a digital camera, notebook, smartphone, or other mobile device. A USB flash drive consists of a finger-size module of reusable flash memory that plugs into the USB ports of nearly any microcomputer. Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Smart Card: pocket-size card with integrated circuits. Resembles a credit card but contains a microprocessor and memory chips May function on three levels: credit, debit, and/or personal information Storage capacity: around 10 MBs Contact smart cards Must be swiped through card readers Can wear out from use Contactless smart cards Read when held in front of a low-powered laser 57 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Online Secondary Storage (Cloud Storage) Allows you to use the Internet to back up your data Sign up with a vendor and receive access to software and applications that allow you to upload your data to that company’s server 58 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 4.8 Future Developments in Processing & Storage 59 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Nanotechnology Optical computing DNA computing Quantum computing Better batteries Description of Processing Technology Tiny machines work at a molecular level to make nanocircuits Uses lasers and light, not electricity Uses strands of synthetic DNA to store data Based on quantum mechanics and stores information using particle states Wireless charging of batteries, longer-lasting batteries 60 Using Information Technology, 11e © 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter

Introduction to Information Technology:
The Future Now

1

©

2

015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1

Chapter 1 Topics

2

UNIT 1A: The Mobile World, Information Technology, & Your Life

1.1 Information Technology & Your Life: The Future Now

1.2 Information Technology Is Pervasive: Cellphones, Email, the Internet, & the E-World

UNIT 1B: The Basics of Information Technology

1.3 The Practical User: How Becoming tech Smart Benefits You

1.4 The “All-Purpose Machine”: The Varieties of Computers

1.5 Understanding Your Computer

1.6 Where Is Information Technology Headed?

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 1A: The Mobile World, Information, & Your Life
As the result of developments in information technology,
smartphones and tablet computers are changing
nearly everything we do.
Information technology refers to any technology that
helps produce, manipulate, store, communicate, and/or
disseminate information.

3

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1.1 Information Technology & Your Life
4
The Future Now

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
5
Information technology affects almost all aspects of our lives,
including education, health, finance, recreation and entertainment,
government, jobs and careers, and your personal life.
Part 1: Computer Technology
A computer is a programmable, multiuse machine that accepts data—raw facts
and figures—and processes, or manipulates, it into information we can use.
Part 2: Communications Technology
Communications technology, also called telecommunications technology, consists of of electromagnetic devices and systems for communicating over any distance.

Two Parts of IT: Computers & Communications

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Education: The Promise of More Interactive & Individualized Learning
Education has become heavily involved in information technology.
Information technology can be used for:
Personalizing students’ education
Automating tedious and rote tasks and managing classes
Reducing instructors’ workload (course-management software)
Graphical presentations (e.g., PowerPoint)
What is misuse?
Text messaging or emailing friends during class
Surfing the Internet for entertainment
Doing assignments for other classes
Sharing answers
6

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Education: The Promise of More Interactive
& Individualized Learning
Online Learning, or distance learning, is becoming common.
Not all online schools/courses are accredited; students should check.
Online courses are less expensive than traditional courses.
Distance learning is available to students in rural areas.
Tutoring, simulation, and avatars are also aspects of IT in education:
7

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Health: High-Tech for Wellness
Computers are playing important roles in our
personal lives.
Telemedicine: Medical care via
telecommunications lets doctors treat patients
from far away.
3D Computer models allow accurate tumor location inside a skull; X rays, MRIs, CT scans can be done remotely.
Robots—automatic devices that perform functions
ordinarily performed by human beings—permit precise microsurgery.
Health websites provide medical information.
Many health records are stored electronically.
8

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Money & Business: Toward the Cashless Society?
Information technology is reducing the use of traditional money.
Virtual means something that is created, simulated, or carried on by means of a computer or a computer network.
Virtual money includes cash-value cards, automatic transfers, and digital money
“Electronic wallets” (e.g., PayPal)
Electronic payroll deposit
Online bill paying via debit and credit cards
Micropayments for online products and
to help charities
9

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Money & Business: Toward the Cashless Society?
Smartphones are used for “showrooming” and shopping.
Technology can also be used to telecommute and to start businesses and earn money.

10

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Government & Electronic Democracy: Participating in the Civic Realm
Information technology is helping governments to deliver services and is affecting political activism.
IT can help governments to improve services, including police services, which use databases, computer systems with a collection of interrelated files.
Online voting is becoming common.
Information is easier to disseminate.
Watchdog websites are growing.
Easier fund raising from small donors.
BUT:
Gerrymandering is becoming easier—redrawing voting districts for partisan advantage.
Voting machine problems can occur.
Invasion of privacy is becoming an important issue.
11

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jobs & Careers
People now use computers to post résumés and find jobs.
IT is used in starting new business ventures.
IT is used to prepare résumés and find jobs on many websites.
To help find jobs, participate in social media and write comments on blogs (weblogs), frequently updated sites on the web intended for public consumption that contain a writer’s observations, opinions, images, and links to other websites. (But be aware of privacy issues and DON’T POST inappropriate pictures or text!) (Internet postings live forever!)

12

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Jobs & Careers
Basic computer skills are needed for most jobs:
Know how to use a keyboard.
Use email.
Be able to use a word processor (usually Microsoft Word).
Know basic spreadsheet and database software skills.
Understand the basics of file sizes, computer memory limitations, and network arrangements.
Know what the basic computer system components are.

13
Discussion Question: Can anyone think of a career that does not require computer skills at all?

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Your Personal Life
Computers are playing important roles in our personal lives.
Online relationship sites, or online dating sites, provide electronic forums that people may join in the hope of meeting compatible companions or mates.
“Digital is embedded into the fiber of every aspect of our culture and our personal lives”– public safety and security; in the home; entertainment; finance; communications; traveling; shopping; medical care; and so on.

14
Discussion Question: Can anyone think of an area of life NOT affected by IT?

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1.2 Information Technology Is Pervasive
15
Cellphones, Email, the Internet, & the E-World

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Phone Grows Up
The telephone is not what it used to be.
1973: First cellphone call
Mobile phone use estimated to rise to 7 billion users in 2014
Today’s smartphones can:
Make voice calls
Connect to Internet and web for all sorts of activities
Send and receive text messages
Take and send pictures and download music and video
Obtain news and TV programs
Scan special barcodes that take users to a website
Provide maps
Do research
Pay for products and services
16

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Email’s Mass Impact
Email revolutionized communication, and has many benefits, but in many areas it is being supplanted by texting.
Introduced in 1981
Reached 10 million users in about one year
1998 surpassed hand-delivered mail
In 2013 about 144 billion messages per day
In business, at least, email requires writing skills
For personal activities, texting is replacing email
Texting, or text messaging, is sending and receiving short written messages between mobile phones or other portable or fixed devices
17

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Internet, the World Wide Web, & the “Plumbing” of Cyberspace
The net, the web, and cyberspace are not the
same things.
Cyberspace
Term coined by William Gibson in Neuromancer
(1984) to describe a futuristic computer network people “plugged” into directly with their brains
Now the term cyberspace encompasses not only the online world and the Internet in particular but also the whole wired and wireless world of communications in general.
18

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
19
The Internet (the “Net” or “net”) is a worldwide computer network that connects hundreds of thousands of smaller networks. These networks link educational, commercial, nonprofit, and military entities, as well as individuals.
The World Wide Web (the “Web” or the “web” is an interconnected system of Internet computers (called
servers ) that support specially formatted documents
in multimedia form. (The word multimedia, from “multiple media,” refers to technology that presents information in more than one medium, such as text, still images, moving images, and sound.)

The Net & Web Defined

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 1B: The Basics of Information Technology
As the result of developments in information technology,
smartphones and tablet computers are changing
nearly everything we do.
Information technology refers to any technology that
helps produce, manipulate, store, communicate, and/or
disseminate information.

20

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1.3 The Practical User
How Becoming tech Smart Benefits You
21

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Being informed about information technology has
practical payoffs.
Know how to make better buying decisions
Know how to fix ordinary computer problems
Know how to upgrade equipment and integrate it with new products
Know how to use the Internet effectively
Know how to guard against online dangers
Know how computer knowledge can advance your career
22

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1.4 The “All-Purpose Machine”
The Varieties of Computers
23

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
All Computers, Great & Small: The Categories of Machines
Computers come in different sizes; they also function as clients and/or servers.
There are five basic computer sizes.
Supercomputers
Mainframes
Workstations
Microcomputers
Microcontrollers

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1. Supercomputers
Supercomputers are used in very special situations.
Priced from $1 million to over $350 million.
High-capacity machines with thousands
of processors that can perform more than several
quadrillion calculations per second.
Faster and largest computer available.
Used for government census, weather forecasting, designing aircraft, scientific projects, etc.
The Titan (U.S.A.) computer is currently the largest supercomputer.
The next supercomputer generation may use nanotechnology.

25

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2. Mainframes
26
Mainframe computers are used in many large businesses.
Priced from $5,000 to $5 million
Process billions of instructions per second
Size is dependent on the use
Water-cooled or air-cooled
Used to be called midsize computers
Used by banks, airlines, colleges, and the like for
millions of transactions

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. Workstations
Workstations are used for graphics, special effects, and
certain professional applications.
Expensive, powerful personal computers
Used for scientific, mathematical, engineering, computer-aided design (CAD), computer-aided manufacturing (CAM) applications
Used for designing cars, drugs, movie special effects
Are usually connected to a network
27

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
4. Microcomputers
Microcomputers are used by individuals as well as businesses, and
they can be connected to networks of larger computers. There are
many types of microcomputers.
Personal computers that cost $500 to over $5,000
Used either stand-alone or in a network
Types include: desktop, tower, notebooks (laptops), netbooks, tablets, mobile devices, personal digital
assistants (PDAs), and e-readers
28

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Types of Microcomputers (1)
Desktop and tower PCs

Notebooks & netbooks

Tablets

Tower PC
Desktop PC

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Types of Microcomputers (2)
Mobile devices & PDAs
E-readers
Also called embedded computers, microcontrollers are tiny, specialized microprocessors inside appliances and automobiles They are in microwaves, programmable ovens, blood-pressure monitors, air bag sensors, vibration sensors, MP3 players, digital cameras, keyboards, car systems, etc.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Servers
The word server describes the way a computer—
whether mainframe, workstation, or PC—is used.
A server, or network server , is a central computer that holds collections of data (databases) and programs for connecting or supplying services to PCs, workstations, and other devices, which are called clients. These clients are linked by a wired or wireless network. The entire network is called a client-server network.
Purpose: Hold data and programs for clients to access and to supply services for clients.
31

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1.5 Understanding Your Computer
32

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How Computers Work: Three Key Concepts
All computer users must understand three basic principles: (1) Data is turned into information; (2) hardware and software have their own specific functions; and (3) all computers involve input, processing, storage, and output, plus communications.
1. Purpose of a computer: Turning data into information
Data: the raw facts and figures
Information: data that has been summarized or otherwise transformed for use in decision making
2. Hardware vs. software
Hardware = the machinery and equipment in a computer system
Software (programs) = the electronic instructions that tell the computer how to perform a task
33
(continued)

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. The basic operations of a computer: All computers use 4 basic operations + communications:
Input: What goes into the computer system
Processing: The manipulation a computer does to transform data into information
Storage:
Primary storage, or memory, is temporary storage for data waiting to be processed
Secondary storage is permanent storage: media such as hard disk, DVDs, and CDs
Output: What comes out—the results of processing, such as on the screen, printouts, sound
Communications: Sending and receiving data
34

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
35
Panel 1.7
Page 29

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Customizing a Desktop Computer
What would you need?
Keyboard & mouse (input hardware)
Inside the system cabinet (processing & memory hardware)

Case and power supply
Processor chip – the central processing unit (CPU)
Memory chips – random access memory (RAM) or primary storage
Motherboard – the system board, the main circuit board, with expansion slots to plug in components
36

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Putting the components together
Panel 1.8
Page 31

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Storage Hardware: Hard Drive, CD/DVD Drive
Storage capacity is represented in bytes
1 byte = 1 character of data
1 kilobyte = 1,024 characters
1 megabyte = 1,048,576 characters
1 gigabyte = over 1 billion characters
1 terabyte = over 1 trillion characters
1 petabyte = about 1 quadrillion characters
38

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Output hardware
Video
Sound cards
Speakers
Monitor
Printer
Communications hardware
Modem
39

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Basic PC System
40
Panel 1.9
Page 33

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Software
Computers use two basic types of software: system software and application software.
System Software—enables the computer to perform essential operating tasks and makes it possible for application software to run.
Most important part: operating system (OS)
Some operating system options
Windows
Unix
Linux
Mac OS

41

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Software
Application Software—enables you to perform specific tasks—solve problems, perform work, or entertain yourself.
Compatibility: Application software is specific to the system software you use.
Linux applications won’t work on Windows.
Windows applications won’t necessarily work on Linux.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1.6 Where Is Information Technology Headed?
43

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computers are headed in three basic directions—

miniaturization, faster speeds, and
greater affordability
—and communications are improving connectivity,
interactivity, and support of multimedia.

44

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
When Computers & Communications Converge:
Five Results
Convergence—combination of several industries
Computers
Communications
Consumer electronics
Entertainment
Mass media
Portability
Personalization
Collaboration
Cloud computing
Artificial intelligence
45

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cloud computing basically means that instead of storing your software and/or data on your own PC or your own company’s computers, you store it on servers on the Internet.
Artificial intelligence (AI) refers to a group of related technologies used for developing machines to emulate human qualities, such as learning, reasoning, communicating, seeing, and hearing. Much of AI is based on the use of algorithms, formulas or sets of steps for solving particular problems. AI deals with Big Data, data that is so large and complex that it cannot be processed using conventional methods,

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ethics
Many important ethical issues are involved in the use of information technology.
Ethics is the set of moral values or principles that govern the conduct of an individual or a group.
3 ethical considerations resulting from development of IT:
Speed & scale affect security and personal privacy
Unpredictability—IT can be less predictable and reliable than other technologies
Complexity—computer systems can be unmanageable
47

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Chapter

The Internet & the World Wide Web: Exploring Cyberspace

2

© 20

1

5 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Using Information Technology, 11e

© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1

Chapter 2 Topics

UNIT 2A: The Internet & the Web

2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers

2.2 How Does the Internet Work?

2.3 The World Wide Web

UNIT 2B: The Riches & Risks of Internet Use

2.4 Email & Other Ways of Communicating over the Net

2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & Social Networking

2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware

2

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 2A: The Internet & the Web
The Internet began in 1969 as ARPANET.
The Internet was text-only. In the early 1990s, multimedia became available on the Internet, and the World Wide Web (web) was born.

3
This is the first image uploaded to the web, in 1992.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

To connect to the Internet you need
1. An access device (computer with modem)
2. A means of connection (phone line, cable hookup, or wireless)
3. An Internet access provider

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.1 Connecting to
the Internet
Narrowband, Broadband,
& Access Providers
5

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
However you connect to the Internet, the bandwidth will determine the speed of your connection.
Bandwidth: Expresses how much data can be sent through a communications channel in a given amount of time.
Baseband: Slow type of connection that allows only one signal to be transmitted at a time.
Broadband: High-speed connections.
6

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Physical connection to Internet—wired or wireless?
Telephone [dial-up] modem
High-speed phone line—DSL, T1/T3
Cable modem
Wireless—satellite and other through-the-air links
7

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Data Transmission Speeds
Originally measured in bits per second (bps)
8 bits are needed to send one character, such as A or a
Kbps connections send 1 thousand bits per second
Mbps connections send 1 million bits per second
Gbps connections send 1 billion bits per second
Uploading & Downloading
Upload—transmit data from local to remote computer
Download—transmit data from remote to local computer
8

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Narrowband (Dial-Up Modem): Low speed but inexpensive
Telephone line = narrowband, or low bandwidth, low speed
Dial-up connection—use of telephone modem to connect to Internet (used mostly in rural areas on POTS, or plain old telephone system)
Telephone Modems
Can be either internal or external
Maximum speed of 56 Kbps
Most ISPs offer local access numbers
9

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Telephone (Dial-Up) Modem
10
Panel 2.3
Page 55

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
High-Speed Phone Lines
More expensive but available in cities & most towns
DSL line
Uses regular phone lines, DSL modem
Receives data at 7 ̶ 105Mbps; sends at about 384 Kbps – 1 Mbps
Is always on
Need to live no farther than 4.5 miles from phone company switching office
Not always available in rural areas
T1 line—very expensive
Traditional trunk line, fiber optic or copper; carries 24 normal telephone circuits
Transmission rate of 1.5 ̶ 6 Mbps (T3 = 6 – 47 Mbps)
The “last mile” can still be a problem
Generally used by large organizations
11

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
High-Speed Phone Lines
Cable modem
TV cable system with Internet connection; company usually supplies cable modem
Is always on
Receives data at up to
100 Mbps; sends at
about 2-8 Mbps
12

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Basic DSL/Cable-PC system
Panel 2.4
Page 57

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Satellite Wireless Connections
Transmits data between satellite dish
and satellite orbiting earth
Connection is always on
Requires Internet access provider with 2-way
satellite transmission
User needs to buy or lease satellite dish and
modem and have them connected
14

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Other Wireless: Wi-Fi, 3G, & 4G
Wi-Fi—stands for “wireless fidelity”
Name for a set of wireless standards (802.11) set by IEEE
Transmits data wirelessly up to 54 Mbps for 300 – 500 feet from access point (hotspot)
Typically used with laptops and tablets that have Wi-Fi hardware
3G = “third generation”; uses existing cellphone system; handles voice, email, multimedia
4G = “fourth generation”; faster than 3G; built specifically for Internet traffic – but not standard yet
Both 3G and 4G used mostly in smartphones
15

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Access Providers (ISPs)
ISP: Local, regional, or national organization that provides access to the Internet for a fee — e.g., Comcast, Charter, AT&T.
Wireless Internet Service Provider (WISP) — e.g., AT&T, T-Mobile, Verizon Wireless, Sprint, Credo
Enables wireless-equipped laptop/tablet and smartphone users to access Internet
16

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.2 How Does the Internet Work?
17

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Internet is basically a huge network that connects hundreds of thousands of smaller networks.
Central to this arrangement are client/server networks
Client: computer requesting data or services
Server or host computer: central computer supplying data or services requested of it
18
Client

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Point of Presence (POP)
A collection of modems and other equipment in a local area
A local gateway (access) to an ISP’s network
ISP connects to an IXP
Internet Exchange Point (IXP)
A routing computer at a point on the Internet where several connections come together
IXPs are run by private companies
Allow different ISPs to exchange Internet traffic
19
(continued)
Internet Connections: POP & IXPs

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Backbone
High-speed, high-capacity data transmission lines, usually
fiber optic
Uses the newest technology
Providers include AT&T, Sprint, Verizon, CenturyLink, and
Deutsche Telekom
Internet 2
Cooperative university/business education and research project
Adds new “toll lanes” to older Internet to speed things up
Advances videoconferencing, research, collaboration
20
Internet Connections: Backbone, & Internet2

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
21
Panel 2.5
Page 59
How the Internet works

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Communications: Protocols, Packets, & IP Addresses
Handshaking & Authentication: Connecting to your ISP’s point of presence (POP)
Handshaking—fastest transmission speed established
Authentication—correct password & user name
Protocols
The set of rules a computer follows to electronically transmit data.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol
Developed in 1978 by ARPA; used for all Internet transactions
Packets
Fixed-length blocks of data for transmission, determined by TCP/IP
Data transmissions are broken up into packets and re-assembled at destination (the IP—Internet Protocol— address)
22

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Every device connected to the Internet has an address
Each IP address uniquely identifies that device
The address is four sets of numbers separated by periods (e.g., 1.160.10.240)
Each number is between 0 and 255
Dynamic IP addresses change with every use; individual computer users are assigned static IP addresses when they log on
Static IP addresses don’t change (established organizations – including ISPs – and companies have static IP addresses, which they pay for)
23
IP (Internet Protocol) Addresses

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Who Runs the Internet?
Basically, no one owns the Internet
The board of trustees of the Internet Society (ISOC) oversees the standards
Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain names (such as .com, edu., .net) that overlie IP addresses; ICANN does not control content
24

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.3 The World Wide Web
25

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Face of the Web: Browsers, Websites, & Web Pages
The World Wide Web brought multimedia to the Internet.
The web and the Internet are not the same; the web is multimedia-based, and the Internet is not. The Internet is the infrastructure that supports the web.
A browser is software that gets you to websites and their individual web pages and displays the content in such a way that the content appears mostly the same regardless of the computer, operating system, and display monitor.
Examples = Internet Explorer
Mozilla FireFox
Apple Macintosh’s Safari
Google’s Chrome
Microsoft’s Bing
26

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Website
The location on a particular computer (server) that has a unique address; example = www.barnesandnoble.com, www.mcgraw-hill.com
The website (server) could be anywhere — not necessarily at company headquarters
Web Page
A document on the web that can include text, pictures, sound, and video
The first page on a website is the Home page
The Home page contains links to other pages on the website (and often other websites)
27

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Uniform Resource Locator (URL): address for a web page
A character string that points to a specific piece of information anywhere on the web
A website’s unique address
It consists of
The web protocol, http://
The domain name of the web server
The directory name or folder on that server
The file within the directory, including optional extension
28
How the Browser Finds Thing: URLs

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
TCP/IP— As explained (p. 60), general Internet Protocol
HTTP—Protocol Used to Access World Wide Web
Hypertext Markup Language (HTML)
The “markup” language used in writing and publishing web pages
Set of instructions used to specify document structure, formatting,
and links to other documents on the web
Hypertext links connect one web document to another
29
The Nuts & Bolts of the Web: HTML & Hyperlinks

Tim Berners-Lee saw the possibility of using hyperlinks to link any information to any other information over the Internet.
hypertext link

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web browsers interpret HTML and allow you to move around the Internet and the web
Come preinstalled on most PCs, but you can download others
5 basic elements
URL (address)bar
Menu bar
Toolbar
Workspace
Status bar
(displays current status of the
web age; 100% = fully loaded)

30
Using Your Browser to Get around the Web

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Browser’s Home Page
The page you see when you open your web browser
You can change the Home Page on your browser
Back, Forward, Home
Use the browser’s icons to move from one page to another (these icons can appear on different bars in different browsers)
31

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Navigation
History List
A list of websites you visited since you opened up your browser for this session
Allows you to easily return to a particular site
Bookmark
Allows you to store the URL from a site on your computer so you can find it again in another browser session
To save the URL for a site, click on “Favorites” in Internet Explorer, “Bookmarks” in Mozilla Firefox, or the star icon in the URL address bar in Chrome

32

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Interactivity with a web page
Click on hyperlinks to transfer to another page
Click on a radio button to choose an option
Type text in a text box
and then hit Enter
Click on scroll arrows to move up and down,
or side to side, on a page
Click on different frames
(separate controllable
sections of a web page)
33

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web portals: Starting points for finding information
A portal is gateway website that offers a broad array of resources and services, online shopping malls, email support, community forums, stock quotes, travel info, and links to other categories
Examples: Yahoo!, Google, Bing, Lycos, and AOL
Most require you to log in, so you can
Check the Home page for general information
Use the subject guide to find a topic you want
Use a keyword to search for a topic
34

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Search Services & Search Engines
Organizations that maintain databases accessible through websites to help you find information on the internet
Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast
Search services maintain search engines—programs that users can use to ask questions or use keywords to find information
Databases of search engines are compiled using software programs called spiders (crawler, bots, agents)
Spiders crawl through the World Wide Web
Follow links from one page to another
Index the words on that site
A search never covers the entire web
Search engines differ in what they cover
35

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
1. Individual Search Engines
Compile their own searchable databases on the web
You search by typing keywords and receiving “hits”
Examples are Ask, Bing, Google, and Yahoo!
2. Subject Directories
Created and maintained by human editors, not electronic spiders
Allow you to search for information by selecting lists of categories or topics
Example sites are Beaucoup!, LookSmart, Open Directory Project, and Yahoo! Directory
36
(continued)
Four Web Search Tools

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. Metasearch Engines
Allows you to search several search engines simultaneously
Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler
4. Specialized Search Engines
Help locate specialized subject matter, such as info on movies, health, jobs
Examples are Career.com. WebMD, Expedia, U.S. Census Bureau
37

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Smart Searching: Three General Strategies
If you’re just browsing . . .
Try a subject directory
Next try a metasearch engine
If you’re looking for specific information . . .
Try a Answers.com “one-click” search
Or go to a general search engine, then a specialized one
If you’re looking for everything on a subject . . .
Try the same search on several search engines
38

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Wikis & Wikipedia
A wiki is a simple piece of software that can be downloaded for free and used to make a website (also called a wiki) that can be corrected or added to by anyone.
Wikipedia is a free online encyclopedia that anyone around the world can contribute to or edit. It has more than 25 million articles in more than 285 languages; over 4.1 million articles appear in the English Wikipedia alone. However, Wikipedia is not considered reliable or authoritative by many academics and librarians.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Still images—e.g., Google Image Search, Bing Images, Fagan Finder
Audio—e.g., Yahoo! Music, Lycos MP3 Search
Video—e.g., AlltheWeb, AOL.video
Scholarly—e.g., Google Scholar
40

Multimedia Search Tools

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tags: Do-it-yourself labels that people can put on anything found on the Internet, from articles to photos to videos, that help them to find their favorite sites again and to link them.
Can be shared easily with other people
Tags are commonly used on blogs and YouTube – word listed at the bottom. Essentially tags are keywords used to classify content.  (The # is a hash symbol; thus the Twitter term hashtag. )
Tag managing is available through delicious.com and BlinkList, among other companies.
41
Tagging

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 2B: The Riches & Risks of Internet Use

42

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.4 Email, Instant Messaging, & Other Ways of Communicating over the Net
43

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Email
Outgoing mail: sent from your computer to a Simple Mail Transfer Protocol (SMTP) server run by your ISP
Incoming mail: Email sent to your computer: uses Post Office Protocol version 3 (POP3)
44

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
45
Page 77

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Two ways to send & receive email:
1. Email Program
Enables you to send email by running email software on your computer that interacts with an email server at your Internet access provider
Incoming mail is stored on the server in an electronic mailbox
Upon access (your ID and password), mail is sent to your software’s inbox
Examples: Microsoft Outlook, Apple Mail
2. Web-Based Email
You send and receive messages by interacting via a browser with a website
Advantage: You can easily send and receive messages while traveling, using any computer or equipped mobile device
Examples: Yahoo! Mail and Gmail (Google)
Disadvantages are ads and email hacking

46

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using email
Get an email address from your ISP, following this format:
47

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tips for Using Email
1. Use the address-book feature to
store email addresses
2. Use folders to organize email
3. Be careful with attachments
4. Be aware of email netiquette
48

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Email Attachments
A copy of a file or document that you send attached to an email to one or more people
Recipients must have compatible software to open the attachment; for example, if they don’t have Excel, they probably can’t read the spreadsheet you sent them.
Be careful about opening attachments:
Many viruses hide in them; scan them with antivirus software
Know who has sent the attachment before you open it
49

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Netiquette: Appropriate Online Behavior
Don’t waste people’s time.
Don’t write anything that you would not say to a person’s face.
Include helpful subject and signature lines.
Be clear and concise.
Avoid spelling and grammatical errors.
Avoid SHOUTING and flaming.
Also:
Be careful with jokes.
Avoid sloppiness, but avoid criticizing other’s sloppiness.
Don’t send huge file attachments unless requested.
When replying, quote only the relevant portion.
Don’t overforward (don’t copy emails to everyone you know).
50

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Instant Messaging
Instant messaging enables you to communicate by email with
specified other users (“buddies”) in real time.
Any user on a given email system can send a message and have it pop up instantly on the screen of anyone logged into that system.
To get IM: Download IM software from a supplier
Examples: AOL/AIM, Google Chat, Windows Messenger, Yahoo! Messenger
Done on computers; is not the same as texting.
51

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Discussion Groups
Mailing Lists:
One-way (to make announcements) or two-way (for discussions) email subscription lists
Email discussion groups on special-interest topics, in which all subscribers receive email messages sent to the group’s email address
Newsgroups:
Giant electronic bulletin board for written discussions about specific subjects
To participate you need a newsreader program
Message Boards:
Special-interest discussion groups without newsreaders
Accessed through a web browser
A collection of messages on a particular topic is called a thread

52

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
FTP (File Transfer Protocol)
Software standard for transferring large files between computers, including those with different operating systems
You can also transfer files from an FTP site on the Internet to your PC
FTP sites offer many free files
FTP sites may be either public or proprietary
You can download using your web browser or FTP client programs, such as Fetch, Cute, FileZilla, and SmartFTP
53

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.5 The Online
Gold Mine
Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & Social Networking

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

Telephony: The Internet Telephone
Uses the Internet to make phone calls via VoIP (Voice over Internet Protocol)
Long-distance calls are either very inexpensive or free
With no PC, dial a special phone number to packetize your call for a standard telephone
Use with a PC that has a sound card, microphone, Internet connection with modem & ISP, and internet telephone software such as Skype and Vonage
Also allows videoconferencing
55

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Multimedia on the Web
Allows you to get images, sound, video, and animation
May require a plug-in, player, or viewer
A downloadable program that adds a specific feature to a browser so it can view certain files
Examples: Flash, RealPlayer, QuickTime
Multimedia Applets
Small programs that can be quickly downloaded and run by most browsers
Java is the most common Applet language
Text & Images: great variety available
Example: Google Earth
56
(continued)

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Animation
The rapid sequencing of still images to create the appearance of motion
Used in video games and web images that seem to move, such as banners
Video & Audio
Downloaded completely before the file can be played, or
Downloaded as streaming video/audio
Examples: RealVideo and RealAudio
57

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Web Automatically Comes to You
Push technology: Software that automatically downloads information to personal computers.
Webcasting: Sending users customized text, video, audio on regular basis.
RSS newsreaders (RSS aggregators): Programs that scour the web, sometimes hourly, sometimes more frequently, and pull together in one place “feeds” from several websites. RSS is based on XML, or extensible markup language, a web-document tagging and formatting language that is an advance over HTML and that two computers can use to exchange information.
58

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

XML and RSS have led to blogs and blogosphere.
Blogs (weblogs) are frequently updated sites on the web intended for public consumption that contain a writer’s observations, opinions, images, and links to other websites.
Podcasting: Internet radio or similar Internet audio program delivered via RSS feed to a subscriber to be played back on computer or digital audio device.

59

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
E-Commerce: B2B, B2C, & C2C
E-Commerce (electronic commerce): conducting business activities online
E-commerce has led to showrooming, the phenomenon in which shoppers browse for products in stores, only to buy them from an online rival, frequently at a lower price.
B2B is business-to-business e-commerce.
Business-to-consumer commerce, or B2C, is the electronic sale or exchange of goods and services from the companies directly to the public, or end users (e.g., online banking, online shopping, online stock trading).
Consumer-to-consumer commerce, or C2C, is the electronic sale or exchange of goods and services between individuals (e.g., auctions).

60
Discussion Question: Have you every sold anything on eBay? Used PayPal? Did you have any problems? What would you warn people about?

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web 2.0: The Social Web
Web 2.0 refers to the web viewed as a medium in which interactive experience, in the form of blogs, wikis, forums, social networking, and so on, plays a more important role than simply accessing information.
The move toward a more social, collaborative, interactive, and responsive web; has led to the “social web,” giving rise to:
Social networking sites: Online communities that allow members to keep track of friends and share photos, videos, music, stories, and ideas (e.g., Facebook, LinkedIn).
Media-sharing sites: Online social networks in which members share media such as photos, videos, music, ideas (e.g., YouTube, Flicker, Shutterfly).
Social-network aggregators: Collect content from all of a user’s various social network profiles into one place, then allow him or her to track friends and share other social network activities (e.g., Mugshot, Readr).

61

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
In Web 3.0, information will be computer-generated with less human interaction required to discover and integrate that information.
Two ideas might form the basis for Web 3.0— semantic markup and a personal browser.
Semantic markup: Data interchange formats that will allow machines to understand the meaning—or “semantics”—of information on the web.
The Web 3.0 browser will probably act as a personal assistant because every user will have a unique Internet profile based on his or her browsing history. The more you use the Web, the more your browser learns about you and the less specific you’ll need to be with your questions.
62
Web 3.0: Computer-Generated Information

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.6 The Intrusive Internet
Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, & Malware

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Snooping
Email is not private
Corporate management has the
right to view employees’ email.
Friends can send email anywhere.
Not all ISPs protect their customers’ privacy.
Deleted emails can be retrieved from a hard disk.
64

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spam: Electronic Junk Mail
Unsolicited email that takes up your time.
Delete it without opening the message.
Never reply to a spam message.
Do not click on “unsubscribe” at the bottom of an email.
When you sign up for something, don’t give your email address.
Use spam filters.
Fight back by reporting new spammers to www.abuse.net or www.spamhaus.org.
65

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spoofing
Using fake email sender names so the message appears to be from a
different source, so you will trust it.
If you don’t know the sender, don’t open it.
Phishing
Sending forged email directing recipient to fake website.
Purpose: to entice people to share personal or financial data.
Fake website looks like real website, such as a bank’s.
Pharming
Implanting malicious software on a victim’s computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser.
Use websites with URLs that begin with “https://
Some spyware removal programs can correct the corruption.

66

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
67
Phishing examples

“YOUR NET ID ACCOUNT” Phishing Scam (3/31/2013)
https://wiki.library.ucsb.edu/display/SYSPUB/Latest+Phishing+Attempts
Phishing Examples

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Little text files left on your hard disk by some websites you visit.
Can include your log-in name, password, browser preferences, and credit card information.
Every time you load a particular website, the browser sends the cookie back to the server to notify the website of your previous activity.
Can make visiting these websites next time more convenient and faster.
But cookies can be used to gather information about you and your browsing habits and history; this information can be used without your consent.
A first-party cookie is a cookie from a website that you have visited. Third-party cookies are placed by trusted partners of the websites you visit. (Third-party cookies are frequently placed by ad networks.)
68
Cookies

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spyware is software surreptitiously installed on your computer via the web.
Spyware hides on your PC/device and captures information about what is on the it, such as keystrokes and passwords
69
Spyware : Adware, Browser & Search Hijackers, & Key Loggers

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Adware, or pop-up generator, is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads.
Browser hijackers change settings in your browser without your knowledge, often changing your browser’s home page and replacing it with another web page.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Search hijackers intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run.
Key loggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the Internet, making it possible for strangers to learn your passwords and other information.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Malware
There are many forms of malicious software—so-called malware—that can harm a computer system, a common danger being viruses.
A virus is a rogue program that migrates through the Internet or via operating systems and attaches itself to different programs that spread from one computer to another, leaving infections.
The principal defense is to install antivirus software, which scans a computer to detect viruses and, sometimes, to destroy them.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How to Reduce Malware Risks
Download virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton AntiVirus ( www.symantec.com/nav ); then follow instructions for installing it on your machine. (Don’t use antivirus software from companies you know nothing about.)
Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that. Also scan any new CDs and drives before using them.
Don’t open, download, or execute any files, email messages, or email attachments if the source is unknown or if the subject line of an email is questionable or unexpected.
Delete all spam and email messages from strangers. Don’t open, forward, or reply to such messages.
Use webmail sparingly, since viruses can hide in the HTML coding of the email. Even
the simple act of previewing the message in your email program can activate the virus
and infect your computer.
Don’t start your computer with a flash drive, USB thumb drive, or CD/DVD in place.
Back up your data files regularly, and keep at least one backup device in a location separate from your computer or use an online (cloud) backup service.
If you discover you have a virus, ask McAfee or Norton to scan your computer online; then follow its directions for cleaning or deleting the virus. (A computer tech person can do this, too.)

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Passwords
Never choose a real word or variations of your or your family’s name, address, phone number, Social Security number, license plate, or birth date.
Don’t use passwords that can be easily guessed, such as “12345” or “password.”
Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and punctuation marks in an oddball sequence of no fewer than eight characters, such as 2b/orNOT2b% and Alfred!E!Newman7. Or choose a password that is memorable but shift the position of your fingers on the keyboard, so that, for instance, TIMBERWOLVES becomes YO,NRTEP;BRD when you move your fingers one position right. For sensitive sites, such as financial accounts, create long passwords, such as 15-character passwords.
Don’t use the same password for multiple sites, so that if someone obtains the password to one account, that person won’t have access to your entire online life.
Don’t write passwords on sticky notes or in a notebook or tape them under your keyboard. Don’t carry the passwords in your wallet. If you have to write down all your passwords, find a safe place to put the paper, or use a software password manager, such as Kaspersky Password Manager, RoboForm Everywhere, or Last Pass Premium.

Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.

1. What does online mean?

A:

Online, in a generic sense, refers to when an electronic device is on and connected to other devices, such as another computer, a network or a device such as a printer.

2. What is the difference between system software and application software?

A: System software is used for operating computer hardware. On other hand Application software is used by user to perform specific task. System software are installed on the computer when operating system is installed. On other hand Application software are installed according to user’s requirements.

3. Briefly define cyberspace.

A;

4. What is the difference between software and hardware?

A: Computer hardware is any physical device used in or with your machine, whereas software is a collection of programming code installed on your computer’s hard drive. In other words, hardware is something you can hold in your hand, whereas software cannot be held in your hand.

5. What is multimedia?

A: Multimedia is the field concerned with the computer-controlled integration of text, graphics, drawings, still and moving images (Video), animation, audio, and any other media where every type of information can be represented, stored, transmitted and processed digitally.

6. What is the difference between microcomputers and supercomputers?

A: Microcomputers are general-purpose computers that are mostly used for daily work that performs all logic and arithmetic operations. While supercomputer is used for complex and large mathematical computations. … Microcomputers are small in terms of size. While the size of a supercomputer is very large.

7. What is the function of RAM?

A: Computer random access memory (RAM) is one of the most important components in determining your system’s performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

8. What does downloading mean?

A: Downloading means your computer is receiving data from the Internet.

Examples of downloading include opening a web page, receiving email, purchasing music files and watching online videos.

9. What is meant by connectivity?

A: the state or quality of being connected or connective: the benefits of global connectivity. Digital Technology. the ability to link to and communicate with other computer systems, electronic devices, software, or the internet: This laptop has limited connectivity.

10. Describe some ways that information technology can be used to help people find jobs and to help jobs find people.

A;

11. Compare the use of email to the use of the telephone and of conventional letters sent via the postal system. Which kinds of communications are best suited for which medium?

A:

12. What is the basic meaning of cloud computing?

A:

13. Name three methods of data transmission that are faster than a dial-up connection.

A:

14. What is netiquette, and why is it important?

A: Netiquette is important as online communication is non-verbal. You have to follow Internet etiquette because there are other people such as your friends, relatives, elders who are using the Internet for all online communications. Hence it is correct to behave properly and write politely to everyone.

15. Briefly define bandwidth.

A:

16. Many web documents are “linked.” What does that mean?

A: The Semantic Web isn’t just about putting data on the web. It is about making links, so that a person or machine can explore the web of data. With linked data, when you have some of it, you can find other, related, data. Like the web of hypertext, the web of data is constructed with documents on the web.

17. Compare and contrast a cable modem service to a DSL service.

A:

18. Explain the basics of how the Internet works.

A: The Internet is made up of a massive network of specialized computers called routers. Each router’s job is to know how to move packets along from their source to their destination. A packet will have moved through multiple routers during its journey. When a packet moves from one router to the next, it’s called a hop.

19. Briefly explain TCP/IP..

A: TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more computers to communicate. The Defense Data Network, part of the Department of Defense, developed TCP/IP, and it has been widely adopted as a networking standard.

20. What’s the difference between a dynamic IP address and a static IP address?

A: When a device is assigned a static IP address, the address does not change. Most devices use dynamic IP addresses, which are assigned by the network when they connect and change over time.

21. State your answer to a person who asks you the question, “Who owns the Internet?”

No one owns it, but there are organizations that determine the Internet’s structure and how it works, but they don’t have any ownership over the Internet itself.

22. How does the Internet affect your life?

The most influential and pervasive impact of the Internet on social life is likely through communication patternsIII.

23. Briefly define booting.

The process of loading OS into the computer’s main memory. Turn the computer on.

Diagnostic routines test main memory, CPU, and other hardware.

Basic Input/Output System (BIOS) programs are copied to main memory.

BIOS contains instructions for operating the hardware.

The computer needs those instructions to operate the hardware and find a copy of the OS.

Boot program obtains the OS and loads it into computer’s main memory

24. What is the difference between a command-driven interface and a graphical user interface (GUI)?

The main difference between GUI and CLI is that the Graphical User Interface (GUI) allows the user to interact with the system using graphical elements such as windows, icons, menus while the Command Line Interface (CLI) allows the user to interact with the system using commands.

25. Why can’t you run your computer without system software?

Because the operating software that makes it tick and provides a platform for programs, like your web browser, to run on. Without an operating system, your laptop is just a box of bits that do not know how to communicate with one another

26. Why is multitasking useful?

Data can be copied and pasted, or dragged and dropped, between programs. May increase productivity, because multiple programs can be running at once. Any changes or updates are seen immediately. For example, if a new e-mail is received, you immediately know.

27. What is a device driver?

in computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer. A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware being used.

28. What is a utility program?

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure – in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users. However, utilities often form part of the application systems. For example, a batch job may run user-written code to update a database and may then include a step that runs a utility to back up the database, or a job may run a utility to compress a disk before copying files.

29. What are the three components of system software? What is the basic function of each?

Application programs, device drivers, and operating systems.

Application software is a type of computer program that performs a specific personal, educational, and business function.

device drivers, the main purpose of device drivers is to provide abstraction by acting as a translator between a hardware device and the applications or operating systems that use it.

An operating system has three main functions: (1) manage the computer’s resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

30. What is open-source software?

Open-source software is a type of computer software in which source code is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software to anyone and for any purpose.

31. What are the following types of application software used for?

a. project management software

Project management software helps project managers (PMs) and teams collaborate and meet goals on time while managing resources and cost. Functions may include task distribution, time tracking, budgeting, resource planning, team collaboration, and many more.

b. desktop-publishing software

Desktop publishing software can generate layouts and produce typographic-quality text and images comparable to traditional typography and printing. Desktop publishing is also the main reference for digital typography.

c. database software

Database software is designed to create databases and to store, manage, change, search, and extract the information contained within them. A comprehensive database software program is sometimes called a database management system.

d. spreadsheet software

Spreadsheet software is a software application capable of organizing, storing and analyzing data in tabular form. The application can provide digital simulation of paper accounting worksheets. They can also have multiple interacting sheets with data represented in text, numeric or in graphic form.

e. word processing software

Word processing software is defined as a computer program that lets you type words or text which shows up in a virtual “document” on your computer screen which can, in turn, be printed or sent electronically. Microsoft Word is an example of word processing software.

32. Explain what computer-aided design (CAD) programs do.

Programs intended for 2D and 3D design of products, structures, civil engineering drawings and maps.

IV

33. What is ASCII, and what do the letters stand for?

ASCII codes represent text in computers, telecommunications equipment, and other devices.

It stands for American Standard Code for Information Interchange.

34. Why should measures of capacity matter to computer users?

Because it notifies how much area is available on the computer memory. Computer storage capacity can rely upon how much disk space can be free in one or more devices.

35. What’s the difference between RAM and ROM?

RAM, which stands for random access memory, and ROM, which stands for read-only memory, are both present in your computer. RAM is volatile memory that temporarily stores the files you are working on. ROM is non-volatile memory that permanently stores instructions for your computer.

36. What is the significance of the term gigahertz?

Abbreviation for gigahertz. One GHz represents 1 billion cycles per second. The speed of microprocessors, called the clock speed, often is measured in gigahertz. … Each computer instruction requires a fixed number of cycles, so the clock speed determines how many instructions per second the microprocessor can execute.

37. What is a motherboard? Name at least four components of a motherboard.

A printed circuit board (PCB) which is located on the posterior of the computer frame is also known as motherboard. It will grant power and connection to the computer hardware components, CPU, and RAM.

38. What are the most convenient forms of backup storage? Why?

Commercial clouds. These services provide a full-time access for your backups, but the connection speed can be compromised by Internet provider settings and circumstances. Despite this fact, clouds are the most convenient and modern way to store data including backups.

39. Why is it important for your computer to be expandable?

Scalable hardware or software can expand to support increasing workloads. This capability allows computer equipment and software programs to grow over time, rather than needing to be replaced.

40. What is nanotechnology?

Tiny machines work at a molecular level to make nano-circuits.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP