Computing Essentials 2023: Making IT Work For You 29th Edition Timothy J. O'Leary
Computing Essentials 2023: Making IT Work For You 29th Edition Timothy J. O'Leary
com
https://ebookmeta.com/product/computing-
essentials-2023-making-it-work-for-you-29th-edition-timothy-
j-oleary/
OR CLICK HERE
DOWLOAD EBOOK
https://ebookmeta.com/product/ise-computing-essentials-2023-29th-
edition-timothy-oleary-oleary-linda-oleary/
ebookmeta.com
https://ebookmeta.com/product/top-stocks-2023-29th-edition-martin-
roth/
ebookmeta.com
https://ebookmeta.com/product/pearsons-federal-
taxation-2023-individuals-36th-edition-timothy-j-rupert/
ebookmeta.com
https://ebookmeta.com/product/lonely-planet-best-day-hikes-italy-1st-
edition-gregor-clark/
ebookmeta.com
https://ebookmeta.com/product/new-blood-the-godbearer-4-1st-edition-l-
c-davis/
ebookmeta.com
https://ebookmeta.com/product/howl-of-the-alpha-blood-moon-wolves-
book-1-1st-edition-milly-taiden-2/
ebookmeta.com
https://ebookmeta.com/product/exploring-internal-communication-
towards-informed-employee-voice-4th-edition-kevin-ruck-editor/
ebookmeta.com
https://ebookmeta.com/product/language-nation-race-linguistic-reform-
in-meiji-japan-1868-1912-1st-edition-atsuko-ueda/
ebookmeta.com
The Wireless World: Global Histories Of International
Radio Broadcasting 1st Edition Simon J. Potter
https://ebookmeta.com/product/the-wireless-world-global-histories-of-
international-radio-broadcasting-1st-edition-simon-j-potter/
ebookmeta.com
Computing Essentials
Making IT work for you
INTRODUCTORY 2023
• The O’Leary Series
Computing Concepts
• Computing Essentials 2017
• Computing Essentials 2019
• Computing Essentials 2021
• Computing Essentials 2023
Daniel A. O’Leary
Professor
City College of San Francisco
Timothy J. O’Leary
Professor Emeritus
Arizona State University
Linda I. O’Leary
Final PDF to printer
COMPUTING ESSENTIALS
Published by McGraw Hill LLC, 1325 Avenue of the Americas, New York, NY 10019. Copyright ©2023 by
McGraw Hill LLC. All rights reserved. Printed in the United States of America. No part of this publication
may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system,
without the prior written consent of McGraw Hill LLC, including, but not limited to, in any network or
other electronic storage or transmission, or broadcast for distance learning.
Some ancillaries, including electronic and print components, may not be available to customers outside
the United States.
1 2 3 4 5 6 7 8 9 LWI 27 26 25 24 23 22
ISBN 978-1-265-26321-8
MHID 1-265-26321-3
All credits appearing on page or at the end of the book are considered to be an extension of the copyright page.
The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website
does not indicate an endorsement by the authors or McGraw Hill LLC, and McGraw Hill LLC does not
guarantee the accuracy of the information presented at these sites.
mheducation.com/highered
3 Application Software 56
4 System Software 84
11 Databases 268
Glossary 362
Index 383
vii
Contents
Communication 35
1 Social Networking 35
Blogs, Microblogs, Podcasts, and Wikis 36
INFORMATION TECHNOLOGY, Messaging 37
THE INTERNET, AND YOU 2 E-mail 38
Search Tools 40
Introduction 4 Search Engines 40
Information Systems 4 Content Evaluation 40
People 6 Electronic Commerce 41
Software 7 Security 42
System Software 7 Cloud Computing 43
Application Software 8 The Internet of Things 45
Making IT work for you: Careers in IT 45
A Look to the Future:
Free Antivirus Program 9
Home Smart Home 46
Hardware 10
Types of Computers 10
Visual Summary 47
Cell Phones 11
Key Terms 51
Personal Computer Hardware 11
Multiple Choice 52
Data 13 Matching 53
Connectivity and the Mobile Internet 14 Open-Ended 54
Careers in IT 15 Discussion 54
A Look to the Future: Using and Understanding
Information Technology 16
Visual Summary 17
Key Terms 20
3
Multiple Choice 21 APPLICATION SOFTWARE 56
Matching 22
Open-Ended 22 Introduction 58
Discussion 23 Application Software 58
App Stores 58
User Interface 58
Common Features 61
2 Mobile Apps 61
Apps 61
THE INTERNET, THE WEB, AND
General-Purpose Applications 62
ELECTRONIC COMMERCE 24 Word Processors 62
Introduction 26 Presentation Software 65
The Internet and the Web 26 Spreadsheets 66
Database Management Systems 68
Making IT work for you: Specialized Applications 69
Graphics Programs 69
Online Entertainment 28 Video Game Design Software 70
Internet Access 31 Web Authoring Programs 71
Providers 31 Other Specialized Applications 72
Browsers 31 Software Suites 72
Web Utilities 33 Office Suites 72
Filters 33 Cloud Computing 72
File Transfer Utilities 33 Specialized and Utility Suites 72
Internet Security Suites 34 Careers in IT 73
viii
Making IT work for you: Making IT work for you:
Cloud Office Suites 74 Gaming 112
A Look to the Future: The New Workplace Wearable Computers 114
Realities 76 Components 114
System Board 115
Visual Summary 77 Microprocessor 116
Key Terms 80 Microprocessor Chips 116
Multiple Choice 81 Specialty Processors 117
Matching 82 Memory 118
Open-Ended 82 RAM 118
Discussion 83 ROM 118
Flash Memory 118
Expansion Cards and Slots 119
4 Bus Lines 120
Expansion Buses 120
SYSTEM SOFTWARE 84 Ports 121
Introduction 86 Standard Ports 121
Specialized Ports 121
System Software 86
Cables 122
Operating Systems 87
Power Supply 122
Functions 87
Features 88 Electronic Data and Instructions 123
Categories 89 Numeric Representation 123
Character Encoding 124
Mobile Operating Systems 90
Careers in IT 125
Desktop Operating Systems 91
Windows 91 A Look to the Future: Brain–Computer
macOS 91 Interfaces 126
UNIX and Linux 92
Virtualization 92 Visual Summary 127
Utilities 93 Key Terms 130
Multiple Choice 131
Making IT work for you: Matching 132
Open-Ended 132
Virtual Assistant 94 Discussion 133
Operating System Utilities 96
Utility Suites 99
Careers in IT 99
A Look to the Future: Making Better Computers 6
by Making Them More Human 100
INPUT AND OUTPUT 134
CONTENTS ix
Audio-Input Devices 142
Making IT work for you:
Voice Recognition Systems 142
What Is Output? 143 Cloud Storage 174
Monitors 143
Mass Storage Devices 176
Features 143
Enterprise Storage System 176
Flat-Panel Monitors 144
Storage Area Network 177
E-book Readers 144
Other Monitors 145
Careers in IT 177
Printers 146 A Look to the Future:
Features 146 Next-Generation Storage 178
Inkjet Printers 147
Laser Printers 147 Visual Summary 179
3D Printers 147 Key Terms 182
Other Printers 147 Multiple Choice 182
Audio-Output Devices 148 Matching 183
Combination Input and Output Open-Ended 184
Devices 148 Discussion 184
Headsets 148
Multifunctional Devices 149
Virtual Reality Head-Mounted Displays
and Controllers 149
Drones 149 8
Making IT work for you: COMMUNICATIONS
Headphones 150
AND NETWORKS 186
Robots 152 Introduction 188
Ergonomics 152 Communications 188
Portable Computers 154 Connectivity 188
The Wireless Revolution 189
Careers in IT 154
Communication Systems 189
A Look to the Future: The Internet of Communication Channels 190
Things 155 Wireless Connections 190
Physical Connections 191
Visual Summary 156 Connection Devices 192
Key Terms 160 Modems 192
Multiple Choice 161 Connection Service 193
Matching 162
Open-Ended 162 Making IT work for you:
Discussion 163
The Mobile Office 194
Data Transmission 196
Bandwidth 196
7 Protocols 196
Networks 197
SECONDARY STORAGE 164 Terms 197
Network Types 199
Introduction 166 Local Area Networks 199
Storage 166 Home Networks 199
Solid-State Storage 167 Wireless LAN 200
Solid-State Drives 167 Personal Area Networks 200
Flash Memory Cards 168 Metropolitan Area Networks 200
USB Flash Drives 168 Wide Area Networks 201
Hard Disks 169 Network Architecture 201
Internal Hard Disks 169 Topologies 202
External Hard Disks 169 Strategies 203
Network Drives 169 Organizational Networks 203
Performance Enhancements 170 Internet Technologies 203
Optical Discs 171 Network Security 204
Cloud Storage 172 Careers in IT 205
x CONTENTS
A Look to the Future: Telepresence Lets You Be Management Levels 250
There without Actually Being There 206 Information Flow 251
Computer-Based Information
Systems 252
Visual Summary 207
Key Terms 210 Transaction Processing Systems 253
Multiple Choice 211 Management Information Systems 255
Matching 212 Decision Support Systems 256
Open-Ended 212 Executive Support Systems 257
Discussion 213 Other Information Systems 259
Expert Systems 260
Careers in IT 260
CONTENTS xi
Input Data 320
12 Processing Requirements 321
Program Specifications Document 321
SYSTEMS ANALYSIS Step 2: Program Design 322
AND DESIGN 292 Top-Down Program Design 322
Pseudocode 323
Introduction 294 Flowcharts 323
Systems Analysis and Design 294 Logic Structures 325
Phase 1: Preliminary Investigation 296 Step 3: Program Code 326
Defining the Problem 296 The Good Program 326
Suggesting Alternative Systems 297 Coding 326
Preparing a Short Report 297 Step 4: Program Test 328
Phase 2: Systems Analysis 298 Syntax Errors 328
Gathering Data 298 Logic Errors 328
Analyzing the Data 298 Testing Process 328
Documenting Systems Analysis 300 Step 5: Program Documentation 330
Phase 3: Systems Design 300 Step 6: Program Maintenance 331
Designing Alternative Systems 300 Operations 331
Selecting the Best System 301 Changing Needs 331
Writing the Systems Design Report 301 CASE and OOP 332
Phase 4: Systems Development 302 CASE Tools 332
Acquiring Software 302 Object-Oriented Software
Acquiring Hardware 302 Development 333
Testing the New System 303 Generations of Programming
Phase 5: Systems Implementation 303 Languages 334
Types of Conversion 303 Machine Languages: The First
Training 304 Generation 334
Phase 6: Systems Maintenance 304 Assembly Languages: The Second
Prototyping and Rapid Applications Generation 334
Development 305 High-Level Procedural Languages:
Prototyping 305 The Third Generation 334
Rapid Applications Development 305 Task-Oriented Languages: The Fourth
Careers in IT 306 Generation 335
A Look to the Future: The Challenge of Problem and Constraint Languages:
Keeping Pace 307 The Fifth Generation 336
Careers in IT 337
A Look to the Future:
Visual Summary 308
Your Own Programmable Robot 338
Key Terms 312
Multiple Choice 313
Matching 314 Visual Summary 339
Open-Ended 314 Key Terms 343
Discussion 315 Multiple Choice 344
Matching 345
Open-Ended 345
Discussion 346
13
PROGRAMMING
The Evolution of the Computer
AND LANGUAGES 316
Age 347
Introduction 318
Programs and Programming 318 The Computer Buyer’s Guide 358
What Is a Program? 318
What Is Programming? 318
Step 1: Program Specification 320 Glossary 362
Program Objectives 320
Desired Output 320 Index 383
xii CONTENTS
New to Computing Essentials 2023
To increase student motivation and engagement, a focus on smartphones has been added by increasing content and
providing marginal tips offering practical advice for efficient smartphone use. While the coverage of other topics has not
been reduced, this change offers a gateway to demonstrate the relevance of all types of computers to their lives.
Additionally, every chapter’s Making IT Work for You, Privacy, Ethics, and Community features have been carefully
revaluated, enhanced, and/or replaced. Also, every chapter’s Look to the Future has been revised to show that the
expected breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the following:
Chapter 2: Added coverage of Web 5.0
Expanded coverage of Web 4.0
Reorganized coverage of Web 1.0 to 3.0 to emphasize relationships between web generations
Expanded coverage of netiquette
Expanded coverage of social networks, including TikTok and Instagram
Expanded coverage of podcasts
Added coverage of cryptocurrencies and blockchain
Chapter 3: Added coverage of features, including grammar checkers
Expanded coverage of app stores
Expanded coverage of mobile apps
Reorganized topics to emphasize growing significance of mobile platforms
Expanded coverage of specialized apps to emphasize mobile apps
Added coverage of shopping sites and fake reviews
Added gaming coverage to include free-to-play
Chapter 4: Expanded coverage of virtual assistants
Added coverage of operating system accessibility features
Added coverage of Windows 11
Added coverage of macOS 12 Monterey
Chapter 5: Added coverage of mobile microprocessors
Added coverage of Thunderbolt 3
Expanded coverage of USB
Added coverage of UTF-8 and UTF-16
Chapter 6: Added coverage of assistive devices for people with disabilities
Expanded coverage of virtual keyboards
Expanded coverage of voice recognition systems
Chapter 7: Expanded coverage of SSDs (solid-state drives)
Expanded coverage of USB flash drives
Expanded coverage of cloud drives
Chapter 8: Expanded coverage of satellite communications
Expanded coverage of 5G networks
Chapter 9: Added coverage of social media and role of advertising
Added coverage of limitation of privacy mode browsing
Expanded coverage of ransomeware
Expanded coverage of data backups
Added coverage of data leaks
Expanded coverage of two-factor authentication
xiii
Preface
T
he 20th century brought us the dawn of the digital information
age and unprecedented changes in information technology. In
fact, the rate of change is clearly increasing. As we begin the
21st century, computer literacy is undoubtedly becoming a prerequisite
in whatever career you choose.
The goal of Computing Essentials is to provide you with the basis for
understanding the concepts necessary for success. Computing Essentials
also endeavors to instill an appreciation for the effect of information
technology on people, privacy, ethics, and our environment and to give
you a basis for building the necessary skill set to succeed in the
21st century.
At the beginning of each chapter, we carefully lay out why and how the
chapter’s content is relevant to your life today and critical to your future.
Within each chapter, we present practical tips related to key concepts
through the demonstration of interesting applications that are relevant
to your lives. Topics presented focus first on outputs rather than pro-
cesses. Then, we discuss the concepts and processes.
Motivation and relevance are the keys. This text has several features
specifically designed to engage and demonstrate the relevance of tech-
nology in your lives. These elements are combined with a thorough
coverage of the concepts and sound pedagogical devices.
xiv
Visual Learning
VISUAL CHAPTER OPENERS
First Pages First Pages
the chapter.
Elnur/Shutterstock
25
VISUAL SUMMARIES
First Pages First Pages
To efficiently and effectively use computers, you need to be aware of the most commonly used input and output devices.
These devices are translators for information into and out of the system unit. Input devices translate words, sounds, and
Visual summaries appear at the end VISUAL SUMMARY actions into symbols the system unit can process. Output devices translate symbols from the system unit into words,
Input and Output images, and sounds that people can understand.
use graphics to reinforce key Input is any data or instructions that are used by a com-
puter. Input devices translate words, numbers, sounds,
Pointing devices provide an intuitive interface with the
system unit by accepting physical movements or gestures
Optical Scanners
An optical scanner (scanner) converts documents into
machine-readable form. The four basic types are flatbed,
digital cameras
Digital cameras record images digitally and store them on
a memory card or in the camera’s memory. Most digital
images, and gestures that people understand into a form and converting them into machine-readable input.
meaningful way.
device that uses pressure to draw images on a screen.
signals are sent to, and processed by, the system unit. Handwriting recognition software translates handwritten reader that reads information from a thin magnetic strip Webcams are specialized digital video cameras that cap-
notes into a form that the system unit can process. on the back of a card. Chip cards contain microchips to ture images and send them to a computer for broadcast
Keyboards Multitouch screens accept multiple-finger commands. encrypt data and improve security. over the Internet. Webcams are built into many cell
There are three basic categories of keyboards: virtual, lap- phones and tablets, while others are attached to the com-
top, and traditional. Bar code readers puter monitor.
Mouse
• Virtual keyboard, primarily used with cell phones and Bar code readers or scanners (either handheld wand read-
A mouse controls a pointer that is displayed on the moni-
tablets. Does not have a physical keyboard. Keys dis- ers or platform scanners) read bar codes on products.
tor. The mouse pointer usually appears in the shape of an
There are a variety of different codes, including the UPC
played on screen and selected by touching a key’s arrow. Some mice have a wheel button that rotates to
and MaxiCode.
AUDIO-INPUT DEVICES
image. scroll through information on the monitor. A cordless or
• Laptop keyboards, used on laptop computers. Smaller wireless mouse uses radio waves or infrared light waves. Audio-input devices convert sounds into a form that can
rFId readers be processed by the system unit. By far the most widely
than traditional keyboard with fewer keys. Includes all A touch pad operates by touching or tapping a surface. It
RFID readers read RFID (radio-frequency identification) used audio-input device is the microphone.
the keys found on virtual keyboard plus extra keys, is widely used instead of a mouse with laptops and some
tags. These tags are widely used for tracking lost pets, pro-
such as function and navigation keys. types of mobile devices.
duction, and inventory and for recording prices and prod- Voice recognition Systems
• Traditional keyboards, used on desktop and larger uct descriptions.
computers. Standard keyboard has 101 keys. Toggle Game controllers Voice recognition systems use a microphone, a sound
keys turn features on and off. Combination keys Game controllers provide input to computer games. card, and special software. Siri, Cortana, and Google
character and Mark recognition devices
perform actions when combinations of keys are held Widely used controllers include gaming mice, joysticks, Assistant are digital assistants that use voice recognition.
Character and mark recognition devices are scanners that
down. gamepads, and motion-sensing devices. Specialized portable voice recorders are widely used by
are able to recognize special characters and marks. Three
doctors, lawyers, and others to record dictation. Some sys-
types are magnetic-ink character recognition (MICR),
tems are able to translate dictation from one language to
optical-character recognition (OCR), and optical-mark
another, such as from English to Japanese.
recognition (OMR).
xv
Unique Content
MAKING IT WORK FOR YOU
First Pages
Making IT work for you Special-interest topics are presented in the Making
IT Work for You section found within nearly
CLOUD STORAGE
Do you find that you take a lot of photos and videos on your phone, and your storage space is running low?
every chapter. These topics include Online Enter-
Are you working on a group project and finding it difficult to keep everyone updated with the most recent
version of documents and files? Are you looking for a safe, secure location to store backups and important
files? If so, cloud storage may be the solution you are looking for. Here are some things to consider when
tainment, Gaming, Virtual Assistants, and the
choosing a cloud storage option.
174
Nearly every chapter has a Privacy box located in accept used devices and
privacy
components for recycling, even
if they are broken. Alternatively,
Generally, the
performance
Although
system board found on a desktop is larger than that found on a
enhancements
laptop, and much larger than one found on a tablet, cell phone, or wearable computer.
Four ways these
to improve
systemthe performance
boards vary in size, of hard disks
speed, are disk
power, andcaching,
versatility,hybrid
theydrives,
never-
redundant arrays oftheinexpensive disks,of and file compression/decompression.
the margin adjacent to the coverage of related tech- visit the website of your local
Diminishing
government secondary
prices
to find the storage
have recycling
electronics an unexpected
center
theless all perform
theDisk caching
personal computer.
same function communicating
forms a function similar to cache memory discussed in Chapter 5. While cache mem-
between the components of
improves hard-disk performance by anticipating data needs. It per-
impact
neareston privacy. The ory improves processing by acting as a temporary high-speed holding area between
nologies. Topics include protecting personal infor-
you.
availability of cheap digital memory and the CPU, disk caching improves processing by acting as a temporary
storage has resulted in a concept check
high-speed holding area between a secondary storage device and memory. Disk cach-
permanent digital record of our
ing requires a combination of hardware and software. During idle processing time,
mation when using a free Wi-Fi network or when lives available for all to see on
the Internet. Once an image,
frequentlyWhat is the system board, and what does it do?
disk cache.
Define
used data is automatically identified and read from the hard disk into the
When needed,sockets,
and describe the data is then
slots, accessed
and bus lines. directly from memory. The trans-
video, or message is released
disposing of an outdated computer. on the Internet, it is very fer rate from memory is much faster than from the hard disk. As a result, overall sys-
What are chips? How are chips attached to the system board?
difficult to remove. Some argue tem performance is often increased by as much as 30 percent.
that we all have a “right to be Hybrid drives are storage drives that contain both solid-state storage and hard disks
forgotten” and that major in an attempt to gain the speed and power benefits of SSDs while still having First
thePages
low
Internet companies like
Instagram and Google should
Microprocessor
cost and large capacity of hard drives. Typically, these systems use SSD to store the
operating system and applications and hard disks to store videos, music, and
help people permanently documents.
remove records of In most personal computer systems, the central processing unit (CPU) or processor is
Redundant arrays of inexpensive disks (RAID) improve performance by expanding
embarrassing or unpleasant contained on a single chip called the microprocessor. The microprocessor is the
external storage, improving access speed, and providing reliable storage. Several inex-
moments. Others say that the
•“brains”
pensive
of the computer
Data hard-disk
transmission drives
system. It has
specifications.
are connected
two basic
These
to one
components:
areanother.
rules and the control
procedures
These that unit
connections
and the
coordinate
can be by a
ethics
Internet is a record of our past arithmetic-logic
the sending
network or within
unit.
and receiving devices
specialized RAID by precisely
devices. (See defining
Figure how7-8.) the
Themessage
connected will hard-
be
Nearly every chapter has an Ethics box located in
and we can’t choose to only
hold on to the positive things. • sent
diskControlacross
drives arethe
unit: Thecommunication
related control unit tells
or grouped channel.
the restand
together, of the
thecomputer
computersystemsystemhow to carry
interacts with
As eavesdropping
What do you think?tools become the out
RAID a program’s
system asinstructions.
• Communication though it This
channel. wereItisdirects
a the
single the movement
connectingof
large-capacity
actual orelectronic
hard-disk signals
drive.
transmission The between
result is
medium
more sophisticated, there is memory,
expanded
that carrieswhich
storage temporarily
the capability,
message. Thisholds
fast access
medium data, instructions,
speed,
can and
be highand
a physical processed
reliability.
wire For information,
or cable, these
or itreasons,
can be
the margin adjacent to the coverage of related tech- concern that law enforcement
and government agencies will
RAIDandisthe
wireless. arithmetic-logic
often
and compression
File
used by Internet
input and output and file
unit.servers
devices.
It also and directs these
large control signals between the CPU
organizations.
decompression increase storage capacity by reducing the
monitor everyone’s Internet For example, if you wanted to send an e-mail to a friend, you could create and send
amount of space required
• Arithmetic-logic unit:cellto store data and programs.
arithmetic-logic File compression is not performs
limited to
The the sendingunit, usually
Your called theisALU,
nologies. Topics include altering images to promote and cell phone activity. In the
private sector, companies are
the message using your
hard-disk
two types
located
drives
systems.
insideofyour
It is
operations:
as well. File
cell phone.
compression
phone,
frequently
arithmetic used
It functions
also
to
and logical.
helps to
device.
compress
as the connection
modem
files on operations
Arithmetic DVDs, CDs,
on a microchip
device, that would
speed up transmission of and
areand
the flash
modify
files division.
from one
increasingly using network andfundamental math
format the message operations: addition,
so that it could travelsubtraction, multiplication,
efficiently across communication channels,
computer
Logical system to another.
operations consist Sending
of and receiving
comparisons such ascompressed
whether onefiles
itemacross
is the to
equal Inter-
a particular message and how the technology we
tools and software to monitor such as cell phone towers. The specifics describing how the message is modified, refor-
net(=),
is a common activity.
the activity of their employees.
matted,less andthan
sent(<),
would or greater than (>)
be described the data
in the other.transmission specifications. After your
Many websites also track File compression programs scan files for ways to reduce the amount of required
message traveled across the channel, a connection device, such as a modem connected
your activity, and government storage. One way chipsis to search for repeating patterns. The repeating patterns are
use affects labor practices around the world. officials have often requested
these records during the
microprocessor
to a desktop computer,
the receiving
Microprocessors are an
would reformat it so that it could be displayed on your friend’s
replaced with a token, leaving enough tokens so that the original can be rebuilt or
computer, device.
important (Note:part This
of
decompressed. These programs often shrink files to a quarter
example
any presents
computing the and
device basic communication
of theirare tailored
original to the
size.
course of an investigation. system
needs ofelements
the and involved
device it serves. in sending
There aree-mail.
two It does
major not and isofnot
categories intended to demon-
microprocessors devel-
Windows Mac operating systems provide compression and decompression util-
strate
oped Forall themobile
today: specificandsteps and equipment
desktop. Mobile involved in
processors an e-mail delivery system.)
Some believe that it is unethical ities. more advanced compression schemes, youarecanused
use in cell phones
specialized and tablets
utilities such
for government and businesses
as WinZip. For a summary of performance enhancement techniques, see Figure 7-9.
to engage in such monitoring
and tracking. Do you agree?
116 chApTer 5 concept check
Define computer communications and connectivity.
xvi
technique description
What is the wireless revolution?
Disk caching Uses cache and anticipates data needs
Describe the four elements of every communication system.
ole36781_ch05_108-133.indd 116 Hybrid drives Uses both SSD and hard disks
11/15/21 04:38 PM
1. Compare primary storage and secondary storage, and discuss the most important
integrated with the chapter’s Making IT Work for You top- characteristics of secondary storage.
2. Discuss solid-state storage, including solid-state drives, flash memory, and USB drives.
3. Discuss hard disks, including density, platters, tracks, sectors, cylinders, internal,
ics. The questions facilitate in-class discussion or written external, and performance enhancements.
4. Discuss optical discs, including pits, lands, CDs, DVDs, Blu-ray, and hi-def.
PRIVACY
Have you ever found yourself e-mailing files back and forth between two of your computers or with others
as a way to transport them? Review the Making IT Work for You: Cloud Storage on pages 174 and 175. Then
respond to the following: (a) Have you ever used Dropbox or a similar service? If so, what service have you
used, and what do you typically use it for? If you have not used Dropbox or a similar service, describe how
and why you might use one. (b) If you do not have a Dropbox account, set up a free one and create a Drop-
box folder. Use Dropbox to either (1) access a file from another computer or (2) share a file with one of your
classmates. Describe your experience. (c) Try a few of Dropbox’s features, and describe your experience
with these features. (d) Do you see yourself using Dropbox on an everyday basis? Why or why not?
in-class discussion or written assignments focusing on video of you on the Internet that you would prefer not be publicly available? Have you said or done things
that, if recorded and posted on social media, could have a negative impact on a job interview? (b) Do you
have the right to decide what photos of you are posted on the Internet by others? Why or why not? (c) Does
critical privacy issues. They are designed to develop a someone else have the right to tell you what to do with the photos you take, even if they are in the photo?
Why or why not? (d) Should Facebook remove photos, videos, or messages if someone is embarrassed by
them? Should Facebook have the right to remove your photos, videos, or messages if someone is embar-
effectively.
184 chApter 7
First Pages
ETHICS
ole36781_ch07_164-185.indd 184 11/15/21 03:30 PM
DISCUSSION
Respond to each of the following questions.
Ethics discussion questions are carefully integrated with
1 Making IT Work for You the chapter’s marginal Ethics boxes. The questions facili-
Making it a habit of keeping current with technology applications can be a key to your success. Numerous
full-page spreads identified as Making IT Work for You are presented in the following chapters. These
sections address some of today’s most interesting and useful applications. They include online entertain- tate in-class discussion or written assignments focusing on
ment in Chapter 2, online office suites in Chapter 3, and cloud storage in Chapter 7. Select one that you
find the most interesting and then respond to the following: (a) Why did you select this application? (b)
Have you used this application? If so, when and how? If not, do you plan to in the near future? (c) Go to the ethical issues relating to technology. They are designed to
chapter containing your selected application, and locate the application’s Making IT Work for You cover-
age. Review and briefly describe its contents. (d) Did you find the coverage useful? Why or why not?
develop a student’s ability to think critically and communi-
2 Privacy
Privacy is one of the most critical issues facing society today. Numerous Privacy boxes appear in the margins cate effectively.
of the upcoming chapters presenting a variety of privacy issues. These issues include apps that constantly
track your movements without your knowledge or consent in Chapter 3; public Wi-Fi connections that record
all of your personal communications in Chapter 8; and protection of personal privacy while using social
media in Chapter 9. Select one that you find the most interesting, and then respond to the following: (a) Why
did you select this issue? (b) Do you have knowledge of or experience with the issue? If so, describe your
knowledge or experience. If not, do you consider the issue to be important for protecting your privacy? (c)
Go to the chapter containing your selected issue, locate the Privacy box, read it, and describe its contents.
(d) Did you find the coverage thought-provoking? Why or why not?
3 Ethics
Computer ethics are guidelines for the morally acceptable use of computers in our society. Numerous Ethics
COMMUNITY
boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These issues
include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized monitoring
or eavesdropping of Internet activity in Chapter 8. Select one issue that you find the most interesting and
then respond to the following: (a) Why did you select this issue? (b) Do you have knowledge of or experience
xvii
Reinforcing Key Concepts
First Pages
CONCEPT CHECKS
People
Following the Visual Summary, the chapter review includes figure 1-3 making IT Work for You applications
b. ISP c. TikTok
7. Transmission of electronic messages over the Internet.
6 the
includes a key terms list that reiterates terms
chApTer 1 presented in
8. Two popular instant messaging services are WhatsApp and Facebook __________.
a. Social c. Messenger
b. Meet d. ISP
the chapter, multiple-choice questions to help test your 9. A business-oriented social networking site.
a. TikTok c. LinkedIn
understanding of information presented in the chapter, 10.
b. Instagram d. Facebook
Electronic commerce involving individuals selling to individuals.
52 ChApTEr 2
xviii
oLe36781_ch02_024-055.indd 52 10/28/21 08:06 PM
The Future of Information Technology
CAREERS IN IT
First Pages
devices like tablets, cell phones, and wearable devices have led many experts
to predict that wireless applications are just the beginning of the wireless
revolution, a revolution that will dramatically affect the way we communicate
and use computer technology.
• The Internet of Things (IoT) is the continuing development of the Internet that
allows everyday objects embedded with electronic devices to send and receive data
over the Internet. It promises to connect all types of devices, from computers to
cell phones, to watches, to any number of everyday devices.
Wireless communication, cloud computing, and IoT are driving the mobile Inter-
net. They promise to continue to dramatically affect the entire computer industry and
how you and I will interact with computers and other devices. Each will be discussed
in detail in the following chapters. For just a few of these mobile devices, see
Figure 1-17.
Some of the fastest-growing career opportunities are in
concept check
information technology. Each chapter highlights one of the
Define data. List four common types of files.
career
Web developer
description
Each chapter concludes with a brief discussion of a essential skill. These issues
are presented in Chapter 2,
The Internet, the Web, and
Electronic Commerce.
well as extensively covered
in Chapter 9.
Organizations
chapter material, reinforcing the importance of stay- sive amounts of data, create dynamic multimedia web pages,
and much more. Today’s employers are expecting the people
they hire to be able to effectively and efficiently use a variety
of different types of software. General-purpose, specialized,
and maintain these systems, you need to understand the basic
concepts of information systems and know how to safely, effi-
ciently, and effectively use computers. These concepts are
covered throughout this book.
ing informed.
and mobile applications are presented in Chapter 3. System
software is presented in Chapter 4. changing Times
Are the times changing any faster now than they ever have?
powerful hardware Almost everyone thinks so. Whatever the answer, it is clear
Personal computers are now much more powerful than they we live in a fast-paced age. The Evolution of the Computer
used to be. Cell phones, tablets, and communication tech- Age section presented at the end of this book tracks the
nologies such as wireless networks are dramatically chang- major developments since computers were first introduced.
ing the ways to connect to other computers, networks, and After reading this book, you will be in a very favorable posi-
the Internet. However, despite the rapid change of specific tion compared with many other people in industry today. You
equipment, their essential features remain unchanged. To will learn not only the basics of hardware, software, connectiv-
become an efficient and effective end user, you should focus ity, the Internet, and the web, but also the most current tech-
on these features. Chapters 5 through 8 explain what you nology. You will be able to use these tools to your advantage.
16
xix
Instructors: Student Success Starts with You
Tools to enhance your unique voice
Want to build your own course? No problem. Prefer to use an
OLC-aligned, prebuilt course? Easy. Want to make changes throughout
65%
Less Time
the semester? Sure. And you’ll save time with Connect’s auto-grading too.
Grading
The testbank contains over 2,200 questions categorized by level of learning (definition,
concept, and application). This is the same learning scheme that is introduced in the
text to provide a valuable testing and reinforcement tool. Text page references have
been provided for all questions, including a level-of-difficulty rating.
xxii
SIMNET ONLINE TRAINING AND ASSESSMENT
FOR OFFICE APPLICATIONS
SIMnet™ Online provides a way for you to test students’ software skills in a simu-
lated environment. SIMnet provides flexibility for you in your applications course
by offering:
• Pretesting options
• Posttesting options
• Course placement testing
• Diagnostic capabilities to reinforce skills
• Web delivery of tests
• Learning verification reports
For more information on skills assessment software, please contact your local sales
representative, or visit us at www.simnetkeepitsimple.com.
xxiii
Acknowledgments
A special thank-you goes to the professors who took time out of their busy schedules
to provide us with the feedback necessary to develop the 2023 edition of this text. The
following professors offered valuable suggestions on revising the text:
Alysyn Harvey-Green Kimberly Hopkins
Metropolitan State University of Denver Tarrant County College
Ashley Harrier Mark Niswander
Hillsborough Community College Indiana University
Becky McAfee Michael Mick
Hillsborough Community College Purdue University
Brenda Nielsen Nizar Alsaid
Mesa Community College Tarrant County College
Cheri Leeth Patricia Roberts
Tarrant County College Mesa Community College
Christine Held Rodney Koch
Mesa Community College State University of NY Cortland
Connie Grimes William Wigton
Morehead State University Tarrant County College
Dorothy Harman
Tarrant County College
xxiv
About the Authors
The O’Learys live in the American Southwest and spend
much of their time engaging instructors and students in
conversation about learning. In fact, they have been talking
about learning for over 30 years. Something in those early
conversations convinced them to write a book, to bring
their interest in the learning process to the printed page.
Tim, Linda, and Dan have talked to and taught numerous students, all of
them with a desire to learn something about computers and applications that
make their lives easier, more interesting, and more productive.
Each new edition of an O’Leary text, supplement, or learning aid has bene-
fited from these students and their instructors who daily stand in front of
them (or over their shoulders).
xxv
Computing Essentials
Making IT work for you
INTRODUCTORY 2023
chapter 1 Information Technology,
the Internet, and You
Sergey Nivens/Shutterstock
Why should I read this chapter?
The future of computers and digital technology prom-
ises exciting challenges and opportunities. Powerful
software and hardware systems are changing the way
people and organizations interact in their daily life and
on the Internet.
This chapter introduces you to the skills and con-
cepts you need to be prepared for this ever-changing
digital world, including:
• Information systems—how the critical parts of tech-
nology interact.
HQuality/Shutterstock • Efficiency and effectiveness—how to maximize
the use of technology.
• Privacy, ethics, and environment—how to integrate technology with people.
• Software, hardware, and data—understand the technology used in information systems.
• Connectivity and cloud computing—how the Internet, the web, and the wireless revolution are changing
how we communicate and interact.
Learning Objectives
After you have read this chapter, you should be able to:
1 Explain the parts of an information system: people, procedures, software, hardware, data, and
the Internet.
2 Distinguish between system software and application software.
3 Differentiate between the three kinds of system software programs.
4 Define and compare general-purpose, specialized, and mobile applications.
5 Identify the four types of computers and the five types of personal computers.
6 Describe the different types of computer hardware, including the system unit, input, output, s torage,
and communication devices.
7 Define data and describe document, worksheet, database, and presentation files.
8 Explain computer connectivity, the wireless revolution, the Internet, cloud computing, and loT.
3
Introduction
“ Welcome to Computing Essentials. I’m Katie, and this is Alan, we
work in information technology. On the following pages, we’ll be
The purpose of this book is to help you become a highly
efficient and effective computer user. This includes how
discussing some of the most exciting new developments in
to use (1) apps and application software; (2) all types of
computer technology, including smartphones, tablets, and cloud
computing. Let me begin this chapter by giving you an overview of computer hardware, including mobile devices like
smartphones, tablets, and laptops; and (3) the Internet.
the book and showing you some of its special features.
” Becoming a highly efficient and effective computer user
also requires a full understanding of the potential
impact of technology on privacy and the environment as
well as the role of personal and organizational ethics.
To effectively and efficiently use computers, you
need to know the parts of an information system: peo-
ple, procedures, software, hardware, data, and the
Internet. You also need to understand the wireless rev-
olution, the mobile Internet, and the web and to recog-
nize the role of information technology in your personal
Moyo Studio/Getty Images and professional life.
Information Systems
When you think of a personal computer, perhaps you think of just the equipment
itself. That is, you think of the screen or the keyboard. Yet there is more to it than that.
The way to think about a personal computer is as part of an information system. An
information system has several parts: people, procedures, software, hardware, data, and
the Internet. (See Figure 1-1.)
• People: It is easy to overlook people as one of the parts of an information system.
Yet this is what personal computers are all about—making people, end users like
you, more productive.
• Procedures: The rules or guidelines for people to follow when using software,
hardware, and data are procedures. These procedures are typically documented in
manuals written by computer specialists. Software and hardware manufacturers
provide manuals with their products. These manuals are provided in either
printed or electronic form.
• Software: A program consists of the step-by-step instructions that tell the computer
how to do its work. Software is another name for a program or programs. The pur-
pose of software is to convert data (unprocessed facts) into information (processed
facts). For example, a payroll program would instruct the computer to take the
number of hours you worked in a week (data) and multiply it by your pay rate
(data) to determine how much you are paid for the week (information).
• Hardware: The equipment that processes the data to create information is called
hardware. It includes smartphones, tablets, keyboards, mice, displays, system
units, and other devices. Hardware is controlled by software.
• Data: The raw, unprocessed facts, including text, numbers, images, and sounds,
are called data. Processed data yields information. Using the previous example of
a payroll program, the data (number of hours worked and pay rate) is processed
(multiplied) to yield information (weekly pay).
• Internet: Almost all information systems provide a way to connect to other people
and computers, typically using the Internet. This connectivity greatly expands the
capability and usefulness of information systems.
4 chapter 1
People
are end users who use computers
to make themselves more productive.
Software
provides step-by-step instructions
for computer hardware.
Procedures
specify rules or guidelines
for computer operations.
Hardware
includes keyboard, mouse,
display, system unit, tablets,
smartphones, and other devices.
Data
consists of unprocessed facts, including text,
numbers, images, and sounds.
Internet
allows computers to connect
to people and other
computers.
What is a program?
People
People are surely the most important part of any information system. Our lives are touched
Community every day by computers and information systems. Many times the contact is direct and
obvious, such as when we
Every major technology has create documents using a
affected communities—but none word processing program
in the unique ways that or when we connect to the
computers have. We have Internet. (See Figure 1-2.)
changed how we interact with Other times, the contact is
our communities, both in the not as obvious.
tools we use to communicate, Throughout this book
such as social media posts, and you will find a variety of
in the ways we communicate, in
features designed to help
emojis and podcasts. But
you become an efficient
technology has had a deeper
impact on our communities than
and effective end user.
just the way we interact. It has These features include
forever changed how we find Making IT Work for You,
and identify our communities. Tips, Privacy, Commu-
Every day, people meet, discuss, nity, Ethics, and Careers Figure 1-2 People and computers
and bond with others they have in IT. fizkes/Shutterstock
never met in person. The entire
world feels a little smaller, with • Making IT Work for You. Throughout this book you will find Making IT Work for
our communities extending You features that present numerous interesting and practical IT applications. For
around the globe. just a few of the Making IT Work for You topics, see Figure 1-3.
• Tips. We all can benefit from a few tips or suggestions. Throughout this book you
will find numerous tips to make your computing safer, more efficient, and more
effective. These tips range from the basics of keeping your computer system
Application Description
Free Antivirus Program Protect your computer by installing and using a free antivirus
program. See page 9.
Cloud Office Suites Create and collaborate with others online to make better
documents and presentations. See page 74.
Gaming Delve into the world of video games and find the best video game
hardware for you. See page 113.
Cloud Storage Move your files online to synch files between devices or free up
space on your digital devices. See page 174.
The Mobile Office Get work done on the road; whether a business trip or your daily
commute, these tools will help you make the most of your time.
See page 194.
6 chapter 1
tips
running smoothly to how to protect your
Are you getting the most out of your cell phone? Here are
privacy while surfing the web. For a
just a few of the tips to make your computing safer, more
partial list of the tips presented in the
efficient, and more effective.
following chapters, see Figure 1-4.
1 Low battery. Do you find that your cell phone’s battery keeps its charge
• Privacy. One of the most critical issues for less time than it used to? Here are some ways to make your battery
today is how to protect the privacy of our last longer. See page 122.
personal information. Throughout this
2 Cell phone cameras. Capturing life’s moments in a photo is easier and
book you will find Privacy boxes in the
faster with a cell phone. But a few simple tips can make the process
margin that present information about easier and your photos better. See page 71.
protecting our privacy.
3 Disaster planning. Having a cell phone lost or stolen can be devastating.
• Community. Computers are changing the
Follow these suggestions to make it easier to get your phone back, or
way we define and interact with our com- recover its data quickly. See page 228.
munities. In this chapter and the following
ones, you will find Community boxes in 4 Data usage. Is your cell phone data plan costing you money? Are your cell
the margins that present ways in which phone apps using up your data plan without you knowing it? Take control
of your data usage with the tips on page 172.
technology affects how we create and
engage with our communities. 5 Protecting your identity. Identity theft is a growing problem and can be
• Ethics. Most people agree that we should financially devastating if you are a victim. Some steps to protect your
identity are on page 223.
behave ethically. That is, we should follow a
system of moral principles that direct our
everyday lives. However, for any given cir- Figure 1-4 Selected tips
cumstance, people often do not agree on
the ethics of the situation. Throughout this
book you will find numerous Ethics boxes posing a variety of different ethical/
unethical situations for your consideration.
• Careers in IT. One of the most important decisions of your life is to decide upon
your life’s work or career. Perhaps you are planning to be a writer, an artist, or an
engineer. Or you might become a professional in information technology (IT).
Each of the following chapters highlights a specific career in information technol-
ogy. This feature provides job descriptions, projected employment demands, edu-
cational requirements, current salary ranges, and advancement opportunities.
concept check
Which part of an information system is the most important?
Describe the Making IT Work for You, Tips, and Privacy features.
Software
Software, as we mentioned, is another name for programs. Programs are the instruc-
tions that tell the computer how to process data into the form you want. In most cases,
the words software and programs are interchangeable. There are two major kinds of
software: system software and application software. You can think of application soft-
ware as the kind you use. Think of system software as the kind the computer uses.
System Software
The user interacts primarily with application software. System software enables the
application software to interact with the computer hardware. System software is
“background” software that helps the computer manage its own internal resources.
Application Software
Application software might be described as end-user software. Three types of applica-
tion software are general-purpose, specialized, and apps.
General-purpose applications are widely used in nearly all career areas. They are
the kinds of programs you have to know to be considered an efficient and effective
end user. Some of the best known are presented in Figure 1-7.
Specialized applications include thousands of other programs that are more nar-
rowly focused on specific disciplines and occupations. Two of the best known are
graphics and web authoring programs.
Mobile apps, also known as mobile applications or simply apps, are small pro-
grams primarily designed for mobile devices such as smartphones and for tablets.
There are over 5 million apps. The most popular mobile apps are for social network-
ing, playing games, and downloading music and videos.
Type Description
8 chapter 1
Making IT work for you
Getting Started First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to
completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free
antivirus program:
• Visit http://free.avg.com and click the Download button. You will be asked to click “save” to save the installation
file to your computer.
• Select Install Basic to install the antivirus software. Once the program is installed, it will open automatically.
Using AVG Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.
AVG Technologies
9
concept check
Describe the two major kinds of software.
Hardware
Computers are electronic devices that can follow instructions to accept input, process
that input, and produce information. This book focuses principally on personal com-
puters. However, it is almost certain that you will come in contact, at least indirectly,
with other types of computers.
Types of Computers
There are four types of computers: supercomputers, mainframe computers, midrange
computers, and personal computers.
• Supercomputers are the most powerful type of computer. These machines are spe-
cial, high-capacity computers used by very large organizations. Supercomputers
are typically used to process massive amounts of data. For example, they are used
to analyze and predict worldwide weather patterns. IBM’s Blue Gene supercom-
puter is one of the fastest computers in the world. (See Figure 1-8.)
• Mainframe computers occupy specially wired, air-conditioned rooms. Although
not nearly as powerful as supercomputers, mainframe computers are capable of
great processing speeds and data storage. For example, insurance companies use
mainframes to process information about millions of policyholders.
• Midrange computers, also referred to as servers, are computers with processing
capabilities less powerful than a mainframe computer yet more powerful than a
personal computer. Originally used by medium-size companies or departments of
large companies to support their processing needs, today midrange computers are
most widely used to support or serve end users for such specific needs as retriev-
ing data from a database or supplying access to application software.
10 chapter 1
Figure 1-9 Desktop Figure 1-10 Laptop
Scanrail1/Shutterstock mama_mia/Shutterstock
• Personal computers, also known as PCs, are the least powerful, yet the most
widely used and fastest-growing type of computer. There are five types of personal
computers: desktops, laptops, tablets, smartphones, and wearables. Desktop computers
are small enough to fit on top of or alongside a desk yet are too big to carry around.
(See Figure 1-9.) Laptop computers, also known as n otebook computers, are por-
table and lightweight and fit into most briefcases. (See Figure 1-10.) Tablets, also
known as tablet computers, are smaller, lighter, and generally less powerful than
laptops. Like a laptop, tablets have a flat screen but typically do not have a stan-
dard keyboard. (See Figure 1-11.) Instead, tablets typically use a virtual keyboard
Figure 1-11 Tablet
that appears on the screen and is touch-sensitive. Prime Stock Photo/Alamy StockPhoto
Smartphones are the most widely used personal computer. Smartphones are cell
phones with wireless connections to the Internet and processing capabilities. (See
Figure 1-12.) Other mobile computers include wearable devices like Apple’s Watch.
(See Figure 1-13.)
Cell Phones
Many people are not aware that their cell phone is a computer, and this computer has
many of the same components as desktops, laptops, and tablets. At one time, cell phones
had very limited power and were used almost exclusively for making telephone calls.
Now, almost all cell phones are powerful smartphones capable of connecting to the
Internet and running any number of apps. In fact, nearly every cell phone purchased
today is more powerful than the computers used to land the first person on the moon.
Today, over 99 percent of Americans under the age of 30 own a cell phone, and
over 96 percent of those cell phones are smartphones. As a result, the two terms are Figure 1-12 Smartphone
becoming interchangeable. Reflecting this trend, we will use the terms cell phone and Urbanscape/Shutterstock
smartphone interchangeably.
Microprocessor
for data, instructions, and information. One type, random-access memory (RAM),
holds the program and data that are currently being processed. This type of mem-
ory is sometimes referred to as temporary storage because its contents will typically
be lost if the electric power to the computer is disrupted.
• Input/output: Input devices translate data and programs that humans can under-
stand into a form that the computer can process. The most common input devices
are the keyboard and the mouse. Output devices translate the processed informa-
tion from the computer into a form that humans can understand. The most com-
mon output device is the display, also known as a monitor.
• Secondary storage: Unlike memory, secondary storage holds data and programs
even after electric power to the computer system has been turned off. The most
important kinds of secondary media are hard disks, solid-state storage, and optical discs.
Hard disks are typically used to store programs and very large data files. Using
rigid metallic platters and read/write heads that move across the platters, data and
information are stored using magnetic charges on the disk’s surface. In contrast,
solid-state storage does not have any moving parts, is more reliable, and requires
less power. It saves data and information electronically similar to RAM except that
it is not volatile. (See Figure 1-15.) Optical discs use laser technology to store
data and programs. Three types of optical discs are compact discs (CDs), digital
versatile (or video) discs (DVDs), and Blu-ray discs (BD).
• Communication: At one time, it was uncommon for a personal computer system to
communicate with other computer systems. Now, using communication devices, a
personal computer routinely communicates with other computer systems located as
near as the next office or as far away as halfway around the world, using the Inter-
Figure 1-15 Solid-state storage net. A modem is a widely used communication device that modifies audio, video,
Stas Knop/Shutterstock and other types of data into a form that can be transmitted across the Internet.
12 chapter 1
concept check
What are the four types of computers?
Data
Data is raw, unprocessed facts, including text, numbers, images, and sounds. As we
mentioned earlier, processed data becomes information. When stored electronically in
files, data can be used directly as input for the system unit.
Four common types of files (see Figure 1-16) are
• Document files, created by word processors to save documents such as memos,
term papers, and letters.
Presentation
Database
Worksheet
Document
Figure 1-16 Four types of files: document, worksheet, database, and presentation
Presentation: Microsoft Corporation; Zoom Pet Photography/Image Source/Getty Images; Database: Microsoft Corporation;
Worksheet: Microsoft Corporation; Sam Edwards/age fotostock; Document: Stockbyte/Getty Images; Maciej Czekajewski/Shutterstock
Silloin Kustaa palasi arkkipiispan luo ja kertoi mitä hän oli saanut
kuulla; veri hänen suonissaan jähmettyi kauhusta, mutta mitä hän
saattoi tehdä?
Renki joka oli ollut hänen kanssaan, oli tietysti matkalla tullut
ajatelleeksi kaikkia niitä vaaroja jotka vaanivat hänen herraansa.
Kuninkaan lähetit ottavat varmaan kiinni myöskin kaikki ritarin
seuralaiset ja miehellä oli vaimo ja lapset, eikä hän tahtonut kuolla,
ja niin hän päätti ensi tilassa karata. Paras tilaisuus siihen ilmaantui
tietysti lautalla. Se ei voinut kannattaa kuin yhden hevosen ja yhden
miehen ja juuri kun Kustaa oli keskellä salmea, kääntyi renki äkkiä ja
läksi täyttä laukkaa ajamaan tiehensä.
Isäntä osoitti hänelle tallin, jonne sai panna hevosen; hän irroitti
selästään laukun ja otti sen mukaansa isoon huoneeseen, jossa suuri
takkavalkea hulmusi, heitellen säkeniä pitkin huonetta.
He olivat nuorta väkeä; vaimo oli tukevaa tekoa: suuret kädet ja
jalat, sekä kasvoissa ankara, miltei tyly ilme, kun hän oli vaiti.
— Oletteko kaukaakin?
— Pitäkää hyvänänne!
— Siltä se vaan näyttää, sanoi hän. — Herra sen kai tietänee, sillä
herran se kai on.
— En ymmärrä… lausui Kustaa hämmästyneenä.
— Ei ole valittamista.
— Keneltä?
— Tuon isältä; kas, hän oli rikas ja minä olin vain köyhä renki.
— Olli sinä!
— Eihän meidän naimiskaupoistamme olisi voinut olla
puhettakaan, mutta sitte hän sai periä tämän saman talon, jossa me
nyt olemme. Ja silloin tämä Maija kosi ja kun me isälle olimme
luvanneet ettemme milloinkaan lainaisi äyriäkään, niin hän vihdoin
suostui ja sitte me saimme toisemme. Tietysti tuon eukon joskus on
ikävä, mutta enhän minä kauvan viivy poissa kotoa.
— Kyllä hyvinkin.
— Kustaa Eerikinpoika!
Kustaa kiitti Jumalaa, että hän kerrankin oli tavannut miehen jolla
oli sydän, ja pani ilomielin levolle.
Barbro pysyi tyynenä ja myönsi mitä oli tehnyt; kun mies sitte
vihansa vimmassa kysyi, mitä se häneen oli kuulunut, niin hän
vastasi:
Suuri vaara oli siis tarjolla, mutta samassa kirkaisi tyttö joka seisoi
lieden ääressä:
— Voin kai.
Jos tappaakin yhden voudin, niin toinen tulee sijaan eikä siitä
kukaan hyödy.
— Totta kai.
Seuraavana päivänä tuli hän Svärdsjön kirkolle, mutta nyt oli hän
käynyt niin varovaiseksi, että hän tahtoi saada selville, saattoiko Jon
herraan luottaa, ennenkuin hän uskoi hänelle salaisuutensa.
Sentähden hän ensin meni latoon, jossa rengit olivat puimassa, ja
tarjoutui auttamaan heitä.
Mutta pian näytti vaara taas olevan tarjolla, sillä Brun Pentinpojan
lähetit tulivat pappilaan kysymään vankia.
Mutta samassa huomasi hän verta tiellä. Silloin hän kiireesti veti
esiin veitsensä ja leikkasi huomaamatta haavan hevosen jalkaan.
Tanskalaisten epäluulo, joka jo olikin herännyt, saatiin siten
poistetuksi.
Kansanlaulussa sanotaan:
Paras ja ainoa suositus oli hänelle se, että hän oli taistellut Sten
herran rinnalla ja Brännkyrkan luona voitollisesti kantanut
valtakunnan lippua. Mutta eihän siinä ollut tarpeeksi.
Ja he läksivät matkoihinsa.