Sale!

Test Bank for Technology In Action, Complete (10th Edition) by Alan Evans

By:  
  • ISBN-10:  0133056228 / ISBN-13:  9780133056228
  • Ebook Details

    • Edition: 10th Edition
    • Format: Downloadable ZIP Fille
    • Resource Type : Testbank
    • Duration: Unlimited downloads
    • Delivery: Instant Download
     

    $40.00 $30.00

    SKU: 8479 Categories: ,

    Table of contents:

    Chapter 1
    Using Technology to Change the World
    How Will You Put Technology in Action?
    Technology on the World Stage
    Political Issues
    Other Global Issues
    Technology and Our Society
    Technology Impacts How We Think
    Technology Impacts How We Connect
    Technology Impacts How We Consume
    Try This: Skyping Around the World
    How Will Technology Improve Your Life?
    Technology at Home
    Technology and Your Career
    Retail: Working in a Data Mine
    Arts: Ink, Paints, and a Laptop?
    Education: Teaching and Learning
    Law Enforcement: Put Down That Mouse–You’re Under Arrest!
    Medicine: The Chip Within
    DIG DEEPER: Making Reality Even More Real
    Science: Simulating Reality
    Psychology: You Should Smile Now
    Chapter 2
    Looking at Computers: Understanding the Parts
    Understanding Digital Components
    Understanding Your Computer
    Computers Are Data Processing Devices
    Bits and Bytes: The Language of Computers
    Types of Computers
    Input Devices
    Keyboards
    Mice and Other Pointing Devices
    Touch Screens
    Image Input
    DIG DEEPER: How Touch Screens Work
    Sound Input
    Ethics in IT: What Is Ethical Computing?
    Output Devices
    Monitors
    Printers
    Sound Output
    Try This: What’s Inside My Computer?
    Processing, Storage, and Connectivity
    Processing and Memory on the Motherboard
    Memory
    Processing
    Storing Data and Information
    Hard Drives
    Flash Storage
    Optical Storage
    Connecting Peripherals to the Computer
    High-Speed and Data Transfer Ports
    Connectivity and Multimedia Ports
    Adding Ports: Expansion Cards and Hubs
    Power Controls
    Setting It All Up
    TRENDS in IT: Innovations in Printing
    Chapter 3
    Using the Internet: Making the Most of the Web’s Resources
    Working and Playing on the Web
    The Internet and How It Works
    The Origin of the Internet
    How the Internet Works
    Communicating and Collaborating on the Web
    Social Networking
    E-Mail
    Instant Messaging
    Wikis
    Blogs
    Podcasts and Webcasts
    Web Entertainment
    Conducting Business Over the Internet: E-commerce
    E-commerce Safeguards
    Try This: Create a SkyDrive Account and Store and Share Your
    Files in the Cloud
    Using the Web Effectively
    Accessing and Moving Around the Web
    Web Browsers
    URLs, Protocols, and Domain Names
    Hyperlinks and Beyond
    Favorites, Live Bookmarks, and Tagging
    DIG DEEPER: Discovering the Semantic Web
    TRENDS in IT: Doing Business on a Shoestring–Thanks to the Internet
    Searching the Web Effectively
    Using Search Engines Effectively
    Evaluating Websites
    Ethics in IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?
    Technology in Focus
    The History of the Personal Computer
    Chapter 4
    Application Software: Programs That Let You Work and Play
    Programs That Let You Work
    The Nuts and Bolts of Software
    TRENDS in IT: Mobile Commerce: What Have You Bought with Your Phone Lately?
    Productivity and Business Software
    Buying Productivity Software
    Word Processing Software
    Spreadsheet Software
    Presentation Software
    Database Software
    Note-Taking Software
    Personal Information Manager Software
    Microsoft Office Productivity Software Features
    Personal Financial Software
    Small Business Software
    Software for Large and Specialized Businesses
    Try This: Citing Website Sources
    Programs That Let You Play
    Multimedia and Entertainment Software
    Digital Image- and Video-Editing Software
    Digital Audio Software
    Media Management Software
    DIG DEEPER: How Cloud Computing Works
    Gaming Software
    Educational and Reference Software
    Drawing Software
    Managing Your Software
    Getting Software
    Software Licenses
    Getting the Right Software for Your System
    Installing and Uninstalling Software
    Ethics in IT: Can I Borrow Software That I Don’t Own?
    Chapter 5
    System Software: The Operating System, Utility Programs, and File Management
    Understanding System Software
    Operating System Fundamentals
    Real-Time Operating Systems
    Operating Systems for Networks, Servers, and Mainframes
    Operating Systems for Mobile Devices
    Operating Systems for Personal Computers
    What the Operating System Does
    The User Interface
    Processor Management
    Memory and Storage Management
    Ethics in IT: Sugar: The Sweet OS for Every Child
    Hardware and Peripheral Device Management
    Software Application Coordination
    The Boot Process: Starting Your Computer
    Step 1: Activating BIOS
    Step 2: Performing the Power-On Self-Test
    Step 3: Loading the OS
    Step 4: Checking Further Configurations and Customizations 1
    Handling Errors in the Boot Process
    Try This: Adding Icons to the Start Screen in Windows 8
    Using System Software
    The Windows Interface
    TRENDS in IT: Open Source Software: Why Isn’t Everyone Using Linux?
    Organizing Your Computer: File Management
    Organizing Your Files
    Viewing and Sorting Files and Folders
    Naming Files
    Working with Files
    Utility Programs
    Display Utilities
    The Programs and Features Utility
    File Compression Utilities
    System Maintenance Utilities
    System Restore and Backup Utilities
    DIG DEEPER: How Disk Defragmenter Utilities Work
    Accessibility Utilities
    Technology in Focus
    Information Technology Ethics
    Chapter 6
    Understanding and Assessing Hardware: Evaluating Your System
    Evaluating Key Subsystems
    Your Ideal Computer
    Evaluating the CPU Subsystem
    How the CPU Works
    CPU Factors
    Measuring the CPU
    Evaluating the Memory Subsystem
    The RAM in Your System
    Adding RAM
    Evaluating the Storage Subsystem
    Mechanical Hard Drives
    Solid State Drives
    DIG DEEPER: How a Mechanical Hard Drive Works
    Optical Drives
    Your Storage Capacity and Needs
    Try This: Measure Your System Performance
    Evaluating Other Subsystems and Making a Decision
    Evaluating the Video Subsystem
    Video Cards
    TRENDS in IT: Thunderbolt: The New Standard for Data Transfer
    Evaluating the Audio Subsystem
    Evaluating System Reliability
    Making a Final Decision
    Getting Rid of Your Old Computer
    Ethics in IT: Free Hardware for All
    Chapter 7
    Networking: Connecting Computing Devices
    How Networks Function
    Networking Fundamentals
    Network Architectures
    Network Architectures Defined by Distance
    Network Architectures Defined by Levels of Administration
    Ethernet Protocols
    Network Components
    Transmission Media
    Basic Network Hardware
    Network Software
    Connecting to the Internet
    Wired Broadband Internet Connections
    Wireless Internet Access
    Dial-Up Connections
    Try This: Testing Your Wired and Wireless Internet Connection Speeds
    Your Home Network
    Installing and Configuring Home Networks
    Planning Your Home Network
    Connecting Devices to a Router
    Network-Attached Storage Devices
    TRENDS in IT: Where Should You Store Your Files? The Cloud Is Calling!
    Home Network Servers
    Digital Entertainment Devices on a Network
    Specialized Home-Networking Devices
    Configuring Software for Your Home Network
    Troubleshooting Wireless Network Problems
    Ethics in IT: Sharing Your Internet Connection with Your Neighbors: Legal? Ethical? Safe?
    Securing Wireless Networks
    Technology in Focus
    Under the Hood
    Chapter 8
    Digital Devices and Media: Managing a Digital Lifestyle
    Mobile Devices
    Digital Convergence
    Telephony: Smartphones and Beyond
    Smartphone Basics
    Smartphone Components
    How Cell Phone Technology Works
    Synchronizing
    Text Messaging
    Mobile Internet
    Smartphone Security
    VoIP
    Smartphone GPS
    TRENDS in IT: NFC Chips: Do You Have a Digital Wallet?
    Tablets, Netbooks, and Ultrabooks
    Tablets
    Netbooks
    Ultrabooks
    Making a Choice
    Try This: Creating and Publishing a Movie
    The Digital Information Age
    Digital Defined
    Digital Media
    Digital Publishing
    Digital Music
    DIG DEEPER: The Shift to Digital Music: A Bumpy Ride
    Digital Photography
    Digital Video
    Ethics in IT: Managing Your Copyrights: Copyleft Might Simplify Your Life
    Chapter 9
    Securing Your System: Protecting Your Digital Data and Devices
    Major Threats to Your Digital Asset
    Cybercrime and Identity Theft
    Computer Viruses
    Catching a Virus
    Boot-Sector Viruses
    Logic Bombs and Time Bombs
    Worms
    Script and Macro Viruses
    E-Mail Viruses
    Encryption Viruses
    Additional Virus Classifications
    Virus Symptoms
    Preventing Virus Infections
    Antivirus Software
    Software Updates
    Understanding Hackers
    Problems Hackers Can Cause
    Trojan Horses and Rootkits
    Denial-of-Service Attacks
    How Hackers Gain Computer Access
    Restricting Access to Your Digital Assets
    Firewalls
    Types of Firewalls
    How Firewalls Work
    Knowing Your Computer Is Secure
    Password Protection and Password Management
    Creating Passwords
    Managing Your Passwords
    Anonymous Web Surfing: Hiding from Prying Eyes
    Biometric Authentication Devices
    Try This: Testing Your Network Security
    Protecting Your Digital Property from Yourself
    Managing Online Annoyances
    Malware: Adware and Spyware
    Ethics in IT: You’re Being Watched … But Are You Aware You’re Being Watched?
    Spam
    Cookies
    DIG DEEPER: Computer Forensics: How It Works
    Keeping Your Data Safe
    Protecting Your Personal Information
    Backing Up Your Data
    Social Engineering
    Phishing and Pharming
    Scareware
    TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches
    Protecting Your Physical Computing Assets
    Environmental Factors
    Power Surges
    Deterring Theft
    Keep Them Safe: Alarms
    Keeping Mobile Device Data Secure
    Software Alerts and Data Wipes
    Technology in Focus
    Careers in IT
    Chapter 10
    Behind the Scenes: Software Programming
    Understanding Software Programming
    The Importance of Programming
    The Life Cycle of an Information System 4
    The System Development Life Cycle
    Ethics in IT: When Software Runs Awry
    The Life Cycle of a Program
    Describing the Problem: The Problem Statement
    Making a Plan: Algorithm Development
    Developing the Algorithm: Decision Making and Design
    Top-Down Design
    Object-Oriented Analysis
    Coding: Speaking the Language of the Computer
    DIG DEEPER: The Building Blocks of Programming Languages:
    Syntax, Keywords, Data Types, and Operators
    Compilation
    Coding Tools: Integrated Development Environments
    Debugging: Getting Rid of Errors
    Testing and Documentation: Finishing the Project
    Try This: Programming with Corona
    Programming Languages
    Many Languages for Many Projects
    Selecting the Right Language
    Exploring Programming Languages
    Visual Basic
    C and C++
    Java and C#
    Objective C
    HTML
    JavaScript and VBScript
    ASP, JSP, and PHP
    Flash, AJAX, and XML
    Mobile Applications
    TRENDS in IT: Emerging Technologies: Unite All Your Video
    Game Design Tools
    The Next Great Language
    Chapter 11
    Behind the Scenes: Databases and
    Information Systems
    Database Basics
    Database Building Blocks
    Databases versus Lists
    Advantages of Using Databases
    Database Management Systems
    Database Terminology
    Planning and Creating the Database
    Using Primary Keys
    Database Types
    Relational Databases
    Object-Oriented Databases
    Multidimensional Databases
    TRENDS in IT: Computers in Society: User-Populated Databases
    Database Functions
    Inputting Data
    Data Validation
    Viewing and Sorting Data
    Extracting or Querying Data
    DIG DEEPER: Structured Query Language (SQL)
    Outputting Data
    Try This: Using Excel’s Database Functions
    How Businesses Use Databases
    Data Warehousing and Storage
    Data Warehouses
    Populating Data Warehouses
    Data Staging
    Data Marts
    TRENDS in IT: Emerging Technologies: Can Your Business Partner
    Deliver the Goods? Enhanced Databases Can Help You Decide!
    Business Intelligence Systems
    Office Support Systems
    Transaction-Processing Systems
    Management Information Systems
    Decision Support Systems
    Enterprise Resource Planning Systems
    Data Mining
    Ethics in IT: Data, Data Everywhere–But Is It Protected?
    Chapter 12
    Behind the Scenes: Networking and Security in the Business World
    Client/Server Networks and Typologies
    Client/Server Network Basics
    Networking Advantages
    Comparing Client/Server and Peer-to-Peer Networks
    Types of Client/Server Networks
    Servers
    Authentication and File Servers
    Print Servers
    Application Servers
    Database Servers
    E-mail Servers
    Communications Servers
    Web Servers and Cloud Servers
    TRENDS in IT: Virtualization: Making Servers Work Harder
    Network Topologies
    Bus Topology
    Ring Topology
    Star Topology
    Comparing Topologies
    Try This: Sharing Folders on a Home Network
    Setting Up Business Networks
    Transmission Media
    Wired Transmission Media
    Twisted-Pair Cable
    Coaxial Cable
    Fiber-Optic Cable
    Wireless Media Options
    Comparing Transmission Media
    Network Adapters
    Network Navigation Devices
    MAC Addresses
    Switches and Bridges
    Routers
    DIG DEEPER: The OSI Model: Defining Protocol Standards
    Network Operating Systems
    Client/Server Network Security
    Authentication
    Access Privileges
    Physical Protection Measures
    Firewalls
    Ethics in IT: How Should Companies Handle Data Breaches?
    Chapter 13
    Behind the Scenes: How the Internet Works 548
    Inner Workings of the Internet
    The Management of the Internet
    Internet Networking
    Internet Data Routes
    The Network Model of the Internet
    Data Transmission and Protocols
    Circuit Switching
    Packet Switching
    TCP/IP
    Internet Identity: IP Addresses and Domain Names
    IP Addresses
    DIG DEEPER: Connection-Oriented Versus Connectionless Protocols
    Domain Names
    Try This: Ping Me
    Coding and Communicating on the Internet
    HTML, XML, and Other Web Building Blocks
    HTML
    XML
    Web Browser Protocols
    Server-Side Applications
    Client-Side Applications
    Communications Over the Internet
    E-mail
    E-mail Security: Encryption
    Ethics in IT: Web Browsing: Not as Private as You May Think
    Instant Messaging
    TRENDS in IT: Crowdsourcing: Harnessing the Power of Social Networks
    Glossary
    Index

    Reviews

    There are no reviews yet.

    Be the first to review “Test Bank for Technology In Action, Complete (10th Edition) by Alan Evans”

    Additional Information


    Resource Type:

    Ebook Title:

    Authors:

    Publisher: