0% found this document useful (0 votes)
22 views67 pages

Computing Essentials 2023: Making IT Work For You 29th Edition Timothy J. O'Leary

The document provides information about various eBooks available for download at ebookmeta.com, including titles such as 'Computing Essentials 2023' and 'Top Stocks 2023.' It highlights the 29th edition of 'Computing Essentials' by Timothy J. O'Leary, which covers key computing concepts and applications. Additionally, it lists other recommended digital products and provides links for instant downloads.

Uploaded by

kelcioregjaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views67 pages

Computing Essentials 2023: Making IT Work For You 29th Edition Timothy J. O'Leary

The document provides information about various eBooks available for download at ebookmeta.com, including titles such as 'Computing Essentials 2023' and 'Top Stocks 2023.' It highlights the 29th edition of 'Computing Essentials' by Timothy J. O'Leary, which covers key computing concepts and applications. Additionally, it lists other recommended digital products and provides links for instant downloads.

Uploaded by

kelcioregjaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

Read Anytime Anywhere Easy Ebook Downloads at ebookmeta.

com

Computing Essentials 2023: Making IT Work for You


29th Edition Timothy J. O'Leary

https://ebookmeta.com/product/computing-
essentials-2023-making-it-work-for-you-29th-edition-timothy-
j-oleary/

OR CLICK HERE

DOWLOAD EBOOK

Visit and Get More Ebook Downloads Instantly at https://ebookmeta.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

ISE Computing Essentials 2023 29th Edition Timothy.


O'Leary O'Leary (Linda. O'Leary

https://ebookmeta.com/product/ise-computing-essentials-2023-29th-
edition-timothy-oleary-oleary-linda-oleary/

ebookmeta.com

Top Stocks 2023 29th Edition Martin Roth

https://ebookmeta.com/product/top-stocks-2023-29th-edition-martin-
roth/

ebookmeta.com

Pearson's Federal Taxation 2023 Individuals 36th Edition


Timothy J. Rupert

https://ebookmeta.com/product/pearsons-federal-
taxation-2023-individuals-36th-edition-timothy-j-rupert/

ebookmeta.com

Student Carers in Higher Education: Navigating, Resisting,


and Re-inventing Academic Cultures 1st Edition Genine Hook
(Editor)
https://ebookmeta.com/product/student-carers-in-higher-education-
navigating-resisting-and-re-inventing-academic-cultures-1st-edition-
genine-hook-editor/
ebookmeta.com
Lonely Planet Best Day Hikes Italy 1st Edition Gregor
Clark

https://ebookmeta.com/product/lonely-planet-best-day-hikes-italy-1st-
edition-gregor-clark/

ebookmeta.com

New Blood The Godbearer 4 1st Edition L.C. Davis

https://ebookmeta.com/product/new-blood-the-godbearer-4-1st-edition-l-
c-davis/

ebookmeta.com

Howl of the Alpha Blood Moon Wolves Book 1 1st Edition


Milly Taiden

https://ebookmeta.com/product/howl-of-the-alpha-blood-moon-wolves-
book-1-1st-edition-milly-taiden-2/

ebookmeta.com

Exploring Internal Communication: Towards Informed


Employee Voice 4th Edition Kevin Ruck (Editor)

https://ebookmeta.com/product/exploring-internal-communication-
towards-informed-employee-voice-4th-edition-kevin-ruck-editor/

ebookmeta.com

Language Nation Race Linguistic Reform in Meiji Japan 1868


1912 1st Edition Atsuko Ueda

https://ebookmeta.com/product/language-nation-race-linguistic-reform-
in-meiji-japan-1868-1912-1st-edition-atsuko-ueda/

ebookmeta.com
The Wireless World: Global Histories Of International
Radio Broadcasting 1st Edition Simon J. Potter

https://ebookmeta.com/product/the-wireless-world-global-histories-of-
international-radio-broadcasting-1st-edition-simon-j-potter/

ebookmeta.com
Computing Essentials
Making IT work for you
INTRODUCTORY 2023
• The O’Leary Series
Computing Concepts
• Computing Essentials 2017
• Computing Essentials 2019
• Computing Essentials 2021
• Computing Essentials 2023

Microsoft Office Applications


• Microsoft® Windows 7: A Case Approach
• Microsoft® Office 2013: A Case Approach
• Microsoft® Office Word 2013: A Case Approach Introductory Edition
• Microsoft® Office Excel 2013: A Case Approach Introductory Edition
• Microsoft® Office Access 2013: A Case Approach Introductory Edition
• Microsoft® Office PowerPoint 2013: A Case Approach Introductory Edition
Computing Essentials
Making IT work for you
INTRODUCTORY 2023

Daniel A. O’Leary
Professor
City College of San Francisco

Timothy J. O’Leary
Professor Emeritus
Arizona State University

Linda I. O’Leary
Final PDF to printer

COMPUTING ESSENTIALS

Published by McGraw Hill LLC, 1325 Avenue of the Americas, New York, NY 10019. Copyright ©2023 by
McGraw Hill LLC. All rights reserved. Printed in the United States of America. No part of this publication
may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system,
without the prior written consent of McGraw Hill LLC, including, but not limited to, in any network or
other electronic storage or transmission, or broadcast for distance learning.

Some ancillaries, including electronic and print components, may not be available to customers outside
the United States.

This book is printed on acid-free paper.

1 2 3 4 5 6 7 8 9 LWI 27 26 25 24 23 22

ISBN 978-1-265-26321-8
MHID 1-265-26321-3

Cover Image: metamorworks/Shutterstock

All credits appearing on page or at the end of the book are considered to be an extension of the copyright page.

The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website
does not indicate an endorsement by the authors or McGraw Hill LLC, and McGraw Hill LLC does not
guarantee the accuracy of the information presented at these sites.

mheducation.com/highered

ole63213_fm_ise iv 01/05/22 05:21 PM


• Dedication
To Jackie, a friend and quiet companion of over 20 years.
You will be missed.
Brief Contents

1 Information Technology, the Internet, and You 2

2 The Internet, the Web, and Electronic Commerce 24

3 Application Software 56

4 System Software 84

5 The System Unit 108

6 Input and Output 134

7 Secondary Storage 164

8 Communications and Networks 186

9 Privacy, Security, and Ethics 214

10 Information Systems 246

11 Databases 268

12 Systems Analysis and Design 292

13 Programming and Languages 316

The Evolution of the Computer Age 347

The Computer Buyer’s Guide 358

Glossary 362

Index 383

vii
Contents

Communication 35
1 Social Networking 35
Blogs, Microblogs, Podcasts, and Wikis 36
INFORMATION TECHNOLOGY, Messaging 37
THE INTERNET, AND YOU 2 E-mail 38
Search Tools 40
Introduction 4 Search Engines 40
Information Systems 4 Content Evaluation 40
People 6 Electronic Commerce 41
Software 7 Security 42
System Software 7 Cloud Computing 43
Application Software 8 The Internet of Things 45
Making IT work for you: Careers in IT 45
A Look to the Future:
Free Antivirus Program 9
Home Smart Home 46
Hardware 10
Types of Computers 10
Visual Summary 47
Cell Phones 11
Key Terms 51
Personal Computer Hardware 11
Multiple Choice 52
Data 13 Matching 53
Connectivity and the Mobile Internet 14 Open-Ended 54
Careers in IT 15 Discussion 54
A Look to the Future: Using and Understanding
Information Technology 16

Visual Summary 17
Key Terms 20
3
Multiple Choice 21 APPLICATION SOFTWARE 56
Matching 22
Open-Ended 22 Introduction 58
Discussion 23 Application Software 58
App Stores 58
User Interface 58
Common Features 61
2 Mobile Apps 61
Apps 61
THE INTERNET, THE WEB, AND
General-Purpose Applications 62
ELECTRONIC COMMERCE 24 Word Processors 62
Introduction 26 Presentation Software 65
The Internet and the Web 26 Spreadsheets 66
Database Management Systems 68
Making IT work for you: Specialized Applications 69
Graphics Programs 69
Online Entertainment 28 Video Game Design Software 70
Internet Access 31 Web Authoring Programs 71
Providers 31 Other Specialized Applications 72
Browsers 31 Software Suites 72
Web Utilities 33 Office Suites 72
Filters 33 Cloud Computing 72
File Transfer Utilities 33 Specialized and Utility Suites 72
Internet Security Suites 34 Careers in IT 73

viii
Making IT work for you: Making IT work for you:
Cloud Office Suites 74 Gaming 112
A Look to the Future: The New Workplace Wearable Computers 114
Realities 76 Components 114
System Board 115
Visual Summary 77 Microprocessor 116
Key Terms 80 Microprocessor Chips 116
Multiple Choice 81 Specialty Processors 117
Matching 82 Memory 118
Open-Ended 82 RAM 118
Discussion 83 ROM 118
Flash Memory 118
Expansion Cards and Slots 119
4 Bus Lines 120
Expansion Buses 120
SYSTEM SOFTWARE 84 Ports 121
Introduction 86 Standard Ports 121
Specialized Ports 121
System Software 86
Cables 122
Operating Systems 87
Power Supply 122
Functions 87
Features 88 Electronic Data and Instructions 123
Categories 89 Numeric Representation 123
Character Encoding 124
Mobile Operating Systems 90
Careers in IT 125
Desktop Operating Systems 91
Windows 91 A Look to the Future: Brain–Computer
macOS 91 Interfaces 126
UNIX and Linux 92
Virtualization 92 Visual Summary 127
Utilities 93 Key Terms 130
Multiple Choice 131
Making IT work for you: Matching 132
Open-Ended 132
Virtual Assistant 94 Discussion 133
Operating System Utilities 96
Utility Suites 99
Careers in IT 99
A Look to the Future: Making Better Computers 6
by Making Them More Human 100
INPUT AND OUTPUT 134

Visual Summary 101 Introduction 136


Key Terms 104 What Is Input? 136
Multiple Choice 105 Keyboard Entry 136
Matching 106 Keyboards 136
Open-Ended 106 Pointing Devices 138
Discussion 107 Touch Screens 138
Mice 138
Game Controllers 138

5 Scanning Devices 139


Optical Scanners 139
THE SYSTEM UNIT 108 Card Readers 140
Bar Code Readers 140
Introduction 110 RFID Readers 141
System Unit 110 Character and Mark Recognition
Smartphones 110 Devices 141
Tablets 110 Image-Capturing Devices 141
Laptops 111 Digital Cameras 141
Desktops 111 Webcams 142

CONTENTS ix
Audio-Input Devices 142
Making IT work for you:
Voice Recognition Systems 142
What Is Output? 143 Cloud Storage 174
Monitors 143
Mass Storage Devices 176
Features 143
Enterprise Storage System 176
Flat-Panel Monitors 144
Storage Area Network 177
E-book Readers 144
Other Monitors 145
Careers in IT 177
Printers 146 A Look to the Future:
Features 146 Next-Generation Storage 178
Inkjet Printers 147
Laser Printers 147 Visual Summary 179
3D Printers 147 Key Terms 182
Other Printers 147 Multiple Choice 182
Audio-Output Devices 148 Matching 183
Combination Input and Output Open-Ended 184
Devices 148 Discussion 184
Headsets 148
Multifunctional Devices 149
Virtual Reality Head-Mounted Displays
and Controllers 149
Drones 149 8
Making IT work for you: COMMUNICATIONS
Headphones 150
AND NETWORKS 186
Robots 152 Introduction 188
Ergonomics 152 Communications 188
Portable Computers 154 Connectivity 188
The Wireless Revolution 189
Careers in IT 154
Communication Systems 189
A Look to the Future: The Internet of Communication Channels 190
Things 155 Wireless Connections 190
Physical Connections 191
Visual Summary 156 Connection Devices 192
Key Terms 160 Modems 192
Multiple Choice 161 Connection Service 193
Matching 162
Open-Ended 162 Making IT work for you:
Discussion 163
The Mobile Office 194
Data Transmission 196
Bandwidth 196

7 Protocols 196
Networks 197
SECONDARY STORAGE 164 Terms 197
Network Types 199
Introduction 166 Local Area Networks 199
Storage 166 Home Networks 199
Solid-State Storage 167 Wireless LAN 200
Solid-State Drives 167 Personal Area Networks 200
Flash Memory Cards 168 Metropolitan Area Networks 200
USB Flash Drives 168 Wide Area Networks 201
Hard Disks 169 Network Architecture 201
Internal Hard Disks 169 Topologies 202
External Hard Disks 169 Strategies 203
Network Drives 169 Organizational Networks 203
Performance Enhancements 170 Internet Technologies 203
Optical Discs 171 Network Security 204
Cloud Storage 172 Careers in IT 205

x CONTENTS
A Look to the Future: Telepresence Lets You Be Management Levels 250
There without Actually Being There 206 Information Flow 251
Computer-Based Information
Systems 252
Visual Summary 207
Key Terms 210 Transaction Processing Systems 253
Multiple Choice 211 Management Information Systems 255
Matching 212 Decision Support Systems 256
Open-Ended 212 Executive Support Systems 257
Discussion 213 Other Information Systems 259
Expert Systems 260
Careers in IT 260

9 A Look to the Future: IBM’s Watson:


The Ultimate Information-Finding Machine 261
PRIVACY, SECURITY,
Visual Summary 262
AND ETHICS 214 Key Terms 264
Introduction 216 Multiple Choice 265
People 216 Matching 266
Privacy 216 Open-Ended 266
Big Data 217 Discussion 267
Private Networks 219
The Internet and the Web 219
Online Identity 222 11
Major Laws on Privacy 223
Security 223 DATABASES 268
Cybercrime 223 Introduction 270
Social Engineering 225
Data 270
Malicious Software 225
Data Organization 271
Malicious Hardware 225
Key Field 272
Measures to Protect Computer
Batch versus Real-Time Processing 272
Security 226
Databases 273
Ethics 231
Need for Databases 274
Cyberbullying 231
Database Management 274
Copyright and Digital Rights
Management 231 DBMS Structure 276
Hierarchical Database 276
Making IT work for you: Network Database 277
Relational Database 277
Security and Technology 232 Multidimensional Database 278
Plagiarism 234 Object-Oriented Database 279
Careers in IT 235 Types of Databases 280
Individual 280
A Look to the Future: End of Anonymity 236 Company 280
Distributed 281
Visual Summary 237 Commercial 281
Key Terms 240 Database Uses and Issues 282
Multiple Choice 241 Strategic Uses 282
Matching 242 Security 282
Open-Ended 243 Careers in IT 283
Discussion 243 A Look to the Future: The Future
of Crime Databases 284

10 Visual Summary 285


Key Terms 288
INFORMATION SYSTEMS 246 Multiple Choice 289
Matching 290
Introduction 248 Open-Ended 290
Organizational Information Flow 248 Discussion 291
Functions 248

CONTENTS xi
Input Data 320
12 Processing Requirements 321
Program Specifications Document 321
SYSTEMS ANALYSIS Step 2: Program Design 322
AND DESIGN 292 Top-Down Program Design 322
Pseudocode 323
Introduction 294 Flowcharts 323
Systems Analysis and Design 294 Logic Structures 325
Phase 1: Preliminary Investigation 296 Step 3: Program Code 326
Defining the Problem 296 The Good Program 326
Suggesting Alternative Systems 297 Coding 326
Preparing a Short Report 297 Step 4: Program Test 328
Phase 2: Systems Analysis 298 Syntax Errors 328
Gathering Data 298 Logic Errors 328
Analyzing the Data 298 Testing Process 328
Documenting Systems Analysis 300 Step 5: Program Documentation 330
Phase 3: Systems Design 300 Step 6: Program Maintenance 331
Designing Alternative Systems 300 Operations 331
Selecting the Best System 301 Changing Needs 331
Writing the Systems Design Report 301 CASE and OOP 332
Phase 4: Systems Development 302 CASE Tools 332
Acquiring Software 302 Object-Oriented Software
Acquiring Hardware 302 ­Development 333
Testing the New System 303 Generations of Programming
Phase 5: Systems Implementation 303 Languages 334
Types of Conversion 303 Machine Languages: The First
Training 304 Generation 334
Phase 6: Systems Maintenance 304 Assembly Languages: The Second
Prototyping and Rapid Applications Generation 334
Development 305 High-Level Procedural Languages:
Prototyping 305 The Third Generation 334
Rapid Applications Development 305 Task-Oriented Languages: The Fourth
Careers in IT 306 Generation 335
A Look to the Future: The Challenge of Problem and Constraint Languages:
Keeping Pace 307 The Fifth Generation 336
Careers in IT 337
A Look to the Future:
Visual Summary 308
Your Own Programmable Robot 338
Key Terms 312
Multiple Choice 313
Matching 314 Visual Summary 339
Open-Ended 314 Key Terms 343
Discussion 315 Multiple Choice 344
Matching 345
Open-Ended 345
Discussion 346
13
PROGRAMMING
The Evolution of the Computer
AND LANGUAGES 316
Age 347
Introduction 318
Programs and Programming 318 The Computer Buyer’s Guide 358
What Is a Program? 318
What Is Programming? 318
Step 1: Program Specification 320 Glossary 362
Program Objectives 320
Desired Output 320 Index 383

xii CONTENTS
New to Computing Essentials 2023
To increase student motivation and engagement, a focus on smartphones has been added by increasing content and
­providing marginal tips offering practical advice for efficient smartphone use. While the coverage of other topics has not
been reduced, this change offers a gateway to demonstrate the relevance of all types of computers to their lives.
­Additionally, every chapter’s Making IT Work for You, Privacy, Ethics, and Community features have been carefully
revaluated, enhanced, and/or replaced. Also, every chapter’s Look to the Future has been revised to show that the
expected breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the following:
Chapter 2: Added coverage of Web 5.0
Expanded coverage of Web 4.0
Reorganized coverage of Web 1.0 to 3.0 to emphasize relationships between web generations
Expanded coverage of netiquette
Expanded coverage of social networks, including TikTok and Instagram
Expanded coverage of podcasts
Added coverage of cryptocurrencies and blockchain
Chapter 3: Added coverage of features, including grammar checkers
Expanded coverage of app stores
Expanded coverage of mobile apps
Reorganized topics to emphasize growing significance of mobile platforms
Expanded coverage of specialized apps to emphasize mobile apps
Added coverage of shopping sites and fake reviews
Added gaming coverage to include free-to-play
Chapter 4: Expanded coverage of virtual assistants
Added coverage of operating system accessibility features
Added coverage of Windows 11
Added coverage of macOS 12 Monterey
Chapter 5: Added coverage of mobile microprocessors
Added coverage of Thunderbolt 3
Expanded coverage of USB
Added coverage of UTF-8 and UTF-16
Chapter 6: Added coverage of assistive devices for people with disabilities
Expanded coverage of virtual keyboards
Expanded coverage of voice recognition systems
Chapter 7: Expanded coverage of SSDs (solid-state drives)
Expanded coverage of USB flash drives
Expanded coverage of cloud drives
Chapter 8: Expanded coverage of satellite communications
Expanded coverage of 5G networks
Chapter 9: Added coverage of social media and role of advertising
Added coverage of limitation of privacy mode browsing
Expanded coverage of ransomeware
Expanded coverage of data backups
Added coverage of data leaks
Expanded coverage of two-factor authentication

xiii
Preface

T
he 20th century brought us the dawn of the digital information
age and unprecedented changes in information technology. In
fact, the rate of change is clearly increasing. As we begin the
21st century, computer literacy is undoubtedly becoming a prerequisite
in whatever career you choose.

The goal of Computing Essentials is to provide you with the basis for
understanding the concepts necessary for success. Computing Essentials
also endeavors to instill an appreciation for the effect of information
technology on people, privacy, ethics, and our environment and to give
you a basis for building the necessary skill set to succeed in the
21st century.

Times are changing, technology is changing, and this text is changing


too. As students of today, you are different from those of yesterday. You
put much effort toward the things that interest you and the things that
are relevant to you. Your efforts directed at learning application pro-
grams and exploring the web seem, at times, limitless. On the other
hand, it is sometimes difficult to engage in other equally important
­topics such as personal privacy and technological advances.

At the beginning of each chapter, we carefully lay out why and how the
chapter’s content is relevant to your life today and critical to your future.
Within each chapter, we present practical tips related to key concepts
through the demonstration of interesting applications that are relevant
to your lives. Topics presented focus first on outputs rather than pro-
cesses. Then, we discuss the concepts and processes.

Motivation and relevance are the keys. This text has several features
specifically designed to engage and demonstrate the relevance of tech-
nology in your lives. These elements are combined with a thorough
­coverage of the concepts and sound pedagogical devices.

xiv
Visual Learning
VISUAL CHAPTER OPENERS
First Pages First Pages

chapter 2 The Internet, the Web,


and Electronic Commerce
Each chapter begins with a Why
Why should I read this chapter?
Should I Read This Chapter?
The Internet has changed the world, and our world has changed how
we use the Inernet. Originally, the Internet was only available to
academics and scientists in universities and federal buildings. Today
­feature that presents a visually
engaging and concise presenta-
the Internet connects everything, from cell phones to refrigerators.
This chapter covers the things you need to know to be prepared
for this ever-changing digital world, including
• Impact—how Internet technology is changing your world.
NicoElNino/Shutterstock • Hardware—how to connect your life to the Internet, including
Wi-Fi, cell phones, and tablets.
• Applications—how to get ahead using social networking,
streaming technology, and cloud computing.
tion of the chapter’s relevance to
Learning Objectives
the reader’s current and future
After you have read this chapter, you should be able to:
1 Explain the origins of the Internet and the web.
life in the digital world. Then a list
2 Explain how to access the web using providers and browsers.
3 Compare different web utilities, including filters, file transfer utilities, and Internet security suites.
4 Compare different Internet communications, including social networking , blogs, microblogs, podcasts,
wikis, text messaging , instant messaging , and e-mail.
of chapter learning objectives is
5 Describe search tools, including search engines.
6 Describe how to evaluate the accuracy of information presented on the web.
7 Identify electronic commerce, including B2C, C2C, B2B, and security issues.
presented providing a brief intro-
duction to what will be ­covered in
8 Describe cloud computing , including the three-way interaction of clients, Internet, and service providers.
9 Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow everyday
objects to send and receive data.

the ­chapter.
Elnur/Shutterstock

25

oLe36781_ch02_024-055.indd 25 10/28/21 08:06 PM

oLe36781_ch02_024-055.indd 24 10/28/21 08:06 PM

VISUAL SUMMARIES
First Pages First Pages

To efficiently and effectively use computers, you need to be aware of the most commonly used input and output devices.
These devices are translators for information into and out of the system unit. Input devices translate words, sounds, and

Visual summaries appear at the end VISUAL SUMMARY actions into symbols the system unit can process. Output devices translate symbols from the system unit into words,
Input and Output images, and sounds that people can understand.

SCANNING DEVICES IMAGE CAPTURING DEVICES

of every chapter and summarize KEYBOARDS POINTING DEVICES

major concepts covered


throughout the chapter. Like the
chapter openers, these summaries Bloomicon/Shutterstock
Jochen Tack/Alamy Stock Photo

Scanning devices move across text and images to convert


Stefano Garau/Shutterstock

Image capturing devices create or capture original images.


AZHANA BINTI ZAINUDDIN/Shutterstock them into a form that the system unit can process. These devices include digital cameras and webcams.

use graphics to reinforce key Input is any data or instructions that are used by a com-
puter. Input devices translate words, numbers, sounds,
Pointing devices provide an intuitive interface with the
system unit by accepting physical movements or gestures
Optical Scanners
An optical scanner (scanner) converts documents into
machine-readable form. The four basic types are flatbed,
digital cameras
Digital cameras record images digitally and store them on
a memory card or in the camera’s memory. Most digital
images, and gestures that people understand into a form and converting them into machine-readable input.

concepts in an engaging and


that the system unit can process. These include keyboards document, portable, and 3D. cameras record video too. Today, many digital cameras are
and pointing, scanning, image capturing, and audio-input touch Screens embedded in other devices, such as cell phones and tab-
devices. card readers lets.
Touch screens allow users to select actions by touching the
Keyboards convert numbers, letters, and special char- screen with a finger or penlike device. A stylus is a penlike Card readers interpret encoded information located on a
acters that people understand into electrical signals. These variety of cards. The most common is the magnetic card Webcams

meaningful way.
device that uses pressure to draw images on a screen.
signals are sent to, and processed by, the system unit. Handwriting recognition software translates handwritten reader that reads information from a thin magnetic strip Webcams are specialized digital video cameras that cap-
notes into a form that the system unit can process. on the back of a card. Chip cards contain microchips to ture images and send them to a computer for broadcast
Keyboards Multitouch screens accept multiple-finger commands. encrypt data and improve security. over the Internet. Webcams are built into many cell
There are three basic categories of keyboards: virtual, lap- phones and tablets, while others are attached to the com-
top, and traditional. Bar code readers puter monitor.
Mouse
• Virtual keyboard, primarily used with cell phones and Bar code readers or scanners (either handheld wand read-
A mouse controls a pointer that is displayed on the moni-
tablets. Does not have a physical keyboard. Keys dis- ers or platform scanners) read bar codes on products.
tor. The mouse pointer usually appears in the shape of an
There are a variety of different codes, including the UPC
played on screen and selected by touching a key’s arrow. Some mice have a wheel button that rotates to
and MaxiCode.
AUDIO-INPUT DEVICES
image. scroll through information on the monitor. A cordless or
• Laptop keyboards, used on laptop computers. Smaller wireless mouse uses radio waves or infrared light waves. Audio-input devices convert sounds into a form that can
rFId readers be processed by the system unit. By far the most widely
than traditional keyboard with fewer keys. Includes all A touch pad operates by touching or tapping a surface. It
RFID readers read RFID (radio-frequency identification) used audio-input device is the microphone.
the keys found on virtual keyboard plus extra keys, is widely used instead of a mouse with laptops and some
tags. These tags are widely used for tracking lost pets, pro-
such as function and navigation keys. types of mobile devices.
duction, and inventory and for recording prices and prod- Voice recognition Systems
• Traditional keyboards, used on desktop and larger uct descriptions.
computers. Standard keyboard has 101 keys. Toggle Game controllers Voice recognition systems use a microphone, a sound
keys turn features on and off. Combination keys Game controllers provide input to computer games. card, and special software. Siri, Cortana, and Google
character and Mark recognition devices
perform actions when combinations of keys are held Widely used controllers include gaming mice, joysticks, Assistant are digital assistants that use voice recognition.
Character and mark recognition devices are scanners that
down. gamepads, and motion-sensing devices. Specialized portable voice recorders are widely used by
are able to recognize special characters and marks. Three
doctors, lawyers, and others to record dictation. Some sys-
types are magnetic-ink character recognition (MICR),
tems are able to translate dictation from one language to
optical-character recognition (OCR), and optical-mark
another, such as from English to Japanese.
recognition (OMR).

156 chApter 6 Input And Output 157

ole36781_ch06_134-163.indd 156 11/15/21 04:40 PM ole36781_ch06_134-163.indd 157 11/15/21 04:40 PM

xv
Unique Content
MAKING IT WORK FOR YOU
First Pages

Making IT work for you Special-interest topics are presented in the Making
IT Work for You section found within nearly
CLOUD STORAGE
Do you find that you take a lot of photos and videos on your phone, and your storage space is running low?
every chapter. These topics include Online Enter-
Are you working on a group project and finding it difficult to keep everyone updated with the most recent
version of documents and files? Are you looking for a safe, secure location to store backups and important
files? If so, cloud storage may be the solution you are looking for. Here are some things to consider when
tainment, Gaming, Virtual Assistants, and the
choosing a cloud storage option.

• What will you store?


Mobile Office.
The types of files that you store can have a big
impact on determining the best cloud storage
service for you. The following suggests the best
file service for you based on the types of files you
typically store.
• If you primarily store photos, then consider the
cloud services of Flickr and Adobe Creative
Cloud. They feature online tools to edit, share,
and search photos.
• If you primarily store music, then consider the
cloud services of Google Play Music and iTunes
Match. They feature online tools to listen to
music and create customizable playlists.
• If you primarily store documents, then consider
the cloud services Adobe Document Cloud and
Microsoft’s One Drive. They feature online tools Cloud storage service Flickr is designed to store and dis-
to view and edit documents. play digital photos.
OlegDoroshin/Shutterstock
• If you primarily need storage to back up your
system programs, consider the cloud services
of Backblaze and iDrive. They have apps that
back up your devices’ data, making backups
seamless and easy.
Also, what you store will impact how much
storage you need. If you are only looking to store
documents and text files, you will not need much
storage space; however, videos and photo albums
can take up a lot more storage. Different services
offer different pricing plans and have special offers
depending on what types of files you store—the
best cloud storage plan for you will tailor itself to
your storage needs.

• What tools will you use?


If your storage needs are mostly sharing and
working on documents, your best cloud storage
choice may be determined by the software you Apple’s iCloud works with the iWorks office suite.
NetPhotos3/Alamy Stock Photo

174

ole36781_ch07_164-185.indd 174 11/15/21 03:30 PM


PRIVACY, ETHICS, AND COMMUNITY First Pages

Nearly every chapter has a Community box located


in the margin adjacent to the coverage of related
technologies. Topics include how accessibility tools community
Many electronics contain toxic

make technology available to everyone or how our


materials, such as lead,
mercury, and chromium. If not
disposed of properly, these
materials can leak into our
actions on social media impact our communities. water supply, get released into
our air, or leach into our soil.
First, consider donating them to
various charitable organizations
that work with local schools
and low-income families. First Pages
Otherwise, recycling electronics
allows us to get rid of old
devices and keep our Figure 5-11 chip mounted onto a chip carrier
community safe. Many ktsdesign/Shutterstock
computer retailers near you

Nearly every chapter has a Privacy box located in accept used devices and

privacy
components for recycling, even
if they are broken. Alternatively,
Generally, the
performance
Although
system board found on a desktop is larger than that found on a
enhancements
laptop, and much larger than one found on a tablet, cell phone, or wearable computer.
Four ways these
to improve
systemthe performance
boards vary in size, of hard disks
speed, are disk
power, andcaching,
versatility,hybrid
theydrives,
never-
redundant arrays oftheinexpensive disks,of and file compression/decompression.
the margin adjacent to the coverage of related tech- visit the website of your local
Diminishing
government secondary
prices
to find the storage
have recycling
electronics an unexpected
center
theless all perform
theDisk caching
personal computer.
same function communicating
forms a function similar to cache memory discussed in Chapter 5. While cache mem-
between the components of
improves hard-disk performance by anticipating data needs. It per-

impact
neareston privacy. The ory improves processing by acting as a temporary high-speed holding area between
nologies. Topics include protecting personal infor-
you.
availability of cheap digital memory and the CPU, disk caching improves processing by acting as a temporary
storage has resulted in a concept check
high-speed holding area between a secondary storage device and memory. Disk cach-
permanent digital record of our
ing requires a combination of hardware and software. During idle processing time,
mation when using a free Wi-Fi network or when lives available for all to see on
the Internet. Once an image,
frequentlyWhat is the system board, and what does it do?
disk cache.
Define
used data is automatically identified and read from the hard disk into the
When needed,sockets,
and describe the data is then
slots, accessed
and bus lines. directly from memory. The trans-
video, or message is released

disposing of an outdated computer. on the Internet, it is very fer rate from memory is much faster than from the hard disk. As a result, overall sys-
What are chips? How are chips attached to the system board?
difficult to remove. Some argue tem performance is often increased by as much as 30 percent.
that we all have a “right to be Hybrid drives are storage drives that contain both solid-state storage and hard disks
forgotten” and that major in an attempt to gain the speed and power benefits of SSDs while still having First
thePages
low
Internet companies like
Instagram and Google should
Microprocessor
cost and large capacity of hard drives. Typically, these systems use SSD to store the
operating system and applications and hard disks to store videos, music, and
help people permanently documents.
remove records of In most personal computer systems, the central processing unit (CPU) or processor is
Redundant arrays of inexpensive disks (RAID) improve performance by expanding
embarrassing or unpleasant contained on a single chip called the microprocessor. The microprocessor is the
external storage, improving access speed, and providing reliable storage. Several inex-
moments. Others say that the
•“brains”
pensive
of the computer
Data hard-disk
transmission drives
system. It has
specifications.
are connected
two basic
These
to one
components:
areanother.
rules and the control
procedures
These that unit
connections
and the
coordinate
can be by a
ethics
Internet is a record of our past arithmetic-logic
the sending
network or within
unit.
and receiving devices
specialized RAID by precisely
devices. (See defining
Figure how7-8.) the
Themessage
connected will hard-
be
Nearly every chapter has an Ethics box located in
and we can’t choose to only
hold on to the positive things. • sent
diskControlacross
drives arethe
unit: Thecommunication
related control unit tells
or grouped channel.
the restand
together, of the
thecomputer
computersystemsystemhow to carry
interacts with
As eavesdropping
What do you think?tools become the out
RAID a program’s
system asinstructions.
• Communication though it This
channel. wereItisdirects
a the
single the movement
connectingof
large-capacity
actual orelectronic
hard-disk signals
drive.
transmission The between
result is
medium
more sophisticated, there is memory,
expanded
that carrieswhich
storage temporarily
the capability,
message. Thisholds
fast access
medium data, instructions,
speed,
can and
be highand
a physical processed
reliability.
wire For information,
or cable, these
or itreasons,
can be
the margin adjacent to the coverage of related tech- concern that law enforcement
and government agencies will
RAIDandisthe
wireless. arithmetic-logic
often
and compression
File
used by Internet
input and output and file
unit.servers
devices.
It also and directs these
large control signals between the CPU
organizations.
decompression increase storage capacity by reducing the
monitor everyone’s Internet For example, if you wanted to send an e-mail to a friend, you could create and send
amount of space required
• Arithmetic-logic unit:cellto store data and programs.
arithmetic-logic File compression is not performs
limited to
The the sendingunit, usually
Your called theisALU,
nologies. Topics include altering images to promote and cell phone activity. In the
private sector, companies are
the message using your
hard-disk
two types
located
drives
systems.
insideofyour
It is
operations:
as well. File
cell phone.
compression
phone,
frequently
arithmetic used
It functions
also
to
and logical.
helps to
device.
compress
as the connection
modem
files on operations
Arithmetic DVDs, CDs,
on a microchip
device, that would
speed up transmission of and
areand
the flash
modify
files division.
from one
increasingly using network andfundamental math
format the message operations: addition,
so that it could travelsubtraction, multiplication,
efficiently across communication channels,
computer
Logical system to another.
operations consist Sending
of and receiving
comparisons such ascompressed
whether onefiles
itemacross
is the to
equal Inter-
a particular message and how the technology we
tools and software to monitor such as cell phone towers. The specifics describing how the message is modified, refor-
net(=),
is a common activity.
the activity of their employees.
matted,less andthan
sent(<),
would or greater than (>)
be described the data
in the other.transmission specifications. After your
Many websites also track File compression programs scan files for ways to reduce the amount of required
message traveled across the channel, a connection device, such as a modem connected
your activity, and government storage. One way chipsis to search for repeating patterns. The repeating patterns are
use affects labor practices around the world. officials have often requested
these records during the
microprocessor
to a desktop computer,
the receiving
Microprocessors are an
would reformat it so that it could be displayed on your friend’s
replaced with a token, leaving enough tokens so that the original can be rebuilt or
computer, device.
important (Note:part This
of
decompressed. These programs often shrink files to a quarter
example
any presents
computing the and
device basic communication
of theirare tailored
original to the
size.
course of an investigation. system
needs ofelements
the and involved
device it serves. in sending
There aree-mail.
two It does
major not and isofnot
categories intended to demon-
microprocessors devel-
Windows Mac operating systems provide compression and decompression util-
strate
oped Forall themobile
today: specificandsteps and equipment
desktop. Mobile involved in
processors an e-mail delivery system.)
Some believe that it is unethical ities. more advanced compression schemes, youarecanused
use in cell phones
specialized and tablets
utilities such
for government and businesses
as WinZip. For a summary of performance enhancement techniques, see Figure 7-9.
to engage in such monitoring
and tracking. Do you agree?
116 chApTer 5 concept check
Define computer communications and connectivity.

xvi
technique description
What is the wireless revolution?
Disk caching Uses cache and anticipates data needs
Describe the four elements of every communication system.
ole36781_ch05_108-133.indd 116 Hybrid drives Uses both SSD and hard disks
11/15/21 04:38 PM

RAID Linked, inexpensive hard-disk drives


Communication ChannelsReduces file size
File compression

Communication channels File decompression


are an essential elementExpands compressed
of every files
communication system.
These channels actually carry the data from one computer to another. There are two
Figure 7-8 rAId storage device
Unique End-of-Chapter
Discussion Materials First Pages

MAKING IT WORK FOR YOU


OPEN-ENDED
Making IT Work for You discussion questions are carefully On a separate sheet of paper, respond to each question or statement.

1. Compare primary storage and secondary storage, and discuss the most important

integrated with the chapter’s Making IT Work for You top- characteristics of secondary storage.
2. Discuss solid-state storage, including solid-state drives, flash memory, and USB drives.
3. Discuss hard disks, including density, platters, tracks, sectors, cylinders, internal,
ics. The questions facilitate in-class discussion or written external, and performance enhancements.
4. Discuss optical discs, including pits, lands, CDs, DVDs, Blu-ray, and hi-def.

assignments focusing on applying specific technologies into


5. Discuss cloud computing and cloud storage.
6. Describe mass storage devices, including enterprise storage systems, file servers,
network attached storage, RAID systems, organizational cloud storage, and storage area

a student’s day-to-day life. They are designed to expand a


network systems.

student’s awareness of technology applications. DISCUSSION


Respond to each of the following questions.

1 Making IT Work for You: CLOUD STORAGE

PRIVACY
Have you ever found yourself e-mailing files back and forth between two of your computers or with others
as a way to transport them? Review the Making IT Work for You: Cloud Storage on pages 174 and 175. Then
respond to the following: (a) Have you ever used Dropbox or a similar service? If so, what service have you
used, and what do you typically use it for? If you have not used Dropbox or a similar service, describe how
and why you might use one. (b) If you do not have a Dropbox account, set up a free one and create a Drop-
box folder. Use Dropbox to either (1) access a file from another computer or (2) share a file with one of your
classmates. Describe your experience. (c) Try a few of Dropbox’s features, and describe your experience
with these features. (d) Do you see yourself using Dropbox on an everyday basis? Why or why not?

Privacy discussion questions are carefully integrated with


2 Privacy: RIGHT TO BE FORGOTTEN
the chapter’s marginal Privacy box. The questions facilitate As a generation grows up with social media, a surplus of youthful indiscretions is now stored on the Inter-
net for all to see. Review the privacy box on page 139 and respond to the following: (a) Is there a photo or

in-class discussion or written assignments focusing on video of you on the Internet that you would prefer not be publicly available? Have you said or done things
that, if recorded and posted on social media, could have a negative impact on a job interview? (b) Do you
have the right to decide what photos of you are posted on the Internet by others? Why or why not? (c) Does

critical privacy issues. They are designed to develop a someone else have the right to tell you what to do with the photos you take, even if they are in the photo?
Why or why not? (d) Should Facebook remove photos, videos, or messages if someone is embarrassed by
them? Should Facebook have the right to remove your photos, videos, or messages if someone is embar-

student’s ability to think critically and communicate


rassed by the content? Justify your answer.

effectively.
184 chApter 7

First Pages

ETHICS
ole36781_ch07_164-185.indd 184 11/15/21 03:30 PM

DISCUSSION
Respond to each of the following questions.
Ethics discussion questions are carefully integrated with
1 Making IT Work for You the chapter’s marginal Ethics boxes. The questions facili-
Making it a habit of keeping current with technology applications can be a key to your success. Numerous
full-page spreads identified as Making IT Work for You are presented in the following chapters. These
sections address some of today’s most interesting and useful applications. They include online entertain- tate in-class discussion or written assignments focusing on
ment in Chapter 2, online office suites in Chapter 3, and cloud storage in Chapter 7. Select one that you
find the most interesting and then respond to the following: (a) Why did you select this application? (b)
Have you used this application? If so, when and how? If not, do you plan to in the near future? (c) Go to the ethical issues relating to technology. They are designed to
chapter containing your selected application, and locate the application’s Making IT Work for You cover-
age. Review and briefly describe its contents. (d) Did you find the coverage useful? Why or why not?
develop a student’s ability to think critically and communi-
2 Privacy
Privacy is one of the most critical issues facing society today. Numerous Privacy boxes appear in the margins cate effectively.
of the upcoming chapters presenting a variety of privacy issues. These issues include apps that constantly
track your movements without your knowledge or consent in Chapter 3; public Wi-Fi connections that record
all of your personal communications in Chapter 8; and protection of personal privacy while using social
media in Chapter 9. Select one that you find the most interesting, and then respond to the following: (a) Why
did you select this issue? (b) Do you have knowledge of or experience with the issue? If so, describe your
knowledge or experience. If not, do you consider the issue to be important for protecting your privacy? (c)
Go to the chapter containing your selected issue, locate the Privacy box, read it, and describe its contents.
(d) Did you find the coverage thought-provoking? Why or why not?

3 Ethics
Computer ethics are guidelines for the morally acceptable use of computers in our society. Numerous Ethics
COMMUNITY
boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These issues
include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized monitoring
or eavesdropping of Internet activity in Chapter 8. Select one issue that you find the most interesting and
then respond to the following: (a) Why did you select this issue? (b) Do you have knowledge of or experience

Community discussion questions are carefully integrated


with the issue? If so, describe your knowledge or experience. If not, do you consider the issue critical for
individuals or organizations? (c) Go to the chapter containing your selected issue, locate the Ethics box, read
it, and describe its contents. (d) Did you find the coverage thought-provoking? Why or why not?

4 Community with the chapter’s marginal Community boxes. The ques-


tions facilitate in-class discussion or written assignments
Almost everyone belongs to several communities—some in person and some digital. Numerous Commu-
nity boxes appear in the margins of the upcoming chapters. These boxes present a variety of community
topics, including etiquette on the Internet in Chapter 2, Accessibility for people with disabilities in

focusing on the impact of technology on communities.


Chapter 4, and the role of communities in bringing Internet access to the developing world in Chapter 8.
Select one that you find the most interesting and then respond to the following: (a) Why did you select
this topic? (b) Go to the chapter containing your selected topic, locate the Community box, read it, and

They are designed to develop a student’s ability to think


describe its contents. (c) Did you find the coverage thought-provoking? Why or why not?

Design Elements: Concept Check icons: Dizzle52/Getty Images;


Making IT Work for You: cifotart/Shutterstock

critically and communicate effectively.


chApTer 1 23

oLe36781_ch01_002-023.indd 23 10/28/21 02:15 PM

xvii
Reinforcing Key Concepts
First Pages
CONCEPT CHECKS

Located at points throughout each


­chapter, the Concept Check cues you to
concept check
What are the parts of an information system?
note which topics have been covered
What is a program?
and to self-test your understanding of What is the difference between data and information?
the material presented.
First Pages

People

Community KEY TERMS


People are surely the most important part of any information system. Our lives are touched
every day by computers and information systems. Many times the contact is direct and
KEY TERMS obvious, such as when we
Every major technology has create documents using a
address (32) MMS (multimedia messaging service) (38)
Advanced Research Project Agency mobile browser (32) affected communities—but none word processing program
Network (ARPANET) (26)
attachment (39)
news feed (36)
online (27) in the unique ways that or whenThroughout
we connect to thethe text, the most important terms are
bitcoin (44) pages (35) computers have. We have Internet. (See Figure 1-2.)
Other times, the contactin
presented is bold and are defined within the text.
BitTorrent (34) podcast (35)
blog (36) PHP (32) changed how we interact with
browser (31) profiles (35)
our communities, both in the not as obvious.
business-to-business (B2B) (42)
business-to-consumer (B2C) (42)
cable (31)
protocol (32)
search engine (40)
search service (40)
tools we use to communicate, You will
Throughout this also
book find a list of key terms at the end of
such as social media posts, and you will find a variety of
each chapter and in the glossary at the end of
cascading style sheets (CSS) (31) secure file transfer protocol (SFTP) (34)
client-based e-mail system (39) share settings (36)
in the ways we communicate, in
cloud computing (45) signature (39) features designed to help
consumer-to-consumer (C2C) (42) SMS (short messaging service) (37) emojiis and podcasts. But
cryptocurrency (44)
deep fake (41)
social networking (35)
spam (40) technology has had a deeper the book.
you become an efficient
desktop browser (32) spam blocker (40) impact on our communities than
and effective end user.
digital currency (43)
domain name (32)
spam filter (40)
spider (40) just the way we interact. It has These features include
downloading (32)
digital subscriber line (DSL) (31)
subject (39)
texting (37) forever changed how we find Making IT Work for You,
e-commerce (41) text messaging (37) and identify our communities. Tips, Privacy, Commu-
e-learning (41) top-level domain (TLD) (32)
electronic commerce (41) tweet (37) Every day, people meet, discuss, nity, Ethics, and Careers figure 1-2 people and computers
electronic mail (38) Twitter (37)
e-mail (38) uniform resource locator (URL) (32)
and bond with others they have in IT. fizkes/Shutterstock
e-mail client (39) uploading (33) never met in person. The entire First Pages
Facebook (36)
fake news (41)
virus (40)
web (26) world feels a little smaller, with • Making IT Work for You. Throughout this book you will find Making IT Work for
file transfer protocol (FTP) (34)
filter (33)
Web 1.0 (26)
Web 2.0 (26)
our communities extending You features that present numerous interesting and practical IT applications. For
friend (35) Web 3.0 (26) around the globe. just a few of the Making IT Work for You topics, see Figure 1-3.
groups (38) Web 4.0 (27)
header (39) Web 5.0 (27) • Tips. We all can benefit from a few tips or suggestions. Throughout this book you
hyperlink (32) web auction (42)
Hypertext Markup Language (HTML) (32) web-based e-mail system (39) will find numerous tips to make your computing safer, more efficient, and more
Instagram (37) web-based file transfer services (33)
instant messaging (IM) (38) webmail (39) effective. These tips range from the basics of keeping your computer system
Internet (26)
Internet of Things (IoT) (46)
webmail client (39)
web developer (45)
MULTIPLE CHOICE
Internet security suite (34) web page (32)
Internet service provider (ISP) (31) web suffix (32) Circle the correct answer.
JavaScript (32) web utility (33) Application description
link (32) wiki (37) 1. When the Internet launched, it was a network called:
LinkedIn (36) Wikipedia (37)
location (32) wireless modem (31) Free Antivirus Program Protect your computer by installingc.and
a. DSL using a free antivirus
ARPANET
message (39) World Wide Web (26) program.b.See page 9.
LAN d. CSS
microblog (36) WWW (26)
2. This Internet activity is associated with sending and receiving e-mails.
Cloud Office Suites Create and collaborate with othersc.online
a. shopping to make better
e-learning
ChApTEr 2 51
documents and presentations. Seed.page
b. communicating xx.
online entertainment
3. The physical network that is the world’s largest network is called:
Gaming Delve intoa. the worldWide
the World of video
Web games
c. and find the best video game
ARPANET
hardwareb.for theyou. See page xx. d. SFTP
Internet
4. This generation of the web that brought about social media.
oLe36781_ch02_024-055.indd 51 10/28/21 08:06 PM
Cloud Storage Move your
a. files online to synch files
Web 1.0 c. between
Web 3.0 devices or free up

CHAPTER REVIEW The Mobile Office


space onb.your
5.
Webdigital
2.0 devices. See d.
page
Webxx.
4.0
An example of a micro-blogging site is:
Get worka.done on the road; whether
Facebook c. a business trip or your daily
Twitter
commute,b.these
TikToktools will help you d. make the most of your time.
Microsoft
See page xx.most common way to access the Internet is through a(n) __________.
6. The
a. cell phone c. SFTP

Following the Visual Summary, the chapter review includes figure 1-3 making IT Work for You applications
b. ISP c. TikTok
7. Transmission of electronic messages over the Internet.

material designed to review and reinforce chapter content. It a. Web 3.0


b. B2B
c. hyperlink
d. e-mail

6 the
includes a key terms list that reiterates terms
chApTer 1 presented in
8. Two popular instant messaging services are WhatsApp and Facebook __________.
a. Social c. Messenger
b. Meet d. ISP
the chapter, multiple-choice questions to help test your 9. A business-oriented social networking site.
a. TikTok c. LinkedIn
understanding of information presented in the chapter, 10.
b. Instagram d. Facebook
Electronic commerce involving individuals selling to individuals.

matching exercises to test your recall of terminology pre- oLe36781_ch01_002-023.indd 6


a. B2C
b. C2C
c. B2B
d. I2I 10/28/21 02:15 PM

sented in the chapter, and open-ended questions or state-


ments to help review your understanding of the key concepts
presented in the chapter.

52 ChApTEr 2

xviii
oLe36781_ch02_024-055.indd 52 10/28/21 08:06 PM
The Future of Information Technology
CAREERS IN IT
First Pages

devices like tablets, cell phones, and wearable devices have led many experts
to predict that wireless applications are just the beginning of the wireless
revolution, a revolution that will dramatically affect the way we communicate
and use computer technology.
• The Internet of Things (IoT) is the continuing development of the Internet that
allows everyday objects embedded with electronic devices to send and receive data
over the Internet. It promises to connect all types of devices, from computers to
cell phones, to watches, to any number of everyday devices.
Wireless communication, cloud computing, and IoT are driving the mobile Inter-
net. They promise to continue to dramatically affect the entire computer industry and
how you and I will interact with computers and other devices. Each will be discussed
in detail in the following chapters. For just a few of these mobile devices, see
Figure 1-17.
Some of the fastest-growing career opportunities are in
concept check
information technology. Each chapter highlights one of the
Define data. List four common types of files.

Define connectivity and networks.


most promising careers in IT by presenting job titles,
What is cloud computing? Wireless revolution? IoT?

responsibilities, educational requirements, and ­salary


Careers in IT ranges. Among the careers covered are webmaster, soft-
“ now that you know the basic outline and As mentioned previously, each of the following chapters highlights a
important features of this book, we would like
to talk about some of the most exciting and
specific career in information technology. Each provides specific job
descriptions, salary ranges, advancement opportunities, and more. For ware engineer, and database administrator. You will learn
well-paid careers in information technology.
” a partial list of these careers, see Figure 1-18.

career

Web developer
description

Develops and maintains websites and web


how the material you are studying relates directly to a
resources. See page 44.

Software engineer Analyzes users’ needs and creates


application software. See page 71. potential career path.
Computer support specialist Provides technical support to customers
and other users. See page 97.
Moyo Studio/Getty Images Computer technician Repairs and installs computer components
and systems. See page 123.

Technical writer Prepares instruction manuals, technical


reports, and other scientific or technical
First Pages
documents. See page 152.

Network administrator Creates and maintains computer networks.


See page 203.

A LOOK TO THE FUTURE


figure 1-18 careers in information technology

InfOrmATIOn TechnOLOgY, The InTerneT, And YOu 15


using and understanding Information need to know about hardware. For those considering the
purchase of a computer, an appendix—The Computer Buyer’s
Technology
Guide—is provided at the end of this book. This guide
The purpose of this book is to help you use and understand provides a very concise comparison of desktops, laptops,
information technology. We want to help you become profi- tablets, and cell phones.

A LOOK TO THE FUTURE


oLe36781_ch01_002-023.indd 15 10/28/21 02:15 PM cient and to provide you with a foundation of knowledge so
that you can understand how technology is being used today privacy, Security, and ethics
and anticipate how technology will be used in the future. What about people? Experts agree that we as a society
This will enable you to benefit from six important information must be careful about the potential of technology to nega-
technology developments. tively affect our lives. Spe-
cifically, we need to be
The Internet and the Web aware of how technology
The Internet and the web are can affect our personal pri-
considered to be the two vacy and our environment.
most important technologies Also, we need to understand
for the 21st century. Under- the role and the importance
standing how to efficiently of organizational and per-
and effectively use the Inter- sonal ethics. These critical
net to browse, communicate, issues are integrated in
and locate information is an every chapter of this book as

Each chapter concludes with a brief discussion of a essential skill. These issues
are presented in Chapter 2,
The Internet, the Web, and
Electronic Commerce.
well as extensively covered
in Chapter 9.

Organizations

recent technological advancement related to the


wavebreakmedia/Shutterstock Almost all organizations rely
powerful Software on the quality and flexibility of
The software that is now available can do an extraordinary their information systems to stay competitive. As a member or
number of tasks and help you in an endless number of ways. employee of an organization, you will undoubtedly be involved
You can create professional-looking documents, analyze mas- in these information systems. In order to use, develop, modify,

chapter material, reinforcing the importance of stay- sive amounts of data, create dynamic multimedia web pages,
and much more. Today’s employers are expecting the people
they hire to be able to effectively and efficiently use a variety
of different types of software. General-purpose, specialized,
and maintain these systems, you need to understand the basic
concepts of information systems and know how to safely, effi-
ciently, and effectively use computers. These concepts are
covered throughout this book.

ing informed.
and mobile applications are presented in Chapter 3. System
software is presented in Chapter 4. changing Times
Are the times changing any faster now than they ever have?
powerful hardware Almost everyone thinks so. Whatever the answer, it is clear
Personal computers are now much more powerful than they we live in a fast-paced age. The Evolution of the Computer
used to be. Cell phones, tablets, and communication tech- Age section presented at the end of this book tracks the
nologies such as wireless networks are dramatically chang- major developments since computers were first introduced.
ing the ways to connect to other computers, networks, and After reading this book, you will be in a very favorable posi-
the Internet. However, despite the rapid change of specific tion compared with many other people in industry today. You
equipment, their essential features remain unchanged. To will learn not only the basics of hardware, software, connectiv-
become an efficient and effective end user, you should focus ity, the Internet, and the web, but also the most current tech-
on these features. Chapters 5 through 8 explain what you nology. You will be able to use these tools to your advantage.

16

oLe36781_ch01_002-023.indd 16 10/28/21 02:15 PM

Found in Connect for Computing Essentials 2023,


Using IT at MoviesOnline—A Case Study of a fictitious
organization provides an up-close look at what you
might expect to find on the job in the real world. You
will follow Alice, a recent college graduate hired as a
marketing analyst, as she navigates her way through
accounting, marketing, production, human resources,
and research, gathering and processing data to help
manage and accelerate the growth of the three-year-
old company.
John A Rizzo/Pixtal/SuperStock

xix
Instructors: Student Success Starts with You
Tools to enhance your unique voice
Want to build your own course? No problem. Prefer to use an
OLC-aligned, prebuilt course? Easy. Want to make changes throughout
65%
Less Time
the semester? Sure. And you’ll save time with Connect’s auto-grading too.
Grading

Study made personal


Incorporate adaptive study resources like
SmartBook® 2.0 into your course and help your
students be better prepared in less time. Learn
more about the powerful personalized learning
experience available in SmartBook 2.0 at
www.mheducation.com/highered/connect/smartbook

Laptop: McGraw Hill; Woman/dog: George Doyle/Getty Images

Affordable solutions, Solutions for


added value your challenges
Make technology work for you with A product isn’t a solution. Real
LMS integration for single sign-on access, solutions are affordable, reliable,
mobile access to the digital textbook, and come with training and
and reports to quickly show you how ongoing support when you need
each of your students is doing. And with it and how you want it. Visit www.
our Inclusive Access program you can supportateverystep.com for videos
provide all these tools at a discount to and resources both you and your
your students. Ask your McGraw Hill students can use throughout the
representative for more information. semester.

Padlock: Jobalou/Getty Images Checkmark: Jobalou/Getty Images


Students: Get Learning that Fits You
Effective tools for efficient studying
Connect is designed to help you be more productive with simple, flexible, intuitive tools that maximize
your study time and meet your individual learning needs. Get learning that works for you with Connect.

Study anytime, anywhere “I really liked this


Download the free ReadAnywhere app and access app—it made it easy
your online eBook, SmartBook 2.0, or Adaptive to study when you
Learning Assignments when it’s convenient, even don't have your text-
if you’re offline. And since the app automatically
syncs with your Connect account, all of your work is book in front of you.”
available every time you open it. Find out more at
www.mheducation.com/readanywhere - Jordan Cunningham,
Eastern Washington University

Everything you need in one place


Your Connect course has everything you need—whether reading on
your digital eBook or completing assignments for class, Connect makes
it easy to get your work done.

Calendar: owattaphotos/Getty Images

Learning for everyone


McGraw Hill works directly with Accessibility Services
Departments and faculty to meet the learning needs
of all students. Please contact your Accessibility
Services Office and ask them to email
[email protected], or visit
www.mheducation.com/about/accessibility
for more information.
Top: Jenner Images/Getty Images, Left: Hero Images/Getty Images, Right: Hero Images/Getty Images
Support Materials in Connect
The Instructor’s Manual offers lecture outlines with teaching notes and figure
­references. It provides definitions of key terms and solutions to the end-of-chapter
material, including multiple-choice and open-ended questions.

The PowerPoint slides are designed to provide instructors with a comprehensive


resource for lecture use. The slides include a review of key terms and topics, as well as
artwork taken from the text to further explain concepts covered in each chapter.

The testbank contains over 2,200 questions categorized by level of learning (definition,
concept, and application). This is the same learning scheme that is introduced in the
text to provide a valuable testing and reinforcement tool. Text page references have
been provided for all questions, including a level-of-difficulty rating.

xxii
SIMNET ONLINE TRAINING AND ASSESSMENT
FOR OFFICE APPLICATIONS

SIMnet™ Online provides a way for you to test students’ software skills in a simu-
lated environment. SIMnet provides flexibility for you in your applications course
by offering:

• Pretesting options
• Posttesting options
• Course placement testing
• Diagnostic capabilities to reinforce skills
• Web delivery of tests
• Learning verification reports

For more information on skills assessment software, please contact your local sales
representative, or visit us at www.simnetkeepitsimple.com.

xxiii
Acknowledgments
A special thank-you goes to the professors who took time out of their busy schedules
to provide us with the feedback necessary to develop the 2023 edition of this text. The
following professors offered valuable suggestions on revising the text:
Alysyn Harvey-Green Kimberly Hopkins
Metropolitan State University of Denver Tarrant County College
Ashley Harrier Mark Niswander
Hillsborough Community College Indiana University
Becky McAfee Michael Mick
Hillsborough Community College Purdue University
Brenda Nielsen Nizar Alsaid
Mesa Community College Tarrant County College
Cheri Leeth Patricia Roberts
Tarrant County College Mesa Community College
Christine Held Rodney Koch
Mesa Community College State University of NY Cortland
Connie Grimes William Wigton
Morehead State University Tarrant County College
Dorothy Harman
Tarrant County College

xxiv
About the Authors
The O’Learys live in the American Southwest and spend
much of their time engaging instructors and students in
conversation about learning. In fact, they have been talking
about learning for over 30 years. Something in those early
conversations convinced them to write a book, to bring
their interest in the learning process to the printed page.

The O’Learys form a unique team blending youth and


­experience. Dan has taught at the University of California at
Santa Cruz, developed energy-related labs at NASA, and
Courtesy of Timothy O’Leary.
worked as a database administrator and as a consultant in
information systems; he is currently a professor at the City College of San
Francisco. Tim has taught courses at Stark Technical College in Canton, Ohio,
and at Rochester Institute of Technology in upstate New York, and is currently
a professor emeritus at Arizona State University. Linda offered her expertise
at ASU for several years as an academic advisor. She also presented and devel-
oped materials for major corporations such as Motorola, Intel, Honeywell, and
AT&T, as well as various community colleges in the Phoenix area.

Tim, Linda, and Dan have talked to and taught numerous students, all of
them with a desire to learn something about computers and applications that
make their lives easier, more interesting, and more productive.

Each new edition of an O’Leary text, supplement, or learning aid has bene-
fited from these students and their instructors who daily stand in front of
them (or over their shoulders).

Design Elements: Concept Check icons: Dizzle52/Getty Images;


Making IT Work for You: cifotart/Shutterstock

xxv
Computing Essentials
Making IT work for you
INTRODUCTORY 2023
chapter 1 Information Technology,
the Internet, and You

Sergey Nivens/Shutterstock
Why should I read this chapter?
The future of computers and digital technology prom-
ises exciting challenges and opportunities. Powerful
software and hardware systems are changing the way
people and organizations interact in their daily life and
on the Internet.
This chapter introduces you to the skills and con-
cepts you need to be prepared for this ever-changing
digital world, including:
• Information systems—how the critical parts of tech-
nology interact.
HQuality/Shutterstock •  Efficiency and effectiveness—how to maximize
the use of technology.
• Privacy, ethics, and environment—how to integrate technology with people.
• Software, hardware, and data—understand the technology used in information systems.
• Connectivity and cloud computing—how the Internet, the web, and the wireless revolution are changing
how we communicate and interact.

Learning Objectives

After you have read this chapter, you should be able to:
1 Explain the parts of an information system: people, procedures, software, hardware, data, and
the Internet.
2 Distinguish between system software and application software.
3 Differentiate between the three kinds of system software programs.
4 Define and compare general-purpose, specialized, and mobile applications.
5 Identify the four types of computers and the five types of personal computers.
6 Describe the different types of computer hardware, including the system unit, input, output, s­ torage,
and communication devices.
7 Define data and describe document, worksheet, database, and presentation files.
8 Explain computer connectivity, the wireless revolution, the Internet, cloud computing, and loT.

3
Introduction
“ Welcome to Computing Essentials. I’m Katie, and this is Alan, we
work in information technology. On the following pages, we’ll be
The purpose of this book is to help you become a highly
efficient and effective computer user. This includes how
discussing some of the most exciting new developments in
to use (1) apps and application software; (2) all types of
computer technology, including smartphones, tablets, and cloud
computing. Let me begin this chapter by giving you an overview of computer hardware, including mobile devices like
smartphones, tablets, and laptops; and (3) the Internet.
the book and showing you some of its special features.
” Becoming a highly efficient and effective computer user
also requires a full understanding of the potential
impact of technology on privacy and the environment as
well as the role of personal and organizational ethics.
To effectively and efficiently use computers, you
need to know the parts of an information system: peo-
ple, procedures, software, hardware, data, and the
Internet. You also need to understand the wireless rev-
olution, the mobile Internet, and the web and to recog-
nize the role of information technology in your personal
Moyo Studio/Getty Images and professional life.

Information Systems
When you think of a personal computer, perhaps you think of just the equipment
itself. That is, you think of the screen or the keyboard. Yet there is more to it than that.
The way to think about a personal computer is as part of an information system. An
information system has several parts: people, procedures, software, hardware, data, and
the Internet. (See Figure 1-1.)
• People: It is easy to overlook people as one of the parts of an information system.
Yet this is what personal computers are all about—making people, end users like
you, more productive.
• Procedures: The rules or guidelines for people to follow when using software,
hardware, and data are procedures. These procedures are typically documented in
manuals written by computer specialists. Software and hardware manufacturers
provide manuals with their products. These manuals are provided in either
printed or electronic form.
• Software: A program consists of the step-by-step instructions that tell the computer
how to do its work. Software is another name for a program or programs. The pur-
pose of software is to convert data (unprocessed facts) into information (processed
facts). For example, a payroll program would instruct the computer to take the
number of hours you worked in a week (data) and multiply it by your pay rate
(data) to determine how much you are paid for the week (information).
• Hardware: The equipment that processes the data to create information is called
hardware. It includes smartphones, tablets, keyboards, mice, displays, system
units, and other devices. Hardware is controlled by software.
• Data: The raw, unprocessed facts, including text, numbers, images, and sounds,
are called data. Processed data yields information. Using the previous example of
a payroll program, the data (number of hours worked and pay rate) is processed
(multiplied) to yield information (weekly pay).
• Internet: Almost all information systems provide a way to connect to other people
and computers, typically using the Internet. This connectivity greatly expands the
capability and usefulness of information systems.

4 chapter 1
People
are end users who use computers
to make themselves more productive.

Software
provides step-by-step instructions
for computer hardware.

Procedures
specify rules or guidelines
for computer operations.

Hardware
includes keyboard, mouse,
display, system unit, tablets,
smartphones, and other devices.

Data
consists of unprocessed facts, including text,
numbers, images, and sounds.

Internet
allows computers to connect
to people and other
computers.

Figure 1-1 Parts of an information system


People: Prostock-Studio/Getty Images; Procedures: Microsoft Corporation; Software: Microsoft Corporation; NoDerog/Getty Images;
Hardware: (Smartphone): Urbanscape/Shutterstock; (Tablet): Prime Stock Photo/Alamy StockPhoto; (Laptop): mama_mia/Shutterstock;
(Desktop) Rawf8/Alamy Stock Photo; Data: Microsoft Corporation; (Rescue puppy or dog): Zoom Pet Photography/ImageSource/Getty Images;
(Employee portrait): Sam Edwards/age fotostock; (Coffee): Stockbyte/Getty Images; (Parrot): Maciej Czekajewski/Shutterstock;
Internet: franckreporter/Getty Images

Information Technology, the Internet, and You 5


concept check
What are the parts of an information system?

What is a program?

What is the difference between data and information?

People
People are surely the most important part of any information system. Our lives are touched
Community every day by computers and information systems. Many times the contact is direct and
obvious, such as when we
Every major technology has create documents using a
affected communities—but none word processing program
in the unique ways that or when we connect to the
computers have. We have Internet. (See Figure 1-2.)
changed how we interact with Other times, the contact is
our communities, both in the not as obvious.
tools we use to communicate, Throughout this book
such as social media posts, and you will find a variety of
in the ways we communicate, in
features designed to help
emojis and podcasts. But
you become an efficient
technology has had a deeper
impact on our communities than
and effective end user.
just the way we interact. It has These features include
forever changed how we find Making IT Work for You,
and identify our communities. Tips, Privacy, Commu-
Every day, people meet, discuss, nity, Ethics, and Careers Figure 1-2 People and computers
and bond with others they have in IT. fizkes/Shutterstock
never met in person. The entire
world feels a little smaller, with • Making IT Work for You. Throughout this book you will find Making IT Work for
our communities extending You features that present numerous interesting and practical IT applications. For
around the globe. just a few of the Making IT Work for You topics, see Figure 1-3.
• Tips. We all can benefit from a few tips or suggestions. Throughout this book you
will find numerous tips to make your computing safer, more efficient, and more
effective. These tips range from the basics of keeping your computer system

Application Description

Free Antivirus Program Protect your computer by installing and using a free antivirus
program. See page 9.

Cloud Office Suites Create and collaborate with others online to make better
documents and presentations. See page 74.

Gaming Delve into the world of video games and find the best video game
hardware for you. See page 113.

Cloud Storage Move your files online to synch files between devices or free up
space on your digital devices. See page 174.

The Mobile Office Get work done on the road; whether a business trip or your daily
commute, these tools will help you make the most of your time.
See page 194.

Figure 1-3 Making IT Work for You applications

6 chapter 1
tips
running smoothly to how to protect your
Are you getting the most out of your cell phone? Here are
privacy while surfing the web. For a
just a few of the tips to make your computing safer, more
­partial list of the tips presented in the
efficient, and more effective.
­following chapters, see Figure 1-4.
1 Low battery. Do you find that your cell phone’s battery keeps its charge
• Privacy. One of the most critical issues for less time than it used to? Here are some ways to make your battery
today is how to protect the privacy of our last longer. See page 122.
personal information. Throughout this
2 Cell phone cameras. Capturing life’s moments in a photo is easier and
book you will find Privacy boxes in the
faster with a cell phone. But a few simple tips can make the process
margin that present information about easier and your photos better. See page 71.
protecting our privacy.
3 Disaster planning. Having a cell phone lost or stolen can be devastating.
• Community. Computers are changing the
Follow these suggestions to make it easier to get your phone back, or
way we define and interact with our com- recover its data quickly. See page 228.
munities. In this chapter and the following
ones, you will find Community boxes in 4 Data usage. Is your cell phone data plan costing you money? Are your cell
the margins that present ways in which phone apps using up your data plan without you knowing it? Take control
of your data usage with the tips on page 172.
technology affects how we create and
engage with our communities. 5 Protecting your identity. Identity theft is a growing problem and can be
• Ethics. Most people agree that we should financially devastating if you are a victim. Some steps to protect your
identity are on page 223.
behave ethically. That is, we should follow a
system of moral principles that direct our
everyday lives. However, for any given cir- Figure 1-4 Selected tips
cumstance, people often do not agree on
the ethics of the situation. Throughout this
book you will find numerous Ethics boxes posing a variety of different ethical/
unethical situations for your consideration.
• Careers in IT. One of the most important decisions of your life is to decide upon
your life’s work or career. Perhaps you are planning to be a writer, an artist, or an
engineer. Or you might become a professional in information technology (IT).
Each of the following chapters highlights a specific career in information technol-
ogy. This feature provides job descriptions, projected employment demands, edu-
cational requirements, current salary ranges, and advancement opportunities.

concept check
Which part of an information system is the most important?

Describe the Making IT Work for You, Tips, and Privacy features.

Describe the Environment, Ethics, and Careers in IT features.

Software
Software, as we mentioned, is another name for programs. Programs are the instruc-
tions that tell the computer how to process data into the form you want. In most cases,
the words software and programs are interchangeable. There are two major kinds of
software: system software and application software. You can think of application soft-
ware as the kind you use. Think of system software as the kind the ­computer uses.

System Software
The user interacts primarily with application software. System software enables the
application software to interact with the computer hardware. System software is
“background” software that helps the computer manage its own internal resources.

Information Technology, the Internet, and You 7


Figure 1-5 Windows 10 Figure 1-6 macOS
omihay/Shutterstock Alexey Boldin/Shutterstock

System software is not a single program. Rather, it is a collection of programs,


including the following:
• Operating systems are programs that coordinate computer resources, provide an
interface between users and the computer, and run applications. Smartphones,
tablets, and many other mobile devices use embedded operating systems, also
known as real-time operating systems (RTOS). Desktop computers use stand-
alone operating systems like Windows 10 or macOS. (See Figures 1-5 and 1-6.)
Networks use network operating systems (NOS).
• Utilities perform specific tasks related to managing computer resources. One of the
most essential utility programs that every computer system should have is an antivirus
program. These programs protect your computer system from viruses or malicious
programs that are all too often deposited onto your computer from the Internet. These
programs can damage software and hardware, as well as c­ ompromise the security and
privacy of your personal data. If your computer does not have an antivirus program
installed on it, you need to get one. To see how you can install a free antivirus program
on your computer, see Making IT Work for You: Free Antivirus Program on page 9.

Application Software
Application software might be described as end-user software. Three types of applica-
tion software are general-purpose, specialized, and apps.
General-purpose applications are widely used in nearly all career areas. They are
the kinds of programs you have to know to be considered an efficient and effective
end user. Some of the best known are presented in Figure 1-7.
Specialized applications include thousands of other programs that are more nar-
rowly focused on specific disciplines and occupations. Two of the best known are
graphics and web authoring programs.
Mobile apps, also known as mobile applications or simply apps, are small pro-
grams primarily designed for mobile devices such as smartphones and for tablets.
There are over 5 million apps. The most popular mobile apps are for social network-
ing, playing games, and downloading music and videos.

Type Description

Word processors Prepare written documents

Spreadsheets Analyze and summarize numerical data

Database management systems Organize and manage data and information


Figure 1-7 General-purpose Presentation software Communicate a message or persuade other people
applications

8 chapter 1
Making IT work for you

FREE ANTIVIRUS PROGRAM


Have you or someone you know had a slower computing experience due to a spyware infection? Even
worse, perhaps a malicious piece of software stole crucial, personal information or caused a total system
failure. Most of these problems can be averted by having an up-to-date antivirus program running in your
computer’s memory at all times. This exercise shows you how to download and install a free antivirus pro-
gram if your computer does not yet have one. (Please note that the web is continually changing, and some
of the specifics presented here may have changed.)

Getting Started First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to
completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free
antivirus program:

• Visit http://free.avg.com and click the Download button. You will be asked to click “save” to save the installation
file to your computer.

• Run the installation file and follow the prompts.

• Select Install Basic to install the antivirus software. Once the program is installed, it will open automatically.

Using AVG Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.

• Click Scan now to run a full scan on


your computer.

• Just to the right of that, click the


button with the white cog to see the
scan options, where you can set a
schedule for automated scans.

• Click the back arrow to reach the


main screen, where you can click
various elements of the program to
configure them. For example, clicking
Web will allow you to turn on a
feature that detects cookies that may
be used to track your online activity.

AVG Technologies

9
concept check
Describe the two major kinds of software.

Describe two types of system software programs.

Define and compare general-purpose applications, specialized applications, and


mobile apps.

Hardware
Computers are electronic devices that can follow instructions to accept input, process
that input, and produce information. This book focuses principally on personal com-
puters. However, it is almost certain that you will come in contact, at least indirectly,
with other types of computers.

Types of Computers
There are four types of computers: supercomputers, mainframe computers, midrange
computers, and personal computers.
• Supercomputers are the most powerful type of computer. These machines are spe-
cial, high-capacity computers used by very large organizations. Supercomputers
are typically used to process massive amounts of data. For example, they are used
to analyze and predict worldwide weather patterns. IBM’s Blue Gene supercom-
puter is one of the fastest computers in the world. (See Figure 1-8.)
• Mainframe computers occupy specially wired, air-conditioned rooms. Although
not nearly as powerful as supercomputers, mainframe computers are capable of
great processing speeds and data storage. For example, insurance companies use
mainframes to process information about millions of policyholders.
• Midrange computers, also referred to as servers, are computers with processing
capabilities less powerful than a mainframe computer yet more powerful than a
personal computer. Originally used by medium-size companies or departments of
large companies to support their processing needs, today midrange computers are
most widely used to support or serve end users for such specific needs as retriev-
ing data from a database or supplying access to application software.

Figure 1-8 Supercomputer


Gorodenkoff/Shutterstock

10 chapter 1
Figure 1-9 Desktop Figure 1-10 Laptop
Scanrail1/Shutterstock mama_mia/Shutterstock

• Personal computers, also known as PCs, are the least powerful, yet the most
widely used and fastest-growing type of computer. There are five types of personal
computers: desktops, laptops, tablets, smartphones, and wearables. Desktop ­computers
are small enough to fit on top of or alongside a desk yet are too big to carry around.
(See Figure 1-9.) Laptop computers, also known as n ­ otebook ­computers, are por-
table and lightweight and fit into most briefcases. (See Figure 1-10.) Tablets, also
known as tablet computers, are smaller, lighter, and generally less powerful than
laptops. Like a laptop, tablets have a flat screen but typically do not have a stan-
dard keyboard. (See Figure 1-11.) Instead, tablets typically use a virtual keyboard
Figure 1-11 Tablet
that appears on the screen and is touch-sensitive. Prime Stock Photo/Alamy StockPhoto
Smartphones are the most widely used personal computer. Smartphones are cell
phones with wireless connections to the Internet and processing capabilities. (See
­Figure 1-12.) Other mobile computers include wearable devices like Apple’s Watch.
(See Figure 1-13.)

Cell Phones
Many people are not aware that their cell phone is a computer, and this computer has
many of the same components as desktops, laptops, and tablets. At one time, cell phones
had very limited power and were used almost exclusively for making telephone calls.
Now, almost all cell phones are powerful smartphones capable of connecting to the
Internet and running any number of apps. In fact, nearly every cell phone purchased
today is more powerful than the computers used to land the first person on the moon.
Today, over 99 percent of Americans under the age of 30 own a cell phone, and
over 96 percent of those cell phones are smartphones. As a result, the two terms are Figure 1-12 Smartphone
becoming interchangeable. Reflecting this trend, we will use the terms cell phone and Urbanscape/Shutterstock
smartphone interchangeably.

Personal Computer Hardware


Hardware for a personal computer system consists of a variety of different devices.
This physical equipment falls into four basic categories: system unit, input/output,
secondary storage, and communication. Because we discuss hardware in detail later in
this book, here we will present just a quick overview of the four basic categories.
• System unit: The system unit is a container that houses most of the electronic
components that make up a computer system. Two important components of the
system unit are microprocessors and memory. (See Figure 1-14.) The microprocessor Figure 1-13 Wearable
controls and manipulates data to produce information. Memory is a holding area TraceyAPhotos/Getty Images

Information Technology, the Internet, and You 11


Memory

Microprocessor

Figure 1-14 System unit


(CPU): Niels Poulsen DK/Alamy Stock Photo; (RAM): Olexandr Panchenko/Shutterstock; (Microprocessor): leungchopan/Shutterstock

for data, instructions, and information. One type, random-access memory (RAM),
holds the program and data that are currently being processed. This type of mem-
ory is sometimes referred to as temporary storage because its contents will typically
be lost if the electric power to the computer is disrupted.
• Input/output: Input devices translate data and programs that humans can under-
stand into a form that the computer can process. The most common input devices
are the keyboard and the mouse. Output devices translate the processed informa-
tion from the computer into a form that humans can understand. The most com-
mon output device is the display, also known as a monitor.
• Secondary storage: Unlike memory, secondary storage holds data and programs
even after electric power to the computer system has been turned off. The most
important kinds of secondary media are hard disks, solid-state storage, and optical discs.
Hard disks are typically used to store programs and very large data files. Using
rigid metallic platters and read/write heads that move across the platters, data and
information are stored using magnetic charges on the disk’s surface. In contrast,
solid-state storage does not have any moving parts, is more reliable, and requires
less power. It saves data and information electronically similar to RAM except that
it is not volatile. (See Figure 1-15.) Optical discs use laser technology to store
data and programs. Three types of optical discs are compact discs (CDs), digital
versatile (or video) discs (DVDs), and Blu-ray discs (BD).
• Communication: At one time, it was uncommon for a personal computer system to
communicate with other computer systems. Now, using communication devices, a
personal computer routinely communicates with other computer systems located as
near as the next office or as far away as halfway around the world, using the Inter-
Figure 1-15 Solid-state storage net. A modem is a widely used communication device that modifies audio, video,
Stas Knop/Shutterstock and other types of data into a form that can be transmitted across the Internet.

12 chapter 1
concept check
What are the four types of computers?

Describe the five types of personal computers.

Describe the four basic categories of personal computer hardware.

Data
Data is raw, unprocessed facts, including text, numbers, images, and sounds. As we
mentioned earlier, processed data becomes information. When stored electronically in
files, data can be used directly as input for the system unit.
Four common types of files (see Figure 1-16) are
• Document files, created by word processors to save documents such as memos,
term papers, and letters.

Presentation

Database

Worksheet

Document

Figure 1-16 Four types of files: document, worksheet, database, and presentation
Presentation: Microsoft Corporation; Zoom Pet Photography/Image Source/Getty Images; Database: Microsoft Corporation;
Worksheet: Microsoft Corporation; Sam Edwards/age fotostock; Document: Stockbyte/Getty Images; Maciej Czekajewski/Shutterstock

Information Technology, the Internet, and You 13


Another Random Scribd Document
with Unrelated Content
hän lupasi sekä auttaa että neuvoa häntä mikäli mahdollista. Hän
kaiveli vanhojen paperiensa joukossa ja kertoi sitte tyytyväisenä, että
nyt hän oli asiasta varma: herra Kustaa Eerikinpoika oli lueteltuna
Kristina Gyllenstjernan pakkosopimus- ja vakuutuskirjeessä.

Hän lisäsi, että kaikki jotka olivat hakeneet kuningas Kristianin


armoa ja ystävyyttä, olivat saaneet häneltä turvakirjan, miten paljon
he ikinä lienevätkin vastustaneet häntä. Kustaa herra saattaa siis
aivan pelotta liketä uutta herraansa, hän kohtelee häntä kuin
lempeä, anteeksiantava isä.

Mutta Kustaa pysyi yhä äänettömänä ajatuksiin vaipuneena. Silloin


vanhus sanoi mielellään kirjoittavansa valtakunnan neuvostolle ja
kuninkaalle, välittääkseen asiaa.

— Ei, huudahti Kustaa innokkaasti, — minä en koskaan tule


alistumaan Kristianin vallan alle. Henkeni annan mielelläni Ruotsin
vapauden ja itsenäisyyden edestä, jos vaaditaan, mutta kunniastani
ja vakaumuksestani en luovu.

Vanha piispa tuli onnettomaksi, muuta hän ei voinut tehdä, sillä


itse puolestaan hän rakasti rauhaa ja tahtoi elää sovussa kaikkien
ihmisten kanssa.

Kustaa kumarsi ja läksi, mutta ei epäillyt asiaansa.

Eräänä päivänä, hänen oleskellessaan Gripsholmassa, tuli muuan


Joakim Brahen vanha palvelija, joka oli seurannut herraansa
Tukholmaan, juosten hänen luokseen, itku kurkussa.

— Mitä on tapahtunut? kysyi Kustaa pahaa aavistaen.


— Voi rakas herra, vastasi palvelija itkien, — nyt ovat asiat oikein
kurjalla ja surkealla kannalla tässä valtakunnassa! ja kauhistuneena
ryhtyi hän, niin hyvin kuin taisi, kertomaan Tukholman kamalasta
verilöylystä.

Kustaa oli muutamia päiviä sitä ennen lähettänyt erään


rälssitilallisen hankkimaan tietoja asiain nykyisestä tilasta; tämä
palasi samalla kertaa retkeltään ja todisti edellisen kertomuksen
todeksi.

Silloin Kustaa palasi arkkipiispan luo ja kertoi mitä hän oli saanut
kuulla; veri hänen suonissaan jähmettyi kauhusta, mutta mitä hän
saattoi tehdä?

Totta oli, että Kustaa Eerikinpoika oli kadottanut ystävänsä ja


sukulaisensa ja että hän itse oli melkein henkipatto; valtion linnat ja
linnoitukset olivat kamalan hirmuvaltiaan käsissä ja hänen
sotamiehiään ja käskyläisiään vilisi pitkin koko maata, mutta mitä
Jaakko Ulfinpoika sille mahtoi?

Onnettomuudet lannistavat heikkoja sieluja, mutta antavat


voimakkaille lisää voimaa ja sitkeyttä.

Tähän saakka Kustaa ehkä oli epäillyt. Se ajatus että vanhemmat


ja sukulaiset mahdollisesti saisivat kärsiä hänen tähtensä, oli
laimentanut hänen tahtoaan, mutta tämä viime tapaus oli kuin
kehoitus rohkeaan toimintaan, käyköön sitte kuinka tahansa,
seuratkoon voitto tai kuolema.

Joulukuun 25 päivänä jätti hän Räfsnäsin yhden ainoan miehen


seuraamana.
Tämä oli vanha, kokenut palvelija ja ratsunsa selässä kuljetti hän
sitä laukkua, johon Kustaa tulevaisuuden varalta oli koonnut
kalleutensa, kullan, hopean tai rahan muodossa. He ratsastivat
hyvää vauhtia Räfsnäsistä Toresundin kirkkoa kohti, sitte
kääntyäkseen sille tielle Söder- ja Vestmanlannin välillä, jonka yli
Kolsundin lautta vei. Kustaa oli jo astunut lautalle, kun hän sai uuden
todisteen alakuloisuudesta, jota hän tähän asti oli kaikkialla
tavannut, todisteen itsekkyydestä, joka pitää huolta yksin omista
asioistaan, välittämättä mistään muusta.

Renki joka oli ollut hänen kanssaan, oli tietysti matkalla tullut
ajatelleeksi kaikkia niitä vaaroja jotka vaanivat hänen herraansa.
Kuninkaan lähetit ottavat varmaan kiinni myöskin kaikki ritarin
seuralaiset ja miehellä oli vaimo ja lapset, eikä hän tahtonut kuolla,
ja niin hän päätti ensi tilassa karata. Paras tilaisuus siihen ilmaantui
tietysti lautalla. Se ei voinut kannattaa kuin yhden hevosen ja yhden
miehen ja juuri kun Kustaa oli keskellä salmea, kääntyi renki äkkiä ja
läksi täyttä laukkaa ajamaan tiehensä.

Kustaa käski paikalla lautankuljettajaa kääntämään takaisin


rantaan, hypähti hevosensa selkään ja alkoi ajaa takaa karkulaista.

Mutta tämä heitti tavarat tielle ja pakeni vinhassa vauhdissa


metsään.

Kustaa jatkoi sitte yksin matkaansa. Hän oli juuri päässyt


Bergslageniin, kun hän eräänä iltana pyysi yösijaa siistissä
talonpoikaistalossa.

Isäntä osoitti hänelle tallin, jonne sai panna hevosen; hän irroitti
selästään laukun ja otti sen mukaansa isoon huoneeseen, jossa suuri
takkavalkea hulmusi, heitellen säkeniä pitkin huonetta.
He olivat nuorta väkeä; vaimo oli tukevaa tekoa: suuret kädet ja
jalat, sekä kasvoissa ankara, miltei tyly ilme, kun hän oli vaiti.

Mies oli pyöreänaamainen ja hyväluontoisen näköinen.

Nainen istui rukkinsa ääressä, mutta silmäili yhtämittaa vierasta.

Mies veisti kerinpuita.

Kustaa istuutui kappaleen matkan päähän, hän oli tänään niin


harvinaisen alakuloisella mielellä.

Silloin mies antoi viittauksen vaimolleen, joka paikalla läksi ulos.

— Oletteko kaukaakin?

— Södermanlannista, tuli vastaukseksi.

Syntyi taaskin hiljaisuus. Nainen palasi huoneeseen, tuoden


mukanaan mustaa leipää sekä juomaa, jonka kaiken hän laski
penkille Kustaan viereen, sanoen:

— Pitäkää hyvänänne!

— Kiitos! vastasi Kustaa ja rupesi syömään.

— Mitä tämä on? kysäisi nainen samassa ja nosti permannolta


kultarahan. Olli, kuulehan… hyvänen aika, se on kultaraha, jolleivät
silmäni petä.

Ollille tuli kiire.

— Siltä se vaan näyttää, sanoi hän. — Herra sen kai tietänee, sillä
herran se kai on.
— En ymmärrä… lausui Kustaa hämmästyneenä.

— Laukku näkyy olevan rikki, huomautti nainen osoittaen laukkua,


jonka sauma oli ratkennut hyvän matkaa.

— En ymmärrä, kuinka se on tapahtunut, sanoi Kustaa.

— Se on mahtanut hankautua satulavyötä vastaan.

— Tahdotteko neulaa ja lankaa?

— Kyllä kai te sen paremmin korjaisitte.

— Tyhjentäkää se, niin saanpahan koettaa.

Kustaa noudatti kehoitusta, mutta naisen neuloessa laukkua


ihmetteli hän ettei kumpikaan isäntäväestä himomielin katsellut
rahoja, joita he tiesivät hänellä olevan. Hän päätti koetella heitä.

— Taidatte tulla hyvin toimeen.

— Ei ole valittamista.

— Mutta kuinka te olette niin yksin; tämä näyttää sentään olevan


iso talo.

— Me saamme apua, kevään tullessa.

— Keneltä?

— Tuon isältä; kas, hän oli rikas ja minä olin vain köyhä renki.

— Olli sinä!
— Eihän meidän naimiskaupoistamme olisi voinut olla
puhettakaan, mutta sitte hän sai periä tämän saman talon, jossa me
nyt olemme. Ja silloin tämä Maija kosi ja kun me isälle olimme
luvanneet ettemme milloinkaan lainaisi äyriäkään, niin hän vihdoin
suostui ja sitte me saimme toisemme. Tietysti tuon eukon joskus on
ikävä, mutta enhän minä kauvan viivy poissa kotoa.

— Eikö teillä ole lapsia?

— Oli yksi, mutta kuoli, vastasi nainen. — Tuossa se nyt on,


paremmin en minä osaa sitä laittaa.

Kustaa pani takaisin tavaransa ja nainen meni isolle sängylle,


tyhjensi siitä vanhat oljet ja pani uusia sijaan. Vanhat hän sitte levitti
uuninnurkkaan.

Sillaikaa oli Olli saanut kerinpuunsa valmiiksi ja katseli tyytyväisenä


työtään.

— Näillä voisi jotakin ansaitakin, virkkoi hän.

— Tahdotteko nyt mennä levolle? kysyi nainen Kustaalta, osoittaen


sänkyä.

Kustaa noudatti paikalla kehoitusta. Hän ripusti laukun


vuoteenpäähän, sillä tiesihän hän olevansa heidän vallassaan; oli siis
parasta osoittaa heille luottamusta.

Hän nukkui sikeään uneen, mutta heräsi siitä että hänen


ympärillään kuiskailtiin.

— Mikähän herrasmies tuo lie? sanoi Olli.


— Mahtaa se olla parempia ihmisiä, vastasi vaimo, — mutta
hänelle täytyy sanoa, että hän pitää huolta tavaroistaan, muutoin ne
kyllä katoavat.

— Pyytäisinköhän minä häntä panemaan ne tuonne vanhaan


kirstuun? kysäisi Olli.

— Älä huoli; pitäköön jokainen huolta omastaan.

Enempää Kustaa ei kuullut, mutta hänen ajatuksensa pysyivät


virkeinä aamuun asti. Maija muori oli keittänyt vesivelliä, jota hän
tarjosi sekä vieraalleen että miehelleen. Lisäksi saivat he kappaleen
mustaa leipää, Kustaa suurimman osan ja vaimo itse vain
suupalallisen.

Turhaan tarjosi Kustaa maksoa; siitä he eivät tahtoneet kuulla


puhuttavankaan.

— Tahdotteko säilyttää rahani, kunnes tulen takaisin? kysyi hän.

Miksei, se kyllä käy laatuun.

— Etkö voisi myydä minulle taalalaispukua? kysyi Kustaa Ollilta.

— Kyllä hyvinkin.

— Entä pyöreää lakkia ja kirvestä? Sekin kävi päinsä.

— Leikkaa sitte minun tukkani juuri sellaiseksi kuin sinun on.

Olli nauroi ja arveli, että se käy vallan helposti.

Kaupat tehtiin, Kustaa muutti muotoa ja talonpoika lupasi säilyttää


hänen vaatteensa ja rahansa. Hän ei kertonut heille, kuka hän oli tai
mitä hän aikoi; mutta hän luotti heihin ja he korvasivat hänen
luottamuksensa monin kerroin.

Hän pani lakin päähänsä, heitti kirveen olalle ja läksi hakemaan


kylästä työtä niinkuin muutkin taalalaismiehet.

Antinpäivän aikaan tuli hän Rankhyttaniin, rikkaan vuoritilallisen


Antero Pietarinpojan luo, pari penikulmaa Falunista. He olivat
Upsalassa olleet ylioppilastoverit, mutta Kustaa luotti valepukuunsa,
pyysi työtä ja sai.

Hänet pantiin riiheen puimaan renkien kanssa; nämä huomasivat


paikalla, ettei hän sitä työtä osannut, ja juttelivat ja nauroivat
keskenään, mutta eivät hänelle sanoneet mitään.

Kun piiat saivat vihiä asiasta, tulivat he uteliaiksi ja muuan heistä


meni häntä niin likelle, että hän näki silkkikauluksen pistävän esiin
talonpoikaistakin alta.

— Sen hullumpaa en iässäni ole kuullut, sanoi tyttö; — pitääkö


renkien nyt ruveta pukeutumaan herrojen lailla?

— Se pitää kertoa isännälle.

Pian kutsuttiin Kustaa Antero Pietarinpojan eteen. Tämä tarkasteli


häntä kauvan ja huudahti sitte:

— Kustaa Eerikinpoika!

Kustaa ojensi hänelle sanatonna kätensä ja kyyneleet valuivat alas


hänen poskiaan.
— Sinä iloinen, reipas upsalanaikuinen toveri tulet surullisena
luokseni ja tällaisessa puvussa; mitä tämä tietää?

Kustaa kertoi isänsä ja lankonsa kuolemasta Tukholman


verilöylyssä.

— Olen kuullut siitä, sanoi Pietarinpoika.

— Ojenna siis minulle kätesi ja auta minua; olen matkalla


Taalainmaalle nostamaan kansaa aseisiin. Valtakunnan itsenäisyys ja
yksityisen onni ovat tässä kysymyksessä.

Vuoritilallinen joutui hämilleen.

— Olen kyllä kuullut puhuttavan tuosta hirveästä tapauksesta


Tukholmassa ja se on kyllä minuun kovasti koskenut, mutta antaa
apua niin uhkarohkeaan yritykseen kuin se jota sinä ajattelet, sitä en
katso meille vuoritilallisille hyödylliseksi, ja jos sinä tahdot seurata
minun neuvoani, niin lähde pian täältä tiehesi, sillä palvelijat ovat
kiinnittäneet sinuun huomionsa ja enempää ei tarvita ennenkuin
kuninkaan vakoojat löytävät tien tänne.

— Etkö sitte tahdo tehdä mitään isänmaan alennuksen ja sorron


poistamiseksi?

— En voi, en uskalla sillä tavalla saattaa itseäni ja omaisiani


perikatoon. Mene Aarent Pietarinpojan luo Ornäsiin, hän ja
Vesteråsin piispa sekä monet muut ylhäiset herrat ovat sukua; jos he
ryhtyvät asiaan, niin se ehkä voi menestyä. Mutta kuule minun
neuvoani: älä viivy kauvan samassa paikassa.

— Aarent Pietarinpoika on hänkin upsalanaikuinen


ylioppilastoverini, sanoi Kustaa miettiväisenä.
— Hän on Svinhufvud-veljesten lanko, lisäsi Antero Pietarinpoika,
itsekseen ihmetellen, eikö Kustaa tietänyt, että koko tämä suku oli
tanskalaismielinen.

— Kiitos neuvostasi! Lähden paikalla Ornäsiin. Myöhään illalla läksi


hän Rankhyttanista ja aikoi Vikin ja Thorsångerin pitäjien välillä
olevan Lillelfvenin lauttauspaikan yli. Hän meni jäälle, se murtui
hänen allaan; mutta hän oli voimakas ja notkea, joten hän pääsi
ylös. Sitte hän palasi takaisin lauttamökille ja viipyi siellä yötä,
kuivatakseen vaatteitansa.

Seuraavana päivänä hän terveenä, reippaana ja hyvillä toiveilla


meni
Ornäsiin.

Aarent Pietarinpoika hämmästyi suuresti hänet nähdessään, mutta


sanoi
iloitsevansa hänen tulostaan ja toimitti pöytään ruokaa ja olutta.
Sillaikaa hän yhtämittaa jutteli entisistä ajoista, kuinka he yhdessä
Kustaan kanssa taistelivat Sten Sturen johdolla, ja heidän olostaan
Upsalassa.

Tämä mies näytti todellakin tahtovan toimia isänmaan hyväksi ja


Kustaa avasi hänelle sydämensä, kertoi tuumistaan valtakunnan
vapauttamiseksi ja pyysi häneltä apua ja neuvoja.

Aarent kuunteli tarkkaavaisesti ja vakuutti että hän toimittaa


hänelle lujaa apua, hän tahtoo vain ensin kuulla mitä naapurit
tuumivat asiasta.

Aterian aikana palveli Barbro, Aarent Pietarinpojan vaimo, heitä ja


Kustaa huomasi, että kalpea nainen usein häntä katseli, mutta hän ei
ajatellut sitä sen enempää.

Myöhään illalla vei Aarent vieraansa luhtikamariin ja kehoitti häntä


perinpohjaisesti lepäämään sillaikaa kun hän puuhaa hänen asiansa
hyväksi.

Kustaa kiitti Jumalaa, että hän kerrankin oli tavannut miehen jolla
oli sydän, ja pani ilomielin levolle.

Isäntä hieroskeli tyytyväisenä käsiään, hymyili itsekseen ja käski


rengin valjastaa hevosen. Silloin huomasi hän vaimonsa, joka
äänetönnä seisoi häneen katselemassa.

— Mitä sinä siinä töllötät? kirkaisi hän hänelle; — lähde paikalla


maata.

Hän jätti huoneen ja näki hetkisen perästä miehensä ajavan


heidän likimmän naapurinsa Maunu Niilonpojan luo Aspebodaan.

— Nyt et onnistu, mutisi hän itsekseen. — Maunu Niilonpoika on


rehellinen mies, joka ei koskaan tule suostumaan petokseen.

Pian Aarent palasikin takaisin ajaen hurjaa vauhtia, mutta ei


pysähtynyt kotiin, vaan jatkoi matkaansa pihan poikki ja siitä
Sätraan, jossa kuninkaan käskynhaltija Brun Pentinpoika asui.

Tämä, yhtä kova ja tunnoton ihminen kuin Aarent, oli naimisissa


Barbron sisaren kanssa, ja Barbro tiesi että molempien suvut olivat
tanskalaismieliset.

Äkkiä hän käsitti kaikki: vieras otetaan vangiksi, kuljetetaan pois


hänen talostaan ja surmataan sitte.
Mikä loukkaus vieraanvaraisuutta kohtaan!… Mitä tuo nuori, reipas
pakolainen on tehnyt?… Ei, Barbro ei saattanut kestää sitä, hänen
täytyy hänet pelastaa, maksoi mitä maksoi.

Hän herätti luotettavan rengin, käski häntä valjastamaan hevosen


ja pysähtymään talon taakse. Sitte hän kiireesti riensi luhtiin
herättämään Kustaata. Mielenliikutuksesta ja pelosta läähättäen
kertoi hän hänelle katkonaisin sanoin mikä vaara häntä uhkasi ja
kehoitti häntä kiiruhtamaan.

Jottei talonväki saisi vihiä hänen aikeistaan, täytyi vieraan kadota


niin ettei kukaan tietäisi minne hän oli joutunut; sentähden laski hän
hänet alas pitkällä käsiliinalla, jommoisia siihen aikaan käytettiin,
talon taakse ja kuuli sitte suurella ilolla reen etenevän Runniin päin.

Aamulla saapui Aarent Pietarinpoika, seurassaan Brun Pentinpoika


ja kaksikymmentä sotamiestä.

Hän kerrassaan raivostui huomatessaan, että lintu oli lentänyt


pesästä.

Barbro pysyi tyynenä ja myönsi mitä oli tehnyt; kun mies sitte
vihansa vimmassa kysyi, mitä se häneen oli kuulunut, niin hän
vastasi:

— En saattanut antaa sellaisen teon kirouksen langeta itseni ja


lasteni päälle.

Sanotaan ettei Aarent Pietarinpoika sitte enää koskaan kärsinyt


vaimoaan; ja onhan se luonnollista, sillä hän muistutti hänelle
alituisesti tuota rikosta.
Mutta Kustaa jatkoi matkaansa, renki, jonka nimi oli Jaakko, ajoi
niin paljon kuin hevonen pääsi jotta he pian tulisivat perille. Barbro
rouva oli kehoittanut heitä ajamaan Svärdsjöhön herra Jonin luo,
joka oli rehellinen pappismies.

Aamun sarastaessa olivat he päässeet Runnjärven toiselle puolelle,


niinsanotuille Korsnäsin mökeille.

Täältä lähetti Kustaa pois ystävällisen kyyditsijänsä, käski häntä


salaa sanomaan Barbro rouvalle, ettei hän koskaan tule unohtamaan
mitä hän hänen hyväkseen on tehnyt, ja jatkoi yksin matkaansa.

Hän aikoi juuri astua erääseen mökkiin kysymään tietä, mutta


ovea avatessa näki hän vuoritilallisen Niilo Hannunpojan
Prämsbackasta, jonka hän tiesi suureksi tanskalaisystäväksi.

Suuri vaara oli siis tarjolla, mutta samassa kirkaisi tyttö joka seisoi
lieden ääressä:

— Auttakaa, pata kaatuu!

Kaikki riensivät auttamaan ja Kustaa livahti tiehensä. Hän läksi


sitte toiselle asumukselle, jota sanottiin Sandvikin mökiksi, ja siellä
hän tapasi erään sulattajan.

— Voitko näyttää minulle tien Svärdsjöhön?

— Voin kai.

He läksivät; se oli reipas nuori mies, varmaankin samanikäinen


kuin Kustaa, joka suuresti rakasti vaivaloista ammattiaan. Hän kertoi
tanskalaisten sorrosta ja lisäsi:
— Ja kuitenkin sanovat, että se vielä käy pahemmaksi.

— Tietysti, jos kärsitte sitä.

Jos tappaakin yhden voudin, niin toinen tulee sijaan eikä siitä
kukaan hyödy.

— Oletko kuullut puhuttavan Engelbrektistä?

— Totta kai.

— Muistatko kuinka silloin kävi?

Mies vaikeni hetkiseksi.

— Olisipa hän vaan täällä, niin voisimmepa koettaa uudelleen,


sanoi hän.

— Ei tiedä mitä vielä voi tapahtua.

Sulattajalla ei ollut aikaa saattaa kauvemmaksi. Kustaa antoi


hänelle hopearahan ja sanoi:

— Jos Jumala auttaa minua, niin tule luokseni ja minä maksan


sinulle paremmin.

He erosivat ja Kustaa jatkoi yksin osoitettuun suuntaan.

Illalla hän tuli Bengtshedeniin; se oli suuri kylä likellä Svärdsjön


pitäjän eteläistä rajaa.

Hän meni Åkersgården-nimiseen taloon pyytämään yösijaa.


Emäntä osoitti hänelle sijan lieden ääressä, mutta kun hän istui
siinä tuijottamassa tuleen eikä virkkanut sanaakaan, niin emännän
päähän pälkähti, että hän samalla saattoi tehdä vähän työtä
ruuastaan. Emäntä valmisti nimittäin juuri makkaroita ja aikoi
hänellekin antaa makkaran.

— Voitpa, kulkijapoika, tehdä minulle pari makkaratikkua, koskei


sinulla ole muutakaan tekemistä, sanoi hän.

— En minä osaa tehdä pylsypölkkyjänne, vastasi Kustaa hymyillen;


hänen ajatuksensa liikkuivat kaukana täältä.

— Ole sitte tekemättä, tuumi emäntä; — makkaran voit siltä saada


ja olutta päälle.

Sitte hän valmisti vuoteen ja väitti Kustaan olevan unen tarpeessa.

Mutta uni ei paikalla tullut. Muistot ja mietteet pyörivät hänen


mielessään ja ylinnä näki hän tuon suojelevan käden joka oli torjunut
kaikki vaarat. Varmaankin korotti hän käsivartensa taivasta kohti ja
huudahti ilon valtaamana: se on hyvässä turvassa, joka on Jumalan
suojeluksessa.

Seuraavana päivänä tuli hän Svärdsjön kirkolle, mutta nyt oli hän
käynyt niin varovaiseksi, että hän tahtoi saada selville, saattoiko Jon
herraan luottaa, ennenkuin hän uskoi hänelle salaisuutensa.
Sentähden hän ensin meni latoon, jossa rengit olivat puimassa, ja
tarjoutui auttamaan heitä.

Heidän puheistaan saattoi päättää että Jon herra oli rehellinen


mies ja silloin hän paikalla läksi hänen puheilleen.
He tunsivat toisensa, sillä pappi oli hänkin ollut Upsalassa samaan
aikaan kuin Kustaa, vaikka hän oli monta vuotta vanhempi.

Tämä hurskas pappismies oli mitä rehellisin ja uskollisin herra.


Liikuttavaa oli katsoa hänen hyväntahtoisuuttaan ja osanottoaan.
Hänen mielestään Kustaa oli ottanut täyttääkseen suuren työn, jonka
onnistumiseen hän rukoili Jumalan siunausta. Ja se että Kustaa oli
tullut hänen taloonsa, oli hänestä sellainen kunnia, ettei hän tietänyt
kuinka hän osaisi kohdella vierastaan.

Kun Kustaan esimerkiksi piti peseytyä, tahtoi hän välttämättömästi


pidellä pyyhinliinaa, itse hän palveli ruokapöydässä eikä koskaan
mennyt ovesta ennen Kustaata.

Jonin taloudenhoitajatar ei käsittänyt, miksi "renkiä" sillä tavalla


kunnioitettiin, ja kun isäntä hengen uhalla kielsi häntä kyselemästä,
niin hän läksi piioille ja rengeille vuodattamaan sydäntään, josta
seuraus oli että kaikki rupesivat vakoilemaan kulkijaa.

Sentähden hänen pian täytyi lähteä matkaan, pappi huomasi sen


välttämättömäksi ja souti itse hänet Isalan kylään, puoli penikulmaa
Svärdsjön kirkolta.

Siellä asui kruununmetsästäjä Sven Elfinpoika vanhan vaimonsa


kanssa.
Pappi puhui hänelle muutamia sanoja kahdenkesken ja ukko vastasi:

— Voitte luottaa minuun, rakas isä.

Mutta pian näytti vaara taas olevan tarjolla, sillä Brun Pentinpojan
lähetit tulivat pappilaan kysymään vankia.

Ja sieltä he läksivät Isalaan.


Sven Elfinpojan vaimo oli juuri paistamassa leipiä, kun joukko
vieraita miehiä astui sisään kysymään, oliko näillä mailla nähty erästä
tuntematonta miestä.

Kustaa seisoi lieden ääressä lämmittelemässä.

Vastauksen asemasta otti vaimo varsiluudan, survasi häntä sillä


selkään ja sanoi:

— Mitä sinä siinä töllistelet niinkuin et koskaan olisi nähnyt ihmisiä.


Laita itsesi siitä pian riihelle!

Hän totteli paikalla ja meni latoon puimaan renkien avuksi.

Voudin palvelijat nauroivat rengin saamia nuhteita, aavistamatta


että vaimo niin pahoin kohteli juuri samaa korkeaa herraa, jota he
etsivät.

Hän pääsi heistä siis sillä kertaa onnellisesti.

Mutta hänen turvallisuutensa oli jo täälläkin vaarassa ja sentähden


Sven Elfinpoika lupasi viedä hänet pohjoisempaan, Marnäsissä
asuvien kruununmetsästäjien Pietari ja Matti Olavinpoikien luo. Mutta
matka sinne oli aika vaarallinen, sillä voudin palvelijoita vakoili
kaikkialla.

Sven Elfinpojan vaimo oli neuvossa niinkuin tavallisesti.

Kustaa pantiin maata olkikuormaan ja Sven asteli vieressä


ajamassa.

Hän ei ollut päässyt kauvaskaan talosta, kun joukko sotamiehiä


kerääntyi hänen ympärilleen.
He kysyivät, mihin matka ja pistivät terävät keihäänsä kuorman
sisään.

Suulas talonpoika vastasi terävästi kaikkiin heidän kysymyksiinsä


ja sotamiehet käskivät häntä menemään hiiteen, jopa heti paikalla.

— Se juuri on hartain haluni, vastasi ukko ja löi hevosta selkään.

Mutta samassa huomasi hän verta tiellä. Silloin hän kiireesti veti
esiin veitsensä ja leikkasi huomaamatta haavan hevosen jalkaan.
Tanskalaisten epäluulo, joka jo olikin herännyt, saatiin siten
poistetuksi.

Niin sai kelpo talonpoika vainotun vieraansa onnellisesti Marnäsiin.

Kansanlaulussa sanotaan:

Kyösti kuningas olkikuormassa, hei sutarallaa


Taalainmaalle vietiin, hei sutarallallaa,
Ja juutit korjasi luunsa, hei sutarallaa.

Mutta Marnäsissä uhkasi sama vaara: kuninkaan vakoilijoita


odotettiin joka hetki eikä vaatimattomissa tölleissä ollut ainoaakaan
piilopaikkaa, johon hänet olisi voinut kätkeä.

Tanskalaisten keihäs oli sattunut hänen jalkaansa hänen


maatessaan olkikuormassa ja siitä haavasta oli veri tullut. Nyt sitä
särki ja liikkuminen tuotti Kustaalle suurta vaivaa.

Marnäsiläiset, sekä miehet että naiset, säälivät häntä; eivät he


tietäneet kuka hän oli tai mitä hän tahtoi, mutta koska tanskalaisen
voudin väet ajoivat häntä takaa, niin he päättivät auttaa häntä niin
kauvas kuin suinkin.
Perinpohjin tuumittuaan veivät he hänet Leksandin pitäjään. Siellä
hänen, Lungsjöån luona, syvällä metsässä, kaatuneen, suuren
hongan alla täytyi maata piilossa. Lepo oli nimittäin aivan
välttämätön haavan parantumiseksi.

Siellä hän makasi kolme päivää ja marnäsiläiset veivät hänelle


ruokaa ja kertoivat kaikki mitä olivat saaneet kuulla vakoilijoista.

Siitä saakka sanottiin paikkaa Närboksi [Närbo merkitsee sanasta


sanaan "elatuspesä".].

Mutta muutamien päivien perästä ei hän täälläkään enää ollut


varma vapaudestaan, jonkatähden hänet Lungsjöån rantoja pitkin
vietiin syvemmälle metsään, kunnes vastaan tuli suuri suo, joka
ympäröi korkeaa kukkulaa.

Täällä hän taasen piilotteli hongan alla, kunnes marnäsiläiset


tiesivät kertoa, että vakoileminen oli käynyt vähemmäksi.

Tanskalaiset olivat luvanneet helisevät palkinnot sille, joka saattaa


vangin heidän käsiinsä, mutta heidän houkutuksensa eivät olleet
vaikuttaneet näihin rehellisiin ihmisiin enempää kuin Sven
Elfinpoikaankaan.

Kustaan persoonallisuus oli tehnyt syvän vaikutuksen noihin


luonnonlapsiin, hän oli niin avuton, hän tarvitsi heitä; jokainen heistä
olisi pitänyt suurena syntinä olla häntä auttamatta.

Muutamien päivien perästä lähdettiin matkaan, metsien läpi,


Onsjönin ja Ingarnin yli Rättvikin pitäjään. Useita marnäsiläisiä
talonpoikia oli mukana.
Kustaa ei ollut vielä saanut tilaisuutta puhua suuremmalle
kansanjoukolle, mutta nyt, tultuaan Siljansdaleihin, huomasi hän
heti, että mieliala oli aivan toinen kuin eteläisissä maakunnissa, ja
seuraavana sunnuntaina läksi hän Rättvikin kirkolle ja siellä hän
kirkonvalleilta ensi kerran julkisesti puhui talonpojille.

Kauniilla, sointuvalla äänellään kuvasi hän valtakunnan hätää ja


vaaraa, puhui Kristianin petollisesta menettelystä ja verilöylystä,
jonka hän oli pannut toimeen Tukholmassa, surmatakseen
valtakunnan etevimmät miehet, sekä kuinka hän oli kohdellut Sten
Sturen leskeä ja äitiä.

Naiset itkivät ja nyyhkyttivät, miehiltä pääsi vihamielisiä


huudahduksia.

Hän kehoitti heitä yhtä urhoollisesti ja uskaliaasti kuin heidän esi-


isänsä tarttumaan aseisiin ja pelastamaan valtakunnan perikadosta.

Talonpojat kuuntelivat häntä suurimmalla myötätuntoisuudella,


sitte he hiljaa neuvottelivat keskenään ja vihdoin astuivat vanhimmat
esiin ja sanoivat, että kyllä he vanhastaan tuntevat tanskalaisen ja
kyllä he ovat taipuvaiset rankaisemaan hänen petollisuuttaan, mutta
yksin eivät he saata päättää niin tärkeää asiaa: heidän täytyy ensin
kuulla naapuripitäjien mielipide.

Tähän vastaukseen oli Kustaa hyvin tyytyväinen. Jospa hän vaan


olisi kantanut rakasta Sture-nimeä, niin he varmaankin paikalla
olisivat olleet valmiit, mutta hän oli heille melkein ventovieras, eikä
hänen sukunsa viime aikoina ollut erittäin kunnostanut itseään.

Paras ja ainoa suositus oli hänelle se, että hän oli taistellut Sten
herran rinnalla ja Brännkyrkan luona voitollisesti kantanut
valtakunnan lippua. Mutta eihän siinä ollut tarpeeksi.

Täältä läksi Kustaa Taalain suurimpaan ja tiheimmin asuttuun


pitäjään, Moraan.

Pappilassa hänet suurella ystävällisyydellä otti vastaan kirkkoherra


Jaakko Pietarinpoika. Taru kertoo, että kirkkoherra täällä niinkuin
Svärdsjössäkin olisi pidellyt hänelle pesuvatia, hänen peseytyessään.
Nainen, joka oli samassa sattunut tulemaan huoneeseen, oli nähnyt
tämän ja paikalla mennyt kertomaan, että ylhäinen herra,
taalalaispukuun puettuna, vieraili Jaakko herran luona; uutinen levisi
kuin kulovalkea, ja Kustaan piti paikalla lähteä tiehensä.

Kirkkoherra vei vieraansa Utmelandin kylään, joka sijaitsee


Siljan-järveen pistäytyvällä niemellä, heti eteläpuolella kirkkoa.
Hänet kätkettiin Tomtgårdenin kellariin, kunnes hän joulupyhinä saisi
tilaisuutta puhua talonpoikien kanssa.

Matti Laurinpoika, joka vaimoineen asui Tomtgårdenia, arveli, ettei


heillä pelätä tanskalaisia kulkureita; tulkoot vaan, niin kyllä Matti
heille antaa.

Vaimon mielestä oli paras olla suutaan soittelematta. Sitte läksi


Jaakko herra pois ja Matti saattoi hänet tielle, mutta vaimo palasi
tupaan panemaan jouluolutta.

Samassa tuli sinne joukko tanskalaisia vakoilijoita, mutta vaimo ei


ollut millään, kieritti vaan olutkuurnan lattiassa olevan kellariluukun
päälle. Kun häneltä kysyttiin, oliko vierasta näkynyt näillä mailla, niin
hän vastasi ettei hänellä ole tapana hyppiä kylän raitteja, saavat
vaan vieraat tulla tupaan ennenkuin hän heidät näkee, ja tällä kertaa
heitä todellakin on aika lauma, mutta ovatko he voroja vaiko muita
rosvoja, sitä hän ei voi tietää.

— Saat pian nähdä, vastasi muuan miehistä, mutta toinen arveli


parhaaksi olla nostamatta riitaa mokoman vanhan peikon kanssa;
saattoihan nähdä ettei se, jota he etsivät, kuitenkaan ollut siellä.

Ja he läksivät matkoihinsa.

Mutta he saattoivat myöskin tulla takaisin ja sentähden täytyi


Kustaan yhä pysyä kellarissa. Pappilasta lähetettiin hänelle ruokaa,
joka pienen aukon läpi laskettiin alas kellariin.

Tanskalaiset voudit olivat nyt ruvenneet etsimään yhä


kiihkeämmin, sillä kuka saattoi tietää mitä tuo karannut ritari vielä
tekisi ja sentähden täytyi käyttää kaikkia mahdollisia keinoja hänen
kiinniottamisekseen.

Mutta tanskalaisten lähettien tehtäviin kuului myöskin kuvata


kansalle kuningasta mitä parhaimmassa valossa: hän oli oikea
talonpoikien ystävä, joka tarkoitti yksinomaan heidän parastaan; ja
Tukholman verilöyly oli vain valhetta ja panettelua, tahdottiin vain
ärsyttää kansaa kuningasta vastaan.

Alivouti Niilo Vestgöte, raju, uskalias velikulta, läksi Taalainmaalle


siinä varmassa luulossa, että hän kyllä saa talonpojat ilmoittamaan
Kustaan olinpaikan. Hän tuli sentähden Moraan ja meni nimismiehen
taloon.

Mutta Morassa oli myöskin muuan Rasmus Jute, alkuaan


tanskalainen, joka oli asunut siellä monta vuotta ja ennen palvellut
Sten Sturella.

You might also like