A Guide To Programming in Java Java 2 Platform Standard Edition 5 Beth Brown download
A Guide To Programming in Java Java 2 Platform Standard Edition 5 Beth Brown download
https://ebookgate.com/product/a-guide-to-programming-in-java-
java-2-platform-standard-edition-5-beth-brown/
https://ebookgate.com/product/java-2-micro-edition-java-in-small-
things-james-white/
ebookgate.com
https://ebookgate.com/product/programming-in-java-2nd-edition-edition-
choudhary/
ebookgate.com
https://ebookgate.com/product/java-2-a-beginner-s-guide-2nd-edition-
steven-holzner/
ebookgate.com
https://ebookgate.com/product/java-programming-8th-edition-joyce-
farrell/
ebookgate.com
Java Programming 6th Edition Joyce Farrell
https://ebookgate.com/product/java-programming-6th-edition-joyce-
farrell/
ebookgate.com
https://ebookgate.com/product/functional-programming-in-java-
harnessing-the-power-of-java-8-lambda-expressions-1st-edition-venkat-
subramaniam/
ebookgate.com
https://ebookgate.com/product/component-development-for-the-java-
platform-1st-edition-stuart-dabbs-halloway/
ebookgate.com
https://ebookgate.com/product/pentaho-reporting-3-5-for-java-
developers-gorman/
ebookgate.com
JAVA
™
A GUIDE TO
PROGRAMMING IN
Java™ 2 Platform Standard Edition 5
Beth Brown
A Guide to Programming
in Java™
Java™ 2 Platform Standard Edition 5
Beth Brown
Copyright 2005
by
First Edition
16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
The text is written and published by Lawrenceville Press, Inc. and is in no way
connected with the Sun® Corporation.
Sun®, Sun® Microsystems, and Java™ are trademarks or registered trademarks of
Sun Microsystems, Inc. in the United States and other countries.
Microsoft® Microsoft® Windows®, Visual Basic®, and Microsoft® Calculator are
either registered trademarks or trademarks of Microsoft Corporation in the United
States and/or other countries. Screen Shots and Icons reprinted with permission
from Microsoft® Corporation.
Mac OS® and Tiger™ are registered trademarks of Apple Computer, Inc. in the
United States and other countries.
ExamView is a registered trademark of FSCreations, Inc.
“JUNE BUGS” poem by Avis Harley used with permission from Boyds Mills Press.
Names of all other products mentioned herein are used for identification purposes
only and may be trademarks of their respective owners.
Preface
Preface iii
Design and Features
Programming Concepts This text emphasizes the fundamental concepts
of programming so that this knowledge can be applied to other program-
ming languages.
Problem Solving From the very beginning, students are taught to imple-
ment programming solutions with proper algorithm design and code
conventions.
Programming Style Throughout the text, proper programming style
is emphasized so that students can make their applications easy to read,
modify, and debug.
Demonstration Applications and Runs Many demonstration applica-
tions are included, complete with sample runs, so that students are shown
both proper programming techniques and the output actually produced
by an application.
Reviews Numerous reviews are presented throughout each chapter to
provide immediate reinforcement of newly learned concepts. Solutions to
the reviews are included on the Teacher Resource Materials CD.
Case Studies Most chapters end by stating a problem, developing an
appropriate algorithm, and then implementing the solution. The process
of specification, design, implementation, and debugging and testing is
clearly outlined.
Chapter Summaries Each chapter ends by summarizing the concepts
and statements covered in the chapter.
Vocabulary Sections Each chapter contains a vocabulary section that
defines new terms. A separate section lists Java keywords, statements,
and classes.
Critical Thinking Written response questions that require critical think-
ing from the student are included at the end of each chapter.
Exercises Each chapter includes a large set of exercises of varying diffi-
culty, making them appropriate for students with a range of abilities. Most
exercises include a demonstration run to help make clear what output is
expected from the student’s application. Exercises based on previous work
are marked with a ö symbol. Answers to the exercises are included on
the Teacher Resource Materials CD.
Indexes In addition to a standard index, an index of the applications
presented in the text is also included.
Appendix A chart of Unicode symbols is included.
Online Resources Materials that complement and extend this text are free
for download and distribution in your class. Information about various
Java compilers is available. Supplemental chapters cover operating systems,
personal finances, introduction to computers, and keyboarding skills are
also provided. Students can download all the files needed to complete the
reviews and exercises from www.lpdatafiles.com.
Acknowledgments
Special thanks to the many instructors who used this text in their
classroom as it was being written. I would especially like to thank the
following instructors for their many comments and suggestions:
Paul Massey Hanna-Westside Extension Campus
Edward Sapienza Peabody Veterans Memorial High School
Timothy Strohm Churchville-Chili Senior High School
Jackie Kyger Marine Military Academy
Jan Marrelli, a Lawrenceville Press author and editor, has contributed
much to this text. She has used this text as it was being written in her
classroom. The many comments and suggestions from her and her stu-
dents have helped to make this text so clearly written. Jan, an experienced
instructor, has also written many of the critical thinking questions, exer-
cises, and reviews.
Preface v
Elaine Malfas, senior technical editor at Lawrenceville Press, has pro-
duced the format and layout for this text. The many illustrations have been
created by Elaine as well.
Thanks also to Joseph Dupree in our Customer Relations Department
for some of the original drawings included in this text.
The success of this and all of our texts is due to the efforts of Heidi Crane,
Vice President of Marketing at Lawrenceville Press. Joseph Dupree and
Christina Albanesius run our Customer Relations Department and handle
the thousands of orders we receive in a friendly and efficient manner.
Michael Porter is responsible for the excellent service Lawrenceville Press
offers in the shipping of orders.
Preface vii
Chapter 5 – Conditional Control Chapter 8 – Classes and Object-
Structures Oriented Development
After completing Chapter 5, students After completing Chapter 8, students
will be able to: will be able to:
1. Demonstrate the use of decision structures to 1. Understand and instantiate objects.
control the flow of a program. 2. Design and implement a class.
2. Describe how a roundoff error can occur. 3. Apply functional decomposition.
3. Generate random numbers. 4. Apply appropriate naming conventions to a
4. Write compound Boolean expressions. class.
5. Access methods in the Math class. 5. Explain the difference between accessor,
6. Modify existing code. modifier, and helper methods.
7. Develop code with correct and efficient use of 6. Write constructors.
conditional control structures. 7. Compare and contrast instance and class
8. Select appropriate test data. members.
9. Create and modify solutions to problems. 8. Understand class specifications and the
relationships among the classes.
Chapter 6 – Loop Structures and 9. Understand and implement a given class
hierarchy.
Strings 10. Apply encapsulation.
After completing Chapter 6, students
11. Identify reusable code from existing code.
will be able to:
1. Demonstrate the use of repetition control
structures. Chapter 9 – Inheritance and
2. Explain how infinite loops can occur. Polymorphism
3. Differentiate between counters and After completing Chapter 9, students
accumulators. will be able to:
4. Use various tools and techniques to debug an 1. Extend a class using inheritance.
application. 2. Explain an is-a relationship.
5. Manipulate and compare strings using the 3. Implement a subclass.
String class and its methods. 4. Define and demonstrate polymorphism.
6. Develop code with correct and efficient use of 5. Understand abstract classes.
repetitive control structures. 6. Declare and implement an interface.
7. Apply problem solving strategies. 7. Extend existing code using inheritance.
Preface ix
x A Guide to Programming in Java
Table of Contents
Table of Contents xi
Chapter 3 – Introducing Java Chapter 5 – Conditional Control
Why Program in Java? ............................................ 59 Structures
Objects, Classes, and Packages ............................. 59
The if Statement ..................................................... 105
A Java Application .................................................. 61
Roundoff Error ...................................................... 106
Executing a Java Application ................................. 62
Review: SurfsUp – part 1 of 3 ......................... 106
Review: Greeting................................................ 62
The if-else Statement............................................. 106
Displaying Output ..................................................63
Review: SurfsUp – part 2 of 3 ......................... 107
Review: AboutMe – part 1 of 2 .........................64
Review: CircleCircumference – part 2 of 2... 107
Formatting Output..................................................64
Nested Statements ................................................. 107
Review: AboutMe – part 2 of 2 .........................65
Review: Stages .................................................. 107
Code Conventions ...................................................65
The if-else if Statement ......................................... 108
Algorithm Design ................................................... 66
Review: SurfsUp – part 3 of 3 ......................... 108
Chapter Summary .................................................. 67
Review: Discriminant...................................... 108
Vocabulary ............................................................... 69
The switch Statement............................................ 109
Java ............................................................................ 70
Review: Hurricane ........................................... 110
Critical Thinking ..................................................... 71
Generating Random Numbers ............................ 110
Exercises ................................................................... 72
Review: RandomNum ..................................... 111
Compound Boolean Expressions ........................ 112
Review: Delivery .............................................. 113
Chapter 4 – Variables and The Math Class ...................................................... 113
Review: PerfectSquare ..................................... 114
Constants Chapter 5 Case Study ........................................... 114
Declaring Variables.................................................77 Review: RPS – part 1 of 2 ................................ 118
Using Variables ........................................................ 78 Review: RPS – part 2 of 2 ................................ 118
Review: RectanglePerimeter............................. 79 Chapter Summary ................................................ 119
Primitive Data Types .............................................. 79 Vocabulary ............................................................. 120
Review: Distance – part 1 of 2 .......................... 79 Java .......................................................................... 121
Abstract Data Types ................................................80 Critical Thinking ................................................... 122
Java Packages ...........................................................80 Exercises ................................................................. 123
Obtaining a Value from the User .......................... 81
Review: Distance – part 2 of 2 .......................... 82
Numeric Expressions..............................................83
Review: Digits.....................................................84
Chapter 6 – Loop Structures and
Type Casting ............................................................84 Strings
Review: GradeAvg – part 1 of 2 .......................85
The while Statement ............................................. 131
Review: TempConverter ....................................85
The do-while Statement ....................................... 131
Formatting Numeric Output ................................. 86
Infinite Loops ........................................................ 132
Assignment Operators ........................................... 86
Review: Prompter ............................................ 133
Review: GradeAvg – part 2 of 2 ....................... 87
Counters and Accumulators................................ 133
Using Named Constants ........................................ 87
Review: Evens ................................................... 134
Identifiers and Keywords ...................................... 88
Review: NumbersSum .................................... 134
Review: CircleCircumference – part 1 of 2..... 88
Review: PercentPassing ................................... 134
Programming Errors .............................................. 88
The for Statement .................................................. 135
Chapter 4 Case Study .............................................90
Review: Factorial .............................................. 136
Chapter Summary .................................................. 93
Review: OddSum ............................................. 136
Vocabulary ............................................................... 95
Debugging Techniques ........................................ 136
Java ............................................................................ 96
Review: Variable Trace .................................... 137
Critical Thinking ..................................................... 97
The String Class .................................................... 138
Exercises ................................................................... 99
Review: AccountSetup .................................... 139
Comparing Strings................................................ 140
Review: FormalGreeting ................................. 141
Chapter 7 – Methods
Program Development Using Methods ............. 157
Chapter 9 – Inheritance and
Writing Methods ................................................... 159 Polymorphism
Review: TimeConverter................................... 160
Extending a Class .................................................. 213
Method Parameters............................................... 160
Implementing a Subclass ..................................... 214
Review: SpanishNumbers .............................. 161
Review: Puck – part 1 of 2 ............................... 216
Review: DisplayBox – part 1 of 2 ................... 162
Polymorphism ....................................................... 217
Method Overloading ............................................ 162
Review: Music – part 1 of 2 ............................. 221
Review: DisplayBox – part 2 of 2 ................... 163
Abstract Classes ....................................................222
The return Statement ............................................ 163
Review: Music – part 2 of 2 .............................225
Review: Exponentiation .................................. 164
Interfaces ................................................................225
Documenting Methods ........................................ 164
Review: Disk ..................................................... 227
Review ............................................................... 165
Review: Puck – part 2 of 2 ............................... 227
Chapter 7 Case Study ........................................... 165
Review: Rectangle – part 4 of 4 ...................... 227
Review: GradeConverter ................................. 171
Review: Rectangle – part 4 of 5 ...................... 227
Chapter Summary ................................................ 171
Chapter 9 Case Study ........................................... 227
Vocabulary ............................................................. 173
Review: SalesCenter.........................................234
Java .......................................................................... 173
Chapter Summary ................................................234
Critical Thinking ................................................... 174
Vocabulary ............................................................. 236
Exercises ................................................................. 175
Java .......................................................................... 236
Critical Thinking ................................................... 237
Exercises ................................................................. 238
Chapter 8 – Classes and Object-
Oriented Development
What is an Object? ................................................ 179
Chapter 10 – Arrays
Designing and Writing a Class ........................... 180 Declaring Arrays ................................................... 239
Review: Circle – part 1 of 4 ............................. 182 Using Arrays .......................................................... 240
Review: Coin – part 1 of 2 ............................... 182 Review: StudentRoster .................................... 241
Writing Constructors ............................................ 183 Review: Squares ............................................... 241
Review: Circle – part 2 of 4 ............................. 184 Review: Reverse ............................................... 241
Review: Rectangle – part 1 of 5 ...................... 184 Array Parameters .................................................. 241
Instance and Class Members............................... 184 Arrays with Meaningful Indexes ....................... 242
Review: Circle – part 3 of 4 ............................. 185 Review: DiceRolls – part 1 of 2 ....................... 243
Review: Rectangle – part 2 of 5 ...................... 185 Review: DiceRolls – part 2 of 2 ....................... 243
The Object Class .................................................... 185 Review: NumberCounts.................................. 243
Review: Circle – part 4 of 4 ............................. 187 Characters and Arrays ......................................... 244
Review: Rectangle – part 3 of 5 ...................... 187 Review: CountLetters ...................................... 246
Review: Coin – part 2 of 2 ............................... 187 Review: NameBackwards ............................... 246
Classes Using Classes ........................................... 187 Searching an Array ............................................... 246
Review: Bank .................................................... 191 Review: FindName .......................................... 247
Object-Oriented Development ............................ 191 Two-Dimensional Arrays ..................................... 247
Review: Carnival .............................................. 195 The ArrayList Class .............................................. 252
Appendix A – Unicode
Unicode ................................................................... 381
Index
Index ....................................................................... 383
Table of Contents xv
xvi Table of Contents
Chapter 1
An Introduction to Computers
e
Desktop Computing
pl
TIP Desktop computers are
referred to as either PCs or
MACS.
A desktop computer and its components are designed to fit on or under
a desk:
�������
���������
���������������
����������
�������
m
��������
�����
e
The Intel Pentium 4 (P4) CPU
has a clock rate of 3.06 GHz.
The AMD Opteron CPU has a ����� ������ ������
clock rate of 2.4 GHz. These
CPUs contain more than 40
pl
million transistors on a single
chip.
���
e
forecasting and nuclear energy of hard disk space. The hardware requirements are based on what will
research.
be needed to allow the OS software to properly manage the computer’s
tasks. The term platform is sometimes synonymous with environment.
pl Environment types vary widely and can refer to the computer type or
the way the user interacts with the computer as well as the software/hard-
ware configuration. A desktop environment refers to a desktop or notebook
computer running an OS designed for the typical hardware found in a
desktop or notebook computer. A multiuser environment is sometimes called
time sharing because each user gets a portion of the processor’s “time.”
A distributed environment shares the load of processing among several
computers. When discussing environments, a distinction is usually made
m
between multiprocessing and multitasking. A multiprocessing environment
means that more than one processor is being used for executing an appli-
cation, and a multitasking environment is one in which processing time for
TIP For information on a multiple applications is divided among one processor. Most environments
specific operating system, refer
run an OS with a graphical user interface (GUI):
to the appropriate chapter at
sa
Lvp.com.
e
pl
m
sa
Windows XP Utilities
Mobile Computing
Improved technology has allowed the miniaturization of computer
components and special long-lasting batteries. Computers now come
in many shapes, sizes, and with many levels of features. Among these
Bluetooth computers are notebooks, tablets, handhelds, smart phones, and wearables.
Blueto oth is a wireless Because of their portability, these types of computers are classified as
technology used to allow mobile computing devices:
mobile computing devices to
communicate. • A notebook computer is a portable, lightweight computer with a
CPU, memory, and hard disk space comparable to that of a typical
desktop computer.
• A tablet PC is a computer designed similar to a pad of paper and
a pencil. Users simply “write” on a screen with a device called a
stylus that is shaped like a thin pencil. Handwriting recognition
software is used to interpret a user’s handwriting. A keyboard can
also be attached.
e
and contain other features usually found in a handheld PC.
cross-platform connectivity One issue involved with using so many types of PCs is cross-platform
connectivity, which is the ability for one type of PC to link to and share
data with a different type of PC. Notebook and desktop PCs typically have
instructions.
Programming languages can be classified as low-level and high-level
languages. Low-level programming languages include machine language
and assembly language. Machine language, which is referred to as a first
generation programming language, can be used to communicate directly
with the computer. However, it is difficult to program in machine language
because the language consists of 0s and 1s to represent the status of a
switch (0 for off and 1 for on). Assembly language uses the same instruc-
tions and structure as machine language but the programmer is able to
Fourth and Fifth use meaningful names or abbreviations instead of numbers. Assembly
Generation Languages language is referred to as a second generation programming language.
Fourth generation languages
(4GL), such as SQL, have High-level programming languages, which are often referred to as third
higher English-like instructions generation programming languages (3GL), were first developed in the late
than most high-level languages 1950s. High-level programming languages have English-like instructions
and are typically used to access and are easier to use than machine language. High-level programming
databases. Fifth generation languages include Fortran, C, Basic, COBOL, and Pascal. In order for the
languages are used for artificial
computer to understand a program written in a high-level language, pro-
intelligence.
grammers convert the source code into machine language using a compiler
or an interpreter. A compiler is a program that converts an entire program
Networks
A network is a combination of hardware and software that allows
e
computers to exchange data and share software and devices, such as
printers. Networks are widely used by businesses, universities, and other
organizations because a network:
Area Network) are network large geographical distances. A WAN can be one widespread network or
technologies classified by the it can be a number of LANs linked together.
size of a network. A MAN is a
high-speed network that typi- The computers and other devices in a LAN each contain an expansion
cally connects LANs within a card called a network interface card:
city or town. A HAN is used
to connect personal devices
within the home.
e
bits per second (bps). Each determines how network resources are handled. Two common models are
transmission media has a spe-
peer-to-peer and client/server. In a peer-to-peer network, each computer on
cific length or range restric-
tion, data transmission rate,
the network is considered equal in terms of responsibilities and resource
and cost. sharing. A client/server network consists of a group of computers, called
pl Ethernet
clients, connected to a server. A server is a computer with more RAM, a
larger hard disk, and sometimes multiple CPUs that is used to manage
network functions.
Physical topology refers to the arrangement of the nodes on a network.
A node is a location on the network with a device capable of processing
information, such as a computer or a printer. There are three common
physical topologies:
m
The Ethernet LAN protocol was
• The bus topology is a physical LAN topology that uses a single cen-
developed by Bob Metcalfe in
1976. Ethernet uses a bus or tral cable, called the bus or backbone to attach each node directly:
star topology with twisted-
pair wiring, coaxial cable,
or fiber optic cable transmis-
sion media. Newer protocols
sa
Baseband and
Broadband Technology
Most LANs use baseband
technology which means the
e
transmission media carries one LAN using a star topology
signal at a time. Broadband
technology allows for data • In a ring topology, each node is connected to form a closed loop.
transmission of more than one A LAN with a ring topology can usually cover a greater distance
pl
signal at a time and is found in
cable television transmission.
than a bus or star topology:
m
Wi-Fi
sa
logical topology Another type of topology is logical topology, which refers to the way data
is passed between the nodes on a network. A LAN’s logical topology is
not always the same as its physical topology.
Number Systems
The electrical circuits on an IC have one of two states, off or on. Therefore,
binary number system the binary number system (base 2), which uses only two digits (0 and 1), was
adopted for use in computers. To represent numbers and letters, a code
e
was developed with eight binary digits grouped together to represent a
bit single number or letter. Each 0 or 1 in the binary code is called a bit (BInary
byte digiT) and an 8-bit unit is called a byte.
base 10 Our most familiar number system is the decimal, or base 10, system. It
pl uses ten digits: 0 through 9. Each place represents a power of ten, with
the first place to the left of the decimal point representing 100, the next
place representing 101, the next 102, and so on (remember that any number
raised to the zero power is 1). In the decimal number 485, the 4 represents
4×102, the 8 represents 8×101, and the 5 represents 5×100. The number 485
represents the sum 4×100 + 8×10 + 5×1 (400 + 80 + 5):
Decimal Base 10 Equivalent
m
485 4×102 + 8×101 + 5×100 = 400 + 80 + 5
base 2 The binary, or base 2, system works identically except that each place
represents a power of two instead of a power of ten. For example, the
binary number 101 represents the sum 1×22 + 0×21 + 1×20 or 5 in base ten.
Some decimal numbers and their binary equivalents are:
sa
e
where mega represents 220 or 1,048,576 bytes and GB stands for gigabytes,
which is 230 or 1,073,741,820 bytes.
Data stored in memory is referred to by an address. An address is a
pl unique binary representation of a location in memory. Therefore, data
can be stored, accessed, and retrieved from memory by its address. For
data to be addressable in memory, it must usually be at least one byte in
length. For example, to store JIM in memory each character is converted
to Unicode and stored in two bytes of memory with each memory location
designated by its address:
m
Because JIM is a character string, it will probably be stored in adjacent
memory addresses.
What is a File?
A file is related data stored on a persistent media. A file can be an appli-
cation (program) or the product of an application. For example, a word
File Size Limitations processor application is used to create document files. As another example,
File size can be decreased a digital camera is used to create photo files. A file is stored on a persistent
or compressed using a media so that it is retained even after the computer or computerized device
e
compression program, such
is turned off. A file can be used over and over again whenever the data it
as WinZip. This technique is
often used to accommodate
stores is needed.
storage device and e-mail A file is really just 1s and 0s because it is stored in binary code. Computers
account limitations.
Internal devices are drives mounted inside the PC case. These devices
can include hard disk, CD/DVD, disk, tape, Zip, and Jaz drives. Except for
the Iomega® RRD (Removable Rigid Disk) system, which uses a removable
media, hard drives typically have permanently installed disks that are not
accessible from outside the PC case. Other devices have an external slot
for removable storage media.
e
External devices have a stand-alone drive housing and connect to a
computer’s USB port with a cable. USB (Universal Serial Bus) is a standard-
ized technology with data transfer rates up to 480 Mbs. As many as 127
devices can be connected to a single port with USB hubs.
pl External drives offer the advantage of portability because they can be
easily moved to other computers that support the technology. External
devices include hard disk, RRD, CD/DVD, diskette, tape, Zip, and Jaz
drives. Except for the hard disk drive, these drives have removable
media.
Ultra-portable devices include keychain, watch, mini drive, and mouse
storage to name just a few. These external devices are small and easy-to-
m
use, but currently more expensive than comparable storage devices that
are larger in size. Most ultra-portable devices, including the keychain and
mini drive, have storage media attached directly to a USB plug that is con-
nected to a USB port. The watch and mouse storage devices use a cable
with a USB plug to connect to a USB port. The watch has a short cable and
USB plug hidden in the band. The mouse storage device requires a longer
sa
e
1.44MB (a floppy diskette) to many gigabytes (hard disk drives with many
platters). Optical technology includes CDs that can store about 700MB of
data, while DVDs can store at least 4GB of data. Solid-state devices store
from 64KB of data to many gigabytes.
Storage Media
The capacity of storage media
varies. For example, a disk has
Storage media can be very sensitive. Care should be taken to avoid
damaging files:
• Never attempt to open a case containing a disk.
• Keep magnetic media away from magnets.
• Handle CD/DVDs by the center hole or by the edges.
• Never bend CD/DVDs or other flexible media.
a storage capacity of 1.44 MB,
m
a CD has a storage capacity • Store CD/DVDs in a jewel case or sleeve to prevent scratches.
of 650 MB, and a DVD has a
storage capacity of over 4GB. • Keep media away from moisture and extreme temperatures.
Telecommunications
Telecommunications is the transmitting and receiving of data. Data can be
in various forms including voice and video. Telecommunications requires
e
TIP Access to the Internet a modem or adapter and a line or cable. The speed of data transmission
requires telecommunications
and the use of an Internet
(sending) and receipt (receiving) is measured in Kbps (thousands of bits
Service Provider (ISP). per second) or Mbps (millions of bits per second). Numerous telecommu-
nications options are available, which vary in speed and cost:
pl • A conventional modem uses standard telephone lines to convert
analog signals to digital data. A conventional modem is a 56 Kbps
modem, which transmits data at 28.8 Kbps and 36.6 Kbps, and
receives data at 56 Kbps. Home computers sometimes use a con-
ventional modem.
• A DSL (Digital Subscriber Line) modem uses standard telephone
TIP In a wireless network, a
router/wireless access point is lines with data transmission up to 640 Kbps. Data receipt is from
m
typically connected by a cable 1.5 Mbps to 9 Mbps. A DSL (Asymmetric DSL) is the most common
to a cable or DSL modem. form used.
• A cable modem transmits data through a coaxial cable television
network. Data transmission is from 2 Mbps to 10 Mbps and data
receipt is from 10 Mbps to 36 Mbps.
sa
Blog
e
Blog is short for weblog and is
a type of website where users
can post entries in a journal
format.
pl
m
A web page that is part of the New York Times website
Another widely used Internet service is e-mail or electronic mail, which
is the sending and receiving of messages and computer files over a com-
munications network, such as a LAN (Local Area Network) or the Internet.
sa
E-mail software is also required for sending and receiving e-mail mes-
sages. Examples of e-mail software include Outlook, Outlook Express,
Instant Messaging and Eudora. Browser-based e-mail only requires a web browser and is
Instant messaging is a com- available through sites such as Yahoo! and Hotmail.
munication tool that allows
for real time or immediate text-
based communication.
e
• Be considerate of other people’s beliefs and opinions.
Spam
When sending e-mail at work or school, it is important to remember
Along with personal and
that employers and school administrators have the right to read any e-mail
pl
busine ss me ssage s, most
people also receive a lot of
“junk e-mail” or spam. Most
e -mail sof t ware includes
features to filter and block
messages from spe cif ic
senders.
messages sent over the corporate or school network, as well as the right to
track online activity.
A mailing list server is a server that manages mailing lists for groups of
users. Two mailing list servers are Listserv and Majordomo. Often users
subscribe to mailing lists for discussion purposes. When a subscriber posts
a message to a mailing list server, every subscriber receives a copy of the
message. Subscribers are identified by a single name or e-mail address.
m
Finding Information on the Web and
Downloading Files
sa
e
one word or the other or both teria florida OR hotel returns links to pages containing either of
NOT locates pages that
the words.
include the first word, but not • The – (minus sign) is used to exclude unwanted Web pages. For
the second word
pl
A boolean expression always
evaluates to TRUE or FALSE
with pages that match the
search condition evaluating to
TRUE.
example, the search for shakespeare –play returns hyperlinks to
pages containing the word shakespeare, but eliminates pages that
also contain the word play. NOT can be used in place of – in most
search engines.
Some search engines provide a subject tree, or web directory, which is a
list of sites separated into categories. The term subject tree is used because
many of the categories “branch” off into subcategories. These subcategories
allow the user to narrow down the subject and display a list of appropriate
m
hyperlinks, which are at the lowest level of the tree.
TIP Just because a file is Information on a website is sometimes in the form of a downloadable
available on a website for file. Downloading is the process of copying a file from a website to the
download does not mean that user’s computer. For example, virus definitions can be downloaded from a
it is legal to download the file. antivirus software company’s website and software updates can be down-
sa
Downloading copyrighted loaded from the software company’s website. When a file is downloaded,
files that have not been made
the user specifies where the file should be saved on the local computer.
freely available is a violation of
copyright law.
Files should only be downloaded from known, authentic websites since
downloadable files are often associated with viruses.
If information from a website is to be referenced or quoted in a report,
essay, or other document, a citation must be used to give credit to the
original author and allow the reader to locate the cited information. A
widely accepted form for citation is published by the Modern Language
MLA Association (MLA) in its publication MLA Handbook for Writers of Research
Papers, Fourth Edition.
In general, a citation for material located at a website should look similar
to:
Author's Last Name, First Name MI. Site Title. Access date.
Organization name. <URL>.
e
Spyware technique known as online profiling. When a commercial website is visited,
Spy ware is sof t ware that information about the user may be collected using various methods such
uses the Internet to gather as cookies or web beacons.
personal information from an
pl
unsuspecting user. Spyware
is unknowingly downloaded
and installed with another file,
such as freeware or shareware
programs.
A cookie is a text file created by the server computer when a user enters
information into a website. The cookie file is then stored on the user’s
computer and accessed each time the user visits that website. Cookies
are often created when online purchases are made. Although cookies can
only store information that the user has selected or entered, their use has
raised concerns over privacy issues.
Web beacons, also called web bugs or pixel tags, are tiny, transparent
IP Address graphics located on web pages or in e-mail messages that are used in
m
combination with cookies to collect data about web page users or e-mail
An IP address is an identifier
for a computer or device on a senders. Usually the monitoring is done by an outside advertising company.
TCP/IP network. The information a web beacon collects includes the IP address of the
computer, the URL being visited, the time the web page was viewed, the
type of browser being used, and the cookie file.
sa
TIP A website’s privacy policy Before providing a company with personal information through a
is typically found as a link at website, check the site’s privacy policy. A privacy policy is a legally binding
the bottom of the home page document that explains how any personal information will be used.
of a website.
The Internet has opened up access to many files that were previously
inaccessible. To protect both the privacy of an individual and the accuracy
of data stored about individuals, several laws have been passed:
• The Electronic Communications Privacy Act of 1986 (ECPA)
makes it a crime to access electronic data without authorization.
It also prohibits unauthorized release of such data.
• The Electronic Freedom of Information Act of 1996 (E-FOIA)
NET Act requires federal government agencies to make certain agency
information available for public inspection and is designed to
The NET (No Electronic Theft)
Act of 1997 closed a loophole improve public access to agency records by making more informa-
in the law which allowed copy- tion available online.
righted material to be given • The Children’s Online Privacy Protection Act of 1998 (COPPA)
away on the Internet without
requires commercial websites that collect personal information
any legal penalty.
from children under the age of 13 to obtain parental consent.
e
Internet Filtering • Use appropriate language.
Software
• Do not reveal personal address or phone numbers.
Many schools and organiza-
tions install Internet filtering • Do not access, upload, download, or distribute inappropriate
pl
software to block offensive
material.
materials.
• Do not access another user’s account.
• Use of the network for private business is prohibited.
• Only administrator installed software may be used on the com-
puters. Adding, deleting, or modifying installed software is not
permitted.
m
The Social and Ethical Implications of
Computer Use
The society in which we live has been so profoundly affected by
sa
information age computers that historians refer to the present time as the information age.
This is due to the our ability to store and manipulate large amounts of
information (data) using computers. As an information society, we must
consider both the social and ethical implications of our use of computers.
By ethical questions we mean asking what are the morally right and wrong
ways to use computers.
ergonomics Ergonomics is the science that studies safe work environments. Many
health-related issues, such as carpal tunnel syndrome and computer vision
syndrome (CVS) are related to prolonged computer use.
Power and paper waste are environmental concerns associated with
computer use. Suggestions for eliminating these concerns include recycling
paper and printer toner cartridges and turning off monitors and printers
when not in use.
Employee monitoring is an issue associated with computers in the work-
place. It is legal for employers to install software programs that monitor
employee computer use. As well, e-mail messages can be read without
employee notification.
e
improper use of data stored in computer files:
• The Fair Credit Reporting Act of 1970 gives individuals the right
to see information collected about them for use by credit, insur-
pl ance, and employment agencies. If a person is denied credit they
are allowed to see the files used to make the credit determination.
If any of the information is incorrect, the person has the right to
have it changed. The act also restricts who may access credit files
to only those with a court order or the written permission of the
individual whose credit is being checked.
• The Privacy Act of 1974 restricts the way in which personal data
can be used by federal agencies. Individuals must be permitted
m
access to information stored about them and may correct any infor-
mation that is incorrect. Agencies must insure both the security
and confidentiality of any sensitive information. Although this law
applies only to federal agencies, many states have adopted similar
laws.
sa
e
destroy data when a certain time is reached. A virus is easily duplicated
when the file is copied, which spreads it to other computers.
Trojan horse A Trojan horse program appears as something else, usually a program
that looks trustworthy. Running the program runs the malicious code
pl antivirus programs
and damages files on the computer. A worm is a program that is able to
reproduce itself over a network. Worms are a threat because of the way
they replicate and use system resources, sometimes causing the system
to shut down.
Malicious code has become so widespread that software called antivirus
programs must be installed on computers and networks to detect and
remove the code before it can replicate or damage data. Precautions can
m
also be taken to prevent damage from malicious code:
• Update antivirus software. An antivirus program can only detect
the viruses, Trojan horses, and worms it is aware of. Antivirus
programs have a web link for updating the virus definitions on
the computer containing the antivirus program.
sa
crackers, hackers Newspapers have carried numerous reports of crackers, or hackers, gain-
ing access to large computer systems to perform acts of vandalism. This
malicious act is illegal and can cause expensive damage. The Electronic
Communications Privacy Act of 1986 specifically makes it a federal offense
to access electronic data without authorization. Networks usually include a
firewall, which is a combination of hardware and software, to help prevent
unauthorized access.
The willful destruction of computer data is no different than any other
vandalizing of property. Since the damage is done electronically the
result is often not as obvious as destroying physical property, but the
consequences are much the same. It is estimated that computer crimes
cost billions of dollars each year.
e
have created many new job
opportunities in the IT field. In addition to ensuring system reliability, an IT professional must take
IT careers include data-entry responsibility for the ethical aspects of the career choice. For example,
operator, systems analyst,
IT professionals involved in creating software must ensure, as best he or
p r o g r a m m e r, c o m p u t e r
pl
e n g in e e r, a n d t e c h ni c al
support technician.
she can, the reliability of the computer software. This means the ethical
responsibility of the IT professional includes using the appropriate tools
and methods to test and evaluate programs before distribution. A special
cause for concern is the increased use of computers to control potentially
dangerous devices such as aircraft, nuclear reactors, or sensitive medical
equipment.
IT professionals must also consider the impact they have on computer
users. Web users for example often rely on data from websites providing
m
real-time information. The information displayed is determined with a
program written using a 4GL or other language that accesses a database.
The IT professionals involved in such a project have the ethical respon-
sibility to possibly millions of individuals for ensuring, as best they can,
accurate data retrieval.
sa
Chapter Summary
A desktop computer and its components are designed to fit on or under
a desk. Mobile computers include notebooks, tablets, handhelds, smart
phones, and wearables. A computer must run operating system (OS)
software in order to control processing and peripherals, run application
software, and control input and output, among other tasks.
e
Japanese, Cherokee, and so on) and symbols of every culture (=, @, ½, and
so on) have been given a representation in a digital code called Unicode.
Computer memory, file sizes, and storage device capacities are measured
in bytes. In computers and electronics MB stands for megabytes, GB stands
pl
for gigabytes, and K stands for kilobytes.
The binary representation of an integer number is usually stored in four
bytes of memory. Real numbers are numbers that contain decimal points
and the binary representation of a real number is usually 4 to 8 bytes of
memory.
A file is related data stored on a persistent media. A file is really just 1s
m
and 0s because it is stored in binary code. Computers are programmed to
translate bytes and words into symbols. File types are distinguished by
the extension that comes after the file name. Folders are used to organize
commonly related files.
Storage devices use a persistent media to maintain files. These devices,
which are also referred to as drives, mass storage, and auxiliary storage,
sa
e
tial for the use of computers to invade our right to privacy has prompted
legislation to protect individuals. Piracy is the illegal act of duplicating
software without permission. A virus is a computer file that erases data
and can cause considerable damage.
pl Working as an IT (information technology) professional includes taking
responsibility for the ethical aspects of a career choice. IT professionals
must also consider the impact they have on computer users.
m
sa
Address A unique binary representation of a location Cookie Text file created by the server computer
in memory. when a user enters information into a website.
Address bus Carries memory addresses that indi- Copyright Protects a piece of work from reproduc-
cate data storage locations. tion without permission from the work’s author.
ALU (Arithmetic Logic Unit) The part of the CPU CPU (Central Processing Unit) Processes data and
that handles arithmetic and logic operations. controls the flow of data between the computer’s
other units. Also contains the ALU. Located on the
Antivirus program Software installed on computers
motherboard.
and networks to detect and remove viruses.
Cracker Person who accesses a computer system
Applications software Program written to perform
without authorization.
a specific task.
Cross-platform connectivity The ability of one
Base unit Housing that contains the mother-
type of PC to link to and share data with a different
e
board, CD-RW/DVD drive, disk drive, and hard
type of PC.
disk drive.
Dedicated line See Leased line.
Binary number system Number system used by
computers that uses only digits 0 and 1. Also called Device driver One type of utility program.
pl
base 2.
Bit (BInary digiT) A single 0 or 1 in binary code.
Bus A central network cable. Also a set of circuits
that connect the CPU to other components.
Bus topology A physical LAN topology that uses a
single central cable to attach each node directly.
Downloading The process of copying a file from
a website to the user’s computer.
DSL (Digital Subscriber Line) modem A modem
that uses standard telephone phone lines. ADSL is
the most common form used.
E-mail (electronic mail) The sending and receiving
m
of messages and electronic files over a communica-
Byte A group of 8 bits.
tions network such as a LAN or the Internet.
Cable modem A modem that transmits data through
Environment A computer’s hardware and soft-
a coaxial cable television network.
ware configuration. Also referred to as platform.
Cache High-speed memory used to store frequently Environment types include desktop, multiuser, net-
sa
used data so that it can be quickly retrieved by an work, handheld, distributed, multiprocessing, and
application. multitasking.
Client A computer that is sent information from a Ergonomics The science that studies safe work
server computer. environments.
Client/server network A type of network that Extension Added after a file name to distinguish
consists of a group of computers, called clients con- file types.
nected to a server computer.
Extranet An extended intranet that provides vari-
Clock rate The speed at which a CPU can execute ous levels of access to authorized members of the
instructions, measured in megahertz or gigahertz. public.
Compiler A program that converts an entire pro- Expansion boards Circuit boards that connect to the
gram into machine code before the program is motherboard to add functionality to the computer.
executed.
File A collection of related data stored on a lasting
Control bus Carries control signals. medium.
Conventional modem A modem that uses stan- Firewall A network security system that prevents
dard telephone lines to convert analog signals to unauthorized network access.
digital data.
Handheld computer A mobile computing device. Low-level programming languages First and
second generation programming languages including
Hardware The physical components of the computer, machine language and assembly language.
such as the monitor and system unit.
Mailing list server A server that manages mailing
Hexadecimal system Number system based on 16 lists for groups of users.
digits. Also called base 16.
Magnetic technology Storage device technology that
High-level programming languages Third uses a mechanical drive with tiny electro-magnetic
generation programming languages that have heads for reading and writing data to media.
English-like instructions.
Match A web page that contains the search
Hub A communication device that joins communica-
e
criteria.
tion lines at a central location on the network.
Mbps Millions of bits per second.
Information age Present time characterized
by increasing dependence on the computer’s Megabytes (MB) Approximately one million
pl
ability to store and manipulate large amounts of
information.
Input device Device used to enter data and instruc-
tions into the computer.
Integrated circuits (ICs) A silicon wafer with intri-
bytes.
Megahertz (MHz) Million of cycles per second.
Memory-resident A program that is always in
memory.
Minus sign (–) Used in search criteria to exclude
cate circuits etched into its surface and then coated
unwanted web pages.
with a metallic oxide that fills in the etched circuit
m
patterns. Also called a chip. Modern Language Association (MLA) Organization
that publishes standards used for citations.
Interactive Information accessed as a result of
selections made by the user. Motherboard The main circuit board inside the
base unit.
Internet The largest and most widely accessed
network. Netiquette The etiquette that should be followed
sa
IT (Information Technology) A term that Network operating system Software that allows
encompasses all aspects of computer-related users and devices to communicate over a network.
technology.
Node A location on the network capable of processing
Kbps Thousands of bits per second. information, such as a computer or a printer.
e
Overflow error An error that occurs when the num-
ber of bits that are needed to represent the integer Server A computer used to manage network func-
is greater than four bytes. tions such as communication and data sharing.
Over writes Updates an original file with Smartphone Cellular phone that is able to send and
pl
changes.
Peer-to-peer network A type of network that does
not have a server.
Peripheral device A device attached to a PC.
Phishing The act of sending an e-mail to a user
falsely claiming to be a legitimate business in an
receive e-mail messages and access the Internet.
Solid state technology Storage device technology
that requires no moving parts.
SRAM (Static Random Access Memory) High-
speed memory referred to as cache.
Star topology A physical LAN topology where
m
attempt to trick the user into revealing personal each node is attached to a hub.
information that could be used for crimes such as
identity theft Storage devices Devices that use persistent media
to maintain files. Also referred to as drives, mass
Piracy Illegally copying or distributing software. storage, and auxiliary storage.
Plus sign (+) Used in search criteria to limit a search Subject tree A list of sites separated into
sa
Real numbers Numbers that contain decimal Trojan horse Malicious code in the form of a program
points. that appears as something else, usually a program
that looks trustworthy.
Real time Occurs immediately.
e
Wearable computer A mobile computing device
that is incorporated into clothing, eyewear, wrist-
wear, and other wearables.
Web See World Wide Web.
pl
Web beacon A tiny, transparent graphic located on
a web page used to collect data about the web page
user. Also called a web bug or pixel tag.
Web browser Interprets an HTML document to
display a web page.
Web directory See Subject tree.
m
Wireless network A type of network that does not
require the use of cables.
Word Bits grouped in units of 16 to 64.
World Wide Web The most widely used Internet
sa
STEWED BLACK FISH.— Flour a deep dish, and lay in the bottom
a piece of butter rolled in flour. Then sprinkle it with a mixture of
parsley, sweet marjoram, and green onion; all chopped fine. Take
your black fish and rub it inside and outside with a mixture of
cayenne, salt, and powdered cloves and mace. Place skewers across
the dish, and lay the fish upon them. Then pour in a little wine, and
sufficient water to stew the fish. Set the dish in a moderate oven,
and let it cook slowly for an hour.
Shad or rock fish may be dressed in the same manner.
PICKLED EGGS.— Boil twelve eggs quite hard, and lay them in
cold water; having peeled off the shells. Then put them whole into a
stone jar, with a quarter of an ounce of whole mace, and the same
quantity of cloves; a sliced nutmeg; a table-spoonful of whole
pepper; a small bit of ginger; and a peach leaf. Fill up the jar with
boiling vinegar; cover it closely that the eggs may cool slowly. When
they are cold, tie up the jar; covering the cork with leather. After it
has stood three days pour off the pickle, boil it up again, and return
it boiling hot to the eggs and spice. They will be fit for use in a
fortnight.
TO KEEP TOMATAS.— Take fine ripe tomatas, and wipe them dry,
taking care not to break the skin. Put them into a stone jar with cold
vinegar, adding a small thin muslin bag filled with mace, whole
cloves, and whole peppers. Then cork the jar tightly with a cork that
has been dipped in melted rosin, and put it away in a dry place.
Tomatas pickled in this manner keep perfectly well and retain their
colour. For this purpose use the small round button tomatas.
Morella cherries may be pickled thus, in cold vinegar.
ADDITIONAL RECEIPTS.
FRENCH GREEN PEA SOUP.— This soup is made without meat.
Put into a soup-pot four quarts of shelled green peas, two large
onions sliced, a handful of leaves of sweet marjoram shred from the
stalks, or a handful of sweet basil; or a mixed handful of both—also,
if you like it, a handful of green mint. Add four quarts of water, and
boil the whole slowly till all the peas are entirely to pieces. Then take
off the pot, and mash the peas well against its sides to extract from
them all their flavour. Afterward strain off the liquid into a clean pot,
and add to it a tea-cup full of the juice of spinach, which you must
prepare, while the soup is boiling, by pounding some spinach in a
mortar. This will give the soup a fine green colour. Then put in a
quarter of a pound of the best fresh butter rolled whole in flour; and
add a pint and a half more of shelled young peas. If you wish the
soup very thick, you may allow a quart of the additional peas.
Season it with a very little salt and cayenne; put it again over the
fire, and boil it till the last peas are quite soft, but not till they go to
pieces.
Have ready in a tureen two or three slices of toasted bread cut into
small squares or dice, and pour the soup on it.
This soup, if properly made, will be found excellent, notwithstanding
the absence of meat. It is convenient for fast days; and in the
country, where vegetables can be obtained from the garden, the
expense will be very trifling.
What is left may be warmed for the next day.
HAM OMELET.— Take six ounces of cold boiled ham, and mince it
very fine, adding a little pepper. Beat separately the whites and yolks
of six eggs, and then mix them together; add to them gradually the
minced ham. Beat the whole very hard, and do not let it stand a
moment after it is thoroughly mixed. Have ready some boiling lard in
a frying-pan, and put in the omelet immediately. Fry it about ten
minutes or a quarter of an hour. When done, put it on a hot dish,
trim off the edges, and fold it over in a half moon. Send it to table
hot, and covered. It is eaten at breakfast.
If you wish a soft omelet, (not to fold over,) fry it a shorter time, and
serve it in a deep dish, to be helped with a spoon.
A similar omelet may be made of the lean of a cold smoked tongue.
APPLE RICE PUDDING.— Wash half a pint of rice, and boil it till
soft and dry. Pare, core, and cut up six large juicy apples, and stew
them in as little water as possible. When they are quite tender, take
them out, and mash them with six table-spoonfuls of brown sugar.
When the apples and rice are both cold, mix them together. Have
ready five eggs beaten very light, and add them gradually to the
other ingredients, with five or six drops of essence of lemon, and a
grated nutmeg. Or you may substitute for the essence, the grated
peel and the juice of one large lemon. Beat the whole very hard
after it is all mixed; tie it tightly in a cloth, (leaving but a very small
space for it to swell,) and stopping up the tying place with a lump of
flour moistened to paste with water. Put it into a pot of boiling water,
and boil it fast for half an hour. Send it to table hot, and eat it with
sweetened cream, or with beaten butter and sugar.
HOE CAKE.— Beat the whites of three eggs to a stiff froth, and sift
into a pan a quart of wheat flour, adding a salt-spoon of salt. Make a
hole in the middle, and mix in the white of egg so as to form a thick
batter, and then add two table-spoonfuls of the best fresh yeast.
Cover it, and let it stand all night. In the morning, take a hoe-iron
(such as are made purposely for cakes) and prop it before the fire till
it is well heated. Then flour a tea-saucer, and filling it with batter,
shake it about, and clap it to the hoe, (which must be previously
greased,) and the batter will adhere till it is baked. Repeat this with
each cake. Keep them hot, and eat them with butter.
MILK TOAST.— Boil a pint of rich milk, and then take it off, and stir
into it a quarter of a pound of fresh butter, mixed with a small table-
spoonful of flour. Then let it again come to a boil. Have ready two
deep plates with half a dozen slices of toast in each. Pour the milk
over them hot, and keep them covered till they go to table. Milk
toast is generally eaten at breakfast.
COMMON ICE CREAM.— Split into pieces a vanilla bean, and boil
it in a very little milk till the flavour is well extracted; then strain it.
Mix two table-spoonfuls of arrow-root powder, or the same quantity
of fine powdered starch with just sufficient cold milk to make it a
thin paste; rubbing it till quite smooth. Mix together a pint of cream
and a pint of rich milk; and afterwards stir in the preparation of
arrow-root, and the milk in which the vanilla has been boiled. Beat it
very hard, stir in half a pound of powdered loaf-sugar, beating it very
hard again. Then strain it, and put it into a freezer placed in a tub
that has a hole in the bottom to let out the water; and surround the
freezer on all sides with ice broken finely, and mixed with coarse
salt. Beat the cream hard for half an hour. Then let it rest;
occasionally taking off the cover, and scraping down with a long
spoon the cream that sticks to the sides. When it is well frozen,
transfer it to a mould; surround it with fresh salt and ice, and then
freeze it over again. If you wish to flavour it with lemon instead of
vanilla, take a large lump of the sugar before you powder it, and rub
it on the outside of a large lemon till the yellow is all rubbed off
upon the sugar. Then, when the sugar is all powdered, mix with it
the juice of two large lemons.
For strawberry ice cream, mix with the powdered sugar the juice of
a quart of ripe strawberries squeezed through a linen bag.
APPLE COMPOTE.— Take large ripe pippin apples. Pare, core, and
weigh them, and to each pound allow a pound of fine loaf-sugar and
two lemons. Parboil the apples, and then set them out to cool. Pare
off very nicely with a penknife the yellow rind of the lemons, taking
care not to break it; and then with scissors trim the edges to an
even width all along. Put the lemon-rind to boil in a little sauce-pan
by itself, till it becomes tender, and then set it to cool. Allow half a
pint of water to each pound of sugar; and when it is melted, set it
on the fire in the preserving kettle, put in the apples, and boil them
slowly till they are clear and tender all through, but not till they
break; skimming the syrup carefully. After you have taken out the
apples, add the lemon-juice, put in the lemon-peel, and boil it till
quite transparent. When the whole is cold, put the apples with the
syrup into glass dishes, and dispose the wreaths of lemon-peel
fancifully about them.
ebookgate.com