Discovering Computers: Digital Technology, Data, and Devices Chapter 8
Discovering Computers: Digital Technology, Data, and Devices Chapter 8
Computers:
Digital
Technology, Data,
and Devices,
Module 8: Operating 17e
Systems: Managing,
Coordinating, and Monitoring
Resources
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved.
Rights
May notReserved.
be scanned,
Maycopied
not be or
scanned,
duplicated,
copied
or posted
or duplicated,
to a publicly
or posted
accessible
to a publicly
website,
accessible
in whole website,
or in part.
in whole or in part. 1
Module Objectives
Start a word processing program and open a • Starts the word processing program
document • Provides tools for you to open the document file
Add information to the document • Manages memory so the computer can run
• Saves your unsaved work to temporary storage
Save the document on the hard drive • Find the hard drive
• Makes sure the hard drive has enough storage
space
• Saves the document
• Stores the location and file name so that you can
access the document later
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
Operating Systems (3 of 6)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
Operating Systems (4 of 6)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
Operating Systems (5 of 6)
Dialog box controls may include:
✔ Option buttons: round
buttons that present one
choice; they are also called
radio buttons.
✔ Check boxes: square boxes
that present a yes/no choice
and display a check mark or x
when selected.
✔ List boxes: lists of options
Figure 8-3: Dialog box.
that appear when you click
arrows in a dialog box; some
list boxes allow you to make
multiple selections.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Operating Systems (6 of 6)
Standard operating system functions include:
• Starting and shutting down a • Monitoring performance
computer or device • Providing file management
• Managing programs
• Updating operating system
• Managing memory software
• Coordinating task • Monitoring security
• Configuring devices • Controlling network access
• Establishing an Internet
connection
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
How an Operating System Works (1 of
6)
• The operating system is the essential software or app on your
computer or device.
• The operating system also manages interactions between hardware
and software.
• RAM is the storage location that temporarily stores open apps
and document data while a computer or device is on.
• The more RAM a device has, the more efficiently it runs.
• The operating system can allocate a portion of a storage medium,
such as a hard disk, to become virtual memory to function as
additional RAM.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
How an Operating System Works (2 of
6)
• Virtual memory allows an operating system to temporarily store
data on a storage medium until it can be “swapped” into RAM.
• The technique of swapping items between memory and storage is
called paging.
• Paging is a time-consuming process.
• Instructions used for processing data can be in the form of a
program or app, commands, or user responses.
• The information is processed into output.
• For example, a webpage typically combines text and graphics and
may include audio and video as well.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
How an Operating System Works (3 of
6)
• Most laptops and desktop
computers have the option to add
memory and storage.
• To increase the memory on a smart
phone, you can add flash memory
in the form of microSD cards.
• Users who take many high-
resolution photos and videos for
professional or personal use can
Figure 8-4: microSD
benefit from additional memory. card.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
How an Operating System Works (4 of
6)
• Input is any data and instructions
entered into the memory of a device.
• Input data and instructions can be
provided in many ways, including
interacting with your touch screen or
using a keyboard.
• Once data is in memory, the computer or
device interprets it, and the system
software executes instructions to process
the data into information.
• Instructions used for processing data can
be in the form of a program or app,
commands, or user responses. Figure 8-5: Screen displays,
• The information is processed into printers, and speakers are
output. examples of output devices
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
How an Operating System Works (5 of
6)
• A buffer is an area of memory that stores data and information
waiting to be sent to an input or output device.
• Placing data into a buffer is called spooling.
• An operating system can be single-tasking or multitasking:
✔ A single-tasking operating system allows only one program or
app to run at a time.
✔ Most operating systems today are multitasking. A multitasking
operating system allows two or more programs or apps to
reside in memory at the same time.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
How an Operating System Works (6 of
6)
• The one in the foreground is the active
program, that is, the one you are
currently using.
• The other programs running but not in
use are in the background. The
foreground program is typically
displayed on the screen, and the
background programs are hidden
partially or completely behind the
foreground program.
• In addition to managing applications, an
operating system also manages other
processes. Figure 8-6: The foreground app is
• A multiuser operating system on the screen, and the others are
enables two or more users to run in the background
programs simultaneously.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
Types of Operating Systems (1 of 11)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
Types of Operating Systems (2 of 11)
Table 8-2: Examples of
• An operating system installed on a single operating systems by
computer is called a personal Category category.
Name
computer (PC) operating system or a
Desktop Windows
desktop operating system. macOS
• Desktop operating systems are also UNIX
sometimes called stand-alone Linux
Chrome OS
operating systems or client
operating systems. Server Windows Server
macOS Server
• Certain computers and devices run only
UNIX
those operating systems designed Linux
specifically for the computer or device.
Mobile Google Android
• Examples of widely used desktop Apple iOS
operating systems include Windows, Windows (mobile edition)
Microsoft Desktop computers, laptops, Supports the Cortana virtual assistant, touchscreen input, HoloLens
Windows and some tablets headsets, and built-in apps, such as the Microsoft Edge browser
macOS Macintosh desktop computers Includes the Siri virtual assistant, coordination with Apple mobile
and laptops devices, and cloud file storage
UNIX Most computers and devices Multitasking operating system with many versions as the code is
licensed to different developers
Linux Desktop computers, laptops, Distributed under the terms of a General Public License (GPL), which
and some tablets allows you to copy the OS for your own use, to give to others, or to
sell
Chrome OS Chromebook laptops Based on Linux, uses the Google Chrome browser as its user
interface and primarily runs web apps
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Types of Operating Systems (4 of 11)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
Types of Operating Systems (5 of 11)
Windows The server version of Windows It includes advanced security tools and a set of
Server programs called Internet Information Services that
manage web apps and services
macOS Server Supports all sizes of networks and One unique feature is that it lets authorized users
servers access servers using their iPhones or other Apple
devices
UNIX A multipurpose operating system that Many web servers, which are Internet computers
can run on a desktop PC or a server that store webpages and deliver them to your
computer or device, use UNIX because it is a
powerful and flexible operating system
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Types of Operating Systems (7 of 11)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
Types of Operating Systems (9 of 11)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Ethics and Issues: Licensing an
Operating System (1 of 2)
• As new versions of the operating system are released, users often
upgrade their existing computers and mobile devices to
incorporate features of the new versions.
• The user includes continuity of service (no disruptions because you
get cut off from using the software because it is improperly licensed)
and security (you have access to the latest updates to know flaws
or bugs).
• An operating system’s automatic update feature can be configured
to alert users when an update is available or to download and install
the update automatically.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
Ethics and Issues: Licensing an
Operating System (2 of 2)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Manage Files and Folders (1 of 8)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Manage Files and Folders (2 of 8)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Manage Files and Folders (3 of 8)
• A file name should identify the content and purpose of the file, as
well as any other information, such as whether the file is a draft or
final.
• A folder can only include one file with the same name and of the
same type.
• You can have multiple files of the same type with the same name
only if they are in different folders.
• To differentiate a version of a file without overwriting the
original, you could add additional characters such as numbers, the
date, or the initials of the person who modified the file.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32
Manage Files and Folders (6 of 8)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Manage Files and Folders (7 of 8)
• A library is a special folder that catalogues specific files and folders
in a central location, regardless of where the items are actually
stored on your device.
• Libraries are helpful to find all files of a certain type, no matter
where they are located on your computer or device.
• Within your file manager, you can move, copy, and delete folders.
Moving or copying a folder affects all the contents of the folder.
• Deleting a folder moves it to the Recycle Bin or Trash folder,
where you can permanently delete it or restore it to its original
location if you change your mind.
• You can use a file manager to reorder, move, or navigate between
folders.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Manage Files and Folders (8 of 8)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Use Operating System Management
Utilities (1 of 8)
• Operating systems provide users with a variety of utilities related
to managing their computer and devices and their programs.
• An operating system controls your computer by managing its
resources.
• The operating system tracks the names and locations of files, as
well as empty storage areas where you can save new files.
• To manage RAM resources, an operating system keeps track of the
apps, processes, and other tasks the system performs.
• You can open your computer or device’s version of the task manager
to view running programs and see the percentage of RAM being
used.
• You can shut down programs and apps in the task manager to free
up RAM.Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
Use Operating System Management
Utilities (2 of 8)
Table 8-7: Operating system tools.
Tool Function
File management Performs functions related to displaying files; organizing files in folders; and copying,
renaming, deleting, moving, and sorting files
Uninstaller Removes a program or app, as well as any associated entries in the system files
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
Use Operating System Management
Utilities (3 of 8)
Table 8-7: Operating system tools. (continued)
Tool Function
Lock screen Causes a display’s screen to require the user to sign in again if no keyboard or mouse
activity occurs for a specified time
Maintenance Identifies and fixes operating system problems, detects and repairs drive problems, and
includes the capability of improving performance
Backup Copies selected files or the contents of an entire storage medium to another storage
location
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
Use Operating System Management
Utilities (4 of 8)
• Operating systems provide shut down options so that you can exit programs and terminate
processes properly.
• Some operating systems have a sleep option to use low power instead of shutting down.
• Sleep stores the current state of open programs and files, saving you time when you
resume using your device.
• A common solution for Windows desktop systems is to run a disk cleanup utility, which
finds and removes unnecessary files, such as temporary Internet files or files you have
marked for deletion.
• Monitoring Performance Operating systems typically include a performance monitor.
• A performance monitor is a program that assesses and reports information about various
computer resources and devices.
• If a computer is running extremely slowly, for example, the performance monitor may
determine that the computer’s memory is being used to its maximum.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Use Operating System Management
Utilities (5 of 8)
• Operating systems allow you to make
adjustments, such as connecting to a
network, controlling sounds, allowing or
preventing app notifications, changing
the brightness or other screen display
settings, changing the appearance of the
home screen or lock screen, applying a
theme to change the look and feel of the
operating system elements, and setting
lock screen settings.
• You can also use these utilities to
uninstall apps, add accounts, and adjust
privacy settings. Figure 8-12: Settings for an
Android smartphone
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Use Operating System Management
Utilities (6 of 8)
• The desktop contains icons for programs
and files, as well as toolbars, taskbars,
menus, and buttons you can use to start
programs and apps.
• A notification area displays the date and
time, as well as shortcuts to utilities
such as audio controls and network
connections.
• In any operating system, a window is a
rectangular-shaped work area that
Figure 8-13: macOS desktop
displays an app or a collection of files,
folders, and utilities.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41
Use Operating System Management
Utilities (7 of 8)
• You can use two types of windows on a computer’s desktop: a
program window displays a running program; a folder window
displays the contents of a folder, drive, or device.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
Use Operating System Management
Utilities (8 of 8)
• Some windows include a ribbon, toolbar,
or menu bar that contains text, icons, or
images you select to perform actions and
make selections.
• Windows can also include vertical and
horizontal scroll bars that you drag to
display contents currently out of view.
• When you have multiple windows, files,
and apps open at a time, the windows can
appear side by side or stacked.
Figure 8-14: Common window elements.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
Knowledge Check Activity 8-1
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
Knowledge Check Activity 8-1: Answer
Answer: b
Shut down
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 45
Secure IT: Securing an Operating
System (1 of 4)
• Network administrators, as well as owners of computers,
typically have an administrator account that enables them to access
all files and programs, install programs, and specify settings that
affect all users on a computer, mobile device, or network.
• Security software must run constantly to protect against new
viruses, malware, and spyware attacks.
• Security experts recommend using a firewall and configuring it to
turn on or off automatically.
• Automatic updating: Many people enjoy the convenience offered
by allowing these fixes to install automatically instead of continually
checking for new files to download.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 46
Secure IT: Securing an Operating
System (2 of 4)
• Spyware and malware detection software: Because
sophisticated spyware and malware threats are emerging at an
unparalleled rate, comprehensive spyware and malware detection
software is crucial to fend off attacks on the computer or device.
• The operating system is generally scheduled to scan and update
when the computer is idle, such as in the middle of the night.
• Permissions define who can access certain resources and when
they can access those resources.
• User accounts protect your computer against unauthorized access.
A user account includes information such as a username or ID and a
password.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
Secure IT: Securing an Operating
System (3 of 4)
• A standard user account is designed for the everyday user who
will be using the computer or device for work or recreation.
• If you want to provide someone temporary access to your computer,
you can create a secure guest account that gives access to basic
functions.
• A user account enables a user to sign into, or access resources on,
a network or computer.
• Each user account typically consists of a username and password or
PIN, but other methods, such as facial recognition, fingerprints, or a
physical security key, can be required for enhanced security.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
Secure IT: Securing an Operating
System (4 of 4)
• If the user’s information matches
their security settings, the operating
system grants the user access.
• The operating system on a network
records successful and unsuccessful
sign-in attempts in a file.
• This allows the network
administrator to review who is using
or attempting to use the computer.
The administrators also use these Figure 8-15: Adding security
files to monitor computer usage. to a user’s settings.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 49
How To: Use Virtual Machines (1 of 3)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50
How To: Use Virtual Machines (2 of 3)
The following steps describe how to set up a virtual machine:
• Obtain and install an app that creates and runs virtual machines.
• Run the app and select the option to create a new virtual machine.
• Specify the settings for the new virtual machine.
• If necessary, insert the installation media for the operating system you want to
run in the virtual machine.
• Run the virtual machine. Follow the steps to install the operating system on the
virtual machine.
• When the operating system has finished installing, remove the installation media.
• While the virtual machine is running, if desired, install any apps you want to run.
• When you are finished using the virtual machine, shut down the operating system
in the same manner you would shut down your computer.
• Exit the virtual machine software.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 51
How To: Use Virtual Machines (3 of 3)
After you set up the virtual machine, you can use the virtual machine at
any time by performing the following steps:
• Run the virtual machine software.
• Select the virtual machine you want to run.
• Click the button to run the virtual machine.
• When you are finished using the virtual machine, shut down the
operating system in a similar way to how you would shut down your
computer.
• Exit the virtual machine software.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 52
Case Study Activity (1 of 2)
Sarah Jonas is the business manager of Alpha Inc. where most of the
business transactions take place online. Sarah generally shares
confidential documents through email. She uses online payment
systems as well. Sarah is worried about the security of her confidential
documents and business information and wants to protect them
against viruses, malware, and other security attacks.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 53
Case Study Activity (2 of 2)
After reading the case study on the previous slide, answer the following
question:
How can Sarah Jonas protect her business data?
a. Set a password to protect the folder containing confidential
information
b. Not use the Internet to avoid virus attacks
c. Use a firewall, configuring it to turn on or off automatically, and also
use antivirus software
d. Use a disk cleanup utility
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 54
Case Study Activity: Answer
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 55
Summary
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 56