Technology in Action Introductory (Record no. 31814)
[ view plain ]
INTERNATIONAL STANDARD BOOK NUMBER | |
---|---|
International Standard Book Number | 9780134608211 |
DEWEY DECIMAL CLASSIFICATION NUMBER | |
Call number | 004 EV TE |
MAIN ENTRY--PERSONAL NAME | |
Authors | Evans, Alan |
TITLE STATEMENT | |
Title | Technology in Action Introductory |
Statement of responsibility, etc | Alan Evans, Kendall Martin, Mary Anne Poatsy |
EDITION STATEMENT | |
Edition | 14th ed. |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | New York : |
Publisher | Pearson, |
Date | c2018. |
PHYSICAL DESCRIPTION | |
Extent | xxx, 379 p. : |
Other Details | ill. ; |
Size | 28 cm. |
GENERAL NOTE | |
General note | Includes index. |
CONTENTS | |
Contents | Machine generated contents note: Part 1: How Will You Put Technology in Action? Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national and global issues. Technology on the World Stage Impact of Tools of Modern Technology Objective 1.1 Describe various technological tools being used to impact national and global issues. Global Issues Objective 1.2 Describe various global social issues that are being affected by technology. Technology and Our Society Technology Impacts How We Think Objective 1.3 Describe how technology is changing our cognitive processes. Technology Impacts How We Connect Objective 1.4 Explain how technology is expanding the ways we collaborate. Technology Impacts How We Consume Objective 1.5 Summarize how technology has impacted the way we choose and consume products and services. Sound Byte: Virtual Computer Tour Try This: Skyping Around the World Contents note continued: Make This: Make: A Virtual Assistant Part 2: Personal Technology and Ethical Computing Learning Outcome 1.2 You will be able to discuss personal impacts technology can have on your life and your career and how technology creates new ethical debates. Technology at Home Computer Literacy Objective 1.6 Characterize computer literacy, and list some of its benefits. Ethics In It: Ethics in Computing Technology and Your Career Impact of Computer Literacy on Your Career Objective 1.7 Evaluate the impact computer literacy has on a variety of careers. Bits&Bytes: Computational Art Dig Deeper: Augmentative and Virtual Realities Technology and Your Ethics Defining Ethics Objective 1.8 Define ethics and examine various ethical systems. Sound Byte: How to Debate Ethical Issues Personal Ethics Objective 1.9 Relate influences on the development of your personal ethics. Ethics and Technology Contents note continued: Objective 1.10 Present examples of how technology creates ethical challenges. Solve This: How Technology Is Used on the World Stage and in My Personal Life Part 1: Understanding Digital Components Learning Outcome 2.1 You will be able to describe the devices that make up a computer system. Understanding Your Computer Computers Are Data Processing Devices Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information. Bits&Bytes: The Language of Computers Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed. Sound Byte: Binary Numbers Interactive Types of Computers Objective 2.3 List common types of computers, and discuss their main features. HelpDesk: Understanding Bits and Bytes Bits&Bytes: Today's Supercomputers: Faster Than Ever Input Devices Physical Keyboards and Touch Screens Contents note continued: Objective 2.4 Identify the main types of keyboards and touch screens. Mice and Other Pointing Devices Objective 2.5 Describe the main types of mice and pointing devices. Dig Deeper: How Touch Screens Work Bits&Bytes: Distributed Computing: Putting Your Computer to Work While You Sleep Image, Sound, and Sensor Input Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices. Output Devices Image and Audio Output Objective 2.7 Describe options for outputting images and audio from computing devices. Bits&Bytes: Near Field Communication (NFC): Now Pay (or Get Paid) Anywhere with Your Phone HelpDesk: Using Output Devices Printers Objective 2.8 Describe various types of printers, and explain when you would use them. Bits&Bytes: Medical Devices and 3D Printing Try This: What's Inside My Computer? Make This: Make: A Mobile App Part 2: Processing, Storage, and Connectivity Contents note continued: Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices connect to a computer system. Processing and Memory on the Motherboard The Motherboard and Memory Objective 2.9 Describe the functions of the motherboard and RAM. Processing Objective 2.10 Explain the main functions of the CPU. Sound Byte: Smartphones Are Really Smart Storing Data and Information Storage Options on Computing Devices Objective 2.11 Describe the various means of storing data and information with computing devices. Ethics In It: What Is Ethical Computing? Trends In It: Green Computing (Green IT) Connecting Peripherals to the Computer Computer Ports Objective 2.12 Describe common types of ports used today. HelpDesk: Exploring Storage Devices and Ports Power Management and Ergonomics Power Controls and Power Management Contents note continued: Objective 2.13 Describe how to manage power consumption on computing devices. Bits&Bytes: Save Power and Avoid Eyestrain: Use Blackle Setting It All Up: Ergonomics Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices. Solve This: Technology Wish List Part 1: Collaborating and Working on the Web Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration, communication, commerce, and entertainment purposes. The Internet and How It Works The Origin of the Internet Objective 3.1 Describe how the Internet got its start. How the Internet Works Objective 3.2 Explain how data travels on the Internet. Collaborating and Communicating on the Web Collaborating with Web Technologies Objective 3.3 Evaluate the tools and technologies used to collaborate on the web. Bits&Bytes: Useful Wikis Sound Byte: Blogging Contents note continued: Communicating over the Web Objective 3.4 Summarize the technologies used to communicate over the web. Conducting Business on the Web Conducting Business Online Objective 3.5 Describe how business is conducted using the Internet. Dig Deeper: How Cloud Computing Works Bits&Bytes: Looking for Extra Money? Try a Side Hustle E-Commerce Safeguards Objective 3.6 Summarize precautions you should take when doing business online. HelpDesk: Doing Business Online Bits&Bytes: Making Safe Mobile and Online Payments Try This: Use OneDrive to Store and Share Your Files in the Cloud Make This: Make: A Web-Capable App Part 2: Using the Web Effectively Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web. Accessing and Moving Around the Web Web Browsers Objective 3.7 Explain what web browsers are, and describe their common features. Contents note continued: URLs, Protocols, and Domain Names Objective 3.8 Explain what a URL is, and discuss its main parts. Navigating the Web Objective 3.9 Describe tools used to navigate the web. Bits&Bytes: Maintain Your Privacy While Searching the Web Searching the Web Effectively Using Search Engines Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results. HelpDesk: Getting Around the Web Bits&Bytes: Digital Assistants and Predictive Search Evaluating Websites Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes. Sound Byte: Finding Information on the Web HelpDesk: Evaluating Websites Trends In It: Linked Data and the Semantic Web Bits&Bytes: Why Isn't Wikipedia Good to Use as a Source for a Research Paper? Using the Web Ethically Digital Activism Contents note continued: Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism. Geolocation Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare? Ethics In It: Cyber Harassment Solve This: Create a Report: Conducting Research on the Web Part 1: Accessing, Using, and Managing Software Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage your software. Software Basics Application vs. System Software Objective 4.1 Compare application software and system software. Distributing Software Objective 4.2 Explain the differences between commercial software and open source software, and describe models for software distribution. Bits&Bytes: Finding Alternative Software Managing Your Software Contents note continued: Purchasing Software Objective 4.3 Explain the different options for purchasing software. Trends In It: Mobile Payment Apps: The Power of M-Commerce HelpDesk: Buying and Installing Software Installing and Uninstalling Software Objective 4.4 Describe how to install and uninstall software. Bits&Bytes: Ridding Your Computer of "Bloat" Upgrading Software Objective 4.5 Explain the considerations around the decision to upgrade your software. Dig Deeper: How Number Systems Work Sound Byte: Where Does Binary Show Up? Software Licenses Objective 4.6 Explain how software licenses function. Ethics In It: Can I Borrow Software That I Don't Own? Try This: Citing Website Sources Make This: Make: A More Powerful App Part 2: Application Software Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia. Productivity and Business Software Productivity Software Contents note continued: Objective 4.7 Categorize the types of application software used to enhance productivity, and describe their uses and features. Bits&Bytes: Productivity Software Tips and Tricks Bits&Bytes: How to Open Unknown File Types Bits&Bytes: Going Beyond PowerPoint Sound Byte: Programming for End Users Business Software Objective 4.8 Summarize the types of software that large and small businesses use. Bits&Bytes: Need to Work as a Team? Try These Collaboration Tools Multimedia and Educational Software Digital Multimedia Software Objective 4.9 Describe the uses and features of digital multimedia software. Digital Audio Software Objective 4.10 Describe the uses and features of digital audio software. HelpDesk: Choosing Software App Creation Software Objective 4.11 Describe the features of app creation software. Bits&Bytes: Mirror, Mirror Educational and Reference Software Contents note continued: Objective 4.12 Categorize educational and reference software, and explain their features. Solve This: Analyzing Benchmark Data Part 1: Understanding System Software Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the steps in the boot process. Operating System Fundamentals Operating System Basics Objective 5.1 Discuss the functions of the operating system. Operating Systems for Personal Use Objective 5.2 Explain the most common operating systems for personal use. Bits&Bytes: Why Isn't Everyone Using Linux? Bits&Bytes: Use Cortana to Find Your Files Operating Systems for Machinery, Networks, and Business Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business. Ethics In It: The Great Debate: Is macOS Safer Than Windows? What the Operating System Does The User Interface Contents note continued: Objective 5.4 Explain how the operating system provides a means for users to interact with the computer. Hardware Coordination Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. Sound Byte: Using Windows to Evaluate CPU Performance Software Application Coordination Objective 5.6 Explain how the operating system interacts with application software. Trends In It: Are Personal Computers Becoming More Human? Starting Your Computer The Boot Process Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. HelpDesk: Starting the Computer: The Boot Process Try This: Using Virtual Desktops in Windows 10 Make This: Make: A Notification Alert Part 2: Using System Software Contents note continued: Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file management capabilities, and utility programs. The Windows Interface Using Windows 10 Objective 5.8 Describe the main features of the Windows interface. Bits&Bytes: The Snipping Tool File Management Organizing Your Files Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders. Bits&Bytes: Save Files in the Cloud Right from Your Apps Bits&Bytes: Tips for Organizing Your Files HelpDesk: Organizing Your Computer: File Management Utility Programs Windows Administrative Utilities Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. HelpDesk: Using Utility Programs Dig Deeper: How Disk Defragmenting Utilities Work Sound Byte: Hard Disk Anatomy Contents note continued: Solve This: Mobile Operating Systems: Changing Market Share Part 1: Evaluating Key Subsystems Learning Outcome 6.1 You will be able to evaluate your computer system's hardware functioning, including the CPU and memory subsystems. Your Ideal Computing Device Moore's Law Objective 6.1 Describe the changes in CPU performance over the past several decades. Selecting a Computing Device Objective 6.2 Compare and contrast a variety of computing devices. Evaluating the CPU Subsystem How the CPU Works Objective 6.3 Describe how a CPU is designed and how it operates. Bits&Bytes: Liquid Cooling Measuring CPU Performance Objective 6.4 Describe tools used to measure and evaluate CPU performance. Dig Deeper: The Machine Cycle Evaluating the Memory Subsystem Random Access Memory Objective 6.5 Discuss how RAM is used in a computer system. Adding RAM Contents note continued: Objective 6.6 Evaluate whether adding RAM to a system is desirable. HelpDesk: Evaluating Your CPU and RAM Sound Byte: Installing RAM Try This: Measure Your System Performance Make This: Make: A Location-Aware App Part 2: Evaluating Other Subsystems and Making a Decision Learning Outcome 6.2 You will be able to evaluate your computer system's storage subsystem, media subsystem, and reliability and decide whether to purchase a new system or upgrade an existing one. Evaluating the Storage Subsystem Types of Storage Drives Objective 6.7 Classify and describe the major types of nonvolatile storage drives. Sound Byte: Installing an SSD Drive Dig Deeper: How Storage Devices Work Storage Needs Objective 6.8 Evaluate the amount and type of storage needed for a system. Bits&Bytes: How Much Storage to Buy? Evaluating the Media Subsystems Video Cards Objective 6.9 Describe the features of video cards. Contents note continued: Bits&Bytes: Graphics Cards with SSD on Board Trends In It: USB 3.1 and USB-C Sound Cards Objective 6.10 Describe the features of sound cards. HelpDesk: Evaluating Computer System Components Evaluating System Reliability and Moving On Maintaining System Reliability Objective 6.11 Describe steps you can take to optimize your system's reliability. Getting Rid of Your Old Computer Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer. Ethics In It: Free Hardware for All Solve This: Laptop Alternatives Part 1: How Networks Function Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to create a network, and describe the different ways a network can connect to the Internet. Networking Fundamentals Understanding Networks Objective 7.1 Explain computer networks and their pros and cons. HelpDesk: Understanding Networking Contents note continued: Ethics In It: Ethical Challenges of the Internet of Things Try This: Testing Your Internet Connection Speed Make This: Make: Networked Devices Part 2: Your Home Network Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home network and how to manage and secure a wireless network. Installing and Configuring Home Networks Planning Your Home Network Objective 7.8 Explain what should be considered before creating a home network. Connecting Devices to a Network Objective 7.9 Describe how to set up a home network. Bits&Bytes: Mesh Networks: An Emerging Alternative Bits&Bytes: Analyzing Network Problems Configuring Software for Your Home Network Objective 7.10 Summarize how to configure home network software. Dig Deeper: P2P File Sharing Managing and Securing Wireless Networks Troubleshooting Wireless Network Problems Contents note continued: Objective 7.11 Describe the potential problems with wireless networks and means to avoid them. Securing Wireless Networks Objective 7.12 Describe how to secure wireless home networks. Sound Byte: Securing Wireless Networks Solve This: Home Networking Guide Part 1: The Impact of Digital Information Learning Outcome 8.1 You will be able to describe the nature of digital signals and how digital technology is used to produce and distribute digital texts, music, and video. Digital Basics Digital Convergence Objective 8.1 Describe how digital convergence has evolved. Digital vs. Analog Objective 8.2 Explain the differences between digital and analog signals. Digital Publishing E-Readers Objective 8.3 Describe the different types of e-readers. Using e-Texts Objective 8.4 Explain how to purchase, borrow, and publish e-texts. Digital Music Creating and Storing Digital Music Contents note continued: Objective 8.5 Describe how digital music is created and stored. Bits&Bytes: Digital Music Creation Distributing Digital Music Objective 8.6 Summarize how to listen to and publish digital music. Bits&Bytes: Need Money for Your Band? Try Crowdfunding Digital Media Digital Photography Objective 8.7 Explain how best to create, print, and share digital photos. Bits&Bytes: Photo Edit on Your Phone Sound Byte: Enhancing Photos with Image-Editing Software Digital Video Objective 8.8 Describe how to create, edit, and distribute digital video. Bits&Bytes: Fly-By Drone Video Trends In It: Digital Asset Managers Needed! Try This: Creating and Publishing a Movie Make This: Make: A Video-Playing App Part 2: Ethical Issues of Living in the Digital Age Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain your digital reputation. Contents note continued: Protection of Digital Property Intellectual Property Objective 8.9 Describe the various types of intellectual property. Copyright Basics Objective 8.10 Explain how copyright is obtained and the rights granted to the owners. HelpDesk: Understanding Intellectual Property and Copyright Copyright Infringement Objective 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. Bits&Bytes: Software Piracy: It's More Than Just Downloading and Copying Bits&Bytes: Your Tax Dollars at Work: Free Media without Permission! Living Ethically in the Digital Era Plagiarism Objective 8.12 Explain plagiarism and strategies for avoiding it. Hoaxes and Digital Manipulation Objective 8.13 Describe hoaxes and digital manipulation. Sound Byte: Plagiarism and Intellectual Property Protecting Your Online Reputation Contents note continued: Objective 8.14 Describe what comprises your online reputation and how to protect it. Bits&Bytes: Celebrity Photographic Rights Ethics In It: Acceptable Use Policies: What You Can and Can't Do Solve This: Intellectual Property and Copyright Basics Part 1: Threats to Your Digital Assets Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats they pose to your digital security. Identity Theft and Hackers Identity Theft Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate. Hacking Objective 9.2 Describe the different types of hackers and the tools they use. Bits&Bytes: Hacking for Security Computer Viruses Virus Basics Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. Contents note continued: Sound Byte: Protecting Your Computer Types of Viruses Objective 9.4 List the different categories of computer viruses, and describe their behaviors. Online Annoyances and Social Engineering Online Annoyances Objective 9.5 Explain what malware, seam, and cookies are and how they impact your security. Social Engineering Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them. Bits&Bytes: I Received a Data Breach Letter...Now What? Scareware Ethics In It: You're Being Watched...But Are You Aware You're Being Watched? Trends In It: Spear Phishing: The Bane of Data Breaches Try This: Testing Your Network Security Make This: Make: A Password Generator Part 2: Protecting Your Digital Property Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption. Restricting Access to Your Digital Assets Firewalls Contents note continued: Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers. HelpDesk: Understanding Firewalls Preventing Virus Infections Objective 9.8 Explain how to protect your computer from virus infection. HelpDesk: Avoiding Computer Viruses Authentication: Passwords and Biometrics Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication. Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots Anonymous Web Surfing: Hiding from Prying Eyes Objective 9.10 Describe ways to surf the web anonymously. Bits&Bytes: Multi-Factor Authentication: Don't Rely Solely on Passwords Keeping Your Data Safe Protecting Your Personal Information Objective 9.11 Describe the types of information you should never share online. Sound Byte: Managing Computer Security with Windows Tools Backing Up Your Data Contents note continued: Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. Protecting Your Physical Computing Assets Environmental Factors and Power Surges Objective 9.13 Explain the negative effects environment and power surges can have on computing devices. Preventing and Handling Theft Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems. Dig Deeper: Computer Forensics: How It Works Solve This: Computer Security. |
SUMMARY | |
Summary | Active helpdesks: learn key computer concepts by fielding questions from callers in a simulated helpdesk environment -- Sound bytes: see key concepts demonstrated through multimedia lessons that include video, sound or animation. Also includes Sound Byte Labs featuring multiple-choice quizzes. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Microcomputers |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Computer science |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Computer networks |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Heading | Information technology |
ADDED ENTRY | |
Name | Martin, Kendall |
ADDED ENTRY | |
Name | Poatsy, Mary Anne |
ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://uowd.box.com/s/p95kqo6z1xe76ufxb0j0kza5dho3mqfi |
Public note | Location Map |
MAIN ENTRY--PERSONAL NAME | |
-- | 6816 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 5453 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 898 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 277 |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
-- | 6817 |
ADDED ENTRY | |
-- | 6818 |
ADDED ENTRY | |
-- | 6819 |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent location | Current location | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Date last borrowed | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
University of Wollongong in Dubai | University of Wollongong in Dubai | Main Collection | 2017-09-11 | AMAUK | 1 | 004 EV TE | T0056982 | 2020-03-05 | 2020-02-24 | 2017-07-23 | REGULAR |