Full Chapter Technology in Action Rental Edition 17Th Edition Alan Evans PDF
Full Chapter Technology in Action Rental Edition 17Th Edition Alan Evans PDF
Full Chapter Technology in Action Rental Edition 17Th Edition Alan Evans PDF
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/technology-in-action-
introductory-13th-edition-alan-evans/
https://textbookfull.com/product/technology-in-action-complete-
twelfth-global-edition-kendall-e-martin/
https://textbookfull.com/product/the-17th-golden-age-of-science-
fiction-megapack-alan-e-nourse-1st-edition-nourse/
Style: Lessons in Clarity and Grace, Rental Edition,
13th Edition Williams
https://textbookfull.com/product/style-lessons-in-clarity-and-
grace-rental-edition-13th-edition-williams/
https://textbookfull.com/product/communication-making-
connections-rental-edition-11th-edition-seiler/
https://textbookfull.com/product/essential-readings-in-light-
metals-volume-4-electrode-technology-for-aluminum-production-1st-
edition-alan-tomsett/
https://textbookfull.com/product/disability-and-technology-an-
interdisciplinary-and-international-approach-1st-edition-alan-
roulstone-auth/
https://textbookfull.com/product/oxford-case-histories-in-
geriatric-medicine-1st-edition-evans/
17th Edition
Technology
in Action
Alan Evans • Kendall Martin • Mary Anne Poatsy
Content Development: Shannon Le-May Finn
Content Management: Stephanie Kiel
Content Production: Rudrani Mukherjee
Product Management: Marcus Scherer
Product Marketing: Wayne Stevens
Rights and Permissions: Jenell Forschler
Please contact https://support.pearson.com/getsupport/s/ with any queries on this content
Cover Image by © Neale Cousland/Shutterstock
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in
the documents and related graphics published as part of the services for any purpose. All such documents and
related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby
disclaim all warranties and conditions with regard to this information, including all warranties and conditions of
merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In
no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or
any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or
other tortious action, arising out of or in connection with the use or performance of information available from the
services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors.
Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make
improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen
shots may be viewed in full within the software version specified.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries.
This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation.
Copyright © 2022, 2020, 2019 by Pearson Education, Inc. or its affiliates, 221 River Street, Hoboken, NJ 07030.
All Rights Reserved. Manufactured in the United States of America. This publication is protected by copyright, and
permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system,
or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise. For
information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global
Rights and Permissions department, please visit www.pearsoned.com/permissions/.
Acknowledgments of third-party content appear on the appropriate page within the text.
PEARSON, ALWAYS LEARNING, and REVEL are exclusive trademarks owned by Pearson Education, Inc. or its
affiliates in the U.S. and/or other countries.
Unless otherwise indicated herein, any third-party trademarks, logos, or icons that may appear in this work are the
property of their respective owners, and any references to third-party trademarks, logos, icons, or other trade dress
are for demonstrative or descriptive purposes only. Such references are not intended to imply any sponsorship,
endorsement, authorization, or promotion of Pearson’s products by the owners of such marks, or any relationship
between the owner and Pearson Education, Inc., or its affiliates, authors, licensees, or distributors.
Library of Congress Cataloging-in-Publication Data
Names: Evans, Alan (Alan D.), author. | Martin, Kendall (Kendall E.),
author. | Poatsy, Mary Anne, author.
Title: Technology in action : complete / Alan Evans, Kendall Martin, Mary
Anne Poatsy.
Description: 17th edition. | [Hoboken] : Pearson, [2022] | Includes index.
Identifiers: LCCN 2020048317 | ISBN 9780136903666 (paperback) | ISBN
9780136903154
Subjects: LCSH: Microcomputers. | Computer science. | Computer networks. |
Information technology.
Classification: LCC QA76.5 .E9195 2021 | DDC 004.16–dc23
LC record available at https://lccn.loc.gov/2020048317
ScoutAutomatedPrintCode
Rental
ISBN-10: 0-13-690366-5
ISBN-13: 978-013-690366-6
Contents at a Glance
Chapter 1
The Impact of Technology in a Changing World.......................................................................... 2
Chapter 2
Looking at Computers: Understanding the Parts ..................................................................... 36
Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................................... 82
Chapter 4
Application Software: Programs That Let You Work and Play.................................................. 122
Chapter 5
System Software: The Operating System, Utility Programs, and File Management.................. 160
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System.......................................... 200
Chapter 7
Networking: Connecting Computing Devices.......................................................................... 242
Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics........................................................... 276
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices............................................ 326
Chapter 10
Behind the Scenes: Software Programming............................................................................ 372
Chapter 11
Behind the Scenes: Databases and Information Systems....................................................... 416
Chapter 12
Behind the Scenes: Networking and Security in the Business World....................................... 460
Chapter 13
Behind the Scenes: How the Internet Works........................................................................... 502
Appendix A
The History of the Personal Computer.....................................................................................A-1
Appendix B
Careers in IT............................................................................................................................B-1
Glossary................................................................................................................................. G-1
Index........................................................................................................................................ I-1
iii
Contents
Chapter 1
The Impact of Technology in a Changing World ...................................................... 2
Part 1: Technology in Society ............................................................................................................................................... 4
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national
and global issues.
Technology in a Global Society.............................................................................................................................. 4
Impact of Tools of Modern Technology................................................................................................................... 4
Objective 1.1 Describe various technological tools being used to impact national and global issues.
Global Issues ......................................................................................................................................................... 5
Objective 1.2 Describe various global social issues that are being affected by technology.
Technology Connects Us with Others................................................................................................................... 6
Technology Impacts How and Why We Connect and Collaborate .......................................................................... 6
Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others.
Technology Impacts How We Consume ................................................................................................................ 7
Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services.
The Importance of Computer Literacy.................................................................................................................. 8
Computer Literacy ................................................................................................................................................. 8
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
HELPDESK: Technology Impacts ............................................................................................................................................. 8
SOUND BYTE: Virtual Computer Tour....................................................................................................................................... 9
TRY THIS: What Does Facebook Know about You?.............................................................................................................. 11
MAKE THIS: TOOL: IFTTT.com (If This Then That) .................................................................................................................. 12
iv Contents
Ethics and Technology ......................................................................................................................................... 24
Objective 1.10 Present examples of how technology creates ethical challenges.
SOLVE THIS WITH WORD: How Technology Is Used on the World Stage and in Your Personal Life ...................................... 35
Chapter 2
Looking at Computers: Understanding the Parts.................................................... 36
Part 1: Understanding Digital Components ...................................................................................................................... 38
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer............................................................................................................................ 38
Computers Are Data Processing Devices............................................................................................................. 38
Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information.
Binary: The Language of Computers.................................................................................................................... 39
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
SOUND BYTE: Binary Numbers Interactive............................................................................................................................. 39
Types of Computers............................................................................................................................................. 41
Objective 2.3 List common types of computers, and discuss their main features.
ACTIVE HELPDESK: Understanding Bits and Bytes............................................................................................................... 41
BITS&BYTES: Today’s Supercomputers: Faster Than Ever...................................................................................................... 45
Input Devices......................................................................................................................................................... 45
Physical Keyboards and Touch Screens............................................................................................................... 45
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices.......................................................................................................................... 47
Objective 2.5 Describe the main types of mice and pointing devices.
BITS&BYTES: Foldable Glass Is Making Foldable Phones Better!............................................................................................ 48
Image, Sound, and Sensor Input.......................................................................................................................... 48
Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
Output Devices...................................................................................................................................................... 50
Image and Audio Output...................................................................................................................................... 50
Objective 2.7 Describe options for outputting images and audio from computing devices.
BITS&BYTES: Teraflops in Your Living Room: Gaming on Overdrive........................................................................................ 52
Printers................................................................................................................................................................. 53
Objective 2.8 Describe various types of printers, and explain when you would use them.
BITS&BYTES: CPUs That Fight Back...................................................................................................................................... 55
TRY THIS: What’s Inside My Computer?............................................................................................................................... 57
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................... 58
Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................ 82
Part 1: Collaborating and Working on the Web ................................................................................................................. 84
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works ........................................................................................................................... 84
The Origin of the Internet...................................................................................................................................... 84
Objective 3.1 Describe how the Internet got its start.
How the Internet Works........................................................................................................................................ 86
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web ................................................................................................. 87
Collaborating with Web Technologies................................................................................................................... 87
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Social Media Influencers................................................................................................................................... 89
SOUND BYTE: Blogging......................................................................................................................................................... 90
Communicating over the Web.............................................................................................................................. 91
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web........................................................................................................................ 93
Being Productive with Cloud Technologies........................................................................................................... 94
Objective 3.5 Describe how cloud technologies are used to create, store, and share files.
DIG DEEPER: Artificial Intelligence and Cloud Computing....................................................................................................... 95
Conducting Business Online ................................................................................................................................ 95
Objective 3.6 Describe how business is conducted using the Internet.
BITS&BYTES: Looking for Extra Money? Try a Side Hustle ..................................................................................................... 96
E-Commerce Safeguards..................................................................................................................................... 96
Objective 3.7 Summarize precautions you should take when doing business online.
HELPDESK: Doing Business Online........................................................................................................................................ 96
BITS&BYTES: Bitcoin: A Form of Virtual Currency................................................................................................................... 97
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud..................................................................................... 99
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 100
vi Contents
Objective 3.9 Explain what a URL is and discuss its main parts.
Navigating the Web............................................................................................................................................ 104
Objective 3.10 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web ............................................................................................. 105
Searching the Web Effectively ........................................................................................................................... 106
Using Search Engines........................................................................................................................................ 106
Objective 3.11 Describe the types of tools used to search the web and summarize strategies
used to refine search results.
SOUND BYTE: Finding Information on the Web .................................................................................................................... 108
Evaluating Websites .......................................................................................................................................... 108
Objective 3.12 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
HELPDESK: Evaluating Websites.......................................................................................................................................... 108
TRENDS IN IT: Linked Data and the Semantic Web.............................................................................................................. 109
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?............................................................ 110
Using the Web Ethically...................................................................................................................................... 110
Deepfakes ......................................................................................................................................................... 110
Objective 3.13 Demonstrate an understanding of Internet-related ethical issues such as deepfakes.
Personalized Marketing ...................................................................................................................................... 111
Objective 3.14 Demonstrate an understanding of Internet-related ethical issues such as personalized marketing.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare?.................................................................. 112
ETHICS IN IT: Cyber Harassment......................................................................................................................................... 113
SOLVE THIS WITH WORD: Create a Report: Conducting Research on the Web ................................................................. 121
Chapter 4
Application Software: Programs That Let You Work and Play.............................. 122
Part 1: Accessing, Using, and Managing Software ......................................................................................................... 124
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how best
to manage your software.
Software Basics .................................................................................................................................................. 124
Application vs. System Software ........................................................................................................................ 124
Objective 4.1 Compare application software and system software.
Distributing Software ......................................................................................................................................... 124
Objective 4.2 Explain the differences between commercial software and open source software and describe models for
software distribution.
BITS&BYTES: Portable Apps ............................................................................................................................................... 125
Managing Your Software ................................................................................................................................... 125
Purchasing Software.......................................................................................................................................... 125
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Artificial Intelligence in Health Care ............................................................................................................... 126
HELPDESK: Buying and Installing Software .......................................................................................................................... 127
Installing and Uninstalling Software .................................................................................................................... 127
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of Bloat .................................................................................................................... 127
Upgrading Software .......................................................................................................................................... 128
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work.......................................................................................................................... 128
Software Licenses ............................................................................................................................................. 129
Objective 4.6 Explain how software licenses function.
SOUND BYTE: Where Does Binary Show Up? ..................................................................................................................... 129
Contents vii
ETHICS IN IT: Can I Use Software on My Device When I Don’t Own the License?................................................................ 131
TRY THIS: Citing Website Sources...................................................................................................................................... 133
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 134
Chapter 5
System Software: The Operating System, Utility Programs,
and File Management............................................................................................. 160
Part 1: Understanding System Software ......................................................................................................................... 162
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain
the steps in the boot process.
Operating System Fundamentals ...................................................................................................................... 162
Operating System Basics................................................................................................................................... 162
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use ................................................................................................................. 162
Objective 5.2 Explain the most popular operating systems for personal use.
BITS&BYTES: Quick Assist................................................................................................................................................... 164
BITS&BYTES: Operating Systems for the Smart Home......................................................................................................... 164
Operating Systems for Machinery, Networks, and Business............................................................................... 165
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows? ..................................................................................... 166
What the Operating System Does ..................................................................................................................... 167
The User Interface.............................................................................................................................................. 168
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination ..................................................................................................................................... 168
viii Contents
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage,
and peripheral devices.
SOUND BYTE: Using Windows Task Manager to Evaluate System Performance................................................................... 168
Software Application Coordination ..................................................................................................................... 171
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human?....................................................................................... 171
Starting Your Computer...................................................................................................................................... 172
The Boot Process .............................................................................................................................................. 172
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the
boot process are handled.
HELPDESK: Starting the Computer: The Boot Process ........................................................................................................ 173
TRY THIS: Using Virtual Desktops in Windows 10............................................................................................................... 176
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 177
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System..................... 200
Part 1: Evaluating Key Subsystems ................................................................................................................................. 202
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including
the CPU and memory subsystems.
Your Ideal Computing Device ............................................................................................................................ 202
Moore’s Law...................................................................................................................................................... 202
Objective 6. 1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device ........................................................................................................................... 203
Objective 6. 2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem ......................................................................................................................... 205
How the CPU Works.......................................................................................................................................... 205
Objective 6. 3 Describe how a CPU is designed and how it operates.
Measuring CPU Performance............................................................................................................................. 208
Objective 6. 4 Describe tools used to measure and evaluate CPU performance.
BITS&BYTES: Liquid Cooling................................................................................................................................................ 209
Contents ix
Evaluating the Memory Subsystem................................................................................................................... 211
Random Access Memory................................................................................................................................... 211
Objective 6.5 Discuss how RAM is used in a computer system.
HELPDESK: Evaluating Your CPU and RAM ......................................................................................................................... 213
Adding RAM ...................................................................................................................................................... 213
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
SOUND BYTE: Installing RAM............................................................................................................................................... 213
BITS&BYTES: Telepresence Robots Coming to a Workplace Near You ................................................................................ 214
TRY THIS: Measure Your System Performance ................................................................................................................... 216
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 217
Chapter 7
Networking: Connecting Computing Devices ....................................................... 242
Part 1: How Networks Function ....................................................................................................................................... 244
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to create a
network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals ................................................................................................................................. 244
Understanding Networks.................................................................................................................................... 244
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking ............................................................................................................................... 246
Network Architectures ....................................................................................................................................... 246
x Contents
Network Designs ............................................................................................................................................... 246
Objective 7.2 Explain the different ways networks are defined.
DIG DEEPER: P2P File Sharing ............................................................................................................................................ 249
BITS&BYTES: Watch Out for Wi-Fi 6E .................................................................................................................................. 250
Network Components ........................................................................................................................................ 250
Transmission Media............................................................................................................................................ 250
Objective 7.3 Describe the types of transmission media used in networks.
Basic Network Hardware ................................................................................................................................... 252
Objective 7.4 Describe the basic hardware devices necessary for networks.
SOUND BYTE: Installing a Home Computer Network ........................................................................................................... 253
Network Software .............................................................................................................................................. 253
Objective 7.5 Describe the type of software necessary for networks.
Connecting to the Internet ................................................................................................................................. 253
Broadband Internet Connections ....................................................................................................................... 253
Objective 7.6 Summarize the broadband options available to access the Internet.
BITS&BYTES: Who’s Not on Broadband? ............................................................................................................................ 255
Wireless Internet Access ................................................................................................................................... 255
Objective 7.7 Summarize how to access the Internet wirelessly.
BITS&BYTES: Net Neutrality ................................................................................................................................................ 256
TRY THIS: Testing Your Internet Connection Speed ............................................................................................................ 258
MAKE THIS: TOOL: Ping and Telnet ..................................................................................................................................... 259
Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics....................................... 276
Part 1: The Impact of Digital Information ....................................................................................................................... 278
Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technology is used
to produce and distribute digital texts, music, and video; and the challenges in managing a digital lifestyle.
Digital Basics....................................................................................................................................................... 278
Contents xi
Digital Convergence and the Internet of Things .................................................................................................. 278
Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
Digital versus Analog ......................................................................................................................................... 280
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing ................................................................................................................................................ 282
E-readers........................................................................................................................................................... 282
Objective 8.3 Describe the different types of e-readers.
HELPDESK: Managing Digital Media .................................................................................................................................... 283
Using e-Texts ..................................................................................................................................................... 283
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
Digital Music........................................................................................................................................................ 284
Creating and Storing Digital Music ..................................................................................................................... 284
Objective 8.5 Describe how digital music is created and stored.
Distributing Digital Music.................................................................................................................................... 286
Objective 8.6 Summarize how to listen to and publish digital music.
Digital Media........................................................................................................................................................ 287
Digital Photography............................................................................................................................................ 287
Objective 8.7 Explain how best to create, print, and share digital photos.
SOUND BYTE: Enhancing Photos with Image-Editing Software............................................................................................ 288
Digital Video....................................................................................................................................................... 288
Objective 8.8 Describe how to create, edit, and distribute digital video.
BITS&BYTES: Professional Video-Editing Tools . . . For Free! ................................................................................................. 291
TRENDS IN IT: Digital Asset Managers Needed!................................................................................................................... 292
Managing Your Digital Lifestyle ......................................................................................................................... 293
Digital Challenges and Dilemmas ....................................................................................................................... 293
Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
DIG DEEPER: Deep Web versus Dark Web: Are There Places You Shouldn’t Go? ............................................................... 295
BITS&BYTES: Goodbye Net Neutrality . . . Hello Bandwidth Throttling................................................................................... 297
TRY THIS: Creating and Publishing a Movie........................................................................................................................ 299
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 300
xii Contents
BITS&BYTES: Celebrity Photographic Rights........................................................................................................................ 317
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do................................................................................... 318
SOLVE THIS WITH POWERPOINT: Intellectual Property and Copyright Basics .................................................................. 325
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices........................ 326
Part 1: Threats to Your Digital Assets .............................................................................................................................. 328
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers................................................................................................................................. 328
Identity Theft...................................................................................................................................................... 329
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
Hacking ............................................................................................................................................................. 329
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Next Generation White Hat Hackers .............................................................................................................. 330
Computer Viruses ............................................................................................................................................... 333
Virus Basics ....................................................................................................................................................... 333
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches
a virus, and the symptoms it may display.
SOUND BYTE: Protecting Your Computer ............................................................................................................................ 334
Types of Viruses ................................................................................................................................................ 335
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering..................................................................................................... 336
Online Annoyances ............................................................................................................................................ 336
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering ............................................................................................................................................. 340
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter . . . Now What?............................................................................................. 340
ETHICS IN IT: Working from Home . . . and Being Watched from Home................................................................................ 341
Ransomware and Scareware ............................................................................................................................. 342
HELPDESK: Threats to Your Digital Life ................................................................................................................................ 342
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches ................................................................................................ 343
TRY THIS: Testing Your Network Security............................................................................................................................ 345
MAKE THIS: App Inventor 2 or Thunkable ............................................................................................................................ 346
Contents xiii
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords! ........................................................................ 356
Keeping Your Data Safe...................................................................................................................................... 356
Protecting Your Personal Information.................................................................................................................. 356
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools........................................................................................ 357
Backing Up Your Data........................................................................................................................................ 357
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain
the various places you can store backup files.
Protecting Your Physical Computing Assets ................................................................................................... 360
Environmental Factors and Power Surges .......................................................................................................... 360
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft ........................................................................................................................... 361
Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems.
DIG DEEPER: Digital Forensics: How It Works...................................................................................................................... 363
SOLVE THIS WITH WORD: Computer Security ................................................................................................................... 371
Chapter 10
Behind the Scenes: Software Programming ......................................................... 372
Part 1: Understanding Programming .............................................................................................................................. 374
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages
in the program development life cycle.
Life Cycle of an Information System ................................................................................................................. 374
The Importance of Programming........................................................................................................................ 374
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle......................................................................................................................... 374
Objective 10.2 Summarize the stages of the system development life cycle.
BITS&BYTES: The Agile Scrum ............................................................................................................................................ 376
Life Cycle of a Program ...................................................................................................................................... 376
The Program Development Life Cycle ................................................................................................................ 376
Objective 10.3 Define programming and list the steps in the program development life cycle.
The Problem Statement ..................................................................................................................................... 377
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller ................................................................................................................. 377
HELPDESK: Understanding Software Programming ............................................................................................................. 378
Algorithm Development...................................................................................................................................... 379
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Build a Coding Portfolio ................................................................................................................................. 382
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operators................... 384
Coding............................................................................................................................................................... 385
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment in coding.
Debugging......................................................................................................................................................... 391
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Coding with a Purpose .................................................................................................................................. 392
Testing and Documentation ............................................................................................................................... 392
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona ................................................................................................................................. 394
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 395
xiv Contents
Part 2: Programming Languages....................................................................................................................................... 396
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages......................................................................................................................... 396
Need for Diverse Languages.............................................................................................................................. 396
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language ................................................................................................ 396
Selecting the Right Language ............................................................................................................................ 397
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Learn Programming with Patch Cords............................................................................................................ 397
ETHICS IN IT: When Software Runs Awry............................................................................................................................. 398
Exploring Programming Languages.................................................................................................................. 399
Tour of Modern Languages ................................................................................................................................ 399
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Repl.It............................................................................................................................................................ 400
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools.................................................................. 407
Future of Programming Languages .................................................................................................................... 407
Objective 10.12 State key principles in the development of future programming languages.
HELPDESK: A Variety of Programming Languages ............................................................................................................... 408
SOLVE THIS WITH EXCEL: Time Sheets ............................................................................................................................ 415
Chapter 11
Behind the Scenes: Databases and Information Systems.................................... 416
Part 1: Database Fundamentals ....................................................................................................................................... 418
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types
of databases and the functions and components of relational databases in particular.
The Need for Databases..................................................................................................................................... 418
Database Basics................................................................................................................................................ 418
Objective 11.1 Explain what a database is and why databases are useful.
Database Types................................................................................................................................................... 420
Flat Databases................................................................................................................................................... 420
Objective 11.2 Describe features of flat databases.
Relational Databases ......................................................................................................................................... 422
Objective 11.3 Describe features of relational databases.
BITS&BYTES: Normal Forms................................................................................................................................................ 423
HELPDESK: Using Databases .............................................................................................................................................. 423
Object-Oriented Databases ............................................................................................................................... 423
Objective 11.4 Describe features of object-oriented databases.
Multidimensional Databases............................................................................................................................... 423
Objective 11.5 Describe features of multidimensional databases.
BITS&BYTES: Use a Graph Database to Track Social Network Data .................................................................................... 424
NoSQL Databases............................................................................................................................................. 424
Objective 11.6 Describe how dynamic, web-created data is managed in a database.
Using Databases ................................................................................................................................................. 425
Relational Database Components and Functions ............................................................................................... 425
Objective 11.7 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................................. 428
BITS&BYTES: Music Streaming Services Use Databases ..................................................................................................... 429
Contents xv
Inputting and Managing Data ............................................................................................................................. 429
Objective 11.8 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL) ................................................................................................................. 434
BITS&BYTES: Data Dashboards: Useful Visualization Tools .................................................................................................. 436
TRY THIS: Using Excel’s Database Functions ..................................................................................................................... 438
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 439
Chapter 12
Behind the Scenes: Networking and Security in the Business World.................. 460
Part 1: Client/Server Networks and Topologies .............................................................................................................. 462
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found
on them, and network topologies used to construct them.
Client/Server Network Basics............................................................................................................................ 462
Networking Advantages..................................................................................................................................... 462
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks......................................................................................... 463
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks ........................................................................................................................ 464
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Make Your Browser Protect You! ................................................................................................................... 467
Servers and Network Topologies ...................................................................................................................... 468
Servers .............................................................................................................................................................. 468
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers ................................................................................................................................................... 469
TRENDS IN IT: Protecting Privacy in Your Home Office......................................................................................................... 471
Network Topologies ........................................................................................................................................... 471
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
xvi Contents
SOUND BYTE: Network Topology and Navigation Devices ................................................................................................... 474
TRY THIS: Sharing Printers on a Network Using Windows .................................................................................................. 478
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 479
Chapter 13
Behind the Scenes: How the Internet Works......................................................... 502
Part 1: Inner Workings of the Internet ............................................................................................................................ 504
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data
is transmitted across the Internet.
Internet Management and Networking ............................................................................................................. 504
Management ..................................................................................................................................................... 504
Objective 13.1 Describe the management of the Internet.
Networking Components ................................................................................................................................... 505
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission.............................................................................................................................................. 506
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You ............................................................................................................... 506
BITS&BYTES: Packet Analysis ............................................................................................................................................. 508
Internet Identity ................................................................................................................................................... 509
IP Addresses ..................................................................................................................................................... 509
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
Contents xvii
BITS&BYTES: What’s Your IP Address? ............................................................................................................................... 510
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols ........................................................................... 510
BITS&BYTES: Amazing Applications of IoT........................................................................................................................... 510
SOUND BYTE: Creating Web Pages with Squarespace ....................................................................................................... 511
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols.................................................................................. 512
Domain Names.................................................................................................................................................. 513
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
TRY THIS: Ping Me............................................................................................................................................................. 517
MAKE THIS: TOOL: App Inventor 2 or Thunkable ................................................................................................................. 518
Appendix A
The History of the Personal Computer .................................................................. A-1
Appendix B
Careers in IT.............................................................................................................B-1
Glossary........................................................................................................................................................................ G-1
Index............................................................................................................................................................................... I-1
xviii Contents
Learn Technology by Using
Technology in Action 17e
Technology in Action continues to be the best-selling title because it delivers an engaging approach to teaching the topics and skills
students need to be digitally literate. The text provides an engaging approach to learning computer concepts in which students learn by
using practical content, hands-on projects, and interactive activities.
To ensure every type of learner and instructor can choose the approach that best fits their style, Technology in Action is available in
three formats:
1. Print Rental for Technology in Action: For courses focused on a more traditional, instructor-led approach, the
print title is available as a rental option. The instructor resources provide everything needed to teach an in-person
or online class in which students read the text and perform objective-based testing.
2. MyLab IT for Technology in Action: For courses that teach computer concepts and Microsoft Office skills, us-
ing the MyLab IT option is the right choice. This option provides students and instructors with an interactive etext
and assignable activities that assess students’ understanding in a variety of ways. By combining trusted author
content with digital tools and a flexible platform, MyLab IT personalizes the learning experience and helps stu-
dents absorb and retain key course concepts while developing skills that employers seek. All of the instruction,
practice, review, and assessment resources are in one place, allowing instructors to arrange their course from
an instructional perspective that gives students a consistent and measurable learning experience from chapter to
chapter. New to this edition are Prebuilt Learning Modules that allow instructors to quickly assign author curated
content in every chapter for quick course set up.
3. Revel Technology in Action: For courses focused on computer concepts only, Revel is an excellent, fully digital
experience in which students read, practice, and study in one continuous experience. Students read a little and
then interact with the content through videos, Check Your Understanding self-check questions, and a variety of
interactives. Revel prepares students for meaningful class participation and provides the skills they need to be
digitally literate in the workplace and their everyday lives. Revel replaces the traditional textbook by presenting an
affordable, seamless blend of author-created digital text, media (videos, Helpdesks, Sound Bytes, and IT Simula-
tions), and assessments based on learning science.
As with previous editions, we have thoroughly reviewed and updated the 17th edition to ensure coverage of the latest in technology.
We have included topics such as Ransomware as a Service, CPUs that fight back against malware, and bandwidth throttling, as well
as new Dig Deeper articles such as “Building Your Own Gaming Computer.”
We made these updates with the instructor in mind—just know the content is timely and check out the transition guide, which pro-
vides the specifics on what we have updated or changed. We have retained popular 16e features, including the web-based survey
activities that encourage students to engage with their peers and develop critical thinking skills through the What Do You Think?
questions. These activities, along with the Tech in the News updates at the beginning of each chapter in the etext or Revel, videos,
interactive Helpdesk activities, Sound Byte lessons, IT Simulations, and a variety of hands-on projects all help students learn the con-
cepts and skills they need in order to be digitally literate in today’s workplace. And, if they are using MyLab IT, they can earn the Digital
Competency badge to demonstrate their skills to potential employers.
Hallmarks
• Engaging question-and-answer writing style that • Hands-on learning with projects throughout each
approaches topics as students do. chapter:
• Ethics coverage throughout, including in end-of-chapter • Try This projects allow students to practice and
activities, Point/Counterpoint ethical debate content found demonstrate their proficiency with important topics. In
in relevant chapters, and a Sound Byte lesson on how to MyLab IT and Revel, how-to videos accompany each
discuss and debate ethical issues. project.
What’s New?
• For the MyLab IT version, Prebuilt Learning Modules Chapter 1:
have been created by the authors for each chapter. These • We have added a new Bits&Bytes showing hands-on tools
will help instructors quickly set up their course to cover a to let students explore AI applications in natural language
range of resources to provide effective learning and processing and vision recognition.
assessment of the concepts. The modules are especially
• We have added a new Bits&Bytes taking students into the
helpful when teaching fully online.
world of machine learning through sound synthesis.
• Key terms have been scaled back by eliminating terms
• We have added a new discussion of digital forensics.
that the majority of today’s students reported they already
knew. • We have added material focused on the challenges and
successes of technology when faced with the global
• The Technology in the News widget helps instructors
COVID-19 pandemic.
keep their class current with weekly technology news. This
currency widget is included in the in the MyLab IT • We have added an ethics discussion on the impact of
interactive etext and Revel versions of Technology in Action COVID-19 on the social equity issue of the digital divide.
throughout the semester. • We have added a presentation on how to donate CPU time
• Images and quizzes have been updated throughout. to the @home effort for vaccine discovery.
• Team Time exercises have been updated and designed Chapter 2:
for working in online environments like Microsoft Teams or • We have streamlined the key terms to eliminate terms most
Zoom. students already know.
• We have added a new Dig Deeper: Building Your Own
Summary of Chapter Updates Gaming Computer.
All chapter Learning Outcomes and Learning Objectives have • We have removed the Dig Deeper: How Touch Screens Work.
been revised as needed and throughout the text, figures and
• We have added a new Bits&Bytes: Foldable Glass Is
photos have been updated with new images, current topics,
Making Foldable Phones Better!
and state-of-the art technology coverage.
• We have replaced the Digital Activism and Geolocation • We have revised the sections on Digital Photography and
ethics topics with Deepfakes and Personalized Marketing. Digital Video to be more phone camera centric.
• We have added a new Bits&Bytes: Professional Video
Chapter 4:
Editing Tools . . . For Free!
• We have added a new Bits&Bytes: Portable Apps, which
• We have removed the Bits&Bytes: The Rise of Wearable
replaces the Bits&Bytes: Finding Alternative Software.
Technology.
• We have added a new Trends In IT: Artificial Intelligence in
• We have added information on wearables into the body of
Healthcare, which replaces Mobile Payment Apps: The
the text.
Power of M-Commerce.
• We have updated Ethics: Can I Use Software on my Device Chapter 9:
When I Don’t Own the License? • We have added discussion of ransomware and examples of
• We have added new content about Microsoft Teams to the its occurrence during the COVID-19 pandemic.
Productivity Software section. • We have added a new key term, Ransomware as a Service.
• We have moved the Bits&Bytes: Need to Work as a Team? • We have added a new focus on employee monitoring
Try These Collaboration Tools content into the body of the software with emphasis as more employees are sent home
text. to telecommute.
• We have added a new Bits&Bytes: PDF: The Universal File • We have updated references to operating system tools for
Format. security.
• We have added a new Bits&Bytes: Scalable Vector • We have added a coverage of new identity theft scams like
Graphics: Text-Based Images. using caller ID to pose as government agencies.
How Technology Is Used on the World Stage and in Your Personal Life
You will use the following skills as you complete this activity:
Microsoft 365
2. Double-click the Title placeholder, type Technology, and then double-click the Heading 1 placeholder and type
Introduction. Press Enter and then type the following: Political and global issues are showing that technology is ac-
3. Type How Technology Impacts Society, press Enter, and then type a few sentences that describe how technology is
skills.
impacting global events such as political revolutions, health care, the environment, and the digital divide. In addition, ad-
dress how businesses are using social media. Press Enter.
interactive learning experience, where students 4. Type How Technology Impacts Me Personally and Professionally, press Enter, and then type a few sentences that de-
scribe how technology is impacting your personal life. You should address the importance of being computer literate. You
should also address the kinds of technology being used in the industry of your current or desired career.
5. Click anywhere in the heading Introduction. With Format Painter, apply the Heading 1 format to the paragraph headers:
with Helpdesk activities, Sound Bytes, IT Simula- 7. Select the title Technology and then format the font as Small caps. Center align the title.
Hint: Click the dialog box launcher in the Font group on the Home tab to access the Small caps font effect.
8. Apply the Whisp header style to the document. Click to add Today’s date in the Date header and delete the Document
Accessible PowerPoint Presentation PowerPoints meet accessibility standards for students with
disabilities. Features include, but are not limited to:
• Keyboard and Screen Reader Access
• Alternative Text for Images
• High Color Contrast between Background and Foreground Colors
Audio PowerPoint Presentation This is a full audio version of the Accessible presentation.
End-of-Chapter Answer Key, Check Your Understanding Answers to all end-of-chapter questions.
Answer Key, Chapter Quiz Answer Key
Image Library Every image in the book.
Make This Projects Activities where students build programs that run on their mobile
devices. Each project includes instructions and a how-to video.
Solve This Projects Real-world problem solving using Microsoft 365 programs. Grader
versions of most of these projects are in MyLab IT.
Test Bank (Textbook, Helpdesk, Sound Bytes) Over 1,000 multiple-choice, true/false, short-answer, and
matching questions with these annotations:
• Difficulty level (1 for straight recall, 2 for some analysis, 3 for
complex analysis)
• Objective, which provides location in the text
Provided for:
• Textbook
• Helpdesk
• Sound Byte
Transition Guide Detailed explanation of changes between the previous and current
edition.
Web Projects Discussion questions and additional projects that can be done on
the Internet.