Home > Computing and Information Technology > Computer science > Technology In Action, Complete
Technology In Action, Complete

Technology In Action, Complete

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Never HIGHLIGHT a Book Again! Includes all testable terms, concepts, persons, places, and events. Cram101 Just the FACTS101 studyguides gives all of the outlines, highlights, and quizzes for your textbook with optional online comprehensive practice tests. Only Cram101 is Textbook Specific. Accompanies: 9780132253567. This item is printed on demand.

Table of Contents:
CHAPTER 1 Why Computers Matter to You: Becoming Computer Fluent     Becoming a Savvy Computer User and Consumer      Being Prepared for Your Career     Being Prepared for Your Career         Computers in Business: Working in a Data Mine?   Computers in Retail: Let Me Look That Up for You          Computers in Shipping: UPS Data on the Go          Computers in Ranching and Farming: High Tech Down on the Farm          Computers in the Arts: Shall We Dance?          Computers in the Medical Field: Fact or Science Fiction?           Computers in Law Enforcement:          Put Down That Mouse–You’re Under Arrest!           Computers in the Legal Fields: Welcome to the Virtual Courtroom           Computers in Education: And on the Left, You See the Mona Lisa          Computers and the Sciences: Programming the Perfect Storm           Computers in Sports: Bend Your Elbow Another Two Degrees?          Computer Gaming Careers: Now Bigger Than Hollywood!          Computers at Home: Just Program It and Forget It        Getting Ready for the Technology of Tomorrow           Nanoscience: The Next “Big” Thing            Biomedical Chip Implants: Combining Humans with Machines?           Artificial Intelligence: Will Computers Become Human?     Understanding the Challenges Facing a Digital Society         TRENDS IN IT: Ehics: Knowledge Is Power: Bridging the Digital Divide        Becoming Computer Fluent          Computers Are Data Processing Devices            Bits and Bytes: The Language of Computers          Computer Hardware           Computer Software           Computer Platforms: PCs and MACs          Specialty Computers           DIG DEEPER: What Can You Do with a Digital Home?        CHAPTER 2  Looking at Computers:  Understanding the Parts     Your Computer’s Hardware      Input Devices          Keyboards            Mice and Other Pointing Devices          Sound Input            Input Devices for Physically Challenged Individuals      Output Devices          Monitors            Printers           DIG DEEPER: How Inkjet and Laser Printers Work           Sound Output       The System Unit          On the Front Panel            On the Back           Inside the System Unit      Setting It All Up         TRENDS IN IT: Emerging Technologies: Tomorrow’s           Display–You Can Take It with You!   TECHNOLOGY IN FOCUS     Careers in IT   CHAPTER 3 Using the Internet: Making the Most of the Web’s Resources     The Internet      Communicating Through the Internet: E-Mail and Other Technologies          Instant Messaging            Voice over Internet Protocol (VoIP)           Weblogs (blogs) and Video Logs (vlogs)           Podcasts          Webcasts           Wikis           E-Mail           Chat Rooms           Newsgroups          Listservs     Web Entertainment: Multimedia and Beyond         TRENDS IN IT: Social Networking       Conducting Business over the Internet: E-Commerce          E-Commerce Safeguards      Managing Online Annoyances          Spam            Cookies           Adware           Spyware          Malware          Phishing and Internet Hoaxes      Navigating the Web: Web Browsers      Getting Around the Web: URLs, Hyperlinks, and Other Tools         URLs          Hyperlinks and Beyond          Favorites and Bookmarks           Tabbed Browsing          TRENDS IN IT: Ethics: What Can You Borrow from the Internet?      Searching the Web: Search Engines and Subject Directories          Search Engines          DIG DEEPER: Refining Your Web Searches: Boolean Operators           Subject Directories           Evaluating Web Sites        Internet Basics         The Internet’s Clients and Servers          Connecting to the Internet          Broadband Connections          Dial-Up Connections           Choosing the Right Internet Connection Option      Finding an Internet Service Provider         Choosing an ISP       The Origin of the Internet         The Web Versus the Internet     The Future of the Internet   CHAPTER 4  Application Software: Programs That Let You Work and Play      The Nuts and Bolts of Software      More Productivity at Home         Word-Processing Software          Spreadsheet Software           Presentation Software          Database Software           Personal Information Manager (PIM) Software           Productivity Software Tools           Integrated Software Applications Versus Software Suites          DIG DEEPER: Speech-Recognition Software          Personal Financial Software       More Media at Home          Digital Image-Editing Software            Digital Audio Software           Digital Video-Editing Software          Media Management Software      More Fun at Home          Gaming Software            Educational Software            Reference Software           Drawing Software       Business Software         Home Business Software        Large-Business Software          TRENDS IN IT: Emerging Technologies: Is It Real or Is It Virtual?          Specialized Business Software      Getting Help with Software      Buying Software          Standard Software            Web-Based Application Software           Discounted Software           Freeware and Shareware           Software Versions and Systems Requirements     Installing/Uninstalling and Opening Software          TRENDS IN IT: Ethics: Can I Borrow Software That I Don’t Own? TECHNOLOGY IN FOCUS     Digital Entertainment   CHAPTER 5  Using System Software: The Operating System, Utility Programs, and File Management      System Software Basics      Operating System Categories          Real-Time Operating Systems            Single-User Operating Systems            Multiuser Operating Systems       Desktop Operating Systems         Microsoft Windows            Mac OS      Unix          Linux            TRENDS IN IT: Emerging Technologies: Open-Source Software:          Why Isn’t Everyone Using Linux?       What the Operating System Does          The User Interface            Processor Management           Memory and Storage Management          Hardware and Peripheral Device Management          Software Application Coordination       The Boot Process: Starting Your Computer          Step 1 : Activating BIOS          Step 2 : Performing the Power-On Self-Test         Step 3 : Loading the Operating System         Step 4 : Checking Further Configurations and Customizations          Handling Errors in the Boot Process      The Desktop and Windows Features      Organizing Your Computer: File Management         Organizing Your Files          Viewing and Sorting Files and Folders          Naming Files          Working with Files      Utility Programs          Display Utilities          The Add or Remove Programs Utility           File Compression Utilities           System Maintenance Utilities          DIG DEEPER: How Disk Defragmenter Utilities Work           System Restore and Backup Utilities           The Task Scheduler Utility          Accessibility Utilities    CHAPTER 6  Understanding and Assessing Hardware:  Evaluating Your System      Is It the Computer or Me?     What Is Your Ideal Computer?      Assessing Your Hardware: Evaluating Your System      Evaluating the CPU Subsystem         Analyzing Your CPU        Evaluating RAM: The Memory Subsystem          Virtual Memory          Adding RAM        Evaluating the Storage Subsystem          The Hard Disk Drive           DIG DEEPER: How a Hard Disk Drive Works         Portable Storage Options: The Floppy and Beyond           Upgrading Your Storage Subsystem       Evaluating the Video Subsystem          Video Cards           TRENDS IN IT: Ethics: CD and DVD Technology: A Free Lunch—Or at          Least a Free Copy           Monitors       Evaluating the Audio Subsystem         Speakers            Sound Cards      Evaluating Port Connectivity         Adding Ports: Expansion Cards and Hubs       Evaluating System Reliability         TRENDS IN IT: Computers in Society: How to Donate Your Old          Computer Safely       Making the Final Decision TECHNOLOGY IN FOCUS     Computing Alternatives   CHAPTER 7  Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses      Networking Fundamentals      Network Architectures          Describing Networks Based on Network Control            Describing Networks Based on Distance        Network Components          Transmission Media          Network Adapters           Network Navigation Devices          Networking Software       Types of Peer-to-Peer Networks          Wired Ethernet Networks          Ethernet Switches          Ethernet Routers          Wireless Ethernet Networks           Power-Line Networks           Phoneline Networks      Choosing a Peer-to-Peer Network     Configuring Software for Your Home Network         TRENDS IN IT: Emerging Technologies: Grid Computing: Aiding Scientific          Research with Your Computer       Keeping Your Home Computer Safe      Computer Threats: Hackers          What Hackers Steal          Trojan Horses         Denial of Service Attacks           How Hackers Gain Access          TRENDS IN IT: Computers in Society: Identity Theft: Is There More           Than One You Out There?      Computer Safeguards: Firewalls          Types of Firewalls           Is  Your Computer Secure?      Securing Wireless Networks         DIG DEEPER: How Firewalls Work      Computer Threats: Computer Viruses          Types of Viruses            Virus Classifications       Computer Safeguards: Antivirus Software          Other Security Measures          TRENDS IN IT: Careers: Cybercops on the Beat: Computer Security Careers    CHAPTER 8  Mobile Computing: Keeping Your Data on Hand      Mobile Computing: Is It Right for You?         Mobile Device Limitations       Mobile Computing Devices      Cellular Phones          Cell Phone Hardware            How Cell Phones Work           Cell Phone Features: Text Messaging          Cell Phone Internet Connectivity       Portable Media Players          PMP Hardware          PMP Flash Memory and File Transfer           PMP Ethical Issues: Napster and Beyond       Personal Digital Assistants (PDAs)         TRENDS IN IT: Emerging Technologies: Why Carry Your Data When          You Can Wear It?           PDA Hardware          PDA Operating Systems           PDA Memory and Storage          PDA File Transfer and Synchronization           PDA Internet Connectivity           PDA Software and Accessories           PDA or Cell Phone?       Tablet PCs          DIG DEEPER: The Power of GPS            Tablet PC Hardware           Tablet Software           Tablet or PDA?       Notebooks          Notebook Hardware          TRENDS IN IT: Ubiquitous Networking: Wherever You Go, There You Are          Notebook Operating Systems and Ports           Notebook Batteries and Accessories           Notebook or Desktop?           TRENDS IN IT: Emerging Technologies: Nanotubes:          The Next Big Thing Is Pretty Darn Small!  TECHNOLOGY IN FOCUS     Protecting Your Computer and Backing Up Your Data   CHAPTER 9  Behind the Scenes: A Closer Look at System Hardware      Digital Data: Switches and Bits          Electrical Switches            The Binary Number System           DIG DEEPER: Advanced Binary and Hexadecimal Notations      The CPU: Processing Digital Information          The CPU Machine Cycle           Stage 1 : The Fetch Stage         Stage 2 : The Decode Stage         Stage 3 : The Execute Stage         Stage 4 : The Store Stage         TRENDS IN IT: Emerging Technologies: Printable Processors:         The Ultimate in Flexibility      RAM: The Next Level of Temporary Storage         Types of RAM       Buses: The CPU’s Data Highway      Making Computers Even Faster: Advanced CPU Designs          Pipelining            Specialized Multimedia Instructions           Multiple Processing Efforts            TRENDS IN IT: Emerging Technologies: Computer Technology          Changing the Face of Medicine    CHAPTER 10  Behind the Scenes: Software Programming      The Life Cycle of an Information System          System Development Life Cycle          TRENDS IN IT: Careers: Considering a Career in Systems Development?      The Life Cycle of a Program     Describing the Problem: The Problem Statement      Making a Plan: Algorithm Development          Developing an Algorithm: Decision Making and Design          Top-Down Design           Object-Oriented Analysis      Coding: Speaking the Language of the Computer          Categories of Programming Languages            Creating Code: Writing the Program           DIG DEEPER: The Building Blocks of Programming Languages: Syntax,         Keywords, Data Types, and Operators           Compilation           Coding Tools: Integrated Development Environments       Debugging: Getting Rid of Errors      Finishing the Project: Testing and Documentation      Programming Languages: Many Languages for Many Projects          Selecting the Right Language          Windows Applications          Web Applications: HTML/XHTML and Beyond          The Next Great Language          TRENDS IN IT: Computers in Society: Alice: Making Programming Fun          and Approachable    CHAPTER 11  Behind the Scenes: Databases and Information Systems      Life Without Databases      Database Building Blocks          Advantages of Using Databases            Database Terminology          Primary Keys       Database Types          Relational Databases            Object-Oriented Databases           Multidimensional Databases      Database Management Systems: Basic Operations          Creating Databases and Entering Data          Input Forms           Data Validation          Viewing and Sorting Data           DIG DEEPER: Structured Query Language (SQL)           Extracting or Querying Data           TRENDS IN IT: Computers in Society: Can a Database Catch a Criminal?          Outputting Data       Relational Database Operations          Normalization of Data            TRENDS IN IT: Computers in Society: Need Cash? Use Databases          to Find Your Property       Data Storage          Data Warehouses          Populating Data Warehouses           Data Staging          Data Marts      Managing Data: Information Systems          Office Support Systems          Transaction Processing Systems           Management Information Systems           Decision Support Systems           Internal and External Data Sources           Model Management Systems           Knowledge-Based Systems     Data Mining         TRENDS IN IT: Emerging Technologies: Web Portal Enables Krispy Kreme to          Manage Its Dough . . . Without Going Nuts!   CHAPTER 12  Behind the Scenes: Networking and Security      Networking Advantages     Client/Server Networks      Classifications of Client/Server Networks: LANs, WANs, and MANs      Constructing Client/Server Networks      Servers         Print Servers           Application Servers           Database Servers           E-Mail Servers           Communications Servers          Web Servers      Network Topologies          Bus Topology            Ring Topology            Star Topology                  Comparing Topologies      Transmission Media         Wired Transmission Media          Wireless Media Options           Comparing Transmission Media      Network Operating Systems         TRENDS IN IT: Emerging Technologies: Virtual Network Computing Is          Here and It’s Free       Network Adapters          DIG DEEPER: The OSI Model: Defining Protocol Standards            TRENDS IN IT: Ethics: RFID—Friend or Foe?       Network Navigation Devices      MAC Addresses        Repeaters and Hubs        Switches and Bridges       Routers      Network Security     Authentication      Access Privileges      Physical Protection Measures      TRENDS IN IT: Emerging Technologies: Wi-Fi Phones Keep      Doctors and Nurses Connected      Firewalls       TRENDS IN IT: Computers in Society: What’s Shakin’? California Maintains a      Reliable Network to Respond to Earthquake Emergencies    CHAPTER 13  Behind the Scenes: The Internet: How It Works      The Management of the Internet      Internet Networking          Connecting Internet Service Providers            Network Access Points          Points of Presence           The Network Model of the Internet       Data Transmission and Protocols          Packet Switching            TCP/IP       IP Addresses and Domain Names          Domain Names          DIG DEEPER: Making the Connection: Connection-Oriented Versus          Connectionless Protocols          DNS Servers      Other Protocols: FTP and Telnet      HTTP, HTML, and Other Web Jargon          HTTP and SSL            HTML/XHTML           XML           The Common Gateway Interface          Client-Side Applications       Communications over the Internet          TRENDS IN IT: Careers: If You Build It, Will They Come? Web          Development and Design Careers           E-mail          TRENDS IN IT: Computers in Society: Have You Ever Used an Extranet          or a Virtual Private Network?          E-Mail Security: Encryption and Specialized Software          Instant Messaging           TRENDS IN IT: Emerging Technologies: The Evolving Internet  TECHNOLOGY IN FOCUS      The History of the PC      Glossary      Index      Credits


Best Sellers


Product Details
  • ISBN-13: 9780132253567
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Height: 276 mm
  • No of Pages: 704
  • Weight: 1466 gr
  • ISBN-10: 0132253569
  • Publisher Date: 20 Feb 2007
  • Binding: SA
  • Language: English
  • Spine Width: 23 mm
  • Width: 216 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Technology In Action, Complete
Pearson Education (US) -
Technology In Action, Complete
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Technology In Action, Complete

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA