Information Technology:: The Future Now
Information Technology:: The Future Now
INTRODUCTION
1
to INFORMATION
TECHNOLOGY: The Future Now
Chapter Topics & Key Questions
UNIT 1A: The Mobile World, Information Technology, & Your Life
1.1 Information Technology & Your Life: The Future Now What is information
technology, and how does it affect education, health, money, leisure, government,
and careers?
1.2 Information Technology Is Pervasive: Cellphones, Email, the Internet,
& the E-World How does information technology facilitate email, networks, and
the use of the Internet and the web; what is the meaning of the term cyberspace?
1.4 The “All-Purpose Machine”: The Varieties of Computers What are the dif-
ferent sizes of computers, and what are clients and servers?
1.5 Understanding Your Computer What four basic operations do all computers
use, and what are some of the devices associated with each operation? How does
communications affect these operations?
So writes Michael Saylor, author of The Mobile Wave.1 The information revolution that
began with writing on clay tablets, then continued through the invention of the print-
ing press, radio and TV, and room-size and desktop computers, is now at a “tipping
point,” he asserts. Now mobile devices such as smartphones—cellphones with built-in
applications, multimedia capability, and Internet access—and tablet computers—
wireless portable computers primarily operated by a touch screen—are changing
nearly everything we do.
Consider the example below, the first in a number of “mini-cases,” business related and
otherwise, that we present in this book:
those, too, will disappear someday” and become part of the smartphone.
It would be simplistic, however, to predict that we’ll be doing all our computing
on just smartphones and tablets anytime soon. As one writer points out, “Heavier pro-
ductivity tasks—like, you know, typing—are still much easier to pull off on standard
2
laptops and desktops.”3 Moreover, the uses of smartphones and other portable devices
1. Internet, broadband, World Wide Web 16. Media file compression panel 1.1
2. PC and laptop computers 17. Microfinance
Top innovations in recent
3. Mobile phones 18. Photovoltaic solar energy years
4. Email 19. Large-scale wind turbines The majority (23 of the
5. DNA testing and sequencing 20. Internet social networking 30) are in the field of
To be more than just a new invention, an event was defined as an innovation if it created more opportunities
for growth and development and if it had problem-solving value.
Source: Adapted from “A World Transformed: What Are the Top 30 Innovations of the Last 30 Years?”
Knowledge@Wharton, February 18, 2009, http://knowledge.wharton.upenn.edu/article.cfm?articleid52163
(accessed May 10, 2013). 3
(processors), is said to rank among the 15 greatest innovations in all history, as important
as the invention of the number zero, money, printing, and participatory democracy.12
Unlike previous generations, you live in a world of pervasive computing or ubiquitous
computing—computing is everywhere. The basis for this phenomenon is the Internet, the
“Net” or “net,” that sprawling global connection of smaller computer networks that enable
data transmission at high speeds. Everything that presently exists on a personal computer,
experts suggest, will move onto the Internet, giving us greater mobility and involving the
Internet even more closely in our lives.13 Already, in fact, the United States has more devices
connecting to the Internet than it has people—425 million smartphones, tablets, personal
computers, and gaming consoles divided among the USA’s 311.5 million residents.14
COMPUTER TECHNOLOGY You likely know what a computer is, but to get to a formal
definition: a computer is a programmable, multiuse machine that accepts data—raw
facts and figures—and processes, or manipulates, it into information we can use,
such as summaries, totals, or reports. Its main purpose is to speed up problem solving and
increase productivity.
4
Education pays, with recent college graduates having lower rates of unemployment,
higher earnings, and better career prospects than their lesser educated peers.15 At every
level, the education system benefits from information technology, whether it’s online sys-
tems allowing families to track their elementary students’ grades, high schools enabling Sur v i v al T i p
use of smartphones for students to get help on assignments, or colleges offering free
Online Colleges and
online education.16 Accreditation
For-profit institutions are
TECH TALES Technology in Education: Adjusting Instructor Presentations not accredited by the same
to the Students standards as traditional not-
for-profit universities. Often
In her physics classes at the Massachusetts Institute of Technology, the course work in these pro-
Professor Gabriella Sciolla’s high-tech classroom has whiteboards and prietary schools is not eligible
huge display screens instead of blackboards. The professor can make for transfer into traditional
schools. For more information
brief presentations of general principles and then throw out multiple-choice
on how schools are accredited:
questions that students “vote” on, using wireless “personal response
www2.ed.gov/admins/finaid/
clickers.” accred/index.html
professor, helping her gauge the level of understanding in the room. “You www.guidetoonlineschools.com/
online-schools
know where they are,” she says. She can then adjust, slow down, or engage
http://chronicle.com/article/
students in guided discussions of their answers.17 Online-Programs-Face-
In her mathematics classes at Hillcrest High School in Greenville, South New/129608/
Avatar. The simulated depictions of humans are a staple not only of videogames but also of computerized training
programs. (What culture does “avatar” come from? See www.answers.com/topic/avatar?cat5technology.)
Institute, Kaplan University, Strayer University, and the University of Phoenix. More
than a third of institutions of higher education—and 97% of public universities—offer
more info! online courses, and many have attracted on-campus students, who say they like the
flexibility of not having to attend their classes at a set time.23
Online Colleges E-learning has been put to such varied uses as bringing career and technical courses to
The following websites provide high school students in remote prairie towns, pairing gifted science students with master
detailed information about get- teachers in other parts of the country, and helping busy professionals obtain further cre-
ting college degrees online: dentials outside business hours.
www.onlinecollegedegrees.net/
www.earnmydegree.com/index. TUTORING, SIMULATION, & AVATARS But the reach of information technology into
html education has only begun. “Intelligent tutoring systems” software is now available that
www.classesusa.com/indexall/?ca gives students individualized instruction when personal attention is scarce—such as
mpusType5online
the software Cognitive Tutor, which not only helps high school students to improve
www.guidetoonlineschools.com/
their performance in math but also sparks them to enjoy a subject they might have once
www.usdla.org/
disliked.
http://distancelearn.about.com/
(includes information about bad In colleges, more students may use interactive simulation games, such as McGraw-
programs, called diploma mills) Hill’s Business Strategy Game, to apply their knowledge to real-world kinds of prob-
www.distancelearning.com/ lems. And employees in company training programs may find themselves engaged in
www.elearners.com/resources/ mock conversations with avatars—computer depictions of humans, as are often found
in online videogames—that represent imaginary customers and coworkers, combining
the best parts of computer-based learning with face-to-face interaction. An avatar is also
part of your online representation of yourself; it gives other users a “face” to go with
your username (“online name”).
more info!
Health: High Tech for Wellness
Carnegie Learning’s
Cognitive Tutor
Computers are now often used in the fields of health and medicine.
Software “Digital technology—on phones and tablets, in electronic record keeping, and in a host of
www.carnegielearning.com/specs/ clinical innovations—is transforming medicine in virtually every way,” says one account.
cognitive-tutor-overview/ “Not the least of the changes is the shifting relationship between doctors and patients.”24
(For now we use the word digital to mean “computer-based.”)
PRACTICAL ACTION
How to Be a Successful Online Student
1. Familiarize yourself with the computer and software. time. You may feel that taking
Be comfortable with the computer, Internet, email, web an online course will free up your
browser, and search engine software. Use tutorials to time for other tasks. If you are feeling
become familiar with the software used by your online overwhelmed by other responsibilities, such as work
school. or family obligations, then perhaps you had better
Take advantage of technology. Learn the various postpone your involvement. Online courses require as
ways of communicating on the web. Blogging, podcast- much and often more personal preparation time than
ing, videoconferencing, and chatting (discussed later on-campus courses. Everything that you would normally
in the book) are tools that will help you with online communicate by speech in class must be typed in an
studying. online course.
2. Do you have regular access to the Internet? Do you 7. You will need good written communication skills. Remem-
have your own email account? It is necessary to maintain ber, your primary means of communication is through
regular communication with the instructor with whom you writing. Being able to send well-structured messages
are taking the course. You must be able to answer your and essays will help with the communication process.
email quickly during the school week, which means within 8. Pay attention to detail, particularly when following
24 hours after receipt. And you should be able to suc- written directions. Assignments, projects, and so on
cessfully send and receive email with attachments. Stu- are posted in written form. Grades are drawn from work
dents must have a reliable Internet service provider (ISP) accomplished as directed. When grading assignments,
and email account before the start of class. (Students the instructor will look for competence in the work
are often required to use a school email account.) submitted. This means that all the required steps were
3. Read every document within your syllabus within the followed and presented in a professional manner.
first five days of your online course. This is usually the 9. Create a private study area. This will help you to focus
time to begin introducing yourself to your classmates on your studies without distractions and ensure that
and instructor and to start asking questions concerning others do not to disturb you while you are in your study
the expectations described in the syllabus. You need to area. Keep all your study materials here, so you know
know what is expected of you. where to look for them.
Know how to find assignments and course material,
as well as be able to participate in and post to discus- 10. Interact with your peers. Contribute and exchange
sions and send emails with attachments. your ideas, perspective, and comments with your
online classmates. Join online student communities
4. Are you comfortable working on your own? Are you and blogs.
self-motivated? You will have flexible use of the time to
spend on course work. Due dates are set by the instruc- 11. Interact with your faculty. Constantly stay in touch with
tor. Flexibility and independence are agreeable to some, your professors. Consult them if you have technical diffi-
but for others it is difficult to self-start. Be honest with culties or problems in understanding something related
yourself about your capabilities. to the course. Since your professors cannot see you,
TECH TALES New Telemedicine: The Doctor Will See You Now—Right Now
more info! New York technology writer Michael Wolff had a rotten cold and his regular
doctor was on vacation. So he used a program called ZocDoc. “I entered my
particulars: my ZIP code, my malady, my insurance,” he wrote. “And bingo, I
Health Websites had my choice of doctors in the vicinity and available appointments that day.
Some reliable sources: I chose an ear-nose-and-throat man a 10-minute walk from my house.”25
www.medlineplus.gov Similarly, Anna Keyes, an employee of a Houston-based Caterpillar dealer,
www.nimh.nih.gov who couldn’t shake chest congestion, walked down the office hallway and,
www.womenshealth.gov/ with the help of a clinical paramedic, connected to a physician 20 minutes
www.mayoclinic.com away, who examined her with an Internet-linked stethoscope and a handheld
www.nationalhealthcouncil.org video camera. In 20 minutes, she was back at her desk with the diagnosis
www.yourdiseaserisk.wustl.edu/ of an allergy and a prescription to cope with it.26
Image transfer technology allows radiologic images such as CT scans and MRIs to be
immediately transmitted to electronic charts and physicians’ offices.27 Patients in intensive
care, who are usually monitored by nurses during off-times, can also be watched over by
doctors in remote “control towers” miles away. Recent telemedicine innovations include
use of smartphones to enable doctors to take an electrocardiogram almost anywhere and to
help patients track for signs of skin cancer.28
Chapter 1
Electronic medical records and other computerized tools enable heart attack patients to
get follow-up drug treatment and diabetics to have their blood sugar measured. Software
can compute a woman’s breast cancer risk.
8
ROBOT MEDICINE Various robots—automatic devices that perform functions
ordinarily performed by human beings, with names such as ROBO DOC, RoboCart,
TUG, and HelpMate—help free medical workers for more critical tasks. The four-
armed da Vinci Si surgical robot, for instance, can do the smallest incisions and stitches
for complex surgery deep inside the body, so that surgery is less traumatic and recov-
ery time faster.29 Hydraulics and computers are being used to help artificial limbs get
“smarter,”30 and pressure-sensitive artificial skin made of tiny circuits is expected to
The Internet and other information technology have helped government deliver better ser-
vices and have paved the way for making governmental operations more transparent to the
public. They have also changed the nature of politics.
IMPROVING GOVERNMENT SERVICES In Boston, the next time your car hits
10 a pothole, you can use a feature (called Street Bump) to report it to someone in city
government who can do something about it. Boston also has a smartphone feature
with which you can adopt a fire hydrant, keeping it snowfree and making sure there’s
access.45 In 2012, Redwood City, California, became the first city in the nation to allow
residents to chat with a police officer online via voice, text, or video.46 In Seattle, San
Diego, and Oakland, police departments use social media such as Twitter and Facebook
to provide residents with moment-to-moment crime reports.47 In Chicago, police are
fighting back against shootings and murders by building a database, a computer sys-
tem with a collection of interrelated files, to track the social connections of the city’s
dozens of street gangs and their myriad factions.48 Some city officials, such as former
Newark, New Jersey, mayor Cory Booker, use social media such as Twitter to make
major announcements and to communicate more quickly with constituents than tradi-
more info!
tional channels, such as radio and TV, allow.49
The federal government, as you might expect, is also a big user of information technology. Online Government
The U.S. State Department has a “DipNote” blog read by more than 2 million readers, and it Help
holds press conferences on YouTube. Congress has a publicly searchable site on the web for all You can gain access to U.S.
federal contracts and grants over $25,000, and a growing number of states are putting every- government (federal, state, and
local) agencies through the fol-
thing from budgets to contracts to travel expenses online for the public to look at. The White lowing websites:
House also has its own site (www.whitehouse.gov), with its Open Government Dialogue blog.
www.usa.gov
www.govspot.com
CHANGING POLITICS Online voting is on the rise, with voters in the tiny East European
www.info.gov
nation of Estonia, for instance, being able to vote in the comfort of their homes via the
STARTING UP YOUR OWN VENTURE So pervasive have computers and the Internet
become that now is a fantastic time to “find new [career] routes into the uncharted wilder-
ness of the 21st-century economy,” writes Bard College professor Walter Russell Mead.58
Start-up costs for new ventures are incredibly low. “A decent computer and an Internet
connection gives a business startup the kind of information and access that only large
corporations used to be able to afford,” he says. “You don’t need nearly as much money to
start up a business as you used to—and there are many businesses that a recent college grad Sur v i v al T i p
can launch with little more equipment than that old college computer.”
Some Basic Computer
Among the possibilities are photography, home design, travel, food preparation and Skills Needed for Office
delivery, fashion, financial planning, tutoring, educational counseling services, fitness Jobs
training, child care, or any number of other activities. The best method is to consider the Keyboarding (typing)
needs and problems of your friends and neighbors and build a small business around sat- Microsoft Word
isfying those needs. In particular, look toward solving the problem of bottling the “hose Microsoft Excel
of the Internet,” filtering, organizing, and customizing the torrent of information so people Internet browser and email
can benefit from it. The life you build that way will probably be more satisfying, says (communications both on the
Mead, “and may well be substantially more remunerative than anything a traditional, Internet and within a business
environment)
off-the-shelf career has to offer.”
File sharing
WAYS FOR YOU TO FIND EMPLOYERS To have a chance of succeeding in today’s job
market, you need to combine a traditional education with training in computer skills. You
also need to be smart about job searching, résumé writing, interviewing, and postings of
employment opportunities. Advice about careers and job hunting is available at Career-
Builder.com, Career Advice Blogs, Working World, National Careers Service, and other
sites on the web.
As you might expect, the first to use cyberspace as a job bazaar were companies seeking
people with technical backgrounds, such as computer programmers. Now, however, online
job exchanges have broadened to include openings for forest rangers in Idaho, physical
Careers. (left) Front-desk workers at many hotels use computers to check in guests. (right) A technician cycles in the Large
Hadron Collider (LHC) at the European Organization for Nuclear Research (CERN) in the French village of Cessy near Geneva in
Switzerland. As hundreds of engineers and workers start two years of work to fit out the giant LHC particle collider to reach deep
into unknown realms of nature, CERN physicists look to the vast machine to unveil by the end of the decade the nature of the
mysterious dark matter that makes up a quarter of the universe and perhaps find new dimensions of space.
13
therapists in Atlanta, models in Florida, and English teachers in China. Most online job
panel 1.3 boards—Monster, Craigslist, CareerBuilder, and others—are free to job seekers, although
many require that you fill out an online registration form. (• See Panel 1.3.) More com-
Some websites that post
panies are also turning to social media, such as Twitter, Facebook, and the professional
job listings
site LinkedIn as a way to broadcast job openings.59 Facebook, for instance, offers a fea-
tured called the Social Jobs App for a central hub for members to find postings to about
1.7 million open jobs in the United States.60
WAYS FOR EMPLOYERS TO FIND YOU Posting your résumé online for prospective employ-
more info! ers to see has to be done with some care. Besides featuring a succinct summary of your top
achievements and related skills, it should also include links or web addresses to social-media
profiles and online portfolios (as of projects you have done). If you’re applying for a specific
Computer Basic Skills
job, your résumé should include applicable keywords from the employer’s job description.61
Test
Indeed, some companies now use tracking programs to scan résumés for keywords, former
A computer basic skills test is employers, years of experience, and schools attended to identify candidates of likely interest.62
usually a prerequisite for a job
or for placement companies:
Some companies are even ditching résumés and the conventional job interview process
for “Twitterviews”—interviews on Twitter.63 Indeed, says one account, some “recruiters are
www.cvtips.com/interview/
computer-basic-skills-test-job-
filling openings faster by relying on new tools that scour social networks and target work-
interview-tips.html ers who aren’t necessarily looking for jobs,” one example being Recruiter by LinkedIn.64
Obviously, if you want to be found, you need to make yourself visible. Thus, some experts
suggest you need to set up a Facebook page that allows you to interact with others on a
professional level, to participate in Twitter, and to write comments (posts) on other people’s
online journals—their blogs (weblogs), frequently updated sites on the World Wide
Web intended for public consumption that contain a writer’s observations, opinions,
images, and links to other websites.65 Also, your personal Facebook page should be pro-
fessional, because companies now do searches to examine a job candidate’s web presence
(http://online.wsj.com/article/SB10000872396390443759504577631410093879278.html).
provide electronic forums that people may join in the hope of meeting compatible
companions or mates. There are over 1,000 such sites, the biggest and best-known being
the mainstream sites Match.com, PlentyOfFish, Zoosk, eHarmony, and Singles.net. Then
there are niche sites, such as those for people of the same ethnicity (LatinAmerican Cupid,
Black People Meet, Asian People Meet), religion (ChristianMingle, JDate for Jewish
14 daters), occupations (FarmersOnly.com), and over 50 (Senior Friend Finder).68 There are
also niche sites for smokers, vegetarians, dog lovers, and so on. One website, Find Your
FaceMate, uses facial recognition to match couples who look alike.69 Of course, other
websites help people to find new friends, not potential mates, such as, for women, Social-
Jane.com and GirlFriendCircles.
Social-networking websites are not specifically designed for finding dates, but that is
how they are being used. Facebook, Twitter, and others let users build personal sites to
express their interests and display their personality. Facebook’s Graph Search extends
searches for singles on the network to friends of friends.70 Many online matchmakers are,
of course, accessible on smartphones.
OTHER AREAS OF PERSONAL LIFE “As we sit here,” says the head of consulting firm
Creative Strategies, “digital is embedded into the fiber of every aspect of our culture and
our personal lives.”71 Worried about walking across campus at night? Armed Safety Button
is a smartphone feature that, once activated, will track your location, set off an alarm, take
a series of photos of an assailant, project a blinding light, and place a call to 911.72 Need
more exercise or want to lose weight? There’s a Nike Training Club iPad feature that you
can use in your living room. There’s also an electronic fork, the HAPIfork, that monitors
eating speed and, through use of vibrations, encourages the user to slow down.73 New baby
in the family? A subscription to Diapers.com might be just the ticket.74 There seems to be
technology for every phase of life—and even beyond it, including memorial websites that
celebrate the lives of those who have departed.75
15
4000–1200 BCE 3500 BCE–2900 BCE 3000 BCE 1270 BCE 900 BCE 530 BCE 100 CE
transactions on clay
tablets
16
17
PRACTICAL ACTION
Managing Email
D
espite the popularity of texting and social network- messages come in or at times
ing, email is still the preferred way for people to com- when you can’t really send a reply.
municate at work. Some people receive as many Incidentally, research has shown that stu-
as 300 emails a day—with perhaps 200 being junk dents who engage in very high email usage also often show
email (spam), unwanted email (“social spam,” such as alerts depressive symptoms.88 Conversely, other research finds
from social networks), bad jokes, or irrelevant memos (the that people who do not look at email frequently at work
“cc” or “courtesy copy”). One study found that the average were less stressed and more productive than others.89
knowledge worker spends 28% of the workweek writing, read- • Avoid using “Reply All”: People hate getting all those
ing, or responding to email.85 “thanks” and “appreciated” emails, as well as the deluge
Shayne Hughes, CEO at Learning for Leadership, man- of “reply alls” with messages of only minimal interest to
dated the unthinkable—forcing his workers to communicate them. Avoid using this feature unless your message is
for one week the old-fashioned way, face to face, which actu- really important.90
ally boosted productivity. Hughes believes dealing with email
• Don’t send long attachments: Attachments—computer
distracts employees from strategic thinking and discussions.
files of long documents or images attached to an email—
He also argues that “there’s a feeling senders get when
are supposed to be a convenience, but large files often
emailing someone with a problem or issue—a misplaced feel-
just clog the mail system.
ing of relief.” He adds, “It’s as if that person is simply detail-
ing the problem, clicking send, and all of sudden that problem • Don’t open attachments you don’t recognize: Some
is now someone else’s.”86 dangerous computer viruses—renegade programs that
Some tips:87 can damage your computer—have been spread by email
attachments that automatically activate the virus when
• Send less email, and send better email: The more email they are opened.
you send, the more you’ll get. Put short messages in the • Be aware that anyone might read the emails you
subject line so that recipients don’t have to open the send: Don’t send a message electronically you would
email to read the note. Make one point per email. Don’t be ashamed of if a third party read it. Email messages
reply to every email message you get. Don’t “cc” (copy to) are not written with disappearing ink; they remain in
people unless absolutely necessary. Don’t send chain let- a computer system long after they have been sent.
ters or lists of jokes. Don’t overuse the high-priority flag. “Delete” removes the email from the visible list, but
• Don’t waste time constantly checking email: Process the messages remain on your hard disk and some serv-
email for 5 to 10 minutes each hour rather than as ers and can be retrieved by experts. (Special software,
18
such as Spytech Eradicator and Revo, can completely convey emotional nuances. Avoid criticism and sarcasm
erase email from the hard disk, as we discuss later.) in electronic messaging. Nevertheless, you can use email
• Make sure emails to bosses, coworkers, and custom- to provide quick praise, even though doing it in person will
ers are literate: It’s okay to be informal when emailing take on greater significance.
friends, but employers and customers expect a higher • Be aware that email you receive at work is the prop-
standard. Pay attention to spelling and grammar. erty of your employer: Be careful of what you save,
• Don’t use email to express criticism and sarcasm: send, and back up.
Because email carries no tone or inflection, it’s hard to
THE INTERNET’S INFLUENCE: LIKE A “SECOND SKIN” There is no doubt that the
influence of the net and the web is tremendous. At present, about 82% of U.S. adults (94%
of ages 19–29) use the Internet, according to Pew Internet.91 But just how revolutionary is
the Internet? Is it equivalent to the invention of television, as some technologists say? Or
is it even more important—equivalent to the invention of the printing press? “Television
turned out to be a powerful force that changed a lot about society,” says technology writer
19
Kevin Maney. “But the printing press changed everything—religion, government, science,
global distribution of wealth, and much more. If the Internet equals the printing press, no
more info! amount of hype could possibly overdo it.”92
Unquestionably, however, for most of us the Internet and information technology have
Brief History of the become like a second skin—an extension of our intellects and even emotions, creating
Internet almost a parallel universe of “digital selves.”
We cover the Internet in more
detail in the next chapter, but if
you would like a brief history of
the Internet now, go to: UNIT 1B: The Basics of Information
www.isoc.org/internet/history/ Technology
brief.shtml
Perhaps you have been using computers a long time and in a multitude of ways. Or perhaps
not. In either case, this book aims to deliver important practical rewards by helping you
become “computer streetwise”—that is, tech smart.
MAKE BETTER BUYING DECISIONS No matter how much prices on computers and
portable devices come down, you will always have to make judgments about quality and
usefulness when buying services, equipment, and software, including apps—short for
“applications,” small, specialized programs downloaded onto mobile devices.
Incidentally, downloading is defined as transferring data from a remote computer
to one’s own computer or mobile device. Uploading is the reverse—transferring data
from your own device to a remote computer.
student may have no use for them. Students will, however, probably benefit
from adding the following free or low-cost apps to their smartphones or
tablets:93
Swype, SwiftKey 3, Path Input Pro: Make typing on a smartphone or
touch-screen tablet faster and more accurate; some of these even make
corrections as you type.
Skype, FaceTime: Allow you to video chat for free with others throughout
the world, using your device’s front- or rear-facing cameras.
Evernote: Write, type, or speak your ideas to Evernote, which helps you to
stay organized.
Google Earth: Lets you explore the world through satellite and ground-
level photos.
Pocket: Lets you save content you like, so you can read it later.
Snapguide: Provides user-created how-to guides.
UPGRADE YOUR EQUIPMENT & INTEGRATE NEW TECHNOLOGY New gadgetry and
software are constantly being developed. A knowledgeable user learns under what conditions
to upgrade, how to do so, and when to start over by buying a new machine or mobile device.
21
from retail to recreation. We hope you will come away from this book with ideas about
how the technology can benefit you in whatever work you choose.
Along the way—in the Experience Boxes, Practical Action boxes, Survival Tips, and
More Info! features—we offer many kinds of practical advice that we hope will help you
to become truly computer smart in a variety of ways, large and small.
Mainframe Computers
Mainframe computers are used in many large businesses.
The only type of computer available until the late 1960s, mainframes are water- or air-
cooled computers that cost $5,000–$5 million and vary in size from small, to medium, to
large, depending on their use. Small mainframes ($5,000–$200,000) are often called midsize
computers; they used to be called minicomputers, although today the term is seldom used.
Mainframes are used by large organizations—such as banks, airlines, insurance companies, and
colleges—for processing millions of transactions. Often users access a mainframe by means of
a terminal, which has a display screen and a keyboard and can input and output data but
cannot by itself process data. Mainframes process billions of instructions per second.
Workstations
Workstations are used for graphics, special effects, and certain
IBM zEnterprise mainframe
professional applications.
computer
Introduced in the early 1980s, workstations are expensive, powerful personal
computers usually used for complex scientific, mathematical, and engi-
neering calculations and for computer-aided design and computer-aided
manufacturing; they are usually connected to a network. Providing many
capabilities comparable to those of midsize mainframes, workstations are used
for such tasks as designing airplane fuselages, developing prescription drugs,
and creating movie special effects. Workstations have caught the eye of the
public mainly for their graphics capabilities, which are used to breathe three-
dimensional life into movies such as Avatar, Harry Potter, Iron Man, and Lord
Workstation of the Rings. The capabilities of low-end workstations overlap those of high-end
desktop microcomputers.
Microcomputers
Microcomputers are used by individuals as well as businesses, and
they can be connected to networks of larger computers. There are
many types of microcomputers.
Microcomputers, also called personal computers (PCs), which cost $500 to over
$5,000, can fit next to a desk or on a desktop or can be carried around. They either
are stand-alone machines or are connected to a computer network, such as a local area
network. A local area network (LAN) connects, usually by special cable and also
Desktop PC wirelessly, a group of desktop PCs and other devices, such as printers, in an office
or a building.
Microcomputers are of several types: desktop PCs, tower PCs, notebooks (laptops) and
netbooks, tablets, mobile devices, and personal digital assistants—handheld computers or
palmtops. Also, some microcomputers are powerful enough be used as workstations.
DESKTOP PCS Desktop PCs are the original style of microcomputers whose case
or main housing sits on a desk, with keyboard in front and monitor (screen) often
on top.
TOWER PCS Tower PCs are microcomputers whose case sits as a “tower,” often on
the floor beside a desk, thus freeing up desk space. Some desktop computers, such as
Tower PC (with speakers, Apple’s iMac, no longer have a boxy housing; most of the computer components are built
keyboard, and mouse) into the back of the flat-panel display screen.
Chapter 1
TABLET COMPUTERS Computers such as those in Apple’s iPad line, Google’s Nexus,
the Kindle Fire, and Samsung’s Galaxy Tab are examples of a tablet computer, a wireless
portable computer that uses a touch screen (or a kind of pen called a stylus) to access Laptop computers: MacBook
information. The touch screen is a 7- to 10-inch screen on which you can manipulate words, Air and Chromebook
images, and commands directly with your finger. Tablets are rapidly eroding sales of note-
book and netbook computers.96 Tablets might soon be replaced by phablets—tablets that are
also smartphones.97
Tablets. Hewlett-Packard
Touchsmart touch screen and
Apple iPad tablet
Microcontroller.
(left) Various
microcontrollers in a
car. (right) Injection
of a VeriChip, which,
when implanted in a
person’s forearm or
shoulder, can provide
medical and identity
information when
scanned.
Microcontrollers
Many personal and household gadgets contain
microcontrollers.
Microcontrollers, also called embedded computers, are the tiny, spe-
cialized microprocessors installed in “smart” appliances and auto-
mobiles. These microcontrollers enable microwave ovens, for example,
to store data about how long to cook your potatoes and at what power
setting. Microcontrollers have been used to develop a new universe of
experimental electronic appliances—e-pliances. For example, they are
behind single-function products such as digital cameras and digital music
players, which have been developed into hybrid forms such as gadgets
that store photos and videos as well as music. They also help run tiny
machines embedded in clothing, jewelry, and such household appliances
as refrigerators. In addition, microcontrollers are used in blood-pressure
monitors, air bag sensors, gas and chemical sensors for water and air, and
vibration sensors.
Servers
Servers are computers having special software dedicated
Servers. (top) Lead technician to providing services to other computers.
services different companies’
Internet servers at Switch The word server describes not a size of computer but rather a particular way in which
and Data PAIX in Palo Alto, a computer is used. Nevertheless, because servers have become so important to tele-
California. Switch and Data PAIX communications, especially with the rise of the Internet and the web, they deserve
is one of the primary Internet mention here.
exchange points in North A server, or network server, is a central computer that holds collections of data
America, serving hundreds of (databases) and programs for connecting or supplying services to PCs, worksta-
businesses servers. (bottom) A tions, and other devices, which are called clients. These clients are linked by a wired
group of networked servers that or wireless network. The entire network is called a client-server network. In small
are housed in one location is organizations, servers can store files, provide printing stations, and transmit email. In
Chapter 1
called a server farm or a server large organizations, servers may also house enormous libraries of financial, sales, and
cluster. product information.
You may never lay eyes on a supercomputer or mainframe or even a tiny microcon-
troller. But most readers of this book already have seen and used a personal computer. We
26 consider this machine next.
• Data: Data consists of the raw facts and figures that are processed into
information—for example, the votes for different candidates being elected to student-
government office.
• Information: Information is data that has been summarized or otherwise
transformed for use in decision making—for example, the total votes for each
candidate, which are used to decide who won.
• Output operation: Output is whatever is output from (“put out of”) the
S u r vi v a l T ip computer system—the results of processing, usually information. Examples of
output are numbers or pictures displayed on a screen, words printed on paper by a
Output is covered in detail in printer, digital files stored on a CD, and music piped over loudspeakers.
Chapter 5.
• Communications operation: These days, most (though not all) computers have
communications ability, which offers an extension capability—in other words, it extends
the power of the computer. With wired or wireless communications connections, data
S u r vi v a l T ip may be input from afar, processed in a remote area, stored in several different locations,
and output in yet other places. However, you don’t need communications ability to write
Communications are covered in letters, do calculations, or perform many other computer tasks.
detail in Chapters 2, 6, and 7.
These five operations are summarized in the illustration at right. (• See Panel 1.7.)
CD/DVD drive
2
Processing: Once in the computer,
data can be processed—numbers
compared or sorted, text formatted, hard-disk drive (hidden)
images or sounds edited.
system unit
1
Input: You input data into the
computer, using a keyboard, mouse,
or other device (such as a scanner, 3
microphone, still camera, or video Storage: Data and programs
camera). The input data may be text, not currently being used are
numbers, images, and/or sounds. held in storage. Primary storage
is computer circuitry. Secondary
storage is usually some kind of
mouse disk (such as hard disk or
CD/DVD) or tape.
keyboard
5
Communications: Often data
or information can be transmitted
by modem to or from other 4 Output: Processed information is
computers, as via email or output on a monitor, speakers,
posting to a website. printer, or other device.
modem
(This one is external
and wireless. monitor
Modems are usually
internal—on a circuit card
inside the system unit.)
CASE & POWER SUPPLY Also known as the system unit, the case or system cabinet
is the box that houses the processor chip (CPU), the memory chips, the motherboard
(main circuit board), the power supply, and some secondary-storage devices—hard-
disk drive and CD or DVD drive, as we will explain. The case generally comes in desktop
or tower models. It includes a power supply unit and a fan to keep the circuitry from
overheating.
Case PROCESSOR CHIP It may be small and not look like much,
but it could be the most expensive hardware component of
a build-it-yourself PC—and doubtless the most important.
A processor chip (CPU, for central processing unit) is a
tiny piece of silicon that contains millions of miniature
electronic circuits. The speed at which a chip processes
information is expressed in megahertz (MHz), millions of
processing cycles per second, or gigahertz (GHz), billions
of processing cycles per second. The faster the processor, the
more expensive it is.
Processor chip
MEMORY CHIPS These chips are also small. Memory chips, also
Memory chip known as RAM (random access memory) chips, represent primary
(RAM chip) storage, or temporary, storage; they hold data before processing
and information after processing, before it is sent along to an out-
put or storage device. You’ll want enough memory chips to hold at
least 2–5 gigabytes, or roughly 2–5 billion characters, of data, which
is adequate for most student purposes. Students into heavy graphics
Memory chips mounted use and game playing will need more memory. (We will explain the
on module numbers used to measure storage capacities in a moment.)
Connecting strip that
plugs into a socket in MOTHERBOARD Also called the system board, the motherboard
the motherboard is the main circuit board in the computer. This is the big (usually)
Memory chip green circuit board to which everything else—such as the keyboard,
mouse, and printer—attaches through connections (called ports) in the back of the com-
puter. The processor chip and memory chips are also installed on the motherboard.
The motherboard has expansion slots—for expanding the PC’s capabilities—which
give you places to plug in additional or upgraded circuit boards, such as those for
video, sound, and communications (modem). (• See Panel 1.8.)
PUTTING THE COMPONENTS TOGETHER Now the components can be put together.
As the illustration at right shows, ❶ the memory chips are plugged into the motherboard.
Then ❷ the processor chip is plugged into the motherboard. Now ❸ the motherboard is
attached to the system cabinet. Then ❹ the power supply unit is connected to the system
cabinet. Finally, ❺ the wire for the power switch, which turns the computer on and off, is
connected to the motherboard.
Motherboard
Expansion
slots
2 Plug microprocessor
chip into motherboard
BIOS chip
Power
switch
5 Connect wire to
3 Attach power switch
motherboard
to system
cabinet System cabinet
4 Connect power
supply unit
(includes fan)
Hard-disk
drive
Keyboard Mouse
panel 1.8
For today’s student purposes, you’ll need a hard drive and a CD/DVD drive. These stor-
age devices slide into the system cabinet from the front and are secured with screws. Each Putting the components
drive is attached to the motherboard by a cable. Also, each drive must be hooked up to a together
plug extending from the power supply.
SOUND CARD To listen to music and sound effects on your PC, you’ll need a sound card,
which enhances the computer’s sound-generating capabilities by allowing sound to
be output through speakers, either built into the computer or connected externally. This
card, too, would be plugged into an expansion slot on the motherboard. With the CD drive
connected to the card, you can listen to music CDs.
MONITOR As with television sets, the inch dimension on monitors is measured diago-
Monitor nally corner to corner. The monitor is the display device that takes the electrical signals
from the video card and forms an image using points of colored light on the screen.
Later, after the system cabinet has been closed up, the monitor will be connected by means
of a cable to the back of the computer, using the clearly marked connector. The power cord
for the monitor will be plugged into a wall plug
Chapter 1
SPEAKERS Speakers are the devices that play sounds transmitted as electrical
signals from the sound card. They may not be very sophisticated, but unless you’re
into high-fidelity recordings they’re probably good enough. The speakers are either
built into the computer or connected to a single wire that is plugged into the back of
32 External speakers the computer.
PRINTER Especially for student work, you certainly need a printer, an output device
that produces text and graphics on paper. There are various types of printers, as we dis-
cuss later. The printer has two connections. One, which relays signals from the computer,
goes to the back of the PC, where it connects with the motherboard. (Wireless printers are
also available.) The other is a power cord that goes to a wall plug. Color printers are more
expensive than black-and-white printers, and fast printers cost more than slow ones.
Software
Computers use two basic types of software: system software
and application software.
After the computer has been assembled, it will be tested. But first the software, the electron-
ically encoded instructions that tell the computer hardware what to do, must be installed.
(Installation is the process of copying software programs from a main secondary-storage
Processing
Output Memory Input Input
Communications
source onto the system’s hard disk and some special chips, so that
you can have direct access to your hardware.)
Software is what makes the computer worthwhile, what makes
it functional for the user. There are two types—system software
and application software.
APPLICATION SOFTWARE Now we’re finally getting somewhere! After the application
software has been installed, the computer can be used for various activities. Application
software enables you to perform specific tasks—solve problems, perform work, or
entertain yourself. For example, when you prepare a term paper on your computer, you
will use a word processing program. (Microsoft Word and Apple’s Pages are two brands.)
Application software is specific to the system software you use. If you want to run Micro-
soft Word for the PC, for instance, you’ll need to first have Microsoft Windows system
software on your system, not Unix or Linux or certain versions of Apple OS X.
Application software comes on CDs packaged in boxes that include instructions, or it
can be downloaded from manufacturers’ websites on the Internet.
We discuss software in more detail in Chapter 3.
System software for the PC. A
version of Microsoft Windows 7
1.6 WHERE IS INFORMATION TECHNOLOGY
HEADED?
Computers are headed in three basic directions—miniaturization,
faster speeds, and greater affordability—and communications are
improving connectivity, interactivity, and support of multimedia.
How far we have come. At the beginning of the 20th century, most people thought they
would live the same life their parents did. Today most people aren’t surprised by the pre-
diction that the Information Age will probably transform their lives beyond recognition.
Let’s consider the trends in the development of computers and communications and, most
exciting, the area where they intersect.
The next step was the development of tiny integrated circuits. Integrated circuits are
entire collections of electric circuits or pathways that are now etched on tiny squares
(chips) of silicon half the size of your thumbnail. Silicon is a natural element found in
sand. In its pure form, it is the base material for computer processing devices. (All these
34 items are discussed in detail in Chapter 4.)
These are the three major trends in computers. What about communications?
PORTABILITY In the 1980s portability, or mobility, meant trading off computing power
and convenience in return for smaller size and weight. Today, however, we are at the point
where we don’t have to give up anything. As a result, experts have predicted that small,
powerful, wireless personal electronic devices will transform our lives far more than the
personal computer has done so far. “The new generation of machines will be truly personal
computers, designed for our mobile lives,” wrote one journalist two decades ago. “We
will read office memos between strokes on the golf course and answer messages from our
children in the middle of business meetings.”100 Today, of course, smartphones and tablets
make such activities commonplace.
COLLABORATION A more recent trend is mass collaboration. Says technology writer John
Markoff, “A remarkable array of software systems makes it simple to share anything instantly,
and sometimes enhance it along the way.”101 Another writer observed that the huge numbers of
people “online worldwide—along with their shared knowledge, social contacts, online reputa-
tions, computing power, and more—are rapidly becoming a collective force of unprecedented
power.”102 Examples are file-sharing, photo-sharing websites, calendar-sharing services,
group-edited informational (encyclopedic) sites called wikis, social-networking services, and
so-called citizen-journalism sites, in which average people write their own news items on the
Internet and comment on what other people post—an interactive, democratic form of mass
media.103 Pooled ratings, for instance, enable people to create personalized Internet music
radio stations or Amazon.com’s millions of customer-generated product reviews.
Chapter 1
36
care where the servers are located; they’re out there somewhere—
“in the cloud”—run by special cloud-service businesses, such as
Amazon Web Services, Rackspace, Google, and Microsoft. The
idea here is that companies can tap into computers/servers as they
are needed, just as they do now with the electric power grid, split-
ting their computing workload among data centers in different
parts of the world. The expectation of technology experts is that
companies will find cloud computing cheaper and easier than man-
aging their own microcomputers, servers, and software (although
security is a worry).105 Google, says one technology writer, is bet-
ting that its touch-screen Chromebook laptop will “propel the shift
toward a computing model where most of our applications and data
live online” in the cloud.106
37
The Computer Ethics Institute SPEED & SCALE Great amounts of information can be stored, retrieved, and transmitted
says:
at a speed and on a scale not possible before, especially now in the era of cloud comput-
1. Thou shalt not use a com- ing and Big Data. Despite the benefits, this has serious implications “for data security and
puter to harm other people.
2. Thou shalt not interfere with
personal privacy,” as well as employment, Forester and Morrison say, because information
other people’s computer work. technology can never be considered totally secure against unauthorized access.
3. Thou shalt not snoop around
in other people’s computer files. UNPREDICTABILITY Computers and communications are pervasive, touching nearly
4. Thou shalt not use a com-
puter to steal.
every aspect of our lives. However, at this point, compared to other pervasive technologies—
5. Thou shalt not use a com- such as electricity, television, and automobiles—information technology seems a lot less
puter to bear false witness. predictable and reliable.
6. Thou shalt not copy or use
proprietary software for which
you have not paid.
COMPLEXITY Computer systems are often incredibly complex—some so complex that
7. Thou shalt not use other they are not always understood even by their creators. “This,” say Forester and Morrison,
people’s computer resources “often makes them completely unmanageable,” producing massive foul-ups or spectacu-
without authorization or proper larly out-of-control costs.
compensation.
8. Thou shalt not appropriate
other people’s intellectual output. Ethics and security can often be talked about in the same breath, since secure computer
9. Thou shalt think about the
social consequences of the
systems obviously go a long way toward keeping people ethical and honest. When we
program you are writing or the discuss security, you will see the icon below.
system you are designing.
Chapter 1
EXPERIENCE BOX
Better Organization & Time Management:
Dealing with the Information Deluge in
College—& in Life
A
n Experience Box appears at the end of each chapter. Devote the First 1½ Hours of Your Day
Each box offers you the opportunity to acquire useful to Your Most Important Task. Writing a
experience that directly applies to the Digital Age. This paper? Studying a hard subject? Make it your first task
first box illustrates skills that will benefit you in college, of the day, and concentrate on it for 90 minutes. After
in this course and others. (Students reading the first 10 edi- that, your brain will probably need a rest, and you can
tions of our book have told us they received substantial benefit answer email, return phone calls, and so on. But until
from these suggestions.) that first break, don’t do anything else, because it can
take the brain 20 minutes to refocus.
“How on earth am I going to be able to keep up with what’s
required of me?” you may ask yourself. “How am I going to
handle the information glut?” The answer is by learning how
Improving Your Memory Ability
to learn. By building your skills as a learner, you certainly help Memorizing is, of course, one of the principal requirements
yourself do better in college, and you also train yourself to be for succeeding in college. And it’s a great help for success in
an information manager in the future. life afterward. Some suggestions:
• Mental and physical imagery: Use your visual and other senses to construct a personal image of what you
want to remember. Indeed, it helps to make the image humorous, action-filled, or outrageous in order to establish
a personal connection. Example: To remember the name of the 21st president of the United States, Chester
Arthur, you might visualize an author writing the number “21” on a wooden chest. This mental image helps you
associate chest (Chester), author (Arthur), and 21 (21st president).
• Acronyms and acrostics: An acronym is a word created from the first letters of items in a list. For instance,
Roy G. Biv helps you remember the colors of the rainbow in order: red, orange, yellow, green, blue, indigo, violet.
An acrostic is a phrase or sentence created from the first letters of items on a list. For example, Every Good Boy
Does Fine helps you remember that the order of musical notes on the treble staff is E-G-B-D-F.
• Location: Location memory occurs when you associate a concept with a place or imaginary place. For example,
you could learn the parts of a computer system by imagining a walk across campus. Each building you pass could
be associated with a part of the computer system.
• Word games: Jingles and rhymes are devices frequently used by advertisers to get people to remember their
products. You may recall the spelling rule “I before E except after C or when sounded like A as in neighbor or
weigh.” You can also use narrative methods, such as making up a story.
panel 1.10
Some memorizing tricks
offer on the first page of every chapter a list of the main Clearly the SQ3R method takes longer than simply reading
headings and accompanying key questions. At the end of with a rapidly moving color marker or underlining pencil. How-
each chapter we offer a review of terms and explanations. ever, the technique is far more effective because it requires
2. Question the segment in the chapter before you read it: your involvement and understanding. These are the keys to all
This step is easy to do, and the point, again, is to get you effective learning.
involved in the material. After surveying the entire chapter,
go to the first segment—whether a whole section, a sub-
Learning from Lectures
section, or even just a paragraph, depending on the level of Does attending lectures really make a difference? Research
difficulty and density of information. Look at the topic head- concludes that students with grades of B or above were more
ing of that segment (or first sentence of a very difficult para- apt to have better class attendance than students with grades
graph). In your mind, restate the heading as a question. of C– or below.119
Some tips for getting the most out of lectures:
After you have formulated the question, go to steps
3 and 4 (read and recite). Then proceed to the next Take Effective Notes by Listening Actively. Research
segment of the chapter, and restate the heading there shows that good test performance is related to good note
as a question, and so on. taking.120 And good note taking requires that you listen
3. Read the segment about which you asked the question: actively—that is, participate in the lecture process. Here
When you read the segment you asked the question are some ways to take good lecture notes:
about, read with purpose, to answer the question you
• Read ahead and anticipate the lecturer: Try to antici-
formulated. Underline or color-mark sentences that you
pate what the instructor is going to say, based on
think are important, if they help you to answer the ques-
your previous reading. Having background knowledge
tion. Read this portion of the text more than once, if
makes learning more efficient.
necessary, until you can answer the question. In addition,
determine whether the segment covers any other signifi- • Listen for signal words: Instructors use key phrases
cant questions, and formulate answers to these too. After such as, “The most important point is . . . ,” “There
you have read the segment, proceed to step 4. (Perhaps are four reasons for . . . ,” “The chief reason . . . ,” “Of
you can see where this is all leading. If you read in terms special importance . . . ,” “Consequently. . . .” When you
of questions and answers, you will be better prepared hear such signal phrases, mark your notes with a ! or *.
when you see exam questions about the material later.) • Take notes in your own words: Instead of just being a
4. Recite the main points of the segment: Recite means stenographer, try to restate the lecturer’s thoughts in
“say aloud.” Thus, you should speak out loud (or softly) your own words, which will make you pay attention more.
the answer to the principal question or questions about • Ask questions: By asking questions during the lecture,
Chapter 1
the segment and any other main points. you necessarily participate in it and increase your
5. Review the entire chapter by repeating questions: After understanding.
you have read the chapter, go back through it and review Review Your Notes Regularly. Make it a point to review
the main points. Then, without looking at the book, test your notes regularly—perhaps on the afternoon after the
your memory by repeating the questions and answers lecture, or once or twice a week. We cannot emphasize
40
you formulated. enough the importance of this kind of reviewing.
algorithm (p. 37) Formula, procedure, or set of steps for solving cloud computing (p. 36) Method of storing your software and/
a particular problem. Why it’s important: Algorithms are essen- or data not on your own PC or company’s computers but rather
tially the foundation, the building blocks, of computer science. on servers on the Internet. Why it’s important: Users could tap
Much of AI is based on the use of algorithms, as is software code. into computers as they are needed, distributing computing work-
load among data centers in different parts of the world, perhaps
application software (p. 34) Software that enables you to per- making computing cheaper and more reliable.
form specific tasks—solve problems, perform work, or entertain
yourself. Why it’s important: Application software such as word communications technology (p. 4) Also called telecommunica-
processing, spreadsheet, database management, graphics, and tions technology; consists of electromagnetic devices and sys-
communications packages are commonly used tools for increas- tems for communicating over any distance. Why it’s important:
ing people’s productivity. (Apps is short for “applications.”) Communications systems using electronic connections have helped
expand human communication beyond face-to-face meetings.
artificial intelligence (AI) (p. 37) Group of related technologies
used for developing machines to emulate human qualities, such computer (p. 4) Programmable, multiuse machine that accepts
as learning, reasoning, communicating, seeing, and hearing. data—raw facts and figures—and processes (manipulates) it
Why it’s important: Given the potential of artificial intelligence, into useful information, such as summaries and totals. Why
it will likely have far-reaching effects on human life in the years it’s important: Computers greatly speed up problem solving and
to come; the studies of the creation of intelligence involve a con- other tasks, increasing users’ productivity.
tinual process to eventually solve many problems.
connectivity (p. 35) Ability to connect computers to one
avatar (p. 6) Computer depiction of a human, often found in another by communications lines to provide online informa-
online videogames. Why it’s important: Avatars can be helpful in tion access and/or the sharing of peripheral devices. Why it’s
training, such as by representing imaginary customers. important: Connectivity is the foundation of the advances in the
Information Age. It provides online access to countless types of
Big Data (p. 37) Data that is so large and complex that it cannot information and services. The connectivity resulting from the
be processed using conventional methods. Why it’s important: The expansion of computer networks has made possible email and
amount of data in our world has been exploding, and analyzing online shopping, for example.
large data sets—Big Data—has become a key basis of business
competition, productivity growth, and innovation. Managing Big
cyberspace (p. 17) Area that includes not only the online world
Data has also become critical to the functioning of government.
and the Internet in particular but also the whole wired and wire-
less world of communications in general. Why it’s important:
blogs (weblogs) (p. 14) Frequently updated sites on the World
More and more human activities take place in cyberspace.
Wide Web intended for public consumption that contain a
writer’s observations, opinions, images, and links to other web-
data (p. 27) Raw facts and figures that are processed into
sites. Why it’s important: Blogs are used, for example, for low-
information. Why it’s important: Users need data to create useful
cost marketing, improving writing skills, trying out new ideas with
information.
people, getting experience in certain areas before looking for a
job, satisfying one’s need for creativity, and for putting something
interesting out into the world. database (p. 11) Computer system with a collection of inter-
related files that is designed and built for a specific purpose;
case (p. 30) Also known as the system unit or system cabinet; technology for pulling together facts that allows the slicing and
the box that houses the processor chip (CPU), the memory dicing and mixing and matching of data. Why it’s important:
CD (compact disk) drive (p. 32) Storage device that uses laser desktop PC (p. 24) Microcomputer unit that sits on a desk,
technology to read data from optical disk. Why it’s important: with the keyboard in front and the monitor often on top. Why it’s
New software is often supplied on CDs, in addition to being down- important: Desktop PCs and tower PCs are the most commonly
loaded from websites. The newest version is called DVD (digital used types of microcomputer.
video disk). The DVD format stores more data than the CD format.
distance learning (p. 5) Also known as e-learning and online
central processing unit (CPU) See processor chip. learning; name given to online education programs. Why it’s
important: Provides students increased flexibility because they do
chip See processor chip. not have to be in an actual classroom. Online classes are becom-
ing increasingly popular.
clients (p. 26) Computers and other devices connected to a
server, a central computer. Why it’s important: Client-server downloading (p. 20) Transferring data from a remote computer
networks are used in many organizations for sharing databases, to one’s own computer. Why it’s important: Allows text, music,
41
devices, and programs. and images to be transferred quickly by telecommunications.
DVD (digital video disk) drive See CD (compact disk) drive. keyboard (p. 28) Input device that uses keys to convert letters,
numbers, and other characters into electrical signals readable
e-learning See distance learning. by the processor. Why it’s important: Keyboards are the most
common kind of input device.
email (electronic mail) (p. 5) Messages transmitted over a
computer network, most often the Internet. Why it’s important: local area network (LAN) (p. 24) Network that connects, usu-
Email has become universal and is heavily used in business and ally by special cable and also wirelessly, a group of desktop PCs
professional work. and other devices, such as printers, in an office or a building.
Why it’s important: LANs have replaced mainframes for many
e-readers (e-book readers) (p. 25) Electronic devices that can functions and are considerably less expensive.
download e-books—digital versions of regular books, articles,
and magazines from various suppliers. Why it’s important: mainframe (p. 24) Second-largest computer available, after the
E-books are cheaper than print books, and e-readers can easily supercomputer; capable of great processing speeds and data
be put in a purse or a pocket. They can download books via a storage. Small mainframes are often called midsize computers.
wireless network almost anywhere or from a computer and are Why it’s important: Mainframes are used by large organizations
relatively inexpensive. (banks, airlines, insurance companies, universities) that need to
process millions of transactions.
ethics (p. 38) Set of moral values or principles that govern the
conduct of an individual or a group. Why it’s important: Ethical memory chip (p. 30) Also known as RAM (for “random access
questions arise often in connection with information technology. memory”) chip; primary (temporary) storage. Why it’s important:
Holds data before processing and information after processing,
expansion slots (p. 30) Internal “plugs” used to expand the before it is sent along to an output or storage device.
PC’s capabilities. Why it’s important: Expansion slots give you
places to plug in additional circuit boards, such as those for microcomputer (p. 24) Also called personal computer (PC);
video, sound, and communications (modem). small computer that fits on or next to a desk or can be carried
around. Why it’s important: The microcomputer reduced the reli-
hard-disk drive (p. 32) Device that stores billions of characters ance on mainframes and has provided more ordinary users with
of data on a nonremovable disk platter usually inside the com- access to computers. It can be used as a stand-alone machine or
puter case. Why it’s important: Hard disks have a very large stor- connected to a network and is essential in many businesses and
age capacity. Nearly all microcomputers use hard disks as their professions.
principal secondary-storage medium.
microcontroller (p. 26) Also called an embedded computer; the
hardware (p. 27) All the machinery and equipment in a com- smallest category of computer. Why it’s important: Microcon-
puter system. Why it’s important: Hardware runs under the trollers are the tiny, specialized microprocessors built into “smart”
control of software and is useless without it. However, hardware electronic devices, such as appliances and automobiles.
contains the circuitry that allows processing.
mobile device (p. 25) Fully Internet-integrated, handheld multi-
information (p. 27) Data that has been summarized or other- media computer highly compatible with desktop microcomputers
wise transformed for use in decision making. Why it’s important: and laptops. Why it’s important: Some mobile devices are too
The whole purpose of a computer (and communications) system small to adequately view images on screen, but viewers still want
is to produce (and transmit) usable information. more pocket-size portability than is possible with a laptop.
information technology (IT) (p. 3) Technology that helps pro- modem (p. 33) Device that sends and receives data over tele-
duce, manipulate, store, communicate, and/or disseminate phone lines or cable lines, or wirelessly over a network, to and
information. Why it’s important: Information technology is bring- from computers. Why it’s important: A modem enables users to
ing about the fusion of several important industries dealing with transmit data from one computer to another.
computers, telephones, televisions, and various handheld devices.
monitor (p. 32) Display device that takes the electrical signals
input (p. 27) Whatever is put in (“input”) to a computer system. from the video card and forms an image using points of colored
Input devices include the keyboard, the touch screen, and the light on the screen. Why it’s important: Monitors enable users to
mouse. Why it’s important: Useful information cannot be pro- view output without printing it out.
duced without input data.
motherboard (p. 30) Also called the system board; main circuit
interactivity (p. 35) Two-way communication; a user can respond board in the computer. Why it’s important: This is the big green
to information he or she receives and modify the process. Why circuit board to which everything else—such as the keyboard,
it’s important: Interactive devices allow the user to actively partici- mouse, and printer—is attached. The processor chip and memory
pate in a technological process instead of just reacting to it. chips are also installed on the motherboard.
Chapter 1
Internet (the “Net” or “net”) (p. 19) Worldwide computer net- mouse (p. 29) Nonkeyboard input device, called a “pointing
work that connects hundreds of thousands of smaller networks device,” used to manipulate objects viewed on the computer
linking computers at academic, scientific, and commercial insti- display screen. Why it’s important: For many purposes, a
tutions, as well as individuals. Why it’s important: Thanks to the mouse is easier to use than a keyboard for inputting com-
Internet, millions of people around the world can share all types mands. Also, the mouse is used extensively in many graphics
42
of information and services. programs.
multimedia (p. 35) From “multiple media”; technology that Why it’s important: By holding data, primary storage enables the
presents information in more than one medium—including text, processor to process.
graphics, animation, video, and sound—in a single integrated
communication. Why it’s important: Multimedia is used increas- printer (p. 33) Output device that produces text and graphics
ingly in business, the professions, and education to improve the on paper. Why it’s important: Printers provide one of the principal
way information is communicated. forms of computer output.
nanotechnology (p. 23) Technology whereby molecule-size processing (p. 28) The manipulation a computer does to trans-
nanostructures are used to create tiny machines for holding form data into information. Why it’s important: Processing is the
data or performing tasks. Why it’s important: Could result in essence of the computer, and the processor is the computer’s
tremendous computer power in molecular-size devices. (Nano “brain.”
means “one-billionth.”)
processor chip (p. 30) Also called the processor, the CPU (cen-
netbook (p. 25) Low-cost, lightweight computer with tiny dimen- tral processing unit), or simply chip; tiny piece of silicon that con-
sions and with functions designed for basic tasks, such as tains millions of miniature electronic circuits used to process
web searching, email, and word processing; weighs 2.25–3.2 data. Why it’s important: Chips have made possible the develop-
pounds. Why it’s important: These cheaper computers fill a tech- ment of small computers.
nological category between notebooks and handheld devices.
robot (p. 8) Automatic device that performs functions ordinar-
network (p. 4) Communications system connecting two or ily performed by human beings. Why it’s important: Robots help
more computers. Why it’s important: Networks allow users to perform tasks that humans find difficult or impossible to do.
share applications and data and to use email. The Internet is
the largest network. secondary storage (p. 28) Also called storage; devices and
media that store data and programs permanently—such as
notebook computer (p. 25) Also called laptop computer; light- disks and disk drives, tape and tape drives, CDs and CD drives.
weight portable computer with a built-in monitor, keyboard, hard- Why it’s important: Without secondary storage, users would not
disk drive, battery, and adapter; weighs 1.8–12 pounds. Why it’s be able to save their work. Storage also holds the computer’s
important: Notebooks and other small computers have provided software.
users with computing capabilities in the field and on the road;
however, they are now being displaced by tablets.
server (p. 26) Also called network server; central computer
in a network that holds collections of data (databases)
online (p. 4) Use of a computer or some other information
and programs for connecting PCs, workstations, and other
device, connected through a network, to access information and
devices, which are called clients. Why it’s important: Servers
services from another computer or information device. Why it’s
enable many users to share equipment, programs, and data
important: Online communication is widely used by businesses,
(linked together in a client-server network).
services, individuals, and educational institutions.
smartphone (p. 2) Cellphone with built-in applications, multi-
online learning See distance learning.
media capability, and Internet access. Why it’s important: The
smartphone has made almost everything we do more portable
online relationship site (p. 14) Electronic forum that people
and immediate.
may join in the hope of meeting compatible companions or
mates. Why it’s important: This is an example of how informa-
tion technology is changing people’s personal lives. social network (p. 3) Site on the World Wide Web (such as
Facebook and Twitter) that allows users to interact and develop
output (p. 28) Whatever is output from (“put out of”) the com- communities around similar interests—and use mobile devices
puter system; the results of processing. Why it’s important: to research products and compare prices. Why it’s important:
Social networks—for good or ill—are affecting almost every way
supercomputer (p. 23) High-capacity computer with thousands fixed devices. Why it’s important: Text messaging is the most
of processors; the fastest calculating device ever invented. widely used data application.
Costs up to $350 million or more. Why it’s important: Supercom-
puters are used primarily for research purposes, airplane design, tower PC (p. 24) Microcomputer unit that sits as a “tower,”
oil exploration, weather forecasting, and other activities that can- often on the floor, freeing up desk space. Why it’s important:
not be handled by mainframes and other less powerful machines. Tower PCs and desktop PCs are the most commonly used types of
microcomputer.
system software (p. 34) Software that enables the computer
to perform essential operating tasks. Why it’s important: Appli- uploading (p. 20) Transferring data from one’s own computer to
cation software cannot run without system software. System a remote computer. Why it’s important: Allows text, music, and
software consists of several programs. The most important is images to be transferred quickly by telecommunications.
the operating system, the master control program that runs the
computer. Examples of operating system software for the PC are video card (p. 32) Circuit board that converts the processor’s
various Microsoft programs (Windows), Unix, Linux, and the Macin- output information into a video signal for transmission through
tosh operating system. a cable to the monitor. Why it’s important: Virtually all computer
users need to be able to view video output on the monitor.
system unit See case.
virtual (p. 10) Something that is created, simulated, or carried on
tablet computer (pp. 2, 25) Wireless portable computer, such by means of a computer or a computer network. Why it’s important:
as Apple’s iPad, primarily operated via a touch screen. Why it’s Allows actual objects to be represented in computer-based form.
important: Tablet computers are easy to use and easy to carry
around, and they don’t require a keyboard. The screen is a 7- to workstation (p. 24) Smaller than a mainframe; expensive, pow-
10-inch touch screen (one can manipulate the screen contents erful computer generally used for complex scientific, mathemati-
directly with one’s hand or a stylus.) Tablet computers support cal, and engineering calculations and for computer-aided design
multimedia. and computer-aided manufacturing. Why it’s important: The
power of workstations is needed for specialized applications too
terminal (p. 24) Input and output device that uses a keyboard large and complex to be handled by PCs.
for input and a monitor for output; it cannot process data. Why
it’s important: Terminals are generally used to input data to and World Wide Web (the “Web” or the “web”) (p. 19) The inter-
receive data from a mainframe computer system. connected system of Internet servers that support specially
formatted documents in multimedia form—sounds, photos, and
texting (text messaging) (p. 17) Sending and receiving short video as well as text. Why it’s important: The web is the most
written messages between mobile phones or other portable or widely known part of the Internet.
CHAPTER REVIEW
More and more educators are favoring an approach to learn- questions, and true-false questions enable you to test
ing (presented by Benjamin Bloom and his colleagues in Tax- how well you recall basic terms and concepts.
onomy of Educational Objectives) that follows a hierarchy of • Stage 2 learning—comprehension: “I can recall informa-
six critical-thinking skills: (a) two lower-order skills—memori- tion in my own terms and explain it to a friend.” Using
zation and comprehension—and (b) four higher-order skills— open-ended, short-answer questions, we ask you to reex-
application, analysis, synthesis, and evaluation. While you press terms and concepts in your own words.
may be able to get through many introductory college courses
• Stage 3 learning—applying, analyzing, synthesizing,
by simply memorizing facts and comprehending the basic
evaluating: “I can apply what I’ve learned, relate these
ideas, to advance further you will probably need to employ the
ideas to other concepts, build on other knowledge, and
four higher-order thinking skills.
use all these thinking skills to form a judgment.” In this
In the Chapter Review at the end of each chapter, we have
part of the Chapter Review, we ask you to put the ideas
implemented this hierarchy in a three-stage approach, as
into effect using the activities described, some of which
follows:
include Internet activities. The purpose is to help you
• Stage 1 learning—memorization: “I can recognize and take possession of the ideas, make them your own, and
recall information.” Self-test questions, multiple-choice apply them realistically to your life.
Chapter 1
44
t a g
e
s
1 LEARNING MEMORIZATION
“I can recognize and recall information.”
t a g
e
s
2 LEARNING COMPREHENSION
“I can recall information in my own terms and explain it to a friend.”
2. What is the difference between system software and 10. What is meant by connectivity?
application software? 11. Describe some ways that information technology can
3. Briefly define cyberspace. be used to help people find jobs and to help jobs find
people.
4. What is the difference between software and hardware?
12. Compare the use of email to the use of the telephone
5. What is a local area network? and of conventional letters sent via the postal system.
6. What is multimedia? Which kinds of communications are best suited for
7. What is the difference between microcomputers and which medium?
supercomputers? 13. What is the basic meaning of cloud computing?
t a g
e
s
What are they used for? How are they connected to of the then-futuristic technology displayed. Classify
other computers? Are any offices or departments using what you see according to input, output, processing,
cloud services? If yes, do any users have complaints storage, and communications. Then watch a recent
about using the cloud? science fiction movie, and also list all the futuristic
46
technology used according to the given categories. television set; it can make telephone calls as if it were a
What was futuristic in the old movie that is now real- telephone; it can let you “draw” and “paint”; it can be pro-
ity? What in the new movie is not yet reality but seems grammed to serve as an answering machine; and so forth.
already feasible? Imagine a future in which digital electronic devices have
5. From what you’ve read and what you have experienced replaced all the things they can emulate. What benefits
and/or observed in your life, do you have a positive, to your life can you see in such a future? What things
negative, or impartial view of our rapidly converging might be worse? What dangers can you see? Do you
technological society? Why? Reevaluate your answers think this kind of radical convergence is likely? If so,
as you work through the course. how long do you think it will take?
6. Computer prices are constantly falling. Whatever you pay
for a computer today, you can be certain that you will be Web Exercises
able to buy a more powerful computer for less money
a year from now and, quite possibly, even just a month If you are not yet familiar with web surfing, wait until you have
from now. So how can you decide when it’s a good finished Chapter 2 to do the following web exercises.
time to upgrade to a better computer? Paradoxically, it 1. Are computers, cellphones, and other electronic devices
seems that no matter how you time it, you’ll always lose, bad for our health? You may have heard the term elec-
because prices will go down again soon, and yet you tromagnetic radiation and dismissed it as an obscure
will also always gain, because, since you were going to scientific term not worth understanding. Visit the links
upgrade sooner or later anyway, you will reap the benefits below to become educated on a topic that will be dis-
of having the more powerful equipment that much longer. cussed more seriously and frequently as our society
Discuss the benefits and costs, both material and psy- becomes completely wireless.
chological, of “waiting until prices drop.” Gather more www.cancer.gov/cancertopics/factsheet/Risk/cellphones/
information on this topic by asking friends and colleagues
which choices they have made about upgrading equip- http://www.huffingtonpost.com/devra-davis-phd/cell-
ment over the years and whether they feel satisfaction or phone-radiation-_b_828330.html
regret about the timing when they finally did upgrade. www.howstuffworks.com/cell-phone-radiation.htm
7. Computers are almost everywhere, and they affect most www.fda.gov/Radiation-EmittingProducts/Radiation
walks of life—business, education, government, mili- EmittingProductsandProcedures/HomeBusiness
tary, hobbies, shopping, socializing, research, and so andEntertainment/CellPhones/ucm116282.htm
on. What aspects of your life can you think of that still www.ewg.org/cellphone-radiation/
seem relatively unaffected by computers and technol- 2. List some pros and cons of a “paperless” environment.
ogy? Is this a good thing or a bad thing, and is it likely Do you believe that a paperless environment is some-
to last? What aspects of your life have been the most thing worth striving for in the workplace? In the home?
conspicuously affected by technology? Has anything In the classroom? In banking? Run a web search to see
been made worse or harder in your life by the advance what others are doing to implement this idea. What
of computers? What about things that have been made might be the downsides of using less paper?
better or easier?
3. Computer pioneer John von Neumann was one of a
8. Have you become extremely dependent on some tech- group of individuals who conceived the idea of the
nologies? Some people no longer write down telephone “stored program.” He could also divide two 8-digit num-
numbers anywhere; instead, they simply program them bers in his head. Spend some time researching this
into their cellphones. Some people feel helpless in a remarkable man; at online bookstores, look up some of
foreign country unless they have a calculator in hand the books he wrote and read the reviews.
to compute currency conversions. Many people rely on
4. Looking for legally free programs? Some places to start:
their email archive or cellphone to hold essential infor-
mation, such as addresses and appointments. When www.download.com/
6. “Moore’s Law” predicts the rate at which computers will a. Make a small change on a page on one of the listed
continue to get smaller (and hence faster). The “law” sites or on some other wiki site you have identified.
has proved to be astonishingly accurate over many Submit your change, and note the results. Anyone
years. Do a web search for Moore’s Law, and see if you navigating to that site will now see your change.
can find answers to the following questions: Did you know that website authoring could be
a. Who is Moore, and when did he make the prediction that easy? Are you surprised that someone would
we know as Moore’s Law? unconditionally open up his or her website for
anyone to edit?
b. What is the simplest statement of the law’s prediction?
b. Since you can make any change you wish, even
c. How has the law changed over time?
something totally nonsensical or simply wrong,
d. Is the law still valid? If yes, how much longer is the it’s obviously possible for incorrect or misleading
law expected to hold true? content to appear on a wiki. Given that, why do you
e. How does the law affect business projections? think that wikis have become so popular and so
7. A wiki is a website on which authoring and editing can be widespread?
done very easily by anyone, anywhere, anytime using a c. How significant a problem do you think vandalism
web browser such as Internet Explorer or Mozilla Firefox, and other acts of poor citizenship might be on
with no need for special software or other special require- “open” wikis? How can you find out?
ments. (Wiki is Hawaiian for “quick.”) Most web pages are
d. Some wikis contend with the threat of vandalism by
less than perfect. If it is a wiki page and you are annoyed
requiring that a password be provided before a user
by something, you can just hit the Edit button and change
is allowed to make changes. What advantages can
it! Over time, the site gets better (people hope)!
you see to this approach? What disadvantages? Do
Here are some examples of wikis that deal with general you think the advantages of password protection
knowledge: outweigh the disadvantages? What do the wikis you
http://en.wikipedia.org/ browse through have to say about this issue?
www.wikimedia.org/ e. What measures do you think an online shared
http://wiki.ehow.com/Main-Page/ space can take to limit the potential damage from
vandalism, while not being overly restrictive?
And here are some specialized wikis:
http://recipes.wikia.com/wiki/Recipes_Wiki/ f. If you knew that a particular person was defacing
a wiki, what would you do about it? Report the
http://webtrends.about.com/od/wikilists/tp/list_of_wiki_
person? Wait for the vandal to get bored and turn
sites.htm
his or her mischief elsewhere? Or try to reform
www.wikispaces.com/ the person? Are the basic ethical considerations
www.wikia.com/Wikia/ here the same as those regarding other forms of
http://wikisineducation.wetpaint.com/ vandalism in our society?
Historical note: The first wiki site was created for the g. Do you think that open-access systems such as
Portland Pattern Repository in 1995. That site now unrestricted wikis will become more common over
hosts tens of thousands of pages. time, or do you think that abuse of such systems
will destroy their usefulness and that wikis will
• http://c2.com/cgi/wiki?WelcomeVisitors
eventually disappear?
• http://c2.com/cgi/wiki?WikiHistory
• http://c2.com/cgi/wiki?WikiDesignPrinciples
Chapter 1
48