Discovering Computers: Technology in a World of Computers, Mobile Devices, and the Internet (Shelly Cashman Series)

Discovering Computers: Technology in a World of Computers, Mobile Devices, and the Internet (Shelly Cashman Series)

Misty E. Vermaat, Steven M. Freund, Susan L. Sebok

Language: English

Pages: 618

ISBN: 1305022262

Format: PDF / Kindle (mobi) / ePub


Based on extensive customer feedback, DISCOVERING COMPUTERS c2014 has been completely reexamined and revised to reflect the evolving needs of the concepts portion of the Introductory Computing course. This exciting new edition maintains many longstanding hallmarks, but is now highly focused on relevancy to provide students only with what they really need to know to be successful digital citizens in college and beyond. To better reflect the importance of certain topics in today's digital world, coverage of enterprise computing, ethics, Internet research skills, mobile computing, operating systems (other than Windows), browsers, security, and Web 2.0 has been expanded and integrated. New critical thinking and problem solving exercises are included in every feature throughout the text, engaging students in regular practice of higher-order thinking skills. In addition, students have more opportunity for hands-on practice with the completely revised end-of-chapter activities. With these enhancements and more, the new DISCOVERING COMPUTERS is an even more engaging teaching and learning tool for your classroom.

 

 

 

 

 

 

 

 

 

 

136 Other Physical Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Behavioral Health Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint • How To: Your Turn • Internet Research • Problem Solving • Critical Thinking • Beyond the Book. . . . . . . . . . . . . . . . . 140 – 150 CHAPTER CHAPTER 5 Digital Safety and Security: Identifying Threats, Issues, and Defenses 4 Programs and Apps: Using Software at Work, School, and Home Database .

152 The Role of the Operating System . . . . . . . . . . . . . . . . . . . . . . . . . 154 Software Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Productivity Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Project Development. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Word Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Presentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Spreadsheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 201 Digital Security Risks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Cybercrime.

42 – 52 CHAPTER 2 The Internet: Accessing, Searching, Sharing, and Communicating 53 The Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Evolution of the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Connecting to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Internet Service Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 How Data and Information Travel the Internet. . . . . . . . . . . . . . . . . 59 Domain Names and IP Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . 59 The World Wide Web. . . .

210 Safeguards against Unauthorized Access and Use . . . . . . . . . . . . . 210 Access Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 User Names and Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Possessed Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Biometric Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Digital Forensics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Software Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Safeguards against Software Theft. . . . . . . . . . . . . . . . . . . . . .

87 Discussion Forums. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 FTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.

Download sample

Download

Rated 4.46 of 5 – based on 15 votes