Technology in Action Complete 16Th Edition Kendall E Martin Online Ebook Texxtbook Full Chapter PDF
Technology in Action Complete 16Th Edition Kendall E Martin Online Ebook Texxtbook Full Chapter PDF
https://ebookmeta.com/product/technology-in-action-complete-
global-edition-alan-evans/
https://ebookmeta.com/product/technology-in-action-
complete-16-global-edition-mary-anne-poatsy/
https://ebookmeta.com/product/quarkus-in-action-meap-v03-martin-
stefanko/
https://ebookmeta.com/product/primary-mathematics-3a-hoerst/
Systems Analysis and Design Global Ed 10th Edition
Kenneth E. Kendall
https://ebookmeta.com/product/systems-analysis-and-design-global-
ed-10th-edition-kenneth-e-kendall/
https://ebookmeta.com/product/istio-in-action-1st-edition-
christian-e-posta/
https://ebookmeta.com/product/quarkus-in-action-meap-v07-martin-
stefanko-jan-martiska/
https://ebookmeta.com/product/learning-in-public-1st-edition-
courtney-e-martin/
https://ebookmeta.com/product/business-in-action-tenth-global-
edition-courtland-l-bovee/
TECHNOLOGY 16E
IN ACTION
ALAN EVANS
COMPLETE
KENDALL MARTIN
MARY ANNE POATSY
Don’t just read about technology, interact with it.
HELPDESKS SOUND BYTES IT SIMULATIONS
These highly-interactive, almost game- These multimedia lessons demystify IT Simulations are detailed, interactive
like simulations let you take the role of complex computer concepts with short scenarios covering the core chapter
a helpdesk staffer where you answer audio, animation, or video. The Sound topic. Students work through the
computer technology questions from Bytes now also include integrated simulations to apply what they have
customers. These simulations help learning objectives, a summary, learned and demonstrate understanding
reinforce the book content in a fun, and a quiz. in an active learning environment.
engaging way.
You will find the Helpdesks, Sound Bytes, and IT Simulations in MyLab IT.
16th Edition
Technology
in Action
Complete
Copyright © 2020, 2019, 2018 by Pearson Education, Inc., All rights reserved. Manufactured in the United States of America. This
publication is protected by copyright and permission should be obtained from the publisher prior to any prohibited reproduction,
storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise.
For information regarding permissions, request forms and the appropriate contacts within the Pearson Education Global Rights &
Permissions department, please visit www.pearsoned.com/permissions/
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps
or all caps.
Library of Congress Cataloging-in-Publication Data
Names: Evans, Alan (Alan D.), author. | Martin, Kendall (Kendall E.), author.
| Poatsy, Mary Anne, author.
Title: Technology in action. Complete / Alan Evans, Kendall Martin, Mary Anne
Poatsy.
Description: 16th edition. | NY, NY : Pearson, [2020] | Includes index.
Identifiers: LCCN 2018055748 | ISBN 9780135435199 | ISBN 0135435196
Subjects: LCSH: Microcomputers. | Computer science. | Computer networks. |
Information technology.
Classification: LCC QA76.5 .E9195 2020 | DDC 004—dc23
LC record available at https://lccn.loc.gov/2018055748
1 18
Chapter 1
The Impact of Technology in a Changing World ......................................................................... 2
Chapter 2
Looking at Computers: Understanding the Parts ..................................................................... 36
Chapter 3
Using the Internet: Making the Most of the Web’s Resources .................................................. 80
Chapter 4
Application Software: Programs That Let You Work and Play ................................................. 120
Chapter 5
System Software: The Operating System, Utility Programs, and File Management ................. 158
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System ......................................... 198
Chapter 7
Networking: Connecting Computing Devices ......................................................................... 240
Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics .......................................................... 272
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ........................................... 322
Chapter 10
Behind the Scenes: Software Programming ........................................................................... 368
Chapter 11
Behind the Scenes: Databases and Information Systems ...................................................... 412
Chapter 12
Behind the Scenes: Networking and Security in the Business World ...................................... 456
Chapter 13
Behind the Scenes: How the Internet Works .......................................................................... 498
Appendix A
The History of the Personal Computer ....................................................................................A-1
Appendix B
Careers in IT ...........................................................................................................................B-1
Glossary................................................................................................................................. G-1
Index........................................................................................................................................ I-1
iii
Contents
Chapter 1
The Impact of Technology in a Changing World ...................................................... 2
Part 1: Technology in Society ................................................................................................................................................ 4
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national
and global issues.
Technology in a Global Society ............................................................................................................................. 4
Impact of Tools of Modern Technology .................................................................................................................. 4
Objective 1.1 Describe various technological tools being used to impact national and global issues.
Global Issues ......................................................................................................................................................... 5
Objective 1.2 Describe various global social issues that are being affected by technology.
Technology Connects Us with Others .................................................................................................................. 6
Technology Impacts How and Why We Connect and Collaborate .......................................................................... 6
Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others.
Technology Impacts How We Consume ................................................................................................................ 7
Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services.
The Importance of Computer Literacy ................................................................................................................. 8
Computer Literacy ................................................................................................................................................. 8
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
HELPDESK: Technology Impacts ............................................................................................................................................. 8
SOUND BYTE: Virtual Computer Tour ...................................................................................................................................... 8
TRY THIS: What Does Facebook Know about You? ........................................................................................... 11
MAKE THIS: TOOL: IFTTT.com (If This Then That) .............................................................................................. 12
Part 2: Emerging Technologies and Ethical Computing .................................................................................................... 13
Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how
technology creates new ethical debates.
Artificial Intelligence ............................................................................................................................................. 13
Artificial Intelligence Basics .................................................................................................................................. 13
Objective 1.6 Describe artificial intelligence systems and explain their main goals.
HELPDESK: The Impact of Artificial Intelligence ...................................................................................................................... 13
ETHICS IN IT: Ethics in Computing .................................................................................................................... 16
Working with Artificial Intelligence and Other Information Technologies ....................................................... 17
Technology and Your Career ................................................................................................................................ 17
Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers.
BITS&BYTES: Is It AI or Human? Take a Turing Test! .......................................................................................... 19
DIG DEEPER: Augmented and Virtual Realities ................................................................................................... 21
Ethical Computing ................................................................................................................................................ 22
Defining Ethics ..................................................................................................................................................... 22
Objective 1.8 Define ethics and examine various ethical systems.
SOUND BYTE: How to Debate Ethical Issues ......................................................................................................................... 22
Personal Ethics .................................................................................................................................................... 23
Objective 1.9 Describe influences on the development of your personal ethics.
Ethics and Technology ......................................................................................................................................... 25
Objective 1.10 Present examples of how technology creates ethical challenges.
SOLVE THIS: How Technology Is Used on the World Stage and in Your Personal Life ......................................... 35
iv Contents
Chapter 2
Looking at Computers: Understanding the Parts ................................................... 36
Part 1: Understanding Digital Components ....................................................................................................................... 38
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer ........................................................................................................................... 38
Computers Are Data Processing Devices ............................................................................................................ 38
Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information.
Binary: The Language of Computers ................................................................................................................... 39
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
SOUND BYTE: Binary Numbers Interactive ............................................................................................................................ 39
Types of Computers ............................................................................................................................................ 41
Objective 2.3 List common types of computers, and discuss their main features.
ACTIVE HELPDESK: Understanding Bits and Bytes .............................................................................................................. 41
BITS&BYTES: Today’s Supercomputers: Faster Than Ever ................................................................................. 45
Input Devices ........................................................................................................................................................ 45
Physical Keyboards and Touch Screens .............................................................................................................. 45
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices ......................................................................................................................... 47
Objective 2.5 Describe the main types of mice and pointing devices.
DIG DEEPER: How Touch Screens Work ........................................................................................................... 48
BITS&BYTES: Distributed Computing: Putting Your Computer to Work While You Sleep .................................... 49
Image, Sound, and Sensor Input ......................................................................................................................... 49
Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
Output Devices ................................................................................................................................................. 51
Image and Audio Output ..................................................................................................................................... 51
Objective 2.7 Describe options for outputting images and audio from computing devices.
BITS&BYTES: Near Field Communication (NFC): Pay (or Get Paid) Anywhere with Your Phone .......................... 53
Printers ................................................................................................................................................................ 53
Objective 2.8 Describe various types of printers, and explain when you would use them.
BITS&BYTES: Medical Devices and 3D Printing ................................................................................................. 56
TRY THIS: What’s Inside My Computer? ............................................................................................................ 58
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................... 59
Part 2: Processing, Storage, and Connectivity ................................................................................................................... 60
Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices
connect to a computer system.
Processing and Memory on the Motherboard ................................................................................................... 60
The Motherboard and Memory ............................................................................................................................ 60
Objective 2.9 Describe the functions of the motherboard and RAM.
SOUND BYTE: Smartphones Are Really Smart ...................................................................................................................... 61
Processing .......................................................................................................................................................... 61
Objective 2.10 Explain the main functions of the CPU.
Storing Data and Information .......................................................................................................................... 62
Storage Options on Computing Devices .............................................................................................................. 62
Objective 2.11 Describe the various means of storing data and information with computing devices.
ETHICS IN IT: What Is Ethical Computing? ......................................................................................................... 64
TRENDS IN IT: Green Computing (Green IT) ...................................................................................................... 65
Connecting Peripherals to the Computer .......................................................................................................... 66
Computer Ports ................................................................................................................................................... 66
Objective 2.12 Describe common types of ports used today.
HELPDESK: Exploring Storage Devices and Ports .................................................................................................................. 66
Contents v
Power Management and Ergonomics ................................................................................................................ 67
Power Controls and Power Management ............................................................................................................. 67
Objective 2.13 Describe how to manage power consumption on computing devices.
Setting It All Up: Ergonomics ............................................................................................................................... 69
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
BITS&BYTES: Sleep Better and Avoid Eyestrain: Use Less Blue Light ................................................................ 69
SOLVE THIS: Technology Wish List .................................................................................................................... 79
Chapter 3
Using the Internet: Making the Most of the Web’s Resources ............................... 80
Part 1: Collaborating and Working on the Web ................................................................................................................. 82
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for c ollaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works ........................................................................................................................... 82
The Origin of the Internet ..................................................................................................................................... 82
Objective 3.1 Describe how the Internet got its start.
How the Internet Works ....................................................................................................................................... 84
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web ................................................................................................. 85
Collaborating with Web Technologies .................................................................................................................. 85
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps .............................................................................................................. 87
SOUND BYTE: Blogging ........................................................................................................................................................ 87
Communicating over the Web ............................................................................................................................. 89
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web ....................................................................................................................... 92
Conducting Business Online ................................................................................................................................ 92
Objective 3.5 Describe how business is conducted using the Internet.
E-Commerce Safeguards .................................................................................................................................... 92
Objective 3.6 Summarize precautions you should take when doing business online.
DIG DEEPER: How Cloud Computing Works ..................................................................................................... 93
BITS&BYTES: Looking for Extra Money? Try a Side Hustle ................................................................................. 94
HELPDESK: Doing Business Online ....................................................................................................................................... 95
BITS&BYTES: Bitcoin: A Form of Virtual Currency .............................................................................................. 95
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud .................................................................. 97
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................... 98
Part 2: Using the Web Effectively ........................................................................................................................................ 99
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web ............................................................................................................ 99
Web Browsers ..................................................................................................................................................... 99
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names ............................................................................................................... 101
Objective 3.8 Explain what a URL is and discuss its main parts.
Navigating the Web ........................................................................................................................................... 102
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web ......................................................................... 103
Searching the Web Effectively ........................................................................................................................... 104
Using Search Engines ....................................................................................................................................... 104
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.
vi Contents
BITS&BYTES: Digital Assistants and Predictive Search ..................................................................................... 105
SOUND BYTE: Finding Information on the Web .................................................................................................................... 107
Evaluating Websites .......................................................................................................................................... 107
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
HELPDESK: Evaluating Websites ......................................................................................................................................... 107
TRENDS IN IT: Linked Data and the Semantic Web ......................................................................................... 108
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper? ....................................... 109
Using the Web Ethically ..................................................................................................................................... 109
Digital Activism .................................................................................................................................................. 109
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation ....................................................................................................................................................... 110
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare? ............................................. 111
ETHICS IN IT: Cyber Harassment ..................................................................................................................... 112
SOLVE THIS: Create a Report: Conducting Research on the Web .................................................................... 119
Chapter 4
Application Software: Programs That Let You Work and Play ............................. 120
Part 1: Accessing, Using, and Managing Software .......................................................................................................... 122
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best
manage your software.
Software Basics .................................................................................................................................................. 122
Application vs. System Software ........................................................................................................................ 122
Objective 4.1 Compare application software and system software.
Distributing Software ......................................................................................................................................... 122
Objective 4.2 Explain the differences between commercial software and open source software and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software ....................................................................................................... 123
Managing Your Software ................................................................................................................................... 123
Purchasing Software ......................................................................................................................................... 123
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce ................................................................. 124
HELPDESK: Buying and Installing Software .......................................................................................................................... 125
Installing and Uninstalling Software .................................................................................................................... 125
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of “Bloat” .............................................................................................. 125
Upgrading Software .......................................................................................................................................... 126
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work ...................................................................................................... 126
Software Licenses ............................................................................................................................................. 127
Objective 4.6 Explain how software licenses function.
SOUND BYTE: Where Does Binary Show Up? ..................................................................................................................... 127
ETHICS IN IT: Can I Borrow Software That I Don’t Own? ................................................................................. 129
TRY THIS: Citing Website Sources ................................................................................................................... 131
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 132
Part 2: Application Software ............................................................................................................................................. 133
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software ................................................................................................................. 133
Productivity Software ......................................................................................................................................... 133
Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses and features.
Contents vii
BITS&BYTES: Productivity Software Tips and Tricks ......................................................................................... 133
BITS&BYTES: How to Open Unknown File Types ............................................................................................. 134
BITS&BYTES: Going Beyond PowerPoint ......................................................................................................... 138
SOUND BYTE: Programming for End Users.......................................................................................................................... 140
Business Software ............................................................................................................................................. 142
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools ........................................................... 144
Multimedia and Educational Software .............................................................................................................. 144
Digital Multimedia Software ............................................................................................................................... 144
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software ....................................................................................................................................... 146
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software ........................................................................................................................................... 147
App Creation Software ...................................................................................................................................... 147
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror . . . ........................................................................................................................ 149
Educational and Reference Software ................................................................................................................. 149
Objective 4.12 Categorize educational and reference software and explain their features.
SOLVE THIS: Analyzing Benchmark Data ......................................................................................................... 157
Chapter 5
System Software: The Operating System, Utility Programs,
and File Management ............................................................................................ 158
Part 1: Understanding System Software .......................................................................................................................... 160
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals ...................................................................................................................... 160
Operating System Basics .................................................................................................................................. 160
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use ................................................................................................................. 160
Objective 5.2 Explain the most popular operating systems for personal use.
BITS&BYTES: Open Source Operating Systems ............................................................................................... 162
BITS&BYTES: Operating Systems for the Smart Home .................................................................................... 162
Operating Systems for Machinery, Networks, and Business .............................................................................. 163
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows? .................................................................. 164
What the Operating System Does ..................................................................................................................... 165
The User Interface ............................................................................................................................................. 166
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination ..................................................................................................................................... 166
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage, and
peripheral devices.
SOUND BYTE: Using Windows Task Manager to Evaluate System Performance .................................................................. 166
Software Application Coordination ..................................................................................................................... 168
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human? .................................................................. 169
Starting Your Computer ..................................................................................................................................... 170
The Boot Process .............................................................................................................................................. 170
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.
viii Contents
HELPDESK: Starting the Computer: The Boot Process ........................................................................................................ 172
TRY THIS: Using Virtual Desktops in Windows 10 ............................................................................................ 174
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 175
Part 2: Using System Software ......................................................................................................................................... 176
Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file
management capabilities, and utility programs.
The Windows Interface ...................................................................................................................................... 176
Using Windows 10............................................................................................................................................. 176
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: The Snipping Tool ...................................................................................................................... 177
File Management ................................................................................................................................................ 179
Organizing Your Files ......................................................................................................................................... 179
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud .............................................................................................................. 181
BITS&BYTES: Tips for Organizing Your Files ..................................................................................................... 182
HELPDESK: Organizing Your Computer: File Management ................................................................................................... 183
Utility Programs .................................................................................................................................................. 185
Windows Administrative Utilities ......................................................................................................................... 186
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work ...................................................................................... 188
SOUND BYTE: Hard Disk Anatomy ...................................................................................................................................... 188
SOLVE THIS: Operating Systems: Analyzing Market Share ............................................................................... 197
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System .................... 198
Part 1: Evaluating Key Subsystems .................................................................................................................................. 200
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the CPU and
memory subsystems.
Your Ideal Computing Device ............................................................................................................................ 200
Moore’s Law ..................................................................................................................................................... 200
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device ........................................................................................................................... 201
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem ......................................................................................................................... 203
How the CPU Works ......................................................................................................................................... 203
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling ........................................................................................................................... 207
Measuring CPU Performance ............................................................................................................................ 207
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle .................................................................................................................... 209
Evaluating the Memory Subsystem .................................................................................................................. 210
Random Access Memory .................................................................................................................................. 210
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM ...................................................................................................................................................... 212
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM ......................................................................................................................... 212
SOUND BYTE: Installing RAM............................................................................................................................................... 213
TRY THIS: Measure Your System Performance ................................................................................................. 215
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 216
Contents ix
Part 2: Evaluating Other Subsystems and Making a Decision ....................................................................................... 217
Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem ................................................................................................................... 217
Types of Storage Drives ..................................................................................................................................... 217
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 218
DIG DEEPER: How Storage Devices Work ....................................................................................................... 219
Storage Needs .................................................................................................................................................. 220
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Much Storage to Buy? ....................................................................................................... 222
Evaluating the Media Subsystems .................................................................................................................... 223
Video Cards ...................................................................................................................................................... 223
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Graphics Cards with SSD on Board ........................................................................................... 225
TRENDS IN IT: USB 3.1 and USB-C ................................................................................................................ 226
Sound Cards ..................................................................................................................................................... 227
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components ...................................................................................................... 227
Evaluating System Reliability and Moving On ................................................................................................. 229
Maintaining System Reliability ............................................................................................................................ 229
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer ..................................................................................................................... 231
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All ................................................................................................................. 232
SOLVE THIS: Laptop Alternatives ..................................................................................................................... 239
Chapter 7
Networking: Connecting Computing Devices ....................................................... 240
Part 1: How Networks Function ........................................................................................................................................ 242
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals ................................................................................................................................. 242
Understanding Networks ................................................................................................................................... 242
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking ............................................................................................................................... 243
Network Architectures ....................................................................................................................................... 244
Network Designs ............................................................................................................................................... 244
Objective 7.2 Explain the different ways networks are defined.
DIG DEEPER: P2P File Sharing ........................................................................................................................ 246
Network Components ........................................................................................................................................ 247
Transmission Media ........................................................................................................................................... 247
Objective 7.3 Describe the types of transmission media used in networks.
SOUND BYTE: Installing a Home Computer Network ........................................................................................................... 247
Basic Network Hardware ................................................................................................................................... 249
Objective 7.4 Describe the basic hardware devices necessary for networks.
Network Software .............................................................................................................................................. 250
Objective 7.5 Describe the type of software necessary for networks.
TRENDS IN IT: How Smart Is Your Home? ....................................................................................................... 251
x Contents
Connecting to the Internet ................................................................................................................................. 251
Broadband Internet Connections ....................................................................................................................... 251
Objective 7.6 Summarize the broadband options available to access the Internet.
BITS&BYTES: Net Neutrality ............................................................................................................................. 252
BITS&BYTES: Who’s Not on Broadband? ........................................................................................................ 253
Wireless Internet Access ................................................................................................................................... 253
Objective 7.7 Summarize how to access the Internet wirelessly.
TRY THIS: Testing Your Internet Connection Speed .......................................................................................... 255
MAKE THIS: TOOL: Ping and Telnet ................................................................................................................. 256
Part 2: Your Home Network ............................................................................................................................................... 257
Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home n etwork and
how to manage and secure a wireless network.
Installing and Configuring Home Networks ..................................................................................................... 257
Planning Your Home Network ............................................................................................................................ 257
Objective 7.8 Explain what should be considered before creating a home network.
BITS&BYTES: Power Your Devices—Wirelessly ................................................................................................ 258
Connecting Devices to a Network ..................................................................................................................... 258
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative .................................................................................. 260
BITS&BYTES: Analyzing Network Problems ..................................................................................................... 262
Managing and Securing Wireless Networks .................................................................................................... 262
Troubleshooting Wireless Network Problems ..................................................................................................... 262
Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them.
Securing Wireless Networks .............................................................................................................................. 262
Objective 7.11 Describe how to secure wireless home networks.
SOUND BYTE: Securing Wireless Networks ......................................................................................................................... 264
HELPDESK: Managing and Securing Your Wireless Network ............................................................................................... 264
SOLVE THIS: Home Networking Guide ............................................................................................................. 271
Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics ...................................... 272
Part 1: The Impact of Digital Information ........................................................................................................................ 274
Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technology is used to
produce and distribute digital texts, music, and video; and the challenges in managing a digital lifestyle.
Digital Basics ...................................................................................................................................................... 274
Digital Convergence and the Internet of Things .................................................................................................. 274
Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
Digital versus Analog ......................................................................................................................................... 276
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing ................................................................................................................................................ 278
e-Readers ......................................................................................................................................................... 278
Objective 8.3 Describe the different types of e-readers.
Using e-Texts ..................................................................................................................................................... 279
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media .................................................................................................................................... 279
Digital Music ....................................................................................................................................................... 280
Creating and Storing Digital Music ..................................................................................................................... 280
Objective 8.5 Describe how digital music is created and stored.
Distributing Digital Music ................................................................................................................................... 282
Objective 8.6 Summarize how to listen to and publish digital music.
Contents xi
Digital Media ....................................................................................................................................................... 283
Digital Photography ........................................................................................................................................... 283
Objective 8.7 Explain how best to create, print, and share digital photos.
SOUND BYTE: Enhancing Photos with Image-Editing Software ........................................................................................... 284
Digital Video ...................................................................................................................................................... 285
Objective 8.8 Describe how to create, edit, and distribute digital video.
TRENDS IN IT: Digital Asset Managers Needed! .............................................................................................. 288
Managing Your Digital Lifestyle ......................................................................................................................... 288
Digital Challenges and Dilemmas ....................................................................................................................... 289
Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
DIG DEEPER: Deep Web versus Dark Web: Are There Places You Shouldn’t Go? ........................................... 290
BITS&BYTES: The Rise of Wearable Technology .............................................................................................. 291
TRY THIS: Creating and Publishing a Movie ...................................................................................................... 295
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 296
Part 2: Ethical Issues of Living in the Digital Age ........................................................................................................... 297
Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain
your digital reputation.
Protection of Digital Property ............................................................................................................................ 297
Intellectual Property ........................................................................................................................................... 297
Objective 8.10 Describe the various types of intellectual property.
Copyright Basics ............................................................................................................................................... 298
Objective 8.11 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright ........................................................................................... 300
Copyright Infringement ...................................................................................................................................... 301
Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which
you can legally use copyrighted material.
BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying ................................................ 303
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission! .......................................................... 305
Living Ethically in the Digital Era ....................................................................................................................... 306
Plagiarism ......................................................................................................................................................... 306
Objective 8.13 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation ........................................................................................................................ 308
Objective 8.14 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property .............................................................................................................. 308
Protecting Your Online Reputation ..................................................................................................................... 311
Objective 8.15 Describe what comprises your online reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights .................................................................................................... 313
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do ............................................................... 314
SOLVE THIS: Intellectual Property and Copyright Basics .................................................................................. 321
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ....................... 322
Part 1: Threats to Your Digital Assets ............................................................................................................................... 324
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers ................................................................................................................................ 324
Identity Theft ..................................................................................................................................................... 325
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
xii Contents
Hacking ............................................................................................................................................................. 325
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Hackers Wanted ........................................................................................................................ 326
Computer Viruses ............................................................................................................................................... 329
Virus Basics ....................................................................................................................................................... 329
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches
a virus, and the symptoms it may display.
SOUND BYTE: Protecting Your Computer ............................................................................................................................ 330
Types of Viruses ................................................................................................................................................ 331
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering .................................................................................................... 332
Online Annoyances ............................................................................................................................................ 333
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering ............................................................................................................................................. 335
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter . . . Now What? ....................................................................... 336
ETHICS IN IT: You’re Being Watched . . . But Are You Aware You’re Being Watched? ...................................... 338
HELPDESK: Threats to Your Digital Life ................................................................................................................................ 338
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches ............................................................................ 339
TRY THIS: Testing Your Network Security ......................................................................................................... 341
MAKE THIS: App Inventor 2 or Thunkable ........................................................................................................ 342
Part 2: Protecting Your Digital Property ............................................................................................................................ 343
Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Access to Your Digital Assets ........................................................................................................ 343
Firewalls ............................................................................................................................................................ 343
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
Preventing Virus Infections ................................................................................................................................. 345
Objective 9.8 Explain how to protect your computer from virus infection.
HELPDESK: Understanding Firewalls ................................................................................................................................... 345
Authentication: Passwords and Biometrics ........................................................................................................ 348
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots ........................................................................... 348
Anonymous Web Surfing: Hiding from Prying Eyes ............................................................................................ 350
Objective 9.10 Describe ways to surf the Web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords! .................................................... 352
Keeping Your Data Safe ..................................................................................................................................... 352
Protecting Your Personal Information ................................................................................................................. 352
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools ....................................................................................... 352
Backing Up Your Data ....................................................................................................................................... 353
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain
the various places you can store backup files.
Protecting Your Physical Computing Assets ................................................................................................... 357
Environmental Factors and Power Surges .......................................................................................................... 357
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft ........................................................................................................................... 357
Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems.
DIG DEEPER: Computer Forensics: How It Works ........................................................................................... 359
SOLVE THIS: Computer Security ...................................................................................................................... 367
Contents xiii
Chapter 10
Behind the Scenes: Software Programming ......................................................... 368
Part 1: Understanding Programming ............................................................................................................................... 370
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System ................................................................................................................. 370
The Importance of Programming ....................................................................................................................... 370
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle ........................................................................................................................ 370
Objective 10.2 Summarize the stages of the system development life cycle.
BITS&BYTES: Let Them See Your Work ........................................................................................................... 372
Life Cycle of a Program ...................................................................................................................................... 372
The Program Development Life Cycle ................................................................................................................ 372
Objective 10.3 Define programming and list the steps in the program development life cycle.
The Problem Statement ..................................................................................................................................... 373
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 373
HELPDESK: Understanding Software Programming.............................................................................................................. 374
Algorithm Development ..................................................................................................................................... 375
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Hackathons ............................................................................................................................... 378
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords,
Data Types, and Operators ........................................................................................................................... 380
Coding .............................................................................................................................................................. 381
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment in coding.
Debugging ........................................................................................................................................................ 387
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display ...................................................................................................... 388
Testing and Documentation ............................................................................................................................... 388
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona ............................................................................................................... 390
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 391
Part 2: Programming Languages ...................................................................................................................................... 392
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an a ppropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages ........................................................................................................................ 392
Need for Diverse Languages ............................................................................................................................. 392
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language................................................................................................. 392
Selecting the Right Language ............................................................................................................................ 393
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Coding for Zombies ................................................................................................................... 393
ETHICS IN IT: When Software Runs Awry ........................................................................................................ 394
Exploring Programming Languages ................................................................................................................. 395
Tour of Modern Languages ................................................................................................................................ 395
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Your Software Portfolio .............................................................................................................. 399
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools ............................................. 403
xiv Contents
Future of Programming Languages .................................................................................................................... 403
Objective 10.12 State key principles in the development of future programming languages.
HELPDESK: A Variety of Programming Languages................................................................................................................ 404
SOLVE THIS: Time Sheets ................................................................................................................................ 411
Chapter 11
Behind the Scenes: Databases and Information Systems ................................... 412
Part 1: Database Fundamentals ........................................................................................................................................ 414
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
The Need for Databases .................................................................................................................................... 414
Database Basics ............................................................................................................................................... 414
Objective 11.1 Explain what a database is and why databases are useful.
Database Types .................................................................................................................................................. 416
Flat Databases .................................................................................................................................................. 416
Objective 11.2 Describe features of flat databases.
Relational Databases ......................................................................................................................................... 418
Objective 11.3 Describe features of relational databases.
Object-Oriented Databases ............................................................................................................................... 419
Objective 11.4 Describe features of object-oriented databases.
BITS&BYTES: Normal Forms ............................................................................................................................ 419
Multidimensional Databases .............................................................................................................................. 419
Objective 11.5 Describe features of multidimensional databases.
HELPDESK: Using Databases............................................................................................................................................... 419
NoSQL Databases ............................................................................................................................................ 420
Objective 11.6 Describe how Web 2.0 data is managed in a database.
Using Databases ................................................................................................................................................. 421
Relational Database Components and Functions ............................................................................................... 421
Objective 11.7 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................................. 424
BITS&BYTES: Music Streaming Services Use Databases ................................................................................. 425
Inputting and Managing Data ............................................................................................................................. 425
Objective 11.8 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL) ............................................................................................. 430
BITS&BYTES: Data Dashboards: Useful Visualization Tools .............................................................................. 432
TRY THIS: Using Excel’s Database Functions ................................................................................................... 434
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 435
Part 2: How Businesses Use Databases ........................................................................................................................... 436
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to
manage data and how business information systems and business intelligence are used to make business decisions.
Data Warehousing and Storage ........................................................................................................................ 436
Data Warehouses and Data Marts ..................................................................................................................... 436
Objective 11.9 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases....................................................................................................................... 436
BITS&BYTES: Data Warehouses Are Going to the Cloud ................................................................................. 437
Data Mining ....................................................................................................................................................... 438
Objective 11.10 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed ................................................................................ 439
ETHICS IN IT: Data, Data Everywhere—But Is It Protected? ............................................................................. 441
Contents xv
Using Databases to Make Business Decisions ............................................................................................... 441
Business Information Systems ........................................................................................................................... 441
Objective 11.11 Describe the main types of business information systems and how they are used by business managers.
SOUND BYTE: Analyzing Data with Microsoft Power BI Suite.............................................................................. 446
BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web ...................................................... 446
TRENDS IN IT: Mobile Business Intelligence ..................................................................................................... 447
SOLVE THIS: College Database ........................................................................................................................ 455
Chapter 12
Behind the Scenes: Networking and Security in the Business World ................. 456
Part 1: Client/Server Networks and Topologies ............................................................................................................... 458
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them,
and network topologies used to construct them.
Client/Server Network Basics ........................................................................................................................... 458
Networking Advantages .................................................................................................................................... 458
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks ........................................................................................ 459
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks ........................................................................................................................ 460
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Your Car Network Can Be Hacked! ............................................................................................ 463
Servers and Network Topologies ...................................................................................................................... 464
Servers .............................................................................................................................................................. 464
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers ................................................................................................................................................... 465
TRENDS IN IT: Virtualization: Making Servers Work Harder .............................................................................. 466
Network Topologies ........................................................................................................................................... 467
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
SOUND BYTE: Network Topology and Navigation Devices.................................................................................................... 469
TRY THIS: Sharing Printers on a Network Using Windows ................................................................................ 474
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 475
Part 2: Setting Up Business Networks ............................................................................................................................. 476
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network
navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media ........................................................................................................................................... 476
Wired and Wireless Transmission Media ............................................................................................................ 476
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Go Green with Mobile Apps ....................................................................................................... 478
Network Adapters and Navigation Devices ..................................................................................................... 478
Network Adapters ............................................................................................................................................. 478
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses ................................................................................................................................................ 480
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers ........................................................................................................................ 481
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and Network Adapters ...................................................................................................... 482
Network Operating Systems and Network Security ....................................................................................... 482
Network Operating Systems .............................................................................................................................. 483
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Smart Lighting for Smart Homes ............................................................................................... 483
xvi Contents
Client/Server Network Security .......................................................................................................................... 484
Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards ............................................................................. 485
SOUND BYTE: A Day in the Life of a Network Technician ..................................................................................................... 486
ETHICS IN IT: How Should Companies Handle Data Breaches? ...................................................................... 489
BITS&BYTES: Are Your Photos Helping Criminals Target You? ......................................................................... 490
SOLVE THIS: Cyber-Security Flyer and Mail Merge ........................................................................................... 497
Chapter 13
Behind the Scenes: How the Internet Works ........................................................ 498
Part 1: Inner Workings of the Internet ............................................................................................................................. 500
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking ............................................................................................................. 500
Management ..................................................................................................................................................... 500
Objective 13.1 Describe the management of the Internet.
Networking Components ................................................................................................................................... 501
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission ............................................................................................................................................. 502
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You ........................................................................................... 502
Internet Identity ................................................................................................................................................... 505
IP Addresses ..................................................................................................................................................... 505
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols ........................................................................... 505
BITS&BYTES: What’s Your IP Address? ........................................................................................................... 506
BITS&BYTES: Internet of Things Goes Shopping .............................................................................................. 506
SOUND BYTE: Creating Web Pages with Squarespace ....................................................................................................... 507
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols .............................................................. 508
Domain Names ................................................................................................................................................. 509
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
BITS&BYTES: Scale Up for Success ................................................................................................................ 510
TRY THIS: Ping Me ........................................................................................................................................... 513
MAKE THIS: TOOL App Inventor 2 or Thunkable .............................................................................................. 514
Part 2: Coding and Communicating on the Internet ....................................................................................................... 515
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies .............................................................................................................................................. 515
Web Development ............................................................................................................................................. 515
Objective 13.6 Compare and contrast a variety of web development languages.
BITS&BYTES: CodePen: An Editing Community for Web Designers ................................................................. 516
Application Architecture ..................................................................................................................................... 518
Objective 13.7 Compare and contrast server-side and client-side application software.
SOUND BYTE: Client-Side Web Page Development ............................................................................................................. 519
BITS&BYTES: Free Code Camp ....................................................................................................................... 521
Communications over the Internet ................................................................................................................... 521
Types of Internet Communication ...................................................................................................................... 521
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
BITS&BYTES: AI and Your Inbox ...................................................................................................................... 523
Encryption ......................................................................................................................................................... 524
Objective 13.9 Explain how data encryption improves security.
Contents xvii
BITS&BYTES: Numbers: We Wouldn’t Have Encryption Without Them! ........................................................... 525
ETHICS IN IT: Do We Really Want Strong Encryption? ..................................................................................... 526
HELPDESK: Keeping E-Mail Secure ..................................................................................................................................... 526
TRENDS IN IT: Cognitive Computing ............................................................................................................... 527
SOLVE THIS: Creating an HTML Document ..................................................................................................... 535
Appendix A
The History of the Personal Computer .................................................................. A-1
Appendix B
Careers in IT ............................................................................................................B-1
Glossary........................................................................................................................................................................ G-1
Index............................................................................................................................................................................... I-1
xviii Contents
Learn Technology by Using
Technology in Action 16e
The best-selling Technology in Action continues to deliver an engaging approach to teaching the topics and skills students need to be
digitally literate. Using practical content, hands-on projects, and interactive simulation activities students are engaged in learning.
Today’s students are more tech savvy than ever—they know how to use their smartphones, YouTube, Snapchat, and Instagram—
and that’s how they want to learn. Technology in Action is written knowing that many students are digital natives, so the instruction
and practice offer students a consistent and engaging experience from chapter to chapter. They don’t just read about technology,
they engage with it in familiar ways.
For the 16th edition, students will engage with their peers at the beginning of each chapter of the etext by taking a Web-based survey
and then analyzing the results with What Do You Think? questions. From there students continue to engage with the content by watch-
ing videos, working through interactive Helpdesk activities, Sound Byte lessons, IT simulations, and a variety of hands-on projects.
Using these resources and the practical content, students learn the concepts and skills they need to be digitally literate in today’s work-
place. And, if they are using MyLab IT, they can earn the Digital Competency badge to demonstrate their skills to potential employers.
Hallmarks
• Engaging question-and-answer writing style that demonstrate understanding. Newly redesigned for a
approaches topics as students do. more engaging and easier-to-use learning experience
• Ethics coverage throughout, including in end-of-chapter that helps students actively demonstrate understanding.
activities, Point/Counterpoint ethical debate content found in Now includes a “presentation mode” so instructors can
relevant chapters, and a Sound Byte lesson on how to discuss walk through the simulation in class or with students.
and debate ethical issues. • Review and Quizzes
• Hands-on learning with projects throughout each chapter: • Check Your Understanding Quizzes provide a self-check
• Try This projects allow students to practice and covering objectives in each part of the chapter so that
demonstrate their proficiency with important topics. students can see how well they are learning the content.
Each project is accompanied by a how-to video. • The Chapter Quiz provides a way for students to test that
they have learned the material from the entire chapter.
• Solve This projects put the concepts students are
learning into action through real-world problem solving • New “Chew on This” critical thinking questions require
using Microsoft Office programs. Grader project versions that students demonstrate their understanding through
of most of these projects are in MyLab IT. written answers that are manually graded.
• Make This projects provide activities where students • Testbank Exams provide customizable prebuilt,
build programs that run on their mobile devices. Twelve autograded, objective-based questions covering the
of the chapters have activities that build fully functional chapter objectives.
mobile apps, compatible with either Android or iOS. • Videos
Each project includes instructions and a how-to video. • Chapter Overview Videos provide an objective-based
• Interactive activities engage students in active learning review of what students should have learned.
and demonstration of understanding: • Try This and Make This project videos
• Helpdesk interactive activities provide a review of • Helpful Resources
chapter objectives by having students play the role of a • PowerPoint and Audio Presentations can be used in
helpdesk staffer assisting customers via a live chat using class for lecture or assigned to students, particularly
a decision-based simulation with a quiz. online students, for instruction and review.
• Sound Byte audio lessons provide coverage of additional • Instructor Chapter Guides provide teaching tips;
topics related to the chapter, including a brief quiz. homework and assessment suggestions; a brief
• IT Simulations provide an in-depth chapter scenario overviews of each chapter’s Try This, Make This, and
that students work through in an active learning Solve This exercises; as well as select Sound Byte
environment and complete with a brief quiz to talking points and ethics debate starters.
• Images and quizzes have been updated throughout. A new Dig Deeper, Deep Web versus Dark Web: Are There
Places You Shouldn’t Go?, has been added to the chapter.
• A new Try This project in Chapter 1—What Does
Facebook Know About You?—lets students explore the Bits&Bytes: The Rise of Wearable Technology has been
detailed information collected about them by the social relocated from Chapter 7.
media platform. Chapter 9
A Bits&Bytes addressing the role of social media and com-
Summary of Chapter Updates puter security in maintaining democratic elections has been
added.
All chapter Learning Outcomes and Learning Objectives have
been revised as needed and throughout the text, figures and Extended treatment of password managers and biometric
photos have been updated with new images, current topics, options for access control has been added.
and state-of-the art technology coverage. Chapter 10
Chapter 1 New coverage of programming technologies like Swift and
A new Try This exercise leading students through the steps to JSON.
examine the data stored about them by social media platforms Chapter 11
has been added.
The concept of flat databases has replaced discussion of lists.
The section on technology and careers has been updated
New content of NoSQL databases has been added.
with current trends and an emphasis on the impact of
artificial intelligence. The content of data staging has been updated.
Chapter 5 A new Bits&Bytes: The Normal Forms has been added.
Discussions on additional mobile operating systems like Chapter 12
watchOS and tvOS have been added. A new Try This: Sharing Printers on a Network Using Windows
Coverage of the latest smarthome devices and open- has been added.
source solutions has been added. Chapter 13
Chapter 7 Coverage of web security topics like email encryption and
The Bits&Bytes: Net Neutrality has been updated. biometrics has been updated.
The Bits&Bytes: Is Dial-Up Still an Option? has been The most current coverage of cognitive computing has
updated. been added.
The Bits&Bytes: 5G Is Coming—Is It Worth the Wait? has More student-focused introduction to web frameworks and
been deleted and content has been added to the text. modern web technologies has been added.
Interactives:
Ethics Try This Solve This Make This What do Helpdesks, Sound Team Time
Projects Projects Projects Projects you think? Bytes, IT Sims Projects Badge
Critical
x x x x X
Thinking
Communication x x x X
Collaboration x x x X
Knowledge
Application and x X x x x x X
Analysis
Social
x X x
Responsibility
apply what they are learning in Understanding what capabilities your current computer has is one of the first steps toward computer literacy. In this
exercise, you’ll learn how to explore the components of your Windows computer. For step-by-step instructions, watch
lead students to explore Want to build your own Android app from scratch? You can, with a
simple tool called App Inventor. To get started, have ready:
a practical project that uses Step 1 To gather information about the storage devices on your computer, click File Explorer from the Taskbar. Then in the nav-
igation pane, click This PC to display information about your computer’s storage devices and network locations.
• A computer connected to a Wi-Fi network
• The Chrome browser
project.
used to create apps for Android devices.
Using App Inventor, you can easily drag
and drop components to design your app’s
System type
Make This 59
58 Chapter 2 Looking at Computers: Understanding the Parts
Helpdesk Activities
The Helpdesk training content,
created specifically for Tech- Solve This Projects
nology in Action, enables stu- Solve This MyLab IT Grader
dents to take on the role of a These exercises inte- Technology Wish List
You are in need of a significant technology upgrade, and your parents have told you they will help you finance your purchases by
helpdesk staffer fielding ques- grate and reinforce loaning you the money. You will need to repay them with a modest 2.5% interest rate over two years. The only catch is that they
want you to create a list of all the new devices that you need, note the cost, and provide a website for each device where they can
find more information. Then, they want you to calculate how much you will need to give them each month to pay them back.
Instructions
1. Open TIA_Ch2_Start.docs and save as TIA_Ch2_LastFirst.docx.
Sound Bytes it by a tax of 6%. Format the results in the Accounting Number format with two decimals.
Hint: The formula will be =E10*0.06
12. In cell A12, type Estimated Shipping, then in cell E12 create a formula to calculate the shipping charge by using the
COUNTA function to determine the number of devices being purchased and then multiplying that by a $10 shipping
charge. Format the results in Accounting Number Format with two decimals.
through engaging lessons with 16. Save the workbook and submit based on your instructor’s directions.
Chapter Review 79
understanding.
IT Simulations
These detailed interactive scenarios cover a core chapter topic in a hands-on environment
where students can apply what they have learned and demonstrate understanding through
active engagement.
End-of-Chapter Answer Key, Check Your Understanding Answers to all end-of-chapter questions.
Answer Key, Chapter Quiz Answer Key
Make This Projects Activities where students build programs that run on their mobile
devices. Each project includes instructions and a how-to video.
Objectives Mapping Outline of the objectives in every chapter.
Solve This Projects Real-world problem solving using Microsoft Office programs.
Grader versions of most of these projects are in MyLab IT.
Syllabus Template Sample syllabus for help in setting up your course.
Test Bank (Textbook, Helpdesk, Sound Bytes) Over 1,000 multiple-choice, true/false, short-answer, and
matching questions with these annotations:
• Difficulty level (1 for straight recall, 2 for some analysis, 3 for
complex analysis)
• Objective, which provides location in the text
Provided for:
• Textbook
• Helpdesk
• Sound Byte
1
The Impact of Technology
in a Changing World
For a chapter overview, watch the Chapter Overview videos.
PART 1 PART 2
MyLab IT All media accompanying this chapter can be found here. Make This A Virtual Assistant on page 12
(John Lund/Getty Images; Carlos Castilla/Shutterstock; Winui/Shuttertock; Ivan Trifonenko/123RF; Sergey Nivens/Shutterstock; Stuart Miles/Fotolia)
2
JournalismCS
RoboticsCS
EducationCS
Psychology CS
MedicineCS
dumperina
LiteratureCS
Theater CS
Biology CS
EconomicsCS
HumanitiesCS
What do you think?
Having a background in technology and computer science enables you to be
a powerful contributor in many career fields. More universities are realizing this and
creating a new department, CS + X. What is CS + X? The CS stands for Computer
Science, while the X stands for a second area of study that blends with computer
technology. For example, the X might be Music, with the combined degree including
study of the perception of music and use of digital techniques to enhance our
experiences. Or the X might be Archaeology, with the curriculum including courses
on the computer simulation of human behavior and creating virtual reality models.
Universities that are creating CS + X departments argue that combining computer
science with other skills produces students who are better journalists, artists,
scientists, and so on. The possibilities for collaboration between your passions and
technology are endless.
Which field would you be most curious about combining with CS?
• Literature • Nursing • Art
• Statistics • Criminal Justice • Other
• Business • Anthropology
3
See the end of the chapter for a follow-up question. (Jacob Lund/Shutterstock)
Part 1 For an overview of this part of the chapter, watch Chapter Overview Video 1.1.
Technology in Society
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on
national and global issues.
Ask yourself: Why are you in this class? Maybe it’s a requirement for your degree, or maybe you want to improve your computer
skills. But let’s step back and look at the bigger picture.
Technology is a tool that enables us all to make an impact beyond our own lives. We’ve all seen movies that dangle the dream in
front of us of being the girl or guy who saves the world—and gets to drive a nice car while doing it!
Technology can be your ticket to doing just that by influencing and participating in projects that will change the world.
Crisis-Mapping Tool
Another example of the interaction of technology
and society is the software tool Ushahidi. Following
a disputed election in Kenya, violence broke out all
over the country. Nairobi lawyer Ory Okolloh tried to
get word of the violence out to the world through her
blog, but she couldn’t keep up with the volume of
reports. However, two programmers saw her request
Figure 1.1 Social media has changed how we access, distribute, and evaluate for help and in a few days created Ushahidi. It is a
information. (Rudmer Zwerver/Shutterstock) crisis-mapping tool that collects information from
e-mails, text messages, blog posts, and tweets and then maps them, instantly making the informa-
tion publicly available. The developers then made Ushahidi a free platform anyone in the world can
use (see Figure 1.2). It has since been used in several international disasters. In what other ways
may technology help us face times of crisis?
Global Issues
Objective 1.2 Describe various global social issues that are being affected by technology.
Let’s look at the different global social issues that are being affected by technology.
Health Care
Infectious diseases account for about one-fifth of all deaths worldwide. Researchers say the odds of
a flu pandemic occurring in the next century are nearly 100%. Could technology help us develop and
deliver vaccines to save lives? Using scientific visualization tools, scientists are developing antibodies for
flu viruses and even HIV, viruses that are difficult to target because they continually change shape. Com-
putationally intense modeling software is helping researchers increase the pace of vaccine production.
As we learn more about the terrible consequences of concussion injuries, technology is playing a
part in providing a solution. Researchers now know that even without an actual concussion, ath-
letes can sustain serious damage from repeated impacts of their brain against the skull. Computer
programs have collected sensor data from impacts on the field, which scientists have analyzed and
used to create a new kind of helmet. College programs and the NFL now use enhanced helmets,
designed to better distribute the impact of collisions.
The Environment
What if every cell phone in the world had built-in atmospheric sensors? Then millions of points of
data measuring air and water quality from around the world could be acquired. The data could be
tagged with geographical information, alerting scientists to new trends in our environment. Ideas
like these are being explored by researchers around the world.
Smart Internet-connected water sprinklers are another technology that is already saving water in
California and other dry areas of the country. The sprinkler system checks the weather forecast so it won’t
use water when rain is coming the next day. The system is showing a 30% reduction in water usage.
Start Network Corruption Blockchain, a digitized Blockchain technology can help Start Network:
public ledger for track humanitarian aid funds startnetwork.org
recording a series of as they flow from donors to
transactions recipients.
SolaRoad/ The need for Solar cells Solar cells are integrated into the Netherlands SolaRoad:
Netherlands a renewable, asphalt roadway. They collect solaroad.nl
nonpolluting energy solar energy and distribute
resource electricity all day.
United Nations Issues of hunger for GIS (geographical The WFP can analyze the location World Food
World Food 1 in 7 of the world’s information systems) and need for food, positioning it Programme:
Programme population and mobile devices where it will help the most. wfp.org
(WFP)
Gates The threat of global Mobile apps, data Worldwide organizations like the Gates Foundation:
Foundation pandemic disease, like analytics, and enhanced Gates Foundation are taking steps gatesfoundation.org
Ebola, or weaponized global communications to build better networks to detect
biological warfare outbreaks and deliver vaccines.
Marketing
Marketing strategies are counting on the
fact that most people have a cell phone
with a camera and Internet access. Quick
response (QR) codes like the one shown
here let any piece of text host a direct link
to online information and video content.
(Pearson Education) Marketers also have to be aware of the
phenomenon of crowdsourcing—checking in with the voice of the
crowd. Forward-thinking companies are using this input to improve
their products and services. AT&T, for example, has an app called
Mark the Spot that lets customers report locations of dropped calls
to help the company improve its coverage.
You can avoid falling prey to hackers You know how to protect yourself You can separate the real privacy and
and viruses because you are aware of from identity theft. security risks from things you don’t
how they operate. have to worry about.
You know how to find information and You can avoid being overwhelmed You can how to diagnose and fix prob-
use the web effectively. by spam, adware, and spyware. lems with your hardware and software.
(Peter Dazeley/The Image Bank/Getty Images; Yuri_Arcurs/E+/Getty Images; Zakai/DigitalVision Vectors/Getty Images; Justin Lewis/Stone/Getty Images; Argus/Fotolia; Ivanastar/
E+/Getty Images)
and Trojan horses? What software—the instructions that tell the computer what to do—should you
install on your computer to avoid online annoyances?
Being able to maintain, upgrade, and troubleshoot your computer. Learning how to care
for and maintain your computer and knowing how to diagnose and fix certain problems can save
you time and money. Do you know how to upgrade your computer if you want more memory? Do
you know which software and computer settings can keep your computer in top shape?
Keeping up to date. Finally, becoming computer literate means knowing about new technologies
and how to integrate them into your life. Can you connect your TV to your wireless network? What
is a media server, and do you need one? Can a USB type C connection carry HDMI video signals?
Being able to stay up to date with technology is an important skill.
This book will help you become computer literate. In Chapter 3, you’ll find out how to get the most
from the web while staying free from the spam and clutter Internet surfing can leave behind on your
computer. Chapter 6 shows you how to determine whether your hardware is limiting your comput-
er’s performance and how to upgrade or shop for a new device. Chapter 9 covers how to keep
your computer and your digital life secure. You’ll be able to save money, time, and frustration by
understanding the basics of how computer systems operate.
multiple choice
1. Automated bot accounts use social media 4. Crowdfunding helps startup businesses by
a. responsibly. a. selling stock more easily.
b. to help humans who are busy. b. using QR codes to advertise and market products.
c. to manipulate opinion by posting news stories c. gathering financial contributions from
and quotes massive numbers of times. supporters.
d. in some countries but they are illegal in the U.S. d. replacing Web 2.0 technology.
2. The digital divide occurred because 5. Collaborative consumption is when people get
a. the United States has the fastest Internet access. together to
b. not everyone has equal access to the Internet. a. find the best prices on products.
chew on
this
(mdorottya/123RF)
(rvlsoft/Shutterstock; Solomon7/Shutterstock)
Step 1 From the Facebook website, download your Facebook data. On the top line of your
Facebook page, click the dropdown arrow on the far right and select Settings. Next,
select Your Facebook Information and click Download Your Information. Click the
Create File button. Facebook will e-mail you when the file is ready.
Step 2 From the Twitter website, download the information Twitter has created on you.
Click on your Twitter avatar and select Settings and privacy. From the list on the left,
select Your Twitter data. Scroll to the bottom and under Download your Twitter data,
and click the Request data button. It will be e-mailed to you when the report is ready.
Step 3 Examine what these algorithms have decided about you. Check the list of interests
and what items they think you will likely buy. How accurately have they guessed
your household income, your politics, and your finances?
Try This 11
Make This TOOL: IFTTT.com
(If This Then That)
A Virtual Assistant
If This Then That (IFTTT.com) is an Internet-based tool that helps you get things done automatically. By using
“recipes” within this web-based tool, you can automate tasks you do during the day, such as:
• automatically silencing your phone when you go into class,
• automatically texting your manager when you’re on your way to work, or
• notifying you when the president signs a new law.
In this exercise, you’ll explore using IFTTT to create recipes like these.
Make the Internet work for you by knowing this one programming statement: IF THIS, THEN THAT.
(IFTTT Inc.)
(IFTTT Inc.)
Can computing devices really think? Are virtual assistants like Alexa intelligent, or do they just mimic thinking? Rapid
developments in the field of artificial intelligence have forced us to consider many new ethical debates. It’s important to learn
about new advancements in technology, such as artificial intelligence, as well as to understand the ethical dilemmas technology
presents.
Artificial Intelligence
Artificial intelligence focuses on creating computer systems that have an ability to perform tasks
associated with human intelligence. Let’s explore in detail what artificial intelligence is and how it
impacts you.
What is artificial intelligence? Artificial intelligence (AI) is a branch of computer science that MyLab IT
Helpdesk
focuses on creating computer systems able to perform tasks that are usually associated with
human intelligence. By this definition, any computer-controlled device that accomplishes something The Impact of Artificial
thought of as “intelligent” by humans is considered AI. Intelligence
Do computers “think” like human beings? In the 1950s, the goal was to create a machine In this Helpdesk, you’ll play the role
that could think like a human. Early examples included expert systems that mimicked doctors in of a helpdesk staffer, fielding ques-
diagnosing illnesses. But this goal has shifted somewhat toward creating machines that generate tions about artificial intelligence.
intelligent output but that do not necessarily mimic the human thought process.
Consider visiting the library. You could tell a human librarian your interests and the librarian could
ask you some questions and then recommend books you might like. The Amazon recommendation
engine fulfills the same purpose. However, the Amazon recommendation engine doesn’t mimic a
human librarian’s thought process but instead analyzes vast amounts of data about you and other
shoppers to make its recommendations. It provides intelligent results, but it does not arrive at those
results the same way a human would.
Artificial Intelligence 13
What are the main areas of research for AI? AI’s central goals can be grouped into a num-
ber of categories (see Table 1.3):
• Natural language processing (NLP): NLP works to develop AI systems that understand written
and spoken words and can interact with humans using language.
• Perception: AI systems have senses just as we do. AI systems use sonar, accelerometers,
infrared, magnetic, and other electronic sensors to gather data. Being able to combine all the
data from sensors and then construct information from it is a difficult challenge.
• Knowledge representation: Knowledge representation involves encoding information about
the world into formats that the AI system can understand. Humans possess a vast collec-
tion of general knowledge based on their experiences in the world. AI systems need to build
knowledge bases to solve problems. Developing a knowledge base and using it efficiently are
active areas of research and have been demonstrated effectively by IBM’s artificial intelligence
computer Watson.
• Planning: AI systems need to set goals and then achieve them. An AI system might need to plan
how to move a blue block out of the way to reach a red one or how to rotate a block as it moves
to fit through a narrow opening.
• Problem solving: Humans tend to make intuitive judgments when solving a problem rather than
perform a step-by-step analysis. AI programming combines a rules-based approach, along with
trying to make judgments with incomplete information.
• Learning: Like humans, AI algorithms adapt and learn through experience. Supervised learning
is used when the system can be trained with a huge number of examples. U nsupervised learning is
when a system can look at data and build rules on its own to decide what it is seeing.
What has enabled us to deploy effective AI systems? Many information technology devel-
opments have contributed to the functional AI systems that we have today.
Artificial neural networks (ANNs) are designed based on the structure of the human brain (see
Figure 1.6), which is a network of loosely connected neurons. When signals are received by a
neuron, it fires an electrical impulse and the signal travels to all the neurons connected to it. In
ANNs, digital signals take the place of biological signals. Many modern ANNs feature different lay-
ers of neurons that allow many degrees of complexity. ANNs have allowed researchers to tackle
complex problems such as speech recognition.
Machine Learning
Machine learning (ML) is a type of AI that doesn’t need to be specifically programmed. Instead, it
analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the
AI system accordingly. By learning, the AI system can adapt itself and become constantly better at
its task. You have interacted with these kinds of systems if you use Alexa, the Amazon voice recog-
nition device. Alexa gathers input from human speech and uses this information to become better
at understanding language over time.
Deep learning (DL) is a subset of the ML field that describes systems capable of learning from
mistakes, just as humans do. DL algorithms can learn from data that is not labeled as “correct” or
“incorrect.” The algorithm adapts to improve its final result without being presented with a huge,
labeled set of training data. This is known as unsupervised learning.
Having a basic understanding about AI systems is necessary to becoming a digitally literate citizen.
In the next section, we’ll explore various workplace systems that use AI.
Artificial Intelligence 15
Another random document with
no related content on Scribd:
β. media. — Feuilles assez grandes (de 6 à 12 centimètres de long
sur 3 à 5 de large), ovales ou ovales-allongées, présentant
souvent la plus grande largeur au-dessus du milieu, obtusément
acuminées, glabres. Jeunes rameaux, nervures et pédoncules
glabres ou finement pubescents. Boutons plus gros que dans la
var. α. Calice urcéolé, à dents peu apparentes. Fleurs assez
grandes, souvent solitaires.
15. U. cristata R. Br. mss. in Herb. Mus. Brit. ; Oliver, Fl. trop. Afr. I,
p. 23.
5. POPOWIA Endl.
(H. Baillon, Hist. des plantes, I, p. 284).
Fleurit en avril.
Fleurit en avril.
7. XYLOPIA L.
(Benth. et Hook. f. Gen. pl. I, 28).
21. X. æthiopica A. Rich. Fl. Cuba, p. 53 (en note) ; Oliver, Fl. trop.
Afr. I, p. 30. — Unona æthiopica Dun. Anon. p. 113 ; DC. Syst.
veget. I, p. 496 ; DC. Prodr. I, p. 91. — Uvaria æthiopica Guill. et
Perr. Fl. Sénég. p. 9. — Habzelia æthiopica A. DC. Mém. Anon. p.
31. — Hablitzia æthiopica Hook. f. Niger Fl. p. 206. — Xylopia
undulata (fruit seulement) P. de Beauv. Fl. Ow. et Ben. I, pl. 16. —
Unona ? undulata (fruit seulement) Dunal, DC. Syst. veget. I, p.
494 ; DC. Prodr. I, p. 9).
8. MONODORA Dunal
(Benth. et Hook. f. Gen. pl. I, 26).
25. M. tenuifolia Benth. Linn. Trans. t. XXIII, p. 475 ; Oliver, Fl. trop.
Afr. I, p. 38.
Fruits en avril.
I V. MÉN ISPERMACÉES
9. TINOSPORA Miers
(Benth. et Hook. f. Gen. pl. I, 34).
26. T. bakis Miers in Ann. nat. Hist. ser. 2, t. VII, p. 38 ; Oliver Fl.
trop. Afr. I, p. 43. — Cocculus bakis Rich. Fl. Sénég. p. 12 pl. 4.
11. CISSAMPELOS L.
(Benth. et Hook. f. Gen. pl. I, 37).
28. C. pareira L. ; Lamk, Illustr. pl. 830 ; DC. Syst. veget. I, p. 533 ;
DC. Prodr. I, p. 100 ; Hook. et Th. Fl. Ind. I, p. 198 ; Oliver, Fl. trop.
Afr. I, p. 45. — C. caapeba DC. Syst. veget. I, p. 536 ; DC. Prodr.
I, p. 101. — C. convolvulacea Willd. ; DC. Syst. veget. I, p. 536 ;
DC. Prodr. I, p. 101. — C. mauritiana Thouars ; DC. Syst. veget. I,
p. 535 ; DC. Prodr. I, p. 101. — C. orbiculata DC. Syst. veget. I, p.
537 ; DC. Prodr. I, p. 101. — C. hirsuta, C. tomentosa DC. Syst.
veget. I, p. 535 ; DC. Prodr. I, p. 101. — C. microcarpa DC. Syst.
veget. I, p. 534 ; Prodr. I, p. 101. — C. mucronata A. Rich. Fl.
Sénég. p. 11. — C. comata Miers in Hook. f. Niger Fl. p. 215. — C.
vogelii Miers in Hook. f. Niger Fl. p. 214 (quoad pl. masc.). —
Menispermum orbiculatum L. — Cocculus orbiculatus DC. Syst.
veget. ; DC. Prodr. I, p. 98.
Fleurit en Janvier.
Exsiccata. — Croît au bord des eaux vives du Fouta-Djallon,
Heudelot (no 740) !
V. NYMPHÉACÉES
13. NYMPHÆA L.
30. N. lotus L.
31. N. cærulea Savign. Décad. Ægypt. III, p. 74, et Ann. Mus. par. I,
p. 366, pl. 25 ; Herb. amat. pl. 338 ; DC. Syst. veget. II, p. 50 ; DC.
Prodr. I, p. 144 ; Delile, Ill. Fl. Ægypt., pl. 62, f. 2 ; Guill. et Perr. Fl.
Sénég. p. 15 ; Planch. in Van Houtte, Fl. des serres, t. 7, pl. 653 ;
Planch. Nymph. (Ann. sc. nat. sér. 3, t. XIX, p. 41). — N. cyanea
Hortul. plurim. (non Roxb.). — N. maculata Sch. et Th. Guin. pl.
(ex descr.). — N. rufescens Guill. et Perr. Fl. Sénég. p. 15. — N.
micrantha Guill. et Perr. Fl. Sénég. p. 16. — N. stellata Oliver, Fl.
trop. Afr. I, p. 52 (non Willd.).
32. N. heudeloti Planch. Nymph. (Ann. sc. nat. sér. 3, t. XIX, p. 41).
— N. stellata Oliver, Fl. trop. Afr. I, p. 52 (non Willd.).
V I. PA PAVÉRACÉES
14. ARGEMONE L.
V II . CR UCIF ÈRE S