Rev. Confirming Pages
Praise from Reviewers of Previous Editions of Using Information Technology “The major difference that I notice between your text and other texts is the informal tone of the writing. This is one of the main reasons we adopted your book—the colloquial feel.” —Todd McLeod, Fresno City College, California. “I would rate the writing style as superior to the book I am currently using and most of the books I have reviewed. . . . I found this book much easier to read than most books on the market.” —Susan Fry, Boise State University [UIT is] “(1) current with today’s and future technology, (2) easy to follow and explain to students who are having difficulty, [and] (3) a great self-study book for the more experienced student.” —Lonnie Hendrick, Hampton University, Hampton, Virginia “The easy-to-understand way of speaking to the readers is excellent. You put computer terminology into an easily understandable way to read. It’s excellent.” —Ralph Caputo, Manhattan College, New York “[The text] is written in a clear and non-threatening manner, keeping the student’s interest through the use of real, colorful anecdotes and interesting observations. The authors’ emphasis on the practical in the early chapters gets the students’ interest by centering on real-life questions that would face everyone purchasing a new personal computer.” —Donald Robertson, Florida Community College–Jacksonville “Williams-Sawyer . . . is the most readable textbook that deals with computer terminology in a meaningful way without getting into tech jargon. The concepts are clearly presented and the [photos], illustrations, and graphics become part of the reading and enhance the ability of the reader to comprehend the material. . . . I think the level of difficulty is perfect. I find very few students, even international students, who have difficulty comprehending the book.” —Beverly Bohn, Park University, Parkville, Missouri “This text is written at a level that is fine for most of my students. I have many students for whom English is a second language. These students may have difficulty with certain phrasing. . . . As I read this chapter [Chapter 3], however, I found very little that I thought might cause confusion, even for those ESL students. . . . I have selected previous editions of this text in large part because it is very ‘readable.’” —Valerie Anderson, Marymount College, Palos Verdes, California “[UIT is] geared toward a generation that grew up with computers but never thought about how they work. Should appeal to a younger audience.” —Leleh Kalantari, Western Illinois University, Macomb “Supplemental materials are great! . . . Book is very readable—short sections with excellent illustrations. Students especially seem to appreciate the Practical Action tips.” —Linda Johnsonius, Murray State University, Murray, Kentucky “I really liked the fact that you updated the text with items that would be important to students when they are looking to purchase a PC.”
i
—Stephanie Anderson, Southwestern Community College, Creston, Iowa
wiL16775_fm_i-xxviii.indd i
1/20/10 7:40:16 PM
Rev. Confirming Pages
“I like the authors’ writing style very much. I found it to be almost conversational, which is good, in my opinion. . . . I truly looked for unclear areas and did not find any at all.” —Laurie Eakins, East Carolina University, Greenville, North Carolina “I like how [the writing] is personalized. It seems as if the writer is speaking directly to the student—not the normal textbook emphasis.” —Tammy Potter, Western Kentucky Community & Technical College, Paducah “The author[s] did a good job taking something that could be considered a complex topic and made it easy to understand.” —Jennifer Merritt, Park University, Parkville, Missouri “[The authors’] writing style is clear and concise. [They have] taken some very technical topics and explained them in everyday language while not ‘dumbing down’ the material. The text flows smoothly. The inclusion of quotes from real people lends a conversational tone to the chapter [Chapter 6], making it easier to read and comprehend.” —Robert Caruso, Santa Rosa Junior College, California “[The writing] flows very well. Touches on most of the important points, but doesn’t bog down in too many details.” —Morgan Shepherd, University of Colorado at Colorado Springs “The level of difficulty is perfect for an intro level computer applications course taught at a 2- or 4-year college.” —Jami Cotler, Siena College, Loudonville, New York “Chapter 2 is written in a readable, motivating style. I found it to be concise, and introducing topics in a proper sequence, defining terms accurately and effectively. I found myself thinking of topics to be added, and then THERE THEY WERE!” —Mike Michaelson, Palomar College, San Marcos, California “Strong writing style. This chapter [Chapter 8] was extremely thorough. And covered many subjects in depth. . . . Writing style has always been quite clear and concise with these two authors.” —Rebecca Mundy, UCLA and University of Southern California “I think the level [of difficulty] is just right. The author[s] did not include a lot of technology lingo, but enough for the typical student who will be reading this book.” —Anita Whitehill, Foothill College, Los Altos Hills, California “Practicality is in the title of the book and is definitely practiced in each chapter. Readability means clear writing, and that is also evident in the text.” —Nancy Webb, San Francisco City College “The practical approach to information technology, along with the book’s superior readability, make this a strong text. The book’s emphasis on being current and a three-level learning system are great.” Reviewer Quotes
—DeLyse Totten, Portland Community College, Oregon
ii
“I enjoyed the writing style. It was clear and casual, without trivializing. I think the examples and explanations of Williams and Sawyer are excellent.” —Martha Tillman, College of San Mateo, California “Ethics topics are far superior to many other textbooks.” —Maryann Dorn, Southern Illinois University “[The critical thinking emphasis is important because] the facts will change, the underlying concepts will not. Students need to know what the technology is capable of and what is not possible . . .” —Joseph DeLibero, Arizona State University
wiL16775_fm_i-xxviii.indd ii
1/20/10 7:40:16 PM
Rev. Confirming Pages
USING INFORMATION
Technology
wiL16775_fm_i-xxviii.indd iii
1/20/10 7:40:16 PM
This page intentionally left blank
Rev. Confirming Pages
USING INFORMATION
Technology
Ninth Edition
A Practical Introduction to Computers & Communications Complete Version
BRIAN K. WILLIAMS
wiL16775_fm_i-xxviii.indd v
|
STACEY C. SAWYER
1/20/10 7:40:16 PM
Rev. Confirming Pages
USING INFORMATION TECHNOLOGY: A PRACTICAL INTRODUCTION TO COMPUTERS & COMMUNICATION: COMPLETE VERSION Published by McGraw-Hill, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY, 10020. Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Previous editions © 1995, 1997, 1999, 2001, 2003, 2005, 2007, and 2010. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Some ancillaries, including electronic and print components, may not be available to customers outside the United States. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 WDQ/WDQ 1 0 9 8 7 6 5 4 3 2 1 0 ISBN 978-0-07-351677-6 MHID 0-07-351677-5 Vice president/Editor in chief: Elizabeth Haefele Vice president/Director of marketing: John E. Biernat Senior sponsoring editor: Scott Davidson Freelance developmental editor: Craig Leonard Editorial coordinator: Alan Palmer Marketing manager: Tiffany Wendt Lead media producer: Damian Moshak Digital development editor: Kevin White Director, Editing/Design/Production: Jess Ann Kosic Project manager: Jean R. Starr Senior production supervisor: Janean A. Utley Senior designer: Marianna Kinigakis Senior photo research coordinator: Jeremy Cheshareck Photo researcher: Judy Mason Digital production coordinator: Brent dela Cruz Cover design: Daniel Krueger Interior design: Kay Lieberherr Typeface: 10/12 Trump Mediaeval Compositor: Laserwords Private Limited Printer: Worldcolor Cover credit: © Don Bishop/Photodisc/Getty Images Credits: The credits section for this book begins on page 557 and is considered an extension of the copyright page. Library of Congress Cataloging-in-Publication Data Williams, Brian K., 1938Using information technology : a practical introduction to computers & communications: Complete version / Brian K. Williams, Stacey C. Sawyer.—9th ed. p. cm. Includes index. ISBN-13: 978-0-07-351677-6 (alk. paper) ISBN-10: 0-07-351677-5 (alk. paper) 1. Computers. 2. Telecommunication systems. 3. Information technology. I. Sawyer, Stacey C. II. Title. QA76.5.W5332 2011b 004—dc22 2009048461
The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a Web site does not indicate an endorsement by the authors or McGraw-Hill, and McGraw-Hill does not guarantee the accuracy of the information presented at these sites. www.mhhe.com
wiL16775_fm_i-xxviii.indd vi
1/21/10 10:14:32 AM
Rev. Confirming g Pages g
Brief Contents 1 2 3 4
INTRODUCTION TO INFORMATION TECHNOLOGY Your Digital World
5
HARDWARE: INPUT & OUTPUT Taking Charge of Computing & Communications 253
6
COMMUNICATIONS, NETWORKS, & SAFEGUARDS The Wired & Wireless World 309
7 8
PERSONAL TECHNOLOGY The Future Is You
9
THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 457
SOFTWARE Tools for Productivity & Creativity
49
119
HARDWARE: THE CPU & STORAGE How to Choose a Multimedia Computer System 193
361
DATABASES & INFORMATION SYSTEMS Digital Engines for Today’s Economy 401
SYSTEMS ANALYSIS & PROGRAMMING Software Development, Programming, & Languages 491
Brief Contents
10
THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace
1
vii
wiL16775_fm_i-xxviii.indd vii
1/20/10 7:40:16 PM
Rev. Confirming Pages
To the Instructor INTRODUCTION Teaching the “Always On” Generation If there is anything we have learned during the 15 years of writing and revising this computer concepts book, it is this: Not only does the landscape of computer education change, but so do the students. USING INFORMATION TECHNOLOGY (abbreviated UIT) was written and revised around three important benchmarks:
•
The impact of digital convergence: The First Edition was the first text to foresee the impact of digital convergence—the fusion of computers and communications—as the new and broader foundation for the computer concepts course.
•
The importance of cyberspace: The Fourth Edition was the first text to acknowledge the new priorities imposed by the Internet and World Wide Web and bring discussion of them from late in the course to near the beginning (to Chapter 2).
•
The ascendancy of the “Always On” generation: The Seventh Edition addressed another paradigm change: Because of the mobility and hybridization of digital devices, an “Always On” generation of students has come of age that’s at ease with digital technology but—and it’s an important “but”—not always savvy about computer processes, possibilities, and liabilities.
The appearance of this new generation imposes additional challenges on professors: Instructors are expected to make the course interesting and challenging to students already at least somewhat familiar with information technology while teaching people of widely varying computer sophistication.
QUOTES What instructors say is most significant challenge in teaching this course
Preface
“Motivating students.” —Sue Vanboven Paradise Valley Community College “Keeping student interest and attention.” —Biswadip Ghosh, Metropolitan State College of Denver
viii
wiL16775_fm_i-xxviii.indd viii
ADDRESSING INSTRUCTORS’ TWO MOST IMPORTANT CHALLENGES As we embark on our sixteenth year of publication, we are extremely pleased at the continued reception to USING INFORMATION TECHNOLOGY, which has been used by well more than a half million students and adopted by instructors in over 800 schools. One reason for this enthusiastic response may be that we’ve tried hard to address professors’ needs. We’ve often asked instructors—in reviews, surveys, and focus groups—
“What are your most significant challenges in teaching this course?” Instructors generally have two answers:
The First Most Important Challenge: “Motivating Students & Making the Course Interesting” One professor at a state university seems to speak for most when she says: “Making the course interesting and challenging.” Others echo her with remarks
1/20/10 7:40:16 PM
Rev. Confirming Pages
such as “Keeping students interested in the material enough to study” and “Keeping the students engaged who know some, but not all, of the material.” Said one professor, “Many students take the course because they must, instead of because the material interests them.” Another speaks about the need to address a “variety of skill/knowledge levels while keeping the course challenging and interesting”—which brings us to the second response.
The Second Most Important Challenge: “Trying to Teach to Students with a Variety of Computer Backgrounds” The most significant challenge in teaching this course “is trying to provide material to the varied levels of students in the class,” says an instructor at a large Midwestern university. Another says the course gets students from all backgrounds, ranging from “Which button do you push on the mouse?” to “Already built and maintain a web page with html.” Says a third, “mixedability classes [make] it difficult to appeal to all students at the same time.” And a fourth: “How do you keep the ‘techies’ interested without losing the beginners?”
QUOTE “This will always be a difficult course to teach, since the students in any given class come from very different backgrounds and have vastly different levels of computer expertise.” —Laurie Eakins, East Carolina University
Motivating the Unmotivated & Teaching to a Disparity of Backgrounds As authors, we find information technology tremendously exciting, but we recognize that many students take the course reluctantly. And we also recognize that many students come to the subject with attitudes ranging from complete apathy and unfamiliarity to a high degree of experience and technical understanding. To address the problem of motivating the unmotivated and teaching to a disparity of backgrounds, UIT offers unequaled treatment of the following: 1. 2. 3. 4.
Practicality Readability Currentness Three-level critical thinking system.
QUOTE
We explain these features on the following pages.
FEATURE #1: Emphasis on Practicality This popular feature received overwhelming acceptance by both students and instructors in past editions. Practical advice, of the sort found in computer magazines, newspaper technology sections, and general-interest computer books, is expressed not only in the text but also in the following:
The Experience Box
About UIT’s practicality “The practical approach to information technology, along with the book’s superior readability, make this a strong text.” —DeLyse Totten, Portland Community College, Oregon
Appearing at the end of each chapter, the Experience Box is optional material that may be assigned at the instructor’s discretion. However, students will find the subjects covered are of immediate value. Examples: “Web Research, Term Papers, & Plagiarism.” “The Web Research, Term Papers, Mysteries of Tech Support.” “How & Plagiarism to Buy a Laptop.” “Preventing o matter how much students may be able to identical blocks of text. Indeed, Your Identity from Getting Storationalize cheating in college—for example, some websites favored by instructrying to pass off someone else’s term paper as tors build a database of papers over len.” “Virtual Meetings: Linking Up their own (plagiarism)—ignorance of the conse- time so that students can’t recycle work quences is not an excuse. Most instructors announce the previously handed in by others. One system, Turnitin’s Origpenalties for cheating at the beginning of the course— inality Checking, can lock on to a stolen phrase as short as Electronically.” “The ‘Always On’ usually a failing grade in the course and possible suspen- eight words. It can also identify copied material even if it has been changed slightly from the original. Another prosion or expulsion from school. Generation.”
N
wiL16775_fm_i-xxviii.indd ix
Preface
EXPERIENCE BOX
ix
1/20/10 7:40:16 PM
Rev. Confirming Pages
See the list of Experience Boxes and Practical Action Boxes on the inside front cover.
Practical Action Box
This box consists of optional material on practical matters. Examples: “Serious Web Search Techniques.” “Preventing Problems from Too Much or Too Little Power to Your Computer.” “When the Internet Isn’t Productive: Online Addiction & Other Timewasters.” “Evaluating & Sourcing Information Found on the Web.” “Tips for Fighting Spam.” “Tips for Avoiding Spyware.” “Utility Programs.” “Help in Building Your Web Page.” “Starting Over with Your Hard Drive: Looking for an Internet Access Erasing, Reformatting, & Reloading.” “BuyProvider: Questions to Ask at ing a Printer.” “Telecommuting & Telework: the Beginning The Nontraditional Workplace.” “Ways to Minimize Virus Attacks.” “How to Deal with f you belong to a college or company, • Is there free, 24-hour technical support? Is it reachable through a toll-free number? you may get internet access free. Many Passwords.” “Online Viewing & Sharing of public libraries also offer free net con- • How long does it take to get tech support? Ask for the nections. If these options are not availtech-support number before you sign up, and then call Digital Photos.” “Buying the Right HDTV.” e to you, here are some questions to ask in your first it to see how long a response takes. Also try connecting
PRACTICAL ACTION
I
See the list of Survival Tips on the inside front cover.
Survival Tips In the margins throughout we present utilitarSu rviv a l T ip ian Survival Tips to aid students’ explorations of the infotech world. Broadband: Riskier Examples: “Test the Speed of Your Interfor Security net Connection.” “Some Free ISPs.” “Do Home Unlike dial-up services, broadPages Endure?” “Look for the Padlock Icon.” band services, because they “Keeping Windows Security Features Updated.” are always switched on, make your computer vulnerable to “New Software & Compatibility.” “Where Do over-the-internet security I Get a Boot Disk?” “Is Your Password Guessbreaches. Solution: Install fireable?” “Update Your Drivers.” “Compressing wall software (Chapter 6). Web & Audio Files.” “Try Before You Buy.” “Setting Mouse Properties.” “Digital Subscriptions.” “Cellphone Minutes.” “Reformat Your Memory Card to Avoid Losing Your Photos.” “Keeping Track of Your Cellphone.” “Fraud Baiters.” “Alleviating Info-Mania.”
How to Understand a Computer Ad QUOTE About UIT’s practicality “The authors’ emphasis on the practical in the early chapters gets the students’ interest by centering on reallife questions that would face everyone purchasing a new personal computer.” —Donald Robertson, Florida Community College–Jacksonville
Preface
wiL16775_ch02_049-118.indd 60
x
wiL16775_fm_i-xxviii.indd x
In the hardware chapters (Chapters 4 and 5), we explain important concepts by showing students how to understand the hardware components in a hypothetical PC ad.
• • • • 1/8/10 • • • • • • • • • •
7-Bay Mid-Tower Case Intel Pentium Dual-Core Processor 2.80 GHz 2 GB DDR2 SDRAM 3 MB L2 Cache 4:03:24 PM 6 USB 2.0 Ports 256 MB DDR2 Nvidia GeForce PCI Graphics Sound Blaster Digital Sound Card 56 Kbps Internal Modem 320 GB SATA 7200 RPM Hard Drive 24X DVD/CD-RW Combo Drive Full-Sized Keyboard with Numeric Keypad Microsoft IntelliMouse 17" Flat Panel Display HP Officejet Pro K5400
Details of this ad are explained throughout this chapter and the next. See the little magnifying glass:
1/20/10 7:40:18 PM
Rev. Confirming Pages
FEATURE #2: Emphasis on Readability & Reinforcement for Learning
QUOTES
We offer the following features for reinforcing student learning:
About UIT’s readability
Interesting Writing—Based on Good Scholarship
“The writing style . . . is very user friendly.” —Pamela Luckett, Barry University
Where is it written that textbooks have to be boring? Can’t a text have personality? Actually, studies have found that textbooks written in an imaginative style significantly improve students’ ability to retain information. Both instructors and students have commented on the distinctiveness of the writing in this book. We employ a number of journalistic devices—colorful anecdotes, short biographical sketches, interesting observations in direct quotes—to make the material as approachable as possible. We also use real anecdotes and examples rather than fictionalized ones. Finally, unlike most computer concepts books, we provide references for our sources—see the endnotes in the back of the book. Many of these are from the year preceding publication. We see no reason why introductory computer books shouldn’t practice good scholarship by revealing their information sources. And we see no reason why good scholarship can’t go along with good writing—scholarship need not mean stuffiness.
Key Terms AND Definitions Emphasized To help readers avoid confusion about important terms and what they actually mean, we print each key term in bold italic underscore and its definition in boldface. Example (from Chapter 1): “Data consists of raw facts and figures that are processed into information.”
“Well written and great for an [introductory] text. I believe all audiences should be able to follow the text.” —Norman Hahn, Thomas Nelson Community College “Definitely written in an easyto-understand viewpoint.” —Jerry Matejka, Adelphi University
Material in Easily Manageable Portions Major ideas are presented in bite-size form, with generous use of advance organizers, bulleted lists, and new paragraphing when a new idea is introduced. Most sentences have been kept short, the majority not exceeding 22–25 words in length.
“What’s in It for Me?” Questions—to Help Students Read with Purpose We have crafted the learning objectives as Key Questions to help readers focus on essentials. These are expressed as “I” and “me” questions, of the type students ask. These questions follow both first-level and second-level headings throughout the book.
Many texts discuss ethics in isolation, usually in one of the final chapters. We believe this topic is too important to be treated last or lightly, and users have agreed. Thus, we cover ethical matters throughout the book, as indicated by the special icon shown at right. Example: We discuss such all-important questions as online plagiarism, privacy, computer crime, and netiquette.
Emphasis Throughout on Security In the post 9-11 era, security concerns are of gravest importance. Although we devote several pages (in Chapters 2, 6, and 9) to security matters, we also reinforce student awareness by highlighting with page-margin Security icons instances of security-related material throughout the book. Example: On p. 102, we use the special icon shown at right to highlight the advice that one
wiL16775_fm_i-xxviii.indd xi
See Ethics examples on pp. 37, 90, 102, 239, 280, 444, 459
ethics
See Security icons on pp. 37, 102, 341, 436, 446, 448, 462, 472, 474
SECURITY
Preface
Emphasis Throughout on Ethics
xi
1/20/10 7:40:20 PM
Rev. Confirming Pages
should pretend that every email message one sends “is a postcard that can be read by anyone.”
Eight Timelines to Provide Historical Perspective See timelines beginning on pp. 14, 50, 166, 196, 260, 310, 410, 516
Some instructors like to see coverage of the history of computing. Not wishing to add greatly to the length of the book, we decided on a student-friendly approach: the presentation of eight pictorial timelines showing the most significant historical IT events. These timelines, which occur in most chapters, appear along the bottom page margin. (See the example at the bottom of this page.) Each timeline repeats certain “benchmark” events to keep students oriented, but each one is modified to feature the landmark discoveries and inventions appropriate to the different chapter material. Examples: In Chapter 4, “System Software,” the timeline features innovations in operating systems. In Chapter 7, “Telecommunications,” the timeline highlights innovations in data transmission.
FEATURE #3: Currentness QUOTE About UIT’s currentness “Very knowledgeable, very good research.” —Maryann Dorn, Southern Illinois University
Preface
1994 Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; web browser invented
Reviewers have applauded previous editions of UIT for being more up to date than other texts. For example, we have traditionally ended many chapters with a forward-looking section that offers a preview of technologies to come— some of which are realized even as students are using the book. Among the new topics and terms covered in this edition are: active and passive RFID tags, Android, attention/focusing problems, augmented reality, Bing, cellphone voice searches, Chrome, Conficker, cyberwarfare, the “deep Web,” e-books, e-book readers, eight-core processors, FiOS, graphics processing units, Google 3D underwater mapping, hafnium and “high-k” technology, Hulu.com, “instant on” booting software, internet-ready TV, iPhone OS 3.0, laptop “cool trays,” MiFi, multiscreen use, online “app stores,” OpenID, PCI Express bus, “plug computers,” portable media players, sentiment analysis, the Singularity, solid-state memory drives, Ubuntu, use of multiple monitors, wireless access points. In this edition, we have updated the PC advertisement on page 199 and we have also updated the screen shots of software in Chapter 3. Material has also been updated on the following: bar codes, battery technology, biometrics, Blu-ray, Bluetooth, Cell chip, cellphone address backup, cloud computing, computer graduate starting salaries, damage to computers, data mining, difficulty disconnecting from work, geolocator tags, gesture-reading technology, Google Print Library Project, government uses of computers, image-recognition technology, injuries caused by computers, input help for disabled, multifunction printers, multitasking, netbooks, online storage, photo printers, privacy matters, Roadrunner supercomputer, speech-recognition systems, telemedicine, texting, three-dimensional output, touch-sensitive computers, Twitter, video-rental kiosks, WiMax 4G networks, Windows 7.
2004
2005
Wireless monitors available for certain industrial applications
Wireless desktop printers commercially available
2011? TV can output odors; full voice interaction with PCs; digital X-ray glasses
2016? Thought recognition as everyday input means
xii
wiL16775_fm_i-xxviii.indd xii
1/20/10 7:40:20 PM
Rev. Confirming Pages
“More Info!” Icons Help Students Find Their Own Answers to Questions In addition, we have taken the notion of currentness to another level through the use of the “MoreInfo!” feature to encourage students to obtain their own updates about material. Examples: “Finding Wi-Fi Hot Spots.” “Finding ISPs.” “Do Home Pages Endure?” “Do You Need to Know HTML to Build a Website?” “Urban Legends & Lies on the Internet.” “Blog Search Engines.” “Some Online Communities.” “Links to Security Software.” “Where to Learn More about Freeware & Shareware.” “More about Watermarks.” See the pages listed on the inside back cover.
FEATURE #4: Three-Level System to Help Students Think Critically about Information Technology This feature, which has been in place for the preceding three editions, has been warmly received. More and more instructors seem to have become familiar with Benjamin Bloom’s Taxonomy of Educational Objectives, describing a hierarchy of six critical-thinking skills: (a) two lower-order skills—memorization and comprehension; and (b) four higher-order skills—application, analysis, synthesis, and evaluation. Drawing on our experience in writing books to guide students to college success, we have implemented Bloom’s ideas in a three-stage pedagogical approach, using the following hierarchical approach in the Chapter Review at the end of every chapter:
See inside back cover for pages on which MoreInfo! icons appear. more
info! Finding Wi-Fi Hot Spots www.wififreespot.com/ www.wifihotspotlist.com/ www.wifinder.com/
QUOTES About UIT’s critical thinking emphasis
Using self-test questions, multiple-choice questions, and true/false questions, we enable students to test how well they recall basic terms and concepts.
Stage 2 Learning—Comprehension: “I Can Recall Information in My Own Terms & Explain Them to a Friend” Using open-ended short-answer questions, we enable students to re-express terms and concepts in their own words.
Stage 3 Learning—Applying, Analyzing, Synthesizing, Evaluating: “I Can Apply What I’ve Learned, Relate These Ideas to Other Concepts, Build on Other Knowledge, & Use All These Thinking Skills to Form a Judgment” In this part of the Chapter Review, we ask students to put the ideas into effect using the activities described. The purpose is to help students take possession of the ideas, make them their own, and apply them realistically to their own ideas. Our web exercises are also intended to spur discussion in the classroom and other contexts. Examples: “Using Text Messaging in Emergencies.” “What’s Wrong with Using Supermarket Loyalty Cards?” “Are You in the Homeland Security Database?”
“[It] is very important because it helps students comprehend and make sound decisions.” —Maryann Dorn, Southern Illinois University “A critical thinking emphasis is very important because . . . it represents a higher level of understanding.” —Evelyn Lulis, DePaul University
RESOURCES FOR INSTRUCTORS Instructor’s Manual The electronic Instructor’s Manual, available as part of the Instructor’s Resource Kit, helps instructors to create effective lectures. The Instructor’s
Preface
Stage 1 Learning—Memorization: “I Can Recognize & Recall Information”
xiii
wiL16775_ch02_049-118.indd 58
wiL16775_fm_i-xxviii.indd xiii
1/20/10 7:40:21 PM
Rev. Confirming Pages
Manual is easy to navigate and simple to understand. Each chapter contains a chapter overview, lecture outline, teaching tips, additional information, and answers to end-of-chapter questions and exercises.
Testbank The Testbank format allows instructors to effectively pinpoint areas of content within each chapter on which to test students. The text questions include learning level, answers, and text page numbers.
EZ Test McGraw-Hill’s EZ Test is a flexible and easy-to-use electronic testing program. The program allows instructors to create tests from book-specific items. It accommodates a wide range of question types, and instructors may add their own questions. Multiple versions of the test can be created and any test can be exported for use with course management systems such as WebCT, BlackBoard, or PageOut. EZ Test Online is a new service and gives you a place to easily administer your EZ Test created exams and quizzes online. The program is available for Windows and Macintosh environments.
PowerPoint Presentation The PowerPoint presentation includes additional material that expands upon important topics from the text, allowing instructors to create interesting and engaging classroom presentations. Each chapter of the presentation includes important illustrations, and animations to enable instructors to emphasize important concepts in memorable ways.
Figures from the Book All of the photos, illustrations, screenshots, and tables are available electronically for use in presentations, transparencies, or handouts.
Online Learning Center The Online Learning Center (www.mhhe.com/uit9e) is designed to provide students with additional learning opportunities. The website includes PowerPoint presentations for each chapter. For the convenience of instructors, all Instructor’s Resource CD material is available for download.
RESOURCES FOR INSTRUCTORS
Preface
PageOut PageOut is our Course Web Site Development Center and offers a syllabus page, URL, McGraw-Hill Online Learning Center content, online exercises and quizzes, gradebook, discussion board, and an area for student Web pages. PageOut requires no prior knowledge of HTML, no long hours of coding, and a way for course coordinators and professors to provide a full-course website. PageOut offers a series of templates—simply fill them with your course information and click on one of 16 designs. The process takes under an hour and leaves you with a professionally designed website. We’ll even get you started with sample websites, or enter your syllabus for you! PageOut is so straightforward and intuitive, it’s little wonder why over 12,000 college professors are using it. For more information, visit the PageOut website at www. pageout.net
xiv
wiL16775_fm_i-xxviii.indd xiv
1/20/10 7:40:21 PM
Rev. Confirming Pages
The Online Learning Center can be delivered through any of these platforms:
• •
Blackboard.com WebCT (a product of Universal Learning Technology)
Web CT & Blackboard Partnerships McGraw-Hill has partnerships with WebCT and Blackboard to make it even easier to take your course online and have McGraw-Hill content delivered through the leading internet-based learning tools for higher education. McGraw-Hill has the following service agreements with WebCT and Blackboard:
•
SimNet Concepts: This is the TOTAL solution for training and assessment in computer concepts. SimNet Concepts offers a unique, graphic-intensive environment for assessing student understanding of computer concepts. It includes interactive labs for 77 different computer concepts and 160 corresponding assessment questions. The content menus parallel the contents of the McGraw-Hill text being used for the class, so that students can cover topics for each chapter of the text you are using. SimNet Concepts also offers the only truly integrated learning and assessment program available today. After a student has completed any SimNet Concepts Exam, he or she can simply click on one button to have SimNet assemble a custom menu that covers just those concepts that the student answered incorrectly or did not attempt. These custom lessons can be saved to disk and loaded at any time for review. Assessment Remediation records and reports what the student did incorrectly for each question on an exam that was answered incorrectly.
This book has only two names on its title page. but we are extraordinarily grateful for the many others who have been important contributors to its development. First, we wish to thank our sponsoring editor and champion, Scott Davidson, for his support in helping roll out this edition, which, because of the surge in technological change, now compels an updating on a yearly basis. Thanks also go to our marketing champion, Tiffany Wendt, for her enthusiasm and ideas and continuing commitment. We were extremely delighted to once again have Jean Starr as our project manager, who was instrumental in keeping the project on track, and we are grateful to her for her professionalism. We also thank Damian Moshak, Kevin White, and Brent dela Cruz for their media and digital support. Thanks are also due Alan Palmer, Jess Ann Kosic, Janean A. Utley, Marianna Kinigakiss, and Jeremy Cheshareck. Outside McGraw-Hill, we want to state our appreciation for the contributions of Brian Kaspar, our great friend, for his help in checking all the URLs. We also wish to acknowledge the work of Craig Leonard as our freelance development editor. Judy Mason, our San Francisco Bay Area photo researcher, whose history with us goes back many, many years, did her usual always reliable, always superb job in photo research. Peter deLissovoy copyedited the text, David Shapiro was our able proofreader, and James Minkin, who has been a stalwart and sensitive indexer on many of our projects, did his usual satisfying and predictable outstanding job. Finally, we are grateful to the following reviewers for helping to make this the most market-driven book possible.
wiL16775_fm_i-xxviii.indd xv
Acknowledgments
ACKNOWLEDGMENTS
xv
1/20/10 7:40:21 PM
Rev. Confirming Pages
Tahir Azia, Long Beach City College, California Don Bailey, Plymouth State University, New Hampshire Bidi Bruno, Portland Community College, Oregon Anthony Cameron, Fayetteville Technical Community College, North Carolina Paulette Comet, Community College of Baltimore County, Maryland Ron Conway, Bowling Green State University, Indiana Rebecca Cunningham, Arkansas Technical University, Russellville Susan Fuschetto, Cerritos College, Norwalk, California Saiid Ganjalizadeh, Catholic University of America, Washington, D.C. Bish Ghosh, Metropolitan State College, Denver Mindy Glander, North Metro Technical College, Acworth, Georgia Mary Carole Hollingsworth, Georgia Perimeter College, Clarkston Linda Johnsonius, Murray State University, Murray, Kentucky Hak Joon Kim, Southern Connecticut State University, New Haven Nicholas Lindquist, Arizona State University
Warren Mack, Northwest Vista College, San Antonio, Texas Elizabeth McCarthy, Kirkwood Community College, Cedar Rapids, Iowa Jacob McGinnis, Park University, Parkville, Missouri Janak Rajani, Howard Community College, Columbia, Maryland Greg Saxon, New Jersey Institute of Technology, Teaneck, New Jersey Barbara Scantlebury, Mohawk Valley Community College, Utica, New York Stephanie Spike, Tallahassee Community College, Florida Susan Taylor, Mount Wachusett Community College, Gardner, Massachusetts David Trimble, Park University, Parkville, Missouri Sue VanBoven, Paradise Valley Community College, Phoenix Jennifer Cohen, Southwest Florida College, Fort Myers Andrew Levin, Delaware Valley College, Doylestown, Pennsylvania John Jansma, Palo Alto College, San Antonio, Texas Lonnie Hendrick, Hampton University, Hampton, Virginia Leon Amstutz, Taylor University, Upland, Indiana
Acknowledgments
Reviewers & Other Participants in Previous Editions
xvi
wiL16775_fm_i-xxviii.indd xvi
We are grateful for the magnificent help over the past 15 years from all the instructors who have given us the benefit of their opinion, as follows: Nancy Alderdice, Murray State University; Margaret Allison, University of Texas–Pan American; Angela Amin, Great Lakes Junior College; Sharon Anderson, Western Iowa Tech
Anderson, Marymount College; Hashem Anwari, Northern Virginia Community College–Loudoun Campus; Connie Aragon, Seattle Central Community College;
1/25/10 8:17:41 PM
Bonnie Bailey, Morehead State University; Robert L. Barber, Lane Community College; Vic Barbow, Purdue University; David Brent Bandy, University of Wisconsin–Oshkosh; Robert Barrett, Indiana University and Purdue University at Fort Wayne; Anthony Baxter, University of Kentucky; Gigi Beaton, Tyler Junior College; Virginia Bender, William Rainey Harper College; Hossein Bidgoli, California State University– Bakersfield; Warren Boe, University of Iowa; Beverly Bohn, Park University; Randall Bower, Iowa State University; Russell Breslauer, Chabot College; Bob Bretz, Western Kentucky University; William C. Brough, University of Texas–Pan American; Phyllis Broughton, Pitt Community College; Charles Brown, Plymouth State College; David Burris, Sam Houston State University; Jeff Butterfield, University of Idaho; J. Wesley Cain, City University, Bellevue; Patrick Callan, Concordia University; Judy Cameron, Spokane Community College; Ralph Caputo, Manhattan College; Robert Caruso, Santa Rosa Junior College; Joe Chambers, Triton College;
wiL16775_fm_i-xxviii.indd xvii
Kris Chandler, Pikes Peak Community College; William Chandler, University of Southern Colorado; John Chenoweth, East Tennessee State University; Ashraful Chowdhury, Dekalb College; Erline Cocke, Northwest Mississippi Community College; Robert Coleman, Pima County Community College; Helen Corrigan-McFadyen, Massachusetts Bay Community College; Jami Cotler, Siena College; Glen Coulthard, Okanagan University; Robert Crandall, Denver Business School; Hiram Crawford, Olive Harvey College; Thad Crews, Western Kentucky University; Martin Cronlund, Anne Arundel Community College; Jim Dartt, San Diego Mesa College; Joseph DeLibro, Arizona State University; Edouard Desautels, University of Wisconsin–Madison; William Dorin, Indiana University–Northwest; Maryan Dorn, Southern Illinois University; Patti Dreven, Community College of Southern Nevada; John Durham, Fort Hays State University; Laura A. Eakins, East Carolina University; Bonita Ellis, Wright City College; John Enomoto, East Los Angeles College; Ray Fanselau, American River College; Pat Fenton, West Valley College;
Acknowledgments
Rev. Confirming Pages
xvii
1/20/10 7:40:21 PM
Acknowledgments
Rev. Confirming Pages
xviii
wiL16775_fm_i-xxviii.indd xviii
Eleanor Flanigan, Montclair State University; Ken Frizane, Oakton Community College; James Frost, Idaho State University; Susan Fry, Boise State University; Bob Fulkerth, Golden Gate University; Janos Fustos, Metropolitan State College; Yaping Gao, College of Mount St. Joseph; Enrique Garcia, Laredo Community College; JoAnn Garver, University of Akron; Jill Gebelt, Salt Lake Community College; Charles Geigner, Illinois State University; David German, Cerro Coso Community College; Candace Gerrod, Red Rocks Community College; Julie Giles, DeVry Institute of Technology; Frank Gillespie, University of Georgia; Myron Goldberg, Pace University; Dwight Graham, Prairie State College; Fillmore Guinn, Odessa College; Norman P. Hahn, Thomas Nelson Community College; Sallyann Hanson, Mercer County Community College; Debra Harper, Montgomery County Community College–North Harris Albert Harris, Appalachian State University; Jan Harris, Lewis & Clark Community College; Michael Hasset, Fort Hays State University; Julie Heine, Southern Oregon State College;
Richard Hewer, Ferris State University; Ron Higgins, Grand Rapids Community College; Martin Hochhauser, Dutchess Community College; Don Hoggan, Solano Community College; James D. Holland, Okaloosa-Waltoon Community College; Stan Honacki, Moraine Valley Community College; Wayne Horn, Pensacola Junior College; Tom Hrubec, Waubonsee Community College; Jerry Humphrey, Tulsa Junior College; Christopher Hundhausen, University of Oregon; Alan Iliff, North Park College; Washington James, Collin County Community College– Plano; Jim Johnson, Valencia Community College; Julie Jordahl, Rock Valley College; Laleh Kalantari, Western Illinois University; Jan Karasz, Cameron University; Jorene Kirkland, Amarillo College; Victor Lafrenz, Mohawk Valley Community College; Sheila Lancaster, Gadsden State Community College; Dana Lasher, North Carolina State University; Stephen Leach, Florida State University; Paul Leidig, Grand Valley State University; Mary Levesque, University of Nebraska–Omaha; Chang-Yang Lin, Eastern Kentucky University; Gina Long, Southwestern Community College;
1/20/10 7:40:21 PM
John Longstreet, Harold Washington College; Paul Lou, Diablo Valley College; Pamela Luckett, Barry University; Deborah Ludford, Glendale Community College; Evelyn Lulis, DePaul University; Peter MacGregor, Estrella Mountain Community College; Donna Madsen, Kirkwood Community College; Ed Mannion, California State University–Chico; Alan Maples, Cedar Valley College; Kenneth E. Martin, University of North Florida; Thomas Martin, Shasta College; Jerry Matejka, Adelphi University; Diane Mayne-Stafford, Grossmont College; Todd McLeod, Fresno City College; Curtis Meadow, University of Maine; Jennifer Merritt, Park University; Timothy Meyer, Edinboro University; Michael Michaelson, Palomar College; Cindy Minor, John A. Logan College; Norman Muller, Greenfield Community College; Rebecca Mundy, University of California, Los Angeles, and University of Southern California; Paul Murphy, Massachusetts Bay Community College; Kathleen Murray, Drexel University; Marry Murray, Portland Community College;
Sonia Nayle, Los Angeles City College; Charles Nelson, Rock Valley College; Bruce Neubauer, Pittsburgh State University; Wanda Nolden, Delgado Community College; E. Gladys Norman, Linn-Benton Community College; George Novotny, Ferris State University; Janet Olpert, Cameron University; Pat Ormond, Utah Valley State College; John Panzica, Community College of Rhode Island; Rajesh Parekh, Iowa State University; Bettye Jewel Parham, Daytona Beach Community College; Merrill Parker, Chattanooga State Technical Community College; Michelle Parker, Indiana Purdue University; Marie Planchard, Massachusetts Bay Community College; Jim Potter, California State University–Hayward; Tammy Potter, West Kentucky Community & Technical College; Leonard Presby, William Patterson State College; William Pritchard, Wayne State University; Delores Pusins, Hillsborough Community College; Eugene Rathswohl, University of San Diego; Alan Rea, Western Michigan University; Jerry Reed, Valencia Community College; John Rezac, Johnson County Community College; Pattie Riden, Western Illinois University;
Acknowledgments
Rev. Confirming Pages
xix
wiL16775_fm_i-xxviii.indd xix
1/20/10 7:40:21 PM
Rev. Confirming Pages
Jane Ritter, University of Oregon; Fernando Rivera, University of Puerto Rico–Mayaguez Campus; Donald Robertson, Florida Community College–Jacksonville; Stan Ross, Newbury College; Russell Sabadosa, Manchester Community College; Behrooz Saghafi, Chicago State University; Judy Scheeren, Westmoreland County Community College; Al Schroeder, Richland College; Dick Schwartz, Macomb County Community College; Earl Schweppe, University of Kansas; Susan Sells, Wichita State University; Tom Seymour, Minot State University; Naj Shaik, Heartland Community College; Morgan Shepherd, University of Colorado–Colorado Springs; Elaine Shillito, Clark State Community College; Jack Shorter, Texas A&M University; James Sidbury, University of Scranton; Maureen Smith, Saddleback College;
Acknowledgments
Esther Steiner, New Mexico State University; Randy Stolze, Marist College;
Charlotte Thunen, Foothill College; Denis Tichenell, Los Angeles City College; Angela Tilaro, Butte College; Martha Tillman, College of San Mateo; DeLyse Totten, Portland Community College; Jack VanDeventer, Washington State University; James Van Tassel, Mission College; Jim Vogel, Sanford Brown College; Dale Walikainen, Christopher Newport University; Reneva Walker, Valencia Community College; Ron Wallace, Blue Mountain Community College; Nancy Webb, San Francisco City College; Steve Wedwick, Heartland Community College; Patricia Lynn Wermers, North Shore Community College; Cora Lee Whitcomb, Bentley College; Doug White, Western Michigan University; Anita Whitehill, Foothill College; Edward Winter, Salem State College; Floyd Winters, Manatee Community College; Israel Yost, University of New Hampshire; Alfred Zimermann, Hawai’i Pacific University; Eileen Zisk, Community College of Rhode Island.
xx
wiL16775_fm_i-xxviii.indd xx
1/20/10 7:40:21 PM
Rev. Confirming g Pages g
Contents INTRODUCTION TO INFORMATION TECHNOLOGY: YOUR DIGITAL WORLDY 1
1.1 The Practical User: How Becoming Computer Savvy Benefits You 3 1.2 Information Technology & Your Life: The Future Now 4 The Two Parts of IT: Computers & Communications 4 Education: The Promise of More Interactive & Individualized Learning 5 Health: High Tech for Wellness 6 Money: Toward the Cashless Society 8 Leisure: Infotech in Entertainment & the Arts 9 Government & Electronic Democracy: Participating in the Civic Realm 10 Jobs & Careers 11
1.3 Infotech Is All Pervasive: Cellphones, Email, the Internet, & the E-World 14 The Phone Grows Up 14 “You’ve Got Mail!” Email’s Mass Impact
15
Practical Action Box: Managing Your Email 17 The Internet, the World Wide Web, & the “Plumbing of Cyberspace” 18 College Students & the E-World 19
1.4 The “All-Purpose Machine”: The Varieties of Computers 20 All Computers, Great & Small: The Categories of Machines 20 Supercomputers 21 Mainframe Computers 22 Workstations 22 Microcomputers 22 Microcontrollers 23 Servers 24
wiL16775_fm_i-xxviii.indd xxi
How Computers Work: Three Key Concepts 25 Pretending to Order (or Build) a Custom-Built Desktop Computer: Basic Knowledge of How a Computer Works 26 Input Hardware: Keyboard & Mouse 28 Processing & Memory Hardware: Inside the System Cabinet 28 Storage Hardware: Hard Drive & CD/DVD Drive 30 Output Hardware: Video & Sound Cards, Monitor, Speakers, & Printer 31 Communications Hardware: Modem 32 Software 32 Is Getting a Custom-Built PC Worth the Effort? 33
1.6 Where Is Information Technology Headed? 34 Three Directions of Computer Development: Miniaturization, Speed, & Affordability 34 Three Directions of Communications Development: Connectivity, Interactivity, & Multimedia 35 When Computers & Communications Combine: Convergence, Portability, Personalization, Collaboration, & Cloud Computing 35 “E” Also Stands for Ethics 37
Experience Box: Better Organization & Time Management: Dealing with the Information Deluge in College—& in Life 38
2
THE INTERNET & THE WORLD WIDE WEB: EXPLORING CYBERSPACE 49
2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers 52 Narrowband (Dial-Up) Modem: Low Speed but Inexpensive & Widely Available 53 High-Speed Phone Lines: More Expensive but Available in Most Cities 54
Contents
1
1.5 Understanding Your Computer: How Can You Customize (or Build) Your Own PC? 25
xxi
1/20/10 7:40:21 PM
Rev. Confirming Pages
Problem for Telephone Internet Connections: The Last Mile 56 Cable Modem: Close Competitor to DSL 56 Satellite Wireless Connections 57 Other Wireless Connections: Wi-Fi & 3G 58 Internet Access Providers: Three Kinds 58
Practical Action Box: Looking for an Internet Access Provider: Questions to Ask at the Beginning 60
2.2 How Does the Internet Work?
60
Internet Connections: POPs, NAPs, Backbone & Internet2 60 Internet Communications: Protocols, Packets, & Addresses 62 Who Runs the Internet? 63
2.3 The World Wide Web
64
The Face of the Web: Browsers, Websites, & Web Pages 64 How the Browser Finds Things: URLs 65 The Nuts & Bolts of the Web: HTML & Hyperlinks 68 Using Your Browser to Get around the Web 69 Web Portals: Starting Points for Finding Information 72 Search Services & Search Engines, & How They Work 74 Four Web Search Tools: Individual Search Engines, Subject Directories, Metasearch Engines, & Specialized Search Engines 74 Smart Searching: Three General Strategies 76
Practical Action: Evaluating & Sourcing Information Found on the Web 77 Multimedia Search Tools: Image, Audio, & Video Searching 77 Practical Action Box: Serious Web Search Techniques 79 Desktop Search: Tools for Searching Your Computer’s Hard Disk 80 Tagging: Saving Links for Easier Retrieval Later 80
Contents
2.4 Email & Other Ways of Communicating over the Net
xxii
81
Two Ways to Send & Receive Email How to Use Email 82 Sorting Your Email 83 Attachments 85 Instant Messaging 87
wiL16775_fm_i-xxviii.indd xxii
82
FTP—for Copying All the Free Files You Want 88 Newsgroups—for Online Typed Discussions on Specific Topics 89 Listservs: Email-Based Discussion Groups 89 Real-Time Chat—Typed Discussions Among Online Participants 90 Netiquette: Appropriate Online Behavior 90
2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & the Social Web 92 Telephony: The Internet Telephone & Videophone 92 Multimedia on the Web 93 The Web Automatically Comes to You: Webcasting, Blogging, & Podcasting 95 E-Commerce: B2B Commerce, Online Finance, Auctions, & Job Hunting 97 Relationships: Matchmaking Websites 98 Web 2.0 & the Social Web: Social Networking, Media Sharing, Social Network Aggregation, & Microblogging 98
2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware 102 Snooping on Your Email: Your Messages Are Open to Anyone 102 Spam: Electronic Junk Mail 102
Practical Action Box: Tips for Fighting Spam 103 Spoofing, Phishing, & Pharming: Phony Email Senders & Websites 104 Cookies: Convenience or Hindrance? 104 Spyware—Adware, Browser & Search Hijackers, & Key Loggers: Intruders to Track Your Habits & Steal Your Data 105 Practical Action Box: Tips for Avoiding 106 Experience Box: Web Research, Term Papers, & Plagiarism 107
Spyware
3
SOFTWARE: TOOLS FOR PRODUCTIVITY & CREATIVITY
119
3.1 System Software: The Power Behind the Power 120
1/20/10 7:40:21 PM
Rev. Confirming Pages
3.2 The Operating System: What It Does 121
3.8 Spreadsheets
Booting 122 CPU Management 123 File Management 124 Task Management 125 Security Management 126
The Basics: How Spreadsheets Work 161 Analytical Graphics: Creating Charts 163
3.9 Database Software
3.10 Specialty Software
Practical Action: Utility Programs 127
3.4 Common Features of the User Interface 129 131
138
Macintosh Operating System 138 Microsoft Windows 140 Network Operating Systems: NetWare, Windows NT/2000/2003, Microsoft .NET, Unix, & Linux 144
Practical Action Box: Get a PC or Get a Mac? Dealing with Security Issues 145 Embedded Operating Systems for Handhelds: Palm OS & Windows CE 148
3.6 Application Software: Getting Started 150 Application Software: For Sale, for Free, or for Rent? 150 Tutorials & Documentation 152 A Few Facts about Files & the Usefulness of Importing & Exporting 153 Types of Application Software 154
3.7 Word Processing
155
Creating Documents 156 Editing Documents 156 Formatting Documents with the Help of Templates & Wizards 158 Output Options: Printing, Faxing, or Emailing Documents 160 Saving Documents 160 Web Document Creation 160 Tracking Changes & Inserting Comments 160
wiL16775_fm_i-xxviii.indd xxiii
167
Presentation Graphics Software 168 Financial Software 170 Desktop Publishing 172 Drawing & Painting Programs 174 Video/Audio Editing Software 175 Animation Software 176 Multimedia Authoring Software 176 Web Page Design/Authoring Software 176
Practical Action Box: Help in Building Your Web Page 178 Project Management Software 178 Portable Document Format (PDF) 179 Computer-Aided Design 180 Experience Box: The Mysteries of Tech Support 182
4
HARDWARE: THE CPU & STORAGE: HOW TO CHOOSE A MULTIMEDIA COMPUTER SYSTEM 193
4.1 Microchips, Miniaturization, & Mobility 194 From Vacuum Tubes to Transistors to Microchips 194 Miniaturization Miracles: Microchips, Microprocessors, & Micromachines 196 Mobility 196 Choosing an Inexpensive Personal Computer: Understanding Computer Ads 198
4.2 The System Unit: The Basics
198
The Binary System: Using On/Off Electrical States to Represent Data & Instructions 199 Machine Language 202 The Computer Case: Bays, Buttons, & Boards 202 Power Supply 204
Contents
Device Drivers: Running Peripheral Hardware 126 Utilities: Service Programs 127
Using Keyboard & Mouse 130 The GUI: The Graphical User Interface The Help Command 137
164
The Benefits of Database Software 164 The Basics: How Databases Work 164 Personal Information Managers 166
3.3 Other System Software: Device Drivers & Utility Programs 126
3.5 Common Operating Systems
161
xxiii
1/20/10 7:40:22 PM
Rev. Confirming Pages
Practical Action Box: Power Issues: Problems with Electrical Power to Your Computer 205 The Motherboard & the Microprocessor Chip 206 Processing Speeds: From Megahertz to Picoseconds 209
4.3 More on the System Unit
5.3 Output Hardware
211
How the Processor or CPU Works: Control Unit, ALU, Registers, & Buses 211 How Memory Works: RAM, ROM, CMOS, & Flash 213 How Cache Works 215 Other Methods of Speeding Up Processing 216 Ports & Cables 216 Expandability: Buses & Cards 221
4.4 Secondary Storage
224
279
280
Traditional Softcopy Output: Display Screens 281 Traditional Hardcopy Output: Printers
285
Practical Action Box: Buying a Printer 289 Mixed Output: Sound, Voice, & Video 290
5.4 Input & Output Technology & Quality of Life: Health & Ergonomics 291 Health Matters 291 Ergonomics: Design with People in Mind
Floppy Disks 224 Hard Disks 225 Optical Disks: CDs & DVDs 227 Magnetic Tape 231 Smart Cards 232 Flash & Solid State Memory 234 Online Secondary Storage 235
5.4 The Future of Input & Output
294
Experience Box: Good Habits: Protecting Your Computer System, Your Data, & Your Health 300
240
Experience Box: How to Buy a Laptop 242
6
COMMUNICATIONS, NETWORKS, & SAFEGUARDS: THE WIRED & WIRELESS WORLD 309
6.1 From the Analog to the Digital Age
5
HARDWARE: INPUT & OUTPUT: TAKING CHARGE OF COMPUTING & COMMUNICATIONS 253
5.1 Input & Output
Contents
5.2 Input Hardware
xxiv
255 256
Keyboards 256 Pointing Devices 260 Scanning & Reading Devices
267
wiL16775_fm_i-xxviii.indd xxiv
311
The Digital Basis of Computers: Electrical Signals as Discontinuous Bursts 311 The Analog Basis of Life: Electrical Signals as Continuous Waves 312 Purpose of the Dial-Up Modem: Converting Digital Signals to Analog Signals & Back 313 Converting Reality to Digital Form 315
6.2 Networks
Audio-Input Devices 273 Webcams & Video-Input Cards 273
294
Toward More Input from Remote Locations 295 Toward More Source Data Automation 295 Toward More Output in Remote Locations 297 Toward More Realistic Output 298
4.5 Future Developments in Processing & Storage 235 Practical Action Box: Starting Over with Your Hard Drive: Erasing, Reformatting, & Reloading 236 Future Developments in Processing 237 Future Developments in Secondary Storage
Digital Cameras 274 Speech-Recognition Systems 277 Sensors 278 Radio-Frequency Identification Tags Human-Biology-Input Devices 280
315
The Benefits of Networks 316 Types of Networks: WANs, MANs, LANs, HANs, PANs, & Others 317 How Networks Are Structured: Client/Server & Peer-to-Peer 318
1/20/10 7:40:22 PM
Rev. Confirming Pages
Intranets, Extranets, & VPNs 318 Components of a Network 320 Network Topologies: Bus, Ring, & Star 322 Two Ways to Prevent Messages from Colliding: Ethernet & Token Ring 324
6.3 Wired Communications Media
325
Wired Communications Media: Wires & Cables 325 Wired Communications Media for Homes: Ethernet, HomePNA, & HomePlug 326
365
7.2 Portable Media Players
366
How MP3 Players Work 366 The Societal Effects of PMPs Players Using PMPs in College 368
368
7.3 High-Tech Radio: Satellite, HD, & Internet 369
Practical Action Box: Telecommuting & Telework: The Nontraditional Workplace 327
6.4 Wireless Communications Media
Personalization 364 Popular Personal Technologies
328
The Electromagnetic Spectrum, the RadioFrequency (RF) Spectrum, & Bandwidth 328 Four Types of Wireless Communications Media 330 Long-Distance Wireless: One-Way Communication 332 Long-Distance Wireless: Two-Way Communication 335 Short-Range Wireless: Two-Way Communications 337
Satellite Radio 369 HD Radio 369 Internet Radio 371 Podcasting 371
7.4 Digital Cameras: Changing Photography 371 How Digital Cameras Work
372
Practical Action Box: Online Viewing & Sharing of Digital Photos 377 The Societal Effects of Digital Cameras 377
7.5 Personal Digital Assistants & Tablet PCs 378
6.5 Cyber Threats, Hackers, & Safeguards 341
How a PDA Works 378 The Future of PDAs 379 Tablet PCs 379
Cyber Threats: Denial-of-Service Attacks, Worms, Viruses, & Trojan Horses 341
7.6 The New Television
Practical Action Box: Ways to Minimize Virus Attacks 345 Some Cyber Villains: Hackers & Crackers 346 Online Safety: Antivirus Software, Firewalls, Passwords, Biometric Authentication, & Encryption 347
Internet-Ready, & Mobile TV 380 Three Kinds of Television: DTV, HDTV, SDTV 381
Practical Action Box: How to Deal with Passwords 349 Experience Box: Virtual Meetings: Linking Up Electronically 352
7.7 E-BOOK READERS: The New Reading Machines 383 How an E-Book Reader Works 383 The Benefits of E-Book Readers 384 The Drawbacks of E-Book Readers 385
7.8 Smartphones: More Than Talk PERSONAL TECHNOLOGY: THE FUTURE IS YOU 361
7.1 Convergence, Portability, & Personalization 362 Convergence 362 Portability 364
wiL16775_fm_i-xxviii.indd xxv
Practical Action Box: Buying the Right Flat-Panel TV 382 The Societal Effects of the New TV 382
How a Mobile Phone Works 386 Smartphone Services 386 The Societal Effects of Cellphones
385
7.9 Videogame Systems: The Ultimate Convergence Machine? 391
Contents
7
380
Microsoft’s Xbox 360
xxv
392
391
1/20/10 7:40:22 PM
Rev. Confirming Pages
Sony’s PlayStation3 393 Nintendo’s Wii 393 The Results of Personal Technology: The “Always On” Generation 393
The Experience Box: The “Always On” Generation 394
8
DATABASES & INFORMATION SYSTEMS: DIGITAL ENGINES FOR TODAY’S ECONOMY 401
8.1 Managing Files: Basic Concepts
402
How Data Is Organized: The Data Storage Hierarchy 403 The Key Field 404 Types of Files: Program Files & Data Files 405 Compression & Decompression: Putting More Data in Less Space 407
8.2 Database Management Systems
407
The Benefits of Database Management Systems 408 Three Database Components 408
Practical Action Box: Storing Your Stuff: How Long Will Digitized Data Last? 409 The Database Administrator 410
8.3 Database Models
410
Hierarchical Database 410 Network Database 411 Relational Database 413 Object-Oriented Database 416 Multidimensional Database 416
8.4 Data Mining
418
The Process of Data Mining 418 Some Applications of Data Mining 420
Contents
8.5 Databases & the Digital Economy: E-Business & E-Commerce 421
xxvi
E-Commerce: Online Buying & Selling 422 Types of E-Commerce Systems: B2B, B2C, & C2C 424
8.6 Information Systems in Organizations: Using Databases to Help Make Decisions 425 The Qualities of Good Information 425
wiL16775_fm_i-xxviii.indd xxvi
Information Flow within an Organization: Horizontally between Departments & Vertically between Management Levels 426 Computer-Based Information Systems 429 Office Information Systems 429 Transaction Processing Systems 429 Management Information Systems 430 Decision Support Systems 431 Executive Support Systems 432 Expert Systems 433
8.7 Artificial Intelligence
433
Expert Systems 434 Natural Language Processing 435 Intelligent Agents 436 Pattern Recognition 436 Fuzzy Logic 436 Virtual Reality & Simulation Devices 436 Robotics 438 Two Approaches to Artificial Intelligence: Weak versus Strong AI 440 Artificial Life, the Turing Test, & AI Ethics 442
8.8 The Ethics of Using Databases: Concerns about Privacy & Identity Theft 444 The Threat to Privacy Identity Theft 446
444
Experience Box: Preventing Your Identity from Getting Stolen 448
9
THE CHALLENGES OF THE DIGITAL AGE: SOCIETY & INFORMATION TECHNOLOGY TODAY 457
9.1 Truth Issues: Manipulating Digital Data 459 Manipulation of Sound 459 Manipulation of Photos 460 Manipulation of Video & Television Accuracy & Completeness 461
461
9.2 Security Issues: Threats to Computers & Communications Systems 462 Errors & Accidents 462 Natural Hazards 465
1/20/10 7:40:22 PM
Rev. Confirming Pages
Computer Crimes 465 Computer Criminals 469
The First Phase: Conduct a Preliminary Investigation 494
Practical Action Box: Is the Boss Watching You? Trust in the Workplace 471
The Second Phase: Do an Analysis of the System 494
9.3 Security: Safeguarding Computers & Communications 472
The Fourth Phase: Develop the System
Deterrents to Computer Crime 472 Identification & Access 473 Encryption 474 Protection of Software & Data 475 Disaster-Recovery Plans 475
The Sixth Phase: Maintain the System
9.4 Quality-of-Life Issues: The Environment, Mental Health, Child Protection, & the Workplace 476
The Second Step: Design the Program
Environmental Problems 476 Mental-Health Problems 478 Protecting Children: Pornography, Sexual Predators, & Online Bullies 479 Workplace Problems: Impediments to Productivity 482
The Fifth Step: Document & Maintain the Program 509
Practical Action: When the Internet Isn’t Productive: Online Addiction & Other Time Wasters 483
Second Generation: Assembly Language 512
The Third Phase: Design the System
498 499
10.2 Programming: A Five-Step Procedure 499 The First Step: Clarify the Programming Needs 500 501
The Third Step: Code the Program
507
The Fourth Step: Test the Program
508
10.3 Five Generations of Programming Languages 510 First Generation: Machine Language
511
Third Generation: High-Level or Procedural Languages 513
Experience Box: Student Use of Computers: Some Controversies 487
Fourth Generation: Very-High-Level or Problem-Oriented Languages 514 Fifth Generation: Natural Languages
516
10.4 Programming Languages Used Today 516 FORTRAN: The Language of Mathematics & the First High-Level Language 516 COBOL: The Language of Business 517 BASIC: The Easy Language 518 Pascal: The Simple Language
518
C: For Portability & Scientific Use
519
LISP: For Artificial Intelligence Programs
SYSTEMS ANALYSIS & PROGRAMMING: SOFTWARE DEVELOPMENT, PROGRAMMING, & LANGUAGES 491
10.1 Systems Development: The Six Phases of Systems Analysis & Design The Purpose of a System
492
492
Getting the Project Going: How It Starts, Who’s Involved 493 The Six Phases of Systems Analysis & Design 493
519
10.5 Object-Oriented & Visual Programming 519 Object-Oriented Programming: Block by Block 519 Three Important Concepts of OOP 520 Visual Programming: The Example of Visual BASIC 521
10.6 Markup & Scripting Languages HTML: For Creating 2-D Web Documents & Links 523
522
Contents
Technology, the Job Killer? 485 Gap between Rich & Poor 485 Whom Does the Internet Serve? 486 In a World of Breakneck Change, Can You Still Thrive? 486
wiL16775_fm_i-xxviii.indd xxvii
497
The Fifth Phase: Implement the System
9.5 Economic & Political Issues: Employment & the Haves/Have-Nots 484
10
496
xxvii
1/20/10 7:40:22 PM
Rev. Confirming Pages
Ruby 525 PHP(Personal Home Page, or PHP Hypertext Pre processor) & R 526 Experience Box: Critical Thinking Tools 527 Notes 535 Credits 557 Index 559
Contents
VRML: For Creating 3-D Web Pages 523 XML: For Making the Web Work Better 523 JavaScript: For Dynamic Web Pages 524 ActiveX: For Creating Interactive Web Pages 525 Perl: For CGI Scripts 525 CGI (Common Gateway Interface) 525 Tcl (Tool Command Language) 525
xxviii
wiL16775_fm_i-xxviii.indd xxviii
1/20/10 7:40:22 PM
Confirming Pages
1 INTRODUCTION to INFORMATION TECHNOLOGY Your Digital World Chapter Topics & Key Questions 1.1
The Practical User: How Becoming Computer Savvy Benefits You What does being computer savvy mean, and what are its practical payoffs?
1.2
Information Technology & Your Life: The Future Now What is information technology, and how does it affect education, health, money, leisure, government, and careers?
1.3
Infotech Is All-Pervasive: Cellphones, Email, the Internet, & the E-World does information technology facilitate email, networks, and the use of the internet and the web; what is the meaning of the term cyberspace?
1.4
The “All-Purpose Machine”: The Varieties of Computers sizes of computers, and what are clients and servers?
1.5
Understanding Your Computer: How Can You Customize (or Build) Your Own PC? What four basic operations do all computers use, and what are some of the devices associated with each operation? How does communications affect these operations?
1.6
Where Is Information Technology Headed? What are three directions of computer development and three directions of communications development?
How
What are the five
1
wiL16775_ch01_001-048.indd 1
11/23/09 3:54:53 PM
Confirming Pages
I
f you are under the age of 30, you live in a world quite different from that of your parents and grandparents.
You are a member of the “Always On” generation, accustomed to spending 8 hours or more a day looking at various screens—on cellphones, on computers, on TVs.1 You are a “digital native,” as one anthropologist put it, constantly busy with text messaging, email, and the internet.2 If you are an 18-to-24-year-old, you generally watch the smallest amount of live TV (3½ hours a day) compared to any other age group but spend the most time text messaging (29 minutes a day) and watch the most online video (5½ minutes a day).3 What are the developments that have encouraged these kinds of behavior? The answer is information technology. Of the top 30 innovations of the last 30 years, according to a 2009 panel of judges at the University of Pennsylvania’s Wharton School, most were related to information technology.4 The first four items on the list, for example, are the internet, broadband, and the World Wide Web; PC and laptop computers; mobile phones; and email. (• See Panel 1.1.) Unlike previous generations, you live in a world of pervasive computing or ubiquitous computing. Central to this concept is the internet—the “Net,” or “net,” that sprawling collection of data residing on computers around the world and accessible by high-speed connections. Everything that presently exists on a personal computer, experts suggest, will move onto the internet, giving us greater mobility and wrapping the internet around our lives.5 So central is the internet to our existence, in fact, that many writers are now spelling it without the capital
panel 1.1
Chapter 1
Top innovations of the last 30 years. The majority (23 of the 30) are in the field of information technology.*
2
wiL16775_ch01_001-048.indd 2
1. Internet, broadband, World Wide Web
16. Media file compression
2. PC and laptop computers
17. Microfinance
3. Mobile phones
18. Photovoltaic solar energy
4. Email 5. DNA testing and sequencing 6. Magnetic resonance imaging
19. Large-scale wind turbines 20. Internet social networking 21. Graphic user interface
7. Microprocessors
22. Digital photography
8. Fiber optics
23. RFID and applications
9. Office software
24. Genetically modified plants
10. Laser/robotic surgery
25. Bio fuels
1 1. Open-source software
26. Bar codes and scanners
12. Light-emitting diodes
27. ATMs
13. Liquid crystal display
28. Stents
14. GPS devices
29. SRAM flash memory
15. E-commerce and auctions
30. Anti-retroviral treatment for AIDS
*
To be more than just a new invention, an event was defined as an innovation if it created more opportunities for growth and development and if it had problem-solving value. Source: Adapted from “A World Transformed: What Are the Top 30 Innovations of the Last 30 Years?” Knowledge@Wharton, February 18, 2009, http://knowledge.wharton.upenn.edu/ article.cfm?articleid⫽2163 (accessed May 28, 2009).
11/23/09 3:55:06 PM
Confirming Pages
“I”—Internet becomes internet, just as Telephone became telephone— because both systems belong not to just one owner but to the world. We will follow this convention in this book. In this chapter, we begin by discussing how becoming computer savvy can benefit you and how computing and the internet affect your life. We then discuss cellphones, the internet, the World Wide Web, and other aspects of the e-world. Next we describe the varieties of computers that exist. We then explain the three key concepts behind how a computer works and what goes into a personal computer, both hardware and software. We conclude by describing three directions of computer development and three directions of communications development.
1.1 THE PRACTICAL USER: How Becoming Computer Savvy Benefits You What does being computer savvy mean, and what are its practical payoffs?
“Just keeping busy.” Multiple electronic devices allow people to do multiple tasks simultaneously—multitasking.
There is no doubt now that for most of us information technology is becoming like a second skin—an extension of our intellects and even emotions, creating almost a parallel universe of “digital selves.” Perhaps you have been using computers a long time and in a multitude of ways, or perhaps not. In either case, this book aims to deliver important practical rewards by helping you become “computer streetwise”—that is, computer savvy. Being computer savvy means knowing what computers can do and what they can’t, knowing how they can benefit you and how they can harm you, knowing when you can solve computer problems and when you have to call for help. Among the practical payoffs are these:
YOU WILL KNOW HOW TO FIX ORDINARY COMPUTER PROBLEMS Whether it’s replacing a printer cartridge, obtaining a software improvement (“patch” or “upgrade”), or pulling photos from your digital camera or camera cellphone, we hope this book gives you the confidence to deal with the continual challenges that arise with computers—and know when and how to call for help.
YOU WILL KNOW HOW TO UPGRADE YOUR EQUIPMENT & INTEGRATE IT WITH NEW PRODUCTS New gadgetry and software are constantly being developed. A knowledgeable user learns under what conditions to upgrade, how to do so, and when to start over by buying a new machine.
wiL16775_ch01_001-048.indd 3
Competence. To be able
to choose a computer system or the components to build one, you need to be computer savvy. Introduction to Information Technology
YOU WILL KNOW TO MAKE BETTER BUYING DECISIONS No matter how much computer prices come down, you will always have to make judgments about quality and usefulness when buying equipment and software. In fact, we start you off in this chapter by identifying the parts of a computer system, what they do, and about how much they cost.
3
11/23/09 3:55:06 PM
Confirming Pages
YOU WILL KNOW HOW TO USE THE INTERNET MOST EFFECTIVELY The sea of data that exists on the internet and other online sources is so great that finding what’s best or what’s really needed can be a hugely time-consuming activity. We hope to show you the most workable ways to approach this problem. YOU WILL KNOW HOW TO PROTECT YOURSELF AGAINST ONLINE VILLAINS The online world poses real risks to your time, your privacy, your finances, and your peace of mind—spammers, hackers, virus senders, identity thieves, and companies and agencies constructing giant databases of personal profiles—as we will explain. This book aims to make you streetwise about these threats. YOU WILL KNOW WHAT KINDS OF COMPUTER USES CAN ADVANCE YOUR CAREER Even top executives now use computers, as do people in careers ranging from police work to politics, from medicine to music, from retail to recreation. We hope you will come away from this book with ideas about how the technology can benefit you in whatever work you choose. more
info! From now on, whenever you see the more info! icon (above) in the margin, you’ll find information about internet sites to visit and how to search for terms related to the topic just discussed.
Along the way—in the Experience Boxes, Practical Action Boxes, Survival Tips, and More Info!s—we offer many kinds of practical advice that we hope will help you become truly computer savvy in a variety of ways, large and small.
1.2 INFORMATION TECHNOLOGY & YOUR LIFE: The Future Now What is information technology, and how does it affect education, health, money, leisure, government, and careers? This book is about computers, of course. But not just about computers. It is also about the way computers communicate with one another. When computer and communications technologies are combined, the result is information technology, or “infotech.” Information technology (IT) is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. IT merges computing with high-speed communications links carrying data, sound, and video. Examples of information technology include personal computers but also new forms of telephones, televisions, appliances, and various handheld devices.
The Two Parts of IT: Computers & Communications How do I distinguish computer technology and communications technology? Note that there are two important parts to information technology—computers and communications.
Chapter 1
COMPUTER TECHNOLOGY You have certainly seen and, we would guess, used a computer. Nevertheless, let’s define what it is. A computer is a programmable, multiuse machine that accepts data—raw facts and figures—and processes, or manipulates, it into information we can use, such as summaries, totals, or reports. Its purpose is to speed up problem solving and increase productivity.
4
wiL16775_ch01_001-048.indd 4
COMMUNICATIONS TECHNOLOGY Unquestionably you’ve been using communications technology for years. Communications technology, also called telecommunications technology, consists of electromagnetic devices and systems for communicating over long distances. The principal examples are telephone, radio, broadcast television, and cable TV. In more recent times, there has been the addition of communication among computers—which is what happens when people “go online” on the internet. In this context, online
11/23/09 3:55:11 PM
Rev. Confirming Pages
means using a computer or some other information device, connected through a network, to access information and services from another computer or information device. A network is a communications system connecting two or more computers; the internet is the largest such network. Information technology is already affecting your life in exciting ways and will do so even more in the future. Let’s consider how.
Education: The Promise of More Interactive & Individualized Learning How is information technology being used in education?
wiL16775_ch01_001-048.indd 5
more
info! Online Colleges The following websites provide detailed information about getting college degrees online: www.classesusa.com/ indexall/?campusType⫽online www.guidetoonlineschools.com www.usdla.org http://distancelearn.about.com/ http://www.distancelearning.com/
A 6-year-old girl plays a Sesame Street interactive program at Maxwell Memorial Library in Camilluis, New York.
Introduction to Information Technology
In her physics classes at the Massachusetts Institute of Technology, professor Gabriella Sciolla’s high-tech classroom has white boards and huge display screens instead of blackboards. The professor can make brief presentations of general principles, then throw out multiple-choice questions that students “vote” on, using wireless “personal response clickers.” These devices transmit the answers to a computer monitored by the professor, helping her gauge the level of understanding in the room. “You know where they are,” she says. She can then adjust, slow down, or engage students in guided discussions of their answers.6 An Indiana University sociology instructor uses similar technology to get students to answer questions about themselves—race, income, political affiliation—showing how, for example, the class is skewed toward wealthier or poorer students, an event that can stir up a half hour of excited class discussion.7 Maybe the classrooms at your school haven’t reached this level of interactivity yet, but there’s no question that information technology is universal on college campuses, and at lower levels the internet has penetrated 99% of schools.8 Most college students have been exposed to computers since the lower grades. In fact, one-fifth of college students report they were using computers between the ages 5 and 8, and all had begun using computers by the time they were 16–18 years old. When properly integrated into the curriculum and classroom, information technology can (1) allow students to personalize their education; (2) automate many tedious and rote tasks of teaching and managing classes; and (3) reduce the teacher’s workload per student, so that he or she can spend more time on reaching individual students.9 For instance, email, or “electronic mail,” messages transmitted over a computer network, most often the internet, are used by students to set up appointments (62%) with professors, discuss grades (58%), or get clarification of an assignment (75%).10 Besides using the internet to help in teaching, today’s college instructors also use presentation graphics software such as PowerPoint to show their lecture outlines and other materials on classroom screens (as we discuss in Chapter 3). In addition, they use Blackboard,
5
1/19/10 3:08:47 PM
Rev. Confirming Pages
Avatar. The simulated depictions of humans are a staple not only of videogames but also of computerized training programs. (What culture does “avatar” come from? See www. answers.com/topic/ avatar?cat⫽technology.)
WebCT, and other course-management software for administering online assignments, schedules, examinations, and grades.11 One of the most intriguing developments in education at all levels, however, is the rise of distance learning, or e-learning, the name given to online education programs, which has gone from under 2 million online students in 2003 to an expected nearly 5 million students in 2009.12 E-learning has had some interesting effects. For example, the availability of the internet has helped to propel the home-schooling movement, in which children are taught at home, usually by parents, to expand from 1.7% of all school-age children in 1999 to 2.9% in 2007.13 E-learning has also propelled the rise of for-profit institutions, such as DeVry and the University of Phoenix, which 8% of full-time college students now attend.14 More than a third of institutions of higher education—and 97% of public universities—offer online courses, and many have attracted oncampus students, who say they like the flexibility of not having to attend their classes at a set time.15 E-learning has been put to such varied uses as bringing career and technical courses to high school students in remote prairie towns, pairing gifted science students with master teachers in other parts of the country, and helping busy professionals obtain further credentials outside business hours. But the reach of information technology into education has only begun. In the future, we will see software called “intelligent tutoring systems” that gives students individualized instruction when personal attention is scarce—such as the software Cognitive Tutor, which not only helps high school students to improve their performance in math but also sparks them to enjoy a subject they might have once hated. In colleges, more students may use interactive simulation games, such as McGraw-Hill’s Business Strategy Game, to apply their knowledge to real-world kinds of problems. And employees in company training programs may find themselves engaged in mock conversations with avatars—computer depictions of humans, as are often found in online videogames—that represent imaginary customers and coworkers, combining the best parts of computer-based learning with face-to-face interaction.16
Health: High Tech for Wellness
Chapter 1
How are computers being used in health and medicine?
6
wiL16775_ch01_001-048.indd 6
Neurologist Bart Demaerschalk of Phoenix, Arizona, was at home tucking into his Thanksgiving dessert when he received a message that a woman 200 miles away had developed drooping facial muscles and slurred speech. Within a few minutes, Demaerschalk was looking at her, asking questions, reviewing her brain scan, and confirming a diagnosis of stroke—all with the help of a twoway video and audio connection set up for just this kind of consultation.17 Damaerschalk’s story is an example of telemedicine—medical care delivered via telecommunications. For some time, physicians in rural areas lacking local access to radiologists have used “teleradiology” to exchange computerized images such as X rays via telephone-linked networks with expert physicians in metropolitan areas. Now telemedicine is moving to an exciting new level, as the use of digital cameras and sound, in effect, moves patients to doctors rather than the reverse. Already telemedicine is being embraced by administrators in the American prison system, where by law inmates are guaranteed medical treatment—and where the increase in prisoners every year has led to the need to control health care costs. Computer technology is radically changing the tools of medicine. All medical information, including that generated by X ray, lab test, and pulse monitor,
12/18/09 4:20:20 PM
Confirming Pages
can now be transmitted to a doctor in digital format. Image transfer technology allows radiologic images such as CT scans and MRIs to be immediately transmitted to electronic charts and physicians’ offices. Patients in intensive care, who are usually monitored by nurses during off-times, can also be watched over by doctors in remote “control towers” miles away. Electronic medical records and other computerized tools enable heart attack patients to get follow-up drug treatment and diabetics to have their blood sugar measured. Software can compute a woman’s breast cancer risk.18 Patients can use email to query their doctors about their records (although there are still privacy and security issues).19 Various robots—automatic devices that perform functions ordinarily performed by human beings, with names such as ROBO DOC, RoboCart, TUG, and HelpMate—help free medical workers for more critical tasks; the four-armed da Vinci surgical robot, for instance, can do cuts and stitches deep inside the body, so that surgery is less traumatic and recovery time faster.20 Hydraulics and computers are being used to help artificial limbs get “smarter.”21 And a patient paralyzed by a stroke has received an implant that allows communication between his brain and a computer; as a result, he can move a cursor across a screen by brainpower and convey simple messages—as in Star Trek.22 Want to calculate how long you will live? Go to www.livingto100.com, an online calculator developed by longevity researchers at Harvard Medical School and Boston Medical Center. Want to gather your family health history to see if you’re at risk for particular inherited diseases? Go to www.hhs.gov/familyhistory to find out how. These are only two examples of health websites available to patients and health consumers. Although online health information can be misleading and even dangerous (for example, be careful about relying on Wikipedia for health advice), many people now tap into health care databases, email health professionals, or communicate with people who have similar conditions. Often patients are already steeped in information about their conditions when they arrive in the offices of health care professionals. This represents a fundamental shift of knowledge, and therefore power, from physicians to patients. In addition, health care consumers are able to share experiences and information with one another. Young parents, for example, can find an online gathering spot (chat room) at pediatrician Alan Greene’s website at www. drgreene.com. If you want to put your medical records on an electronic keychain storage device, visit med-infochip.com.
wiL16775_ch01_001-048.indd 7
more
info! Health Websites Some reliable sources: www.medlineplus.gov www.nimh.nih.gov www.4woman.gov www.mayoclinic.com www.nationalhealthcouncil.org www.yourdiseaserisk.wustl.edu/
Introduction to Information Technology
High-tech medicine. (left) Screenshot of the visual patient record software pioneered at Thy-Mors hospital. This patient has had a fracture of the femur in the right leg. This computer-based image shows a close-up view of the treated area. A click on the arrow or the highlighted femur would show the pertinent medical information from the record on the right panel. The tool allows doctors to easily zoom in an out on a particular body region or part and choose between many different views, for example, the cardiovascular system, the central nervous system, or the muscular system. (right) Open heart surgery is seen on a computer monitor as an Israeli medical team repairs a congenital defect in a boy’s heart at the Wolfson Medical Center in Tel Aviv.
7
11/23/09 3:55:24 PM
Confirming Pages
Robots. (left) A humanoid robot, HRP-2 Promet, developed by the National Institute of Advanced Industrial Science and Technology and Kawada Industries, Inc. Five feet tall, it performs traditional Japanese dancing. Priced at $365,000, the robot can help workers at construction sites and also drive a car. (middle) This sea bream is about 5½ pounds and can swim up to 38 minutes before recharging. The robot fish, created by Mitsubishi, looks and swims exactly like the real thing. (right) Humanoid robot KOBIAN displays an emotion of sadness during a demonstration at Waseda University in Tokyo, Japan. KOBIAN, which can express seven programmed emotions by using its entire body, including facial expressions, has been developed by researchers at Waseda’s Graduate School of Advanced Science and Engineering.
Money: Toward the Cashless Society How will computers affect my financial matters?
more
info! Financial Information
Chapter 1
The internet contains lots of financial information. Some of the better sources: www.finance.yahoo.com www.fool.com www.ragingbull.com www.usatoday.com/money/ default.htm
8
wiL16775_ch01_001-048.indd 8
“The future of money is increasingly digital, likely virtual, and possibly universal,” says one writer.23 Virtual means that something is created, simulated, or carried on by means of a computer or a computer network, and we certainly have come a long way toward becoming a cashless society. Indeed, the percentage of all financial transactions done electronically, both phone-initiated and computer-initiated, was projected to rise to 18.4% in 2013, up from 0.9% in 1993.24 Besides currency, paper checks, and credit and debit cards, the things that serve as “money” include cash-value cards (such as subway fare cards), automatic transfers (such as direct-deposit paychecks), and digital money (“electronic wallet” accounts such as PayPal). Many readers of this book will probably already have engaged in online buying and selling, purchasing DVDs, books, airline tickets, or computers. But what about groceries? After all, you can’t exactly squeeze the cantaloupes through your keyboard. Even so, online groceries are expected to reach $7.5 billion in U.S. sales by 2012.25 To change decades of shopping habits, e-grocers keep their delivery charges low and delivery times convenient, and they take great pains in filling orders, knowing that a single bad piece of fruit will produce a devastating word-of-mouth backlash.
11/23/09 3:55:29 PM
Confirming Pages
Only about 46% of U.S. workers have their paychecks electronically deposited into their bank accounts (as opposed to 95% or more in Japan, Norway, and Germany, for example), but this is sure to change as Americans discover that direct deposit is actually safer and faster. Online bill paying is also picking up steam. For more than two decades, it has been possible to pay bills online, such as those from phone and utility companies, with special software and online connections to your bank. Some banks and other businesses are backing an electronic-payment system that allows internet users to buy goods and services with micropayments, electronic payments of as little as 25 cents in transactions for which it is uneconomical to use a credit card. The success of Apple Computer’s iTunes online music service, which sells songs for 99 cents each, suggests that micro sales are now feasible. All kinds of businesses and organizations, from independent songwriters to comic book writers to the Legal Aid Society of Cleveland, now accept micropayments, using intermediaries such as BitPass and Peppercoin.26 Thus, you could set up your own small business simply by constructing a website (we show you how later in the book) and accepting micropayments.
Leisure: Infotech in Entertainment & the Arts How will my leisure activities be affected by information technology?
wiL16775_ch01_001-048.indd 9
Download (reverse the direction of data transmission to upload) Satellite Upload Download
Mainframe
Individual PC
Download (reverse the direction of data transmission to upload)
more
info! Free Music Online Places to look for free—and legal—music online: new.music.yahoo.com www.epitonic.com http://memory.loc.gov/ ammem/audio.html www.archive.org
Introduction to Information Technology
Information technology is being used for all kinds of entertainment, ranging from videogames to telegambling. It is also being used in the arts, from painting to photography. Let’s consider just two examples, music and film. Computers, the internet, and the World Wide Web are standing the system of music recording and distribution on its head—and in the process are changing the financial underpinnings of the music industry. Because of their high overhead, major record labels typically need a band to sell half a million CDs in order to be profitable, but independent bands, using online marketing, can be reasonably successful selling 20,000 or 30,000 albums. Team Love, a small music label established in 2003, found it could promote its first two bands, Tilly and the Wall and Willy Mason, by offering songs online free for downloading—transferring data from a remote computer to one’s own computer—so that people could listen to them before paying $12 for a CD. It also puts videos online for sharing and uses quirky websites to reach fans. “There’s something exponential going on,” says one of Team Love’s founders. “The more music that’s downloaded, the more it sells.”27 Many independent musicians are also using the internet to get their music heard, hoping that giving away songs will help them build audiences.28 The web also offers sources for instantly downloadable sheet music (see www.everynote.com, www.musicnotes.com, www.sheetmusicdirect.com, and www.sunhawk.com). One research engineer has devised a computerized scoring system for judging musical competitions that overcomes the traditional human-jury approach, which can be swayed by personalities and politics.29 And a Spanish company, Polyphonic HMI, has created Hit Song Science software, which they say can analyze the hit potential of new songs by, according to one description, “reference to a finely parsed universe of attributes derived from millions of past songs.”30 As for movies, now that blockbuster movies routinely meld live action and animation, computer artists are in big demand. The 1999 film Star Wars: Episode I, for instance, had 1,965 digital shots out of about 2,200 shots. Even when film was used, it was scanned into computers to be tweaked with animated effects, lighting, and the like. Entire beings were created on computers by artists working on designs developed by producer George Lucas and his chief artist.31 What is driving the demand for computer artists? One factor is that animation, though not cheap, looks more and more like a bargain, because hiring movie actors costs so much—some make $20 million a film. Moreover, special
www.garageband.com
9
11/23/09 3:55:41 PM
Confirming Pages
Entertainment. (left) Computer-generated special effects shot from the movie Up. (right) An indoor “winter” sports facility in Japan; the system uses microprocessors to keep lifts running, snow falling, and temperature at 26 degrees.
more
info! Online Movie Tickets Three sites offer movie tickets, as well as reviews and other materials. In some cities you can print out tickets at home. www.fandango.com www.moviefone.com www.movietickets.com
effects are readily understood by audiences in other countries, and major studios increasingly count on revenues from foreign markets to make a film profitable. Digital manipulation also allows a crowd of extras to be multiplied into an army of thousands. It can also be used to create settings: in the film Sky Captain and the World of Tomorrow, the actors—Gwyneth Paltrow, Angelina Jolie, and Jude Law—shot all their scenes in front of a blue screen, and computer-generated imagery was then used to transport them into an imaginary world of 1939.32 Computer techniques have even been used to develop digitally created actors—called “synthespians.” (Thespis was the founder of ancient Greek drama; thus, a thespian works in drama as an actor.) Actors ranging from the late James Dean to the late John Wayne, for instance, have been recruited for television commercials. And computerized animation is now so popular that Hollywood studios and movie directors are finding they can make as much money from creating videogames as from making movies.33 But animation is not the only area in which computers are revolutionizing movies. Digital editing has radically transformed the way films are assembled. Whereas traditional film editing involved reeling and unreeling spools of film and cutting and gluing pieces of highly scratchable celluloid together, nearly burying the editor in film, today an editor can access 150 miles of film stored on a computer and instantly find any visual or audio moment, allowing hundreds of variations of a scene to be called up for review. Even nonprofessionals can get into movie making as new computer-related products come to market. Now that digital video capture-and-edit systems are available for under $1,000, amateurs can turn home videos into digital data and edit them. Also, digital camcorders, which offer outstanding picture and sound quality, have steadily dropped in price.
Government & Electronic Democracy: Participating in the Civic Realm
Chapter 1
In what ways are computers changing government and politics?
10
wiL16775_ch01_001-048.indd 10
The internet and other information technology have helped government deliver better services and have paved the way for making governmental operations more transparent to the public. For instance, during a health crisis involving salmonella-tainted peanut butter, the U.S. Food and Drug Administration sent out information 707 times per minute in response to citizens seeking information about it.34 The U.S. State Department has a “DipNote” blog read by 2 million readers, and it holds press conferences on YouTube.35 Congress has a publicly searchable website for all federal contracts and grants over $25,000,
11/23/09 3:55:42 PM
Confirming Pages
Electronic voting. Voting using computer technology and a touch screen to vote.
more
info! Online Government Help You can gain access to government agencies through the following websites: www.firstgov.gov www.govspot.com www.info.gov
Jobs & Careers How could I use computers to advance my career? Today almost every job and profession requires computer skills of some sort. Some are ordinary jobs in which computers are used as ordinary tools. Others are specialized jobs in which advanced computer training combined with professional training gives people dramatically new kinds of careers. Consider:
•
In the hotel business, even front-desk clerks need to know how to deal with computerized reservation systems. Some hotels, however, also have a so-called computer concierge, someone with knowledge of computer systems who can help computer-carrying guests with online and other tech problems.
•
In law enforcement, police officers need to know how to use computers while on patrol or at their desks to check out stolen cars, criminal
wiL16775_ch01_001-048.indd 11
Careers. Front-desk workers at many hotels use computers to check guests in.
Introduction to Information Technology
and a growing number of states are putting everything from budgets to contracts to travel expenses online for the public to look at.36 The White House also has its own website (www.whitehouse.gov) with its Open Government Dialogue blog.37 Many local and state governments also have websites through which citizens can deal with everything from paying taxes and parking tickets, to renewing vehicle registration and driver’s licenses, viewing birth and marriage certificates, and applying for public sector jobs. The internet is also changing the nature of politics, enabling political candidates and political interest groups to connect with voters in new ways, to raise money from multiple small donors instead of just rich fat cats, and (using cellphones and text messaging) to organize street protests.38 The Barack Obama campaign was said to be particularly adept at exploiting information technology during his run for the presidency in 2008 and afterward for staying in touch with supporters to help him govern.39 Yet information also has its downside, as computers have allowed incumbent legislators to design (gerrymander) voting districts that make it nearly impossible for them to be dislodged; electronic tools have also made it easier than ever for political parties to skirt or break campaign laws, and computerized voting machines still don’t always count votes as they are supposed to. Still, websites and bloggers have become important watchdogs on government. The website E-Democracy (www.e-democracy.org), for instance, can help citizens dig up government conflicts of interest, and websites such as Project Vote Smart (www.votesmart. org) outline candidates’ positions.
11
11/23/09 3:55:59 PM
Confirming Pages
Police work. Syracuse, New York: An Onondaga County sheriff’s deputy enters information into a laptop in his squad car as he issues a ticket for an uninspected vehicle. The officer was using the sheriff’s department’s new computer database system.
records, outstanding arrest warrants, and the like. However, investigators with specialized computer backgrounds are also required to help solve fraud, computer break-ins, accounting illegalities, and other high-tech crimes.
•
In entertainment, computers are used for such ordinary purposes as budgets, payroll, and ticketing. However, there are also new careers in virtual set design, combining training in architecture and 3-D computer modeling, and in creating cinematic special effects.
Chapter 1
Clearly, information technology is changing old jobs and inventing new ones. To prosper in this environment, you need to combine a traditional education with training in computers and communications. You also need to be savvy about job searching, résumé writing, interviewing, and postings of employment opportunities. Advice about careers, job hunting, occupational trends, and employment laws is available at Yahoo!, Google, and other websites. Some starting annual salaries for recent college graduates are shown below; note that jobs involving degrees in computers and information systems occupy four of the seven top-paying starting salaries (• See Panel 1.2.) Computers can be used both for you to find employers and for employers to find you.40
12
wiL16775_ch01_001-048.indd 12
WAYS FOR YOU TO FIND EMPLOYERS As you might expect, the first to use cyberspace as a job bazaar were companies seeking people with technical backgrounds and technical people seeking employment. However, as the public’s interest in commercial services and the internet has exploded, the focus of online job exchanges has broadened. Now, interspersed among ads for programmers on the internet are openings for forest rangers in Idaho, physical therapists in Atlanta, models in Florida, and English teachers in China. Most websites are free to job seekers, although many require that you fill out an online registration form. (• See Panel 1.3.) WAYS FOR EMPLOYERS TO FIND YOU Posting your résumé online for prospective employers to view is attractive because of its low (or zero) cost and wide reach. But does it have any disadvantages? Certainly it might if the employer who sees your posting happens to be the one you’re already working for. In addition, you have to be aware that you lose control over anything broadcast
11/23/09 3:56:04 PM
Rev. Confirming Pages
Discipline (bachelor's degree)
Current average starting salary
panel 1.2
Computer science Computer engineering Electrical/electronics and communications engineering Mechanical engineering Civil engineering Management information systems/Business data processing Economics (business/managerial) Finance Accounting Business administration/Management Marketing/Marketing management Political science/Government History Biological sciences/Life sciences English language and literature/Letters Sociology
|||||||||||||||||||||||||||||||||||||||||||||||||||||| $61,280 ||||||||||||||||||||||||||||||||||||||||||||||||||||| $60,280 ||||||||||||||||||||||||||||||||||||||||||||||||||| $57,503 ||||||||||||||||||||||||||||||||||||||||||||||||||| $57,024 ||||||||||||||||||||||||||||||||||||||||||||||||| $51,780 ||||||||||||||||||||||||||||||||||||||||||||||||| $51,489 |||||||||||||||||||||||||||||||||||||||||||| $51,062 |||||||||||||||||||||||||||||||||||||||||| $48,158 |||||||||||||||||||||||||||||||||||||||||| $48,020 ||||||||||||||||||||||||||||||||||||||||| $46,171 ||||||||||||||||||||||||||||||||||||| $41,506 ||||||||||||||||||||||||||||||||| $38,844 ||||||||||||||||||||||||||||||||| $38,056 ||||||||||||||||||||||||||||||| $35,522 ||||||||||||||||||||||||||||||| $35,453 ||||||||||||||||||||||||||||||| $35,434
Entering the job market Average starting salary offers for 2008 college graduates
panel 1.3 Some websites that post job listings
Career One Stop: www.jobbankinfo.org
Yahoo! Hot Jobs: http://hotjobs.yahoo.com
Career Builder: www.careerbuilder.com
Jobs.com: www.jobs.com
College Grad Job Hunter: www.collegegrad.com
Jobs on Line: www.jobsonline.com
Erecruiting: www.erecruiting.com
MonsterTrak.com: www.jobtrak.com
FedWorld (U.S. Government jobs): www.fedworld.gov
JobWeb: www.jobweb.org
NationJob Network: www.nationjob.com
Monster.com: www.monster.com
Indeed.com: www.indeed.com
Simply Hired: www.simplyhired.com
into cyberspace. You’re putting your credentials out there for the whole world to see, and you need to be somewhat concerned about who might gain access to them. If you have a technical background, it’s definitely worth posting your résumé with an electronic jobs registry, since technology companies in particular find this an efficient way of screening and hiring. However, posting may also benefit people with less technical backgrounds. Online recruitment is popular with companies because it prescreens applicants for at least basic computer skills. If you’ve mastered the internet, you’re likely to know something about word processing, spreadsheets, and database searching as well, knowledge required in most good jobs these days. One wrinkle in job seeking is to prepare a résumé with web links and/or clever graphics and multimedia effects and then put it on a website to entice employers to chase after you. If you don’t know how to do this, there are many companies that—for a fee—can convert your résumé and publish it on their own websites. Some of these services can’t dress it up with fancy graphics or multimedia, but since complex pages take longer for employers to download anyway, the extra pizzazz is probably not worth the effort. A number of websites allow you to post your résumé for free. Another wrinkle is to pay extra to move your résumé higher in the listings so that it will stand out compared with competing résumés. For example, for an extra $20–$150 apiece, Careerbuilder.com will move your listing toward the top of the search heap, and the company says that employers click on upgraded résumés 200% more often than on regular ones.41
wiL16775_ch01_001-048.indd 13
Introduction to Information Technology
Source: Adapted from the NACE Average Starting Salary Offer Survey Results (2008), Purdue University Calumet, posted February 27, 2009, http://209.85.173.132/search?q⫽cache:http:// webs calumet.purdue.edu/careerservices/files/2008/10/nace-salary-survey.pdf (accessed April 21, 2009). The original survey is by the National Association of Colleges and Employers, copyright holder. © National Association of Colleges and Employers. All rights reserved. 62 Highland Ave., Bethlehem, PA 18017, www.nacewb.org.
13
2/5/10 7:37:06 AM
Rev. Confirming Pages
1.3 INFOTECH IS ALL-PERVASIVE: Cellphones, Email, the Internet, & the E-World
panel 1.4 Grandparent and offspring ENIAC (left) is the grandparent of today’s smartphones (right).
How does information technology facilitate email, networks, and the use of the internet and the web; what is the meaning of the term cyberspace?
panel 1.5 Timeline Overview of some of the historical developments in information technology. The timeline is modified in upcoming chapters to show you more about the people and advances contributing to developments in information technology.
Chapter 1
4000–1200
BCE
Inhabitants of the first known civilization in Sumer keep records of commericial transactions on clay tablets
3500
One of the first computers, the outcome of military-related research, was delivered to the U.S. Army in 1946. ENIAC (short for “Electronic Numerical Integrator And Calculator”) weighed 30 tons and was 80 feet long and two stories high, but it could multiply a pair of numbers in the then-remarkable time of threethousandths of a second. (• See Panel 1.4.) This was the first general-purpose, programmable electronic computer, the grandparent of today’s lightweight handheld machines—including the smart cellphone. Some of the principal historical developments are illustrated in the timeline below. (• See Panel 1.5.)
The Phone Grows Up How has the telephone changed? Cellphone e-mania has swept the world. All across the globe, people have acquired the portable gift of gab, with some users making 45 or more calls a day. Strategy Analytics has estimated that worldwide mobile phone subscriptions will rise to 3.9 billion in 2013; more than half the world’s population will be using mobile phones by 2010.42 It has taken more than 100 years for the
BCE–2900 BCE
Phoenicians develop an alphabet; Sumerians develop cuneiform writing; Egyptians develop hierogylphic writing
3000
BCE
Abacus is invented in Babylonia
1270
BCE
First encyclopedia (Syria)
900
BCE
First postal service (China)
530
BCE
Greeks start the first library
100
CE
First bound books
14
wiL16775_ch01_001-048.indd 14
2/5/10 7:37:21 AM
Confirming Pages
Smartphones. (left) Motorola Q9c smartphone. (middle) Ojo videophone, which allows face-to-face chats long distance. (right) Bandai Networks’ mobile phone that displays a novel. Bandai offers 150 books on its site for phone owners to download and read on their phones.
telephone to get to this point—getting smaller, acquiring push buttons, losing its cord connection. In 1964, the * and # keys were added to the keypad. In 1973, the first cellphone call was processed. In its most basic form, the telephone is still so simply designed that even a young child can use it. However, it is now becoming more versatile and complex—a way of connecting to the internet and the World Wide Web. Indeed, internet smartphones—such as the Apple iPhone, the Samsung Instinct, the palm Centro, and the Motorola Q9c—represent another giant step for information technology. Now you no longer need a personal computer to get on the internet. Smartphones in their various forms enable you not only to make voice calls but also to send and receive text messages, browse the World Wide Web, and obtain news, research, music, photos, movies, and TV programs. (And with camera and camcorder cellphones, you can send images, too.)43 According to one survey, the percentage of people who use nonvoice applications for text messages is 27%; email 11%; internet 9%; and photography 6%—and the numbers of users for these options are growing all the time.44
“You’ve Got Mail!” Email’s Mass Impact It took the telephone 40 years to reach 10 million customers, and fax machines 20 years. Personal computers made it into that many American homes 5 years
700–800 Arabic numbers introduced to Europe
1049 First moveable type (clay) invented in China
1450 Newspapers appear in Europe
1455 Printing press (J. Gutenberg, Germany)
1621 Slide rule invented (Edmund Gunther)
1642 First mechanical adding machine (Blaise Pascal)
1666 First mechanical calculator that can add and subtract (Samuel Morland)
Introduction to Information Technology
What makes email distinctive from earlier technologies?
15
wiL16775_ch01_001-048.indd 15
11/23/09 3:56:12 PM
Confirming Pages
after they were introduced. Email, which appeared in 1981, became popular far more quickly, reaching 10 million users in little more than a year.45 No technology has ever become so universal so fast. Thus, one of the first things new computer and internet users generally learn is how to send and receive email. Until 1998, hand-delivered mail was still the main means of correspondence. But in that year, the volume of email in the United States surpassed the volume of hand-delivered mail. In 2007, the total number of email messages sent daily has been estimated at 183 billion worldwide.46 Already, in fact, email is the leading use of PCs. Because of this explosion in usage, suggests a BusinessWeek report, “email ranks with such pivotal advances as the printing press, the telephone, and television in mass impact.”47 Using electronic mail clearly is different from calling on a telephone or writing a conventional letter. As one writer puts it, email “occupies a psychological space all its own. It’s almost as immediate as a phone call, but if you need to, you can think about what you’re going to say for days and reply when it’s convenient.”48 Email has blossomed, points out another writer, not because it gives us more immediacy but because it gives us less. “The new appeal of email is the old appeal of print,” he says. “It isn’t instant; it isn’t immediate; it isn’t in your face.” Email has succeeded for the same reason that the videophone—which allows callers to see each other while talking—has been so slow to catch on: because “what we actually want from our exchanges is the minimum human contact commensurate with the need to connect with other people.”49 It will be interesting to see, however, whether this observation holds up during the next few years if marketers roll out more videophones. What is interesting, though, is that in these times when images often seem to overwhelm words, email is actually reactionary. “The internet is the first new medium to move decisively backward,” points out one writer, because it essentially involves writing. Twenty years ago, “even the most literate of us wrote maybe a half a dozen letters a year; the rest of our lives took place on the telephone.”51 Email has changed all that—and has put pressure on businesspeople in particular to sharpen their writing skills. (A countertrend, unfortunately, is that the informal style of electronic messages is showing up in schoolwork.)52
1714
A linked sequence of punched cards controls the weaving patterns in Jacquard’s loom
1820 The first massproduced calculator, the Thomas Arithnometer
1829 William Austin patents the first workable typewriter in America
1833 Babbage’s difference engine (automatic calculator)
1843 World’s first computer programmer, Ada Lovelace, publishes her notes
Chapter 1
First patent for a typewriter (England)
1801
16
wiL16775_ch01_001-048.indd 16
11/23/09 3:56:22 PM
Confirming Pages
PRACTICAL ACTION Managing Your Email
F
a message electronically that you don’t want some third party to read. Email messages are not written with disappearing ink; they remain in a computer system long after they have been sent. Worse, recipients can easily copy and even alter your messages and forward them to others without your knowledge. •
•
Do your part to curb the email deluge: Put short messages in the subject line so that recipients don’t have to open the email to read the note. Don’t reply to every email message you get. Avoid “cc:ing” (copying to) people unless absolutely necessary. Don’t send chain letters or lists of jokes, which just clog mail systems.
•
•
Be helpful in sending attachments: Attachments— computer files of long documents or images attached to an email—are supposed to be a convenience, but often they can be an annoyance. Sending a 1-megabyte file to a 500-person mailing list creates 500 copies of that file— and that many megabytes can clog the mail system. (A 1-megabyte file is about the size of a 300-page doublespaced term paper.) Ask your recipients beforehand if they want the attachment.
•
•
Be careful about opening attachments you don’t recognize: Some dangerous computer viruses—renegade programs that can damage your computer—have been spread by email attachments that automatically activate the virus when they are opened.
•
•
Use discretion about the emails you send: Email should not be treated as informally as a phone call. Don’t send
1844 Samuel Morse sends a telegraph message from Washington to Baltimore
1854 George Boole publishes “An Investigation on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design
1876 Alexander Graham Bell patents the telephone
•
Make sure emails to bosses, coworkers, and customers are literate: It’s okay to be informal when emailing friends, but employers and customers expect a higher standard. Pay attention to spelling and grammar. Don’t use email to express criticism and sarcasm: Because email carries no tone or inflection, it’s hard to convey emotional nuances. Avoid criticism and sarcasm in electronic messaging. Nevertheless, you can use email to provide quick praise, even though doing it in person will take on greater significance. Be aware that email you receive at work is the property of your employer: Be careful of what you save, send, and back up. Realize that deleting email messages doesn’t totally get rid of them: “Delete” moves the email from the visible list, but the messages remain on your hard disk and can be retrieved by experts. Special software, such as Spytech Eradicator and Window Washer, will completely erase email from the hard disk. Don’t neglect real personal contact: More companies are asking employees to trade email for more in-person contact with the people they work with, through such practices as banning the use of email on Fridays. This has come about because so many employees complain that they have to leave multiple messages when trying to get answers since coworkers don’t respond in timely fashion.
1890 Electricity used for first time in a dataprocessing project— Hollerith’s automatic census-tabulating machine (used punched cards)
1895 First radio signal transmitted
1907 First regular radio broadcasts, from New York
1920–1921 The word “robot,” derived from the Czech word for compulsory labor, is first used to mean a humanlike machine
Introduction to Information Technology
or many people, email is the online environment, more so than the World Wide Web. According to one study, 60% of people who do emailing at work average 10 or fewer messages a day, 23% receive more than 20, and 6% receive more than 50.50 But some people receive as many as 300 emails a day—with perhaps 200 being junk email (spam), bad jokes, or irrelevant memos (the “cc,” previously “carbon copy,” now “courtesy copy”). It’s clear, then, that email will increase productivity only if it is used properly. Overuse or misuse just causes more problems and wastes time. The following are some ideas to keep in mind when using email:
17
wiL16775_ch01_001-048.indd 17
11/23/09 3:56:23 PM
Rev. Confirming Pages
The Internet, the World Wide Web, & the “Plumbing of Cyberspace” What’s the difference between the net, the web, and cyberspace? As the success of the cellphone shows, communications has extended into every nook and cranny of civilization (with poorer nations actually the leaders in cellphone growth), a development called the “plumbing of cyberspace.” The term cyberspace was coined by William Gibson in his novel Neuromancer (1984) to describe a futuristic computer network into which users plug their brains. (Cyber comes from “cybernetics,” a term coined in 1948 to apply to the comparative study of automatic control systems, such as the brain/nervous system and mechanical-electrical communication systems.) In everyday use, this term has a rather different meaning. Today many people equate cyberspace with the internet. But it is much more than that. Cyberspace includes not only the web, chat rooms, online diaries (blogs), and member-based services such as America Online—all features we explain in this book—“but also such things as conference calls and automatic teller machines,” says David Whittler.53 We may say, then, that cyberspace encompasses not only the online world and the internet in particular but also the whole wired and wireless world of communications in general—the nonphysical terrain created by computer and communications systems. Cyberspace is where you go when you go online with your computer. THE NET & WEB DEFINED The two most important aspects of cyberspace are the internet and that part of the internet known as the World Wide Web. To give them formal definition:
Chapter 1
1924 T.J. Watson renames Hollerith’s machine company, founded in 1896, to International Business Machines (IBM)
•
The internet—“the mother of all networks”: The internet is at the heart of the Information Age. Called “the mother of all networks,” the internet (the “net”) is a worldwide computer network that connects hundreds of thousands of smaller networks. These networks link educational, commercial, nonprofit, and military entities, as well as individuals.
•
The World Wide Web—the multimedia part of the internet: The internet has been around for more than 40 years. But what made it popular, apart from email, was the development in the early 1990s of the World Wide Web, often called simply the “Web” or the “web”—an interconnected system of internet computers (called servers) that support specially formatted documents in multimedia form. The word multimedia, from “multiple media,” refers to technology that presents information in more than one medium, such as text, still images, moving images, and sound. In other words, the web provides information in more than one way.
1927 First demonstration of television in USA
1941 Konrad Zuse (Germany) produces the first fully functional programmable digital computer, the Z3 (ran by perforated celluloid strips)
1942 First electronic digital computer (but nonprogrammable) developed by John Atanasoff and Clifford Berry
1944 First programmable electromechanical computer (Mark I) (owned by the U.S. government)
1945 John von Neumann introduces the concept of a stored program
18
wiL16775_ch01_001-048.indd 18
12/18/09 4:21:58 PM
Confirming Pages
Always on Most of today’s students don’t remember a time before the existence of cyberspace.
THE INTERNET’S INFLUENCE There is no doubt that the influence of the net and the web is tremendous. At present, 75% of American adults use the internet, according to the Pew Internet & American Life Project.54 Seventy-two percent of American adult internet users use the net on an average day, with 60% using it to send or read email.55 But just how revolutionary is the internet? Is it equivalent to the invention of television, as some technologists say? Or is it even more important—equivalent to the invention of the printing press? “Television turned out to be a powerful force that changed a lot about society,” says USA Today technology reporter Kevin Maney. “But the printing press changed everything—religion, government, science, global distribution of wealth, and much more. If the internet equals the printing press, no amount of hype could possibly overdo it.”56
College Students & the E-World
One thing we know already is that cyberspace is saturating our lives. The worldwide internet population was 1.59 billion (or nearly 24% of the world’s population in 2009). About 251 million of those internet users were in North America, representing a penetration of 74% of the population.57 While the average age of users is 1946 First programmable electronic computer in United States (ENIAC)
1947 Invention of the transistor (enabled miniaturization of electronic devices)
1951 Computers are first sold commercially
1952 UNIVAC computer correctly predicts election of Eisenhower as U.S. President
1958 Integrated circuit; first modem
1962 The first computer game is invented (Spacewar)
1969 ARPANet established by U.S. Advanced Research Projects Agency; led to internet
Introduction to Information Technology
How does my use of information technology compare with that of other students?
19
wiL16775_ch01_001-048.indd 19
11/23/09 3:56:37 PM
Confirming Pages
rising, there’s no doubt that people ages 18–29 love the internet, with 87% of them using it; among all computer users with a college education, 95% use the net.58 Teens and young adults (age 18–32) are the most likely of all groups to use the internet for communicating with friends and family; for entertainment— especially online videos, online games, and virtual worlds (such as for multiplayer online role-playing games)—and for obtaining music. They are also considerably more likely than older users to use social networking sites— online communities, such as Facebook and Twitter, that allow members to keep track of their friends and share photos, videos, and the like. In addition, young people are more apt to send instant messages and to do text messaging (texting) with friends—send brief written messages between cellphones.59 We consider all these technologies later in the book.
1.4 THE “ALL-PURPOSE MACHINE”: The Varieties of Computers What are the five sizes of computers, and what are clients and servers? When the ✭alarm clock blasts you awake, you leap out of bed and head for the kitchen, where you check the ✭coffee maker. After using your ✭electronic toothbrush and showering and dressing, you stick a bagel in the ✭microwave, and then pick up the ✭TV remote and click on the ✭TV to catch the weather forecast. Later, after putting dishes in the ✭dishwasher, you go out and start up the ✭car and head toward campus or work. Pausing en route at a ✭traffic light, you turn on your ✭iPod to listen to some music. And you might use your ✭GPS system to get to your destination. You haven’t yet touched a PC, a personal computer, but you’ve already dealt with at least 11 computers—as you probably guessed from the ✭s. All these familiar appliances rely on tiny “computers on chips” called microprocessors. Maybe, then, the name “computer” is inadequate. As computer pioneer John von Neumann has said, the device should not be called the computer but rather the “all-purpose machine.” It is not, after all, just a machine for doing calculations. The most striking thing about it is that it can be put to any number of uses. What are the various types of computers? Let’s take a look.
All Computers, Great & Small: The Categories of Machines What are the five sizes of computers? At one time, the idea of having your own computer was almost like having your own personal nuclear reactor. In those days, in the 1950s and 1960s, computers were enormous machines affordable only by large institutions. Now they come in a variety of shapes and sizes, which can be classified according to their processing power: supercomputers, mainframe computers, workstations, microcomputers, and microcontrollers. We also consider servers.
Chapter 1
1970 Microprocessor chips come into use; floppy disk introduced for storing data; first dynamic RAM chip
1972 First videogame (Pong)
1975 First microcomputer (MIT’s Altair 8800)
1976 Apple I computer (first personal computer sold in assembled form)
1978 1 4
5 " floppy disk; Atari home videogame; first spam email sent
1981 IBM introduces personal computer; mouse becomes regular part of a computer
1982 Portable computers
20
wiL16775_ch01_001-048.indd 20
11/23/09 3:56:41 PM
Rev. Confirming Pages
Top Speed, Teraflops
Roadrunner Los Alamos Laboratory and IBM Blue Gene/L IBM Molecular Dynamics Machine Riken Grape-6 U. Tokyo Columbia SGI Earth Simulator NEC
panel 1.6
Location U.S. U.S.
1,105 280.6
more
info!
Japan Japan U.S. Japan
78 64 61 41
FLOPS
Source: Data from www.top500.org, reported in Don Clark, “Los Alamos Computer Keeps Title as the Fastest,” The Wall Street Journal, November 11, 2008, p. B9; www.newsfactor. com/story.xhtml?story_id⫽31771; www.supercomputingonline.com/print.php?sid⫽8879; and H. Josef Hebert, “Computer Proves It’s World’s Fastest,” San Francisco Chronicle, June 10, 2008, p. 47.
Supercomputers Is there a chance I might use a supercomputer? Typically priced from $1 million to more than $350 million, supercomputers are high-capacity machines with thousands of processors that can perform more than several trillion calculations per second. These are the most expensive and fastest computers available. “Supers,” as they are called, have been used for tasks requiring the processing of enormous volumes of data, such as doing the U.S. census count, forecasting weather, designing aircraft, modeling molecules, and breaking encryption codes. More recently they have been employed for business purposes—for instance, sifting demographic marketing information—and for creating film animation. The fastest computer in the world, costing $100 million and with roughly the computing power of 100,000 of today’s most powerful laptops, is the Roadrunner, developed by engineers from the Los Alamos National Laboratory and IBM Corp., primarily for nuclear weapons research, including simulating nuclear explosions. Roadrunner’s speed is 1.105 petaflops, or 1,105 trillion operations per second.60 (• See Panel 1.6.) In February 2009, IBM announced its intent to release “Sequoia,” a 20 petaflops supercomputer, in 2011. This machine will have the power of approximately 2 million laptops.
In computing, FLOPS is an abbreviation of Floating-point Operations Per Second. Flops is used as a measure of a computer’s performance, especially in fields of scientific calculations. Using floating-point encoding, extremely long numbers can be handled relatively easily. Computers operate in the trillions of flops; for comparison, any response time below 0.1 second is experienced as instantaneous by a human operator, so a simple pocket calculator could be said to operate at about 10 flops. Humans are even worse floating-point processors. If it takes a person a quarter of an hour to carry out a penciland-paper long division with 10 significant digits, that person would be calculating in the milliflops range.
Roadrunner supercomputer from Los Alamos National Laboratory and IBM This is the world’s fastest supercomputer.
1984 Apple Macintosh; first personal laser printer
1994
1998
Apple and IBM PayPal is introduce PCs founded with full-motion video built in; wireless data transmission for small portable computers; first web browser invented
2000
2001
The “Y2K” nonproblem; the first U.S. presidential webcast
2002
2003
Dell computers Friendster Facebook becomes the MySpace largest PC maker
Introduction to Information Technology
Supercomputer Maker or Lab
21
wiL16775_ch01_001-048.indd 21
2/5/10 7:37:45 AM
Rev. Confirming Pages
Supercomputers are still the most powerful computers, but a new generation may be coming that relies on nanotechnology, in which molecule-size nanostructures are used to create tiny machines for holding data or performing tasks. (Nano means “one-billionth.”) Computers the size of a pencil eraser could become available that work 10 times faster than today’s fastest supercomputer.61 Eventually nanotech could show up in every device and appliance in your life.
Mainframe Computers What kind of services am I apt to get from a mainframe? The only type of computer available until the late 1960s, mainframes are water- or air-cooled computers that cost $5,000–$5 million and vary in size from small, to medium, to large, depending on their use. Small mainframes ($5,000–$200,000) are often called midsize computers; they used to be called minicomputers, although today the term is seldom used. Mainframes are used by large organizations—such as banks, airlines, insurance companies, and colleges—for processing millions of transactions. Often users access a mainframe by means of a terminal, which has a display screen and a keyboard and can input and output data but cannot by itself process data. Mainframes process billions of instructions per second. Mainframe computer
Workstations What are some uses of workstations?
Workstation
Chapter 1
Hewlett-Packard Touchsmart This desktop computer allows users to move items around on the screen with their hands, to open and close files, and to perform other functions manually.
22
wiL16775_ch01_001-048.indd 22
Introduced in the early 1980s, workstations are expensive, powerful personal computers usually used for complex scientific, mathematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. Providing many capabilities comparable to those of midsize mainframes, workstations are used for such tasks as designing airplane fuselages, developing prescription drugs, and creating movie special effects. Workstations have caught the eye of the public mainly for their graphics capabilities, which are used to breathe three-dimensional life into movies such as WALL • E, Harry Potter, and X-Men Origins: Wolverine. The capabilities of lowend workstations overlap those of high-end desktop microcomputers.
Microcomputers How does a microcomputer differ from a workstation? Microcomputers, also called personal computers (PCs), which cost $500 to over $5,000, can fit next to a desk or on a desktop or can be carried around. They either are stand-alone machines or are connected to a computer network, such as a local area network. A local area network (LAN) connects, usually by special cable, a group of desktop PCs and other devices, such as printers, in an office or a building. Microcomputers are of several types: desktop PCs, tower PCs, notebooks (laptops), netbooks, mobile internet devices (MIDs), and personal digital assistants—handheld computers or palmtops.
2004
2005
2006
IBM PC sold YouTube Twitter to Lenovo Wii Group Flickr
2007 Skype
2012
2030–2045
Foldable The computers Singularity
12/18/09 4:22:12 PM
Rev. Confirming Pages
DESKTOP PCs Desktop PCs (left) are older microcomputers whose case or main housing sits on a desk, with keyboard in front and monitor (screen) often on top.
Small The Mac Mini has the smallest desktop microcomputer case, just 6.5 inches square and 2 inches tall.
TOWER PCs Tower PCs are microcomputers whose case sits as a “tower,” often on the floor beside a desk, thus freeing up desk surface space. Some desktop computers, such as Apple’s iMac, no longer have a boxy housing; most of the computer components are built into the back of the flat-panel display screen. NOTEBOOKS Notebook computers, also called laptop computers, are lightweight portable computers with built-in monitor, keyboard, hard-disk drive, CD/DVD drive, battery, and AC adapter that can be plugged into an electrical outlet; they weigh anywhere from 1.8 to 9 pounds.
Tower PC
NETBOOKS A fairly recent category, netbooks are low-cost, lightweight, computers with Notebook computers: Macbooks tiny dimensions and functions designed for basic tasks, such as web searching, email, and word processing. They weigh anywhere from 2.25 to 3.2 pounds, cost generally between $270 and $500, have little processing power, and have screens between 8.9 and 12 inches wide diagonally.62 Netbooks fill a technological category between notebooks and handheld devices. Netbook
LG Mobile Internet Device (MID)
PERSONAL DIGITAL ASSISTANTS Personal digital assistants (PDAs), also called handheld computers or palmtops, combine personal organization tools—schedule planners, address books, to-do lists—with the ability in some cases to send email and faxes. Some PDAs have touch-sensitive screens. Some also connect to desktop computers for sending or receiving information. (For now, we are using the word digital to mean “computer based.”) The range of handheld wireless devices, such as multipurpose cellphones, has surged in recent years, and we consider these later in the book (Chapter 7).
Microcontrollers What gadgets do I have that might contain microcontrollers? Microcontrollers, also called embedded computers, are the tiny, specialized microprocessors installed in “smart” appliances and automobiles. These microcontrollers enable microwave ovens, for example, to store data about how long to cook your potatoes and at what power setting. Microcontrollers have been used to develop a new universe of experimental electronic
wiL16775_ch01_001-048.indd 23
Personal digital assistant (PDA)
Introduction to Information Technology
MOBILE INTERNET DEVICES (MIDs) Smaller than notebook computers but larger and more powerful than PDAs (see below), mobile internet devices (MIDs) are for consumers and business professionals. Fully internet integrated, they are highly compatible with desktop microcomputers and laptops. The initial models focus on data communication, not voice communication.
23
12/18/09 4:22:18 PM
Confirming Pages
Microcontroller The MPXY8020A pressure sensor from Motorola reduces tire blowouts and improves gas mileage. This embedded computer notifies drivers, via a dashboard display, when tire pressure is not optimal.
appliances—e-pliances. For example, they are behind single-function products such as digital cameras, MP3 and MP4 players, and organizers, which have been developed into hybrid forms such as gadgets that store photos and videos as well as music. They also help run tiny web servers embedded in clothing, jewelry, and household appliances such as refrigerators. In addition, microcontrollers are used in bloodpressure monitors, air bag sensors, gas and chemical sensors for water and air, and vibration sensors.
Servers How do servers work, and what do they do?
Cellphone microcontroller
The word server describes not a size of computer but rather a particular way in which a computer is used. Nevertheless, because servers have become so important to telecommunications, especially with the rise of the internet and the web, they deserve mention here. (Servers are discussed in detail in Chapters 2, 6, and 7.) A server, or network server, is a central computer that holds collections of data (databases) and programs for connecting or supplying services to PCs, workstations, and other devices, which are called clients. These clients are linked by a wired or wireless network. The entire network is called a client/server network. In small organizations, servers can store files, provide printing stations, and transmit email. In large organizations, servers may also house enormous libraries of financial, sales, and product information. You may never lay eyes on a supercomputer or mainframe or even a tiny microcontroller. But most readers of this book will already have laid eyes and hands on a personal computer. We consider this machine next.
Chapter 1
Servers A group of networked servers that are housed in one location is called a server farm or a server cluster.
24
wiL16775_ch01_001-048.indd 24
11/23/09 3:57:08 PM
Confirming Pages
1.5 UNDERSTANDING YOUR COMPUTER: How Can You Customize (or Build) Your Own PC? What four basic operations do all computers use, and what are some of the devices associated with each operation? How does communications affect these operations? Perhaps you know how to drive a car. But do you know what to do when it runs badly? Similarly, you’ve probably been using a personal computer. But do you know what to do when it doesn’t act right—when, for example, it suddenly “crashes” (shuts down)? Cars are now so complicated that professional mechanics are often required for even the smallest problems. With personal computers, however, there are still many things you can do yourself—and should learn to do, so that, as we’ve suggested, you can be effective, efficient, and employable. To do so, you first need to know how computers work.
How Computers Work: Three Key Concepts What are the three fundamental principles everyone should understand about how computers work? Could you build your own personal computer? Some people do, putting together bare-bones systems for just a few hundred dollars. “If you have a logical mind, are fairly good with your hands, and possess the patience of Job, there’s no reason you can’t . . . build a PC,” says science writer David Einstein. And, if you do it right, “it will probably take only a couple of hours,” because industry-standard connections allow components to go together fairly easily.63 Actually, probably only techies would consider building their own PCs. But many ordinary users order their own custom-built PCs. Let’s consider how you might do this. We’re not going to ask you to build or order a PC—just to pretend to do so. The purpose of this exercise is to give you a basic overview of how a computer works. That information will help you when you go shopping for a new system or, especially, if you order a custom-built system. It will also help you understand how your existing system works, if you have one. Before you begin, you will need to understand three key concepts.
•
Data: Data consists of the raw facts and figures that are processed into information—for example, the votes for different candidates being elected to student-government office.
•
Information: Information is data that has been summarized or otherwise manipulated for use in decision making—for example, the total votes for each candidate, which are used to decide who won.
2. DIFFERENCE BETWEEN HARDWARE & SOFTWARE You should know the difference between hardware and software.
•
Hardware: Hardware consists of all the machinery and equipment in a computer system. The hardware includes, among other devices, the keyboard, the screen, the printer, and the “box”—the computer or processing device itself. Hardware is useless without software.
•
Software: Software, or programs, consists of all the electronic instructions that tell the computer how to perform a task. These instructions come from a software developer in a form (such as a CD, or compact disk) that will be accepted by the computer. Examples are Microsoft Windows and Office XP/Vista.
wiL16775_ch01_001-048.indd 25
Introduction to Information Technology
1. PURPOSE OF A COMPUTER: TURNING DATA INTO INFORMATION Very simply, the purpose of a computer is to process data into information.
25
11/23/09 3:57:16 PM
Confirming Pages
S u rv i v al Ti p
3. THE BASIC OPERATIONS OF A COMPUTER Regardless of type and size, all computers use the same four basic operations: (1) input, (2) processing, a (3) storage, and (4) output. To this we add (5) communications.
•
Input operation: Input is whatever is put in (“input”) to a computer system. Input can be nearly any kind of data—letters, numbers, symbols, shapes, colors, temperatures, sounds, pressure, light beams, or whatever raw material needs processing. When you type some words or numbers on a keyboard, those words are considered input data.
•
Processing operation: Processing is the manipulation a computer does to transform data into information. When the computer adds 2 + 2 to get 4, that is the act of processing. The processing is done by the central processing unit—frequently just called the CPU—a device consisting of electronic circuitry that executes instructions to process data.
•
Storage operation: Storage is of two types—temporary storage and permanent storage, or primary storage and secondary storage. Primary storage, or memory, is the internal computer circuitry that temporarily holds data waiting to be processed. Secondary storage, simply called storage, refers to the devices and media that store data or information permanently. A hard disk or CD/DVD is an example of this kind of storage. (Storage also holds the software—the computer programs.)
•
Output operation: Output is whatever is output from (“put out of”) the computer system—the results of processing, usually information. Examples of output are numbers or pictures displayed on a screen, words printed out on paper by a printer, or music piped over some loudspeakers.
•
Communications operation: These days, most (though not all) computers have communications ability, which offers an extension capability—in other words, it extends the power of the computer. With wired or wireless communications connections, data may be input from afar, processed in a remote area, stored in several different locations, and output in yet other places. However, you don’t need communications ability to write letters, do calculations, or perform many other computer tasks.
Input is covered in detail in Chapter 5.
S u rv i v al Ti p Processing is covered in detail in Chapter 4.
S u rv i v al Ti p Storage is covered in detail in Chapter 4.
S u rv i v al Ti p Output is covered in detail in Chapter 5.
S u rv i v al Ti p Communications is covered in detail in Chapters 2, 6, and 7.
These five operations are summarized in the illustration on the facing page. (• See Panel 1.7.)
Pretending to Order (or Build) a Custom-Built Desktop Computer: Basic Knowledge of How a Computer Works
Chapter 1
In what order would components be put together to build a custom desktop computer?
26
wiL16775_ch01_001-048.indd 26
Now let’s see how you would order a custom-built desktop PC, or even build one yourself. Remember, the purpose of this is to help you understand the internal workings of a computer so that you’ll be knowledgeable about using one and buying one. (If you were going to build it yourself, you would pretend that someone had acquired the PC components for you from a catalog company and that you’re now sitting at a table about to begin assembling them. All you would need is a combination Phillips/flathead screwdriver, perhaps a small wrench, and a static-electricity-arresting strap for your wrist, to keep static electricity from adversely affecting some computer components. You would also need the manuals that come with some of the components.) Although prices of components are always subject to change, we have indicated general ranges of prices for basic equipment current as of 2009 so that you can get a sense of the relative importance of the various parts. (“Loaded” components— the most powerful and sophisticated equipment—cost more than the prices given here.)
11/23/09 3:57:16 PM
Rev. Confirming Pages
CD/DVD drive
2
Processing: Once in the computer, data can be processed—numbers compared or sorted, text formatted, images or sounds edited.
hard-disk drive (hidden)
system unit
1
Input: You input data into the computer, using a keyboard, mouse, or other device (such as a scanner, microphone, still camera, or video camera). The input data may be text, numbers, images and/or sounds.
3
mouse
Storage: Data and programs not currently being used are held in storage. Primary storage is computer circuitry. Secondary storage is usually some kind of disk (such as hard disk or CD/DVD) or tape.
keyboard
Communications: Often data or information can be transmitted by modem to or from other computers, as via email or posting to a website. modem (This one is external. Modems are usually internal—on a circuit card inside the system unit.)
panel 1.7 Basic operations of a computer
4
Output: Processed information is output on a monitor, speakers, printer, or other device.
monitor
speakers
Note: All the system components you or anyone else chooses must be compatible—in other words, each brand must work with other brands. If you work with one company—such as Dell, or Hewlett-Packard—to customize your system, you won’t have to worry about compatibility. If you choose all the components yourself—for example, by going to a computer-parts seller such as ComputerGeeks.com (www.geeks.com)—you will have to check on compatibility as you choose each component. And you’ll have to make sure each component comes with any necessary cables, instructions, and componentspecific software (called a driver) that makes the component run. This section of the chapter gives you a brief overview of the components, which are all covered in detail in Chapters 2–6. We describe them in the following order: (1) input hardware—keyboard and mouse; (2) processing and memory hardware; (3) storage hardware—disk drives; (4) output hardware— video and sound cards, monitor, speakers, and printer; (5) communication hardware—the modem; and (6) software—system and application.
wiL16775_ch01_001-048.indd 27
printer
Sur v iv a l T ip Hardware Info Go to http://computers.bizrate. com/computers_software/ for a listing of virtually all types of hardware, their descriptions, ratings, and prices, and the names of sellers.
Introduction to Information Technology
5
27
2/5/10 7:38:04 AM
Confirming Pages
Input Hardware: Keyboard & Mouse What do the two principal input devices, keyboard and mouse, do? Input hardware consists of devices that allow people to put data into the computer in a form that the computer can use. At minimum, you will need two things: a keyboard and a mouse. KEYBOARD (Cost: $5–$100) On a microcomputer, a keyboard is the primary input device. A keyboard is an input device that converts letters, numbers, and other characters into electrical signals readable by the processor. A microcomputer keyboard looks like a typewriter keyboard, but besides having keys for letters and numbers it has several keys (such as F keys and Ctrl, Alt, and Del keys) intended for computer-specific tasks. After other components are assembled, the keyboard will be plugged into the back of the computer in a socket intended for that purpose. (CordKeyboard less keyboards work differently.)
Mouse
MOUSE ($5–$50) A mouse is a nonkeyboard input device (“pointing device”) that is used to manipulate objects viewed on the computer display screen. The mouse cord is plugged into the back of the computer or into the back of the keyboard after the other components are assembled. (Cordless mice are also available.)
Processing & Memory Hardware: Inside the System Cabinet How do I distinguish the processing and memory devices in a computer? What does the motherboard do? The brains of the computer are the processing and memory devices, which are installed in the case or system cabinet. CASE & POWER SUPPLY (about $10–$200) Also known as the system unit, the case or system cabinet is the box that houses the processor chip (CPU), the memory chips, and the motherboard with power supply, as well as some secondary-storage devices—floppy-disk drive (if any), harddisk drive, and CD or DVD drive, as we will explain. The case generally comes in desktop or tower models. It includes a power supply unit and a fan to keep the circuitry from overheating.
Chapter 1
Case
Processor chip
28
wiL16775_ch01_001-048.indd 28
PROCESSOR CHIP ($20–$1,000 or more) It may be small and not look like much, but it could be the most expensive hardware component of a build-it-yourself PC—and doubtless the most important. A processor chip (CPU, for central processing unit) is a tiny piece of silicon that contains millions of miniature electronic circuits. The speed at which a chip processes information is expressed in megahertz (MHz), millions of processing cycles per second, or gigahertz (GHz), billions of processing cycles per second. The faster the processor, the more expensive it is. For $50, you might get a 2-GHz chip, which is adequate for most student purposes. For $100, you might get a 3-GHz chip, which you would want if you’re running software with spectacular graphics and sound, such as those with some new videogames. Only older processors’ speed is measured in megahertz now, but if you want a cheap processor—for instance, because you plan to work only with text documents—you could get a 233-MHz processor for about $40.
11/23/09 3:57:19 PM
Rev. Confirming Pages
MEMORY CHIPS ($20–$600) These chips are also small. Memory chips, also known as RAM (random access memory) chips, represent primary storage, or temporary storage; they hold data before processing and information after processing, before it is sent along to an output or storage device. You’ll want enough memory chips to hold at least 1 gigabyte, or roughly 1 billion characters, of data, which is adequate for most student purposes. If you work with large graphics files, you’ll need more memory capacity, perhaps 2 gigabytes or more. (We will explain the numbers used to measure storage capacities in a moment.)
Memory chip (RAM chip)
Memory chips mounted on module (Memory chip)
MOTHERBOARD (about $45–$500) Also called the system board, the motherboard is the main circuit board in the computer. This is the big green circuit board to which everything else—such as the keyboard, mouse, and printer— attaches through connections (called ports) in the back of the computer. The processor chip and memory chips are also installed on the motherboard. The motherboard has expansion slots—for expanding the PC’s capabilities—which give you places to plug in additional circuit boards, such as those for video, sound, and communications (modem). (• See Panel 1.8.)
panel 1.8 Putting the components together
Motherboard Expansion slots
2
Plug microprocessor chip into motherboard
BIOS Chip
Plug memory chips into motherboard
3
Floppy-disk drive
5 Attach motherboard to system cabinet
4
Keyboard
wiL16775_ch01_001-048.indd 29
CD/DVD drive
Power switch Connect wire to power switch System cabinet
Connect power supply unit (includes fan)
Mouse
Hard-disk drive
Introduction to Information Technology
1
Built-in fan to cool the microprocessor
29
2/5/10 7:38:19 AM
Rev. Confirming Pages
PUTTING THE COMPONENTS TOGETHER Now the components can be put together. As the illustration on the previous page shows, ❶ the memory chips are plugged into the motherboard. Then ❷ the processor chip is plugged into the motherboard. Now ❸ the motherboard is attached to the system cabinet. Then ❹ the power supply unit is connected to the system cabinet. Finally, ❺ the wire for the power switch, which turns the computer on and off, is connected to the motherboard.
Storage Hardware: Hard Drive & CD/DVD Drive What kind of storage devices would I as a student probably want in my computer? With the motherboard in the system cabinet, the next step is installation of the storage hardware. Whereas memory chips deal only with temporary storage, secondary storage, or permanent storage, stores your data for as long as you want. For today’s student purposes, you’ll need a hard drive and a CD/DVD drive, and in older systems (called legacy systems), you might have a floppy disk drive. These storage devices slide into the system cabinet from the front and are secured with screws. Each drive is attached to the motherboard by a flat cable (called a ribbon cable). Also, each drive must be hooked up to a plug extending from the power supply. A computer system’s data/information storage capacity is represented by bytes, kilobytes, megabytes, gigabytes, terabytes, and petabytes, as follows: ⫽ 1 character of data (A character can be alphabetic—A, B, or C—or numeric—1, 2, or 3—or a special character—!, ?, *, $, %.) 1 kilobyte ⫽ 1,024 characters 1 megabyte ⫽ 1,048,576 characters 1 gigabyte ⫽ more than 1 billion characters 1 terabyte ⫽ more than 1 trillion characters 1 petabye ⫽ about 1 quadrillion characters 1 byte
Chapter 1
Floppy disk drive
30
wiL16775_ch01_001-048.indd 30
FLOPPY-DISK DRIVE ($25) A floppy-disk drive is a storage device that stores data on removable 3.5-inchdiameter diskettes. These diskettes, which are now used mostly on fairly old microcomputer systems, don’t seem to be “floppy,” because they are encased in hard plastic, Floppy disk but the mylar disk inside is indeed flexible or floppy. Each can store 1.44 million bytes (characters) or more of data. With a floppyFloppy disk disk drive installed, you’ll later be able to insert a diskette through a slot in the front and remove it by pushing the eject button. HARD-DISK DRIVE ($35–$200, depending on storage capacity) A hard-disk drive is a storage device that stores billions of characters of data on a nonremovable disk platter. With 120–200 gigabytes of storage (about $40), you should be able to handle most student needs. (Some hard-disk drives store up to 2 teraHard-disk drive (goes inside the computer bytes of data.) case)
1/19/10 3:11:44 PM
Confirming Pages
CD/DVD DRIVE ($30–$180) A CD (compact-disk) drive, or its CD/DVD disk more recent variant, a DVD (digital video-disk) drive, is a storage device that uses laser technology to read data from CD/DVD drive optical disks. (Some companies call a DVD a “digital versatile disk.”) Today new software is generally supplied on CDs or via the net. The system cabinet has lights on the front that indicate when these drives are in use. (You must not remove a disk from the drive until its light goes off, or else you risk damage to both disk and drive.) The wires for these lights need to be attached to the motherboard.
Output Hardware: Video & Sound Cards, Monitor, Speakers, & Printer What kinds of output hardware are standard with a PC? Output hardware consists of devices that translate information processed by the computer into a form that humans can understand—print, sound, graphics, or video, for example. Now a video card and a sound card need to be installed in the system cabinet. Next the monitor, speakers, and a printer are plugged in. This is a good place to introduce the term peripheral device. A peripheral device is any component or piece of equipment that expands a computer’s input, storage, and output capabilities. In other words, a peripheral device is not part of the essential computer. Peripheral devices can be inside the computer or connected to it from the outside. Examples include printers and disk drives.
Slot on motherboard Insert slot on motherboard Introduction to Information Technology
VIDEO CARD ($30–$1,400) You doubtless want your monitor to display color (rather than just black-and-white) images. Your system cabinet will therefore need to have a device to make this possible. A video card converts the processor’s output information into a video signal that can be sent through a cable to the monitor. Remember the expansion slots we mentioned? Your video card is plugged into one of these on the motherboard. (You can also buy a motherboard with built-in video.) SOUND CARD ($15–$300 and higher) You may wish to listen to music on your PC. If so, you’ll need a sound card, which enhances the computer’s soundgenerating capabilities by allowing sound to be output through speakers. This, too, would be plugged into an expansion slot on the motherboard. (Once again, you can buy a motherboard with built-in sound.) With the CD drive connected to the card, you can listen to music CDs. MONITOR ($150–$300 or higher for a 17-inch model or a 19-inch model; $300–$1,200 or more for larger displays) As with television sets, the inch dimension on monitors is measured diagonally corner to corner. The monitor is the display device that takes the electrical signals from the video card and forms an image using points of colored light on the screen. Later, after the system cabinet has been closed up, the monitor will be connected by means of a cable to the back of the computer, using the clearly marked connector. The power cord for the monitor will be plugged into a wall plug.
wiL16775_ch01_001-048.indd 31
Monitor
31
11/23/09 3:57:38 PM
Confirming Pages
PAIR OF SPEAKERS ($25–$250) Speakers are the devices that play sounds transmitted as electrical signals from the sound card. They may not be very sophisticated, but unless you’re into high-fidelity recordings they’re probably good enough. The two speakers are connected to a single wire that is plugged into the back of the computer once installation is completed.
Speakers
PRINTER ($50–$1,000) Especially for student work, you certainly need a printer, an output device that produces text and graphics on paper. There are various types of printers, as we discuss later. The printer has two connections. One, which relays signals from the computer, goes to the back of the PC, where it connects with the motherboard. The other is a power cord that goes to a wall plug. Color printers are more expensive than black-and-white printers, and fast printers cost more than slow ones.
Communications Hardware: Modem How is a modem installed? Computers can be stand-alone machines, unconnected to anything else. If all you’re doing is word processing to write term papers, you can do it with a stand-alone system. As we have seen, however, the communications component of the computer system vastly extends the range of a PC. Thus, while the system cabinet is still open, there is one more piece of hardware to install.
Printer
MODEM ($10–$100) A standard modem is a device that sends and receives data over telephone lines to and from computers. The modem is mounted on an expansion card, which is fitted into an expansion slot on the motherboard. Later you can run a telephone line from the teleModem card phone wall plug to the back of the PC, where it will connect to the modem. Other types of communications connections exist, which we cover in Chapters 2 and 6. However, standard modems are still often used. Now the system cabinet is closed up. The person building the system will plug in all the input and output devices and turn on the power “on” button. Your microcomputer system will look similar to the one opposite. (• See Panel 1.9.) Are you now ready to roll? Not quite.
Software In what order are the two kinds of software installed?
Chapter 1
System software—a version of Microsoft Vista
32
System software—a version of Microsoft 7
wiL16775_ch01_001-048.indd 32
With all the pieces put together, the person assembling the computer (you, if you’re building it yourself) needs to check the motherboard manual for instructions on starting the system. One of the most important tasks is to install software, the electronically encoded instructions that tell the computer hardware what to do. Software is what makes the computer worthwhile. There are two types—system software and application software. SYSTEM SOFTWARE First, system software must be installed. System software helps the computer perform essential operating tasks and enables the application software to run. System software consists of several electronically coded programs. The most important is the operating system, the master control program that runs the computer. Examples of operating system software for the PC are various Microsoft programs (such as Windows 95, 98, XP, Vista, and 7), Unix, and Linux. The Apple Macintosh microcomputer is another matter altogether. As we explain in Chapter 3, it has its own hardware components and software, which often aren’t directly transferable to the PC. System software comes most often on CDs. The person building your computer system will insert these into your CD drive and follow the on-screen
11/23/09 3:57:40 PM
Rev. Confirming Pages
Processor, memory, hard-disk drive, video card, sound card, and modem are inside the system cabinet
Hard-disk drive CD/DVD drive Storage
panel 1.9
Speaker
Completely assembled PC hardware system
Output Output
Output
Processing Memory Communications
Input
Input
Printer
System unit
Keyboard
Mouse
directions for installation. (Installation is the process of copying software programs from secondary-storage media—CDs, for example—onto your system’s hard disk, so that you can have direct access to your hardware.) After the system software is installed, setup software for the hard drive, the video and sound cards, and the modem must be installed. These setup programs (drivers, discussed in Chapter 3) will probably come on CDs. Once again, the installer inserts these into the appropriate drive and then follows the instructions that appear on the screen.
Application software for rendering art
Is Getting a Custom-Built PC Worth the Effort? Why might I want to build a PC myself—and why not? Does the foregoing description make you want to try putting together a PC yourself? If you add up the costs of all the components (not to mention the value of your time), and then start checking ads for PCs, you might wonder why anyone would bother going to the trouble of building one. And nowadays you would probably be right. “If you think you’d save money by putting together a computer from scratch,” says David Einstein, “think again. You’d be lucky to match the price PC-makers are charging these days in their zeal to undercut the competition.”64
wiL16775_ch01_001-048.indd 33
Application software for photo manipulation
Introduction to Information Technology
APPLICATION SOFTWARE Now we’re finally getting somewhere! After the application software has been installed, you can start using the PC. Application software enables you to perform specific tasks—solve problems, perform work, or entertain yourself. For example, when you prepare a term paper on your computer, you will use a word processing program. (Microsoft Word and Corel WordPerfect are two brands.) Application software is specific to the system software you use. If you want to run Microsoft Word, for instance, you’ll need to first have Microsoft Windows system software on your system, not Unix or Linux. Application software comes on CDs packaged in boxes that include instructions. You insert the CDs into your computer and then follow the instructions on the screen for installation. Later on you may obtain entire application programs by getting (downloading) them off the internet, using your modem or another type of communications connection. We discuss software in more detail in Chapter 3.
33
1/19/10 3:11:57 PM
Confirming Pages
But had you done this for real, it would not have been a wasted exercise: by knowing how to build a system yourself, not only would you be able to impress your friends but you’d also know how to upgrade any store-bought system to include components that are better than standard. For instance, as Einstein points out, if you’re into videogames, knowing how to construct your own PC would enable you to make a system that’s right for games. You could include the latest three-dimensional graphics video card and a state-of-the-art sound card, for example. More important, you’d also know how to order a custombuilt system (as from Dell, Hewlett-Packard, Lenovo, or Gateway, some of the online computer makers) that’s right for you. In Chapters 4 and 5, we’ll expand on this discussion so that you can really know what you’re doing when you go shopping for a microcomputer system.
1.6 Where Is Information Technology Headed? What are three directions of computer development and three directions of communications development? How far we have come. At the beginning of the 20th century, most people thought they would live the same life their parents did. Today most people aren’t surprised by the prediction that the Information Age will probably transform their lives beyond recognition. Let’s consider the trends in the development of computers and communications and, most exciting, the area where they intersect.
Three Directions of Computer Development: Miniaturization, Speed, & Affordability What are the three ways computers have developed? Since the days of ENIAC, computers have developed in three directions—and are continuing to do so. MINIATURIZATION Everything has become smaller. ENIAC’s oldfashioned radio-style vacuum tubes gave way after 1947 to the smaller, faster, more reliable transistor. A transistor is a small device used as a gateway to transfer electrical signals along predetermined paths (circuits). The next step was the development of tiny integrated circuits. Integrated circuits are entire collections of electrical circuits or pathways that are now etched on tiny squares (chips) of silicon half the size of your thumbnail. Silicon is a natural element found in sand. In pure form, it is the base material for computer processing devices. The miniaturized processor, or microprocessor, in a personal desktop computer today can perform calculations that once required a computer filling an entire room.
Chapter 1
SPEED Thanks to miniaturization and new material used in making processors, computer makers can cram more hardware components into their machines, providing faster processing speeds and more data storage capacity.
34
Miniaturization A woman tries on a prototype of a wearable computer, a jacket with a built-in display in its sleeve. This type of computer, from Pioneer, is expected to aid medical workers, firefighters, and farm workers.
wiL16775_ch01_001-048.indd 34
AFFORDABILITY Processor costs today are only a fraction of what they were 15 years ago. A state-of-the-art processor costing less than $1,000 provides the same processing power as a huge 1980s computer costing more than $1 million. These are the three major trends in computers. What about communications?
11/23/09 3:57:50 PM
Confirming Pages
Three Directions of Communications Development: Connectivity, Interactivity, & Multimedia What are three things I do that represent these three features— connectivity, interactivity, and multimedia? Once upon a time, we had the voice telephone system—a one-to-one medium. You could talk to your Uncle Joe and he could talk to you, and with special arrangements (conference calls) more than two people could talk with one another. We also had radio and television systems—one-to-many media (or mass media). News announcers could talk to you on a single medium such as television, but you couldn’t talk to them. There have been three recent developments in communications: CONNECTIVITY Connectivity refers to the connection of computers to one another by a communications line in order to provide online information access and/or the sharing of peripheral devices. The connectivity resulting from the expansion of computer networks has made possible email and online shopping, for example.
MULTIMEDIA Radio is a single-dimensional medium (sound), as is most email (mainly text). As mentioned earlier in this chapter, multimedia refers to technology that presents information in more than one medium—such as text, pictures, video, sound, and animation—in a single integrated communication. The development of the World Wide Interactivity A dashboard computer allows drivers Web expanded the internet to include pictures, sound, music, to request information about the car’s operation, location, and nearby services. and so on, as well as text. Exciting as these developments are, truly mind-boggling possibilities have emerged as computers and communications have cross-pollinated.
When Computers & Communications Combine: Convergence, Portability, Personalization, Collaboration, & Cloud Computing What are five developments growing out of the fusion of computers and communications? Sometime in the 1990s, computers and communications started to fuse together, beginning a new era within the Information Age. The result has been five additional developments. CONVERGENCE Convergence describes the combining of several industries through various devices that exchange data in the format used by computers.
wiL16775_ch01_001-048.indd 35
Introduction to Information Technology
INTERACTIVITY Interactivity refers to two-way communication; the user can respond to information he or she receives and modify what a computer is doing. That is, there is an exchange or dialogue between the user and the computer, and the computer responds to user requests. A noninteractive program, once started, continues without requiring human contact, or interaction. The ability to interact means users can be active rather than passive participants in the technological process. On the television networks MSNBC or CNN, for example, you can immediately go on the internet and respond to news from broadcast anchors. Today, most application software is interactive. In the future, cars may respond to voice commands or feature computers built into the dashboard.
35
11/23/09 3:57:54 PM
Confirming Pages
The industries are computers, communications, consumer electronics, entertainment, and mass media. Convergence has led to electronic products that perform multiple functions, such as TVs with internet access, cellphones that are also digital cameras, and a refrigerator that allows you to send email. PORTABILITY In the 1980s, portability, or mobility, meant trading off computing power and convenience in return for smaller size and weight. Today, however, we are close to the point where we don’t have to give up anything. As a result, experts have predicted that small, powerful, wireless personal electronic devices will transform our lives far more than the personal computer has done so far. “The new generation of machines will be truly personal computers, designed for our mobile lives,” wrote one journalist back in 1992. “We will read office memos between strokes on the golf course and answer messages from our children in the middle of business meetings.”65 Today such activities are commonplace, and smartphones are taking on other functions. The risk they bring is that, unless we’re careful, work will completely invade our personal time.66
According to inventor and futurist Raymond Kuzweil, technological change will become so rapid and so profound that human bodies and brains will merge with machines.
PERSONALIZATION Personalization is the creation of information tailored to your preferences—for instance, programs that will automatically cull recent news and information from the internet on just those topics you have designated. Companies involved in e-commerce can send you messages about forthcoming products based on your pattern of purchases, usage, and other criteria. Or they will build products (cars, computers, clothing) customized to your heart’s desire.
Chapter 1
COLLABORATION A more recent trend is mass collaboration. Says New York Times technology writer John Markoff, “A remarkable array of software systems makes it simple to share anything instantly, and sometimes enhance it along the way.”67 BusinessWeek writer Robert Hof observes that the huge numbers of people “online worldwide—along with their shared knowledge, social contacts, online reputations, computing power, and more—are rapidly becoming a collective force of unprecedented power.”68 Examples are file-sharing, photo-sharing websites, calendar-sharing services, group-edited sites called wikis, social networking services, and so-called citizen-journalism sites, in which average people write their own news items on the internet and comment on what other people post—an interactive, democratic form of mass media.69 Pooled ratings, for instance, enable people to create personalized net music radio stations or Amazon.com’s millions of customer-generated product reviews.
36
wiL16775_ch01_001-048.indd 36
CLOUD COMPUTING: THE GLOBAL COMPUTER Not everyone agrees on exactly what “cloud computing” means.70 Previously called on-demand computing, grid computing, or software as a service, cloud computing basically means that, instead of storing your software or data on your own PC or your own company’s computers, you store it on servers on the internet. You don’t care where the servers are located; they’re out there somewhere—“in the cloud.” The idea here is that companies could tap into computers as they are needed, just as they do now with the electric power grid, splitting their computing workload between data centers in different parts of the world. The hope of technology people is that companies will find cloud computing cheaper and more reliable than managing their own PCs, servers, and software.71 (In a later chapter, we discuss an even more involved concept known as the singularity.)
11/23/09 3:57:56 PM
Rev. Confirming Pages
Illuminated plastic balls meant to represent cloud computing go up and down on metal cables at the IBM stand at the CeBIT technology trade fair two days ahead of the fair’s opening on March 1, 2009, in Hanover, Germany. CeBIT is the world’s largest computer and IT trade fair.
“E” Also Stands for Ethics What are the principal ethical concerns I should be conscious of in the use of information technology?
SPEED & SCALE Great amounts of information can be stored, retrieved, and transmitted at a speed and on a scale not possible before. Despite the benefits, this has serious implications “for data security and personal privacy,” as well as employment, Forester and Morrison say, because information technology can never be considered totally secure against unauthorized access. UNPREDICTABILITY Computers and communications are pervasive, touching nearly every aspect of our lives. However, at this point, compared to other pervasive technologies—such as electricity, television, and automobiles— information technology seems a lot less predictable and reliable. COMPLEXITY Computer systems are often incredibly complex—some so complex that they are not always understood even by their creators. “This,” say Forester and Morrison, “often makes them completely unmanageable,” producing massive foul-ups or spectacularly out-of-control costs. Ethics and security can often be talked about in the same breath, since secure computer systems obviously go a long way toward keeping people ethical and honest. When we discuss security, you will see this icon:
SECURITY
wiL16775_ch01_001-048.indd 37
ethics
Sur v iv a l T ip Recycling Old PCs Just got a new computer? Where to donate your old one? Check with schools, after-school programs, churches, and the following websites: www1.us.dell.com/content/ topics/segtopic.aspx/dell_ recycling?c⫽us&cs⫽19& l⫽en&s⫽dhs www.crc.org www.youthfortechnology.org/ frames.html http://earth911.org/recycling/ computer-recycling-reuse/ www.epa.gov/epaoswer/ hazwaste/recycle/ecycling/ donate.htm www.recycles.org/ http://ww1.pcdisposal. com/?gclid⫽COmh6b S75oCFRYiagodNwOFCA www.computerhope.com/ disposal.htm
Introduction to Information Technology
Every computer user will have to wrestle with ethical issues related to the use of information technology. Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Because ethical questions arise so often in connection with information technology, we will note them, wherever they appear in this book, with the symbol shown at left. Below, for example, are some important ethical concerns pointed out by Tom Forester and Perry Morrison in their book Computer Ethics.72 These considerations are only a few of many; we’ll discuss others in subsequent chapters.
37
1/4/10 10:13:27 PM
Rev. Confirming Pages
EXPERIENCE BOX Better Organization & Time Management: Dealing with the Information Deluge in College— & in Life
A
n Experience Box appears at the end of each chapter. Each box offers you the opportunity to acquire useful experience that directly applies to the Digital Age. This first box illustrates skills that will benefit you in college, in this course and others. (Students reading the first eight editions of our book have told us they received substantial benefit from these suggestions.) “How on earth am I going to be able to keep up with what’s required of me?” you may ask yourself. “How am I going to handle the information glut?” The answer is: by learning how to learn. By building your skills as a learner, you certainly help yourself do better in college, and you also train yourself to be an information manager in the future.
Using Your “Prime Study Time” Each of us has a different energy cycle. The trick is to use it effectively. That way, your hours of best performance will coincide with your heaviest academic demands. For example, if your energy level is high during the evenings, you should plan to do your studying then. To capitalize on your prime study time, take the following steps: (1) Make a study schedule for the entire term, and indicate the times each day during which you plan to study. (2) Find some good places to study—places where you can avoid distractions. (3) Avoid time wasters, but give yourself frequent rewards for studying, such as a TV show, a favorite piece of music, or a conversation with a friend.
Chapter 1
Learning to Focus
38
Multitasking is shifting focus from one task to another in rapid succession. When you read this textbook while listening to music and watching TV, you may think you’re simultaneously doing three separate tasks, but you’re really not. “It’s like playing tennis with three balls,” says one expert.73 Today multitasking is easy and focus is hard because of all the things demanding our attention—phone calls, email, text messages, music, radio, TV, Twitter, MySpace, Facebook, various blogs and websites. “You can drive yourself crazy trying to multitask and answer every email message instantly,” says one writer. “Or you can recognize your brain’s finite capacity for processing information.”74 Here are some tips on learning to concentrate: 75 Choose What to Focus On. “People don’t realize that attention is a finite resource, like money,” one expert says. “Do you want to invest your cognitive cash on endless Twittering or Net surfing or couch potatoing [watching TV]?” She adds, “Where did the idea come
wiL16775_ch01_001-048.indd 38
from that anyone who wants to contact you can do so at any time? You need to take charge of what you pay attention to instead of responding to the latest stimuli.”76 For example, to block out noise, you can wear earplugs while reading. Devote the First 1½ Hours of Your Day to Your Most Important Task. Writing a paper? Studying a hard subject? Make it your first task of the day, and concentrate on it for 90 minutes. After that, your brain will probably need a rest, and you can answer email, return phone calls, and so on. But until that first break, don’t do anything else, because it can take the brain 20 minutes to refocus.
Improving Your Memory Ability Memorizing is, of course, one of the principal requirements for succeeding in college. And it’s a great help for success in life afterward. Some suggestions: Space Your Studying, Rather than Cramming. Cramming—making a frantic, last-minute attempt to memorize massive amounts of material—is probably the least effective means of absorbing information. Research shows that it’s best to space out your studying of a subject over successive days. A series of study sessions over several days is preferable to trying to do it all during the same number of hours on one day. It is repetition that helps move information into your long-term memory bank. Review Information Repeatedly—Even “Overlearn” It. By repeatedly reviewing information—known as “rehearsing”—you can improve both your retention and your understanding of it. Overlearning is continuing to review material even after you appear to have absorbed it. Use Memorizing Tricks. There are several ways to organize information so that you can retain it better. For example, you can make drawings or diagrams (as of the parts of a computer system). Some methods of establishing associations between items you want to remember are given opposite. (• See Panel 1.10.)
How to Improve Your Reading Ability: The SQ3R Method SQ3R stands for “survey, question, read, recite, and review.”77 The strategy behind the method is to break down a reading assignment into small segments and master each before moving on. The five steps of the SQ3R method are as follows:
12/18/09 4:24:26 PM
Rev. Confirming Pages
• Mental and physical imagery: Use your visual and other senses to construct a personal image of what you want to remember. Indeed, it helps to make the image humorous, action-filled, or outrageous in order to establish a personal connection. Example: To remember the name of the 21st president of the United States, Chester Arthur, you might visualize an author writing the number “21” on a wooden chest. This mental image helps you associate chest (Chester), author (Arthur), and 21 (21st president). • Acronyms and acrostics: An acronym is a word created from the first letters of items in a list. For instance, Roy G. Biv helps you remember the colors of the rainbow in order: red, orange, yellow, green, blue, indigo, violet. An acrostic is a phrase or sentence created from the first letters of items on a list. For example, Every Good Boy Does Fine helps you remember that the order of musical notes on the treble staff is E-G-B-D-F. • Location: Location memory occurs when you associate a concept with a place or imaginary place. For example, you could learn the parts of a computer system by imagining a walk across campus. Each building you pass could be associated with a part of the computer system. • Word games: Jingles and rhymes are devices frequently used by advertisers to get people to remember their products. You may recall the spelling rule “I before E except after C or when sounded like A as in neighbor or weigh.” You can also use narrative methods, such as making up a story.
panel 1.10 Some memorizing tricks
2. Question the segment in the chapter before you read it: This step is easy to do, and the point, again, is to get you involved in the material. After surveying the entire chapter, go to the first segment—whether a whole section, a subsection, or even just paragraph, depending on the level of difficulty and density of information. Look at the topic heading of that segment (or first sentence of a very difficult paragraph). In your mind, restate the heading as a question. In this book, to help you do this, following each section head we present a Key Question. An example in this chapter was “What are three directions of computer development and three directions of communications development?” After you have formulated the question, go to steps 3 and 4 (read and recite). Then proceed to the next segment of the chapter and restate the heading there as a question, and so on. 3. Read the segment about which you asked the question: When you read the segment you asked the question about, read with purpose, to answer the question you formulated. Underline or highlight sentences that you think are important, if they help you answer the question. Read this portion of the text more than
wiL16775_ch01_001-048.indd 39
once, if necessary, until you can answer the question. In addition, determine whether the segment covers any other significant questions, and formulate answers to these, too. After you have read the segment, proceed to step 4. (Perhaps you can see where this is all leading. If you read in terms of questions and answers, you will be better prepared when you see exam questions about the material later.) 4. Recite the main points of the segment: Recite means “say aloud.” Thus, you should speak out loud (or softly) the answer to the principal question or questions about the segment and any other main points. 5. Review the entire chapter by repeating questions: After you have read the chapter, go back through it and review the main points. Then, without looking at the book, test your memory by repeating the questions and answers you formulated. Clearly the SQ3R method takes longer than simply reading with a rapidly moving color marker or underlining pencil. However, the technique is far more effective because it requires your involvement and understanding. These are the keys to all effective learning.
Learning from Lectures Does attending lectures really make a difference? Research shows that students with grades of B or above were more apt to have better class attendance than students with grades of C- or below.78 Some tips for getting the most out of lectures: Take Effective Notes by Listening Actively. Research shows that good test performance is related to good
Introduction to Information Technology
1. Survey the chapter before you read it: Get an overview of the chapter before you begin reading it. If you have a sense of what the material is about before you begin reading it, you can predict where it is going. In this text, we offer on the first page of every chapter a list of the main heads and accompanying key questions. At the end of each chapter we offer a Summary, which recalls what the chapter’s terms and concepts mean and why they are important.
39
1/22/10 10:39:40 AM
Rev. Confirming Pages
• Take notes in your own words: Instead of just being a stenographer, try to restate the lecturer’s thoughts in your own words, which will make you pay attention more.
• Read ahead and anticipate the lecturer: Try to anticipate what the instructor is going to say, based on your previous reading. Having background knowledge makes learning more efficient.
• Ask questions: By asking questions during the lecture, you necessarily participate in it and increase your understanding.
• Listen for signal words: Instructors use key phrases such as “The most important point is . . . ,” “There are four reasons for . . . ,” “The chief reason . . . ,” “Of special importance . . . ,” “Consequently . . .” When you hear such signal phrases, mark your notes with a ! or *.
Review Your Notes Regularly. Make it a point to review your notes regularly—perhaps on the afternoon after the lecture, or once or twice a week. We cannot emphasize enough the importance of this kind of reviewing.
Chapter 1
note taking.79 And good note taking requires that you listen actively—that is, participate in the lecture process. Here are some ways to take good lecture notes:
40
wiL16775_ch01_001-048.indd 40
1/22/10 10:39:59 AM
Rev. Confirming Pages
SUMMARY application software (p. 33) Software that has been developed to solve a particular problem, perform useful work on general-purpose tasks, or provide entertainment. Why it’s important: Application software such as word processing, spreadsheet, database management, graphics, and communications packages are commonly used tools for increasing people’s productivity. avatar (p. 6) Computer depiction of a human, often found in online videogames. Why it’s important: Avatars can be helpful in training, such as by representing imaginary customers. case (p. 28) Also known as the system unit or system cabinet; the box that houses the processor chip (CPU), the memory chips, and the motherboard with power supply, as well as storage devices—floppy-disk drive, hard-disk drive, and CD or DVD drive. Why it’s important: The case protects many important processing and storage components. CD (compact-disk) drive (p. 31) Storage device that uses laser technology to read data from optical disks. Why it’s important: New software is generally supplied on CDs rather than diskettes. And even if you can get a program on floppies, you’ll find it easier to install a new program from one CD than to repeatedly insert and remove many diskettes. The newest version is called DVD (digital video disk). The DVD format stores even more data than the CD format. central processing unit (CPU) See processor chip.
computer savvy (p. 3) Knowing what computers can do and what they can’t, knowing how they can benefit you and how they can harm you, and knowing when you can solve computer problems and when you have to call for help. Why it’s important: You will know how to make better buying decisions, how to fix ordinary computer problems, how to upgrade your equipment and integrate it with new products, how to use the internet most effectively, how to protect yourself against online villains, and what kinds of computer uses can advance your career. connectivity (p. 35) Ability to connect computers to one another by communications lines, so as to provide online information access and/or the sharing of peripheral devices. Why it’s important: Connectivity is the foundation of the advances in the Information Age. It provides online access to countless types of information and services. The connectivity resulting from the expansion of computer networks has made possible email and online shopping, for example. course-management software (p. 6) Software for administering online assignments, schedules, examinations, and grades. Why it’s important: It helps to make administrative “housekeeping” more efficient. cyberspace (p. 18) Term used to refer to not only the online world and the internet in particular but also the whole wired and wireless world of communications in general. Why it’s important: More and more human activities take place in cyberspace.
chip See processor chip.
cloud computing (p. 36) Concept of storing your software and/or data not on your own PC or company’s computers but rather on servers on the internet. Why it’s important: Users could tap into computers as they are needed, distributing computing workload among data centers in different parts of the world, perhaps making computing cheaper and more reliable.
data (p. 25) Raw facts and figures that are processed into information. Why it’s important: Users need data to create useful information. desktop PC (p. 23) Microcomputer unit that sits on a desk, with the keyboard in front and the monitor often on top. Why it’s important: Desktop PCs and tower PCs are the most commonly used types of microcomputer. distance learning (p. 6) Also known as e-learning; name given to online education programs. Why it’s important: Provides students increased flexibility because they do not have to be in an actual classroom.
communications technology (p. 4) Also called telecommunications technology; consists of electromagnetic devices and systems for communicating over long distances. Why it’s important: Communications systems using electronic connections have helped to expand human communication beyond face-to-face meetings.
download (p. 9) To transfer data from a remote computer to one’s own computer. Why it’s important: Allows text, music, and images to be transferred quickly by telecommunications.
computer (p. 4) Programmable, multiuse machine that accepts data—raw facts and figures—and processes (manipulates) it into useful information, such as summaries and totals. Why it’s important: Computers greatly speed up problem solving and other tasks, increasing users’ productivity.
email (electronic mail) (p. 5) Messages transmitted over a computer network, most often the internet. Why it’s important: Email has become universal; one of the first things new computer users learn is how to send and receive email.
wiL16775_ch01_001-048.indd 41
DVD (digital video-disk) drive See CD drive.
Introduction to Information Technology
clients (p. 24) Computers and other devices connected to a server, a central computer. Why it’s important: Client/server networks are used in many organizations for sharing databases, devices, and programs.
41
1/22/10 10:40:27 AM
Rev. Confirming Pages
ethics (p. 37) Set of moral values or principles that govern the conduct of an individual or a group. Why it’s important: Ethical questions arise often in connection with information technology. expansion slots (p. 29) Internal “plugs” used to expand the PC’s capabilities. Why it’s important: Expansion slots give you places to plug in additional circuit boards, such as those for video, sound, and communications (modem). hard-disk drive (p. 30) Storage device that stores billions of characters of data on a nonremovable disk platter usually inside the computer case. Why it’s important: Hard disks hold much more data than diskettes do. Nearly all microcomputers use hard disks as their principal secondary-storage medium. hardware (p. 25) All machinery and equipment in a computer system. Why it’s important: Hardware runs under the control of software and is useless without it. However, hardware contains the circuitry that allows processing. information (p. 25) Data that has been summarized or otherwise manipulated for use in decision making. Why it’s important: The whole purpose of a computer (and communications) system is to produce (and transmit) usable information.
Chapter 1
information technology (IT) (p. 4) Technology that helps to produce, manipulate, store, communicate, and/or disseminate information. Why it’s important: Information technology is bringing about the fusion of several important industries dealing with computers, telephones, televisions, and various handheld devices.
42
mainframe (p. 22) Second-largest computer available, after the supercomputer; capable of great processing speeds and data storage. Costs $5,000–$5 million. Small mainframes are often called midsize computers. Why it’s important: Mainframes are used by large organizations (banks, airlines, insurance companies, universities) that need to process millions of transactions. memory chip (p. 29) Also known as RAM (for “random access memory”) chip; represents primary storage or temporary storage. Why it’s important: Holds data before processing and information after processing, before it is sent along to an output or storage device. microcomputer (p. 22) Also called personal computer; small computer that fits on or next to a desk or can be carried around. Costs $500–$5,000. Why it’s important: The microcomputer has lessened the reliance on mainframes and has provided more ordinary users with access to computers. It can be used as a stand-alone machine or connected to a network. microcontroller (p. 23) Also called an embedded computer; the smallest category of computer. Why it’s important: Microcontrollers are the tiny, specialized microprocessors built into “smart” electronic devices, such as appliances and automobiles. micropayments (p. 9) Electronic payments of as little as 25 cents in transactions for which it is uneconomical to use a credit card. Why it’s important: Allows products to be sold that previously weren’t worth the effort of merchandising.
input (p. 26) Whatever is put in (“input”) to a computer system. Input devices include the keyboard and the mouse. Why it’s important: Useful information cannot be produced without input data.
mobile internet device (MID) (p. 23) Fully internet integrated, handheld computer highly compatible with desktop microcomputers and laptops. The initial models focus on data communication, not voice communication. Why it’s important: Some mobile devices are too small to adequately view images on screen, but viewers still want more pocket-size portability than is possible with a laptop.
interactivity (p. 35) Two-way communication; a user can respond to information he or she receives and modify the process. Why it’s important: Interactive devices allow the user to actively participate in a technological process instead of just reacting to it.
modem (p. 32) Device that sends and receives data over telephone lines to and from computers. Why it’s important: A modem enables users to transmit data from one computer to another by using standard telephone lines instead of special communications equipment.
internet (the “net”) (p. 18) Worldwide computer network that connects hundreds of thousands of smaller networks linking computers at academic, scientific, and commercial institutions, as well as individuals. Why it’s important: Thanks to the internet, millions of people around the world can share all types of information and services.
monitor (p. 31) Display device that takes the electrical signals from the video card and forms an image using points of colored light on the screen. Why it’s important: Monitors enable users to view output without printing it out.
keyboard (p. 28) Input device that converts letters, numbers, and other characters into electrical signals readable by the processor. Why it’s important: Keyboards are the most common kind of input device. local area network (LAN) (p. 22) Network that connects, usually by special cable, a group of desktop PCs and other devices, such as printers, in an office or a building. Why it’s important: LANs have replaced mainframes for many functions and are considerably less expensive.
wiL16775_ch01_001-048.indd 42
motherboard (p. 29) Also called the system board; main circuit board in the computer. Why it’s important: This is the big green circuit board to which everything else—such as the keyboard, mouse, and printer—is attached. The processor chip and memory chips are also installed on the motherboard. mouse (p. 28) Nonkeyboard input device, called a “pointing device,” used to manipulate objects viewed on the computer display screen. Why it’s important: For many purposes, a mouse is easier to use than a keyboard for inputting commands. Also, the mouse is used extensively in many graphics programs.
12/18/09 4:24:46 PM
Rev. Confirming Pages
nanotechnology (p. 22) Technology whereby molecule-size nanostructures are used to create tiny machines for holding data or performing tasks. Why it’s important: Could result in tremendous computer power in molecular-size devices. netbook (p. 23) Low-cost, lightweight computer with tiny dimensions and with functions designed for basic tasks, such as web searching, email, and word processing; weighs 2.25–3.2 pounds. Why it’s important: Cheaper computers that fill a technological category between notebooks and handheld devices. network (p. 5) Communications system connecting two or more computers. Why it’s important: Networks allow users to share applications and data and to use email. The internet is the largest network. notebook computer (p. 23) Also called laptop computer; lightweight portable computer with a built-in monitor, keyboard, hard-disk drive, battery, and adapter; weighs 1.8–9 pounds. Why it’s important: Notebook and other small computers have provided users with computing capabilities in the field and on the road. online (p. 4) Using a computer or some other information device, connected through a network, to access information and services from another computer or information device. Why it’s important: Online communication is widely used by businesses, services, individuals, and educational institutions. output (p. 26) Whatever is output from (“put out of”) the computer system; the results of processing. Why it’s important: People use output to help them make decisions. Without output devices, computer users would not be able to view or use the results of processing. peripheral device (p. 31) Any component or piece of equipment that expands a computer’s input, storage, and output capabilities. Examples include printers and disk drives. Why it’s important: Most computer input and output functions are performed by peripheral devices. personal digital assistant (PDA) (p. 23) Also known as handheld computer or palmtop; used as a schedule planner and address book and to prepare to-do lists and send email and faxes. Why it’s important: PDAs make it easier for people to do business and communicate while traveling. primary storage (p. 26) Also called memory; internal computer circuitry that temporarily holds data waiting to be processed. Why it’s important: By holding data, primary storage enables the processor to process. printer (p. 32) Output device that produces text and graphics on paper. Why it’s important: Printers provide one of the principal forms of computer output.
wiL16775_ch01_001-048.indd 43
processing (p. 26) The manipulation a computer does to transform data into information. Why it’s important: Processing is the essence of the computer, and the processor is the computer’s “brain.” processor chip (p. 28) Also called the processor, the CPU (central processing unit), or simply chip; tiny piece of silicon that contains millions of miniature electronic circuits used to process data. Why it’s important: Chips have made possible the development of small computers. robot (p. 7) Automatic device that performs functions ordinarily performed by human beings. Why it’s important: Robots help perform tasks that humans find difficult or impossible to do. secondary storage (p. 26) Also called storage; devices and media that store data and programs permanently—such as disks and disk drives, tape and tape drives, CDs and CD drives. Why it’s important: Without secondary storage, users would not be able to save their work. Storage also holds the computer’s software. server (p. 24) Central computer in a network that holds collections of data (databases) and programs for connecting PCs, workstations, and other devices, which are called clients. Why it’s important: Servers enable many users to share equipment, programs, and data. software (p. 25) Also called programs; step-by-step electronically encoded instructions that tell the computer hardware how to perform a task. Why it’s important: Without software, hardware is useless. sound card (p. 31) Special circuit board that enhances the computer’s sound-generating capabilities by allowing sound to be output through speakers. Why it’s important: Sound is used in multimedia applications. Also, many users like to listen to music CDs and MP3 files on their computers. speakers (p. 32) Devices that play sounds transmitted as electrical signals from the sound card. Speakers are connected to a single wire plugged into the back of the computer. Why it’s important: See sound card.
system software (p. 32) Software that helps the computer perform essential operating tasks. Why it’s important: Application software cannot run without system software. System software consists of several programs. The most important is the operating system, the master control program that runs the computer. Examples of operating system software for the PC are various Microsoft programs (such as Windows 95, 98, NT, Me, XP, and Vista), Unix, Linux, and the Macintosh operating system.
Introduction to Information Technology
multimedia (p. 35) From “multiple media”; technology that presents information in more than one medium—including text, graphics, animation, video, and sound—in a single integrated communication. Why it’s important: Multimedia is used increasingly in business, the professions, and education to improve the way information is communicated.
system unit See case.
43
supercomputer (p. 21) High-capacity computer with thousands of processors that is the fastest calculating device ever invented. Costs up to $350 million or more. Why it’s important: Supercomputers are used primarily for research purposes, airplane design, oil exploration, weather forecasting, and other activities that cannot be handled by mainframes and other less powerful machines.
12/18/09 4:24:46 PM
Rev. Confirming Pages
telemedicine (p. 6) Medical care delivered via telecommunications. Why it’s important: Allows physicians in remote areas to consult over a distance. terminal (p. 22) Input and output device that uses a keyboard for input and a monitor for output; it cannot process data. Why it’s important: Terminals are generally used to input data to and receive data from a mainframe computer system. tower PC (p. 23) Microcomputer unit that sits as a “tower,” often on the floor, freeing up desk space. Why it’s important: Tower PCs and desktop PCs are the most commonly used types of microcomputer. video card (p. 31) Circuit board that converts the processor’s output information into a video signal for transmission through a cable to the monitor. Why it’s important: Virtually all computer users need to be able to view video output on the monitor.
virtual (p. 8) Something that is created, simulated, or carried on by means of a computer or a computer network. Why it’s important: Allows actual objects to be represented in computer-based form. workstation (p. 22) Smaller than a mainframe; expensive, powerful computer generally used for complex scientific, mathematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. Why it’s important: The power of workstations is needed for specialized applications too large and complex to be handled by PCs. World Wide Web (the “web”) (p. 18) The interconnected system of internet servers that support specially formatted documents in multimedia form—sounds, photos, and video as well as text. Why it’s important: The web is the most widely known part of the internet.
CHAPTER REVIEW More and more educators are favoring an approach to learning (presented by Benjamin Bloom and his colleagues in Taxonomy of Educational Objectives) that follows a hierarchy of six critical-thinking skills: (a) two lower-order skills— memorization and comprehension; and (b) four higher-order skills—application, analysis, synthesis, and evaluation. While you may be able to get through many introductory college courses by simply memorizing facts and comprehending the basic ideas, to advance further you will probably need to employ the four higher-order thinking skills. In the Chapter Review at the end of each chapter, we have implemented this hierarchy in a three-stage approach, as follows:
t a g
1
• Stage 2 learning—comprehension: “I can recall information in my own terms and explain it to a friend.” Using open-ended short-answer questions, we ask you to reexpress terms and concepts in your own words. • Stage 3 learning—applying, analyzing, synthesizing, evaluating: “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” In this part of the Chapter Review, we ask you to put the ideas into effect using the activities described, some of which include internet activities. The purpose is to help you take possession of the ideas, make them your own, and apply them realistically to your life.
e
s
• Stage 1 learning—memorization: “I can recognize and recall information.” Self-test questions, multiple-choice
questions, and true/false questions enable you to test how well you recall basic terms and concepts.
LEARNING
MEMORIZATION “I can recognize and recall information.”
Self-Test Questions
Chapter 1
1. The ________ ________ ________ refers to the part of the internet that presents information in multimedia form.
44
2. The two main types of microcomputers are the________ ________, which sits on the desktop, and the ________ ________, which usually is placed on the floor.
5. The ________ is a worldwide network that connects hundreds of thousands of smaller networks. 6. ________ refers to information presented in nontextual forms such as video, sound, and graphics. 7. ________ are high-capacity machines with thousands of processors. 8. Embedded computers, or ________, are installed in “smart” appliances and automobiles.
3. “________ technology” merges computing with highspeed communications.
9. The kind of software that enables users to perform specific tasks is called ________ software.
4. A(n) ________ is an electronic machine that accepts data and processes it into information.
10. RAM is an example of ________ storage, and a hard drive is an example of ________ storage.
wiL16775_ch01_001-048.indd 44
12/18/09 4:24:46 PM
Confirming Pages
1 1. A(n) ________ is a communications system connecting two or more computers. 12. The four basic operations of all computers are ________, ________, ________, and ________.
d. output e. processing 6. Supercomputers are used for a. breaking codes.
13. The first programmable computer in the USA, which appeared in 1946, was called the ________.
b. simulations for explosions of nuclear bombs. c. forecasting weather.
14. The ________ is the display device that takes the electrical signals from the video card and forms an image using points of colored light on the screen. 15. The base material for computer processing devices is ________, a natural element found in sand.
d. keeping planets in orbit. e. all of these f. only a, b, and c. 7. What is the leading use of computers?
16. The general term for all the machinery and equipment in a computer system is ________.
a. web surfing
17. ________ and ________ are the two most common input devices.
c. e-shopping
18. The processor chip, commonly called the ________ or a ________, is a tiny piece of silicon that contains millions of miniature electronic circuits.
b. email d. word processing 8. Which is the main circuit board in the computer? a. RAM chip (random access memory)
19. One gigabyte is approximately ________ characters.
b. CPU processor chip (central processing unit) c. motherboard (system board)
Multiple-Choice Questions 1. Which of the following devices converts computer output into displayed images?
d. hard drive 9. A terabyte is approximately a. one million characters.
a. printer
b. one billion characters.
b. monitor
c. one trillion characters.
c. floppy-disk drive
d. one quadrillion characters.
d. processor
10. Speakers are an example of
e. hard-disk drive
a. an input device.
2. Which of the following computer types is the smallest?
b. an output device.
a. mainframe
c. a processor.
b. microcomputer
d. a storage device.
c. microcontroller e. workstation 3. Which of the following is a secondary-storage device?
True/False Questions T F
1. Mainframe computers process faster than microcomputers.
a. processor
T F
b. memory chip
2. Main memory is a software component.
T F
3. The operating system is part of the system software.
T F
4. Processing is the manipulation by which a computer transforms data into information.
T F
5. Primary storage is the area in the computer where data or information is held permanently.
T F
6. The keyboard and the mouse are examples of input devices.
c. floppy-disk drive d. printer e. monitor 4. Since the days when computers were first made available, computers have developed in three directions. What are they? a. increased expense b. miniaturization
T F
7. Movies are a form of multimedia.
c. increased size
T F
8. Computers are becoming larger, slower, and more expensive.
T F
9. Modems store information.
d. affordability e. increased speed
T F
10. A microcomputer is used to view very small objects.
a. input
T F
1 1. A hard disk is an example of software.
b. storage
T F
12. Computers continue to get smaller and smaller.
c. programming
T F
13. Supercomputers are particularly inexpensive.
5. Which of the following operations constitute the four basic operations followed by all computers?
wiL16775_ch01_001-048.indd 45
Introduction to Information Technology
d. supercomputer
45
11/23/09 3:58:40 PM
t a g
2
e
s
Confirming Pages
LEARNING
COMPREHENSION ”I can recall information in my own terms and explain it to a friend.”
Short-Answer Questions
8. What is the function of RAM? 9. What does downloading mean?
1. What does online mean?
10. What is meant by connectivity?
2. What is the difference between system software and application software?
1 1. Describe some ways that information technology can be used to help people find jobs and to help jobs find people.
3. Briefly define cyberspace. 4. What is the difference between software and hardware? 5. What is a local area network? 6. What is multimedia?
t a g
13. What is the basic meaning of cloud computing?
e
s
7. What is the difference between microcomputers and supercomputers?
12. Compare the use of email to the use of the telephone and of conventional letters sent via the postal system. Which kinds of communications are best suited for which medium?
3
LEARNING
APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
Knowledge in Action 1. Do you wish there was an invention to make your life easier or better? Describe it. What would it do for you? Come up with ideas on how that device may be constructed. 2. Determine what types of computers are being used where you work or go to school. In which departments are the different types of computer used? Make a list of the input devices, output devices, and storage devices. What are they used for? How are they connected to other computers?
Chapter 1
3. Imagine a business you could start or run at home. What type of business is it? What type(s) of computer(s) do you think you’ll need? Describe the computer system in as much detail as possible, including hardware components in the areas we have discussed so far. Keep your notes, and then refine your answers after you have completed the course.
46
4. Has reality become science fiction? Or has science fiction become science fact? First, watch an old futuristic movie, such as 2001—A Space Odyssey, and take note of the then-futuristic technology displayed. Classify what you see according to input, output, processing, storage, and communications. Then watch a recent science fiction movie, and also list all the futuristic technology used according to the given categories. What was futuristic in the old movie that is now reality? What in the new movie is not yet reality but seems already feasible? 5. From what you’ve read and what you have experienced and/or observed in your life, do you have a positive, negative, or impartial view of our rapidly converging
wiL16775_ch01_001-048.indd 46
technological society? Why? Reevaluate your answers at the end of the course. 6. Computer prices are constantly falling. Whatever you pay for a computer today, you can be certain that you will be able to buy a more powerful computer for less money a year from now, and quite possibly even just a month from now. So how can you decide when it’s a good time to upgrade to a better computer? Paradoxically, it seems that no matter how you time it, you’ll always lose, because prices will go down again soon, and yet you will also always gain, because, since you were going to upgrade sooner or later anyway, you will reap the benefits of having the more powerful equipment that much longer. Discuss the benefits and costs, both material and psychological, of “waiting until prices drop.” Gather more information on this topic by asking friends and colleagues what choices they have made about upgrading equipment over the years and whether they feel satisfaction or regret about the timing when they finally did upgrade. 7. Computers are almost everywhere, and they affect most walks of life—business, education, government, the military, hobbies, shopping, research, and so on. What aspects of your life can you think of that still seem relatively unaffected by computers and technology? Is this a good thing or a bad thing, and is it likely to last? What aspects of your life have been the most conspicuously affected by technology? Has anything been made worse or harder in your life by the advance of computers? What about things that have been made better or easier?
11/23/09 3:58:40 PM
Confirming Pages
Make a list of technologies that have become indispensable to your life. Imagine the consequences if any of these technologies should fail you. What can you do to protect yourself against such failure? 9. It has been said that the computer is a “meta medium” because it can simulate (behave as) any other medium. Thus a computer can present text that can be read from virtual “pages” as if it were a book; it can let you compose and print text as if it were a typewriter; it can play music as if it were a boombox; it can display video as if it were a television set; it can make telephone calls as if it were a telephone; it can let you “draw” and “paint”; it can be programmed to serve as an answering machine; and so forth. Imagine a future in which computers have replaced all the things they can emulate: instead of books and magazines and newspapers, we would have text only on computers. Telephones, PDAs, television sets, VCRs, DVD players, stereo sets, and other electronic devices would all be gone or, rather, subsumed by computers. What benefits to your life can you see in such a future? What things might be worse? What dangers can you see? Do you think this kind of radical convergence is likely? If so, how long do you think it will take?
Web Exercises If you are not yet familiar with web surfing, wait until you have finished Chapter 2 to do the following web exercises. 1. Are computers, cellphones, and other electronic devices bad for our health? You may have heard the term electromagnetic radiation and dismissed it as an obscure scientific term not worth understanding. Visit the links below to become educated on a topic that will be discussed more seriously and frequently when our society becomes completely wireless. www.howstuffworks.com/cell-phone-radiation.htm www.fda.gov/cellphones/
remarkable man; at online bookstores, look up some of the books he wrote and read the reviews. 4. Looking for legally free programs? Some great places to start: www.download.com www.shareware.com www.freewarefiles.com/ www.freedownloadscenter.com/ 5. Visit the following websites to become aware of some topics of interest in the computing world. Full comprehension of these topics isn’t necessary at this time; this is only to familiarize you with subject matter you may come in contact with. www.zdnet.com/eweek www.computeruser.com/ www.computermarket.com/news http://slashdot.org 6. “Moore’s Law” predicts the rate at which computers will continue to get smaller (and hence faster). The “law” has proved to be astonishingly accurate over many years. Do a web search for Moore’s Law, and see if you can find answers to the following questions: a. Who is Moore, and when did he make the prediction we know as Moore’s Law? b. What is the simplest statement of the law’s prediction? c. How has the law changed over time? d. How much longer is the law expected to hold true? e. How does the law affect business projections? 7. A Wiki is a website on which authoring and editing can be done very easily by anyone, anywhere, anytime using a web browser such as Internet Explorer or Netscape Navigator, with no need for special software or other special requirements. (Wiki is Hawaiian for “quick.”) Most web pages are less than perfect. If it is a Wiki-page and you are annoyed by something, you can just hit the Edit button and change it! Over time, the site gets better (people hope)! Here are some examples of Wikis that deal with general knowledge: http://en.wikipedia.org www.wikimedia.org/ http://wiki.ehow.com/Main-Page And here are some specialized Wikis: www.rawfoodwiki.org/index.php/Encyclopedia
www.consumeraffairs.com/news04/2008/03/cells_ danger.html
http://london-crafts.org/
http://skeptoid.com/episodes/4117
www.payrollwiki.com
2. List some pros and cons of a “paperless” environment. Do you believe that a paperless environment is something worth striving for in the workplace? In the home? In the classroom? In banking? Run a web search to see what others are doing to implement this idea. 3. Computer pioneer John Von Neumann was one of a group of individuals who conceived the idea of the “stored program.” He could also divide two 8-digit numbers in his head. Spend a few hours researching this
wiL16775_ch01_001-048.indd 47
www.wikia.com/wiki/Wikia http://wikisineducation.wetpaint.com/ a. Make a small change on a page on one of the listed sites or on some other Wiki site you have identified. Submit your change, and note the results. Anyone navigating to that site will now see your change. Did you know that website authoring could be that easy? Are you surprised that someone would unconditionally open up his or her website for anyone to edit?
Introduction to Information Technology
8. Have you become extremely dependent on some technologies? Some people no longer write down telephone numbers anywhere; instead, they simply program them into their cellphones. Some people feel helpless in a foreign country unless they have a calculator in hand to compute currency conversions. Many people rely on their email archive to hold essential information, such as addresses and appointments. When any of these technologies fails us, we can feel lost.
47
11/23/09 3:58:40 PM
Rev. Confirming Pages
b. Since you can make any change you wish, even something totally nonsensical or simply wrong, it’s obviously possible for incorrect or misleading content to appear on a Wiki. Given that, why do you think that Wikis have become so popular and so widespread? c. How significant a problem do you think vandalism and other acts of poor citizenship might be on “open” Wikis? How can you find out?
f. If you knew that a particular person was defacing a Wiki, what would you do about it? Report the person? Wait for the vandal to get bored and turn his or her mischief elsewhere? Or try to reform the person? Are the basic ethical considerations here the same as those regarding other forms of vandalism in our society? g. Do you think that open-access systems such as unrestricted Wikis will become more common over time, or do you think that abuse of such systems will destroy their usefulness and that Wikis will eventually disappear?
Chapter 1
d. Some Wikis contend with the threat of vandalism by requiring that a password be provided before a user is allowed to make changes. What advantages can you see to this approach? What disadvantages? Do you think the advantages of password protection outweigh the disadvantages? What do the Wikis you browse through have to say about this issue?
e. What measures do you think an online shared space can take to limit the potential damage from vandalism, while not being overly restrictive?
48
wiL16775_ch01_001-048.indd 48
1/22/10 10:40:52 AM
Rev. Confirming Pages
2 THE INTERNET & the WORLD WIDE WEB Exploring Cyberspace
Chapter Topics & Key Questions 2.1
Connecting to the Internet: Narrowband, Broadband, & Access Providers What are the means of connecting to the internet, and how fast are they? What are the three kinds of internet access provider?
2.2
How Does the Internet Work? who controls it?
2.3
The World Wide Web How do the following work: websites, web pages, browsers, URLs, web portals, search tools, and search engines? What are HTML and hyperlinks?
2.4
Email & Other Ways of Communicating over the Net What are email and webmail, attachments, instant messaging, FTP, newsgroups, listservs, real-time chat, and netiquette?
2.5
The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & the Social Web What are internet telephony, various kinds of multimedia, RSS, and different web feeds (webcasting, blogging, podcasting), types of e-commerce, and the social web?
2.6
The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware How can I protect myself against snoopers, spam, spoofing, phishing, pharming, cookies, and spyware—adware, browser and search hijackers, and key loggers?
What is the basic structure of the internet, and
49
wiL16775_ch02_049-118.indd 49
1/8/10 4:03:05 PM
Rev. Confirming Pages
T more
info! Hobbes’s Internet Timeline For more detailed internet timelines, go to: www.zakon.org/robert/ internet/timeline www.computerhistory.org/ internet_history www.webopedia.com/quick_ref/ timeline.asp www.factmonster.com/ipka/ A0193167.html
panel 2.2
he immensity of the changes wrought—and still to come—cannot be underestimated,” says futurist Graham Molitor. “This miraculous information channel—the internet—will touch and alter virtually every facet of humanity, business, and all the rest of civilization’s trappings.”1 Today the world of the internet permits activities hardly imaginable a dozen years ago. (• See Panel 2.1.) Indeed, pervasive computing, ubiquitous computing, is already an established fact, with “everything connected to everything,” from cellphones to cameras to car navigation systems. Because of its standard interfaces and low rates, the internet has been the great leveler for communications—just as the personal computer was for computing. The basis for the internet began in 1969 as ARPANET (for ARPA, the Advanced Research Projects Agency of the U.S. Department of Defense), with four linked-together computers at different universities and defense contractors. From there the network expanded to 62 computers in 1974, 500 computers in 1983, and 28,000 in 1987. However, it still remained the domain of researchers and academics, and it was still all text—no graphics, video, or sound. Not until the development of the World Wide Web in the early 1990s, which made multimedia available on the internet, and the first browser (for locating web pages), which opened the web to commercial uses, did the global network really take off. (• See Panel 2.2 for a brief history of telecommunications.) Not everyone is interested in the internet—indeed a third of adults says they simply don’t want it, 13% can’t get access, and 9% find it too difficult.2 But by 2012, the internet is expected to have 1.9 billion users, or 30% of the world’s population.3 How does one become a participant in this network of networks? What is the first step? To connect to the internet, you need three things: an access device, such as a personal computer with a modem; a means of connection, such as a telephone line, cable hookup, or wireless capability; and an internet access provider, such as an internet service provider (ISP), a commercial online service provider, or a wireless internet service provider. We cover these subjects in the next section. We then describe how the internet works.
Timeline: Brief graphical history of telecommunications and the internet
1621
Chapter 2
Slide rule invented (Edmund Gunther)
1642 First mechanical adding machine (Blaise Pascal)
1843 World’s first computer programmer, Ada Lovelace, publishes her notes
1844 Samuel Morse sends a telegraph message from Washington to Baltimore
1876 Alexander Graham Bell patents the telephone
1895 First radio signal transmitted
1907 First regular radio broadcast from New York
50
wiL16775_ch02_049-118.indd 50
1/19/10 3:41:15 PM
Rev. Confirming Pages
Internet user
Internet access provider y’s Todather Wea
Search
Research & information Find information on any subject, using browsers and search tools.
News Stay current on politics, weather, entertainment, sports, and financial news.
$$ $ $
Entertainment Amuse yourself with internet games, music, videos, and movies.
Download files Get software, music, and documents such as e-books.
E-shopping Price anything from plane tickets to cars; order anything from books to sofas.
Financial matters Do investing, banking, and bill paying online.
Auctions Sell old stuff, acquire more stuff, with online auctions.
Telephony & conferencing Make inexpensive phone calls; have online meetings.
Career advancement Search job listings, post résumés, interview online.
Distance learning Attend online lectures, have discussions, write research papers, earn degrees.
E-business Connect with coworkers, buy supplies, support customers, conduct negotiations.
1927 First demonstration of television in USA
1944 First electromechanical computer (Mark I)
1946 First programmable electronic computer in United States (ENIAC)
1947 Vannevar Bush proposes hypertext; mobile phones first invented (cellphones not sold commercially until 1983)
panel 2.1 The world of the internet
1958 Eisenhower administration creates the Advanced Research Projects Agency (ARPA) as part of the U.S. Department of Defense
1962 First commercially available modem (developed in the 1950s)
The Internet & the World Wide Web
Email & discussion groups Stay in touch worldwide through email, Facebook, and Twitter.
Famin e AfricaHits
51
wiL16775_ch02_049-118.indd 51
1/19/10 3:41:16 PM
Rev. Confirming Pages
2.1 CONNECTING TO THE INTERNET: Narrowband, Broadband, & Access Providers What are the means of connecting to the internet, and how fast are they? What are the three kinds of internet access provider? In general terms, bandwidth, or channel capacity, is an expression of how much data—text, voice, video, and so on—can be sent through a communications channel in a given amount of time. The type of data transmission that allows only one signal at a time is called baseband transmission. When several signals can be transmitted at once, it’s called broadband transmission. Broadband—very high speed—connections include various kinds of high-speed wired connections (such as coaxial and fiber-optic, described in Chapter 6), as well as DSL, cable, and satellite and other wireless connections, discussed shortly. Today more than half (55%) of all adult Americans have broadband internet connections at home.4 THE PHYSICAL CONNECTION: WIRED OR WIRELESS? What are your choices of a physical connection—the wired or wireless means of connecting to the internet? A lot depends on where you live. As you might expect, urban and many suburban areas offer more broadband connections than rural areas do. Among the principal means of connection are (1) telephone (dial-up) modem; (2) several high-speed phone lines—ISDN, DSL, and T1; (3) cable modem; and (4) wireless—satellite and other through-the-air links. DATA TRANSMISSION SPEEDS Data is transmitted in characters or collections of bits. A bit, as we will discuss later, is the smallest unit of information used by computers. Today’s data transmission speeds are measured in bits, kilobits, megabits, and gigabits per second:
•
bps: A computer with an older modem might have a speed of 28,800 bps, which is considered the minimum speed for visiting websites with graphics. The bps stands for bits per second. (Eight bits equals one character, such as A, 3, or #.)
•
Kbps: This is the most frequently used measure; kilobits per second, or Kbps, are 1 thousand bits per second. The speed of a modem that is 28,800 bps might be expressed as 28.8 Kbps.
•
Mbps: Faster means of connection are measured in megabits per second, or Mbps—1 million bits per second.
•
Gbps: At the extreme are gigabits per second, Gbps—1 billion bits per second.
UPLOADING & DOWNLOADING Why is it important to know these terms? Because the number of bits affects how fast you can upload and download
Chapter 2
1969 ARPANET established at 4 U.S. universities (4 computers linked by leased lines); led to internet (4 hosts)
1970 Microprocessor chips come into use; 15 ARPANET sites established (universities/ research), each with own address; 13 hosts on internet
1971 Email invented by computer engineer Ray Tomlinson; 23 hosts on internet
1973 ARPANET becomes international; 35 hosts on internet
1974 TCP (Transmission Control Protocol) specification developed by U.S. Dept. of Defense; 62 hosts on internet
1975 First microcomputer (MITS Altair 8800)
1976 Queen Elizabeth sends the first royal email
52
wiL16775_ch02_049-118.indd 52
1/8/10 4:03:09 PM
Rev. Confirming Pages
information from a remote computer. As we’ve said (Chapter 1), download is the transmission of data from a remote computer to a local computer, as from a website to your own PC. Upload is the transmission of data from a local computer to a remote computer, as from your PC to a website you are constructing.
Satellite Upload Download
Narrowband (Dial-Up Modem): Low Speed but Inexpensive & Widely Available Why would I want to use dial-up to connect my computer to the internet? The telephone line that you use for voice calls is still the cheapest means of online connection and is available everywhere. Although the majority of U.S. adults, 55% in 2008, favor broadband internet connections, many home users still use what are called narrowband, or low-bandwith, connections.5 This mainly consists of dial-up connections—use of telephone modems to connect computers to the internet.
Mainframe
Individual PC
Download (reverse the direction of data transmission to upload)
MODEMS & CALL WAITING One disadvantage of a telephone modem is that while you’re online you can’t use that phone line to make voice calls unless you’ve installed special equipment. In addition, people who try to call you while you’re using the modem will get a busy signal. (Call waiting may interrupt an online connection, so you need to talk to your phone company about disabling it or purchase a new modem that can handle call waiting. The Windows operating system also has a feature for disabling call waiting.) You generally won’t need to pay long-distance phone rates, since most access providers offer local access numbers. The cost of a dial-up modem connection to the internet is as low as $7.95 a month, plus a possible setup charge of $10–$25.6 1976 Apple I computer (first personal computer sold in assembled form)
1978 TCP/IP developed (released in 1983) as standard internet transmission protocol; 111 hosts on internet
1979 First Usenet newsgroups; 188 hosts on internet
1981 IBM introduces Personal Computer; 213 hosts on internet
1984 Apple Macintosh; first personal laser printer; William Gibson coins term “cyberspace”; Domain Name System (DNS) introduced
1986 NSFNET (National Science Foundation Network) backbone established
1987 Digital cellular phones invented; first email message sent from China
The Internet & the World Wide Web
CONNECTING THE MODEM As we mentioned in Chapter 1, a modem is a device that sends and receives data over telephone lines to and from computers. These days, the modem is generally installed inside your computer, but there are also external modems. The modem is attached to the telephone wall outlet. (• See Panel 2.3.) (We discuss modems in a bit more detail in Chapter 6.) Most standard modems today have a maximum speed of 56 Kbps. That doesn’t mean that you’ll be sending and receiving data at that rate. The modem in your computer must negotiate with the modems used by your internet access provider, the regional, national, or wireless organization or business that connects you to the internet. Your provider may have modems operating at slower speeds, such as 28.8 Kbps. In addition, lower-quality phone lines or heavy traffic during peak hours—such as 5 p.m. to 11 p.m. in residential areas—can slow down your rate of transmission.
53
wiL16775_ch02_049-118.indd 53
1/8/10 4:03:09 PM
Rev. Confirming Pages
panel 2.3 The modem connection You connect the modem inside your computer from a port (socket) in the back of your computer to a line that is then connected to a wall jack. Your telephone is also connected to your computer so that you can make voice calls.
Internal modem
Telephone outlet
Telephone wall outlet connector
Phone
Phone connector
Jack (fits in connector)
High-Speed Phone Lines: More Expensive but Available in Most Cities What are my choices in high-speed phone lines? Waiting while your computer’s modem takes 25 minutes to transmit a 1-minute low-quality video from a website may have you pummeling the desk in frustration. To get some relief, you could enhance your POTS—“plain old telephone
Chapter 2
1989 World Wide Web established by Tim Berners-Lee while working at the European Particle Physics Laboratory in Geneva, Switzerland; first home trials of fiber communications network; number of internet hosts breaks 100,000
1990
1984
9.6 K ARPANET modem decommissioned; first ISP comes online (dial-up access); BernersLee develops first web browser, World Wide Web; 313,000 hosts on internet (9,300 domains)
1989–1991 14.4 K modem
1992 “Surfing the internet” coined by Jean Armour Polly; 1,136,000 hosts on internet (18,1000 domains)
1993
1994
Multimedia desktop computers; NAPs replace NSFNET; first graphical web browser, Mosaic, developed by Marc Andreessen; the U.S. White House goes online; internet talk radio begins broadcasting; 2,056,000 hosts on internet (28,000 domains)
Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; Netscape Navigator released; 28.8 K modem; the Japanese Prime Minister goes online; 3,864,000 hosts on internet (56,000 domains)
54
wiL16775_ch02_049-118.indd 54
1/8/10 4:03:10 PM
Rev. Confirming Pages
system”—connection with a high-speed adaptation. Among the choices are ISDN, DSL, and T1, available in most major cities, though not in rural and many suburban areas. ISDN LINE ISDN (Integrated Services Digital Network) consists of hardware and software that allow voice, video, and data to be communicated over traditional copper-wire telephone lines. Capable of transmitting 64 to 128 Kbps, ISDN is able to send digital signals over POTS lines. If you were trying to download an approximately 6-minute-long music video from the World Wide Web, it would take you about 4 hours and 45 minutes with a 28.8-Kbps modem. A 128-Kbps ISDN connection would reduce this to an hour. Basically, ISDN is a viable solution for single users of small business networks when other high-speed options are not available. ISDN is not as fast as DSL, cable, or T1 and is expensive.
Check online connections If youʼre using Windows XP on your computer, you can check your online connection speed by going to Control Panel, Network Connections; click on your Internet gateway icon, then on View Status of This Connection (on the left side of the screen):
DSL LINE DSL (digital subscriber line) uses regular phone lines, a DSL modem, and special technology to transmit data in megabits per second. Incoming data is significantly faster than outgoing data. That is, your computer can receive data at the rate of 1.5–10 Mbps, but it can send data at only 128 Kbps–1.5 Mbps. This arrangement may be fine, however, if you’re principally interested in obtaining very large amounts of data (video, music) rather than in sending such data to others. With DSL, you could download that 6-minute music video perhaps in only 11 minutes (compared to an hour with ISDN). A big advantage of DSL is that it is always on (so you don’t have to make a dial-up connection) and, unlike cable (discussed shortly), its transmission rate is relatively consistent. Also, you can talk on the phone and send data at the same time. There is one big drawback to DSL: You have to live within 3.3 miles of a phone company central switching office, because the access speed and reliability degrade with distance. However, DSL is becoming more popular, and phone companies are building thousands of remote switching facilities to
NSFNET reverts to research project; internet now in commercial hands; the Vatican goes online
1996 Microsoft releases Internet Explorer; 56 K modem invented; cable modem introduced; 12,881,000 hosts on internet (488,000 domains)
2000 Web surpasses 1 billion indexable pages; 93,047,785 hosts on internet URL:
2001 AOL membership surpasses 28 million; Napster goes to court
2002 Blogs become popular; Friendster
2003 First official Swiss online election; flash mobs start in New York City; Facebook; MySpace
2004 More than 285,000,000 hosts on internet
The Internet & the World Wide Web
1995
55
wiL16775_ch02_049-118.indd 55
1/8/10 4:03:13 PM
Rev. Confirming Pages
S u rv i v al Ti p Broadband: Riskier for Security Unlike dial-up services, broadband services, because they are always switched on, make your computer vulnerable to over-the-internet security breaches. Solution: Install firewall software (Chapter 6).
enhance service throughout their regions. Another drawback is that you have to choose from a list of internet service providers that are under contract to the phone company you use, although other DSL providers exist. A new competitor to DSL, available from Verizon, is a service (fiber optic, which we describe later) called FiOS, which is faster than DSL. However, FiOS is not available in all areas (see www.verizon.com/fios).7 Still, the real problem for DSL—or any other kind of broadband—is that it is not available to most rural Americans, who thus lack the sort of high-speed services and opportunities, such as distance learning and web-based commerce, that urban dwellers take for granted.8 T1 LINE How important is high speed to you? Is it worth $400–$1,500 a month? Then consider getting a T1 line, essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 to 6 Mbps. Generally, T1 lines are leased by corporate, government, and academic sites. Another high-speed line, the T3 line, transmits at 6–45 Mbps (the equivalent of about 672 simultaneous voice calls) and costs about $4,000 or more a month. Telephone companies and other types of companies are making even faster connections available: An STS-1 connection runs at 51 Mbps, and an STS-48 connection speeds data along at 2.5 Gbps (2.5 billion bits per second). T1 and T3 lines are commonly used by businesses connecting to the internet, by internet access providers, and in the internet high-speed transmission lines.
Problem for Telephone Internet Connections: The Last Mile Why does the “last mile” of a wired connection often slow down the data rate? The distance from your home to your telephone’s switching office, the local loop, is often called the “last mile.” As we mentioned earlier, if you are using POTS for your initial internet connection—even if you use ISDN or DSL—data must pass back and forth between you and your telephone switching station. (This distance is usually more than a mile; it is shorter than 20 miles and averages about 3 miles in metropolitan areas.) The “last mile” of copper wire is what really slows things down. This problem can be solved by installing newer transmission media, but communications companies are slow to incur this cost. There are about 130 million phone lines in the United States that use 650 million miles of copper wire. Considering that our planet is only about 93 million miles from the sun, 650 million miles of wire represents a huge challenge to replace!
Cable Modem: Close Competitor to DSL What are the advantages and disadvantages of a cable modem connection?
Cable modem
If DSL’s 11 minutes to move a 6-minute video sounds good, 2 minutes sounds even better. That’s the rate of transmission for cable modems, which can transmit outgoing data at about 1.4 Mbps and incoming data at up to 30 Mbps. (The common
Chapter 2
2005
56
wiL16775_ch02_049-118.indd 56
2006
YouTube; Wii
2007
Skype
2009
2030–2045
More than 625,226,456 hosts on internet — top 10 are USA, Japan, Germany, Italy, China, France, Australia, Netherlands, Mexico, Brazil
The Singularity
1/8/10 4:03:14 PM
Rev. Confirming Pages
1
DSL users connect their equipment to a typical phone line, whereas cable users connect their equipment to the coaxial cable used to deliver television programming. In both instances, unused portions of the wire or cable are used to send data.
2
DSL users connect to a DSLAM (DSL Access Multiplexer), whereas cable users connect to CMTS (CableModem Termination System). The DSLAM is usually located at the central office of the phone company, and the CMTS is located at the headend of the cable network. Internet
DSLAM or CMTS
High-Speed Connection ISP Network and POP Email Servers
User
Cable or DSL Modem Terminal Server
Both DSLAM and CMTS funnel data from multiple users into a single highbandwidth connection to the internet.
panel 2.4 Web Server
residential transmission rate is 3 Mbps.) A cable modem connects a personal computer to a cable-TV system that offers an internet connection. The advantage of a cable modem is that, like a DSL connection, it is always on. However, unlike DSL, you don’t need to live near a telephone switching station. (• See Panel 2.4.) A disadvantage, however, is that you and your cable-TV-viewing neighbors are sharing the system and consequently, during peak-load times, your service may be slowed to the speed of a regular dial-up modem. Also, using an internet connection that is always on—and that, in the case of cable, you share with other people—invites outside interference with your computer, a risk that we discuss later in the book. Cable companies may contract you to use their own internet access provider, but more commonly you may choose your own. (Note that cable modems are for internet connections. They do not by themselves take the place of your voice phone system.)
Basic DSL/cable–PC system
Sur v iv a l T ip Connection Speeds To test the speed of your internet connection, go to www.computerhope.com/ issues/ch000539.htm http://us.mcafee.com/root/ speedometer/ www.auditmypc.com/speed test.asp
Satellite Wireless Connections Why might I consider having a satellite connection? If you live in a rural area and are tired of the molasses-like speed of your cranky local phone system, you might—if you have an unobstructed view of the southern sky—consider taking to the air. With a pizza-size satellite dish on your roof or on the side of your house, you can send data at the rate of about 512 Kbps and receive data at about 1.5 Mbps from a communications satellite, a space station that transmits radio waves called microwaves from earth-based stations. Satellite internet connections are always on. To surf the internet using this kind of connection, you need an internet access provider that supports two-way satellite transmission. You will also have to lease or purchase satellite-access hardware, such Sky connection. Setting up a home satellite dish. as a dish. (We cover satellites in more detail in Chapter 6.)
wiL16775_ch02_049-118.indd 57
The Internet & the World Wide Web
3
57
1/8/10 4:03:16 PM
Rev. Confirming Pages
more
Other Wireless Connections: Wi-Fi & 3G
info!
What are Wi-Fi and 3G wireless connections?
How much do you know about Wi-Fi? Take a quiz:
More and more people are using laptop computers, smart cellphones, and personal digital assistants to access the internet through wireless networks, which use radio waves to transmit data. Indeed, 62% of all Americans are part of a wireless, mobile population.9 We discuss various types of wireless networks in detail in Chapter 6, but here let us mention just two of the technologies:
http://computer.howstuffworks. com/wifi-quiz.htm
more
info! Finding Wi-Fi Hot Spots www.wififreespot.com/ www.wifihotspotlist.com/ www.wifinder.com/
WI-FI Short for Wireless Fidelity, Wi-Fi is the name given to any of several standards—so-called 802.11 standards—set by the Institute of Electrical and Electronic Engineers (IEEE) for wireless transmission. One standard, 802.11b, permits wireless transmission of data at up to 54 Mbps for 300–500 feet from an access point, or hot spot, a station that sends and receives data to and from a Wi-Fi network; 802.11n can transmit up to 140 Mpbs. Many airports, hotels, libraries, convention centers, and fast-food facilities offer so-called hotspots—public access to Wi-Fi networks. The hotspot can get its internet access from DSL, cable modem, T1 local area network, dial-up phone service, or any other method. (Communications technology is covered in Chapter 6.) Once the hotspot has the internet connection, it can broadcast it wirelessly. Laptops are commonly used for Wi-Fi internet connections; they must be equipped with the necessary Wi-Fi hardware, however. 3G WIRELESS 3G, which stands for “third generation,” is loosely defined as high-speed wireless technology that does not need access points because it uses the existing cellphone system. This technology, which is found in many smartphones and PDAs that are capable of delivering downloadable video clips and high-resolution games, is being provided by Cingular, Sprint, Verizon, and T-Mobile. The table at right shows the transmission rates for various connections, as well as their approximate costs (always subject to change, of course) and their pros and cons. (• See Panel 2.5.)
more
info!
How do I distinguish among the three types of providers?
Finding ISPs
As we mentioned, in addition to having an access device and a means of connection, to get on the internet you need to go through an internet access provider. There are three types of such providers: internet service providers, commercial online services, and wireless internet service providers.
For comparison shopping, go online to: www.thelist.com
Chapter 2
Internet Access Providers: Three Kinds
This site lists ISPs from all over the world and guides you through the process of finding one that’s best for you. Which ISPs are available in your area? Which ones supply both dial-up and wireless services?
INTERNET SERVICE PROVIDERS (ISPs) An internet service provider (ISP) is a company that connects online users through their communications lines to the company’s server, which links them to the internet via another company’s network access points. Examples are EarthLink and United Online. There are also some free ISPs.
S u rv i v al Ti p
COMMERCIAL ONLINE SERVICES A commercial online service is a membersonly company that provides not only internet access but other specialized content as well, such as news, games, and financial data. The two best-known subscriber-only commercial online services are AOL (America Online) and MSN (Microsoft Network).
Some Free ISPs www.freei.com www.dailyedeals.com/free_ internet/free_isp.htm www.juno.com
58
wiL16775_ch02_049-118.indd 58
WIRELESS INTERNET SERVICE PROVIDERS A wireless internet service provider (WISP) enables users with computers containing wireless modems—mostly laptops/notebooks—and web-enabled mobile smartphones and personal digital assistants to gain access to the internet. Examples are Cingular, Sprint, T-Mobile, and Verizon.
1/8/10 4:03:23 PM
Rev. Confirming Pages
panel 2.5 Methods of going online compared
Telephone (dial-up) modem ISDN
DSL
T1 line
Cable modem
Satellite
Wi-Fi
3G
wiL16775_ch02_049-118.indd 59
$0–$45
56 Kbps
Pluses
Minuses
Inexpensive, available everywhere Slow; connection supports only a single user
Faster than dial-up; uses conven- More expensive than dial-up; 64–128 Kbps (1.5 tional phone lines no longer extensively supMbps with speported by telephone comcial wiring) panies for individuals; used mostly by small businesses $25–$35, depend- 768 kbps–7 Mbps Fast download, always on, higher Needs to be close to phone company switching station; ing on speed security; uploads faster than limited choice of service cable; users can talk and providers; supports only a transmit data at the same single user time 1.5 Mbps (T5 ⫽ 45 Can support many users: 24 sep- Expensive, best for businesses $350–$1,500 Mbps) arate circuits of 64 Kbps each; (+ $1,000 instalreliable high-speed downloadlation cost) ing and uploading; users can talk and transmit data at the same time Slower service during highUp to 30 Mbps (4 Fast, always on, most popular $40–$100 (+ $5 traffic times, vulnerability Mbps common) broadband type of connecmonthly for to outside intrusion, limited tion; can support many users; leased cable choice of service providdownloads faster than DSL; modem) ers; not always available to users can talk on phone and businesses transmit cable data at the same time High setup and monthly 512 Kbps–5 Mbps Wireless, fast, reliable, always Up to $120 costs; users must have on; goes where DSL and cable (+ about $300 unobstructed view of the can’t; users can talk on phone installation) southern sky; because the and transmit satellite data at satellite signals must travel the same time so far (22,000 miles into space and then back again), latency (signal delay) is a problem for users who need real-time interactivity, such as when playing games; bad weather can cause service drop-outs Range of access is usually only 54–140 Mbps Uses a beefed-up version of the Nothing for users 50–300 feet (to access current cellphone network; accessing point) ultimately should be available hotspots supeverywhere plied by others; about $300 for access-point hardware and up to $25 per month for subscription to a Wi-Fi access service Low battery power on some Functions like Wi-Fi but without $250 and up About 3 Mbps models; phones are relathe need for hot spots; uses (about 15 sectively large existing cellphone network onds to download a 3-minute MP3 song)
$40–$110 (+ $350–$700 installation cost)
The Internet & the World Wide Web
Service
Cost per Month (plus installation, Maximum Speed equipment) (download only)
59
1/8/10 4:03:24 PM
Rev. Confirming Pages
PRACTICAL ACTION Looking for an Internet Access Provider: Questions to Ask at the Beginning
I
f you belong to a college or company, you may get internet access free. Many public libraries also offer free net connections. If these options are not available to you, here are some questions to ask in your first phone call to an internet access provider:
•
Is there free, 24-hour technical support? Is it reachable through a toll-free number?
•
How long does it take to get tech support? Ask for the tech-support number before you sign up, and then call it to see how long a response takes. Also try connecting through the web.
•
Is there a contract, and for what length of time? Is there a trial period, or are you obligated to stick with the provider for a while even if you’re unhappy with it?
•
Will the provider keep up with technology? For instance, is it planning to offer broadband access? Wireless access?
•
Is there a setup fee? What kind of help do you get in setting up your connection?
•
•
How much is unlimited access per month? Is there a discount for long-term commitments?
Will the provider sell your name to marketers? What kind of service does it offer to block unwanted junk messages (spam)?
•
Is the access number a local phone call so that you don’t have long-distance phone tolls?
•
Is there an alternative dial-up number if the main number is out of service?
•
Is access available when you’re traveling, through either local numbers or toll-free 800 numbers?
•
Can you gain access to your email through the provider’s website?
•
Will the provider help you establish your personal website, if you want one, and is there sufficient space for it on the provider’s server?
2.2
Once you have contacted an internet access provider and paid the required fee (charged to your credit card), you will be provided with information about local connections and necessary communications software for setting up your computer and modem to make a connection. For this you use your user name (“user ID”) and your password, a secret word or string of characters that enables you to log on, or make a connection to the remote computer. The access provider will also help you establish your email address, which must be unique—that is, not the same as anyone else’s.
HOW DOES THE INTERNET WORK?
What is the basic structure of the internet, and who controls it?
Chapter 2
The international network known as the internet consists of hundreds of thousands of smaller networks linking educational, commercial, nonprofit, and military organizations, as well as individuals. Central to this arrangement is the client/server network. A client computer is a computer requesting data or services. A server, or host computer, is a central computer supplying data or services requested of it. When the client computer’s request—for example, for information on various airline flights and prices—gets to a server computer, that computer sends the information back to the client computer.
60
wiL16775_ch02_049-118.indd 60
Internet Connections: POPs, NAPs, Backbone, & Internet2 How do I distinguish a point of presence from a network access point, and what is the internet backbone? What does Internet2 do? Your journey onto the internet starts, in the case of dial-up, with your client computer’s modem connecting via a local phone call to your internet service provider (ISP). (• See Panel 2.6.) This is the slowest part of the internet connection. An ISP’s headquarters and network servers may be located almost anywhere.
1/8/10 4:03:24 PM
Rev. Confirming Pages
POINT OF PRESENCE To avoid making its customers pay long-distance phone charges to connect, the ISP provides each customer with a ❶ point of presence (POP)—a local access point to the internet—a collection of modems and other equipment in a local area. The POP acts as a local gateway to the ISP’s network. NETWORK ACCESS POINT The ISP in turn connects to a ❷ network access point (NAP), a routing computer at a point on the internet where several connections come together. NAPs are owned by a network service provider (NSP), a large communications company, such as AGIS or MCI. The four original NAPs in the United States are in San Francisco, Washington, D.C., Chicago, and New Jersey. These NAPs were established in 1993, when the original network that became the internet was privatized. Much of the internet congestion occurs at NAPs. The four main NAPs quickly became overloaded, so Private/Peer NAPs, called PNAPs (“miniNAPs”) were established in the late 1990s. PNAPs facilitate more efficient routing (passing) of data back and forth on the internet by providing more backbone access locations. PNAPs are provided by commercial companies, such as Savvis Communications. INTERNET BACKBONE Each NAP has at least one computer, whose task is simply to direct internet traffic from one NAP to the next. NAPs are connected by the equivalent of interstate highways, known collectively as the ❸ internet backbone, high-speed, high-capacity transmission lines that use the newest communications technology to transmit data across the internet. Backbone connections are supplied by internet backbone providers such as AT&T, Cable & Wireless, GTE, Sprint, Teleglobe, Verizon, and Deutsche Telekom.
3 Internet backbone Network Access Point (NAP)
2 Network Access Point (NAP)
Internet backbone
Internet connection
U.S. Library of Congress
Can also be a national ISP’s (online service’s) POP (for example, AOL’s local access number)
Local phone call (dial-up or cable connection) You
ISP
Internet backbone
Local ISP’s Point of Presence (POP)
Modem inside
University mainframe
Another user
Internet connection
High-speed line
1
How the internet works
The internet’s main communication lines are the backbone. The U.S. lines that make up the backbone exchange data at main points called Network Access Points (NAPs), which are located in major cities. National ISPs use their own dedicated lines to connect directly to the backbone. Local ISPs lease lines from telephone companies.
The Internet & the World Wide Web
Amazon.com servers
panel 2.6
61 User
wiL16775_ch02_049-118.indd 61
1/8/10 4:03:27 PM
Rev. Confirming Pages
INTERNET2 Internet2 is a cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks. In effect, Internet2 adds “toll lanes” to the older internet to speed things up. The purpose is to advance videoconferencing, research, and academic collaboration—to enable a kind of “virtual university.” Presently Internet2 links more than 210 research universities. Requiring state-of-the-art infrastructure, Internet2 operates a high-speed backbone network (formerly called Abiline), which many colleges use. A rival nonprofit organization is National LamdaRail, a fiber-optic network assembled for colleges’ use.
Internet Communications: Protocols, Packets, & Addresses How do computers understand the data being transmitted over the internet? When your modem connects to a modem at your ISP’s POP location, the two modems go through a process called handshaking, whereby the fastestavailable transmission speed is established. Then authentication occurs: your ISP needs to know you are who you say you are, so you will need to provide a user name and a password. These two items will have been established when you opened your account with your ISP.
more
info! The Internet Traffic Report The Internet Traffic Report monitors the flow of data around the world. It displays values between 0 and 100 for many networks. Higher values indicate faster and more reliable connections. Check out your area at: www.internettrafficreport.com
more
Chapter 2
info! Your IP Address Want to find out what your IP address is while you’re online? Go to: http://whatismyipaddress.com
62
wiL16775_ch02_049-118.indd 62
PROTOCOLS How do computers understand the data being transmitted? The key lies in data following the same protocol, or set of rules, that computers must follow to transmit data electronically. The protocol that enables all computers to use data transmitted on the internet is called Transmission Control Protocol/Internet Protocol, or TCP/IP, which was developed in 1978 by ARPA. TCP/IP is used for all internet transactions, from sending email to downloading pictures off a friend’s website. Among other things, TCP/IP determines how the sending device will indicate that it has finished sending a message and how the receiving device will indicate that it has received the message.10 PACKETS Most important, perhaps, TCP/IP breaks the data in a message into separate packets, fixed-length blocks of data for transmission. This allows a message to be split up and its parts sent by separate routes yet still all wind up in the same place. IP is used to send the packets across the internet to their final destination, and TCP is used to reassemble the packets in the correct order. The packets do not have to follow the same network routes to reach their destination because all the packets have the same IP address, as we explain next. IP ADDRESSES An Internet Protocol (IP) address uniquely identifies every computer and device connected to the internet. An IP address consists of four sets of numbers between 0 and 255 separated by decimals (called a dotted quad)—for example, 1.160.10.240. An IP address is similar to a street address, but street addresses rarely change, whereas IP addresses often do. Each time you connect to your internet access provider, it assigns your computer a new IP address, called a dynamic IP address, for your online session. When you request data from the internet, it is transmitted to your computer’s IP address. When you disconnect, your provider frees up the IP address you were using and reassigns it to another user. A dynamic IP address changes each time you connect to the internet. A static IP address remains constant each time a person logs on to the internet. Established organizational websites—such as your ISP’s—have static IP addresses. It would be simple if every computer that connects to the internet had its own static IP number, but when the internet was first conceived, the architects didn’t foresee the need for an unlimited number of IP addresses. Consequently,
1/8/10 4:03:28 PM
Rev. Confirming Pages
Who Runs the Internet? What does ICANN do? Although no one owns the internet, everyone on the net adheres to standards overseen by the international Board of Trustees of ISOC, the Internet Society (www.isoc.org). ISOC is a professional, nonprofit society with more than 80 organizational and 28,000 individual members in more than 180 countries. The organizations include companies, governments, and foundations. ISOC provides leadership in addressing issues that confront the future of the internet and is the organizational home for groups responsible for internet infrastructure standards. In June 1998, the U.S. government proposed the creation of a series of nonprofit corporations to manage such complex issues as fraud prevention, privacy, and intellectual-property protection. The first such group, the Internet Corporation for Assigned Names and Numbers (ICANN), was established to regulate human-friendly internet domain names—those addresses ending with .com, .org, .net, and so on, that overlie IP addresses and identify the website type. ICANN (which can be accessed at www.icann.org) is a global, private-sector, nonprofit corporation that has no statutory authority and imposes policies through contracts with its world members. Criticized for inefficiency, in 2003 it outlined what it called ICANN 2.0, intended to be a more responsive and agile agency that would consult better with the world internet community about the adoption of standards.11 One of its improvements is the ICANN Whosis Database, which returns the name and address of any domain name entered (entering microsoft.com, for instance, returns the name and address of Microsoft Corp.). However, various groups, including the International Telecommunication Union, a United Nations agency, have suggested that the United States through ICANN has too much control over the internet, and several countries have proposed that an international body take over ICANN. The United States in July 2005 asserted that it intended to retain its role in internet management.12 In June 2008, ICANN decided to “increase competition and choice” by allowing perhaps thousands of new internet domain names to join “.com,” beginning in 2009. Thus, for instance, new names could cover locations such as “.nyc” (for New York City) and “.berlin” or industries such as “.bank” or companies such as “.ebay.” An application would not be allowed if it conflicted with a trademark (such as “.pepsi”).13
wiL16775_ch02_049-118.indd 63
Partial map of the internet based on January 15, 2005, data. Each line is drawn between two nodes, representing two IP addresses. Different colors represent different countries (http:// commons.wikimedia.org/wiki/ File:Internet_map_1024.jpg).
more
info! Non-English Domain Names In October 2009, ICANN approved the use of non-Latin character sets in domain names. This will allow domain names to be written in native character sets, such as Chinese, Arabic, and Greek. ICANN has argued that this change is necessary to expand use of the Web in regions where people don’t understand English. This also means that many of us in the USA, for example, will not be able to type such domain names. For more information, try: www.wired.com/ epicenter/2009/10/icanninternational-scripts/ http://news.cnet.com/83011023_3-10387139-93.html http://arstechnica.com/web/ news/2009/10/domainextensions-go-globalgoodbye-com-welcome.ars
The Internet & the World Wide Web
there are not enough IP numbers to go around. To get around that problem, many internet access providers limit the number of static IP addresses they allocate and economize on the remaining number of IP addresses they possess by temporarily assigning an IP address from a pool of IP addresses. If your computer is constantly connected to the internet, through a local network at work or school, most likely you have a static IP address. If you have a dial-up connection to the internet or are using a computer that gets connected to the internet intermittently, you’re most likely picking up a dynamic IP address from a pool of possible IP addresses at your internet access provider’s network during each log-in. After your connection has been made, your internet access provider functions as an interface between you and the rest of the internet. If you’re exchanging data with someone who uses the same provider, the data may stay within that organization’s network. Large national internet access providers operate their own backbones that connect their POPs throughout the country. Usually, however, data travels over many different networks before it reaches your computer.
63
1/8/10 4:03:29 PM
Rev. Confirming Pages
2.3
THE WORLD WIDE WEB
How do the following work: websites, web pages, browsers, URLs, web portals, search tools, and search engines? What are HTML and hyperlinks?
more
info! Whence the Word Web? Why did people perceive the need for a “web,” and how did Berners-Lee develop what they needed? Go to: www.ibiblio.org/pioneers/lee. html http://en.wikipedia.org/wiki/ Tim_Berners-Lee
Chapter 2
Tim Berners-Lee
The internet and the World Wide Web, as we have said, are not the same. The internet is a massive network of networks, connecting millions of computers via protocols, hardware, and communications channels. It is the infrastructure that supports not only the web but also other communications systems such as email, instant messaging, newsgroups, and other activities that we’ll discuss. The part of the internet called the web is a multimedia-based technology that enables you to access more than just text. That is, you can also download art, audio, video, and animation and engage in interactive games.
The Face of the Web: Browsers, Websites, & Web Pages How would I explain to someone the difference between browsers, websites, and web pages? If a Rip Van Winkle had fallen asleep in 1989—the year computer scientist Tim Berners-Lee developed the web software—and awoke today, he would be completely baffled by the new vocabulary that we now encounter on a daily basis: browser, website, web page, www. Let’s see how we would explain to him what these and similar web terms mean. Tim Berners-Lee was born in London, England; his parents, both mathematicians, were employed together on the team that built the Manchester Mark I, one of the earliest computers. Berners-Lee graduated from the Queen’s College of Oxford University, where he built a computer with a soldering iron. In 1980, while an independent contractor at CERN (European Organization for Nuclear Research), Berners-Lee proposed a project based on the concept of hypertext, to facilitate sharing and updating information among researchers. With other researchers, he built a prototype system named Enquire. After leaving CERN, he used ideas similar to those used in Enquire to create the World Wide Web, for which he designed and built the first browser (called WorldWideWeb and developed into NeXTSTEP). Berners-Lee built the first website at http://info. cern.ch/ and it was first put online on August 6, 1991. It provided an explanation about what the World Wide Web was, how one could own a browser, how to set up a web server, and so on. In 1994, Berners-Lee founded the World Wide Web Consortium (W3C) at the Massachusetts Institute of Technology. It comprised various companies willing to create standards and recommendations to improve the quality of the internet. It was not until 2000 and 2001 that popular browsers began to support this standard. BROWSERS: SOFTWARE FOR SURFING THE WEB A browser, or web browser, is software that enables you to find and access the various parts of the web. The two best-known browsers are Microsoft Internet Explorer, more commonly used (with a 68% market share), and Mozilla Firefox (21%). (• See Panel 2.7.) Apple Inc.’s Macintosh computers’ Safari is third (8%), and Google’s Chrome, introduced in 2008, is fourth (1%).14 Bing, a new browser from Microsoft, was introduced in 2009.15 These and other browsers allow you, like riding a wave with a surfboard, to surf the web. Surf means to explore the web by using your mouse to move via a series of connected paths, or links, from one location, or website, to another.
64
wiL16775_ch02_049-118.indd 64
1/8/10 4:03:29 PM
Rev. Confirming Pages
WEB PAGES: THE DOCUMENTS ON A WEBSITE A website is composed of a web page or collection of related web pages. A web page is a document on the World Wide Web that can include text, pictures, sound, and video. The first page you see at a website is like the title page of a book. This is the home page, or welcome page, which identifies the website and contains links to other pages at the site. (• See Panel 2.8, on next page.) If you have your own personal website, it might consist of just one page—the home page. Large websites have scores or even hundreds of pages.
How the Browser Finds Things: URLs How would I describe how a browser connects? Now let’s look at the details of how the browser finds a particular web page. URLS: ADDRESSES FOR WEB PAGES Before your browser can connect with a website, it needs to know the site’s address, the URL. The URL (Uniform Resource Locator) is a string of characters that points to a specific piece of information anywhere on the web. In other words, the URL is the website’s unique address.
panel 2.7 Internet Explorer (top) and Mozilla Firefox (bottom) Notice the different toolbar and tool setups.
Sur v iv a l T ip Do Home Pages Endure? The contents of home pages often change. Or they may disappear, and so the connecting links to them in other web pages become links to nowhere. To find out how to view “dead” pages, go to: http://web.ticino.com/ multilingual/Search.htm
The Internet & the World Wide Web
WEBSITE: THE LOCATION ON THE COMPUTER A website, or simply site, is a location on a particular computer on the web that has a unique address (called a URL, as we’ll explain). If you decided to buy books online from bookseller Barnes & Noble, you would visit its website, www.barnesandnoble.com; the website is the location of a computer somewhere on the internet. That computer might be located in Barnes & Noble’s offices, but it might be located somewhere else entirely.
65
wiL16775_ch02_049-118.indd 65
1/19/10 3:41:43 PM
Rev. Confirming Pages
panel 2.8 Home page This is a website’s first page, or welcome page.
A URL consists of (1) the web protocol, (2) the domain name or web server name, (3) the directory (or folder) on that server, and (4) the file within that directory (perhaps with an extension such as html or htm). Consider the following example of a URL for a website offered by the National Park Service for Yosemite National Park: Directory File name, (document) Domain name or name and Protocol (web server name) folder extension
http://www.nps.gov/yose/home.htm
Chapter 2
Let’s look at these elements.
66
wiL16775_ch02_049-118.indd 66
•
The protocol: http:// As mentioned, a protocol is a set of communication rules for exchanging information. The web protocol, HTTP, was developed by Tim Berners-Lee, and it appears at the beginning of some web addresses (as in http://www.mcgraw-hill.com). It stands for HyperText Transfer Protocol (HTTP), the communications rules that allow browsers to connect with web servers. (Note: Most browsers assume that all web addresses begin with http://, and so you don’t need to type this part; just start with whatever follows, such as www.)
•
The domain name (web server name): www.nps.gov/A domain is simply a location on the internet, the particular web server. Domain names tell the location and the type of address. Domain-name components are separated by periods (called “dots”). The last part of the domain, called the top-level domain, is a three-letter extension that describes the domain type: .gov, .com, .net, .edu, .org, .mil, .int—government, commercial, network, educational, nonprofit, military, or international organization. In our example, the www stands for “World Wide Web,” of course; the .nps stands for “National Park Service,” and .gov is the top-level domain name indicating that this is a government website.
1/8/10 4:03:34 PM
Rev. Confirming Pages
The meanings of other internet top-level domain abbreviations appear in the box on the next page. (• See Panel 2.9.) Some top-level domain names also include a two-letter code extension for the country—for example, .us for United States, .ca for Canada, .mx for Mexico, .uk for United Kingdom, .jp for Japan, .in for India, .cn for China. These country codes are optional.
•
The directory name: yose/ The directory name is the name on the server for the directory, or folder, from which your browser needs to pull the file. Here it is yose for “Yosemite.” For Yellowstone National Park, it is yell.
•
The file name and extension: home.htm The file is the particular page or document that you are seeking. Here it is home.htm, because you have gone to the home page, or welcome page, for Yosemite National Park. The .htm is an extension to the file name, and this extension informs the browser that the file is an HTML file. Let us consider what HTML means.
URLs & EMAIL ADDRESSES: NOT THE SAME A URL, you may have observed, is not the same thing as an email address. The website for the White House (which includes presidential information, history, a tour, and a guide to federal services) is www.whitehouse.gov. Some people might type president@ whitehouse.gov and expect to get a website, but that won’t happen. We explain email addresses in another few pages.
Domain Name
Authorized Users
Example
panel 2.9
.aero .biz .com
air-transport industry businesses originally commercial; now anyone can use cooperative associations postsecondary accredited educational and research institutions U.S. government agencies and bureaus generic information service providers organizations established by international treaties between governments human resources managers U.S. military organizations providers of mobile products and services museums individuals generic networking organizations generic organizations, often nonprofit and professional (noncommercial) Universal Postal Union* credentialed professionals & related entities For businesses and individuals to publish their contact data travel industry adults-only website
[emailprotected] [emailprotected] [emailprotected]
Internet top-level domain abbreviations and users
.gov .info .int
.jobs .mil .mobi .museum .name .net .org
.post .pro tel. .travel .xxx
[emailprotected] [emailprotected]
[emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected]
[emailprotected] [emailprotected] [emailprotected] [emailprotected] [emailprotected]
Note: The number of domain names is expanding; for a list of current domain names, go to www. iana.org/gtld/gtld.htm. *Some groups pay $45,000 or more to ICANN for a particular domain name.
wiL16775_ch02_049-118.indd 67
The Internet & the World Wide Web
.coop .edu
67
1/8/10 4:03:35 PM
Rev. Confirming Pages
Marc Andreessen is best known as a cofounder of Netscape Communications Corporation and coauthor of Mosaic, an early web browser. Andreessen received his bachelor’s degree in computer science from the University of Illinois, Urbana-Champaign. As an undergraduate, he interned one summer at IBM in Austin, Texas. He also worked at the university’s National Center for Supercomputing Applications, where he became familiar with ViolaWWW, created by PeiYuan Wei, which was based on Tim Berners-Lee’s open standards for the World Wide Web. These early browsers had been created to work only on expensive Unix workstations, so Andreessen created an improved and more userfriendly version with integrated graphics that would work on personal computers. The resulting code was the Mosaic web browser. Soon after this development, Mosaic Communications Corporation was in business in Mountain View, California, with Andreessen as vice president. Mosaic Communications changed its name to Netscape Communications, and its flagship web browser became Netscape Navigator, which is available now only in archived versions (not technically supported).
The Nuts & Bolts of the Web: HTML & Hyperlinks What are HTML and hyperlinks? The basic communications protocol that makes the internet work, as we described, is TCP/IP. The communications protocol used to access that part of the internet called the World Wide Web, we pointed out, is called HyperText Transfer Protocol (HTTP). A hypertext document uses hypertext markup language (HTML), which uses hypertext links, to connect with other documents. The foundations of the World Wide Web, then, are HTML and hypertext links. HYPERTEXT MARKUP LANGUAGE (HTML) Hypertext markup language (HTML) is the set of special instructions (called “tags” or “markups”) that are used to specify document structure, formatting, and links to other multimedia documents on the web. Extensible hypertext markup language (XHTML) is the successor to and the current version of HTML. The need for a stricter version of HTML was perceived primarily because World Wide Web content now needs to be delivered to many devices (such as mobile phones) that have fewer resources than traditional computers have. HYPERTEXT LINKS Hypertext links—also called hyperlinks, hotlinks, or just links—are connections to other documents or web pages that contain related information; a word or phrase in one document becomes a connection to a document in a different place. Hyperlinks appear as underlined or colored words and phrases. On a home page, for instance, the hyperlinks serve to connect the main page with other pages throughout the website. Other hyperlinks will connect to pages on other websites, whether located on a computer next door or one on the other side of the world. An example of an HTML document with hyperlinks is shown below. (• See Panel 2.10.)
Chapter 2
panel 2.10
68
An HTML document and hyperlinks Using the mouse to click on the hyperlinked (underlined) text connects you to another location in the same website or at a different site.
wiL16775_ch02_049-118.indd 68
1/8/10 4:03:36 PM
Rev. Confirming Pages
Using Your Browser to Get around the Web
more
What do I need to know to operate my browser?
info!
You can find almost anything you want on the more than 28.1 billion indexed web pages available around the world.16 In one month alone, one writer reported, he went on the web “to find, among other things, hotel reservations in California, a rose that will grow in the shade, information about volunteer fire departments, a used copy of an obscure novel, two ZIP codes, the complete text of A Midsummer Night’s Dream, and the news that someone I went to high school with took early retirement. I also heard, out of the blue, from two people I haven’t seen in years.”17 Among the droplets of what amounts to a Niagara Falls of information: Weather maps and forecasts. Guitar chords. Recipe archives. Sports schedules. Daily newspapers in all languages. Nielsen television ratings. The Alcoholism Research Data Base. U.S. government phone numbers. The Central Intelligence Agency world map. The daily White House press releases. And on and on. But it takes a browser and various kinds of search tools to find and make any kind of sense of this enormous amount of data.
Do You Need to Know HTML to Build a Website?
FIVE BASIC ELEMENTS OF THE BROWSER If you buy a new computer, it will come with a browser already installed. Most browsers have a similar look and feel and similar navigational tools. Note that the web browser screen has five basic elements: menu bar, toolbar, URL bar, workspace, and status bar. To execute menu-bar and toolbar commands, you use the mouse to move the pointer over the word, known as a menu selection, and click the left button of the mouse. This will result in a pull-down menu of other commands for other options. (• See Panel 2.11.) After you’ve been using a mouse for a while, you may find moving the pointer around somewhat time consuming. As a shortcut, if you click on the right mouse button, you can reach many of the commands on the toolbar (Back, Forward, and so on) via a pop-up menu.
Most general web users do not need to know HTML. If you want to convert a wordprocessed document to HTML so that someone can post it on a website, applications such as Microsoft Word will convert it for you (for example, using the options Save as, Web page). Also, many website builders offer their services on the web; you can hire them to build a website for you. Many ISPs supply help with building websites and offer website storage on their servers to their subscribers. If you want to learn more about HTML formatting, try these websites: www.htmlcodetutorial.com/ www.make-a-web-site.com/ www.w3schools.com/html/ default.asp
panel 2.11 Common tools and functions of a browser
The Internet & the World Wide Web
STARTING OUT FROM HOME: THE HOME PAGE The first page you see when you start up your browser is the home page or start page. (You can also start up from just a blank page, if you don’t want to wait for the time it takes to connect with a home page.) You can choose any page on the web as your start page, but a good start page offers links to sites you want to visit frequently. Often you may find that the internet access provider with which you arrange your internet connection will provide its own start page. However, you’ll no doubt be able to customize it to make it your own personal home page.
69
wiL16775_ch02_049-118.indd 69
1/19/10 3:41:49 PM
Rev. Confirming Pages
PERSONALIZING YOUR HOME PAGE Want to see the weather forecast for your college and/or hometown areas when you first log on? Or the day’s news (general, sports, financial, health, and so on)? Or the websites you visit most frequently? Or a reminder page (as for deadlines or people’s birthdays)? You can probably personalize your home page following the directions provided with the first start page you encounter. A customized start page is also provided by Yahoo!, Google, and similar services. GETTING AROUND: BACK, FORWARD, HOME, & SEARCH FEATURES Driving in a foreign city (or even Boston or San Francisco) can be an interesting experience in which street names change, turns lead into unknown neighborhoods, and signs aren’t always evident, so that soon you have no idea where you are. That’s what the internet is like, although on a far more massive scale. Fortunately, unlike being lost in Rome, here your browser toolbar provides navigational aids. (• See Panel 2.12.) Back takes you back to the previous page. Forward lets you look again at a page you returned from. If you really get lost, you can start over by clicking on Home, which returns you to your home page. Search lists various other search tools, as we will describe. Other navigational aids are history lists and favorites or bookmarks.
panel 2.12 More information on common browser functions
Menu bar Back: Moves you to a previous page or site Forward: Lets you visit a page you have just returned from Stop: Halts any ongoing transfer of page information Refresh: If page become stalled or garbled while loading, this will retrieve it again Home: Returns you to your personal start page Favorites/Bookmarks: Lists of sites you have saved so you can remember them and go to them quickly History: Names and descriptions of sites most recently visited Print: Prints the web page you are on
panel 2.13
Chapter 2
History list If you want to return to a previously viewed site in Internet Explorer or Firefox, click on History.
70
wiL16775_ch02_049-118.indd 70
1/8/10 4:03:40 PM
Rev. Confirming Pages
panel 2.14
FAVORITES OR BOOKMARKS One great helper for finding your way is the Favorites or Bookmarks feature, which lets you store the URLs of web pages you frequently visit so that you don’t have to remember and retype your favorite addresses. (• See Panel 2.14.) Say you’re visiting a site that you really like and that you know you’d like to come back to. You click on Favorites (in Internet Explorer) or Bookmarks (in Firefox), which displays the URL on your screen, and then click on Add or Bookmark This Page, which automatically stores the address. Later you can locate the site name on your Favorites menu and click on it, and the site will reappear. (When you want to delete it, you can use the right mouse button and select the Delete command.) INTERACTIVITY: HYPERLINKS, RADIO BUTTONS, & SEARCH BOXES For any given web page that you happen to find yourself on, there may be one of three possible ways to interact with it—or sometimes even all three on the same page. (• See Panel 2.15.) 1. By using your mouse to click on the hyperlinks, which will transfer you to another web page (p. 68). 2. By using your mouse to click on a radio button and then clicking on a Submit command or pressing the Enter key. Radio buttons are little circles located in front of various options; selecting an option with the mouse places a dot in the corresponding circle. 3. By typing text in a search box, a fill-in text box, and then hitting the Enter key or clicking on a Go or Continue command, which will transfer you to another web page. SCROLLING & FRAMES To the bottom and side of your screen display you will note scroll arrows, small up/down and left/ right arrows. Clicking on scroll arrows with your mouse pointer moves the screen so that you can see the rest of
wiL16775_ch02_049-118.indd 71
panel 2.15 Radio buttons and text box
Radio buttons Act like station selector buttons on a car radio
Search (text) boxes Require you to type in information
The Internet & the World Wide Web
HISTORY LISTS If you are browsing through many web pages, it can be difficult to keep track of the locations of the pages you’ve already visited. The history list allows you to quickly return to the pages you have recently visited. (• See Panel 2.13.)
Favorites If you are at a website you may want to visit again, click on Favorites (in Internet Explorer) or Bookmark (in Firefox) and choose Add to Favorites or Bookmark This Page. Later, to revisit the site, go to the Favorites menu, and the site’s URL will reappear.
71
1/8/10 4:03:41 PM
Rev. Confirming Pages
the web page, a movement known as scrolling. You can also use the arrow keys on your keyboard for scrolling. Some web pages are divided into different rectangles known as frames, each with its own scroll arrows. A frame is an independently controllable section of a web page. A web page designer can divide a page into separate frames, each with different features or options. LOOKING AT TWO PAGES SIMULTANEOUSLY If you want to look at more than one web page at the same time, you can position them side by side on your display screen. Select New from your File menu to open more than one browser window.
Web Portals: Starting Points for Finding Information How can I benefit from understanding how portals work? Using a browser is sort of like exploring an enormous cave with flashlight and string. You point your flashlight at something, go there, and at that location you can see another cave chamber to go to; meanwhile, you’re unrolling the ball of string behind you so that you can find your way back. But what if you want to visit only the most spectacular rock formations in the cave and skip the rest? For that you need a guidebook. There are many such “guidebooks” for finding information on the web, sort of internet superstations known as web portals. TYPES OF WEB PORTALS A web portal, or simply portal, is a type of gateway website that functions as an “anchor site” and offers a broad array of resources and services, online shopping malls, email support, community forums, current news and weather, stock quotes, travel information, and links to other popular subject categories. In addition, there are wireless portals, designed for web-enabled portable devices. An example is Yahoo! Mobile, which offers Yahoo! oneSearch, Yahoo! Maps, Yahoo! Entertainment, and so on. Yahoo! Mobile users can access not only email, calendar, news, and stock quotes but also Yahoo!’s directory of wireless sites, movies, and auctions. Portals may be general public portals (horizontal portals or megaportals), such as Yahoo!, Google, Bing (formerly MSN), Lycos, and AOL. (• See Panel 2.16.) There are also specialized portals—called vertical portals, or vortals, which focus on specific narrow audiences or communities—such as iVillage.com for women, Fool.com for investors, Burpee.com for gardeners, and Searchnet working.techtarget.com for network administrators.
Chapter 2
LOGGING ON TO A PORTAL When you log on to a portal, you can do three things: (1) check the home page for general information; (2) use the subject guide to find a topic you want; and (3) use a keyword to search for a topic. (• See Panel 2.17.)
72
wiL16775_ch02_049-118.indd 72
•
Check the home page for general information: You can treat a portal’s home or start page as you would a newspaper—for example, to get news headings, weather forecasts, sports scores, and stock-market prices.
•
Use the subject guide to find a topic: Before they acquired their other features, many of these portals began as a type of search tool known as a subject guide, providing lists of several categories of websites classified by topic, such as (with Yahoo!) “Business” or “Entertainment.” Such a category is also called a hypertext index, and its purpose is to allow you to access information in specific categories by clicking on a hypertext link.
•
Use search box and keywords to search for a topic: At the top of each portal’s home page is a search box, a blank space into which you can type a keyword, the subject word or words of the topic you wish to find.
1/8/10 4:03:42 PM
Rev. Confirming Pages
panel 2.16 Portals: Lycos and Bing
panel 2.17
If you want a biography on Apple Computer founder Steve Jobs, then Steve Jobs is the keyword. This way you don’t have to plow through menu after menu of subject categories. The results of your keyword search will be displayed in a summary of documents containing the keyword you typed.
The Internet & the World Wide Web
Yahoo! home page You can read headlines for news and weather, use the directory to find a topic, or use keywords in the Search text box to research specific topics.
Some popular portal sites are listed on the next page. (• See Panel 2.18.)
73
wiL16775_ch02_049-118.indd 73
1/8/10 4:03:42 PM
Rev. Confirming Pages
panel 2.18 Popular portal sites
Portal Name
Site
AOL Bing Google Lycos MSN (part of Bing) Yahoo!
www.aol.com www.Bing.com www.google.com www.lycos.com www.msn.com www.yahoo.com
Search Services & Search Engines, & How They Work How do search services build search engines, and what are the implications for me when I make a search?
S u rv i v al Ti p Urban Legends & Lies on the Internet To check the veracity of material on the internet, go to www.snopes.com, which lists, according to category, information circulated on the internet that isn’t true. Each category includes a key to color-coded bullets that precede each entry; the color lets you know how much truth there is to each item: green ⫽ true red ⫽ false yellow ⫽ undetermined white ⫽ unclassifiable
Search services are organizations that maintain databases accessible through websites to help you find information on the internet. Examples are not only parts of portals such as Yahoo! and Bing/MSN but also Google, Ask.com, and Gigablast, to name just a few. Search services also maintain search engines, programs that enable you to ask questions or use keywords to help locate information on the web. Search services compile their databases by using special programs called spiders—also known as crawlers, bots (for “robots”), or agents—that crawl through the World Wide Web, following links from one web page to another and indexing the words on that site. This method of gathering information has two important implications: A SEARCH NEVER COVERS THE ENTIRE WEB Whenever you are doing a search with a search engine, you are never searching the entire web. As one writer points out, “You are actually searching a portion of the web, captured in a fixed index created at an earlier date.”18 (An exception: Some news databases, such as Yahoo! News or Google Breaking News, offer up-to-the-minute reports on a number of subjects.) In addition, you should realize that there are a lot of databases whose material is not publicly available. Finally, a lot of published material from the 1970s and earlier has never been scanned into databases and made available. SEARCH ENGINES DIFFER IN WHAT THEY COVER Search engines list their results according to some kind of relevance ranking, and different search engines use different ranking schemes. Some search engines, for instance, rank web pages according to popularity (frequency of visits by people looking for a particular keyword), but others don’t.
Four Web Search Tools: Individual Search Engines, Subject Directories, Metasearch Engines, & Specialized Search Engines What are the differences between the four different web search tools?
Chapter 2
There are many types of search tools, but the most popular versions can be categorized as (1) individual search engines, (2) subject directories, (3) metasearch engines, and (4) specialized search engines. The most popular search sites, measured in share of visitors, are Google, Yahoo!, Bing, and Ask.19
74
wiL16775_ch02_049-118.indd 74
INDIVIDUAL SEARCH ENGINES An individual search engine compiles its own searchable database on the web. You search for information by typing one or more keywords, and the search engine then displays a list of web pages, or “hits,” that contain those keywords, ordered from most likely to least likely to contain the information you want. Hits are defined as the sites that a search engine returns after running a keyword search.
1/8/10 4:03:46 PM
Rev. Confirming Pages
Search Tool
Site
AllTheWeb Answers.com Ask Bing Gigablast Lycos Yahoo!
www.alltheweb.com www.answers.com www.ask.com www.bing.com www.gigablast.com www.lycos.com www.yahoo.com
Search Tool
Site
Beaucoup! Galaxy Google Directory Open Directory Project Yahoo! Directory
www.beaucoup.com www.galaxy.com/directory http://directory.google.com www.dmoz.org http://dir.yahoo.com
panel 2.19 Individual search engines
panel 2.20 Subject directories
Examples of this kind of search engine are Ask, Bing, Google, and Yahoo!, as well as AllTheWeb, Gigablast, and Lycos.20 (• See Panel 2.19.) The search engine Ask allows users to ask questions in a natural way, such as “What is the population of the United States?” Answers.com is a site-and-software combination providing instant “one-click” reference answers rather than lists of search engine links.
METASEARCH ENGINES A metasearch engine allows you to search several search engines simultaneously. Metasearch engines are very fast and can give you a good picture of what’s available across the web and where it can be found. Examples are Clusty, Dogpile, Mamma, MetaCrawler, and Webcrawler. (• See Panel 2.21.) Clusty organizes search results into groups or clusters. Thus, for example, if you do a search on the word “Indians,” the top results will be grouped into clusters such as Tribe, Native Americans, Baseball, and
Search Tool
Site
Clusty Dogpile Grokker ixquick Kartoo Mamma MetaCrawler Webcrawler Widow Zuula
http://clusty.com www.dogpile.com www.grokker.com www.ixquick.com www.kartoo.com www.mamma.com www.metacrawler.com www.webcrawler.com www.widow.com www.zuula.com
wiL16775_ch02_049-118.indd 75
panel 2.21 Metasearch engines
The Internet & the World Wide Web
SUBJECT DIRECTORIES Unlike a search engine, a subject directory is created and maintained by human editors, not electronic spiders, and allows you to search for information by selecting lists of categories or topics, such as “Health and Fitness” or “Science and Technology.” Directories tend to be smaller than search engine databases, usually indexing only the top-level pages of a website. Subject directories are best for browsing and for searches of a more general nature.21 Examples of subject directories are Beaucoup!, Galaxy, Google Directory, LookSmart, Open Directory Project, and Yahoo! Directory. (• See Panel 2.20.)
75
1/8/10 4:03:46 PM
Rev. Confirming Pages
panel 2.22 Specialized search engines
Search Tool
Site
Career.com (jobs) Expedia (travel) Internet Movie Database (movies) Monster Board (jobs) Motley Fool (personal investments) U.S. Census Bureau (statistics) WebMD (health)
www.career.com www.expedia.com www.imdb.com www.monster.com www.fool.com www.census.gov www.webmd.com
Indian Students. Grokker displays categories in a circular map instead of ranked lists. Searching on the word “Indians” with Grokker produces the categories of Mumbai Indians, American Indians, Cleveland Indians, and Indian Subcontinent, plus General, More, and other clusters. SPECIALIZED SEARCH ENGINES There are also specialized search engines, which help locate specialized subject matter, such as material about movies, health, and jobs. These overlap with the specialized portals, or vortals, we discussed above. (• See Panel 2.22.)
Smart Searching: Three General Strategies How do I find what I want on the web?
Search results for “worm” in Grokker map view; click on any category circle to explore its contents.
The phrase “trying to find a needle in a haystack” will come vividly to mind the first time you type a word into a search engine and back comes a response on the order of “63,173 listings found.” Clearly, it becomes mandatory that you have a strategy for narrowing your search. The following are some tips.
IF YOU’RE JUST BROWSING—TWO STEPS If you’re just trying to figure out what’s available in your subject area, do as follows: more
info!
•
Try a subject directory: First try using a subject directory, such as Yahoo! Directory or Open Directory Project.
Generalized List of Search Engines
•
Try a metasearch engine: Next enter your search keywords into a metasearch engine, such as Dogpile or Mamma—just to see what else is out there.
http://searchenginewatch. com/2156241
Example: You could type “search engine tutorial into Yahoo!, then Dogpile.”
Chapter 2
IF YOU’RE LOOKING FOR SPECIFIC INFORMATION If you’re looking for specific information, you can try Answers.com “one-click” search (www.answers.com). Or you can go to a major search engine such as Google or Yahoo! and then go to a specialized search engine. Example: You could type “Life expectancy in U.S.” first into Google and then into the Centers for Disease Control and Prevention’s search engine (www.cdc. gov).
76
wiL16775_ch02_049-118.indd 76
IF YOU’RE LOOKING FOR EVERYTHING YOU CAN FIND ON A SUBJECT If you want to gather up everything you can find on a certain subject, try the same search on several search engines. Example: You could type pogonip (a type of dense winter fog) into more than one search tool. (Of course, you will probably get some irrelevant responses, so it helps to know how to narrow your search, as explained in the box opposite.)
1/8/10 4:03:46 PM
Rev. Confirming Pages
PRACTICAL ACTION Evaluating & Sourcing Information Found on the Web Guidelines for Evaluating Web Resources Anyone (including you) can publish anything on the World Wide Web—and all kinds of people do. Here are some ways to assess credibility of the information you find there:25 •
On what kind of website does the information appear? Websites may be professional sites, maintained by recognized organizations and institutions. They may be news and journalistic sites, which may be anything from The New York Times to e-zines (electronic magazines, or small web-based publications) such as Network Audio Bits. They may be commercial sites, sponsored by companies ranging from the Disney Company to The Happy House Painter. They may be special-interest sites, maintained by activists ranging from those of the major political parties to proponents of legalization of marijuana. They may be blogs or personal home pages, maintained by individuals of all sorts, from professors to children to struggling musicians.
•
Does the website author appear to be a legitimate authority? What kind of qualifications and credentials does the author have, and what kind of organization is he or she associated with? Does a web search show that the author published in other scholarly and professional publications?
•
Is the website objective, complete, and current? Is the website trying to sell you on a product, service, or point of view? Is the language balanced and objective, or is it one-sided and argumentative? Does the author cite sources, and do they seem to come from responsible publications?
A variant on these guidelines has been framed by Butler University librarian Brad Matthies as CRITIC. (• See Panel 2.23, next page).
Multimedia Search Tools: Image, Audio, & Video Searching What kind of nontext search engines are available? Most web searches involve text, but there are many nontext kinds of resources as well, including videos and still images. (• See Panel 2.24, next page.) STILL IMAGES Interested in an image of Dilbert? You could go to Yahoo! Search—Image Search (images.search.yahoo.com), Google Image Search
wiL16775_ch02_049-118.indd 77
The Internet & the World Wide Web
W
ant to know what a term means? You could try the immensely popular Wikipedia (http:// en.wikipedia.org), a free online encyclopedia that anyone around the world can contribute to or edit. It has more than 200 million articles in more than 200 languages. A wiki, which founding programmer Ward Cunningham got from the Hawaiian term for “quick” (“wiki wiki”) when he created the WikiWiki Web in 1995, is a simple piece of software that can be downloaded for free and used to make a website that can be edited by anyone you like (or don’t like). Thus, for example, corporations such as Kodak use business wikis for cross-company collaboration, such as a Word document memo that is worked on by several coworkers simultaneously. That use of wikis is valuable. But the Wikipedia is not considered reliable or authoritative by academics and librarians. As Larry Sanger, Wikipedia’s former editor in chief, who now lectures at Ohio State University, says: “The wide-open nature of the internet encourages people to disregard the importance of expertise.” As a result, Sanger does not allow his students to use Wikipedia for their papers.22 “You can expect to find everything on the web,” points out one library director, “silly sites, hoaxes, frivolous and serious personal pages, commercials, reviews, articles, fulltext documents, academic courses, scholarly papers, reference sources, and scientific reports.”23 It is “easy to post information on the internet, usually with no editorial oversight whatsoever, and that means it is often of questionable quality,” adds a Columbia University instructor. “Few students are able to separate the good research from the bad, which is less of a problem with printed texts.”24 An alternative to Wikipedia has recently been launched by Google: Knol. This is a “monetizable” creation, whereby authors are held accountable for the articles they write (and their names appear). The authors can share in revenue from ads on their page. If you’re relying on web sources for research for a term paper, how do you determine what’s useful and what’s not?
77
1/8/10 4:03:47 PM
Rev. Confirming Pages
panel 2.23 CRITIC These guidelines will help you think critically about the reliability of online information.
• C—Claim: Is the source’s claim clear and reasonable, timely and relevant? Or is there evidence of motivationally based language? • R—Role of the claimant: Is the author of the information clearly identifiable? Are there reasons to suspect political, religious, philosophical, cultural, or financial biases? • I—Information backing the claim: Is evidence for the claim presented? Can it be verified, or is the evidence anecdotal or based on testimony? Does the author cite credible references? • T—Testing: Can you test the claim, as by conducting your own quantitative research? • I—Independent verification: Have reputable experts evaluated and verified the claim? • C—Conclusion: After taking the preceding five steps, can you reach a conclusion about the claim? Source: Adapted from Brad Matthies, “The Psychologist, the Philosopher, and the Librarian: The Information-Literacy Version of CRITIC,” Skeptical Inquirer, May/June 2005, pp. 49–52.
panel 2.24 Some multimedia search engines
Search Tool
Site
altavista A9 (Amazon.com) Blinkx Digital Library System Find Sounds Google Video Internet Archive for Audio Internet Archive for Moving Images Picsearch Pixsta The University of Delaware Library
www.altavista.com/image/default http://a9.com www.blinkx.com www.fws.gov/dls www.findsounds.com/types.html http://video.google.com www.archive.org/details/audio www.archive.org/details/movies www.picsearch.com www.pixsta.com www2.lib.udel.edu/subj/film/resguide/ streamingweb.htm http://video.search.yahoo.com
Yahoo! Video
more
info!
Chapter 2
Citing Web Sources in College Papers The four principal kinds of styles for citing sources— books, articles, and so on—are (1) the Modern Language Association style (for humanities), (2) the American Psychological Association style (for social science subjects), (3) the University of Chicago Press style, and (4) the Turabian style. To learn the format of these styles— including those for internet sources—go to: http://library.wustl.edu/ research/citesource.html www.lib.berkeley.edu/Teaching Lib/Guides/Internet/Style. html
78
wiL16775_ch02_049-118.indd 78
(http://images.google.com), or Bing Images (www.bing.com/images), where you’ll be offered several thousand choices of Dilbert still images. Other good image search engines are Exalead and Picsearch. AUDIO & VIDEO Other multimedia search engines offer audio as well as image and video searching. If you go to CampaignSearch.com, for instance, and type in keywords of your choosing, the search engine StreamSage will search audio and video broadcasts by analyzing speech. ShadowTV can provide continuous access to live and archived television content via the web. Yahoo! allows users to search for closed captioning associated with a broadcast and then to click for full-motion video of the words being spoken. Among the audio search engines available are Yahoo! Audio Search, AltaVista Audio Search, BlogDigger, SingingFish, FindSounds, ez2Find, and Blinkx. Among video search engines you can select from are All TheWeb, SingingFish, the Open Video Project, AltaVista Video, Yahoo! Video Search, Google Video Search, and Blinkx Video Search. MULTIPLE SOURCES, INCLUDING MUSIC A9 culls information from multiple sources, including the web, images from Google, inside-the-book text from Amazon.com, movies (Internet Movie Database), and reference materials from Answers.com. Rocket Mobile has a music search program for cellphones called Song ID. “You can hold your cellphone up to a music source for 10 seconds,” says one account, “and it will identify the singer, the song, and the album.”26
1/19/10 3:42:00 PM
Rev. Confirming Pages
PRACTICAL ACTION Serious Web Search Techniques
•
Choose your search terms well, and watch your spelling: Use the most precise words possible. If you’re looking for information about novelist Thomas Wolfe (author of Look Homeward Angel, published 1929) rather than novelist/journalist Tom Wolfe (author of I Am Charlotte Simmons, 2005), details are important: Thomas, not Tom; Wolfe, not Wolf. Use poodle rather than dog, Maui rather than Hawaii, Martin guitar rather than guitar, or you’ll get thousands of responses that have little or nothing to do with what you’re looking for. You may need to use alternate words and spellings to explore the topic you’re investigating: e-mail, email, electronic mail.
•
Type words in lowercase: Typing words in lowercase will help you find both lowercase and capitalized variations.
•
Use phrases with quotation marks rather than separate words: If you type ski resort, you could get results of (1) everything to do with skis, on the one hand, and (2) everything to do with resorts—winter, summer, mountain, seaside—on the other. Better to put your phrase in quotation marks—“ski resort”—to narrow your search.
•
•
Put unique words first in a phrase: Better to have “Tom Wolfe novels” rather than “Novels Tom Wolfe.” Or if you’re looking for the Hoagy Carmichael song rather than the southern state, indicate “Georgia on My Mind.” Use Boolean operators—AND, OR, and NOT: Most search sites use symbols called Boolean operators to make searching more precise. To illustrate how they are used, suppose you’re looking for the song “Strawberry Fields Forever.”31 AND connects two or more search words and means that all of them must appear in the search results. Example: Strawberry AND Fields AND Forever. OR connects two or more search words and indicates that any of the two may appear in the results.
•
Example: Strawberry Fields OR Strawberry fields. NOT, when inserted before a word, excludes that word from the results. Example: Strawberry Fields NOT Sally NOT W.C. (to distinguish from the actress Sally Field and long-ago comedian W.C. Fields). Use inclusion and exclusion operators—plus (ⴙ) and minus (ⴚ): With many search engines you can use the inclusion operator, the plus sign, and the exclusion operator, the minus sign, to take the place of AND and NOT. The plus sign (⫹), like AND, precedes a word that must appear. Example: ⫹ Strawberry ⫹ Fields. The minus sign (⫺), like NOT, excludes the word that follows it. Example: Strawberry Fields–Sally.
•
Use wildcards—asterisks (*) and question marks (?): If you want as many results as possible on a keyword, use an asterisk (*) or question mark (?) to mean “anything/ everything.” Example: Type dance* and you will get hits for dance, dances, dancers, dancing, dancewear, and so on. If you can’t remember how to spell something, use the question mark (?). Example: If you type Solzhe?, you will get page matches for the Russian author Solzhenitsyn.
•
•
Read the Help or Search Tips section: All search sites provide a Help section and tips. This could save you time later. Try an alternate general search site or a specific search site: As we indicated in the text, if you’re looking for very specific information, a general type of search site such as Yahoo! may not be the best way to go. Instead, you should turn to a specific search site. Examples: To explore public companies, try Hoover’s Online (www.hoovers.com). For news stories, try Yahoo News (http://dailynews.yahoo.com) or CNN (www.cnn. com). For pay-per-view information from all sorts of articles, journals, and reports, try LexisNexis (www. lexisnexis.com) and Factiva (Dow Jones and Reuters at www.factiva.com).
SCHOLARLY Google offers Google Scholar (www.scholar.google.com), described as “a one-stop shop of scholarly abstracts, books, peer-reviewed papers, and technical papers intended for academics and scientists.”27 Google has also launched an ambitious project in which it is scanning page by page more than 50 million books (at a cost of about $10 for each book scanned) from several libraries—those at Harvard, Stanford, Oxford, and the University of Michigan, plus the New York Public Library. “This is one of the
wiL16775_ch02_049-118.indd 79
The Internet & the World Wide Web
Y
ou type “Bill Gates” into Google and get around 38,800,000 hits; in Yahoo!, 70,600,000. How useful is that? Following are some tricks of the trade.
79
1/8/10 4:03:51 PM
Rev. Confirming Pages
more
info! Collaborative Categorization Some “social bookmarking” or photo-sharing web services with tagging features: BlinkList www.blinklist.com del.icio.us http://del.icio.us furl www.furl.net/index.jsp Flickr www.flickr.com 43 Things www.43things.com
most transformative events in the history of information distribution since Gutenberg,” says New York Public Library CEO Paul LeClerc.28 The Google Print Library Project, as it is called, is currently being studied by the U.S. Justice Department to see if massive book scanning violates antitrust laws, since authors, campus researchers, and library groups have expressed serious concerns over the move.29
Desktop Search: Tools for Searching Your Computer’s Hard Disk How can I find things on my hard disk? These days an inexpensive desktop computer, points out BusinessWeek technology writer Stephen Wildstrom, comes with enough hard-drive storage capacity to store the text of 13,000 copies of the long novel War and Peace. “All that space,” he observes, “means that anything you save, from Grandma’s email messages to a web page for a quaint bed-and-breakfast, is likely to stay there forever. Good luck trying to find it.”30 The solution: a desktop search engine, a tool that extends searching beyond the web to the contents of your personal computer’s hard disk. Desktop search allows users to quickly and easily find words and concepts stored on the harddisk drive, using technology similar to that in web search engines. Desktop tools must be downloaded from the internet, often as part of a toolbar (a bar across the top of the display window on your computer screen, offering frequently executed options or commands). The tools remain in the background on your computer screen until you want to use them. Separate searches are usually required for the web and for the desktop. AltaVista premiered a version called Discovery in 1998, but the technology failed to catch on. Now all the principal search engine services offer it. (• See Panel 2.25.)
Tagging: Saving Links for Easier Retrieval Later How do I use tags to categorize things I’ve found on the web? Once you’ve found favorite websites, how do you keep them found so that you can get back to them easily? You can always use the bookmarking or favorites feature, but there is also another way called tagging. Tags are do-it-yourself labels that people can put on anything found on the internet, from articles to photos to videos. Using so-called social-bookmarking websites such as del.icio.us or BlinkList or photo-sharing services such as Flickr, users can tag anything for easy retrieval later. Unlike bookmarks or favorites, these tags can be shared easily with other people, which allows people to share similar interests and ideas.
Search Tool
Site
Some desktop search tools
Archivarius
www.likasoft.com/document-search
Ask.com Desktop Search
http://sp.ask.com/docs/desktop/ overview.shtml
Blinkx Pico
www2.blinkx.com/pico
Copernic Desktop Search
www.copernic.com/
Everything
www.snapfiles.com
Professional Google Desktop Search
http://desktop.google.com
Yahoo! Desktop Search
http://us.config.toolbar.yahoo.com/yds
Chapter 2
panel 2.25
80
wiL16775_ch02_049-118.indd 80
1/8/10 4:03:54 PM
Rev. Confirming Pages
2.4 EMAIL & OTHER WAYS OF COMMUNICATING OVER THE NET What are email and webmail, attachments, instant messaging, FTP, newsgroups, listservs, real-time chat, and netiquette? Once connected to the internet, most people want to immediately join the millions of users—probably 90% of them—who send and receive electronic mail, or email, the principal use of the internet. Your incoming mail is stored in your mailbox on the access provider’s computer, usually a server called a mail server. Outgoing mail is sent to a Simple Mail Transfer Protocol (SMTP) server. (• See Panel 2.26.) When you use your email software to retrieve your messages, the email is sent from the server to your computer using Post Office Protocol version 3 (POP3—not the same as “point of presence”) or Internet Message Access Protocol (IMAP), which has expanded functions compared to POP3. For example, if your access provider and email software support IMAP,
Network Access Point (NAP) Cable company
Jake’s ISP (SMTP server) Regional network Routers
Telephone company
POP3
Network Access Point (NAP)
Maria
Jake
1
2
Jake on the West Coast logs into his dial-up ISP and sends an email message to Maria on the East Coast.
3
The SMTP server breaks down the message into multiple packets that take different routes to their eventual destination. The packets are forwarded by routers and may travel over faster regional networks before eventually ending up on one of several high-speed internet backbones.
5
6 The message travels from Jake’s computer over a standard telephone line to his ISP’s local POP (point of presence). From there, the message is sent to an SMTP (Simple Mail Transport) server used to send outgoing mail.
4
The packets are eventually routed off the backbone and delivered to the proper email server at Maria’s ISP. The packets are reassembled to re-create the message.
Key to Connection types Regular phone lines DSL Cable Satellite T1, T2, T3 Lines Fiber optic cable
Maria uses her cable modem to connect to the internet. When she checks her email, she is sending a request from her PC to the CMTS (Cable-Modem Termination System), which connects her to her ISP’s network.
Maria’s ISP routes the “check email” request to its POP3 (Post Office Protocol 3) email server where messages are temporarily stored. The POP3 server sends Jake’s email message to Maria’s PC, along with other waiting messages.
panel 2.26 Sending and receiving emails
The Internet & the World Wide Web
POP
Routers
Maria’s ISP
81
wiL16775_ch02_049-118.indd 81
1/8/10 4:03:56 PM
Rev. Confirming Pages
you can search through your email messages while they are still on the access provider’s server—before you download them. Then you can choose which messages to download on your machine.
Two Ways to Send & Receive Email What’s the difference between an email program and web-based email? There are two ways to send and receive email—via email program or via webbased email.
more
info! Free Email For discussion of free email services, go to: www.emailaddresses.com
EMAIL PROGRAM An email program, also called email client software, enables you to send email by running email software on your computer, which interacts with an email server at your internet access provider to send and receive email. Your incoming mail is stored on the server in an electronic mailbox. When you access the email server, your incoming messages are sent to your software’s inbox, where they are ready to be opened and read. Examples of such programs are Microsoft’s Outlook Express, now called Windows Mail, and Apple Inc.’s Mail. The advantage of standard email programs is that you can easily integrate your email with other applications, such as calendar, task list, and contact list. WEB-BASED EMAIL With web-based email, or webmail, you send and receive messages by interacting via a browser with a website. The big four email carriers are Yahoo! Mail, Windows Live Hotmail, Gmail (Google), and AOL Mail.32 The advantage of web-based email is that you can easily send and receive messages while traveling anywhere in the world. Moreover, because all your outgoing and incoming messages and folders for storing them (explained below) are stored on the mail server, you can use any personal computer and browser to keep up with your email. Many users will rely mostly on an email program in their personal computer, but when traveling without their PCs, they will switch over to web-based email (using computers belonging to friends or available—for a fee—in airports and hotels) to check messages. Or they use portable devices such as a BlackBerry to do text messaging. (• See Panel 2.27.)
How to Use Email What are some tips for being effective with email? You’ll need an email address, of course, a sort of electronic mailbox used to send and receive messages. All such addresses follow the same approach: username@domain. These are somewhat different from web URLs, which do not use the “@” (called “at”) symbol. You can check with your internet access provider to see if a certain name is available.
Chapter 2
panel 2.27 Mobile mail Portable devices such as this BlackBerry Wireless Handheld allow you to send and receive email messages from many locations.
User name (User ID)
Domain name
[emailprotected] Domain Country (location) Top-level domain (domain type)
82
wiL16775_ch02_049-118.indd 82
1/8/10 4:03:57 PM
Rev. Confirming Pages
•
The user name: Joe_Black The user name, or user ID, identifies who is at the address—in this case, Joe_Black (note the underscore). There are many ways that Joe Black’s user name might be designated, with and without capital letters: Joe_Black, joe_black, joe.black, joeblack, jblack, joeb, and so on.
•
Domain name: @earthlink The domain name, which is located after the @ (“at”) symbol, tells the location and type of address. Domain-name components are separated by periods (called “dots”). The domain portion of the address (such as Earthlink, an internet service provider) provides specific information about the location—where the message should be delivered.
•
Top-level domain: .net The top-level domain, or domain code, is a threeletter extension that describes the domain type: .net, .com, .gov, .edu, .org, .mil, .int—network, commercial, government, educational, nonprofit, military, or international organization.
•
Country: .us Some domain names also include a two-letter extension for the country—.us for United States, .ca for Canada, .mx for Mexico.
The illustration on the next page shows how to send, receive, and reply to email. (• See Panel 2.28.) Here are some tips about using email: TYPE ADDRESSES CAREFULLY You need to type the address exactly as it appears, including capitalization and all underscores and periods. If you type an email address incorrectly (putting in spaces, for example), your message will be returned to you labeled “undeliverable.”
more
info! Country Abbreviations What do you think the country abbreviations are for Micronesia? Botswana? Saint Lucia? Go to: www.eubank-web.com/William/ Webmaster/c-codes.htm www.thrall.org/domains.htm
USE THE ADDRESS-BOOK FEATURE You can store the email addresses of people sending you messages in your program’s “address book.” This feature also allows you to organize your email addresses according to a nickname or the person’s real name so that, for instance, you can look up your friend Joe Black under his real name, instead of under his user name, bugsme2, which you might not remember. The address book also allows you to organize addresses into various groups—such as your friends, your relatives, club members—so that you can easily send all members of a group the same message with a single command. DEAL WITH EACH EMAIL ONLY ONCE When a message comes in, delete it, respond to it, or file it away in a folder. Don’t use your inbox for storage. DON’T “BLOAT” YOUR EMAIL Email messages loaded with fancy typestyles, logos, and background graphics take longer to download. Keep messages simple.
Sorting Your Email How can I keep my emails organized? On an average day, billions of business and personal emails are sent in North America. If, as many people do, you receive 50–150 emails per day, you’ll have to keep them organized so that you don’t lose control.
The Internet & the World Wide Web
USE THE REPLY COMMAND When responding to an e-message someone has sent you, the easiest way to avoid making address mistakes is to use the Reply command, which will automatically fill in the correct address in the “To” line. Be careful not to use the Reply All command unless you want your reply to be sent to all the original email’s recipients.
83
wiL16775_ch02_049-118.indd 83
1/8/10 4:04:07 PM
Rev. Confirming Pages
Sending email
Address Book: Lists email addresses you use most; can be attached automatically to messages
Send: Command for sending messages cc: For copying (“carbon/ courtesy copy”) message to others bcc: For copying others (“blind carbon copy”) without the primary recipient knowing it Message area You can conclude every message with a custom “signature”
Receiving email
Subject line: Preview incoming email by reviewing the subject lines to see if you really need to read the messages
Reply, Reply All, Forward, Delete: For helping you handle incoming email
Inbox lists messages waiting in email box. (Unopened envelope icon shows unread mail.)
Selected message displayed here
Replying to email
Chapter 2
Use the Reply command icon, and the email program automatically fills in the To, From, and Subject lines in your reply.
panel 2.28 How to send, receive, and reply with email
84
wiL16775_ch02_049-118.indd 84
1/8/10 4:04:07 PM
Rev. Confirming Pages
@
History of the @ Sign
In 1972, Ray Tomlinson sent the first electronic message using the @ symbol to indicate the location or institution of the recipient. Tomlinson knew that he had to use a symbol that would not appear in anyone’s name. Before the @ sign became a character on the keyboard, where was it used? Some linguists believe that the symbol dates back to the 6th or 7th centuries, when Latin scribes adapted the Latin word ad, meaning “at,” “to,” or “toward.” Other linguists say that @ dates to its use in the 18th century as a symbol in commerce to indicate price per unit, as in 4 CDs @ $5 [each]. In 2000, a professor of history in Italy discovered some original 14th-century documents clearly marked with the @ sign to indicate a measure of quantity, based on the word amphora, meaning “jar.” The amphora was a standard-size earthenware jar used by merchants for wine and grain. In Florence, the capital “A” was written with a flourish and later became @ (“at the price of”). Other countries have different names for this symbol. For example: South Africa—aapstet, or “monkey’s tail”
Czech Republic—zavinac, or “pickled herring” Denmark—snable-a, or “elephant’s trunk” France—petit escargot, “little snail” Greece—papaki, “little duck” Hungary—kukac, “worm”
Taiwan—xiao lao-shu, “mouse sign” Norway—grisehale, “pig’s tail” Russia—sobachka, “little dog” Turkey—kulak, “ear”
Source: www.pcwebopedia.com, January 28, 2003, and www.webopedia.com, August 2005.
One way to stay organized is by using instant organizers, also called filters, which sort mail on the basis of the name of the sender or the mailing list and put particular emails into one folder. (• See Panel 2.29.) Then you can read emails sent to this folder later when you have time, freeing up your inbox for mail that needs your more immediate attention. Instructions on how to set up such organizers are in your email program’s Help section.
Attachments You have written a great research paper and you immediately want to show it off to someone. If you were sending it via the Postal Service, you would write a cover note—“Folks, look at this great paper I wrote about globalization! See attached”—then attach it to the paper, and stick it in an envelope. Email has its own version of this. If the file of your paper exists in the computer from which you are sending email, you can write your email message (your cover note) and then use the Attach File command to attach the document. (• See Panel 2.30, next page.) (Note: It’s important that the person receiving the email attachment have exactly the same software that created the attached file, such as Microsoft Word, or have software that can read and convert the attached file.) Downloading attachments from the mail server can take a lot of time—so you may want to discourage friends from sending you many attachments. You may also want to use compression software to reduce the size of your attachments. While you could also copy your document into the main message and send it that way, some email software loses formatting options such as bold or italic text or special symbols. And if you’re sending song lyrics or poetry, the lines of text may break differently on someone else’s display screen than they do on
wiL16775_ch02_049-118.indd 85
panel 2.29 Sorting email Email folders
The Internet & the World Wide Web
What are the benefits of being able to do email attachments?
85
1/8/10 4:04:09 PM
Rev. Confirming Pages
Sending an email attachment
3 Third, use your email software’s toolbar buttons or menus to attach the file that contains the attachment.
4 Fourth, click on Send to send the email message and attachment.
1 First, address the person who will receive the attachment.
2 Second, write a “cover letter” email advising the recipient of the attachment.
Receiving an email attachment
Chapter 2
When you receive a file containing an attachment, you’ll see an icon indicating the message contains more than just text. You can click on the icon to see the attachment. If you have the software the attached file was created in, you can open the attachment immediately to read or print, or you can save the attachment in a location of your choice (on your computer). You can also forward the attachment to another person.
panel 2.30 Attach File function
86
wiL16775_ch02_049-118.indd 86
1/8/10 4:04:10 PM
Rev. Confirming Pages
yours. Thus, the benefit of the attachment feature is that it preserves all such formatting, provided the recipient is using the same word processing software that you used. You can also attach pictures, sounds, videos, and other files to your email message. Important Note: Many viruses—those rogue programs that can seriously damage your PC or programs—ride along with email as attached files. Thus, you should never open an attached file from an unknown source. (We describe viruses in Chapter 6.)
Instant Messaging What are the benefits and drawbacks of my using instant messaging?
Sur v iv a l T ip Accessing Email while Traveling Abroad To access your email using a local call while traveling outside North America, get a free email account with Yahoo! (http://mail.yahoo.com), Windows Live Hotmail (www.hotmail.com), or Mail.com (www. mail.com).
Instant messages are like a cross between email and phone, allowing communication that is far speedier than conventional email. With instant messaging (IM), any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system. (Instant messaging should not be confused with text messaging, or texting, the exchange of messages between mobile phones, as we discuss in Chapter 7. Nor should it be confused with twittering, the sending of text-based messages of up to 140 characters.) As soon as you use your computer or portable device to connect to the internet and log on to your IM account, you see a buddy list (or contacts list), a list you have created that consists of other IM users you want to communicate with. If all parties agree, they can initiate online typed conversations in real time (in a “chat room”). The messages appear on the display screen in a small window—a rectangular area containing a document or activity—so that users can exchange messages almost instantaneously while operating other programs.
THE DOWNSIDE OF IM IM has become a hit with many users. Instant messaging is especially useful in the workplace as a way of reducing long-distance telephone bills when you have to communicate with colleagues who are geographically remote but with whom you must work closely. However, you need to be aware of a few drawbacks:
•
Lack of privacy: Most IM services lack the basic privacy that most other forms of communication provide. Efforts are under way to develop IM security software and procedures, but for now IM users should be aware that they have virtually no privacy.
•
Lack of common standards: Many IM products do not communicate with one another. If you’re using AOL’s AIM, you cannot communicate with a buddy on Yahoo!.
•
Time wasters when you have to get work done: An instant message “is the equivalent of a ringing phone because it pops up on the recipient’s screen right away,” says one writer.33 Some analysts suggest that, because of its speed, intrusiveness, and ability to show who else is online, IM can destroy workers’ concentration in some offices. You can put off
wiL16775_ch02_049-118.indd 87
The Internet & the World Wide Web
GETTING INSTANT-MESSAGING CAPABILITY Examples of present instantmessage systems are AOL/AIM, MSN, Google Talk, MySpace, Facebook, and Yahoo! Messenger. To get instant messaging, which is often free, you download software and register with the service, providing it with a user name and password. When your computer or portable device is connected to the internet, the software checks in with a central server, which verifies your identity and looks to see if any of your “buddies” are also online. You can then start a conversation by sending a message to any buddy currently online.
87
1/8/10 4:04:11 PM
Rev. Confirming Pages
acknowledging email, voice mail, or faxes. But instant messaging is “the cyber-equivalent of someone walking into your office and starting up a conversation as if you had nothing better to do,” says one critic. “It violates the basic courtesy of not shoving yourself into other people’s faces.”34 You can turn off your instant messages, but that is like turning off the ringer on your phone; after a while people will wonder why you’re never available. Buddy lists or other contact lists can also become very in-groupish. When that happens, people are distracted from their work as they worry about staying current with their circle (or being shut out of one). Incidentally, a 2008 survey of 2,134 adults found that although 58% said that email, cellphones, and the internet gave them more control over when to work, 46% also said that these technologies increase the demands that they work more hours, and 49% said that the technologies made it harder to disconnect from work when they should be off.35
FTP—for Copying All the Free Files You Want What does FTP allow me to do? more
info! FTP CLients & Servers FTP software programs, called FTP clients, come with many operating systems, including Windows, DOS, Unix, and Linux. Web browsers also come with FTP clients. For lists of FTP clients and FTP servers, go to: www.answers.com/main/ ntquery? method⫹4&dsis⫹2 222&dekey⫽FTP⫹client&gwp ⫹11&curtab⫹2222 www.thefreecountry.com/web master/freeftpclients.shtml You can also set up your own FTP site, for example, by going to: www.sharefile.com
Many net users enjoy “FTPing”—cruising the system and checking into some of the tens of thousands of FTP sites, which predate the web and offer interesting free or inexpensive files to download. FTP (File Transfer Protocol) is a software standard for transferring files between computers with different operating systems. You can connect to a remote computer called an FTP site and transfer files to your own microcomputer’s hard disk via TCI/IP over the internet. Free files offered cover nearly anything that can be stored on a computer: software, games, photos, maps, art, music, books, statistics. (• See Panel 2.31.) You can also set up your own private FTP site (for example, through ShareFile.com) to enable you and other people you allow to use your site to upload and download files that are too large to send as email attachments. Some FTP files are open to the public (at anonymous FTP sites); some are not. For instance, a university might maintain an FTP site with private files (such as lecture transcripts) available only to professors and students with assigned user names and passwords. It might also have public FTP files open to anyone with an email address. You can download FTP files using either your web browser or special software (called an FTP client program), such as Fetch and Cute.
panel 2.31
Chapter 2
FTP software
88
wiL16775_ch02_049-118.indd 88
1/8/10 4:04:11 PM
Rev. Confirming Pages
panel 2.32 Newsgroup message board from the Blogger Help Group, a Google group
Newsgroups—for Online Typed Discussions on Specific Topics A newsgroup (or forum) is a giant electronic bulletin board on which users conduct written discussions about a specific subject. (• See Panel 2.32.) There are thousands of internet newsgroups—which charge no fee— and they cover an amazing array of topics. In addition, for a small fee, services such as Meganetnews.com and CoreNews.com will get you access to more than 100,000 newsgroups all over the world. Newsgroups take place on a special network of computers called Usenet, a worldwide public network of servers that can be accessed through the internet (www.usenet.com). To participate, you need a newsreader, a program included with most browsers that allows you to access a newsgroup and read or type messages. (Messages, incidentally, are known as articles.) One way to find a newsgroup of interest to you is to use a portal such as Yahoo! or Bing to search for specific topics. Or you can use Google’s Groups (http://groups.google.com/grphp?hl+en&ie⫽UTF-8), which presents the newsgroups matching the topic you specify. About a dozen major topics, identified by abbreviations ranging from alt (alternative topics) to talk (opinion and discussion), are divided into hierarchies of subtopics.
Listservs: Email-Based Discussion Groups Why would I want to sign up for a listserv? Want to receive email from people all over the world who share your interests? You can try finding a mailing list and then “subscribing”—signing up, just as you would for a free newsletter or magazine. A listserv is an automatic mailing-list server that sends email to subscribers who regularly participate in discussion topics. (• See Panel 2.33, next page.) Listserv companies include L-Soft’s Listserv (www.lsoft.com), Majordomo (www.majordomo.com), and http://listserve.com/. To subscribe, you send an email to the list-server moderator and ask to become a member, after which you will automatically receive email messages from anyone who responds to the server. Mailing lists are one-way or two-way. A one-way list either accepts or sends information, but the user interacts only with the list server and not other
wiL16775_ch02_049-118.indd 89
The Internet & the World Wide Web
What would probably be my favorite kind of newsgroup?
89
1/8/10 4:04:11 PM
Rev. Confirming Pages
panel 2.33 Listserv mailing list software
users. Most one-way mailing lists are used for announcements, newsletters, and advertising (and “spam,” discussed shortly). Two-way lists, which are limited to subscribers, let users interact with other subscribers to the mailing list; this is the discussion type of mailing list.
Real-Time Chat—Typed Discussions among Online Participants What discussion subjects might I like to participate in using RTC? With mailing lists and newsgroups, participants may contribute to a discussion, go away, and return hours or days later to catch up on others’ typed contributions. With real-time chat (RTC), participants have a typed discussion (“chat”) while online at the same time, just like a telephone conversation except that messages are typed rather than spoken. Otherwise, the format is much like a newsgroup, with a message board to which participants may send (“post”) their contributions. To start a chat, you use a service available on your browser such as IRC (Internet Relay Chat) that will connect you to a chat server. Unlike instant messaging, which tends to involve one-on-one conversation, real-time chat usually involves several participants. As a result, RTC is often like being at a party, with many people and many threads of conversation occurring at once.
Netiquette: Appropriate Online Behavior Chapter 2
What are the rules of courtesy for using email? ethics
90
wiL16775_ch02_049-118.indd 90
You may think etiquette is about knowing which fork to use at a formal dinner. Basically, though, etiquette has to do with politeness and civility—with rules for getting along so that people don’t get upset or suffer hurt feelings. New internet users, known as “newbies,” may accidentally offend other people in a discussion group or in an email simply because they are unaware of netiquette, or “network etiquette”—appropriate online behavior. In
1/8/10 4:04:12 PM
Rev. Confirming Pages
•
Consult FAQs: Most online groups post FAQs (frequently asked questions) that explain expected norms of online behavior for a particular group. Always read these first—before someone in the group tells you you’ve made a mistake.
•
Avoid flaming: A form of speech unique to online communication, flaming is writing an online message that uses derogatory, obscene, or inappropriate language. Flaming is a form of public humiliation inflicted on people who have failed to read FAQs or have otherwise not observed netiquette (although it can happen just because the sender has poor impulse control and needs a course in anger management). Something that smooths communication online is the use of emoticons, keyboard-produced pictorial representations of expressions. (• See Panel 2.34.)
•
Don’t SHOUT: Use of all-capital letters is considered the equivalent of SHOUTING. Avoid, except when they are required for emphasis of a word or two (as when you can’t use italics in your e-messages).
•
Be careful with jokes: In email, subtleties are often lost, so jokes may be taken as insults or criticism.
•
Avoid sloppiness, but avoid criticizing others’ sloppiness: Avoid spelling and grammatical errors. But don’t criticize those same errors in others’ messages. (After all, they may not speak English as a native language.) Most email software comes with spell-checking capability, which is easy to use.
•
Don’t send huge file attachments, unless requested: Your cousin living in the country may find it takes minutes rather than seconds for his or her computer to download a massive file (as of a video that you want to share). Better to query in advance before sending large files as attachments. Also, whenever you send an attachment, be sure the recipient has the appropriate software to open your attachment.
•
When replying, quote only the relevant portion: If you’re replying to just a couple of matters in a long email posting, don’t send back the entire message. This forces your recipient to wade through lots of text to find the reference. Instead, edit his or her original text down to the relevant paragraph and then put in your response immediately following.
•
Don’t “overforward”: Don’t automatically forward emails to your friends without checking if the contents are true and appropriate. Icon
Meaning
:) :] :D XD :( :c D: D⫽ :) *) :P :p ::b :O :/ :\ :X :# 0:) :’(
smiley or happy face laughing, big grin frown horror, disgust wink tongue sticking out surprise, shock skeptical, annoyed, uneasy sealed lips, embarrassed innocent crying
wiL16775_ch02_049-118.indd 91
panel 2.34 Some emoticons
The Internet & the World Wide Web
general, netiquette has two basic rules: (1) Don’t waste people’s time; and (2) don’t say anything to a person online that you wouldn’t say to his or her face. Some more specific rules of netiquette are shown below:
91
1/8/10 4:04:12 PM
Rev. Confirming Pages
2.5 THE ONLINE GOLD MINE: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & the Social Web What are internet telephony, various kinds of multimedia, RSS, and different web feeds (webcasting, blogging, podcasting), types of e-commerce, and the social web? “For vivid reporting from the enormous zone of tsunami disaster,” says a newspaper account, “it was hard to beat the blogs.”36 Blogs, as technology writer Lee Gomes points out, used to be regarded as web-based “daily diaries of people with no real lives to chronicle in the first place.”37 But the December 2004 Indian Ocean calamity that resulted in over 143,000 people killed and more than 146,000 missing also showed how quick and effective this form of web technology could be in spreading instant news, often beating out the mainstream news media. In particular, the tsunami spurred the distribution of video blogs, or vblogs, consisting of video footage mostly shot by vacationing foreign tourists during and after the disaster. One video, for example, showed an elderly couple overpowered by a wave, filmed at a beach hotel by a factory worker from Sweden.38 The opportunities offered by the internet and the web seem inexhaustible. Here we’ll examine several resources available to you.
Telephony: The Internet Telephone & Videophone Why would I want to make phone calls via the internet? As we stated earlier, the internet breaks up conversations (as it does any other transmitted data) into “information packets” that can be sent over separate lines and then regrouped at the destination, whereas conventional voice phone lines carry a conversation over a single path. Thus, the internet can move a lot more traffic over a network than the traditional telephone link can. With internet telephony, or VoIP phoning (short for Voice over Internet Protocol)—using the net to make phone calls, either one to one or for audioconferencing—you can make long-distance phone calls that are surprisingly inexpensive or even free. (• See Panel 2.35.) Indeed, it’s possible to do this without owning a computer, simply by picking up your standard telephone and dialing a number that will “packetize” your conversation. However, people also can use a PC with a sound card and a microphone, a modem linked to a standard internet service provider, and internet telephone software such
panel 2.35
Chapter 2
Internet telephony ad
92
wiL16775_ch02_049-118.indd 92
1/8/10 4:04:12 PM
Rev. Confirming Pages
as Microsoft NetMeeting and Windows Messenger. VoIP is offered by AT&T, Google Voice, Skype, Vonage, Yahoo! Voice, and scores of other companies. Although sound quality used to be a problem with VoIP systems, the widespread availability of broadband has made call quality no longer an issue.39 Besides carrying voice signals, internet telephone software also allows videoconferencing, in which participants are linked by a videophone that will transmit their pictures, thanks to a video camera attached to their PCs.
Multimedia on the Web How can I get images, sound, video, and animation as well as text? Many websites (especially those trying to sell you something) employ complicated multimedia effects, using a combination of text, images, sound, video, and animation. While most web browsers can handle basic multimedia elements on a web page, eventually you’ll probably want more dramatic capabilities. PLUG-INS In the 1990s, as the web was evolving from text to multimedia, browsers were unable to handle many kinds of graphic, sound, and video files. To do so, external application files called plug-ins had to be loaded into the system. A plug-in is a program that adds a specific feature to a browser, allowing it to play or view certain files. For example, to view certain documents, you may need to download Adobe Acrobat Reader. (• See Panel 2.36.) To view high-quality video and hear radio, you may need to download RealPlayer. (• See Panel 2.37, next page.) QuickTime is a media player for the Apple Macintosh. Plug-ins are required by many websites if you want to fully experience their content. Recent versions of Microsoft Internet Explorer and Firefox can handle a lot of multimedia. Now if you come across a file for which you need a plug-in, the browser will ask whether you want it and then tell you how to go about downloading it, usually at no charge. DEVELOPING MULTIMEDIA: APPLETS, JAVA, & VISUAL STUDIO.NET How do website developers get all those nifty special multimedia effects? Often web pages contain links to applets, small programs (software) that can be
panel 2.36
The Internet & the World Wide Web
Adobe Acrobat Reader
93
wiL16775_ch02_049-118.indd 93
1/8/10 4:04:13 PM
Rev. Confirming Pages
panel 2.37 RealPlayer
quickly downloaded and run by most browsers. Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. Java applets enhance web pages by playing music, displaying graphics and animation, and providing interactive games. Java-compatible browsers such as Internet Explorer automatically download applets from the website and run them on your computer so that you can experience the multimedia effects. Microsoft offers Visual Studio.NET to compete with Java. TEXT & IMAGES Of course, you can call up all kinds of text documents on the web, such as newspapers, magazines, famous speeches, and works of literature. You can also view images, such as scenery, famous paintings, and photographs. Most web pages combine both text and images. One interesting innovation is that of aerial maps. Google Earth (www.google. earth.com) is a satellite imaging program that Google describes as “part flight simulator, part search tool.”40 You type in your ZIP code or street address and it feels like you’re looking down on a high-resolution aerial view of your house from a plane at 30,000 feet. Using Google Local Search, you can search for a business or other attraction in some city, and you’ll get an indicator on your satellite image; if you click again, the establishment’s web page opens. “Google sightseers can zoom in close enough to see airplanes parked in the desert, the baseball diamond at Wrigley Field, and cars in the Mall of America parking lot,” says one writer.41 Google Earth also extends under the sea. In 2009, the company released a 3-D mapping service “that lets users explore the ocean as if they were dolphins, swimming past submerged volcanoes and through underwater canyons.”42
Chapter 2
ANIMATION Animation is the rapid sequencing of still images to create the appearance of motion, as in most videogames as well as in moving banners displaying sports scores or stock prices.
94
wiL16775_ch02_049-118.indd 94
VIDEO Video can be transmitted in two ways. (1) A file, such as a movie or video clip, may have to be completely downloaded before you can view it. This may take several minutes in some cases. (2) A file may be displayed as streaming video and viewed while it is still being downloaded to your computer. Streaming video is the process of transferring data in a continuous flow so that you can begin viewing a file even before the end of the file is sent. For instance, RealPlayer offers live, television-style broadcasts over the internet as
1/8/10 4:04:14 PM
Rev. Confirming Pages
streaming video for viewing on your PC screen. You download and install this software and then point your browser to a site featuring RealVideo. That will produce a streaming-video television image in a window a few inches wide. A milestone in streaming video occurred in July 2005 when America Online broadcast seven separate live feeds of the Live 8 concerts from London, Philadelphia, Paris, Berlin, Rome, and Toronto, as well as a separate global feed that included footage from four other venues. With more and more American households having the broadband connections that permit streaming video, movies-by-mail firms such as Netflix are moving toward the near-instant delivery of movies streamed to subscribers’ TV sets via Net-enabled TV sets, set-top box systems, and Xbox 360 games systems.43 AUDIO Audio, such as sound or music files, may also be transmitted in two ways:
•
Downloaded completely before the file can be played: Many online music services, such as eMusic, iTunes Music Store, MusicMatch, Rhapsody, Virgin, Napster, Connect, and Walmart, offer music for a fee, either by subscription or by the song. Generally, music must be downloaded completely before the file can be played on a computer or portable music player.
•
Downloaded as streaming audio: Music that is downloaded as streaming audio allows you to listen to the file while the data is still being downloaded to your computer. A popular standard for transmitting audio is RealAudio. Supported by most web browsers, it compresses sound so that it can be played in real time, even though sent over telephone lines. You can, for instance, listen to 24-hour-a-day net radio, which features “vintage rock,” or English-language services of 19 shortwave outlets from World Radio Network in London. Many large radio stations outside the United States have net radio, allowing people around the world to listen in. (We explain a form of web audio known as podcasting shortly.)
The Web Automatically Comes to You: Webcasting, Blogging, & Podcasting How would I explain webcasting, blogging, and podcasting to someone?
PUSH TECHNOLOGY & WEBCASTING The trend began in the late 1990s with push technology, software that automatically downloads information to personal computers (as opposed to pull technology, in which you go to a website and pull down the information you want—in other words, the web page isn’t delivered until a browser requests or pulls it). One result of push technology was webcasting, in which customized text, video, and audio are sent to you automatically on a regular basis. The idea here is that you choose the categories, or (in Microsoft Internet Explorer) the channels, of websites that will automatically send you updated information. Thus, webcasting saves you time because you don’t have to go out searching for the information. Webcasting companies are also called subscription services, because they sell on-demand services. However, a lot of push technology fell out of favor because it clogged networks with information that readers often didn’t want. Then along came RSS. BLOGGING—RSS, XML, & THE RISE OF THE BLOGOSPHERE RSS was built to be simpler than push technology. RSS newsreaders, or RSS aggregators, are programs that scour the web, sometimes hourly or more frequently,
wiL16775_ch02_049-118.indd 95
The Internet & the World Wide Web
It used to be that you had to do the searching on the web. Now, if you wish, the web will come to you. Let’s consider three variations—webcasting, blogging, and podcasting.
95
1/8/10 4:04:15 PM
Rev. Confirming Pages
more
info! Blog Search Engines Some blog search engines: Technorati www.technorati.com Bloglines www.bloglines.com Blogdigger www.blogdigger.com Blog Search Engine www.blog searchengine.com/ Google Blog Search http://blog search.google.com/
more
info! Two Blogging Products Two popular blogging products are these: Blogger www.blogger.com/start Moveable Type’s TypePad (begins at $4.95 a month) www.typepad.com
and pull together in one place web “feeds” from several websites. The developers of RSS technology don’t agree on what the abbreviation stands for, but some say it means “Really Simple Syndication” or “Rich Site Summary,” although there are other variations as well.44 “RSS allows you to play news editor and zero in on the information you really need,” says one account, “even as you expand the number of sites you sample.”45 This is because the information is so specifically targeted. RSS is based on XML, or extensible markup language, a web-document tagging and formatting language that is an advance over HTML and that two computers can use to exchange information. XML, in the form of RSS, has allowed people to have access to a whole new universe of content. One of the earliest adopters, for instance, was the Mormon Church, which used the system to keep in touch with members. Now, however, it has morphed into something called the blogosphere, the total universe of blogs—blog being short for web log, a diary-style web page. (• See Panel 2.38.) “Blogs can be anything their creators want them to be, from newsy to deeply personal, argumentative to poetic,” says one writer. “Some are written by individuals. Some are group projects. Some have readerships in the thousands and influence world media. Others are read by a handful of people—or not read at all, because they’re all pictures. Bloggers are a new breed of homegrown journal writers and diarists who chronicle life as it happens, with words, photos, sound, and art.”46 Says another dedicated blogger, “Blogging is . . . to writing what extreme sports are to athletics: more free-form, more accident-prone, less formal, more alive. It is, in many ways, writing out loud.”47 Some people have succeeded in turning blogging into successful businesses, with those who receive 100,000 or more unique visitors a month earning an average of $75,000 a year (aided by online ads).48 But 95% of blogs are essentially abandoned, so the key to building a successful audience for a blog seems to be a nonstop, work-every-day workweek.49 Among other variations are video blogs, or vblogs or vogs, which seem to be simply video versions of blogs, and moblogs, or mobile blogs, in which picture blogs are posted to websites directly from camera-enabled cellphones.
panel 2.38
Chapter 2
The blogosphere: one way to create your own blog
96
wiL16775_ch02_049-118.indd 96
1/8/10 4:04:15 PM
Rev. Confirming Pages
PODCASTING Podcasting involves the recording of internet radio or similar internet audio programs. The term derives not only from webcasting but also from the Apple iPod portable music player and other mobile listening devices, such as MP3 players. Blogging and podcasting seem to represent the frontier of personalized media, a subject to which we will return throughout the book, particularly in Chapter 7.
E-Commerce: B2B Commerce, Online Finance, Auctions, & Job Hunting What are ways I might personally benefit from online e-commerce possibilities? The explosion in e-commerce (electronic commerce)—conducting business activities online—is not only widening consumers’ choice of products and services but also creating new businesses and compelling established businesses to develop internet strategies. Many so-called brick-and-mortar retailers—those operating out of physical buildings—have been surprised at the success of such online companies as Amazon.com, seller of books, CDs, and other products. As a result, traditional retailers from giant Walmart to very small one-person businesses now offer their products online. Retail goods can be classified into two categories—hard and soft. Hard goods are those that can be viewed and priced online, such as computers, clothes, groceries, and furniture, but are then sent to buyers by mail or truck. Soft goods are those that can be downloaded directly from the retailer’s site, such as music, software, travel tickets, and greeting cards. Some specific forms of e-commerce are as follows:
ONLINE FINANCE: TRADING, BANKING, & E-MONEY The internet has changed the nature of stock trading. Anyone with a computer, a connection to the global network, and the information, tools, and access to transaction systems required to play the stock market can do so online. Companies such as E*Trade have built one-stop financial supermarkets offering a variety of money-related services, including home mortgage loans and insurance. More than 1,000 banks have websites, offering services that include account access, funds transfer, bill payment, loan and credit-card applications, and investments.50 AUCTIONS: LINKING INDIVIDUAL BUYERS & SELLERS Today millions of buyers and sellers are linking up at online auctions, where everything is available from comic books to wines.51 The internet is also changing the tradition-bound art and antiques business (dominated by such venerable names as Sotheby’s, Christie’s, and Butterfield & Butterfield). There are generally two types of auction sites:
info!
•
Person-to-person auctions: Person-to-person auctions, such as eBay, connect buyers and sellers for a listing fee and a commission on sold items. (• See Panel 2.39, next page.)
Some Auction Websites
Vendor-based auctions: Vendor-based auctions, such as OnSale, buy merchandise and sell it at discount. Some auctions are specialized, such as Priceline, an auction site for airline tickets and other items.
Overstock.com http://auctions. overstock.com
•
wiL16775_ch02_049-118.indd 97
more
eBay www.ebay.com WeBidz www.webidz.com
The Internet & the World Wide Web
B2B COMMERCE Of course, every kind of commerce has taken to the web, ranging from travel bookings to real estate. One of the most important variations is B2B (business-to-business) commerce, the electronic sale or exchange of goods and services directly between companies, cutting out traditional intermediaries. Expected to grow even more rapidly than other forms of e-commerce, B2B commerce covers an extremely broad range of activities, such as supplier-to-buyer display of inventories, provision of wholesale price lists, and sales of closed-out items and used materials—usually without agents, brokers, or other third parties.
97
1/8/10 4:04:16 PM
Rev. Confirming Pages
panel 2.39 eBay auction
ONLINE JOB HUNTING There are more than 2,000 websites that promise to match job hunters with an employer. Some are specialty “boutique” sites looking for, say, scientists or executives. Some are general sites, the leaders being Monster.com, CareerPath.com, CareerMosaic.com, USAJOBS (U.S. government/federal jobs; www.usajobs.opm.gov), and CareerBuilder.com. Job sites can help you keep track of job openings and applications by downloading them to your own computer. Résumé sites such as Employment911.com help you prepare professional-quality résumés.
Relationships: Matchmaking Websites Would I use a dating website? A matchmaking, or dating, website is an online forum that people may join in hopes of meeting compatible potential mates. People who connect online before meeting in the real world have the chance to base their relationship on personality, intelligence, and sense of humor rather than on purely physical attributes. Five of the biggest and best-known sites are AmericanSingles, eHarmony, Match.com, True, and Yahoo! Personals. Facebook, the social-networking site, also offers the dating site called Are You Interested.52 Most dating sites charge a fee, but PlentyofFish, OKCupid, MatchDoctor, and BookofMatches are free. Most of the 1,000 or so dating sites are niche or specialty sites for those with different political or religious beliefs, different ethnicities, mature adults, and so on.53
Web 2.0 & the Social Web: Social Networking, Media Sharing, Social-Network Aggregation, & Microblogging
Chapter 2
What is Web 2.0, and which social-networking, media-sharing, social-network aggregator websites, and microblogging might be useful?
98
wiL16775_ch02_049-118.indd 98
Finally, we come to what is known as Web 2.0, which can be defined as the move toward a more social, collaborative, interactive, and responsive web.54 As websites have become easier to use, they allow users to better harness the collective power of people, which has led to a “social web” or “social media,” involving not only blogs and wikis (for sharing information) but also social networks and media sharing. The common theme of all these is human interaction.
1/8/10 4:04:16 PM
Rev. Confirming Pages
MYSPACE, FACEBOOK, & OTHER SOCIAL-NETWORKING WEBSITES A socialnetworking website is an online community that allows members to keep track of their friends and share photos, videos, music, stories, and ideas with other registered members. Social-networking websites are led by MySpace (76 million U.S. members) and Facebook (55 million U.S. members) but also include the business-contact site LinkedIn (6.3 million U.S. members).55 Although 44% of U.S. adults who were online in 2007 did not participate in social networks, according to Forrester Research, another 25% were considered “joiners,” who visited social-networking sites such as MySpace; “collectors” consisted of an elite 15% who collected and aggregated information; and the rest were “critics,” who posted ratings and reviews, as well as contributed to blogs and forums.56
more
info! Some Top SocialNetworking Websites Bebo BlackPlanet.com Facebook Flixter Friendster Last.fm
YOUTUBE, FLICKR, & OTHER MEDIA-SHARING WEBSITES A media-sharing website is a type of online social network in which members share media such as photos, videos, and music. The most popular example is YouTube, but others are Hulu, Flickr, Shutterfly, Twango, and Yahoo! Video. Forty-eight percent of internet users in 2007 said they had visited video-sharing websites, according to the Pew Internet & American Life Project, and the daily traffic to such sites doubled in a year.57 Video-sharing sites include YouTube, Flickr, Photobucket, Imageshack, Vimeo, and Veoh. (Incidentally, part of the success of YouTube, where people watch around 3 billion videos a month, is that its founders have kept it pornography-free, using top-secret pattern-recognition software, according to one report.)58
LinkedIn MySpace Ning Xanga
more
info! Some Top MediaSharing Websites Flickr Hulu Photobucket Imageshack Shutterfly Twango Yahoo! Video
The Internet & the World Wide Web
YouTube
99
wiL16775_ch02_049-118.indd 99
1/8/10 4:04:16 PM
Rev. Confirming Pages
more
info! Some Social-Network Aggregators Chapter 2
FriendFeed Spokeo Iminta Plaxo Readr Mugshot
100
wiL16775_ch02_049-118.indd 100
FRIENDFEED, SPOKEO, & OTHER SOCIAL-NETWORK AGGREGATORS Cathy Brooks, 39, of San Francisco is described as a “typically unapologetic Silicon Valley web addict.” In one week alone, it’s reported, “she produced more than 40 pithy updates on the text messaging service Twitter, uploaded two dozen videos to various video-sharing sites, posted seven graphs on . . . Flickr and one item to the online community calendar Upcoming.”59 She and her friends follow one another’s activities by funneling them into a single information broadcast, a content-aggregation system known as FriendFeed. Social-network aggregators, or social aggregators, collect content from all of a user’s various social networks profiles into one place, then allow them to track friends and share their other social network activities. Beside FriendFeed, other examples of “friend-tracking services” are Spokeo, Iminta, Plaxo, Readr, and Mugshot. TWITTER & TUMBLR SOCIAL NETWORKING & MICROBLOGGING SERVICES As you and your friends track each other’s every moment, you can also use services such as Twitter and Tumblr to do “thoughtcasting” or “microblogging”—send a text message from your mobile phone, which your friends will receive on the web/IM or on their phones.60 (The phenomenon is called microblogging, because messages have to be short, 140 characters or less, owing to length restrictions on text messaging.) Tumblr lets you express yourself using multiple media, but in a way that’s easier than using traditional blog software.
1/8/10 4:04:17 PM
Email is still king at the office, but research suggests that Twitter, Facebook, and other social media have overtaken email to become the fourth-mostpopular way people spend time online (after search, portals, and software applications).61
wiL16775_ch02_049-118.indd 101
The Internet & the World Wide Web
Rev. Confirming Pages
101
1/8/10 4:04:18 PM
Rev. Confirming Pages
2.6 THE INTRUSIVE INTERNET: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware How can I protect myself against snoopers, spam, spoofing, phishing, pharming, cookies, and spyware—adware, browser and search hijackers, and key loggers? “The current internet model is just too wide open,” says Orion E. Hill, president of the Napa Valley (California) Personal Computer Users Group, which educates users about PCs. “The internet is just too accessible, and it’s too easy for people to make anything they want out of it.”62 Thus, although the internet may be affected to a degree by governing and regulatory bodies, just like society in general, that doesn’t mean that it doesn’t have its pitfalls or share of users who can do you real harm. We consider some of the other serious internet issues (such as viruses, worms, and crackers) in Chapter 6 and elsewhere, but here let us touch on a few of immediate concern that you should be aware of: snooping, spam, spoofing, phishing, pharming, cookies, and spyware.
Snooping on Your Email: Your Messages Are Open to Anyone Who’s able to look at my private emails? ethics
SECURITY
S u rv i v al Ti p
Chapter 2
Look for the Padlock Icon To avoid having people spying on you when you are sending information over the web, use a secure connection. This is indicated at the bottom of your browser window by an icon that looks like a padlock or key.
102
wiL16775_ch02_049-118.indd 102
The single best piece of advice that can be given about sending email is this: Pretend every electronic message is a postcard that can be read by anyone. Because the chances are high that it could be. (And this includes email on college campus systems as well.) Think the boss can’t snoop on your email at work? The law allows employers to “intercept” employee communications if one of the parties involved agrees to the “interception.” The party “involved” is the employer.63 And in the workplace, email is typically saved on a server, at least for a while. Indeed, federal laws require that employers keep some email messages for years. Think you can keep your email address a secret among your friends? You have no control over whether they might send your e-messages on to someone else—who might in turn forward them again. (One thing you can do for your friends, however, is delete their names and addresses before sending one of their messages on to someone.) Think your internet access provider will protect your privacy? Often service providers post your address publicly or even sell their customer lists. If you’re really concerned about preserving your privacy, you can try certain technical solutions—for instance, installing software that encodes and decodes messages (discussed in Chapter 6). But the simplest solution is the easiest: Don’t put any sensitive or embarrassing information in your email. Even deleted email removed from trash can still be traced on your hard disk. To guard against this, you can use software such as Spytech Eradicator and Webroot’s Window Washer to completely eliminate deleted files. (Be aware, however: your email may already have been backed up on the company—or campus—server.)
Spam: Electronic Junk Mail Is it really possible to manage spam? Several years ago, Monty Python, the British comedy group, did a sketch in which restaurant customers were unable to converse because people in the background (a group of Vikings, actually) kept chanting “Spam, spam, eggs and spam . . .” The term spam was picked up by the computer world to describe another kind of “noise” that interferes with communication. Now spam refers to unsolicited email, or junk mail, in the form of advertising or chain letters. But the problem of spam has metastasized well beyond the stage of annoyance.
1/8/10 4:04:18 PM
Rev. Confirming Pages
Spam has become so pestiferous that Smart Computing magazine refers to it as a “cockroach infestation.”64 In 2001, spam accounted for about 5% of the traffic on the internet; by 2004, it was more than 70%—in some regions more than 90%, more than a hundred billion unsolicited messages.65 In 2008, the number of spam messages globally was 164 billion per day, using enough electricity to power 2.4 million homes for a year.66 Spam plagues social networks, such as Facebook. It is even migrating from computers to cellphones, messages that the recipients have to pay for. Usually, of course, you don’t recognize the spam sender on your list of incoming mail, and often the subject line will give no hint, stating something such as “The status of your application” or “It’s up to you now.” The solicitations can range from money-making schemes to online pornography. To better manage spam, some users get two email boxes. One is used for online shopping, business, research, and the like—which will continue to attract spam. The other is used (like an unlisted phone number) only for personal friends and family—and will probably not receive much spam. The Practical Action box gives some other tips for fighting spam.
PRACTICAL ACTION •
Delete without opening the message: Opening the spam message can send a signal to the spammer that someone has looked at the on-screen message and therefore that the email address is valid—which means you’ll probably get more spams in the future. If you don’t recognize the name on your inbox directory or the topic on the inbox subject line, simply delete the message without reading it. Or you can use a preview feature in your email program to look at the message without opening it; then delete it.
•
Never reply to a spam message: The following advice needs to be taken seriously: Never reply in any way to a spam message! Replying confirms to the spammer that yours is an active email address. Some spam senders will tell you that if you want to be removed from their mailing list, you should type the word remove or unsubscribe in the subject line and use the Reply command to send the message back. Invariably, however, all this does is confirm to the spammer that your address is valid, setting you up to receive more unsolicited messages.
•
Opt out: When you sign up for or buy something online and are asked for an email address, remember to opt out of everything you’re sure you don’t want to receive. When you register for a website, for example, read its privacy policy to find out how it uses email addresses—and don’t give the site permission to pass along yours.
wiL16775_ch02_049-118.indd 103
•
Enlist the help of your internet access provider, or use spam filters: Your IAP may offer a free spam filter to stop the stuff before you even see it. If it doesn’t, you can sign up for a filtering service, such as MailWise, for a small monthly charge. Or there are do-it-yourself spam-stopping programs. Examples: Choicemail (www.digiportal.com), MailWasher (www.mailwasher. net/), Barracuda (www.barracudanetworks.com) and McAfee SpamKiller (http://us.mcafee.com/root/product. asp? productid⫽msk). More complicated spam-blocker packages exist for businesses. Be warned, however: Even so-called spam killers don’t always work. “Nothing will work 100%, short of changing your email address,” says the operator of an online service called SpamCop. “No matter how well you try to filter a spammer, they’re always working to defeat the filter.”68
•
Fight back: If you want to get back at spammers—and other internet abusers—check with abuse.net (www. abuse.net) or Ed Falk’s Spam Tracking Page (www.rahul. net/falk). Spamhaus (www.spamhaus.org) tracks the internet’s worst spammers and works with ISPs and law enforcement agencies to identify and remove persistent spammers from the internet. These groups will tell you where to report spammers, the appropriate people to complain to, and other spam-fighting tips.
The Internet & the World Wide Web
Tips for Fighting Spam67
103
1/8/10 4:04:19 PM
Rev. Confirming Pages
Spoofing, Phishing, & Pharming: Phony Email Senders & Websites How would I know if I were being spoofed, phished, or pharmed? more
info! Deciphering Fake Email For more about spoofing and how to identify origins of fake emails, go to: www.mailsbroadcast.com/ email.broadcast.faq/46.email. spoofing.htm
A message shows up in your email supposedly from someone named “Sonia Saunders.” The subject line reads “Re: Hey there!” It could have been from someone you know, but it’s actually a pitch for porn. Or you receive what appears to be an “Urgent notice from eBay,” the online auction company, stating that “failure to update billing information will result in cancellation of service” and asking you to go to the web address indicated and update your credit-card information. In the first instance you’ve been spoofed, in the second you’ve been phished.69 SPOOFING—USING FAKE EMAIL SENDER NAMES Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is one of the main tactics used by spammers (and virus writers) to induce or trick recipients into opening and perhaps responding to their solicitations. Spoofing is generally not illegal and might even serve a legitimate purpose under some circumstances—say, a “whistle-blowing” employee fearful of retaliation who reports a company’s illegalities to a government agency. It is illegal, however, if it involves a direct threat of violence or death.70 PHISHING—USING TRUSTED INSTITUTIONAL NAMES TO ELICIT CONFIDENTIAL INFORMATION Phishing (pronounced “fishing” and short for password harvesting fishing) is (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to “phish” for, or entice people to share, their personal, financial, or password data. The names may be trusted names such as Citibank, eBay, or Best Buy.71 A variant is spear-phishing, in which a message seems to originate within your company, as when a “Security Department Assistant” asks you to update your name and password or risk suspension.72 Thus, you should be suspicious of any email that directs you to a website that requests confidential information, such as credit-card or Social Security number.73 PHARMING—REDIRECTING YOU TO AN IMPOSTOR WEB PAGE Pharming is a relatively new kind of phishing that is harder to detect. In pharming, thieves implant malicious software on a victim’s computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. One way to protect yourself is to make sure you go to special secure web pages, such as any financial website, which begin with https rather than the standard http and which use encryption to protect data transfer.74
Cookies: Convenience or Hindrance? Do I really want to leave cookies on my computer? more
Chapter 2
info! Verifying Valid Websites For more on verifying if you’re dealing with a legitimate company website, go to: www.trustwatch.com
104
wiL16775_ch02_049-118.indd 104
Cookies are little text files—such as your log-in name, password, and preferences—left on your hard disk by some websites you visit. The websites retrieve the data when you visit again. A website that welcomes you by name uses cookies. THE BENEFITS OF COOKIES Cookies can be a convenience. If you visit an online merchant—such as BarnesandNoble.com for a book—and enter all your address and other information, the merchant will assign you an identification number, store your information with that number on its server, and send the number to your browser as a cookie, which stores the ID number on your hard disk. The next time you go to that merchant, the number is sent to the server, which looks you up and sends you a customized web page welcoming you. “Cookies actually
1/8/10 4:04:21 PM
Rev. Confirming Pages
perform valuable services,” says technology writer and computer talk-radio-show host Kim Komando. “For instance, they can shoot you right into a site so you don’t have to enter your password.”75 Says another writer: “They can also fill in a username on a site that requires logging in, or [help] a weather site remember a ZIP code so that it can show a local forecast on return visits.”76 THE DRAWBACKS OF COOKIES Cookies are not necessarily dangerous—they are not programs, and they can’t transmit computer viruses, for example. However, some websites sell the information associated with your ID number on their servers to marketers, who might use it to target customers for their products. “Unsatisfactory cookies,” in Microsoft’s understated term, are those that might allow someone access to personally identifiable information that could be used without your consent for some secondary purpose. This can lead to spyware, as we describe next. Webroot’s Window Washer, among other programs, can clean your computer of cookies.
Sur v iv a l T ip Control Those Cookies! You can use your browser’s Help function to accept or reject cookies. For instance, in Internet Explorer, go to the Tools menu and click Internet Options; on the General tab, click Settings; then click View files, select the cookie you want to delete, and on the File menu click Delete. Software such as Cookie Pal (www. kburra.com) will also help block and control cookies, as will Webroot’s Window Washer.
Spyware—Adware, Browser & Search Hijackers, & Key Loggers: Intruders to Track Your Habits & Steal Your Data You visit a search site such as Yahoo! or Google and click on a text ad that appears next to your search results. Or you download a free version of some software, such as Kazaa, a file-sharing program. Or you simply visit some web merchant to place an order. The next thing you know, you seem to be getting pop-up ads, a form of online advertising in which, when you visit certain websites, a new window opens, or “pops up,” to display advertisements. You have just had an encounter with spyware, of which pop-up ads are only one form. Spyware may be defined as deceptive software that is surreptitiously installed on a computer via the web; once installed on your hard disk, it allows an outsider Webroot’s Window Washer, among other programs, can clean to harvest confidential information, such as key- your computer of cookies. strokes, passwords, your email address, or your history of website visits. Spyware was found on the personal computers of 80% of the 329 homes participating in a study conducted by America Online Inc. and the National Cyber Security Alliance.77 Ways to avoid getting spyware are shown in the more info! in the margin at right. more The most common forms of spyware are the following:
info!
ADWARE OR POP-UP GENERATORS Adware, or pop-up generators, is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads. This is the most common, and benign, type of spyware. Adware can be developed by legitimate companies such as Verizon and Panasonic but also by all kinds of fly-by-night purveyors of pornography and gambling operating from computer servers in Russia, Spain, and the Virgin Islands.
Fighting Spyware More information about ways to combat spyware may be found at: www.microsoft.com/athome/ security/spyware/default. mspx www.pcpitstop.com
BROWSER HIJACKERS & SEARCH HIJACKERS More damaging kinds of spyware are browser hijackers, which change settings in your browser without your knowledge, often changing your browser’s home page and replacing it with another web page, and search hijackers, which intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. “A better name for these programs is scumware,” says one writer. “One of them might reset your home page to a porn site or an obscure search engine
wiL16775_ch02_049-118.indd 105
www.spywarewarrior.com/ rogue_anti-spyware.htm www.webroot.com www.cleansoftware.org www.lavasoftusa.com/ software/
The Internet & the World Wide Web
What should I be afraid of about spyware?
105
1/8/10 4:04:22 PM
Rev. Confirming Pages
panel 2.40 Some antispyware programs
Program Name
Site
Ad Aware AntiSpyware PC Tools Software
www.lavasoftusa.com/software/adaware http://us.mcafee.com www.pctools.com/spywaredoctor/?ref⫽google77 www.ca.com/products/pestpatrol http://spywaresoftware.net www.tenebril.com www.spywareinfo.com/downloads.php www.webroot.com
Pest Patrol Spybot Search & Destroy SpyCatcher SpyCop Spy Sweeper
and then refuse to let you change the page back. Or it might hijack your search requests and then direct them to its own page.”78 KEY LOGGERS Key loggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the internet, making it possible for strangers to learn your passwords and other information. For instance, some may secretly record the keystrokes you use to log in to online bank accounts and then send the information off to who knows where. In the past, spyware writers have relied on flaws in Microsoft’s Internet Explorer. On the PC, you may be protected if you keep your security features updated. Some people believe that getting rid of Internet Explorer and going to Mozilla Firefox, the most popular alternative, is a better solution.79 Another option is Opera. Internet access providers such as AOL and Earthlink offer scan-and-removal tools, but you can also employ specialized antispyware software. Some of the good ones appear below. (• See Panel 2.40.) One big problem with spyware is that overburdened PCs begin to run more slowly as the hard drives cope with random and uncontrollable processes. If none of the antispyware works, you will need to wipe your hard drive clean of programs and data and start from scratch—a complicated matter that we discuss in Chapter 4.
PRACTICAL ACTION Tips for Avoiding Spyware
Y
weather data often are paid to distribute spyware. When you install their software, you might be asked to agree to certain conditions. If you simply click “I agree” without reading the fine print, you may be authorizing installation of spyware. “People have gotten in the habit of clicking next, next, next, without reading” when they install software, says a manager at McAfee Inc., which tracks spyware and viruses.80
ou may not be able to completely avoid spyware, but doing the following may help:
Chapter 2
•
106
•
Be careful about free and illegal downloads: Be choosy about free downloads, as from Grokster and Kazaa, or illegal downloads of songs, movies, or TV shows. Often they use a form of spyware. File-sharing programs, which are popular with students, often contain spyware. Pornographic websites also are common carriers of spyware. Don’t just say “I agree”; read the fine print: Sites that offer games, music-sharing videos, screen savers, and
wiL16775_ch02_049-118.indd 106
•
Beware of unsolicited downloads: If while you’re surfing the net your browser warns you a file is being downloaded and you’re asked if you choose to accept, keep clicking no until the messages stop.
1/21/10 8:11:35 PM
Rev. Confirming Pages
EXPERIENCE BOX Web Research, Term Papers, & Plagiarism identical blocks of text. Indeed, some websites favored by instructors build a database of papers over time so that students can’t recycle work previously handed in by others. One system, Turnitin’s Originality Checking, can lock on to a stolen phrase as short as eight words. It can also identify copied material even if it has been changed slightly from the original. Another program professors use is the Self-Plagiarism Detection Tool, or SplaT.
How the Web Can Lead to Low-Quality Papers
• Sites offering papers for free: Such a site requires that users fill out a membership form and then provides at least one free student term paper. (Good quality is not guaranteed, since free-paper mills often subsist on the submissions of poor students, whose contributions may be subliterate.)
William Rukeyser, coordinator for Learning in the Real World, a nonprofit information clearinghouse, points out another problem: The web enables students “to cut and paste together reports or presentations that appear to have taken hours or days to write but have really been assembled in minutes with no actual mastery or understanding by the student.”83 Philosophy professor David Rothenberg, of New Jersey Institute of Technology, reports that as a result of students’ doing more of their research on the web, he has seen “a disturbing decline in both the quality of the writing and the originality of the thoughts expressed.”84 How does an instructor spot a term paper based primarily on web research? Rothenberg offers four clues:
• Sites offering papers for sale: Commercial sites may charge $6–$10 a page, which users may charge to their credit card. (Expense is no guarantee of quality. Moreover, the term-paper factory may turn around and make your $350 custom paper available to others—even fellow classmates working on the same assignment—for half the price.)
• No books cited: The student’s bibliography cites no books, just articles or references to websites. Sadly, says Rothenberg, “one finds few references to careful, in-depth commentaries on the subject of the paper, the kind of analysis that requires a book, rather than an article, for its full development.”
How Instructors Catch Cheaters
• Outdated material: A lot of the material in the bibliography is strangely out of date, says Rothenberg. “A lot of stuff on the web that is advertised as timely is actually at least a few years old.”
How the Web Can Lead to Plagiarism Two types of term-paper websites are as follows:
How do instructors detect and defend against student plagiarism? Professors are unlikely to be fooled if they tailor term-paper assignments to work done in class, monitor students’ progress—from outline to completion—and are alert to papers that seem radically different from a student’s past work. One professor of art history requires that papers in his classes be submitted electronically, along with a list of World Wide Web site references. “This way I can click along as I read the paper. This format is more efficient than running around the college library, checking each footnote.”82 Just as the internet is the source of cheating, it is also a tool for detecting cheaters. Search programs make it possible for instructors to locate texts containing identified strings of words from the millions of pages found on the web. Thus, a professor can input passages from a student’s paper into a search program that scans the web for
wiL16775_ch02_049-118.indd 107
• Unrelated pictures and graphs: Students may intersperse the text with a lot of impressive-looking pictures and graphs that actually bear little relation to the precise subject of the paper. “Cut and pasted from the vast realm of what’s out there for the taking, they masquerade as original work.” • Superficial references: “Too much of what passes for information [online] these days is simply advertising for information,” points out Rothenberg. “Screen after screen shows you where you can find out more, how you can connect to this place or that.” Other kinds of information are detailed but often superficial: “pages and pages of federal documents, corporate propaganda, snippets of commentary by people whose credibility is difficult to assess.”
The Internet & the World Wide Web
N
o matter how much students may be able to rationalize cheating in college—for example, trying to pass off someone else’s term paper as their own (plagiarism)—ignorance of the consequences is not an excuse. Most instructors announce the penalties for cheating at the beginning of the course— usually a failing grade in the course and possible suspension or expulsion from school. Even so, probably every student becomes aware before long that the World Wide Web contains sites that offer term papers, either for free or for a price. Some dishonest students may download papers and just change the author’s name to their own. Others are more likely just to use the papers for ideas. Perhaps, suggests one article, “the fear of getting caught makes the online papers more a diversion than an invitation to wide-scale plagiarism.”81
107
1/8/10 4:04:25 PM
Rev. Confirming Pages
SUMMARY access point (p. 58) Station that sends and receives data to and from a Wi-Fi network. Why it’s important: Many public areas, such as airports and hotels, offer hot spots, or access points, that enable Wi-Fi-equipped users to go online wirelessly. adware (p. 105) Also called pop-up generators: kind of spyware that tracks web surfing or buying online. Why it’s important: Adware enables marketers to send you targeted and unsolicited pop-up and other ads. animation (p. 94) The rapid sequencing of still images to create the appearance of motion, as in a cartoon. Why it’s important: Animation is a component of multimedia; it is used in online video games as well as in moving banners displaying sports scores or stock prices. applets (p. 93) Small programs that can be quickly downloaded and run by most browsers. Why it’s important: Web pages contain links to applets, which add multimedia capabilities. B2B (business-to-business) commerce (p. 97) Electronic sale or exchange of goods and services directly between companies, cutting out traditional intermediaries. Why it’s important: Expected to grow even more rapidly than other forms of e-commerce, B2B commerce covers an extremely broad range of activities, such as supplier-to-buyer display of inventories, provision of wholesale price lists, and sales of closed-out items and used materials—usually without agents, brokers, or other third parties. backbones See internet backbone. bandwidth (p. 52) Also known as channel capacity; expression of how much data—text, voice, video, and so on—can be sent through a communications channel in a given amount of time. Why it’s important: Different communications systems use different bandwidths for different purposes. The wider the bandwidth, the faster the data can be transmitted. bits per second (bps) (p. 52) Eight bits make up a character. Why it’s important: Data transfer speeds are measured in bits per second.
Chapter 2
blog (p. 96) Short for web log, an internet journal. Blogs are usually updated daily; they reflect the personality and views of the blogger. Why it’s important: Blogs are becoming important sources of current information.
108
blogosphere (p. 96) The total universe of blogs. Why it’s important: The blogosphere has allowed the rise of a new breed of homegrown journal writers and diarists to chronicle life as it happens. broadband (p. 52) Very high speed connection. Why it’s important: Access to information is much faster than access with traditional phone lines.
wiL16775_ch02_049-118.indd 108
browser See web browser. browser hijacker (p. 105) A damaging kind of spyware that changes settings in your browser without your knowledge. Why it’s important: This spyware can reset your home page to a porn site or obscure search engine or change your home page and replace it with another web page. cable modem (p. 57) Device connecting a personal computer to a cable-TV system that offers an internet connection. Why it’s important: Cable modems transmit data faster than do standard modems. client (p. 60) Computer requesting data or services. Why it’s important: Part of the client/server network, in which the server is a central computer supplying data or services requested of it to the client computer. communications satellite (p. 57) Space station that transmits radio waves called microwaves from earth-based stations. Why it’s important: An orbiting satellite contains many communications channels and receives signals from ground microwave stations anywhere on earth. cookies (p. 104) Little text files, such as your log-in name, password, and preferences, that are left on your hard disk by some websites you visit; the websites retrieve the data when you visit again. Why it’s important: Cookies can be beneficial in that they put you right into a website without having to enter your password. However, some websites sell the information associated with your ID number on their servers to marketers, who might use it to target you as a customer for their products. dial-up connection (p. 53) Use of a telephone modem to connect a computer to the internet. Why it’s important: Cheapest means of online connection and available everywhere. domain (p. 66) A location on the internet, the particular web server. Why it’s important: A domain name is necessary for sending and receiving email and for many other internet activities. download (p. 53) To transmit data from a remote computer to a local computer. Why it’s important: Downloading enables users to save files on their own computers for later use, which reduces the time spent online and the corresponding charges. DSL (digital subscriber line) (p. 55) A hardware and software technology that uses regular phone lines to transmit data in megabits per second. Why it’s important: DSL connections are much faster than regular modem connections. e-commerce (electronic commerce) (p. 97) Conducting business activities online. Why it’s important: E-commerce not only is widening consumers’ choice of products and services but is also creating new businesses and compelling established businesses to develop internet strategies.
1/8/10 4:04:29 PM
Rev. Confirming Pages
FAQs (frequently asked questions) (p. 91) Guides that explain expected norms of online behavior for a particular group. Why it’s important: Users should read a group’s/site’s FAQs to know how to proceed properly. flaming (p. 91) Writing an online message that uses derogatory, obscene, or inappropriate language. Why it’s important: Flaming should be avoided. It is a form of public humiliation inflicted on people who have failed to read FAQs or have otherwise not observed netiquette (although it can happen just because the sender has poor impulse control and needs a course in anger management). frame (p. 72) An independently controllable section of a web page. Why it’s important: A web page designer can divide a page into separate frames, each with different features or options.
document structure, formatting, and links to other documents. Why it’s important: HTML enables the creation of web pages. HyperText Transfer Protocol (HTTP) (p. 66) Communications rules that allow browsers to connect with web servers. Why it’s important: Without HTTP, files could not be transferred over the web. individual search engine (p. 74) Type of internet search tool that compiles its own searchable database on the web. You search for information by typing one or more keywords, and the search engine then displays a list of web pages, or “hits,” that contain those key words, ordered from most likely to least likely to contain the information you want. Why it’s important: Examples of this kind of search engine are Ask, Bing, Google, and Yahoo!, as well as AllTheWeb, Gigablast, and Lycos. These are the search engines most commonly used by individual users. instant messaging (IM) (p. 87) Service that enables any user on a given email system to send a message and have it pop up instantly on the screen of anyone else logged onto that system. Why it’s important: People can initiate online typed conversations in real time. As they are typed, the messages appear on the display screen in a small window.
FTP (File Transfer Protocol) (p. 88) Method whereby you can connect to a remote computer called an FTP site and transfer publicly available files to your own microcomputer’s hard disk via TCP/IP over the internet. Why it’s important: The free files offered cover nearly anything that can be stored on a computer: software, games, photos, maps, art, music, books, statistics.
internet2 (p. 62) A cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks. Why it’s important: Internet2 creates a kind of “virtual university” by advancing videoconferencing, research, and academic collaboration.
gigabits per second (Gbps) (p. 52) 1 billion bits per second. Why it’s important: Gbps is a common measure of data transmission speed.
internet access provider (p. 53) Regional, national, or wireless organization or business that connects you to the internet. Why it’s important: This organization is necessary to connect people to the internet.
hit (p. 74) Site that a search engine returns after running a keyword search. Why it’s important: The web pages, or hits, that a search engine returns after you type in a keyword are the beginning of the types of information you are looking for.
internet backbone (p. 61) High-speed, high-capacity transmission lines that use the newest communications technology. Why it’s important: The internet backbone transmits data across the internet.
home page (p. 65) Also called welcome page; web page that, somewhat like the title page of a book, identifies the website and contains links to other pages at the site. Why it’s important: The first page you see at a website is the home page.
Internet Corporation for Assigned Names and Numbers (ICANN) (p. 63) Global, private-sector, nonprofit corporation that was established to regulate human-friendly internet domain names, those addresses ending with.com, .org, .net, and so on, that overlie IP addresses and identify the website type. Why it’s important: This organization helps humans organize and understand websites.
host computer See server. hotspot (p. 58) Public access to Wi-Fi networks. Why it’s important: Hotspots in airports, hotels, and the like enable wireless-equipped users to go online without a physical connection. hypertext links (p. 68) Also called hyperlinks, hotlinks, or just links; connections to other documents or web pages that contain related information. Why it’s important: Allows a word or phrase in one document to become a connection to a document in a different place. hypertext markup language (HTML) (p. 68) Set of special instructions (called “tags” or “markups”) used to specify web
wiL16775_ch02_049-118.indd 109
Internet Protocol (IP) address (p. 62) Uniquely identifies every computer and device connected to the internet; consists of four sets of numbers between 0 and 255 separated by decimals—for example, 1.160.10.240. This address is similar to a street address. However, street addresses rarely change, but IP addresses often do. Why it’s important: Each time you connect to your ISP, the ISP will assign your computer a new IP address, called a dynamic IP address, for your online session. When you request data from the internet, it is transmitted to your computer’s IP address. When you disconnect, your ISP frees up the IP address you were using and reassigns it to another user.
The Internet & the World Wide Web
email program (p. 82) Also called email client software; enables you to send email by running email software on your computer, which interacts with an email server at your internet access provider to send and receive email. Why it’s important: With this standard email program, unlike web-based email, you can easily integrate your email with other applications, such as calendar, task list, and contact list.
109
1/8/10 4:04:29 PM
Rev. Confirming Pages
internet service provider (ISP) (p. 58) Company that connects you through your communications line to its servers, or central computer, which connects you to the Internet via another company’s network access points. Why it’s important: Unless they subscribe to an online information service (such as AOL) or have a direct network connection (such as a T1 line), microcomputer users need an ISP to connect to the internet.
to share media. Why it’s important: Members can share their photos, videos, and music with others with great ease and convenience.
internet telephony (p. 92) Also known as VoIP phoning, short for Voice over Internet Protocol: using the internet to make phone calls, either one-to-one or for audioconferencing. Why it’s important: Long-distance phone calls by this means are surprisingly inexpensive.
metasearch engine (p. 75) Type of internet search tool that allows you to search several search engines simultaneously. Why it’s important: A metasearch engine enables you to expand the range of your search.
ISDN (Integrated Services Digital Network) (p. 55) Hardware and software that allow voice, video, and data to be communicated over traditional copper-wire telephone lines (POTS). Why it’s important: ISDN provides faster data transfer speeds than do regular modem connections. Java (p. 94) Complex programming language that enables programmers to create animated and interactive web pages using applets. Why it’s important: Java applets enhance web pages by playing music, displaying graphics and animation, and providing interactive games. key logger (p. 106) Also known as keystroke logger; type of spyware that can record each character you type and transmit that information to someone else on the internet. Why it’s important: A key logger can make it possible for strangers to learn your passwords and other information. keyword (p. 72) A keyword is the subject word or words that refer to the topic you wish to find. Why it’s important: You must use keywords to research topics on the internet. kilobits per second (Kbps) (p. 52) 1,000 bits per second. Why it’s important: Kbps is a common measure of data transfer speed. The speed of a modem that is 28,800 bps might be expressed as 28.8 Kbps. listserv (p. 89) Automatic mailing-list server that sends email to subscribers who regularly participate in discussion topics. To subscribe, the user sends an email to the list-server moderator and asks to become a member, after which he or she automatically receives email messages from anyone who responds to the server. Why it’s important: Anyone connected to the internet can subscribe to listserv services. Subscribers receive information on particular subjects and can post email to other subscribers.
Chapter 2
log on (p. 60) To make a connection to a remote computer. Why it’s important: Users must be familiar with log-on procedures to go online.
110
matchmaking website (p. 98) Also called dating website; an online forum that people may join in hopes of meeting compatible potential mates. Why it’s important: Matchmaking websites allow people with similar political or religious beliefs, different ethnicities, mature adults, and so on to find others with similar characteristics. media-sharing website (p. 99) Type of online social network, such as YouTube, Flickr, and Shutterfly, that allows members
wiL16775_ch02_049-118.indd 110
megabits per second (Mbps) (p. 52) 1 million bits per second. Why it’s important: Mbps is a common measure of data transmission speed.
modem (p. 53) Device that sends and receives data over telephone lines to and from computers. Why it’s important: The modem provides a means for computers to communicate with one another using the standard copper-wire telephone network, an analog system that was built to transmit the human voice but not computer signals. narrowband (p. 53) Low-bandwidth connection, such as dial-up (telephone). Why it’s important: Narrowband connecting technology is inexpensive and widely available. netiquette (p. 90) “Network etiquette,” or appropriate online behavior. Why it’s important: In general, netiquette has two basic rules: (1) Don’t waste people’s time, and (2) don’t say anything to a person online that you wouldn’t say to his or her face. network access point (NAP) (p. 61) A routing computer at a point on the internet where several connections come together. Why it’s important: NAPs connect internet service providers to the internet backbone. newsgroup (p. 89) Also called forum; giant electronic bulletin board on which users conduct written discussions about a specific subject. Why it’s important: There are thousands of newsgroup forums—which charge no fee—and they cover an amazing array of topics. newsreader (p. 89) Program included with most browsers that allows users to access a newsgroup and read or type messages. Why it’s important: Users need a newsreader to participate in a newsgroup. packet (p. 62) Fixed-length block of data for transmission. Why it’s important: TCP/IP breaks data in a message into separate packets, which allows the message to be split up and its parts sent by separate routes yet still all wind up in the same place. password (p. 60) A secret word or string of characters that enables you to log on, or make a connection, to a remote computer. Why it’s important: The password helps keep a computer system secure against intruders. pharming (p. 104) A type of phishing in which malicious software is implanted on a victim’s computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. Why it’s important: The purpose is to trick people into sharing their personal, financial, or password data.
1/8/10 4:04:30 PM
Rev. Confirming Pages
plug-in (p. 93) Program that adds a specific feature to a browser, allowing it to play or view certain files. Why it’s important: To fully experience the contents of many web pages, you need to use plug-ins. podcasting (p. 97) Recording of internet radio or similar internet audio programs. Why it’s important: Podcasting is another expression of personalized media. point of presence (POP) (p. 61) Collection of modems and other equipment in a local area. Why it’s important: To avoid making their subscribers pay long-distance phone charges, ISPs provide POPs across the country. The POP acts as a local gateway to the ISP’s network.
scroll arrows (p. 71) Small up/down and left/right arrows located to the bottom and side of your screen display. Why it’s important: Clicking on scroll arrows with your mouse pointer moves the screen so that you can see the rest of the web page, or the content displayed on the screen. scrolling (p. 72) Moving quickly upward or downward through text or some other screen display, using the mouse and scroll arrows (or the arrow keys on the keyboard). Why it’s important: Normally a computer screen displays only part of, for example, a web page. Scrolling enables users to view an entire document, no matter how long. search (text) box (p. 71) Fill-in text box. Why it’s important: Allows interaction with a web page. search engine (p. 74) Search tool that allows you to find specific documents through keyword searches and menu choices, in contrast to directories, which are lists of websites classified by topic. Why it’s important: Search engines enable users to find websites of specific interest or use to them.
pop-up ads (p. 105) Form of online advertising in which, when you visit certain websites, a new window opens, or “pops up,” to display advertisements. Why it’s important: Pop-up ads are one form of the nuisance known as spyware.
search hijacker (p. 105) A damaging kind of spyware that can intercept your legitimate search requests made to real search engines and return results from phony search services. Why it’s important: Phony search services may send you to sites they run.
POTS (plain old telephone system) (p. 54) Traditional kind of connection to the internet. Why it’s important: Slowest method of connecting to the internet.
search service (p. 74) Organization that maintains databases accessible through websites. Why it’s important: A search service helps you find information on the internet.
protocol (p. 62) Set of communication rules for exchanging information. Why it’s important: Transmission Control Protocol/Internet Protocol (TCP/IP) enables all computers to use data transmitted on the internet. HyperText Transfer Protocol (HTTP) provides the communication rules that allow browsers to connect with web servers.
server (p. 60) Central computer supplying data or services. Why it’s important: Part of the client/server network, in which the central computer supplies data or services requested of it to the client computer.
push technology (p. 95) Software that automatically downloads information to your computer, as opposed to pull technology, in which you go to a website and pull down the information you want. Why it’s important: With little effort, users can obtain information that is important to them.
social-network aggregator (p. 100) Also called social aggregator; this technology collects content from all of a user’s various social network profiles into one place. Why it’s important: Aggregators such as FriendFeed and Spokeo are “friend tracking services” that allow members to track friends and share their other social network activities.
radio buttons (p. 71). An interactive tool displayed as little circles in front of options; selecting an option with the mouse places a dot in the corresponding circle. Why it’s important: Radio buttons are one way of interacting with a web page. real-time chat (RTC) (p. 90) Typed discussion (“chat”) among participants who are online at the same time; it is just like a telephone conversation, except that messages are typed rather than spoken. Why it’s important: RTC provides a means of immediate electronic communication. RSS newsreaders (p. 95) Also called RSS aggregators; programs that scour the web, sometimes hourly or more frequently, and pull together in one place web “feeds” from several websites. Why it’s important: RSS newsreaders give people access to a whole new universe of content and have led to the creation of the blogosphere.
wiL16775_ch02_049-118.indd 111
site (p. 65) See website.
social-networking website (p. 99) An online community that allows members to keep track of their friends and share ideas and media. Why it’s important: Social-networking websites such as MySpace, Facebook, and LinkedIn allow members to easily expand their circle of acquaintances and to exchange photos, videos, music, stories, and ideas with each other. spam (p. 102) Unsolicited email in the form of advertising or chain letters. Why it’s important: Spam filters are available that can spare users the annoyance of receiving junk mail, ads, and other unwanted email. spider (p. 74) Also known as crawler, bot, or agent; special program that crawls through the World Wide Web, following links from one web page to another. Why it’s important: A spider indexes the words on each site it encounters and is used to compile the databases of a search service.
The Internet & the World Wide Web
phishing (p. 104) Short for password harvesting fishing; (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. Why it’s important: The purpose of the fraudulent sender is to “phish” for, or entice people to share, their personal, financial, or password data.
111
1/8/10 4:04:30 PM
Rev. Confirming Pages
spoofing (p. 104) The forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Why it’s important: Spoofing is one of the main tactics used by spammers to induce or trick recipients into responding to their solicitations.
kilobytes). IP is used to send the packets across the internet to their final destination, and TCP is used to reassemble the packets in the correct order. Why it’s important: Internet computers use TCP/IP for all internet transactions, from sending email to downloading stock quotes or pictures off a friend’s website.
spyware (p. 105) Deceptive software that is surreptitiously installed on a computer via the web. Why it’s important: Once spyware is installed on your hard disk, it allows an outsider to harvest confidential information, such as keystrokes, passwords, or your email address.
upload (p. 53) To transmit data from a local computer to a remote computer. Why it’s important: Uploading allows users to easily exchange files over networks.
streaming audio (p. 95) Process of downloading audio in which you can listen to the file while the data is still being downloaded to your computer. Why it’s important: Users don’t have to wait until the entire audio is downloaded to the hard disk before listening to it.
URL (Uniform Resource Locator) (p. 65) String of characters that points to a specific piece of information anywhere on the web. A URL consists of (1) the web protocol, (2) the name of the web server, (3) the directory (or folder) on that server, and (4) the file within that directory (perhaps with an extension such as html or htm). Why it’s important: URLs are necessary to distinguish among websites.
streaming video (p. 94) Process of downloading video in which the data is transferred in a continuous flow so that you can begin viewing a file even before the end of the file is sent. Why it’s important: Users don’t have to wait until the entire video is downloaded to the hard disk before watching it.
Usenet (p. 89) Worldwide network of servers that can be accessed through the internet. Why it’s important: Newsgroups take place on Usenet. VoIP phoning. See internet telephony.
subject directory (p. 75) Type of search engine that allows you to search for information by selecting lists of categories or subjects. Why it’s important: Subject directories allow you to look for information by categories such as “Business and Commerce” or “Arts and Humanities.” surf (p. 64) To explore the web by using your mouse to move via a series of connected paths, or links, from one location, or website, to another. Surfing requires a browser. Why it’s important: Surfing enables you to easily find information on the web that’s of interest to you. 3G (third generation) (p. 58) High-speed wireless technology that does not need access points because it uses the existing cellphone system. Why it’s important: The technology is found in many new smartphones and PDAs that are capable of delivering downloadable video clips and high-resolution games. T1 line (p. 56) Traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. Why it’s important: High-capacity T1 lines are used at many corporate, government, and academic sites; these lines provide greater data transmission speeds than do regular modem connections.
Chapter 2
tags (p. 80) Do-it-yourself labels that people can put on anything found on the internet, from articles to photos to videos. Why it’s important: A tag is more powerful than a bookmark, because tags can be shared easily with other people.
112
Transmission Control Protocol/Internet Protocol (TCP/ IP) (p. 62) Protocol that enables all computers to use data transmitted on the internet by determining (1) the type of error checking to be used, (2) the data compression method, if any, (3) how the sending device will indicate that it has finished sending a message, and (4) how the receiving device will indicate that it has received a message. TCP/IP breaks data into packets, which are the largest blocks of data that can be sent across the internet (less than 1,500 characters, or 128
wiL16775_ch02_049-118.indd 112
Web 2.0 (p. 98) Defined as the move toward a more social, collaborative, interactive, and responsive World Wide Web. Why it’s important: As websites have become easier to use, they allow users to better harness the collective power of people, which has led to a “social web” or “social media,” involving blogs, wikis, social networks, and media sharing. The common theme of all these is human interaction. web-based email (p. 82) Type of email in which you send and receive messages by interacting via a browser with a website. Why it’s important: Unlike standard email, web-based email allows you to easily send and receive messages while traveling anywhere in the world and to use any personal computer and browser to access your email. web browser (browser) (p. 64) Software that enables users to locate and view web pages and to jump from one page to another. Why it’s important: Users can’t surf the web without a browser. Examples of browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla Firefox, Opera, and Apple Macintosh Safari. webcasting (p. 95) Service, based on push technology, in which customized text, video, and audio are sent to the user automatically on a regular basis. Why it’s important: Users choose the categories, or the channels, of websites that will automatically send updated information. Thus, webcasting saves time because users don’t have to go out searching for the information. web page (p. 65) Document on the World Wide Web that can include text, pictures, sound, and video. Why it’s important: A website’s content is provided on web pages. The starting page is the home page. web portal (p. 72) Type of gateway website that functions as an “anchor site” and offers a broad array of resources and services, online shopping malls, email support, community forums,
1/22/10 10:37:35 AM
Rev. Confirming Pages
current news and weather, stock quotes, travel information, and links to other popular subject categories. The most popular portals are America Online, Yahoo!, Google, Microsoft Network, Netscape, and Lycos. Why it’s important: Web portals provide an easy way to access the web.
window (p. 87) A rectangular area on a computer display screen that contains a document or activity. Why it’s important: In instant messaging, a window allows a user to exchange IM messages with others almost simultaneously while operating other programs.
website (site) (p. 65) Location of a web domain name in a computer somewhere on the internet. Why it’s important: Websites provide multimedia content to users.
wireless network (p. 58) Network that uses radio waves to transmit data, such as Wi-Fi. Why it’s important: Wireless networks enable people to access the internet without having a cabled or wired connection, using wireless-equipped laptops and smart cellphones.
Wi-Fi (p. 58) Short for “wireless fidelity.” The name given to any of several standards—so-called 802.11 standards—set by the Institute of Electrical and Electronic Engineers for wireless transmission. Why it’s important: Wi-Fi enables people to use their Wi-Fi-equipped laptops to go online wirelessly in certain areas such as airports that have public access to Wi-Fi networks.
XML (extensible markup language) (p. 96) A Web-document tagging and formatting language that two computers can use to exchange information. Why it’s important: XML is an improvement over HTML and enables the creation of RSS newsreaders.
1
LEARNING
STAGE 1 LEARNING MEMORIZATION “I can recognize and recall information.”
Self-Test Questions 1. Today’s data transmission speeds are measured in ________, _____ Kbps, ________, and ________. 2. A(n) ________, ________ connects a personal computer to a cable-TV system that offers an internet connection. 3. A space station that transmits data as microwaves is a ________. 4. A company that connects you through your communications line to its server, which connects you to the internet, is a(n) ________. 5. A rectangular area on the computer screen that contains a document or displays an activity is called a(n) ________. 6. ________ is writing an online message that uses derogatory, obscene, or inappropriate language. 7. A(n) ________ is software that enables users to view web pages and to jump from one page to another.
1 1. Unsolicited email in the form of advertising or chain letters is known as ________. 12. The expression of how much data—text, voice, video, and so on—can be sent through a communications channel in a given amount of time is known as ________. 13. A(n) ________ is a string of characters that points to a specific piece of information somewhere on the web. 14. Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called ________. 15. Using trusted institutional names to elicit confidential information is called ________. 16. The kind of spyware that can record each character you type and transmit that information to someone else on the internet, making it possible for strangers to learn your passwords and other information, is called .
Multiple-Choice Questions 1. Kbps means how many bits per second?
8. A computer with a domain name is called a(n)________.
a. 1 billion
9. ________ comprises the communications rules that allow browsers to connect with web servers.
b. 1 thousand
10. A(n) ________ is a program that adds a specific feature to a browser, allowing it to play or view certain files.
c. 1 million d. 1 hundred e. 1 trillion
The Internet & the World Wide Web
t a g
e
s
CHAPTER REVIEW
113
wiL16775_ch02_049-118.indd 113
1/22/10 10:38:03 AM
Rev. Confirming Pages
2. A location on the internet is called a a. network.
9. Each time you connect to your ISP, it will assign your computer a new address called a(n)
b. user ID.
a. domain.
c. domain.
b. IP address.
d. browser.
c. plug-in.
e. web.
d. POP.
3. In the email address [emailprotected], Kim_Lee is the a. domain.
e. URL (Universal Resource Locator). 10. ISPs that don’t run their own backbones connect to an internet backbone through a
b. URL.
a. NAP network access point.
c. site.
b. web portal.
d. user ID.
c. web browser.
e. location.
d. URL.
4. Which of the following is not one of the four components of a URL?
e. TCP/IP. 1 1. Which of the following is not a protocol?
a. web protocol
a. TCP/IP
b. name of the web server
b. IE
c. name of the browser
c. HTTP
d. name of the directory on the web server
d. SMTP
e. name of the file within the directory 5. Which of the following is the fastest method of data transmission? a. ISDN
12. The sending of phony email that pretends to be from a credit-card company or bank, luring you to a website that attempts to obtain confidential information from you, is called a. spoofing.
b. DSL
b. phishing.
c. modem
c. spamming.
d. T1 line
d. keylogging.
e. cable modem
e. cookies.
6. Which of the following is not a netiquette rule? a. Consult FAQs. b. Flame only when necessary.
True/False Questions T F
d. Avoid huge file attachments.
1. POP3 is used for sending email, and SMTP is used for retrieving email.
T F
e. Avoid sloppiness and errors.
2. A dial-up modem is an ISP (internet service provider).
T F
3. Replying to spam email messages with the statement “remove” will always get spammers to stop sending you unsolicited email.
T F
4. All computer communications use the same bandwidth.
T F
5. A T1 line is the slowest but cheapest form of internet connection.
T F
6. A dynamic IP address gives you faster internet access than a static IP address does.
T F
7. A bookmark lets you return to a favorite website quickly.
T F
8. Radio buttons are used for listening to radio stations on the internet.
T F
9. Spoofing means using fake email sender names.
c. Don’t shout.
7. Which protocol is used to retrieve email messages from the server to your computer? a. HTTP (HyperText Transfer Protocol) b. SMTP (Simple Mail Transfer Protocol) c. POP3 (Post Office Protocol version 3) d. POP (point of presence) 8. Who owns the internet? a. Microsoft b. IBM c. Apple
Chapter 2
d. U.S. government e. No one owns the internet; the components that make up the Internet are owned and shared by thousands of public and private entities.
T F
10. Hypertext refers to text presented with very large letters.
114
wiL16775_ch02_049-118.indd 114
1/8/10 4:04:30 PM
t a g
2
e
s
Rev. Confirming Pages
LEARNING
COMPREHENSION “I can recall information in my own terms and explain it to a friend.”
Short-Answer Questions 1. Name three methods of data transmission that are faster than a regular modem connection. 2. What does log on mean?
8. What expanded functions does IMAP (Internet Message Access Protocol) have? 9. Briefly explain what TCP/IP does. 10. Why was ICANN established?
3. What is netiquette, and why is it important?
1 1. What’s the difference between a dynamic IP address and a static IP address?
4. Briefly define bandwidth.
12. Explain what a blog is.
5. Many web documents are “linked.” What does that mean?
13. State your answer to a person who asks you the question “Who owns the internet?”
6. Compare and contrast a cable modem service to a DSL service.
14. What is B2B commerce? 15. List and briefly describe three kinds of spyware.
t a g
e
s
7. Explain the basics of how the internet works.
3
LEARNING
APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
1. Distance learning uses electronic links to extend college campuses to people who otherwise would not be able to take college courses. Are you, or is someone you know, involved in distance learning? If so, research the system’s components and uses. What hardware and software do students need in order to communicate with the instructor and classmates? What courses are offered? Discuss the pros and cons of distance learning compared to classroom-based learning. 2. It’s difficult to conceive how much information is available on the internet and the web. One method you can use to find information among the millions of documents is to use a search engine, which helps you find web pages on the basis of typed keywords or phrases. Use your browser to go to the Google home page, and click in the Search box. Type the keywords “personal computers”; then click on Google Search, or press the Enter key. How many results did you get? 3. As more and more homes get high-speed broadband internet connections, the flow of data will become exponentially faster and will open up many new possibilities for sharing large files such as video. What types of interactive services can you envision for the future? 4. Draw a diagram of what happens when you log onto your ISP; include all the connections you think possible for your situation. 5. How do the latest cellphones incorporate the internet into their functions? What functions could be improved? Have any of these extra functions affected your daily life? 6. How has the internet affected your life? Start keeping a list.
wiL16775_ch02_049-118.indd 115
7. Email and instant messaging (IM) are ways of sending text messages back and forth to other people on the internet. They seem very similar: in both, you compose a message, and when it’s ready, you send it; and when someone else sends something to you, you receive it on your device and can read it. But in practice, email and IM can be surprisingly different; each has its own rhythm, its own strengths and weaknesses, its own sociology, its own etiquette. Instant messaging is like using the telephone, whereas email is more like corresponding by letter. As you use email and IM during the course of the term, watch for differences between them. Which medium is more appropriate for which kinds of relationships and communications? Which medium is more stressful to use? Which takes more time? Which is more convenient for you? Which one is more useful for getting real work done? Which medium would you use if you knew that whatever you wrote was eventually going to be published in a book? If you were restricted to using only one of these communications methods, which would it be? 8. Internet service providers (ISPs) often place limits on upload speeds, thus making it take much longer to send (upload) a large file than it would take to receive (download) a file of the same size from someone else. Do a comparison between upload and download speeds on your internet connection, perhaps by emailing yourself a file large enough to allow you to notice the difference. Why do you think there is a difference? (Consider both technological and economic factors.) 9. Imagine that an elderly relative wants to start using the internet for the first time. You want to help the person get started, but you need to be careful not to
The Internet & the World Wide Web
Knowledge in Action
115
1/8/10 4:04:30 PM
Rev. Confirming Pages
overwhelm your relative with more information than he or she can use. What three or four things would you tell and show your relative first? What things do you think will be hardest for him or her to master? How do you think using the internet is likely to change this person’s life? If possible, seek out such a relative or neighbor and actually introduce him or her to the internet. 10. As we have discussed in this chapter, the internet is both a goldmine and a minefield. There are vast riches of information, entertainment, education, and communication to be found, but there are also snoopers, spam, spoofing, phishing, spyware, adware, browser hijackers, and key loggers. What should you do to avoid these threats? 11. Some websites require you to register before you are allowed to use them. Others require that you have a paid membership. Others allow limited free access to everyone but require payment for further content. Why do you think different sites adopt these different attitudes toward use of their material?
Web Exercises 1. Some websites go overboard with multimedia effects, while others don’t include enough. Locate a website that you think makes effective use of multimedia. What is the purpose of the site? Why is the site’s use of multimedia effective? Take notes, and repeat the exercise for a site with too much multimedia and one with too little. 2. If you have never done a search before, try this: Find out how much car dealers pay for your favorite cars, what they charge consumers for them, and what you should know about buying a new car. A company called Edmunds publishes a magazine with all that information, but you can get the same information on its website for free. Using the Google search engine (www.google.com), type “automobile buyer’s guide” and Edmunds in the search box, and hit the Google Search button. How many entries did you get? Click on a link to the Edmunds website. Explore the site, and answer the questions at the beginning of this exercise. 3. Ever wanted your own dot-com in your name? Visit these sites to see if your name is still available: www.register.com www.namezero.com www.domainname.com www.checkdomain.com/ www.domaindirect.com/ 4. Interested in PC-to-phone calls through your internet connection? Visit these sites and check out their services: http://voice.yahoo.com/ Chapter 2
www.net2phonedirect.com
116
www.iconnecthere.com www.skype.com www.voip.com/ 5. HTTP (HyperText Transfer Protocol) on the World Wide Web isn’t the only method of browsing and transferring data. FTP is the original method and is still a useful
wiL16775_ch02_049-118.indd 116
internet function. To use FTP, you’ll need an FTP client software program, just as you need a web browser to surf the web. Download one of these shareware clients and visit its default FTP sites, which come preloaded: CuteFtp
www.globalscape.com
WS_FTP
www.ipswitch.com
FTP Voyager
www.ftpvoyager.com
SmartFTP
www.smartftp.com
FileZilla
http://filezilla-project.org/
You will need an FTP client program to upload files to a server if you ever decide to build a website. Some online website builders have browser uploaders, but the conventional method has always been FTP. On some Macintosh computers, an FTP function is built into the Mac OS Finder (for downloading only—you have to use an FTP client to upload). 6. Video chat extensions to chat software are now generally available, and they really constitute at least twoparty videoconferencing. These extensions are available through AIM, Yahoo Messenger, MSN Messenger, and Apple’s iChat. All you need is a camera, a microphone, and an internet connection. Check out these sites and decide if this type of “video chat” interests you. 7. Visit these websites to learn more about creating websites with HTML: www.lissaexplains.com www.make-a-web-site.com www.htmlgoodies.com/primers/html/ www.htmlcodetutorial.com/ www.w3schools.com/html/default.asp Or do an internet search for “html primer,” “learn html,” or “html tutorial.” 8. To learn more about internet conventions, go to: http://members.tripod.com/~paandaa/smiley.htm http://research.microsoft.com/~mbj/Smiley/Smiley.html http://piology.org/smiley.txt www.cygwin.com/acronyms/ 9. Some hobbies have been dramatically changed by the advent of the World Wide Web. Particularly affected are the “collecting” hobbies, such as stamp collecting, coin collecting, antique collecting, memorabilia collecting, plate collecting, and so forth. Choose some such hobby that you know something about or have some interest in. Run a web search about the hobby and see if you can find: a. a mailing list about the hobby. b. an auction site that lists rare items and allows you to bid on them. c. a chat room or other discussion forum allowing enthusiasts to gather and discuss the hobby. d. a site on which someone’s formidable collection is beautifully and proudly displayed. 10. When the web first came into widespread use, the most popular search engine was AltaVista. For several years there were a variety of search engines available, but in recent years one search engine, Google, has become predominant and the word googling has entered the
1/8/10 4:04:31 PM
Rev. Confirming Pages
language as a term that means “to use a search engine to find information.”
Practice “catch-and-release e-commerce” by researching the best deals you can find for:
Visit http://searchenginewatch.com/links/ for a list of many alternative search engines, as well as explanations about how they work and how to get your site listed on them.
a rare or at least out-of-print book that you’d like to have.
11. E-commerce is booming. For any given product you may wish to buy on the web, there may be hundreds or thousands of possible suppliers, with different prices and terms—and not all of them will provide equally reputable and reliable service. The choices can be so numerous that it may sometimes seem difficult to know how to go about choosing a vendor. Websites that do comparison shopping for you can be a great help. Such a service communicates with many individual vendors’ websites, gathering information as it proceeds; it then presents its findings to you in a convenient form. Often, ratings of the various vendors are provided as well, and sales tax and shipping charges are calculated for you.
a high-end DVD recorder. a replacement ink or toner cartridge for your laser or inkjet printer. a pair of athletic shoes exactly like the shoes you currently have. Pursue each transaction right up to the last step before you would have to enter your credit-card number and actually buy the item, and then quit. (Don’t buy it. You can always do that another time.) 12. WebCams, or web cameras, are used by some websites to show pictures of their locations—either live video or still shots. To run your own WebCam site requires a suitable camera and a continuous internet connection. But to look at other people’s WebCam sites requires only a web browser.
Here are a few sites that can assist with comparison shopping:
For example, try searching for “WebCam Antarctica.” Or go to www.webcam-index.com.
www.epinions.com/
Find and bookmark at least one interesting WebCam site in each of the following places: Africa, Asia, South America, Europe, Australia, Antarctica, Hawaii.
www.bizrate.com/ www.pricescan.com/
The Internet & the World Wide Web
http://shopper.cnet.com/
117
wiL16775_ch02_049-118.indd 117
1/8/10 4:04:31 PM
This page intentionally left blank
Rev. Confirming Pages
3 SOFTWARE Tools for Productivity & Creativity
Chapter Topics & Key Questions 3.1
System Software: The Power behind the Power What are three components of system software, what does the operating system (OS) do, and what is a user interface?
3.2
The Operating System: What It Does operating system?
3.3
Other System Software: Device Drivers & Utility Programs acteristics of device drivers and utility programs?
3.4
Common Features of the User Interface What are some common features of the graphical software environment, and how do they relate to the keyboard and the mouse?
3.5
Common Operating Systems portable (embedded) OSs?
3.6
Application Software: Getting Started What are five ways of obtaining application software, tools available to help me learn to use software, three common types of files, and the types of software?
3.7
Word Processing What can I do with word processing software that I can’t do with pencil and paper?
3.8
Spreadsheets What can I do with an electronic spreadsheet that I can’t do with pencil and paper and a standard calculator?
3.9
Database Software What is database software, and what is personal information management software?
3.10
Specialty Software
What are the principal functions of the What are the char-
What are some common desktop, network, and
What are the principal uses of specialty software? 119
wiL16775_ch03_119-192.indd 119
1/8/10 4:31:40 PM
Rev. Confirming Pages
W
more
info! HCI Careers! Could you make a career in HCIassociated areas? Go to: www.sigchi.org and www.hfcareers.com/Default. aspx Do you see some HCI-related areas that you might consider as a major?
more
info! Chapter 3
Who Was John Tukey? The term software was coined by John Tukey. Who was he? Did he coin any other important computer terms? Do a keyword search on his name and see what you can find out.
120
wiL16775_ch03_119-192.indd 120
hat we need is a science called practology, a way of thinking about machines that focuses on how things will actually be used.”
So says Alan Robbins, a professor of visual communications, on the subject of machine interfaces—the parts of a machine that people actually manipulate.1 An interface is a machine’s “control panel,” ranging from the volume and tuner knobs on an old radio to all the switches and dials on the flight deck of a jetliner. You may have found, as Robbins thinks, that on too many of today’s machines—digital watches, cameras, even stoves—the interface is often designed to accommodate the machine or some engineering ideas rather than the people actually using it. Good interfaces are intuitive—that is, based on prior knowledge and experience—like the twin knobs on a 1950s radio, immediately usable by both novices and sophisticates. Bad interfaces, such as a software program with a bewildering array of menus and icons, force us to relearn the required behaviors every time. So how well are computer hardware and software makers doing at giving us useful, helpful interfaces? The answer is, They’re getting better all the time, but they still have some problematic leftovers from the past. For instance, some interface screens have so many icons that they are confusing instead of helpful. And some microcomputer keyboards still come with a SysRq (for System Request) key, which was once used to get the attention of the central computer but now is rarely used. (The Scroll Lock key is also seldom used.) Improving interfaces is the province of human-computer interaction (HCI), which is concerned with the study, design, construction, and implementation of human-centric interactive computer systems. HCI goes beyond improving screens and menus into the realm of adapting interfaces to human reasoning and studying the long-term effects that computer systems have on humans. HCI encompasses the disciplines of information technology, psychology, sociology, anthropology, linguistics, and others. As computers become more pervasive in our culture, HCI designers are increasingly looking for ways to make interfaces easier, safer, and more efficient. In time, as interfaces are refined, computers may become no more difficult to use than a car. Until then, however, for smoother computing you need to know something about how software works. Today people communicate one way, computers another. People speak words and phrases; computers process bits and bytes. For us to communicate with these machines, we need an intermediary, an interpreter. This is the function of software, particularly system software.
3.1 SYSTEM SOFTWARE: The Power behind the Power What are three components of system software, what does the operating system (OS) do, and what is a user interface? As we mentioned in Chapter 1, software, or programs, consists of all the electronic instructions that tell the computer how to perform a task. These instructions come from a software developer in a form (such as a CD or DVD, USB drive, or an internet download) that will be accepted by the computer. Application software is software that has been developed to solve a particular problem for users—to perform useful work on specific tasks or to provide entertainment. System software enables the application software
1/8/10 4:31:41 PM
Rev. Confirming Pages
User
Application Software word processing, spreadsheet, database, graphics, etc.
Device drivers
System Software Operating system
Utility programs
panel 3.1 User
Hardware (computer plus peripheral devices)
Three components of system software System software is the interface between the user and the application software and the computer hardware.
to interact with the computer and helps the computer manage its internal and external resources. We interact mainly with the application software, which interacts with the system software, which controls the hardware. New microcomputers are usually equipped not only with system software but also with some application software. There are three basic components of system software that you need to know about. (• See Panel 3.1.)
•
Operating systems: An operating system is the principal component of system software in any computing system.
• •
Device drivers: Device drivers help the computer control peripheral devices. Utility programs: Utility programs are generally used to support, enhance, or expand existing programs in a computer system. A fourth type of system software, language translators, is covered elsewhere.
3.2
THE OPERATING SYSTEM: What It Does
The operating system (OS), also called the software platform, consists of the low-level, master system of programs that manage the basic operations of the computer. These programs provide resource management services of many kinds. In particular, they handle the control and use of hardware resources, including disk space, memory, CPU time allocation, and peripheral devices. Every general-purpose computer must have an operating system to run other programs. The operating system allows you to concentrate on your own tasks or applications rather than on the complexities of managing the computer. Each application program is written to run on top of a particular operating system.
wiL16775_ch03_119-192.indd 121
Software
What are the principal functions of the operating system?
121
1/8/10 4:31:42 PM
Rev. Confirming Pages
S u rv i v al Ti p New Software & Compatibility Pay attention to compatibility requirements when you obtain new software. The system requirements for running the software will be listed on the box or included with the downloaded information. When it is time to update the software, you can usually do that by paying a small upgrade fee to the software manufacturer and then downloading the new version and/or obtaining a new CD/DVD.
more
info! If Windows doesn’t boot properly, it may go into Safe Mode. You can also get into Safe Mode by pressing the F8 key during the boot process. Safe Mode is used for diagnosing problems and fixing them. When the system is in Safe Mode, only the essential parts of the system work—monitor, mouse, keyboard—and there are no fancy graphics on the screen. www.computerhope.com/ issues/chsafe.htm http://computer.howstuffworks. com/question575.htm
Different sizes and makes of computers have their own operating systems. For example, Cray supercomputers use UNICOS and COS; IBM mainframes use MVS and VM; PCs run Windows or Linux and Apple Macintoshes run the Macintosh OS. Cellphones have their own operating systems, such as Apple’s iPhone OS 3.0, which works with iPhones, or Google and the Open Handset Alliance’s Android operating system for mobile devices.2 In general, an operating system written for one kind of hardware will not be able to run on another kind of machine. In other words, different operating systems are mutually incompatible. Microcomputer users may readily experience the aggravation of such incompatibility when they acquire a new or used microcomputer. Do they get an Apple Macintosh with Macintosh system software, which won’t always run PC programs? Or do they get a PC (such as Dell or Hewlett-Packard), which won’t run Macintosh programs? Before we try to sort out these perplexities, we should have an idea of what operating systems do. We consider:
• • • • •
Booting CPU management File management Task management Security management
Booting What is the boot process? The work of the operating system begins as soon as you turn on, or “boot,” the computer. Booting is the process of loading an operating system into a computer’s main memory. This loading is accomplished automatically by programs stored permanently in the computer’s electronic circuitry (called read-only memory, or ROM, described in Chapter 4). When you turn on the machine, programs called diagnostic routines test the main memory, the central processing unit, and other parts of the system to make sure they
Once you are in Safe Mode, you use the Device Manager to help you fix problems: https://kb.wisc.edu/helpdesk/ page.php?id⫽502
more
info!
Chapter 3
Going Backward
122
Another way to get out of a system problem is to use System Restore (see right), found by clicking on the System icon, via Start, Control Panel. Restore System restores the system files to a previous date and/ or time. Your data files (for example, documents) are not affected, and you can customize your System Restore points via the System restore icon.
wiL16775_ch03_119-192.indd 122
1/18/10 4:29:16 PM
Rev. Confirming Pages
1
When you turn on the computer . . .
Hard disk
2
5
. . . the processor (CPU) automatically begins . . .
RAM
Processor
3
. . . executing the part of the operating system’s start-up system (BIOS) located in ROM.
. . . then they pass control to the OS.
ROM BIOS
4
These instructions help load the operating system from the hard disk into RAM (main memory), and . . .
panel 3.2 Booting What happens when you turn on the computer
are running properly. Next, BIOS (for “basic input/output system”) programs are copied to main memory and help the computer interpret keyboard characters or transmit characters to the display screen or to a disk. Then the boot program obtains the operating system, usually from the hard disk, and loads it into the computer’s main memory, where it remains until you turn the computer off. (• See Panel 3.2.) COLD BOOTS & WARM BOOTS When you power up a computer by turning on the power “on” switch, this is called a cold boot. If your computer is already on and you restart it, this is called a warm boot or a warm start. Until recently, computer users have had to endure up to three minutes of waiting while they waited for their machines to boot up. In 2009, however, new software—such as Presto, Hyperspace, and Splashtop—was introduced that allows for “instant on” computing (although there are still problems to be worked out).3 THE BOOT DISK Normally, your computer would boot from the hard drive, but if that drive is damaged, you can use a disk called a boot disk to start up your computer. A boot disk is a floppy disk or a CD that contains all the files needed to launch the OS. When you insert the boot disk into your computer’s floppy or CD drive, you force-feed the OS files to the BIOS, thereby enabling it to launch the OS and complete the start-up routine. After the OS loads completely, you then can access the contents of the Windows drive, run basic drive maintenance utilities, and perform troubleshooting tasks that will help you resolve the problem with the drive.
How does CPU management work? The central component of the operating system is the supervisor. Like a police officer directing traffic, the supervisor, or kernel, manages the CPU (the central processing unit or processor, as mentioned in Chapter 1). It remains in memory (main memory or primary storage) while the computer is running and directs other “nonresident” programs (programs that are not in memory) to perform tasks that support application programs.
wiL16775_ch03_119-192.indd 123
Software
CPU Management
123
1/8/10 4:31:44 PM
Rev. Confirming Pages
MEMORY MANAGEMENT The operating system also manages memory—it keeps track of the locations within main memory where the programs and data are stored. It can swap portions of data and programs between main memory and secondary storage, such as your computer’s hard disk, as so-called virtual memory. This capability allows a computer to hold only the most immediately needed data and programs within main memory. Yet it has ready access to programs and data on the hard disk, thereby greatly expanding memory capacity. GETTING IN LINE: QUEUES, BUFFERS, & SPOOLING Programs and data that are to be executed or processed wait on disk in queues (pronounced “Qs”). A queue is a first-in, first-out sequence of data and/or programs that “wait in line” in a temporary holding place to be processed. The disk area where the programs or documents wait is called a buffer. Print jobs are usually spooled—that is, placed—into a buffer, where they wait in a queue to be printed. This happens because the computer can send print jobs to the printer faster than the printer can print them, so the jobs must be stored and then passed to the printer at a rate it can handle. Once the CPU has passed a print job to the buffer, it can take on the next processing task. (The term spooling dates back to the days when print jobs were reeled, or copied, onto spools of magnetic tape, on which they went to the printer.)
File Management What should I know about file management? A file is (1) a named collection of data (data file), or (2) a program (program file) that exists in a computer’s secondary storage, such as a hard disk or CD/DVD. Examples of data files are a word processing document, a spreadsheet, images, songs, and the like. Examples of program files are a word processing program or spreadsheet program. (We cover files in more detail in Chapter 4.)
panel 3.3 Directories and subdirectories
Root Directory
C:/
My Music
My Pictures My Documents
Files
Subdirectories
Chapter 3
Term paper
124 Section 1 . . .
wiL16775_ch03_119-192.indd 124
Letters
FINDING & HANDLING FILES Files containing programs and data are located in many places on your hard disk and other secondary storage devices. The operating system records the storage location of all files. If you move, rename, or delete a file, the operating system manages such changes and helps you locate and gain access to it. For example, you can copy, or duplicate, files and programs from one disk to another. You can back up, or make a duplicate copy of, the contents of a disk. You can erase, or remove, from a disk any files or programs that are no longer useful. You can rename, or give new file names to, the files on a disk. ORGANIZING FILES: DIRECTORIES, SUBDIRECTORIES, & PATHS The operating system’s file system arranges files in a hierarchical manner, first into directories (also called folders) and then into subdirectories. (• See Panel 3.3.) The topmost directory is called the root directory; a directory below another directory is called a subdirectory; any directory above a subdirectory is called its parent directory.
1/8/10 4:31:46 PM
Rev. Confirming Pages
To find a particular file in an operating system’s file system, you type in the file’s pathname. The path is the route through the file system. A simple example of a pathname is C:mydocuments/ termpaper/section1.doc. “C” refers to the hard disk; “mydocuments” is the root directory, or main folder; “term paper” is the subdirectory, or subfolder; “section 1” is the name of the file; and “doc” is a file extension that indicates what type of file it is (document).
What is the purpose of task management? A computer is required to perform many different tasks at once (multitasking). In word processing, for example, it accepts input data, stores the data on a disk, and prints out a document—seemingly simultaneously. Most desktop and laptop operating systems are single-user systems that can handle more than one program at the same time—word processing, spreadsheet, database searcher. Each program is displayed in a separate window on the screen. Other operating systems (multiuser systems) can accommodate the needs of several different users at the same time. All these examples illustrate task management (see left). A task is an operation such as storing, printing, or calculating. Both Windows (left) and the Mac operating system (right) provide a Find (Search) function for finding files if you don’t know the pathname.
MULTITASKING: HANDLING MORE THAN ONE PROGRAM CONCURRENTLY Multitasking is the execution of two or more programs by one user almost at the same time on the same computer with one central processor. You may be writing a report on your computer with one program while another program plays a music CD. How does the computer handle both programs at once? The answer is that the operating system directs the processor to spend a predetermined amount of time executing the instructions for each program, one at a time. Thus, a small part of the first program is processed, and then the processor moves to the remaining programs, one at a time, processing small parts of each. The cycle is repeated until processing is complete. Because the processor is usually very fast, it may appear that all the programs are being executed at the same time. However, the processor is still executing only one instruction at a time.
wiL16775_ch03_119-192.indd 125
more
info! Task Manager If you want to see a list of processes being executed by your system, open the Task Manager in Windows by holding down the Ctrl, Alt, and Del keys.
Software
Task Management
125
1/8/10 4:31:46 PM
Rev. Confirming Pages
The password is usually displayed as asterisks or dots, so that anyone looking over your shoulder—a “shoulder surfer”—cannot read it.
In Windows, you can access the Security Center via the Control Panel to control additional security features.
Security Management How does the OS help keep my computer secure? S u rv i v al Ti p Is Your Password Guessable? Don’t choose a password that could be easily guessed. Examples of weak passwords are birth date, anniversary date, boyfriend/girlfriend name, city/town name, pet’s name, fad words/expressions, or names of celebrities or famous movie/book characters. Instead, use meaningless letters and numbers.
Operating systems allow users to control access to their computers—an especially important matter when several people share a computer or the same computer network. Users gain access in the same manner as accessing their email—via a user name (user ID) and a password. As we stated in Chapter 2, a password (above left) is a special word, code, or symbol required to access a computer system. If you are using a computer at work, you may give yourself a password. When you first boot up a new personal computer, the OS will prompt you to choose a user name and a password. Then, every time after that, when you boot up your computer, you will be prompted to type in your user name and password. Some OSs even allow you to protect individual files with separate access passwords. (The Help feature explains how to change or turn off your password.) Computer systems and security issues have become complicated and critically important. We discuss this subject in more detail in Chapter 6.
3.3 OTHER SYSTEM SOFTWARE: Device Drivers & Utility Programs S u rv i v al Ti p
Chapter 3
Update Your Drivers You should regularly (once a year, say) update your drivers. To do so, visit the websites of your peripheral devices’ manufacturers and download any updates. You can also buy utilities for backing up and restoring drivers, such as 3D2F.com Software Directory (http://3d2f.com/ programs/54-281-my-driversdownload.shtml) or DriverSoft.com’s Driver Genius (www. driver-soft.com).
126
wiL16775_ch03_119-192.indd 126
What are the characteristics of device drivers and utility programs? We said that the three principal parts of system software are the operating system, device drivers, and utility programs. Let’s now consider the last two.
Device Drivers: Running Peripheral Hardware Why do I need device drivers? Device drivers are specialized software programs that allow input and output devices to communicate with the rest of the computer system. Each device’s brand and model are supported by a different driver that works with only one operating system. Many basic device drivers come with the system software when you buy a computer, and the system software will guide you through choosing and installing the necessary drivers. If, however, you buy a new peripheral device, such as a mouse, a scanner, or a printer, the package
1/8/10 4:31:47 PM
Rev. Confirming Pages
will include a device driver for the device (probably on a CD or DVD). Most new operating systems recognize many new hardware devices on their own and automatically install them. If your OS does not recognize your new hardware, it will display a message and ask you to install the driver from the CD that came with your hardware. (• See Panel 3.4.)
Utilities: Service Programs Which utilities would be most important to me? Utility programs, also known as service programs, perform tasks related to the control and allocation of computer resources. They enhance existing functions or provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software. However, they may also be bought separately as external utility programs (such as Norton SystemWorks and McAfee Utilities). Among the tasks performed by utilities are backing up data, compressing files, recovering lost data, and identifying hardware problems. (See below.)
panel 3.4 Device driver selection
PRACTICAL ACTION Utility Programs
Backup
Suddenly your hard-disk drive fails, and you have no more programs or files. Fortunately, we hope, you have used a backup utility to make a backup, or duplicate copy, of the information on your hard disk. The backup can be made to
an external hard drive, an offsite networked (online) site, or other choices discussed later in the book. Examples of freestanding backup utilities are Norton Ghost (from Symantec) and DT Utilities PC Backup.
Data Recovery One day in the 1970s, so the story goes, programming legend Peter Norton was working at his computer and accidentally
Software
U
tility programs are incorporated into the operating system. Others, such as antivirus programs, are sold as stand-alone programs. Some important utility programs are as follows:
127
wiL16775_ch03_119-192.indd 127
1/8/10 4:31:49 PM
Rev. Confirming Pages
deleted an important file. This was, and is, a common enough error. However, instead of reentering all the information, Norton decided to write a computer program to recover the lost data. He called the program “The Norton Utilities.” Ultimately it and other utilities made him very rich. A data-recovery utility is used to restore data that has been physically damaged or corrupted. Data can be damaged by viruses (see following), bad software, hardware failure, and power fluctuations that occur while data is being written/recorded.
Virus Protection If there’s anything that can make your heart sink faster than the sudden failure of your hard disk, it may be the realization that your computer system has been invaded by a virus. A virus consists of hidden programming instructions that are buried within an application or system program. Sometimes viruses copy themselves to other programs, causing havoc. Sometimes the virus is merely a simple prank that pops up in a message. Other times, however, it can destroy programs and data and wipe your hard disk clean. Viruses are spread when people exchange disks or CDs, download information from the internet and other computer networks, or open files attached to email. (• See Panel 3.5.) You must, therefore, install antivirus software. Antivirus software is a utility program that scans all disks and memory to detect viruses. Some utilities destroy the virus on the spot. Others notify you of possible viral behavior. Because new viruses are constantly being created, you need the type of antivirus software that can detect unknown viruses. Examples of antivirus software are Symantec’s Norton AntiVirus, Bit Defender, Avast!, and McAfee’s VirusScan. New viruses appear every day, so it’s advisable to look for an antivirus utility that offers frequent online updates without additional cost. We discuss viruses again in more detail in Chapter 6.
Chapter 3
Data Compression
128
As you continue to store files on your hard disk, it will eventually fill up. You then have several choices: You can delete old files to make room for the new. You can buy a new hard-disk cartridge S u rv i v al Ti p drive and some cartridges and transfer the old files and programs to those. Or Temp File Removal you can use a data comIn Windows, to remove tempression utility, such as porary and unnecessary files from your hard drive, Click PK Zip, ZipIt, WinZip, or Start, All Programs, AccesStuffIt. (As a result of the sories, System Tools, and Disk name “Zip,” people have Cleanup. Put checks in the come to refer to comboxes next to the types of pressing a file as “zipping” file you want to delete, and and decompressing a file click OK. as “unzipping.”)
wiL16775_ch03_119-192.indd 128
Data compression utilities remove redundant elements, gaps, and unnecessary data from a computer’s storage space so that less space (fewer bits) is required to store or transmit data. With a data compression utility, files can be made more compact for storage on your harddisk drive. Given today’s huge-capacity hard drives, you may never fill yours up. Still, data compression remains an issue. With the increasing use of large graphic, sound, and video files, data compression is necessary both to reduce the storage space required and to reduce the time required to transmit such large files over a network. As the use of sophisticated multimedia becomes common, compression and decompression are being increasingly taken over by built-in hardware boards that specialize in this process. That will leave the main processor free to work on other things, and compression/decompression software utilities will become obsolete.
File Defragmentation Over time, as you delete old files from your hard disk and add new ones, something happens: The files become fragmented. Fragmentation is the scattering of portions of files about the disk in nonadjacent areas, thus greatly slowing access to the files. When a hard disk is new, the operating system puts files on the disk contiguously (next to one another). However, as you update a file over time, new data for that file is distributed to unused spaces. These spaces may not be contiguous to the older data in that file. It takes the operating system longer to read these fragmented files. A defragmenter utility program, commonly called a “defragger,” will find all the scattered files on your hard disk and reorganize them as contiguous files. Defragmenting the files will speed up the drive’s operation.
Disk Scanner (ScanDisk or Check Disk) & Disk Cleanup These utilities detect and correct certain types of common problems on hard drives and CDs and search for and remove unnecessary files, such as temporary files, or “temp files.” Both Windows and the applications you run create temp files needed only for short tasks and system restore (return to normal operating conditions) after certain types of system problems. These files are stored in the Temp folder. For example, when you create a word document, Word will store a temp file version of it in the Temp folder. When you save this document, Word will save it to the location you designated and delete the temp file. The computer should delete temp files when a program is closed, but this doesn’t always happen. Also, files will be left in the Temp folder if the computer crashes. Thus temp files can accumulate in the Temp folder and take up space. Many other utilities exist, such as those for transferring files back and forth between a desktop microcomputer and a laptop and for troubleshooting various types
1/8/10 4:31:50 PM
Rev. Confirming Pages
of system problems. Generally, the companies selling utilities do not manufacture the operating system. OS developers usually eventually incorporate the features of a proven utility as part of their product. (Note: Independent, or external, utilities must be compatible with your system software; check the software packaging and user documentation.)
For some unusual utilities, go to: NimiVisuals www.mynimi.net
more
info!
Defraggler www.defraggler.com FileAlyzer www.safer-networking. org/en/filealyzer Edgeless www.fxc.btinternet. co.uk/assistive.htm
PC Tune-Up: Stop at the Pitstop
Fences www.stardock.com/ products/fences
To find out what problems your PC has and to learn which utilities might improve its performance, go to:
MaxiVista www.maxivista.com
www.pcpitstop.com/default.asp
FreeOTFE www.freeotfe.org
and try their free computer scans.
DoubleKiller www.bigbang enterprises.de/en/doublekiller JPEGsnoop www.impulseadven ture.com/photo/jpeg-snoop.html
MarxioTimer www.marxio-tools.net/en/marxio-times.htm Edison www.verdiem.com/edison.asp
• If you download or install software from a network server (including the internet), bulletin board, or online service, always run virus scanning software on the directory you place the new files in before executing them.
panel 3.5 Preventing viruses
• Make sure you have a disk (e.g., CD) with your virus program. • Do not open any email from unknown sources. • Do not open email attachments from unknown sources. • Scan files attached to email before you open them. • If your internet connection is always on (for example, if you have a cable modem), purchase special software called firewall software to keep other internet users out of your computer. • Never start your computer from an unknown floppy disk. Always make sure your floppy-disk drive is empty before turning on or restarting your computer. • Run virus-scanning software on a new floppy disk or CD before executing, installing, or copying its files into your system.
Sur v iv a l T ip Free Antivirus Software For a list of free antivirus software, see: www.thefreecountry.com/ security/antivirus.shtml
3.4 COMMON FEATURES OF THE USER INTERFACE
The first thing you look at when you call up any system software on the screen is the user interface—the user-controllable display screen that allows you to communicate, or interact, with the computer. Like the dashboard on a car, the user interface has gauges that show you what’s going on and switches and buttons for controlling what you want to do. From this screen, you choose the application programs you want to run or the files of data you want to open.
wiL16775_ch03_119-192.indd 129
Software
What are some common features of the graphical software environment, and how do they relate to the keyboard and the mouse?
129
1/18/10 4:29:21 PM
Rev. Confirming Pages
Using Keyboard & Mouse How do I use the keys on my keyboard and my mouse as a user interface? You can interact with the display screen using the keys on your keyboard. As well as having letter, number, and punctuation keys and often a calculatorstyle numeric keypad, computer keyboards have special-purpose and function keys. (• See Panel 3.6.) SPECIAL-PURPOSE KEYS Special-purpose keys are used to enter, delete, and edit data and to execute commands. An example is the Esc (for “Escape”) key, which tells the computer to cancel an operation or leave (“escape from”) the current mode of operation. The Enter, or Return, key, which you will use often, tells the computer to execute certain commands and to start new paragraphs in a document. Commands are instructions that cause the software to perform specific actions. Special-purpose keys are generally used the same way regardless of the application software package being used. Most keyboards include the following special-purpose keys: Esc, Ctrl, Alt, Del, Ins, Home, End, PgUp, PgDn, Num Lock, and a few others. (For example, Ctrl means “Control,” Del means “Delete,” Ins means “Insert.”) FUNCTION KEYS Function keys, labeled “F1,” “F2,” and so on, are positioned along the top or left side of the keyboard. They are used to execute commands specific to the software being used. For example, one application software package may use F6 to exit a file, whereas another may use F6 to underline a word. MACROS Sometimes you may wish to reduce the number of keystrokes required to execute a command. To do this, you use a macro. A macro, also called a keyboard shortcut, is a single keystroke or command—or a series
panel 3.6 Keyboard functions
Escape Key
Function Keys
You can press Esc to quit a task you are performing.
These keys let you quickly perform specific tasks. For example, in many programs you can press F1 to display help information.
Esc
Caps Lock and Shift Keys These keys let you enter text in uppercase (ABC) and lowercase (abc) letters.
~
Chapter 3
Press Shift in combination with another key to type an uppercase letter.
130
Ctrl and Alt Keys You can use the Ctrl or Alt key in combination with another key to perform a specific task. For example, in some programs, you can press Ctrl and S to save a document.
wiL16775_ch03_119-192.indd 130
!
Caps Lock
Ctrl
F3 #
2
Q
Tab
Shift
F2
@
1
`
Press Caps Lock to change the case of all letters you type. Press the key again to return to the original case.
F1
$
3
W A
S
R
T
Y
U
(
I
N
M
— –
)
P
O
: ;
L
K
J
F9
9
8
H
B
F8
*
7
G V
F7
&
6
F C
F6
^
5
D X
F5 %
4
E
Z
F4
< ,
Alt
Alt
Windows Key You can press the Windows key to quickly display the Start menu when using many Windows operating systems.
? /
> .
Spacebar You can press the Spacebar to insert a blank space.
1/8/10 4:31:52 PM
Rev. Confirming Pages
of keystrokes or commands—used to automatically issue a longer, predetermined series of keystrokes or commands. Thus, you can consolidate several activities into only one or two keystrokes. The user names the macro and stores the corresponding command sequence; once this is done, the macro can be used repeatedly. (To set up a macro, pull down the Help menu and type in macro.) Although many people have no need for macros, individuals who find themselves continually repeating complicated patterns of keystrokes say they are quite useful. THE MOUSE & POINTER You will also frequently use your mouse to interact with the user interface. The mouse allows you to direct an on-screen pointer to perform any number of activities. The pointer usually appears as an arrow, although it changes shape depending on the application. The mouse is used to move the pointer to a particular place on the display screen or to point to little symbols, or icons. You can activate the function corresponding to the symbol by pressing (“clicking”) buttons on the mouse. Using the mouse, you can pick up and slide (“drag”) an image from one side of the screen to the other or change its size. (• See Panel 3.7 on page 132.)
The GUI: The Graphical User Interface How does a GUI make life easier for me? In the beginning, personal computers had command-driven interfaces, which required that you type in complicated-looking instructions (such as copy a: \ filename c: \ to copy a file from a floppy disk to a hard disk). In the next version, they also had menu-driven interfaces, in which you could use the arrow keys on your keyboard (or a mouse) to choose a command from a menu, or a list of activities. Today the computer’s “dashboard” is usually a graphical user interface (GUI) (pronounced “gooey”), which allows you to use a mouse or keystrokes
" ' ? /
Alt
F12
Backspace } ]
{ [
: ;
These lights indicate whether the Num Lock or Caps Lock features are on or off.
F11 + =
— –
Status Lights
You can press Backspace to remove the character to the left of the cursor.
| \
Delete Key Print Screen Insert Delete
Scroll Lock
Pause
Home End
Enter
Page Up Page Down
Num Lock
Caps Lock
/
Num Lock
7
Home
4
Numeric Keypad
+
Pg Up
6 2
End
Ctrl
9
5
1
Shift
–
* 8
You can press Delete to remove the character to the right of the cursor.
Scroll Lock
3
Pg Dn
.
Enter
Del
Arrow Keys
Application Key You can press the Application key to quickly display the shortcut menu for an item on your screen. Shortcut menus display a list of commands commonly used to complete a task related to the current activity.
wiL16775_ch03_119-192.indd 131
When the Num Lock light is on, you can use the number keys (0 through 9) to enter numbers. When the Num Lock light is off, you can use these keys to move the cursor around the screen. To turn the light on or off, press Num Lock.
Enter Key You can press Enter to tell the computer to carry out a task. In a word processing program, press this key to start a new paragraph.
These keys let you move the cursor around the screen.
Software
F10
F9
Backspace Key
131
1/8/10 4:31:55 PM
Rev. Confirming Pages
panel 3.7
Term
Mouse language
Action
Point
Click Click
Double-click Click
Purpose
Move mouse across desk to guide pointer to desired spot on screen. The pointer assumes different shapes, such as arrow, hand, or I-beam, depending on the task you’re performing.
To execute commands, move objects, insert data, or similar actions on screen.
Press and quickly release left mouse button.
To select an item on the screen.
Quickly press and release left mouse button twice.
To open a document or start a program.
Position pointer over item on screen, press and hold down left mouse button while moving pointer to location in which you want to place item, then release.
To move an item on the screen.
Press and release right mouse button.
To display a shortcut list of commands, such as a pop-up menu of options.
Click
Drag and drop
Right-click
Click
to select icons (little symbols) and commands from menus (lists of activities). The GUIs on the PC and on the Apple Macintosh (which was the first easy-to-use personal computer available on a wide scale) are somewhat similar. Once you learn one version, it’s fairly easy to learn the other. However, the bestknown GUI is that of Microsoft Windows system software. (• See Panel 3.8.) DESKTOP, ICONS, & MENUS Three features of a GUI are the desktop, icons, and menus.
•
Desktop: After you turn on the computer, the first screen you will encounter is the desktop (see right), a term that embodies the idea of folders of work (memos, schedules, to-do lists) on a businessperson’s desk. The desktop, which is the system’s main interface screen, displays pictures (icons) that provide quick access to programs and information.
Chapter 3
•
132
Icons and rollovers: We’re now ready to give a formal definition: Icons are small pictorial figures that represent Icon: Symbol representing a program, data file, or programs, data files, or procedures. For example, a procedure. Icons are designed to communicate trash can represents a place to dispose of a file you no their function, such as a floppy disk for saving. longer want. If you click your mouse pointer on a little picture of a printer, you can print out a document. One of the most important icons is the folder, a representation of a manila folder; folders hold the files in which you store your documents and other data.
Rollover: When you roll your mouse pointer over an icon or graphic (in this case, the “Save” icon), a small box with text appears that briefly explains its function.
wiL16775_ch03_119-192.indd 132
Of course, you can’t always be expected to know what an icon or graphic means. A rollover feature, a small text box explaining the icon’s function, appears when you roll the mouse pointer over the icon. A rollover may also produce an animated graphic.
1/8/10 4:31:57 PM
Rev. Confirming Pages
Outlook Express: Part of Microsoft’s browser, Internet Explorer, that enables you to use email. Microsoft Network: Click here to connect to Microsoft Network (MSN), the company’s online service. My Documents: Where your documents are stored (unless you specify otherwise), in folders you create and name. Network Neighborhood: If your PC is linked to a network, click here to get a glimpse of everything on the network. My Computer: Gives you a quick overview of all the files and programs on your PC, as well as available drives (A:, C:, D:, E:). Menu bar
Start button: Click for an easy way to start using the computer.
Title bar
Start menu: After clicking on the Start button, a menu appears, giving you a quick way to handle common tasks. You can launch programs, call up documents, change system settings, get help, and shut down your PC.
Documents: Multitasking capabilities allow users to smoothly run more than one program at once.
The opening screen is the desktop.
Minimize Maximize Close
Taskbar: Gives you a log of all programs you have opened. To switch programs, click on the icon buttons on the taskbar.
Multimedia: Windows XP features sharp graphics and video capabilities.
Title bar
Menu bar
Document
panel 3.8 Software
PC graphical user interface (desktop) (Top) Windows XP; (bottom) Windows Vista. (Icons may differ on your PC.)
133 Start menu
Taskbar
Opening desktop screen
wiL16775_ch03_119-192.indd 133
1/8/10 4:32:05 PM
Rev. Confirming Pages
•
Pull-down menu: When you click the mouse on the menu bar, a list of options appears or pulls down like a shade.
Menus: Like a restaurant menu, a menu offers you a list of options to choose from—in this case, a list of commands for manipulating data, such as Print or Edit. Menus are of several types. Resembling a pull-down window shade, a pull-down menu, also called a drop-down menu, is a list of options that pulls down from the menu bar at the top of the screen. For example, if you use the mouse to “click on” (activate) a command (for example, File) on the menu bar, you will see a pull-down menu offering further commands.
Choosing one of these options may produce further menus called cascading menus (left), menus that seem to fly back to the left or explode out to the right, wherever there is space. A pull-up menu is a list of options that pulls up from the menu bar at the bottom of the screen. In Windows XP, a pull-up menu appears in the lower left-hand corner when you click on the Start button. A pop-up menu is a list of command options that can “pop up” anywhere on the screen when you click the right mouse button. In contrast to pull-down or pull-up menus, pop-up menus are not connected to a menu bar. DOCUMENTS, TITLE BARS, MENU BARS, TOOLBARS, TASKBARS, & WINDOWS (SMALL “W”) If you want to go to a document, there are three general ways to begin working from a typical Microsoft Windows GUI desktop: (1) You can click on the Start button at the lower left corner and then make a selection from the pull-up menu that appears. (2) Or you can click on the My Computer icon on the desktop and pursue the choices offered there. (3) Or you can click on the My Documents icon and then on the folder that contains the document you want. In each case, the result is the same: the document is displayed in the window. (• See Panel 3.9.)
Chapter 3
Pull-up menu: When you click the mouse pointer on the Start button, it produces a pull-up menu offering access to programs and documents.
Cascading menu: Moving the mouse pointer to an option on the pull-up menu produces a flyout menu with more options.
134
wiL16775_ch03_119-192.indd 134
1/8/10 4:32:08 PM
Rev. Confirming Pages
From Start menu
panel 3.9 Three ways to go to a document in Windows XP
Click on the Start button to produce Start menu, then go to Documents option, then to My Documents. Click on the item you want. Click on C, which opens a window that provides access to information stored on your hard disk. From My Computer
Click on the My Documents icon, which opens a window providing access to document files and folders.
Click on the My Computer icon, which opens a window that provides access to information on your computer.
Click on My Documents, which opens a window that shows the names of your documents/ document folders.
Click on document folder or ...
Click on a document to open it.
Software
Click on the document you want.
From My Documents icon
135
wiL16775_ch03_119-192.indd 135
1/8/10 4:32:10 PM
Rev. Confirming Pages
Title bar Desktop icons Menu bar
Folder Toolbar
Windows XP taskbar
panel 3.10
Chapter 3
“Bars” and windows functions
136
wiL16775_ch03_119-192.indd 136
Once past the desktop—which is the GUI’s opening screen—if you click on the My Computer icon, you will encounter various “bars” and window functions. (• See Panel 3.10.)
•
Title bar: The title bar runs across the very top of the display window and shows the name of the folder you are in—for example, “My Computer.”
•
Menu bar: Below the title bar is the menu bar, which shows the names of the various pull-down menus available. Examples of menus are File, Edit, View, Favorites, Tools, and Help.
•
Toolbar: The toolbar, below the menu bar, displays menus and icons representing frequently used options or commands. An example of an icon is the picture of two pages in an open folder with a superimposed arrow, which issues a Copy to command.
•
Taskbar: In Windows, the taskbar is the bar across the bottom of the desktop screen that contains the Start button and that appears by default. Small boxes appear here that show the names of open files. You can switch among the files by clicking on the boxes.
•
Windows: When spelled with a capital “W,” Windows is the name of Microsoft’s system software (Windows 95, 98, Me, XP, Vista, 7, and so on). When spelled with a lowercase “w,” a window is a rectangular frame on the computer display screen. Through this frame you can view a file of data—such as a document, spreadsheet, or database—or an application program.
In the upper right-hand corner of the Windows title bar are some window controls—three icons that represent Minimize, Maximize and Restore, and Close. By clicking on these icons, you can minimize the window (shrink it down to an icon at the bottom of the screen), maximize it (enlarge it or restore
1/8/10 4:32:11 PM
Rev. Confirming Pages
it to its original size), or close it (exit the file and make the window disappear). You can also use the mouse to move the window around the desktop, by clicking on and dragging the title bar.
Sur v iv a l T ip Don’t Trash Those Icons
Minimize to Taskbar Maximize/ Restore Close
Finally, you can create multiple windows to show programs running concurrently. For example, one window might show the text of a paper you’re working on, another might show the reference section for the paper, and a third might show something you’re downloading from the internet. If you have more than one window open, click on the Maximize button of the window you want to be the main window to restore it.
Don’t delete unwanted software programs by using the mouse to drag their icons to the recycle bin. This might leave behind system files that could cause problems. Instead, use an “uninstall” utility. In Windows, go to Start, Settings, Control Panel; doubleclick Add/Remove Programs. Find the program you want to delete, and click the Add/ Remove button.
The Help Command What can the Help command do for me? Don’t understand how to do something? Forgotten a command? Accidentally pressed some keys that messed up your screen layout and you want to undo it? Most toolbars contain a Help command—a command generating a table of contents, an index, and a search feature that can help you locate answers. In addition, many applications have context-sensitive help, which leads you to information about the task you’re performing. (• See Panel 3.11.) The Help menu provides a list of help options. Index: Lets you look up Help topics in alphabetical order
Sur v iv a l T ip Getting Help On Windows computers, you can find the Help area by pressing the F1 key. Or use the mouse to click on Start in the lower left screen; then click on Help. On the Macintosh, Help is located under the main menu bar.
Search: Lets you hunt for Help topics that contain particular words or phrases
Question mark icon: Double-click to see Help screens.
Help features (Top) The XP Help command yields a pull-down menu; (bottom) the Help screen for Vista
wiL16775_ch03_119-192.indd 137
Software
panel 3.11
137
1/8/10 4:32:12 PM
Rev. Confirming Pages
3.5 COMMON OPERATING SYSTEMS What are some common desktop, network, and portable (embedded) OSs?
panel 3.12 DOS screen
The platform is the particular processor model and operating system on which a computer system is based. For example, there are “Mac platforms” (Apple Macintosh) and “Windows platforms” or “PC platforms” (for personal computers such as Dell, Compaq, Lenovo, Gateway, and Hewlett-Packard, which run Microsoft Windows). Sometimes the latter are called Wintel platforms, for “Windows + Intel,” because they often combine the Windows operating system with the Intel processor chip. (We discuss processors in Chapter 4.) Despite the dominance of the Windows platform, some so-called legacy systems are still in use. A legacy system is an older, outdated, yet still functional technology, such as the DOS operating system. DOS (rhymes with “boss”)—for Disk Operating System—was the original operating system produced by Microsoft and had a hard-to-use command-driven user interface. (• See Panel 3.12.) Its initial 1982 version was designed to run on the IBM PC as PC-DOS. Later Microsoft licensed the same system to other computer makers as MS-DOS. Here we briefly describe the principal platforms used on single-user, stand-alone computers today, both desktops and laptops: the Apple Macintosh OS and Microsoft Windows. We discuss operating systems for networks (servers) and for embedded systems (handheld computers and some consumer devices) in a few pages.
Macintosh Operating System What significant contribution has the Mac OS made to personal computing?
Chapter 3
The Macintosh operating system (Mac OS), which runs only on Apple Macintosh computers, set the standard for icon-oriented, easy-to-use graphical user interfaces. Apple based its new interface on work done at Xerox, which in turn had based its work on early research at Stanford Research Institute (now SRI International). (See the timeline starting on page 166.) The software generated a strong legion of fans shortly after its launch in 1984 and inspired rival Microsoft to upgrade DOS to the more user-friendly Windows operating systems. Much later, in 1998, Apple introduced its iMac computer (the “i” stands for “internet”), which added capabilities such as small-scale networking.
138
wiL16775_ch03_119-192.indd 138
MAC OS X The Mac OS is proprietary, meaning that it is privately owned and controlled by a company. Some Mac users still use System 9, introduced in October 1999, which added an integrated search engine, updated the GUI, and improved networking services. The next version of the operating system, Mac OS X (“ex” or “10”) broke with 15 years of Mac software to use Unix (discussed shortly) to offer a dramatic new look and feel. (• See Panel 3.13.) Many Apple users claim that OS X won’t allow software conflicts, a frequent headache with Microsoft’s Windows operating systems. (For example, you might install a game and find that it interferes with the device driver for a sound card. Then, when you uninstall the game, the problem persists. With
1/8/10 4:32:14 PM
Rev. Confirming Pages
panel 3.13 Mac OS X screen
Mac OS X, when you try to install an application program that conflicts with any other program, the Mac simply won’t allow you to run it.) Mac OS X also offers free universal email services, improved graphics and printing, improved security, CD/DVD burning capability, a CD/DVD player, easier ways to find files, and support for building and storing web pages. Mac OS X also uses:
•
Spotlight—for desktop search: A desktop search engine, you’ll recall from Chapter 2, is a tool that extends searching beyond the web to the contents of your personal computer’s hard disk. The Macintosh version, called Spotlight, helps you find information stored in the thousands of files on your hard drive. Spotlight also offers Smart Folders, permanent lists of search results that are automatically updated as files are added or deleted.
•
Dashboard—for creating desktop “widgets”: The Dashboard is a collection of little applications that Apple calls “widgets,” such as clock, calculator, weather report, or stock ticker, that can be available on your desktop at any time. Dashboard enables programmers to create customized widgets that provide notification on the desktop whenever there’s a newsworthy development, such as a change in stock price, that’s important to users—something that “could tame the flood of real-time data that threatens to overwhelm us,” says BusinessWeek’s Stephen Wildstrom.4
panel 3.14
Automator—for handling repetitive tasks: Automator is a personal robotic assistant that lets you streamline repetitive tasks into a script that will perform a sequence of actions with a single click, such as checking for new messages from a particular sender, then sending you an alert.
OS market shares (http://news.cnet. com/8301-10805_ 3-10154133-75.html)
The latest version of OS X, 10.6, or Snow Leopard, was released in 2009. As of 2009, Mac OS X is the second most popular general-purpose operating system in use (almost 10%), after Microsoft Windows (about 88%).5 (• See Panel 3.14.) WHERE IS MAC KING? Macintosh is still considered king in areas such as desktop publishing, and Macs are still favored in many educational settings. For very specialized applications, most programs are written for
wiL16775_ch03_119-192.indd 139
Total Market Share 89%
10% 1% 0% 0% 0%
88.26% - Windows
0.83% - Linux
0.04% - Playstation
9.93% - Mac
0.48% - iPhone
0.01% - SunOS
Software
•
139
1/8/10 4:32:15 PM
Rev. Confirming Pages
more
info! Mac Apps To see the wide variety of applications available to download for the Mac, go to: www.apple.com/downloads/ macosx/
the Windows platform. However, programs for games and for common business uses such as word processing and spreadsheets are also widely available for the Mac. Note that many Macs can work with Microsoft PC (Windows) applications, such as Word—if the Mac version of these applications has been installed on the Mac and the Mac has an Intel processor (Chapter 4). You can also use a PC-formatted disk in many Macs. (The reverse is not true: PCs will not accept Mac-formatted disks.)
Microsoft Windows What has been the evolution of Windows? In the 1980s, taking its cue from the popularity of Mac’s easy-to-use GUI, Microsoft began working on Windows to make DOS more user-friendly. Also a proprietary system, Microsoft Windows is the most common operating system for desktop and portable PCs. Early attempts (Windows 1.0, 2.0, 3.0) did not catch on. However, in 1992, Windows 3.X emerged as the preferred system among PC users. (Technically, Windows 3.X wasn’t a full operating system; it was simply a layer or “shell” over DOS.)
Chapter 3
Bill Gates. The founder of Microsoft has been identified with every PC operating system since the 1980 DOS.
140
wiL16775_ch03_119-192.indd 140
EARLY VERSIONS OF WINDOWS: WINDOWS 95, 98, & ME Windows 3.X evolved into the Windows 95 operating system, which was succeeded by Windows 98 and Windows Me. Among other improvements over their predecessors, Windows 95, 98, and Me (for Millennium Edition), which are still used in many homes and businesses, adhere to a standard called Universal Plug and Play, which is supposed to let a variety of electronics seamlessly network with each other. Plug and Play is defined as the ability of a computer to automatically configure a new hardware component that is added to it. WINDOWS XP Microsoft Windows XP, introduced in 2001, combined elements of Windows networking software and Windows Me with a new GUI. It has improved stability and increased driver and hardware support. It also features built-in instant messaging; centralized shopping managers to help you keep track of your favorite online stores and products; and music, video, and photography managers. Windows XP comes in many versions: Windows Starter Edition is for new computer users in developing countries; Windows XP Home Edition is for typical home users; Windows XP Professional Edition is for businesses of all sizes and for home users who need to do more than get email, browse the internet, and do word processing; Windows XP Tablet PC Edition is for business notebook computers that support data entry via a special pen used to write on the display screen (• See Panel 3.15.); Windows XP Embedded is for embedded systems in portable devices and consumer electronics. WINDOWS XP MEDIA CENTER EDITION/TV PACK 2008 In late 2004, Microsoft released Windows XP Media Center Edition 2005, a media-oriented operating system that supports DVD burning, high-definition television (HDTV), TV tuners, cable TV, and satellite TV and that provides a refreshed user interface. A key feature is support for wireless technology and in particular Media Center Extender, a technology that lets users wirelessly connect up to five TVs and some portable devices to the Media Center PC. Windows XP Media Center Edition is a premium version of Windows XP, designed to make the PC or the TV the media and entertainment hub of the home. Windows TV Pack 2008 is for Vista (see below). In addition to
1/8/10 4:32:19 PM
Rev. Confirming Pages
panel 3.15 Windows XP (left) and Windows Tablet PC
WINDOWS VISTA Windows Vista was introduced to consumers in January 2007 (• See Panel 3.16.) It is the equivalent of Windows version 12—preceded by 1.0, 2.0, 3.0, 3.1, NT, 95, NT 4.0, 98, 2000, ME, XP. To create Vista, Microsoft supposedly rebuilt Windows from scratch, and it does indeed have a dazzling interface, glitzier graphics, and improved security tools. However, so much computing power was required to run it that many people found their new PCs ran more slowly than their older, less powerful XP machines.6 Vista was also criticized for software and hardware incompatibility issues with office suites and some printers, digital cameras, and other devices. So, many businesses decided that, given the downturn in the economy, they wouldn’t be upgrading
Sur v iv a l T ip XP Service Packs 1, 2, & 3 In late 2002, Microsoft updated XP to a “second edition” by supplying a downloadable service pack (an update) called Windows XP Service Pack 1 (SP1). In 2004, Microsoft released Service Pack 2 (SP2). In 2008, Service Pack 3(SP 3) was released, which includes Packs 1 and 2, as well as some additional updates, particularly involving security. These service pack updates, and subsequent smaller updates, improve the OS’s performance and strengthen security. However, they can cause compatibility problems with existing applications on a user’s computer. So, if you are considering updating your version of XP, research compatibility and backup issues on the internet before going to Microsoft’s website to download these updates and/or Service Packs.
panel 3.16 Vista desktop screen showing a computer’s various storage locations
Software
performing traditional PC tasks, the system can serve music, pictures, video, and live television to portable devices, stereos, and TVs while also enforcing digital rights set by content owners. Users can access a Windows XP Media Center PC—a combination of special Windows OS and hardware that includes a TV tuner, remote control, and other multimedia equipment—with a remote control through a special user interface on their TV.
141
wiL16775_ch03_119-192.indd 141
1/8/10 4:32:23 PM
Rev. Confirming Pages
more
info! For more on how Media Centers work, go to: www.microsoft.com/ windows/windows-vista/ features/media-center.aspx http://on10.net/blogs/ maxpowerhouse7/ CES-2009-WindowsMedia-Center-on-Windows7-with-Touch/
S u rv i v al Ti p
Chapter 3
OEM
142
If you buy a computer with Windows (or any other operating system) already installed, the OS is called an OEM (original equipment manufacturer) version. If you buy your OS off the shelf, it is called a retail version. These two versions are almost identical, except an OEM version will install only on the specific machine for which it was intended. A retail version will install on any compatible machine. If you have an OEM version, you have to call the computer manufacturer, not the OS producer, for technical support. Because a retail version is not specifically tailored for your particular computer, Microsoft recommends that, before you buy a retail version of an OS, you run a compatibility check at its website (http://support. microsoft.com).
wiL16775_ch03_119-192.indd 142
Aerial view of Microsoft’s Redmond, Washington, main corporate campus, which spreads over several square miles of the Seattle suburb.
from XP to Vista, because they saw no value in it and because it required buying more powerful PCs and new software. To spur Vista sales, Microsoft announced it would stop selling Windows XP in June 2008—a move that launched a storm of protest. Microsoft thereupon softened its initial posture and said it would continue to make XP available and would provide extended customer support and fix bugs for XP until 2014. However, in spite of this change, Vista did not sell well, so Microsoft moved on to Windows 7, or Windows 2009. WINDOWS 7 Windows 7 (or Windows 2009), the newest version of Microsoft Windows was released in October 2009. The new operating system includes iPhone-like touch-screen applications called Microsoft Surface, an alternative to the computer mouse. Thus, you can manipulate objects on the screen with your hands, such as enlarge and shrink photos or navigate a city map by stroking the screen. (• See Panel 3.17.) Windows 7 is less power-hungry than Vista, boots up more quickly than previous Windows systems, and has improved networking and security features. As does XP, Windows 7 comes in various versions:
• • • • • •
Starter Home Basic Home Premium Professional Enterprise (for multi-user businesses) Ultimate (for retail businesses)
Vista and XP users can upgrade to Windows 7, but with some difficulty and some cost. (See more info! on the next page.). There are many detailed issues involved with upgrading/changing an operating system. If you are a Windows user and are considering an upgrade, go to Microsoft’s support site (www. support.microsoft.com) to find out what options are open to you. A problem for any version of Windows, however, is that it builds off the same core architecture that represents more than 20 years of legacies. Some believe
1/8/10 4:32:26 PM
Rev. Confirming Pages
panel 3.17
Software
Windows 7 screen displays (top) Flip screen (can be rotated); (middle) touch screen (hands-on interactivity); (bottom) personalizing Windows 7
143
wiL16775_ch03_119-192.indd 143
1/8/10 4:32:28 PM
Rev. Confirming Pages
more
info! XP versus Vista and 7 To compare Windows XP to Windows Vista and Windows 7, try: www.microsoft.com www.pcmag.com http://news.softpedia.com/ newsImage/Windows-7-vsVista-SP1-vs-XP-SP3Feature-Comparison-3.jpg/
more
info! Upgrading to Windows 7 For a step-by step guide to upgrade to Windows 7: www.blogsdna.com/3217/stepby-step-guide-to-upgradewindows-xp-to-windows-7. htm Or you can buy software to do it for you: www.laplink.com/pcmover/ pcmoverupgradeassistant. html
S u rv i v al Ti p New Installation
Chapter 3
Every time you install or reinstall Windows XP, Vista, or 7 you will have to get Microsoft’s permission to activate it. You can do this over the internet or via the phone.
144
wiL16775_ch03_119-192.indd 144
that Microsoft needs to do what Apple did when it introduced its Mac OS X in 2001: start over from scratch. Although this risked alienating some Macintosh users, since it forced them to buy new versions of their existing Mac applications software, it also made the system less vulnerable to crashes. “A monolithic operating system like Windows perpetuates an obsolete design,” said one critic. “We don’t need to load up our machines with bloated layers we won’t use.”7
Network Operating Systems: NetWare, Windows NT Server, Unix, & Linux How would I distinguish among the several network OSs? The operating systems described so far were principally designed for use with stand-alone desktop and laptop machines. Now let’s consider the important operating systems designed to work with sizeable networks—NetWare, Windows NT Server, Unix/Solaris, and Linux. NOVELL’S NETWARE NetWare has long been a popular network operating system for coordinating microcomputer-based local area networks (LANs) throughout a company or a campus. LANs allow PCs to share programs, data files, and printers and other devices. A network OS is usually located on a main server (see Chapter 1), which controls the connectivity of connected smaller networks and individual computers. Novell, the maker of NetWare, thrived as corporate data managers realized that networks of PCs could exchange information more cheaply than the previous generation of mainframes and midrange computers. The biggest challenge to NetWare has been the Windows’ versions of NT and Server. However, Novell is continuing to improve its networking OS with its new version, Open Enterprise Server, which combines Netware with the benefits of a more recently popular operating system, Linux (discussed shortly). WINDOWS NT & NT SERVER Windows desktop operating systems (95/98/Me/ XP/Vista/7) can be used to link PCs in small networks in homes and offices. However, something more powerful was needed to run the huge networks linking a variety of computers—PCs, workstations, mainframes—used by many companies, universities, and other organizations, which previously were served principally by Unix and NetWare operating systems. Microsoft Windows NT (the NT stands for “New Technology”) and now called Windows Server 2008, is the company’s multitasking operating system designed to run on network servers in businesses of all sizes. It allows multiple users to share resources such as data, programs, and printers and to build web applications and connect to the internet. The Windows NT/Server networking OS comes in various versions, and some of its functions are built into XP, Vista, and Windows 7. UNIX, SOLARIS, & BSD Unix (pronounced “you-nicks”) was developed at AT&T’s Bell Laboratories in 1969 as an operating system for minicomputers. By the 1980s, AT&T entered into partnership with Sun Microsystems to develop a standardized version of Unix for sale to industry. Today Unix is a proprietary multitasking operating system for multiple users that has built-in networking capability and versions that can run on all kinds of computers. (• See Panel 3.18.) It is used mostly on mainframes, workstations, and servers, rather than on PCs. Government agencies, universities, research institutions, large corporations, and banks all use Unix for everything from designing airplane parts to currency trading. Because it is particularly stable and reliable, Unix is also used for website management and runs the backbone of the internet. The developers of the internet built their communications system around Unix because it has the ability to keep large systems (with hundreds of processors) churning out transactions day in and day out for years without fail.
1/8/10 4:32:30 PM
Rev. Confirming Pages
panel 3.18 Unix screen
PRACTICAL ACTION Get a PC or Get a Mac? Security Issues
Microsoft’s Service Packs versus Patches As we have mentioned, a service pack (sometimes called a “service release”) is a collection of files for various updates, software bug fixes, and security improvements. A patch (sometimes called a “hotfix”) is an update that occurs between service packs; most patches are built to correct security vulnerabilities. Service packs are planned, or strategic, releases. Patches are unplanned, interim solutions. A new service pack is supposed to “roll up” all previous service packs and patches. Microsoft recommends installing
wiL16775_ch03_119-192.indd 145
both packs and patches as they become available but also checking the online bulletin accompanying every new patch to see what vulnerability risks it poses to your particular hardware and software configuration. It would appear, however, that the pack-and-patch approach to security for Microsoft products will be with us for a long time. “We don’t feel like we’ve ever crossed the finish line,” says Windows’ lead product manager. “We have to keep outrunning the bad guys.”9
Switch to Mac? Perhaps because Apple Macintosh has a smaller percentage of the market share for microcomputers, it seems to have eluded most of the attention of the hackers and virus writers. Similarly, for whatever reasons, Linux-based computers hardly get infected or invaded at all. Big-business users, it’s suggested, have too much money invested in Windows machines to think of switching to Macintoshes; the costs of making the change would be astronomical. Individual users, however, might wish to give it some thought. What if you already have Microsoft Office files, such as Microsoft Word or Microsoft Excel, on a PC and want to move them to a Mac? In that case, you’ll need the current version of Microsoft Office for the Mac, which will handle the PC version, and a Mac with an Intel processor. Apple’s OS X also comes with a program called Mail and a word processor called Text Edit that will deal with Microsoft Word documents that come to you online. You can also get a Macintosh version of Internet Explorer, which is, in fact, considered safer than the Windows versions. Check out www.macvswindows.com/index.php?title⫽ Main_Page, or do keyword searches for “Mac vs. Windows” and “Mac vs. PC.”
Software
N
ervous about spam, spyware, phishing, viruses, and other threats to your computer? That’s certainly been the case for many Windows PC users. “Microsoft has paid so little attention to security over the years,” says distinguished technology writer Walter Mossberg, “that consumers who use Windows have been forced to spend more and more of their time and money fending off” these invasive demons.8 In late 2004, the software giant rolled out a major, free operating system upgrade called Service Pack 2, or SP2. Among other things, this was supposed to reduce the risk to Microsoft’s Internet Explorer web browser of online attacks that had frustrated users and slowed businesses. However, the company conceded that SP2 interfered with about 50 known programs, including corporate products and a few games. And a couple of months later, Microsoft issued several “security advisories” urging consumers and businesses to patch 21 new flaws in Windows software products. In February 2005 it said that it was upgrading its Internet Explorer against malicious software and expected to include security defenses in its new operating system, Vista. Service Pack 3 (2008) was supposed to “cure” some more Windows security ills, but many users remain critical of Windows’ vulnerability to viruses and the like.
145
1/8/10 4:32:30 PM
Rev. Confirming Pages
Some Common Unix Commands ^h, [backspace]
erase previously typed character
^u
erase entire line of input typed so far
cp
copy files
whoami
who is logged on to this terminal
mkdir
make new directory
mv
change name of directory
read/send email
gzip, gunzip
compress, recompress a file
lpr
send file to printer
wc
count characters, words, and lines in a file
head
show first few lines of a file
tail
show last few lines of a file
find
find files that match certain criteria
•
Versions of Unix: Sun Microsystems’ Solaris is a version of Unix that is popular for handling large e-commerce servers and large websites. Another interesting variant is BSD, free software derived from Unix. BSD began in the 1970s in the computer science department of the University of California, Berkeley, when students and staff began to develop their own derivative of Unix, known as the Berkeley Software Distribution, or BSD. There are now three variations, which are distributed online and on CD. Other Unix variations are made by Hewlett-Packard (HP-UX) and IBM (AIX).
•
Unix interface—command or shell? Like MS-DOS, Unix uses a command-line interface (but the commands are different for each system). Some companies market Unix systems with graphical interface shells that make Unix easier to use. LINUX It began in 1991 when programmer Linus Torvalds, a graduate student in Finland, posted his free Linux operating system on the internet. Linux (pronounced “linn-uks”) is the rising star of network software. Linux is a free (nonproprietary) version of Unix, and its continual improvements result from the efforts of tens of thousands of volunteer programmers. (• See Panel 3.19.) Whereas Windows NT/Server is Microsoft’s proprietary product, Linux is open-source software—meaning any programmer can download it from the internet for free and modify it with suggested improvements. The only qualification is that changes can’t be copyrighted; they must be made available to all and remain in the public domain. From these beginnings, Linux has attained cultlike status. “What makes Linux different is that it’s part of the internet culture,” says an IBM general manager. “It’s essentially being built by a community.”10
panel 3.19
Chapter 3
Linux screen (inset)
146
wiL16775_ch03_119-192.indd 146
1/8/10 4:32:32 PM
Rev. Confirming Pages
•
•
•
Linux and China: In 2000, the People’s Republic of China announced that it was adopting Linux as a national standard for operating systems because it feared being dominated by the OS of a company of a foreign power—namely, Microsoft. In 2005, Red Flag Software Company, Ltd., the leading developer of Linux software in China, joined the Open Source Development Labs, a global consortium dedicated to accelerating the adoption of Linux in the business world. In 2007, OSDL and the Free Standards Group merged to form The Linux Foundation (http://osdl.org/en/Main_Page), narrowing their respective focuses to that of promoting Linux in competition with Microsoft Windows. The permutations of Linux: If Linux belongs to everyone, how do companies such as Red Hat Software—a company that bases its business on Linux—make money? Their strategy is to give away the software but then sell services and support. Red Hat, for example, makes available an inexpensive application software package that offers word processing, spreadsheets, email support, and the like for users of its PC OS version. It also offers more powerful versions of its Linux OS for small and mediumsize businesses, along with applications, networking capabilities, and support services. Google Chrome: In late 2008, Google launched its Chrome internet browser. Based on Linux, this browser is intended for people who do most of their computer activities on the web. However, most of the operating systems that computers run on were designed in an era when there was no web; so in July 2009, Google introduced the Chrome OS. This operating system is a lightweight, open-source Linux-based system with a new windowing arrangement that has initially been targeted at netbooks. The user interface is minimal, and internet connection is fast and secure. As with the Chrome browser, this OS has been created for people who spend most of their computer time on the web. Chrome does not support Microsoft Office, which will limit its usability in business, educational, and professional environments, but it does support OpenOffice, Google email, Google Docs, and cloud computing. The full version of Chrome OS was supposed to become available in 2010. Dell Computers now offers a Linux-based operating system, Ubuntu (the Zulu word for “humanity”), on some of its products. Some companies, such as Ibex, make dual-boot PCs that can switch back and forth between Windows and Linux by rebooting. Win4Lin, Inc., a leading supplier of specialized operating systems that run on Linux, has released Win4Lin Desktop 5, which runs Windows and Windows applications on Linux. More recently, several varieties of Linux have been introduced to run on the low-end kind of computers known as netbooks. They include Ubuntu, Hewlett-Packard’s Mi (which is based on Ubuntu), and Intel Corp.’s Mobilin.11 Linux in the future: Because it was originally built for use on the internet, Linux is more reliable than Windows for online applications. Hence, it is better suited to run websites and e-commerce software. Its real growth, however, may come as it reaches outward to other applications and, possibly, replaces Windows in many situations. IBM, Red Hat, Motorola Computing, Panasonic, Sony, and many other companies have formed the nonprofit, vendor-neutral Embedded Linux Consortium, which now, as part of The Linux Foundation, is working to make Linux a top operating system of choice for developers designing embedded systems, as we discuss next.
The three major microcomputer operating systems are compared in the box on the next page. (• See Panel 3.20.)
wiL16775_ch03_119-192.indd 147
more
info! China’s Red Flag To learn more about China’s Red Flag Software Company, go to: www.redflag-linux.com/egyhq. html http://en.wikipedia.org/wiki/ Red_Flag_Linux
more
info! Linux versus Windows Do you think Linux will overtake Windows? Will more users switch to Mac OS X? To research Linux, go to: www.kernel.org http://news.softpedia.com/ cat/Linux/ www.lwn.net For Mac OS, go to: www.macosrumors.com http://news.softpedia.com/ cat/Apple/, www.macrumors. com For Windows, go to: www.winsupersite.com www.neowin.net www.winbeta.org http://news.softpedia.com/ cat/Microsoft/ For general OS matters, go to: www.betanews.com www.osnews.com
Software
•
147
1/8/10 4:32:33 PM
Rev. Confirming Pages
Windows XP
panel 3.20 OS comparison
Pros:
Pros:
Runs on a wide range of hardware
Runs on a wide range of hardware
Easy to install
Has largest market share
Has largest number of user interface types
Secure and stable
Can be used as server or desktop PC open source software; anyone can fix bugs
Cons:
Cons:
Supports only Apple computers
more
More on OS Comparisons For more details on OS comparisons, go to: www.iterating.com/ productclasses/ Operating-Systems
Cons: Security problems Not efficient used as a server OS Have to reboot every time a network configuration is changed
Limited support for games
info! Open-Source Search
Chapter 3
Open-source utilities—some command-line interfaces, some GUIs—are available for Linux and Mac systems. What keywords could you use to find these utilities?
148
Palm Pre¯ OS screen
wiL16775_ch03_119-192.indd 148
Best GUI
Limited commercial applications available
Base hardware more expensive than other platforms
Can be difficult to learn
Fewer utilities available
Proprietary software; only company programmers can fix bugs
more
Mac OS X
Pros:
Has many built-in utilities
info!
Linux
Fewer games than for Windows Proprietary software; only company programmers can fix bugs
Embedded Operating Systems for Handhelds: Palm OS & Windows CE What are some different embedded OSs for handheld computers and PDAs? An embedded system is any electronic system that uses a CPU chip but that is not a general-purpose workstation, desktop, or laptop computer. It is a specialized computer system that is part of a larger system or a machine. Embedded systems are used, for example, in automobiles, planes, trains, barcode scanners, fuel pumps, space vehicles, machine tools, watches, appliances, cellphones, PDAs, and robots. Handheld computers and personal digital assistants rely on specialized operating systems, embedded operating systems, that reside on a single chip. Such operating systems include the Palm OS and Windows CE. PALM OS—THE DOMINANT OS FOR HANDHELDS The Linux-based Palm OS, also known as Garnet OS and webOS, developed by Palm Inc., is a popular operating system for mobile devices, including smartphones, wrist watches, handheld gaming consoles, barcode readers and GPS devices. In 1994, Jeff Hawkins took blocks of mahogany and plywood into his garage and emerged with a prototype for the
Palm OS launcher screen
1/8/10 4:32:33 PM
Rev. Confirming Pages
more
info! Palm OS For updates on the Palm OS for Palm PDAs and Treo Smartphones, try: www.versiontracker.com/ palmos/ www.freeware-palm.com/ and http://kb.palm.com/wps/ portal/kb/na/centro/ centro/sprint/downloads/ page_en.html
Microsoft OS for Socket Mobile
Microsoft OS for HP iPAQ
WINDOWS EMBEDDED—MICROSOFT WINDOWS FOR HANDHELDS & EMBEDDED SYSTEMS In 1996, Microsoft released Microsoft Windows CE, now known as Windows Embedded, a slimmed-down version of Windows, for handhelds such as those made by Garmin, ASUS, Dell, and Hewlett-Packard. The Windows handheld OS has the familiar Windows look and feel and includes mobile
wiL16775_ch03_119-192.indd 149
Software
PalmPilot, which led to the revolution in handheld computing. Palm Inc. sells the popular Preˉ Smartphone, the Centro Smartphone, and the Treo Pro Smartphone, as well as various models of PDAs. (Smartphones are cellular phones that have built-in music players and video recorders and that run computerlike applications and support internet activities beyond just email. We discuss them in detail in Chapter 7.) Early versions of handhelds cannot be upgraded to run recent versions of Palm OS. If you buy a PDA or a smartphone, therefore, you need to make sure that the OS is a current version and that the manufacturer plans to continue to support it.
149
1/18/10 4:29:59 PM
Rev. Confirming Pages
versions of word processing, spreadsheet, email, web browsing, text messaging, and other software. Windows Mobile, based on CE, is used in certain smartphones. Special versions of Windows CE are also used in embedded systems such as ATMs, barcode scanners, kiosks, gaming devices, and set-top boxes.
3.6
APPLICATION SOFTWARE: Getting Started
What are five ways of obtaining application software, tools available to help me learn to use software, three common types of files, and the types of software? At one time, just about everyone paid for microcomputer application software. You bought it as part of the computer or in a software store, or you downloaded it online with a credit card charge. Now, other ways exist to obtain software.
Application Software: For Sale, for Free, or for Rent? S u rv i v al Ti p
What are the various ways I can obtain software?
What to Set Up First?
Although most people pay for software, usually popular brands that they can use with similar programs owned by their friends and coworkers, it’s possible to rent programs or get them free. (• See Panel 3.21.) Let’s consider these categories.
When setting up a new microcomputer system, install your peripherals first—first your printer, any external storage drives, scanner, and so on. Test each one separately by restarting the computer. Then install the next peripheral. After this, install your applications software, again testing each program separately.
COMMERCIAL SOFTWARE Commercial software, also called proprietary software or packaged software, is software that’s offered for sale, such as Microsoft Word, Microsoft Office XP, or Adobe PhotoShop. Although such software may not show up on the bill of sale when you buy a new PC, you’ve paid for some of it as part of the purchase. And, most likely, whenever you order a new game or other commercial program, you’ll have to pay for it. This software is copyrighted. A copyright is the exclusive legal right that prohibits copying of intellectual property without the permission of the copyright holder. Software manufacturers don’t sell you their software; rather, they sell you a license to become an authorized user of it. What’s the difference? In paying for a software license, you sign a contract in which you agree not to make copies of the software to give away or resell. That is, you have bought only the company’s permission to use the software and not the software itself. This legal nicety allows the company to retain its rights to the program and limits the way its customers can use it. The small print in the licensing agreement usually allows you to make one copy (backup copy or archival copy) for your own use. (Each software company has a different license; there is no industry standard.) Several types of software licenses exist:
•
Site licenses allow the software to be used on all computers at a specific location.
•
Concurrent-use licenses allow a certain number of copies of the software to be used at the same time. Types
Definition
Choices among application software
Commercial software
Copyrighted. If you don’t pay for it, you can be prosecuted.
Public-domain software
Not copyrighted. You can copy it for free without fear of prosecution.
Shareware
Copyrighted. Available free, but you should pay to continue using it.
Freeware
Copyrighted. Available free.
Rentalware
Copyrighted. Lease for a fee.
Chapter 3
panel 3.21
150
wiL16775_ch03_119-192.indd 150
1/8/10 4:32:37 PM
Rev. Confirming Pages
A multiple-user license specifies the number of people who may use the software.
•
A single-user license limits software use to one user at a time.
Most personal computer software licenses allow you to run the program on only one machine and make copies of the software only for personal backup purposes. Personal computer users often buy their software in shrink-wrapped packages; once you have opened the shrink wrap, you have accepted the terms of the software license. Every year or so, software developers find ways to enhance their products and put forth new versions or new releases. A version is a major upgrade in a software product, traditionally indicated by numbers such as 1.0, 2.0, 3.0— for example, Adobe 8.0 and Adobe 9.0. More recently, other notations have been used. After 1995, Microsoft labeled its Windows and Office software versions by year instead of by number, as in Microsoft’s Office 97, Office 2000, Office 2003, and Office 2007. A release, which now may be called an “add” or “addition,” is a minor upgrade. Often this is indicated by a change in number after the decimal point. (For instance, 8.0 may become 8.1, 8.2, and so on.) Some releases are now also indicated by the year in which they are marketed. And, unfortunately, some releases are not clearly indicated at all. (These are “patches,” which may be downloaded from the software maker’s website, as can version updates.) Once you have purchased an application, the manufacturer will usually allow you to download small patches for free but will charge for major new versions. More recently, Apple Inc. has enjoyed huge success with its online Apple App Store, offering more than 1,600 business applications that can be downloaded directly to your cellphone.12 Other “stores” offering downloadable applications are BlackBerry App World, Google Android Market, Palm Software Store, and Microsoft’s Windows Mobile Store.13 PUBLIC-DOMAIN SOFTWARE Public-domain software is not protected by copyright and thus may be duplicated by anyone at will. Public-domain programs—sometimes developed at taxpayer expense by government agencies— have been donated to the public by their creators. They are often available through sites on the internet. You can download and duplicate public-domain software without fear of legal prosecution. SHAREWARE Shareware is copyrighted software that is distributed free of charge, but users are required to make a monetary contribution, or pay a registration fee, to continue using it—in other words, you can try it before you buy it. Once you pay the fee, you usually get supporting documentation, access to updated versions, and perhaps some technical support. Shareware is distributed primarily through the internet, but because it is copyrighted, you cannot use it to develop your own program that would compete with the original product. If you copy shareware and pass it along to friends, they are expected to pay the registration fee also, if they choose to use the software. FREEWARE Freeware is copyrighted software that is distributed free of charge, today most often over the internet. Why would any software creator let his or her product go for free? Sometimes developers want to see how users respond, so that they can make improvements in a later version. Sometimes they want to further some scholarly or humanitarian purpose—for instance, to create a standard for software on which people are apt to agree. In its most recent form, freeware is made available by companies trying to make money some other way—as, by attracting viewers to their advertising. (The web browsers Internet Explorer and Mozilla Firefox are of this type.) Freeware developers generally retain all rights to their programs; technically, you are not supposed to duplicate and redistribute the programs. (Freeware is different
wiL16775_ch03_119-192.indd 151
Important: Use of the enclosed software is subject to the license agreement included on this CD-ROM. You must read and agree to these terms and conditions before using the software. Any other use, copying, or distribution of the software is strictly prohibited.
Part of a software license
more
info! Public Domain Software For information on public domain software and where to obtain it, go to: www.gnu.org/philosophy/ categories.html www.webcrawler.com/ webcrawler301/ws/results/ web/public⫹domain⫹ software/1/417/topnavigation/ relevance/iq⫽true/ zoom⫽off/_iceurlflag⫽7?_ice url⫽true&gclid⫽ckik1ifjspscfr wdagodtafvpa
more
info! Shareware & Freeware What kinds of shareware and freeware are available? To find out, go to: www.searchalot.com/Top/ Computers/Software/ www.shareware.com www.tucows.com www.freewarehome.com www.download.com www.sharewareking.com
Software
•
151
1/8/10 4:32:38 PM
Rev. Confirming Pages
from free software, or public-domain software, which has no restrictions on use, modification, or redistribution.)
more
info! More about ASPs If you want to learn more about ASPs, go to: www.aspnews.com www.dmoz.org/Computers/ Software/Business/ E-Commerce/Business-toBusiness/Application_ Service_Providers//
RENTALWARE: ONLINE SOFTWARE Rentalware is online software that users lease for a fee and download whenever they want it. This is the concept behind application service providers (ASPs), or software-as-a-service (SaaS) technology, the idea of leasing software over the internet. The ASP stores the software on its servers and supplies users with support and other services. Today online software accounts for only a small part of business-software sales, but it could represent the wave of the future, because it frees businesses from having to buy computer servers and hire a staff to maintain them. Some business owners find that present-day online software isn’t as good as the traditional software available. However, online software represents a stage in what in Chapter 1 we called “cloud computing,” the idea of obtaining computing resources from the network of computers sitting beyond a user’s own four walls.14 Some experts believe that future software is more apt to be available in a variety of ways: through traditional licensing, through online rentalware, through ad-supported online means, and even through open-source means.15 PIRATED SOFTWARE Pirated software is software obtained illegally, as when you get a CD/DVD from a friend who has made an illicit copy of, say, a commercial video game. Sometimes pirated software can be downloaded off the internet. Sometimes it is sold in retail outlets in foreign countries. If you buy such software, not only do the original copyright owners not get paid for their creative work, but you risk getting inferior goods and, worse, picking up a virus. To discourage software piracy, many software manufacturers, such as Microsoft, require that users register their software when they install it on their computers. If the software is not registered, it will not work properly. ABANDONWARE “Abandonware” does not refer to a way to obtain software. It refers to software that is no longer being sold or supported by its publisher. U.S. copyright laws state that copyrights owned by corporations are valid for up to 95 years from the date the software was first published. Copyrights are not considered abandoned even if they are no longer enforced. Therefore, abandoned software does not enter the public domain just because it is no longer supported. Don’t copy it. CUSTOM SOFTWARE Occasionally, companies or individuals need software written specifically for them, to meet unique needs. This software is called custom software, and it’s created by software engineers and programmers. Recently many people who have never written a line of computer code have been inspired to learn programming as a possible way to make money developing applications for downloading off the popular Apple iPhone.16
Tutorials & Documentation How could software tutorials and documentation be helpful to me?
Chapter 3
How are you going to learn a given software program? Most commercial packages come with tutorials and documentation.
152
wiL16775_ch03_119-192.indd 152
TUTORIALS A tutorial is an instruction book or program that helps you learn to use the product by taking you through a prescribed series of steps. For instance, our publisher offers several how-to books that enable you to learn different kinds of software. Tutorials may also form part of the software package. DOCUMENTATION Documentation is all information that describes a product to users, including a user guide or reference manual that provides a narrative and graphical description of a program. Although documentation may
1/8/10 4:32:38 PM
Rev. Confirming Pages
Tutorial: Microsoft Office training
First page of downloaded documentation for Adobe Acrobat 8
be print-based, today it is usually available on CD, as well as via the internet. Documentation may be instructional, but features and functions are usually grouped by category for reference purposes. For example, in word processing documentation, all features related to printing are grouped together so that you can easily look them up.
A Few Facts about Files & the Usefulness of Importing & Exporting What are three types of files, and what do importing and exporting mean? There is only one reason for having application software: to take raw data and manipulate it into useful files of information. A file, as we said earlier, is (1) a named collection of data (data file) or (2) a program (program file) that exists in a computer’s secondary storage, such as hard disk, keychain (Chapter 4), or CD/DVD.
•
Document files: Document files are created by word processing programs and consist of documents such as reports, letters, memos, and term papers.
•
Worksheet files: Worksheet files are created by electronic spreadsheets and usually consist of collections of numerical data such as budgets, sales forecasts, and schedules.
•
Database files: Database files are created by database management programs and consist of organized data that can be analyzed and displayed in various useful ways. Examples are student names and addresses that can be displayed according to age, grade-point average, or home state.
EXCHANGING FILES: IMPORTING & EXPORTING It’s useful to know that often files can be exchanged—that is, imported and exported—between programs.
•
Importing: Importing is defined as getting data from another source and then converting it into a format compatible with the program in
wiL16775_ch03_119-192.indd 153
Software
THREE TYPES OF DATA FILES Three well-known types of data files are these:
153
1/18/10 4:30:03 PM
Rev. Confirming Pages
which you are currently working. For example, you might write a letter in your word processing program and include in it—that is, import—a column of numbers from your spreadsheet program. The ability to import data is very important in software applications because it means that one application can complement another.
•
Exporting: Exporting is defined as transforming data into a format that can be used in another program and then transmitting it. For example, you might work up a list of names and addresses in your database program and then send it—export it—to a document you wrote in your word processing program. Exporting implies that the sending application reformats the data for the receiving application; importing implies that the receiving application does the reformatting.
Types of Application Software What is productivity software?
panel 3.22 Types of application software
Application software can be classified in many ways—for entertainment, personal, education/reference, productivity, and specialized uses. (• See Panel 3.22.) In the rest of this chapter we will discuss types of productivity software— such as word processing programs, spreadsheets, and database managers— whose purpose is to make users more productive at particular tasks. Some productivity software comes in the form of an office suite, which bundles several applications together into a single large package. Microsoft Office, for example, includes (among other things) Word, Excel, and Access—word processing, spreadsheet, and database programs, respectively. (Office is available
APPLICATIONS SOFTWARE
Entertainment software
Chapter 3
Games, etc.
Personal software Cookbooks Medical Home decoration Gardening Home repair Tax preparation etc.
Education/ reference software
Productivity software
Specialty software
Encyclopedias Phone books Almanacs Library searches etc.
Word processing Spreadsheets Database managers Personal information managers Web browser Ch. 2 Email etc.
Presentation graphics Financial Desktop publishing Drawing & painting (image editing) Video/audio editing Animation Multimedia authoring Web page design Project management Computeraided design PDF etc.
154
wiL16775_ch03_119-192.indd 154
1/8/10 4:32:40 PM
Rev. Confirming Pages
more
info! Office Suites Commercial Office suites are fairly expensive— but there is a free alternative, available for a number of different OSs: OpenOffice.org. It can read most other file formats, including Microsoft Office, and it has most of the same features as MS Office.
for both the PC and the Mac platforms.) Corel Corp. offers similar programs, such as the WordPerfect word processing program. Other productivity software, such as Lotus Notes, is sold as groupware—online software that allows several people to collaborate on the same project and share some resources. Google offers a free suite of applications called Google Aps (from www.google. com/apps).17 We now consider the three most important types of productivity software: word processing, spreadsheet, and database software (including personal information managers). We then discuss more specialized software: presentation graphics, financial, desktop-publishing, drawing and painting, project management, computer-aided design, web page design, image/video/audio editing, and animation software.
3.7 WORD PROCESSING After a long and productive life, the typewriter has gone to its reward. Indeed, it is practically as difficult today to get a manual typewriter repaired as to find a blacksmith. Word processing software offers a much-improved way of dealing with documents. Word processing software allows you to use computers to create, edit, format, print, and store text material, among other things. Word processing is the most common software application. The best-known word processing program is Microsoft Word, but there are others, such as Corel WordPerfect, Apple Pages, Google Apps (a free download from www.google.com/apps), and Zoho Writer (a free download from www.zoho.com).18 There is even a fullfledged word processor, known as Quickoffice, that can be used on the Apple iPhone.19 Word processing software allows users to work through a document and delete, insert, and replace text, the principal edit/correction activities. It also offers such additional features as creating, formatting, printing, and saving.
wiL16775_ch03_119-192.indd 155
Software
What can I do with word processing software that I can’t do with pencil and paper?
155
1/8/10 4:32:40 PM
Rev. Confirming Pages
To clean your printer, first open the top by pressing the button on the left side near the top. Swing the lid_ _
Cursor
Creating Documents What are word processing features I would use when creating a document? Creating a document means entering text using the keyboard or the dictation function associated with speech-recognition software. Word processing software has three features that affect this process—the cursor, scrolling, and word wrap. CURSOR The cursor is the movable symbol on the display screen that shows you where you may next enter data or commands. The symbol is often a blinking rectangle or an I-beam. You can move the cursor on the screen using the keyboard’s directional arrow keys or a mouse. The point where the cursor is located is called the insertion point. SCROLLING Scrolling means moving quickly upward, downward, or sideways through the text or other screen display. A standard computer screen displays only 20–22 lines of standard-size text. Of course, most documents are longer than that. Using the directional arrow keys, or the mouse and a scroll bar located at the side of the screen, you can move (“scroll”) through the display screen and into the text above and below it.
Scrolling
WORD WRAP Word wrap automatically continues text to the next line when you reach the right margin. That is, the text “wraps around” to the next line. You don’t have to hit a “carriage-return” key or Enter key, as was necessary with a typewriter. SOME OTHER To help you organize term papers and reports, the Outline View feature puts tags on various headings to show the hierarchy of heads—for example, main head, subhead, and sub-subhead. Word processing software also allows you to insert footnotes that are automatically numbered and renumbered when changes are made. The basics of word processing are shown in the illustration at right. (• See Panel 3.23.)
more
info!
Editing Documents
Creating a Watermark
What are various kinds of editing I can do in a word processing document?
Chapter 3
A character, word, or image that appears faintly in the background of a printed document is called a watermark or a background. To add one to your Word 2003 document, select Format, Background and Printed Watermark. Then select Picture Watermark or Text Watermark and provide the requested information. In Word 2007, in the Page Layout tab, in the Page Background group, click Watermark.
156
wiL16775_ch03_119-192.indd 156
Editing is the act of making alterations in the content of your document. Some features of editing are insert and delete, undelete, find and replace, cut/copy and paste, spelling checker, grammar checker, and thesaurus. Some of these commands are in the Edit pull-down menu and icons on the toolbar. INSERT & DELETE Inserting is the act of adding to the document. Simply place the cursor wherever you want to add text and start typing; the existing characters will be pushed along. If you want to write over (replace) text as you write, press the Insert key before typing. When you’re finished typing, press the Insert key again to exit Insert mode. Deleting is the act of removing text, usually using the Delete key or the Backspace key. The Undo command allows you to change your mind and restore text that you have deleted. Some word processing programs offer as many as 100 layers of “undo,” so that users who delete several paragraphs of text, but then change their minds, can reinstate the material. FIND & REPLACE The Find, or Search, command allows you to find any word, phrase, or number that exists in your document. The Replace command allows you to automatically replace it with something else.
1/8/10 4:32:41 PM
Rev. Confirming Pages
Save
Undo Redo
Title bar: Shows name of document you’re working on
Tabs: with grouped command options Name of typeface Size of Typeface Text alignment buttons: Click on one to align text left, centered, right, or full justified.
Set number of Columns Set Page color
wiL16775_ch03_119-192.indd 157
panel 3.23 Some word processing functions
Software
CUT/COPY & PASTE Typewriter users who wanted to move a paragraph or block of text from one place to another in a manuscript used scissors and glue to “cut and paste.” With word processing, moving text takes only a few keystrokes. You select (highlight with the mouse) the portion of text you want to copy or move. Then you use the Copy or Cut command to move it to the clipboard, a special holding area in the computer’s memory. From there, you use Paste to transfer the material to any point (indicated with the cursor) in the existing document or in a new document. The clipboard retains its material, so repeated pastes of the same item will work without your having to recopy each time.
157
1/8/10 4:32:42 PM
Rev. Confirming Pages
SPELLING CHECKER Most word processors have a spelling checker, which tests for incorrectly spelled words. As you type, the spelling checker indicates (perhaps with a squiggly line) words that aren’t in its dictionary and thus may be misspelled. (• See Panel 3.24 at right.) Special add-on dictionaries are available for medical, engineering, and legal terms. In addition, programs such as Microsoft Word have an Auto Correct function that automatically fixes such common mistakes as transposed letters— replacing “teh” with “the,” for instance. GRAMMAR CHECKER A grammar checker highlights poor grammar, wordiness, incomplete sentences, and awkward phrases. The grammar checker won’t fix things automatically, but it will flag (perhaps with a different-color squiggly line) possible incorrect word usage and sentence structure. (• See Panel 3.25.) THESAURUS If you find yourself stuck for the right word while you’re writing, you can call up an on-screen thesaurus, which will present you with the appropriate word or alternative words.
Formatting Documents with the Help of Templates & Wizards What are some types of formatting I can do? Word can help you choose templates
Left-justified
Justified
Chapter 3
Centered
Right-justified
158
wiL16775_ch03_119-192.indd 158
In the context of word processing, formatting means determining the appearance of a document. You can always format your documents manually, but word processing programs provide a helpful device to speed the process up and make it more sophisticated. A template, called a wizard in older Office versions, is a preformatted document that provides basic tools for shaping a final document—the text, layout, and style for a letter, for example. Simply put, it is a style guide for documents. Because most documents are fairly standard in format, every word processing program comes with at least a few standard templates. When you use a template, you’re actually opening a copy of the template. In this way you’ll always have a fresh copy of the original template when you need it. After you open a copy of the template and add your text, you save this version of the template under the filename of your choice. In this way, for example, in a letterhead template, your project’s name, address, phone number, and web address are included every time you open your letterhead template file. Among the many aspects of formatting are these: FONT You can decide what font—typeface and type size—you wish to use. For instance, you can specify whether it should be Arial, Courier, or Freestyle Script. You can indicate whether the text should be, say, 10 points or 12 points in size and the headings should be 14 points or 16 points. (There are 72 points in an inch.) You can specify what parts should be underlined, italic, or boldface. SPACING & COLUMNS You can choose whether you want the lines to be single-spaced or double-spaced (or something else). You can specify whether you want text to be one column (like this page), two columns (like many magazines and books), or several columns (like newspapers). MARGINS & JUSTIFICATION You can indicate the dimensions of the margins— left, right, top, and bottom—around the text. You can specify the text justification—how the letters and words are spaced in each line. To justify means to align text evenly between left and right margins, as in most newspaper columns and this text. To left-justify means to align text evenly on the left. (Left-justified text has a “ragged-right” margin, as do many business letters.) Centering centers each text line in the available white space between the left and right margins.
1/8/10 4:32:43 PM
Rev. Confirming Pages
Choose Change to insert the highlighted word.
panel 3.24
Red wavy line Indicates spelling checker doesn’t recognize the word.
Spelling checker How a word processing program checks for misspelled words and offers alternatives (Microsoft Word).
Dialog box Suggests correct spellings.
Green wavy line indicates a possible grammar error.
Choose Change to make the suggested correction.
Dialog box suggests a correction.
HEADERS, FOOTERS, & PAGE NUMBERS You can indicate headers or footers and include page numbers. A header is common text (such as a date or document name) printed at the top of every page. A footer is the same thing printed at the bottom of every page. If you want page numbers, you can determine what number to start with, among other things.
wiL16775_ch03_119-192.indd 159
Grammar checker This program points out possible errors in sentence structure and word usage and suggests alternatives (Microsoft Word).
Software
panel 3.25
159
1/8/10 4:32:44 PM
Rev. Confirming Pages
S u rv i v al Ti p When Several Word Documents Are Open You can write with several Word documents open simultaneously. To go (“toggle”) back and forth, hold down Ctrl and press F6. To display several documents at once, go to the Windows menu (2003) or the View tab (2007) and select Arrange All. You can cut and paste text from one document to another.
OTHER FORMATTING You can specify borders or other decorative lines, shading, tables, and footnotes. You can import graphics or drawings from files in other software programs, including clip art—collections of ready-made pictures and illustrations available online or on CDs/DVDs. DEFAULT SETTINGS Word processing programs (and indeed most forms of application software) come from the manufacturer with default settings. Default settings are the settings automatically used by a program unless the user specifies otherwise, thereby overriding them. Thus, for example, a word processing program may automatically prepare a document singlespaced, left-justified, with 1-inch right and left margins, unless you alter these default settings.
Output Options: Printing, Faxing, or Emailing Documents What are some of my output options? Most word processing software gives you several options for printing. For example, you can print several copies of a document. You can print individual pages or a range of pages. You can even preview a document before printing it out. Previewing (print previewing) means viewing a document on-screen to see what it will look like in printed form before it’s printed. Whole pages are displayed in reduced size. You can also send your document off to someone else by fax or email attachment if your computer has the appropriate communications link.
Saving Documents How can I save a document? Saving means storing, or preserving, a document as an electronic file permanently—on your hard disk or a CD, for example. Saving is a feature of nearly all application software. Having the document stored in electronic form spares you the tiresome chore of retyping it from scratch whenever you want to make changes. You need only retrieve it from the storage medium and make the changes you want. Then you can print it out again. (Always save your documents often while you are working; don’t wait!)
Web Document Creation How do I format a document to put it on the web? Saving a document as a web page in Word 2007
Most word processing programs allow you to automatically format your documents into HTML so that they can be used on the web. To do this in Microsoft Word, open File, Save As, Save As Type: Web page (*.htm, *.html).
Chapter 3
Tracking Changes & Inserting Comments How do I and any cowriters make changes visible in a document? Tracking in Word 2007
160
wiL16775_ch03_119-192.indd 160
What if you have written an important document and have asked other people to edit it? Word processing software allows editing changes to be tracked by highlighting them, underlining additions, and crossing out deletions. Each person working on the document can choose a different color so that you can tell who’s done what and when. And anyone can insert hidden questions or comments that become
1/8/10 4:32:46 PM
Rev. Confirming Pages
visible when you pass the mouse pointer over yellow-highlighted words or punctuation. An edited document can be printed out showing all the changes, as well as a list of comments keyed to the text by numbers. Or it can be printed out “clean,” showing the edited text in its new form, without the changes.
3.8 SPREADSHEETS What can I do with an electronic spreadsheet that I can’t do with pencil and paper and a standard calculator? What is a spreadsheet? Traditionally, it was simply a grid of rows and columns, printed on special light-green paper, that was used to produce financial projections and reports. A person making up a spreadsheet spent long days and weekends at the office penciling tiny numbers into countless tiny rectangles. When one figure changed, all other numbers on the spreadsheet had to be erased and recomputed. Ultimately, there might be wastebaskets full of jettisoned worksheets. In 1978, Daniel Bricklin was a student at the Harvard Business School. One day he was staring at columns of numbers on a blackboard when he got the idea for computerizing the spreadsheet. He created the first electronic spreadsheet, now called simply a spreadsheet. The spreadsheet allows users to create tables and financial schedules by entering data and formulas into rows and columns arranged as a grid on a display screen. Before long, the electronic spreadsheet was the most popular small business program. Unfortunately for Bricklin, his version (called VisiCalc) was quickly surpassed by others. Today the principal spreadsheets are Microsoft Excel, Corel Quattro Pro, and IBM’s Lotus 1-2-3. Spreadsheets are used for maintaining student grade books, tracking investments, creating and tracking budgets, calculating loan payments, estimating project costs, and creating other types of financial reports.
The Basics: How Spreadsheets Work What are the basic principles involved with manipulating a spreadsheet? A spreadsheet is arranged as follows. (• See Panel 3.26, next page.) HOW A SPREADSHEET IS ORGANIZED A spreadsheet’s arrangement of columns, rows, and labels is called a worksheet.
•
Column headings: In the worksheet’s frame area (work area), lettered column headings appear across the top (“A” is the name of the first column, “B” the second, and so on).
•
Row headings: Numbered row headings appear down the left side (“1” is the name of the first row, “2” the second, and so forth).
•
Labels: Labels are any descriptive text that identifies categories, such as APRIL, RENT, or GROSS SALES.
CELLS: WHERE COLUMNS & ROWS MEET Each worksheet has more than 17 million cells.
•
Cells & cell addresses: A cell is the place where a row and a column intersect; its position is called a cell address. For example, “A1” is the cell address for the top left cell, where column A and row 1 intersect.
wiL16775_ch03_119-192.indd 161
Software
You use your computer’s keyboard to type in the various headings and labels. Each Office 2007 worksheet has 16,384 columns and 1,048,576 rows, and each spreadsheet file can technically hold up to 650 related worksheets— but the computer’s memory will not likely hold more than about 200.
161
1/8/10 4:32:47 PM
Rev. Confirming Pages
Tabs with command groups
Formula bar
Title bar
Active cell location Heavy outline acts as cursor, to indicate current (active) cell.
Column headings
Row headings
Labels Identify contents of cells
Values Numbers are called values. Worksheet Area
Sheet tabs Let you select a worksheet. (A spreadsheet file can contain several related worksheets, each covering a different topic.)
panel 3.26 Electronic spreadsheet This program is Microsoft Excel.
Status bar Shows details about the document you’re working on.
• •
Ranges: A range is a group of adjacent cells—for example, A1 to A5.
•
Cell pointer: A cell pointer, or spreadsheet cursor, indicates where data is to be entered. The cell pointer can be moved around like a cursor in a word processing program.
Values: A number or date entered in a cell is called a value. The values are the actual numbers used in the spreadsheet—dollars, percentages, grade points, temperatures, or whatever. Headings, labels, and formulas also go into cells.
Chapter 3
FORMULAS, FUNCTIONS, RECALCULATION, & WHAT-IF ANALYSIS Why has the spreadsheet become so popular? The reasons lie in the features known as formulas, functions, recalculation, and what-if analysis.
162
wiL16775_ch03_119-192.indd 162
•
Formulas: Formulas are instructions for calculations; they define how one cell relates to other cells. For example, a formula might be ⫽SUM(A5:A15) or @SUM(A5:A15), meaning “Sum (that is, add) all the numbers in the cells with cell addresses A5 through A15.”
•
Functions: Functions are built-in formulas that perform common calculations. For instance, a function might average a range of numbers or round off a number to two decimal places.
•
Recalculation: After the values have been entered into the worksheet, the formulas and functions can be used to calculate outcomes. However, what was revolutionary about the electronic spreadsheet was its ability to easily do recalculation. Recalculation is the process of recomputing values, either as an ongoing process as data is entered or afterward, with the press of a key. With this simple feature, the hours of mind-numbing work
1/8/10 4:32:47 PM
Rev. Confirming Pages
required to manually rework paper spreadsheets has become a thing of the past.
•
What-if analysis: The recalculation feature has opened up whole new possibilities for decision making. In particular, what-if analysis allows the user to see how changing one or more numbers changes the outcome of the calculation. That is, you can create a worksheet, putting in formulas and numbers, and then ask, “What would happen if we change that detail?”—and immediately see the effect on the bottom line.
Mooving data. A dairy farmer enters feeding data into a spreadsheet.
WORKSHEET TEMPLATES You may find that your spreadsheet software makes worksheet templates available for specific tasks. Worksheet templates are forms containing formats and formulas custom-designed for particular kinds of work. Examples are templates for calculating loan payments, tracking travel expenses, monitoring personal budgets, and keeping track of time worked on projects. Templates are also available for a variety of business needs—providing sales quotations, invoicing customers, creating purchase orders, and writing a business plan. MULTIDIMENSIONAL SPREADSHEETS Most spreadsheet applications are multidimensional, meaning that you can link one spreadsheet to another. A three-dimensional spreadsheet, for example, is like a stack of spreadsheets all connected by formulas. A change made in one spreadsheet automatically affects the other spreadsheets.
What are analytical graphics?
panel 3.27
You can use spreadsheet packages to create analytical graphics, or charts. Analytical graphics, or business graphics, are graphical forms that make numeric data easier to analyze than it is when organized as rows and columns of numbers. Whether viewed on a monitor or printed out, analytical graphics help make sales figures, economic trends, and the like easier to comprehend and visualize. In Excel, you enter your data to the worksheet, select the data, and use the Chart wizard to step through the process of choosing the chart type and various options. Examples of analytical graphics are column charts, bar charts, line graphs, pie charts, and scatter charts. (• See Panel 3.27.) If you have a color printer, these charts can appear in color. In addition, they can be displayed or printed out so that they look three-dimensional. Spreadsheets can even be linked to more exciting graphics, such as digitized maps.
Analytical graphics Bar charts, line graphs, and pie charts are used to display numbers in graphical form.
wiL16775_ch03_119-192.indd 163
Software
Analytical Graphics: Creating Charts
163
1/8/10 4:32:48 PM
Rev. Confirming Pages
3.9
DATABASE SOFTWARE
What is database software, and what is personal information management software? In its most general sense, a database is any electronically stored collection of data in a computer system. In its more specific sense, a database is a collection of interrelated files in a computer system. These computer-based files are organized according to their common elements, so that they can be retrieved easily. Sometimes called a database manager or database management system (DBMS), database software is a program that sets up and controls the structure of a database and access to the data.
The Benefits of Database Software What are two advantages of database software over the old ways of organizing files? When data is stored in separate files, the same data will be repeated in many files. In the old days, each college administrative office—registrar, financial aid, housing, and so on—might have a separate file on you. Thus, there was redundancy—your address, for example, was repeated over and over. This means that when you changed addresses, all the college’s files on you had to be updated separately. Thus, database software has two advantages. INTEGRATION With database software, the data is not in separate files. Rather, it is integrated. Thus, your address need only be listed once, and all the separate administrative offices will have access to the same information. INTEGRITY For that reason, information in databases is considered to have more integrity. That is, the information is more likely to be accurate and up to date. Databases are a lot more interesting than they used to be. Once they included only text. Now they can also include pictures, sound, and animation. It’s likely, for instance, that your personnel record in a future company database will include a picture of you and perhaps even a clip of your voice. If you go looking for a house to buy, you will be able to view a real estate agent’s database of video clips of homes and properties without leaving the realtor’s office. Today the principal microcomputer database programs are Microsoft Access and Corel Paradox. (In larger systems, Oracle is a major player.)
The Basics: How Databases Work What are the basic principles involved with manipulating a database?
Chapter 3
Let’s consider some basic features of databases:
164
wiL16775_ch03_119-192.indd 164
HOW A RELATIONAL DATABASE IS ORGANIZED: TABLES, RECORDS, & FIELDS The most widely used form of database, especially on PCs, is the relational database, in which data is organized into related tables. Each table contains rows and columns; the rows are called records, and the columns are called fields. An example of a record is a person’s address—name, street address, city, and so on. An example of a field is that person’s last name; another field would be that person’s first name; a third field would be that person’s street address; and so on. (• See Panel 3.28.) Just as a spreadsheet may include a workbook with several worksheets, so a relational database might include a database with several tables. For instance, if you’re running a small company, you might have one database
1/8/10 4:32:54 PM
Rev. Confirming Pages
Tabs with command groups
Fields Columns, such as all street addresses, are called fields.
Because this is a relational database, it contains tables.
Records Rows, such as a complete address, are called records. Status bar shows document details
1
A The results of a database query can be printed out in report form.
Forms are used to enter data into tables.
panel 3.28 Some database functions
headed Employees, containing three tables—Addresses, Payroll, and Benefits. You might have another database headed Customers, with Addresses, Orders, and Invoices tables.
FINDING WHAT YOU WANT: QUERYING & DISPLAYING RECORDS The beauty of database software is that you can locate records quickly. For example, several offices at your college may need access to your records but for different reasons: registrar, financial aid, student housing, and so on. Any of these offices can query records—locate and display records—by calling them up on a computer screen for viewing and updating. Thus, if you move, your address field will need to be corrected for all relevant offices of the college. A person
wiL16775_ch03_119-192.indd 165
Software
LINKING RECORDS, USING A KEY In relational databases a key—also called key field, sort key, index, or keyword—is a field used to sort data. For example, if you sort records by age, then the age field is a key. The most frequent key field used in the United States is the Social Security number, but any unique identifier, such as employee number or student number, can be used. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the primary key and must hold a unique value for each record. A key field that identifies records in different tables is called a foreign key. Foreign keys are used to cross-reference data among relational tables.
165
1/8/10 4:32:54 PM
Rev. Confirming Pages
making a search might make the query, “Display the address of [your name].” Once a record is displayed, the address field can be changed. Thereafter, any office calling up your file will see the new address. SORTING & ANALYZING RECORDS & APPLYING FORMULAS With database software you can easily find and change the order of records in a table—in other words, they can be sorted in different ways—arranged alphabetically, numerically, geographically, or in some other order. For example, they can be rearranged by state, by age, or by Social Security number. In addition, database programs contain built-in mathematical formulas so that you can analyze data. This feature can be used, for example, to find the grade-point averages for students in different majors or in different classes. PUTTING SEARCH RESULTS TO USE: SAVING, FORMATTING, PRINTING, COPYING, OR TRANSMITTING Once you’ve queried, sorted, and analyzed the records and fields, you can simply save them to your hard disk, CD, or other secondary storage medium. You can format them in different ways, altering headings and typestyles. You can print them out on paper as reports, such as an employee list with up-to-date addresses and phone numbers. A common use is to print out the results as names and addresses on mailing labels—adhesive-backed stickers that can be run through your printer and then stuck on envelopes. You can use the Copy command to copy your search results and then paste them into a paper produced on your word processor. You can also cut and paste data into an email message or make the data an attachment file to an email, so that it can be transmitted to someone else.
Personal Information Managers How could a personal information manager be valuable to me? Pretend you are sitting at a desk in an old-fashioned office. You have a calendar, a Rolodex-type address file, and a notepad. Most of these items could also be found on a student’s desk. How would a computer and software improve on this arrangement? Many people find ready uses for specialized types of database software known as personal information managers. A personal information manager (PIM) is software that helps you keep track of and manage information you use on a daily basis, such as addresses, telephone numbers, appointments, to-do lists, and miscellaneous notes. Some programs feature phone dialers, outliners (for roughing out ideas in outline form), and ticklers (or reminders). With a PIM, you can key in notes in any way you like and then retrieve them later based on any of the words you typed. Popular PIMs are Microsoft Outlook and Lotus SmartSuite Organizer (PC), and Contactizer Pro and Yojimbo (Mac). Microsoft Outlook, for example, has
panel 3.29 Timeline Developments in software
3000 BCE
1621 CE Slide rule invented (Edmund Gunther)
1642 First mechanical adding machine (Blaise Pascal)
1801 A linked sequence of punched cards controls the weaving patterns in Jacquard’s loom
1820 The first massproduced calculator, the Thomas Arithnometer
1833 Babbage’s difference engine (automatic calculator)
Chapter 3
Abacus is invented in Babylonia
166
wiL16775_ch03_119-192.indd 166
1/8/10 4:32:56 PM
Rev. Confirming Pages
panel 3.30 Personal information manager Microsoft Outlook 2007
sections such as Inbox, Calendar, Contacts, Tasks (to-do list), Journal (to record interactions with people), Notes (scratchpad), and Files. (• See Panel 3.30.)
3.10 SPECIALTY SOFTWARE What are the principal uses of specialty software? After learning some of the productivity software just described, you may wish to become familiar with more specialized programs. For example, you might first learn word processing and then move on to desktop publishing, or first learn spreadsheets and then learn personal-finance software. We will consider the following kinds of software, although they are but a handful of the thousands of specialized programs available: presentation graphics, financial, desktop-publishing, drawing and painting, project management, computer-aided design, video/audio editing, animation, and web page design software.
World’s first computer programmer, Ada Lovelace, publishes her notes
wiL16775_ch03_119-192.indd 167
1854 George Boole publishes “An Investigation on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design
1890 Electricity used for first time in a dataprocessing project — Hollerith’s automatic census-tabulating machine (used punched cards)
1924 T.J. Watson renames Hollerith’s machine company, founded in 1896, to International Business Machines (IBM)
1930 General theory of computers (MIT)
1944 First electromechanical computer (Mark I)
Software
1843
167
1/8/10 4:32:57 PM
Rev. Confirming Pages
Presentation Graphics Software How could I do a visual presentation, using presentation graphics software? Presentation graphics software is intended primarily for the business user, for creating slide-show presentations, overhead transparencies, reports, portfolios, and training materials. Presentation graphics software uses graphics, animation, sound, and data or information to make visual presentations. Presentation graphics are much more fancy and complicated than are analytical graphics. Pages in presentation software are often referred to as slides, and visual presentations are commonly called slide shows. They can consist, however, not only of 35-mm slides but also of paper copies, overhead transparencies, video, animation, and sound. Completed presentations are frequently published in multiple formats, which may include print, the web, and electronic files. Most often, presentation projects are used in live sessions. They are commonly projected onto large screens or printed on overhead transparencies. The slides may be distributed in printed form as handouts to accompany the live presentation. Slides are generally intended to be followed in an ordered sequence, although some presentations may utilize interactive forms of navigation. More and more of this software now has the ability to export to HTML for posting presentations on the web. You may already be accustomed to seeing presentation graphics because many college instructors now use such software to accompany their lectures. Well-known presentation graphics packages include Microsoft PowerPoint, Corel Presentations, Harvard Graphics, and Presentation Graphics SDK. (• See Panel 3.31.) Companies such as Presentation Load specialize in professional templates for sophisticated business presentations. Presentation graphics packages often come with slide sorters, which group together a dozen or so slides in miniature. The person making the presentation can use a mouse or a keyboard to bring the slides up for viewing or even start a self-running electronic slide show. You can also use a projection system from the computer itself. PowerPoint provides three types of movements: Entrance, emphasis, and exit of elements on a slide itself are controlled by what PowerPoint calls Custom Animations. Transitions are movements between slides. These can be animated in a variety of ways. Custom animation can be used to create small story boards by animating pictures to enter, exit, or move. Speech bubbles with edited text can be set on and off to create speech. Just as word processing programs offer templates for faxes, business letters, and the like, presentation graphics programs offer templates to help you organize your presentation, whether it’s for a roomful of people or over the internet. Templates are of two types: design and content.
Chapter 3
1946 First programmable electronic computer in United States (ENIAC)
•
Design templates: These offer formats, layouts, background patterns, and color schemes that can apply to general forms of content material.
•
Content templates: These offer formats for specific subjects. For instance, PowerPoint offers templates for “Selling Your Ideas,” “Facilitating a Meeting,” and “Motivating a Team.” 1967 A graphical user interface (GUI) is a main theme of Jeff Raskin, who later became an Apple Macintosh team leader; handheld calculator
1969–1971 Unix is developed and released by Bell Laboratories
1970 Microprocessor chips come into use; floppy disk introduced for storing data
168
wiL16775_ch03_119-192.indd 168
1/8/10 4:32:58 PM
Rev. Confirming Pages
Tabs with command groups
Outline View helps you organize the content of your material in standard outline form.
panel 3.31 Presentation graphics Microsoft PowerPoint helps you prepare and make visual presentations.
Slide View shows you what a single slide looks like.
Slide Sorter View displays all the slides as miniatures.
Notes Page View shows a small version of the slide plus the notes you will be using as speaker notes.
DRESSING UP YOUR PRESENTATION Presentation software makes it easy to dress up each visual page (“slide”) with artwork by pulling in (“dragging and dropping”) clip art from other sources. Although presentations may make use of some basic analytical graphics—bar, line, and pie charts—they generally use much more sophisticated elements. For instance, they may display different
Xerox PARC develops an experimental PC that uses a mouse and a GUI
1975 Bill Gates and Paul Allen start Microsoft in Albuquerque, N.M. (move to Seattle in 1979); first microcomputer (MITS Altair 8800)
1976 Apple I computer (first personal computer sold in assembled form)
1977 Apple II’s floppy disk drive leads to writing of many software programs
Software
1973
169
wiL16775_ch03_119-192.indd 169
1/8/10 4:32:59 PM
Rev. Confirming Pages
Getting started in Microsoft Office PowerPoint 2007: 1 Tabs are designed to be taskoriented; 2 groups within each tab break a task into subtasks; 3 command buttons in each group carry out a command or display a menu of commands.
textures (speckled, solid, cross-hatched), color, and three-dimensionality. In addition, you can add sound clips, special visual effects (such as blinking text), animation, and video clips. (You can, in fact, drag and drop art and other enhancements into desktop-publishing, word processing or other standard PC applications.)
more
info! Adding Clip Art
Financial Software
For information on adding clip art to presentation slides, check out:
What are the features of financial software that could be useful to me?
www.communicateusing technology.com/articles/ using_clip_art_photo.htm
Financial software is a growing category that ranges from personal-finance managers to entry-level accounting programs to business financial-management packages. Consider the first of these, which you may find particularly useful. Personalfinance managers let you keep track of income and expenses, write checks, do online banking, and plan financial goals. (• See Panel 3.32.) Such programs don’t promise to make you rich, but they can help you manage your money. They may even get you out of trouble. Many personal-finance programs, such as Quicken and Microsoft Money, include a calendar and a calculator.
www.clipartpress.com/43 http://presentationsoft. about.com/od/nextstepsin powerpoint/ss/add_pics.htm For information on obtaining clip art, go to: www.clipartinc.com http://dir.yahoo.com/ Computers_and_Internet/ Graphics/Clip_art/
FEATURES OF FINANCIAL SOFTWARE The principal features are these:
http://office.microsoft.com/ en-us/clipart/default.aspx
•
Chapter 3
1978 The first electronic spreadsheet, VisiCalc, is introduced; WordStar, the first commercial word processor for consumers, is introduced
Tracking of income and expenses: The programs allow you to set up various account categories for recording income and expenses, including credit card expenses.
1980 Microsoft obtains DOS version that becomes PC-DOS for IBM PC.
1981 Xerox introduces mouse-operated icons, buttons, and menus on the Star computer; IBM introduces personal computer (IBM PC)
1982 Portable computers
1983 Bill Gates announces the first version of the Windows operating system (and releases it two years later)
1984 Apple Macintosh; first personal laser printer; the Apple Macintosh introduces the first widely used GUI; Mac System 1.0 is introduced
170
wiL16775_ch03_119-192.indd 170
1/8/10 4:33:03 PM
Rev. Confirming Pages
panel 3.32 Financial software Microsoft Money can be used for all sorts of money-related management. It includes guidance tips for setting up your accounts.
•
Checkbook management: All programs feature checkbook management, with an on-screen check-writing form and check register that look like the ones in your checkbook. Checks can be purchased to use with your computer printer.
•
Reporting: All programs compare your actual expenses with your budgeted expenses. Some will compare this year’s expenses to last year’s.
•
Income tax: All programs offer tax categories, for indicating types of income and expenses that are important when you’re filing your tax return.
•
Other: Some of the more versatile personal-finance programs also offer financial-planning and portfolio-management features.
GOING BEYOND PERSONAL FINANCE Besides personal-finance managers, financial software includes small business accounting and tax software programs, which provide virtually all the forms you need for filing income taxes. Tax programs such as TaxCut and TurboTax make complex calculations, check for mistakes, and even unearth deductions you didn’t know existed. Tax programs can be linked to personal-finance software to form an integrated tool. Many financial software programs may be used in all kinds of enterprises. For instance, accounting software such as Intuit Quickbooks and Sage Software’s Peachtree automates bookkeeping tasks, while payroll software keeps records of employee hours and produces reports for tax purposes. Some programs go beyond financial management and tax and accounting management. For example, Business Plan Pro and Small Business Management Pro can help you set up your own business from scratch.
Aldus PageMaker becomes the first integrated desktop publishing program; Microsoft Windows 1.0 is released; Mac. System 2.0
wiL16775_ch03_119-192.indd 171
1986 Mac System 3.0
1987 Microsoftʼs Excel program introduced; Mac system 4.0, then 5.0
1988 Mac System 6.0
1990 Microsoft introduces Windows 3.0 in May, intensifying its legal dispute with Apple over the softwareʼs “look and feel” resemblance to the Macintosh operating system
1991 Linus Torvalds introduces Linux; Mac System 7.0
Software
1985
171
1/8/10 4:33:04 PM
Rev. Confirming Pages
Desktop-publishing software. Named after the subatomic particle proposed as the building block for all matter, the Quark company was founded in Colorado in 1981. QuarkXPress was released in 1987 and made an immediate impact on the fledgling desktop publishing business. QuarkXPress introduced precision typography, layout, and color control to the desktop computer.
Finally, there are investment software packages, such as StreetSmart Pro from Charles Schwab and Online Xpress from Fidelity, as well as various retirement-planning programs.
Desktop Publishing What are the principal features of desktop-publishing software? Adobe Systems was founded in 1982, when John Warnock and Charles Geschke began to work on solving some of the long-standing problems that plagued the relationship between microcomputers and printers. Collaboration with Apple Computers produced the first desktop-publishing package, using Adobe PostScript, a printer language that can handle many fonts and graphics, in 1984. By 1987, Adobe had agreements with IBM, Digital, AST Research, HewlettPackard, and Texas Instruments for them to use PostScript in their printers. Desktop publishing (DTP) involves mixing text and graphics to produce high-quality output for commercial printing, using a microcomputer and mouse, scanner, laser or ink-jet printer, and DTP software. Often the printer is used primarily to get an advance look before the completed job is sent to a typesetter service bureau for even higher-quality output. Service bureaus have special machines that convert the DTP files to film, which can then be used to make plates for offset printing. Offset printing produces higher-quality documents, especially if color is used, but is generally more expensive than laser printing.
Chapter 3
1992 Microsoft’s Access database program released
172
wiL16775_ch03_119-192.indd 172
1993
1994
Multimedia desktop computers PDF software
Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; Netscape’s first web browser is introduced (based on Mosaic, introduced in 1993)
1995 Windows 95 is released
1997
1998
Windows 98 Mac OS 8 sells 1.25 million copies is released in its first two weeks; Mac System 8.0
1/8/10 4:33:06 PM
Rev. Confirming Pages
FEATURES OF DESKTOP PUBLISHING Desktop publishing has these characteristics:
•
Mix of text with graphics: Desktop-publishing software allows you to precisely manage and merge text with graphics. As you lay out a page on-screen, you can make the text “flow,” liquidlike, around graphics such as photographs. You can resize art, silhouette it, change the colors, change the texture, flip it upside down, and make it look like a photo negative.
•
Varied type and layout styles: As do word processing programs, DTP programs support a variety of fonts, or typestyles, from readable Times Roman to staid Tribune to wild Jester and Scribble. Additional fonts can be purchased on disk or downloaded online. You can also create all kinds of rules, borders, columns, and page-numbering styles.
•
Use of files from other programs: It’s usually not efficient to do word processing, drawing, and painting with the DTP software. As a rule, text is composed on a word processor, artwork is created with drawing and painting software, and photographs are input using a scanner and then modified and stored using image-editing software. Prefabricated art to illustrate DTP documents may be obtained from clip-art sources. The DTP program is used to integrate all these files. You can look at your work on the display screen as one page, as two facing pages (in reduced size), or as “thumbnails.” Then you can see it again after it has been printed out. (• See Panel 3.33.)
4
2
1999
5
6 DTP software is used to make up pages.
How desktop publishing uses other files
A black-and-white or color printer, usually a laser printer, prints out the pages.
Images scanned to disk by a scanner.
1
Art created with drawing or painting software.
2000
2001
2003
Adobe Windows 2000 Windows XP InDesign (ME) is released; becomes Mac System 9.0 available; Mac OS X ships
2007
Microsoft Vista OS (Pre-Beta) first introduced; Windows Mobile released
2008
Windows Vista commercially availiable; Mac OS X.5 (Leopard) available
Text created with word processing software.
2009
2012?
Cloud Windows 7 computing starts to take off
Most software will be open-source; 3-D user interface
Software
3
The files created in Steps 1 , 2 , 3 are imported into a DTP document.
panel 3.33
173
wiL16775_ch03_119-192.indd 173
1/8/10 4:33:07 PM
Rev. Confirming Pages
BECOMING A DTP PROFESSIONAL Not everyone can be successful at desktop publishing, because many complex layouts require experience, skill, and knowledge of graphic design. Indeed, use of these programs by nonprofessional users can lead to rather unprofessional-looking results. Nevertheless, the availability of microcomputers and reasonably inexpensive software has opened up a career area formerly reserved for professional typographers and printers. QuarkXPress and Adobe InDesign are professional DTP programs. Microsoft Publisher is a “lowend,” consumer-oriented DTP package. Some word processing programs, such as Word and WordPerfect, also have many DTP features, although still Page design and layout in Adobe InDesign not at the sophisticated level of the specialized DTP software. DTP packages, for example, give you more control over typographical characteristics and provide more support for full-color output.
Drawing & Painting Programs How do drawing and painting programs differ? 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
12,13
5,3
12,3
0 1 2 3 4 5 6 7 8 910111213141516
Vector image
00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 1 00 0 0 0 0 0 0 0 0 0 1 0 00 0 0 0 0 0 0 0 0 1 0 0 00 0 0 0 0 0 0 0 1 0 0 0 00 0 0 0 0 0 0 1 0 0 0 0 00 0 0 0 0 0 1 0 0 0 0 0 00 0 0 0 0 1 0 0 0 0 0 0 00 0 0 0 1 0 0 0 0 0 0 0 00 0 0 1 1 1 1 1 1 1 1 1 00 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0
Bit-mapped image
more
Chapter 3
info!
It may be no surprise to learn that commercial artists and fine artists have largely abandoned the paintbox and pen-and-ink for software versions of palettes, brushes, and pens. However, even nonartists can produce good-looking work with these programs. There are two types of computer art programs, also called illustration software—drawing and painting. DRAWING PROGRAMS A drawing program is graphics software that allows users to design and illustrate objects and products. Some drawing programs are CorelDRAW, Adobe Illustrator, and Macromedia Freehand. Drawing programs create vector images—images created from geometrical formulas. Almost all sophisticated graphics programs use vector graphics. PAINTING PROGRAMS Painting programs are graphics programs that allow users to simulate painting on-screen. A mouse or a tablet stylus is used to simulate a paintbrush. The program allows you to select “brush” sizes, as well as colors from a color palette. Examples of painting programs are Adobe PhotoShop, Microsoft Photo Editor, Corel Photopaint, and JASC’s PaintShop Pro. Painting programs produce bit-mapped images, or raster images, made up of little dots. Painting software is also called image-editing software because it allows you to retouch photographs, adjust the contrast and the colors, and add special effects, such as shadows. SOME GRAPHICS FILE FORMATS When you create an image, it’s important to choose the most appropriate graphics file format, which specifies the method of organizing information in a file. Among the most important graphics formats you are apt to encounter are these:
•
.bmp (BitMaP): This bitmap graphic file format is native to Microsoft Windows and is used on PCs. Microsoft Paint creates .bmp file formats.
•
.gif (Graphic Interchange Format): This format is used in Web pages and for downloadable online images.
•
.jpeg (Joint Photographic Experts Group): Pronounced “jay-peg,” this bitmap format is used for websites and for photos and other highresolution images.
File Formats For a complete list of file formats, go to: http://en.wikipedia.org/wiki/ List_of_file_formats
174
wiL16775_ch03_119-192.indd 174
1/8/10 4:33:09 PM
Rev. Confirming Pages
•
.tiff (Tagged Image File Format): This bitmap format is used on both PCs and Macs for high-resolution files that will be printed.
•
.png (Portable Network Graphics): This file format was specifically created for web page images and can be used as a public domain alternative to .gif for compression.
Video/Audio Editing Software Could I benefit from using video/audio editing software? The popularity of digital camcorders (“camera recorders”) has caused an increase in sales of video-editing software. This software allows you to import video footage to your PC and edit it, for example, deleting parts you don’t want, reordering sequences, and adding special effects. Popular video-editing software packages include Adobe Premiere, Sony Pictures Digital Vegas, Apple Final Cut Express, Pinnacle Studio DV, and Ulead VideoStudio. Audio-editing software provides similar capabilities for working with sound tracks, and you can also clean up background noise (called artifacts) and emphasize certain sound qualities. Sound-editing software includes Windows Sound Recorder, Sony Pictures Digital Sound Forge, Audacity (freeware), Felt Tip Software’s Sound Studio (shareware), GoldWave, and WavePad. Video and audio are covered in more detail in Chapter 5.
Animation Software How does animation software differ from video software? Animation is the simulation (illusion) of movement created by displaying a series of still pictures, or frames, very quickly in sequence. Computer animation refers to the creation of moving images by means of a computer. Whereas video devices record continuous motion and break it up into discrete frames, animation starts with independent pictures and puts them together to form the illusion of continuous motion. Animation is one of the chief ingredients of multimedia presentations and is commonly used on web pages. There are many software applications that enable you to create animations that you can display on a computer monitor. The first type of animation to catch on for web use was called GIF (for Graphics Interchange Format) animation, and it is still very popular today. GIF files contain a group of images that display very quickly to simulate movement when a web page viewer clicks on the file icon. Animated GIF Construction Professional enables users to easily create animation via the use of a wizard. It
Sur v iv a l T ip Compressing Web & Audio Files Video and audio files tend to be very large, so they need to be edited down and compressed to be as short as possible, especially if they are to be used on web pages. Your software documentation will explain how to do this.
more
info! About Animation For sources about animation, go to: http://webreference.com/3d/ For schools offering training in computer-based graphics, including animation, check out: www.computertrainingschool. com/?googleanimation⫽ y&got⫽3d_animation_ training&t⫽30
Software
Sophisticated application software. Animation artist at work at the Studio Ghibli, Mitaka, Japan.
175
wiL16775_ch03_119-192.indd 175
1/8/10 4:33:09 PM
Rev. Confirming Pages
Screen from a GIF animation program
allows the creation of many special effects and supports compression, as well as offering tutorials. Among the many other GIF animation software packages are 3D GIF Designer and The Complete Animator.
Multimedia Authoring Software What is multimedia authoring software? Multimedia authoring software combines text, graphics, video, animation, and sound in an integrated way to create stand-alone multimedia applications. Content can be burned to CDs/DVDs or delivered via the web. Until the mid-1990s, multimedia applications were relatively uncommon, owing to the expensive hardware required. With increases in performance and decreases in price, however, multimedia is now commonplace. Nearly all microcomuters are capable of displaying video, though the resolution available depends on the power of the computer’s video adapter and CPU. Macromedia Director and Macromedia Authorware are two popular multimedia authoring packages. Many websites, as well as business training centers and educational institutions, use multimedia to develop interactive applications.
Web Page Design/Authoring Software
Chapter 3
How could using web page design software be to my benefit?
176
Multimedia authoring software
wiL16775_ch03_119-192.indd 176
Web page design/authoring software is used to create web pages with sophisticated multimedia features. A few of these packages are easy enough for beginners to use. Some of the best-known are Adobe Dreamweaver, Adobe Flash, Coffee Cup Visual Site designer, RealMac Rapid Weaver, Microsoft Expression Web 2, and Dynamic HTML Editor. These tools generate the necessary HTML coding (and other,
1/8/10 4:33:15 PM
Rev. Confirming Pages
panel 3.34 (Top) HTML coded text; (bottom) the same text translated into WYSIWYG form by Reall’s HTML WYSIWYG Editor
more
info! Web Authoring This site offers a lot of information on web authoring tools: http://webdesign.about.com/ od/htmleditors/HTML_ Editors_Web_Page_ Authoring_Tools.htm
more
info!
wiL16775_ch03_119-192.indd 177
For 5 basic steps of web design, go to: www.grantasticdesigns. com/5rules.html For information on becoming a professional website designer, try: http://designeducation. allgraphicdesign.com/ http://websitetips.com/ business/education/ www.sessions.edu/courses/ index.asp www.tuj.ac.jp/newsite/main/ cont-ed/certificate/graphic_ design.html
Software
newer language coding) based on the user’s design and content and present everything to the design in a WYSIWYG (“what you see is what you get”) form. (• See Panel 3.34.) Internet access providers also offer some free, easy-to-use web-authoring tools for building simple websites. They help you create web pages, using icons and menus to automate the process; you don’t need to know hypertext markup language (HTML, Chapter 2) to get the job done. These automated tools let you select a prepared, template web page design, type a few words, add a picture or two—and you’re done. To save the pages and make them accessible on the internet, the provider grants you a certain amount of space on its web servers. Website design can include much more than text: for example, animation, video, sound, interactivity, search-engine functions. But before creating a website, the designer must first plan exactly what is needed in the website—define the audience, as well as the purpose and the content. Once a web site is completed, it must be uploaded (published) in order to be available to internet
177
1/8/10 4:33:16 PM
Rev. Confirming Pages
PRACTICAL ACTION Help in Building Your Web Page
L
ocal and national internet access providers often offer web-page-building tools, as well as space on their servers for storing your web page. Other sources of information for designing and building web pages are these:
For Novices •
Yahoo!: Yahoo! offers web-page-building tools and templates under the name SiteBuilder (http://webhosting. yahoo.com/ps/sb/index.php), which enables you to add music and other special effects to your web pages and have components that track how many people visit your site. For a fee, Yahoo! offers unlimited storage for your website and will help you determine your URL (website address).
•
Lycos: Lycos offers templates and tools, and it also offers tutorials to help you get started if you want to build your own pages from scratch. Lycos also offers free space in its Tripod area (www.tripod.lycos.com). As with Yahoo!,
you will have advertisements on your pages unless you pay a small fee to get rid of them. •
Google Sites: Google offers this free online tool that makes it easy for anyone to create and publish web pages in just minutes. You can see what your pages will look like, and you can edit your pages right in your browser. Google will host your web pages on your own site at www.sites.google.com.
Once you’ve created your website, you’ll need to “publish” it—upload it to a web server for viewing on the internet. You can get upload instructions from your online service or internet access provider, which may also provide space (for free or for a fee) on its servers. (Or, as we mention below, if you have a powerful, large-storage-capacity microcomputer that has an always-on internet connection, you can use it to host your own website.) For much more information about building and storing your own web pages, just do a keyword search using “build web page” or “website design” in any good search engine.
users via a browser. Some people with powerful personal computers and an always-on internet connection, such as cable, leave their websites on their own computers; the website is accessed by users typing in the site’s URL (web address; Chapter 2) in their browsers. Most people, however, use FTP software (Chapter 2) to upload their website files to a server host, where, for a fee, the website is stored for access. Complicated business websites are created and maintained by professional website developers.
Chapter 3
Inserting an Adobe Photoshop photo file into a Dreamweaver web page that is being designed
Project Management Software Should I learn to use project management software? As we have seen, a personal information manager (PIM) can help you schedule your appointments and do some planning. That is, it can help you manage your own life. But what if you need to manage the lives of others in order to accomplish a full-blown project, such as steering a political campaign or handling a nationwide road tour for a band? Strictly defined, a project is a one-time operation involving several tasks and multiple resources that must be organized toward completing a specific goal within a given period of time. The project can be small, such as an advertising campaign for an in-house
178
wiL16775_ch03_119-192.indd 178
1/8/10 4:33:17 PM
Rev. Confirming Pages
advertising department, or large, such as construction of an office tower or a jetliner. Project management software is a program used to plan and schedule the people, costs, and resources required to complete a project on time. (See • Panel 3.35.) For instance, the associate producer on a feature film might use such software to keep track of the locations, cast and crew, materials, dollars, and schedules needed to complete the picture on time and within budget. The software would show the scheduled beginning and ending dates for a particular task—such as shooting all scenes on a certain set—and then the date that task was actually completed. Examples of project management software are Mindjet MindManager Pro 8, MindView, Intuit, Microsoft Project, FastTrackSchedule, and Project KickStart.
panel 3.35 Project management software: Microsoft Project
Portable Document Format (PDF) Short for Portable Document Format, PDF is a file format developed by Adobe Systems. PDF captures text, graphic, and formatting information from a variety of applications on different platforms making it possible to send documents and have them appear on the recipient’s monitor (or printer) as they were intended to be viewed. (See • Panel 3.36, next page.) A properly prepared PDF file maintains the original fonts, images, colors, and graphics, as well as the exact layout of the file. Originally, PDF was mostly used by graphic artists, designers, and publishers for producing color page proofs. Today, however PDF is used for virtually any data that needs to be exchanged among applications and users. Individuals, businesses, and government agencies around the world trust and rely on PDF to communicate. PDF files are widely used on websites and are also used to distribute electronic documents over networks and via email.
Software
Why is PDF useful?
179
wiL16775_ch03_119-192.indd 179
1/8/10 4:33:19 PM
Rev. Confirming Pages
panel 3.36 Screen from the Adobe Acrobat PDF tutorial; (lower right corner) Adobe PDF file icon. Any file in the PDF format will have this icon next to the filename.
A PDF file can be shared, viewed, and printed by anyone using the free downloadable Adobe Reader software regardless of the operating system and original application used. PDF can also be used on mobile devices. In addition, many applications, such as Microsoft Word, enable users to save their files in a PDF version. To be able to create and work with all of Adobe’s PDF features, you need to purchase the complete Adobe Acrobat Suite.
Computer-Aided Design more
info! The Ultimate CAD Directory This directory has information about all sorts of CAD products to suit every type of need: www.tenlinks.com/CAD
S u rv i v al Ti p Try before You Buy
Chapter 3
Free trial versions of software are often offered as downloads from company sites.
What could I do with a CAD program? Computers have long been used in engineering design. Computer-aided design (CAD) programs are intended for the design of products, structures, civil engineering drawings, and maps. CAD programs, which are available for microcomputers, help architects design buildings and workspaces and help engineers design cars, planes, electronic devices, roadways, bridges, and subdivisions. CAD and drawing programs are similar. However, CAD programs provide precise dimensioning and positioning of the elements being drawn, so they can be transferred later to computer-aided manufacturing (CAM) programs. Also, CAD programs lack some of the special effects for illustrations that come with drawing programs. One advantage of CAD software is that the product can be drawn in three dimensions and then rotated on the screen, so the designer can see all sides. (• See Panel 3.36.) Examples of popular CAD programs are Autodesk, AutoCAD, TurboCAD, Alibre Design, and PowerCADD. Computer-aided design/computer-aided manufacturing (CAD/CAM) software allows products designed with CAD to be input into an automated manufacturing system that makes the products. For example, CAD/CAM systems brought a whirlwind of enhanced creativity and efficiency to the fashion industry. The designs and specifications are then input into CAM systems that enable robot pattern-cutters to automatically cut thousands of patterns from fabric with only minimal waste. Whereas previously the fashion industry worked about a year in advance of delivery, CAD/CAM has cut that time to less than 8 months—a competitive edge for a field that feeds on fads.
180
wiL16775_ch03_119-192.indd 180
1/8/10 4:33:20 PM
Rev. Confirming Pages
panel 3.37
Software
CAD CAD software is used for nearly all threedimensional designing. (Top) TurboCAD; (bottom) Autodesk.
181
wiL16775_ch03_119-192.indd 181
1/8/10 4:33:20 PM
Rev. Confirming Pages
EXPERIENCE BOX The Mysteries of Tech Support
Y
our screen flashes “Fatal Error.” Your new software upgrade totals your printer. You can’t connect to your internet access provider. No wonder one online survey found that nearly 20% of the respondents admitted they’d dropped a computer on the floor out of anger.20 Because of the complicated mesh of elements—software, hardware, communications, people—Murphy’s Law (“If anything can go wrong, it will”) seems to apply in computing as almost nowhere else. Thus, one of the most valuable tasks you can learn is how to deal with tech support—getting technical help on the phone or online when things don’t work. (There’s no need to be shy. One survey found that nearly half of all U.S. tech users said they needed assistance with their new gadgets.)21
What’s Wrong with Tech Support? It has been found that for every $1 the typical company spends buying information technology, it will spend $4–$10 making it all work.22 Thus, more than two decades after Apple Computer revolutionized PC software with intuitive, easy-to-use designs, software companies have begun to get the message about the importance of usability.23 Simultaneously, technology companies have also had to try to improve their tech support operations, which customers said were falling down on the job. The result was tedious delays on help lines and complaints about unhelpful tech advice, among other things. Two problems seem to affect the tech support industry:
Chapter 3
• Information technology is becoming more complex: The more personal computers and other infotech devices are expected to do—music, video, photos, DVDs, home networking, and so on—the more complex the interaction between the components and the harder it is to figure out what’s wrong. In addition, points out technology writer Edward C. Baig, “The severe outbreak of viruses, worms, and spyware makes the support task more daunting.”24
182
• Manufacturers practice a “blame game”: One computer user found he had a possible online virus (a rogue program that can damage a computer) when he started up his PC. He first called the computer manufacturer, who said it was a software issue, but the software maker could provide help only if he went online, which his affected computer didn’t allow him to do. Later he discovered the antivirus manufacturer had tech support phone numbers, but there was a charge ($3.95 a minute) for their use. Eventually a friend had to help him out. This kind of experience is not uncommon.
wiL16775_ch03_119-192.indd 182
Improving Your Chances for Avoiding Tech Support Hassles Wouldn’t it be wonderful if you never had to go through tech support agony in the first place? Here are three things technology writer Baig suggests that you can do in advance to improve your chances:25 • Never upgrade, and never add software: “If your PC is working fine and you have no ambitions for doing more,” says Baig, “don’t mess around” by adding new hardware accessories or new software. Many problems occur, for instance, because of conflicts between the operating system and special software (known as drivers) that arise when people do upgrades or add software that didn’t come with the original system. (Of course, this would seem to defeat one of the purposes of having a computer in the first place—that you can save money by readily adding new things to it. If you must do so, ask the retailer from whom you buy them to handle the installation. But you probably can’t do this if you ordered your original equipment from an online seller.) • Use the web to research a manufacturer’s tech support before you buy: If you decide to upgrade/add anyway, go to the manufacturer’s website and look at tech support resources to see “how coherent and easily accessible” they are, advises Baig. This will also give you some feel for the kinds of problems customers are having. • Call tech support before you buy: Calling tech support in advance of purchasing may cost you something in long-distance charges, but you’ll also find out how confusing the voice menu is and how long it takes to reach a live human. We would add some other tips: • Create a fact sheet with your computer’s important specs: When you get a computer, create a fact sheet listing the important technical specifications and attach it to the outside of the case. This will provide you with the kind of information that tech support personnel are apt to ask should you call on them. Take a copy along with you whenever you buy a game or other video- and sound-intensive application to make sure it is compatible with the rest of your system.26 • If you have a communication problem, hang up and call again: Many companies now hire people in offshore call centers as tech support specialists, and sometimes you may have trouble with foreign accents. If this happens to you, hang up and call again.
1/8/10 4:33:21 PM
Rev. Confirming Pages
Price
Services
AAATechSupport.com 800-392-5938 www.aaatechsupport.com
First 2 minutes free. $2.79 per minute after that.
Support for most computer products
Ask Dr. Tech 800-AskDrTech www.AskDrTech.com
$149 per year, $39 per month, $19 per call
Phone, email, or online chat support for PCs and peripherals
geeks to go! Toll free: 888-433-5435 www.geekstogo.com/
free
Live chat support with consultants and forums for numerous software and hardware problems
Live Repair www.liverepair.com/com/ individual.asp
Varies
Tech support via web-based chat for PCs, phone, and email
Speak With A Geek 866-933-HELP www.speakwithageek.com
Individual plan $34.95 per month
Phone, email, or online chat PC support
Geek Squad 1-800-433-5778 www.geeksquad.com
From $29 to about $300, depending on the problem; at your location, one of their stores, or at a Best Buy store
Almost any problem related to computers, electronics, and networks
Geeks on Call 1-800-905-GEEK www.geeksoncall.com
Varies, depending on the problem
Same as above
Nerds On Site 1-877-696-3737 www.nerdsonsite.us
Same as above
Same as above
iYogi 866-242-4609 www.iyogi.net/tollfree1/ tech-support
$120 per year
24/7 PC and peripherals support
Mac Help 954-726-9525 www.lookatmymac.com/? gclid=CNiy7oW61JQCFR GiiQodggG5kA
$1.50 per minute or $90 per hour phone/live chat support; on-site $120 per hour
Support for Mac-related issues
JustAnswer.mac http://mac.justanswer.com/ mac
Create an account and name your price for an answer to your problem; email and live chat
Same as above
Finding Your Own Personal Tech Support Can’t get any satisfaction from Microsoft (whose tech support might charge you $35 per incident), Apple, Dell, or the like? Maybe you should turn to your own personal support service—for instance, to Support Freaks, iYogi, BluePhone, or Speak With a Geek. (• See Panel 3.38.) Because these services don’t have a stake in any particular kind of software or hardware, you are more apt to avoid the blamegame problem. “We’ll support your Gateway talking to your Compaq talking to your scanner talking to your digital camera,” says a representative of Speak With a Geek.27 However, because most of these operations are small, you may find yourself waiting while whoever answers the phone or online inquiry tracks down an on-call consultant to help you. If you’re prepared to pay, however, companies such as Geek Squad, as well as local specialists, will come to your house or office. Personalized tech support can be paid for on an hourly basis, service-call basis, or subscription basis, as the chart shows.
Other Sources of Help Although usually less specific in solving your problem, there are nonetheless a number of other sources of help to be aware of:
wiL16775_ch03_119-192.indd 183
panel 3.38 Some individual technical support services 800 and 888 numbers are toll-free. Most services are available 24 hours a day, 7 days a week. Note that not all operations serve Macintosh users, and not all have a phone option— which can be a handicap when you’re not able to go online.
• Help: instruction manuals, software, and online: User guides or instruction manuals printed on paper have traditionally accompanied software. Now most software publishers rely more on Help programs on a CD/DVD or in downloadable PDF manuals. Help programs are also available through the internet. The problem with this approach, of course, is, How do you go online to solve the problem of your computer not working if your computer isn’t working? (It helps to have two computers.) • Commercial how-to books: How-to books are the kind of books found both in computer stores and in general bookstores such as Barnes & Noble or Borders and on Amazon.com. Examples are the “For Dummies” or “Complete Idiot’s” books (such as PCs for Dummies and The Complete Idiot’s Guide to Microsoft Office). • Knowledgeable friends: Believe it or not, nothing beats having a knowledgeable friend: your instructor, a student more advanced than you, or someone with a technical interest in computers. We can’t stress enough how important it is to get to know people—from your classes, from computer user groups (including online internet groups), from family, friends, or whatever—who can lend aid and expertise when your computer software gives you trouble.
Software
Company
183
1/8/10 4:33:22 PM
Rev. Confirming Pages
SUMMARY analytical graphics (p. 163) Also called business graphics; graphical forms that make numeric data easier to analyze than it is when organized as rows and columns of numbers. The principal examples of analytical graphics are bar charts, line graphs, and pie charts. Why it’s important: Whether viewed on a monitor or printed out, analytical graphics help make sales figures, economic trends, and the like easier to comprehend and analyze.
cursor (p. 156) Movable symbol on the display screen that shows where the user may next enter data or commands. The symbol is often a blinking rectangle or an I-beam. You can move the cursor on the screen using the keyboard’s directional arrow keys or a mouse. The point where the cursor is located is called the insertion point. Why it’s important: All application software packages use cursors to show the current work location on the screen.
animation (p. 175) The simulation (illusion) of movement created by displaying a series of still pictures, or frames, very quickly in sequence. Why it’s important: Animation is used in video games, movies, special-effects presentations, and even in email, to make it more interesting.
database (p. 164) Collection of interrelated files in a computer system. These computer-based files are organized according to their common elements, so that they can be retrieved easily. Why it’s important: Businesses and organizations build databases to help them keep track of and manage their affairs. In addition, online database services put enormous resources at the user’s disposal.
application software (p. 120) Software that has been developed to solve a particular problem for users—to perform useful work on specific tasks or to provide entertainment. Why it’s important: Application software consists of most of the software you are familiar with and use on a daily basis. (Compare system software.) booting (p. 122) Loading an operating system into a computer’s main memory. Why it’s important: Without booting, computers could not operate. The programs responsible for booting are stored permanently in the computer’s electronic circuitry. When you turn on the machine, programs called diagnostic routines test the main memory, the central processing unit, and other parts of the system to make sure they are running properly. Next, BIOS (basic input/output system) programs are copied to main memory and help the computer interpret keyboard characters or transmit characters to the display screen or to a diskette. Then the boot program obtains the operating system, usually from the hard disk, and loads it into the computer’s main memory, where it remains until you turn the computer off.
Chapter 3
cell (p. 161) Place where a row and a column intersect in a spreadsheet worksheet; its position is called a cell address. Why it’s important: The cell is the smallest working unit in a spreadsheet. Data and formulas are entered into cells. Cell addresses provide location references for spreadsheet users. computer-aided design (CAD) (p. 180) Programs intended for the design of products, structures, civil engineering drawings, and maps. Why it’s important: CAD programs, which are available for microcomputers, help architects design buildings and workspaces and help engineers design cars, planes, electronic devices, roadways, bridges, and subdivisions. While similar to drawing programs, CAD programs provide precise dimensioning and positioning of the elements being drawn, so they can be transferred later to computer-aided manufacturing programs; however, they lack special effects for illustrations. One advantage of CAD software is that three-dimensional drawings can be rotated on-screen, so the designer can see all sides of the product.
database software (p. 164) Also called database manager or database management system (DBMS); application software that sets up and controls the structure of a database and access to the data. Why it’s important: Database software allows users to organize and manage huge amounts of data. default settings (p. 160) Settings automatically used by a program unless the user specifies otherwise, thereby overriding them. Why it’s important: Users need to know how to change default settings in order to customize documents. desktop (p. 132) The operating system’s main interface screen. Why it’s important: The desktop displays pictures (icons) that provide quick access to programs and information. desktop publishing (DTP) (p. 172) Application software and hardware system that involves mixing text and graphics to produce high-quality output for commercial printing, using a microcomputer and mouse, scanner, laser or ink-jet printer, and DTP software (such as QuarkXPress and In Design or, at a more consumer-oriented level, Microsoft Publisher). Often the printer is used primarily to get an advance look before the completed job is sent to a typesetter for even higher-quality output. Some word processing programs, such as Word and WordPerfect, have rudimentary DTP features. Why it’s important: Desktop publishing has reduced the number of steps, the time, and the money required to produce professional-looking printed projects. device drivers (p. 126) Specialized software programs— usually components of system software—that allow input and output devices to communicate with the rest of the computer system. Why it’s important: Drivers are needed so that the computer’s operating system can recognize and run peripheral hardware. DOS (Disk Operating System) (p. 138) Original operating system produced by Microsoft, with a hard-to-use commanddriven user interface. Its initial 1982 version was designed to
184
wiL16775_ch03_119-192.indd 184
1/22/10 10:46:15 AM
Rev. Confirming Pages
exporting (p. 154) Transforming data into a format that can be used in another program and then transmitting it. Why it’s important: Users need to know how to export many types of files. file (p. 124) A named collection of data (data file) or a program (program file) that exists in a computer’s secondary storage, such as on a hard disk or CD. Why it’s important: Dealing with files is an inescapable part of working with computers. Users need to be familiar with the different types of files. financial software (p. 170) Application software that ranges from personal-finance managers to entry-level accounting programs to business financial-management packages. Why it’s important: Financial software provides users with powerful management tools (personal-finance managers) as well as small business programs. Moreover, tax programs provide virtually all the forms needed for filing income taxes, make complex calculations, check for mistakes, and even unearth deductions you didn’t know existed. Tax programs can also be integrated with personal finance software to form an integrated tool. Accounting software automates bookkeeping tasks, while payroll software keeps records of employee hours and produces reports for tax purposes. Some programs allow users to set up a business from scratch. Financial software also includes investment software packages and various retirement planning programs. formulas (p. 162) In a spreadsheet, instructions for calculations entered into designated cells. Why it’s important: When spreadsheet users change data in one cell, all the cells linked to it by formulas automatically recalculate their values. freeware (p. 151) Copyrighted software that is distributed free of charge, today most often over the internet. Why it’s important: Freeware saves users money. function keys (p. 130) Keys labeled “F1,” “F2,” and so on, positioned along the top or left side of the keyboard. Why it’s important: They are used to execute commands specific to the software being used. functions (p. 162) In a spreadsheet, built-in formulas that perform common calculations. Why it’s important: After the values have been entered into the worksheet, formulas and functions can be used to calculate outcomes. graphical user interface (GUI) (p. 131) User interface in which icons and commands from menus may be selected by means of a mouse or keystrokes. Why it’s important: GUIs are easier to use than command-driven interfaces. Help command (p. 137) Command generating a table of contents, an index, and a search feature that can help users locate answers to questions about the software. Why it’s
important: Help features provide a built-in electronic instruction manual. icons (p. 132) Small pictorial figures that represent programs, data files, or procedures. Why it’s important: Icons have simplified the use of software. The feature represented by the icon can be activated by clicking on the icon. importing (p. 153) Getting data from another source and then converting it into a format compatible with the program in which the user is currently working. Why it’s important: Users will often have to import files. key (p. 165) Also called key field, sort key, index, or keyword; field used to sort data in a database. For example, if users sort records by age, then the age field is a key. Why it’s important: Key fields are needed to identify and retrieve specific items in a database. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the primary key and must hold a unique value for each record. A key field that identifies records in different tables is called a foreign key. Foreign keys are used to cross-reference data among relational tables. The most frequent key field used in the United States is the Social Security number, but any unique identifier, such as employee number or student number, can be used. Linux (p. 146) Free (open-source) version of the Unix OS, supported by the efforts of thousands of volunteer programmers. Why it’s important: Linux is an inexpensive, open-source operating system useful for online applications and to PC users who have to maintain a web server or a network server. Macintosh operating system (Mac OS) (p. 138) System software that runs only on Apple Macintosh computers. Why it’s important: Although Macs are not as common as PCs, many people believe they are easier to use. Macs are often used for graphics and desktop publishing. macro (p. 130) Also called keyboard shortcut; a single keystroke or command—or a series of keystrokes or commands— used to automatically issue a longer, predetermined series of keystrokes or commands. Why it’s important: Users can consolidate several activities into only one or two keystrokes. The user names the macro and stores the corresponding command sequence; once this is done, the macro can be used repeatedly. menu (p. 134) Displayed list of options—such as commands—to choose from. Why it’s important: Menus are a feature of GUIs that make software easier to use. menu bar (p. 136) Bar across the top of the display window, below the title bar. Why it’s important: It shows the names of the various pull-down menus available. Microsoft Windows (p. 140) Most common operating system for desktop and portable microcomputers. Windows 95 was succeeded by Windows 98, Windows 2003, Windows Me, Windows XP, Vista, and, most recently, Windows 7 (Windows 2009). Why it’s important: Windows supports the most applications written for microcomputers.
Software
run on the IBM PC as PC-DOS. Later Microsoft licensed the same system to other computer makers as MS-DOS. Why it’s important: DOS used to be the most common microcomputer operating system, and it is still used on some microcomputers. Today the most popular operating systems use GUIs.
185
wiL16775_ch03_119-192.indd 185
1/22/10 10:46:15 AM
Rev. Confirming Pages
Microsoft Windows Embedded (p. 149) Previously known as Windows CE; operating system for handhelds. Why it’s important: Windows Embedded offers pocket versions of Word and Excel that let users read standard word processing and spreadsheet files sent as email attachments from their PCs. It also enables web functions. A version of Windows Embdedded, Windows Mobile, is used in certain smartphones. Microsoft Windows NT (p. 144) NT stands for “New Technology”; Microsoft’s multitasking OS designed to run on network servers in businesses of all sizes. Why it’s important: It allows multiple users to share resources such as data, programs, and printers and to build web applications and connect to the internet. Microsoft Windows Vista (p. 141) Introduced to consumers in January 2007, the Vista operating system is the equivalent of Windows version 12—preceded by 1.0, 2.0, 3.0, 3.1, NT, 95, NT 4.0, 98, 2000, ME, XP. Why it’s important: To create Vista, Microsoft supposedly rebuilt Windows from scratch, with an interesting interface, glitzier graphics, and improved security tools. However, so much computing power was required to run it that many new PCs ran more slowly than older, less powerful XP machines. Vista was also criticized for software and hardware incompatibility issues with office suites and some printers, digital cameras, and other devices. Many businesses decided that they would not upgrade from XP to Vista, because they saw no value in it and because it required buying more powerful PCs and new software. For that reason, Microsoft turned to developing Windows 7. Microsoft Windows XP (p. 140) Recent Microsoft operating system for PCs. Why it’s important: With this OS version, Microsoft finally gave up the last of the Windows software carried forward from the aging DOS programming technology. Windows XP was being replaced by Windows Vista but now is being replaced by Windows 7, Microsoft’s newest operating system. Microsoft Windows 7 (2009) (p. 142) Newest operating system developed by Microsoft; it follows Vista. Why it’s important: Windows 7 is less power-hungry than Vista, boots up more quickly than previous Windows systems, and has improved networking and security features.
Chapter 3
multimedia authoring software (p. 176) Application software that combines text, graphics, video, animation, and sound in an integrated way to create stand-alone multimedia applications. Why it’s important: Multimedia is now commonplace. Nearly all PCs are capable of handling multimedia. multitasking (p. 125) Feature of OS software that allows the execution of two or more programs concurrently by one user almost at the same time on the same computer with one CPU. For instance, you might write a report on your computer with one program while another plays a music CD. Why it’s important: Multitasking allows the computer to switch rapidly back and forth among different tasks. The user is generally unaware of the switching process and thus can work in more than one application at a time. NetWare (p. 144) Long-popular network operating system for coordinating microcomputer-based local area networks
(LANs) throughout an organization. Why it’s important: LANs allow PCs to share programs, data files, and printers and other devices. open-source software (p. 146) Software that any programmer can download from the internet free and modify with suggested improvements. The only qualification is that changes can’t be copyrighted; they must be made available to all and remain in the public domain. Why it’s important: Because this software is not proprietary, any programmer can make improvements, which can result in better-quality software. operating system (OS) (p. 121) Also called software platform; low-level master system of programs that manage the basic operations of the computer. Why it’s important: These programs provide resource management services of many kinds. In particular, they handle the control and use of hardware resources, including disk space, memory, CPU time allocation, and peripheral devices. The operating system allows users to concentrate on their own tasks or applications rather than on the complexities of managing the computer. Palm OS (p. 148) Palm Source’s operating system for handhelds. Why it’s important: Because it is not a Windows derivative but was specifically designed for handhelds, Palm OS is a smoother-running operating system. PDF See portable document format. personal-finance manager (p. 170) Application software that lets users keep track of income and expenses, write checks, do online banking, and plan financial goals. Why it’s important: Personal-finance software can help people manage their money more effectively. personal information manager (PIM) (p. 166) Software that helps users keep track of and manage information they use on a daily basis, such as addresses, telephone numbers, appointments, to-do lists, and miscellaneous notes. Some programs feature phone dialers, outliners (for roughing out ideas in outline form), and ticklers (or reminders). Why it’s important: PIMs can help users better organize and manage daily business activities. pirated software (p. 152) Software that is obtained illegally. Why it’s important: If you buy such software, not only do the original copyright owners not get paid for their creative work but you risk getting inferior goods and, worse, picking up a virus. To discourage software piracy, many software manufacturers require that users register their software when they install it on their computers. If the software is not registered, it will not work properly. platform (p. 138) Particular processor model and operating system on which a computer system is based. Why it’s important: Generally, software written for one platform will not run on any other. Users should be aware that there are Mac platforms (Apple Macintosh) and Windows platforms, or “PC platforms” (for personal computers such as Dell, Compaq, Gateway, Hewlett-Packard, or IBM that run Microsoft Windows). Sometimes the latter are called Wintel platforms, for
186
wiL16775_ch03_119-192.indd 186
1/22/10 10:46:16 AM
Rev. Confirming Pages
pointer (p. 131) Indicator that usually appears as an arrow, although it changes shape depending on the application. The mouse is used to move the pointer to a particular place on the display screen or to point to little symbols, or icons. Why it’s important: Manipulating the pointer on the screen by means of the mouse is often easier than typing commands on a keyboard. portable document format (PDF) (p. 179) File format developed by Adobe Systems. PDF captures text, graphic, and formatting information from a variety of applications on different platforms, making it possible to send documents and have them appear on the recipient’s monitor (or printer) as they were intended to be viewed. Why it’s important: A properly prepared PDF file maintains the original fonts, images, colors, and graphics, as well as the exact layout of the file. A PDF file can be shared, viewed, and printed by anyone using the free downloadable Adobe Reader software. PDF can also be used on mobile devices. presentation graphics software (p. 168) Software that uses graphics, animation, sound, and data or information to make visual presentations. Why it’s important: Presentation graphics software provides a means of producing sophisticated graphics. productivity software (p. 154) Application software such as word processing programs, spreadsheets, and database managers. Why it’s important: Productivity software makes users more productive at particular tasks. project management software (p. 179) Program used to plan and schedule the people, costs, and resources required to complete a project on time. Why it’s important: Project management software increases the ease and speed of planning and managing complex projects. public-domain software (p. 151) Software, often available on the internet, that is not protected by copyright and thus may be duplicated by anyone at will. Why it’s important: Publicdomain software offers lots of software options to users who may not be able to afford much commercial software. Users may download such software from the internet free and make as many copies as they wish. range (p. 162) A group of adjacent cells in a spreadsheet—for example, A1 to A5. Why it’s important: Ranges help sort data for calculation or reports. recalculation (p. 162) The process of recomputing values in a spreadsheet, either as an ongoing process as data is entered or afterward, with the press of a key. Why it’s important: With this simple feature, the hours of mind-numbing work required to manually rework paper spreadsheets has become a thing of the past. relational database (p. 164) Database in which data is organized into related tables. Each table contains rows and columns; the rows are called records, and the columns are called
fields. An example of a record is a person’s address—name, street address, city, and so on. An example of a field is that person’s last name; another field would be that person’s first name; a third field would be that person’s street address; and so on. Why it’s important: The relational database is a common type of database. rentalware (p. 152) Software that users lease for a fee and download whenever they want it. Why it’s important: This is the concept behind application service providers (ASPs). rollover (p. 132) Icon feature in which a small textbox explaining the icon’s function appears when you roll the mouse pointer over the icon. A rollover may also produce an animated graphic. Why it’s important: The rollover gives the user an immediate explanation of an icon’s meaning. saving (p. 160) Storing, or preserving, a document as an electronic file permanently—on diskette, hard disk, or CD-ROM, for example. Why it’s important: Saving is a feature of nearly all application software. Having the document stored in electronic form spares users the tiresome chore of retyping it from scratch whenever they want to make changes. Users need only retrieve it from the storage medium and make the changes, then resave it and print it out again. scrolling (p. 156) Moving quickly upward, downward, or sideways through the text or other screen display. Why it’s important: A standard computer screen displays only 20–22 lines of standard-size text; however, most documents are longer than that. Using the directional arrow keys, or the mouse and a scroll bar located at the side of the screen, users can move (“scroll”) through the display screen and into the text above and below it. shareware (p. 151) Copyrighted software that is distributed free of charge but requires that users make a monetary contribution in order to continue using it. Shareware is distributed primarily through the internet. Because it is copyrighted, you cannot use it to develop your own program that would compete with the original product. Why it’s important: Like public-domain software and freeware, shareware offers an inexpensive way to obtain new software. software license (p. 150) Contract by which users agree not to make copies of software to give away or resell. Why it’s important: Software manufacturers don’t sell people software; they sell them licenses to become authorized users of the software. special-purpose keys (p. 130) Keys used to enter, delete, and edit data and to execute commands. For example, the Esc (for “Escape”) key tells the computer to cancel an operation or leave (“escape from”) the current mode of operation. The Enter, or Return, key tells the computer to execute certain commands and to start new paragraphs in a document. Why it’s important: Special-purpose keys are essential to the use of software. spreadsheet (p. 161) Application software that allows users to create tables and financial schedules by entering data and
Software
“Windows + Intel,” because they often combine the Windows operating system with the Intel processor chip.
187
wiL16775_ch03_119-192.indd 187
1/22/10 10:46:16 AM
Rev. Confirming Pages
formulas into rows and columns arranged as a grid on a display screen. Why it’s important: When data is changed in one cell, values in other cells in the spreadsheet are automatically recalculated.
ease of use of hardware and software. The three types of user interface are command-driven, menu-driven, and graphical (GUI), which is now the most common. Without user interfaces, no one could operate a computer system.
supervisor (p. 123) Also called kernel; the central component of the operating system that manages the CPU. Why it’s important: The supervisor remains in main memory while the computer is running. As well as managing the CPU, it directs other nonresident programs to perform tasks that support application programs.
utility programs (p. 127) Also known as service programs; system software components that perform tasks related to the control and allocation of computer resources. Why it’s important: Utility programs enhance existing functions or provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software; they usually include backup, data recovery, virus protection, data compression, and file defragmentation, along with check (scan) disk and disk cleanup.
system software (p. 120) The software that helps the computer perform essential operating tasks and enables the application software to run. The most important component of system software is the operating system, the master control program that runs the computer. Examples of operating system software for the PC are various Microsoft programs (such as Windows XP, Vista, and 7), Apple Macintosh OS X, Unix, and Linux. Why it’s important: Computers cannot run application software without having system software. taskbar (p. 136) Graphic toolbar that appears at the bottom of the Windows screen. Why it’s important: The taskbar presents the applications that are running. template (p. 158) In word processing, a preformatted document that provides basic tools for shaping a final document— the text, layout, and style for a letter, for example. Why it’s important: Templates make it very easy for users to prepare professional-looking documents, because most of the preparatory formatting is done. title bar (p. 136) Bar across the very top of the display window. Why it’s important: It shows the name of the folder the user is in. toolbar (p. 136) Bar across the top of the display window, below the menu bar. It displays menus and icons representing frequently used options or commands. Why it’s important: Toolbars make it easier to identify and execute commands.
value (p. 162) A number or date entered in a spreadsheet cell. Why it’s important: Values are the actual numbers used in the spreadsheet—dollars, percentages, grade points, temperatures, or whatever. web page design/authoring software (p. 176) Software used to create web pages with sophisticated multimedia features. Why it’s important: Allows beginners as well as professional web designers to create web pages, which have become extremely important communications tools on the internet, for all sorts of purposes. what-if analysis (p. 163) Spreadsheet feature that employs the recalculation feature to investigate how changing one or more numbers changes the outcome of the calculation. Why it’s important: Users can create a worksheet, putting in formulas and numbers, and then ask, “What would happen if we change that detail?”—and immediately see the effect. window (p. 136) Rectangular frame on the computer display screen. Through this frame users can view a file of data—such as a document, spreadsheet, or database—or an application program. Why it’s important: Using windows, users can display at the same time portions of several documents and/or programs on the screen. Windows Mobile See Microsoft Windows Embedded.
Chapter 3
Unix (p. 144) Proprietary multitasking operating system for multiple users that has built-in networking capability and versions that can run on all kinds of computers. Why it’s important: Government agencies, universities, research institutions, large corporations, and banks all use Unix for everything from designing airplane parts to currency trading. Unix is also used for website management. The developers of the internet built their communication system around Unix because it has the ability to keep large systems (with hundreds of processors) churning out transactions day in and day out for years without fail. user interface (p. 129) User-controllable display screen that allows the user to communicate, or interact, with his or her computer. Why it’s important: The interface determines the
word processing software (p. 155) Application software that allows users to use computers to format, create, edit, print, and store text material, among other things. Why it’s important: Word processing software allows users to maneuver through a document and delete, insert, and replace text, the principal correction activities. It also offers such additional features as creating, editing, formatting, printing, and saving. word wrap (p. 156) Special feature that automatically continues text to the next line by “wrapping around” when the user reaches the right margin. Why it’s important: You don’t have to hit a “carriage-return” key or Enter key to move to the next line.
188
wiL16775_ch03_119-192.indd 188
1/22/10 10:46:16 AM
Rev. Confirming Pages
t a g
1
e
s
CHAPTER REVIEW
LEARNING
MEMORIZATION “I can recognize and recall information.”
Self-Test Questions 1. ________ software enables the computer to perform essential operating tasks. 2. ________ ________ is the term for programs designed to perform specific tasks for the user. 3. ________ is the activity in which a computer works on more than one process at a time. 4. ________ is the scattering of portions of files about the disk in nonadjacent areas, thus greatly slowing access to the files. 5. Windows and Mac OS are generally used on ________ computers. 6. ________ is the process of loading an operating system into a computer’s main memory. 7. A(n) ________ is a utility that will find all the scattered files on your hard disk and reorganize them as contiguous files. 8. The ________ is the component of system software that comprises the master system of programs that manage the basic operations of the computer. 9. The ________ is the user-controllable display screen that allows you to communicate, or interact, with your computer. 10. Disk scanner and disk cleanup utilities detect and correct certain types of common problems on hard disks, such as removing unnecessary files called ________ files that are created by Windows only for short tasks and system restore after system problems. 1 1. OSs allow users to control access to their computers via use of a ________ and a ________.
17. Name four editing features offered by word processing programs: ________, ________, ________, ________. 18. In a spreadsheet, the place where a row and a column intersect is called a ________. 19. The ________ is the movable symbol on the display screen that shows you where you may next enter data or commands. 20. When you buy software, you pay for a ________, a contract by which you agree not to make copies of the software to give away or resell. 21. Records in a database are sorted according to a ________. 22. ________ involves mixing text and graphics to produce high-quality output for commercial printing. 23. A ________ allows users to create tables and do “what-if” financial analyses by entering data and formulas into rows and columns arranged as a grid on a display screen. 24. ________ automatically continues text to the next line when you reach the right margin. 25. Settings that are automatically used by a program unless the user specifies otherwise are called ________. ________. 26. ________ - ________ software is not protected by copyright and may be copied by anyone. 27. ________ ________ are specialized software programs that allow input and output devices to communicate with the rest of the computer system.
12. Software or hardware that is ________ means that it is privately owned and controlled by a company.
28. The ________ format allows documents to be sent to almost any platform and be opened without losing any of their characteristics (text, colors, graphics, formatting).
13. Linux is ________-________ software—meaning any programmer can download it from the internet for free and modify it with suggested improvements.
Multiple-Choice Questions
15. ________ software allows you to create and edit documents. 16. ________ is the activity of moving upward or downward through the text or other screen display.
1. Which of the following are functions of the operating system? a. file management b. CPU management c. task management d. booting e. all of these
Software
14. When you power up a computer by turning on the power “on” switch, this is called a ________ boot. If your computer is already on and you restart it, this is called a ________ boot.
189
wiL16775_ch03_119-192.indd 189
1/22/10 10:46:16 AM
Rev. Confirming Pages
2. Which of the following was the first major microcomputer OS? a. Mac OS b. Windows c. DOS
c. formatting d. cut and paste e. find and replace 9. What is the common consumer computer interface used today?
d. Unix
a. command-driven interface
e. Linux
b. graphical user interface
3. Which of the following is a prominent network operating system? a. Linux b. Ubuntu c. Windows NT d. DOS e. Mac OS 4. Which of the following is the newest Microsoft Windows operating system?
c. menu-driven interface d. electronic user interface e. biometric user interface 10. Which type of software can you download and duplicate without any restrictions whatsoever and without fear of legal prosecution? a. commercial software b. shareware c. public-domain software
a. Windows Vista
d. pirated software
b. Windows XP
e. rentalware
c. Windows 7 d. Windows NT
True/False Questions
e. Windows CE
T F
5. Which of the following refers to the execution of two or more programs by one user almost at the same time on the same computer with one central processor? a. multitasking b. multiprocessing
T F
2. The first graphical user interface was provided by Microsoft Windows.
T F
3. All operating systems are mutually compatible.
T F
4. Font refers to a preformatted document that provides basic tools for shaping the final document.
T F
5. Unix crashes often and thus is not normally used for running important large systems.
T F
6. Windows NT is the most recent Microsoft OS.
T F
7. Spreadsheet software enables you to perform what-if calculations.
T F
8. Public-domain software is protected by copyright and so is offered for sale by license only.
T F
9. The records within the various tables in a database are linked by a key field.
c. time-sharing d. multiprogramming e. coprocessing 6. Which of the following are specialized software programs that allow input and output devices to communicate with the rest of the computer system? a. multitasking b. boot-disks c. utility programs d. device drivers e. service packs 7. Which of the following is not an advantage of using database software? a. integrated data b. improved data integrity c. lack of structure
T F
10. QuarkXPress and Adobe InDesign are professional desktop-publishing programs.
T F
1 1. The best-known graphical user interface is the command-driven one.
T F
12. Microsoft PowerPoint is an example of financial software.
T F
13. Drawing programs create vector images, and painting programs produce bit-mapped images.
T F
14. General computer users can design their own web pages using Adobe Dreamweaver, Adobe Flash, and Microsoft FrontPage.
d. elimination of data redundancy 8. Which of the following is not a feature of word processing software? a. spelling checker
1. The supervisor manages the CPU.
Chapter 3
b. cell address
190
wiL16775_ch03_119-192.indd 190
1/22/10 10:46:16 AM
2
LEARNING
COMPREHENSION “I can recall information in my own terms and explain it to a friend.”
Short-Answer Questions
12. What are the following types of application software used for?
1. Briefly define booting.
a. project management software
2. What is the difference between a command-driven interface and a graphical user interface (GUI)?
b. desktop-publishing software
3. Why can’t you run your computer without system software?
d. spreadsheet software
4. Why is multitasking useful? 5. What is a device driver? 7. What is a platform? 8. What are the three components of system software? What is the basic function of each? 9. What is open-source software? 10. What does defragmenting do?
15. What is importing? Exporting? 16. Briefly compare drawing programs and painting programs. 17. Explain what computer-aided design (CAD) programs do. 18. Discuss the various software licenses: site licenses, concurrent-use licenses, multiple-user licenses, singleuser license.
e
s
1 1. What is an embedded system?
3
LEARNING
APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
Knowledge in Action 1. Here’s a Windows XP exercise in defragmenting your hard-disk drive. Defragmenting is a housekeeping procedure that will speed up your system and often free up hard-disk space. Double-click on My Computer on your Windows desktop (opening screen). Now use your right mouse button to click on C drive, then right-click on Properties, then left-click on the General tab, and you will see how much free space there is on your hard disk. Next left-click on the Tools tab; to clear out any errors, click the Check Now button; this will run a scan. Once the scan is complete, return to the Tools window and click the Defragment Now button. Click on Show Details. This will visually display on the screen the process of your files being reorganized into a contiguous order. Many times when your PC isn’t performing well, such as when it’s sluggish, running both ScanDisk (Check Now) and Defragment will solve the problem. 2. Ray Kurzweil is, among other things, the author of The Age of Intelligent Machines; The Age of Spiritual Machines, When Computers Exceed Human Intelligence; and The Singularity Is Near: When Humans Transcend Biology. He has said: “We are entering a new era. I call it ‘the Singularity.’ It’s a merger between
wiL16775_ch03_119-192.indd 191
e. word processing software 13. Which program is more sophisticated, analytical graphics or presentation graphics? Why? 14. How are the following different from one another? Pop-up menu; pull-down menu; cascading menu.
6. What is a utility program?
t a g
c. database software
human intelligence and machine intelligence that is going to create something bigger than itself. It’s the cutting edge of evolution on our planet” (www. edge.org/3rd_culture/kurzweil_singularity/kurzweil_ singularity_index.html; accessed July 1, 2009). He envisions a future in which information technologies have advanced so far that they enable humans to transcend their biological limitations (www.singularity.com). What is “singularity”? Will it hurt? Will we hate it? Will we be able to notice it? Search the terms “Kurzweil” and “Singularity” on www.singularity.com, www. kurzweilai.net, and other sites, and see if you can explain the concept to friends within 5 minutes or so. 3. What do you think is the future of Linux? Experts currently disagree about whether Linux will become a serious competitor to Windows. Research Linux on the web. Which companies are creating application software to run on Linux? Which businesses are adopting Linux as an OS? What are the predictions about Linux use? 4. How do you think you will obtain software for your computer in the future? Explain your answer. 5. Design your own handheld. Draw what your ideal handheld would look like, and draw screens of what your user interface would look like. Describe the key features of your handheld. 6. What sorts of tasks do operating systems not do that you would like them to do?
Software
t a g
e
s
Rev. Confirming Pages
191
1/22/10 10:46:16 AM
Rev. Confirming Pages
7. If you were in the market for a new microcomputer today, what application software would you want to use on it? Why? What are some “dream” applications that you would like that have not yet been developed? 8. Several websites include libraries of shareware programs. Visit the www.5star-shareware.com site and identify three shareware programs that interest you. State the name of each program, the operating system it runs on, and its capabilities. Also, describe the contribution you must make to receive technical support. What about freeware? Check out www.freewarehome.com. 9. What is your opinion of downloading free music from the web to play on your own PC and/or CDs? Much attention has been given lately to music downloading and copyright infringement. Research this topic in library magazines and newspapers or on the internet, and take a position in a short report. 10. How do you think you could use desktop publishing at home? For personal items? Family occasions? Holidays? What else? What hardware and software would you have to buy?
www.osdata.com/kind/history.htm www.answers.com/topic/history-of-operating-systems 5. Security Issue: Read about some security flaws and limitations of Microsoft Windows operating systems: www.sans.org/top20/ www.zdnetasia.com/news/ security/0,39044215,39242898,00.htm 6. Some people are fascinated by the error message commonly referred to as the “Blue Screen of Death” (BSOD) or “Doom.” Run a search on the internet and find websites that sell T-shirts with the BSOD image on it, photo galleries of public terminals displaying the BSOD, fictional stories of BSOD attacks, and various other forms of entertainment based on the infamous error message. Do a search on the web to find users’ hypotheses of why the BSOD occurs, and find methods to avoid it. Here are a few sites:
11. Think of three new ways that software companies could prevent people from pirating their software.
www.errornerds.com/error/blue-screen-of-death.php? gclid⫽COL79bfTtZsCFRMUagodfAZ0Ow
12. What is your favorite application software program of all? Why?
http://bluescreenofdeathfixer.com/
13. Did your computer come with a Windows Startup disk, and have you misplaced it? If your computer crashes, you’ll need this disk to reinstall the operating system.
http://bbspot.com/News/2000/9/bsod_death.html
To learn the benefits of having a Startup disk, visit www.microsoft.com. Type startup in the “search for” box; then click on the links that interest you.
Web Exercises 1. Go to http://list.driverguide.com/list/company243/ and identify the drivers that correspond to equipment you use. How does this website let you know which devices the drivers are for and which operating systems are compatible with them? If you own your own computer, go to the manufacturer’s website and locate its resource for updating drivers. Does the manufacturer recommend any driver updates that you could use? 2. Use a web search tool such as Google or Yahoo! to find some online antivirus sites—sites where users can regularly download updates for their antivirus software. Do you know what kind of antivirus software is installed on your computer? 3. Microsoft offers “patches,” or updates, for its Windows OS. Go to www.microsoft.com and search for the list of updates. What kinds of problems do these updates fix? Do you need any? 4. The History of Operating Systems: Visit the following websites to get an overview of the evolution and history of the theory and function of operating systems: Chapter 3
www.computinghistorymuseum.org/teaching/papers/ research/history_of_operating_system_Moumina.pdf
www.microsoft.com/windows/winhistoryintro.mspx
http://bsod.org/ 7. Using Microsoft Excel or another spreadsheet program, make a food shopping list incorporating the estimated price for each item, and then have Excel calculate the overall cost. Then go buy your groceries and compare Excel’s price with the supermarket’s price. What else could Excel help you with? 8. The Windows operating system comes with a basic word processing program called Wordpad. Go to the Microsoft home page and to http://en.wikipedia.org/ wiki/WordPad and find out how Wordpad differs from Microsoft Word. Then use a keyword search in a search engine to get more information about these programs. Which one is right for you? 9. Curriculum Data Wales (CDW) is a public/private partnership that has been charged by the Welsh Assembly Government with the task of designing, building, and maintaining the National Grid for Learning Cymru as a bilingual service to schools and colleges in Wales. CDW’s website includes some short tutorials on desktop-publishing (DTP), spreadsheet, word processing, and database management software: www.ngfl-cymru.org.uk/vtc-home/vtc-ks4-home/ vtc-ks4-ict/vtc-ks4-ict-application_software.htm Work through the tutorials. Did they expand your knowledge of these applications? Do a search for “application software” & tutorials. What other useful tutorials did you find?
192
wiL16775_ch03_119-192.indd 192
1/22/10 10:46:16 AM
Rev. Confirming Pages
4 HARDWARE: THE CPU & STORAGE How to Choose a Multimedia Computer System
Chapter Topics & Key Questions 4.1
Microchips, Miniaturization, & Mobility What are the differences between transistors, integrated circuits, chips, and microprocessors?
4.2
The System Unit: The Basics How is data represented in a computer, what are the components of the system cabinet, and what are processing speeds?
4.3
More on the System Unit How do the processor and memory work, and what are some important ports, buses, and cards?
4.4
Secondary Storage What are the features of floppy disks, hard disks, optical disks, magnetic tape, smart cards, flash memory, and online secondary storage?
4.5
Future Developments in Processing & Storage What are some forthcoming developments that could affect processing power and storage capacity?
193
wiL16775_ch04_193-252.indd 193
1/7/10 8:41:42 PM
Rev. Confirming Pages
T
he microprocessor was “the most important invention of the 20th century,” says Michael Malone, author of The Microprocessor: A Biography.1
Quite a bold claim, considering the incredible products that issued forth during those 100 years. More important than the airplane? More than television? More than atomic energy? According to Malone, the case for the exalted status of this thumbnail-size information-processing device is demonstrated, first, by its pervasiveness in the important machines in our lives, from computers to transportation. Second, “The microprocessor is, intrinsically, something special,” he says. “Just as [the human being] is an animal, yet transcends that state, so too the microprocessor is a silicon chip, but more.” Why? Because it can be programmed to recognize and respond to patterns in the environment, as humans do. Malone writes: “Implant [a microprocessor] into a traditional machine—say an automobile engine or refrigerator—and suddenly that machine for the first time can learn, it can adapt to its environment, respond to changing conditions, become more efficient, more responsive to the unique needs of its user.”2
4.1 MICROCHIPS, MINIATURIZATION, & MOBILITY What are the differences between transistors, integrated circuits, chips, and microprocessors? The microprocessor has presented us with gifts that we may only barely appreciate—portability and mobility in electronic devices. In 1955, for instance, portability was exemplified by the ads showing a young woman holding a Zenith television set over the caption: IT DOESN’T TAKE A MUSCLE MAN TO MOVE THIS LIGHTWEIGHT TV. That “lightweight” TV weighed a hefty 45 pounds. Today, by contrast, there is a handheld Casio 2.3-inch color TV weighing a mere 6.7 ounces. Had the transistor not arrived, as it did in 1947, the Age of Portability and consequent mobility would never have happened. To us a “portable” telephone might have meant the 40-pound backpack radio-phones carried by some American GIs during World War II, rather than the 3-ounce shirt-pocket cellular models available today.
From Vacuum Tubes to Transistors to Microchips
Chapter 4
How do transistors and integrated circuits differ, and what does a semiconductor do?
194
wiL16775_ch04_193-252.indd 194
A circuit is a closed path followed or capable of being followed by an electric current. Without circuits, electricity would not be controllable, and so we would not have electric or electronic appliances. Old-time radios used vacuum tubes—small lightbulb-size electronic tubes with glowing filaments, or wire circuits, inside them—to facilitate the transmission (flow) of electrons. One computer with these tubes, the ENIAC, was switched on in 1946 at the University of Pennsylvania and employed about 18,000 of them. Unfortunately, a tube failure occurred on average once every 7 minutes. Since it took more than 15 minutes to find and replace the faulty tube, it was difficult to get any useful computing work done—during a typical week, ENIAC was down for about one-third of the time. Moreover, the ENIAC was enormous, occupying
1/7/10 8:41:48 PM
Rev. Confirming Pages
1,800 square feet and weighing more than 30 tons. ENIAC could perform about 5,000 calculations per second—more than 10,000 times slower than modern PCs. Yet even at that relatively slow speed, ENIAC took about 20 seconds to complete a problem that had taken experts 1 or 2 days to complete manually. THE TRANSISTOR ARRIVES The transistor changed all that. A transistor is essentially a tiny electrically operated switch, or gate, that can alternate between “on” and “off ” many millions of times per second. The transistor was developed by Bell Labs in 1947. The first transistors were one-hundredth the size of a vacuum tube, needed no warm-up time, consumed less energy, and were faster and more reliable. (• See Panel 4.1.) Moreover, they marked the beginning of a process of miniaturization that has not ended yet. In 1960 one transistor fit into an area about a half-centimeter square. This was sufficient to permit Zenith, for instance, to market a transistor radio weighing about 1 pound (convenient, the company advertised, for “pocket or purse”). Today more than 6 million transistors can be squeezed into a centimeter, and a Sony headset radio, for example, weighs only 4.3 ounces. Hewlett-Packard is working on a transistor about 0.1 nanometer square. One nanometer is 1 billionth of a meter; a human hair is about 80,000 nanometers thick. In the old days, transistors were made individually and then formed into an electronic circuit with the use of wires and solder. Today transistors are part of an integrated circuit—an entire electronic circuit, including wires, formed on a single “chip,” or piece, of special material, usually silicon, as part of a single manufacturing process. Integrated circuits were developed by Jack Kilby at Texas Instruments, who demonstrated the first one in 1958. (• See the timeline, Panel 4.2, next page.) An integrated circuit embodies what is called solid-state technology. In a solid-state device, the electrons travel through solid material—in this case, silicon. They do not travel through a vacuum, as was the case with the old radio vacuum tubes. SILICON & SEMICONDUCTORS What is silicon, and why use it? Silicon is an element that is widely found in clay and sand. It is used not only because its abundance makes it cheap but also because it is a semiconductor.
Shrinking components The lightbulb-size 1940s vacuum tube was replaced in the 1950s by a transistor one-hundredth its size. Today’s transistors are much smaller, being microscopic in size.
Hardware: The CPU & Storage
panel 4.1
195
wiL16775_ch04_193-252.indd 195
1/7/10 8:41:49 PM
Rev. Confirming Pages
Modern chip with etched transistors. This chip would be about 1/2 inch by 1/2 inch and be several layers deep, with transistors etched on each level.
A semiconductor is a material whose electrical properties are intermediate between a good conductor of electricity and a nonconductor of electricity. (An example of a good conductor of electricity is the copper in household wiring; an example of a nonconductor is the plastic sheath around that wiring.) Because it is only a semiconductor, silicon has partial resistance to electricity. As a result, highly conducting materials can be overlaid on the silicon to create the electronic circuitry of the integrated circuit. (• See Panel 4.3.) Silicon alone has no processing power. A chip, or microchip, is a tiny piece of silicon that contains millions of microminiature integrated electronic circuits. Chip manufacture requires very clean environments, which is why chip manufacturing workers appear to be dressed for a surgical operation. Such workers must also be highly skilled, which is why chip makers are not found everywhere in the world.
Miniaturization Miracles: Microchips, Microprocessors, & Micromachines What is a microprocessor? Microchips—“industrial rice,” as the Japanese call them— are responsible for the miniaturization that has revolutionized consumer electronics, computers, and communications. They store and process data in all the electronic gadgetry we’ve become accustomed to—from microwave ovens to videogame controllers to music synthesizers to cameras to automobile fuel-injection systems to pagers to satellites. There are different kinds of microchips—for example, microprocessor, memory, logic, communications, graphics, and math coprocessor chips. We discuss some of these later in this chapter. Perhaps the most important is the microprocessor chip. A microprocessor (“microscopic processor” or “processor on a chip”) is the miniaturized circuitry of a computer processor—the CPU, the part that processes, or manipulates, data into information. When modified for use in machines other than computers, microprocessors are called microcontrollers or embedded computers.
Mobility
panel 4.2 Timeline: Developments in processing and storage
3000 BCE
Chapter 4
Abacus is invented in Babylonia
1621 CE Slide rule invented (Edmund Gunther)
How have microprocessors helped make information technology more mobile? Smallness in TVs, phones, radios, camcorders, CD players, and computers is now largely taken for granted. In the 1980s, portability, or mobility,
1642 First mechanical adding machine (Blaise Pascal)
1666 First mechanical calculator that can add and subtract (Samuel Morland)
1801 A linked sequence of punched cards controls the weaving patterns in Jacquard’s loom
1820
1833
The first massproduced calculator, the Thomas Arithnometer
Babbage’s difference engine (automatic calculator)
196
wiL16775_ch04_193-252.indd 196
1/7/10 8:41:50 PM
Rev. Confirming Pages
1. A large drawing of the electrical circuitry is made; it looks something like the map of a train yard. The drawing is photographically reduced hundreds of times, to microscopic size. 2. That reduced photograph is then duplicated many times so that, like a sheet of postage stamps, there are multiple copies of the same image or circuit. 3. That sheet of multiple copies of the circuit is then printed (in a printing process called photolithography) and etched onto a round slice of silicon called a wafer. Wafers have gone from 4 inches in diameter to 6 inches to 8 inches, and now are moving toward 12 inches; this allows semiconductor manufacturers to produce more chips at lower cost.
Chip designers checking out an enlarged drawing of chip circuits
4. Subsequent printings of layer after layer of additional circuits produce multilayered and interconnected electronic circuitry built above and below the original silicon surface.
A wafer imprinted with many microprocessors.
(above) Pentium 4 microprocessor chip mounted in protective frame with pins that can be connected to an electronic device such as a microcomputer.
6. After testing, each chip is mounted in a protective frame with protruding metallic pins that provide electrical connections through wires to a computer or other electronic device.
1843
1854
World’s first computer programmer, Ada Lovelace, publishes her notes
1877
George Boole Thomas Edison publishes “An invents the Investigation phonograph on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design
1890 Electricity used for first time in a dataprocessing project – Hollerith’s automatic census-tabulating machine (used punched cards)
panel 4.3 Making of a chip How microscopic circuitry is put onto silicon.
1915 78 rpm record platters are introduced
Hardware: The CPU & Storage
5. Later an automated die-cutting machine cuts the wafer into separate chips, which are usually less than 1 centimeter square and about half a millimeter thick. A chip, or microchip, is a tiny piece of silicon that contains millions of microminiature electronic circuit components, mainly transistors. An 8-inch silicon wafer will have a grid of nearly 300 chips, each with as many as 5.5 million transistors.
197
wiL16775_ch04_193-252.indd 197
1/7/10 8:41:54 PM
Rev. Confirming Pages
more
info! Learning More about Computer Technology Try the magazine Smart Computing in Plain English (www. smartcomputing.com). A more technical publication is PC Magazine (www.pcmag.com). See also
meant trading off computing power and convenience in return for smaller size and less weight. Today, however, we are getting close to the point where we don’t have to give up anything. As a result, experts have predicted that small, powerful, wireless personal electronic devices will transform our lives far more than the personal computer has done so far. “The new generation of machines will be truly personal computers, designed for our mobile lives,” wrote one reporter back in 1992. “We will read office memos between strokes on the golf course, and answer messages from our children in the middle of business meetings.”3 Today, of course, such activities are commonplace.
Choosing an Inexpensive Personal Computer: Understanding Computer Ads
www.webopedia http://computer.how stuffworks.com www.geek.com At www.pcpitstop.com you can get all sorts of information about testing your system’s performance and improving it.
What kind of features does a multimedia personal computer have? You’re in the market for a new PC and are studying the ads. What does “1 GB DDR SDRAM” mean? How about “160 GB SATA 7200 RPM Hard Drive”? Let’s see how to interpret a typical computer ad. (• See Panel 4.4.) Most desktop computers are multimedia computers, with sound and graphics capability. As we explained in Chapter 1, the word multimedia means “combination of media”—the combination of pictures, video, animation, and sound in addition to text. A multimedia computer features such equipment as a fast processor, DVD drive, sound card, graphics card, and speakers; and you may also wish to have headphones and a microphone. (Common peripherals are printer, scanner, sound recorder, and digital camera.) Let us now go through the parts of a computer system so that you can understand what you’re doing when you buy a new computer. First we look at how the system processes data. In the remainder of this chapter, we will consider the system unit and storage devices. In Chapter 5, we look at input devices and output devices.
4.2
THE SYSTEM UNIT: The Basics
How is data represented in a computer, what are the components of the system cabinet, and what are processing speeds? Computers run on electricity. What is the most fundamental thing you can say about electricity? Electricity is either on or off. This two-state situation allows computers to use the binary system to represent data and programs.
Chapter 4
1924
198
1930
T.J. Watson renames Hollerithʼs machine company, founded in 1896, to International Business Machines (IBM)
wiL16775_ch04_193-252.indd 198
General theory of computers (MIT)
1936 Konrad Zuse develops the concept of a computer memory to hold binary information
1944 First electromechanical computer (Mark I)
1945 John von Neumann introduces the concept of a stored program
1946 First programmable electronic computer in United States (ENIAC)
1947 Magnetic tape enters the U.S. market; the first transistor is developed
1/7/10 8:41:58 PM
Rev. Confirming Pages
7-Bay Mid-Tower Case Intel Pentium Dual-Core Processor 2.80 GHz 2 GB DDR2 SDRAM 3 MB L2 Cache 6 USB 2.0 Ports 256 MB DDR2 Nvidia GeForce PCI Graphics Sound Blaster Digital Sound Card 56 Kbps Internal Modem 320 GB SATA 7200 RPM Hard Drive 24X DVD/CD-RW Combo Drive Full-Sized Keyboard with Numeric Keypad Microsoft IntelliMouse 17" Flat Panel Display HP Officejet Pro K5400
panel 4.4
Details of this ad are explained throughout this chapter and the next. See the little magnifying glass:
Advertisement for a PC The terminology in microcomputer ads generally does not change as quickly as the numbers; users will continue to need most of these components for a while, but the speeds and capacities change quickly, as do methods of connection.
The Binary System: Using On/Off Electrical States to Represent Data & Instructions What does a computer’s binary system do, and what are some binary coding schemes? The decimal system that we are accustomed to has 10 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9). By contrast, the binary system has only two digits: 0 and 1. Thus, in the computer, the 0 can be represented by the electrical current being off and the 1 by the current being on. Although the use of binary systems is not restricted to computers, all data and program instructions that go into the computer are represented in terms of these binary numbers. (• See Panel 4.5.) For example, the letter “G” is a translation of the electronic signal 01000111, or off-on-off-off-off-on-on-on. When you press the key for “G” on the computer keyboard, the character is automatically converted into the series of electronic impulses that the computer can recognize. Inside the computer, the character “G” is represented by a combination of eight transistors (as we will describe). Some are off, or closed (representing the 0s), and some are on, or open (representing the 1s).
1947–1948 Magnetic drum memory is introduced as a data storage device for computers
1949 45 rpm record platters are introduced
1952
1954
UNIVAC computer correctly predicts election of Eisenhower as U.S. President
Texas Instruments introduces the silicon transistor
1956 First computer hard disk is used
1958 Stereo records are produced
1962
1963
Integrated circuit is nicknamed the “chip”; timesharing becomes common
The American National Standards Institute accepts ASCII-7 code for information exchange
Hardware: The CPU & Storage
• • • • • • • • • • • • • •
199
wiL16775_ch04_193-252.indd 199
1/7/10 8:41:59 PM
Rev. Confirming Pages
off on
panel 4.5 Binary data representation How the letters “G-RO-W” are represented in one type of on/off, 1/0 binary code.
G
01000111
R
01010010
O
01001111
W
01010111
MEASURING CAPACITY How many representations of 0s and 1s can be held in a computer or a storage device such as a hard disk? Capacity is denoted by bits and bytes and multiples thereof:
Chapter 4
1964
200
•
Bit: In the binary system, each 0 or 1 is called a bit, which is short for “binary digit.”
•
Byte: To represent letters, numbers, or special characters (such as ! or *), bits are combined into groups. A group of 8 bits is called a byte, and a byte represents one character, digit, or other value. (As we mentioned, in one scheme, 01000111 represents the letter “G.”) The capacity of a computer’s memory or of a floppy disk is expressed in numbers of bytes or multiples such as kilobytes and megabytes. (There are 256 combinations of 8 bits available: 28 256.)
•
Kilobyte: A kilobyte (K, KB) is about 1,000 bytes. (Actually, it’s precisely 1,024 bytes, but the figure is commonly rounded.) The kilobyte was a common unit of measure for memory or secondary storage capacity on older computers. 1 KB equals about one-half page of text.
•
Megabyte: A megabyte (M, MB) is about 1 million bytes (1,048,576 bytes). Measures of microcomputer primary storage capacity today are expressed in megabytes. 1 MB equals about 500 pages of text.
•
Gigabyte: A gigabyte (G, GB) is about 1 billion bytes (1,073,741,824 bytes). This measure was formerly used mainly with “big iron”
1965
IBM introduces 360 line of computers; IBM’s seven-year long Sabre project, allowing travel agents anywhere to make airline reservations via terminals, is fully implemented; Control Data Corp.’s CDC 6600, designed by Seymour Cray, becomes the first commercially successful supercomputer
wiL16775_ch04_193-252.indd 200
1968
Audio cassette tape introduced; Gordon Moore pronounces “Moore’s Law”
Robert Noyce, Andy Grove, and Gordon Moore establish Intel, Inc.
1969 Klass Compaan conceives idea for CD
1970 Microprocessor chips come into use; floppy disk introduced for storing data; a chip 110 inches square contains 1,000 transistors; the first and only patent on the smart card is filed
1/7/10 8:42:00 PM
Rev. Confirming Pages
•
Terabyte: A terabyte (T, TB) represents about 1 trillion bytes (1,009,511,627,776 bytes). 1 TB equals about 500,000,000 pages of text. Some high-capacity disk storage is expressed in terabytes.
•
Petabyte: A petabyte (P, PB) represents about 1 quadrillion bytes (1,048,576 gigabytes). The huge storage capacities of modern databases are now expressed in petabytes.
•
Exabyte: An exabyte (EB) represents about 1 quintillion bytes—that’s 1 billion billion bytes (1,024 petabytes—or 1,152,921,504,606,846,976 bytes). This number is seldom used. It is estimated that all the printed material in the world represents about 5 exabytes.4
BINARY CODING SCHEMES Letters, numbers, and special characters are represented within a computer system by means of binary coding schemes. (• See Panel 4.6.) That is, the off/on 0s and 1s are arranged in such a way that they can be made to represent characters, digits, or other values.
•
EBCDIC: Pronounced “eb-see-dick,” EBCDIC (Extended Binary Coded Decimal Interchange Code) is a binary code used with large
Character
EBCDIC
ASCII-8
Character
EBCDIC
ASCII-8
A B C D E F G H I J K L M
1100 1100 1100 1100 1100 1100 1100 1100 1100 1101 1101 1101 1101
0001 0010 0011 0100 0101 0110 0111 1000 1001 0001 0010 0011 0100
0100 0100 0100 0100 0100 0100 0100 0100 0100 0100 0100 0100 0100
0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101
N O P Q R S T U V W X Y Z
1101 1101 1101 1101 1101 1110 1110 1110 1110 1110 1110 1110 1110
0101 0110 0111 1000 1001 0010 0011 0100 0101 0110 0111 1000 1001
0100 0100 0101 0101 0101 0101 0101 0101 0101 0101 0101 0101 0101
1110 1111 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010
0 1 2 3 4 !
1111 1111 1111 1111 1111 0101
0000 0001 0010 0011 0100 1010
0011 0011 0011 0011 0011 0010
0000 0001 0010 0011 0100 0001
5 6 7 8 9 ;
1111 1111 1111 1111 1111 0101
0101 0110 0111 1000 1001 1110
0011 0011 0011 0011 0011 0011
0101 0110 0111 1000 1001 1011
1971
1972
First pocket calculator; the Intel 4004 microprocessor is developed— a “computer on a chip”
Intel 8008 8-bit microprocessor
1973
1974
Large-scale A DRAM integration: chip 10,000 becomes components available are placed on a 1-sq.-cm. chip
1975
1976
First microcomputer (MITS Altair 8800)
Apple I computer (first personal computer sold in assembled form); has 512 KB RAM
more
info! Bigger Than an Exabyte? How big is a zettabyte? A yottabyte? Do an online search to find out.
Sur v iv a l T ip Decimal to Binary Conversion Use the Windows Calculator for quick decimal to binary conversions. Open Windows Calculator by choosing Start, All programs, Accessories, Calculator. Or you could just go to Start, Run, Calc. When the calculator opens, choose View, Scientific. This will change your calculator interface from a standard calculator to a scientific calculator. Type in your number, and click the circle that says BIN. Also, while having the calculator on the Bin setting, you can type in any combination of 0s and 1s and convert them to decimal form by clicking on the DEC circle.
panel 4.6 Binary coding schemes: ASCII and EBCDIC
1978 514 " floppy disk; Atari home videogame; Intel’s first 16-bit microprocessor, the 8086, debuts
Hardware: The CPU & Storage
(mainframe) computers, but it is typical of the secondary storage (harddisk) capacity of today’s microcomputers. One gigabyte equals about 500,000 pages of text.
201
wiL16775_ch04_193-252.indd 201
1/7/10 8:42:00 PM
Rev. Confirming Pages
computers, such as mainframes. It was deveoped in 1963–1964 by IBM and uses 8 bits (1 byte) for each character.
•
ASCII: Pronounced “ask-ee,” ASCII (American Standard Code for Information Interchange) is the binary code most widely used with microcomputers. Depending on the version, ASCII uses 7 or 8 bits (1 byte) for each character. Besides having the more conventional characters, the version known as Extended ASCII includes such characters as math symbols and Greek letters. ASCII’s 256 characters, however, are not enough to handle such languages as Chinese and Japanese, with their thousands of characters.
•
Unicode: Developed in the early 1990s, Unicode uses 2 bytes (16 bits) for each character, rather than 1 byte (8 bits). Instead of having the 256 character combinations of ASCII, Unicode can handle 65,536 character combinations. Thus, it allows almost all the written languages of the world to be represented using a single character set.
Machine Language How would I define machine language? Every brand of computer has its own binary language, called machine language. Machine language is a binary-type programming language built into the CPU that the computer can run directly. The machine language is specific to the particular CPU model; this is why, for example, software written for a Macintosh will not run on a Dell PC. To most people, an instruction written in machine language, consisting only of 0s and 1s, is incomprehensible. To the computer, however, the 0s and 1s represent precise storage locations and operations. How do people-comprehensible program instructions become computercomprehensible machine language? Special system programs called language translators rapidly convert the instructions into machine language. This translating occurs virtually instantaneously, so you are not aware it is happening. Because the type of computer you will most likely be working with is the microcomputer, we’ll now take a look at what’s inside the microcomputer’s system unit.
S u rv i v al Ti p
The Computer Case: Bays, Buttons, & Boards
Bay Access Drive bays are the openings in your computer’s case into which drives are installed. If the bay is “accessible,” it’s open to the outside of the PC (tape, floppy, CD/DVD drives). If it’s “hidden,” it’s closed inside the PC case (hard drive).
Chapter 4
1979 Motorola introduces the 68000 chip, which later will support the Mac
202
wiL16775_ch04_193-252.indd 202
1981
What is a bay used for? The system unit houses the motherboard (including the processor chip and memory chips), the power supply, and storage devices. (• See Panel 4.7.) In computer ads, the part of the system unit that is the empty box with just the power supply is called the case or system cabinet. For today’s desktop PC, the system unit may be advertised as something like a “4-bay mini-tower case” or an “8-bay mid-tower case.” A bay is a shelf
1982
IBM introduces Portable personal computers computer (with 8088 CPU and 16 KB RAM)
1983 The capacity of floppy disks is expanded to 360 KB; CDs are introduced to U.S. market
1984
1985
Apple Macintosh; first personal laser printer; Sony and Philips introduce the CD-ROM; Intel’s 80286 chip is released
Intel’s 80386 32-bit microprocessor is introduced
1/7/10 8:42:01 PM
Rev. Confirming Pages
CD/DVD drive Power supply
Hard drive
Chip
Motherboard Power cords
Fan
panel 4.7 The system unit Interior views of the box, or case. It includes the motherboard, power supply, and storage devices. (The arrangement of the components varies among models.)
Floppy drive Video card Moderm card
Ribbon cable
Sound card
Extra case fan
Expansion slots (for video card, sound card, fax modem, etc.)
ROM chips
Microprocessor chip
Floppy-disk drive
Power supply Data transfer Power ribbon cable connector
CD/DVD opticaldisk drive
On/Off switch
CPU
Motherboard
1986
RAM (main memory) chips mounted on modules (cards)
1988
The 3 " diskette is introduced for the Mac and becomes popular for the PC as well 1 2
Motorola’s 32-bit 88000 series of RISC microprocessors is introduced
Speaker
1989 Double-sided, double-density floppy disks come on the market, increasing the 514 " diskette to 1.2 MB and the 312 " diskette to 1.4 MB; Intel’s 80486 chip with 1.2 million transistors is introduced; first portable Mac
1990 Motorola’s 68040 and Intel’s 1486 chips are released
Hardware: The CPU & Storage
Coprocessor chips
System unit
Hard-disk drive
203
wiL16775_ch04_193-252.indd 203
1/7/10 8:42:02 PM
Rev. Confirming Pages
A line from the PC ad on page 199
7-Bay Mid-Tower Case
or an opening used for the installation of electronic equipment, generally storage devices such as a hard drive or DVD drive. A computer may come equipped with four to eight bays. Empty bays are covered by a panel. A tower is a cabinet that is tall, narrow, and deep (so that it can sit on the floor beside or under a table) rather than short, wide, and deep. Originally a tower (full tower) was considered to be 24 inches high. Mini- (micro) and mid-towers may be less than half that size. At 6.5 inches square and 2 inches high, the Mac mini (Chapter 1, p. 23) is the smallest desktop microcomputer. The number of buttons on the outside of the computer case will vary, but the on/off power switch will appear somewhere, probably on the front. There may also be a “sleep” switch; this allows you to suspend operations without terminating them, so that you can conserve electrical power without the need for subsequently “rebooting,” or restarting, the computer. Inside the case—not visible unless you remove the cabinet—are various electrical circuit boards, chief of which is the motherboard, as we’ll discuss.
Power Supply What does a computer’s power supply do? The electricity available from a standard wall outlet is alternating current (AC), but a microcomputer runs on direct current (DC). The power supply is a device that converts AC to DC to run the computer. The on/off switch in your computer turns on or shuts off the electricity to the power supply. Because electricity can generate a lot of heat, a fan inside the computer keeps the power supply and other components from becoming too hot. Electrical power drawn from a standard AC outlet can be quite uneven. For example, a sudden surge, or “spike,” in AC voltage can burn out the low-voltage DC circuitry in your computer (“fry the motherboard”). Instead of plugging your computer directly into a wall electrical outlet, it’s a good idea to plug it into a power protection device. The three principal types are surge protectors, voltage regulators, and UPS units: SURGE PROTECTOR A surge protector, or surge suppressor, is a device that protects a computer from being damaged by surges (spikes) of high voltage. The computer is plugged into the surge protector, which in turn is plugged into a standard electrical outlet. (See the Practical Action box on page 205.) VOLTAGE REGULATOR A voltage regulator, or line conditioner, is a device that protects a computer from being damaged by insufficient power—“brownouts” or “sags” in voltage. Brownouts can occur when a large machine such as a power tool starts up and
Surge protector
Chapter 4
1993 Multimedia desktop computers; Intel introduces its first Pentium chip; Motorola releases the Power PC CPU
204
wiL16775_ch04_193-252.indd 204
1994 Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; Power Macintosh based on Motorola’s Power PC 601 microprocessor; DNA computing proof of concept released
1995 Intel’s Pentium Pro
1997
1998
Intel’s Apple Pentium II iMac and Pentium MMX for games and multimedia
1999
2000
Intel’s Pentium III; AMD’s Athlon CPU (800 MHz); Power Mac G4 available; end of the floppy disk predicted
Intel’s Pentium 4; AMD’s Athlon CPU reaches 1 GHz
1/7/10 8:42:10 PM
Rev. Confirming Pages
PRACTICAL ACTION Power Issues: Problems with Electrical Power to Your Computer
•
•
•
To reduce your electricity bill, turn off your computer when you’re not using it: It’s not just your computer. Many electronic gadgets—cellphone chargers, microwave ovens, and so on—suck electricity when they’re not being used (it’s called a “phantom” load). Indeed, it amounts to 5%–10% every year in American homes.6 Leaving PCs on overnight costs U.S. companies $2.8 billion a year.7 Devices are coming to market that can detect when an appliance is in standby mode (not working).8 But the best thing you can do is to plug your computer into some variant of a power strip (discussed below), so that you can turn off the on-off switch when your PC is not in use. If a laptop’s heat on your thighs is uncomfortable, put it on a “cool tray” with fan: A computer on your lap can generate heat that can quickly make you uncomfortable. Some companies now offer pads and so-called cool trays ($30–$50) with fans that you can slide under your laptop and can cool off both the machine and your lap. Devices are marketed by Logitech, Belkin, Kensington, and Microsoft.9
problems, you’ll be able to get back in business fairly quickly once the machine is running again. •
Use a surge protector to protect against too much electricity: Plug all your hardware into a surge protector (suppressor), which will prevent damage to your equipment if there is a power surge. (You’ll know you’ve experienced a power surge when the lights in the room suddenly get very bright.) Surge protectors cost $10–$35.
•
Use a voltage regulator to protect against too little electricity: Plug your computer into a voltage regulator (line conditioner) to adjust for power sags or brownouts. If power is too low for too long, it’s as though the computer had been turned off.
•
Consider using a UPS to protect against complete absence of electricity: Consider plugging your computer into a UPS, or uninterruptible power supply (available at electronics stores for $35–$200). The UPS is kind of a short-term battery that, when the power fails, will keep your computer running long enough (5–30 minutes) for you to save your data before you turn off the machine. It also acts as a surge protector.
•
Turn ON highest-power-consuming hardware first: When you turn on your computer system, you should turn on the devices that use the most power first. This will avoid causing a power drain on smaller devices. The most common advice is to turn on (1) printer, (2) other external peripherals, (3) system unit, (4) monitor—in that order.
•
Turn OFF lowest-power-consuming hardware first: When you turn off your system, follow the reverse order. This avoids a power surge to the smaller devices.
•
Unplug your computer system during lightning storms: Unplug all your system’s components—including phone lines—during thunder and lightning storms. If lightning strikes your house or the power lines, it can ruin your equipment.
Back up data regularly: You should faithfully make backup (duplicate) copies of your data every few minutes as you’re working. Then, if your computer has power
2001
2002
Pentium 4 reaches 2 GHz; USB 2.0 is introduced
wiL16775_ch04_193-252.indd 205
2003
Pentium 4 reaches 3.06 GHz; Power Mac has 2 1-GHz Power PC CPUs; about 1 billion PCs have been shipped worldwide since the mid-70s
2004
Intel’s Pentium M/Centrino for mobile computing; 64-bit processors
2005
2006
Intel Express Perpendicular chipsets for recording for built-in sound disk drives and video capabilities (no cards needed); IBM sells its PC computing division to Lenovo Group
Intel and AMD introduce dualcore processors; 64-bit processors enter the market
Hardware: The CPU & Storage
B
en Veligdan, a Brooklyn, New York, music teacher, wondered why his monthly electric bill exceeded $100 a month when his household consisted only of himself, his wife, and his cat. Then he looked around his modest one-bedroom apartment and thought, Could it be the computer? When he decided to unplug it while sleeping or not working, his electric bill fell almost immediately.5 You need power to run your computer, of course, but electricity can be very problematic: Leaving a computer turned on all the time is expensive. Having a computer on your thighs can quickly become hot and uncomfortable. Sudden power surges can devastate your hardware. Sudden power drops can wipe out your data. Here are a few things you can do to deal with these problems:
205
1/7/10 8:42:13 PM
Rev. Confirming Pages
causes the lights in your house to dim. They also may occur on very hot summer days when the power company has to lower the voltage in an area because too many people are running their air conditioners all at once. UPS A UPS (uninterruptible power supply) is a battery-operated device that provides a computer with electricity if there is a power failure. The UPS will keep a computer going for 5–30 minutes or more. It goes into operation as soon as the power to your computer fails. Power supply units are usually rated in joules, named after a 19th-century English physicist. The higher the number of joules, the better the power protection. (One hundred joules of energy keep a 100-watt light going for 1 second.)
The Motherboard & the Microprocessor Chip
UPS
How is the motherboard important, and what are types of processor chips? As we mentioned in Chapter 1, the motherboard, or system board, is the main circuit board in the system unit. The motherboard consists of a flat board that fills one side of the case. It contains both soldered, nonremovable components and sockets or slots for components that can be removed—microprocessor chip, RAM chips, and various expansion cards, as we explain later. (• See Panel 4.8, next page.) Making some components removable allows you to expand or upgrade your system. Expansion is a way of increasing a computer’s capabilities by adding hardware to perform tasks that are beyond the scope of the basic system. For example, you might want to add video and sound cards. Upgradmodem card ing means changing to newer, usually more processors in slot powerful or sophisticated versions, such as a more powerful microprocessor or more memory chips.
data transfer ribbon
Chapter 4
2010
2015
$1,000 buys a computer working at 10 quadrillion calculations per second
206
wiL16775_ch04_193-252.indd 206
CPU
THE MICROPROCESSOR CHIP The motherboard may be thought of as your computer’s central nervous system. The brain of your computer is the microprocessor chip. As we described in Chapter 1, a microprocessor is the miniaturized circuitry of a computer processor, contained on a small silicon chip. expansion slots It stores program instructions that fan process, or manipulate, data into Mac motherboard information.
Microcomputer storage in zettabytes
2025
2030
Computers are able to simulate the entire human brain
2030–2045
$1,000 buys a computer more powerful than... the human brain
The point of “singularity” is reached, when technical progress is so fast that unenhanced human intelligence can’t follow it. One can no longer distinguish between our biology and our technology.
1/7/10 8:42:20 PM
Rev. Confirming Pages
RAM (main memory) chips mounted on modules (cards)
panel 4.8 The motherboard This main board offers slots or sockets for removable components: microprocessor chip, RAM chips, and various expansion cards.
Microprocessor chip (with CPU)
•
Transistors—key parts of a chip: The key parts of the microprocessor are transistors. Transistors, we said, are tiny electronic devices that act as on/off switches, which process the on/off (1/0) bits used to represent data. According to Moore’s law, named for legendary Intel cofounder Gordon Moore, the number of transistors that can be packed onto a chip doubles about every 18 months, while the price stays the same, which has enabled the industry to shrink the size and cost of things such as computers and cellphones while improving their performance. In 1961 a chip had only 4 transistors. In 1971 it had 2,300; in 1979 it had 30,000; and in 1997 it had 7.5 million. In 2008, Intel announced a new Itanium chip with 2 billion transistors.10
•
The chipset—chips for controlling information among system components: The chipset consists of groups of interconnected chips on the motherboard that control the flow of information between the microprocessor and other system components connected to the motherboard. The chipset determines what types of processors, memory, and video card ports will work on the same motherboard. It also establishes the types of multimedia, storage, network, and other hardware the motherboard supports.
TRADITIONAL MICROCOMPUTER MICROPROCESSORS Most personal computers in use today have one of two types of microprocessors— one for the PC, one for the Macintosh. The leading chip makers have been Intel, AMD, IBM, and Motorola/Freescale.
•
Intel-type processors for PCs—Intel and AMD chips: Most PCs use CPUs manufactured by Intel Corporation or Advanced Micro Devices (AMD). Indeed, the Microsoft Windows operating system was designed to run on Intel chips. Intel-type chips have a similar internal design and are made to run PCs. They are used by manufacturers such as Dell and Hewlett-Packard in their PC microcomputers. Since 1993, Intel has marketed its chips under such names as “Pentium,” “Pentium Pro,” “Pentium II,” and “Pentium III.” New computers usually have a “Pentium 4” (P4), “Celeron,” “Xeon,” or “Itanium” processor. Less expensive PCs use Pentium or Celeron processors; workstations and low-end servers use Xeon or Itanium
wiL16775_ch04_193-252.indd 207
Intel Pentium DualCore Processor 2.80 GHz
Hardware: The CPU & Storage
Cards in expansion slots
207
1/7/10 8:42:28 PM
Rev. Confirming Pages
processors. AMD’s Opteron processors compete with Intel’s Xeon and Itanium families, and its Athlon processors compete with Intel’s Pentium and Celeron families. In 2008, Intel introduced a line of chips dubbed Atom, for use in so-called nettops and netbooks, Intel’s terms for low-priced desktop ($200–$300) and notebook ($200–$350) computers. AMD announced Puma as a new chip to help the company maintain its share in the laptop market.11
•
Dell Inspiron Mini 9 netbook
Motorola/Freescale and IBM processors for Macintoshes: Apple computers have used a design different from Intel-type processors. For many years, Motorola-type chips were made by Motorola and later its subsidiary Freescale Semiconductor for Apple Macintosh computers up to and including the Apple Mac G4. PowerMac G5 Macintoshes used the PowerPC family of processors, which were originally developed in a cooperative effort by Apple, Freescale, and IBM. Apple MacBooks use Intel Core 2 Duo processors, and the Mac Pros use Quad Core Intel Xeon processors. RECENT MICROCOMPUTER MICROPROCESSORS Some recent developments in chips have had significant effects:
•
Intel processors for Macintoshes: In mid-2005, Apple announced that it would end its current line of products based on PowerPC chips from IBM and Freescale and would switch its machines to Intel chips. Although risky for Apple, the advantage of this major switch is that an Intel processor gives Mac users access to the vast array of Windows-based games and programs (at least those users who are willing to run a Windows OS as well as Mac OS on their systems). This appeals to Windows users who are attracted to Apple’s designs but have stayed away from Macs because they didn’t run Windows programs.12 Even Windows users benefit, suggests well-known technology journalist Walter Mossberg, because, as the most innovative major computer maker, Apple’s impact on the industry is vastly greater than its market share. “Almost everything it does is later copied by the Windows PC makers,” he points out, “so keeping Apple strong and innovating is good for Windows users, too.”13
Motorola processor
Chapter 4
•
208
wiL16775_ch04_193-252.indd 208
Multicore processors for PCs—dual core and quadcore: “You’ll be typing along on an email when suddenly the PC stops responding to your keystrokes, then catches up a few seconds later,” wrote BusinessWeek’s Stephen Wildstrom. “Or a program that used to load in a few seconds inexplicably takes three times as long. Processors are faster than ever, but the demands of even routine computing are overwhelming them.”14 The reason computers bog down is that, as Wildstrom explained, “no matter how fast a processor runs, it can do only one thing at a time.” Adding more transistors doesn’t help, because they generate too much heat. Enter a new kind of microcomputer chip—the multicore processor, designed to let the operating system divide the work over more than one processor, with two or more processor “cores” on a single piece of silicon. The concept is not new; large computer systems, such as IBM’s Blue Gene/L supercomputer, have featured as many as 65,000 processors working in unison.15 But the beauty of having two or more cores is that chips can take on several tasks at once, eliminating the annoying pauses that Wildstrom mentioned. For desktop personal computers, Intel offers a Pentium Dual-Core, a Core 2 Duo, a Core 2 Extreme, and a Core 2 Quad (four processors). AMD
1/7/10 8:42:36 PM
Rev. Confirming Pages
offers the Athlon 64 FX/X2 Dual-Core. For servers, Intel offers a Xeon Dual-Core and Quad-Core Xeon, and AMD offers a Dual-Core Opteron a Quad-Core Opteron. In early 2009, Intel said it was developing an eightcore processor, the “Enterprise” Xeon processor, which would carry 2.3 billion transistors.16 (The multicore technology takes advantage of a technology called hyperthreading, explained in a few pages.)
•
Processors for portable devices: Chip makers have been rushing to produce processors for a new breed of portable devices—mobile internet devices (Chapter 1), netbooks (Intel’s term), and other electronics, from cellphones to MP3 players to handheld game systems to household appliances. Among the contenders making processors for this market are Nvidia (with its Tegra system-on-a-chip), Qualcomm (Snapdragon), Texas Instruments (OMAP4), Via Technologies (the Via C7), and Intel (Atom and Moorestown, and the forthcoming Medfield).17 What all such chips have in common is energy efficiency; Nvidia’s Tegra, for instance, can hold a battery charge five times longer than Intel’s Atom.18
•
Graphics processing units—specialized processors for 3-D graphics: A graphics processing unit (GPU) is a specialized processor used to manipulate three-dimensional (3-D) computer graphics. Unlike a general-purpose CPU, a GPU is able to perform a range of complex algorithms (problem-solving steps). GPUs are found in personal computers, workstations, cellphones, and game consoles. The first company to develop the GPU was Nvidia, whose GeForce 256 GPU has over 22 million transistors (compared to 9 million in the Pentium III) and can process billions of calculations per second.
Processing Speeds: From Megahertz to Picoseconds
Often a PC ad will say something like “Intel Celeron processor 1.80 GHz,” “Intel Pentium 4 processor 2.80 GHz,” or “AMD Athlon 64 X2 processor 2.30 GHz.” GHz stands for “gigahertz.” These figures indicate how fast the microprocessor can process data and execute program instructions. Every microprocessor contains a system clock, which controls how fast all the operations within a computer take place. The system clock uses fixed vibrations from a quartz crystal to deliver a steady stream of digital pulses or “ticks” to the CPU. These ticks are called cycles. Faster clock speeds will result in faster processing of data and execution of program instructions, as long as the computer’s internal circuits can handle the increased speed. There are four main ways in which processing speeds are measured, as follows. FOR MICROCOMPUTERS: MEGAHERTZ & GIGAHERTZ Older microcomputer microprocessor speeds are expressed in megahertz (MHz), a measure of frequency equivalent to 1 million cycles (ticks of the system clock) per second. The original IBM PC had a clock speed of 4.77 megahertz, which equaled 4.77 million cycles per second. The latest-generation processors from AMD and Intel operate in gigahertz (GHz)—a billion cycles per second. Intel’s Pentium 4 operates at up to 3.60 gigahertz, or 3.60 billion cycles per second. Some experts predict that advances in microprocessor technology will produce a 50-gigahertz processor by 2010, the kind of power that will be required to support such functions as true speech interfaces and real-time speech translation. However, unfortunately, the faster a CPU runs, the more power it consumes and the more waste heat it produces. Thus, rather than increasing clock speeds, which requires smaller transistors and creates tricky engineering problems, chip makers such as Intel and AMD are now employing additional
wiL16775_ch04_193-252.indd 209
more
info! Which Intel Processor Is Better? Which is the better Intel processor, Pentium or Celeron, for basic word processing and web surfing versus video games and complex applications? Find out by doing a web search.
Hardware: The CPU & Storage
How does the system clock work in my computer, and how is its speed measured?
209
1/7/10 8:42:44 PM
Rev. Confirming Pages
Comparison of Some Popular Recent Microcomputer Processors Year
Processor Name
Clock Speed
Transistors
2008
Intel Core i7
2.66 GHz (each core)
2008 2007 2006 2005 2005 2005 2004 2003 2002 2002 2001 2001 2001 2001 2000 1999
Intel Tukwila Quad Core Intel Core Quad Intel Pentium EE 840 dual core Intel Pentium 4 660 AMD Athlon 64 X2 dual core Intel Itanium 2 Montecito dual core IBM PowerPC 970FX (G5) AMD Opteron Intel Itanium 2 AMD Athlon MP Intel Xeon Intel Mobile Pentium 4 AMD Athlon XP Intel Itanium Intel Pentium 4 Motorola PowerPC 7400 (G4)
2 GHz (each core) 2.4–2.7 HZ 3.2 GHZ (each core) 3.6–3.7 GHz 2 GHz (each core) 2 GHz (each core) 2.2 GHz 2–2.4 GHz 1 GHz and up 1.53–1.6 GHz 1.4–2.8 GHz 1.4–3.06 GHz 1.33–1.73 GHz 733–800 MHz 1.4–3.06 GHz 400–500 MHz
410 million (each core; 4 cores usually used) 2 billion 582 million 230 million 169 million 105.9 million 1.7 billion 58 million 37.5 million 221 million 37.5 million 140 million 55 million 37.5 million 25.4–60 million 42–55 million 10.5 million
CPU cores and running them in parallel—dual core or multicore technology, as we’ve described.19 As for you, since a new high-speed processor can cost many hundred dollars more than a previous-generation chip, experts often recommend that buyers fret less about the speed of the processor (since the work most people do on their PCs doesn’t even tax the limits of the current hardware) and more about spending money on extra memory. (However, game playing does tax the system. Thus, if you’re an avid computer game player, you may want to purchase the fastest processor.)
Chapter 4
FOR WORKSTATIONS & MAINFRAMES: MIPS Processing speed can also be measured according to the number of instructions per second that a computer can process. MIPS stands for “millions of instructions per second.” MIPS is used to measure processing speeds of mainframes and workstations. A workstation might perform at 100 MIPS or more; a mainframe at as much as 981,024 MIPS.
210
wiL16775_ch04_193-252.indd 210
FOR SUPERCOMPUTERS: FLOPS The abbreviation flops stands for “floatingpoint operations per second.” A floating-point operation is a special kind of mathematical calculation. This measure, used mainly with supercomputers, is expressed as megaflops (mflops, or millions of floating-point operations per second), gigaflops (gflops, or billions), and teraflops (tflops, or trillions). IBM’s Blue Gene/L (for “Lite”) supercomputer cranks out 280.6 teraflops, or 280.6 trillion calculations per second. (With the previous top speed of 70.72 teraflops, a person able to complete one arithmetic calculation every second would take more than a million years to do what Blue Gene/L does in a single second.) The latest champion supercomputer, Roadrunner, developed by Los Alamos National Laboratory and IBM (Chapter 1), has a speed of 1,105 teraflops, or more than a petaflop (1,000 trillion operations per second).20 FOR ALL COMPUTERS: FRACTIONS OF A SECOND Another way to measure cycle times is in fractions of a second. A microcomputer operates in microseconds, a supercomputer in nanoseconds or picoseconds—thousands or millions
1/7/10 8:42:44 PM
Rev. Confirming Pages
of times faster. A millisecond is one-thousandth of a second. A microsecond is one-millionth of a second. A nanosecond is one-billionth of a second. A picosecond is one-trillionth of a second.
4.3 MORE ON THE SYSTEM UNIT How do the processor and memory work, and what are some important ports, buses, and cards? Technology moves on—toward simplifying on the one hand, toward mastering more complexity on the other. An example of simplifying: How about a $100 laptop that could be put into the hands of billions of schoolchildren in the world’s poorest nations? Nicholas Negroponte of the Media Lab at the Massachusetts Institute of Technology has proposed just such a “world computer,” the One Laptop Per Child project’s XO laptop. The XO, which weighs 3.2 pounds, has no hard drive or expensive display system, comes with less capable batteries and a hand crank for charging them, and stretches wireless networks with a technology that lets each computer in a third-world village in Peru or Mexico, for example, relay data to the others. Originally intended to sell for $100, the initial generation of XOs cost $188, depending on whether it used Linux or (for about $20 more) a version of Windows.21 The One Laptop effort has led to competing low-cost computers, such as the itty-bitty 2-pound Eee PC from Asus, available for as little as $299.22 An example of mastering more complexity: IBM, Sony, and Toshiba announced a processor chip called Cell that has nine processing units, or cores, each of which can work independently, allowing the processor to tackle nine tasks at once. Cell’s processing power of 48 gigaflops is such that it would have been among the top 500 supercomputers in 2002, but a version of the chip was released in a Toshiba notebook in 2008.23 To understand the different ways computers are diverging, let’s take a deeper look at how the system unit works.
How the Processor or CPU Works: Control Unit, ALU, Registers, & Buses Once upon a time, the processor in a computer was measured in feet. A processing unit in the 1946 ENIAC (which had 20 such processors) was about 2 feet wide and 8 feet high. Today, computers are based on microprocessors, less than 1 centimeter square. It may be difficult to visualize components so tiny. Yet it is necessary to understand how microprocessors work if you are to grasp what PC advertisers mean when they throw out terms such as “2 GB DDR-SDRAM” or “1 MB Level 2 Advanced Transfer Cache.” WORD SIZE Computer professionals often discuss a computer’s word size. Word size is the number of bits that the processor may process at any one time. The more bits in a word, the faster the computer. A 32-bit computer—that is, one with a 32-bit-word processor—will transfer data within each microprocessor chip in 32-bit chunks, or 4 bytes at a time. (Recall there are 8 bits in a byte.) A 64-bit-word computer is faster; it transfers data in 64-bit chunks, or 8 bytes at a time. THE PARTS OF THE CPU A processor is also called the CPU, and it works hand in hand with other circuits known as main memory to carry out processing. The CPU (central processing unit) is the “brain” of the computer; it follows the instructions of the software (program) to manipulate data into information. The CPU consists of two parts—(1) the control unit and
wiL16775_ch04_193-252.indd 211
Hardware: The CPU & Storage
How do the CPU and its parts work?
211
1/7/10 8:42:44 PM
Rev. Confirming Pages
CPU on motherboard (enlarged representation)
Registers High-speed storage areas used by control unit and ALU to speed up processing
(2) the arithmetic/logic unit (ALU), both of which contain registers, or high-speed storage areas (as we discuss shortly). All are linked by a kind of electronic “roadway” called a bus. (• See Panel 4.9.)
•
Control unit Directs electronic signals between main memory and ALU Arithmetic/logic unit (ALU) Performs arithmetic and logical operations Buses Electrical data roadways that transmit data within CPU and between CPU and main memory and peripherals
Bus
Main memory (Random Access Memory, or RAM)
Bus Expansion slots on motherboard
•
The arithmetic/logic unit— for arithmetic and logical operations: The arithmetic/logic unit (ALU) performs arithmetic operations and logical operations and controls the speed of those operations. As you might guess, arithmetic operations are the fundamental math operations: addition, subtraction, multiplication, and division. Logical operations are comparisons. That is, the ALU compares two pieces of data to see whether one is equal to (), greater than (>), greater than or equal to (>), less than (