Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Technology in action : complete 16th

Edition Kendall E. Martin


Visit to download the full and correct content document:
https://ebookmeta.com/product/technology-in-action-complete-16th-edition-kendall-e-
martin/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Technology In Action Complete, Global Edition Alan


Evans

https://ebookmeta.com/product/technology-in-action-complete-
global-edition-alan-evans/

Technology In Action Complete 16 global Edition Mary


Anne Poatsy

https://ebookmeta.com/product/technology-in-action-
complete-16-global-edition-mary-anne-poatsy/

Quarkus in Action (MEAP V03) Martin Štefanko

https://ebookmeta.com/product/quarkus-in-action-meap-v03-martin-
stefanko/

Primary Mathematics 3A Hoerst

https://ebookmeta.com/product/primary-mathematics-3a-hoerst/
Systems Analysis and Design Global Ed 10th Edition
Kenneth E. Kendall

https://ebookmeta.com/product/systems-analysis-and-design-global-
ed-10th-edition-kenneth-e-kendall/

Istio in Action 1st Edition Christian E. Posta

https://ebookmeta.com/product/istio-in-action-1st-edition-
christian-e-posta/

Quarkus in Action MEAP V07 Martin Štefanko Jan Martiška

https://ebookmeta.com/product/quarkus-in-action-meap-v07-martin-
stefanko-jan-martiska/

Learning in Public 1st Edition Courtney E. Martin

https://ebookmeta.com/product/learning-in-public-1st-edition-
courtney-e-martin/

Business in Action, Tenth Global Edition Courtland L.


Bovée

https://ebookmeta.com/product/business-in-action-tenth-global-
edition-courtland-l-bovee/
TECHNOLOGY 16E
IN ACTION
ALAN EVANS
COMPLETE

KENDALL MARTIN
MARY ANNE POATSY
Don’t just read about technology, interact with it.
HELPDESKS SOUND BYTES IT SIMULATIONS
These highly-interactive, almost game- These multimedia lessons demystify IT Simulations are detailed, interactive
like simulations let you take the role of complex computer concepts with short scenarios covering the core chapter
a helpdesk staffer where you answer audio, animation, or video. The Sound topic. Students work through the
computer technology questions from Bytes now also include integrated simulations to apply what they have
customers. These simulations help learning objectives, a summary, learned and demonstrate understanding
reinforce the book content in a fun, and a quiz. in an active learning environment.
engaging way.

CHAPTER 1 CHAPTER 8 CHAPTER 1 CHAPTER 8 CHAPTER 1 CHAPTER 8


Technology Impacts Managing Digital Virtual Computer Enhancing Photos Technology and Digital Devices
The Impact of Artificial Media Tour with Image-Editing Ethics and Multimedia
Intelligence Understanding How to Debate Software
Intellectual Property Ethical Issues Plagiarism and CHAPTER 2 CHAPTER 9
CHAPTER 2 and Copyright Intellectual What Is Security and
Understanding Bits CHAPTER 2 Property a Computer? Privacy
and Bytes CHAPTER 9 Binary Numbers
Exploring Storage Threats to Your Interactive CHAPTER 9 CHAPTER 3 CHAPTER 10
Devices and Ports Digital Life Smartphone Are Protecting Your The Internet Program
Understanding Really Smart Computer Development
CHAPTER 3 Firewalls Managing Computer CHAPTER 4
Doing Business CHAPTER 3 Security with CHAPTER 11
Application Software
Online CHAPTER 10 Blogging Windows Tools
Databases
Evaluating Websites Understanding Finding Information CHAPTER 5
Software on the Web CHAPTER 10
System Software CHAPTER 12
CHAPTER 4 Programming Using the Arduino
Client/Server
Buying and Installing A Variety of CHAPTER 4 Microcontroller
Programming Programming with
CHAPTER 6 Networks
Software Where Does Binary
Languages the Processing Hardware
Choosing Software Show Up? CHAPTER 13
Programming for Language
CHAPTER 11 CHAPTER 7 Communicating,
CHAPTER 5 End Users
CHAPTER 11 Networks Sharing on
Starting the Using Databases
the Web
Computer: The How Businesses CHAPTER 5 Creating and
Boot Process Use Databases Using Windows Querying an
Organizing Your Task Manager to Access Database
Computer: CHAPTER 12 Evaluate System Analyzing Data with
File Management Using Servers Performance Microsoft Power
Transmission Media Hard Disk Anatomy BI Suite
CHAPTER 6 and Network
Adapters CHAPTER 6 CHAPTER 12
Evaluating Your CPU
and RAM Installing RAM Network Topology
Evaluating Computer CHAPTER 13 Installing an SSD and Navigation
System Understanding IP Drive Devices
Components Addresses, Domain A Day in the Life
Names, and CHAPTER 7 of a Network
CHAPTER 7 Protocols Technician
Installing a Home
Understanding Keeping E-Mail Computer
Secure CHAPTER 13
Networking Network
Managing and Securing Wireless Creating Web Pages
Securing Wireless Networks with Squarespace
Networks Client-Side
Web Page
Development

You will find the Helpdesks, Sound Bytes, and IT Simulations in MyLab IT.
16th Edition

Technology
in Action
Complete

Alan Evans • Kendall Martin • Mary Anne Poatsy

330 Hudson Street, NY NY 10013


Vice President, Career & IT Skills: Andrew Gilfillan Digital Content Producer: Tanika Henderson
Executive Portfolio Manager: Jenifer Niles Senior Art Director: Mary Siener
Managing Producer: Laura Burgess Cover Design: Pearson CSC
Development Editor: Shannon LeMay-Finn Cover Image Credits: keving3/Alamy Stock Photo
Director of Product Marketing: Brad Parkins Full-Service Project Management: Susan Hannahs
Director of Field Marketing: Jonathan Cottrell Composition: Pearson CSC
Field Marketing Manager: Bob Nisbet Printer/Binder: LSC Communications
Product Marketing Manager: Heather Taylor Cover Printer: Phoenix Color
Operations Specialist: Maura Garcia Text Font: 10/12 Helvetica Neue LT W1G Roman
Senior Product Model Manager: Eric Hakanson
Lead, Production and Digital Studio: Heather Darby
Course Producer: Amanda Losonsky
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the
appropriate page within text.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents
and related graphics published as part of the services for any purpose. All such documents and related graphics, are provided “as is”
without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this
information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular
purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or
consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract,
negligence or other tortious action, arising out of or in connection with the use or performance of information available from the
services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are
periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the
product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version
specified.
Microsoft©, Windows©, and Microsoft Office© are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries.

Copyright © 2020, 2019, 2018 by Pearson Education, Inc., All rights reserved. Manufactured in the United States of America. This
publication is protected by copyright and permission should be obtained from the publisher prior to any prohibited reproduction,
storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise.
For information regarding permissions, request forms and the appropriate contacts within the Pearson Education Global Rights &
Permissions department, please visit www.pearsoned.com/permissions/
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
Library of Congress Cataloging-in-Publication Data
Names: Evans, Alan (Alan D.), author. | Martin, Kendall (Kendall E.), author.
| Poatsy, Mary Anne, author.
Title: Technology in action. Complete / Alan Evans, Kendall Martin, Mary Anne
Poatsy.
Description: 16th edition. | NY, NY : Pearson, [2020] | Includes index.
Identifiers: LCCN 2018055748 | ISBN 9780135435199 | ISBN 0135435196
Subjects: LCSH: Microcomputers. | Computer science. | Computer networks. |
Information technology.
Classification: LCC QA76.5 .E9195 2020 | DDC 004—dc23
LC record available at https://lccn.loc.gov/2018055748

1 18

ISBN 10: 0-13-543519-6


ISBN 13: 978-0-13-543519-9
Contents at a Glance

Chapter 1
The Impact of Technology in a Changing World ......................................................................... 2

Chapter 2
Looking at Computers: Understanding the Parts ..................................................................... 36

Chapter 3
Using the Internet: Making the Most of the Web’s Resources .................................................. 80

Chapter 4
Application Software: Programs That Let You Work and Play ................................................. 120

Chapter 5
System Software: The Operating System, Utility Programs, and File Management ................. 158

Chapter 6
Understanding and Assessing Hardware: Evaluating Your System ......................................... 198

Chapter 7
Networking: Connecting Computing Devices ......................................................................... 240

Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics .......................................................... 272

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ........................................... 322

Chapter 10
Behind the Scenes: Software Programming ........................................................................... 368

Chapter 11
Behind the Scenes: Databases and Information Systems ...................................................... 412

Chapter 12
Behind the Scenes: Networking and Security in the Business World ...................................... 456

Chapter 13
Behind the Scenes: How the Internet Works .......................................................................... 498

Appendix A
The History of the Personal Computer ....................................................................................A-1

Appendix B
Careers in IT ...........................................................................................................................B-1

Glossary................................................................................................................................. G-1

Index........................................................................................................................................ I-1

iii
Contents

Chapter 1
The Impact of Technology in a Changing World ...................................................... 2
Part 1: Technology in Society ................................................................................................................................................ 4
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national
and global issues.
Technology in a Global Society ............................................................................................................................. 4
Impact of Tools of Modern Technology .................................................................................................................. 4
Objective 1.1 Describe various technological tools being used to impact national and global issues.
Global Issues ......................................................................................................................................................... 5
Objective 1.2 Describe various global social issues that are being affected by technology.
Technology Connects Us with Others .................................................................................................................. 6
Technology Impacts How and Why We Connect and Collaborate .......................................................................... 6
Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others.
Technology Impacts How We Consume ................................................................................................................ 7
Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services.
The Importance of Computer Literacy ................................................................................................................. 8
Computer Literacy ................................................................................................................................................. 8
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
HELPDESK: Technology Impacts ............................................................................................................................................. 8
SOUND BYTE: Virtual Computer Tour ...................................................................................................................................... 8
TRY THIS: What Does Facebook Know about You? ........................................................................................... 11
MAKE THIS: TOOL: IFTTT.com (If This Then That) .............................................................................................. 12
Part 2: Emerging Technologies and Ethical Computing .................................................................................................... 13
Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how
technology creates new ethical debates.
Artificial Intelligence ............................................................................................................................................. 13
Artificial Intelligence Basics .................................................................................................................................. 13
Objective 1.6 Describe artificial intelligence systems and explain their main goals.
HELPDESK: The Impact of Artificial Intelligence ...................................................................................................................... 13
ETHICS IN IT: Ethics in Computing .................................................................................................................... 16
Working with Artificial Intelligence and Other Information Technologies ....................................................... 17
Technology and Your Career ................................................................................................................................ 17
Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers.
BITS&BYTES: Is It AI or Human? Take a Turing Test! .......................................................................................... 19
DIG DEEPER: Augmented and Virtual Realities ................................................................................................... 21
Ethical Computing ................................................................................................................................................ 22
Defining Ethics ..................................................................................................................................................... 22
Objective 1.8 Define ethics and examine various ethical systems.
SOUND BYTE: How to Debate Ethical Issues ......................................................................................................................... 22
Personal Ethics .................................................................................................................................................... 23
Objective 1.9 Describe influences on the development of your personal ethics.
Ethics and Technology ......................................................................................................................................... 25
Objective 1.10 Present examples of how technology creates ethical challenges.
SOLVE THIS: How Technology Is Used on the World Stage and in Your Personal Life ......................................... 35

iv Contents
Chapter 2
Looking at Computers: Understanding the Parts ................................................... 36
Part 1: Understanding Digital Components ....................................................................................................................... 38
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer ........................................................................................................................... 38
Computers Are Data Processing Devices ............................................................................................................ 38
Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information.
Binary: The Language of Computers ................................................................................................................... 39
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
SOUND BYTE: Binary Numbers Interactive ............................................................................................................................ 39
Types of Computers ............................................................................................................................................ 41
Objective 2.3 List common types of computers, and discuss their main features.
ACTIVE HELPDESK: Understanding Bits and Bytes .............................................................................................................. 41
BITS&BYTES: Today’s Supercomputers: Faster Than Ever ................................................................................. 45
Input Devices ........................................................................................................................................................ 45
Physical Keyboards and Touch Screens .............................................................................................................. 45
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices ......................................................................................................................... 47
Objective 2.5 Describe the main types of mice and pointing devices.
DIG DEEPER: How Touch Screens Work ........................................................................................................... 48
BITS&BYTES: Distributed Computing: Putting Your Computer to Work While You Sleep .................................... 49
Image, Sound, and Sensor Input ......................................................................................................................... 49
Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
Output Devices ................................................................................................................................................. 51
Image and Audio Output ..................................................................................................................................... 51
Objective 2.7 Describe options for outputting images and audio from computing devices.
BITS&BYTES: Near Field Communication (NFC): Pay (or Get Paid) Anywhere with Your Phone .......................... 53
Printers ................................................................................................................................................................ 53
Objective 2.8 Describe various types of printers, and explain when you would use them.
BITS&BYTES: Medical Devices and 3D Printing ................................................................................................. 56
TRY THIS: What’s Inside My Computer? ............................................................................................................ 58
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................... 59
Part 2: Processing, Storage, and Connectivity ................................................................................................................... 60
Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices
connect to a computer system.
Processing and Memory on the Motherboard ................................................................................................... 60
The Motherboard and Memory ............................................................................................................................ 60
Objective 2.9 Describe the functions of the motherboard and RAM.
SOUND BYTE: Smartphones Are Really Smart ...................................................................................................................... 61
Processing .......................................................................................................................................................... 61
Objective 2.10 Explain the main functions of the CPU.
Storing Data and Information .......................................................................................................................... 62
Storage Options on Computing Devices .............................................................................................................. 62
Objective 2.11 Describe the various means of storing data and information with computing devices.
ETHICS IN IT: What Is Ethical Computing? ......................................................................................................... 64
TRENDS IN IT: Green Computing (Green IT) ...................................................................................................... 65
Connecting Peripherals to the Computer .......................................................................................................... 66
Computer Ports ................................................................................................................................................... 66
Objective 2.12 Describe common types of ports used today.
HELPDESK: Exploring Storage Devices and Ports .................................................................................................................. 66

Contents v
Power Management and Ergonomics ................................................................................................................ 67
Power Controls and Power Management ............................................................................................................. 67
Objective 2.13 Describe how to manage power consumption on computing devices.
Setting It All Up: Ergonomics ............................................................................................................................... 69
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
BITS&BYTES: Sleep Better and Avoid Eyestrain: Use Less Blue Light ................................................................ 69
SOLVE THIS: Technology Wish List .................................................................................................................... 79

Chapter 3
Using the Internet: Making the Most of the Web’s Resources ............................... 80
Part 1: Collaborating and Working on the Web ................................................................................................................. 82
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for c ­ ollaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works ........................................................................................................................... 82
The Origin of the Internet ..................................................................................................................................... 82
Objective 3.1 Describe how the Internet got its start.
How the Internet Works ....................................................................................................................................... 84
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web ................................................................................................. 85
Collaborating with Web Technologies .................................................................................................................. 85
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps .............................................................................................................. 87
SOUND BYTE: Blogging ........................................................................................................................................................ 87
Communicating over the Web ............................................................................................................................. 89
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web ....................................................................................................................... 92
Conducting Business Online ................................................................................................................................ 92
Objective 3.5 Describe how business is conducted using the Internet.
E-Commerce Safeguards .................................................................................................................................... 92
Objective 3.6 Summarize precautions you should take when doing business online.
DIG DEEPER: How Cloud Computing Works ..................................................................................................... 93
BITS&BYTES: Looking for Extra Money? Try a Side Hustle ................................................................................. 94
HELPDESK: Doing Business Online ....................................................................................................................................... 95
BITS&BYTES: Bitcoin: A Form of Virtual Currency .............................................................................................. 95
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud .................................................................. 97
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................... 98
Part 2: Using the Web Effectively ........................................................................................................................................ 99
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web ............................................................................................................ 99
Web Browsers ..................................................................................................................................................... 99
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names ............................................................................................................... 101
Objective 3.8 Explain what a URL is and discuss its main parts.
Navigating the Web ........................................................................................................................................... 102
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web ......................................................................... 103
Searching the Web Effectively ........................................................................................................................... 104
Using Search Engines ....................................................................................................................................... 104
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.

vi Contents
BITS&BYTES: Digital Assistants and Predictive Search ..................................................................................... 105
SOUND BYTE: Finding Information on the Web .................................................................................................................... 107
Evaluating Websites .......................................................................................................................................... 107
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
HELPDESK: Evaluating Websites ......................................................................................................................................... 107
TRENDS IN IT: Linked Data and the Semantic Web ......................................................................................... 108
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper? ....................................... 109
Using the Web Ethically ..................................................................................................................................... 109
Digital Activism .................................................................................................................................................. 109
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation ....................................................................................................................................................... 110
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare? ............................................. 111
ETHICS IN IT: Cyber Harassment ..................................................................................................................... 112
SOLVE THIS: Create a Report: Conducting Research on the Web .................................................................... 119

Chapter 4
Application Software: Programs That Let You Work and Play ............................. 120
Part 1: Accessing, Using, and Managing Software .......................................................................................................... 122
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best
manage your software.
Software Basics .................................................................................................................................................. 122
Application vs. System Software ........................................................................................................................ 122
Objective 4.1 Compare application software and system software.
Distributing Software ......................................................................................................................................... 122
Objective 4.2 Explain the differences between commercial software and open source software and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software ....................................................................................................... 123
Managing Your Software ................................................................................................................................... 123
Purchasing Software ......................................................................................................................................... 123
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce ................................................................. 124
HELPDESK: Buying and Installing Software .......................................................................................................................... 125
Installing and Uninstalling Software .................................................................................................................... 125
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of “Bloat” .............................................................................................. 125
Upgrading Software .......................................................................................................................................... 126
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work ...................................................................................................... 126
Software Licenses ............................................................................................................................................. 127
Objective 4.6 Explain how software licenses function.
SOUND BYTE: Where Does Binary Show Up? ..................................................................................................................... 127
ETHICS IN IT: Can I Borrow Software That I Don’t Own? ................................................................................. 129
TRY THIS: Citing Website Sources ................................................................................................................... 131
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 132
Part 2: Application Software ............................................................................................................................................. 133
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software ................................................................................................................. 133
Productivity Software ......................................................................................................................................... 133
Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses and features.

Contents vii
BITS&BYTES: Productivity Software Tips and Tricks ......................................................................................... 133
BITS&BYTES: How to Open Unknown File Types ............................................................................................. 134
BITS&BYTES: Going Beyond PowerPoint ......................................................................................................... 138
SOUND BYTE: Programming for End Users.......................................................................................................................... 140
Business Software ............................................................................................................................................. 142
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools ........................................................... 144
Multimedia and Educational Software .............................................................................................................. 144
Digital Multimedia Software ............................................................................................................................... 144
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software ....................................................................................................................................... 146
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software ........................................................................................................................................... 147
App Creation Software ...................................................................................................................................... 147
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror . . . ........................................................................................................................ 149
Educational and Reference Software ................................................................................................................. 149
Objective 4.12 Categorize educational and reference software and explain their features.
SOLVE THIS: Analyzing Benchmark Data ......................................................................................................... 157

Chapter 5
System Software: The Operating System, Utility Programs,
and File Management ............................................................................................ 158
Part 1: Understanding System Software .......................................................................................................................... 160
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals ...................................................................................................................... 160
Operating System Basics .................................................................................................................................. 160
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use ................................................................................................................. 160
Objective 5.2 Explain the most popular operating systems for personal use.
BITS&BYTES: Open Source Operating Systems ............................................................................................... 162
BITS&BYTES: Operating Systems for the Smart Home .................................................................................... 162
Operating Systems for Machinery, Networks, and Business .............................................................................. 163
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows? .................................................................. 164
What the Operating System Does ..................................................................................................................... 165
The User Interface ............................................................................................................................................. 166
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination ..................................................................................................................................... 166
Objective 5.5 Explain how the operating system helps manage hardware such as the ­processor, memory, storage, and
peripheral devices.
SOUND BYTE: Using Windows Task ­Manager to Evaluate System Performance .................................................................. 166
Software Application Coordination ..................................................................................................................... 168
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human? .................................................................. 169
Starting Your Computer ..................................................................................................................................... 170
The Boot Process .............................................................................................................................................. 170
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.

viii Contents
HELPDESK: Starting the Computer: The Boot Process ........................................................................................................ 172
TRY THIS: Using Virtual Desktops in Windows 10 ............................................................................................ 174
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 175
Part 2: Using System Software ......................................................................................................................................... 176
Learning Outcome 5.2 You will be able to describe how to use system software, including the user i­nterface, file
management capabilities, and utility programs.
The Windows Interface ...................................................................................................................................... 176
Using Windows 10............................................................................................................................................. 176
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: The Snipping Tool ...................................................................................................................... 177
File Management ................................................................................................................................................ 179
Organizing Your Files ......................................................................................................................................... 179
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud .............................................................................................................. 181
BITS&BYTES: Tips for Organizing Your Files ..................................................................................................... 182
HELPDESK: Organizing Your Computer: File Management ................................................................................................... 183
Utility Programs .................................................................................................................................................. 185
Windows Administrative Utilities ......................................................................................................................... 186
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work ...................................................................................... 188
SOUND BYTE: Hard Disk Anatomy ...................................................................................................................................... 188
SOLVE THIS: Operating Systems: Analyzing Market Share ............................................................................... 197

Chapter 6
Understanding and Assessing Hardware: Evaluating Your System .................... 198
Part 1: Evaluating Key Subsystems .................................................................................................................................. 200
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the CPU and
memory subsystems.
Your Ideal Computing Device ............................................................................................................................ 200
Moore’s Law ..................................................................................................................................................... 200
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device ........................................................................................................................... 201
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem ......................................................................................................................... 203
How the CPU Works ......................................................................................................................................... 203
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling ........................................................................................................................... 207
Measuring CPU Performance ............................................................................................................................ 207
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle .................................................................................................................... 209
Evaluating the Memory Subsystem .................................................................................................................. 210
Random Access Memory .................................................................................................................................. 210
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM ...................................................................................................................................................... 212
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM ......................................................................................................................... 212
SOUND BYTE: Installing RAM............................................................................................................................................... 213
TRY THIS: Measure Your System Performance ................................................................................................. 215
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 216

Contents ix
Part 2: Evaluating Other Subsystems and Making a Decision ....................................................................................... 217
Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem ................................................................................................................... 217
Types of Storage Drives ..................................................................................................................................... 217
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 218
DIG DEEPER: How Storage Devices Work ....................................................................................................... 219
Storage Needs .................................................................................................................................................. 220
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Much Storage to Buy? ....................................................................................................... 222
Evaluating the Media Subsystems .................................................................................................................... 223
Video Cards ...................................................................................................................................................... 223
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Graphics Cards with SSD on Board ........................................................................................... 225
TRENDS IN IT: USB 3.1 and USB-C ................................................................................................................ 226
Sound Cards ..................................................................................................................................................... 227
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components ...................................................................................................... 227
Evaluating System Reliability and Moving On ................................................................................................. 229
Maintaining System Reliability ............................................................................................................................ 229
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer ..................................................................................................................... 231
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All ................................................................................................................. 232
SOLVE THIS: Laptop Alternatives ..................................................................................................................... 239

Chapter 7
Networking: Connecting Computing Devices ....................................................... 240
Part 1: How Networks Function ........................................................................................................................................ 242
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals ................................................................................................................................. 242
Understanding Networks ................................................................................................................................... 242
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking ............................................................................................................................... 243
Network Architectures ....................................................................................................................................... 244
Network Designs ............................................................................................................................................... 244
Objective 7.2 Explain the different ways networks are defined.
DIG DEEPER: P2P File Sharing ........................................................................................................................ 246
Network Components ........................................................................................................................................ 247
Transmission Media ........................................................................................................................................... 247
Objective 7.3 Describe the types of transmission media used in networks.
SOUND BYTE: Installing a Home Computer Network ........................................................................................................... 247
Basic Network Hardware ................................................................................................................................... 249
Objective 7.4 Describe the basic hardware devices necessary for networks.
Network Software .............................................................................................................................................. 250
Objective 7.5 Describe the type of software necessary for networks.
TRENDS IN IT: How Smart Is Your Home? ....................................................................................................... 251

x Contents
Connecting to the Internet ................................................................................................................................. 251
Broadband Internet Connections ....................................................................................................................... 251
Objective 7.6 Summarize the broadband options available to access the Internet.
BITS&BYTES: Net Neutrality ............................................................................................................................. 252
BITS&BYTES: Who’s Not on Broadband? ........................................................................................................ 253
Wireless Internet Access ................................................................................................................................... 253
Objective 7.7 Summarize how to access the Internet wirelessly.
TRY THIS: Testing Your Internet Connection Speed .......................................................................................... 255
MAKE THIS: TOOL: Ping and Telnet ................................................................................................................. 256
Part 2: Your Home Network ............................................................................................................................................... 257
Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home n ­ etwork and
how to manage and secure a wireless network.
Installing and Configuring Home Networks ..................................................................................................... 257
Planning Your Home Network ............................................................................................................................ 257
Objective 7.8 Explain what should be considered before creating a home network.
BITS&BYTES: Power Your Devices—Wirelessly ................................................................................................ 258
Connecting Devices to a Network ..................................................................................................................... 258
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative .................................................................................. 260
BITS&BYTES: Analyzing Network Problems ..................................................................................................... 262
Managing and Securing Wireless Networks .................................................................................................... 262
Troubleshooting Wireless Network Problems ..................................................................................................... 262
Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them.
Securing Wireless Networks .............................................................................................................................. 262
Objective 7.11 Describe how to secure wireless home networks.
SOUND BYTE: Securing Wireless Networks ......................................................................................................................... 264
HELPDESK: Managing and Securing Your Wireless Network ............................................................................................... 264
SOLVE THIS: Home Networking Guide ............................................................................................................. 271

Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics ...................................... 272
Part 1: The Impact of Digital Information ........................................................................................................................ 274
Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technology is used to
produce and distribute digital texts, music, and video; and the challenges in managing a digital lifestyle.
Digital Basics ...................................................................................................................................................... 274
Digital Convergence and the Internet of Things .................................................................................................. 274
Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
Digital versus Analog ......................................................................................................................................... 276
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing ................................................................................................................................................ 278
e-Readers ......................................................................................................................................................... 278
Objective 8.3 Describe the different types of e-readers.
Using e-Texts ..................................................................................................................................................... 279
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media .................................................................................................................................... 279
Digital Music ....................................................................................................................................................... 280
Creating and Storing Digital Music ..................................................................................................................... 280
Objective 8.5 Describe how digital music is created and stored.
Distributing Digital Music ................................................................................................................................... 282
Objective 8.6 Summarize how to listen to and publish digital music.

Contents xi
Digital Media ....................................................................................................................................................... 283
Digital Photography ........................................................................................................................................... 283
Objective 8.7 Explain how best to create, print, and share digital photos.
SOUND BYTE: Enhancing Photos with Image-Editing Software ........................................................................................... 284
Digital Video ...................................................................................................................................................... 285
Objective 8.8 Describe how to create, edit, and distribute digital video.
TRENDS IN IT: Digital Asset Managers Needed! .............................................................................................. 288
Managing Your Digital Lifestyle ......................................................................................................................... 288
Digital Challenges and Dilemmas ....................................................................................................................... 289
Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
DIG DEEPER: Deep Web versus Dark Web: Are There Places You Shouldn’t Go? ........................................... 290
BITS&BYTES: The Rise of Wearable Technology .............................................................................................. 291
TRY THIS: Creating and Publishing a Movie ...................................................................................................... 295
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 296
Part 2: Ethical Issues of Living in the Digital Age ........................................................................................................... 297
Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain
your digital reputation.
Protection of Digital Property ............................................................................................................................ 297
Intellectual Property ........................................................................................................................................... 297
Objective 8.10 Describe the various types of intellectual property.
Copyright Basics ............................................................................................................................................... 298
Objective 8.11 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright ........................................................................................... 300
Copyright Infringement ...................................................................................................................................... 301
Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which
you can legally use copyrighted material.
BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying ................................................ 303
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission! .......................................................... 305
Living Ethically in the Digital Era ....................................................................................................................... 306
Plagiarism ......................................................................................................................................................... 306
Objective 8.13 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation ........................................................................................................................ 308
Objective 8.14 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property .............................................................................................................. 308
Protecting Your Online Reputation ..................................................................................................................... 311
Objective 8.15 Describe what comprises your online reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights .................................................................................................... 313
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do ............................................................... 314
SOLVE THIS: Intellectual Property and Copyright Basics .................................................................................. 321

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ....................... 322
Part 1: Threats to Your Digital Assets ............................................................................................................................... 324
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers ................................................................................................................................ 324
Identity Theft ..................................................................................................................................................... 325
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.

xii Contents
Hacking ............................................................................................................................................................. 325
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Hackers Wanted ........................................................................................................................ 326
Computer Viruses ............................................................................................................................................... 329
Virus Basics ....................................................................................................................................................... 329
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches
a virus, and the symptoms it may display.
SOUND BYTE: Protecting Your Computer ............................................................................................................................ 330
Types of Viruses ................................................................................................................................................ 331
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering .................................................................................................... 332
Online Annoyances ............................................................................................................................................ 333
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering ............................................................................................................................................. 335
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter . . . Now What? ....................................................................... 336
ETHICS IN IT: You’re Being Watched . . . But Are You Aware You’re Being Watched? ...................................... 338
HELPDESK: Threats to Your Digital Life ................................................................................................................................ 338
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches ............................................................................ 339
TRY THIS: Testing Your Network Security ......................................................................................................... 341
MAKE THIS: App Inventor 2 or Thunkable ........................................................................................................ 342
Part 2: Protecting Your Digital Property ............................................................................................................................ 343
Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Access to Your Digital Assets ........................................................................................................ 343
Firewalls ............................................................................................................................................................ 343
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
Preventing Virus Infections ................................................................................................................................. 345
Objective 9.8 Explain how to protect your computer from virus infection.
HELPDESK: Understanding Firewalls ................................................................................................................................... 345
Authentication: Passwords and Biometrics ........................................................................................................ 348
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots ........................................................................... 348
Anonymous Web Surfing: Hiding from Prying Eyes ............................................................................................ 350
Objective 9.10 Describe ways to surf the Web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords! .................................................... 352
Keeping Your Data Safe ..................................................................................................................................... 352
Protecting Your Personal Information ................................................................................................................. 352
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools ....................................................................................... 352
Backing Up Your Data ....................................................................................................................................... 353
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain
the various places you can store backup files.
Protecting Your Physical Computing Assets ................................................................................................... 357
Environmental Factors and Power Surges .......................................................................................................... 357
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft ........................................................................................................................... 357
Objective 9.14 Describe the major concerns when a device is stolen and strategies for ­solving the problems.
DIG DEEPER: Computer Forensics: How It Works ........................................................................................... 359
SOLVE THIS: Computer Security ...................................................................................................................... 367

Contents xiii
Chapter 10
Behind the Scenes: Software Programming ......................................................... 368
Part 1: Understanding Programming ............................................................................................................................... 370
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System ................................................................................................................. 370
The Importance of Programming ....................................................................................................................... 370
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle ........................................................................................................................ 370
Objective 10.2 Summarize the stages of the system development life cycle.
BITS&BYTES: Let Them See Your Work ........................................................................................................... 372
Life Cycle of a Program ...................................................................................................................................... 372
The Program Development Life Cycle ................................................................................................................ 372
Objective 10.3 Define programming and list the steps in the program development life cycle.
The Problem Statement ..................................................................................................................................... 373
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 373
HELPDESK: Understanding Software Programming.............................................................................................................. 374
Algorithm Development ..................................................................................................................................... 375
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Hackathons ............................................................................................................................... 378
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords,
Data Types, and Operators ........................................................................................................................... 380
Coding .............................................................................................................................................................. 381
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment in coding.
Debugging ........................................................................................................................................................ 387
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display ...................................................................................................... 388
Testing and Documentation ............................................................................................................................... 388
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona ............................................................................................................... 390
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 391
Part 2: Programming Languages ...................................................................................................................................... 392
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an a ­ ppropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages ........................................................................................................................ 392
Need for Diverse Languages ............................................................................................................................. 392
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language................................................................................................. 392
Selecting the Right Language ............................................................................................................................ 393
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Coding for Zombies ................................................................................................................... 393
ETHICS IN IT: When Software Runs Awry ........................................................................................................ 394
Exploring Programming Languages ................................................................................................................. 395
Tour of Modern Languages ................................................................................................................................ 395
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Your Software Portfolio .............................................................................................................. 399
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools ............................................. 403

xiv Contents
Future of Programming Languages .................................................................................................................... 403
Objective 10.12 State key principles in the development of future programming languages.
HELPDESK: A Variety of Programming Languages................................................................................................................ 404
SOLVE THIS: Time Sheets ................................................................................................................................ 411

Chapter 11
Behind the Scenes: Databases and Information Systems ................................... 412
Part 1: Database Fundamentals ........................................................................................................................................ 414
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
The Need for Databases .................................................................................................................................... 414
Database Basics ............................................................................................................................................... 414
Objective 11.1 Explain what a database is and why databases are useful.
Database Types .................................................................................................................................................. 416
Flat Databases .................................................................................................................................................. 416
Objective 11.2 Describe features of flat databases.
Relational Databases ......................................................................................................................................... 418
Objective 11.3 Describe features of relational databases.
Object-Oriented Databases ............................................................................................................................... 419
Objective 11.4 Describe features of object-oriented databases.
BITS&BYTES: Normal Forms ............................................................................................................................ 419
Multidimensional Databases .............................................................................................................................. 419
Objective 11.5 Describe features of multidimensional databases.
HELPDESK: Using Databases............................................................................................................................................... 419
NoSQL Databases ............................................................................................................................................ 420
Objective 11.6 Describe how Web 2.0 data is managed in a database.
Using Databases ................................................................................................................................................. 421
Relational Database Components and Functions ............................................................................................... 421
Objective 11.7 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................................. 424
BITS&BYTES: Music Streaming Services Use Databases ................................................................................. 425
Inputting and Managing Data ............................................................................................................................. 425
Objective 11.8 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL) ............................................................................................. 430
BITS&BYTES: Data Dashboards: Useful Visualization Tools .............................................................................. 432
TRY THIS: Using Excel’s Database Functions ................................................................................................... 434
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 435
Part 2: How Businesses Use Databases ........................................................................................................................... 436
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to
manage data and how business information systems and business intelligence are used to make business decisions.
Data Warehousing and Storage ........................................................................................................................ 436
Data Warehouses and Data Marts ..................................................................................................................... 436
Objective 11.9 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases....................................................................................................................... 436
BITS&BYTES: Data Warehouses Are Going to the Cloud ................................................................................. 437
Data Mining ....................................................................................................................................................... 438
Objective 11.10 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed ................................................................................ 439
ETHICS IN IT: Data, Data Everywhere—But Is It Protected? ............................................................................. 441

Contents xv
Using Databases to Make Business Decisions ............................................................................................... 441
Business Information Systems ........................................................................................................................... 441
Objective 11.11 Describe the main types of business information systems and how they are used by business managers.
SOUND BYTE: Analyzing Data with Microsoft Power BI Suite.............................................................................. 446
BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web ...................................................... 446
TRENDS IN IT: Mobile Business Intelligence ..................................................................................................... 447
SOLVE THIS: College Database ........................................................................................................................ 455

Chapter 12
Behind the Scenes: Networking and Security in the Business World ................. 456
Part 1: Client/Server Networks and Topologies ............................................................................................................... 458
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them,
and network topologies used to construct them.
Client/Server Network Basics ........................................................................................................................... 458
Networking Advantages .................................................................................................................................... 458
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks ........................................................................................ 459
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks ........................................................................................................................ 460
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Your Car Network Can Be Hacked! ............................................................................................ 463
Servers and Network Topologies ...................................................................................................................... 464
Servers .............................................................................................................................................................. 464
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers ................................................................................................................................................... 465
TRENDS IN IT: Virtualization: Making Servers Work Harder .............................................................................. 466
Network Topologies ........................................................................................................................................... 467
Objective 12.5 Describe the common types of network topologies and the advantages and ­disadvantages of each one.
SOUND BYTE: Network Topology and ­Navigation Devices.................................................................................................... 469
TRY THIS: Sharing Printers on a Network Using Windows ................................................................................ 474
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 475
Part 2: Setting Up Business Networks ............................................................................................................................. 476
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network
navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media ........................................................................................................................................... 476
Wired and Wireless Transmission Media ............................................................................................................ 476
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Go Green with Mobile Apps ....................................................................................................... 478
Network Adapters and Navigation Devices ..................................................................................................... 478
Network Adapters ............................................................................................................................................. 478
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses ................................................................................................................................................ 480
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers ........................................................................................................................ 481
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and ­Network Adapters ...................................................................................................... 482
Network Operating Systems and Network Security ....................................................................................... 482
Network Operating Systems .............................................................................................................................. 483
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Smart Lighting for Smart Homes ............................................................................................... 483

xvi Contents
Client/Server Network Security .......................................................................................................................... 484
Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards ............................................................................. 485
SOUND BYTE: A Day in the Life of a Network Technician ..................................................................................................... 486
ETHICS IN IT: How Should Companies Handle Data Breaches? ...................................................................... 489
BITS&BYTES: Are Your Photos Helping Criminals Target You? ......................................................................... 490
SOLVE THIS: Cyber-Security Flyer and Mail Merge ........................................................................................... 497

Chapter 13
Behind the Scenes: How the Internet Works ........................................................ 498
Part 1: Inner Workings of the Internet ............................................................................................................................. 500
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking ............................................................................................................. 500
Management ..................................................................................................................................................... 500
Objective 13.1 Describe the management of the Internet.
Networking Components ................................................................................................................................... 501
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission ............................................................................................................................................. 502
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You ........................................................................................... 502
Internet Identity ................................................................................................................................................... 505
IP Addresses ..................................................................................................................................................... 505
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols ........................................................................... 505
BITS&BYTES: What’s Your IP Address? ........................................................................................................... 506
BITS&BYTES: Internet of Things Goes Shopping .............................................................................................. 506
SOUND BYTE: Creating Web Pages with Squarespace ....................................................................................................... 507
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols .............................................................. 508
Domain Names ................................................................................................................................................. 509
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
BITS&BYTES: Scale Up for Success ................................................................................................................ 510
TRY THIS: Ping Me ........................................................................................................................................... 513
MAKE THIS: TOOL App Inventor 2 or Thunkable .............................................................................................. 514
Part 2: Coding and Communicating on the Internet ....................................................................................................... 515
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies .............................................................................................................................................. 515
Web Development ............................................................................................................................................. 515
Objective 13.6 Compare and contrast a variety of web development languages.
BITS&BYTES: CodePen: An Editing Community for Web Designers ................................................................. 516
Application Architecture ..................................................................................................................................... 518
Objective 13.7 Compare and contrast server-side and client-side application software.
SOUND BYTE: Client-Side Web Page Development ............................................................................................................. 519
BITS&BYTES: Free Code Camp ....................................................................................................................... 521
Communications over the Internet ................................................................................................................... 521
Types of Internet Communication ...................................................................................................................... 521
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
BITS&BYTES: AI and Your Inbox ...................................................................................................................... 523
Encryption ......................................................................................................................................................... 524
Objective 13.9 Explain how data encryption improves security.

Contents xvii
BITS&BYTES: Numbers: We Wouldn’t Have Encryption Without Them! ........................................................... 525
ETHICS IN IT: Do We Really Want Strong Encryption? ..................................................................................... 526
HELPDESK: Keeping E-Mail Secure ..................................................................................................................................... 526
TRENDS IN IT: Cognitive Computing ............................................................................................................... 527
SOLVE THIS: Creating an HTML Document ..................................................................................................... 535

Appendix A
The History of the Personal Computer .................................................................. A-1

Appendix B
Careers in IT ............................................................................................................B-1
Glossary........................................................................................................................................................................ G-1
Index............................................................................................................................................................................... I-1

xviii Contents
Learn Technology by Using
Technology in Action 16e

The best-selling Technology in Action continues to deliver an engaging approach to teaching the topics and skills students need to be
digitally literate. Using practical content, hands-on projects, and interactive simulation activities students are engaged in learning.
Today’s students are more tech savvy than ever—they know how to use their smartphones, YouTube, Snapchat, and Instagram—
and that’s how they want to learn. Technology in Action is written knowing that many students are digital natives, so the instruction
and practice offer students a consistent and engaging experience from chapter to chapter. They don’t just read about technology,
they engage with it in familiar ways.
For the 16th edition, students will engage with their peers at the beginning of each chapter of the etext by taking a Web-based survey
and then analyzing the results with What Do You Think? questions. From there students continue to engage with the content by watch-
ing videos, working through interactive Helpdesk activities, Sound Byte lessons, IT simulations, and a variety of hands-on projects.
Using these resources and the practical content, students learn the concepts and skills they need to be digitally literate in today’s work-
place. And, if they are using MyLab IT, they can earn the Digital Competency badge to demonstrate their skills to potential employers.

Hallmarks
• Engaging question-and-answer writing style that demonstrate understanding. Newly redesigned for a
approaches topics as students do. more engaging and easier-to-use learning experience
• Ethics coverage throughout, including in end-of-chapter that helps students actively demonstrate understanding.
activities, Point/Counterpoint ethical debate content found in Now includes a “presentation mode” so instructors can
relevant chapters, and a Sound Byte lesson on how to discuss walk through the simulation in class or with students.
and debate ethical issues. • Review and Quizzes
• Hands-on learning with projects throughout each chapter: • Check Your Understanding Quizzes provide a self-check
• Try This projects allow students to practice and covering objectives in each part of the chapter so that
demonstrate their proficiency with important topics. students can see how well they are learning the content.
Each project is accompanied by a how-to video. • The Chapter Quiz provides a way for students to test that
they have learned the material from the entire chapter.
• Solve This projects put the concepts students are
learning into action through real-world problem solving • New “Chew on This” critical thinking questions require
using Microsoft Office programs. Grader project versions that students demonstrate their understanding through
of most of these projects are in MyLab IT. written answers that are manually graded.

• Make This projects provide activities where students • Testbank Exams provide customizable prebuilt,
build programs that run on their mobile devices. Twelve autograded, objective-based questions covering the
of the chapters have activities that build fully functional chapter objectives.
mobile apps, compatible with either Android or iOS. • Videos
Each project includes instructions and a how-to video. • Chapter Overview Videos provide an objective-based
• Interactive activities engage students in active learning review of what students should have learned.
and demonstration of understanding: • Try This and Make This project videos
• Helpdesk interactive activities provide a review of • Helpful Resources
chapter objectives by having students play the role of a • PowerPoint and Audio Presentations can be used in
helpdesk staffer assisting customers via a live chat using class for lecture or assigned to students, particularly
a decision-based simulation with a quiz. online students, for instruction and review.
• Sound Byte audio lessons provide coverage of additional • Instructor Chapter Guides provide teaching tips;
topics related to the chapter, including a brief quiz. homework and assessment suggestions; a brief
• IT Simulations provide an in-depth chapter scenario overviews of each chapter’s Try This, Make This, and
that students work through in an active learning Solve This exercises; as well as select Sound Byte
environment and complete with a brief quiz to talking points and ethics debate starters.

Learn Technology by Using Technology in Action 16e xix


What’s New?
• What Do You Think? discussion topics begin each chapter Ethics in IT: Ethical Challenges of the Internet of Things has
with surveys that students complete. They then respond to moved to Chapter 8.
follow-up questions related to the topic at the end of the A new Bits&Bytes: Power Your Devices Wirelessly has been
chapter to encourage critical thinking. added.
• Chew on This critical thinking questions at the end of each
Revisions to setting up a Windows home network have
chapter part, encourage students to think critically about
been made to remove concept of homegroups.
the impact of technology on society.
The Bits&Bytes: The Rise of Wearable Technology has
• Technology in the News (formerly TechBytes Weekly) lets
moved to Chapter 8.
you keep your class current with weekly technology news.
This currency widget is included in the etext or Revel A new Ethics in IT: Privacy Challenges of Delivering Free
versions of Technology in Action to provide new and Wi-Fi has been added.
updated content, discussion points, and activities Chapter 8
every week.
Ethics in IT: Ethical Challenges of the Internet of Things has
• Chapter 8 has been expanded to discuss the challenges been relocated from Chapter 7.
students face in managing an active digital lifestyle such as
the Dark Web, keeping data private, and using A new objective, “Discuss the challenges in managing an
cryptocurrency. active digital lifestyle,” has been added to the chapter.

• Images and quizzes have been updated throughout. A new Dig Deeper, Deep Web versus Dark Web: Are There
Places You Shouldn’t Go?, has been added to the chapter.
• A new Try This project in Chapter 1—What Does
Facebook Know About You?—lets students explore the Bits&Bytes: The Rise of Wearable Technology has been
detailed information collected about them by the social relocated from Chapter 7.
media platform. Chapter 9
A Bits&Bytes addressing the role of social media and com-
Summary of Chapter Updates puter security in maintaining democratic elections has been
added.
All chapter Learning Outcomes and Learning Objectives have
been revised as needed and throughout the text, figures and Extended treatment of password managers and biometric
photos have been updated with new images, current topics, options for access control has been added.
and state-of-the art technology coverage. Chapter 10
Chapter 1 New coverage of programming technologies like Swift and
A new Try This exercise leading students through the steps to JSON.
examine the data stored about them by social media platforms Chapter 11
has been added.
The concept of flat databases has replaced discussion of lists.
The section on technology and careers has been updated
New content of NoSQL databases has been added.
with current trends and an emphasis on the impact of
artificial intelligence. The content of data staging has been updated.
Chapter 5 A new Bits&Bytes: The Normal Forms has been added.
Discussions on additional mobile operating systems like Chapter 12
watchOS and tvOS have been added. A new Try This: Sharing Printers on a Network Using Windows
Coverage of the latest smarthome devices and open- has been added.
source solutions has been added. Chapter 13
Chapter 7 Coverage of web security topics like email encryption and
The Bits&Bytes: Net Neutrality has been updated. ­biometrics has been updated.
The Bits&Bytes: Is Dial-Up Still an Option? has been The most current coverage of cognitive computing has
­updated. been added.
The Bits&Bytes: 5G Is Coming—Is It Worth the Wait? has More student-focused introduction to web frameworks and
been deleted and content has been added to the text. modern web technologies has been added.

xx Learn Technology by Using Technology in Action 16e


The Program
To maximize student results, we recommend using Technology in Action with MyLab IT,
the teaching and learning platform that empowers you to reach every student. By combining
trusted author content with digital tools and a flexible platform, MyLab IT personalizes the
learning experience and will help your students learn and retain key course concepts while
developing skills that future employers seek.
With MyLab IT for Technology in Action, students have access to all of the instruction, prac-
tice, review, and assessment resources in one place. There are two ways you can set up
your course:
1. You can choose to use the new sequential learning modules that allow you to create
activities in the order you want students to complete them, providing a consistent, mea-
surable learning experience from chapter to chapter.
2. You can take a second approach for an interactive learning experience, where students
use the interactive etext to read and learn actively with Helpdesk activities, Sound Bytes,
IT Simulations, What’s New in Technology currency updates, What do You Think?
­surveys and critical thinking questions, hands-on projects, videos, accessible PowerPoint
presentations, and more. You assign the etext chapter, students engage in learning and
practice, and go back to their assignments to take the chapter quizzes.

Solving Teaching and Learning Challenges


Technology in Action, 16e provides a hands-on approach to learning computer concepts in
which students learn a little and then apply what they are learning in a project or simulation
or watch a video to dive deeper. Within the etext, students are engaged through interactive
surveys, What’s New in Technology currency updates, videos, IT Simulations, interactives,
fun study tools, and quiz questions with immediate feedback. And with the new What do
you think? surveys at the beginning of each chapter, the follow-up question at the end of the
chapter related to the survey results, as well as new Chew on This critical thinking questions
at the end of each chapter part, students are encouraged to think critically about the impact
of technology on society.
The optimal way to experience Technology in Action is with MyLab IT. All of the instruction,
practice, review, and assessment resources are in one place, allowing you to arrange your
course from an instructional perspective that gives students a consistent, measurable learn-
ing experience from chapter to chapter.

Developing Employability Skills


Digital literacy is a top skill required in today’s job market! Developing these skills involves
conceptual as well as hands-on learning. With Technology in Action, students get both—they
learn the fundamentals of computers and have opportunities to apply what they are learning
in real-world projects and simulations. Using MyLab IT and Technology in Action, students
can learn, practice, and demonstrate their digital literacy.
• High-Demand Office Skills are evaluated in the auto-graded Solve This projects in each
chapter.
• Essential Digital Literacy Skills are taught and practiced throughout the book in Try This,
Solve This, and Make This projects.

Learn Technology by Using Technology in Action 16e xxi


Employability Skills Matrix (ESM)

Interactives:
Ethics Try This Solve This Make This What do Helpdesks, Sound Team Time
Projects Projects Projects Projects you think? Bytes, IT Sims Projects Badge

Critical
x x x x X
Thinking

Communication x x x X

Collaboration x x x X

Knowledge
Application and x X x x x x X
Analysis

Social
x X x
Responsibility

xxii Learn Technology by Using Technology in Action 16e


Applied Learning Opportunities Throughout
Using MyLab IT with Technology in Action provides students with a variety of ways to get instruction, practice, review,
and assessment.
Technology in the News
Formerly TechBytes Weekly, these weekly currency updates deliver the latest technology news stories to you to use in your classroom. The
update is live in the etext chapter, so no matter where you are in the content, you'll have this weekly update to use for in-class discussion or as
a reading assignment.

Try This Projects Make This Projects


Try This Make This TOOL: App Inventor 2 or Thunkable
These projects have students These hands-on activities
What’s Inside My Computer? A Mobile App

apply what they are learning in Understanding what capabilities your current computer has is one of the first steps toward computer literacy. In this
exercise, you’ll learn how to explore the components of your Windows computer. For step-by-step instructions, watch
lead students to explore Want to build your own Android app from scratch? You can, with a
simple tool called App Inventor. To get started, have ready:

mobile app development


the Chapter 2 Try This video on MyLab IT.

a practical project that uses Step 1 To gather information about the storage devices on your computer, click File Explorer from the Taskbar. Then in the nav-
igation pane, click This PC to display information about your computer’s storage devices and network locations.
• A computer connected to a Wi-Fi network
• The Chrome browser

(Copyright MIT, used with permission.)


skills they’ll need in the work- in either an Android or • A Google account
• The MIT AI2 Companion app (available in the Google Play Store)
• [optional] An Android device connected to the same Wi-Fi network

force and everyday life. Each


(Courtesy of Microsoft Corporation)
Click to launch File Explorer
iOS environment.
project includes a video to
Step 2 The This PC window displays informa-
In this exercise, you’ll explore the App
tion about internal storage devices (such
as internal hard drives), optical storage
Ribbon Inventor tool and begin working with your
devices (such as DVD drives), and portable first simple app. As you’ll see, making your

guide students through the


storage devices (such as flash drives and device work for you is as easy as drag and
external hard drives). To display the Sys- drop with App Inventor.
tem screen, click the Computer tab on the
ribbon, and then click System properties. App Inventor is a programming platform

project.
used to create apps for Android devices.
Using App Inventor, you can easily drag
and drop components to design your app’s

(Copyright MIT, used with permission.)


interface and its behavior.

(Courtesy of Microsoft Corporation)

Step 3 You can gather quite a bit of information Clock speed


Processor info
from the About screen, such as:
• Version of Windows
• Type of processor
• Speed of the processor
• Amount of RAM installed
RAM info
• System type (32-bit or 64-bit)

System type

To create iOS apps, go to Thunkable.com, a programming platform


Windows version based on App Inventor.
For the detailed instructions for this exercise, go to MyLab IT.

(Courtesy of Microsoft Corporation)

Make This 59
58 Chapter 2 Looking at Computers: Understanding the Parts

M02_EVAN0000_16_SE_C02.indd 59 12/14/18 3:28 PM


M02_EVAN0000_16_SE_C02.indd 58 12/14/18 6:02 PM

Helpdesk Activities
The Helpdesk training content,
created specifically for Tech- Solve This Projects
nology in Action, enables stu- Solve This MyLab IT Grader

dents to take on the role of a These exercises inte- Technology Wish List
You are in need of a significant technology upgrade, and your parents have told you they will help you finance your purchases by

helpdesk staffer fielding ques- grate and reinforce loaning you the money. You will need to repay them with a modest 2.5% interest rate over two years. The only catch is that they
want you to create a list of all the new devices that you need, note the cost, and provide a website for each device where they can
find more information. Then, they want you to calculate how much you will need to give them each month to pay them back.

chapter concepts with


You will use the following skills as you complete this activity:

tions posed by computer


• Merge and Center • Modify Column Widths

• Modify Workbook Themes • Insert a Hyperlink

Microsoft Office skills.


• Apply Number Formats • Create a Formula

users so that students demon-


• Use the SUM, PMT, and COUNTA Functions • Wrap Text

Instructions
1. Open TIA_Ch2_Start.docs and save as TIA_Ch2_LastFirst.docx.

strate their understanding in


2. Format the title in cell A1 with the Title Cell Style, and format the column headers in cells A3:F3 with the Heading 3 Cell Style.
Hint: To format cell styles, on the Home tab, in the Styles group, click Cell Styles.
3. Merge and Center A1 across columns A through F, and Center align the column headers in cells A3:F3.
Hint: To Merge and Center text, on the Home tab, in the Alignment group, click Merge & Center.

an active learning environ-


4. Modify column widths so that Column A is 25 and Column D is 45.
Hint: To modify column widths, on the Home tab, in the Cells group, click Format, and then select Column Width.
5. In cells B4:E9, fill in the table with the Brand and Model of the six devices that you would like to purchase. The device
type is filled out for you. In the Reason column, write a brief note as to why this device will help you. (You’ll format the

ment. Each Helpdesk ends


text so it all displays later.) Enter the cost of the device in the Cost column. Don’t include tax and/or shipping.
6. Change the Workbook Theme to Integral.
Hint: To apply the Theme, on the Page Layout tab, in the Themes group, click Themes.
7. In cells F4:F9, create a Hyperlink to a webpage that features each respective product so your grandparents can have

with a quiz, ensuring students


access to more information if they need it. Ensure that each hyperlink includes the URL to the exact webpage for the
device in the Address, but displays the Make/Model of the device in the worksheet.
Hint: To insert a hyperlink, on the Insert tab, in the Links group, click Hyperlink. In the Insert Hyperlink dialog box, enter
the URL in the Address box and enter the Make/Model in the Text to display box.
8. Wrap the text in cells C4:C9, D4:D9, and F4:F9 so all text displays.

have grasped the content.


Hint: To wrap text, on the Home tab, in the Alignment group, click Wrap Text.
9. Format the values in cells E4:E9 with the Accounting Number format with two decimals.
Hint: To apply number and decimal formats, look on the Home tab, in the Number group.
10. In cell A10, type Subtotal, then in cell E10 use a SUM function to calculate the total cost of all devices. Format the
results in the Accounting Number format with two decimals.
Hint: To apply number and decimal formats, look on the Home tab, in the Number group.
11. In cell A11, type Estimated Tax, then in cell E11 create a formula that references the subtotal in cell E10 and multiplies

Sound Bytes it by a tax of 6%. Format the results in the Accounting Number format with two decimals.
Hint: The formula will be =E10*0.06
12. In cell A12, type Estimated Shipping, then in cell E12 create a formula to calculate the shipping charge by using the
COUNTA function to determine the number of devices being purchased and then multiplying that by a $10 shipping
charge. Format the results in Accounting Number Format with two decimals.

Sound Bytes expand student


Hint: The formula will be =COUNTA(B4:B9)*10.
13. In cell A13, type Total Cost, then in cell E13 use the SUM function to create a formula that adds up the Subtotal, Estimated
Tax, and Estimated Shipping costs. Format the results in Accounting Number Format with two decimals. Format the cells
A13:E13 with the Total Cell Style.

mastery of complex topics


14. Right align cells A10:A13.
15. In cell D14, type Estimated Monthly Payment, and then in cell E14 use the PMT function to calculate the monthly
payment owed to your parents to pay back the total purchase amount in two years at a 2.5% annual interest rate.
Hint: The formula will need to adjust the annual interest rate to a monthly rate, and adjust the annual term of the loan
to monthly payments.

through engaging lessons with 16. Save the workbook and submit based on your instructor’s directions.
Chapter Review 79

a brief quiz to check M02_EVAN0000_16_SE_C02.indd 79 12/14/18 3:34 PM

understanding.

IT Simulations
These detailed interactive scenarios cover a core chapter topic in a hands-on environment
where students can apply what they have learned and demonstrate understanding through
active engagement.

Learn Technology by Using Technology in Action 16e xxiii


Instructor Teaching Resources
This program comes with the following teaching resources.
Supplements available to instructors at
Features of the Supplement
www.pearsonhighered.com/techinaction
Accessible PowerPoint Presentation PowerPoints meet accessibility standards for students with
disabilities. Features include, but are not limited to:
• Keyboard and Screen Reader Access
• Alternative Text for Images
• High Color Contrast between Background and Foreground Colors

End-of-Chapter Answer Key, Check Your Understanding Answers to all end-of-chapter questions.
Answer Key, Chapter Quiz Answer Key

Image Library Every image in the book.

Instructor Chapter Guide • Content Instruction


• Student Preparation and Review
• Active Learning Options
• Chapter Assessment
• End-of-Chapter Exercises
• Currency Topics
• Soft Skills and Team Work
• Instructor Resources

Make This Projects Activities where students build programs that run on their mobile
devices. Each project includes instructions and a how-to video.
Objectives Mapping Outline of the objectives in every chapter.
Solve This Projects Real-world problem solving using Microsoft Office programs.
Grader versions of most of these projects are in MyLab IT.
Syllabus Template Sample syllabus for help in setting up your course.
Test Bank (Textbook, Helpdesk, Sound Bytes) Over 1,000 multiple-choice, true/false, short-answer, and
matching questions with these annotations:
• Difficulty level (1 for straight recall, 2 for some analysis, 3 for
complex analysis)
• Objective, which provides location in the text
Provided for:
• Textbook
• Helpdesk
• Sound Byte

Computerized TestGen TestGen allows instructors to:


• Customize, save, and generate classroom tests
• Edit, add, or delete questions from the Test Item files
• Analyze test results
• Organize a database of tests and student results

Transition Guide Detailed explanation of changes between the previous and


current edition.
Web Projects Discussion questions and additional projects that can be done on
the Internet.

xxiv Learn Technology by Using Technology in Action 16e


Letter from the Authors

Our 16th Edition—A Letter from the Authors


Why We Wrote This Book
The pace of technological change is ever increasing.
In education, we have seen this impact us more than
ever recently—the Maker movement, the Internet of
Things, MOOCs, touch-screen mobile delivery, and
Hangouts are now fixed parts of our environment.
Even the most agile of learners and educators need sup-
port in keeping up with this pace of change. Our students
have easier access to more information than any generation
before them. We recognize the need for them to be able
to think critically and investigate the data they see. In this
edition, we introduce the use of chapter-opening features
called What do you think? that allow students to critically think about a chapter topic. Students then
follow up at the end of the chapter by answering additional related critical thinking questions in a What
do you think now? feature.
We have also responded by integrating material to help students develop skills for web application
and mobile programming. We see the incredible value of these skills and their popularity with students
and have included Make This exercises for each chapter. These exercises gently bring the concepts
behind mobile app development to life. In addition, there is a Solve This exercise in each chapter that
reinforces chapter content while also applying Microsoft Office skills. These projects help to promote
students’ critical-thinking and problem-solving skills, which employers value highly.
The Helpdesk and Sound Byte training modules and IT Simulations continue to provide students with
an active learning environment in which they can reinforce their learning of chapter objectives. In this
edition, we have put the spotlight on critical thinking. We've integrated real-time surveys on important
technology topics to foster classroom discussion and analytical skills. We have also included additional
material on key challenges of a digital lifestyle, such as using digital currency, avoiding the Dark Web,
and protecting privacy.
We also continue to emphasize the many aspects of ethics in technology debates. Some of the
Helpdesks and IT Simulations support instruction on how to conduct thoughtful and respectful discus-
sion on complex ethical issues.
Our combined 70 years of teaching computer concepts have coincided with sweeping innovations in
computing technology that have affected every facet of society. From iPads to Web 2.0, computers are
more than ever a fixture of our daily lives—and the lives of our students. But although today’s students
have a much greater comfort level with their digital environment than previous generations, their knowl-
edge of the machines they use every day is still limited.
Part of the student-centered focus of our book has to do with making the material truly engaging to
students. From the beginning, we have written Technology in Action to focus on what matters most to
today’s student. Instead of a history lesson on the microchip, we focus on tasks students can ac-
complish with their computing devices and skills they can apply immediately in the workplace, in the
classroom, and at home.
We strive to keep the text as current as publishing timelines allow, and we are constantly looking for
the next technology trend or gadget. We have augmented the etext with weekly What’s New in Tech-
nology automatic updates. These updates will be in each chapter, so regardless of where you are in the
text, you'll have current topics to talk about in class related to the latest breaking developments.
We also continue to include a number of multimedia components to enrich the classroom and stu-
dent learning experience. The result is a learning system that sparks student interest by focusing on the
material they want to learn (such as how to integrate devices into a home network) while teaching the
material they need to learn (such as how networks work). The sequence of topics is carefully set up to
mirror the typical student learning experience.

Letter from the Authors xxv


As they read this text, your students will progress through stages and learning outcomes of increas-
ing difficulty:
• Thinking about how technology offers them the power to change their society and their world and
examining why it’s important to be computer fluent
• Understanding the basic components of computing devices
• Connecting to and exploring the Internet
• Exploring application software
• Learning about the operating system and personalizing their computer
• Evaluating and upgrading computing devices
• Understanding home networking options
• Creating digital assets and understanding how to legally distribute them
• Keeping computing devices safe from hackers
• Going behind the scenes, looking at technology in greater detail
We strive to structure the book in a way that makes navigation easy and reinforces key concepts. We
continue to design the text around learning outcomes and objectives, making them a prominent part
of the chapter structure. Students will see the learning outcomes and objectives in the chapter opener,
throughout the text itself, as well as in the summary so they understand just what they are expected to
learn.
We also continue to structure the book in a progressive manner, intentionally introducing on a basic
level in the earlier chapters concepts that students traditionally have trouble with and then later expand-
ing on those concepts in more detail when students have become more comfortable with them. Thus,
the focus of the early chapters is on practical uses for the computer, with real-world examples to help
the students place computing in a familiar context. For example, we introduce basic hardware com-
ponents in Chapter 2, and then we go into increasingly greater detail on some hardware components
in Chapter 6. The Behind the Scenes chapters venture deeper into the realm of computing through
in-depth explanations of how programming, networks, the Internet, and databases work. They are spe-
cifically designed to keep more experienced students engaged and to challenge them with interesting
research assignments.
In addition to extensive review, practice, and assessment content, each chapter contains several
problem-solving, hands-on activities that can be carried out in the classroom or as homework:
• The Try This exercises lead students to explore a particular computing feature related to the
chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development in both the Android and iOS environments.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to reinforce the
material taught in the text and to support both classroom lectures and distance learning:
• New chapter-opening features called What do you think? allow students to critically think about a
chapter topic. Students then follow up at the end of the chapter by answering additional related
critical thinking questions in a What do you think now? feature.
• New Chew on This critical-thinking questions require that students demonstrate their
understanding through written answers that are manually graded.
• The Helpdesk training content, created specifically for Technology in Action, enables students to
take on the role of a helpdesk staffer fielding questions posed by computer users so that students
can demonstrate their understanding in an active learning environment.
• Sound Bytes expand student mastery of complex topics through engaging lessons with a brief
quiz to check understanding.
• IT Simulations are detailed, interactive scenarios covering the core chapter topic. As students work
through the simulation, they apply what they have learned and demonstrate understanding in an
active learning environment.
• The What’s New in Technology (formerly TechBytes Weekly) is a weekly currency update that
delivers the latest technology news stories to you for use in your classroom. In addition, the
currency items have discussion points or activities included. The update is live in the etext
chapters, so no matter where you are in the content, you'll have this weekly update to use for an
in-class discussion or reading assignment.

xxvi Letter from the Authors


About the Authors

Alan Evans, MS, CPA


[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer science
and business courses. He holds a BS in accounting from Rider University and
an MS in Information Systems from Drexel University, and he is a certified public
accountant. After a successful career in business, Alan finally realized that his
true calling is education. He has been teaching at the college level since 2000. He enjoys attending
technical conferences and exploring new methods of engaging students.

Kendall Martin, PhD


[email protected]
Kendall is a full professor of Computer Science at Montgomery County Community
College with teaching experience at both the undergraduate and graduate levels
at a number of institutions, including Villanova University, DeSales University,
Ursinus College, and Arcadia University. Her education includes a BS in electrical
engineering from the University of Rochester and an MS and a PhD in engineering
from the University of Pennsylvania. Kendall has industrial experience in research and development
environments (AT&T Bell Laboratories) as well as experience with several start-up technology firms.

Mary Anne Poatsy, MBA


[email protected]
Mary Anne is a senior faculty member at Montgomery County Community
College, teaching various computer application and concepts courses in face-
to-face and online environments. She enjoys speaking at various professional
conferences about innovative classroom strategies. Mary Anne holds a BA
in psychology and education from Mount Holyoke College and an MBA in
finance from Northwestern University’s Kellogg Graduate School of Management. She has been in
teaching since 1997, ranging from elementary and secondary education to Montgomery County
Community College, Gwynedd-Mercy College, Muhlenberg College, and Bucks County Community
College, as well as training in the professional environment. Before teaching, Mary Anne was a vice
president at Shearson Lehman Hutton in the Municipal Bond Investment Banking Department.

About the Authors xxvii


Acknowledgments
For my wife, Patricia, whose patience, understanding, and support continue to make this work possible, espe-
cially when I stay up past midnight writing! And to my parents, Jackie and Dean, who taught me the best way to
achieve your goals is to constantly strive to improve yourself through education.
—Alan Evans
For all the teachers, mentors, and gurus who have popped in and out of my life.
—Kendall Martin
For my husband, Ted, who unselfishly continues to take on more than his fair share to support me throughout this
process, and for my children, Laura, Carolyn, and Teddy, whose encouragement and love have been inspiring.
—Mary Anne Poatsy
First, we would like to thank our students. We constantly learn from them while teaching, and they are a continu-
al source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and children
made sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience, a few individuals
deserve special mention. The constant support and encouragement we receive from Jenifer Niles, Executive
Portfolio Product Manager, and Andrew Gilfillan, VP, Editorial Director, continually make this book grow and
change. Our heartfelt thanks go to Shannon LeMay-Finn, our Developmental Editor. Her creativity, drive, and
management skills helped make this book a reality. We also would like to extend our appreciation to Pearson
Content Producers, particularly Laura Burgess, and the vendor teams, who work tirelessly to ensure that our
book is published on time and looks fabulous. The timelines are always short, the art is complex, and there are
many people with whom they have to coordinate tasks. But they make it look easy! We’d like to extend our thanks
to the media and MyLab IT team—Eric Hakanson, Becca Golden, Amanda Losonsky, and Heather Darby—for all
of their hard work and dedication.
There are many people whom we do not meet at Pearson and elsewhere who make significant contributions
by designing the book, illustrating, composing the pages, producing the media, and securing permissions. We
thank them all.
And finally, we would like to thank the reviewers and the many others who contribute their time, ideas, and
talents to this project. We appreciate their time and energy, as their comments help us turn out a better product
each edition. A special thanks goes to Rick Wolff, a wonderfully talented infographic designer who helped by
creating the infographics for this text.

xxviii About the Authors


Chapter

1
The Impact of Technology
in a Changing World
For a chapter overview, watch the Chapter Overview videos.

PART 1 PART 2

Technology in Society Emerging Technologies and Ethical Computing


Learning Outcome 1.1 
You will be able to discuss the impact Learning Outcome 1.2 
You will be able to describe emerging
of the tools of modern technology on technologies, such as artificial
national and global issues. ­intelligence, and how technology
creates new ethical debates.

Technology in a Global Society 4 Artificial Intelligence 13


Objective 1.1 Describe various technological tools being used to Objective 1.6 Describe artificial intelligence systems and explain
impact national and global issues. their main goals.
Objective 1.2 Describe various global social issues that are being Helpdesk: The Impact of Artificial Intelligence
affected by technology.

 orking with Artificial Intelligence and


W
Technology Connects Us with Others 6
Other Information Technologies 17
Objective 1.3 Describe how technology is changing how and why
Objective 1.7 Describe how artificial intelligence and other emerging
we connect and collaborate with others.
technologies are important in many careers.
Objective 1.4 Summarize how technology has impacted the way we
choose and consume products and services.
Helpdesk: Technology Impacts
Ethical Computing 22
Objective 1.8 Define ethics and describe various ethical systems.
The Importance of Computer Literacy 8 Objective 1.9 Describe influences on the development of your
­personal ethics.
Objective 1.5 Characterize computer literacy and explain why it is
important to be computer literate. Objective 1.10 Present examples of how technology creates ethical
challenges.
Sound Byte: Virtual Computer Tour
Sound Byte: How to Debate Ethical Issues

MyLab IT All media accompanying this chapter can be found here. Make This A Virtual Assistant on page 12

(John Lund/Getty Images; Carlos Castilla/Shutterstock; Winui/Shuttertock; Ivan Trifonenko/123RF; Sergey Nivens/Shutterstock; Stuart Miles/Fotolia)

2
JournalismCS
RoboticsCS
EducationCS
Psychology CS
MedicineCS
dumperina

LiteratureCS
Theater CS
Biology CS
EconomicsCS
HumanitiesCS
What do you think?
Having a background in technology and computer science enables you to be
a powerful contributor in many career fields. More universities are realizing this and
creating a new department, CS + X. What is CS + X? The CS stands for Computer
Science, while the X stands for a second area of study that blends with computer
technology. For example, the X might be Music, with the combined degree including
study of the perception of music and use of digital techniques to enhance our
experiences. Or the X might be Archaeology, with the curriculum including courses
on the computer simulation of human behavior and creating virtual reality models.
Universities that are creating CS + X departments argue that combining computer
science with other skills produces students who are better journalists, artists,
scientists, and so on. The possibilities for collaboration between your passions and
technology are endless.

Which field would you be most curious about combining with CS?
• Literature • Nursing • Art
• Statistics • Criminal Justice • Other
• Business • Anthropology

3
See the end of the chapter for a follow-up question. (Jacob Lund/Shutterstock)
Part 1 For an overview of this part of the chapter, watch Chapter Overview Video 1.1.

Technology in Society
Learning Outcome 1.1  You will be able to discuss the impact of the tools of modern technology on
national and global issues.
Ask yourself: Why are you in this class? Maybe it’s a requirement for your degree, or maybe you want to improve your computer
skills. But let’s step back and look at the bigger picture.
Technology is a tool that enables us all to make an impact beyond our own lives. We’ve all seen movies that dangle the dream in
front of us of being the girl or guy who saves the world—and gets to drive a nice car while doing it!
Technology can be your ticket to doing just that by influencing and participating in projects that will change the world.

Technology in a Global Society


Recent national and global issues are showing that technology is accelerating change around the
world and galvanizing groups of people in new ways. Let’s look at a few examples.

Impact of Tools of Modern Technology


Objective 1.1 Describe various technological tools being used to impact national and global
issues.

Social Media Tools


Social media platforms like Twitter, Facebook, and Instagram enable people to connect and
exchange ideas. These platforms also bring together people facing similar problems to fight for
social change. For example, the Twitter hashtag #MeToo began as a way of supporting women
facing sexual harassment and assault but evolved to galvanize an international movement. A simple
hashtag brought to light an important social issue
and was a key means for revealing how widespread
the problem was.
How we conduct informed discussion in the age
of social media is still developing, however. Bot
accounts, automated programs retweeting news
stories and quotes, have been used to create
discord around controversial topics in many
­countries—enflaming the gun control debate in
the United States or fanning prejudice into vio-
lence in Sri Lanka. For these and other reasons,
knowing how to use and critically evaluate social
media is an important skill needed by all (see
Figure 1.1).

Crisis-Mapping Tool
Another example of the interaction of technology
and society is the software tool Ushahidi. Following
a disputed election in Kenya, violence broke out all
over the country. Nairobi lawyer Ory Okolloh tried to
get word of the violence out to the world through her
blog, but she couldn’t keep up with the volume of
reports. However, two programmers saw her request
Figure 1.1 Social media has changed how we access, distribute, and evaluate for help and in a few days created Ushahidi. It is a
information. (Rudmer Zwerver/Shutterstock) crisis-mapping tool that collects information from

4 Chapter 1 The Impact of Technology in a Changing World


Figure 1.2 Ushahidi crisis-mapping software has been used to ­identify areas of violence against women in India.
(Pixhall/Alamy Stock Photo)

e-mails, text messages, blog posts, and tweets and then maps them, instantly making the informa-
tion publicly available. The developers then made Ushahidi a free platform anyone in the world can
use (see Figure 1.2). It has since been used in several international disasters. In what other ways
may technology help us face times of crisis?

Global Issues
Objective 1.2 Describe various global social issues that are being affected by technology.
Let’s look at the different global social issues that are being affected by technology.

Health Care
Infectious diseases account for about one-fifth of all deaths worldwide. Researchers say the odds of
a flu pandemic occurring in the next century are nearly 100%. Could technology help us develop and
deliver vaccines to save lives? Using scientific visualization tools, scientists are developing antibodies for
flu viruses and even HIV, viruses that are difficult to target because they continually change shape. Com-
putationally intense modeling software is helping researchers increase the pace of vaccine production.
As we learn more about the terrible consequences of concussion injuries, technology is playing a
part in providing a solution. Researchers now know that even without an actual concussion, ath-
letes can sustain serious damage from repeated impacts of their brain against the skull. Computer
programs have collected sensor data from impacts on the field, which scientists have analyzed and
used to create a new kind of helmet. College programs and the NFL now use enhanced helmets,
designed to better distribute the impact of collisions.

The Environment
What if every cell phone in the world had built-in atmospheric sensors? Then millions of points of
data measuring air and water quality from around the world could be acquired. The data could be
tagged with geographical information, alerting scientists to new trends in our environment. Ideas
like these are being explored by researchers around the world.
Smart Internet-connected water sprinklers are another technology that is already saving water in
California and other dry areas of the country. The sprinkler system checks the weather forecast so it won’t
use water when rain is coming the next day. The system is showing a 30% reduction in water usage.

Technology in a Global Society 5


The Digital Divide
There is a serious gap in the levels of Internet access and the availability of technical tools in differ-
ent regions of the world. The term for this difference in access to technology is the digital divide.
One danger of a digital divide is that it prevents us from using all the minds on the planet to solve
global problems. But this challenge created by technology is also being answered by it.
The Next Einstein Initiative (NEI) is a plan to focus resources on the talented mathematical minds
of Africa (see Figure 1.3). Cambridge professor Neil Turok founded the African Institute of Mathe-
matical Sciences (AIMS) to bring together the brightest young minds across Africa with the best
Figure 1.3 The Next Einstein
lecturers in the world. By capturing the enthusiasm of the world with presentations distributed
Initiative (NEI) is rallying the
through TED (ted.com) and Google’s Project 10100, there is now a push to create additional AIMS
support of the world to identify and
centers across Africa.
encourage mathematical genius.
(Alistair Cotton/123RF) Table 1.1 shows additional examples of people putting technology into action to impact the world.
How will you join them?

Table 1.1 Technology in Action: Taking on Global Problems


Person/
Organization Global Problem Technology Used Action Find Out More . . .

Start Network Corruption Blockchain, a digitized Blockchain technology can help Start Network:
public ledger for track humanitarian aid funds startnetwork.org
recording a series of as they flow from donors to
transactions recipients.

SolaRoad/ The need for Solar cells Solar cells are integrated into the Netherlands SolaRoad:
Netherlands a renewable, asphalt roadway. They collect solaroad.nl
nonpolluting energy solar energy and distribute
resource electricity all day.

United Nations Issues of hunger for GIS (geographical The WFP can analyze the location World Food
World Food 1 in 7 of the world’s information systems) and need for food, positioning it Programme:
Programme population and mobile devices where it will help the most. wfp.org
(WFP)

Gates The threat of global Mobile apps, data Worldwide organizations like the Gates Foundation:
Foundation pandemic disease, like analytics, and enhanced Gates Foundation are taking steps gatesfoundation.org
Ebola, or weaponized global communications to build better networks to detect
biological warfare outbreaks and deliver vaccines.

Technology Connects Us with Others


Technology is also allowing us to redefine fundamental parts of our social makeup—how we think,
how we connect with each other, and how we purchase and consume products.

Technology Impacts How and Why We Connect and Collaborate


Objective 1.3 Describe how technology is changing how and why we connect and collabo-
rate with others.

Collaborating for the Benefit of Others


With the arrival of many web applications that allow individuals to become “creators” of the web, a
new kind of Internet has come into being. Nicknamed Web 2.0, the web now allows users to easily
contribute content and connect with each other. Web 2.0 has fostered a dramatic shift across the

6 Chapter 1 The Impact of Technology in a Changing World


world, from simply consuming to having the ability to volunteer and
collaborate on projects. The term cognitive surplus was coined to
reflect the combination of leisure time and the tools to be creative.
The availability of media tools and the easy connectivity of Web 2.0,
along with generosity and a need to share, also enable projects like
Ushahidi to emerge.

Connecting Through Business


One of the most profound ways we can connect with each other is
to support other people’s dreams. Kickstarter helps us connect in
this way by allowing people to post their ideas and to ask for direct
funding. Donors are given rewards for different levels of pledges,
such as a signed edition of a book or a special color of a product.
This means of generating capital to start a business is known as
crowdfunding, asking for small donations from a large number of
people. Successful Kickstarter projects have included ice chests
with integrated blenders, DNA analysis machines that could inex-
pensively diagnose disease, and many entertainment projects.
Over $3.9 billion of funding for businesses has been raised using
Kickstarter. Business ideas are not the only projects benefiting from
crowdfunding. Sites like GoFundMe allow people to crowdfund to
raise money for things such as medical bills or tuition.

Technology Impacts How We Consume


Objective 1.4 Summarize how technology has impacted the
way we choose and consume products and services.
Technology is also changing how we decide what we’ll purchase
and how we actually buy goods and services.

Marketing
Marketing strategies are counting on the
fact that most people have a cell phone
with a camera and Internet access. Quick
response (QR) codes like the one shown
here let any piece of text host a direct link
to online information and video content.
(Pearson Education) Marketers also have to be aware of the
phenomenon of crowdsourcing—checking in with the voice of the
crowd. Forward-thinking companies are using this input to improve
their products and services. AT&T, for example, has an app called
Mark the Spot that lets customers report locations of dropped calls
to help the company improve its coverage.

Access Versus Ownership


Even the idea of ownership is evolving. Items like cars and bikes can
become “subscriptions” instead of purchases. Services like Uber
and Lyft let you use your car to provide rides for others while Zipcar
allows you to use a shared car whenever you need it. Bicycles can be
shared in most cities with programs like New York City’s Citi Bike. It
has already seen riders take over 50 million trips. These new sharing
options have revolutionized the transportation industry (see Figure 1.4).
Such collaborative consumption implies that we are joining together
as a group to use a specific product more efficiently. There are
increasing opportunities to share the services a product provides Figure 1.4 With smartphones and constant networking, sharing
instead of owning it outright. Mounting environmental concerns and services like CitiBike, Zipcar, Uber, and Lyft have revolutionized
global financial pressures are other forces pushing us toward collab- ­transportation options. (MShieldsPhotos/Alamy Stock Photo; Metamorworks/
orative consumption (see Figure 1.5). Shutterstock; Mr.Whiskey/Shutterstock; Piotr Swat/Shutterstock)

Technology Connects Us with Others 7


Figure 1.5 Collaborative consumption means that we use networking to share a resource (for example, a car
or home) so many people can use the same object. (Montri Nipitvittaya/Shutterstock)

The Importance of Computer Literacy


Everywhere you go, you see ads for computers and other devices. Do you know what all the words in
the ad mean? What is a GPU? How fast do you need your computer to be, and how much memory
Helpdesk MyLab IT should it have? If you’re computer literate, you’ll be a more informed consumer when it comes time to
buy computers, peripherals, and technology services. Understanding computer terminology and keep-
Technology Impacts ing current with technology will help you better determine which computers and devices you need.
In this Helpdesk, you’ll play the
role of a helpdesk staffer fielding Computer Literacy
questions about ways in which
technology affects society.
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
Let’s look at a few examples of what it means to be a savvy computer user and consumer.
Computer literacy. When you are computer literate (see Table 1.2), you understand the capabil-
ities and limitations of computers and you know how to use them safely and efficiently. The topics
listed in Table 1.2 and more are covered in detail in the remaining chapters.
Avoiding hackers and viruses. Hackers and viruses can threaten a computer’s security. Being
aware of how they operate and knowing the damage they can cause can help you avoid falling prey
to them.
Protecting your privacy. If your identity is stolen, your credit rating can be quickly ruined. Do
Sound Byte MyLab IT you know how to protect yourself from identity theft when you’re online?
Virtual Computer Tour Understanding the real risks. Being computer literate means being able to separate real pri-
In this Sound Byte, you’ll take a vacy and security risks from things you don’t have to worry about. Do you know whether cookies
video tour of the inside of a desk- pose a privacy risk when you’re on the Internet? Do you know how to configure a firewall for your
top system unit; locate the power needs?
supply, CPU, and memory; and Using the web wisely. People who are computer literate know how to find reliable, accurate
learn more about what’s inside a information effectively. They also know how to use the web to work well with others. Are you effec-
computer. tive in how you use the web?
Avoiding online annoyances. How can you avoid spam—unsolicited electronic junk mail? Do
you know what adware and spyware are? Do you know the difference between viruses, worms,

8 Chapter 1 The Impact of Technology in a Changing World


Table 1.2 What Does It Mean to Be Computer Literate?


You can avoid falling prey to hackers You know how to protect yourself You can separate the real privacy and

and viruses because you are aware of from identity theft. security risks from things you don’t
how they operate. have to worry about.

You know how to find information and You can avoid being overwhelmed You can how to diagnose and fix prob-
use the web effectively. by spam, adware, and spyware. lems with your hardware and software.

(Peter Dazeley/The Image Bank/Getty Images; Yuri_Arcurs/E+/Getty Images; Zakai/DigitalVision Vectors/Getty Images; Justin Lewis/Stone/Getty Images; Argus/Fotolia; Ivanastar/
E+/Getty Images)

and Trojan horses? What software—the instructions that tell the computer what to do—should you
install on your computer to avoid online annoyances?
Being able to maintain, upgrade, and troubleshoot your computer. Learning how to care
for and maintain your computer and knowing how to diagnose and fix certain problems can save
you time and money. Do you know how to upgrade your computer if you want more memory? Do
you know which software and computer settings can keep your computer in top shape?
Keeping up to date. Finally, becoming computer literate means knowing about new technologies
and how to integrate them into your life. Can you connect your TV to your wireless network? What
is a media server, and do you need one? Can a USB type C connection carry HDMI video signals?
Being able to stay up to date with technology is an important skill.
This book will help you become computer literate. In Chapter 3, you’ll find out how to get the most
from the web while staying free from the spam and clutter Internet surfing can leave behind on your
computer. Chapter 6 shows you how to determine whether your hardware is limiting your comput-
er’s performance and how to upgrade or shop for a new device. Chapter 9 covers how to keep
your computer and your digital life secure. You’ll be able to save money, time, and frustration by
understanding the basics of how computer systems operate.

Before moving on to Part 2:

1. Watch Chapter Overview Video 1.1.


2. Then take the Check Your Understanding quiz.

The Importance of Computer Literacy 9


Check Your Understanding // Review & Practice
For a quick review to see what you’ve learned so far, answer the following questions.

multiple choice
1. Automated bot accounts use social media 4. Crowdfunding helps startup businesses by
a. responsibly. a. selling stock more easily.
b. to help humans who are busy. b. using QR codes to advertise and market products.
c. to manipulate opinion by posting news stories c. gathering financial contributions from
and quotes massive numbers of times. supporters.
d. in some countries but they are illegal in the U.S. d. replacing Web 2.0 technology.

2. The digital divide occurred because 5. Collaborative consumption is when people get
a. the United States has the fastest Internet access. together to

b. not everyone has equal access to the Internet. a. find the best prices on products.

c. crowdfunding is increasing. b. increase the use of a single product by sharing


access to it.
d. everyone now has a smartphone.
c. fight diseases of the respiratory tract.
3. Cognitive surplus means that we now find many peo- d. exchange reviews on services and goods they
ple with have purchased.
a. more money than free time.
b. limited access to the Internet.
c. mobile devices.
d. excess time and free tools for collaboration.

chew on
this

Our thoughts are influenced by the information fed to our mind


all day long. Web 2.0 has created numerous channels for people
to offer their own work for free—open source software and free
music, text, and artwork, to name a few. How has this affected
your thinking, what you create, and what value you put on cre-
ative work?

(mdorottya/123RF)

Go to MyLab IT to take an autograded version of the Check Your


MyLab IT Understanding review and to find all media resources for the chapter.

For the IT Simulation for this chapter,


see MyLab IT.

10 Chapter 1 The Impact of Technology in a Changing World


Try This
What Does Facebook Know about You?
Social media sites like Facebook and Twitter do not charge you a fee. They make a profit
by selling information about your behavior to marketers. By watching what groups you
join and what posts you read, their algorithms make conclusions about what kind of
person you are. In this exercise we’ll show you how to check what information these
sites have deduced about who you are. For more step-by-step instructions, watch the
Chapter 1 Try This video on MyLab IT.

What You Need


A Facebook account A Twitter account

(rvlsoft/Shutterstock; Solomon7/Shutterstock)

Step 1 From the Facebook website, download your Facebook data. On the top line of your
Facebook page, click the dropdown arrow on the far right and select Settings. Next,
select Your Facebook Information and click Download Your Information. Click the
Create File ­button. Facebook will e-mail you when the file is ready.

(Used with Permission from Kendall Martin)

Step 2 From the Twitter website, download the information Twitter has created on you.
Click on your Twitter avatar and select Settings and privacy. From the list on the left,
select Your Twitter data. Scroll to the bottom and under Download your Twitter data,
and click the Request data button. It will be e-mailed to you when the report is ready.

Step 3 Examine what these algorithms have decided about you. Check the list of interests
and what items they think you will likely buy. How accurately have they guessed
your household income, your politics, and your finances?

Try This 11
Make This TOOL: IFTTT.com
(If This Then That)
A Virtual Assistant
If This Then That (IFTTT.com) is an Internet-based tool that helps you get things done automatically. By using
“recipes” within this web-based tool, you can automate tasks you do during the day, such as:
• automatically silencing your phone when you go into class,
• automatically texting your manager when you’re on your way to work, or
• notifying you when the president signs a new law.
In this exercise, you’ll explore using IFTTT to create recipes like these.
Make the Internet work for you by knowing this one programming statement: IF THIS, THEN THAT.

(IFTTT Inc.)

(IFTTT Inc.)

For the instructions for this exercise, go to MyLab IT.

12 Chapter 1 The Impact of Technology in a Changing World


Part 2 For an overview of this part of the chapter, watch Chapter Overview Video 1.2.

Emerging Technologies and


Ethical Computing
Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence,
and how technology creates new ethical debates.

Can computing devices really think? Are virtual assistants like Alexa intelligent, or do they just mimic thinking? Rapid
developments in the field of artificial intelligence have forced us to consider many new ethical debates. It’s important to learn
about new advancements in technology, such as artificial intelligence, as well as to understand the ethical dilemmas technology
presents.

Artificial Intelligence
Artificial intelligence focuses on creating computer systems that have an ability to perform tasks
associated with human intelligence. Let’s explore in detail what artificial intelligence is and how it
impacts you.

Artificial Intelligence Basics


Objective 1.6 Describe artificial intelligence systems and explain their main goals.
What exactly is intelligence? Intelligence is the ability to acquire and apply knowledge and
skills. Sociologists point to characteristics that make human beings intelligent, such as learning from
experiences, reasoning, problem solving, perception, and using language. Animals can exhibit com-
plex behavior, such as birds flying south for the winter, but this is attributed to instinct rather than
intelligence. Some animals can even solve problems, such as sea otters that use rocks to crack
open shellfish so they can consume them. But what separates us from other animals is the ability to
combine behaviors as opposed to demonstrating one specific rote behavior (such as flying south for
the winter).

What is artificial intelligence? Artificial intelligence (AI) is a branch of computer science that MyLab IT
Helpdesk
focuses on creating computer systems able to perform tasks that are usually associated with
human intelligence. By this definition, any computer-controlled device that accomplishes something The Impact of Artificial
thought of as “intelligent” by humans is considered AI. Intelligence
Do computers “think” like human beings? In the 1950s, the goal was to create a machine In this Helpdesk, you’ll play the role
that could think like a human. Early examples included expert systems that mimicked doctors in of a helpdesk staffer, fielding ques-
diagnosing illnesses. But this goal has shifted somewhat toward creating machines that generate tions about artificial intelligence.
intelligent output but that do not necessarily mimic the human thought process.

Consider visiting the library. You could tell a human librarian your interests and the librarian could
ask you some questions and then recommend books you might like. The Amazon recommendation
engine fulfills the same purpose. However, the Amazon recommendation engine doesn’t mimic a
human librarian’s thought process but instead analyzes vast amounts of data about you and other
shoppers to make its recommendations. It provides intelligent results, but it does not arrive at those
results the same way a human would.

  Artificial Intelligence 13
What are the main areas of research for AI? AI’s central goals can be grouped into a num-
ber of categories (see Table 1.3):
• Natural language processing (NLP): NLP works to develop AI systems that understand written
and spoken words and can interact with humans using language.
• Perception: AI systems have senses just as we do. AI systems use sonar, accelerometers,
­infrared, magnetic, and other electronic sensors to gather data. Being able to combine all the
data from sensors and then construct information from it is a difficult challenge.
• Knowledge representation: Knowledge representation involves encoding information about
the world into formats that the AI system can understand. Humans possess a vast collec-
tion of general knowledge based on their experiences in the world. AI systems need to build
knowledge bases to solve problems. Developing a knowledge base and using it efficiently are
active areas of research and have been demonstrated effectively by IBM’s artificial intelligence
­computer Watson.
• Planning: AI systems need to set goals and then achieve them. An AI system might need to plan
how to move a blue block out of the way to reach a red one or how to rotate a block as it moves
to fit through a narrow opening.
• Problem solving: Humans tend to make intuitive judgments when solving a problem rather than
perform a step-by-step analysis. AI programming combines a rules-based approach, along with
trying to make judgments with incomplete information.
• Learning: Like humans, AI algorithms adapt and learn through experience. ­Supervised ­learning
is used when the system can be trained with a huge number of examples. U ­ nsupervised ­learning is
when a system can look at data and build rules on its own to decide what it is seeing.

Table 1.3 Main Areas of AI Research


Natural Language Processing Perception Knowledge Representation

Understanding Using sensors to gather data Storing and accessing


Written and spoken words information about the world

Planning Problem Solving Learning

Goal must be set Using even incomplete information Improve through


and achieved to achieve solution experience

(Convisum/123RF; Andrija Markovic/123RF; Galina Peshkova/123RF; Viktor Bondar/123RF; Tomertu/123RF; Sentavio/123RF)

14 Chapter 1 The Impact of Technology in a Changing World


A project like a self-driving (autonomous) car requires research in many of these areas. The car must
have computer vision—the ability to interpret visual information the way humans do. The AI system
needs to be able to tell the difference between trees and pedestrians, but it also needs to know
many things about trees and people. Is the tree going to run into the path of the car? The car must
scan the scene with sensors, recognize objects, and consult a knowledge base to create and exe-
cute a plan.

What has enabled us to deploy effective AI systems? Many information technology devel-
opments have contributed to the functional AI systems that we have today.

Artificial Neural Networks


Expert systems, computer programs that mimic the experience of human experts such as doctors
or lawyers, were among the first attempts at producing AI. Rules-based systems, software that
asks questions and responds based on preprogrammed algorithms, were the first expert systems
designed. These systems asked questions (“Do you have a fever?”) and initiated other questions
or actions based on the answers (“How long have you had a fever?”) and worked adequately for
some settings. But just a list of rules is not sophisticated enough to handle difficult tasks.

Artificial neural networks (ANNs) are designed based on the structure of the human brain (see
­Figure 1.6), which is a network of loosely connected neurons. When signals are received by a
­neuron, it fires an electrical impulse and the signal travels to all the neurons connected to it. In
ANNs, digital signals take the place of biological signals. Many modern ANNs feature different lay-
ers of neurons that allow many degrees of complexity. ANNs have allowed researchers to tackle
complex problems such as speech recognition.

Machine Learning
Machine learning (ML) is a type of AI that doesn’t need to be specifically programmed. Instead, it
analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the
AI system accordingly. By learning, the AI system can adapt itself and become constantly better at
its task. You have interacted with these kinds of systems if you use Alexa, the Amazon voice recog-
nition device. Alexa gathers input from human speech and uses this information to become better
at understanding language over time.

Deep learning (DL) is a subset of the ML field that describes systems capable of learning from
mistakes, just as humans do. DL algorithms can learn from data that is not labeled as “correct” or
“incorrect.” The algorithm adapts to improve its final result without being presented with a huge,
labeled set of training data. This is known as unsupervised learning.

Having a basic understanding about AI systems is necessary to becoming a digitally literate citizen.
In the next section, we’ll explore various workplace systems that use AI.

Figure 1.6 Human neurons can either send a signal or


block one. Artificial neurons mimic this behavior
digitally. (LuckyStep48/Alamy Stock Photo)

  Artificial Intelligence 15
Another random document with
no related content on Scribd:
β. media. — Feuilles assez grandes (de 6 à 12 centimètres de long
sur 3 à 5 de large), ovales ou ovales-allongées, présentant
souvent la plus grande largeur au-dessus du milieu, obtusément
acuminées, glabres. Jeunes rameaux, nervures et pédoncules
glabres ou finement pubescents. Boutons plus gros que dans la
var. α. Calice urcéolé, à dents peu apparentes. Fleurs assez
grandes, souvent solitaires.

« Senegambia, Heudelot » (Oliver).

Exsiccata. — Croît dans les lieux fertiles et humides de


Karkandy, Heudelot (no 873) !

γ. grandiflora. — Feuilles très grandes (8 à 15 centimètres de long


sur 5 à 8 de large), ovales ou ovales-oblongues, obtuses ou
obtusément acuminées, à nervures et à pédoncules glabres.
Jeunes rameaux ordinairement glabres. Boutons très gros. Calice
trilobé, à lobes larges, obtus. Fleurs grandes, souvent solitaires.
Cette dernière variété, trouvée à Nupe, sur le Niger, par M.
Barter, n’a pas encore été rencontrée au Sénégal.

Distrib. géogr. — Cette espèce a été retrouvée sur les bords


du fleuve San-Iago sur la côte d’Or, à Nupe sur le Niger, et aux
environs de Zanzibar sur la côte orientale de l’Afrique.

Observations. — Cette espèce est très variable. Elle est tantôt


glabre et tantôt pubescente ; les feuilles varient beaucoup de forme
et de dimension. Le calice est ordinairement urcéolé et se déchire
souvent en trois parties lors de l’anthèse, mais j’ai vu des fleurs
ouvertes dans lesquelles la déchirure n’avait pas eu lieu. D’autres
fois le calice est tout à fait trilobé, à lobes arrondis, même dans le
bouton. On pourrait être tenté d’établir plusieurs espèces sur ces
caractères, mais un examen attentif montre qu’il n’y a là que des
formes ou des variétés, car chaque caractère varie séparément, les
autres restant semblables, de sorte qu’on peut trouver tous les
passages entre les diverses variétés de l’espèce. La fleur, quoique
variant en dimension, est toujours semblable, au moins pour ses
caractères essentiels ; les étamines ont toujours la même forme
dans toutes les variétés et présentent les caractères suivants :
Étamines extrorses ; loges longues et étroites, se touchant
presque à la partie inférieure, mais divergeant vers le haut, ce qui
les rejette un peu sur le côté ; filet presque nul ; connectif dilaté au-
dessus des loges, les recouvrant, à surface supérieure aplatie,
polygonale, inclinée, un peu prolongée en corne vers le centre de la
fleur.
Le même rameau porte souvent des feuilles de forme et de
dimension très différentes, de sorte qu’on rencontre tous les degrés
entre la forme à très grandes feuilles et celle à petites feuilles. Nous
croyons qu’il y a lieu d’établir les trois variétés que nous venons
d’énumérer.

15. U. cristata R. Br. mss. in Herb. Mus. Brit. ; Oliver, Fl. trop. Afr. I,
p. 23.

« Sierra Leone, Purdie » (Oliver).

Distrib. géogr. — Cette espèce n’a pas encore été retrouvée.

5. POPOWIA Endl.
(H. Baillon, Hist. des plantes, I, p. 284).

Observation. — Nous comprenons le genre comme l’a délimité


M. Baillon, en réunissant les Clathrospermum (Benth. et Hook. f.
Gen. pl. I, p. 29) aux Popowia (Benth. et Hook. f. Gen. pl. I, p. 25).

16. P. vogelii H. Bn, Adans. VIII, p. 316. — Clathrospermum vogelii


Planch. inéd., Bentham in Linn. Trans. t. XXIII, p. 479 ; Oliver, Fl.
trop. Afr. I, p. 25. — Uvaria ? vogelii Hook. f. Niger Fl., p. 208, pl.
17.

« Sierra Leone, Barter » (Oliver).


Distrib. géogr. — Cette espèce se retrouve sur les côtes de
Guinée et du golfe de Guinée et sur les rives du Niger.

Observations. — Il ne faut pas songer à distinguer cette espèce


des deux autres Popowia de la région sans avoir la fleur ou le fruit.
Les différences des feuilles sont très légères et ne donnent aucun
caractère précis. Dans le P. vogelii, les feuilles sont souvent un peu
cordées à la base, tandis qu’elles sont terminées brusquement ou en
coin dans les deux autres espèces.

17. P. heudeloti H. Bn, Adans. VIII, p. 320.

Fleurit en avril.

« Crescit in depressis fertilibus ad Karkandy Senegambiæ,


Heudelot » (H. Bn).

Exsiccata. — Croît dans les bas-fonds fertiles de Karkandy,


Heudelot (no. 878) !

Distrib. géogr. — Cette espèce n’a pas encore été retrouvée


ailleurs.

18. P. barteri H. Bn, Adans. VIII, p. 324.

« Crescit in Africa tropica occidentali, ad Sierra Leone, ubi in


exped. anglic. ad flum. Nigrum, anno 1857-59, legit Barter » (H. Bn).

Exsiccata. — Sierra Leone, Barter !

Distrib. géogr. — Cette espèce n’a pas encore été retrouvée


ailleurs.

Observations. — Cette espèce a toutes les apparences


extérieures du P. heudeloti H. Bn. On ne peut l’en distinguer qu’en
analysant la fleur pour voir la forme de l’étamine, dont le connectif
est en forme de coin dans le P. heudeloti et en forme de pioche dans
le P. barteri. Le fruit de cette dernière espèce est encore inconnu.
6. HEXALOBUS A. DC.
(Benth. et Hook. f. Gen. pl. I, 24).

19. H. crispiflorus A. Rich. Fl. Cuba, p. 143. — H. grandiflorus


Benth. Linn. Trans. t. XXIII, p. 468, pl. 49 ; Oliver, Fl. trop. Afr. I, p.
27.

Fleurit en avril.

« Crescit in ripis fluminorum Senegambiæ, Heudelot » (Richard).

Exsiccata. — Croît près des ruisseaux du Fouta-Djallon,


Heudelot (no 865) !

Distrib. géogr. — Cette espèce se retrouve sur les côtes du


golfe de Guinée.

Observations. — A. Richard avait publié cette espèce en 1845,


dans la Flore de Cuba, d’après les échantillons recueillis par
Heudelot au Sénégal. Il avait donné la diagnose suivante :

« Hexalobus crispiflorus. — H. fol. elliptico-lanceolatis,


acuminatis, acutissimis, integris, coriaceis, superne glabris, subtus
ferrugineis ; fl. maximis axillaribus ; corolla gamopetala regulari,
sexpartita, campanulata, lobis lanceolatis margine sinuosis. Crescit
in ripis fluminorum Senegambiæ. Arbor procera. »
M. Bentham a publié la même espèce en 1862, dans son
mémoire sur les Anonacées africaines, d’après les échantillons
rapportés par MM. Mann et Barter de la côte de Guinée, et lui a
donné le nom de H. grandiflorus. Il n’avait pas vu la plante de
Heudelot, car il ne la cite pas dans son mémoire, mais il devait
connaître la diagnose donnée par Richard, quoiqu’elle fût égarée
dans la Flore de Cuba, car il cite ce dernier ouvrage à propos des
Xylopia. Il est probable qu’il n’aura pas osé identifier sa plante avec
une simple diagnose. La comparaison des échantillons authentiques
de Heudelot avec la plante de Mann, et la description et l’excellente
figure du mémoire de M. Bentham, nous permettent de réunir les
deux espèces avec certitude. Le nom donné par Richard, étant plus
ancien, doit être conservé.
Ajoutons que M. Bentham aurait été bien pardonnable s’il n’avait
pas connu les diagnoses d’un Hexalobus et d’un Xylopia du Sénégal
isolées au milieu d’une flore des Antilles. On ne saurait trop blâmer
cette habitude qu’ont quelques auteurs de donner dans une flore la
description de plantes appartenant à une flore très différente. Ces
descriptions sont presque perdues pour la science, puisque ce n’est
que le hasard qui peut les faire rencontrer. M. A. de Candolle
condamne les différents genres de publicité qu’il appelle publicité
incomplète, dans lesquels il comprend une note sur les plantes
d’Afrique dans une flore américaine (A. DC. Phytogr. p. 21). C’est
bien le cas qui se présente ici, et il est probable que M. de Candolle
a eu en vue précisément l’exemple que nous venons de citer.

20. H. senegalensis A. DC. Mém. Anon. p. 37 ; Oliver, Fl. trop. Afr.


I, p. 27. — Uvaria monopetala Guill. et Perr. Fl. Sénég. p. 8, pl. 2.

Fleurit de février en mai.

« Crescit in montosis saxosis regionis Galam et ad basim collium


prope Joal » (Guill. et Perr.).
« Senegambia, Leprieur et Perrottet, Heudelot ; Gambia,
Whitfield » (Oliver).

Exsiccata. — Croît dans le Woolli, Saloum, Baol, Heudelot (no


360) ! Sénégal, Leprieur ! Perrottet !

Distrib. géogr. — Cette espèce se retrouve sur les bords du


Niger et dans la région du haut Nil.

7. XYLOPIA L.
(Benth. et Hook. f. Gen. pl. I, 28).
21. X. æthiopica A. Rich. Fl. Cuba, p. 53 (en note) ; Oliver, Fl. trop.
Afr. I, p. 30. — Unona æthiopica Dun. Anon. p. 113 ; DC. Syst.
veget. I, p. 496 ; DC. Prodr. I, p. 91. — Uvaria æthiopica Guill. et
Perr. Fl. Sénég. p. 9. — Habzelia æthiopica A. DC. Mém. Anon. p.
31. — Hablitzia æthiopica Hook. f. Niger Fl. p. 206. — Xylopia
undulata (fruit seulement) P. de Beauv. Fl. Ow. et Ben. I, pl. 16. —
Unona ? undulata (fruit seulement) Dunal, DC. Syst. veget. I, p.
494 ; DC. Prodr. I, p. 9).

Fleurit en novembre et décembre.

« Crescit frequentissime hoc arbor elegans in Palmarum sylvis


Senegambiæ » (Guill. et Perr.).
« Sénégambie, Leprieur, Perrottet, Ingram ; Sierra Leone,
Afzelius, Dr Daniell » (Oliver).
« In Sierra Leone » (DC.).

Exsiccata. — Crescit frequentissime hæc arbor elegans in


Palmarum silvis Senegambiæ, Perrottet !
Sénégal, Adanson (no 197, A.) ! Perrottet (no 9) ! Heudelot (no
566) !

Distrib. géogr. — Cette espèce se retrouve sur la côte de


Guinée, dan le golfe de Guinée, sur les bords du Niger et au Gabon.

Observations. — On sait que la figure de Palisot de Beauvois


avait été faite d’après deux échantillons d’espèces différentes et
attribués à tort à la même espèce. Le fruit appartient au Xylopia
æthiopica, et la fleur est celle du Monodora myristica Dunal.

22. X. parviflora Vallot (non Benth.) (non Oliver). — Uvaria


parviflora Guill. et Perr. Fl. Sénég. p. 9, pl. 3, fig. 1. — Cœlocline
parviflora A. DC. Mém. Anon. p. 33 ; Hook. f. Niger Fl. p. 207. —
X. acutiflora Benth. Linn. Trans. t. XXIII, p. 478 (non A. Rich.) ;
Oliver, Fl. trop. Afr. I, p. 32 (non A. Rich.). — X. acutiflora (fruit
seulement) Dunal, Anon. p. 116, pl. 22. — Barter, Exsicc. no 426 et
no 1035.

Feuilles alternes, ovales-oblongues, obtuses, obtusément


acuminées ou rétuses, coriaces, glabres en dessus, glabres ou
pubescentes en dessous, petites (2,5 à 6 cent. de long sur 1 à 3
cent. de large) ; pétioles très courts (2 à 3 mill.). Fleurs petites (de 5
à 15 mill. de long), longuement acuminées, axillaires, 1 à 3
ensemble, sur de longs pédoncules (de 8 à 12 mill.) portant 2 ou 3
bractéoles squamiformes espacées, alternes. Calice trilobé, à lobes
aigus. Pétales longuement acuminés, linéaires, soyeux. Fruits
formés d’un petit nombre de baies subsessiles, oblongues, épaisses,
deux fois plus longues que larges, de la grosseur d’une olive.

Fruits en mars et avril.

« Crescit ad oram sylvarum et in locis siccis riparum


Casamanciæ prope Maloum » (Guill. et Perr.).

Exsiccata. — Crescit frequens ad oram sylvarum et in locis


siccis riparum Casamanciæ prope Maloum, Perrottet (no 7) !
Casamance, Perrottet !
In sabulosis prope Maloum. Cap Rouge ; pays des Feloupes,
Leprieur !

Distrib. géogr. — Cette espèce se retrouve sur la côte de


Guinée, sur les rives du Niger et au Congo.

Observations. — Nous avons cru devoir donner une description


abrégée de cette espèce, qui a été méconnue par M. Bentham et
décrite par cet auteur sous le nom de X. acutiflora A. Rich. (voyez
les observations au X. acutiflora.)

23. X. dunaliana Vallot. — Unona acutiflora (fr. exclus.) Dun. Anon.


p. 116, pl. 22 ; DC. Syst. veget. I, p. 498 ; DC. Prodr. I, p. 92. —
Cœlocline acutiflora (fr. exclus.) A. DC. Mém. Anon. p. 32, pl. 5, C.
— Xylopia acutiflora (fr. exclus.) A. Rich. Fl. Cuba, p. 55 (en note),
(non Benth. Linn. Trans. t. XXIII, p. 478), (non Oliver, Fl. trop. Afr.
I, p. 32). — Xylopia parviflora (fr. exclus.) Benth. Linn. Trans. t.
XXIII, p. 479 ; Oliver, Fl. trop. Afr. I, p. 31. — Unona oxypetala DC.
Syst. veget. I, p. 496 (ex descriptione) ; DC. Prodr. I, p. 91 (ex
descript.). — Cœlocline ? oxypetala A. DC. Mém. Anon. p. 33 (ex
descript.). — Mann, Exsicc. no 914.

Feuilles ovales-lancéolées, aiguës ou acuminées, raides,


glabres, petites (de 5 à 8 cent. de long sur 1,5 à 2,5 cent. de large) ;
pétioles très courts (2 à 3 mill.). Fleurs variables (de 0,5 à 2 cent. de
long), tantôt allongées et acuminées, tantôt brusquement coniques
et très courtes, axillaires, solitaires, presque sessiles ; pédicelles très
courts, à peine de la longueur du pétiole, recouvert par de petites
bractées alternes, imbriquées. Calice trilobé, à lobes aigus. Pétales
soyeux, allongés acuminés, ou courts triangulaires. Fruit inconnu.

« In Sierra Leona, Smeathman, Afzelius » (DC.).


« Sénégambie, Perrottet » (H. Baillon).

Distrib. géogr. — Cette espèce a été retrouvée sur les côtes


du golfe de Guinée et sur les bords du Niger.

Observations. — Nous avons donné une description abrégée


de cette plante à cause des confusions dont elle a été l’objet.

1o Cette espèce, qui est en partie l’Unona acutiflora de Dunal, a


été l’objet de plusieurs erreurs. M. Bentham la donne sous le nom de
X. parviflora, tandis qu’il décrit cette dernière espèce en la nommant
X. acutiflora. Du reste, M. Bentham, qui, je crois, n’a pas eu
l’occasion de consulter les types du X. parviflora recueillis par
Perrottet, n’était pas certain d’avoir bien déterminé ces deux plantes,
comme il le fait remarquer dans son mémoire : « I do not feel at all
confident... in my having correctly identified our specimens. » La
description qu’il donne du X. acutiflora est en complet désaccord
avec celle de Dunal.
Nous mettons ici en parallèle les caractères les plus distinctifs
des deux espèces controversées :
Unona acutiflora Dun. (d’après la description et la figure de
Dunal). — Fleurs axillaires, presque sessiles, solitaires ; pédoncules
très courts, à peine de la longueur des pétioles (2 millim. envir.),
recouverts par les bractéoles imbriquées. Fleurs tantôt allongées et
acuminées, tantôt brusquement coniques et très courtes, variant
ainsi de 0,5 à 2 centimètres.
Uvaria parviflora Guill. et Perr. (d’après la description, la figure et
les échantillons de Perrottet). — Fleurs axillaires, pédonculées,
réunies par 1-3 ; pédoncules de 8 à 12 millim. de long, portant 2 ou 3
bractéoles courtes, espacées. Baies peu nombreuses, grosses et
courtes, en forme d’olive.
La forme des feuilles est variable et ne peut guère servir, dans
une description, à distinguer les deux espèces. Les feuilles sont
aiguës, obtuses ou un peu acuminées dans l’Unona parviflora ; elles
sont aiguës ou longuement acuminées dans l’Uvaria acutiflora.
Dunal a décrit les feuilles de l’Unona acutiflora comme aiguës,
mais M. A. de Candolle, qui décrit la plante d’après le même
échantillon, les donne comme acuminées. Du reste, dans la figure
de Dunal, les feuilles supérieures sont aiguës et les inférieures
longuement acuminées.
Ces éléments posés, nous allons aborder la discussion des
espèces de M. Bentham.
2o La plante recueillie par M. Mann à Bagroo river, décrite par M.
Bentham sous le nom de X. parviflora et que j’ai pu examiner au
Muséum, a les feuilles longuement acuminées ; les fleurs sont
presque sessiles et variables, les unes allongées, les autres très
courtes, grosses et coniques, comme on en voit dans la figure de
l’Unona acutiflora de Dunal et comme les décrit M. Bentham,
« petalis brevioribus crassioribus », au X. parviflora. On voit que
cette plante est très différente de l’Uvaria parviflora de Perrottet, qui
a de longs pédoncules et des feuilles obtuses, aiguës ou rarement
brièvement acuminées, tandis qu’elle s’accorde précisément avec la
description de l’Unona acutiflora de Dunal. Le Xylopia parviflora
Benth. doit donc être rapporté à l’Unona acutiflora Dunal, c’est-à-dire
au Xylopia dunaliana Vallot.
3o M. Bentham donne, pour le X. acutiflora, les caractères
suivants : « ... Pedicelli calyce longiores... Baccæ paucæ, 1-1 1/2
poll. longæ, 1/2 poll. crassæ. » La longueur des pédicelles et la
forme du fruit suffisent à montrer que cette description s’applique à
l’Uvaria parviflora Guill. et Perr., et non à l’Unona acutiflora Dun. M.
Bentham a décrit cette espèce d’après les échantillons récoltés par
Barter sur le Niger. Nous avons examiné la plante de Barter au
Muséum, nous l’avons comparée aux échantillons authentiques de
Perrottet, et nous avons pu nous convaincre de l’identité des deux
plantes. On retrouve dans la plante de Barter, outre le même facies,
les fleurs souvent agrégées par 2 ou 3 à l’aisselle des feuilles, les
pédoncules longs et ne portant que 2 ou 3 petites bractées
espacées, que l’on voit sur les échantillons en fruit de Perrottet. Le
Xylopia acutiflora Bentham doit donc être rapporté à l’Uvaria
parviflora Guill. et Perr., qui est aujourd’hui le Xylopia parviflora
Richard.
4o Dunal a représenté le fruit de l’Unona acutiflora pourvu d’un
pédoncule de 3 centimètres de long. Des doutes ont été émis par A.
Richard sur l’authenticité de ce fruit, qui pourrait bien avoir été joint à
l’Unona acutiflora par suite d’une erreur d’herbier.
On sait que dans certaines Anonacées les pédoncules
s’allongent à mesure que le fruit mûrit ; il faut donc, pour pouvoir
trancher la question, chercher si cet allongement existe et est
considérable dans les espèces voisines de celle que nous
considérons.
Perrottet ne connaissait pas la fleur de l’Unona parviflora, mais
on trouve sur ses échantillons des fruits à tous les états
d’avancement, depuis le moment où la corolle vient de tomber,
jusqu’à la maturité complète du fruit. En examinant les échantillons
et les comparant à ceux en fleur et en fruit de Barter, nous avons pu
nous convaincre que le pédicelle grossit presque sans s’allonger, à
mesure que le fruit mûrit. De même, dans le Xylopia æthiopica, le
pédoncule s’allonge très peu et le fruit est presque sessile, comme
la fleur.
Il n’est donc pas probable que l’Unona acutiflora Dun., dont les
fleurs sont presque sessiles et assez semblables à celles du X.
æthiopica, s’éloigne assez des espèces voisines pour avoir un fruit
dont le pédoncule s’allonge énormément et deviendrait aussi long
que celui du X. parviflora dont les fleurs sont longuement
pédonculées. De plus, la figure donnée par Dunal semble avoir été
faite pour représenter un fruit de X. parviflora que nous avons sous
les yeux. Nous croyons donc que le fruit de l’Unona acutiflora Dun.
est encore inconnu, et que la figure de Dunal représente le fruit du
X. parviflora, joint par erreur à l’échantillon de l’Unona acutiflora.
Le nom d’Unona acutiflora s’applique dès lors à la description de
la fleur d’une espèce et du fruit d’une autre espèce ; il ne peut donc
subsister. Nous proposons de donner à cette espèce le nom de
Dunal, qui l’avait décrite le premier, et, la rétablissant dans le genre
Xylopia, nous l’appellerons Xylopia dunaliana.
5o L’Unona oxypetala DC. a été signalé par plusieurs auteurs
comme très voisin de l’Unona acutiflora Dun. D’après de Candolle, il
n’en est guère différent que par ses feuilles, aiguës dans l’Unona
acutiflora et acuminées dans l’Unona oxypetala, et par la forme de
son fruit. Nous avons vu que l’Unona acutiflora a souvent les feuilles
acuminées ; il n’y a donc que le fruit qui diffère. Le fruit de l’Unona
oxypetala est inconnu, mais les cicatrices du torus montrent qu’il doit
être composé de 15 à 20 carpelles, comme dans le Xylopia
æthiopica. C’est ce grand nombre de carpelles qui empêchait de
réunir l’Unona oxypetala. à l’U. acutiflora. Mais comme nous avons
vu que le fruit pauci-carpellé figuré par Dunal n’appartient pas à sa
plante, nous croyons pouvoir réunir l’Unona oxypetala à l’U.
acutiflora, c’est-à-dire au Xylopia dunaliana.
Ajoutons, en terminant, que le X. dunaliana est une espèce très
variable, ne se distinguant guère du X. æthiopica, aussi très
variable, qu’en ce qu’elle est plus petite dans toutes ses parties.
Certains échantillons des deux plantes sont tellement voisins, que
nous ne serions pas étonné qu’on ne fût un jour obligé de les réunir
en une seule espèce. Mais il faudrait pour cela avoir un plus grand
nombre d’échantillons intermédiaires et connaître le fruit du X.
dunaliana.

24. X. ? polycarpa Oliver, Fl. trop. Afr. I, p. 32. — Anona ? polycarpa


DC. Syst. veget. I, p. 499 ; DC. Prodr. I, p. 92. — Cœlocline
polycarpa A. DC. Mém. Anon. p. 33. — Melodorum ? polycarpum
Benth. Linn. Trans. t. XXIII, p. 477.

« In Sierra Leona, Afzelius » (DC.).


« Sierra Leone, Afzelius, Daniell » (Oliver).

Distrib. géogr. — Cette espèce n’a pas été retrouvée en


dehors de la Sierra Leone.

8. MONODORA Dunal
(Benth. et Hook. f. Gen. pl. I, 26).

25. M. tenuifolia Benth. Linn. Trans. t. XXIII, p. 475 ; Oliver, Fl. trop.
Afr. I, p. 38.

Fruits en avril.

Exsiccata. — Croît dans les lieux ombragés de Karkandy,


Heudelot (no 872) !

Distrib. géogr. — Cette espèce se retrouve sur les côtes du


golfe de Guinée, sur les rives du Niger et à Fernando-Po.

Observations. — On observe sur cette espèce un curieux


phénomène de déviation du rameau florifère : « La fleur est portée
sur le côté d’un rameau de l’année, mais elle est seule à ce niveau
et placée bien au-dessous de la première des feuilles que porte ce
jeune rameau. Plus tard le pédoncule s’allonge et s’épaissit, et c’est
le rameau florifère qui, déjeté et relativement peu volumineux, a l’air
d’être inséré sur le côté du pédoncule. » (H. Baillon, Hist. des
plantes, I, p. 249.)

I V. MÉN ISPERMACÉES

(Meni sper meæ Juss. p. 284).

9. TINOSPORA Miers
(Benth. et Hook. f. Gen. pl. I, 34).

26. T. bakis Miers in Ann. nat. Hist. ser. 2, t. VII, p. 38 ; Oliver Fl.
trop. Afr. I, p. 43. — Cocculus bakis Rich. Fl. Sénég. p. 12 pl. 4.

« Crescit in collibus arenosis ad sylvarum oras et ad sepes regni


Cayor, et prope Lamsar in regno Walo » (Guill. et Perr.).
« Senegambia, Leprieur ad Heudelot » (Oliver).

Exsiccata. — Lamsar, Walo, Perrottet !


Ad sepes Albreda, Gambie !
Sénégal, Heudelot ! Richard !

Distrib. géogr. — Cette espèce a été retrouvée dans le


Sennaar (Nubie).

10. COCCULUS DC.


(Benth. et Hook. f. Gen. pl. I, 36).

27. C. læeba DC. Syst. veget. I, p. 529 ; DC. Prodr. I, p. 99 ; Guill. et


Perr. Fl. Sénég. p. 13 ; Schmidt, Fl. Cap Verd. p. 259 ; Hook. f.
Niger Fl. I, p. 97 ; Oliver, Fl. trop. Afr. I, p. 44. — Læeba Forsk. Fl.
Ægypt. p. 172 ; Juss. Gen. p. 285. — Menispermum læeba Delile,
Fl. Ægypt. p. 140, pl. 51, fig. 2 et 3. — Menispermum ellipticum
Poiret, Suppl. III, p. 657. — Cocculus ellipticus DC. Syst. veget. I,
p. 526 ; DC. Prodr. I, p. 99. — Epibatherium pendulum Forst. Gen.
pl. 54. — Cocculus epibatherium DC. Syst. veget. I, p. 530 ; DC.
Prodr. I, p. 100. — Menispermum edule Vahl, Symb. I, p. 80. —
Cocculus cebatha DC. Syst. veget. I, p. 527 ; DC. Prodr. I, p. 99 ;
Hook. f. Niger Fl. p. 215.

Fleurit en septembre et octobre et de nouveau en février et mars.

« Crescit frequentissimus ubique in sabulosis Senegambiæ »


(Guill. et Perr.).
« Senegambia, Perrottet, Heudelot » (Oliver).
« In Senegalia » (DC.).

Exsiccata. — Croît dans les sables du Walo, Heudelot (no 529) !


Sénégal, Perrottet (no 11) ! Leprieur ! Richard ! Geoffroy !

Distrib. géogr. — Cette espèce occupe une aire très vaste. On


la retrouve aux îles du Cap-Vert, dans l’Angola, dans le Bornou
(Soudan), en Egypte, en Abyssinie, en Arabie et jusque dans les
Indes et l’Afghanistan.

11. CISSAMPELOS L.
(Benth. et Hook. f. Gen. pl. I, 37).

28. C. pareira L. ; Lamk, Illustr. pl. 830 ; DC. Syst. veget. I, p. 533 ;
DC. Prodr. I, p. 100 ; Hook. et Th. Fl. Ind. I, p. 198 ; Oliver, Fl. trop.
Afr. I, p. 45. — C. caapeba DC. Syst. veget. I, p. 536 ; DC. Prodr.
I, p. 101. — C. convolvulacea Willd. ; DC. Syst. veget. I, p. 536 ;
DC. Prodr. I, p. 101. — C. mauritiana Thouars ; DC. Syst. veget. I,
p. 535 ; DC. Prodr. I, p. 101. — C. orbiculata DC. Syst. veget. I, p.
537 ; DC. Prodr. I, p. 101. — C. hirsuta, C. tomentosa DC. Syst.
veget. I, p. 535 ; DC. Prodr. I, p. 101. — C. microcarpa DC. Syst.
veget. I, p. 534 ; Prodr. I, p. 101. — C. mucronata A. Rich. Fl.
Sénég. p. 11. — C. comata Miers in Hook. f. Niger Fl. p. 215. — C.
vogelii Miers in Hook. f. Niger Fl. p. 214 (quoad pl. masc.). —
Menispermum orbiculatum L. — Cocculus orbiculatus DC. Syst.
veget. ; DC. Prodr. I, p. 98.

Fleurit en septembre et octobre.

« Crescit frequens in sylvulis regni Walo » (Guill. et Perr.).


« Senegambia, Heudelot, etc. » (Oliver).

Exsiccata. — In sylvis Dagana, Ouallo, Sénégal, Leprieur !


In sylvis Gambiæ. Albreda, Leprieur !
Pays de Kombo (embouchure de la Gambie).
Dans les champs cultivés de l’île Sainte-Marie, Hudelot (no 66) !
Croît dans toute la Sénégambie, Heudelot (no 569) !
Sénégal, Walo, Perrottet !
Sénégal, Perrottet (no 332) ! Morenas ! Heudelot ! Boivin (no
420) !

Distrib. géogr. — Cette espèce occupe une aire très vaste.


Elle se trouve dans toute la région tropicale, en Afrique, en Asie et
en Amérique.

12. TRICLISIA Benth.


(Benth. et Hook. f. Gen. pl. I, 39).

29. T ? patens Oliver, Fl. trop. Afr. I, p. 49.

Fleurit en Janvier.
Exsiccata. — Croît au bord des eaux vives du Fouta-Djallon,
Heudelot (no 740) !

Distrib. géogr. — Cette espèce a été trouvée à Bagroo river,


sur la côte de Guinée.

Observations. — Les échantillons de Heudelot que j’ai pu


consulter ne renferment que des inflorescences mâles, nées sur le
vieux bois, sans tiges ni feuilles. Mais la forme de ces inflorescences
et celle des fleurs, comparées à celles des échantillons complets de
M. Mann, ne laissent aucun doute sur l’identité de cette curieuse
espèce. On ne connaît pas les fleurs femelles des Triclisia.

V. NYMPHÉACÉES

(N ymphea c eæ DC. Syst. II, p. 39).

13. NYMPHÆA L.

(Benth. et Hook. f. Gen. pl. I, 46).

30. N. lotus L.

β. ortgiesiana Planch. Nymph. (Ann. sc. nat. sér. 3, XIX, p. 41). — N.


lotus L. ; DC. Syst. veget. II, p. 53 ; DC. Prodr. I, p. 115 ; Guill. et
Perr. Fl. Sénég. p. 14 ; Palis. Beauv. Fl. Ow. et Ben. ; Oliver, Fl.
trop. Afr. I, p. 52. — N. lotus β. pubescens Guill. et Perr. Fl. Sénég.
p. 14. — N. dentata Sch. et Thon. Guin. pl. II, p. 23 ; Planch. in
Van Houtte Fl. des serres, t. 6. — N. ortgiesiana Planch. ibid. t. 8.

Fleurit en septembre, octobre, etc.

« Crescit in paludosis provinciæ Walo Senegaliæ ad ripas


fluminis » (Guill. et Perr.).
« Senegambia, Perrottet, Brunner » (Oliver).
« Sierra Leone, Whitfield ; Sénégambie, Roger, Brunner »
(Planchon).

Exsiccata. — Isle Saint-Louis au Sénégal, Richard !

Distrib. géogr. — Cette espèce se retrouve sur les côtes de la


Guinée et du golfe de Guinée, au Congo, dans le Soudan, en
Egypte, dans la région des grands lacs, à Madagascar et jusque
dans les Indes.

31. N. cærulea Savign. Décad. Ægypt. III, p. 74, et Ann. Mus. par. I,
p. 366, pl. 25 ; Herb. amat. pl. 338 ; DC. Syst. veget. II, p. 50 ; DC.
Prodr. I, p. 144 ; Delile, Ill. Fl. Ægypt., pl. 62, f. 2 ; Guill. et Perr. Fl.
Sénég. p. 15 ; Planch. in Van Houtte, Fl. des serres, t. 7, pl. 653 ;
Planch. Nymph. (Ann. sc. nat. sér. 3, t. XIX, p. 41). — N. cyanea
Hortul. plurim. (non Roxb.). — N. maculata Sch. et Th. Guin. pl.
(ex descr.). — N. rufescens Guill. et Perr. Fl. Sénég. p. 15. — N.
micrantha Guill. et Perr. Fl. Sénég. p. 16. — N. stellata Oliver, Fl.
trop. Afr. I, p. 52 (non Willd.).

Fleurit de septembre en janvier et presque toute l’année.

« Crescit in paludosis provinciæ Walo et ubique in Senegalia »


(Guill. et Perr.).
« Crescit in paludosis provinciæ Walo Senegaliæ » (Guill. et Perr.
sub N. rufescens).
« Crescit in paludosis peninsulæ promontorii Viridis prope
N’Batal ; in regione Galam ; in Cayor, etc. » (Guill. et Perr. sub N.
micrantha).

Exsiccata. — Marais, Sénégal, Morel !


Marais du Carbango, Leprieur !
Decanbango, Leprieur !
N’Batal, cap Vert, Perrottet !
Sénégal, Perrottet (no 13) ! (no 115), etc.
Sénégal, Adanson (no 135, B.) !

Distr. géogr. — Cette espèce habite l’Afrique septentrionale et


occidentale, tropicale et subtropicale.

Observations. — Cette espèce a été réunie au N. stellata par


M. Oliver. Après avoir étudié les nombreux échantillons de l’herbier
du Muséum, nous nous rangeons à l’opinion de M. Planchon, qui
conserve les deux espèces. Le N. stellata est normalement plus petit
dans toutes ses parties ; le N. cærulea présente quelquefois des
formes appauvries, à petites fleurs et à petites feuilles (N. micrantha
Guill. et Perr.), mais ces formes sont rares et ne sont jamais
absolument semblables au N. stellata. Le principal caractère qui
servira à distinguer le N. cærulea réside dans le stigmate, qui est
pourvu de 16 rayons au moins, tandis qu’il n’en a que 8-12 dans le
N. stellata. Le N. stellata a les feuilles presque toujours dentées :
c’est une plante des Indes, qui ne se retrouve pas en Afrique.

32. N. heudeloti Planch. Nymph. (Ann. sc. nat. sér. 3, t. XIX, p. 41).
— N. stellata Oliver, Fl. trop. Afr. I, p. 52 (non Willd.).

« Senegambia, in rivulis haud altis ditionis Fouta-Dhiallon,


Heudelot no 844 » (Planchon).

Exsiccata. — Croît dans les eaux courantes peu profondes du


Fouta-Djallon, Heudelot (no 844) !

Distrib. géogr. — Cette espèce n’a pas été retrouvée ailleurs.

Observations. — Nous ne croyons pas qu’on puisse réunir cette


espèce au N. stellata, auquel elle ressemble par sa petite taille et
par le petit nombre de ses pétales et des rayons de son stigmate.
Elle en diffère surtout par ses graines absolument lisses, tandis
qu’elles sont pourvues de côtes longitudinales dans le N. stellata. Le
même caractère sépare le N. heudeloti de la forme à petites fleurs
du N. cærulea et du N. abbreviata. Il diffère aussi de ces deux
espèces par son stigmate à 8-10 rayons, au lieu de 16-20, et ses
fleurs à 5-8 pétales, au lieu de 10 ou un plus grand nombre.

33. N. abbreviata Guill. et Perr. Fl. Sénég. p. 16 ; Planchon, Nymph.


— N. stellata Oliver, Fl. trop. Afr. I, p. 52 (non Willd.).

Fleurit en mars et avril.

« Habitat in aquis stagnantibus Casamanciæ ad Kounoun, in


peninsula promontorii Viridis » (Guill. et Perr.).
« Sénégal » (Planchon).

Exsiccata. — Kounoun, cap Vert, Perrottet !


Sénégambie, Perrottet !

Distrib. géogr. — Cette espèce n’a pas encore été retrouvée


ailleurs.

Observations. — Cette espèce, très différente du N. stellata par


le nombre plus grand des rayons du stigmate (15 au lieu de 8-12),
peut être facilement distinguée du N. cærulea par ses graines, tout à
fait globuleuses et munies de côtes plus saillantes.

V I. PA PAVÉRACÉES

(Papav er a c e æ Juss. p. 236).

14. ARGEMONE L.

(Benth. et Hook. f. Gen. pl. I, 52).

34. A. mexicana L. ; DC. Syst. veget. II, p. 85 ; DC. Prodr. I, p. 120 ;


Guill. et Perr. Fl. Sénég. p. 18 ; Oliver, Fl. trop. Afr. I, p. 54 ; Lamk
Dict. pl. 252.

« Crescit in sabulosis promontorii Viridis et inter rupes insularum


adjacentium » (Guill. et Perr.).
« Senegambia, Leprieur » (Oliver).

Exsiccata. — In cultis. Cayor, Leprieur !


Toute l’année, sur les bords du fleuve. Entre Bakel et Fangalla,
Carrey (no 60) !

Distrib. géogr. — Cette espèce est très répandue dans la


région tropicale, en Afrique, en Amérique, en Asie et en Océanie.
Elle se trouve aussi au Cap.

V II . CR UCIF ÈRE S

(Cr uc i fer æ Juss. p. 237).

15. NASTURTIUM Br.


(Benth. et Hook. f. Gen. pl. I, 59).

35. N. humifusum Guill. et Perr. Fl. Sénég. p. 19 ; Oliver, Fl. trop.


Afr. I, p. 58.

Fleurit de novembre à mars.

« Crescit copiose in inundatis argillosis prope la Sénégalaise et


circa rivum dictum Marigot de N’ghiang, in regno Walo » (Guill. et
Perr.).
« Senegambia, Heudelot, Perrottet » (Oliver).

Exsiccata. — Terrains inondés du Walo, Leprieur !

You might also like