Solution Manual For Computing Essentials 2023 29th Edition by Timothy O'Leary and Linda O'Leary and

Page 1


Solution Manual For th

Computing Essentials 2023 29 Edition by Timothy O'Leary and Linda O'Leary and Daniel O'Leary Chapter 1-13

Chapter 1 Information Technology, the Internet, and You Lecture Guide 

Learning Objectives o Explain the parts of an information system: people, procedures, software, hardware, data, and the Internet. o Distinguish between system software and application software. o Differentiate between the three kinds of system software programs. o Define and compare general purpose, and specialized, and mobile applications. o Identify the four types of computers and the five types of personal computers. o Describe the different types of computer hardware, including the system unit, input, output, storage, and communication devices. o Define data and describe document, worksheet, database, and presentation files. o Explain computer connectivity, the wireless revolution, the Internet, cloud computing and loT.

Chapter Outline 

Information Systems o Parts to an information system:  People – end users  Procedures – rules or guidelines to follow when using software, hardware, and data  Software – programs that consists of step-by-step instructions that tell the computer how to do its work  Hardware – the equipment that processes data to create information  Data – raw, unprocessed facts, including text, numbers, images and sounds  Internet - Almost all information systems provide a way to connect to other people and computers expanding the capability and usefulness of information systems. People o Most important part of any information system o Our lives are touched every day by computers and information systems. o A variety of features throughout the book help you to become a more efficient and effective end user  Making IT Work for You  Practical IT applications  Tips 1-1

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


   

Numerous tips to make your computing safer, more efficient, and more effective Privacy  Important information on protecting the privacy of your personal information Environment  Important relevant environmental information Ethics  Numerous different ethical/unethical situations for your consideration Careers in IT  Specific careers in information technology providing job descriptions, projected employment demands, educational requirements, current salary ranges and advancement opportunities.

Procedures o Computer users are required to follow rules or guidelines in order to effectively use software, hardware, and data. o Procedures are typically documented in manuals written by computer specialists. o Software and hardware manufacturers provide manuals with their products and are provided either printed or in electronic form. Software o Programs – the instructions that tell computers how to process data o Two major types of software:  System Software is software the computer uses  Enables application software to interact with computer hardware  System software is ―background‖ software that helps the computer to manage its own internal resources.  A collection of programs o Operating system – coordinate computer resources, provide a user interface, and run applications; Windows 10 and Mac OS are stand-alone operating systems.  Tablets, Smartphones, and other mobile devices use embedded operating systems known as RTOS (real-time operating systems).  Networks use network operating systems (NOS). o Utilities – perform specific tasks related to managing computer resources. One of the most essential utility programs that every computer system should have is an antivirus program.  Application Software is software for end users.  Three types – general-purpose, specialized, and apps o General-purpose applications are widely used in nearly all careers. Examples include word processor, 1-2

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


spreadsheet, database management system, and presentation applications. o Specialized applications are narrowly focused on specific disciplines and occupations. Examples include graphics and web authoring programs. o Mobile apps, also known as mobile applications, or simply apps, are small programs designed for mobile devices such as smartphones and tablets. The most popular mobile apps are for social networking, playing games, and downloading music and videos. 

Hardware o Four types of computers  Supercomputers  Most powerful type of computer  Special high-capacity computers  Fastest processing massive amounts of data  Used by large organizations  Used to analyze and predict worldwide weather patterns  IBMs Blue Gene  Mainframe  Capable of great processing speeds and large amounts of data storage, though not as powerful as supercomputers  Used by large corporations  Midrange  Also referred to as servers  Less powerful than a mainframe computer but more powerful than a personal computer  Support or serve end users for specific needs such as retrieving data from a database or supplying access to application software  Personal, also known as PCs  Least powerful  Most widely used  Fastest growing segment  Five types of personal computers include: o Desktops  Fits on top of a desk  Too big to carry around o Laptops, also known as notebook computers  Portable and lightweight  Fit in most briefcases o Tablets, also known as tablet computers  Smaller, lighter, and generally less powerful than laptops  Typically use a virtual keyboard that appears on screen and is touch sensitive o Smartphones 1-3

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

The most widely used personal computer Cell phones with wireless connections to the Internet and processing capabilities o Wearables  Mobile computer  Like Apple‘s watch o Cell Phones  Another type of computer  Many of the same components as desktops, laptops, and tablets  Capable of connecting to the Internet and running apps o Personal Computer Hardware  System unit – houses electronic components that make up a computer system  Two important components are the microprocessor and memory. o The microprocessor controls and manipulates data to produce information. o Memory is a holding area for data, instructions, and information.  One type, random-access memory (RAM), holds the program and data that is currently being processed; known also as temporary storage.  Temporary storage contents will typically be lost if the electric power to the computer is disrupted.  Input/output devices translate data and programs that humans can understand into a form that the computer can process.  Input devices o Common input devices–keyboard and mouse  Output devices translate the processed information form the computer into a form that humans can understand. o Most common output device is the display, also known as a monitor.  Secondary storage holds data and programs even after electrical power to a computer system is off.  The most common secondary media are hard disks, solid-state storage, and optical disks.  Hard disks-typically store programs and very large data files on rigid metallic platters.  Solid-state-no moving parts, reliable, requires less power  Optical, use laser technology to store data and programs o Three types of optical discs include compact discs (CDs), digital versatile (or video) discs (DVDs), and Blue-ray discs (BD).  Communication/Communication devices communicate with other computer systems using the Internet. 1-4 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Modem is a widely used communication device that modifies audio, video, and other types of data so it can be transmitted over the Internet.

Data o o o o o

Raw unprocessed facts including text, numbers, images, and sounds Processed data becomes information. Stored electronically in files Can be used as input for system unit Four common types of files include:  Document files – created by word processors that include memos, term papers, and letters  Worksheet files – created by electronic spreadsheets to analyze things like budgets and predict sales  Database files – created by database management programs to contain highly structured and organized data  Presentation files - created by presentation software that may contain audience handouts, speaker notes, and electronic slides Connectivity and the Mobile Internet o Connectivity is the capability of a personal computer to share information with other computers. o Central to the concept of connectivity is the network, a communications system connecting two or more computers o The Internet is the largest computer network in the world. o The web provides a multimedia interface to the resources available on the Internet. o The Internet has driven the evolution of computers and their impact on our daily lives. o Three things driving the impact of technology on peoples‘ lives, in addition to the Internet, include cloud computing, wireless communication, and the Internet of Things (IoT).  Cloud computing uses the Internet and the web to shift computer activities from a user‘s computer to computers on the Internet.  Users use the Internet to connect to the cloud and access more powerful computers, software, and storage.  Wireless communication has changed the way we communicate.  Experts predict that wireless applications are just the beginning of the wireless revolution which will dramatically affect communication and computer technology use.  The Internet of things (IoT) is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.  It promises to connect all types of devices, from computers to cell phones to watches to any number of everyday devices. o Wireless communication, cloud computing, and IoT are driving the mobile Internet. Careers in IT o There are different types of IT careers highlighted in each chapter. 1-5

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 Web Developer  Software engineer  Computer support specialist  Computer technician  Technical writer  Network administrator A Look to the Future o Using and Understanding Information Technology  The purpose of this book is to help you use and understand information technology.  The Internet and the Web are considered the two most important technologies of the 21st Century.  Powerful Software is available to do an extraordinary number of tasks and help individuals in an endless number of ways.  Powerful Hardware includes personal computers that are more powerful than ever. o Cell phones, tablets, and communication technologies such as wireless networks are dramatically changing the ways to connect to other computers, networks and the Internet.  Privacy, Security, and Ethics are necessary as technology can impact our personal privacy and our environment. o Awareness of how technology can affect our personal privacy and our environment is essential.  Organizations rely on the quality and flexibility of their information systems to stay competitive.  Changing Times indicate that we live in a fast-paced age; look at the Evolution of the Computer Age section which tracks the major developments since computers were first introduced.

1-6 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

Information Systems o The purpose is to help students become highly efficient and effective computer users. This first chapter is an overview of an information system. Users need to recognize and understand:  Personal computers are common tools in all areas of life.  The wireless revolution is going to happen.  The role of information technology in personal and professional lives People o Provide examples of how people are the most important part of the information system as people encounter computers almost every day in some way. o Ask the students to talk about the computers they use daily - both directly and indirectly. For example, computers are in microwaves, traffic lights, cars, etc. Which are direct uses, and which are considered indirect? o As end users – there are different features to promote becoming efficient and effective computer users. Explain how the following textbook features can and will help students to better understand computers:  Making IT Work for You  Tips  Privacy  Environment  Ethics  Careers in IT Software o Emphasize that there are two types of software –  System software is not a single program rather it is a collection of programs.  System software is the collection of ―background‖ software that helps the computer manage its own resources.  Utilities perform specific tasks related to managing computer resources.  Application Software might be described as end user software. There are three types of application software – general purpose, specialized and apps. o Engage the students in a discussion by asking them to name different types of System Software and Application Software. Further the discussion by asking students to differentiate between the three types of Application software how they use computers, which will help emphasize the importance of application software as well as mobile apps on cell phones. Hardware o Emphasize the basic categories of computer hardware. Give examples of each. o Mention that the categories are determined by their storage capacity and processing speeds. Mention examples of uses of computers in each category. o Emphasize that personal computers are the least powerful, yet the most widely used. Ask students for reasons. o Review the five types of personal computers. 1-7

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Review the four basic categories of personal computer hardware: system unit, input/output, secondary storage, and communication. Data o Data is raw, unprocessed facts, including text, numbers, images and sounds. o Data is stored electronically in files. o See Figure 1-16 for the four most common types of files: presentation, database, worksheet, and document. Connectivity and the Mobile Internet o A dynamic shift in connecting has been the widespread use of mobile or wireless communication devices and cloud computing. See Figure 1-17 for illustrations of the devices. o Discuss what cloud computing is and how it is used. o Ask the students to define and discuss the Internet of Things (IoT) and the continuing development allows everyday objects embedded with electronic devices to send and receive data over the Internet. Careers in IT o Figure 1-18 is a good reference for the different types of careers in IT. Each provides specific job descriptions, salary ranges, and advancement opportunities. What computer related jobs do students think about when computer careers are mentioned? The list in Figure 1-18 helps to bring a broader awareness of what exists and what may interest them. A Look to The Future o Review and discuss with students the six important information technology developments:  The Internet and the Web  Powerful Software  Powerful Hardware  Privacy, Security, and Ethics  Organizations  Changing Times

1-8 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term application software apps Blu-ray disc (BD) cloud computing communication device compact disc (CD) connectivity data database file desktop computer digital versatile disc (DVD)

digital video disc (DVD)

display document file embedded operating systems (RTOS) end user general-purpose application hard disk hardware information information system information technology (IT) input device Internet IoT (Internet of Things)

keyboard laptop computer

Definition End user software Small programs designed for mobile devices Optical disc using laser technology to store data and programs Uses the Internet and the web to shift many computer activities from a user‘s computer to computers on the Internet Computer equipment that allows a computer to connect to other computer systems to share data and information Optical disc that stores data and programs Provides the capability for computers to connect and share information with other computers Unprocessed facts including text, numbers, images, and sound Typically created by database management programs to contain highly structured and organized data Use standalone operating systems like Windows 10 or macOS Optical device that provides great storage capacity and can be used to store many different types of data (See also digital video disc) Optical device that provides great storage capacity and can be used to store many different types of data (See also digital versatile disc.) A monitor used to display information Created by word processors Embedded operating system known as real-time operating system used in cell phones, tablets and other mobile devices People, the most important part of an information system (See also people) Application software that is used in nearly all careers Secondary storage device that uses magnetized charges to store information and programs Physical equipment, controlled by software and processes data to create information Processed facts How the critical parts of technology interact Relates to computer software and hardware, and data Include keyboard and mouse and are translators between humans and computers The largest computer network in the world The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet Input device that allows the user to input character data into the computer Also known as a notebook computer, is lightweight and 1-9

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Term

Definition

portable mainframe computer Computer that is capable of great processing speeds and data storage memory Holds data and program instructions currently being processed (See also random-access memory) microprocessor An important component of a computer system, controls and manipulates data to produce information midrange computer Most widely used to support end users for specific needs such as retrieving data from a database or supplying access to application software mobile app (application) Known as apps and are small programs primarily designed for mobile devices such as cell phones and tablet computers modem Modifies audio, video, and other types of data into a form that can be transmitted across the Internet monitor Most common output device that displays the output mouse Input device that allows the user to point and click on items network A communications system connecting two or more computers network operating system Used by a network to coordinate network resources notebook computer Microcomputer, also known as a laptop, that is portable, lightweight, and fits into most briefcases operating system Coordinates computer resources, provides an interface, and runs applications optical disc Secondary storage device that uses laser technology and is used to hold data and programs output device Translator between humans and computers, most common output device is the computer monitor PC Personal Computer people The most important part of an information system (See also end user) personal computer PC presentation file Created by presentation graphics programs to save presentation materials procedures Rules or guidelines for people to follow when using software, hardware, and data program Step-by-step instructions that tell the computer how to do its work (See Software) random-access memory (RAM) Holds data and program instructions that is currently being processed (See also memory) real-time operating system Embedded operating systems used in mobile devices (See embedded operating system) secondary storage Holds data and programs even after electrical power to the computer system has been turned off server Most widely used to support end users for specific needs such as retrieving data from a database or supplying access to application software (See midrange computer) smartphone Most widely used handheld computer. Smartphones are cell 1-10 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Term

software solid-state storage specialized application

stand-alone operating system supercomputer system software

system unit tablet

tablet computer

utility virus wearable web wireless communication wireless revolution worksheet file

Definition phones with wireless connections to the Internet with processing capabilities. Step-by-step instructions that tell the computer how to do its work (See also program) Secondary storage device that has no moving parts Computer programs that are narrowly focused on specific disciplines and occupations (See also special-purpose application) Used in desktop computers and include Windows 10 and Mac OS Most powerful type of computer that is a special highcapacity computer used by very large organizations Enables the application software to interact with the computer hardware and helps the computer manage its own internal resources Contains electronic circuitry, including microprocessors and memory Also known as a tablet computer, is smaller and lighter and generally less powerful than a laptop, usually has a flat screen and a virtual keyboard Also known as a tablet, is smaller and lighter and generally less powerful than a laptop, usually has a flat screen and a virtual keyboard A part of the system software that performs specific tasks related to managing computer resources Malicious program that can damage software, hardware, and compromise the security and privacy of your personal data Mobile computer that can be worn Provides a multimedia interface to the numerous resources available on the Internet Communication between wireless communication devices such as cell phones and tablets A revolution that is expected to dramatically affect the way we communicate and use computer technology Created by electronic spreadsheets to analyze things like budgets and to predict sales

1-11 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 1 Num

Multiple Choice Answers

Matching Answers

1 2 3 4 5 6 7 8 9 10

A C A A B D D B A C

G D F J H B A E C I

Open Ended Questions: 1. Explain the parts of an information system. What part do people play in this system? 

People- Personal computers make people, or end users, more productive.

Procedures- Rules or guidelines for people to follow when using software, hardware, and data

Software- A program consisting of the step-by-step instructions that tell the computer how to do its work. The purpose of software is to convert data (unprocessed facts) into information (processed facts).

Hardware- Equipment that processes the data to create information

Data- Raw, unprocessed facts, including text, numbers, images, and sounds

Connectivity- typically uses the Internet and allows users to greatly expand the capability and usefulness of their information systems

People are the most important part of any information system. Lives are touched every day by computers and information systems, directly or indirectly. 2. What is system software? What kinds of programs are included in system software? 

System software enables the application software to interact with the computer hardware. System software is ―background‖ software that helps the computer manage its own internal resources. It is not a single program; it is a collection of programs that include:

1-12 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Operating systems that coordinate computer resources and provide an interface between users and the computer o Utilities which perform specific tasks related to managing computer resources 3. Define and compare general purpose applications, specialized applications, and apps. Describe some different types of general-purpose applications. Describe some types of specialized applications. 

General purpose applications are widely used in nearly all career areas. They are the kinds of programs you must know to be considered an efficient and effective end user.  Examples of general-purpose applications include word processors, spreadsheets, database management systems, and presentation software.

Specialized applications include thousands of other programs that are more narrowly focused on specific disciplines and occupations.  Two examples are graphics, and web authoring programs.

Mobile apps, also known as mobile applications or simply apps are small programs primarily designed for mobile devices such as smartphones, tablets.  The most popular apps are for social networking, playing games, and downloading music and videos.

4. Describe the different types of computers. What is the most common type? What are the types of personal computers? 

There are four types of computers- supercomputers, mainframe computers, midrange computers, and personal computers.

Personal computers are the most widely used and fastest-growing computer type.

There are five types of personal computers- desktop, laptop, tablet, smartphone and wearables.

5. What is connectivity? What is a computer network? What are the Internet and the web? What are cloud computing, the wireless revolution, and IoT? 

Connectivity is the capability of a computer to share information with other computers.

Wireless communication has changed the way we communicate with one another. These wireless applications are just the beginning of the wireless revolution, a revolution that is expected to dramatically affect the way we communicate and use computer technology.

A computer network is a communications system connecting two or more computers.

The largest network in the world is the Internet. It is like a giant highway that connects you to millions of other people and organizations located throughout the world. The web, also 1-13 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


known as the World Wide Web or WWW, provides a multimedia interface to the numerous resources available on the Internet. 

Cloud computing is the ability to store and access programs, files, and other activities via the web and Internet, rather than relying solely on a user‘s computer.

The IoT (Internet of Things) is the continuing development of the Internet allowing everyday objects embedded with electronic devices to send and receive data over the Internet.

1-14 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Chapter 2 The Internet, the Web, and Electronic Commerce Lecture Guide 

Learning Objectives o Explain the origins of the Internet and the web. o Explain how to access the web using providers and browsers. o Compare different web utilities including filters, file transfer utilities, and Internet security suites. o Compare different Internet communications, including social networking, blogs, microblogs, podcasts, wikis, text messaging, instant messaging, and e-mail. o Describe search tools, including search engines. o Describe how to evaluate the accuracy of information presented on the web. o Identify electronic commerce including B2C, C2C, B2B, and security issues. o Describe cloud computing, including the three-way interaction of clients, Internet, and service providers. o Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow everyday objects to send and receive data.

Chapter Outline 

The Internet and the Web o Internet  ARPANET – Advanced Research Project Agency Network  Launched in 1969  Network infrastructure – connects computers around the world o World Wide Web or WWW  Introduced in 1991  Prior to the web the Internet was all text based with no graphics.  Web made it possible to include multimedia resources. o Web 1.0 – defined by the use of search engines that connect everyone to web pages of interest o Web 2.0 – defined by the use of social media that connect friends and family to social media posts  Nontechnical people could be seen and heard on the web.  Example: Facebook o Web 3.0 – defined by the innovation of the semantic web  Identifies relationships between data  Example: Amazon's Alexa and Google Assistant o Web 4.0 – Defined by the use of mobile tools that provide new sources of information for programs to provide users with information  Called the mobile web  programs draw relationships among data  Example: Apple‘s Siri can use your current location, the location of your next calendar event, and local traffic reports on the Internet to alert you to leave early o Beyond 4.0 – Futurists suggest that Web 5.0, called the emotional web, will focus on anticipating our needs based on mood and behaviors 1-15 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Internet and the Web  Are not the same thing  Internet - physical network, made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network  Web – multimedia interface to the resources available on the Internet

1-16 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Uses of the Internet and the web  Communicating - the most popular Internet activity  Exchanging texts, e-mails, photos and videos from almost anywhere in the world  Shopping - one of the fastest growing Internet applications  Searching - finding information has never been so convenient  Education (e-learning) - you can take classes online in almost any subject  Online entertainment - endless opportunities to find news, music, movies, and play video games with friends around the world Internet Access o Once on the Internet the computer becomes an extension of what appears to be a giant computer that branches all over the world. o Providers  Most common way is through an Internet Service Provider (ISP).  Providers are already connected to the Internet and provide a path or connection for individuals to access the Internet.  Commercial Internet providers  Provide access through telephone lines, cable, and/or wireless connections. o Some of the best-known providers in the US include AT&T, Comcast, Spring, T-Mobile, and Verizon. o Browsers  Common to access the Internet from a variety of devices like cell phones, tablets, and laptops. These devices use programs, called browsers, that provide access to web resources.  Connect you to remote computers o Opens and transfers files o Displays text, images, and multimedia o Provides in one tool an uncomplicated interface to the Internet and web documents  Examples: Apple Safari, Google Chrome, Microsoft Edge, and Mozilla Firefox  Differ by what device they work on o Chrome has a mobile version for cell phones and tablets and a desktop version for laptops and desktops. o Mobile browsers designed for smaller touchscreens of mobile devices. o Desktop browsers designed for laptop and desktop computers  Connections to remote computers  Location/address – Uniform Resource Locator (URL)  URL‘s have two basic parts; many have additional parts o First-part is the protocol  Rules for exchanging data between computers  https is used for web traffic and is the most widely used Internet protocol. o Second part is the domain name 1-17 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Specific address where the resource is located  Top-level domain (TLD), or web suffix, – last part of the domain name following the dot (.) which identifies the type of organization. For example .com indicates a commercial site Displaying text and images  Documents displayed within the browser window contain Hypertext Markup Language (HTML), a markup language for displaying web pages.  Browser interprets the HTML code  Displays document as a web page o Web pages can have hyperlinks, or links, that connect to other documents containing related information.  Web pages can also be highly interactive and animated using the following technologies: o JavaScript – a language used within HTML documents to trigger interactive features  Opening new browser windows  Checking information entered in online forms o PHP—language often used within HTML documents to improve a website‘s interactivity  Executes on the website‘s computer and not the user‘s computer like JavaScript typically does o Cascading Style Sheets (CSS) – separate files referenced by or lines inserted into an HTML document controlling the appearance of a web page  Helps to ensure that related web pages have a consistent presentation  Example: Netflix uses CSS to visually connect all its web pages.

Web Utilities o Specialized utility programs that make using the Internet and the web easier and safer to use o Some of these utilities are browser-related programs that either become part of the browser or are executed from the browser, others work as separate stand-alone applications. o Common uses include filtering content and transferring files. o Filters block access to selected sites or set time limits.  By parents or organizations o File transfer utilities are used to copy files (download) to computers from specially configured servers or copy files (upload) from computer to another computer on the Internet. o Three popular types of file transfer  Web-based file transfer services make use of a web browser to upload and download files alleviating the need for custom software to be installed. Examples: Microsoft's OneDrive, Google's Google Drive 1-18 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


BitTorrent distributes file transfers across many different computers for more efficient downloads.  File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP) allow efficient copying of files across the Internet. o Internet Security Suite is a collection of utility programs designed to maintain security and privacy when connected to the web.  These programs control spam, protect against computer viruses, provide filters and more.  Internet security suites include Symantec‘s Norton Internet Security and Bitdefender Internet Security. Communication o The most popular Internet activity o Family, friends, businesses all use electronic communication o Social Networking is the most significant Web 2.0 application.  Connecting individuals to one another  Focus is on connecting people and organizations that share a common interest or activity.  Typically provide a wide array of tools that facilitate meeting, communicating, and sharing  Common features are shared by social networking sites.  Profiles or pages allow you to share information about yourself or your business. Individuals create profiles while businesses create pages.  Groups and Friends the other members on social media that you will communicate with. Friends are individuals you communicate with, while groups are communities of other members that share information and discuss specific topics.  News feed is the first page seen after logging into a social networking site.  Share settings on social media accounts determine who can see posts.  A social network often has an overall focus. o LinkedIn is a popular business-oriented site. o Facebook connects friends and family and also includes news sites, entertainment sites, and a powerful way for businesses and organizations to connect with their audience. o Other popular social networking sites: LinkedIn, Instagram, Pinterest, TikTok, Snapchat o Blogs, Microblogs, Podcasts, and Wikis  These sites help ordinary people communicate across the web.  Many individuals create personal websites, called blogs, to keep in touch with friends and family. o Blog postings are time-stamped and arranged with the newest item first. o Used by individuals, groups, and businesses to share information 1-19 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

o Considered a quick publishing method  Blogger and WordPress are examples of blogs Microblogs – designed to be used with mobile devices and limit the size of posts. o Twitter is an example of a microblog, limiting posts to 280 characters. o Instagram, another example, is designed to share images and video posts with little or no written content. Podcasts – Audio programs delivered over the Internet o Typically, one audio program in a series of related podcasts. Wikis - a web site specially designed to allow visitors to use their browsers to add, edit, or delete the site‘s content o Wikis support collaborative writing for a community of interested people. o Wikis support collaborative writing.  Wikipedia is an example of a wiki. o Creating blogs and wikis are examples of web authoring.

o Messaging o Electronic messaging is a popular way to communicate quickly and efficiently, typically using cell phones.  Text messaging, also known as texting, SMS (short messaging service)  Short electronic message typically less than 160 characters using a wireless network to another person who views the message on a mobile device such as a cell phone.  Multimedia Messaging Service (MMS) allows the sending and receiving images, video, and sound.  Instant Messaging (IM)  Allows two or more people to contact each other via direct live communication  To use, register with an instant messaging service provider  Specify a list of friends  IM notifies you when your friends are online.  Includes video conferencing, file sharing, and remote assistance  Three of the most popular instant messaging services are Facebook Messenger, WhatsApp, and Google Meet. o E-mail or electronic mail  Unlike electronic messaging, E-mail is used to communicate longer and more formal text.  Four Basic elements  Header includes the addresses and subject  Message  Signature  Attachment  Two basic types of e-mail accounts: o Client-based e-mail systems require a special program known as an e-mail client to be installed on a computer. 1-20 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Two of the most widely used e-mail clients are Microsoft‘s Outlook and Apple‘s Mail. o Web-based e-mail systems do not require an e-mail program to be installed on a computer. Most ISPs offer webmail services o Three free webmail service providers are Google‘s Gmail, Microsoft‘s Outlook, and Yahoo!‘s Yahoo! Mail E-mail can be an asset to both personal and professional lives. Some drawbacks include: o Unsolicited and unwanted e-mails known as Spam  Can contain computer viruses and be dangerous  Spam blockers and spam filters identify and eliminate spam.

Search Tools o Over twenty billion pages and more are being added to the Internet daily. o Search services or search providers help users locate the needed information  Maintain huge databases of the pages on the Internet and web  Special automated programs called spiders continually look for new information and update databases.  Search Engines  Specialized programs that help locate information on the web and the Internet  Searches for information based on keywords and phrases and after comparing the entry against its database it returns the search results, or sites that contain the keywords  Each search service maintains its own database so the search results returned by one search engine will not necessarily be the same search results returned by another search engine.  Content evaluation  Not all information found on the web is accurate and has not been subjected to strict guidelines.  Some sites promote fake news or information that is inaccurate or biased.  Manipulated videos known as deep fakes  Designed to look like legitimate news sites  Before you believe a website's claims or share that site with friends and family consider the following: o Authority – is the author an expert? o Accuracy – Read beyond the headlines and consult other reputable sources. o Objectivity – Is the information factually reported? Does the author have a personal bias? o Currency – Is the information up to date? Are the site's links operational? If not, the site is most likely not being actively maintained. Electronic Commerce o Also known as e-commerce 1-21 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Buying and selling of goods over the Internet o Advantages to the buyer  They can buy things 24/7.  They can shop from anywhere. o Advantages to the seller  Lower costs  Reduced inventory  Ship goods directly from warehouse o Disadvantages  Inability to provide goods immediately  Can‘t ―try on‖ purchases  Security concerns with online payments o Business-to-consumer (B2C)  Sale of products and services to the general public or end users  Fastest growing type of e-commerce  Three most widely used B2C applications  Online banking  Financial trading  Shopping o Amazon.com is one of the most widely used B2C sites. o Consumer-to-Consumer (C2C)  Individuals selling to individuals  Consists of electronic version of the classified ads or web auctions  Buyers and sellers seldom meet face to face.  Popular site is etsy.com, Figure 2-19 shows some of the most popular C2C sites. o Business-to-Business (B2B)  Sale of a product or service from one business to another  Typically, a manufacturer-supplier relationship. o Security – The two greatest challenges for e-commerce include:  Developing fast, secure, and reliable payment methods for purchased goods  Digital currency is the Internet‘s equivalent to traditional cash.  Buyers purchase digital cash from a third party that specializes in electronic currency.  Facebook‘s digital cash, Diem, is tied to the US dollar.  Some digital currencies, like bitcoin, have no traditional cash equivalents and their transactions do not involve third party banks. Such a currency is called a cryptocurrency. o Cryptocurrencies use public ledgers, knows as blockchains, to record all transactions of the cryptocurrency. o Nearly impossible to counterfeit the blockchain Cloud Computing o Uses the Internet and the web to shift many computer activities from the user‘s computer to other computers on the Internet o Frees users from owning, maintaining, and storing software and data  Access to services from anywhere through an Internet connection 1-22 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Basic components to cloud computing (See Figure 2-22.)  Clients o Corporations and end users who want access to data, programs, and storage o Access available anywhere and anytime that a connection to the Internet is available o End users do not need to buy, install, and maintain application programs and data.  Internet o Provides the connection between the clients and the providers o Two most critical factors determining the efficiency of cloud computing  Speed and reliability of the user‘s access to the Internet  Internet‘s capability to provide safe and reliable transmission of data and programs  Service Providers o Organizations with computers connected to the Internet that are willing to provide access to software, data, and storage  Providers may charge a fee, or it may be free  Google Drive Apps provide free access to programs with capabilities like Microsoft‘s Word, Excel and PowerPoint through an Internet connection. (See Figure 2-23.) The Internet of Things (IoT) o Becoming more and more part of everyday life o The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet o Everyday objects include cell phones, wearable devices, and even coffee makers o Google Nest is a collection of IoT devices for the home. o Web 3.0 application can access Fitbit data, combine that data with other data on the web, process the data and send information back to another device. Careers in IT o Web developers  Develop and maintain web sites and resources  Job includes backup of the company website, updating resources, or development of new resources  Involved in the design and development of the website  Monitor and update interface design, as well as traffic to the website  Webmasters can work with marketing personnel  Employers look for candidates with a bachelor‘s or associate‘s degree in computer science or information systems  Knowledge of HTML and PHP  Experience using web authoring software and programs like Adobe Illustrator and Adobe Dreamweaver are often preferred  Good communication and organizational skills are vital in this position 1-23 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 Annual salary range $52,000 to $82,000 A Look to the Future o Home Smart Home o Smart homes of the future will have furniture that can monitor and improve your health, rooms that can expand and contract as your needs change, and gardens that farm themselves and turn compost into energy. o Internet of Things (IoT) and Web 5.0 technologies work together to make for an easier, healthier, and more sustainable home. o Google‘s Nest adjusts your thermostat. o IoT devices will work together to maximize their efficiency. o Smart homes of the future will have smart walls that use adjustable surfaces and actuators to change the size of a room effectively.

1-24 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

The Internet and the Web o Most students feel that the Internet and the web are synonymous, so it helps to stress the distinction between the two. Emphasize, using diagrams, that the Internet is a network infrastructure consisting of computers connected to one another. The Internet connects computers around the world and provides resources and services to end users. o Illustrate using YouTube videos that the web is a multimedia interface to the resources available on the Internet. o Discuss web 1.0, 2.0, 3.0, 4.0 and the future of web 5.0. o Have a discussion with students regarding what they use the Internet and the Web for. Some of these answers may be stated:  Communicating  Shopping  Searching  Education (e-Learning)  Online entertainment Internet Access o Discuss with students the different types of Internet Service Providers (ISP) used to access the Internet. o Browsers are the programs used by devices to provide access to web resources.  These programs connect you to remote computers, open and transfer files, display text, images, and multimedia, and provide in one tool an uncomplicated interface to the Internet and web documents.  Four well known browsers  Google Chrome, Microsoft Edge, Mozilla Firefox, and Apple Safari  Take a poll and see which is the most popular browser and ask why? o Discuss the difference between mobile browsers and desktop browsers. Mobile browsers are designed for the smaller touch screens of mobile devices. Desktop browsers are designed for laptop and desktop computers.  Explain that an address, or location, is needed for browsers to connect  Uniform Resource Locator (URL) - address o Protocol – rules for exchanging data o Domain name – indicates the specific address where the resource is located o Have students write out different URLs and identify the parts of the URL.  Documents (web pages) contain Hypertext Markup Language (HTML) and hyperlinks which provide links to other related pages.  Find a web page and view the source code of the web page.  Web pages also contain various technologies that control the appearance of the web page and are used to provide highly interactive and animated web sites. These include JavaScript, PHP, and Cascading Style Sheets (CSS).  Have students locate a web page that is interactive. 1-25 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Web Utilities o Specialized utility programs the make using the Internet and the web easier and safer to use o Filters - block access to selected sites  What types of sites may be blocked?  Consider a discussion on whether academic institutions should use filters. o File Transfer Utilities  Demonstrate using FTP simply by saving a file or picture using the ―Save as‖ option in Internet Explorer. The students can relate to this concept more readily because they may have downloaded files from the Internet.  Web-based file transfer services, Example: Microsoft's OneDrive, Google's Google drive  BitTorrent  File transfer protocol (FTP) and Secure File Transfer Protocol (SFTP) o Internet Security Suites  Discuss the importance of Internet security and open a discussion with students on security issues that they have experienced and how they dealt with the problem. Communication o Social networking – these sites are setup to help users find others with similar interests, hobbies, and friends, etc. Most students have already used a site, such as, Facebook.com, LinkedIn, or Instagram.  Discuss security and how to protect yourself from unwanted guests, such as stalkers.  Review the common features including Profiles and Pages, Groups and Friends, News feed and Share settings.  Social networks often have an overall focus.  LinkedIn – business oriented social networking site  Facebook – connecting friends and family, news, entertainment, and connecting businesses and organizations with their audience  Instagram – sharing photos  TikTok – sharing short videos  Snapchat – instant messaging o Review Blogs, Microblogs, Podcasts, and Wikis. How are they used? How do they differ? Have students create their own blog on a free blog space.  Have students present examples of blogs, microblogs, podcasts, and wikis. Discuss Wikipedia. These sites help ordinary people communicate across the web.  Many individuals create personal web sites, called blogs, to keep in touch with friends and family. o Used by individuals, groups, and businesses to share information o Time stamped and arranged with the newest item first  Microblogs – designed to be used with mobile devices and limit the size of posts. Twitter is an example of a microblog. Instagram is another example, designed to share images and video posts. 1-26 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Podcasts- audio programs delivered over the Internet o Discuss examples of podcasts, like Ted Talks and The Daily.  Wikis - a website specially designed to allow visitors to add, edit, or delete content. o ―Wiki‖ comes from the Hawaiian word for fast o Wikis demonstrate collaborative writing in which there isn‘t a single expert author, but rather a community of interested people that builds knowledge over time. o Most famous example is Wikipedia.  Discuss with students why they should not use information on Wikipedia when doing research assignments. Wikipedia is not based on facts as much as it is on personal opinions. o Messaging - Text messaging, also known as texting or short message service (SMS), typically less than 160 characters, using a wireless network to another person who views the message on a mobile device such as a cell phone. Discuss texting and drawbacks. o Instant Messaging – allows two or more people to contact each other via direct, live communication  Have students give examples of how they use Instant Messaging.  Facebook Messenger, WhatsApp, Google Meet o E-mail – Emphasize that it is the most common form of Internet communication and has four basic elements  Header, Address, Subject and attachments o Discuss two types of e-mail:  Client-based  Require email client to be installed on your computer  Web-based  Do not require email client to be installed on your computer  How irritating is Spam? Does it have any usefulness? Spam is a complaint among most people. Demonstrate how to setup junk mail rules and use the Spam filters feature of e-mail. Search Tools o To illustrate how the different types of search engines work, ask the students to perform several searches. Have students use one of each different type of search engine that you have specified. They should use the exact key word/phrase search on each engine. The results will vary widely in the search results they generate, as well as the type of information received. o Content evaluation  Anyone can publish something on the web  Some sites promote fake news, or information that is inaccurate or biased.  Discuss deep fakes, where an individual‘s appearance or message has changed.  Find a website to evaluate accuracy consider the following:  Authority – Is this an official site?  Accuracy – Can I contact the author if I find inaccuracies?  Objectivity – Does the author have a personal bias? 1-27 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Currency – Has the data been updated on the web page? Are the site's links operational? If not, the site is most likely not being actively maintained.

Electronic Commerceo Give examples of each, B2C, C2C, B2B o E-commerce is fast-growing. Many students have participated in at least one type of e-commerce activity. For example:  Banking  Financial  Shopping o Security-Discuss the importance of security in online purchases.  Digital currency is the Internet‘s equivalent to traditional cash  Facebook's Diem, tied to the US Dollar  Cryptocurrency, Bitcoin, no cash equivalent  Cryptocurrencies use blockchains to record transactions  Digital currency providers: Amazon, Google, Venmo, PayPal Cloud Computing o Cloud computing is a means to free users from owning, maintaining, and storing software and data.  Discuss how users can access services from anywhere through an Internet connection. Some may charge a fee, while others like Google Apps provide access to users for free.  Discuss the basic components to cloud computing and have students discuss how the Internet and the web enable users to shift many of their computer activities from their personal computer to other computers on the Internet.  Clients  Internet providers-provides connection between the clients and providers  Service providers-may charge a fee or be free  Discuss the potential drawbacks that students see for cloud computing. The Internet of Things o Discuss what web 3.0 applications are and how they work.

1-28 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term Definition address The location or name of a Web site Advanced Research Project Agency Launched in 1969 when the United States funded a Network (ARPANET) project that developed a national computer network Files, such as documents and worksheets that can attachment be sent along with an e-mail message Cryptocurrency/digital currency, has no cash bitcoin equivalent and their transactions do not involve third party banks A type of file transfer that distributes files across BitTorrent many different computers for more efficient downloads blog Web logs that contain time stamped postings Software program that provides a user interface to browser web resources Involves the sale of a product or service from one business-to-business (B2B) business to another over the Internet The sale of a product or service to the general business-to-consumer (B2C) public or end users over the Internet Modems that provide Internet high-speed access cable using unused bandwidth on a cable television network Files inserted into an HTML document that control cascading style sheets (CSS) the appearance of web pages including layout, colors, and fonts Special program known as an e-mail client that needs to be installed and running to enable a client based e-mail system computer to communicate with the e-mail service provider Uses the Internet and the web to shift many cloud computing computer activities from a user‘s computer to computers on the Internet Involves individuals selling to individuals over the consumer-to-consumer (C2C) Internet A digital currency, like bitcoin, has no cash cryptocurrency equivalent and their transactions do not involve third party banks A manipulated video where an individual's deep fake appearance or message is changed Software program that provides a user interface to web resources, designed for laptop and desktop desktop browser computers, with smaller buttons and more onscreen options designed to take advantage of larger monitors and the precision of mouse input digital currency Internet‘s equivalent to traditional cash; Buyers 1-29 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Term

domain name downloading DSL e-commerce e-learning electronic commerce electronic mail e-mail

e-mail client

Facebook fake news file transfer protocol (FTP) filter friend groups header hyperlink Hypertext Markup Language (HTML) Instagram instant messaging (IM) Internet

Definition purchase digital cash from a third party by transferring funds from their banks. Part of the URL that signifies the name of a web server where the resource is located Copying a file from a server to a local computer Digital Subscriber Line, provides a digital connection over unused frequencies of standard telephone lines Buying and selling of goods over the Internet (See also electronic commerce) Being able to take classes on almost any subject from educational institutions that offer courses online Buying and selling of goods over the Internet (See also e-commerce) Electronic mail, the transmission of electronic messages over the Internet (See also e-mail) Electronic mail, the transmission of electronic messages over the Internet (See also electronic mail) Special program required to communicate with the e-mail service provider in client-based e-mail accounts Social networking site that provides an array of features and applications including instant messaging, photo and video sharing, games, and more. information that is inaccurate or biased Internet standard for transferring files Blocks access to selected web sites A person that you specify in a list to use instant messaging Communities of individuals who share a common interest who come together online The first basic element of an e-mail message Connect to other documents, which can be videos, text, graphics, audio files, etc. Text based programming language used to create web pages Social networking site with an emphasis on sharing photos Allows two or more people to contact each other via direct, live communication Launched in 1969 with ARPANET, the Internet consists of the actual physical network made up of wires, cables, and satellites. 1-30

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Term Internet of Things (IoT) Internet security suite Internet service provider (ISP) JavaScript link LinkedIn location message microblog MMS (multimedia messaging service) mobile browser news feed online pages podcast PHP profiles protocol search engine search service secure file transfer protocol (SFTP) share settings signature SMS (short messaging service) social networking spam

Definition Allows everyday objects embedded with electronic devices to send and receive data over the Internet Collection of utility programs designed to protect security and privacy while on the Internet Provides a path or connection for individuals to access the Internet A scripting language that triggers interactivity on web pages Also known as a hyperlink Social networking site focusing on business professionals The site of a web page The second basic element of an e-mail that consists of the body of the e-mail Web site that publishes short sentences that only take a few seconds to write, Twitter is a microblog. Sends images, videos, and sounds Special browser designed to run on portable devices First page you see after logging in to a social networking site Being connected to the Internet Are created by companies to promote their business Deliver media content widely used Language often used within HTML document to improve a websites‘ interactivity Created by individuals to share information about themselves Rules for exchanging data between computers Helps individuals locate information on the Web. (See also search service) An organization operates websites that can help individuals locate information on the Web. (See also search engine) Allows the efficient copying of files across the Internet On your social media account determine who can see your posts The third element of an e-mail message that provides additional information about the sender Process of sending a short electronic message Using the Internet to connect individuals and businesses to one another Unwanted or unsolicited e-mail 1-31

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Term spam blocker spam filter spider subject texting

text messaging top-level domain (TLD) tweet Twitter uniform resource locator (URL) uploading virus web Web 1.0 Web 2.0 Web 3.0

Web 4.0

Web 5.0 web auction web-based e-mail system web-based file transfer services webmail

Definition Software programs that are installed to work with e-mail programs to filter unwanted e-mail messages Programs used to identify and eliminate spam Special programs that continually look for new information on the Internet and update the search services‘ databases Part of the header element in an e-mail, usually a one-line description of the message Sending a short electronic message using a wireless network to another person who views the message on a mobile device, such as a cell phone Sending a short electronic message using a wireless network to another person who views the message on a mobile device, such as a cell phone. Last part of the domain name following the dot (.) Twitter messages A microblog that publishes short sentences The name, or address, of a web site To copy a file from a local computer to another computer on the Internet Destructive program often attached to unsolicited e-mail Introduced in 1992 at CERN, the web (WWW and World Wide Web) provides a multimedia interface to Internet resources. Focused on linking existing information Evolved to support more dynamic content creation and social interaction Focuses on computer-generated information requiring less human interaction to locate and to integrate information Called the mobile web, focus on connecting data and devices into a seamless integration into your physical life Called the emotional web-may include programs that anticipate our needs based on our mood and behaviors Sellers post descriptions of products at a web site and buyers submit bids electronically Use webmail clients located on the e-mail provider‘s computer Services that make use of a web browser to upload and download files, Dropbox is an example. Once a computer connects to an e-mail service provider, a special program called a webmail client 1-32

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Term

webmail client web developer web page web suffix web utility wiki Wikipedia

wireless modem

World Wide Web WWW

Definition runs on the e-mail provider‘s computer and emailing can take place. Special program that runs on an e-mail provider‘s computer and enables web mailing to take place Develops and maintains websites and web resources A document on the web Identifies the type of organization, for example .com indicates a commercial site. Specialized programs that make using the Internet and the web easier and safer A web site specially designed to allow visitors to fill in missing information or correct inaccuracies An online ‗wiki‘ encyclopedia written and edited by anyone who wants to contribute Transmits information that is modulated onto a carrier frequency to allow many simultaneous wireless communication links to work simultaneous on different frequencies Also known as WWW, provides a multimedia interface to resources available on the Internet Provides a multimedia interface to resources available on the Internet

1-33 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 2 Num

Multiple Choice Answers

Matching Answers

1 2 3 4

C B B B

5 6 7 8 9 10

C B D C C B

G J F Internet of Things (IoT) H I E C D B

Open Ended Questions: 1. Discuss the Internet and web including their origins, the four generations of the web, and most common uses. The Internet was launched in 1969 when the United States funded a project that developed a national computer network called Advanced Research Project Agency Network (ARPANET). The Internet is an immense network that connects together smaller networks all over the globe. The web was introduced in 1991. Prior to the web, the Internet was all text—no graphics, animations, sound, or video. The web made it possible to include these elements. It provided a multimedia interface to resources available on the Internet. 

The first generation of the web, known as Web 1.0, focused on linking existing information. In 2001, the second generation, Web 2.0, evolved to support more dynamic content creation and social interaction. Facebook is one of the best-known Web 2.0 applications. Web 3.0 identifies relationships between data. Siri and Google Assistant are examples of Web 3.0 applications. Web 4.0, called the mobile web, is defined by the use of mobile tools that provide new sources of information for programs to provide users with information. Web 5.0 is on the horizon—called the emotional web, this generation may include programs that anticipate our needs based on our mood and behaviors. However, this future is not yet realized, and the specifics of Web 5.0 are still to be determined.

Some of the uses of the Internet are communicating, shopping, searching, education or elearning, and online entertainment. Communicating is the most popular. You can exchange texts, emails, photos, and videos with family and friends from almost anywhere in the world. Some activities of entertainment are music, movies, and playing video games with friends around the world. Other activities to participate in are shopping, doing research online, and e-learning. 1-34 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


2. Describe how to access the Internet. What are providers? Define desktop and mobile browsers and discuss URLs, HTML, CSS, JavaScript, PHP, and mobile browsers. The most common way to access the Internet is through an Internet service provider (ISP). 

Internet service providers are connected to the Internet, providing a path or connection for individuals to access the Internet.

Today it is common to access the Internet from a variety of devices like cell phones, tablets, and laptops. These devices use programs called browsers, to provide access to web resources. This software connects you to remote computers, opens and transfers files, displays text, images, and multimedia, and provides an uncomplicated interface to the Internet and web documents. Mobile browsers are designed for the smaller touch screens of mobile devices. They typically have larger buttons to select options and provide multitouch support for actions such as ―pinch‖ or ―stretch‖ to zoom in on web content. Desktop browsers are designed for laptop and desktop computers, with smaller buttons and more on-screen options designed to take advantage of larger monitors and the precision of mouse input.

URLs – for browsers to connect to resources, the location or address of the resources must be specified. These addresses are called uniform resource locators (URLs). All URL‘s have two basic parts, protocol and domain name. Protocols are rules for exchanging data between computers. The protocol http is used for web traffic and is the most widely used Internet protocol. The domain name indicates the specific address where the resource is located. The last part of the domain name following the dot (.) is the top-level domain (TLD). It typically identifies the type of organization.

HTML – Hypertext Markup Language is a text-based markup language used to create web pages. The browser interprets the HTML formatting instructions in the document file and displays the document as a web page.

CSS - Cascading Style Sheets (CSS) are files inserted into an HTML document that control the appearance of web pages including layout, colors, and fonts. CSS helps to ensure that related web pages have a consistent presentation or look.

JavaScript – is a language often used within HTML documents to trigger interactive features, such as opening new browser windows and checking information entered in online forms.

PHP – like JavaScript, it is a language often used within HTML documents to improve a website‘s interactivity.

Mobile browsers – Mobile browsers are designed for the smaller touch screens of mobile devices. They typically have larger buttons to select options and provide multitouch support for actions such as ―pinch‖ or ―stretch‖ to zoom in on web content. 1-35 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


3. What are web utilities? Discuss filters, file transfer utilities, and Internet security suites. Web utilities are specialized utility programs that make using the Internet and the web easier and safer to use. 

Filters are used by parents and organizations to block certain sites and to monitor the use of the Internet and the web.

File transfer utilities copy files to (downloading) and from (uploading) your computer. Three types are: o Web-based file transfer services make use of a web browser to upload and download files. Popular services include Microsoft‘s OneDrive (onedrive.com) and Google‘s Google drive (drive.google.com). o BitTorrent distributes file transfers across many different computers. o File Transfer Protocol and secure file transfer protocol which allow users to efficiently copy files across the Internet.

An Internet security suite is a collection of utility programs designed to maintain your security and privacy while you are on the web These programs control spam, protect against computer viruses, provide filters, and much more. Two of the best-known Internet security suites are Symantec Norton Internet Security and Bitdefender Internet Security. These companies also offer apps for mobile devices, Bitdefender Mobile Security and Norton Mobile Security.

4. Discuss Internet communications including social networking, blogs, microblogs, podcasts, wikis, client-based and web-based e-mail, and text and instant messaging. Communication is the most popular use for the Internet, both for business and personal usage. 

Social networking is one of the fastest growing and most significant Web 2.0 applications. Social networking sites focus on connecting people and organizations that share a common interest or activity. These sites typically provide a wide array of tools that facilitate meeting, communicating, and sharing. There are hundreds of social networking sites. Some of the best known are Facebook, LinkedIn, Instagram, Pinterest, TikTok, and Snapchat. 

Common features include: i. Profiles or pages allow you to share information about yourself or your business. Individuals create profiles while businesses create pages. ii. Groups and friends are the other members on social media that you will communicate with. Friends are individuals you communicate with, while groups are communities of other members that share information and discuss specific topics. iii. News feed is the first page you see after logging into a social networking site 1-36

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


iv. Share settings on your social media account determine who can see your posts A social network often has an overall focus. For example, LinkedIn is a popular business oriented social networking site.

Blogs are personal websites that users can create to keep in touch with friends and family. Some blogs can contain professional subject matter (e.g., reviewers, critics, journalists), but many are simply online diaries for personal information. Blog entries are arranged with the most recent entry first. Two of the most widely used blog sites are Blogger and WordPress.

Much like a blog, a microblog allows an individual or company to share posts with an audience. However, microblogs are designed to be used with mobile devices and limit the size of posts. For example, Twitter, one of the most popular microblogging sites, limits posts, also known as tweets, to 280 characters.

Podcasts are audio programs delivered over the Internet. Typically, a podcast is one audio program in a series of related podcasts.

A wiki is a web site that allows visitors to use their browser to add, edit, or delete the site's content. The most famous example of this is Wikipedia, an online encyclopedia that allows anyone to add or contribute to entries.

Unlike Electronic messaging, E-mail or electronic mail, is used to communicate longer and more formal text. o Client-based e-mail accounts use a special program known as an e-mail client which must be installed on the user‘s computer. o Web-based e-mail accounts do not require an e-mail program to be installed on the user‘s computer. Instead, they use webmail clients that are located on the email provider‘s computer. This is known as webmail. For individual use, webmail is more widely used because it frees the user from installing and maintaining an email client on every computer used to access e-mail. With webmail, you can access your e-mail from any computer anywhere that has Internet access.

Text messaging, also known as texting or SMS (short message service), is the process of sending a short electronic message using a wireless network to another person who views the message on a mobile device such as a cell phone.

MMS (Multimedia Messaging Service) enables sending images, video, and sound

Instant messaging allows two or more people to contact each other via direct, live communication. To use instant messaging, you register with an instant messaging server and then specify a list of friends. Whenever you connect to the Internet, special software informs your messaging server that you are online. In response, the server will notify you if any of your friends are online. At the same time, it notifies your friends that you are online. You can then send messages directly back and forth to one another. Most instant 1-37 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


messaging programs also include video conferencing features, file sharing, and remote assistance. 5. Define search tools, including search services. Discuss search engines and fake news. Describe how to evaluate the content of a website. The web is a massive collection of interrelated pages. Locating the precise information can be difficult to locate. A number of organizations called search services operate web sites that help locate the information needed. They maintain huge databases related to information provided on the Web and the Internet. Special automated programs called spiders continually look for new information and update the search service‘s databases. Additionally, search services provide special programs called search engines. 

Search engines help locate specific information on the web. To use a search web site, you enter a keyword or phrase reflecting the information you want. The search engine compares your entry against its database and returns a list of search results, or sites that contain the keywords. Each search result includes a link to the referenced web page (or other resource) along with a brief discussion of the information contained at that location.

Content Evaluation - Unlike most published material found in newspapers, journals, and textbooks, not all the information you find on the web has been subjected to strict guidelines to ensure accuracy. Anyone can publish content on the web, sometimes anonymously and without critical evaluation. Some sites promote fake news or information that is inaccurate or biased. This can include manipulated videos, known as deep fakes, where an individual‘s appearance or message are changed. Before you believe a website‘s claims or share that site with friends and family, consider the following: authority, accuracy, objectivity and currency.

6. Describe electronic commerce, including business-to-consumer, consumer-to-consumer, and business-to-business e-commerce, and security. Electronic commerce, also known as e-commerce, is the buying and selling of goods over the Internet. Electronic commerce is fast growing and widely used in part because it provides incentives for both consumers and sellers. Some disadvantages include the inability to provide immediate delivery and security of online payment. The three types of electronic commerce include: 

Business-to-consumer (B2C) - Involves the sale of a product or service to the general public or end user. Amazon.com is a popular example. The three most widely used B2C applications are for online banking, financial trading, and shopping.

Consumer-to-consumer (C2C) - Involves individuals selling to individuals. C2C often takes the form of an electronic version of the classified ads or an auction. eBay is an example of this type of site. Etsy.com is another example of a C2C site.

Business-to-business (B2B) - Involves the buying and selling of goods from one business to another. 1-38 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Security - The two greatest challenges for e-commerce is the development of (1) fast, secure, and reliable payment methods for purchased goods and (2) providing convenient ways to provide required information such as mailing addresses and credit card information. Two basic payment options are credit card, and digital currency. Buyers purchase digital currency from a third party and use it to purchase goods. Sellers accept digital currency and convert to traditional currency through the third party. o Some digital currencies, like bitcoin, have no traditional cash equivalent, and their transactions do not involve third-party banks. Such a currency is called a cryptocurrency. Cryptocurrencies use public ledgers, known as blockchains, to record all transactions of the cryptocurrency. Anyone can read the blockchain, and anyone can hold a copy of the blockchain, but it is nearly impossible to counterfeit the blockchain.

7. Discuss the Internet of Things (IoT). Describe how Fitbit and Apple’s Health App are examples of how an IoT device can interact with a Web 3.0 application. The Internet is becoming more and more a part of our lives. The Internet of Things (IoT)is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. 

These everyday objects include cell phones and wearable devices.

The Fitbit is a bracelet that monitors health data and sends the data to your cell phone or a personal web page.

A Web 3.0 application can access the Fitbit data, combine that data with other data on the web, process the data, and send information back to another device.

Apple‘s Health App, a Web 3.0 application can access Fitbit data, combine it with other related health data, analyze the data, and report back to you through your cell phone.

The reports provide information about personal health including heart rate, steps taken each day, and estimate of daily calories burned.

8. What is cloud computing? Describe three basic components of cloud computing. Cloud computing allows users to maintain, store, and access software and data from the Internet, rather than from the users‘ hard drives. The basic components of cloud computing are:  Clients- Corporations and end users who want access to data, programs, and storage. 

The Internet - Provides the connection between the clients and the providers.

Service providers - Organizations with computers connected to the Internet providing access to software, data, and storage. 1-39 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Chapter 3 Application Software Lecture Guide 

Learning Objectives o Identify general-purpose applications. o Describe word processors, spreadsheets, presentation programs and database management systems. o Describe specialized applications, such as graphics, web authoring, and video game development programs. o Describe mobile apps and app stores. o Identify software suites. o Describe office suites, cloud suites, specialized suites, and utility suites.

Chapter Outline 

Two kinds of software: o System software – works with end users, application software, and computer hardware to handle the majority of technical details o Application software – end user software and is used to accomplish a variety of tasks Application Software o Divided into three categories:  Mobile apps  Most popular, applications designed for cell phones and tablets  General purpose applications  Widely used in nearly every discipline and occupation  Includes word processors, spreadsheets, presentation software, and database management systems,  Specialized applications  More narrowly focused programs that are used in specific disciplines and occupations o App Stores  An app store is where you can download applications to work with your mobile, laptop, and desktop devices.  Apple‘s App Store, Google Play, Microsoft Store  Written for a specific device o User Interface  Portion of the application that allows you to control and to interact with the program is known as the graphical user interface (GUI)  Uses Icons and a mouse for easy navigation and input in an application  Uses windows, a rectangular area, that can contain programs, documents, and/or messages  Menus present commands typically displayed in a menu bar at the top of the screen.

1-40 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Toolbars typically appear below the menu bar and include small graphic elements called buttons that provide quick access to commonly used commands.  Dialog boxes provide additional information and requests user input.  Ribbons replace toolbars and menus by organizing commonly used commands into sets of related activities and are displayed as tabs.  Tabs divide the ribbon into major activity areas.  Galleries, like dialog boxes, provide additional options and simplify choosing and option by showing the effect. o Common Features  Most applications provide a variety of features to make entering, editing, and formatting document easy.  Spelling and Grammar checker - looks for misspelled words or grammatical errors  Alignment - centers, right-aligns, or left-aligns numbers and characters  Font and font sizes - specifies the size and style of entered number and text  Character effects - provide a variety of different typefaces, such as bold or italics  Edit options - provide easy ways to edit text, such as cut, copy, and paste  Mobile Apps o Mobile apps or mobile applications, referred to as apps, are add-on programs for a variety of mobile devices including cell phones and tablets. o Traditional applications include:  Address books, to-do lists, alarms, and message lists o Widely used mobile apps include:  Music, video, social networking, shopping, games o Apps  Over 3.5 million apps on the Google Play store  Some of the most widely used mobile apps are for listening to music, viewing video, social networking, shopping, and game playing.  Music – Stream music, organize playlists, and recommend new artists.  Spotify, YouTube Music  For a monthly fee, most streaming music services will offer ad-free music and extra features.  Video - Watch TV shows, movies, or video clips.  The YouTube app offers access to free online videos, such as movie trailers and video blogs  The Netflix app provides access to more professional videos for a fee.  Social networking - Share pictures, check in to locations, or send out invites.  Facebook, Instagram, TikTok 1-41 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Shopping – makes shopping online quick and easy  Find products, read customer reviews, and make purchases.  Gaming - Some game apps cost money, but others work on a free-to-play model, where the initial game is free, but the more advanced features require an in-app purchase.  Games vary from Crossy-road, a simple arcade style game, to Stardew Valley, a complex role-playing games (RPGs) where gamers create a farm, grow crops, and raise livestock.  Many apps are written for a particular type of mobile device and will not work on other types. General-Purpose Applications Word Processors o Create text-based documents o Most flexible and widely used software tools o Used to create memos, letters, reports, manuals, and brochures o Most widely used word processing program is Microsoft Word o Other popular programs are Apple Pages and Google Docs. o Popular features (See Figures 3-7 and 3-8.) o Features  Captions-identify figures  AutoCorrect - recognizes typing errors and automatically fixes.  Fonts and Font Size choices provide interesting fonts and as well as multiple sizes.  Header or Footer - display page numbers and other document related information.  Footnote - inserts the footnote superscript number and automatically formats the bottom of the page to contain footnote text. Presentation software o Programs that combine a variety of visual objects to create attractive, visually interesting presentations o Excellent tools to communicate a message and to persuade people o People in a variety of settings and situations use presentation software programs to make their presentations more interesting and professional. o Three of the most widely used presentation graphics programs are Microsoft PowerPoint, Apple Keynote, and Google Slides. o Features  Document Theme - makes presentations professional and eye-catching.  Templates - provide an excellent way to quickly create a presentation.  Animation - provide additional emphasis to items. Spreadsheets o Organize, analyze, and graph numeric data such as budgets and financial reports. o Widely used by nearly every profession o Most widely used spreadsheet program is Microsoft Excel. o Other popular programs are Apple Numbers and Google Sheets. o Spreadsheet programs manipulate numeric data and create worksheets. o Features  Text entries - provide meaning to values in worksheet. 1-42 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Worksheets - are used to create, analyze, and forecast. Functions - are prewritten formulas provided by the spreadsheet program that perform more complex calculations.  Cells - can contain labels, numbers, and formulas.  Formulas – provide a way to perform calculations.  Range - is a series of continuous cells.  Charts - are visual representations of data in a worksheet.  Workbooks - can contain multiple worksheets with a summary sheet usually first.  Sheet Names - are used to give each worksheet has a unique sheet name.  What-If analysis - is a very powerful tool to test the effects of different assumptions in a spreadsheet. Database Management Systems o A database is a collection of related data. o A database management system (DBMS) or database manager is a program that sets up, or structures, a database and provides tools to enter, edit, and retrieve data from the database. o Three most widely used database management systems designed for personal computers are Microsoft Access, Apple FileMaker, and Oracle Database Express Edition. o Features  Primary Key - is assigned to a unique field and used to link tables.  Fields - hold different content, like Last Name, First Name.  Record - often includes a combination of numeric, text and object data types.  Table - makes up the basic structure of a relational database with columns containing field data and rows containing record information.  Forms - are designed to make it easy to enter and view data. Specialized Applications o Specialized applications are used within specific professions. These include:  Graphics programs  Video game design software  Web authoring programs Graphics o Widely used by professionals in the graphic arts profession  These programs include video editors, image editors, illustration programs, and desktop publishing programs. o Video Editors  Used to edit videos to enhance quality and appearance  Used to add special effects, music tracks, titles, and on-screen graphics to the videos you capture using your cell phone or other devices  Well known video editors are Movavi Video Editor Plus for Android phones and tablets, Apple iMovie for apple devices, and Adobe Premier Elements 2021 for a professional tool on laptops and desktops . o Image editors, known as photo editors  Specialized graphics programs for editing or modifying digital photographs  Used to touch up photographs to remove scratches and other imperfections 1-43 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Used with bitmap or raster images using pixels or dots making up the image  For cell phones and tablets: Snapseed  For laptops and desktops: Microsoft Photo and Apple‘s Photos  For professional photographers: Adobe Photoshop o Illustration programs, also known as drawing programs  Used to create and/or edit vector images created by connecting lines and curves which avoid the pixelated ragged edges created by bitmap images  These objects can be defined by mathematical equations and can rapidly and easily be resized, colored, textured, and manipulated.  Used for graphic design, page layout, and creating sharp artistic images  Popular programs are Procreate, Adobe Illustrator Draw, and Autodesk Sketchbook. o Desktop publishing programs, or page layout programs  Used to mix text and graphics to create publications of professional quality  Focuses on page design and layout  Used to create brochures, newsletters, newspapers, and textbooks  Popular programs are Adobe InDesign, Microsoft Publisher, and QuarkXPress.  Typically, graphic artists import text and graphics from other sources into desktop publishing programs. Video Game Design Software o Helps to organize thoughts and provides guidance through the game design process  Includes character development  Environmental design o There are choices from free software to expensive used by professional game designers.  The video game design software behind some of the biggest games include the Unreal Game Engine , the Unity development kit, and the GameMaker Studio 2. (See Figure 3-16.) Web Authoring Programs o Web Authoring is the process of creating a website. o Individuals can create online diaries or commentaries, called blogs. o Creating a site (web authoring) begins with site design followed by creation of a document file that displays the website‘s content. o Used to create sophisticated commercial sites o Web pages are typically HTML (Hypertext Markup Language).  Some web authoring programs are WYSIWYG editors.  What you see is what you get  You can build a web page without interacting directly with HTML code using a word processing application or a simple text editor.  Widely used programs are Adobe Dreamweaver and Froala 4.0. Other Specialized Applications o Numerous applications including accounting, personal finance, and project management applications 1-44 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Accounting applications such as Intuit QuickBooks help companies record and report financial operations. o Personal financial applications such as Quicken Starter Edition help individuals track their personal finances and investments. o Project management software like Microsoft Project is widely used in business to help coordinate and plan complicated projects. Software Suites o A software suite is a collection of separate application programs bundled together and made available as a group. o There are four types:  Office suites, also known as office software suites productivity suites, contain general-purpose application programs that are typically used in a business situation, including a word processor, spreadsheet, database manager, and a presentation application.  Microsoft Office, Apple iWork  Cloud Computing - Cloud suites, or online office suites, are stored on a server on the Internet and available anywhere you can access the Internet.  Documents created using cloud applications can be stored online, making it easy to share and collaborate on documents with others.  Downside is that users are dependent upon the server providing the application to be available whenever the application is needed  Google Workspace, Microsoft 365 and Apple iWorks.  Specialized suite - focus on specific applications.  Graphics suites: Adobe Creative Cloud  Recording, audio editing, and mastering suites: Magix‘s Sound Forge Pro 15  Financial planning suites: Moneytree Software‘s TOTAL Planning Suite  Utility suite - include a variety of programs designed to make computing easier and safer.  Iolo‘s System Mechanic Ultimate Defense and AVG TuneUp. Careers in IT o Software engineers analyze users‘ needs and create application software. Software engineers typically have experience in programming but focus on the design and development of programs using the principles of mathematics and engineering.  A bachelor‘s or an advanced specialized associate‘s degree in computer science or information systems and extensive knowledge of computers and technology is required by most employers.  Employers typically look for software engineers with good communication and analytical skills.  Annual salary range $63,000 to $148,000  Experienced software engineers are candidates for many other advanced IT careers. A Look to the Future-The New Workplace Realities 1-45 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Working from home has become increasingly popular. Working from home is lacking in important features that office buildings provided. o Virtual reality (VR) and augmented reality (AR) technologies offer a future where you still work from home but experience all the benefits of working at the office. o The future office building may be located in virtual reality, and the next meeting you have may be a blend of physical and virtual elements that make up augmented reality. o AR glasses and complex camera arrays will change the way videoconferencing happens. o People from offices anywhere can use AR glasses and appear to be in the same place. o VR headset may cover a person‘s face, but the person‘s avatar (virtual representation) appears in the room. o VR office spaces have the potential to completely remove the need for office space. o Developments in flexible and translucent screens may one day be so compact that AR glasses would be AR contact lenses. o In the future a computer screen will always be at your disposal with hand gestures and head position monitored to create virtual keyboards that only you can see.

1-46 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions  

Solicit answers to the question—Why Should I read this chapter? Application software features o Point out that there are two basic types of software: System and Application.  Explain that system software is needed to make the computer work. Without it, you wouldn‘t have a functioning computer and why.  Have the students describe the features of a Graphical User Interface (GUI) application such as icons and the use of windows.  Point out the toolbars and show the position of buttons and menu options among applications.  Discuss the use of Menus, Toolbars and Dialog boxes.  The features of a ribbon GUI are the Ribbon, Tabs, and Galleries. Describe each one.  Review common features available in application software. Mobile Apps o Have students name the most popular apps they are currently using.  Music, video, social networking, shopping, gaming  YouTube, Netflix, TikTok, Instagram, Amazon, Stardew Valley o Many apps are written for a specific mobile device and will not work on others. o App Stores  Have students visit one of the app stores: Apple's App Store, or Google Play. How often do students use app stores? Can students locate the app stores on their cell phones? Word Processors o Describe the different types of documents that can be created with a word processor – newsletters, memos, mailing labels, term papers, and other examples. o Explain how spell check works and why students should be aware that a word spelled correctly but used in the wrong way won‘t be identified by the checker. o Case study: Use a word processor to create a flyer. (See Figure 3-7, 3-8.) Presentation Software o The case is a good tool to emphasize the features of presentation graphics. o The case helps illustrate the concepts of a design template, presentation styles, and using the master slide. o If you wish to make the case more challenging, have the students design a presentation from scratch and include their own animations and transitions. Go into using timings and running an unattended presentation. (See Figure 3-9.) Spreadsheets o Discuss the provided scenario to emphasize different spreadsheet features. o Illustrate the similarities and differences between a formula and a function. o Ask students to list the ways they can use a spreadsheet – household budget, research statistics, membership dues, and other examples. o Case study: Discuss using a spreadsheet to create a financial plan for the Downtown Internet Café. (See Figure 3-10, 3-11.) Database Management Systems o Databases are probably the least used application by students. Ask them to discuss when creating a database would be helpful. 1-47 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

o Explore with students how they currently use databases in their lives, such as contacts on their cell phone. o What is related data and why is it important? Ask students to find out more on the web about relational databases. o Discuss setting up and structuring a database. o Review tools to enter, edit and retrieve data from a database. o Case study: (See Figure 3-12.) Specialized Applications Programs o Discuss when to use graphics programs and web authoring programs. Graphics o Discuss each of the four types of graphics applications and what types of projects they would be used to create. o Video editors  Show students examples of free or inexpensive video editors. (See Figure 3-13.) o Image editors, also known as photo editors  Many students are familiar with image editor applications. What they sometimes don‘t understand is the difference in the types of graphics files.  Show the students what raster images are and how they can be manipulated. o Illustration programs  Also known as drawing programs  Vector images, use geometric shapes  Compare vector images to raster images. o Desktop publishing  Also known as page layout programs  Focus on page design and layout and provide greater flexibility than a word processor Video Game Design Software o Used to design video games  The first step is to visualize the game and determine length and plot.  The second step is to choose the right video game software.  Have students explore different programs on the Internet. Web Authoring Programs o Ask the students to locate several blogs and discuss them. o If possible, suggest that students create their own blogs. o Provide a demo of Adobe Dreamweaver or Microsoft Expression Web to illustrate web authoring techniques.  View the code page to show the students how the HTML code is being generated as they design their pages and site.  Refer students to an online tutorial on HTML. Software Suites o Applications function the same as if purchased individually, but they are significantly less expensive to purchase when grouped in a suite.  Review Office or Productivity suite  Microsoft Office, Apple iWorks.  Cloud Computing 1-48 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Cloud suites or online office suites are stored on a server on the Internet and available anywhere you can access the Internet.  Most popular suites include Google Workspace, Microsoft 365, and Apple iWorks.  What do students store on the cloud? Are there disadvantages to using the cloud? Specialized suite - focus on specific applications. These include graphics suites, financial planning suites, and many others. Utility suite  Make computing easier and safer  Discuss the importance of utility suites.  iolo‘s System Mechanic Ultimate Defense , and AVG TuneUp

1-49 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term app application software app store bitmap blog button cloud suite contextual tab database database management system (DBMS) database manager

desktop publishing program dialog box document drawing program free-to-play gallery general-purpose application graphical user interface (GUI) graphics program group HTML editor

Definition Known as application software. End-user software and is used to accomplish a variety of tasks (See also application software) End-user software and is used to accomplish a variety of tasks (See also app) Web sites providing access to specific mobile apps for a fee or free Use thousands of dots or pixels to represent images (See also raster image) Personal web site that can be created by individuals Used in toolbars to provide shortcuts for quick access to commonly used commands Online office suites stored on a server on the Internet and are available anywhere anyone can access the Internet Appears automatically when needed A collection of related data A program that sets up, or structures, a database, and provides tools to enter, edit, and retrieve data from the database (See also database manager) A program that sets up, or structures, a database, and provides tools to enter, edit, and retrieve data from the database (See also database management system) Allows the mixing of text and graphics to create publications of professional quality (See also page layout program) Provides additional information and requests user input Text based files or documents that are created by a word processing program Used to create and to edit vector images (See also illustration program) Gaming apps in which the initial game is free, but the more advanced features require an in-app purchase Feature of Microsoft Office that simplifies the process of making selections from a list of alternatives by replacing dialog boxes with visual presentations of results Program that is widely used in a business situation Uses icons to represent familiar objects Programs used by professionals in the graphic arts profession. They use video editors, image editing programs, illustration programs, and desktop publishing programs. Tabs are organized into groups that contain related items. Programs that provide support for web site design and 1-50

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


icon illustration program image editor menu menu bar mobile app mobile application office software suite office suite online office suite

page layout program photo editor pixel pointer presentation software productivity suite raster ribbon ribbon GUI role playing game (RPG) software engineer software suite specialized application

HTML coding (See also web authoring program) Graphical element (or picture) that represents familiar objects Used to create and to edit vector images (See also drawing program). Specialized graphics programs for editing or modifying digital photographs (See also photo editors) Present commands that are typically displayed in a menu bar at the top of a screen A rectangular band located on the top part of the screen in an application that contains the menu options Also known as mobile applications, are add-on features that perform a variety of tasks not associated with typical cell phone use (See also mobile application) Also known as mobile apps, are add-on programs for a variety of mobile devices including cell phones and tablets Office suite, also known as productivity suite – contain general purpose application programs Office software suite, also known as productivity suite – contain general purpose application programs Also known as cloud suites are stored on a server on the Internet and are available anywhere the Internet can be accessed Allow you to mix text and graphics to create publications of professional quality (See also desktop publishing program) Specialized graphics programs for editing or modifying digital photographs (See also image editors) dots used to represent images A graphical element on the computer screen that is controlled by a mouse and is used to select items on the screen Programs that combine a variety of visual objects to create attractive, visually interesting presentations Office software suite, also known as office suite – contain general purpose application programs Use thousands of dots or pixels to represent images (See also bitmap image) Replace menus and toolbars by organizing commonly used commands into sets of related activities Graphical User Interface that changes based on the needs of the user Complex video game where players assume roles Analyze users‘ needs and create application software A collection of separate application programs bundled together and sold as a group Applications that are more narrowly focused on specific 1-51

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


specialized suite spreadsheet system software tab toolbar user interface utility suite vector illustration vector image video editor video game design software web authoring web authoring program

web page editor window word processor WYSIWYG (what you see is what you get) editor

disciplines and occupations Application suites that focus on specific applications, such as financial planning, accounting, etc. Organizes, analyzes, and graphs numeric data such as budgets and financial reports widely used by nearly every profession Works with end users, application software, and computer hardware to handle most technical details Tabs divide ribbons into major activity areas organized into groups. Contextual tabs automatically appear when needed. Contains small, outlined areas called buttons that provide shortcuts for quick access to commonly used commands Uses icons selected by a mouse-controlled pointer Includes a variety of programs designed to make computing easier and safer Geometric shapes or objects used to represent images (See also vector image) Geometric shapes or objects used to represent images (See also vector illustration) Are used to edit videos to enhance quality and appearance Helps to organize thoughts and guides people through the game design process including character development and environmental design Creating a web site Programs that provide support for website design and HTML coding (See also HTML editor and web page editor) Programs that provide support for website design and HTML coding (See also web authoring programs and HTML editor) A rectangular area that can contain a document, program, or message Creates text-based files, called documents. Used to create letters, memos, manuals, and brochures (What you see is what you get) which means you can build a page without interacting directly with HTML code

1-52 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 3 Num

Multiple Choice Answers

Matching Answers

1 2 3 4 5 6 7 8 9 10

A D B C C A B D B A

D I G B E F H C J A

Open Ended Questions: 1. Explain the difference between general-purpose and specialized applications. Also discuss the common features of application programs, including those with traditional and ribbon graphical user interfaces. General purpose applications are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems, and presentation software. Specialized applications are more narrowly focused on specific disciplines and occupations. Common features of traditional application programs  A user interface is the portion of the application that allows you to control and to interact with the program. Almost all applications use a graphical user interface. (GUI) that displays graphical elements called icons to represent familiar objects and a mouse.  Mouse controls a pointer on the screen that is used to select items such as icons.  Uses windows to display programs, documents, and/or messages  Has menus with a list of options or commands associated with the selected menu  Commands typically displayed in a menu bar at the top of the screen  Toolbars contain small buttons that provide shortcuts to the options and commands listed in the menu.  Dialog boxes provide additional information and requests user input Common features of ribbon GUI interface  Ribbons replace menus and toolbars by organizing commonly used commands into a set of tabs.  Tabs are used to divide the ribbon into major activity areas. Each tab is then organized into groups that contain related items. Some tabs, called contextual tabs, only appear when they are needed and anticipate the next operations to be performed by the user. 1-53 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Galleries simplify the process of making a selection from a list of alternatives.

2. Discuss general-purpose applications including word processors, spreadsheets, database management systems, and presentation software. 

Word processors create text-based documents and are one of the most flexible and widely used software tools. All types of people and organizations use word processors to create memos, letters, and other forms. Organizations create newsletters, manuals, and brochures to provide information to their customers. Students and researchers use word processors to create reports. Word processors can even be used to create personalized web pages.

Spreadsheets organize, analyze, and graph numeric data such as budgets and financial reports. Once used exclusively by accountants, spreadsheets are widely used by nearly every profession. Marketing professionals analyze sales trends. Financial analysts evaluate and graph stock market trends. Students and teachers record grades and calculate grade point averages.

A database is a collection of related data. It is the electronic equivalent of a file cabinet. A database management system (DBMS) or database manager is a program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database. All kinds of individuals use databases, from hospital administrators recording patient information to police officers checking criminal histories. Colleges and universities use databases to keep records on their students, instructors, and courses. Organizations of all types maintain employee databases.

Presentation software are programs that combine a variety of visual objects to create attractive, visually interesting presentations. They are excellent tools to communicate a message and to persuade people.

3. Discuss specialized applications including graphics programs, video game design software, web authoring programs, and other professional specialized applications. Graphics are widely used by professionals in the graphic arts profession. They use video editors, image editing programs, illustration programs, and desktop publishing programs. 

Video editors are used to edit videos to enhance quality and appearance. You can add special effects, music tracks, titles, and on-screen graphics.

Image editors, also known as photo editors, are specialized graphics programs for editing or modifying digital photographs.

Illustration programs, also known as drawing programs, are used to create and edit vector images. While bitmap images use pixels to represent images, vector images, also known as vector illustrations, use geometric shapes or objects.

1-54 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Desktop publishing programs, or page layout programs, allow you to mix text and graphics to create publications of professional quality. While word processors focus on creating text and have the ability to combine text and graphics, desktop publishers focus on page design and layout and provide greater flexibility.

Video game design software allows individuals to create their own video games. The software will help you organize your thoughts and guide you through the game design process, including character development and environmental design.

Creating a site is called web authoring. It begins with site design followed by creation of a document file that displays the web site‘s content. Web authoring programs are typically used to create sophisticated commercial sites. Also known as web page editors and HTML editors, these programs provide support for website design and HTML coding.

There are numerous other specialized applications including accounting, personal finance, and project management applications. Accounting applications help companies record and report their financial operations. Personal financial applications help individuals track their personal finances and investments. Project management software is widely used in business to help coordinate and plan complicated projects.

4. Describe mobile apps including popular apps and app stores. 

Mobile apps or mobile applications are add-on features for a variety of mobile devices including cell phones and tablets. Some of the most widely used apps are music, video, social networking, shopping, and games.

Music apps, like Spotify, stream music, organize playlists, and recommend new artists. Video apps, like YouTube are a favorite way to watch movie trailers and video blogs. Social networking apps, like Facebook, let you use your mobile device to share vacation photos, check in at your favorite coffee shop, or invite friends to a party. Shopping apps, like Amazon, make shopping online quick and easy. Gaming apps, like Crossy-road, are an enjoyable way to pass the time on a cell phone.

An app store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge. o Many apps are written for a particular type of mobile device and will not run on other types. o Two major Apps stores are Apple and Google Play.

5. Describe software suites including office suites, cloud suites, specialized suites, and utility suites. A software suite is a collection of separate application programs bundled together and made available as a group. While the applications function the same whether purchased in a suite or separately, it is significantly less expensive to buy a suite of applications than to buy each application separately. Four types of suites are office suites, cloud suites, specialized suites, and utility suites. 1-55 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Office suites, also known as office software suites and productivity suites, contain general purpose application programs that are typically used in a business situation. Productivity suites commonly include a word processor, spreadsheet, database manager, and a presentation application. The best known is Microsoft Office.

Cloud suites or online office suites are stored at a server on the Internet and are available anywhere you can access the Internet. Documents created using online applications also can be stored online, making it easy to share and collaborate on documents with others.

Specialized suites focus on specific applications. These include graphics suites, financial planning suites, and many others.

Utility suites include a variety of programs designed to make computing easier and safer.

Chapter 4 System Software Lecture Guide 

Learning Objectives o Describe the differences between system software and application software. o Identify the four types of system software programs. o Explain the basic functions, features, and categories of operating systems. o Compare mobile operating systems including iOS and Android. o Compare desktop operating systems including Windows, Mac OS, UNIX, Linux, and virtualization. o Explain the purpose of utilities and utility suites. o Identify the six most essential utilities.

Chapter Outline 

System Software o End users need to understand the functionality of system software to efficiently and effectively use computers. o System software works with end users, application software, and computer hardware to handle most technical details. o It is a collection or a system of programs that handle hundreds of technical details with little or no user intervention. o System software consists of four types of programs:  Operating systems - coordinate computer resources, provide an interface between users and the computer, and run applications.  Utilities - perform specific tasks related to managing computer resources.  Device drivers - specialized programs that allow particular input or output devices to communicate with the rest of the computer system  Language translators - convert the programming instructions written by programmers into a language that computers understand and process. Operating Systems 1-56 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o A collection of programs that handle many of the technical details related to using a computer o The operating system could be considered the most important type of computer program; without a functioning operating system the computer would be useless. o Functions can be classified into three groups:  Managing resources – coordinate all the computer‘s resources including memory, processing, storage, and devices such as printers and monitors  This includes monitoring system performance, scheduling tasks, providing security, and starting up the computer  Providing user interface – how the user interacts with the computer  Almost all newer operating systems use a graphical user interface (GUI).  Many operating systems now include voice assist tools, which allow users to directly issue voice commands.  Running applications - load and run applications such as word processors and spreadsheets.  Most operating systems support multitasking, or the ability to switch between different applications stored in memory. o The program that you are currently working on is described as running in the foreground. The other program, or programs, is described as running in the background. o Features  Booting – the process of starting up or restarting the operating system  Warm boot – occurs when the computer is already on, and you restart it without turning off the power  Cold boot – is starting the computer when it is turned off  Desktop – a place which provides access to computer resources  Icons - graphic representations for a program, type of file, or function  Pointer - controlled by a mouse, trackpad or touch screen and changes shape depending upon its current function  Windows - rectangular areas for displaying information and running programs  Menus - provide a list of options or commands  Tabs – divide menus into major activity areas such as format and page layout  Dialog boxes - provide information or request input  Help - provides online assistance for operating system functions and procedures  Gesture control – ability to control operations with finger movements such as swiping, sliding, and pinching o Most operating systems store data and programs in a system of files and folders  Files are used to store data and programs.  Folders store related files.  Folders can contain other folders within a folder or subfolders for organizational purposes. o Categories 1-57 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


There are hundreds of different operating systems, but only three basic categories:  Embedded operating systems also known as real-time operating systems (RTOS) and are uniquely designed to work exclusively with a particular device's hardware. (See Figure 4-3.) o They control smartwatches, cell phones, video game systems and thousands of other small electronic devices.  Stand-alone operating systems (desktop operating systems) are used in a single desktop or laptop computer. o These operating systems are located on the computer‘s hard disk. o Often desktop computers and laptops are part of a network and in these cases, the desktop operating system works with the network to share and coordinate resources. o Popular stand-alone operating systems are Apple‘s macOS and Microsoft‘s Windows.  Network operating systems (NOS) are used to control and coordinate computers that are networked or linked together. o NOS are typically located on one of the connected computers‘ hard disks.  Called the network server, this computer coordinates all communication between the other computers. o Popular network operating systems include Linux, Windows Server, and UNIX. o Software environment, or software platform  A computer's platform dictates what applications will run on that device.  Almost all application programs are designed to run with a specific software platform.  Many applications have different versions allowing one version to run on Windows and another to operate with macOS. Mobile Operating Systems o Known as mobile OS; are a type of embedded operating system. o Every mobile computer, including cell phones, tablets, and wearables requires an operating system. o These mobile operating systems are less complicated and more specialized for wireless communication. o Best known are:  Android – used as the platform for many popular cell phones, such as the Samsung Galaxy S1 Ultra and Google Pixel 4a.  iOS – was developed by Apple and is used as the platform for Apple‘s mobile devices, the iPad and iPhone. Desktop Operating Systems o Microsoft’s Windows  The most widely used personal computer operating system  More application programs are developed to run under Windows than any other operating system. 1-58 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Windows comes in a variety of different versions and is designed to run with a variety of different microprocessors.  The most recent version of Windows is Windows 11  Announced in 2021  Merges Windows‘ desktop and mobile operating systems (See Figure 4-6.)  Windows 11 is Microsoft's desktop, laptop, and tablet operating system.  Innovations include a simplified user interface and improved support for mobile devices, such as tablets and 2-in-1 laptops. One of the biggest changes with Windows 11 is its ability to run Android apps on a Windows device. o macOS  Designed to run only with Apple computers  Has been the leader in development of powerful and easy-to-use personal computer operating systems since its introduction in 1984  Not as widely used as the Windows operating system  Fewer application programs have been written for it.  The use of mac OS is rapidly increasing.  The popular iOS and iPadOS mobile operating systems are based off the macOS.  macOS 12 Monterey, announced in 2021, includes the ability to control multiple devices from one keyboard and mouse, improved videoconferencing tools, and ways to customize notifications to reduce distractions. o Unix and Linux  Originally designed to run on minicomputers in network environments  Used today by powerful personal computers, servers on the web, and mainframe computers  There are many different versions of UNIX.  Linux is an operating system that extended one of the UNIX versions.  Linux  Open source operating system  Developed at the University of Helsinki by Linus Torvalds in 1991  Popular and powerful alternative to the Windows operating system  Modifications and improvements to the OS are encouraged.  Google‘s Chrome OS and the Android mobile operating system are based on Linux. o Integrates with web servers to run applications and to perform other traditional operating system functions o Popular for inexpensive notebook computers that use cloud computing and cloud storage o One limitation is that their efficiency is dependent upon the speed of the Internet connection. Virtualization o The ability to support multiple operating systems on a single physical computer 1-59 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o With virtualization software, the physical computer can be logically separated into two or more independent virtual computers known as virtual machines.  Each virtual machine appears to the user as a separate independent computer with its own operating system.  Host operating system –the OS of the physical machine  Guest operating system - the OS on all the virtual machines o Users can readily switch between virtual computers and programs running on them. o Parallels and VMware are programs that create and run virtual machines. These programs allow a Mac to run Windows programs. Utilities o Specialized programs designed to make computing easier o There are hundreds of different utility programs. o Essential programs include:  Search programs  Provide a quick and easy way to search a computer system to find applications, data, or files  Storage Management programs  Provide a list of application programs, stored videos, and other programs that are unused or very large, allowing you to eliminate or archive files  Backup programs  Make copies of files in case the originals are lost or damaged  Windows 11 comes with a free backup program, the File History tool, and macOS has a backup feature, Time Machine.  Antivirus programs  Guard a computer system against viruses or other damaging programs  Troubleshooting or diagnostic programs  Recognize and correct problems, ideally before they become serious  Virtual assistants  Utilities that accept commands through text or speech to allow intuitive interaction with computers, cell phones, or tablets  Coordinates personal data across multiple applications  Microsoft Windows 11 Cortana  macOS Siri o Operating System Utilities  Most come with common utility programs, including a search program, a storage management program, and a backup program.  Search programs on mobile operating systems, as well as laptops and desktops help you locate apps, files, and programs. (See Figure 4-10.)  Storage management utilities allow you to organize and view your hard drive usage to identify old or unused files. Move or eliminate files and give your operating system the space it needs to run at peak efficiency. (See Figure 4-11.) 1-60 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Backup programs should be run frequently to avoid the unexpected loss of files from your devices. (See figure 4-12.)

o Utility Suites:  Combine several programs into one package  Buying the package is less expensive than buying the programs separately  Some of the best-known utility suites are by BitDefender and Norton.  Suites provide a variety of utilities, including programs that protect your system from dangerous programs like computer viruses or improve your computer‘s performance. Careers in IT o Computer Support Specialists or Technical Support Specialists or Help-desk Technicians  Provide technical support to customers and other users  Manage the everyday technical problems faced by computer users  Resolve common networking problems and may use troubleshooting programs to diagnose problems  Increasingly common for companies to provide technical support as an outsourced service  Degrees in information technology or information systems preferred  Because demand for qualified applicants is high, those with practical experience and certification from a training program increasingly fill these positions.  Employers seek individuals with good analytical and communication skills.  Good people skills and customer service experience is an advantage.  Annual salary range $43,040 - $68,060  Advancement opportunities are very good and may involve design and implementation of new systems. A Look to the Future-Making Better Computers by Making Them More Human o Self-healing computers could mean an end to computer crashes and performance problems.  Computers fixing themselves  What if your computer could continually fine-tune its operations to maintain peak performance?  What if you never had to help your computer recover after a virus or other intrusion?  The Cloud and Autonomic Computer Center is the leading research group devoted to developing self-healing computers.  Autonomic computing is a system that allows machines to run with little human intervention.  These are not AI systems.  Autonomic machines would be able to identify security flaws and repair them.

1-61 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

System Software o Students tend to know very little about system software. Emphasize that it interfaces with the user, applications and the hardware. A good analogy is that it works like an interpreter between the user and the hardware. Draw a diagram with the computer in the center surrounded by the OS and then application software surrounding the OS. o Describe the four types of system software programs and provide examples of each:  Operating systems - coordinate computer resources, provide an interface between users and the computer, and run applications.  Utilities - perform specific tasks related to managing computer resources.  Device drivers - specialized programs that allow input or output devices to communicate with the rest of the computer system.  Language translators - convert the programming instructions written by programmers into a language that computers understand and process. Operating Systems o Functions  Managing resources – a good way to illustrate the management portion of the operating system is to use the Performance tool.  Provide user interface  Most of today‘s students have only known a GUI interface.  Show examples of the different operating systems and/or interfaces.  Runs applications  Most support multitasking, the ability to switch between different applications. The program that you are currently working on is described as running in the foreground. The other program or programs are described as running in the background. o Features - Provide a demo of each of the following as students work with each.  Booting  Ask students what a cold (or hard) boot is, then do the same for a warm (or soft) boot.  Explain why you would do one over another in different instances.  Icons, Pointer, Windows, Menus, Tabs, Dialog boxes, Help, Gesture control  Use any application or utility to show students these common features.  File management system  Use the analogy of a file cabinet. Folders within folders and files within folders.  Use File Explorer and create, copy, and move files and folders. Introduce short cuts, such as Ctrl + click, or Shift + click.  Discuss the importance of File Management. o Categories  Discuss the three categories of operating systems: 1-62 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Embedded operating systems, RTOS, are used in cell phones and tablets, as well as video game systems and thousands of other small electronic devices.  Stand-alone operating systems, also called desktop operating systems, are used in a single desktop or laptop computer. Often desktop computers and laptops are part of a network.  In these cases, the desktop operating system works with the network to share and coordinate resources.  Network operating systems (NOS) are used to control and coordinate computers that are networked or linked. Typically located on one of the connected computers‘ hard disks, called the network server, this computer coordinates all communication between the other computers.  Examples include Linux, Windows Server, and UNIX. o Software environment, or software platform  Platform dictates what applications will run on that device.  Almost all application programs are designed to run with a specific platform.  Many applications, however, have different versions, each designed to operate with a particular platform. Mobile Operating Systems o Mobile operating systems (mobile OS), are a type of embedded operating system. Ask what other products have embedded operating systems/chips. o Every mobile computer, including cell phones, tablets, and wearable computers, has an embedded operating system. o Some of the best known are Android and iOS. o Discuss with students why all apps (OSs) cannot run on all phones. Inform students that they must choose the app that runs on their OS. o Ask students what OS is on their device. Desktop Operating Systems o Microsoft’s Windows  Most students are familiar with the Windows environment.  Discuss the changes for Windows 11. o macOS  Many students use macOSX.  Designed to run only with Apple computers  Fewer application programs have been written for it.  Discuss the most recent version, macOS 12 Monterey. o Unix and Linux  More experienced students have heard of Linux, but they may not know that it is a type of UNIX. Provide a brief overview of UNIX.  Discuss open source.  Linux has been the basis of several other operating systems. For example, Google‘s Chrome OS and the Android mobile operating system are based on Linux.

1-63 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

o Virtualization-Ask the students what they would do if they wanted to run two or more applications on one single machine where each application requires a different operating system.  Discuss with students how it is possible to do this task with virtualization.  Provide a demonstration and show students how they can readily switch between virtual computers and programs running on them. Explain to them how each machine appears to the user as a separate independent computer with its own operating system.  Host operating system – operating system of the physical machine  Guest operating system – operating system for each virtual machine  Two programs, Parallels and VMware, are examples of programs that allow a user on a Mac to run Windows programs. Utilities o Have students work with some of the utilities on their computers.  Search programs  Storage management programs  Backup programs  Antivirus programs  Troubleshooting or Diagnostic programs  Virtual assistants Operating System Utilities o Search – (See Figure 4-10.) o Storage Management – (See Figure 4-11.) o Backup – (See Figure 4-12.) Utility Suites Have students conduct online research on the two different utility suites by BitDefender and Norton. A Look to the Future o Discuss self-healing computers. o Ask students to visit The Cloud and Autonomic Computing Center website to learn more about this initiative. Ask them to come up with ideas where they think autonomic computing would be applicable.

1-64 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term Android antivirus program background backup program booting Chrome OS cold boot computer support specialist Cortana desktop desktop operating system device driver diagnostic program dialog box embedded operating system file folder foreground gesture control graphical user interface (GUI) guest operating system help host operating system icon

Definition Mobile phone operating system developed by Android for the Android phone System utility that guards a computer system against viruses or other damaging programs that can invade it Program or programs that are not active in your window on the desktop but are available to switch to from your foreground program System utility that makes copies of files to be used in case the originals are lost or damaged The process of starting or restarting a computer Based on Linux and designed for netbook computers that use cloud computing and cloud storage The process of starting a computer after it has been turned off A person who provides technical support to customers and other users A Windows virtual assistant that can accept commands through voice Provides users access computer resources Operating system controlling desktop or laptop computer (See also stand-alone operating system) Specialized programs that allow particular input or output devices to communicate with the rest of the computer system System utility that recognizes and corrects problems, ideally before they become serious (See also troubleshooting program) A feature of a GUI operating system which provides information or requests input Also known as real-time operating systems and are entirely stored within a device Used to store data and programs Container in a file management system where related files are stored Program currently running in the active window of the computer Ability to control operations with finger movements, such as swiping, sliding, and pinching User interface that uses graphical elements such as icons and windows Operating system for a virtual machine Provides online assistance for operating system functions and procedures Operating system of a physical machine Graphic representation for a program or function 1-65

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


iOS language translator Linux macOS

macOS 12 Monterey menu mobile operating system mobile OS multitasking network operating system (NOS) network server open source operating system pointer real-time operating system (RTOS) search program Siri software environment software platform stand-alone operating system storage management program

Developed by Apple (formerly known as iPhone OS) to support iPhone and iPad Converts the programming instructions written by programmers into a language that computers understand and process A nonproprietary version of Unix, popular and powerful alternative to the Windows operating system Operating system that is designed to run on Apple computers, popular iOS and iPadOS mobile operating systems are based off the macOS macOS, announced in 2021, includes the ability to control multiple devices from one keyboard and mouse, improved videoconferencing tools, and ways to customize notifications to reduce distractions. Provides a list of options or commands Type of embedded operating system on every cell phone to control the operations (See also mobile OS) Type of embedded operating system on every cell phone to control the operations (See also mobile operating system) The ability to switch between different applications stored in memory Operating systems that are used to control and coordinate computers networked or linked together In a network environment, it is the main computer that coordinates all communication between the other computers. Programs released for free distribution to allow the program code to be modified and further developed by others Software that coordinates computer resources, provides an interface between users and the computer, and runs applications A graphic that is controlled by a mouse and changes shape depending upon its current function Operating system stored entirely within a device, controls smartwatches, cell phones, video game systems and other small electronic devices Provides a quick and easy way to search or examine an entire computer system to help you find specific applications, data, or other files Virtual assistant for Apple Another name for an operating system. (See also software platform) Another name for an operating system (See also software environment) Also called desktop operating systems that controls a desktop or laptop computer (See also desktop operating system) Utility program that allows you to eliminate unused applications or archive large files 1-66

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


system software tab troubleshooting program UNIX user interface utilities utility suite virtual assistant virtualization virtualization software virtual machine virus voice assist tool warm boot window Windows

Windows 11

Works with end users, application software, and computer hardware to handle most technical details Common feature of an application that divide menus into major activity areas A system utility that recognizes and corrects problems, ideally before they become serious An operating system that was originally designed to run on minicomputers in network environments, and currently runs on powerful microcomputers and servers How the user communicates with the operating system, computer, and/or application Perform specific tasks related to managing computer resources A combination of several utility programs into one package A utility that accepts commands through text or speech to allow intuitive interaction with your computer, cell phone, or tablet and coordinate personal data across several applications A method in which a physical computer can support multiple operating systems that operate independently Software that allows the physical computer to be logically separated into separate and independent virtual computers Virtual machine appears to the owner as a separate independent computer with its own operating system A dangerous program that can cause a variety of damage or problems to a computer Allows a user to directly issue voice commands The process of starting or restarting a computer when the computer is already on Rectangular area for displaying information and running programs Operating system released by Microsoft corporation, the most widely used personal computer operating system. Announced in 2021, Microsoft‘s desktop, laptop, and tablet operating system. This version of Windows includes several innovations, such as a simplified user interface and improved support for mobile devices, such as tablets and 2-in-1 laptops. One of the biggest changes with Windows 11 is its ability to run Android apps on a Windows device.

1-67 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 4 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers D B B C A A A B D C

Matching Answers I J G E H F C D A B

Open Ended Questions: 2. Describe system software. Discuss each of the four types of system programs. System software works with end users, application software, and computer hardware to handle most technical details. System software is not a single program. Rather it is a collection or a system of programs that handle hundreds of technical details with little or no user intervention. System software consists of four types of programs: •

Operating systems coordinate computer resources, provide an interface between users and the computer, and run applications.

Utilities, also known as service programs, perform specific tasks related to managing computer resources.

Device drivers are specialized programs that allow particular input or output devices to communicate with the rest of the computer system.

Language translators convert the programming instructions written by programmers into a language that computers understand and process.

3. Define operating systems. Describe the basic features and the three categories of operating systems. An operating system is a collection of programs that handle many of the technical details related to using a computer. The operating system is considered the most important type of computer program. Without an operating system, your computer would be useless.

1-68 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Every computer has an operating system and every operating system performs a variety of functions. These functions can be classified into three groups: •

Managing resources: Operating systems coordinate all the computer‘s resources including memory, processing, storage, and devices such as printers and monitors. They also monitor system performance, schedule tasks, provide security, and start up the computer.

Providing user interface: Operating systems allow users to interact with application programs and computer hardware through a user interface. Almost all operating systems use a graphical user interface (GUI). A graphical user interface uses graphical elements such as icons and windows.

Running applications: Operating systems load and run applications such as word processors and spreadsheets. Most operating systems support multitasking, or the ability to switch between different applications stored in memory. With multitasking, you could have Word and Excel running at the same time and switch easily between the two applications. The program that you are currently working on is described as running in the foreground. The other program or programs are running in the background.

Operating systems have several features in common with application programs including: • • • • • • • •

Icons – graphic representations for a program, type of file, or function. Pointer – controlled by a mouse, trackpad, or touchscreen, the pointer changes shape depending upon its current function. Windows – rectangular areas for displaying information and running programs Menus – provide a list of options or commands Tabs – divide menus into major activity areas Dialog boxes – provide information or request input. Help - provides online assistance for operating system functions and procedures. Gesture control – ability to control operations with finger movements such as swiping, sliding, and pinching.

The three main categories of operating systems are: •

Embedded operating systems are used in cell phones and tablets, as well as video game systems and thousands of other small electronic devices. Also known as real-time operating systems (RTOS), these operating systems are uniquely designed to work exclusively with (i.e., embedded into) a particular device‘s hardware. Typically designed for a specific application, embedded operating systems are essential in the evolution of IoT where many everyday devices can communicate with one another.

Stand-alone operating systems are used by a single desktop or laptop computer. Also called desktop operating systems, these operating systems are located on the computer‘s hard disk. Often desktop computers and laptops are part of a network. In these cases, the desktop operating system works with the network to share and coordinate resources.

1-69 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Network operating systems (NOS) are used to control and coordinate computers that are networked or linked together. Network operating systems are typically located on one of the connected computers‘ hard disks. Called the network server, this computer coordinates all communication between the other computers.

4. What are mobile operating systems? Describe the leading mobile operating systems. Mobile operating systems, also known as mobile OS, are a type of embedded operating system. Every mobile computer including cell phones requires an operating system. These mobile operating systems are less complicated and more specialized for wireless communication. While there are numerous mobile operating systems, some of the best known are: •

Android – used as the platform for many popular cell phones, such as the Samsung Galaxy S1 Ultra and Google Pixel 4a phones.

iOS – was developed by Apple and is used as the platform for Apple‘s mobile devices, the iPhone and iPad

5. What are desktop operating systems? Compare Windows, macOS, Unix and Linux, and Chrome OS. Discuss virtualization. Desktop operating systems, also called stand-alone operating systems, are used in a single desktop or laptop computer. Every microcomputer has an operating system controlling its operations. These operating systems are located on the computer‘s hard disk. Often desktop computers and laptops are part of a network. In those cases, the desktop operating system works with the network to share and coordinate resources. The operating system is often referred to as the software environment or software platform. Almost all application programs are designed to run with a specific platform. 

Windows – is the most widely used microcomputer operating system market, because its market share is so large, more application programs are developed to run under Windows than any other operating system. Windows comes in a variety of different versions and is designed to run with a variety of different microprocessors. The most recent version Windows 11. Windows 11 is Microsoft‘s desktop, laptop, and tablet operating system. This version of Windows includes several innovations, such as a simplified user interface and improved support for mobile devices, such as tablets and 2-in-1 laptops. One of the biggest changes with Windows 11 is its ability to run Android apps on a Windows device.

mac OS- is designed to run on Apple machines, macOS is not as widely used as the Windows operating system. Fewer applications have been written for it. The popular iOS and iPadOS mobile operating systems are based off the macOS. o macOS is the most widely used Mac desktop operating system. macOS 12 Monterey, announced in 2021, includes the ability to control multiple devices from one keyboard and mouse, improved videoconferencing tools, and ways to customize notifications to reduce distractions when working. 1-70 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Unix and Linux: Unix is widely used by servers on the web, mainframe computers, and very powerful personal computers. Linux is an operating system that extended one of the UNIX versions. It was released as open source which allows free distribution of the operating system code and encourages others to modify and further develop the code. Linux is a popular and powerful alternative to the Windows operating system.

Google’s Chrome OS and the Android mobile operating system are based on Linux. Chrome OS integrates with web servers to run applications and to perform other traditional operating system functions. This capability has made Chrome OS a popular choice for inexpensive notebook computers that use cloud computing and cloud storage to do things that would normally require much more expensive hardware. One limitation of these computers is that their efficiency is dependent upon the speed of their Internet connection.

Virtualization – a method in which a physical computer can support multiple operating systems that operate independently. With virtualization software a single computer operates as though it were two or more separate and independent computers known as virtual machines. Each virtual machine appears to the user as a separate independent computer with its own operating system. The OS of the physical machine is known as the host operating system. The OS for each virtual machine is known as the guest operating system. Users can readily switch between virtual computers and programs running on them. There are several programs to create and run virtual machines. One such program, Parallels, allows a user on a Mac to run Windows programs in OS X.

6. Discuss utilities. What are the most essential utilities? What is a utility suite? Utilities are specialized programs designed to make computing easier. The most essential are: • • • • • •

Search programs provide a quick and easy way to search or examine an entire computer system to help you find specific applications, data, or other files. Storage management programs help solve the problem of running out of storage space by providing lists of application programs, stored videos, and other program files so that you can eliminate unused applications or archive large files elsewhere. Backup programs make copies of files to be used in case the originals are lost or damaged. Windows 11 comes with a free backup program, the File History tool, and macOS has a backup feature named Time Machine. Antivirus programs guard your computer system against viruses or other damaging programs that can invade your computer system. Popular antivirus programs include Norton AntiVirus and Bitdefender‘s Antivirus Plus. Troubleshooting or diagnostic programs recognize and correct problems, ideally before they become serious. Virtual assistants are utilities that accept commands through text or speech to allow intuitive interaction with your computer, cell phone, or tablet and coordinate personal data across multiple applications. Microsoft Windows 11 has the virtual assistant Cortana, and Apple‘s macOS has Siri.

1-71 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Utility Suites combine several programs into one package. These suites provide a variety of utilities. Some programs improve hard disk efficiency, while other programs protect systems from dangerous viruses.

Chapter 5 The System Unit Lecture Guide 

Learning Objectives o Differentiate among the five basic types of system units. o Describe system boards, including sockets, slots, and bus lines. o Recognize different microprocessors, including microprocessor chips and specialty processors. o Compare different types of computer memory, including RAM, ROM, and flash memory. o Explain expansion cards and slots. o Describe bus lines, bus widths, and expansion buses. o Describe ports including standard and specialized ports. o Identify power supplies for cell phones, tablets, laptops, and desktops. o Explain how a computer can represent numbers and encode characters electronically.

Chapter Outline 

System Unit o Also known as the system chassis, is a container that houses most of the electronic components that make up a computer system o A personal computer is the most widely used type of computer.  Most affordable  Designed to be operated directly by an end user o There are five most common types of personal computers:  Smartphones - Almost every cell phone is a smartphone, most popular type of personal computer.  They are effectively a thin slab that is almost all monitor, with the system unit, secondary storage, and all electronic components located behind the monitor.  Tablets, tablet computer - very similar to cell phones, although tablets are larger, heavier, and generally more powerful  Not designed to be used as a phone and, typically, cannot be connected to phone networks  Tablets come in a range of styles and sizes, with the smallest tablets (called mini tablets) being just a little larger than the largest cell phones.  Laptops - like cell phones and tablets, laptops have their system units housed with selected secondary storage and input devices. Laptops, however, are larger and more powerful.  Larger monitor separate from the rest of the computer, attached to the system unit with a hinge.  Specialized laptops 1-72 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Two-in-one laptops - touch screen and folds flat like a tablet o Gaming laptops - high-end graphics hardware and very fast processors o Ultrabooks, ultraportables, or mini notebooks - a type of a very portable laptop, lighter and thinner and generally have a longer battery life than a laptop Desktops - most powerful type of personal computer.  Some desktop computers, like Apple‘s iMac, have their monitor and system unit housed together in the same case, known as all-inone desktops.  Most desktops have their system unit in a separate case. o Contains the system‘s electronic components and secondary storage devices o Input and output devices, such as a mouse, keyboard, and monitor, located outside the system unit Wearable computers, wearable devices  Contain an embedded computer on a chip that is typically much smaller and less powerful than a cell phone‘s  Most common wearable computers are smartwatches and activity trackers o Smartwatches like Apple‘s Watch acts as a watch, fitness monitor, and communication device. The Apple Watch connects to an iPhone to display emails, text messages, and calendar reminders on the user‘s wrist. o Activity trackers like Garmin Vivoactive 4 monitors daily exercise and sleep patterns and connects wirelessly to desktop, laptops, and smartphones to record and share data. Components - Personal computers come in a variety of different sizes, shapes, and capabilities.  They may look different, and each has its own unique features.  Components share similar components, including system boards, microprocessors, and memory.

System Board o Also known as the motherboard or mainboard o Controls communication for the entire computer system o Every component of the system unit connects to the system board. o Acts as a direct path and traffic monitor o For cell phones, tablets, and wearable computers, the system board is located behind the screen. For laptops, and desktops, the system board is typically located at the bottom of the system unit or along one side. o The system board is a flat circuit board covered with a variety of different electronic components including sockets, slots, and bus lines. (See Figure 5-9.)  Sockets provide a connection point for small specialized electronic parts called chips.  Chips consist of tiny circuit boards etched onto squares of sandlike material called silicon. 1-73 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 Also called a silicon chip, semiconductor, or integrated circuit  Chip carriers are used to mount chips. The carriers either plug directly into sockets on the system board or onto cards that are then plugged into slots on the system board.  Slots provide a connection point for specialized cards or circuit boards. These cards provide expansion capability for a computer system. An example is a wireless networking card plugs into a slot on the system board to provide a connection to a local area network.  Connecting lines called bus lines provide pathways that support communication among the various electronic components that are either located on the system board or attached to the system board. o System boards vary in size, speed, power, and versatility, but perform the same functions of communicating between the components of the personal computer. Microprocessor o The central processing unit (CPU) or processor is contained on a single chip called the microprocessor. o The microprocessor is the ―brains‖ of the computer system. o The microprocessor has two basic components:  The control unit tells the rest of the computer system how to carry out a program‘s instructions.  It directs the movement of electronic signals between memory.  Memory temporarily holds data, instructions and processed information.  The arithmetic-logic unit, usually called the ALU, performs two types of operations:  Arithmetic operations – fundamental math operations o Addition, subtraction, multiplication, division  Logical operations – consists of comparisons o (=) equal to, less than (<), or greater than (>) Microprocessor chips  There are two major categories of microprocessors developed today: mobile and desktop.  Mobile processors, used in cell phones and tablets, try to strike a balance between the processing power of the processor and the power the processor draws from the mobile device‘s battery.  Desktop processors, used in laptops and desktops, are less concerned with the energy use of the processor and are more powerful than mobile processors.  Chip processing capacities are often expressed in word sizes.  A word is the number of bits (such as 32 or 64) that can be accessed at one time by the CPU.  More bits in a word, the more data a computer can process at one time.  The processing speed of a microprocessor is typically represented by its clock speed which is related to the number of times the CPU can fetch and process data or instructions in a second.  Newer personal computers are much faster and process data and instructions in billionths of a second, or nanoseconds. 1-74 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Supercomputers, by contrast, operate at speeds measured in trillionths of a second, or picoseconds - 1,000 times faster than personal computers.  Some processors can handle multiple instructions per cycle or tick of the clock.  The multicore processors can provide two or more separate and independent CPUs thereby allowing a single computer to run two or more operations at the same time.  For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called parallel processing.  Windows 11 and macOS Big Sur support parallel processing. o Specialty processors  Coprocessors are specialty chips designed to improve specific computing operations.  One of the most widely used is a graphics coprocessor, also known as a graphics processing unit (GPU). These processors are specifically designed to handle a variety of specialized tasks such as displaying 3D images and encrypting data.  Most cell phones and tablets have specialty processors to efficiently show and store videos. Memory o Memory is a holding area for data, instructions, and information. o Memory is contained on chips connected to the system board. o There are three well-known types of memory chips: random-access memory (RAM), read-only memory (ROM), and flash memory. o RAM  Random-access memory (RAM) chips hold the program (sequence of instructions) and data that the CPU is presently processing. (See Figure 514.)  RAM is temporary or volatile storage because everything in most types of RAM is lost if there is a power failure or other disruption of the electric current going to the computer.  Cache memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU. Computers detect which information in RAM is most frequently used and then copies that information into the cache.  Having enough memory to use applications is important and is expressed in bytes such as MB, GB, or TB. (See Figure 5-15.)  RAM can be added by inserting an expansion module – DIMM (dual inline memory module).  Virtual memory is space utilized on a secondary storage device by the operating system when there isn‘t enough RAM to process all applications.  Large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk and each part is read into RAM only when needed. 1-75 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o ROM  Read-only memory (ROM) chips have information and programs built into them by the manufacturer.  ROM chips are not volatile and cannot be changed by the user.  Read only means that the CPU can read, or retrieve, data and programs written on the ROM chip but cannot write or change the information or instructions in ROM.  Not long ago, ROM chips were typically used to contain almost all instructions for basic computer operations.  Recently, however, flash memory chips have replaced ROM chips for many applications. o Flash Memory  Offers a combination of the features of RAM and ROM.  Flash memory can be updated, like RAM, to store new information.  Flash memory chips, like ROM, can retain data even if power is disrupted.  Used for a wide variety of applications such as startup instructions for a computer. This information is called the system's BIOS (basic input/output system). Expansion Cards and Slots o Expansion cards insert into expansion slots located on the system board. o Ports on the cards allow cables to be connected from the expansion cards to devices outside the system unit. (See Figure 5-19.) o Some of the more common devices are  Graphics cards – provide high-quality 3D graphics and animation for games and simulations.  Network interface cards (NIC) - also known as network adapter cards, are used to connect a computer to a network.  Wireless network cards-allow computers to be connected without cables.  Each device on the network is equipped with a wireless network card that communicates with the other devices. o Many computers include graphics and network capabilities embedded in the system board, making a graphics or network card unnecessary. However, graphics and network technologies are advancing quickly, and having an expansion card allows users to upgrade their computers to the newest technology without having to replace the system board. Bus Line o A bus line also known simply as a bus - connects the parts of the CPU to each other. o Buses also link the CPU to various other components on the system board. o A bus is a pathway for bits representing data and instructions. (See Figure 5-21.) o The number of bits that can travel simultaneously down a bus is known as the bus width. o A 64-bit bus can move twice as much information at a time as a 32-bit bus, just like a highway with multiple traffic lanes. o There are two basic categories of buses:  System - connects the CPU to memory on the system board  Expansion - connects the CPU to other components on the system board. o Expansion Buses 1-76 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Computer systems typically have a combination of different types of expansion buses  Universal serial bus (USB) widely used today; external USB devices are connected to one another or to a common point or hub and then onto the system board. o The current USB standard is USB 4.  FireWire buses operate much like USB buses but more specialized; used to connect audio and video to the system board.  PCI Express (PCIe) is widely used in many of today‘s most powerful computers and uses a single bus line or path for each connected device.

Ports o A port is a socket for external devices to connect to the system unit. A cell phone typically uses a port to recharge its battery. o Some ports connect directly to the system board while others connect to cards that are inserted into slots on the system board. o Some ports are standard features of most computer systems and others are more specialized.  Standard ports. The most common ports are:  Universal serial bus (USB) ports – used to connect several devices to the system unit such as keyboards, mice, printers, storage devices and a variety of specialty devices. o A Single USB port can be used to connect many USB devices to the system unit. o USB-A is the port found on most laptops and desktops. o USB-B are found on peripheral devices like digital cameras and cell phones. o USB-C is the newest USB port, found on high end cell phones and laptops. USB-C is faster, smaller, and easier to use than previous USB types. Some USB-C ports also support Thunderbolt 3, a high-speed version of the USB-C port.  High Definition Multimedia Interface (HDMI) ports - provide high-definition video and audio making it possible to use a computer as a video jukebox or an HD video recorder.  Thunderbolt 3 – a high-speed version of USB-C  Ethernet ports – high-speed networking ports that has become a standard for many of today‘s computers. o Used to connect multiple computers for sharing files, or to a DSL or cable modem for high-speed Internet access  Specialized ports. Numerous specialty ports include:  DisplayPort - audiovisual port typically used to connect to large monitors, popular on gaming computers with high-end graphics cards.  DVI (Digital Video Interface) – ports connect digital monitors to your computer. These ports can only send video signals and cannot send audio signals. They can be found mainly on desktops. 1-77 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

FireWire ports provide high-speed connections to specialized FireWire devices such as camcorders and storage devices.

Cables  Used to connect exterior devices to the system unit.  One end of the cable is attached to the device and the other to a matching connector on a port. (See Figure 5-25.)

Power Supply o Computers require direct current (DC) to power their electronic components and to represent data and instructions. o DC power can be provided indirectly by converting alternating current (AC) from standard wall outlets or directly from batteries. o Most cell phones and tablets are powered directly from batteries that are recharged using an AC adapter that plug into standard wall outlets and convert AC to DC. With cell phones and tablets, a USB cable often connects the AC adapter to the mobile device. Some cell phones can use a wireless charging platform. (See Figure 5-26.) o Like cell phones and tablets, laptops typically use AC adapters located outside the system unit. (See Figure 5-27.)  Unlike cell phones and tablets, can be operated either using an AC adapter plugged into a wall outlet or using battery power.  Batteries typically provide enough power for up to eight hours. o Desktops have a power supply unit located within the system unit that plugs into a standard wall outlet, converts AC to DC and provides power to drive all system unit components. Unlike cell phones, tablets, or laptops, desktop computers do not have batteries and cannot operate unless connected to a power source. Electronic Data and Instructions o Computers recognize only digital electronic signals. o Before processing occurs, a conversion must take place from analog to what the system unit can electronically process.  Numeric Representation uses the binary system.  Each 0 or 1 is called a bit.  1 is represented by a negative charge and the 0 with no charge.  Uses two-state binary system to represent data and instructions Byte – a group 8 bits  Hexadecimal system uses 16 digits to represent binary numbers.  Used to select colors in a website design or drawing application or when entering the password for access to a wireless network o Character Encoding - how a computer provides representation to communicate  Character encoding standards – assigns a unique sequence of bits to each character  ASCII (American Standard Code for Information Interchange) is a seven-bit coding scheme. o Personal computers have used the ASCII to represent character.  EBCDIC (Extended Binary Coded Decimal Interchange Code) is an eight-bit coding scheme. o Mainframe computers used EBCDIC. 1-78 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Unicode - most widely used character encoding standard and is recognized by virtually every computer system. o The first 128 characters are assigned the same sequence of bits as ASCII to maintain compatibility with older ASCIIformatted information. o Uses a variable number of bits to represent each character, which allows non-English characters and special characters to be represented. o Can be written in UTF-16 or UTF-8. UTF-16 is the older Unicode standard, and each character is a minimum of 16 bits. The newer standard, UTF-8, can have characters as small as 8 bits, making it more efficient than UTF-16.

Careers In IT o Computer technicians  Repair and install computer components and systems ranging from personal computers to mainframe servers and printers  Experienced computer technicians may work with computer engineers to diagnose problems and run routine maintenance on complex systems.  Employers look for those with certification in computer repair or degrees from professional schools.  Computer technicians also can expect to continue their education to keep up with technological changes.  Good communication skills are important in this field.  Annual salary range $27,000 to $58,000 A Look to the Future-Brian-Computer Interfaces o Implants/Chips inside Your Brain. o Have you ever thought it would be possible for you to be able to communicate with a computer by merely thinking? o Simple computer implants are used on a regular basis to improve hearing or reduce the risk of heart attacks or in Parkinson‘s patients. o The future will lie in implanted microchips which can communicate directly with our nerve cells.  Although their initial purpose will be to treat a variety of medical conditions, they could eventually (and controversially) be used to improve various brain functions of otherwise healthy individuals.

1-79 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

The System Unit o Discuss and have students give examples of the five basic types of computers: cell phones, tablets, laptops, desktops, and wearable computers. o If possible, bring various examples of computer hardware to class. Open a desktop computer and allow students to examine the components. o Use the Figures provided in the book as reference. o Have students use sticky notes to label the different parts of the computer such as the system board, sockets, ports, chips, expansion slots, bus lines and cards. System Board o Using the opened machines, as stated earlier, point to the various parts of the system board and discuss sockets, chips, carrier packages, slots, and bus lines o Activity: Have students develop a jeopardy game for the computer hardware. Microprocessor o In the opened machine, you can point to the processor and discuss. o Using the analogy of the microprocessor being the ―brains‖ of the computer system is an excellent way of introducing what it does.  Show students how to find out the type of processor they have on their laptop. In Windows, go to File Explorer, right-click on This PC and then select Properties. Alternatively, go to the Control Panel app and click on System and Security, and then select System.  Have students find the system properties on tablets and other mobile devices. o Refer to Figure 5-13 for a list of popular desktop microprocessors. Memory o Memory is a holding area for data, instructions, and information. o There are three well-known types of memory chips: random-access memory (RAM), read-only memory (ROM), and flash memory. o RAM  Using the opened machine, point to the memory slots on the board. Mention that adding memory is easy, but when doing so they should consult documentation to make sure they are adding the right type and in the right combinations.  If available, bring a RAM chip and show students how to install it onto the system board.  Discuss RAM as temporary or volatile storage because everything in most types of RAM is lost as soon as the personal computer is turned off.  Virtual memory is space utilized on a secondary storage device by the operating system when there isn‘t enough RAM to process all applications. It is a swap area where each part is read into RAM only when needed.  To use Windows 11, Microsoft recommends at least 4GB of RAM. o ROM  Read-only memory (ROM) chips have programs built into them at the factory.  ROM chips are not volatile and the information in them cannot be changed by the user. 1-80 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


   

ROM chips typically contain special instructions for detailed computer operations.  Recently, however, flash memory chips have replaced ROM chips for many applications.  If available, bring a ROM chip to class. ROM chips are usually attached to a carrier package. o Flash Memory  Offers a combination of the features of RAM and ROM.  Flash memory chips can retain data even if power is disrupted.  Contains startup instructions called the system's BIOS (basic input/output system). Expansion slots and cards o Point to the different expansion cards and ports on the opened machine and have the students identify common devices. o Discuss SD cards that plug in to cell phones, tablets, and laptops. Bus Line o A bus is a pathway for bits representing data and instructions. o Bus design or bus architecture is an important factor relating to the speed and power for a computer. o The wider the bus, the more bits that can be moved simultaneously. o There are two types of buses:  System bus - connects the CPU to memory on the system board  Expansion bus - connects the CPU to other components on the system board o Ask students to explain the difference between a system and an expansion bus. Expansion Buses o Point out the different types of expansion buses and advise students to consider their specific requirements when purchasing a new computer. Ports o See Figures 5-23 and 5-24. Power Supply o Discuss the power supply and AC adapter for cell phones and tablets. o Discuss wireless charging platforms. (See Figure 5-26.) Electronic Data and Instructions Computers are digital devices as opposed to analog devices. Therefore, computers can only understand things as on or off. o Numeric Representation  On is represented as a 1 and off as a 0, thus a binary system. The binary system consists of only two digits—0 and 1.  Each 0 or 1 is called a bit—short for binary digit.  In order to represent numbers, letters, and special characters, bits are combined into groups of eight called bytes. Each byte typically represents one character. (See Figure 5-28.)  Hexadecimal system (hex)  Uses 16 digits (0-9 and A-F) to represent binary numbers.  Each hex digit represents 4 binary digits, and two hex decimals are commonly used together to represent 1 byte (8 binary digits). 1-81 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Character Encoding  ASCII (American Standard Code for Information Interchange) is a seven-bit coding scheme. This is the most widely used binary code for personal computers.  EBCDIC (Extended Binary Coded Decimal Interchange Code) is an eight-bit coding scheme developed by IBM and is used primarily for large computers.  Unicode – The explosion of the Internet and subsequent globalization of computing have led to a new character encoding called Unicode. o Most widely used character encoding standard and is recognized by virtually every computer system. o First 128 characters are assigned the same sequence of bits as ASCII to maintain compatibility with older ASCIIformatted information. o Variable number of bits to represent each character, which allows non-English characters and special characters to be represented. Unicode can be written in UTF-16 or UTF-8. UTF-16 is the older Unicode standard, and each character is a minimum of 16 bits. The newer standard, UTF-8, can have characters as small as 8 bits, making it more efficient than UTF-16.

1-82 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term AC adapter activity tracker all-in-one desktop analog arithmetic-logic unit (ALU) arithmetic operation ASCII binary system BIOS (basic input/output system)

bit bus bus line bus width byte cable cache memory cell phone central processing unit (CPU) character encoding standards chip

chip carriers clock speed

Definition Power adapter that converts AC to DC, provides power to the system unit components, and can recharge batteries Monitors daily exercise and sleep patterns connecting wirelessly to desktops, laptops and smartphones to record and share data Desktop computer that has the monitor and system unit housed together in the same case (e.g., Apple's iMac) Continuous, signals that vary to represent different tones, pitches, and volume Performs two types of operations: arithmetic and logical Fundamental math operations: addition, subtraction, multiplication, division Binary coding scheme widely used on personal computers with eight bits forming each byte, and each byte represents one character Numbering system that consists of only two digits, 0 and 1 Start-up instructions for a computer with information including the specifics covering the amount of RAM, type of keyboard, and secondary storage devices connected to the system unit Data and instructions can be represented electronically with a two-state or binary system of numbers (0 and 1) and each 0 or 1 is called a bit which is short for binary digit Provides data pathways that connects various system components (See also bus line) Provides data pathways that connects various system components (See also bus) Number of bits that can travel simultaneously Eight bits and each byte typically represents one character Connects external devices to the system unit via ports High-speed holding area for frequently used data and information Indispensable handheld computer The ―brains‖ of a computer and is contained on a single chip (See also microprocessor, processor) Assign unique sequences of bits to each character Consists of tiny circuit boards etched onto squares of sandlike material called silicon (See also integrated circuit, silicon chip, semiconductor) Plug either directly into sockets on the system board or onto cards that are then plugged into slots on the system board Relates to the number of times the CPU can fetch and process data or instructions in a second 1-83

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


computer technician Repairs and installs computer components and systems The part of a processor that tells the rest of the computer system how to carry out a program‘s instructions and control unit directs the movement of electronic signals between memory and the CPU Specialty chip designed to improve specific computing coprocessor operations desktop Most powerful type of personal computer Signals that are only in two states – on or off – are used to digital represent voice and data DIMM Dual in-line memory module is used to expand memory DVI (Digital Video Interface) port Provides connections to analog and digital monitors Extended Binary Coded Decimal Interchange Code is an 8EBCDIC bit binary coding scheme developed by IBM and used primarily in mainframe computers ethernet port High-speed networking port expansion bus Connects the CPU to expansion slots expansion card Optional devices used to expand systems expansion slot Slots provided to expand computer systems Similar to USB bus but are more specialized and are used FireWire bus primarily to connect audio and video equipment to the system board Provides high-speed connections to specialized FireWire FireWire port devices such as camcorders and storage devices flash memory Chips that can retain data even if power is disrupted Include high end graphics hardware and very fast gaming laptops processors Graphics Processing Unit is designed to handle a variety of GPU (graphics processing unit) specialized tasks such as displaying 3D images and encrypting data Provides high-quality 3D graphics and animation for graphics card games and simulations Processor specifically designed to handle the processing of graphics coprocessor graphic images hexadecimal system (hex) Uses 16 digits to represent binary numbers High-Definition Multimedia Digital high-definition audio and video Interface (HDMI) Consists of tiny circuit boards etched onto squares of sandintegrated circuit like material called silicon (See also chip, silicon chip, semiconductor) have their system units housed with selected secondary laptop storage and input devices and are smaller than desktops Consists of comparisons such as two items being equal, logical operation less than, or greater than each other Controls all communications for the system with every mainboard component within the system unit connecting to the mainboard (see also system board or mother board) 1-84 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


memory Holds data, instructions, and information The ―brains‖ of a computer and is contained on a single microprocessor chip (See also central processing unit, processor) Lighter, thinner, and have longer battery life than other mini notebook laptops Type of tablet with a smaller screen and not all the mini tablets functionality of a larger tablet Controls communication for the entire computer system motherboard (See also main board, system board) multicore processor Two or more separate and independent CPUs Connects a computer to one or more other computers (See network adapter card also network interface card) Expansion card connecting a computer to one or more network interface card (NIC) other computers (See also network adapter card) Requires programs that allow multiple processors to work parallel processing together to run large complex programs Is widely used and provides a single dedicated path for PCI Express (PCIe) each connected device peripheral external device, such as a monitor or keyboard Most widely used computer that is most affordable and is personal computer designed to be operated directly by the end user Allow cables to be connected from expansion cards to port devices outside the system unit Converts AC to DC and provides the power to system unit power supply unit components The ―brains‖ of a computer and is contained on a single processor chip (See also microprocessor, central processing unit) Chips temporarily holding programs and data that the CPU random-access memory (RAM) is presently processing Chips that are nonvolatile storage and control essential read-only memory (ROM) system operations Fingernail size expansion card used primarily for laptop SD card computers, tablets, and cell phones Consists of tiny circuit boards etched onto squares of sandsemiconductor like material called silicon (See also integrated circuit, silicon chip, chip) Consists of tiny circuit boards etched onto squares of sandsilicon chip like material called silicon (See also integrated circuit, chip, semiconductor) Provides a connection point for specialized cards or circuit slot boards smartphone Most popular mobile device providing computer power Contains and embedded chip and acts as a watch, fitness smartwatch monitor, and communication device socket Provides a connection point for chips The communications medium for the entire computer system board system (See also motherboard, main board) 1-85 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


system bus Connects the CPU to memory on the system board A container that houses most of the electronic components system chassis that makes up a computer system (See also system unit, or chassis) A container that houses most of the electronic components system unit that makes up a computer system (See also chassis, or system unit) Highly portable device as they are smaller and lighter than tablet laptops, but are less powerful than laptop computers Highly portable device as they are smaller and lighter than tablet computer laptops, but are less powerful than laptop computers High-speed connections to up to seven separate devices Thunderbolt port connected one to another tower computer A desktop system unit placed vertically tower unit A desktop system unit placed vertically Includes a touch screen and the ability to fold flat like a two-in-one laptops tablet computer A type of a very portable laptop, lighter and thinner with ultrabooks longer battery life A type of a very portable laptop, lighter and thinner with ultraportables longer battery life Unicode A 16-bit binary code, most widely used standard universal serial bus (USB) Can connect several devices to the system unit Fastest type of port that can connect several devices at a universal serial bus (USB) port time to the system unit Universal serial bus –A (USB-A) Used on PCs Universal serial bus – B (USB-B) Used for peripherals Gaining popularity on laptops and smartphones and is Universal serial bus – C (USB-C) expected to replace USB-A and USB-B in the future Divides large programs into parts that are read into RAM virtual memory as needed Also known as wearable devices and are one of the first wearable computer evolutionary steps to IoT and contain an embedded computer on a chip Also known as a wearable computer and are one of the first wearable device evolutionary steps to IoT and contain an embedded computer on a chip Used in place of a cable to charge cell phones and mobile wireless charging platform devices Expansion card that allows computers to be connected wireless network card without cables Number of bits (such as 16, 32, or 64) that can be accessed word at one time by the microprocessor

1-86 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 5 Num Multiple Matching Choice Answers Answers 1 A B 2 B C 3 A A 4 B E 5 D F 6 C G 7 C H 8 D D 9 B I 10 C J Open Ended Questions: 7. Describe the five most common types of personal computers. •

Smartphones are the most popular type of personal computer. Designed to comfortably fit into the palm of one hand and accept finger touches on the monitor as primary input, cell phones have become the indispensable handheld computer.

Tablets, also known as tablet computers, are very similar to cell phones, although tablets are larger, heavier, and generally more powerful. Also, a tablet is not designed to be used as a phone and, typically, cannot be connected to phone networks. Tablets come in a range of styles and sizes, with the smallest tablets (called mini tablets) being just a little larger than the largest cell phones.

Laptops - Like cell phones and tablets, laptops have their system units housed with selected secondary storage and input devices. Laptops, however, are larger and more powerful. Their larger monitor is separate from the rest of the computer and attached to the system unit with a hinge.

Desktops – This is the most powerful type of personal computer. Most desktops have their system unit in a separate case. This case contains the system‘s electronic components and selected secondary storage devices. Input and output devices are located outside the system unit. Desktop system units that are placed vertically are sometimes referred to as a tower unit or tower computer. Some desktop computers, like Apple's iMac, have their monitor and system unit housed together in the same case. These computers are known as all-in-one desktops.

Wearable computers also known as wearable devices, are one of the first evolutionary steps to the Internet of Things (IoT). These devices contain an embedded computer on a chip that is typically much smaller and less powerful than a cell phone‘s. The most common wearable computers are smartwatches and activity trackers. 1-87 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


8. Describe system boards including sockets, chips, chip carriers, slots, and bus lines. System board is also known as the mainboard or motherboard. The system board controls communications for the entire computer system. Every component within the system unit connects to the system board. All external devices including the keyboard, mouse, and monitor connect to the system board. It acts as a data path and traffic monitor, allowing the various components to communicate efficiently with one another. The system board is a flat circuit board covered with a variety of different electronic components including: 

Sockets – provide a connection point for small specialized electronic parts called chips. Sockets are used to connect the system board to a variety of different types of chips, including microprocessors and memory chips.

Chips- consist of tiny circuit boards etched onto squares of sand-like material called silicon. A chip is also called a silicon chip, semiconductor, or integrated circuit.

Chip carriers– chips are mounted on carrier packages. These packages plug either directly into sockets on the system board or onto cards that are then plugged into slots on the system board.

Slots – provide a connection point for specialized cards or circuit boards

Bus lines – provide pathways that support communication among the various electronic components that are either located on the system board or attached to the system board.

9. Discuss microprocessor components, chips, and specialty processors. The central processing unit (CPU) or processor is contained on a single chip called the microprocessor. The microprocessor is the ―brains‖ of the computer system. It has two basic components: the control unit and the arithmetic-logic unit. 

Control unit o Tells the rest of the computer system how to carry out a program‘s instructions. o Directs the movement of electronic signals between memory, which temporarily holds data, instructions, and processed information and the arithmetic-logic unit. o Directs these control signals between the CPU and input and output devices.

Arithmetic-logic unit (ALU) o Performs two types of operations: arithmetic and logic. o Arithmetic operations are the fundamental math operations: addition, subtraction, multiplication, and division. o Logical operations consist of comparison where two pieces of data are compared to see whether one is equal to (=), less than (<), or greater than (>) the other.

1-88 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Multicore processors – Multicore processors can provide two or more separate and independent CPUs. These chips allow a single computer to run two or more operations at the same time, as well as very large, complex programs.

Specialty processors are specialty chips designed to improve specific computing operations. These include: o Graphics coprocessors (also called a GPU) are processors designed to handle a variety of specialized tasks such as displaying 3-D images and encrypting data. o Processors in automobiles, satellites entertainment, and tracking systems. o Cell phones and tablets have specialty processors to efficiently show and store videos.

10. Define computer memory including RAM, ROM, and flash memory. Memory is a holding area for data, instructions, and information. Memory is contained on chips connected to the system board. There are three well-known types of memory chips: random-access memory (RAM), read-only memory (ROM), and flash memory. 

Random-access memory (ROM) chips hold the program (sequence of instructions) and data that the CPU is presently processing. RAM is called temporary or volatile storage because everything in most types of RAM is lost as soon as the personal computer is turned off. o Cache memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU. The computer detects which information in RAM is most frequently used and then copies that information into the cache.

Read-only memory (ROM) chips have information stored in them by the manufacturer. Unlike RAM chips, ROM chips are not volatile and cannot be changed by the user. ―Read only‖ means that the CPU can read or retrieve data and programs written on the ROM chip. However, the computer cannot write-encode or change- the information or instructions in ROM. Not long ago, ROM chips were typically used to contain almost all instructions for basic computer operations. Recently, however, flash memory chips have replaced ROM chips for many applications.

Flash memory offers a combination of the features of RAM and ROM. Like RAM, it can be updated to store new information. Like ROM, it does not lose that information when power to the computer system is turned off. Flash memory is used to store startup instructions, which is the system's BIOS (basic input/output system).

11. Define expansion cards and slots, including graphics cards, network interface cards, wireless network cards, and SD cards. Expansion slots are provided on a personal computer where users can insert optional devices known as expansion cards into these slots.  Graphics cards: provide high-quality 3D graphics and animation for games and simulations. 1-89 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 Network interface cards (NIC): These cards are used to connect a computer to one or more other computers. The network adapter card typically connects the system unit to a cable that connects to the network.  Wireless network cards allow computers to be connected without cables. Each device on a network is equipped with a wireless network card that communicates with other devices.  Many computers include graphics and network capabilities embedded in the system board, making a graphics or network card unnecessary. However, graphics and network technologies are advancing quickly, and having an expansion card allows users to upgrade their computers to the newest technology without having to replace the system board.

12. Describe bus line, bus width, system bus, and expansion bus. A bus line, or bus, connects the parts of the CPU to each other. Buses also link the CPU to various other components on the system board. A bus is a pathway for bits representing data and instructions.  The number of bits that can travel simultaneously down a bus is known as bus width.  Expansion buses connect the CPU to other components on the system board, including expansion slots. The principal types are: o Universal serial bus (USB) is widely used to connect external USB devices. The USB then connects to the PCI bus on the system board. o FireWire bus – like USB but more specialized. They are used primarily to connect audio and video equipment to the system board. o PCI Express (PCIe) is widely used in powerful computers. Unlike most other buses that share a single bus line or path with several devices, the PCIe bus provides a single dedicated path for each connected device. 13. Define ports including standard and specialized ports. Give examples of each. A port is a socket for external devices to connect to the system unit. Some ports connect directly to the system board while others connect to cards that are inserted into slots on the system board. The most common standard ports are: 

Universal serial bus (USB) ports can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices.

High Definition Multimedia Interface (HDMI) ports provide high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder. 1-90 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Ethernet ports are a high-speed networking port. Ethernet allows the connecting of multiple computers for sharing files, or to a DSL or cable modem for high-speed Internet access.

The most common specialized ports are: 

DisplayPort (DP) ports are audiovisual ports typically used to connect large monitors. They are popular on gaming computers with high-end graphics cards.

DVI (Digital Video Interface) connect digital monitors to your computer. These ports can only send video signals and cannot send audio signals. They can be found mainly on desktops.

FireWire ports provide high-speed connections to specialized FireWire devices such as camcorders and storage devices.

14. Describe power supply including power supply units, AC adapters, and wireless charging platform. Computers require DC current to power their electronic components and to represent data and instructions. DC power can be provided indirectly by converting alternating current (AC) from standard wall outlets or directly from batteries. 

Most cell phones and tablets are powered directly from batteries that are recharged using an AC adapter. These adapters plug into standard wall outlets and convert AC to DC. With cell phones and tablets, a USB cable often connects the AC adapter to the mobile device. Some cell phones, however, can use a wireless charging platform, eliminating the cable. Most tablets, mobile devices, and wearable computers can operate only using battery power. Their AC adapters or charging platforms are only used to recharge batteries.

Like cell phones and tablets, laptops typically use AC adapters that are located outside the system unit. Unlike cell phones and tablets, these computers can be operated either using an AC adapter plugged into a wall outlet or using battery power.

Desktop computers have a power supply unit located within the system unit. This unit plugs into a standard wall outlet, converts AC to DC, and provides the power to all of the system unit components. Unlike cell phones, tablets, or laptops, desktop computers do not have batteries and cannot operate unless connected to a power source.

15. Discuss electronic data and instructions. Computers can only recognize digital electronic signals. Before any processing can occur within the system unit, a conversion must occur from what humans understand (analog) to what the system unit can electronically process (digital). 

Numeric representation: 1-91 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Computers use a two-state (binary system) – on or off arrangement to represent data and instructions. o Binary system consists of only two digits – 0 and 1. Each 0 or 1 is called a bit – short for binary digit. o In the system unit, the 1 can be represented by a positive charge and the 0 by no electrical charge. o In order to represent numbers, letters, and special characters, bits are combined into groups of eight called bytes. o Hexadecimal system uses 16 digits to represent binary numbers. Each hex digit represents four binary digits, and two hex digits are commonly used together to represent 1 byte (8 binary digits) 

Character encoding: o Nonnumeric characters are assigned encoding schemes or standards which assign a unique sequence of bits to each character. o ASCII – used in personal computers and uses 7 bits to represent a character which means that only 128 total characters can be represented o EBCDIC – used in mainframe computers o Unicode – most widely used character encoding standard and is recognized by virtually every computer system. Unicode uses a variable number of bits to represent each character, which allows non-English characters and special characters to be represented.

Chapter 6 Input and Output Lecture Guide 

Learning Objectives o Define input. o Describe keyboard entry including types and features of keyboards. o Identify different pointing devices including touch screens, game controllers and styluses. o Describe scanning devices including optical scanners RFID readers, and recognition devices. o Recognize image capturing and audio-input devices. o Define output. o Identify different monitor features and types including flat panels and e-books. o Define printing features and types including inkjet, 3D, and cloud printers. o Recognize different audio-output devices, including headphones and headsets. o Define combination input and output devices, including multifunctional devices, VR head-mounted displays and controllers, drones, and robots. o Explain ergonomics and ways to minimize physical damage.

Chapter Outline 

What is Input? o Any data or instructions that are used by a computer o Can come directly from end user or from other sources 1-92 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Input devices are hardware used to translate words, numbers, sounds, images, gestures, and actions that people understand into a form that the system unit can process. o In addition to keyboards and mice, there are a wide variety of other input devices including pointing, scanning, image capturing, and audio-input devices. Keyboard Entry o One of the most common ways to input data is by keyboard. o Keyboards convert numbers, letters, and special characters that people understand into electrical signals. o Most keyboards use an arrangement of keys given the name QWERTY.  Name reflects the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys displaying letters. o Variety of keyboard designs:  Virtual keyboards  Used primarily with cell phones and tablets  Keys are displayed on a screen and selected by touching their image on the screen. (See Figure 6-1.)  Laptop keyboards  Attached to the laptop system unit and come in a variety of configurations, depending on manufacturer and the size of the laptop  Include all the keys found on a typical virtual keyboard, as well as extra keys, such as function and navigation keys (See Figure 6-2.)  Traditional keyboards  Full-size keyboards widely used on desktops and larger computers  Standard U.S. traditional keyboard has 101 keys, including extra keys, such as a function keys, navigation keys, and a numeric keypad.  Some traditional keyboards include a few additional special keys. For example, the Windows keyboard includes a Windows key to directly access the Start menu. (See Figure 6-3.) o Pointing Devices  Provide an intuitive interface with the system unit by accepting physical movements and gestures such as finger pointing or moving across a screen and converting them into machine-readable input  Wide variety of pointing devices, including the touch screen, mouse, and game controller  Touch Screen  Allow users to select actions or commands by touching the screen with a finger or stylus  Stylus uses pressure to draw images on a screen.  Often, a stylus interacts with the computer through handwriting recognition software.  Multitouch screens – touch with more than one finger, which allows for interactions such as rotating graphical objects with the hand and zooming in and out by pinching and stretching the fingers 1-93 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Commonly used with cell phones, tablets, and laptops, as well as some desktops 

Mouse  Controls a pointer that is displayed on the monitor  Usually appears in the shape of an arrow o Changes shape depending on the application o Can have one, two, or more buttons, which are used to select command options and to control the mouse pointer on the monitor o Some mice have a wheel button that can be rotated to scroll through information that is displayed on the monitor. (See Figure 6-6.) o Cordless or wireless mouse uses radio waves or infrared light waves to communicate with the system unit. o Like a mouse, a touch pad is used to control the mouse pointer and to make selections. Touch pad operates by moving or tapping your finger on the surface of a pad. Used on laptops and some types of mobile devices.  Game Controllers  Used with computer games  The most popular game controllers are joysticks, gaming mice, gamepads, and motion-sensing devices. (See Figure 6-8.) o Joysticks control game actions by users varying the pressure speed, and direction of the joystick. o Gaming mice are like traditional mice with higher precision, faster responsiveness, and programmable buttons. o Gamepads are designed to be held by two hands and provide a wide array of inputs including motion, turning, stopping, and firing. o Motion-sensing devices control games by user movements. o Scanning Devices  Convert scanned text and images into a form that the system unit can process. There are five types of scanning devices:  Optical scanner, also known simply as a scanner, accepts documents consisting of text and/or images and converts them to machine-readable form. o Do not recognize individual letters or images. Rather, they recognize light, dark, and colored areas that make up individual letters or images. o Typically, scanned documents are saved in files that can be further processed, displayed, printed or stored for later use. o Four basic types of optical scanners: flatbed, document and portable, and 3D

1-94 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

  

 

  

Flatbed – like a copy machine, the image to be scanned is placed on a glass surface and the scanner records the image. Document – is like a flatbed scanner, can quickly scan multipage documents, automatically feeds one page of a document at a time through a scanning surface Portable – typically a handheld device that slides across the image, making direct contact 3D – use lasers, cameras, or robotic arms to record the shape of an object

Card Readers o Encoded information is often stored on credit cards and card readers interpret this encoded information. o Magnetic card reader – is the most common  Encoded information is stored on a thin magnetic strip located on the back of the card. When the card is swiped through the magnetic card reader, the information is read. o Chip cards – include additional security in the form of a microchip embedded in the credit card Bar Code Readers o Handheld wand readers or platform scanners o Contain photoelectric cells that scan bar codes, the vertical zebra-striped marks, printed on product containers.  UPCs (Universal Product Codes) are widely used by retail stores to automate the processes to check out customers, or change product prices, and to maintain inventory records  MaxiCode is widely used by the United Parcel Service (UPS) and others to automate the process of routing packages, tracking in-transit packages, and locating lost packages. o Cell phones with apps can also scan codes. (See Figure 612.) RFID Readers Radio-frequency identification tags are tiny chips that can be embedded in most everything. (See Figure 6-13.) o Contain electronically stored information o Used to monitor and locate lost pets; to track food from farm to table; and to record prices, product descriptions, and locations of retail items o Can be read by RFID readers located several yards away Character and Mark Recognition Devices Scanners that are able to recognize special characters and marks Specialty devices that are essential tools for certain applications Three types are: 1-95

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Magnetic-ink character recognition (MICR)—used by banks to automatically read numbers on the bottom of checks and deposit slips o Optical-character recognition (OCR)—uses special preprinted characters that can be read by a light source and changed into machine-readable code (See Figure 6-14.)  A common OCR device is the handheld wand reader. o Optical-mark recognition (OMR) - senses the presence or absence of a mark, such as a pencil mark, and is often used to score multiple-choice tests. o Image Capturing Devices  Image capturing devices create or capture original images. These devices include:  Digital cameras capture images digitally and store images on a memory card or in the camera‘s memory. o Most digital cameras are also able to record video. o Almost all tablets and cell phones have built-in digital cameras.  Webcams are specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet. o Webcams are built into most cell phones and tablets. o Popular videoconferencing apps, such as Zoom, Microsoft Teams, and Apple‘s FaceTime use webcams. o Audio-Input devices  Audio-input devices convert sounds into a form that can be processed by the system unit. The microphone is the most widely used audio-input device. Audio input can take many forms including the human voice and music.  Voice recognition systems use a microphone, a sound card, and special software. These systems allow users to operate computers and to create documents using voice commands.  Most cell phones include a virtual assistant that uses voice recognition to accept voice commands.  Apple Siri, Windows Cortana, Amazon Alexa, Android Google Assistant  Amazon Echo, Apple HomePod, Google Home  Examples include:  Scheduling events on a calendar  Composing simple text messages  Looking up facts on the web  Record dictation  Translate dictation from one language to another What is Output? o Output is processed data or information, and typically takes the form of text, graphics, photos, audio, and/or video. o Output devices are any hardware used to provide or to create output. 1-96 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

They translate information that has been processed by the system unit into a form that humans can understand. Most widely used output devices are monitors, printers, and audio-output devices.

Monitors o Most frequently used output device, also known as a display screen o Present visual images of text and graphics o Monitors vary in size, shape, and cost. o The most important characteristic of a monitor is its clarity.  Clarity refers to the quality and sharpness of the displayed images, and is composed of five elements:  Resolution - Images are formed on a monitor by a series of dots or pixels. Resolution is expressed as a grid of these dots or pixels (picture elements). The higher a monitor‘s resolution, the clearer the image produced.  Dot (pixel) pitch is the distance between each pixel. The lower the dot pitch (the shorter the distance between pixels), the clearer the images produced.  Contrast ratios – indicate a monitor‘s ability to display images. It compares the light intensity of the brightest white to the darkest black. The higher the ratio, the better the monitor.  Size or active display area is measured by the diagonal length of a monitor‘s viewing area.  Aspect ratio indicates the proportional relationship between a display‘s width and height.  Another important monitor feature is the ability to accept touch or gesture input such as finger movements. It has become a standard feature of newer monitors. o Flat-panel monitors are the most widely used type of monitor today and are much thinner and require less power to operate than other types of monitors. There are three basic types of flat-panel monitors:  LCD (liquid crystal display) is widely used for older monitors and is typically less expensive.  LED (light emitting diode) monitors are similar technology with a more advanced backlighting technology producing better-quality images, are slimmer, and are more environmentally friendly requiring less power and using less toxic chemicals to manufacture.  OLED (organic light-emitting diode) monitors that are thinner and better power efficiency and contrast ratio replaced the LED monitor‘s back-lighting technology with a thin layer organic compound that produces light.  E-book Readers o E-books (electronic books) – are traditional printed books in electronic format.

1-97 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o E-book readers (e-readers) are dedicated mobile devices for storing and displaying e-books and other electronic media including electronic newspapers and magazines. o E-ink produces images that reflect light like ordinary paper, making the display easy to read. o Two well-known e-book readers are Amazon‘s Kindle and Walmart‘s Kobo. (See Figure 6-20.) o Tablets can also display e-books using LCD. Other Monitors –used for more specialized applications, such as making presentations and watching television o Digital or interactive whiteboards – are specialized devices with a large display connected to a computer or projector.  Computer‘s desktop is displayed on the digital whiteboard and controlled using a special pen, a finger, or some other type of device.  Widely used in classrooms and corporate boardrooms.

o Flexible screens allow digital devices to display images on surfaces that are not flat. Early uses of flexible screens included cell phones with screens that wrap around the edges of the phone and curved monitors whose edges wrap toward the viewer. Recent innovations include foldable screens, such as the Samsung Galaxy Fold, a cell phone with a screen that unfolds to become a tablet. (See Figure 6-22.) o Digital projectors project the images from a traditional monitor onto a screen or wall.  A drawback is that projected images can be difficult to see in bright rooms. o Printers  Translates information that has been processed by the system unit and presents the information on paper  Features – Basic distinguishing features include:  Resolution - the clarity of images produced and measured in dpi (dots per inch), The higher the dpi, the better the quality of images produced  Color capability – provided by most printers today. Users typically have the option to print either with just black ink or with color.  Speed - measured in the number of pages printed per minute  Memory – Printer memory is used to store printing instructions and documents waiting to be printed. The more memory in a printer, the faster it will be able to print large documents.  Duplex printing – Allows automatic printing on both sides of a sheet of paper to reduce paper waste and to protect the environment  Ink-jet printers  Spray ink at high speed onto the surface of paper  Most widely used printers  Printing available in black only or color 1-98 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 Reliable, quiet, and relatively inexpensive  Most costly aspect is replacing ink cartridges  Laser printers  Similar technology to that used in a photocopying machine  Use a laser light beam to produce images with excellent letter and graphics quality  Faster than inkjets and are used in applications requiring highquality output  Two categories o Personal – used by single users and less expensive o Shared – used by a group of users, typically support color, and are more expensive  3D printers also known as additive manufacturing, create threedimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.  There are a variety of different processes and materials that can be used to create each layer.  One of the most common sprays a liquid plastic or plastic like substance through a nozzle like an inkjet printer creating thin layers.  Controlled by data describing the shape of the object to be created; typically comes from a file  Prices have dropped making them available to individuals.  Other Printers  Cloud printers are printers connected to the Internet that provide printing services to others on the Internet. o Google Cloud Print is a service that supports cloud printing. The user must activate a printer using Google Chrome OS and then it can be accessed with a cell phone or other type of computer connected to the Internet.  Thermal printers use heat elements to produce images on heatsensitive paper that are widely used with ATMs and gasoline pumps.  Plotters are special-purpose printers for producing maps, images, and architectural and engineering drawings by using output from graphics tablets and other graphical input devices. o Audio-Output Devices - translate audio information from the computer into sounds that people can understand.  Most widely used audio-output devices are speakers and headphones (See Figure 6-27.)  Connect to a sound card  Wireless connections typically use Bluetooth technology which requires Bluetooth-enabled speakers and/or headphones.  Plays music, vocalize translations from one language to another, and communicate information from the computer system to users.

1-99 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Creating voice output is not as difficult as recognizing and interpreting voice input and can be used to help students study a foreign language for example. o Combination Input and Output Devices - many devices combine input and output capabilities.  Headsets combine the functionality of microphones and headphones.  Accepts audible input and headphones provide audio output  Integral part of multiplayer video game systems  Multifunctional devices (MFD)  Many devices combine the capabilities of a scanner, printer, fax, and copy machine.  Offer a cost and space advantage  Widely used in home and small business offices  Can have slightly lower quality  Virtual Reality (VR) is an artificial, or simulated, reality created in 3-D by computers.  Creates a virtual or immersive experience by using specialized hardware that includes a head-mounted display and controller. (See Figure 6-29.)  VR head-mounted displays have earphones and stereoscopic screens to present 3D images and gyroscopic sensors to interpret head orientation.  VR controllers have sensors that collect data about hand movements. o Coupled with software, this interactive sensory equipment lets you immerses players in a computer-generated world.  There are any number of applications for virtual reality head-mounted displays and controllers.  Drones, or unmanned aerial vehicles (UAV), are now affordable, faster, and smarter making them a valuable tool and fun high-tech toy. (See Figure 6-30.)  Most drones take input from a controller from either a radio joystick or a Wi-Fi connected tablet or laptop.  Drones act as an output device, sending back video and sound to the user.  Can be used in agriculture to apply pesticides and monitor livestock; or in disaster relief to look for people in distress and by the Post Office to deliver mail  Robots, like drones, have become relatively inexpensive with expanding capabilities.  Use cameras, microphones, and other sensors as inputs  Recent improvements in robotics software and decreases in hardware prices have made robots more prevalent in industrial and hobbyist workshops.  Robots can be found almost everywhere, including vacuuming floors in homes, assembling cars in factories, and aiding surgeons in hospitals. 1-100 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Ergonomics is the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task. o For computer users and manufactures this means devising ways that input and output devices can be used and designed to increase ease of use and to avoid health risks.  Sitting in front of a screen in awkward positions for long periods may lead to physical problems such as eyestrain, headaches, and back pain.  Computer users can alleviate these problems by taking frequent rest breaks and by using well-designed computer furniture. o Eyestrain and headache – To alleviate, take a 15-minute break every hour or two. Keep everything you‘re focusing on at about the same distance, approximately 20 inches away. o Back and neck pain – To help avoid, adjust your chair for height and angle, and the chair should have good back support.  The monitor should be at eye-level or slightly below eye level.  Use a footrest to reduce leg fatigue. o Repetitive strain injury – (RSI) is an injury that is caused by fast, repetitive work that can generate neck, wrist, hand and arm strain. o Use ergonomic keyboards and take frequent short rest breaks and gently massage your hands. o The design of portable computers presents some specific ergonomic challenges.  Cell phones and texting cause pain at the base of the muscles of the thumb or wrist.  Tablets being held in a person‘s hands improperly aligns the head to the viewing surface causing neck and back pain.  Laptops with attached screens and keyboards; it‘s difficult to get an optimum angle for both. o In today‘s world, it is important to protect yourself by using computers appropriately. 

Careers in IT o Technical writers prepare instruction manuals, technical reports, and other scientific or technical documents. o Work for computer software firms, government agencies, or research institutions o They translate technical information into easily understandable instructions or summaries. o Requires an associate or a college degree in communications, journalism, or English and a specialization in, or familiarity with, a technical field o Annual salary range $43,000 – $88,000 o Advancement opportunities can be limited within a firm or company, but there are additional opportunities in consulting. A Look to the Future-The Internet of Things (IoT) o Promises many excited innovations that are already happening o Cell phones can monitor location; and smartwatches can count and track workouts. 1-101 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o In the future most items will likely include a chip that uniquely identifies them and shares appropriate data to applications running on the Internet.  Includes clothes, purses  Food will be identified, and refrigerators will be able to read the chips and provide feedback on what is being eaten, what might spoil and what foods need to be restocked. o Privacy advocates raise concerns related to the IoT.  With sensors recording your location, shopping habits, diet, activity, etc. companies and governments will have an unprecedented, detailed view of people‘s lives.

1-102 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

What is Input? Input devices are hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process. o Emphasize that it is how users put data into the system. Demonstrate Siri or Cortana with voice commands. o Keyboard Entry – Students are familiar with most types of keyboards. Have students identify and describe different keyboards that they have seen or used.  Discuss the variety of keyboard designs; virtual, laptop, and traditional. o Pointing Devices – Most students are familiar with the various pointing devices, so you can have them list the different types of devices they know and discuss their uses.  Touch Screen  Stylus and handwriting recognition software. Have students research how handwriting recognition software works.  Multi-touch screen – commonly used on cell phones, tablets, laptops, and some desktops.  Mouse  Wireless – Have students research how a wireless mouse works.  Touch pad – similar to a mouse  Game Controllers – input device for games, students have a great deal of knowledge in this area and can lead discussions on how each, joysticks, gaming mice, gamepads and motion-sensing devices are used. o Scanning Devices Most students are familiar with the various scanning devices, so you can have them list the different types of devices they know and discuss their uses. Have students give examples of each of the following.  Optical scanner  Flatbed  Document  Portable  3D—Have a discussion of what can be created with a 3D printer.  Assign groups and give students areas such as medical, science, etc. to research what 3D printers have been able to create. Research the first 3D printed car.  Card Readers  Magnetic card reader  Chip cards – Ask students why these chip cards are more secure?  Discuss the pros and cons of contactless payment.  Bar code readers  UPCs; discuss how and where used  MaxiCode; discuss how it is used by UPS  RFID (radio-frequency identification)  Used to monitor and locate pets, track food from farm to table, record prices, product descriptions, and locations of retail items  Character and mark recognition devices - discuss which entities use the following: 1-103 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 Magnetic-ink character recognition (MICR)  Optical-character recognition (OCR)  Optical-mark recognition (OMR)  After discussing readers and how they work, ask students to think of different readers that they have encountered. What the students may find is their own realization of just how integrated technology is that it is taken for granted. o Image Capturing Devices  Digital camera capture images digitally  Webcams – specialized digital video cameras that capture images and send them to a computer for broadcast  Popular videoconferencing apps, such as Zoom, Microsoft Teams, and Apple‘s FaceTime use webcams to allow you to communicate in real time. o Audio-Input devices  Convert sounds into a form that can be processed by the system unit. The most widely used audio-input device is the microphone.  Voice Recognition Systems - Ask students to conduct research on the Internet to find applications where voice recognition systems are being widely used. Discuss the use in cars, Siri, Cortana, Google Now. Discuss Amazon‘s Echo, Apple‘s HomePod and Google‘s Home. What is Output? o Most students are familiar with the various output devices, so you can have them list the different types of devices they know and discuss their uses. o Monitors o Discuss the newest tv‘s and what the resolution information means for them as viewers and/or gamers.  Resolution – one of the most important features of a monitor. Images for formed on a monitor by a series of dots or pixels. Resolution is expressed as a grid of those dots or pixels.  Dot (pixel) pitch – is the distance between each pixel. Most new monitors have a dot pitch of .31 mm or less. The lower the dot pitch (the shorter the distance between pixels), the clearer the images produced.  Contrast ratios – indicate a monitor‘s ability to display images. It compares the light intensity of the brightest white to the darkest black. The higher the ratio, the better the monitor.  Active display area (size) – is measured by the diagonal length of a monitor‘s viewing area. Common sizes or active display areas are 15, 17, 19, 21, and 24 inches.  Aspect ratio – is determined by the width of a monitor divided by its height. Common aspect ratios for monitors are 4:3 (standard, similar to traditional television pictures) and 16:10 (wide screen).  Different types of monitors include:  Flat-panel monitors – are the most widely used type of monitor today.  E-book Readers – are dedicated mobile devices for storing and displaying ebooks and other electronic media including electronic newspapers and magazines. Examples are Amazon‘s Kindle and Walmart‘s Kobo. 1-104 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Other Monitors – these monitors are used for more specialized applications, such as making presentations, and watching television. Three of these specialized devices are digital whiteboards, flexible screens, and digital projectors. Discuss the new Samsung Galaxy Fold, a cell phone with a screen that unfolds to become a tablet. o Printers  Printers translate information that has been processed by the system unit and present the information on paper.  Discuss the features that distinguish different printers.  Resolution  Color  Speed  Memory  Duplex printing  Ink-jet printers  Laser printers  3D printers (additive manufacturing)  Other Printers  Cloud printers – Ask students to discuss the benefits associated with these types of printers. Do they anticipate the need to use this type of technology? If so, explain why.  Thermal printers  Plotters o Audio –Output Devices  Speakers  Headphones  Discuss wireless connections using Bluetooth. Combination Input-Output devices o Multifunctional devices (MFD) typically combine the capabilities of a scanner, printer fax, and copy machine. o Virtual Reality (VR) Head-Mounted Displays and Controllers  VR is an artificial, or simulated, reality created in 3-D by computers.  Creates a virtual or immersive experience by using specialized hardware that includes VR head-mounted displays and VR controllers.  VR head-mounted displays have earphones and stereoscopic screens to present 3D images as well as sensors to interpret head orientations.  VR controllers have sensors that collect data about hand movements.  Coupled with software, this interactive sensory equipment lets you immerses yourself in a computer-generated world.  Discuss applications for virtual reality head mounted displays and controllers. o Drones, or unmanned aerial vehicles (UAV), are now affordable, faster, and smarter, making them a valuable tool and fun high-tech toy. (See Figure 6-30.)  Most drones take input from a controller from either a radio joystick or a Wi-Fi connected tablet or laptop.  Drones act as an output device, sending back video and sound to the user. 1-105 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Can be used in agriculture to apply pesticides and monitor livestock; or in disaster relief to look for people in distress and by the Post Office to deliver mail. o Robots, like drones, have become relatively inexpensive with expanding capabilities.  Use cameras, microphones, and other sensors as inputs  Recent improvements in robotics software and decreases in hardware prices have made robots more prevalent in industrial and hobbyist workshops.  Drones and Robots are great discussion items for students to research the latest products in a variety of different industries, such as manufacturing and healthcare. Ergonomics - the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task. For computer users and manufactures this means devising ways that input and output devices can be used and designed to increase ease of use and to avoid health risks. Sitting in front of a screen in awkward positions for long periods may lead to physical problems such as eyestrain, headaches, and back pain. Computer users can alleviate these problems by taking frequent rest breaks and by using well-designed computer furniture. o Eyestrain and headache – Take a 15-minute break every hour or two. Keep everything you‘re focusing on at about the same distance. o Back and neck pain – Adjust your chair for height and angle, and the chair should have good back support. The monitor should be at eye-level or slightly below eye level. Use a footrest to reduce leg fatigue. o Repetitive strain injury – (RSI) is an injury that is caused by fast, repetitive work that can generate neck, wrist, hand and arm strain. Use ergonomic keyboards and take frequent short rest breaks and gently massage your hands. o Discuss the issues of portable computers and ergonomics. The design of portable computers, including cell phones, tablets, and laptops, presents some specific ergonomic challenges.  Cell phones: Thumbs are often used to type on a tiny keyboard, causing pain at the base or in the muscles of the thumb or wrist. Try to keep wrists straight (not bent), head up, and shoulders straight and frequently rest thumbs by using other fingers.  Tablets: Tablet hunch, can be minimized by taking frequent breaks, moving around while working, using a tablet cover or stand that allows the screen to be tipped at various angles, and using an external keyboard.  Laptops: Raise the level of the screen by using books or reams of paper under the laptop and attach an external keyboard to be used at waist level. o Have students look around their classroom or their home ―office‖ and determine if it is ergonomically ―correct".

1-106 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term 3D printer

3D scanner active display area additive manufacturing

aspect ratio bar code bar code reader bar code scanner Bluetooth card reader carpal tunnel syndrome clarity cloud printer combination key connectivity contrast ratio

cordless mouse digital camera digital projector digital whiteboard display screen document scanner

Definition Also known as additive manufacturing, create threedimensional shapes by adding very thick layers of materials until the final shape is fully formed, (See also additive manufacturing) Use lasers, cameras, or robotic arms to record the shape of an object Diagonal length of a monitor‘s viewing area and is also known as size Also known as 3D printers, create three-dimensional shapes by adding very thick layers of materials until the final shape is fully formed, (See also 3D printers) Indicates the proportional relationship between a display‘s width and height and is usually expressed by tow numbers separated by a colon such as 16:9 Vertical zebra-striped marks printed on product containers Contains photoelectric cells that scan or read bar codes (See also bar code scanner) Contains photoelectric cells that scan or read bar codes (See also bar code reader) Type of wireless connection (Discussed in Chapter 8) Interprets encoded information from a variety of cards Repetitive strain injury consisting of damage to the nerves and tendons in the hands Quality and sharpness of displayed images Printers connected to the Internet that provide printing services to others on the Internet A key, that when held down in combination with another key, performs an action The ability of a device to connect to a network Indicates a monitor‘s ability to display images by comparing the light intensity of the brightest white to the darkest black A battery-powered device that uses radio waves or infrared light waves to communicate with the system unit (See also wireless mouse) Captures images digitally and stores the images on a memory card or in the camera‘s memory Projects images from a traditional monitor onto a screen or wall Specialized device with a large display connected to a computer or projector (see also interactive whiteboard) Presents visual images of text and graphics (See also monitor) Quickly scans multipage documents by automatically 1-107

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


dot pitch dots-per-inch (dpi) drones duplex printing e-book reader e-books e-ink electronic book e-reader ergonomics flatbed scanner flat-panel monitor flexible screen game controller gamepad gaming mice Google Cloud Print grayscale handwriting recognition software headphone headset immersive experience

inkjet printer input

feeding one page at a time through a scanning surface Distance between each pixel on a monitor (See also pixel pitch) Measurement of printer resolution; the higher the dots-perinch the better the quality of the printed image Also known as unmanned aerial vehicles (UAVs), take input from a controller from either a radio joystick or a WiFi connected tablet or laptop and act as an output device Printing feature that allows automatic printing on both sides of a sheet of paper Store and display e-books and other electronic media using e-ink technology Traditional printed books in electronic format (See also ebook reader and electronic book) Produces images that reflect light making the display easy to read Traditional printed books in electronic format (See also ebook reader and e-book) Dedicated, handheld, book-sized devices that display text and graphics (See also e-book) Study of human factors related to things people use Much like a copy machine where the image to be scanned is placed on a glass surface and the scanner records the image Most widely used type of monitor Allow digital devices to display images on surfaces that are not flat Provides input to computer games Designed to be held by two hands and provide a wide array of inputs including motion, turning, stopping, and firing Similar to traditional mice with higher precision, faster responsiveness, and programmable buttons Service that supports cloud printing Images are displayed in many shades of gray Translates handwritten notes into a form that the system unit can process Audio-output device that connects to a sound card within the system unit Combines the functionality of microphones and headphones Strives to create a virtual experience by using specialized hardware that includes a head-mounted display and controller A type of printer that sprays ink at high speed onto the surface of paper that are widely used and relatively inexpensive Any data or instructions that are entered into a computer 1-108

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


input device interactive whiteboard joystick keyboard laptop keyboard laser printer light-emitting diode (LED)

liquid crystal display (LCD) magnetic card reader magnetic-ink character recognition (MICR) MaxiCode monitor motion-sensing device mouse mouse pointer multifunctional device (MFD)

multitouch screen

optical scanner optical-character recognition (OCR) optical-mark recognition (OMR) organic light-emitting diode (OLED) output output device personal laser printer

Hardware used to translate words, numbers, sounds, images, and gestures that people understand into a form that the system unit can process Specialized device with a large display connected to a computer or projector (see also digital whiteboard) Control game actions by users varying the pressure, speed, and direction of a control stick Converts numbers, letters, and special characters that people understand into electrical signals Smaller than traditional keyboards with fewer keys Uses a technology like a photocopying machine Use more advanced backlighting technology producing better quality images, are slimmer, and are more environmentally friendly requiring less power and use fewer toxic chemicals Backlit with a common source of light that is dispersed over all the pixels on the screen and widely used for older monitors and is typically less expensive Reads encoded information stored on a thin magnetic strip located on the back of a card Used by banks to automatically read numbers on the bottom of checks and deposit slips Bar code widely used by UPS and others to automate the process of routing packages, tracking in-transit packages, and locating lost packages Presents visual images of text and graphics (See also display screen) Controls games with user movements Controls a pointer that is displayed on the monitor Often in the form of an arrow, it moves on the screen as the user moves the computer mouse Combination input/output device that combines the capabilities of a scanner, printer, fax, and copy machine Can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers Accepts documents consisting of text and/or images and converts them to machine-readable form Uses special preprinted characters that can be read by a light source and changed into machine-readable code Senses the presence or absence of a mark Replaced the LED monitor‘s back lighting technology with a thin layer organic compound that produces light Processed data or information Any hardware used to provide or to create output Less expensive and are used by a single user printing 15 to 1-109

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


picture element pixel pixel pitch platform scanner plotter pointing device portable scanner printer repetitive strain injury (RSI) resolution (monitor) resolution (printer)

RFID reader

17 pages a minute A series of dots, or pixels, that form images on a monitor (See also pixel) A series of dots that form images on a monitor (See also picture elements) Distance between each pixel (See also dot pitch) Wall or table mounted bar code scanner Special-purpose printer for producing maps, images, and architectural and engineering drawings Provides an intuitive interface with the system unit by accepting physical movements or gestures and converting them into machine-readable input Typically, a handheld device that slides across the image, making direct contact Translates information that has been processed by the system unit and presents the information on paper Injury that is caused by fast, repetitive work that can generate wrist, hand, and arm pain A grid of pixels measured in dots per inch (dpi) A measure of the clarity of images produced, measured in dpi (dots per inch) Used to read radio frequency identification information and a few of the uses include; can track and locate lost pets, monitor production and update inventory to record prices, product descriptions and locations of retail items

RFID (radio-frequency Tiny chips that can be embedded in almost anything identification) tag Use cameras, microphones, and other sensors as inputs and robot based on the input create outputs Convert scanned text and images into a form that the scanner system unit can process (See also scanning device) Convert scanned text and images into a form that the scanning device system unit can process (See also scanner) Laser printer used by a group of users (See also laser shared laser printer printer) speaker An audio-output device Pen-like device that uses pressure to draw images on a stylus screen Prepares instruction manuals, technical reports, and other technical writer scientific or technical documents Uses heat elements to produce images on heat-sensitive thermal printer paper toggle key Key that turns a feature on or off Controls the pointer by moving and tapping a finger on the touch pad surface of a pad Allows users to select actions or commands by touching touch screen the screen with a finger or penlike device 1-110 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Full-sized, rigid, rectangular keyboard that includes function, navigational, and numeric keys Bar code system used by retail stores to automate processes Universal Product Code (UPC) to check out customers, to change product prices, and to maintain inventory records Also known as a drone, takes input from a controller from unmanned aerial vehicle (UAV) either a radio joystick or a Wi-Fi connected tablet or laptop and act as an output device traditional keyboard

virtual keyboard Keyboard image displayed on a touch screen virtual reality (VR) Creates 3D simulated immersive experiences Uses a microphone, a sound card, and special software to voice recognition system allow users to operate computers and to create documents using voice commands Controller with sensors that collect data about your hand movements. Coupled with software, this interactive VR controller sensory equipment lets you immerse yourself in a computer-generated world. Has earphones for immersive sound, stereoscopic screens VR head-mounted display to present 3D images, and gyroscopic sensors to interpret head orientation wand reader Hand-held bar code reader Specialized digital video cameras that capture images and webcam send them to a computer Button located in the middle of a mouse that can be rotated wheel button to scroll through information that is displayed on the monitor Battery-powered device that typically uses radio waves or wireless mouse infrared light waves to communicate with the system unit

1-111 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 6 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers B A C A B B C D A C

Matching Answers D F G A I J B C H E

1-112 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Open Ended Questions: 16. Define input and input devices. Input is any data or instructions that are used by a computer. They can come directly from you or from other sources. Input devices are hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process. 17. Describe the different types of keyboard, pointing, scanning, image capturing, and audio-input devices. Variety of keyboard designs:  Virtual keyboards – primarily used with cell phones and tablets and do not have physical keys, rather, the keys are displayed on a screen and selected by touching their image on the screen.  Laptop keyboards – these keyboards are attached to the laptop system unit and designed to fold up with the laptop monitor. These keyboards include all the keys found on a typical virtual keyboard, as well as extra keys, such as function and navigation keys.  Traditional keyboards—full-sized, widely used on a desktop keyboards that include function, navigational, and numeric keys. Variety of different pointing devices:  Touch screen allows users to select actions or commands by touching the screen with a finger or stylus. A stylus is a penlike device typically used with tablets and mobile devices. Often, a stylus interacts with the computer through handwriting recognition software. Handwriting recognition software translates handwritten notes into a form that the system unit can process. Multitouch screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. Multitouch screens are commonly used with cell phones, tablets, and laptops, as well as some desktops. 

Mouse – A mouse controls a pointer that is displayed on the monitor. The mouse pointer usually appears in the shape of an arrow. It frequently changes shape, however, depending on the application. A mouse can have one, two, or more buttons, which are used to select command options and to control the mouse pointer on the monitor. Some mice have a wheel button that can be rotated to scroll through information that is displayed on the monitor. Traditionally, the detected movements are communicated to the system unit through a cord. Alternatively, the cordless or wireless mouse uses radio waves or infrared light waves to communicate with the system unit.

Like a mouse, a touch pad is used to control the mouse pointer and to make selections. Unlike a mouse, however, a touch pad operates by moving or tapping your finger on the surface of a pad. These devices are widely used instead of a mouse with laptops and some types of mobile devices. 1-113

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Game controllers such as joysticks, gaming mice, gamepads and motion-sensing devices provide input to computer games.

Scanning devices convert scanned text and images into a form that the system unit can process.  Optical scanner – also known simply as a scanner, accept documents consisting of text and/or images and convert them to machine-readable form. These devices do not recognize individual letters or images. Rather, they recognize light, dark, and colored areas that make up individual letters or images.  There are four types of optical scanners: o Flatbed - much like a copy machine o Document - similar to a flatbed scanner except that it can quickly scan multipage documents o Portable - typically a handheld device that slides across the image making direct contact o 3D - use lasers, cameras or robotic arms to record the shape of an object 

Card readers – interpret encoded information on some type of credit card, debit card, access (parking or building) card, and/or some type of identification card. Card readers interpret this encoded information. The encoded information is stored on a thin magnetic strip located on the back of the card. When the card is swiped through the magnetic card reader, the information is read. Many credit cards, known as chip cards, include additional security in the form of a microchip embedded in the credit card. This chip contains encrypted data that makes it nearly impossible for criminals to forge a duplicate card. Some chips require that you insert the card into a specialized reader, while others are contactless, and only require that you hold the card near the reader.

Bar code readers– These devices are either handheld wand readers or platform scanners. They contain photoelectric cells that scan or read bar codes, or the vertical zebra-striped marks printed on product containers.

UPCs (Universal Product Codes) are widely used by retail stores to automate the processes to check out customers, to change product prices, and to maintain inventory records.

MaxiCode is widely used by the United Parcel Service to automate the process of routing packages, tracking, and lost packages.

Cell phones with the appropriate app can also scan codes.

RFID readers – Radio-frequency identification tags are tiny chips that can be embedded in most everything. They contain electronically stored information. They are used to track and locate lost pets; to monitor production and update inventory; and to record prices, product descriptions, and locations of retail items.

1-114 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Character and mark recognition devices – recognize special characters and marks. Three basic types include: MICR (magnetic ink character recognition, read by readers/sorters), OCR (optical character recognition), and OMR (optical mark recognition).

Image capturing devices – create or capture original images. These devices include digital cameras (images downloaded to system unit for further processing and/or printing) and Webcams. Digital cameras capture images digitally and store the images on a memory card or in the camera‘s memory. Most digital cameras are also able to record video as well. Originally, digital cameras were only dedicated devices. Today, many digital cameras are embedded in other devices, such as cell phones and tablets. Digital cameras provide a fast and easy way to create photos to share over social media and e-mail. Webcams are specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet. Webcams are built into most cell phones and tablets. Desktop and laptop webcams are either built in or attached to the computer‘s monitor. Popular apps Skype and FaceTime use webcams to allow you to communicate in real time with friends and family using live video.

Audio-input devices – convert sounds into a form that can be processed by the system unit. By far the most used audio-input device is the microphone. Audio input takes many forms, including the human voice and music. Voice recognition systems use a combination of microphone, a sound card, and special software.

18. Define output and output devices. Output is processed data or information. Output typically takes the form of text, graphics, photos, audio, and/or video.  Output devices are hardware used to provide or to create output. They translate information that has been processed by the system unit into a form that people can understand. There are a wide range of output devices. The most widely used are monitors, printers, and audio-output devices. 19. Describe the features and different types of monitors and printers. Monitors are also known as display screens. They present visual images of text and graphics. The output is often referred to as soft copy. Monitors vary in size, shape, and cost. The most important characteristic is clarity which is a function of the following features:  Resolution – one of the most important features of a monitor. Images for formed on a monitor by a series of dots or pixels. Resolution is expressed as a grid of those dots or pixels.  Dot (pixel) pitch – is the distance between each pixel. Most newer desktop monitors have a dot pitch below 0.30 mm (30/100th of a millimeter). Cell phones, which are designed to be viewed more closely than desktop monitors, can have dot pitches below 0.05 mm (5/1000th of a millimeter). The lower the dot pitch (the shorter the distance between pixels), the clearer the images produced.  Contrast ratios – indicate a monitor‘s ability to display colors. It compares the light intensity of the brightest white to the darkest black. The higher the ratio, the better the monitor. 1-115 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Active display area (size) – is measured by the diagonal length of a monitor‘s viewing area. Common sizes are 15, 17, 19, 21, and 24 inches. Aspect ratio – is determined by the width of a monitor divided by its height. Common aspect ratios for monitors are 4:3 (standard, like traditional television pictures) and 16:10 (wide screen)

 

Different types of monitors include: Flat-panel monitors – are the most widely used type of monitor today. They are thin, more portable, and require less power to operate. o Most of today's flat-panel monitors are LCD (liquid crystal display). One characteristic of LCD technology is that the monitors are back-lit meaning that a common source of light is dispersed over all the pixels on the screen. LED, light-emitting diode, advanced technology, slimmer, better picture quality and environmentally friendly, and OLED (organic light-emitting diode) replace the LED monitor‘s back lighting technology with a thin layer or organic compound that produces light. E-book Readers – are dedicated mobile devices for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Other Monitors – These monitors are used for more specialized applications, such as making presentations and watching television. Some of these specialized devices are digital whiteboards, flexible screens, and digital projectors.

 

Printers: translate information that has been processed by the system unit and present the information on paper. Features – Basic distinguishing features include: o Resolution - the clarity of images produced and measured in dpi (dots per inch). The higher the dpi, the better the quality of images produced. o Color capability – provided by most printers today. Users typically have the option to print either with just black ink or with color. o Speed - measured in the number of pages printed per minute. o Memory – printer memory is used to store printing instructions and documents waiting to be printed. The more memory in a printer, the faster it will be able to create large documents. o Duplex printing – allows automatic printing on both sides of a sheet of paper. o Connectivity – the ability of the printer to connect to a network, eliminating the need for a computer to be attached by a cable to the printer and making it easier for multiple computers to share one printer. Many printers include the ability to connect to a network over Wi-Fi or Ethernet. o Ink-jet printers  Spray ink at high speed onto the surface of paper  Most widely used printers  Available in black and white or color  Relatively inexpensive  Most costly aspect is replacing ink cartridges o Laser printers  Use a laser light beam to produce images with excellent letter and graphics quality. 1-116

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

Available in black and white or color More expensive than inkjets Faster than inkjets and are used in applications requiring high-quality output  Two categories  Personal – used by single users  Shared – used by a group of users, typically support color, and are more expensive o 3D printers, also known as additive manufacturing, create threedimensional shapes by adding very thin layer after layer of material until the final shape is fully formed. There are a variety of different processes and materials that can be used to create each layer. 3D printers are controlled by data, usually a file, describing the shape of the object to be created. o Other Printers  Cloud printers are printers connected to the Internet that provide printing services to others on the Internet.  Thermal printers use heat elements to produce images on heatsensitive paper.  Plotters are special-purpose printers for producing maps, images, and architectural and engineering drawings. 20. Describe audio-output devices. Audio-output devices translate audio information from the computer into sounds that people can understand. The most widely used audio-output devices are speakers and headphones. These devices connect to a sound card within the system unit. This connection can be by cable to an audio jack on the system unit, or the connection can be wireless. Wireless connections typically use Bluetooth technology. This connection requires special Bluetoothenabled and/or headphones. Audio-output devices are used to play music, vocalize translations from one language to another, and communicate information from the computer system to users. 21. Discuss combination input and output devices, including multifunctional devices, headsets, drones, robots, and virtual reality head-mounted displays and controllers. Combination input and output devices are hardware that combines input and output capabilities. Some of these include multifunctional devices, Internet telephones, and robots.  Headsets combine the functionality of microphones and headphones. The microphone accepts audible input and headphones provide audio output  Multifunctional devices (MFD), - typically combine the capabilities of a scanner, printer, fax, and copy machine into one unit.  Virtual reality (VR) is an artificial, or simulated, reality created in 3D computers. It strives to create a virtual or immersive experience by using specialized hardware that includes a head-mounted display and controller. o VR Head-mounted displays have earphones and three-dimensional stereoscopic screens. o VR controllers have sensors that collect data about hand movements. 1-117 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Drones, or unmanned aerial vehicles (UAV), take input from a controller from either a radio joystick or a Wi-Fi connected tablet or laptop. Robots, like drones, have become relatively inexpensive with expanding capabilities. Robots use cameras, microphones, and other sensors as inputs. Based on these inputs, robotic outputs can be either simple or complex.

22. Define ergonomics and describe ways to minimize physical discomfort and discuss design issues with portable computers. Ergonomics is the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task. For computer users and manufactures this means devising ways that input and output devices can be used and designed to increase ease of use and to avoid health risks. Sitting in front of a screen in awkward positions for long periods may lead to physical problems such as eyestrain, headaches, and back pain. Computer users can alleviate these problems by taking frequent rest breaks and by using well-designed computer furniture.  Eyestrain and headache – Take a 15-minute break every hour or two. Keep everything you‘re focusing on at about the same distance.  Back and neck pain – Adjust your chair for height and angle, and the chair should have good back support. The monitor should be at eye-level or slightly below eye level. Use a footrest to reduce leg fatigue.  Repetitive strain injury – (RSI) is an injury that is caused by fast, repetitive work that can generate neck, wrist, hand and arm strain. Use ergonomic keyboards and take frequent short rest breaks and gently massage your hands.  Portable computers provide some specific ergonomic challenges: o Cell phones: Thumbs are often used to type on a tiny keyboard. The result can be a pain at the base or in the muscles of the thumb or wrist. This problem can be minimized by keeping wrists straight (not bent), head up, and shoulders straight and frequently resting thumbs by using other fingers. o Tablets: Almost all tablets use a virtual keyboard and are designed to be held in your hands, flat on a table, or slightly angled. These design features cause the user to improperly align his or her head to the viewing surface, often causing neck and back pain. This problem, sometimes referred to as tablet hunch, can be minimized by taking frequent breaks, moving around while working, using a tablet cover or stand that allows the screen to be tipped at various angles, and using an external keyboard. o Laptops: It is impossible to optimally position both the keyboard and the screen together for safe ergonomic use. When the screen is positioned appropriately at eye level, the keyboard is too high. When the keyboard is appropriately positioned, the screen is too low. To minimize the negative impact, raise the level of the screen by using books or reams of paper under the laptop and attach an external keyboard to be used at waist level.

Chapter 7 Secondary Storage Lecture Guide 

Learning Objectives 1-118

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Distinguish between primary and secondary storage. o Identify the important characteristics of secondary storage including media, capacity, storage devices, and access speed. o Define solid-state storage including solid-state drives, flash memory cards, and USB drives. o Describe hard-disk platters, tracks, sectors, and cylinders. o Compare performance enhancements including disk caching, RAID, hybrid drives, file compression, and file decompression. o Define optical storage including compact discs, digital versatile discs, and Blu-ray discs. o Compare internal, external, and network drives. o Define cloud storage and cloud storage services. o Describe mass storage, mass storage devices, enterprise storage systems, and storage area networks.

Chapter Outline 

Storage o An essential feature of every computer is the ability to save, or store, information. o Random-access memory (RAM) holds or stores data and programs that the CPU is currently processing.  RAM is sometimes referred to as primary storage. Most RAM provides only temporary or volatile storage. That is, if the computer is turned off or loses power, all of the information stored on RAM is erased.  Has the disadvantage of being relatively small and unable to hold all the videos, photos, and applications that we regularly use o Secondary storage provides permanent or nonvolatile storage with far larger capacity than RAM.  Using secondary storage devices, such as a solid state drive, data and programs can be retained after the computer has been shut off.  This is accomplished by writing files to and reading files from secondary storage devices o Writing is the process of saving information to the secondary storage device. o Reading is the process of accessing information from secondary storage. o Important characteristics of secondary storage  Media are the physical material that holds the data and programs. (See Figure 7-1.)  Capacity measures how much a storage medium can hold.  Storage devices are hardware that reads data and programs from storage media. These devices are typically referred to as drives. Most also write to storage media. 1-119

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Access speed measures the amount of time required by the storage device to retrieve data and programs. o Most cell phones and tablets, and laptops have solid-state storage drives. Most desktop computers have internal hard disk drives. 

Solid State Storage Solid-state storage devices provide access to flash memory, commonly known as solid-state storage. o Solid-State Drives (SSDs)  Store and retrieve data and information much in the same manner as RAM  Are fast and durable and require little power, making them popular for cell phones, tablets, and laptops  Common on mobile devices and are gaining popularity on gaming computers and desktops due to their speed and power efficiency  Can provide internal storage or be located inside the system unit, or provide external storage o Flash Memory Cards  Are small solid-state storage devices widely used in portable devices such as cell phones, laptops, and GPS navigation systems (See Figure 7-4.)  Commonly used in digital cameras and cell phones o USB Flash Drives  Also known simply as flash drives  Very compact  Connect directly to a computer‘s USB port to transfer files.  Can have capacities ranging from 1 GB to 2 TB; and higher (See Figure 7-5.) Hard Disks o Unlike solid-state drives, which have no moving parts, hard disk drives rotate and have read/write heads that move in and out. These moving parts allow hard disk drives to use inexpensive technology to provide large capacity storage; however, they also make hard disks less durable and slower than solid-state drives. o Save files by altering the magnetic charges of the disk‘s surface to represent 1s and 0s. o Retrieve data and programs by reading the charges from the magnetic disk. o Density refers to how tightly these charges can be packed next to one another on the disk. o Rigid metallic platters that are stacked one on top of another. o Store and organize files using tracks, sectors, and cylinders  Tracks are rings of concentric circles on the platter.  Each track is divided into invisible wedge-shaped sections called sectors. (See Figure 7-6.)

1-120 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o o

o o

A cylinder runs through each track of a stack of platters and they are necessary to differentiate files stored on the same track and sector of different platters. When a hard disk is formatted, tracks, sectors, and cylinders are assigned. Three basic types of hard disks:  Internal hard disk  Located inside the system unit  Can store and retrieve large quantities of information quickly such as programs and data  External hard disk  Slower access than internal hard disks  Typically connected to a USB or Thunderbolt port on the system unit, are easily removed, and effectively provide an unlimited amount of storage  Use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk  Other uses for external drives include backing up the contents of the internal hard disk and providing additional hard-disk capacity.  Network Drive  Drive or drives on a network and can be located across the world from the system unit  Popular solution for individuals and businesses where access speed is not essential, but capacity and durability are crucial Performance Enhancements Three ways to improve the performance of hard disks:  Disk caching  Improves hard-disk performance by anticipating data needs  Improves processing by acting as a temporary highspeed holding area  Requires a combination of hardware and software  Frequently used data is read from the hard disk into disk cache and then when needed, the data is accessed directly from memory.  Transfer rate is much faster.  Increases system performance by 30 percent  Hybrid drives  Storage drives that contain both solid-state storage and hard disks to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives

1-121 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Typically, use SSD to store the operating system and applications and hard disks to store videos, music, and documents Redundant arrays of inexpensive disks (RAID)  Improves performance by expanding external storage, improving access speed, and providing reliable storage  Several inexpensive hard-disk drives are connected to one another. o These connections can be by a network or within specialized RAID devices. (See Figure 78.)  The computer system interacts with the RAID system as though it were a single large-capacity hard-disk drive.  The result is expanded storage capability, fast access speed, and high reliability.  RAID is often used by Internet servers and large organizations. File compression and file decompression  Increase storage capacity by reducing the amount of space required to store data and programs  File compression is not limited to hard disks systems. o Frequently used to compress files on DVDs, CDs, and flash drives  File compression helps speed up transmission of files from one computer system to another.  File compression programs scans files for ways to reduce the amount of required storage. o In file compression repeated patterns are replaced with a token, leaving enough tokens so that the original can be rebuilt or decompressed. o File compression programs often shrink files to a quarter of their original size.  Windows and Mac operating systems provide compressions and decompression utilities.  For more advanced compression use specialized utilities, such as WinZip.

Optical Discs o Can hold over 128 gigabytes of data. (See Figure 7-10.)  Equivalent of millions of typewritten pages o A laser beam alters the surface of a plastic or metallic disc to represent data. o Use reflective light to represent data o The 1s and 0s are represented by flat areas called lands and bumpy areas called pits on the disc surface. o Discs are read by an optical disc drive using a laser that projects a tiny beam of light on these areas. 1-122

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o o o

o

o

o 

The amount of reflected light determines whether the area represents a 1 or a 0. Like hard disks, use tracks and sectors to organize and store data Typically use a single track that spirals toward the center of the disk. This single track is divided into equally sized sectors. The most widely used optical discs are CD, DVD, and Blu-ray discs.  Compact disc stores 700 MB (megabytes) of data; have largely been replaced by DVDs and Blu-ray discs.  Digital versatile discs (DVD) can store 4.7 GB, seven times the capacity of CDs.  Blu-ray discs (BDs) have a typical capacity of 50GB, which is 10 times the capacity of DVDs, store hi-def video and the newest video games, Ultra HD Blu-rays (UHD BD), are able to play back 4K video content and store up to 100 GB of data. Each of the optical discs has three basic formats  Read only—cannot be written to or erased by user; contain music, movies and Blu-ray video games are often read only  Write once (R for recordable)—can be written to once and then can be read many times but cannot be written on or erased  Used for permanent archives such as home movies  Rewriteable (RW for rewritable or RAM for random-access memory)—are like write once discs except that the disc surface is not permanently altered when data is recorded; these portable storage options are popular for storing and sharing audio, video, and large multimedia presentations Some optical discs, referred to as double-sided discs, contain information on both sides of the disc and need to be flipped over to read the other side, effectively doubling the storage capacity of the disk, such as the DVD. Another way to add capacity to an optical disc is by adding multiple recording layers, such as some Blu-ray discs. (See Figure 7-11.)

Cloud Storage o Cloud computing where the Internet acts as a ―cloud‖ of servers that supply applications as a service rather than a product o These servers provide cloud storage, also known as online storage. o No installation on local computer, only need Internet ready device to display results  Google Drive Docs is provided on the cloud. (See Figure 7-12.) o Benefits of cloud computing are numerous.  Maintenance - cloud service takes care of back-ups, encryption and security.  Hardware upgrades - cloud service will never run out of disk space, can replace failed hard disks without interruption to the user.  File synching and collaboration - share documents, spreadsheets, and files with others from anywhere with an Internet connection. 1-123

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o There are some disadvantages of cloud storage. Two primary concerns are:  Access speed - data transfer rate is dependent upon the speed of your Internet connection  File security - users are dependent upon the cloud service's security procedures o There are many websites that provide cloud storage services. (See Figure 7-13.) Mass Storage Devices o Mass storage refers to the tremendous amount of secondary storage required by large organizations. o Mass storage devices are specialized high-capacity secondary storage devices designed to meet organizational demands for data storage. o Allow large corporations and institutions to centralize maintenance and security of data thereby reducing costs and personnel o Enterprise Storage Systems are used to promote efficient and safe use of data across organizational networks within large organizations. (See Figure 7-14.) o Some of the mass storage devices that support this strategy include:  File servers—dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data  Network attached storage (NAS) – a type of file server widely used for home and small business storage needs  easy to set up and easy to manage  RAID systems—larger versions of specialized devices that protect data by constantly making backup copies of files moving across the organization‘s networks  Organizational cloud storage - high-speed Internet connection to a dedicated remote storage facility  These facilities contain banks of file servers to offer enormous amounts of storage. o Storage Area Network (SAN)  Architecture to link remote computer storage devices, such as enterprise storage systems, to computers such that the devices are as available as locally attached drives  In a SAN system, the user‘s computer provides the file system for storing data, but the SAN provides the disk space for data.  Key to a SAN is:  High-speed network, connecting individual computers to mass storage devices  Special file systems prevent simultaneous users from interfering with each other.  Provide the ability to house data in remote locations and still allow efficient and secure access Careers In IT o Disaster recovery specialists 1-124

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


   

Responsible for recovering systems and data after a disaster strikes an organization  Create plans to prevent and prepare for disasters  A crucial part of a plan is to use storage devices and media in order to ensure that all company data is backed up and, in some cases, stored off site.  Bachelor's or associate's degree in information systems or computer science  Experience in networking, security, and database administration is desirable  Annual salary: $70,500 to $87,000  Demand expected to grow A Look to the Future-Next-Generation Storage As we record longer videos at greater quality, we need more secondary storage to hold them. Scientists are exploring the use of Samsung‘s Heat-Assisted Magnetic Recording (HAMR) technologies. A HAMR writes data on a special heatsensitive magnetic surface. Intel‘s Optane flash memory is exploring the possibility of storing data not on the surface but in 3D multilevel cells (MLCs), using memory stacks that store information both horizontally and vertically. These dense stacks of bits can be accessed much faster than traditional flash memory. In 2017, Columbia University used encoding techniques developed at Netflix to store 215 petabytes in one gram of DNA. In 2019, researchers at the University of Washington automated the read and write processes used to record data on DNA—bringing the possibility of DNA secondary storage even closer.

1-125 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

Storage o Discuss the important characteristics of secondary storage and compare the different types of storage using these characteristics:  Media or medium, which is the actual physical material that holds the data and programs.  Capacity measures how much a storage medium can hold.  Storage devices are hardware that read data and programs from storage media.  Access speed or access time measures the amount of time required by the storage device to retrieve data and programs.  Most cell phones, tablets, and laptops have solid state storage drives. Desktop computers often have internal hard disk drives.  Poll students as to what they know about storage characteristics, and which are the most important in their opinion. Solid-State Storage o Ask students to describe each of the following:  Solid-State Drives – SSDs are fast and durable and require little power, making them popular for cell phones, tablets, and laptops.  Common on mobile devices  Gaining popularity on gaming computers and desktops due to their speed and power efficiency  Flash Memory Cards – are small solid-state storage devices widely used in portable devices. Some of the cards are used within devices such as cell phones, laptops, and GPS navigation systems. Other cards provide external or removable storage. Flash memory cards are commonly used with digital cameras and cell phones to expand their internal storage.  USB Flash drives – flash drives; connect to USB port; used for transferring files o As an exercise, ask students about their mobile devices and ask them to explain what type of solid-state storage they may be using on them. Hard Disks o Internal hard disk  Discuss with students how to ensure adequate performance of the internal hard disk and the safety of data by performing routine maintenance and periodically making backup copies of all important files. o External hard disk  Point out the benefits of an external hard disk. Because they are easily removed, they are particularly useful to protect or secure sensitive information. Other uses for external drives include backing up the contents of the internal hard disk and providing additional hard-disk capacity. o Network drive 1-126

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


This is a popular solution for individuals and businesses where access speed is not essential, but capacity and durability are crucial. o Performance Enhancements  Briefly cover these aspects.  Disk caching  Hybrid drives  Redundant arrays of inexpensive disks (RAID)  File compression and file decompression o Files compressed before storing and then decompressed before being used again; improves performance through efficient storage o Show students how to ―zip‖ a file and then ―unzip‖ it using Windows and/or Mac utilities. Optical Discs o Compact disc – have mostly been replaced by DVDs and Blu-rays o Digital Versatile Disc – greater capacity than CDs o Blu-ray disc (BD) – stores high-definition video, greatest capacity  Newest Blu-ray disks, Ultra HD Blu-rays (UHD BD), can play back 4K video content and sore up to 100 GB of data. o Optical disc formats  Read only—CD-ROM - it cannot be written on or erased by the user.  Write once—CD-R - it can be written to once.  Rewriteable—CD-RW – can be written to many times. Cloud Storage o Discuss online storage services. (See Figure 7-13.) o Cloud computing where the Internet acts as a ―cloud‖ of servers that supply applications to clients as a service. o How many students use cloud storage? Which ones? How often, What for? Mass Storage Devices o Enterprise storage system – use of data across networks to promote efficient and safe use of data across the networks within their organizations o Devices  File servers  Network attached storage (NAS)  RAID systems  Organizational cloud storage o Storage area network (SAN)  SAN is an architecture to link remote computer storage devices, such as enterprise storage systems, to computers such that the devices are as available as locally attached drives. In a SAN system, the user‘s computer provides the file system for storing data, but the SAN provides the disk space for data. 1-127

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term access speed Blu-Ray Disc (BD) capacity cloud computing cloud storage compact disc (CD) cylinder density digital versatile disc or digital video disc (DVD) disaster recovery specialist

disk caching drive enterprise storage system external hard drive

file compression file decompression file server flash drive flash memory card hard disk drive

Definition Measures the amount of time required by the storage device to retrieve data and programs Newest form of optical storage designed to store hi-def (high definition) video How much a storage medium can hold Internet acts as a ―cloud‖ of servers that supply application services Internet servers that supply applications as a service for online storage The first widely available optical format for PC users, but have largely been replaced by DVDs and Blu-rays Part of a hard disk that runs through each track of a stack of platters How tightly the bits (electromagnetic charges) can be packed next to one another on a disk Standard optical disc in PCs, similar to CDs except that typical DVD discs can store 4.7 GB (gigabytes)—seven times the capacity of CDs Are responsible for recovering systems and data after a disaster strikes an organization as well as they create plans to prevent and prepare for disasters Enhances hard disk performance by improving processing by acting as a temporary high-speed holding area between a secondary storage device and the CPU Storage device that reads data and programs from storage media Large organizations use to promote efficient and safe use of data across the networks within their organizations Connect to a port on the system unit, are not as fast as internal drives, and are removable, providing unlimited storage using a single port Performance enhancement that increases storage capacity by reducing the amount of space required to store data and programs Rebuilding a file that has been compressed Dedicated computer with very large storage capacity that provides users access to fast storage and retrieval of data Solid-state storage device that connects directly to a computer‘s USB port Small solid-state storage device that is widely used with portable devices Secondary storage device of one or more metallic disks using magnetic charges to record data and have large storage capacities and fast retrieval times 1-128

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


hi-def (high definition) Video format used on Blu-ray discs Storage drives that contain both solid-state storage and hard disks to gain the speed and power benefits of SSDs hybrid drives while still having the low cost and large capacity of hard drives Magnetic secondary storage device that is located inside internal hard disk the system unit land Flat area that optical discs use to represent 1s and 0s Refers to the tremendous amount of secondary storage mass storage required by large organizations mass storage device Specialized high-capacity secondary storage device media Physical material that holds data and programs Like a file server except simpler and less expensive network attached storage (NAS) designed for homes and small businesses Hard drive on a network and can be located across the world from the system unit, popular solution for network drive individuals and businesses where access speed is not essential, but capacity and durability are crucial Internet servers that supply applications as a service for online storage storage (See also Cloud Storage) Storage device that uses a laser beam to alter the surface of optical disc a plastic or metallic disc to represent data Uses a laser that projects a tiny beam of light on a disc to optical disc drive reflect the light to determine a pit or land High-speed Internet connection to a dedicated remote organizational cloud storage organizational cloud storage server pit Bumpy area that optical discs use to represent 1s and 0s Component of a hard disk made of a rigid metallic material platter and stacked one on top of another RAM or memory, where data is stored before being primary storage processed System that enhances organizational security by constantly RAID system making backup copies of files moving across the organization‘s networks random-access memory (RAM) Like write-once discs except that the disc surface is not disc permanently altered when data is recorded read-only memory (ROM) disc Cannot be written on or erased by the user recordable (R) disc Discs can be written on once then can be read only Larger versions of the specialized devices that enhance redundant array of inexpensive organizational security by constantly making backup disks (RAID) copies of files moving across the organization‘s networks Like write-once discs except that the disc surface is not rewritable (RW) disc permanently altered when data is recorded secondary storage Provides permanent or nonvolatile storage Hardware where data and programs can be retained after secondary storage device the computer has been shut off (see also storage device) sector Section shaped like a pie wedge that divides the tracks on a 1-129 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


solid-state drive (SSD) solid-state storage storage area network (SAN)

storage device track Ultra HD Blu-ray (UHD BD) USB flash drive write-once disc

disk Storage device that is fast and durable and require little power, making it popular for cell phones, tablets, and laptops Storage devices with no moving parts SAN is a mass storage development to link remote computer storage devices to computers such that the devices are as available as locally attached drives Hardware where data and programs can be retained after the computer has been shut off (see also secondary storage device) Rings of concentric circles without visible grooves, part of how files are stored and organized on a flexible disk Newest Blu-ray discs, able to play back 4K video content and store up to 100 GB of data Hard drive that connects to a computer‘s USB port enabling transfer of files Can be written on once, after that the disc can be read many times but cannot be written on or erased making these discs ideal for creating permanent archives

1-130 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 7 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers A A B B B A D C D D

Matching Answers A E C J Optical Disc H G B D F

Open Ended Questions: 23. Compare primary storage and secondary storage and discuss the most important characteristics of secondary storage. Storage is the ability to save, to back up and even to transport files consisting of data or programs from one location or computer to another. 

Primary storage - Random-access memory (RAM) holds or stores data and programs that the CPU is currently processing. RAM is sometimes referred to as primary storage. Most RAM provides only temporary or volatile storage – if the computer is turned off or loses power, all the information stored on RAM is erased.

Secondary storage provides permanent or nonvolatile storage. Using secondary storage devices, data and programs can be retained after the computer has been shut off.

Important characteristics of secondary storage o Media - are the actual physical material that holds the data and programs. o Capacity - measures how much a particular storage medium can store. o Storage devices - are hardware that read data and programs from storage media. Most also write to storage media. o Access speed or access time - measures the amount of time required by the storage device to retrieve data and programs.

24. Discuss hard disks including density, platters, tracks, sectors, cylinders, internal, external, network, and performance enhancements.  Hard disks save files by altering the magnetic charges of the disk‘s surface to represent 1s and 0s. Hard disks retrieve data and programs by reading the charges from the magnetic disk. 1-131 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Density - refers to how tightly these charges can be packed next to one another on the disk. o Platters - Rigid metallic platters that are stacked one on top of another. o Store and organize files using tracks, sectors, and cylinders.  Tracks are rings of concentric circles without visible grooves.  Sectors - Each track is divided into wedge-shaped sections called sectors.  Cylinders - A cylinder runs through each track of a stack of platters. Cylinders are necessary to differentiate files stored on the same track and sector of different platters. o Three basic types of hard disks:  Internal hard disk  Located inside the system unit.  Almost all of today‘s powerful applications are designed to be stored on and run from an internal hard disk. To ensure adequate performance of your internal hard disk, you should perform routine maintenance and periodically make backup copies of all important files.  External hard disk  Typically connect to a USB or Thunderbolt port on the system unit, are easily removed, and effectively provide an unlimited amount of storage.  Use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk.  Network drive  Drive on a network that can be located across the world from the system unit. This is a popular solution for individuals and businesses where access speed is not essential, but capacity and durability are crucial. o Performance Enhancements - Four ways to improve the performance of hard disks are: 1. Disk caching  Improves hard-disk performance by anticipating data needs  Improves processing by acting as a temporary high-speed holding area  Requires a combination of hardware and software  Frequently used data is read from the hard disk into disk (cache). When needed, the data is then accessed directly from memory.  The transfer rate from memory is much faster  Increases system performance by 30 percent 2. Hybrid drives  Storage drives that contain both solid-state storage and hard disks to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives  Typically, use SSD to store the operating system and applications and hard disks to store videos, music, and documents 1-132 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


3. Redundant arrays of inexpensive disks (RAID)  Improves performance by expanding external storage, improving access speed, and providing reliable storage.  Several inexpensive hard-disk drives are connected to one another. These connections can be by a network or within specialized RAID devices.  The computer system interacts with the RAID system as though it were a single large-capacity hard-disk drive.  The result is expanded storage capability, fast access speed, and high reliability. 4. File compression and file decompression  Increase storage capacity by reducing the amount of space required to store data and programs.  File compression is not limited to hard disks systems.  File compression helps speed up transmission of files from one computer system to another.  File compression programs scans files for ways to reduce the amount of required storage.  In file compression repeated patterns are replaced with a token, leaving enough tokens so that the original can be rebuilt or decompressed.  File compression programs often shrink files to a quarter of their original size.  Can be done with Windows and Mac utilities and specialized utilities such as WinZip 25. Discuss solid-state storage, including solid-state drives, flash memory cards, and USB flash drives. Solid-state storage devices provide access to flash memory, also known as solid-state storage. As we discussed in Chapter 5, flash memory offers a combination of features of RAM and ROM. Like RAM it can be updated, and like ROM it does not lose information when a computer is turned off. Flash memory is a little slower than traditional memory but much faster than other secondary storage drives. 

Solid-State Drives (SSDs)  Fast and durable and require little power, making them popular for cell phones, tablets, and laptops  Common on mobile devices and are gaining popularity on gaming computers and desktops due to their speed and power efficiency  Provide internal storage or be located inside the system unit, Or SSDs can provide external storage

Flash Memory Cards  Small solid-state storage devices widely used in portable devices  Some of the cards are used within devices such as cell phones, laptops, and GPS navigation systems 1-133

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Commonly used with digital cameras and cell phones to expand their internal storage

USB flash drives, or flash drives  Small, solid-state  Connect directly to a computer‘s USB port to transfer files  Can have capacities ranging from 1 GB to 2 TB  Convenient size and large capacities make USB flash drives very popular for transporting data and information between computers, specialty devices, and the Internet.

26. Discuss optical discs including pits, lands, CDs, DVDs, Blue-ray, and hi def.  Optical Discs  Can hold over 128 gigabytes of data  A laser beam alters the surface of a plastic or metallic disc to represent data. Optical discs use reflective light to represent data.  Pits and lands: The 1s and 0s are represented by flat areas called lands and bumpy areas called pits on the disc surface.  Disc is read by an optical disc drive using a laser that projects a tiny beam of light on these areas. The amount of reflected light determines whether the area represents a 1 or a 0.  Optical discs typically use a single track that spirals toward the center of the disk. This single track is divided into equally sized sectors. 

Compact Disc (CD)  Were the first widely available optical format for PC users, but have largely been replaced by DVDs and Blu-rays  Store 700 MB (megabytes) on one side of a CD  Often stores music

Digital Versatile Disc (DVD)  DVD stands for digital versatile disc or digital video disc  Can store 4.7 GB (gigabytes) on one side of a DVD disc  Capacity is 7 times that of a CD

Blu-ray Disc (BD)  Store hi-def (high definition) video  Have a greater capacity than DVDs  Newest Blu-ray disks, Ultra HD Blu-rays (UHD BD) can play back 4K video content and store up to 100 GB of data 

Basic formats: o Read only--cannot be written on or erased by the user. o Write once--can be written to once and read many times but cannot be written to or erased 1-134

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Rewriteable--can be written to many times as the disc surface is not permanently altered when data is recorded 27. Discuss cloud computing and cloud storage.  Cloud Computing o Many applications that would have required installation on your computer to run have moved to the web. Web sites provide application services. This is known as cloud computing, where the Internet acts as a ―cloud‖ of servers that supply applications to clients as a service, rather than a product. o This means that even devices with little storage, memory, or processing power, such as a cell phone, can run the same powerful applications as a desktop computer. o Benefits include maintenance (backups, encryption, and security), hardware upgrades, file synching and collaboration. 

Cloud Storage o Servers provide cloud storage, also known as online storage. o No installation on local computer, only need Internet ready device to access applications and data.

28. Describe mass storage devices including enterprise storage systems, file servers, network attached storage, RAID systems, organizational cloud storage, and storage area network systems.  

Mass storage refers to the tremendous amount of secondary storage required by large organizations. Mass storage devices are specialized high-capacity secondary storage devices designed to meet organizational demands for data. o Enterprise Storage Systems are used to promote efficient and safe use of data across organizational networks within their organizations. Some mass storage devices that support this strategy include:     

File servers—dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data. Network attached storage (NAS) – similar to a file server except simpler and less expensive; widely used for home and small business storage needs. RAID systems—larger versions of the specialized storage devices that protect data by constantly making backup copies of files moving across the organization‘s networks. Organizational cloud storage - high-speed Internet connection to a dedicated remote organizational Internet drive site. Storage Area Network (SAN) 1-135

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

Architecture to link remote computer storage devices, such as enterprise storage systems, to computers such that the devices are as available as locally attached drives User‘s computer provides the file system for storing data, but the SAN provides the disk space for data Key to a SAN is:  High-speed network, connecting individual computers to mass storage devices.  Special file systems prevent simultaneous users from interfering with each other.  Provide the ability to house data in remote locations and still allow efficient and secure access.

Chapter 8 Communications and Networks Lecture Guide 

Learning Objectives o Explain connectivity, the wireless revolution, and communication systems. o Describe wireless and physical communication channels. o Differentiate between connection devices and services including cellular, dial-up, DSL, cable, and satellite. o Describe data transmission factors, including bandwidths and protocols. o Define networks and key network terminology including network interface cards and network operating systems. o Describe different types of networks, including local, home, wireless, personal, metropolitan, and wide area networks. o Describe network architectures, including topologies and strategies. o Explain the organization issues related to Internet technologies and network security.

Chapter Outline 

Communications o The process of sharing data, programs, and information between two or more computers, including:  Texting - provides very efficient direct text communication between individuals using short electronic messages.  E-mail - provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents.  Video Conferencing - provides an alternative to meeting in person using audio communications (such as a phone call) often with video to see the people you talk to.  Electronic commerce - buying and selling goods electronically o Connectivity - using computer networks to link people and resources  For example, connectivity means that you can connect your cell phone to other devices and information sources from almost anywhere. 1-136 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


To be able to efficiently and effectively use computers becomes a matter of knowing about connectivity through networks to cell phones, and also about larger computer systems and information resources. o The Wireless Revolution  The single most dramatic change in connectivity and communications since the development of the internet has been the widespread use of mobile devices like cell phones and tablets with fast wireless Internet connectivity.  Allows individuals to stay connected with one another from almost anywhere at any time  It is estimated that over 2.3 billion cell phones are in use worldwide.  While wireless technology was originally used primarily for voice communications, many of today‘s mobile devices support e-mail, web access, social networking, and a variety of Internet applications.  Allows a wide variety of nearby devices to communicate with one another without any physical connection  High speed Internet wireless technology allows individuals to connect to the Internet and share information from almost anywhere in the world. o Communications systems - electronic systems that transmit data from one location to another o Four basic elements of a communication system include:  Sending and receiving devices –  Often a computer or specialized communication device  Originates (send) as well as accepts (receive) messages in the form of data, information, and/or instructions  Connection devices –  Act as an interface between the sending and the receiving devices and communication channel  Convert outgoing messages into packets that can travel across the communication channel and reverse the process for incoming messages  Data transmission specifications - rules and procedures that coordinate the sending and receiving devices by physically defining how the message will be sent across the communication channel  Communication channel –  Transmission medium that carries the message  Medium can be a physical wire or cable, or it can be wireless Communication Channels o Essential element of every communication system o Carry the data from one computer to another o Two categories of communication channels, wireless and wired o Wireless communications send information through the air, such as when you use a cell phone. o Wired communications require a physical connection and are more common with desktop computers. o Wireless Connections  Do not use a solid substance to connect sending and receiving devices 1-137 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

Data is moved through the air. Most wireless connections use radio waves to communicate. Primary technologies used for wireless connections are cellular, Bluetooth, Wi-Fi, microwave, WiMax, and satellite connections.  Cellular communication uses multiple antennae (cell towers) to send and receive data within relatively small geographic regions (cells). o Most cell phones and other mobile devices use cellular networks.  Bluetooth is a short-range radio communication standard that transmits data over short distances of up to approximately 33 feet. o Widely used for wireless headsets, printer connections, and handheld devices  Wi-Fi (wireless fidelity) uses high frequency radio signals to transmit data. o A number of standards for Wi-Fi exist, and each can send and receive data at a different speed. (See Figure 8-3) o Most home and business wireless networks use Wi-Fi.  Microwave - communication uses high-frequency radio waves. o It is sometimes referred to as line-of-sight communication because microwaves can only travel in a straight line. o Because waves cannot bend with the curvature of the earth, they can only be transmitted over relatively short distances. o For longer distances, the waves must be relayed by means of microwave stations with microwave dishes or antennas.  WiMax (Worldwide Interoperability for Microwave Access) is a wireless standard that extends the range of Wi-Fi networks using microwave connections. o Commonly used by universities and others to extend the capability of existing Wi-Fi networks  Satellite - amplified microwaves that use point-to-point communication to relay devices (satellites) orbiting 22,000 miles above the earth o Orbit at a precise point and speed above the earth o Many are offered by Intelsat, the International Telecommunications Satellite Consortium. o Amplify and relay microwave signals from one transmitter on the ground to another o Used to send and receive large volumes of data o Uplink is a term relating to sending data to a satellite. o Downlink refers to receiving data from a satellite. o Bad weather can interrupt the flow of data. o Global positioning, a network of satellites is owned and managed by the Department of Defense that continuously send location information to earth o Used by global positioning system (GPS) devices 1-138

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Available in many automobiles to provide navigational support o Used by many cell phones and tablets  Infrared uses infrared light waves to communicate over short distances. o Can only travel in a straight line and for short distances without obstructions o Physical Connections- a solid medium to connect sending and receiving devices. These connections include:  Fiber-optic cable - transmits data as pulses of light through tiny tubes of glass. (See Figure 8-6).  Lighter, faster, and more reliable than coaxial cable; recent speeds of 1 petabit per second (a petabit is 1 million gigabits)  Rapidly replacing twisted-pair cable telephone lines  Coaxial cable - a high-frequency transmission cable consisting of a single, solid copper core (See Figure 8-7).  Has over 80 times the transmission capacity of twisted pair  Used to deliver television signals as well as to connect computers in a network  Twisted pair cable– pairs of copper wires twisted together  Both landline telephone lines and Ethernet cables use twisted pair (See Figure 8-8.) o Ethernet cables are often used in networks and to connect a variety of components to the system unit. 

Connection Devices o At one time nearly all computer communication systems used telephone lines and analog signals. Computers, in contrast, use digital signals. A modem is required to convert the digital signals to analog signals and vice versa. o Modems (modulator-demodulator)  Modulation - the name of the process of converting from digital to analog  Demodulation - the process of converting from analog to digital  Transfer rate - the transfer speed in bits-per-second; typically measured in millions of megabits per second (Mbps)  Three commonly used types of modems:  DSL (digital subscriber line) – uses standard phone lines to create a high-speed connection directly to the phone company‘s offices; are external and usually use USB or Ethernet port to connect to system.  Cable – uses the same coaxial cable as a television to create a high-speed connection. Connect using the system unit‘s USB or Ethernet port.  Wireless, also known as a WWAN - wireless wide area network modem. o Almost all computers today have built-in wireless modems. For those that do not, wireless adapter cards are available that plug into USB or special card ports. 1-139 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Connection Service  T1, T3 and DS3, special high-speed lines from telephone companies that support digital communications, have largely been replaced with optical carrier (OC) lines which are much faster.  Dial-up - uses existing telephones and telephone modems to connect to the Internet. Very slow and has been replaced by other higher-speed connection services, including cellular, DSL, cable, and satellite.  Cellular service providers, including Verizon, AT&T, Sprint, and TMobile support voice and data transmission to wireless devices using cellular networks.  The progress of mobile telecommunication is measured in generations. The first generation (1G) started in the 1980s and has progressed to today‘s fifth generation (5G): o First generation (1G) could only transmit analog signals used for voice communications. o Second generation (2G) used radio signals for cellular calls and introduced texting. o Third generation (3G) improved data speeds and introduced widespread use of the internet on cell phones. o Fourth generation (4G) uses Long Term Evolution (LTE) connections for increased internet speeds, making streaming videos and music popular on cell phones. o Fifth-generation mobile telecommunications (5G) is the newest and fastest network, with speeds rivaling home Internet connections. The 5G network is a new technology and may not be available yet in your area as service providers update old antennae and add new antennae to the network.  Digital subscriber line (DSL) - uses existing telephone lines to provide high-speed connections. Much faster than dial-up.  ADSL (asymmetric digital subscriber line) is one of the most widely used types of DSL.  Cable service - use existing television cables to provide high-speed connections. Usually faster than DSL.  Fiber Optic Service (FiOS) is a new technology in some areas but not widely available. Current providers of FiOS include Google and Verizon with speeds faster than cable or DSL.  Satellite connection services - use satellites to provide wireless connections.  Slower than DSL and cable modem but higher availability Making IT Work for You-The Mobile Office o Two of the most important features of the mobile office are your Internet connection when on the go and the tools to replicate the resources of working in person. For accessing the Internet, there are three popular options: mobile hotspot devices, personal hotspots, and public Wi-Fi. o Mobile Hotspot Device

1-140 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Many cell phone service providers offer standalone devices that connect to a 4G or 5G network and allow multiple devices near it to access the Internet via Wi-Fi connection.  When choosing a hotspot device from a cell phone service provider, consider the provider‘s data options and pricing. o Personal Hotspot  Many cell phones can act as mobile hotspot devices, allowing nearby tablets and laptops to connect to the Internet.  Sometimes called tethering, devices can connect to the cell phone via Bluetooth, Wi-Fi, or USB cable, and through that connection access the Internet.  Offer a simple mobile Internet solution without the additional cost of purchasing a mobile hotspot device. o Public Wi-Fi  Even if you can‘t use the Internet on the go— you can probably get online when you arrive. Many public locations, especially airports, hotels, and coffee shops, offer free or low-cost Internet connections.  Not all pubic Wi-Fi Internet connections are safe. Only connect to networks that are offered from locations you trust. o Cloud Storage  When on the go, you want your documents to be available, up to date, and secure. With an Internet connection, you can connect to cloud storage services that will hold your important documents.  Popular cloud services are Google Drive, Microsoft OneDrive, and Dropbox. o Video Conferencing  Provides an alternative to meeting in person using audio communications (such as a phone call) often with video to see the people you talk to  A camera, microphone, and speakers will be needed. Most cell phones, tablets, and laptops come with these accessories.  Popular videoconferencing apps: Skype, Microsoft Teams, FaceTime, Zoom, Google Meet Data transmission o Several factors affect how data is transmitted. o Bandwidth – is a measurement of the width or capacity of the communication channel meaning how much information can move across the communication channel in a given amount of time. o Four categories of bandwidth include:  Voiceband (low bandwidth) - used for landline telephone communication by personal computers with telephone modems and dial-up service  Medium band - used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances  Capable of very high-speed data transfer  Broadband – widely used by DSL, cable, and satellite connections where several users can simultaneously use a single broadband connection for high-speed data transfer  Baseband - widely used to connect individual computers that are located close to one another, such as computers in an office building 1-141 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Like broadband, supports high-speed transmission Unlike broadband, however, baseband can only carry a single signal at one time o Protocols - For data transmission to be successful, sending and receiving devices must follow a set of communications rules for exchange of information. Protocols are the rules for exchanging data between computers.  https or hypertext transfer protocol secure is widely used to protect and transfer sensitive information.  TCP/IP – Transmission Control Protocol/Internet Protocol is the standard protocol for the Internet.  Essential features involve – sending and receiving devices and breaking information into small parts for transmission across the Internet  Identification: Every computer on the Internet has a unique numeric address called an IP address (Internet protocol address) which is used to deliver –email and to locate websites. o Numeric addresses are difficult for people to remember and use so a system, DNS (domain name server) was developed to automatically convert text-based addresses to numeric IP addresses  Enter a URL and a DNS converts it to an IP address before a connection can be made.  Packetization: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. o Before a message is sent, it is reformatted or broken down into small parts called packets.  Each packet is then sent separately over the Internet, possibly traveling different routes to one common destination.  At the receiving end, the packets are reassembled into the correct order. Networks o A computer network is a communication system that connects two or more computing devices so they can exchange information and share resources. o Networks can be set up in different arrangements to suit users‘ needs (See Figure 8-13.) o Number of specialized terms that describe computer networks include:  Node—any device that is connected to a network  Computer, printer, or data storage device  Client —a node that requests and uses resources available from other nodes.  Typically, a client is a user‘s personal computing device  Server—a node that shares resources with other nodes  Dedicated servers specialize in performing specific tasks. o Dedicated servers include application server, communication server, database server, file server, printer server or web server. 1-142 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Directory server—specialized server that manages resources such as user accounts for an entire network  Host—any computer system that can be accessed over a network  Router —a node that forwards or routes data packets from one network to their destination in another network  Switch—central node that coordinates the flow of data by sending messages directly between sender and receiver nodes  A hub previously filled this purpose by sending a received message to all connected nodes, rather than just the intended node.  Network interface cards (NIC)—expansion cards located within the system unit that connect the computer to a network  Sometimes referred to as a LAN adapter  Network operating systems (NOS)—control and coordinate the activities of all computers and other devices on a network.  Network administrator—a computer specialist responsible for efficient network operations and implementation of new networks Network Types o Local Area Networks (LANs) - networks with nodes that are in close physical proximity, typically spanning less than a mile and are owned and operated by individual organizations  Network gateway - device that allows one LAN to be linked to other LANs or to larger networks  The most common standard in which nodes in a LAN can be connected to one another is known as Ethernet. o Home Networks - networks being used by individuals in their homes and apartments that allow different computers to share resources, including a common Internet connection  Connections happen in a variety of ways, including electrical wiring, telephone wiring, and special cables. o Wireless LAN (WLAN) - uses radio frequencies to connect computers and other devices.  All communications pass through the network‘s centrally located wireless access point or base station.  This access point interprets incoming radio frequencies and routes communications to the appropriate devices.  In public places wireless access points are known as hotspots and typically use Wi-Fi technology. o Most mobile computing devices have an internal wireless network card to connect to hotspots. o If the mobile device does not have an internal wireless network card, a wireless adapter that plugs into the computer‘s USB port or PC card slot can be used. o Personal area network (PAN) - type of wireless network that works within a very small area—your immediate surroundings  PANs connect cell phones to headsets, keyboards to cell phones, etc.  Most popular PAN technology is Bluetooth, with a maximum range of around 33 feet. 1-143 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Metropolitan Area Networks (MANs)- span distances up to 100 miles and are frequently used as links between office buildings that are located throughout a city.  MANs are typically owned by a group of organizations who jointly own and operate the network or by a single network service provider that provides network services for a fee. o Wide Area Networks (WANs) - countrywide and worldwide networks  Provide access to regional service (MAN) providers and typically span distances greater than 100 miles  Use microwave relays and satellites to reach users over long distances with the widest of all WANs being the Internet, which spans the entire globe  The primary difference between a PAN, LAN, MAN, and WAN is the geographic range. Network Architecture o Describes how a network is arranged and how resources are coordinated and shared o Network topology – describes the physical arrangement of a network and how resources are coordinated and shared. o Network topologies provide different arrangements and configurations.  Bus network- each device is connected to a common cable called a bus or backbone and all communications travel along this bus.  Ring network-each device is connected to two other devices, forming a ring. (See Figure 8-17.)  When a message is sent, it is passed around the right until it reaches the intended destination.  Star network - each device is connected directly to a central network switch. (See Figure 8-18.)  Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient.  Most widely used network topology today  Range of applications includes small networks in the home to very large networks in major corporations.  Tree network - each device is connected to a central node, either directly or through one or more other devices.  Central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes, and so forth, forming a treelike structure. (See Figure 8-19.)  Also known as a hierarchical network  Mesh network - newest type of topology and does not use a specific physical layout  Requires that each node have more than one connection to the other nodes, resulting in a pattern that forms the appearance of a mesh  If a path between two nodes is somehow disrupted, data can be automatically rerouted around the failure using another path.  Wireless technologies are frequently used to build mesh networks. 1-144 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Strategies o Every network has a strategy, or way of coordinating the sharing of information and resources. o Two of the most common network strategies are client/server and peer-to-peer.  Client/server networks - use central servers to coordinate and supply services to other nodes and are widely used on the Internet.  Each time a web browser is opened the computer (client) sends out a request for a specific web page; the request is routed over the Internet to a server and then the server locates and send the requested material back to the computer.  Advantages of the client/server network strategy include:  Ability to handle very large networks efficiently  Availability of powerful network management software to monitor and control network activities  The major disadvantages are the cost of installation and maintenance.  Peer-to-peer (P2P) network - nodes have equal authority and can act as both clients and servers.  Many current popular games, movies, and music sharing services use this network strategy.  Special file-sharing, software such as BitTorrent can be used to obtain files located on another personal computer.  Advantage of P2P: o Easy and inexpensive (often free) to set up and use  Disadvantage of P2P: o Lack of security controls or other common management functions  Few businesses use this type of network to communicate sensitive information.

Organizational Networks o Most large organizations have a complex and a wide range of different network configurations, operating systems, and strategies and the challenge for the organizations is making the networks work together effectively and securely. o Internet Technologies are used by organizations to support effective communication within and between organizations using intranets and extranets. o Intranet  A private network within an organization that resembles the Internet  Uses browsers, web sites, and web pages  Organizations use intranets to provide information to their employees such as electronic telephone directories, e-mail addresses, employee benefits, internal job openings, and more.  Accessible only to those within the organization  Easy and intuitive for employees to use o Extranet  A private network that connects more than one organization 1-145 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Many organizations use Internet technologies to allow suppliers and others limited access to their networks.  Main purpose is to increase efficiency and reduce costs. o Network Security  Securing large corporate networks requires specialized technology.  Three technologies commonly used to ensure network security include:  Firewalls  A security system designed to protect an organization‘s network against external threats  Consists of hardware and software that control access to a company‘s intranet or other internal networks o Most use a special computer or software called a proxy server. This system is a gatekeeper. o All communications between the company‘s internal networks and the outside world must pass through it. (See Figure 8-22.)  Intrusion detection systems (IDS)  Works with firewalls to protect an organization‘s network  Uses sophisticated statistical techniques to analyze all incoming and outgoing network traffic  Uses advanced pattern matching and heuristics to recognize signs of a network attack and disable access before an intruder can do damage  Virtual private networks (VPN)  Create a secure private connection between a remote user and an organization‘s internal network  Connection is heavily encrypted.  Special VPN protocols create the equivalent of a dedicated line between a user‘s home or laptop computer and a company server. Careers In IT o Network administrators manage a company‘s LAN and WAN networks. o Design, implementation, and maintenance of networks o Maintenance of both hardware and software related to a company‘s intranet and Internet networks o Diagnosing and repairing problems with these networks o Planning and implementations of network security o Bachelor‘s degree or an advanced associate‘s degree in computer science, computer technology, or information systems as well as practical networking experience or technical certification o Annual salary $43,000 to $84,000 o Expected to be among the fastest-growing jobs A Look to the Future-Telepresence Lets You Be There without Actually Being There o Telepresence is the use of technology to create the illusion that you are actually somewhere else, attempting to replicate the foreign location entirely. o Video and audio with immersive screens and multiple directional speakers. 1-146 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Telepresence will allow you to touch things in this other location—to interact with the world there through robotics and even feel this other location. o Cisco TelePresence, use very-high-definition video, acoustically tuned audio systems, and high-speed networks. o Haptic technology uses specialized gloves and surfaces that can give the user touch sensations that mimic holding or touching a distant object. o Ava Robotics has developed the RP-VITA, a telepresence robot that has multiple cameras, high-resolution screens, and complex robotics to allow a doctor to care for and consult with patients and doctors from around the world. o Future technologies include specialized cameras that monitor temperature, heart rate, and respiration and haptic robotics that can assist in diagnostic testing.

1-147 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

Communications o Emphasize in discussion that connectivity is the fastest growing sector of the computer industry and that The Wireless Revolution is the single most dramatic change in connectivity and communications in the past decade. o Discuss why it is called a revolution. o Give an overview of the different parts of a communication system that will be covered. o Refer to the basic communications model that is discussed in public speaking classes and how computers work in the same fashion.  Sending and receiving devices  Communication channel = medium  Connection devices  Data transmission specifications = message Communications Channels o Discuss the two types of channels, physical and wireless: o Physical (wired) - a solid medium to connect sending and receiving devices.  Fiber-optic cable - transmits data as pulses of light through tiny tubes of glass or plastic, covers the farthest distance and has the fastest transmission speed.  Coaxial cable - a high-frequency transmission cable, uses copper wire to conduct electricity, has a medium-range distance capability and speed.  Twisted pair - uses copper wires to conduct electricity, covers the least distance, and is the slowest of the wired channels. o Have students research the services that are available in their area. o Wireless-Give specific examples for each category or have students discuss which ones work best for them.  Cellular communication uses multiple antennae (cell towers) to send and receive data within relatively small geographic regions (cells). Most cell phones and mobile devices use cellular networks.  Bluetooth is a short-range radio communication standard that transmits data over short distances of up to approximately 33 feet. Bluetooth is widely used for wireless headsets, printer connections, and handheld devices.  Wi-Fi - (wireless fidelity) uses high frequency radio signals to transmit data. A number of standards for Wi-Fi exist, and each can send and receive data at a different speed. Most home and business wireless networks use Wi-Fi.  Microwave - communication through high-frequency radio waves and provides line-of-sight communication but over short distances. Bluetooth is a form of microwave transmission  WiMax (Worldwide Interoperability for Microwave Access) is a new standard that extends the range of Wi-Fi networks using microwave connections.  Satellite - amplified microwaves that use point-to-point communication to relay devices (satellites) orbiting the earth. Communication interferences can occur in bad weather. 1-148 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

 

GPS (global positioning system); Discuss many applications of GPS.  Infrared uses infrared light waves to communicate over short distances. Line of sight, most common infrared device is the TV remote control. Connection Devices o Analog – continuous electronic waves o Digital – represents the presence or absence of an electronic pulse o Discuss the differences between modems; DSL, cable and wireless. Connections Services o Describe the following services and give examples of each. o Cellular, DSL, Cable, Fiber-optic, Satellite, o Discuss the cellular service generations of mobile communications 1G, 2G, 3G, 4G and 5G. o Have students research what is new in 5G. Making IT Work – Discuss the pros and cons of hotspots, public Wi-Fi, cloud storage, and videoconferencing. Data transmission o Discuss Bandwidth. Use an analogy of a highway and the wider the road the more cars can travel on it in a given amount of time. o Protocols can be compared to foreign services and how different countries have different ways to communicate. o Discuss with students how it is possible to determine which computer on the Internet was used to send an e-mail or to access a certain web site via the IP Address of the computer. Networks o Refer to the figures in the book to discuss the basic parts that comprise a network. Network Types o The divisions between the types of networks are not as clear cut from a technical perspective because some types of devices that used to be solely used for a WAN can be used in LAN environments. Network Architecture o How a network is arranged and how resources are coordinated and shared o Refer to the figures in the book to discuss network architecture. o The star network is the most widely used network topology today. It is used in small networks in the home and very large networks in major corporations. Strategies o Most of the students have had experiences with BitTorrent, and other types of downloading programs. Use these as an example of how client/server and peer-topeer work. o Discuss the problem with downloading files with potential viruses from these unsecured sites. Discuss Copyright infringements. Discuss security issues. Organizational Networks o Intranet  Emphasize that it is a private network within an organization that resembles the Internet, and it provides services accessible only to those within the organization. o Extranet 1-149 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Emphasize that it is a private network that connects more than one organization to allow suppliers and others limited access to their networks.  Good examples are organizations that use Just In Time inventory. o Network Security  Firewalls  Both hardware and software  Good for home use as well  Have students identify what type of firewall they are using on their personal computers.  Intrusion detection systems (NIDS)  Intrusion detection systems (IDS) work with firewalls to protect an organization‘s network using sophisticated statistical techniques to analyze all incoming and outgoing network traffic.  Ask students to search the Internet for more information on how this system can recognize network attacks and disable access  Virtual Private Network (VPN) – This technology is widely used by many people who work from home.  Virtual private networks (VPN) create a secure private connection between a remote user and an organization‘s internal network.  Ask students to do research to find out what is needed to use VPN.  Ask students why security on a network is important and discuss current events with hacking and/or security breaches of intranets and extranets.

1-150 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term Definition 1G (first generation mobile Started in the 1980s using analog radio signals to provide telecommunications) analog voice transmission service Started in the 1990s using digital radio signals, focused on 2G (second generation mobile voice transmission and was too slow for effective Internet telecommunications) connectivity 3G (third generation mobile Provided services capable of effective connectivity to the telecommunications) Internet, marking the beginning of cell phones Provides faster transmission speeds using LTE (Long Term 4G (third generation mobile Evolution) connections to provide faster internet access, telecommunications allowing cell phones to easily stream videos and music 5G (fifth-generation mobile Is the most recent generation, with speeds that rival home telecommunications) Internet connections analog signal Continuous electronic waves asymmetric digital subscriber The most widely used type of DSL which is much faster line (ADSL) than dial-up backbone See bus A measurement of the width or capacity of the bandwidth communication channel A network‘s centrally located wireless access point that base station interprets incoming radio frequencies and routes communications to the appropriate devices Used to connect individual computers that are located close baseband to one another, able to support high-speed transmission, can only carry a single signal at one time A short-range wireless communication standard that uses Bluetooth microwaves to transmit data over short distances, around 33 feet broadband The bandwidth used for high-capacity transmissions All communication travels along a common connecting cable called a bus or a backbone. As information passes bus along the bus, it is examined by each device on the system board to see if the information is intended for that device Each device is connected to a common cable, bus or bus network backbone, and all communications travel along the bus Use existing television cables to provide high-speed cable modem connections to the Internet A service provided by cable television companies using cable service their existing television cables, usually faster than DSL cell Small geographical region cell tower Antennae that sends and receives data Communication uses multiple antennae, cell towers, to send cellular and receive data within relatively small geographical regions known as cells cellular service provider Includes Verizon, AT&T, Sprint, and T-Mobile supporting 1-151 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


client client/server network coaxial cable communication channel communication system computer network connectivity demodulation dial-up service digital signal

digital subscriber line (DSL) digital subscriber line (DSL) service directory server domain name server (DNS) downlink DS3 Ethernet Ethernet cable extranet fiber-optic cable fiber-optic service (FIOS) firewall global positioning system (GPS) hierarchical network

voice and data transmissions to wireless devices using cellular networks A node that requests and uses resources available from other nodes A computer network where one computer coordinates and supplies services to other nodes on the network A high-frequency transmission cable with a single solidcopper core The actual connecting or transmission medium that carries the message An electronic system that transmit data from one location to another A communication system that connects two or more computers so that they can exchange information and share resources Using computer networks to link people and resources The process of converting from analog to digital Using standard telephone lines and conventional modems to link to the Internet A representation of the presence or absence of an electronic pulse – on/off Uses standard telephone lines to create a high-speed connection directly to a phone company‘s offices, usually external and connect to the system unit using either a USB or Ethernet port A service provided by telephone companies using existing telephone lines to provide high-speed connections A specialized server that manages resources, such as user accounts, for an entire network Converts text-based addresses to IP addresses Receives data from a satellite Same as T1 leased line The most common way in which nodes can be connected to one another and communications can be controlled Uses twister pair cable which is a LAN standard that is commonly used in networks to connect a variety of components to the system unit A private network that connects more than one organization Transmits data as pulses of light through tiny tubes of glass Transmits data as pulses or light and offers speeds faster than cable or DSL connections Consists of hardware and software that control access to a company‘s intranet and other internal networks Global positioning system (GPS) devices use location information sent by satellites to uniquely determine the geographic location of the device Each device is connected to a central node, either directly or 1-152

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


home network

host hotspot https (hypertext transfer protocol secure) hub infrared intranet intrusion detection system (IDS)

through one or more other devices The central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes; forms a tree like structure allow different computers to share resources, including a common Internet connection, can be connected in a variety of ways, including electrical wiring, telephone wiring, and special cables Any computer system that provides access to its resources over a network Wireless access points that provide Internet access and are often available in public places such as coffee shops, libraries, bookstores, colleges, and universities Widely used protocol used to protect the transfer of sensitive information The center or central node for other nodes Uses light waves to communicate over short distances; line of sight communication A private network within an organization that resembles the Internet using browsers, websites and web pages A system that works with firewalls to recognize and disable network attacks

IP address (Internet protocol A unique numeric address for every computer on a network address) local area network (LAN) Networks with nodes that are in close physical proximity Used for standard telephone communication (see also low bandwidth voiceband) LTE (Long Term Evolution) A wireless standard, comparable to WiMax The bandwidth used in special leased lines to connect medium band midrange and mainframe computers as well as to transmit data over long distance megabits per second (Mbps) The transfer rate of millions of bits per second A type of topology that does not use a specific of physical mesh network layout metropolitan area network A network that links office buildings within a city, and can (MAN) span distances up to 100 miles A type of communication that uses high-frequency radio microwave waves, line-of-sight communication, can only travel in a straight line Modulator-demodulator enables digital personal computers modem to communicate across analog telephone lines modulation The process of converting from digital to analog A computer specialist responsible for efficient network network administrator operations and implementation of new networks Describes the structure of how a network is arranged and network architecture how resources are coordinated and shared network gateway A device that allows one LAN to be linked to other LANs or 1-153 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


network interface card (NIC) network operating system (NOS) node optical carrier (OC) packet peer-to-peer (P2P) network

personal area network (PAN) protocol proxy server

ring network

router satellite satellite connection service server star network strategy switch T1 T3

to larger networks LAN adapter card that connects the computer to a network Controls and coordinates network operations Any device that is connected to a network Very high-speed lines used by large corporations for alldigital transmission Small parts of messages A type of network where each node has equal authority and can act as both client and server a type of wireless network that works within a very small area—your immediate surroundings, connect cell phones to headsets, keyboards to cell phones, and so on, make it possible for wireless devices to interact with each other. Rules for exchanging data between computers A computer through which all communications between the company‘s internal networks and the outside world must pass Network in which each device is connected to two other devices, forming a ring There is no host computer, and messages are passed around the ring until they reach the correct destination A node that forwards or routes data packets from one network to their destination in another network A type of communication that uses satellites orbiting about 22,000 miles above the earth as microwave relay stations Use satellites to provide wireless connections, slower than DSL and cable, but available almost anywhere A node that shares resources with other nodes A number of small computers or peripheral devices are linked to a central unit A way of coordinating the sharing of information and resources A node that coordinates direct flow of data between other nodes Special high-speed copper lines leased from telephone companies Special line combined with T1 lines to form a higher capacity line A type of cable that uses 2, 4, or 8 pairs of copper wire How a network is arranged or configured The speed at which data can be transmitted

telephone line topology transfer rate transmission control protocol/Internet protocol The standard protocol for the Internet (TCP/IP) A network topology where each device is connected to a tree network central node, either directly or through one or more devices forming a treelike structure 1-154 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Twisted-pair cable uplink virtual private network (VPN) voiceband wide area network (WAN) Wi-Fi (wireless fidelity)

Cable consisting of pairs of copper wire that are twisted together Relates to sending data to a satellite A security technology that creates a secure private connection between a remote user and an organization‘s internal network Used for standard telephone communication (see also low bandwidth) A countrywide or worldwide network that spans distances greater than 100 miles A wireless standard used to connect computers to each other and to the Internet using high-frequency radio signals to transmit data

WiMax (Worldwide The technology used to extend Wi-Fi ranges over greater Interoperability for Microwave distances using microwave connections Access) All communications in a wireless network passes through a wireless access point centrally located base station or wireless access point. Local area network connecting computers and other devices wireless LAN (WLAN) using radio frequencies A modem that is usually internal, but may be connected wireless modem using USB or special card ports, also known as a WWAN modem A modem that is usually internal, but may be connected wireless wide area network using USB or special card ports, also known as a wireless (WWAN) modem modem

1-155 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 8 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers B A D A D B A B C C

Matching Answers E G D H A B F I C J

Open Ended Questions: 1. Define communications including connectivity, the wireless revolution, and communication systems. 

Communications is the process of sharing data, programs, and information between two or more computers.

Connectivity is a concept related to using computer networks to link people and resources. For example, connectivity means that you can connect your cell phone to other devices and information sources from almost anywhere. With this connection, you are linked to the world of larger computers and the Internet.

Wireless revolution - The single most dramatic change in connectivity and communications since the development of the Internet has been the widespread use of mobile devices like cell phones and tablets with fast wireless Internet connectivity.

Communication systems are electronic systems that transmit data from one location to another. Four basic elements of a communication system include: o Sending and receiving devices - originate (send) as well as accept (receive) messages in the form of data, information, and/or instructions. o Connection devices - convert outgoing messages into packets that can travel across the communication channel and reverse the process for incoming messages. o Data transmission specifications - rules and procedures that coordinate the sending and receiving devices by physically defining how the message will be sent across the communication channel. o Communication channel – transmission medium that carries the message. Medium can be a physical wire or cable, or it can be wireless. 1-156 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


2. Discuss communication channels including physical connections and wireless connections.  Communications Channels o Carry the data from one computer to another o Two categories of communication channels, wireless and wired o Wireless communications send information through the air, such as when you use a cell phone. Wired communications require a physical connection and are more common with desktop computers. 

Wireless Connections o Do not use a solid substance to connect sending and receiving devices. Data is moved through the air. Primary technologies used for wireless connections are Bluetooth, Wi-Fi, microwave, WiMax, cellular, and satellite connections. o Cellular – uses multiple antennae (cell towers) to send and receive data within relatively small geographic areas regions (cells). Most cell phones and mobile devices use cellular networks. o Bluetooth is a short-range radio communication standard that transmits data over short distances of up to approximately 33 feet. Bluetooth is widely used for wireless headsets, printer connections, and handheld devices. o Wi-Fi (wireless fidelity) uses high frequency radio signals to transmit data. A number of standards for Wi-Fi exist, and each can send and receive data at a different speed. Most home and business wireless networks use Wi-Fi. o Microwave - communication through high-frequency radio waves. It is sometimes referred to as line-of-sight communication because microwaves can only travel in a straight line.  Because waves cannot bend with the curvature of the earth they can only be transmitted over relatively short distances.  For longer distances, the waves must be relayed by means of microwave stations with microwave dishes or antennas. o WiMax (Worldwide Interoperability for Microwave Access) is a new standard that extends the range of Wi-Fi networks using microwave connections. WiMax is commonly used by universities and others to extend the capability of existing Wi-Fi networks. o Satellite - amplified microwaves that use point-to-point communication to relay devices (satellites) orbiting 22,000 miles above the earth  Rotate at a precise point and speed above the earth  Amplify and relay microwave signals from one transmitter on the ground to another  Used to send and receive large volumes of data  Communication interferences can occur in bad weather.  Used by global positioning system (GPS) devices  Used by many cell phones, including the Apple iPhone  Uplink relates to sending data to a satellite.  Downlink refers to receiving data from a satellite. Physical Connections- a solid medium to connect sending and receiving devices. These connections include: o Fiber-optic cable - transmits data as pulses of light through tiny tubes of glass. 1-157 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Compared to coaxial cable, it is lighter, faster, and more reliable at transmitting data.  Rapidly replacing twisted-pair cable telephone lines. o Coaxial cable - a high-frequency transmission cable consisting of a single, solid copper core.  Used to deliver television signals as well as to connect computers in a network o Twisted pair – pairs of copper wires twisted together  Landline telephone lines, Ethernet cables  Ethernet cables are often used in networks and to connect a variety of components to the system unit. 3. Discuss connection devices including modems (DSL, cable, and wireless modems) and connection services (DSL, ADSL, cable, satellite, and cellular connection services). 

Connection Devices o At one time nearly all computer communication used telephone lines. o Telephone lines were designed to carry analog signals, which are continuous electronic waves. o Computers send and receive digital signals. o To convert the digital signals to analog signals and vice versa, a modem is used.

Modem (modulator-demodulator) o Converts the computer‘s digital signal to an analog transmission to send over the phone line (modulation) and then re-convert it to digital when receiving information from the phone lines (demodulation). o Transfer rate is in bits-per-second; typically measured in millions of bits (megabits) per second (Mbps) o Three commonly used types of modems include:  DSL (digital subscriber line) – uses standard phone lines to create a highspeed connection directly to the phone company‘s offices  Cable – uses the same coaxial cable as a television to create a high-speed connection.  Wireless (also known as a WWAN- wireless wide area network modem). Commonly a USB device is used that provides very portable high-speed connectivity from virtually anywhere.

Connection service o Digital subscriber line (DSL) – is provided by telephone companies using existing telephone lines to provide high-speed connections. ADSL (asymmetric digital subscriber line) is one of the most widely used types of DSL. o Cable – is provided by cable television companies using existing television cables to provide high-speed connections, faster than DSL. o Fiber-optic service (FIOS) – new technology not widely available. Current providers include Google and Verizon with speeds faster than cable or DSL o Satellite connection services - use satellites to provide wireless connections. Slower than DSL and cable modem but higher availability. o Cellular service providers including Verizon, AT&T, Sprint, and T-Mobile support voice and data transmission to wireless devices using cellular networks. 1-158 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


The progress of mobile telecommunication is measured in generations. The first generation (1G) started in the 1980s and has progressed to today‘s fifth generation (5G):  First generation (1G) could only transmit analog signals used for voice communications.  Second generation (2G) used radio signals for cellular calls and introduced texting.  Third generation (3G) improved data speeds and introduced widespread use of the internet on cell phones.  Fourth generation (4G) uses Long Term Evolution (LTE) connections for increased internet speeds, making streaming videos and music popular on cell phones.  Fifth-generation mobile telecommunications (5G) is the newest and fastest network, with speeds rivaling home Internet connections. The 5G network is a new technology and may not be available yet in your area as service providers update old antennae and add new antennae to the network. 4. Discuss data transmission including bandwidths (voiceband, medium band, broadband, and baseband) as well as protocols (IP addresses, domain name servers, and packetization) 

Data transmission o Several factors affect how data is transmitted. These factors include bandwidth and protocols.

Bandwidth - a measurement of the width or capacity of the communication channel. It means how much information can move across the communication channel in a given amount of time. Four categories of bandwidth include: o Voiceband (low bandwidth) - used for landline telephone communication. At one time, personal computers with telephone modems and dial-up service used this bandwidth. o Medium band – used in special leased lines to connect minicomputers and mainframes as well as to transmit data over long distances, capable of very highspeed data transfer o Broadband – widely used by DSL, cable, and satellite connections for high-capacity transmissions. Several users can simultaneously use a single broadband connection for high-speed data transfer. o Baseband – widely used to connect individual computers that are located close to one another, such as the computers in an office building. Like broadband, it can support high-speed transmission. Unlike broadband, however, baseband can only carry a single signal at one time.

Protocols - For data transmission to be successful, sending and receiving devices must follow a set of communications rules for exchange of information. Protocols are the rules for exchanging data between computers. o http or hypertext transfer protocol is a widely used protocol used for web traffic. Another protocol, https or hypertext transfer protocol secure is becoming widely 1-159 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


used to protect the transfer of sensitive information. TCP/IP – Transmission Control Protocol/Internet Protocol is the standard protocol for the Internet.  Essential features involve – sending and receiving devices and breaking information into small parts for transmission across the Internet  Identification: Every computer on the Internet has a unique numeric address called an IP address (Internet Protocol address), uses a domain name server (DNS) that automatically converts text-based addresses to numeric IP addresses  Packetization: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before a message is sent, it is reformatted or broken down into small parts called packets. Each packet is then sent separately over the Internet, possibly travelling different routes to one common destination. At the receiving end, the packets are reassembled into the correct order. 5. Discuss networks by identifying and defining specialized terms that describe computer networks.  Networks o A computer network is a communication system that connects two or more computing devices so they can exchange information and share resources. o o o o o o o o o o

Node—any device that is connected to a network Client —a node that requests and uses resources available from other nodes Server—a node that shares resources with other nodes Directory server—specialized server that manages resources such as user accounts for an entire network Host—any computer system that can be accessed over a network Router—a node that forwards or routes data packets from one network to their destination in another network Switch—central node that coordinates the flow of data by sending messages directly between sender and receiver nodes. A hub previously filled this purpose by sending a received message to all connected nodes, rather than just the intended node. Network interface cards (NIC)— expansion cards located within the system unit that connect the computer to a network Network operating systems (NOS)—control and coordinate the activities of all computers and other devices on a network. Network administrator—a computer specialist responsible for efficient network operations and implementation of new networks

6. Discuss network types including local area, home, wireless, personal, metropolitan, and wide area networks.  Network Types o Local Area Networks (LAN) - networks with nodes that are in close physical proximity, typically spanning less than a mile and are owned and operated by individual organizations  Network gateway - device that allows one LAN to be linked to other LANs or to larger networks 1-160 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


The most common standard in which nodes in a LAN can be connected to one another is known as Ethernet.

o Home Networks - networks being used by individuals in their homes and apartments, allow different computers to share resources, including a common Internet connection o Wireless LAN (WLAN) - uses radio frequencies to connect computers and other devices. All communications pass through the network‘s centrally located wireless access point or base station. This access point interprets incoming radio frequencies and routes communications to the appropriate devices. In public places wireless access points are known as hotspots and typically use Wi-Fi technology. o Personal area network (PAN) - type of wireless network that works within a very small area—your immediate surroundings. PANs connect cell phones to headsets, keyboards to cell phones, and so on. These networks make it possible for wireless devices to interact with each other. The most popular PAN technology is Bluetooth, with a maximum range of around 33 feet. Virtually all wireless peripheral devices available today use Bluetooth, including the controllers on popular game systems like the PlayStation and Wii. o Metropolitan Area Networks (MAN) - span distances up to 100 miles. Frequently used links between office buildings that are located throughout a city. MANs are typically owned by a group of organizations who jointly own and operate the network or by a single network service provider who provides network services for a fee. o Wide Area Networks - countrywide and worldwide networks. Provide access to regional service (MAN) providers and typically span distances greater than 100 miles. They use microwave relays and satellites to reach users over long distances. 7. Define network architecture including topologies (bus, ring, star, tree, and mesh) and strategies (client/server and peer-to-peer).  Network Architecture o Describes how a network is arranged and how resources are coordinated and shared o Topology – describes the physical arrangement of a network and how resources are coordinated and shared 

Bus network  Each device is connected to a common cable called a bus or backbone and all communications travel along this bus.

Ring network  Each device is connected to two other devices, forming a ring. When a message is sent, it is passed around the right until it reaches the intended destination.

Star network  Each device is connected directly to a central network switch. 1-161

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient. Most widely used network topology today Range of applications includes small networks in the home to very large networks in major corporations.

Tree network  Each device is connected to a central node, either directly or through one or more other devices.  Central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes, and so forth, forming a treelike structure.  Also known as a hierarchical network

Mesh network  Newest type of topology and does not use a specific physical layout  Requires that each node have more than one connection to the other nodes, resulting pattern forms the appearance of a mesh  If a path between two nodes is somehow disrupted, data can be automatically rerouted.  Wireless technologies are frequently used to build mesh networks.

o Strategies - Every network has a strategy, or way of coordinating the sharing of information and resources. Two of the most common network strategies are client/server and peer-to-peer. 

Client/server network - use central computers to coordinate and supply services to other nodes on the network. The server provides access to resources such as web pages, databases, application software, and hardware.  Strategy is based on specialization. Server nodes coordinate and supply specialized services, and client nodes request the services.  Commonly used server operating systems are Windows Server, mac OS X Server, Linux, and Solaris.  Client/server networks are widely used on the Internet.  Advantages of the client/server network strategy include: o Ability to handle very large networks efficiently o Availability of powerful network management software to monitor and control network activities o Disadvantage of the client/server network strategy is cost of installation and maintenance.

Peer-to-peer (P2P) network - nodes have equal authority and can act as both clients and servers. Many current popular game, movie, and music sharing services use this network strategy.  Advantage of P2P: 1-162

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Easy and inexpensive (often free) to set up and use Disadvantage of P2P: o Lack of security controls or other common management functions

8. Discuss organizational networks including Internet technologies (intranets and extranets) and network security (firewalls, proxy servers, intrusion detection systems, and virtual private networks.  Organizational Networks o Intranet Technologies  A private network within an organization that resembles the Internet  Uses browsers, web sites, and web pages  Organizations use intranets to provide information to their employees such as electronic telephone directories, e-mail addresses, internal job openings, and more.  Accessible only to those within the organization o Extranet  A private network that connects more than one organization  Many organizations use Internet technologies to allow suppliers and others limited access to their networks.  Main purpose is to increase efficiency and reduce costs o Network Security - Securing large corporate networks requires specialized technology. Three technologies commonly used to ensure network security include:  Firewalls  A security system designed to protect an organization‘s network against external threats  Consists of hardware and software that control access to a company‘s intranet or other internal networks  Sometimes organizational firewalls include a special computer or software called a proxy server. This system is a gatekeeper. All communications between the company‘s internal networks and the outside world must pass through it. 

Intrusion detection systems (IDS)  Works with firewalls to protect an organization‘s network  Uses sophisticated statistical techniques to analyze all incoming and outgoing network traffic  Uses advanced pattern matching and heuristics to recognize signs of a network attack and disable access before an intruder can do damage

Virtual private networks (VPN)  Create a secure private connection between remote users and an organization‘s internal network 1-163

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Connection is heavily encrypted

Chapter 9 Privacy, Security, and Ethics Lecture Guide 

Learning Objectives o Describe the impact of large databases, private networks, the Internet, and the web on privacy. o Discuss online identity and the major laws on privacy. o Discuss cybercrimes including identity theft, Internet scams, data manipulation, ransomware, and denial of service. o Describe social engineering and malicious software, including crackers, malware, viruses, worms, and Trojan horses. o Discuss malicious hardware, including zombies, botnets, rogue Wi-Fi networks, and infected USB flash drives. o Detail ways to protect computer security including, restricting access, encrypting data, anticipating disasters, and preventing data loss. o Discuss computer ethics including copyright law, software piracy, digital rights management, the Digital Millennium Copyright Act as well as cyberbullying, plagiarism, and ways to identify plagiarism.

Chapter Outline 

People o Although most everyone agrees that technology has had a very positive impact on people, it is important to recognize the negative, or potentially negative, impact on people. o Effective implementation of computer technology involves maximizing its positive effects while minimizing its negative effects. The most significant concerns are:  Privacy – What are the threats to personal privacy and how can we protect ourselves?  Security – How can access to sensitive information be controlled and how can we secure hardware and software?  Ethics – How do the actions of individual users and companies affect society? Privacy  Privacy – Concerns the collection and use of data about individuals. There are three primary privacy issues:  Accuracy - the responsibility of those who collect data to ensure that the data is correct.  Property – relates to who owns data.  Access - the responsibility of those who have data to control and who can access that data. o Big Data – Today, almost all human events are recorded digitally.  Making a phone call, posting a video to social media, or wearing a smartwatch creates a digital record. 1-164 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


An unprecedented amount of digital information being stored. This stored information is often referred to as big data.  This collection of data can be searched to find all the action of one person—creating a digital footprint that reveals a highly detailed account of your life.  A vast industry of data gatherers known as information resellers or information brokers now exists that collects, analyzes, and sells such personal data.  Personal information can reveal more than you might wish to make public and have an impact beyond what you might imagine which raises many important issues, including:  Collecting public, but personally identifying information o Google‘s Street View makes is possible to take a virtual tour of many cities and neighborhoods from any computer with a connection to the Internet.  Images available on Street View are all taken in public locations, some have objected to the project as being an intrusion on their privacy.  Spreading information without personal consent o What if employers used personal information from Facebook, Google+ or other social networking profiles to make decisions about hiring?  It is a common practice today for many organizations.  The openness of social networking can put individuals at risk.  Without your knowledge or permission, a social networking friend might tag or identify you in a photo and then a tagged photo can become part of your digital footprint.  Spreading inaccurate information  Is much more common than what might be expected  Mistaken identity in which the digital footprint of one person is switched with another. o Freedom of Information Act - law allows you to gain access to records about you held by government agencies. Portions may be deleted for national security reasons. o Private networks  Many businesses search employees‘ electronic mail and computer files using employee monitoring software.  Software can record virtually everything you do on your computer.  Many people incorrectly assume that their employers won‘t or can‘t monitor employee activity on work computers and networks. You should never do anything on a work computer or a work network connection that you wouldn‘t want shared with your employer. 1-165 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


If you are employed and would like to know your company‘s current policy on monitoring electronic communication, contact your human resources department. o The Internet and the web  When you send a message on the Internet or browse the web, do you have any concerns about privacy?  Illusion of anonymity – the mistaken belief that as long as people are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy  Every computer on the Internet is identified by a unique number (IP address) which can be used to trace Internet activities to their origin, allowing computer security experts and law enforcement officers to investigate computer crimes such as unauthorized access to networks or sharing of copyrighted files without permission.  Some websites are designed to be hidden from standard search engines. These websites make up the deep web and allow communication in a secure and anonymous manner. o One part of the deep web is hidden websites that make up the dark web. These websites use special software that hides a user‘s IP address and makes it nearly impossible to identify who is using the site.  When browsing the web, the browser software stores critical information, typically without the user being aware of it. o This information includes history and temporary Internet files.  Browsers create history files of the locations, or addresses, of sites visited. o Computer users can view browsing history in all browsers.  Temporary Internet files, also known as browser cache, contain web page content and instructions for displaying the content. o The files are saved by browsers.  Another way web activity is monitored is with cookies, or small data files that are deposited on your hard disk from web sites you have visited. o These cookies can be accepted or blocked.  While cookies are harmless, they can be a potential privacy risk because they store information about you, your preferences, and your browsing habits.  The information stored depends on whether it is a first-party cookie or a third-party cookie. o A first-party cookie is one that is generated (and then read) only by the website you are currently visiting.  Stores information about the current session, your general preferences, and your activity on the site 1-166 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


The intention is to provide a personalized experience on a particular site.  When you are shopping online, you might fill your cart with items and then leave the site without making a purchase. Cookies allow you to return to that site and have the site remember what was in your cart. o A third-party cookie is usually generated by an advertising company that is affiliated with the website you are currently visiting. o Used by an advertising company to keep track of your web activity as you move from one site to the next and are often referred to as tracking cookies Most browsers offer privacy mode, which ensures that your browsing activity is not recorded. o Google Chrome provides Incognito Mode. o Safari provides Private Browsing. Web bugs – invisible images or HTML code hidden within a web page or e-mail message and can be used to transmit information without your knowledge o If you open an e-mail message containing a web bug information is sent back to the sender to validate your email address.  This is why many e-mail programs block images and HTML code. Spyware – the most dangerous type of privacy threat o Programs designed to secretly record and report an individual‘s activities on the Internet o Some spyware can even make changes to your browser to be deceptive and manipulate what is seen online. o Computer monitoring software is the most invasive and dangerous type of spyware.  Keylogger records every activity and keystroke made on your computer including credit card number and passwords.  Can be deposited on your hard drive by a malicious web site or by someone installing software onto your computer.  Can be invisible to the average user as it can disguise itself as useful software, such as a security program. o Can be legally used by companies to monitor employees o Can be legally used by law enforcement to collect evidence o Antispyware or spy removal programs detect and remove various types of privacy threats. (See Figure 9-6.)

o Online Identity – information that people voluntarily post about themselves online 1-167 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


With the popularity of social networking, blogging, and photo- and videosharing sites, many people post intimate details of their lives without considering the consequences.  There are a number of cases of people who have lost their jobs on the basis of posts on social networking. o Major Laws on Privacy  Some federal laws governing privacy matters have been created.  Gramm-Leach-Bliley Act – protects personal financial information  Health Insurance Portability and Accountability Act (HIPAA)– protects medical records  Family Educational Rights and Privacy Act (FERPA) - restricts disclosure of educational records.  Most of the information collected by private organizations is not covered by existing laws. 

Security o Computer security involves protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. o Cyber Crime  Also known as computer crime is any criminal offence that involves a computer and a network.  It was recently estimated that cybercrime affects over 400 million people and costs over $400 billion dollars each year.  Cybercrimes can take various forms including identity theft, Internet scams, data manipulation, ransomware, and denial of service attacks. o Identity Theft is the illegal assumption of someone‘s identity for the purposes of economic gain.  Stolen identities are used to steal credit cards and mail and to commit other crimes  It is estimated that identity thieves stole $16 billion and victimized 15.4 million individuals. o Internet scams use the Internet and almost all the scams are initiated by a mass mailing to unsuspecting individuals.  See Figure 9-7 for a list of common types of Internet scams. o Data manipulation is the unauthorized access of a computer network and copying files to or from the server.  In Facebook, it‘s making a post logged in as another user  Feeding a company false reports to change business practices  Can occur for months, even years, without the victims being aware of the security breach, making it hard to detect. 1-168 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Ransomware is malicious software that encrypts a computer‘s data and ransoms the password to the user.  In 2021, a ransomware attack on the Colonial Pipeline caused fuel shortages that grounded airplanes and closed gas stations across the southeastern United States. o Denial of service attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data.  A widely used variation is known as distributed denial of service (DDoS) which coordinates several computers making requests for service.  Targets for these attacks are ISPs and specific websites  With cybercrime on the rise it is important to know the tools the cybercriminal uses to help maker smarter choices and protect yourself from becoming a victim.  The tools of the cybercriminal include social engineering, malicious software, and malicious hardware. o Social Engineering  The practice of manipulating people to divulge private data.  It has played a key role in identity theft, Internet scams and data manipulation.  Phishing – a technique employed by scammers attempting to trick Internet users to think a fake but official looking site is legitimate.  Phishing has grown in sophistication, replicating entire websites like PayPal. o Malicious Software  A cracker is a computer criminal who creates and distributes malicious programs or malware which is short for malicious software.  Three most common types of malwares are:  Viruses are programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. o Some are relatively harmless, but many can be quite destructive. o Once activated, destructive viruses can alter and/or delete files. o Creating and knowingly spreading a virus is a serious crime and a federal offense punishable under the Computer Fraud and Abuse Act o Symantec, McAfee, and Microsoft all track the most serious virus threats See Figure 9-8  Worms are programs that replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed or stopped. 1-169 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Internet worms can be carriers of more traditional viruses. Once the traditional virus has been deposited by a worm on an unsuspecting computer system, the virus will either activate immediately or lie dormant until some future time. o Viruses and worms typically find their way into personal computers through e-mail attachments and programs downloaded from the Internet. o Computer users are advised to never open an e-mail attachment from an unknown source and to exercise great care in accepting new programs and data from any source.  Trojan horses are programs that enter a computer system appear to be harmless but carry malicious programs. Trojan horses are not viruses but can be carriers of viruses o The most common types of Trojan horses appear as free computer games and free screensaver programs that can be downloaded from the Internet. o When a user installs one of these programs, a virus is on their computer system and the virus then begins its mischief. o One of the most dangerous types of Trojan horses claims to provide free antivirus programs. When a user downloads one of these programs, the Trojan horse first installs a virus that locates and disables any existing virus protection programs before depositing other viruses o Malicious Hardware  Criminals use computer hardware to steal information, infect computers with malicious software, and disrupt computer systems.  The most common malicious hardware includes zombie botnets, rogue Wi-Fi hotspots, and infected USB flash drives.  Zombies are computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes o Botnet or robot network is a collection of zombie computers. o Botnets harness the combined power of many zombies for malicious activities like password cracking or sending junk e-mail. o Formed by many computers distributed across the Internet, botnets are hard to shut down even after they are detected.  Rogue Wi-Fi Hotspots  Imitate free networks and operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to  Capture any and all information sent by unsuspecting users to legitimate  Infected USB flash drives  USB drives can hide viruses and other malicious software 1-170 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

Crackers will abandon these drives in the hope that others will find them, plug them into their computer, and become infected. Infected drives have also been found distributed for free at conferences and slipped into people‘s mailboxes.

Measures to Protect Computer Security o There are numerous ways in which computer systems and data can be compromised and many ways to ensure computer security. o The Computer Fraud and Abuse Act makes it a crime for unauthorized persons even to view, copy or damage data using any computer across state lines.  It also prohibits unauthorized use of any government computer, or a computer used by any federally insured financial institution.  Offenders can be sentenced to up to 20 years in prison and fined up to $100,000. o Some principal measures to protect computer security are restricting access, encrypting data, anticipating disasters, and preventing data loss:  Restricting Access – security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Some methods employed include: o Putting guards on company computer rooms and checking the identity of everyone admitted o Assigning passwords which are secret words, names, and numeric patterns  Strong passwords have at least eight characters and use a combination of letters, numbers and symbols.  Don‘t use the same password for multiple accounts.  The strength of a password depends on how easily it can be guessed.  Newer technology allows access to be restricted by passwords that do not require secret words of phrases.  Windows 10 includes an application, Picture Password, that accepts a series of gestures over a picture of the user‘s choice. o Use of biometric scanning devices such as fingerprint and iris scanners. (See Figure 9-9.) o Numerous applications use face recognition to allow access to a computer system.  Windows 11 and Apple's iOS 15 include facial recognition software, which uses specialized cameras to identify users and automatically log them in. o Security suites provide a collection of utility programs designed to protect privacy and security while on the web. o Firewalls, special hardware and software which act as a security buffer between a corporation‘s private network and all external networks. 1-171 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


All electronic communications coming into and leaving must be evaluated by the firewall. o Password managers help create strong passwords and will also store passwords, accessed with one master password, in one location and automatically provide the appropriate password when requested by a favorite website o Authentication is the process of ensuring the identity of a user. Two-factor authentication uses two types (or factors) of data to verify your identity. These types of data include knowledge (such as a password or the answer to a security question), possession (such as your cell phone or credit card), and biometric data (such as a fingerprint or voice print). Two step authentication uses one type of authentication twice (such as asking for two knowledgebased authentications such as a password and the answer to a security question). While both types are more secure than a single authentication, two-factor authentication is considered more secure than two-step authentication—and both are more secure than a single authentication. Encrypting Data – the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key. Some common uses for encryption include: o E-mail encryption – protects e-mail messages as they move across the Internet (See Figure 9-11.) o File encryption – protects sensitive files by encrypting them before they are stored on a hard drive (See Figure 912.) o Website encryptions – secures web transactions, especially financial transactions. The most common protocol for website encryption is HTTPS (hypertext transfer protocol secure). HTTPS adds a security level to HTTP.  Requires that the browser and the connecting site encrypt all messages providing a safer and more secure transmission o Virtual Private Networks - encrypt connections between company networks and remote users such as workers connecting from home. o Wireless network encryptions - restricts access to authorized users on wireless networks.  WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks.  WPA2 is typically established for a wireless network through the network's wireless router Anticipating Disasters – companies (and individuals) should prepare themselves for disasters. 1-172

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Physical security – protecting hardware from human and natural disasters o Data security – protecting software and data from unauthorized tampering or damage o Disaster recovery plan - describing ways to continue operating until normal computer operations can be restored.  Most larger organizations have disaster recovery plans. o Preventing Data Loss  Carefully screening of job applicants  Guarding of passwords  Auditing of data and programs  Use of redundant storage (RAID)  Use of backup batteries during power outages  Making frequent backups  Making incremental backups to store multiple versions of data at different points in time  Backups are often stored at an off-site location  Students and others use cloud storage Ethics – standards of moral conduct o Computer ethics are guidelines for the morally acceptable use of computers in our society.  This includes the right to keep personal information getting into unauthorized hands. o Cyberbullying  Cyberbullying is the use of the Internet to send or post content intended to hurt or embarrass another person. Cyberbullying includes sending repeated unwanted e-mails to an individual who has stated that he or she wants no further contact with the sender, ganging up on victims in electronic forums, posting false statements designed to injure the reputation of another, maliciously disclosing personal data about a person that could lead to harm to that person, and sending any type of communication that is threatening or harassing.  If you or someone you know is the victim of cyberbullying, go to stopbullying.gov for help and advice. o Copyright and Digital Rights Management  Copyright - is a legal concept that gives content creators the right to control use and distribution of their work.  Materials that can be copyrighted include paintings, books, music, films, and even video games.  Software piracy is the unauthorized copying and/or distribution of software.  Software piracy costs the software industry over $60 billion annually. 1-173 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


To prevent copyright violations, corporations often use digital rights management (DRM). o Typically, DRM is used to (1) control the number of devices that can access a given file as well as (2) limit the kinds of devices that can access a file.  The Digital Millennium Copyright Act makes it illegal to deactivate or otherwise disable any anti-piracy technologies including DRM technologies.  The act also establishes that copies of commercial programs may not be legally resold or given away.  It further makes it a crime to sell or to use programs or devices that are used to illegally copy software, movies, or music. o This may come as a surprise to those who copy software including music and games from a friend or from the Internet. o Plagiarism  Representing some other person‘s work and ideas as your own without giving credit to the original source  Plagiarist – can be caught by computer technology. Services such as Turnitin are dedicated to preventing Internet plagiarism. Careers in IT o IT security analysts  Responsible for maintaining the security of a company's networks, systems, and data  Their goal is to ensure the confidentiality, integrity, and availability of information.  Safeguard information systems against a variety of external threats, such as hackers and viruses, as well be vigilant of threats that may come from within the company.  Employers typically look for a bachelor‘s or associate‘s degree in information systems or computer science as well as experience with good communication and research skills.  Annual salary of $49,000 to $99,000  Demand for this position is expected to grow as malware, crackers, and other types of threats become more complex and prevalent. A Look to the Future-The End of Anonymity o Some people anonymously post horrible, dangerous, and even criminal things on the Internet—should anonymity protect them? o The Internet has always had a challenging relationship with anonymity  Free speech advocates praise anonymous speech, allowing citizens in oppressive regimes to meet and share ideas without fear of government reprisal. o Security advocates argue that the same tools that allow for free speech in dictatorships also allow terrorists to plan attacks against democracies. o In the future we are likely to see an ever-decreasing level of anonymity. o Companies and Internet service providers already buy and sell your web browsing habits and online purchase habits and history to better advertise and sell things. 1-174 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o In the future, when you visit a mall, security cameras will recognize you and track your path using facial recognition and update your online identity.  This personal digital footprint will be continuously updated based on social media postings, Internet browsing history, and credit card purchases.  Based on the amount of information currently shared by people online, one wonders whether anonymity will be valued at all in the future.  Sensors in your clothes will tell stores what brands you like and how much you spend. o Technology has been profoundly impacting anonymity and public interactions.

1-175 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions  

Begin with a discussion about the consequences of the widespread presence of technology. Does technology make it easy for others to invade our personal privacy? People o People are part of an information system.  Ask students to discuss why it is important to protect the rights of those using the Internet.  What are the limits for protecting the rights of people using the Internet?  When we apply for a loan or for a driver‘s license, or when we check out at the supermarket, is that information about us being distributed and used without our permission? o Discuss the following concerns:  Privacy – What are the threats to personal privacy and how can we protect ourselves?  Security – How can access to sensitive information be controlled and how can we secure hardware and software?  Ethics – How do the actions of individual users and companies affect society? Where do personal ethics begin and are companies in the business for instilling ethics? Privacy o How does computing technology make it possible to collect and use information about people? Give examples. o When we use the web, is information about us being collected and shared with others? How can criminals use this information for ransom, blackmail, or vandalism? o Discuss the meaning of the following terms as it relates to privacy:  Accuracy  Property  Access o Big Data  Today, almost all human events are recorded digitally. This results in an unprecedented amount of digital information being stored. This stored information is often referred to as big data.  Discuss examples of data that is being collected about us:  Posting a video to social media  Wearing a smartwatch  Credit card transactions  Retail purchases  Banking  Internet search history  Discuss digital footprint.  Ethical concerns:  Collecting public, but personally identifying, information o Discuss Google Street View. How is it used? How can it be used negatively? Show a picture from Google Street View.  Spreading information without personal consent  Spreading inaccurate information 1-176 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Use the Internet to find sites offering reverse directories. Ask students to identify sites that they can find information on themselves.  What are information brokers/information resellers and how do they earn money?  Give examples of using webcams, cell phone cameras, etc. and how public information can be captured.  Discuss identity theft.  Ask the students to search the Internet for articles about situations of mistaken identity involving computerized information. How were these instances of mistaken identity used and/or resolved?  What is the importance of the Freedom of Information Act? o Private networks  Discuss employee monitoring software. Many students aren‘t aware that businesses use this software and what its implications may be.  You should never do anything on a work computer or a work network connection that you wouldn‘t want shared with your employer.  Discuss the school policy on the use of monitoring software.  Ask students to interview IT personnel on the use of private networks. o The Internet and the web  Most students have the illusion of anonymity while using the Internet. You can discuss what is and isn‘t private while using the Internet. Give specific examples so that students understand anonymity or lack of.  Discuss the deep web and the dark web.  Discuss the browser history file and how it contains information about computer users.  Demonstrate how to clear a history file and have students clear the history on their laptop browser.  Although cookies are harmless in and of themselves, what makes them a potential privacy risk is that they can store information about you, your preferences, and your browsing habits. Discuss the different types of cookies and their effects.  Provide examples of 1st and 3rd party cookies.  Show students how to clear history files on their smartphone. (See Figure 9-4.)  Discuss privacy mode and ask students to find out how to enable it on their laptops.  Google Chrome provides Incognito Mode.  Safari provides Private Browsing.  Web bugs – discuss how these bugs operate and how dangerous they are.  Computer monitoring software is the most invasive and dangerous type of spyware.  Keylogger- records every activity and keystroke made on your computer system, including credit card numbers, passwords, and email messages  Discuss why it is difficult to remove web bugs and computer monitoring programs. 1-177 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Ask students if they have ever come across or been a victim of a keystroke logger or web bug.  Discuss spyware on cell phones, Pegasus is spyware that works on iOS and Android cell phones.  Online identity  Discuss social networking and the voluntary posting of personal information.  How would you feel if information you posted about yourself on the web kept you from getting a job? Is this fair, why or why not? o Major Laws on Privacy  Ask students how they feel that the FERPA or HIPAA law affects them as students.  Most of the information collected by private organizations is not covered by existing laws. Discuss the implications and effects of these laws. Security o Discuss how to keep information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters. o Cyber Crime  Discuss cyberterrorism, a politically motivated cybercrime.  Cybercrimes include identity theft, Internet scams, data manipulation, ransomware, and denial of service attacks.  Identity theft – Advise students not to post personal information on forums or social networking areas that are public or in response to an email.  Internet scams – Advise students to only do business on the Internet with companies known to be legitimate. (See Figure 9-7.)  Data Manipulation - This can be as simple as making a post in Facebook when logged in as someone else.  Ransomware – Discuss the ransomware attack on the Colonial Pipeline caused fuel shortages that grounded airplanes and closed gas stations across the southeastern United States in the summer of 2021.  Denial of Service – What is a DoS attack? Ask students to use the Internet to find a company that was affected by a DoS attack? What were the negative consequences for the company? o Social Engineering - the practice of manipulating people to divulge private data  Phishing - attempts to trick Internet users into thinking a fake but officiallooking website or e-mail is legitimate. o Malicious Software  Cracker - someone who creates and distributes malicious programs, malware (viruses, worms, Trojan horses)  Have students research viruses, worms, and Trojan horses. Discuss the differences and the tools available to protect systems from them. o Malicious Hardware  The most common malicious hardware includes zombie botnets, rogue Wi-Fi hotspots, and infected USB flash drives.

1-178 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Have students research zombie botnets, rogue Wi-Fi hotspots, and infected USB flash drives. Discuss the differences and the tools available to protect systems from them. o Measures to protect computer security  Discuss the different ways to protect computer information and systems.  Restricting Access  What is a dictionary attack?  Discuss the benefits of biometric scanning.  Discuss security suites and firewalls, password managers and authentication.  Encrypting Data – discuss the common uses for encryption including:  E-mail encryption  File encryption.  Website encryption  Virtual Private Networks (VPNs)  Wireless network encryption  Anticipating Disasters  Have the students research and then discuss their ideas of a disaster recovery plan for their institution in case of a disaster.  Preventing Data Loss  Even though backing up data is important, many computers users fail to do so. Why? Discuss reasons.  What methods are now available for avoiding data loss? Ethics – are standards of moral conduct. Computer ethics are guidelines for the morally acceptable use of computers in our society. Discuss the following with students and have them research and provide examples of ethics violations. o Discuss how students feel that ethics can be used to control how computers are used. How are ethics amplified when using technology? o Cyberbullying - the use of the Internet to send or post content intended to hurt or embarrass another person  Show students stopbullying.gov o Copyright and Digital Rights Management - Ask students what copyright means? Ask them to explain how copyright infringements affect the total industry. o Software piracy - unauthorized copy and distribution of software. Ask students to explain why it is illegal to make additional copies of software however, it is legal to make a backup copy of the programs that come on their new computer. o Plagiarism - the representation of some other person‘s work and ideas as your own without giving credit to the original source. This is an excellent time to present students with a copy of the universities code of conduct and point out the academic consequences of individuals who break these rules (it could lead to expulsion from the school). Have students research and provide Internet sites that work with plagiarism. o Using the A Look to the Future as a starting point for debate set up two panels with students either supporting anonymity or are against. Have students research and debate the pros and cons. 1-179 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term access accuracy antispyware authentication big data biometric scanning botnet browser cache computer crime computer ethics Computer Fraud and Abuse Act computer monitoring software cookies copyright cracker cyberbullying cybercrime cyberterrorism dark web data manipulation data security deep web denial of service (DoS) attack

Definition Relates to the responsibility of those who have data to control who is able to use that data Relates to the responsibility of those who collect data to ensure that the data is correct Programs designed to detect and remove privacy threats The process of ensuring the identity of a user The ever-growing volume of data that is being collected over the Internet Using devices such as fingerprint and iris (eye) scanners to verify the identity of users A collection of zombie computers that are remotely controlled for malicious purposes A collection of temporary internet files that contain web page content and instructions for displaying this content An illegal action which involves a computer or a network, also known as cybercrime Guidelines for the morally acceptable use of computers in our society Makes it a crime for unauthorized persons to view and copy or damage data using any computer across state lines Records every activity and keystroke made on a computer system (see also keystroke logger) Small data files that are deposited on a hard disk from websites you visit Legal concept that gives content creators the right to control use and distribution of their work Create and distribute malware (malicious software) Use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person Any criminal offense that involves a computer and a network Politically motivated cybercrime Websites that use special software that hides a user‘s IP address and makes it nearly impossible to identify who is using the site Unauthorized access of a computer network and copying files to or from the server Protecting software and data from unauthorized tampering or damage Websites designed to be hidden from standard search engines Slows down or stops a computer system or network by 1-180

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


dictionary attack

digital footprint

Digital Millennium Copyright Act

digital rights management (DRM)

disaster recovery plan distributed denial of service (DDoS) employee-monitoring software encryption encryption key ethics facial recognition Family Educational Rights and Privacy Act (FERPA) firewall first-party cookie Freedom of Information Act Gramm-Leach-Bliley Act hacker

flooding it with repeated requests for information and/or data Uses software to try thousands of common words, sequentially in an attempt to gain unauthorized access to a user‘s account Highly detailed amount of information about an individual compiled by credit card companies, banks, retail establishments, and search engines Makes it illegal to deactivate or disable antipiracy technologies; to copy, resell, or give away commercial programs; or to sell or use programs or devices that are used to illegally copy software A collection of technologies designed to prevent copyright violations by controlling the number of devices that can access a given file and limit the kinds of devices that can access a file Procedures to continue operating until normal computer operations can be restored A variation of denial of service attack that coordinates several computers making repeated requests for service Software that records and searches everything an employee does on their computer The process of coding information to make it unreadable except to those who have a special key A key or special piece of information used to gain access to data that has been encrypted Standards of moral conduct One form of biometric scanning A federal law that restricts disclosure of educational records A security buffer between an organization‘s private network and all external networks including the Internet A cookie that is generated and then read only by the web site you are currently visiting A law that entitles people to look at records held by government agencies A federal law that protects personal financial information People who gain unauthorized access to a computer system for the fun and challenge of it A federal law that protects personal medical records and information Records websites visited

Health Insurance Portability and Accountability Act (HIPAA) history file HTTPS (Hyper Text Transfer Requires browsers and websites to encrypt all messages Protocol Secure) The illegal assumption of someone‘s identity for the identity theft purposes of economic gain 1-181 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


illusion of anonymity Incognito Mode infected USB flash drive information broker information reseller Internet scam IT security analyst key

keylogger malware (malicious software) mistaken identity online identity password

password manager

Phishing physical security picture password plagiarism plagiarist privacy privacy mode

The feeling that if you are selective about disclosing personal information on the Internet, then little can be done to invade your personal privacy Google Chrome provides this mode to ensure browsing activity is not recorded on a computer‘s hard disk USB drives that are often free that contain a virus Data gatherers that collect and sell personal data (see also information reseller) Data gatherers that collect and sell personal data (see also information broker) Uses the Internet to create financial and legal problems for people Responsible for maintaining the security of a company's network, systems, and data An encryption key; special information for making encrypted information readable The most invasive and dangerous type of spyware, which records every activity and keystroke made on a computer system (see also computer monitoring software) Short for malicious software It is when a digital footprint of one person is switched with another The information that people voluntarily post about themselves online Secret words or phrases (including numbers, letters, and special characters) that must be keyed into a computer system to gain access Helps create strong passwords and will store all passwords in one location to automatically provide password when requested from website; use one master password to access list of passwords A technique employed by scammers attempting to trick Internet users to think a fake but official looking site is legitimate Procedures and devices that deal with protecting hardware from possible human and natural disasters Uses a series of gestures Is the illegal and unethical representation of some other person‘s work and ideas as your own without giving credit to the original source A person who uses another‘s work and ideas as their own without crediting the original source The collection and use of data about individuals There are three primary privacy issues: Accuracy, Property, and Access Many browsers offer a privacy mode that ensures 1-182

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


privacy browsing property ransomware robot network rogue Wi-Fi hotspot security security suites social engineering software piracy spy removal program

spyware

temporary Internet file third-party cookie tracking cookies Trojan horse two-factor authentication two-step authentication virtual private network (VPN) virus

web bugs wireless network encryption worm

browsing activity is not recorded on a computer‘s hard disk A tool in Safari that ensures browser history will not be recorded on the computer‘s hard disk Relates to who owns data Software that encrypts your data and demands a payment for the password to get the data back. A botnet; a collection of zombie computers Free wireless hotspot where user‘s information is captured once connected Focuses on protecting information, hardware, and software from unauthorized use as well as preventing damage from intrusions, sabotage, and natural disasters A collection of utility programs designed to protect a user‘s privacy and security while on the web Practice of manipulating people to divulge private data Unauthorized copying and distribution of software Programs designed to detect and remove various types of privacy threats A wide range of programs that are designed to secretly record and report an individual‘s activities on the Internet Can run in the background invisible to the average user It also disguises itself as useful software Contain website content and instructions for displaying this content Generated by an advertising company that is affiliated with the website being visited, also known as a tracking cookie Generated by an advertising company that is affiliated with the website currently being visited A program that appears to be harmless comes into a computer system disguised as something else, but may contain a virus uses two types (or factors) of data to verify your identity uses one type of authentication twice to verify your identity A secure private connection between a remote user and an organization‘s internal network Programs that migrate through networks and operating systems, and most attach themselves to different programs and databases Typically hidden within the HTML code for a web page or e-mail message as a graphical image and used to transmit information without a user‘s knowledge Restricts access to authorized users on wireless networks A special program fills a computer system with self1-183

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


replicating information, clogging the system so that its operations are slowed or stopped Wi-Fi Protected Access encryptions used on wireless WPA2 (Wi-Fi Protected Access 2) home networks Remotely controlled computers used for malicious zombie purposes

1-184 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 9 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers A A C A B B C B D D

Matching Answers I E C D B J H F G A

Open Ended Questions: 1. Define privacy and discuss the impact of big data, private networks, the Internet, and the web. Privacy concerns the collection and use of data about individuals. There are three primary privacy issues: o Accuracy - the responsibility of those who collect data to ensure that the data is correct o Property – related to who owns data and rights to software o Access - the responsibility of those who have data to control and who is able to access that data o Big Data - businesses compile information and store it in large databases  Almost all human events are recorded digitally.  Making a phone call, posting a video to social media, or wearing a smartwatch creates a digital record.  Credit card companies maintain user databases that track cardholder purchases, payments, and credit records.  Search engines record the search histories of their users including search topics and sites visited.  Information reseller (brokers) is a vast industry of data gathers that collects and sells personal data. Using publicly available databases and nonpublic databases, they create digital footprints or highly detailed and personalized descriptions of individuals.  Collect and sell personal data to direct marketers, fundraisers, and others.  Personal information has become a marketable commodity. This raises many issues, including: 1-185 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Collecting public, but personally identifying information  Google‘s Street View o Spreading information without personal consent  What if employers used personal information from Facebook, Google+ or other social networking profiles to make decisions about hiring?  It is a common practice today for many organizations.  Identity theft happens every day to nearly 10 million people.  Identity theft is the illegal assumption of someone‘s identity for the purposes of economic gain.  Fastest-growing crimes in the country. o Spreading inaccurate information  Mistaken identity in which the digital footprint of one person is switched with another.  Freedom of Information Act - law allows you to gain access to records about you held by government agencies and credit bureaus. o Private networks  Nearly 75 percent of all businesses search employees‘ electronic mail and computer files using employee monitoring software.  Many people incorrectly assume that their employers won‘t or can‘t monitor employee activity on work computers and networks. You should never do anything on a work computer or a work network connection that you wouldn‘t want shared with your employer. o The Internet and the web  Illusion of anonymity – the mistaken belief that as long as computer operators are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy.  Every computer on the Internet is identified by a unique number (IP address) which can be used to trace Internet activities to their origin, allowing computer security experts and law enforcement officers to investigate computer crimes such as unauthorized access to networks or sharing of copyrighted files without permission.  Some websites are designed to be hidden from standard search engines. These websites make up the deep web and allow communication in a secure and anonymous manner. One part of the deep web is hidden websites that make up the dark web. These websites use special software that hides a user‘s IP address and makes it nearly impossible to identify who is using the site.  When browsing the web, the browser software stores critical information onto the hard disk, typically without you being aware of it. 1-186 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

 

o This information includes history and temporary Internet files. Browsers create history files of the locations of sites visited by your computer system. Temporary Internet files, also known as browser cache, contain web page content and instructions for displaying the content. The files are saved by your browser. Another way web activity is monitored is with cookies, or small data files that are deposited on your hard disk from websites you have visited. o These cookies can be accepted or blocked. While cookies are harmless, they can be a potential privacy risk because they store information about you, your preferences, and your browsing habits. It depends on whether it is a first-party cookie or a third-party cookie. o A first-party cookie is one that is generated (and then read) only by the website you are currently visiting.  Store information about the current session, your general preferences, and your activity on the site.  The intention is to provide a personalized experience on a particular site.  For example, when you are shopping online, you might fill your cart with items and then leave the site without making a purchase. Cookies allow you to return to that site and have the site remember what was in your cart. o A third-party cookie is usually generated by an advertising company that is affiliated with the website you are currently visiting.  Used by the advertising company to keep track of your web activity as you move from one site to the next and are often referred to as tracking cookies. Most browsers offer privacy mode, which ensures that your browsing activity is not recorded. o Google Chrome – InCognito Mode o Safari - Private Browsing Web bugs – invisible images or HTML code hidden within a web page or e-mail message and can be used to transmit information without your knowledge o If you open an e-mail message containing a web bug information is sent back to the sender to validate your email address. o This is why many e-mail programs block images and HTML code. Spyware – a wide range of programs that are designed to secretly record and report an individual‘s activities on the Internet 1-187

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Some spyware can even make changes to your browser. o Computer monitoring software, also known as keystroke loggers, is the most invasive and dangerous type of spyware. o Record every activity and keystroke made on your computer o Can be deposited on your hard drive by a malicious web site or by someone installing software onto your computer o Legally used by companies to monitor employees o Legally used by law enforcement to collect evidence o Antispyware or spy removal programs detect and remove various types of privacy threats. 2. Define and discuss online identity and the major privacy laws. o Online Identity – information that people voluntarily post about themselves online. With the popularity of social networking, blogging, and photo- and videosharing sites, many people post intimate details of their lives without considering the consequences. o Major Laws on Privacy  Some federal laws governing privacy matters have been created.  Gramm-Leach-Bliley Act – protects personal financial information  Health Insurance Portability and Accountability Act – protects medical records  Family Educational Rights and Privacy Act (FERPA) - restricts disclosure of educational records.  Most of the information collected by private organizations is not covered by existing laws. 3. Define security. Define cybercrime, social engineering, malicious software, and malicious hardware. Include identity theft, Internet scams, data manipulation, ransomware, Denial of service attacks, viruses, worms, Trojan horses, zombies, rogue Wi-Fi hotspots, and infected USB flash drives. Computer security specifically focuses on protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters. o Cybercrime or Computer Crime  Cybercrime or computer crime is any criminal offence that involves a computer and a network. It was recently estimated that cybercrimes affect over 400 million people and costs over $400 billion dollars each year.  Cybercrimes can take various forms including the identity theft, Internet scams, data manipulation, ransomware, and denial of service attacks.  Identity theft is the illegal assumption of someone‘s identity for the purposes of economic gain.  An Internet scam is a fraudulent or deceptive act or operation on the Internet designed to trick individuals into providing personal 1-188 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


information or spending their time and money for little or no return.  Phishing is a technique employed by scammers attempting to trick Internet users to think a fake but official looking site is legitimate.  Phishing has grown in sophistication, replicating entire websites.  Data manipulation is finding entry into someone‘s computer network  The Computer Fraud and Abuse Act make it a crime to view, copy or damage data using any computer across state lines.  It Prohibits unauthorized use of any government computer or a computer used by any federally insured financial institution.  Ransomware is malicious software that encrypts a computer‘s data and ransoms the password to the user.  In 2021, a ransomware attack on the Colonial Pipeline caused fuel shortages that grounded airplanes and closed gas stations across the southeastern United States.  Denial of service attack (DoS)  Attempts to slow down or stop a computer system or network  Unlike a worm that self-replicates, a DoS attack floods a computer or network with requests for information and data. As a result, the ISP or website is effectively shut down.  The targets of these attacks are usually Internet service providers (ISP) and specific websites. o Social Engineering is the practice of manipulating people to divulge private data. It has played a key role in identity theft, Internet scams and data manipulation.  Phishing is a technique employed by scammers attempting to trick Internet users to think a fake but official looking site is legitimate.  Phishing has grown in sophistication, replicating entire websites. o Malicious Software, called malware, is specifically designed to damage, or disrupt a computer system. A cracker is someone who creates and distributes malicious programs.  Three most common types of malware are:  Viruses are programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. o Some are relatively harmless, but many can be quite destructive. o Once activated, destructive viruses can alter and/or delete files. Some delete all files on the hard disk and can damage system components. o Creating and knowingly spreading a virus is a serious crime and a federal offense punishable under the Computer Fraud and Abuse Act  Worms are programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed or stopped. 1-189 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Internet works can be carriers of more traditional viruses. Once the traditional virus has been deposited by a worm on an unsuspecting computer system, the virus will either activate immediately or lie dormant until some future time. o Viruses and worms typically find their way into personal computers through e-mail attachments and programs downloaded from the Internet. o Computer users are advised to never open an e-mail attachment from an unknown source and to exercise great care in accepting new programs and data from any source.  Trojan horses are programs that enter a computer system disguised as something else. Trojan horses are not viruses. They can be carriers of viruses. o The most common types of Trojan horses appear as free computer games and free screen saver programs that can be downloaded from the Internet. o When a user downloads one of these programs, a virus is deposited on their computer system. The virus then begins its mischief. o One of the most dangerous types of Trojan horses claims to provide free antivirus programs. Malicious hardware  Zombies are computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes o Botnet or Robot network is a collection of zombie computers. o Botnets harness the combined power of many zombies for malicious activities like password cracking or sending junk e-mail. o Because they are formed by many computers distributed across the Internet, botnets are hard to shut down even after they are detected.  Rogue Wi-Fi Hotspots o Imitate free networks and operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to. o Capture any and all information sent by unsuspecting users to legitimate sites including usernames and passwords.  Infected USB flash drives o USB drives can hide viruses and other malicious software o Crackers will abandon these drives in the hope that others will find them, plug them into their computer, and become infected. o Infected drives have also been found distributed for free at conferences and slipped into people‘s mailboxes.

4. Discuss ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. 1-190 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Measures to Protect Computer Security  Some principal measures to protect computer security are restricting access, encrypting messages, anticipating disasters, and preventing data loss:  Restricting Access – security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Some methods employed include: o Putting guards on company computer rooms and checking the identity of everyone admitted. o Use of biometric scanning devices such as fingerprint and iris scanners. o Face recognition to allow access to a computer system. o Assign passwords to people and changing the passwords when people leave the company. The strength of a password depends on how easily it can be guessed. A dictionary attack uses software to try thousands of common words sequentially in an attempt to gain access to a user‘s account. o Security suites provide a collection of utility programs designed to protect privacy and security while on the web Firewalls, special hardware and software, act as a security buffer between a corporation‘s private network and all external networks. o Authentication is the process of ensuring the identity of a user. When you enter a password to gain access to a site, that is a single authentication of your identity. For added security, some security systems require multiple authentications. Two-factor authentication uses two types (or factors) of data to verify your identity. These types of data include knowledge (such as a password or the answer to a security question), possession (such as your cell phone or credit card), and biometric data (such as a fingerprint or voice print). Two step authentication uses one type of authentication twice (such as asking for two knowledgebased authentications such as a password and the answer to a security question). While both types are more secure that a single authentication, two-factor authentication is considered more secure than two-step authentication—and both are more secure than a single authentication.  Encrypting Data – the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key. Some common uses for encryption include: o E-mail encryption – protects e-mail messages as they move across the Internet. o File encryption – protects sensitive files by encrypting them before they are stored on a hard drive. 1-191 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Web site encryptions – secures web transactions, especially financial transactions. The most common protocol for website encryption is HTTPS (Hyper Text Transfer Protocol Secure). As we discussed in Chapter 2, HTTP (Hyper Text Transfer Protocol) is the most widely used Internet protocol. HTTPS adds a security level to HTTP. Every URL that begins with https requires that the browser and the connecting site encrypt all messages providing a safer and more secure transmission. o Virtual Private Networks - encrypt connections between company networks and remote users such as workers connecting from home. o Wireless network encryptions - restricts access to authorized users on wireless networks. WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks. WPA2 is typically established for a wireless network through the network's wireless router. Anticipating Disasters – Companies (and individuals) should prepare themselves for disasters. o Physical security – protecting hardware from human and natural disasters o Data security – protecting software and data from unauthorized tampering or damage o Disaster recovery plan - describing ways to continue operating until normal computer operations can be restored Preventing Data Loss o Carefully screening of job applicants o Guarding of passwords o Auditing of data and programs o Use of redundant storage o Use of backup batteries during power outages o Making frequent backups o Making incremental backups to store multiple versions of data at different points in time

1-192 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


5. Define computer ethics, cyberbullying, copyright law, and plagiarism. Ethics are standards of moral conduct. o Technology is moving so fast that it is difficult for the legal system to control how computers can be used. o Computer ethics are guidelines for the morally acceptable use of computers in our society. o Cyberbullying  The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person. Although not always a crime, it can lead to criminal prosecution.  Cyber-bulling includes:  sending repeated unwanted e-mails to an individual who has stated that they do not want further contact with the sender  ganging up on victims in electronic forums  posting false statements designed to injure the reputation of another  maliciously disclosing personal data about a person that could lead to harm to that person  Sending any type of communication that is threatening or harassing.  Never participate in cyber-bulling and discourage others from participating in this dangerous and hateful activity. o Copyright and Digital Rights Management  Copyright - is a legal concept that gives content creators the right to control use and distribution of their work.  Software piracy - unauthorized copying and distribution of software for personal gain  Piracy costs the software industry over $30 billion annually  The Digital Millennium Copyright Act – makes it illegal to give away or sell copies of programs on your computer. It is also illegal to download copyright-protected music and videos from the Internet.  Corporations use digital rights management (DRM) to prevent copyright violations.  Controls the number of devices that can access a given file  Limits the kinds of devices that can access a file o Plagiarism  Representing some other person‘s work and ideas as your own without giving credit to the original source.  Plagiarist – can be caught by computer technology. Services such as Turnitin are dedicated to preventing Internet plagiarism.

Chapter 10 Information Systems 1-193 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Lecture Guide 

Learning Objectives o Explain the functional view of an organization and describe each function. o Describe the management levels and the informational needs for each level in an organization. o Describe how information flows within an organization. o Describe computer-based information systems. o Distinguish among a transaction processing system, a management information system, a decision support system, and an executive support system. o Distinguish between office automation systems and knowledge work systems. o Explain the difference between data workers and knowledge workers. o Define expert systems and knowledge bases.

Chapter Outline  

An information system is a collection of people, procedures, software, hardware, data and connectivity working together to provide information essential to running an organization. Organizational Information Flow o Computerized information systems do more than just keep track of transactions and daily business operations as these systems support the vertical and horizontal flow of organizational information o Functions – most organizations have departments that specialize in one of five basic functions:  Accounting - records all financial activity from billing customers to paying employees.  Marketing - plans, prices, promotes, sells, and distributes the organization‘s goods and services.  Human resources - focuses on people-hiring, training, promoting, and any number of other human-centered activities.  Production - creates finished goods and services using raw materials and personnel.  Research - identifies, investigates, and develops new products and services. o Management levels - people who do the planning and organizing, (See Figure 10-3.)  Supervisors – manage and monitor the employees and are responsible for operational matters; monitor day-to-day events and immediately take corrective action, if necessary.  Middle management - deal with control, planning (also called tactical planning), and decision making, and implement the long-term goals of the organization.  Top management - concerned with long range planning (also called strategic planning); need information that will help them plan the future growth and direction of the organization. o Information flow – summary information describing the overall operations of the business  Each management level has different information needs. 1-194 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Top level - need information that is summarized describing the overall condition of the business.  They also need information from outside the organization, because top-level managers need to forecast and plan for long-range events.  To support different needs, information flows in different directions. (See Figure 10-5.)  Middle management - need summarized information—weekly or monthly reports.  They need to develop budget projections and to evaluate the performance of supervisors.  Information flow is both vertical and horizontal across functional lines within the organization.  Supervisory - need detailed, very current, day-to-day information on their units so that they can keep operations running smoothly.  Information flow is primarily vertical as supervisors communicate mainly with their middle managers and with the workers beneath them. Computer-Based Information Systems – collect and use the data, (See Figure 10-6.) o Transaction processing system (TPS) - records day-to-day transactions, such as customer orders, bills, inventory levels, and production output; and acts as the foundation for the other information systems. o Management information system (MIS) - summarizes the detailed data of the TPS in standard reports for middle-level managers. o Decision support system (DSS) – uses data from TPS and a set of flexible tools for analysis; helps middle-level managers and others in the organization analyze a wide range of problems, such as the effect of events and trends outside the organization. o Executive support system (ESS) uses internal data from MIS and TPS and external data is to present information in a highly summarized form, and helps top-level managers oversee the company‘s operations and develop strategic plans. Transaction Processing System o Helps an organization keep track of routine operations and records these events in a database. (See Figure 10-7.) o Also called data processing system (DPS) o The database of transactions is used to support the MIS, DSS, and ESS. o One of the most essential transaction processing systems for any organization is in the accounting area. There are six basic accounting activities:  Sales order processing - records the customer requests for the company‘s products or services.  Accounts receivable- records money received from or owed by customers.  Inventory control system – keeps records of the number of each kind of part or finished good in stock.  Purchasing is the buying of materials and services. o Often a purchase order is used that provides the company‘s information and what is being purchased. 1-195 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Accounts payable - records the money the company owes its suppliers for materials and services it has received.  Payroll: - is concerned with calculating employee paychecks.  General Ledger - keeps track of all summaries of the foregoing transactions and can produce income statements and balance sheets.  Income statement - show a company‘s financial performance— income, expenses, and the difference between them for a specific time period.  Balance sheet - list the overall financial condition of an organization.  There are many other transaction processing systems that people encounter every day.  ATM, online registration systems Management Information Systems (MIS) o A computer-based information system that produces standardized reports in summarized structured form used to support middle managers (See Figure 10-9.) o MIS uses databases. o MIS requires a database management system that integrates the databases of the different departments. o MIS produces reports that are predetermined – follow a predetermined format and always show the same kinds of content. o Three common categories of reports produced:  Periodic reports - produced at regular intervals such as weekly, monthly or quarterly for example  Exception reports – produced in response to unusual events  Demand report - produced on request Decision Support System (DSS) o Enables managers to get answers to unexpected and generally nonrecurring kinds of problems o Different from TPS and MIS  Used to analyze data not just collect data o Produces reports that do not have a fixed format making the DSS a flexible tool for analysis o The DSS must be easy to use. o Four parts of a decision support system:  User - someone who makes decisions; often a middle-level manager  System software is essentially the operating system; programs designed to work behind the scenes to handle detailed operating procedures  Data - stored in a database and consists of two kinds:  Internal data, within the organization  External data, gathered outside the organization  Decision models - give the DSS its analytical capabilities.  Strategic models - assist top-level managers in long-range planning. o Stating company objectives or planning plant locations  Tactical models – help middle-level managers control the work of the organization. 1-196 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Financial planning and sales promotion planning  Operational models – help lower-level managers accomplish the organization‘s day-to-day activities. o Evaluating and maintaining quality control Executive Support Systems o Consists of sophisticated software that, like a MIS or a DSS, can present, summarize, and analyze data from an organization‘s databases. o Specifically designed to be easy to use o Information is often displayed in condensed form with informative graphics. o Permit a firm‘s top executives to gain direct access to information about the company‘s performance o May be organized to retrieve information from databases outside the company Other Information System o There are many other information systems to support different individuals and functions.  The fastest growing are information systems designed to support information workers. o Information workers distribute, communicate, and create information.  Data workers – involved with distribution and communication of information  Knowledge workers – involved with the creation of information o Two systems to support information workers:  Office automation systems (OAS) - designed primarily to support data workers  Focus on managing documents, communicating, and scheduling o Project managers are programs designed to schedule, plan, and control project resources. o Videoconferencing systems are computer systems that allow people located at various geographic locations to communicate and have in-person meetings.  Knowledge work systems (KWS) - specialized information systems to create information in their areas of expertise o For example, engineers involved in product design and manufacturing use computer aided design/computeraided manufacturing (CAD/CAM) systems.  Expert systems, also known as knowledge-based systems, are widely used knowledge work systems. o Artificial intelligence that uses a database, known as a knowledge base  Provides assistance to users  Users interact with an expert system by describing a particular situation or problem.  The expert system takes the inputs and searches the knowledge base until a solution or recommendation is formulated.  Expert systems are highly specialized software built by experienced professionals in their field. 1-197 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Industries where expert systems are popular include medicine, geology, architecture, and nature. 

Careers in IT o Information systems managers - oversee the work of programmers, computer specialists, systems analysts, and other computer professionals. o Create and implement corporate computer policy and systems. o Consult with management, staff, and customers to achieve goals. o Individuals with strong technical backgrounds, sometimes as consultants, with a master‘s degree in business o Experience in computer and network security will be in demand as businesses and society continue to struggle with important security issues. o Annual salary of $90,430 to $208,000 o Advancement opportunities typically include leadership in the field. A Look to the Future IBM’s Watson - The Ultimate Information- Finding Machine o Have you noticed how much information is out there, from books and journals in your library to the millions of articles on the web? o Do you ever wonder how professionals manage to read through all that research in order to stay up to date in their field? o IBM hopes to address this concern through their information-finding supercomputer known as Watson. o In 2011 this computer defeated the two best contestants in the game show known as Jeopardy. o Several organizations have already ―hired‖ Watson.  One healthcare company will be using Watson to help suggest options based on a patient's unique circumstances.  It will assist physicians and nurses by looking through millions of pages of medical research and then quickly identifying the most likely diagnosis and treatment options for the patient.  IBM has partnered with a cancer center in order to ―teach‖ Watson how to process the massive amount of cancer-related research and case studies. o Watson has recently been learning about the complexities of Wall Street, with the hopes that it can help financial firms identify risks and rewards that will improve the advice given to their customers.

1-198 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

Organizational Information Flow o Many students aren‘t aware of all the different functions in a business and how they relate to each other. o You can emphasize the functions and management levels while comparing their information flows. o Ask students to explain how they think information flows within their own educational institution. o Conduct a questionnaire with students on their workplace and where do they fit into the organization and how the data organization works (Having students examine their own work involvement provides personal insights.) Computer-Based Information Systems o Emphasize each type of system and the examples given in the text which offer good illustrations of how each type works. o Find out what information system is used by your institution.  How is registration done?  What are the functions of the bursar?  Where does the President of the institution get data to make decisions? o Review and discuss the four support systems; Poll students as to how many they have interacted with and what situations.  Transaction processing system (TPS)  Management information system (MIS)  Decision support system (DSS)  Executive support system (EIS) Transaction Processing System o This is the most familiar type of system discussed. The students encounter these types of systems frequently.  Many students have worked in retail. Discuss the computerized data systems in a retail environment. o Ask the students to review and discuss the operations of the HealthWise Company mentioned in the text. Discuss how their accounting system might function. o Discuss how a supermarket discount card tracks customer purchases. How is the information used by the store? Management Information Systems o Emphasize that these systems are typically used by managers and supervisors. o List each type and give an example of each using either the accounting system example used in the text or using one of the types of organizations the students may have listed in the previous exercise. o Have students research and find examples of each type of report.  Periodic reports - produced at regular intervals  Exception reports – produced in response to unusual events  Demand reports - produced on request Decision Support System o This type of system is somewhat unfamiliar to students. Emphasize the different models and give examples of each. Find out if there are decision support systems for your college or university. If not, how might one work? What would be the benefits? How would a group decision support system fit in? What types of 1-199 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


decisions might be made using a DSS? Have students diagram their conceptions for DSS models.  Decision models - give the DSS its analytical capabilities.  Strategic models - assist top-level managers in long-range planning, such as stating company objectives or planning plant locations.  Tactical models – help middle-level managers control the work of the organization.  Operational models – help lower-level managers accomplish the organization‘s day-to-day activities. Executive Support Systems o Emphasize that these are easy-to-use systems but also may need to access outside databases to get the required data. o Discuss how would a president of a typical company use an ESS? (Most students may not have had exposure to this—perhaps create a case study that students can use for this chapter.) Other Information System o Two systems to support information workers:  Office automation systems - designed primarily to support data workers, focus on managing documents, communicating, and scheduling.  Some students might be familiar with Microsoft Project management software. Give examples of project management. Discuss the role of the project manager.  Knowledge work systems - specialized information systems to create information in their areas of expertise  Ask the students to use the Internet to find out more about CAD/CAM systems. Find out the names of some of these systems.  Expert systems - Artificial intelligence that uses a database, known as a knowledge base, to aid users  Cite examples of expert systems.  Have students research projects using AI. Most students find AI an interesting topic.

1-200 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term accounting accounts payable accounts receivable

Definition A function of a business that records all financial activity from billing customers to paying employees Refers to the money the company owes its suppliers for materials and services it has received Refers to the money received from or owed by customers Lists the overall financial condition of an organization

balance sheet computer-aided design/computerSpecial programs that integrate the design and aided manufacturing (CAD/CAM) manufacturing activities system Stored in a database and consists of two kinds – internal data and external A type of system where the data from operations makes data processing system (DPS) up a database that records the transactions of the company People involved with distribution and communication of data worker information Gives the DSS its analytical capabilities, three basic decision model models: strategic, tactical, and operational Analyzes unanticipated situations using data (internal decision support system (DSS) and external) and decision models (strategic, tactical, and operational) A document that is produced by an information system demand report upon request A document produced by an information system exception report produced in response to unusual events An easy-to-use system that presents information in a executive information system (EIS) very highly summarized form (see also executive support system) Designed to be an easy-to-use system that presents executive support system (ESS) information in a very highly summarized form (see also executive information system) Computer program that provides advice to decision makers who would otherwise rely on human experts, a expert system type of artificial intelligence that uses a database to provide assistance to users external data Data gathered from outside the organization An accounting reporting system that keeps track of all general ledger summaries of all the foregoing transactions and can produce balance sheets and income statements group decision support system Tools to support group meetings and collective work (GDSS) Finds and hires people; handles such matters as sick human resources leave, retirement benefits, evaluation, compensation, and 1-201 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


income statement

information system

information systems manager information worker internal data inventory inventory control system knowledge base knowledge-based system knowledge work system (KWS) knowledge worker management information system (MIS) marketing middle-level manager office automation system (OAS) operational model payroll periodic report production project manager purchase order purchasing research sales order processing

professional development Shows a company‘s financial performance—income, expenses, and the difference between them for a specific time period A collection of people, procedures, software, hardware, and data that all work together to provide information essential to running an organization A person who oversees the work of programmers, computer specialists, systems analysts, and other computer professionals People who create, distribute, and communicate information Data from within the organization The parts and finished goods that the company has in stock Keeps records of the number of each kind of part or finished good in the warehouse Contains facts and rules to relate the facts distilled from a human expert Is a type of AI that uses a database to provide assistance to users Systems that support knowledge workers who create information People involved with the creation of information Summarizes detailed data of the transaction processing system in standard reports for middle-level managers Plans, prices, promotes, sells, and distributes the organization‘s goods and services Person in an organization who deals with control, planning, decision making, and implementation of longterm goals of the organization Programs designed primarily to support data workers Helps lower-level managers accomplish the organization‘s day-to-day activities An accounting function that is concerned with calculating employee paychecks Reports produced at regular intervals Creates finished goods and services using raw materials and personnel Programs designed to schedule, plan, and control project resources A form that shows the name of the company supplying the material or service and what is being purchased The buying of materials and services Conducts product research and development; monitors and troubleshoots new products Activity which records the customer requests for the 1-202

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


strategic model supervisor system software tactical model Top-level manager

company‘s products or services Model that assists top-level managers in long-range planning, such as stating company objectives or planning plant locations Controls operational matters, monitors day-to-day events, and supervises workers Is essentially the operating system-programs designed to work behind the scenes to handle detailed operating procedures Helps middle-level managers control the work of the organization Person in an organization who is concerned with long range planning

transaction processing system Records day-to-day transactions (TPS) Someone who makes decisions; often a middle-level user manager A computer system that allows people located at various videoconferencing system geographic locations to communicate and have in-person meetings

1-203 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 10 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers C B D C A A B B D A

Matching Answers I D J F E H B G C A

Open Ended Questions: 29. Name and discuss the five common functions of most organizations.  Accounting - records all financial activity from billing customers to paying employees.  Marketing - plans, prices, promotes, sells, and distributes the organization‘s goods and services.  Human resources - focuses on people centered activities within the organization.  Production - creates finished goods and services using raw materials and personnel.  Research - identifies, investigates, and develops new products and services. 30. Discuss the roles of the three kinds of management in a corporation.  Supervisor - manage and monitor the employees or workers. These managers have responsibility relating to operational matters. They monitor day-to-day events and immediately take corrective action, if necessary..  Middle management - deal with control, planning, and decision making, and implement the long-term goals of the organization.  Top management - concerned with long range planning; plan the future growth and direction of the organization. 31. What are the four most common computer-based information systems?  Transaction processing system - records day-to-day transactions, such as customer orders, bills, inventory levels, and production output; acts as the foundation for the other information systems.  Management information system - summarizes the detailed data of the transaction processing system in standard reports for middle-level managers.

1-204 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Decision support system - helps middle-level managers and others in the organization analyze a wide range of problems, such as the effect of events and trends outside the organization. Executive support systems - easy-to-use systems that present information in a very highly summarized form, and helps top-level managers oversee the company‘s operations and develop strategic plans

32. Describe the different reports and their roles in managerial decision making.  Periodic reports - produced at regular intervals  Exception reports - produced in response to unusual events  Demand report - produced on request 33. What is the difference between an office automation system and a knowledge work system?  Office automation systems - designed primarily to support data workers; focus on managing documents, communicating, and scheduling  Knowledge work systems - specialized information systems to create information in their areas of expertise i. Expert systems are a widely used knowledge work system.

Chapter 11 Databases Lecture Guide 

Learning Objectives o Distinguish between the physical and logical views of data. o Describe how data is organized: characters, fields, records, tables, and databases. o Define key fields and how they are used to integrate data in a database. o Define and compare batch processing and real-time processing. o Describe databases, including the need for databases, and database management systems (DBMSs). o Describe the five common database models: hierarchical, network, relational, multidimensional, and object-oriented. o Distinguish among individual, company, distributed, and commercial databases. o Describe strategic database uses and security concerns.

Chapter Outline  

Information systems consist of people, procedures, software, hardware, data, and the Internet. This chapter focuses on: Data o Defined as facts or observations about people, places, things, and events. o Types of data:  Not long ago data was limited to numbers, letters, and symbols recorded by keyboards.  Now data is much richer and includes:  Audio captured, interpreted, and saved using microphones and voice recognition systems. 1-205

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Music downloaded from the Internet saved on cell phones, tablets, and other devices.  Photographs captured by digital cameras, and edited by imageediting software, and shared with others over the Internet.  Video captured by digital video cameras, TV tuner cards, and webcams. o Two ways or perspectives to view data:  Physical view focuses on the actual format and location of the data  Logical view focuses on the meaning, content, and context of the data.  End users and most computer professionals are concerned with this view as they use the data with application programs.  Data Organization- learning data organization is the first step in understanding databases which is organized into groups or categories and each group is more complex than the one before.  Character – the most basic logical data element; a single letter, number or special character, or a symbol.  Field – group of related characters; represents an attribute of some entity.  A data field represents an attribute (description or characteristic) of some entity (person, place or thing)  Record – a collection of related fields; represents a collection of attributes that describe an entity.  Table – a collection of related records.  Database - an integrated collection of logically related tables. o Key Field  Each record in a table has at least one distinctive field (the key field)  Also known as the primary key.  This field uniquely identifies the record.  Tables can be related or connected to other tables by common key fields o Data is processed in one of two ways, batch and real-time processing. o Batch vs. Real-time Processing  Batch – ―later‖ (See Figure 11-2.)  Data is collected over several hours, days, or even weeks, then processed all at once.  Real-time – ―now‖ (See Figure 11-3.)  Also known as online processing  Occurs when data is processed at the same time the transaction occurs Example: ATM withdrawal and immediate update of your balance.  Databases o Many organizations which have multiple files on the same subject or person is called data redundancy. o Data redundancy can lead to a lack of data integrity. o Data spread around in different files is not as useful. o Need for databases, there are many advantages to having databases.  Sharing – information from one department in an organization can be readily shared with other departments 1-206 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Security – users are given passwords or access only to the kind of information they need.  Less data redundancy – having access to one file, there are fewer files. Thus, storage is reduced.  Data integrity – when there are multiple sources of data, each source may have variations, with one source accuracy is improved. o Database Management  Allows users to create, modify, and gain access to a database, special software called database management system (DBMS) is required.  Some DBMSs, such as Microsoft Access are designed specifically for personal computers while others are designed for specialized database servers.  DBMS software is made up of five parts or subsystems:  The DBMS engine provides a bridge between the logical view of the data and the physical view of the data.  The data definition subsystem defines the logical structure of the database by using a data dictionary or schema.  The dictionary contains a description of the structure of data in the database  The data manipulation subsystem provides tools for maintaining and analyzing data.  Maintaining data is known as data maintenance.  Specific tools include query-by-example and specialized programming languages called structured query languages (SQL).  The application generation subsystem provides tools to create data entry forms and specialized programming languages that interface or work with common and widely used programming languages.  The data administration subsystem helps to manage the overall database, including maintaining security, providing disaster recovery support, and monitoring the overall performance of database operations.  Larger organizations typically employ highly trained computer specialists, called database administrators (DBAs), to interact with the data administration subsystem.  Additional duties of database administrators include determining processing rights or determining which people have access to what kinds of data in the database.  DBMS Structure o DBMS programs are designed to work with data that is logically structured or arranged in a particular way.  This arrangement is known as the database model.  Database models define rules and standards for all the data in a database. o There are five common database models that include: o Hierarchical database – (DBMS designed for mainframes)  Fields or records are structured in nodes.  Nodes are points connected like the branches of an upside-down tree. 1-207 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

Each entry has one parent node. A parent may have several child nodes - a one-to-many relationship. To find a particular field you have to start at the top with a parent and trace down the tree to a child.  Nodes farther down the system are subordinate to the ones above, like the hierarchy of managers in a corporation.  The downside to a hierarchical database is that if one parent node is deleted, so are all the subordinate child nodes.  A very significant limitation is the rigid structure. o Network database - (See Figure 11-7.)  Has a hierarchical arrangement of nodes however each child node may have more than one parent node described as a many-to-many relationship  Additional connections—called pointers—between parent nodes and child nodes  A node may be reached through more than one path. o Relational database – (See Figure 11-8)  Most common type of organization  There are no access paths through a hierarchy.  The data elements are stored in different tables, each of which consists of rows and columns.  A table and its data are called a relation.  Related tables must have a common data item, or shared key field, in both tables.  Information stored in one table can be linked with information stored on another.  Entries can be easily added, deleted, and modified. o Multidimensional database  A variation and an extension of the relational data model  Extend the two-dimensional data model to include additional or multiple dimensions; sometimes called a data cube  Data can be viewed as a cube having three or more side and consisting of cells.  Each side of the cube is considered a dimension of the data. Complex relationships between data can be represented and efficiently analyzed.  Two of the most significant advantages are:  Conceptualization – Multidimensional databases and data cubes provide users with an intuitive model in which complex data and relationships can be conceptualized analyzed without specialized database programming knowledge.  Processing speed – Analyzing and querying a large multidimensional database can be much faster. o Object-oriented database – (See Figure 11-10.)  More flexible; it stores data as well as instructions to manipulate the data  The structure is ideally designed to provide input for object-oriented software development. 1-208 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Object-oriented databases organize data using classes, objects, attributes, and methods.  Classes are general definitions.  Objects are specific instances of a class that contain data and instructions to manipulate the data.  Attributes are the data fields an object possesses.  Methods are instructions for retrieving or manipulating attribute values. o Although hierarchical and network databases are still widely used, relational and multidimensional databases are the most popular today. Object-oriented databases are becoming more widely used and are part of a new category of databases known as NoSQL. For a summary of DBMS organization. (See Figure 11-11.)  Types of Databases o Databases may be small or large, limited in accessibility or widely accessible o Databases may be classified into four types: o Individual – a collection of integrated files primarily used by one person. Also called a personal computer database that is under the direct control of the user o Company (shared) – may be stored on a central database server and managed by a database administrator.  Users throughout the company have access to the database through their personal computers linked to local or wide area networks. o Distributed – data stored not in just one location but in several locations.  Data is made accessible through a variety of communications networks.  Typically, database servers on a client/server network provide the link between the data. o Commercial – can also called information utilities or data banks  Generally, an enormous database that an organization develops for specific purposes  Offers access to this database to the public or selected outside individuals for a fee  Some widely used commercial databases:  ProQuest Dialog offers business information, as well as technical and scientific information.  Dow Jones provides world news and information on business, investments, and stocks.  LexisNexis offers news and information on legal, public records, and business issues.  Most commercial databases are designed for organizational as well as individual use.  Organizations typically pay a membership fee plus hourly use fees.  Often individuals can search the database to obtain a summary of available information without charge. Pay only for those items selected for further investigation.  Database Uses and Issues o Databases offer great opportunities for productivity. o Strategic uses 1-209 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Databases help users to keep up to date and plan for the future. o To support the needs of managers and other business professionals, many organizations collect data from a variety of internal and external databases.  This data is then stored in a special type of database called a data warehouse.  A technique called data mining is often used to search these databases to look for related information and patterns. o There are hundreds of databases available to help users with both general and specific business purposes, including:  Business directories –addresses, financial and marketing information, products, and trade and brand names  Demographic data – county and city statistics, current estimates of population and income, employment statistics, and census data  Business statistical information – financial information of publicly traded companies, market potential of selected retail stores, and other business data and information  Text databases –articles from business publications, press releases, reviews of companies and products  Web databases – cover a wide range of topics;  Web search sites like Yahoo! and Google maintain extensive databases of available Internet content. o Security  Personal and private information stored in databases may be used for the wrong purposes.  Unauthorized users gaining access to a database.  May require putting guards in company computer rooms and checking the identification of everyone admitted  Particularly important to organizations using WANs  Most corporations today use special hardware and software called firewalls to control access to their internal networks. Careers in IT o Database Administrators – use database management software to determine the most efficient ways to organize and access a company‘s data. o Responsible for maintaining database security and system backup o Normally requires a bachelor‘s degree in computer science and technical experience o Internships and prior experience with the latest technology are a considerable advantage for those seeking jobs in the industry. o One can transfer skills learned in one industry, such as finance, to a new career in database administration. o Annual salary of $47,000 to $111,000 o Opportunities for advancement include positions as a chief technology officer or other managerial opportunities. A Look to the Future The Future of Crime Databases o Potential criminals could be stopped before they commit a crime. o You need large and powerful databases, along with computer programs that can analyze data and make predictions. o Over the years, criminal databases have been expanding. 1-210

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o You will need a significant amount of personal information from everyone who lives in the country. o Currently, national crime databases in several countries, such as the U.S., focus on keeping data about individuals that have committed crimes. o These databases contain basic information such as name and date of birth, and also contain fingerprints, photos, and even DNA samples.

1-211 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

Data o Emphasize how databases have changed significantly in the last decade or so due to the types of captured data. o Have students research the changes in databases. o Types of data  Basic numbers, letters, characters, and symbols recorded by keyboards but what other types of data are now collected in databases?  All students use different types of databases in their personal lives. Ask the students to give examples of databases that they use that contain the following type of data:  Audio  Music  Photographs  Video  What type of data do students collect on cell phones? Data Organization o Emphasize the different database elements and why a common data field and primary keys are important aspects. o Use examples of your schools‘ registrar‘s database and how it is used to keep and maintain student records. o Have students review how data is captured and maintained for student records. They can each look at their own personal student record. Database o Emphasize the different needs for databases and the need for information by organizations. Give examples of each of the 4 needs for databases. o Need for databases  Sharing –information from one department can be readily shared with others.  Security –users are given passwords or access only to the kind of information they need.  Less data redundancy – having access to one file requires fewer files and thus reduced storage requirements.  Data integrity – a change made to a file by one department will be seen by other departments and accuracy is improved. o Database Management  Discuss and create a database using a desktop DBMS, Microsoft Access or use the sample databases provided to illustrate different concepts. DBMS Structure o Briefly discuss, hierarchical and network databases, since they are infrequently used today.  Use the Internet to find examples of these databases. o Emphasize relational database concepts and use Microsoft Access to help illustrate the concept by setting up a database with a few tables. o Emphasize the differences of multidimensional and object-oriented databases and where they can be used. Types of Databases 1-212

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o o o o

Individual Company Distributed Commercial  ProQuest Dialog  Dow Jones  LexisNexis  Have students form groups and look up the different users of the commercial database. Database Uses and Issues o Strategic uses  Discuss the strategic uses when discussing the types of databases.  Expand on the exercise to have students include different types of strategic uses for database types.  Ask students to use the Internet to find examples of each to the following databases:  Business directories  Demographic data  Business statistical information  Text databases  Web databases o Security  Get a copy of your college‘s computer use document. Review the policies that your institution has in place for computer security.  What penalties are in place for violations?  How does your institution handle excessive and/or illegal downloading of music and videos?

1-213 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term application generation subsystem attribute batch processing character child node class commercial database common data item company database data

data administration subsystem data bank data cube data definition subsystem data dictionary data integrity data maintenance data manipulation subsystem data mining data redundancy data warehouse database database administrator (DBA)

Definition Provides tools to create data entry forms and specialized programming languages that interface or work with common and widely used programming languages Are the data fields an object possesses Data is collected over time and then processed all at once as a ―batch‖ The most basic logical data element consisting of individual numbers, letters, and special characters A structured part of a hierarchical or network database that represents a field or record that will have a parent node Are general definitions in an object-oriented database An enormous database that an organization develops to cover particular subjects In a relational database related tables must have a common data item (key field) Stored on central server; accessed by multiple people Facts or observations about people, places, things, and events Helps users to manage the overall database, including maintaining security, providing disaster recovery support, and monitoring the overall performance of database operations A commercial database (see also information utility) Multidimensional databases extend two-dimensional relational tables to three or more dimensions Defines the logical structure of the database by using a data dictionary or schema Contains a description of the structure of data in the database Database characteristics relating to the consistency and accuracy of data Involves adding new data, deleting old data, and editing existing data Provides tools for maintaining and analyzing data A technique used to search databases to look for related information and patterns Records for the same data entity may appear in different files Data collected from a variety of internal and external databases and stored in a special type of database, a data warehouse An integrated collection of related tables A person who uses database management software to 1-214

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


database management system (DBMS) database model DBMS engine distributed database entity field firewall hierarchical database individual database information utility key field logical view many-to-many relationship method multidimensional database network database node NoSQL object object-oriented database

one-to-many relationship online processing parent node personal computer database physical view

determine the most efficient ways to organize and access a company‘s data Software for creating, modifying, and gaining access to the database Specific data structures that define rules and standards for all the data in a database Provides a bridge between logical and physical data views Spread out geographically; accessed by communications links A person, place, thing, or object A group of related characters Special hardware and software which controls access to internet networks Fields or records are structured in nodes in a one-tomany relationship A collection of integrated files primarily used by just one person (see also personal computer database) A commercial database (see also data bank) Field in a record that uniquely identifies each record Focuses on the meaning and content of the data The structure of a network database where the parent can have more than one child node and each child node may have more than one parent node Instructions for retrieving or manipulating attribute values Provides users with an intuitive model in which complex data and relationships can be conceptualized Is like hierarchical except a child node may have more than one parent in a many-to-many relationship A field or record in a hierarchical or network database A new category of databases that includes objectoriented databases Specific instances of a class that can contain both data and instructions to manipulate data A database that can store data as well as instructions to manipulate the data, and is able to handle unstructured data The structure of a hierarchical database where one parent node can have many child nodes, but a child node can have only one parent node Data is processed at the same time the transaction occurs (see also real-time processing) A field or record in a hierarchical or network database A collection of integrated files primarily used by just one person (see also individual database) A data perspective that focuses on the actual format and 1-215

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


pointers primary key processing rights query-by-example real-time processing record relation relational database schema structured query language (SQL) table

location of the data Connectors between parent and child nodes in a database structure A distinctive field that uniquely identifies the record (see also key field) Determining which people have access to what kinds of data in the database A database tool that supports viewing all or selected parts of the data Data is processed at the same time the transaction occurs (see also online processing) A collection of related fields A table and its data A database structure where data elements are stored in different tables, each of which consists of rows and columns A data dictionary that contains a description of the structure of data in the database A specialized database programming language A collection of related records

1-216 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 11 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers B D B B C A C D A C

Matching Answers D B F J C A G I H E

Open Ended Questions: 34. Describe the five logical data groups or categories.  Character – the most basic logical element; a single letter, number or special character, or a symbol  Field – a group of related characters; represents an attribute of some entity  Record – a collection of related fields; represents a collection of attributes that describe an entity  Table – a collection of related records  Database – an integrated collection of logically related records or objects  Each category is more complex than the previous one. 35. What is the difference between batch processing and real-time processing?  In batch processing, data is collected over several hours, days, or even weeks, then processed all at once.  In real-time processing, also known as online processing, the data is processed at the same time the transaction occurs. 36. Identify and define the five parts of DBMS programs.  DBMS programs allow users to create, modify, and gain access to a database, special software is required. o DBMS engine – provides a bridge between the logical view of the data and the physical view of the data. o Data definition subsystem - defines the logical structure of the database by using a data dictionary. o Data manipulation subsystem - provides tools for maintaining and analyzing data.

1-217 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Application generation subsystem – provides tools to create data entry forms and specialized programming languages that interface or work with common and widely used programming languages. o Data administration subsystem – helps to manage the overall database, including maintaining security, providing disaster recovery support, and monitoring the overall performance of database operations. 37. Describe each of the five common database models.  Hierarchical database – (once widely used by mainframes) o Fields or records are structured in nodes. o Nodes are points connected like the branches of an upside-down tree. o Each entry has one parent node. o A parent may have several child nodes - a one-to-many relationship. o To find a particular field you have to start at the top with a parent and trace down the tree to a child. o If one parent node is deleted, so are all the subordinate child nodes.  Network database o Each child node may have more than one parent node. o A many-to-many relationship o Additional connections—called pointers—between parent nodes and child nodes o A node may be reached through more than one path.  Relational database – more flexible; common for personal computer DBMS o There are no access paths through a hierarchy. o The data elements are stored in different tables, each of which consists of rows and columns. o A table and its data are called a relation. o Related tables must have a common data item (key field). o Information stored in one table can be linked with information stored on another. o Entries can be easily added, deleted, and modified.  Multidimensional database o A variation and an extension of the relational data model o Extend this two-dimensional data model to include additional or multiple dimensions; sometimes called a data cube. o Conceptualization – Multidimensional databases provide users with an intuitive model in which complex data and relationships can be conceptualized. o Processing speed – Analyzing and querying a large multidimensional database is much faster.  Object-oriented database o This is more flexible; it stores data and instructions to manipulate the data and is able to handle unstructured data such as photographs, audio, and video. o Object-oriented databases organize data using classes, objects, attributes, and methods.  Classes are general definitions. 1-218 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Objects are specific instances of a class that contain data and instructions to manipulate the data.  Attributes are the data fields an object possesses.  Methods are instructions for retrieving or manipulating attribute values. o Although hierarchical and network databases are still widely used, relational and multidimensional databases are the most popular today. Object-oriented databases are becoming more widely used and are part of a new category of databases known as NoSQL. 38. What are some of the benefits and limitations of databases? Why is security a concern?  Sharing – information from one department can be readily shared with others.  Security – users are given passwords or access only to the kind of information they need.  Less data redundancy – having access to one file, there are fewer files. Thus, storage is reduced.  Data integrity – a change made to a file by one department will be seen by other departments. Accuracy is improved. Security is an issue because personal and private information about people stored in databases may be used for the wrong purposes, and unauthorized users can gain access to a database.

Chapter 12 Systems Analysis and Design Lecture Guide 

Learning Objectives o Describe the six phases of the systems life cycle. o Identify information needs and formulate possible solutions. o Analyze existing information systems and evaluate the feasibility of alternative systems. o Identify, acquire, and test new system software and hardware. o Switch from an existing information system to a new one with minimal risk. o Explain system audits and periodic evaluations. o Describe prototyping and rapid applications development.

Chapter Outline o Most people in an organization are involved with an information system of some kind. o For an organization to create and effectively use a system requires considerable thought and effort o A system is a collection of activities and elements organized to accomplish a goal.  An information system is a collection of hardware, software, people, procedures, data, and the Internet. 1-219 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Provides information essential to running an organization o To avoid confusion, the flow of information must follow a route that is defined by a set of rules and procedures. o Systems analysis and design is a six-phase problem-solving procedure for examining and improving an information system. o Six phases make up the systems life cycle. (See Figure 12-1.)  Preliminary investigation: The organization‘s problems or needs are identified.  Systems analysis: The present system is studied in depth.  New requirements are specified and documented.  Systems design: A new or alternative information system is designed, and a design report is created.  Systems development: New hardware and software are acquired, developed, and tested.  Systems implementation: The new information system is installed, and people are trained to use it.  Systems maintenance: In this ongoing phase, the system is periodically evaluated and updated as needed. o This six-phase systems life cycle is used by computer professionals known as systems analysts.  They study an organization‘s systems to determine what actions to take and how to use computer technology to assist them.  Every career is affected by information systems, and understanding how they are created and used will allow you to work smarter and avoid common mistakes.  Those unfamiliar with the life cycle model are likely to consider the design, development, and implementation phases as the most important. However, many information systems fail because of a lack of investigation and analysis.  Many information systems go over budget or become obsolete too quickly because of a failure to recognize the importance of system maintenance.  Inexperienced developers, in an effort to save money, may look to reduce or underestimate maintenance expenses.  The long-term success of an information system is dependent on understanding the value and necessity of each of the phases.  Learning the six steps will raise computer efficiency and effectiveness. Phase 1: Preliminary Investigation o An investigation of a proposed project, usually requested by an end user or a manager, who wants something done that is not being done o In Phase 1, the systems analyst or the end user is concerned with three tasks:  Briefly defining the problem  Suggesting alternative solutions  Preparing a short report to help management decide whether to pursue the project further (See Figure 12-2.) o Defining the Problem  Examining the current information system in use  Determining what information is needed, by whom, when, and why 1-220 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Accomplished by interviewing, making observations, and/or by conducting a survey by the systems analyst, or by the end user o Suggesting Alternative Solutions  Suggest some possible plans as alternatives to the present system.  Modify the current system.  Purchase off-the-shelf package.  Design new system. o Prepare a Short Report  Systems analyst summarizes the results of the preliminary investigation and suggests alternative systems.  May include schedules for further development of the project  Summary is presented to higher management, along with a recommendation to continue or discontinue the project.  Management decides whether to finance the second phase, the systems analysis. Phase 2: Systems Analysis - Data is collected about the present system and the data is analyzed to determine new requirements (no new design at this point). (See Figure 12-4.) o Gathering Data  The end user doing system analysis expands and adds details about how the current system works.  Data is obtained from observation, interviews.  In addition, data also is obtained from questionnaires given to people using the system.  Data is also obtained from studying documents that describe the formal lines of authority and standard operating procedures.  One document is the organization chart, which shows levels of management as well as formal lines of authority. o Analyzing Data  Learn how information currently flows.  Pinpoint why it isn‘t flowing appropriately.  Apply logic to the existing arrangement and its workability.  Often the current system is operating incorrectly because prescribed procedures are not being followed.  A redesign might not be needed rather people may need to be shown how to follow the correct procedures.  Many different tools are available to assist systems analysts and end users in the analysis phase.  Top-down analysis method - used to identify the top-level components of a complex system, and then break it down into smaller and smaller components making each component easier to analyze and deal with.  Grid charts - shows the relationship between input and output documents. (See Figure 12-5.)  System flowcharts - show the flow of input data to processing and to output, or distribution of information. (See Figures 12-6 and 127.) 1-221 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Data flow diagrams - show the data or information flow within an information system. o The data is traced from its origin through input, processing, storage, and output. (See Figures 12-8 and 12-9.)  Automated design tools - software packages that evaluate hardware and software alternatives according to requirements given by the systems analyst. o Also called computer-aided software engineering (CASE) tools o CASE tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities. o Documenting System Analysis  Typically documented in a systems analysis report for higher management in larger organizations  Describes the current information system, the requirements for a new system, and a possible development schedule  Management studies the report and decides whether to continue with the project. Phase 3: System Design (See Figure 12-10.) o This phase consists of three tasks: o Designing Alternative Systems o Systems designers evaluate each alternative system for:  Economic feasibility: Will the costs of the new system be justified by the benefits it promises?  How long will it take for the new system to pay for itself?  Technical feasibility: Are reliable hardware, software, and training available to make the system work?  If not, can they be obtained?  Operational feasibility: Can the system actually be made to operate in the organization, or will people (employees, managers, and clients) resist it? o Selecting the Best System – must consider four questions  Will the system work with the organization‘s overall information system?  Will the system be flexible enough so it can be modified in the future?  Can it be made secure against unauthorized use?  Are the benefits worth the costs? o Writing the System Design Report  Prepared for higher management and describes the alternative designs  Presents the costs versus the benefits and outlines the effect of alternative designs within the organization  Usually concludes by recommending one of the alternatives Phase 4: System Development (See Figure 12-11.) o It has three steps: o Acquiring Software  Can be obtained in two ways  Purchased as off-the-shelf packaged software and possibly modified 1-222 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

 Can be custom designed o Acquiring Hardware  If new computer equipment is needed and the places where they are to be installed must be determined.  This is a critical area.  Switching or upgrading equipment can be an expensive proposition.  Are personal computers sufficient?  Are networks expandable?  Will people have to undergo costly training?  The systems analyst gives options of several different makes and models of computer equipment. o Testing the New System  Sample data is input to the system.  The processed information is then evaluated to see whether results are correct.  Testing may take several months if the new system is complex. Phase 5: System Implementation – Known as conversion - process of changing from the old system to the new one and training people to use the new system. There are four approaches to conversion. o Types of Conversion  Direct approach - the conversion is done simply by abandoning the old and starting up the new; not recommended because it is so risky.  Parallel approach - old and new systems are operated side by side until the new one proves to be reliable; low risk but can be expensive.  Pilot approach - the new system is tried out in only one part of the organization; less expensive than the parallel approach.  It also is somewhat riskier.  Difficulties will not affect the entire organization.  Phased approach - the new system is implemented gradually over a period of time; expensive but one of the least risky approaches.  The entire implementation process is broken down into parts of phases. o Training  Is important and is one of the most commonly overlooked activities  Some people may begin training early, even before the equipment is delivered.  Professional training may be brought in-house. Phase 6: System Maintenance o Very important ongoing activity o Most organizations spend more time and money on this phase than on any of the others. o Systems audit - The system‘s performance is compared to the original design specifications to determine whether the new procedures are actually furthering productivity. o All systems should be evaluated periodically to determine whether they are meeting the goals and providing the service they are supposed to. 1-223 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Figure 12-13 displays the summary of systems life cycle and associated activity. Prototyping and Rapid Applications Development o Two alternative approaches to the systems life cycle that require much less time: o Prototyping  Build a model or prototype that can be modified before the actual system is installed.  Users try it out and provide feedback to the systems analyst.  Systems analyst revises the prototype until users feel it is ready to be put into place.  Typically, the development time for prototyping is shorter, however, it is sometimes more difficult to manage the project and to control costs. o Rapid Applications Development (RAD)  Involves the use of powerful development software, small, specialized teams, and highly trained personnel.  Development time is often shorter, and the quality of the completed system can be better. Careers in IT o Systems analysts follow the steps described in the systems life cycle. o Analysts plan and design new systems or reorganize a company‘s computer resources to best utilize them. o Systems analyst positions normally require either an advanced associate‘s degree or a bachelor‘s degree in computer science or information systems and technical experience. o Systems analysts can expect to earn an annual salary of $48,000 to $95,000. o Opportunities for advancement include positions as a chief technology officer or other managerial opportunities. A Look to the Future-The Challenge of Keeping Pace o The pace of business is now faster than ever before. o The time to develop a product and bring it to market in many cases is now months rather than years. o Internet technologies have provided tools to support the rapid introduction of new products and services. o To stay competitive, corporations must integrate the new technologies into existing procedures. o Many organizations are responding by aggressively implementing prototyping and RAD. o Outside consulting groups that specialize in system development are often utilized. o In the future, many companies will no longer have larger servers and database systems under their own roof. o A monthly fee will be paid to a separate company that has large data centers that are accessible via the Internet. o The systems analyst of the future will not have to worry about the hardware requirement of a new piece of software or database management software. o The implementation of new systems will be much easier for businesses and customers. o The cloud is becoming an integral part of organizations. 1-224 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions 

 

Systems Analysis and Design o Explain that developing a good system needs to follow a set of procedures, so that it has the greatest chance of being successful. o The most common/traditional approach is the systems development life cycle.  Discuss the importance of every step. Those unfamiliar with the life cycle model are likely to consider the design, development, and implementation phases as the most important. However, many information systems fail because of a lack of investigation and analysis.  Many information systems go over budget or become obsolete too quickly because of a failure to recognize the importance of system maintenance.  Inexperienced developers may underestimate maintenance expenses.  The long-term success of an information system is dependent on understanding the value and necessity of each of the phases. o Emphasize that it is always an option to discontinue the project after any phase until implementation. o The text has an ongoing scenario that can be used as an illustration of the process throughout the chapter. o Rely on the Figures in this chapter as examples. o Another good example is to use one of the existing processes at your institution and ask students to improve it using the systems life cycle. For example, consider how you would implement a new registration system using the six phases of the cycle. Phase 1: Preliminary Investigation o The big issue is to identify the proper individuals to interview. These users should be the ones most closely associated with the project. o Set up student groups and have them role play. Some students can be users and other students can be analysts. Provide scenarios and have them develop questions and dialogue to illustrate the process. o Have students research different systems development life cycles and share what they see as benefits and deficits of different systems Phase 2: Systems Analysis o Expanding on the role play, have students develop more questions for this phase. This is a good way to illustrate the difference in the types of questions necessary for each phase. o Have students evaluate the different types of methods used to analyze a system and see which ones best fit with the project and why. o Have students develop a systems analysis report including specifics on the analysis of the scenario provided in Phase 1.  Each Phase will build on the previous one. Phase 3: System Design o Have students come up with feasibility requirements and see how they can affect the development process for each provided scenario. Phase 4: System Development o Have students research different applications currently available for the type of function in the role-playing exercise. 1-225 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

They can create a matrix based on the criteria setup in the design phase and evaluate the packages according to meeting the needs. o Have students research and determine the dollar amount of required investment for software, hardware, infrastructure, people, and training. Phase 5: System Implementation o Have the students research the different types of conversions and list the pros and cons of each and which one will work for their scenario. Phase 6: System Maintenance o Emphasize that most organizations spend more time and money on this phase than the others. o Help desks are an example of a maintenance function. Prototyping and Rapid Applications Development o Emphasize that these are alternative approaches that require much less time o Use the Internet to search for services that provide RAD for educational administrative systems. What are the advantages/disadvantages of using these services?

1-226 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term automated design tools

computer-aided software engineering (CASE) tools conversion data flow diagram direct approach economic feasibility grid chart operational feasibility organization chart parallel approach

phased approach

pilot approach

preliminary investigation prototyping rapid applications development (RAD) system system flowchart systems analysis systems analysis and design

Definition Software packages that evaluate hardware and software alternatives according to requirements given by the systems analyst (see also computer-aided software engineering) Software packages that evaluate hardware and software alternatives according to requirements given by the systems analyst (see also automated design tools) The process of changing/converting from the old system to the new one and training people to use the new system Shows the data or information flow within an information system The conversion is done simply by abandoning the old and starting up the new Cost versus benefits; time for the system to pay for itself Shows the relationship between input and output documents Answers the question, Can the system actually be made to operate in the organization or will people, managers, clients resist it? Shows company‘s functions and levels of management Running the old and new systems side by side until the new system proves its working; low risk but expensive Gradually implementing the new system to the entire organization; less risky but can be expensive and is recommended for situations with many people performing different operations Converting only one part of the organization to the new system until the new system proves that it is working; less expensive but riskier than parallel conversion The first phase of the systems life cycle which defines problem suggests alternatives, and a short report is prepared Building a model or prototype that can be modified before the actual system is installed Uses powerful development software, small specialized teams, and highly trained personnel A collection of activities and elements organized to accomplish a goal Shows the flow of input data to processing and finally to output, or distribution of information In phase 2 where data is gathered, analyzed, and documented A six-phase problem-solving procedure for examining and improving an information system (see also system 1-227

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


systems analysis report

systems analyst systems audit systems design systems design report systems development

systems implementation

systems life cycle

systems maintenance technical feasibility top-down analysis method

life cycle) A document that describes the current information system, the requirements for a new system, and a possible development schedule that is prepared for higher management Plans and designs new systems or reorganizes a company‘s computer resources to better utilize them A process where the system‘s performance is compared to the original design specifications The third phase of the system development life cycle which includes the activities of designing alternatives, selecting the best alternative, and writing a report A document prepared for higher management and describes the alternative designs The fourth phase of the system development life cycle where software is developed, hardware acquired, and the system is tested The fifth phase of the system development life cycle where the system is converted to the new system and people are trained A six-phase problem-solving procedure for examining and improving an information system (see also system analysis and design) Performing systems audit, and evaluating the system periodically is the sixth phase of the system development life cycle Making sure reliable hardware, software, and training are available to make the system work Used to identify the top-level components of a complex system

1-228 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 12 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers D A C A B A B B C B

Matching Answers C H E A J B F G I D

Open Ended Questions: 39. What is a system? What are the six phases of the systems life cycle? Why do corporations undergo this process? A system is a collection of activities and elements organized to accomplish a goal. An information system is a collection of hardware, software, people, procedures, and data. It provides information essential to running an organization. The phases are: o Preliminary investigation: The information problems or needs are identified. o Systems analysis: The present system is studied in depth. New requirements are specified. o Systems design: A new or alternative information system is designed. o Systems development: New hardware and software are acquired, developed, and tested. o Systems implementation: The new information system is installed and adapted to the new system, and people are trained to use it. o Systems maintenance: In this ongoing phase, the system is periodically evaluated and updated as needed. Systems analysis and design is a six-phase problem-solving procedure for examining and improving an information system. 40. What are the tools used in the analysis phase? What is top-down analysis? How is it used? Tools used in the analysis phase are:  Checklists – a list of questions that are helpful in guiding the systems analyst and end user through key issues for the present system  Top-down analysis method - used to identify the top-level components of a complex system, then broken down into smaller and smaller components  Grid charts - shows the relationship between input and output documents  Decision tables - shows the decision rules that apply when certain conditions occur 1-229 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


  

System flowcharts - show the flow of input data to processing and finally to output, or distribution of information Data flow diagrams - The data is traced from its origin through processing, storage, and output. Automated design tools - software packages that evaluate hardware and software alternatives according to requirements given by the systems analyst

41. Describe each type of system conversion. Which is the most commonly used?  Direct approach - the conversion is done simply by abandoning the old and starting up the new.  Parallel approach - old and new systems are operated side by side until the new one proves to be reliable.  Pilot approach - the new system is tried out in only one part of the organization.  Phased approach - the new system is implemented gradually over a period of time. The pilot and phased approaches are the most preferred and commonly used. 42. What is systems maintenance? When does it occur?  Most organizations spend more time and money on this phase than on any of the others. It consists of a systems audit followed by periodic evaluation.  Systems maintenance is the final phase of the systems development life cycle. 43. Explain prototyping and RAD. When might they be used by corporations? Both prototyping and RAD are alternative approaches to application development that require much less time than going through each phase of the systems development life cycle.  Prototyping o Means to build a model or prototype that can be modified before the actual system is installed. o Users would try it out and provide feedback to the systems analyst.  Rapid applications development (RAD) o Involves the use of powerful development software, small, specialized teams, and highly trained personnel. o The development time would be shorter, and the quality of the completed system could be better.

Chapter 13 Programming and Languages Lecture Guide 

Learning Objectives o Define programming and describe the six steps of programming. o Compare design tools including top-down design, pseudocode, flowcharts, and logic structures. o Describe program testing and the tools for finding and removing errors. 1-230 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Describe CASE tools and object-oriented software development. o Explain the five generations of programming languages.

Chapter Outline  

To efficiently and effectively use computers users need to understand the relationship between systems development and programming. Programs and Programming o A program is a list of instructions for the computer to follow to accomplish the task of processing data into information. o The instructions are made up of statements used in a programming language such as C++, Java, or Python. o These can be purchased and are referred to as prewritten or packaged programs or programs can be created or custom-made. o Programming, also known, as software development, typically follows a six-step procedure known as the software development life cycle (SDLC). o SDLC-The software development life cycle consists of six steps.  Program specification: The program‘s objectives, outputs, inputs, and processing requirements are determined.  Program design: A solution is created using programming techniques such as top-down program design, pseudocode, flowcharts, and logic structures.  Program code: The program is written or coded using a programming language.  Program test: The program is tested or debugged by looking for syntax and logic errors.  Program documentation: Documentation is an ongoing process throughout the programming process.  This phase focuses on formalizing the written description and processes used in the program.  Program maintenance: Completed programs are periodically reviewed to evaluate their accuracy, efficiency, standardization, and ease of use. o Computer professionals, known as software engineers or programmers, use the six-step procedure. Step 1: Program Specification (See Figure 13-2.) o Also called program definition or program analysis; it requires that the programmer (or end user) specify five items:  Program objectives - Make a clear statement of the problem that is trying to be solved.  Determine the objectives.  Desired Outputs - List what end users want to get out of the computer system.  Specify outputs before inputs.  Input data - Once it is known what output is desired, input data can be determined as well of the source of this data.  Processing Requirements - Define the processing tasks that must happen for input data to be processed into output.  Program Specification Document – Ongoing documentation is essential record program objectives, desired outputs, needed inputs, and required processing. 1-231 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Step 2: Program Design o Plan a solution preferably using structured programming techniques: o Top-down program design  Used to identify the program‘s processing steps knowns as program modules  Each module is made up of logically related program statements.  Each module should have a single function.  The program must pass in sequence from one module to the next until all modules are processed by the computer. o Pseudocode - an outline of the logic of the program to be written. (See Figure 137.) o Flowcharts - graphically present the detailed sequence of steps needed to solve a programming problem, known as program flowcharts. (See Figures 13-8 and 139.) o Logic structures; sequential, selection, and repetition  Sequential structure - One program statement follows another. (See Figure 13-10.)  Selection structure - occurs when a decision must be made.  The outcome of the decision determines which of two paths to follow. (IF-THEN-ELSE structure)  Repetition or loop structure - describes a process that may be repeated as long as a certain condition remains true.  The structure is called a ―loop‖ or ―iteration‖ because the program loops around or repeats again and again. o The last thing to do before leaving the program design step is to document the logic of the design.  This report typically includes pseudocode, flowcharts, and logic structures. Step 3: Program Code o Writing the program is called coding. o Use the logic developed in the program design step to actually write the program.  This is the ―program code‖ that instructs the computer what to do using the developed logic. o A Good Program  What are the qualities of a good program?  Should be reliable and work under most conditions  Should catch obvious and common input errors  Should be well documented and understandable by a programmer other than the person who wrote it  One of the best ways to code effective programs is to write structured programs using the logic structures. o Coding o After the program logic has been formulated, the next step is to code or write the program using the appropriate computer language.  A programming language uses a collection of symbols, words, and phrases that instruct a computer to perform specific operations. 1-232 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Programming languages process data and information for a wide variety of different types of applications. o Once the program has been coded, the next step is testing and debugging. Step 4: Program Test o Debugging refers to the process of testing and then eliminating errors. (See Figure 13-16.) o Programming errors are of two types: syntax errors and logic errors.  Syntax error  A violation of the rules of the programming language  Logic error  Occurs when the programmer uses an incorrect calculation or leaves out a programming procedure o Testing Process  Several methods have been devised for finding and removing both types of errors:  Desk checking (code review) - The programmer proofreads a printout of the program listing line by line checking for syntax and logic errors.  Manually testing with sample data – Checking for programming logic errors, the programmer compares the manually calculated values to those calculated by the program(s). o Programmer follows each program statement, performing calculations with sample data  Attempt at translation - The program is run through a computer, using a translator program. o The translator attempts to translate the written program from the programming language (such as C++) into the machine language.  Before the program will run, it must be free of syntax errors. (See Figure 13-17.)  Testing sample data on the computer – After syntax errors have been corrected the program is tested for logic errors using sample data. o Sample data is used to test the correct execution of each program statement.  Testing by a select group of potential users - called beta testing, potential users try out the program and provide feedback. o Usually the final step in testing a program Step 5: Program Documentation o Documentation consists of written descriptions and procedures about a program and how to use it. o Program documentation continues throughout all the programming steps. o All the prior documentation is reviewed, finalized, and distributed. o Documentation is important for people who may be involved with the program in the future:  Users - need to know how to use the software 1-233 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Operators – documentation must be provided for computer operators to be able to understand any possible error messages  Programmers – need to be able to update and modify programs  Should include text and program flowcharts, program listings, and sample output o It may also include system flowcharts to show how the particular program related to other programs within an information system. Step 6: Program Maintenance o As much as 75 percent of the total lifetime cost for an application program is for maintenance. (See Figure 13-20.)  This activity is so commonplace that a special job title, maintenance programmer, exists. o The purpose of program maintenance is to ensure that current programs are operating error free, efficiently, and effectively. o Activities in program maintenance are divided into two categories:  Operations - concerned with locating and correcting operational errors, making programs easier to use, and standardizing software using structured programming techniques.  Programming modifications or corrections are often referred to as patches.  For software that is acquired, it is common for the software manufacturer to periodically send patches or updates for their software.  If these patches are significant, they are known as software updates. o Changing needs - Programs need to be adjusted for a variety of reasons, including new tax laws, new information needs, and new company policies. o Some projects start before all requirements are known.  SDLC (Systems Design Life Cycle) – then becomes more cyclical  Agile development is a popular development methodology  Starts by getting core functionality  Expands on project until customer is satisfied with the results o Figure 13-21 summarizes the six steps of the programming process CASE and OOP o Efficiency and productivity are particularly important for software development. o Two resources:  CASE - Computer Aided Software Engineering tools provide some automation and assistance in program design, coding, and testing. (See Figure 13-22.)  Object - Oriented Programming (OOP) – focuses less on the procedures and more on defining the relationships between previously defined procedures or ―objects‖.  Process of organizing a program into objects.  Each object contains both the data and processing operations needed to perform a task.  Objects are reusable, self-contained components. 1-234 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Generations of Programming Languages o Levels or generations of programming languages, range from ―low‖ to ―high.‖ o Programming languages are called lower level when they are closer to the language the computer itself uses.  The computer understands the 0s and 1s that make up bits and bytes. o Programming languages are called higher level when they are closer to the language humans‘ use—that is, for English speakers, more like English. o There are five generations of programming languages: o First generation – Machine languages  A two-state system where data represented in 1‘s and 0‘s  Machine languages also vary according to make of computer o Second generation – Assembly languages  Use abbreviations or mnemonics such as ADD that are automatically converted to the appropriate sequence of 1‘s and 0‘s  Much easier for humans to understand and to use  Vary from computer to computer o Third Generation 3GLs – High-level procedural languages  They are more ―English-like‖ programming languages.  Still require training to use higher-level languages  Known as 3GLs  Designed to express the logic—the procedures—that can solve general problems  Most widely used languages to create software applications  C++ is a widely used procedural language.  Procedural languages must be translated into machine language by one of the following:  Compiler - converts a programmer‘s procedural language program, called the source code, into a machine language code, called the object code. o This object code can then be saved and run later.  Interpreter - converts the procedural language one statement at a time into machine code just before it is executed. o No object code is saved.  The difference between using a compiler and using an interpreter is that when a program is run, the complier requires two steps.  The first step is to convert the entire program‘s source code to object code.  The second step is to run the object code.  The Interpreter, in contrast, converts and runs the program at the same time.  The advantage of a compiler language is that once the object code has been obtained, the program executes faster.  The advantage of an interpreter language is that programs are easier to develop. o Fourth Generation – Task Oriented Languages  Require little special training on the part of the user  Known as 4GLs or very high-level languages 1-235 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


 

Designed to solve specific problems 4GLs are nonprocedural languages and focus on specifying what the program is to accomplish  4GLs are more English-like.  Query languages - enable nonprogrammers to use certain easily understood commands to search and generate reports from a database. o One of the most widely used query languages is SQL (structured query language).  Application generators – or a program coder, a program that provides modules of prewritten code, greatly reduces the time required to create an application. o Fifth generation – Problem and Constraint Languages  The next step in programming languages will be the fifth-generation language (5GL).  A computer language that incorporates the concepts of artificial intelligence to allow a person to provide a system with a problem and some constraints, and then request a solution.  Enables a computer to learn and to apply new information just as people do  Communicate more directly to a computer using natural languages  When will fifth-generation languages become a reality? That's difficult to say, however, researchers are actively working on the development of 5GL languages and have demonstrated some success. Careers in IT o Computer programmers create, test, and troubleshoot programs used by computers. o Programmers also may update and repair existing programs. o Need for programmers to work on the most basic computer functions has decreased.  Demand for computer programmers with specializations in advanced programs continues. o Jobs in programming typically require a bachelor‘s degree in Computer Science or information systems.  Some positions available with a two-year degree and employers are looking for programmers who have previous experience. o Salaries range from $ 65,760 to $112,120. A Look to the Future Your Own Programmable Robot o Would you like to have your own robot that could help you with your chores and understood your words? o It is just a matter of time before these robots can understand human instructions instead of complex programming languages. o One of earliest robots made available to consumers was the Roomba from iRobot, which is essentially an automated, intelligent vacuum cleaner. o A company named Aldebaran Robotics has taken a different approach, creating small, humanoid, or human-like, robots that the end-user can program. o In the future, it will not be necessary for someone to use software or know a programming language to communicate with a robot. 1-236 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o The hardware components needed to make robots are becoming cheaper. However, the software remains a challenge.  Human languages and conversations remain very difficult for a computer to fully understand.

1-237 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Teaching Tips/Suggestions  

 

 

Programs and Programming o A program is a list of instructions for the computer to follow to accomplish the task of processing data into information. Program Specification o Emphasize the five aspects, especially that outputs must be decided first. Sometimes students have a hard time understanding this. o Provide a scenario that requires students to identify the desired outputs; use a white board as a place for students to record outputs to be discussed Program Design o Illustrate the different steps by providing a visual aid that would walk through a flowchart with the various structures. o Have students create flowcharts examples using flowchart design; provide scenarios. Program Code o Use pseudo code to write simple programs; provide scenarios. o Use the different types of structures in the program description to help the students better understand the concepts. Program Test o Go through the different aspects that need to be tested. o Use the analogy that syntax is to programming as grammar is to English, and how it can affect the understanding of the code. o Discuss the consequences if a program is not tested thoroughly.  Desk checking - The programmer goes through the listing line by line looking for syntax and logic errors.  Manually testing with sample data - Looking for programming logic errors, the programmer compares the manually calculated values to those calculated by the programs.  Attempt at translation - The translator attempts to translate the written program from the programming language (such as C++) into the machine language. It will identify syntax errors.  Testing sample data on the computer - The program is tested for logic errors using sample data.  Testing by a select group of potential users - called beta testing, potential users try out the program and provide feedback. Program Documentation o Demonstrate internal documentation by having the students include remark statements within their lab programs. Program Maintenance o Emphasize this is the bulk of the lifetime cost of the application. o Discuss changing needs that can arise in an organization and relate it to Program Maintenance. CASE and OOP o Emphasize how each tool can aid in program development and save time and money in the process. Generations of Programming Languages 1-238 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


o Ask students to use the Internet to find the names of programming languages for each level of generation and what the languages are used to create. o Students can view YouTube videos on different programming languages and the evolution of the different generations of programming languages. o What distinguishes a lower level program from a higher-level program? Explain.

1-239 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Key Terms Key Term agile development application generator assembly language beta testing code code review coding compiler computer-aided software engineering (CASE) tools debugging desk checking documentation fifth-generation language (5GL) fourth-generation language (4GL) generation higher level IF-THEN-ELSE structure IFPS (interactive financial planning system) interpreter level logic error logic structure

Definition A popular development methodology that gets the core functionality of a program working then expands on it until the customer is satisfied with the results A program that provides modules of prewritten code (see also program coder) A second-generation programming language that uses abbreviations or mnemonics that are automatically converted to the appropriate sequence of 1s and 0s Potential users try out the program and provide feedback Writing a program using the appropriate programming language Proofreading a printout of a program for syntax and logic errors Writing a computer program Converts the programmer‘s procedural language program into a machine language code Provide some automation and assistance in program design, coding, and testing Running and testing a program on a computer and then fixing the parts that do not work A programmer going through the listing line by line looking for syntax and logic errors Written descriptions and procedures about a program and how to use it A computer language that incorporates the concepts of artificial intelligence to allow direct human communication Task-oriented languages designed to solve specific problems (see also very high-level languages) Programming languages have levels or generations ranging from low to high Programming languages that are closer to the language humans use Use selection logic structure when a decision must be made A fourth-generation programming language used to develop financial models Converts the procedural language one statement at a time into machine code just before it is to be executed Classifications of programming languages (see also generation) Is an incorrect calculation or procedure Programming techniques that take much of the guesswork out of programming 1-240

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


loop structure lower level machine language maintenance programmer module natural language object object code object-oriented programming (OOP) object-oriented software development objective operator patches portable language procedural language program

program analysis

program coder

program definition

program design program documentation

A process that may be repeated as long as a certain condition remains true Programming language closer to the language the computer understands; 0s and 1s First generation language where data is represented in 1s and 0s A person who ensures that current programs are operating error free, efficiently, and effectively, and fixes problems when it isn‘t A program‘s processing steps (see also programming module) Human languages such as English or Spanish Contains both the data and processing operations necessary to perform a task Machine language code A process by which a program is organized into objects, which contain both the data and processing operations necessary to perform a task Focuses less on procedures and more on defining relationships between previously defined procedures or object Problem to be solved People who need to know how to execute the program and how to recognize and correct errors Software updates Can be run on more than one kind of computer Programming language designed to express the logic that can solve general problems (see also third generation language) A list of instructions for the computer to follow to accomplish the task of processing data into information Requires that five items be specified for the program: the program‘s objectives, the desired output, the input data required, the processing requirements, and the documentation (see also program specification, program definition) A program that provides modules of prewritten code (see also application generator) Requires that five items be specified for the program: the program‘s objectives, the desired output, the input data required, the processing requirements, and the documentation (see also program specification, program analysis) Creating a solution using structured programming tools and techniques Documentation that is carried on throughout all the six programming steps 1-241

© McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


program flowchart program maintenance program module

program specification

programmer programming programming language pseudocode query language repetition structure selection structure

A graphical representation of the steps needed to solve a programming problem Designed to ensure that the program operates correctly, efficiently, and effectively A program‘s processing steps (see also module) Requires that five items be specified for the program: the program‘s objectives, the desired output, the input data required, the processing requirements, and the documentation (see also program definition, program analysis) A person who creates, tests, and troubleshoots programs used by computers along with providing documentation A six-step procedure for programs (see also software development) Uses a collection of symbols, words, and phrases that instruct a computer to perform specific operations Range for lower level to higher levels An outline of the logic of the program A fourth-generation language that uses certain easily understood commands to search and generate reports from a database A loop structure that describes a process that may be repeated as long as certain conditions remain true A logic structure that occurs when a decision must be made (see also IF-THEN-ELSE structure) One program statement follows another Programming is also known as software development

sequential structure software development software development life cycle A six-step process for creating new programs (SDLC) Also known as programmers; create software required for software engineer information systems software updates Significant patches to a program/software source code The programmer‘s procedural language program, Enables to code effective programs by using the logic structured program structures Technique that consist of top-down program design, structured programming technique pseudocode, flowcharts, and logic structures syntax error A violation of the rules of the programming language A programming language designed to solve specific task-oriented language problems; 4GL Programming languages designed to express the logic that third-generation language (3GL) can solve general problems (see also procedural language) Major processing steps called program modules are top-down program design identified A person who uses the software to provide the necessary user outputs very high-level language Designed to solve specific problems (see also problem1-242 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


oriented languages, fourth generation language)

1-243 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Answers to End-of-Chapter Materials Chapter 13 Num

1 2 3 4 5 6 7 8 9 10

Multiple Choice Answers C D C C A B A D C B

Matching Answers I D H F A C E B J G

Open Ended Questions: 44. Identify and discuss each of the six steps of programming.  Program specification: The program‘s objectives, outputs, inputs, and processing requirements are determined.  Program design: A solution is created using programming techniques such as top-down program design, pseudocode, flowcharts, and logic structures.  Program code: The program is written or coded using programming language.  Program test: The program is tested or debugged by looking for syntax and logic errors.  Program documentation: Documentation is an ongoing process throughout the programming process. This phase focuses on formalizing the written description and processes used in the program.  Program maintenance: Completed programs are periodically reviewed to evaluate their accuracy, efficiency, standardization, and ease of use. 45. Describe CASE tools and OOP. How does CASE assist programmers?  Computer-aided software engineering tools (CASE) - provide some automation and assistance in program design, coding, and testing. o CASE tools make programmer‘s work easier, faster, and more reliable.  Object-oriented programming (OOP) - is a process by which a program is organized into objects.  Each object contains both the data and processing operations necessary to perform a task. o Object-oriented software development focuses less on procedures and more on defining the relationships between previously defined procedures or ―objects‖. 1-244 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


46. What is meant by ―generation‖ in reference to programming languages? What is the difference between low-level and high-level languages? Computer professionals talk about levels or generations of programming languages, ranging from ―low‖ to ―high.‖  Programming languages are called lower level when they are closer to the language the computer itself uses. The computer understands the 0s and 1s that make up bits and bytes.  Programming languages are called higher level when they are closer to the language humans use—that is, for English speakers, more like English.  There are five generations of programming languages: (1) machine languages, (2) assembly languages, (3) procedural languages, (4) task-oriented languages, and (5) problem and constraint languages. 47. What is the difference between a compiler and an interpreter?  Compiler - converts the programmer‘s procedural language program, called the source code, into a machine language code, called the object code. The code is saved.  Interpreter - converts the procedural language one statement at a time into machine code just before it is to be executed. Nothing is saved. 48. What are logic structures? Describe the differences between the three types. Logic structures link the various parts of the flowchart. The best way is a combination of three logic structures:  Sequential structure - one program statement follows another.  Selection structure - occurs when a decision must be made. The outcome of the decision determines which of two paths to follow. (IF-THEN-ELSE structure)  Repetition or loop (iteration) structure - describes a process that may be repeated as long as a certain condition remains true.

1-245 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.