Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Using Information Technology

Using Information Technology

Information technology (IT) encompasses the use of computers, software, networks, and other technologies to manage and process data. It involves the creation, storage, retrieval, transmission, and manipulation of information in various forms. Information technology plays a vital role in businesses, organizations, and everyday life, enabling communication, automation, decision-making, and innovation. Moreover you can see this amazing site for gain knowledge on technology:https://technew.com.au/

Jack Edward

March 27, 2024
Tweet

Other Decks in Education

Transcript

  1. i Praise from Reviewers of Previous Editions of Using Information

    Technology “The major difference that I notice between your text and other texts is the informal tone of the writing. This is one of the main reasons we adopted your book—the colloquial feel.” — Todd McLeod, Fresno City College, California. “I would rate the writing style as superior to the book I am currently using and most of the books I have reviewed. . . . I found this book much easier to read than most books on the market.” — Susan Fry, Boise State University [UIT is] “(1) current with today’s and future technology, (2) easy to follow and explain to students who are having difficulty, [and] (3) a great self-study book for the more experienced student.” —Lonnie Hendrick, Hampton University, Hampton, Virginia “The easy-to-understand way of speaking to the readers is excellent. You put computer terminology into an easily understandable way to read. It’s excellent.” — Ralph Caputo, Manhattan College, New York “[The text] is written in a clear and non-threatening manner, keeping the student’s interest through the use of real, colorful anecdotes and interesting observations. The authors’ emphasis on the practical in the early chapters gets the students’ interest by centering on real-life questions that would face everyone purchasing a new personal computer.” — Donald Robertson, Florida Community College–Jacksonville “Williams-Sawyer . . . is the most readable textbook that deals with computer terminology in a meaningful way without getting into tech jargon. The con- cepts are clearly presented and the [photos], illustrations, and graphics become part of the reading and enhance the ability of the reader to comprehend the material. . . . I think the level of difficulty is perfect. I find very few students, even international students, who have difficulty comprehending the book.” — Beverly Bohn, Park University, Parkville, Missouri “This text is written at a level that is fine for most of my students. I have many students for whom English is a second language. These students may have difficulty with certain phrasing. . . . As I read this chapter [Chapter 3], however, I found very little that I thought might cause confusion, even for those ESL students. . . . I have selected previous editions of this text in large part because it is very ‘readable.’” — Valerie Anderson, Marymount College, Palos Verdes, California “[UIT is] geared toward a generation that grew up with computers but never thought about how they work. Should appeal to a younger audience.” — Leleh Kalantari, Western Illinois University, Macomb “Supplemental materials are great! . . . Book is very readable—short sections with excellent illustrations. Students especially seem to appreciate the Practi- cal Action tips.” — Linda Johnsonius, Murray State University, Murray, Kentucky “I really liked the fact that you updated the text with items that would be important to students when they are looking to purchase a PC.” — Stephanie Anderson, Southwestern Community College, Creston, Iowa
  2. ii Reviewer Quotes “I like the authors’ writing style very

    much. I found it to be almost conversa- tional, which is good, in my opinion. . . . I truly looked for unclear areas and did not find any at all.” — Laurie Eakins, East Carolina University, Greenville, North Carolina “I like how [the writing] is personalized. It seems as if the writer is speaking directly to the student—not the normal textbook emphasis.” — Tammy Potter, Western Kentucky Community & Technical College, Paducah “The author[s] did a good job taking something that could be considered a complex topic and made it easy to understand.” — Jennifer Merritt, Park University, Parkville, Missouri “[The authors’] writing style is clear and concise. [They have] taken some very technical topics and explained them in everyday language while not ‘dumbing down’ the material. The text flows smoothly. The inclu- sion of quotes from real people lends a conversational tone to the chapter [Chapter 6], making it easier to read and comprehend.” — Robert Caruso, Santa Rosa Junior College, California “[The writing] flows very well. Touches on most of the important points, but doesn’t bog down in too many details.” — Morgan Shepherd, University of Colorado at Colorado Springs “The level of difficulty is perfect for an intro level computer applications course taught at a 2- or 4-year college.” — Jami Cotler, Siena College, Loudonville, New York “Chapter 2 is written in a readable, motivating style. I found it to be concise, and introducing topics in a proper sequence, defining terms accurately and effectively. I found myself thinking of topics to be added, and then THERE THEY WERE!” — Mike Michaelson, Palomar College, San Marcos, California “Strong writing style. This chapter [Chapter 8] was extremely thorough. And covered many subjects in depth. . . . Writing style has always been quite clear and concise with these two authors.” — Rebecca Mundy, UCLA and University of Southern California “I think the level [of difficulty] is just right. The author[s] did not include a lot of technology lingo, but enough for the typical student who will be reading this book.” — Anita Whitehill, Foothill College, Los Altos Hills, California “Practicality is in the title of the book and is definitely practiced in each chapter. Readability means clear writing, and that is also evident in the text.” — Nancy Webb, San Francisco City College “The practical approach to information technology, along with the book’s superior readability, make this a strong text. The book’s emphasis on being current and a three-level learning system are great.” — DeLyse Totten, Portland Community College, Oregon “I enjoyed the writing style. It was clear and casual, without trivializing. I think the examples and explanations of Williams and Sawyer are excellent.” — Martha Tillman, College of San Mateo, California “Ethics topics are far superior to many other textbooks.” — Maryann Dorn, Southern Illinois University “[The critical thinking emphasis is important because] the facts will change, the underlying concepts will not. Students need to know what the technology is capable of and what is not possible . . .” — Joseph DeLibero, Arizona State University
  3. A Practical Introduction to Computers & Communications Complete Version BRIAN

    K. WILLIAMS | STACEY C. SAWYER USING INFORMATION Technology Ninth Edition
  4. USING INFORMATION TECHNOLOGY: A PRACTICAL INTRODUCTION TO COMPUTERS & COMMUNICATION:

    COMPLETE VERSION Published by McGraw-Hill, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY, 10020. Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Previous editions © 1995, 1997, 1999, 2001, 2003, 2005, 2007, and 2010. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Some ancillaries, including electronic and print components, may not be available to custom- ers outside the United States. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 WDQ/WDQ 1 0 9 8 7 6 5 4 3 2 1 0 ISBN 978-0-07-351677-6 MHID 0-07-351677-5 Vice president/Editor in chief: Elizabeth Haefele Vice president/Director of marketing: John E. Biernat Senior sponsoring editor: Scott Davidson Freelance developmental editor: Craig Leonard Editorial coordinator: Alan Palmer Marketing manager: Tiffany Wendt Lead media producer: Damian Moshak Digital development editor: Kevin White Director, Editing/Design/Production: Jess Ann Kosic Project manager: Jean R. Starr Senior production supervisor: Janean A. Utley Senior designer: Marianna Kinigakis Senior photo research coordinator: Jeremy Cheshareck Photo researcher: Judy Mason Digital production coordinator: Brent dela Cruz Cover design: Daniel Krueger Interior design: Kay Lieberherr Typeface: 10/12 Trump Mediaeval Compositor: Laserwords Private Limited Printer: Worldcolor Cover credit: © Don Bishop/Photodisc/Getty Images Credits: The credits section for this book begins on page 557 and is considered an extension of the copyright page. Library of Congress Cataloging-in-Publication Data Williams, Brian K., 1938- Using information technology : a practical introduction to computers & communications: Complete version / Brian K. Williams, Stacey C. Sawyer.—9th ed. p. cm. Includes index. ISBN-13: 978-0-07-351677-6 (alk. paper) ISBN-10: 0-07-351677-5 (alk. paper) 1. Computers. 2. Telecommunication systems. 3. Information technology. I. Sawyer, Stacey C. II. Title. QA76.5.W5332 2011b 004—dc22 2009048461 The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a Web site does not indicate an endorsement by the authors or McGraw-Hill, and McGraw-Hill does not guarantee the accuracy of the information presented at these sites. www.mhhe.com
  5. Brief Contents vii Brief Contents 1 INTRODUCTION TO INFORMATION TECHNOLOGY

    Your Digital World 1 2 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 49 3 SOFTWARE Tools for Productivity & Creativity 119 4 HARDWARE: THE CPU & STORAGE How to Choose a Multimedia Computer System 193 5 HARDWARE: INPUT & OUTPUT Taking Charge of Computing & Communications 253 6 COMMUNICATIONS, NETWORKS, & SAFEGUARDS The Wired & Wireless World 309 7 PERSONAL TECHNOLOGY The Future Is You 361 8 DATABASES & INFORMATION SYSTEMS Digital Engines for Today’s Economy 401 9 THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 457 10 SYSTEMS ANALYSIS & PROGRAMMING Software Development, Programming, & Languages 491
  6. viii Preface INTRODUCTION Teaching the “Always On” Generation If there

    is anything we have learned during the 15 years of writing and revising this computer concepts book, it is this: Not only does the landscape of computer education change, but so do the students. USING INFORMATION TECHNOLOGY (abbreviated UIT) was written and revised around three important benchmarks: • The impact of digital convergence: The First Edition was the first text to foresee the impact of digital convergence—the fusion of computers and communications—as the new and broader foundation for the computer concepts course. • The importance of cyberspace: The Fourth Edition was the first text to acknowledge the new priorities imposed by the Internet and World Wide Web and bring discussion of them from late in the course to near the beginning (to Chapter 2). • The ascendancy of the “Always On” generation: The Seventh Edition addressed another paradigm change: Because of the mobility and hybridization of digital devices, an “Always On” generation of students has come of age that’s at ease with digital technology but—and it’s an important “but”—not always savvy about computer processes, possibilities, and liabilities. The appearance of this new generation imposes additional challenges on professors: Instructors are expected to make the course interesting and challenging to students already at least somewhat familiar with infor- mation technology while teaching people of widely varying computer sophistication. ADDRESSING INSTRUCTORS’ TWO MOST IMPORTANT CHALLENGES As we embark on our sixteenth year of publication, we are extremely pleased at the continued reception to USING INFORMATION TECHNOLOGY, which has been used by well more than a half million students and adopted by instruc- tors in over 800 schools. One reason for this enthusiastic response may be that we’ve tried hard to address professors’ needs. We’ve often asked instructors—in reviews, surveys, and focus groups— “What are your most significant challenges in teaching this course?” Instructors generally have two answers: The First Most Important Challenge: “Motivating Students & Making the Course Interesting” One professor at a state university seems to speak for most when she says: “Making the course interesting and challenging.” Others echo her with remarks To the Instructor QUOTES What instructors say is most significant challenge in teach- ing this course “Motivating students.” —Sue Vanboven Paradise Valley Community College “Keeping student interest and attention.” —Biswadip Ghosh, Metropolitan State College of Denver
  7. Preface ix such as “Keeping students interested in the material

    enough to study” and “Keeping the students engaged who know some, but not all, of the material.” Said one professor, “Many students take the course because they must, instead of because the material interests them.” Another speaks about the need to address a “variety of skill/knowledge levels while keeping the course challeng- ing and interesting”—which brings us to the second response. The Second Most Important Challenge: “Trying to Teach to Students with a Variety of Computer Backgrounds” The most significant challenge in teaching this course “is trying to provide material to the varied levels of students in the class,” says an instructor at a large Midwestern university. Another says the course gets students from all backgrounds, ranging from “Which button do you push on the mouse?” to “Already built and maintain a web page with html.” Says a third, “mixed- ability classes [make] it difficult to appeal to all students at the same time.” And a fourth: “How do you keep the ‘techies’ interested without losing the beginners?” Motivating the Unmotivated & Teaching to a Disparity of Backgrounds As authors, we find information technology tremendously exciting, but we recognize that many students take the course reluctantly. And we also rec- ognize that many students come to the subject with attitudes ranging from complete apathy and unfamiliarity to a high degree of experience and techni- cal understanding. To address the problem of motivating the unmotivated and teaching to a disparity of backgrounds, UIT offers unequaled treatment of the following: 1. Practicality 2. Readability 3. Currentness 4. Three-level critical thinking system. We explain these features on the following pages. FEATURE #1: Emphasis on Practicality This popular feature received overwhelming acceptance by both students and instructors in past editions. Practical advice, of the sort found in computer magazines, newspaper technology sections, and general-interest computer books, is expressed not only in the text but also in the following: The Experience Box Appearing at the end of each chapter, the Experience Box is optional material that may be assigned at the instruc- tor’s discretion. However, students will find the subjects covered are of immediate value. Examples: “Web Research, Term Papers, & Plagiarism.” “The Mysteries of Tech Support.” “How to Buy a Laptop.” “Preventing Your Identity from Getting Sto- len.” “Virtual Meetings: Linking Up Electronically.” “The ‘Always On’ Generation.” QUOTE “This will always be a difficult course to teach, since the students in any given class come from very different backgrounds and have vastly different levels of computer expertise.” — Laurie Eakins, East Carolina University QUOTE About UIT ’s practicality “The practical approach to infor- mation technol- ogy, along with the book’s superior readability, make this a strong text.” — DeLyse Totten, Portland Commu- nity College, Oregon No matter how much students may be able to rationalize cheating in college—for example, trying to pass off someone else’s term paper as their own (plagiarism)—ignorance of the conse- quences is not an excuse. Most instructors announce the penalties for cheating at the beginning of the course— usually a failing grade in the course and possible suspen- sion or expulsion from school. identical blocks of text. Indeed, some websites favored by instruc- tors build a database of papers over time so that students can’t recycle work previously handed in by others. One system, Turnitin’s Orig- inality Checking, can lock on to a stolen phrase as short as eight words. It can also identify copied material even if it has been changed slightly from the original. Another pro- EXPERIENCE BOX Web Research, Term Papers, & Plagiarism
  8. Survival Tip Broadband: Riskier for Security Unlike dial-up services, broad-

    band services, because they are always switched on, make your computer vulnerable to over-the-internet security breaches. Solution: Install fire- wall software (Chapter 6). x Preface Practical Action Box This box consists of optional material on practical matters. Examples: “Serious Web Search Techniques.” “Preventing Problems from Too Much or Too Little Power to Your Computer.” “When the Internet Isn’t Produc- tive: Online Addiction & Other Timewast- ers.” “Evaluating & Sourcing Information Found on the Web.” “Tips for Fighting Spam.” “Tips for Avoiding Spyware.” “Util- ity Programs.” “Help in Building Your Web Page.” “Starting Over with Your Hard Drive: Erasing, Reformatting, & Reloading.” “Buy- ing a Printer.” “Telecommuting & Telework: The Nontraditional Workplace.” “Ways to Minimize Virus Attacks.” “How to Deal with Passwords.” “Online Viewing & Sharing of Digital Photos.” “Buying the Right HDTV.” If you belong to a college or company, you may get internet access free. Many public libraries also offer free net con- nections. If these options are not avail- e to you, here are some questions to ask in your first • Is there free, 24-hour technical support? Is it reachable through a toll-free number? • How long does it take to get tech support? Ask for the tech-support number before you sign up, and then call it to see how long a response takes. Also try connecting PRACTICAL ACTION Looking for an Internet Access Provider: Questions to Ask at the Beginning See the list of Experience Boxes and Practical Action Boxes on the inside front cover. See the list of Survival Tips on the inside front cover. QUOTE About UIT ’s practicality “The authors’ emphasis on the practical in the early chapters gets the students’ interest by centering on real- life questions that would face everyone purchasing a new personal computer.” — Donald Robertson, Florida Community College–Jacksonville • 7-Bay Mid-Tower Case • Intel Pentium Dual-Core Processor 2.80 GHz • 2 GB DDR2 SDRAM • 3 MB L2 Cache • 6 USB 2.0 Ports • 256 MB DDR2 Nvidia GeForce PCI Graphics • Sound Blaster Digital Sound Card • 56 Kbps Internal Modem • 320 GB SATA 7200 RPM Hard Drive • 24X DVD/CD-RW Combo Drive • Full-Sized Keyboard with Numeric Keypad • Microsoft IntelliMouse • 17" Flat Panel Display • HP Officejet Pro K5400 Details of this ad are explained throughout this chapter and the next. See the little magnifying glass: Survival Tips In the margins throughout we present utilitar- ian Survival Tips to aid students’ explorations of the infotech world. Examples: “Test the Speed of Your Inter- net Connection.” “Some Free ISPs.” “Do Home Pages Endure?” “Look for the Padlock Icon.” “Keeping Windows Security Features Updated.” “New Software & Compatibility.” “Where Do I Get a Boot Disk?” “Is Your Password Guess- able?” “Update Your Drivers.” “Compressing Web & Audio Files.” “Try Before You Buy.” “Set- ting Mouse Properties.” “Digital Subscriptions.” “Cellphone Minutes.” “Reformat Your Memory Card to Avoid Losing Your Photos.” “Keeping Track of Your Cellphone.” “Fraud Baiters.” “Alleviating Info-Mania.” How to Understand a Computer Ad In the hardware chapters (Chapters 4 and 5), we explain important concepts by showing students how to understand the hardware components in a hypothetical PC ad.
  9. Preface xi FEATURE #2: Emphasis on Readability & Reinforcement for

    Learning We offer the following features for reinforcing student learning: Interesting Writing—Based on Good Scholarship Where is it written that textbooks have to be boring? Can’t a text have personality? Actually, studies have found that textbooks written in an imaginative style significantly improve students’ ability to retain information. Both instructors and students have commented on the distinctiveness of the writing in this book. We employ a number of journalistic devices—colorful anecdotes, short biographical sketches, interesting observations in direct quotes—to make the material as approachable as possible. We also use real anecdotes and examples rather than fictionalized ones. Finally, unlike most computer concepts books, we provide references for our sources—see the endnotes in the back of the book. Many of these are from the year preceding publication. We see no reason why introduc- tory computer books shouldn’t practice good scholarship by revealing their information sources. And we see no reason why good scholarship can’t go along with good writing—scholarship need not mean stuffiness. Key Terms AND Definitions Emphasized To help readers avoid confusion about important terms and what they actually mean, we print each key term in bold italic underscore and its definition in boldface. Example (from Chapter 1): “ Data consists of raw facts and fig- ures that are processed into information. ” Material in Easily Manageable Portions Major ideas are presented in bite-size form, with generous use of advance organizers, bulleted lists, and new paragraphing when a new idea is intro- duced. Most sentences have been kept short, the majority not exceeding 22–25 words in length. “What’s in It for Me?” Questions—to Help Students Read with Purpose We have crafted the learning objectives as Key Questions to help readers focus on essentials. These are expressed as “I” and “me” questions, of the type students ask. These questions follow both first-level and second-level headings throughout the book. Emphasis Throughout on Ethics Many texts discuss ethics in isolation, usually in one of the final chapters. We believe this topic is too important to be treated last or lightly, and users have agreed. Thus, we cover ethical matters throughout the book, as indicated by the special icon shown at right. Example: We discuss such all-important questions as online plagiarism, privacy, computer crime, and netiquette. Emphasis Throughout on Security In the post 9-11 era, security concerns are of gravest importance. Although we devote several pages (in Chapters 2, 6, and 9) to security matters, we also rein- force student awareness by highlighting with page-margin Security icons instances of security-related material throughout the book. Example: On p. 102, we use the special icon shown at right to highlight the advice that one QUOTES About UIT ’s readability “The writing style . . . is very user friendly.” — Pamela Luckett, Barry University “Well written and great for an [intro- ductory] text. I believe all audiences should be able to follow the text.” — Norman Hahn, Thomas Nelson Community College “Definitely writ- ten in an easy- to- understand viewpoint.” — Jerry Matejka, Adelphi University See Ethics examples on pp. 37, 90, 102, 239, 280, 444, 459 See Security icons on pp. 37, 102, 341, 436, 446, 448, 462, 472, 474 ethics SECURITY
  10. xii Preface should pretend that every email message one sends

    “is a postcard that can be read by anyone.” Eight Timelines to Provide Historical Perspective Some instructors like to see coverage of the history of computing. Not wish- ing to add greatly to the length of the book, we decided on a student-friendly approach: the presentation of eight pictorial timelines showing the most significant historical IT events. These timelines, which occur in most chap- ters, appear along the bottom page margin. (See the example at the bottom of this page.) Each timeline repeats certain “benchmark” events to keep students oriented, but each one is modified to feature the landmark discoveries and inventions appropriate to the different chapter material. Examples: In Chapter 4, “System Software,” the timeline features innovations in oper- ating systems. In Chapter 7, “Telecommunications,” the timeline highlights innovations in data transmission. FEATURE #3: Currentness Reviewers have applauded previous editions of UIT for being more up to date than other texts. For example, we have traditionally ended many chapters with a forward-looking section that offers a preview of technologies to come— some of which are realized even as students are using the book. Among the new topics and terms covered in this edition are: active and pas- sive RFID tags, Android, attention/focusing problems, augmented reality, Bing, cellphone voice searches, Chrome, Conficker, cyberwarfare, the “deep Web,” e-books, e-book readers, eight-core processors, FiOS, graphics processing units, Google 3D underwater mapping, hafnium and “high-k” technology, Hulu.com , “instant on” booting software, internet-ready TV, iPhone OS 3.0, laptop “cool trays,” MiFi, multiscreen use, online “app stores,” OpenID, PCI Express bus, “plug computers,” portable media players, sentiment analysis, the Singularity, solid-state memory drives, Ubuntu, use of multiple monitors, wireless access points. In this edition, we have updated the PC advertisement on page 199 and we have also updated the screen shots of software in Chapter 3. Material has also been updated on the following: bar codes, battery technology, biomet- rics, Blu-ray, Bluetooth, Cell chip, cellphone address backup, cloud computing, computer graduate starting salaries, damage to computers, data mining, dif- ficulty disconnecting from work, geolocator tags, gesture-reading technology, Google Print Library Project, government uses of computers, image-recognition technology, injuries caused by computers, input help for disabled, multifunction printers, multitasking, netbooks, online storage, photo printers, privacy matters, Roadrunner supercomputer, speech-recognition systems, telemedicine, texting, three-dimensional output, touch-sensitive computers, Twitter, video-rental kiosks, WiMax 4G networks, Windows 7. See timelines beginning on pp. 14, 50, 166, 196, 260, 310, 410, 516 Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; web browser invented 1994 Wireless monitors available for certain industrial applications 2004 Wireless desktop printers commercially available 2005 TV can output odors; full voice interaction with PCs; digital X-ray glasses 2011? Thought recognition as everyday input means 2016? QUOTE About UIT ’s currentness “Very knowledge- able, very good research.” — Maryann Dorn, Southern Illinois University
  11. Preface xiii “More Info!” Icons Help Students Find Their Own

    Answers to Questions In addition, we have taken the notion of currentness to another level through the use of the “MoreInfo!” feature to encourage students to obtain their own updates about material. Examples: “Finding Wi-Fi Hot Spots.” “Finding ISPs.” “Do Home Pages Endure?” “Do You Need to Know HTML to Build a Website?” “Urban Leg- ends & Lies on the Internet.” “Blog Search Engines.” “Some Online Communi- ties.” “Links to Security Software.” “Where to Learn More about Freeware & Shareware.” “More about Watermarks.” See the pages listed on the inside back cover. FEATURE #4: Three-Level System to Help Students Think Critically about Information Technology This feature, which has been in place for the preceding three editions, has been warmly received. More and more instructors seem to have become familiar with Benjamin Bloom’s Taxonomy of Educational Objectives, describing a hierarchy of six critical-thinking skills: (a) two lower-order skills— memorization and comprehension; and (b) four higher-order skills— application, analysis, syn- thesis, and evaluation. Drawing on our experience in writing books to guide students to college success, we have implemented Bloom’s ideas in a three-stage pedagogical approach, using the following hierarchical approach in the Chapter Review at the end of every chapter: Stage 1 Learning—Memorization: “I Can Recognize & Recall Information” Using self-test questions, multiple-choice questions, and true/false questions, we enable students to test how well they recall basic terms and concepts. Stage 2 Learning—Comprehension: “I Can Recall Information in My Own Terms & Explain Them to a Friend” Using open-ended short-answer questions, we enable students to re-express terms and concepts in their own words. Stage 3 Learning—Applying, Analyzing, Synthesizing, Evaluating: “I Can Apply What I’ve Learned, Relate These Ideas to Other Concepts, Build on Other Knowledge, & Use All These Thinking Skills to Form a Judgment” In this part of the Chapter Review, we ask students to put the ideas into effect using the activities described. The purpose is to help students take possession of the ideas, make them their own, and apply them realistically to their own ideas. Our web exercises are also intended to spur discussion in the class- room and other contexts. Examples: “Using Text Messaging in Emergencies.” “What’s Wrong with Using Supermarket Loyalty Cards?” “Are You in the Homeland Security Database?” RESOURCES FOR INSTRUCTORS Instructor’s Manual The electronic Instructor’s Manual, available as part of the Instructor’s Resource Kit, helps instructors to create effective lectures. The Instructor’s See inside back cover for pages on which MoreInfo! icons appear. info! more Finding Wi-Fi Hot Spots www.wififreespot.com/ www.wifihotspotlist.com/ www.wifinder.com/ QUOTES About UIT ’s critical thinking emphasis “[It] is very impor- tant because it helps students compre- hend and make sound decisions.” — Maryann Dorn, Southern Illinois University “A critical think- ing emphasis is very important because . . . it repre- sents a higher level of understanding.” — Evelyn Lulis, DePaul University
  12. xiv Preface Manual is easy to navigate and simple to

    understand. Each chapter contains a chapter overview, lecture outline, teaching tips, additional information, and answers to end-of-chapter questions and exercises. Testbank The Testbank format allows instructors to effectively pinpoint areas of con- tent within each chapter on which to test students. The text questions include learning level, answers, and text page numbers. EZ Test McGraw-Hill’s EZ Test is a flexible and easy-to-use electronic testing pro- gram. The program allows instructors to create tests from book-specific items. It accommodates a wide range of question types, and instructors may add their own questions. Multiple versions of the test can be created and any test can be exported for use with course management systems such as WebCT, BlackBoard, or PageOut. EZ Test Online is a new service and gives you a place to easily administer your EZ Test created exams and quizzes online. The program is available for Windows and Macintosh environments. PowerPoint Presentation The PowerPoint presentation includes additional material that expands upon important topics from the text, allowing instructors to create interesting and engaging classroom presentations. Each chapter of the presentation includes important illustrations, and animations to enable instructors to emphasize important concepts in memorable ways. Figures from the Book All of the photos, illustrations, screenshots, and tables are available electroni- cally for use in presentations, transparencies, or handouts. Online Learning Center The Online Learning Center ( www.mhhe.com/uit9e ) is designed to provide students with additional learning opportunities. The website includes Power- Point presentations for each chapter. For the convenience of instructors, all Instructor’s Resource CD material is available for download. RESOURCES FOR INSTRUCTORS PageOut PageOut is our Course Web Site Development Center and offers a syllabus page, URL, McGraw-Hill Online Learning Center content, online exercises and quizzes, gradebook, discussion board, and an area for student Web pages. PageOut requires no prior knowledge of HTML, no long hours of coding, and a way for course coordinators and professors to provide a full-course web- site. PageOut offers a series of templates—simply fill them with your course information and click on one of 16 designs. The process takes under an hour and leaves you with a professionally designed website. We’ll even get you started with sample websites, or enter your syllabus for you! PageOut is so straightforward and intuitive, it’s little wonder why over 12,000 college pro- fessors are using it. For more information, visit the PageOut website at www. pageout.net
  13. Acknowledgments xv The Online Learning Center can be delivered through

    any of these platforms: • Blackboard.com • WebCT (a product of Universal Learning Technology) Web CT & Blackboard Partnerships McGraw-Hill has partnerships with WebCT and Blackboard to make it even easier to take your course online and have McGraw-Hill content delivered through the leading internet-based learning tools for higher education. McGraw-Hill has the following service agreements with WebCT and Blackboard: • SimNet Concepts: This is the TOTAL solution for training and assessment in computer concepts. SimNet Concepts offers a unique, graphic-intensive environment for assessing student understanding of computer concepts. It includes interactive labs for 77 different computer concepts and 160 corresponding assessment questions. The content menus parallel the contents of the McGraw-Hill text being used for the class, so that students can cover topics for each chapter of the text you are using. SimNet Concepts also offers the only truly integrated learning and assessment program available today. After a student has completed any SimNet Concepts Exam, he or she can simply click on one button to have SimNet assemble a custom menu that covers just those concepts that the student answered incorrectly or did not attempt. These custom lessons can be saved to disk and loaded at any time for review. Assessment Remediation records and reports what the student did incorrectly for each question on an exam that was answered incorrectly. ACKNOWLEDGMENTS This book has only two names on its title page. but we are extraordinarily grateful for the many others who have been important contributors to its devel- opment. First, we wish to thank our sponsoring editor and champion, Scott Davidson, for his support in helping roll out this edition, which, because of the surge in technological change, now compels an updating on a yearly basis. Thanks also go to our marketing champion, Tiffany Wendt, for her enthusiasm and ideas and continuing commitment. We were extremely delighted to once again have Jean Starr as our project manager, who was instrumental in keep- ing the project on track, and we are grateful to her for her professionalism. We also thank Damian Moshak, Kevin White, and Brent dela Cruz for their media and digital support. Thanks are also due Alan Palmer, Jess Ann Kosic, Janean A. Utley, Marianna Kinigakiss, and Jeremy Cheshareck. Outside McGraw-Hill, we want to state our appreciation for the contribu- tions of Brian Kaspar, our great friend, for his help in checking all the URLs. We also wish to acknowledge the work of Craig Leonard as our freelance devel- opment editor. Judy Mason, our San Francisco Bay Area photo researcher, whose history with us goes back many, many years, did her usual always reli- able, always superb job in photo research. Peter deLissovoy copyedited the text, David Shapiro was our able proofreader, and James Minkin, who has been a stalwart and sensitive indexer on many of our projects, did his usual satisfying and predictable outstanding job. Finally, we are grateful to the following reviewers for helping to make this the most market-driven book possible.
  14. xvi Acknowledgments Tahir Azia, Long Beach City College, California Don

    Bailey, Plymouth State University, New Hampshire Bidi Bruno, Portland Community College, Oregon Anthony Cameron, Fayetteville Technical Community College, North Carolina Paulette Comet, Community College of Baltimore County, Maryland Ron Conway, Bowling Green State University, Indiana Rebecca Cunningham, Arkansas Technical University, Russellville Susan Fuschetto, Cerritos College, Norwalk, California Saiid Ganjalizadeh, Catholic University of America, Washington, D.C. Bish Ghosh, Metropolitan State College, Denver Mindy Glander, North Metro Technical College, Acworth, Georgia Mary Carole Hollingsworth, Georgia Perimeter College, Clarkston Linda Johnsonius, Murray State University, Murray, Kentucky Hak Joon Kim, Southern Connecticut State University, New Haven Nicholas Lindquist, Arizona State University Warren Mack, Northwest Vista College, San Antonio, Texas Elizabeth McCarthy, Kirkwood Community College, Cedar Rapids, Iowa Jacob McGinnis, Park University, Parkville, Missouri Janak Rajani, Howard Community College, Columbia, Maryland Greg Saxon, New Jersey Institute of Technology, Teaneck, New Jersey Barbara Scantlebury, Mohawk Valley Community College, Utica, New York Stephanie Spike, Tallahassee Community College, Florida Susan Taylor, Mount Wachusett Community College, Gardner, Massachusetts David Trimble, Park University, Parkville, Missouri Sue VanBoven, Paradise Valley Community College, Phoenix Jennifer Cohen, Southwest Florida College, Fort Myers Andrew Levin, Delaware Valley College, Doylestown, Pennsylvania John Jansma, Palo Alto College, San Antonio, Texas Lonnie Hendrick, Hampton University, Hampton, Virginia Leon Amstutz, Taylor University, Upland, Indiana Reviewers & Other Participants in Previous Editions We are grateful for the magnificent help over the past 15 years from all the instructors who have given us the benefit of their opinion, as follows: Nancy Alderdice, Murray State University; Margaret Allison, University of Texas–Pan American; Angela Amin, Great Lakes Junior College; Sharon Anderson, Western Iowa Tech Anderson, Marymount College; Hashem Anwari, Northern Virginia Community College–Loudoun Campus; Connie Aragon, Seattle Central Community College;
  15. Acknowledgments xvii Bonnie Bailey, Morehead State University; Robert L. Barber,

    Lane Community College; Vic Barbow, Purdue University; David Brent Bandy, University of Wisconsin–Oshkosh; Robert Barrett, Indiana University and Purdue University at Fort Wayne; Anthony Baxter, University of Kentucky; Gigi Beaton, Tyler Junior College; Virginia Bender, William Rainey Harper College; Hossein Bidgoli, California State University– Bakersfield; Warren Boe, University of Iowa; Beverly Bohn, Park University; Randall Bower, Iowa State University; Russell Breslauer, Chabot College; Bob Bretz, Western Kentucky University; William C. Brough, University of Texas–Pan American; Phyllis Broughton, Pitt Community College; Charles Brown, Plymouth State College; David Burris, Sam Houston State University; Jeff Butterfield, University of Idaho; J. Wesley Cain, City University, Bellevue; Patrick Callan, Concordia University; Judy Cameron, Spokane Community College; Ralph Caputo, Manhattan College; Robert Caruso, Santa Rosa Junior College; Joe Chambers, Triton College; Kris Chandler, Pikes Peak Community College; William Chandler, University of Southern Colorado; John Chenoweth, East Tennessee State University; Ashraful Chowdhury, Dekalb College; Erline Cocke, Northwest Mississippi Community College; Robert Coleman, Pima County Community College; Helen Corrigan-McFadyen, Massachusetts Bay Community College; Jami Cotler, Siena College; Glen Coulthard, Okanagan University; Robert Crandall, Denver Business School; Hiram Crawford, Olive Harvey College; Thad Crews, Western Kentucky University; Martin Cronlund, Anne Arundel Community College; Jim Dartt, San Diego Mesa College; Joseph DeLibro, Arizona State University; Edouard Desautels, University of Wisconsin–Madison; William Dorin, Indiana University–Northwest; Maryan Dorn, Southern Illinois University; Patti Dreven, Community College of Southern Nevada; John Durham, Fort Hays State University; Laura A. Eakins, East Carolina University; Bonita Ellis, Wright City College; John Enomoto, East Los Angeles College; Ray Fanselau, American River College; Pat Fenton, West Valley College;
  16. xviii Acknowledgments Eleanor Flanigan, Montclair State University; Ken Frizane, Oakton

    Community College; James Frost, Idaho State University; Susan Fry, Boise State University; Bob Fulkerth, Golden Gate University; Janos Fustos, Metropolitan State College; Yaping Gao, College of Mount St. Joseph; Enrique Garcia, Laredo Community College; JoAnn Garver, University of Akron; Jill Gebelt, Salt Lake Community College; Charles Geigner, Illinois State University; David German, Cerro Coso Community College; Candace Gerrod, Red Rocks Community College; Julie Giles, DeVry Institute of Technology; Frank Gillespie, University of Georgia; Myron Goldberg, Pace University; Dwight Graham, Prairie State College; Fillmore Guinn, Odessa College; Norman P. Hahn, Thomas Nelson Community College; Sallyann Hanson, Mercer County Community College; Debra Harper, Montgomery County Community College–North Harris Albert Harris, Appalachian State University; Jan Harris, Lewis & Clark Community College; Michael Hasset, Fort Hays State University; Julie Heine, Southern Oregon State College; Richard Hewer, Ferris State University; Ron Higgins, Grand Rapids Community College; Martin Hochhauser, Dutchess Community College; Don Hoggan, Solano Community College; James D. Holland, Okaloosa-Waltoon Community College; Stan Honacki, Moraine Valley Community College; Wayne Horn, Pensacola Junior College; Tom Hrubec, Waubonsee Community College; Jerry Humphrey, Tulsa Junior College; Christopher Hundhausen, University of Oregon; Alan Iliff, North Park College; Washington James, Collin County Community College– Plano; Jim Johnson, Valencia Community College; Julie Jordahl, Rock Valley College; Laleh Kalantari, Western Illinois University; Jan Karasz, Cameron University; Jorene Kirkland, Amarillo College; Victor Lafrenz, Mohawk Valley Community College; Sheila Lancaster, Gadsden State Community College; Dana Lasher, North Carolina State University; Stephen Leach, Florida State University; Paul Leidig, Grand Valley State University; Mary Levesque, University of Nebraska–Omaha; Chang-Yang Lin, Eastern Kentucky University; Gina Long, Southwestern Community College;
  17. Acknowledgments xix John Longstreet, Harold Washington College; Paul Lou, Diablo

    Valley College; Pamela Luckett, Barry University; Deborah Ludford, Glendale Community College; Evelyn Lulis, DePaul University; Peter MacGregor, Estrella Mountain Community College; Donna Madsen, Kirkwood Community College; Ed Mannion, California State University–Chico; Alan Maples, Cedar Valley College; Kenneth E. Martin, University of North Florida; Thomas Martin, Shasta College; Jerry Matejka, Adelphi University; Diane Mayne-Stafford, Grossmont College; Todd McLeod, Fresno City College; Curtis Meadow, University of Maine; Jennifer Merritt, Park University; Timothy Meyer, Edinboro University; Michael Michaelson, Palomar College; Cindy Minor, John A. Logan College; Norman Muller, Greenfield Community College; Rebecca Mundy, University of California, Los Angeles, and University of Southern California; Paul Murphy, Massachusetts Bay Community College; Kathleen Murray, Drexel University; Marry Murray, Portland Community College; Sonia Nayle, Los Angeles City College; Charles Nelson, Rock Valley College; Bruce Neubauer, Pittsburgh State University; Wanda Nolden, Delgado Community College; E. Gladys Norman, Linn-Benton Community College; George Novotny, Ferris State University; Janet Olpert, Cameron University; Pat Ormond, Utah Valley State College; John Panzica, Community College of Rhode Island; Rajesh Parekh, Iowa State University; Bettye Jewel Parham, Daytona Beach Community College; Merrill Parker, Chattanooga State Technical Community College; Michelle Parker, Indiana Purdue University; Marie Planchard, Massachusetts Bay Community College; Jim Potter, California State University–Hayward; Tammy Potter, West Kentucky Community & Technical College; Leonard Presby, William Patterson State College; William Pritchard, Wayne State University; Delores Pusins, Hillsborough Community College; Eugene Rathswohl, University of San Diego; Alan Rea, Western Michigan University; Jerry Reed, Valencia Community College; John Rezac, Johnson County Community College; Pattie Riden, Western Illinois University;
  18. xx Acknowledgments Jane Ritter, University of Oregon; Fernando Rivera, University

    of Puerto Rico–Mayaguez Campus; Donald Robertson, Florida Community College–Jacksonville; Stan Ross, Newbury College; Russell Sabadosa, Manchester Community College; Behrooz Saghafi, Chicago State University; Judy Scheeren, Westmoreland County Community College; Al Schroeder, Richland College; Dick Schwartz, Macomb County Community College; Earl Schweppe, University of Kansas; Susan Sells, Wichita State University; Tom Seymour, Minot State University; Naj Shaik, Heartland Community College; Morgan Shepherd, University of Colorado–Colorado Springs; Elaine Shillito, Clark State Community College; Jack Shorter, Texas A&M University; James Sidbury, University of Scranton; Maureen Smith, Saddleback College; Esther Steiner, New Mexico State University; Randy Stolze, Marist College; Charlotte Thunen, Foothill College; Denis Tichenell, Los Angeles City College; Angela Tilaro, Butte College; Martha Tillman, College of San Mateo; DeLyse Totten, Portland Community College; Jack VanDeventer, Washington State University; James Van Tassel, Mission College; Jim Vogel, Sanford Brown College; Dale Walikainen, Christopher Newport University; Reneva Walker, Valencia Community College; Ron Wallace, Blue Mountain Community College; Nancy Webb, San Francisco City College; Steve Wedwick, Heartland Community College; Patricia Lynn Wermers, North Shore Community College; Cora Lee Whitcomb, Bentley College; Doug White, Western Michigan University; Anita Whitehill, Foothill College; Edward Winter, Salem State College; Floyd Winters, Manatee Community College; Israel Yost, University of New Hampshire; Alfred Zimermann, Hawai’i Pacific University; Eileen Zisk, Community College of Rhode Island.
  19. Contents xxi 1.5 Understanding Your Computer: How Can You Customize

    (or Build) Your Own PC? 25 How Computers Work: Three Key Concepts 25 Pretending to Order (or Build) a Custom-Built Desktop Computer: Basic Knowledge of How a Computer Works 26 Input Hardware: Keyboard & Mouse 28 Processing & Memory Hardware: Inside the System Cabinet 28 Storage Hardware: Hard Drive & CD/DVD Drive 30 Output Hardware: Video & Sound Cards, Monitor, Speakers, & Printer 31 Communications Hardware: Modem 32 Software 32 Is Getting a Custom-Built PC Worth the Effort? 33 1.6 Where Is Information Technology Headed? 34 Three Directions of Computer Development: Miniaturization, Speed, & Affordability 34 Three Directions of Communications Development: Connectivity, Interactivity, & Multimedia 35 When Computers & Communications Combine: Convergence, Portability, Personalization, Collaboration, & Cloud Computing 35 “E” Also Stands for Ethics 37 Experience Box: Better Organization & Time Management: Dealing with the Information Deluge in College—& in Life 38 2 THE INTERNET & THE WORLD WIDE WEB : EXPLORING CYBERSPACE 49 2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers 52 Narrowband (Dial-Up) Modem: Low Speed but Inexpensive & Widely Available 53 High-Speed Phone Lines: More Expensive but Available in Most Cities 54 1 INTRODUCTION TO INFORMATION TECHNOLOGY : YOUR DIGITAL WORLDY 1 1.1 The Practical User: How Becoming Computer Savvy Benefits You 3 1.2 Information Technology & Your Life: The Future Now 4 The Two Parts of IT: Computers & Communications 4 Education: The Promise of More Interactive & Individualized Learning 5 Health: High Tech for Wellness 6 Money: Toward the Cashless Society 8 Leisure: Infotech in Entertainment & the Arts 9 Government & Electronic Democracy: Participating in the Civic Realm 10 Jobs & Careers 11 1.3 Infotech Is All Pervasive: Cellphones, Email, the Internet, & the E-World 14 The Phone Grows Up 14 “You’ve Got Mail!” Email’s Mass Impact 15 Practical Action Box: Managing Your Email 17 The Internet, the World Wide Web, & the “Plumbing of Cyberspace” 18 College Students & the E-World 19 1.4 The “All-Purpose Machine”: The Varieties of Computers 20 All Computers, Great & Small: The Categories of Machines 20 Supercomputers 21 Mainframe Computers 22 Workstations 22 Microcomputers 22 Microcontrollers 23 Servers 24 Contents
  20. xxii Contents Problem for Telephone Internet Connections: The Last Mile

    56 Cable Modem: Close Competitor to DSL 56 Satellite Wireless Connections 57 Other Wireless Connections: Wi-Fi & 3G 58 Internet Access Providers: Three Kinds 58 Practical Action Box: Looking for an Internet Access Provider: Questions to Ask at the Beginning 60 2.2 How Does the Internet Work? 60 Internet Connections: POPs, NAPs, Backbone & Internet2 60 Internet Communications: Protocols, Packets, & Addresses 62 Who Runs the Internet? 63 2.3 The World Wide Web 64 The Face of the Web: Browsers, Websites, & Web Pages 64 How the Browser Finds Things: URLs 65 The Nuts & Bolts of the Web: HTML & Hyperlinks 68 Using Your Browser to Get around the Web 69 Web Portals: Starting Points for Finding Information 72 Search Services & Search Engines, & How They Work 74 Four Web Search Tools: Individual Search Engines, Subject Directories, Metasearch Engines, & Specialized Search Engines 74 Smart Searching: Three General Strategies 76 Practical Action: Evaluating & Sourcing Information Found on the Web 77 Multimedia Search Tools: Image, Audio, & Video Searching 77 Practical Action Box: Serious Web Search Techniques 79 Desktop Search: Tools for Searching Your Computer’s Hard Disk 80 Tagging: Saving Links for Easier Retrieval Later 80 2.4 Email & Other Ways of Communicating over the Net 81 Two Ways to Send & Receive Email 82 How to Use Email 82 Sorting Your Email 83 Attachments 85 Instant Messaging 87 FTP—for Copying All the Free Files You Want 88 Newsgroups—for Online Typed Discussions on Specific Topics 89 Listservs: Email-Based Discussion Groups 89 Real-Time Chat—Typed Discussions Among Online Participants 90 Netiquette: Appropriate Online Behavior 90 2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & the Social Web 92 Telephony: The Internet Telephone & Videophone 92 Multimedia on the Web 93 The Web Automatically Comes to You: Webcasting, Blogging, & Podcasting 95 E-Commerce: B2B Commerce, Online Finance, Auctions, & Job Hunting 97 Relationships: Matchmaking Websites 98 Web 2.0 & the Social Web: Social Networking, Media Sharing, Social Network Aggregation, & Microblogging 98 2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware 102 Snooping on Your Email: Your Messages Are Open to Anyone 102 Spam: Electronic Junk Mail 102 Practical Action Box: Tips for Fighting Spam 103 Spoofing, Phishing, & Pharming: Phony Email Senders & Websites 104 Cookies: Convenience or Hindrance? 104 Spyware—Adware, Browser & Search Hijackers, & Key Loggers: Intruders to Track Your Habits & Steal Your Data 105 Practical Action Box: Tips for Avoiding Spyware 106 Experience Box: Web Research, Term Papers, & Plagiarism 107 3 SOFTWARE : TOOLS FOR PRODUCTIVITY & CREATIVITY 119 3.1 System Software: The Power Behind the Power 120
  21. Contents xxiii 3.8 Spreadsheets 161 The Basics: How Spreadsheets Work

    161 Analytical Graphics: Creating Charts 163 3.9 Database Software 164 The Benefits of Database Software 164 The Basics: How Databases Work 164 Personal Information Managers 166 3.10 Specialty Software 167 Presentation Graphics Software 168 Financial Software 170 Desktop Publishing 172 Drawing & Painting Programs 174 Video/Audio Editing Software 175 Animation Software 176 Multimedia Authoring Software 176 Web Page Design/Authoring Software 176 Practical Action Box: Help in Building Your Web Page 178 Project Management Software 178 Portable Document Format (PDF) 179 Computer-Aided Design 180 Experience Box: The Mysteries of Tech Support 182 4 HARDWARE: THE CPU & STORAGE : HOW TO CHOOSE A MULTIMEDIA COMPUTER SYSTEM 193 4.1 Microchips, Miniaturization, & Mobility 194 From Vacuum Tubes to Transistors to Microchips 194 Miniaturization Miracles: Microchips, Microprocessors, & Micromachines 196 Mobility 196 Choosing an Inexpensive Personal Computer: Understanding Computer Ads 198 4.2 The System Unit: The Basics 198 The Binary System: Using On/Off Electrical States to Represent Data & Instructions 199 Machine Language 202 The Computer Case: Bays, Buttons, & Boards 202 Power Supply 204 3.2 The Operating System: What It Does 121 Booting 122 CPU Management 123 File Management 124 Task Management 125 Security Management 126 3.3 Other System Software: Device Drivers & Utility Programs 126 Device Drivers: Running Peripheral Hardware 126 Utilities: Service Programs 127 Practical Action: Utility Programs 127 3.4 Common Features of the User Interface 129 Using Keyboard & Mouse 130 The GUI: The Graphical User Interface 131 The Help Command 137 3.5 Common Operating Systems 138 Macintosh Operating System 138 Microsoft Windows 140 Network Operating Systems: NetWare, Windows NT/2000/2003, Microsoft .NET, Unix, & Linux 144 Practical Action Box: Get a PC or Get a Mac? Dealing with Security Issues 145 Embedded Operating Systems for Handhelds: Palm OS & Windows CE 148 3.6 Application Software: Getting Started 150 Application Software: For Sale, for Free, or for Rent? 150 Tutorials & Documentation 152 A Few Facts about Files & the Usefulness of Importing & Exporting 153 Types of Application Software 154 3.7 Word Processing 155 Creating Documents 156 Editing Documents 156 Formatting Documents with the Help of Templates & Wizards 158 Output Options: Printing, Faxing, or Emailing Documents 160 Saving Documents 160 Web Document Creation 160 Tracking Changes & Inserting Comments 160
  22. xxiv Contents Digital Cameras 274 Speech-Recognition Systems 277 Sensors 278

    Radio-Frequency Identification Tags 279 Human-Biology-Input Devices 280 5.3 Output Hardware 280 Traditional Softcopy Output: Display Screens 281 Traditional Hardcopy Output: Printers 285 Practical Action Box: Buying a Printer 289 Mixed Output: Sound, Voice, & Video 290 5.4 Input & Output Technology & Quality of Life: Health & Ergonomics 291 Health Matters 291 Ergonomics: Design with People in Mind 294 5.4 The Future of Input & Output 294 Toward More Input from Remote Locations 295 Toward More Source Data Automation 295 Toward More Output in Remote Locations 297 Toward More Realistic Output 298 Experience Box: Good Habits: Protecting Your Computer System, Your Data, & Your Health 300 6 COMMUNICATIONS, NETWORKS, & SAFEGUARDS : THE WIRED & WIRELESS WORLD 309 6.1 From the Analog to the Digital Age 311 The Digital Basis of Computers: Electrical Signals as Discontinuous Bursts 311 The Analog Basis of Life: Electrical Signals as Continuous Waves 312 Purpose of the Dial-Up Modem: Converting Digital Signals to Analog Signals & Back 313 Converting Reality to Digital Form 315 6.2 Networks 315 The Benefits of Networks 316 Types of Networks: WANs, MANs, LANs, HANs, PANs, & Others 317 How Networks Are Structured: Client/Server & Peer-to-Peer 318 Practical Action Box: Power Issues: Problems with Electrical Power to Your Computer 205 The Motherboard & the Microprocessor Chip 206 Processing Speeds: From Megahertz to Picoseconds 209 4.3 More on the System Unit 211 How the Processor or CPU Works: Control Unit, ALU, Registers, & Buses 211 How Memory Works: RAM, ROM, CMOS, & Flash 213 How Cache Works 215 Other Methods of Speeding Up Processing 216 Ports & Cables 216 Expandability: Buses & Cards 221 4.4 Secondary Storage 224 Floppy Disks 224 Hard Disks 225 Optical Disks: CDs & DVDs 227 Magnetic Tape 231 Smart Cards 232 Flash & Solid State Memory 234 Online Secondary Storage 235 4.5 Future Developments in Processing & Storage 235 Practical Action Box: Starting Over with Your Hard Drive: Erasing, Reformatting, & Reloading 236 Future Developments in Processing 237 Future Developments in Secondary Storage 240 Experience Box: How to Buy a Laptop 242 5 HARDWARE: INPUT & OUTPUT : TAKING CHARGE OF COMPUTING & COMMUNICATIONS 253 5.1 Input & Output 255 5.2 Input Hardware 256 Keyboards 256 Pointing Devices 260 Scanning & Reading Devices 267 Audio-Input Devices 273 Webcams & Video-Input Cards 273
  23. Contents xxv Personalization 364 Popular Personal Technologies 365 7.2 Portable

    Media Players 366 How MP3 Players Work 366 The Societal Effects of PMPs Players 368 Using PMPs in College 368 7.3 High-Tech Radio: Satellite, HD, & Internet 369 Satellite Radio 369 HD Radio 369 Internet Radio 371 Podcasting 371 7.4 Digital Cameras: Changing Photography 371 How Digital Cameras Work 372 Practical Action Box: Online Viewing & Sharing of Digital Photos 377 The Societal Effects of Digital Cameras 377 7.5 Personal Digital Assistants & Tablet PCs 378 How a PDA Works 378 The Future of PDAs 379 Tablet PCs 379 7.6 The New Television 380 Internet-Ready, & Mobile TV 380 Three Kinds of Television: DTV, HDTV, SDTV 381 Practical Action Box: Buying the Right Flat-Panel TV 382 The Societal Effects of the New TV 382 7.7 E-BOOK READERS: The New Reading Machines 383 How an E-Book Reader Works 383 The Benefits of E-Book Readers 384 The Drawbacks of E-Book Readers 385 7.8 Smartphones: More Than Talk 385 How a Mobile Phone Works 386 Smartphone Services 386 The Societal Effects of Cellphones 391 7.9 Videogame Systems: The Ultimate Convergence Machine? 391 Microsoft’s Xbox 360 392 Intranets, Extranets, & VPNs 318 Components of a Network 320 Network Topologies: Bus, Ring, & Star 322 Two Ways to Prevent Messages from Colliding: Ethernet & Token Ring 324 6.3 Wired Communications Media 325 Wired Communications Media: Wires & Cables 325 Wired Communications Media for Homes: Ethernet, HomePNA, & HomePlug 326 Practical Action Box: Telecommuting & Telework: The Nontraditional Workplace 327 6.4 Wireless Communications Media 328 The Electromagnetic Spectrum, the Radio- Frequency (RF) Spectrum, & Bandwidth 328 Four Types of Wireless Communications Media 330 Long-Distance Wireless: One-Way Communication 332 Long-Distance Wireless: Two-Way Communication 335 Short-Range Wireless: Two-Way Communications 337 6.5 Cyber Threats, Hackers, & Safeguards 341 Cyber Threats: Denial-of-Service Attacks, Worms, Viruses, & Trojan Horses 341 Practical Action Box: Ways to Minimize Virus Attacks 345 Some Cyber Villains: Hackers & Crackers 346 Online Safety: Antivirus Software, Firewalls, Passwords, Biometric Authentication, & Encryption 347 Practical Action Box: How to Deal with Passwords 349 Experience Box: Virtual Meetings: Linking Up Electronically 352 7 PERSONAL TECHNOLOGY : THE FUTURE IS YOU 361 7.1 Convergence, Portability, & Personalization 362 Convergence 362 Portability 364
  24. xxvi Contents Information Flow within an Organization: Horizontally between Departments

    & Vertically between Management Levels 426 Computer-Based Information Systems 429 Office Information Systems 429 Transaction Processing Systems 429 Management Information Systems 430 Decision Support Systems 431 Executive Support Systems 432 Expert Systems 433 8.7 Artificial Intelligence 433 Expert Systems 434 Natural Language Processing 435 Intelligent Agents 436 Pattern Recognition 436 Fuzzy Logic 436 Virtual Reality & Simulation Devices 436 Robotics 438 Two Approaches to Artificial Intelligence: Weak versus Strong AI 440 Artificial Life, the Turing Test, & AI Ethics 442 8.8 The Ethics of Using Databases: Concerns about Privacy & Identity Theft 444 The Threat to Privacy 444 Identity Theft 446 Experience Box: Preventing Your Identity from Getting Stolen 448 9 THE CHALLENGES OF THE DIGITAL AGE : SOCIETY & INFORMATION TECHNOLOGY TODAY 457 9.1 Truth Issues: Manipulating Digital Data 459 Manipulation of Sound 459 Manipulation of Photos 460 Manipulation of Video & Television 461 Accuracy & Completeness 461 9.2 Security Issues: Threats to Computers & Communications Systems 462 Errors & Accidents 462 Natural Hazards 465 Sony’s PlayStation3 393 Nintendo’s Wii 393 The Results of Personal Technology: The “Always On” Generation 393 The Experience Box: The “Always On” Generation 394 8 DATABASES & INFORMATION SYSTEMS : DIGITAL ENGINES FOR TODAY’S ECONOMY 401 8.1 Managing Files: Basic Concepts 402 How Data Is Organized: The Data Storage Hierarchy 403 The Key Field 404 Types of Files: Program Files & Data Files 405 Compression & Decompression: Putting More Data in Less Space 407 8.2 Database Management Systems 407 The Benefits of Database Management Systems 408 Three Database Components 408 Practical Action Box: Storing Your Stuff: How Long Will Digitized Data Last? 409 The Database Administrator 410 8.3 Database Models 410 Hierarchical Database 410 Network Database 411 Relational Database 413 Object-Oriented Database 416 Multidimensional Database 416 8.4 Data Mining 418 The Process of Data Mining 418 Some Applications of Data Mining 420 8.5 Databases & the Digital Economy: E-Business & E-Commerce 421 E-Commerce: Online Buying & Selling 422 Types of E-Commerce Systems: B2B, B2C, & C2C 424 8.6 Information Systems in Organizations: Using Databases to Help Make Decisions 425 The Qualities of Good Information 425
  25. Contents xxvii The First Phase: Conduct a Preliminary Investigation 494

    The Second Phase: Do an Analysis of the System 494 The Third Phase: Design the System 496 The Fourth Phase: Develop the System 497 The Fifth Phase: Implement the System 498 The Sixth Phase: Maintain the System 499 10.2 Programming: A Five-Step Procedure 499 The First Step: Clarify the Programming Needs 500 The Second Step: Design the Program 501 The Third Step: Code the Program 507 The Fourth Step: Test the Program 508 The Fifth Step: Document & Maintain the Program 509 10.3 Five Generations of Programming Languages 510 First Generation: Machine Language 511 Second Generation: Assembly Language 512 Third Generation: High-Level or Procedural Languages 513 Fourth Generation: Very-High-Level or Problem-Oriented Languages 514 Fifth Generation: Natural Languages 516 10.4 Programming Languages Used Today 516 FORTRAN: The Language of Mathematics & the First High-Level Language 516 COBOL: The Language of Business 517 BASIC: The Easy Language 518 Pascal: The Simple Language 518 C: For Portability & Scientific Use 519 LISP: For Artificial Intelligence Programs 519 10.5 Object-Oriented & Visual Programming 519 Object-Oriented Programming: Block by Block 519 Three Important Concepts of OOP 520 Visual Programming: The Example of Visual BASIC 521 10.6 Markup & Scripting Languages 522 HTML: For Creating 2-D Web Documents & Links 523 Computer Crimes 465 Computer Criminals 469 Practical Action Box: Is the Boss Watching You? Trust in the Workplace 471 9.3 Security: Safeguarding Computers & Communications 472 Deterrents to Computer Crime 472 Identification & Access 473 Encryption 474 Protection of Software & Data 475 Disaster-Recovery Plans 475 9.4 Quality-of-Life Issues: The Environment, Mental Health, Child Protection, & the Workplace 476 Environmental Problems 476 Mental-Health Problems 478 Protecting Children: Pornography, Sexual Predators, & Online Bullies 479 Workplace Problems: Impediments to Productivity 482 Practical Action: When the Internet Isn’t Productive: Online Addiction & Other Time Wasters 483 9.5 Economic & Political Issues: Employment & the Haves/Have-Nots 484 Technology, the Job Killer? 485 Gap between Rich & Poor 485 Whom Does the Internet Serve? 486 In a World of Breakneck Change, Can You Still Thrive? 486 Experience Box: Student Use of Computers: Some Controversies 487 10SYSTEMS ANALYSIS & PROGRAMMING : SOFTWARE DEVELOPMENT, PROGRAMMING, & LANGUAGES 491 10.1 Systems Development: The Six Phases of Systems Analysis & Design 492 The Purpose of a System 492 Getting the Project Going: How It Starts, Who’s Involved 493 The Six Phases of Systems Analysis & Design 493
  26. Contents xxviii Ruby 525 PHP(Personal Home Page, or PHP Hypertext

    Pre processor) & R 526 Experience Box: Critical Thinking Tools 527 Notes 535 Credits 557 Index 559 VRML: For Creating 3-D Web Pages 523 XML: For Making the Web Work Better 523 JavaScript: For Dynamic Web Pages 524 ActiveX: For Creating Interactive Web Pages 525 Perl: For CGI Scripts 525 CGI (Common Gateway Interface) 525 Tcl (Tool Command Language) 525
  27. 1 INTRODUCTION to INFORMATION TECHNOLOGY Your Digital World 1 Chapter

    Topics & Key Questions 1.1 The Practical User: How Becoming Computer Savvy Benefits You What does being computer savvy mean, and what are its practical payoffs? 1.2 Information Technology & Your Life: The Future Now What is information technology, and how does it affect education, health, money, leisure, government, and careers? 1.3 Infotech Is All-Pervasive: Cellphones, Email, the Internet, & the E-World How does information technology facilitate email, networks, and the use of the internet and the web; what is the meaning of the term cyberspace? 1.4 The “All-Purpose Machine”: The Varieties of Computers What are the five sizes of computers, and what are clients and servers? 1.5 Understanding Your Computer: How Can You Customize (or Build) Your Own PC? What four basic operations do all computers use, and what are some of the devices associated with each operation? How does communications affect these operations? 1.6 Where Is Information Technology Headed? What are three directions of computer development and three directions of communications development?
  28. 2 Chapter 1 I f you are under the age

    of 30, you live in a world quite different from that of your parents and grandparents. You are a member of the “Always On” generation, accustomed to spending 8 hours or more a day looking at various screens—on cellphones, on com- puters, on TVs.1 You are a “digital native,” as one anthropologist put it, constantly busy with text messaging, email, and the internet.2 If you are an 18-to-24-year-old, you generally watch the smallest amount of live TV (3½ hours a day) compared to any other age group but spend the most time text messaging (29 minutes a day) and watch the most online video (5½ minutes a day).3 What are the developments that have encouraged these kinds of behavior? The answer is information technology. Of the top 30 innovations of the last 30 years, according to a 2009 panel of judges at the University of Pennsylvania’s Wharton School, most were related to information technology. 4 The first four items on the list, for example, are the internet, broadband, and the World Wide Web; PC and laptop computers; mobile phones; and email. (• See Panel 1.1 .) Unlike previous generations, you live in a world of pervasive computing or ubiquitous computing. Central to this concept is the internet—the “Net,” or “net,” that sprawling collection of data residing on computers around the world and accessible by high-speed connections. Everything that presently exists on a personal com- puter, experts suggest, will move onto the internet, giving us greater mobility and wrapping the internet around our lives.5 So central is the internet to our existence, in fact, that many writers are now spelling it without the capital 1. Internet, broadband, World Wide Web 2. PC and laptop computers 3. Mobile phones 4. Email 5. DNA testing and sequencing 6. Magnetic resonance imaging 7. Microprocessors 8. Fiber optics 9. Office software 10. Laser/robotic surgery 1 1. Open-source software 12. Light-emitting diodes 13. Liquid crystal display 14. GPS devices 15. E-commerce and auctions 16. Media file compression 17. Microfinance 18. Photovoltaic solar energy 19. Large-scale wind turbines 20. Internet social networking 21. Graphic user interface 22. Digital photography 23. RFID and applications 24. Genetically modified plants 25. Bio fuels 26. Bar codes and scanners 27. ATMs 28. Stents 29. SRAM flash memory 30. Anti-retroviral treatment for AIDS *To be more than just a new invention, an event was defined as an innovation if it created more opportunities for growth and development and if it had problem-solving value. Source: Adapted from “A World Transformed: What Are the Top 30 Innovations of the Last 30 Years?” Knowledge@Wharton, February 18, 2009, http://knowledge.wharton.upenn.edu/ article.cfm?articleidϭ2163 (accessed May 28, 2009). panel 1.1 Top innovations of the last 30 years. The majority (23 of the 30) are in the field of information technology.*
  29. Introduction to Information Technology 3 “I”— Internet becomes internet, just

    as Telephone became telephone — because both systems belong not to just one owner but to the world. We will follow this convention in this book. In this chapter, we begin by discussing how becoming computer savvy can benefit you and how computing and the internet affect your life. We then discuss cellphones, the internet, the World Wide Web, and other aspects of the e-world. Next we describe the varieties of computers that exist. We then explain the three key concepts behind how a com- puter works and what goes into a personal computer, both hardware and software. We conclude by describing three directions of computer development and three directions of communications development. 1.1 THE PRACTICAL USER: How Becoming Computer Savvy Benefits You What does being computer savvy mean, and what are its practical payoffs? There is no doubt now that for most of us information technology is becoming like a second skin—an extension of our intellects and even emotions, creating almost a parallel universe of “digital selves.” Per- haps you have been using computers a long time and in a multitude of ways, or perhaps not. In either case, this book aims to deliver important practical rewards by helping you become “computer streetwise”—that is, computer savvy. Being computer savvy means knowing what computers can do and what they can’t, knowing how they can benefit you and how they can harm you, knowing when you can solve computer problems and when you have to call for help. Among the practical payoffs are these: YOU WILL KNOW TO MAKE BETTER BUYING DECISIONS No matter how much computer prices come down, you will always have to make judgments about quality and usefulness when buying equipment and software. In fact, we start you off in this chapter by identifying the parts of a computer system, what they do, and about how much they cost. YOU WILL KNOW HOW TO FIX ORDINARY COMPUTER PROBLEMS Whether it’s replacing a printer cartridge, obtaining a software improvement (“patch” or “upgrade”), or pulling pho- tos from your digital camera or camera cellphone, we hope this book gives you the confi- dence to deal with the contin- ual challenges that arise with computers—and know when and how to call for help. YOU WILL KNOW HOW TO UPGRADE YOUR EQUIPMENT & INTEGRATE IT WITH NEW PRODUCTS New gadgetry and software are constantly being developed. A knowledgeable user learns under what condi- tions to upgrade, how to do so, and when to start over by buy- ing a new machine. “Just keeping busy.” Multiple electronic devices allow people to do multiple tasks simultaneously—multitasking. Competence. To be able to choose a computer system or the compo- nents to build one, you need to be computer savvy.
  30. info! more 4 Chapter 1 YOU WILL KNOW HOW TO

    USE THE INTERNET MOST EFFECTIVELY The sea of data that exists on the internet and other online sources is so great that finding what’s best or what’s really needed can be a hugely time-consuming activity. We hope to show you the most workable ways to approach this problem. YOU WILL KNOW HOW TO PROTECT YOURSELF AGAINST ONLINE VILLAINS The online world poses real risks to your time, your privacy, your finances, and your peace of mind—spammers, hackers, virus senders, identity thieves, and companies and agencies constructing giant databases of personal profiles—as we will explain. This book aims to make you streetwise about these threats. YOU WILL KNOW WHAT KINDS OF COMPUTER USES CAN ADVANCE YOUR CAREER Even top executives now use computers, as do people in careers ranging from police work to politics, from medicine to music, from retail to recreation. We hope you will come away from this book with ideas about how the technology can benefit you in whatever work you choose. Along the way—in the Experience Boxes , Practical Action Boxes , Survival Tips, and More Info!s—we offer many kinds of practical advice that we hope will help you become truly computer savvy in a variety of ways, large and small. 1.2 INFORMATION TECHNOLOGY & YOUR LIFE: The Future Now What is information technology, and how does it affect education, health, money, leisure, government, and careers? This book is about computers, of course. But not just about computers. It is also about the way computers communicate with one another. When com- puter and communications technologies are combined, the result is informa- tion technology, or “infotech.” Information technology (IT) is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. IT merges computing with high-speed communications links carrying data, sound, and video. Examples of information technology include personal computers but also new forms of telephones, televisions, appliances, and various handheld devices. The Two Parts of IT: Computers & Communications How do I distinguish computer technology and communications technology? Note that there are two important parts to information technology—comput- ers and communications. COMPUTER TECHNOLOGY You have certainly seen and, we would guess, used a computer. Nevertheless, let’s define what it is. A computer is a program- mable, multiuse machine that accepts data—raw facts and figures—and processes, or manipulates, it into information we can use, such as summa- ries, totals, or reports. Its purpose is to speed up problem solving and increase productivity. COMMUNICATIONS TECHNOLOGY Unquestionably you’ve been using com- munications technology for years. Communications technology , also called telecommunications technology , consists of electromagnetic devices and systems for communicating over long distances. The principal examples are telephone, radio, broadcast television, and cable TV. In more recent times, there has been the addition of communication among computers—which is what happens when people “go online” on the internet. In this context, online From now on, whenever you see the more info! icon (above) in the margin, you’ll find information about internet sites to visit and how to search for terms related to the topic just discussed.
  31. Introduction to Information Technology 5 means using a computer or

    some other information device, connected through a network, to access information and services from another com- puter or information device. A network is a communications system con- necting two or more computers; the internet is the largest such network. Information technology is already affecting your life in exciting ways and will do so even more in the future. Let’s consider how. Education: The Promise of More Interactive & Individualized Learning How is information technology being used in education? In her physics classes at the Massachusetts Institute of Technology, profes- sor Gabriella Sciolla’s high-tech classroom has white boards and huge display screens instead of blackboards. The professor can make brief presentations of general principles, then throw out multiple-choice questions that students “vote” on, using wireless “personal response clickers.” These devices transmit the answers to a computer monitored by the professor, helping her gauge the level of understanding in the room. “You know where they are,” she says. She can then adjust, slow down, or engage students in guided discussions of their answers.6 An Indiana University sociology instructor uses similar technology to get students to answer questions about themselves—race, income, political affili- ation—showing how, for example, the class is skewed toward wealthier or poorer students, an event that can stir up a half hour of excited class discussion.7 Maybe the classrooms at your school haven’t reached this level of interactiv- ity yet, but there’s no question that information technology is universal on col- lege campuses, and at lower levels the internet has penetrated 99% of schools.8 Most college students have been exposed to computers since the lower grades. In fact, one-fifth of college students report they were using computers between the ages 5 and 8, and all had begun using computers by the time they were 16–18 years old. When properly integrated into the curriculum and classroom, information technology can (1) allow students to personalize their education; (2) automate many tedious and rote tasks of teaching and managing classes; and (3) reduce the teacher’s workload per stu- dent, so that he or she can spend more time on reach- ing individual students.9 For instance, email, or “electronic mail,” mes- sages transmitted over a computer network, most often the internet, are used by students to set up appointments (62%) with professors, discuss grades (58%), or get clarification of an assignment (75%).10 Besides using the inter- net to help in teaching, today’s college instruc- tors also use presentation graphics software such as PowerPoint to show their lecture outlines and other materials on classroom screens (as we discuss in Chapter 3). In addi- tion, they use Blackboard, A 6-year-old girl plays a Ses- ame Street interactive program at Maxwell Memorial Library in Camilluis, New York. info! more Online Colleges The following websites provide detailed information about getting college degrees online: www.classesusa.com/ indexall/?campusTypeϭonline www.guidetoonlineschools.com www.usdla.org http://distancelearn.about.com/ http://www.distancelearning.com/
  32. 6 Chapter 1 WebCT, and other course-management software for administering

    online assignments, schedules, examinations, and grades. 11 One of the most intriguing developments in education at all levels, however, is the rise of dis- tance learning, or e-learning, the name given to online education pro- grams, which has gone from under 2 million online students in 2003 to an expected nearly 5 million students in 2009.12 E-learning has had some interest- ing effects. For example, the availability of the internet has helped to propel the home-schooling movement, in which children are taught at home, usually by parents, to expand from 1.7% of all school-age children in 1999 to 2.9% in 2007.13 E-learning has also propelled the rise of for-profit institutions, such as DeVry and the University of Phoenix, which 8% of full-time college stu- dents now attend.14 More than a third of institutions of higher education—and 97% of public universities—offer online courses, and many have attracted on- campus students, who say they like the flexibility of not having to attend their classes at a set time.15 E-learning has been put to such varied uses as bringing career and technical courses to high school students in remote prairie towns, pair- ing gifted science students with master teachers in other parts of the country, and helping busy professionals obtain further credentials out- side business hours. But the reach of informa- tion technology into education has only begun. In the future, we will see software called “intel- ligent tutoring systems” that gives students indi- vidualized instruction when personal attention is scarce—such as the software Cognitive Tutor, which not only helps high school students to improve their performance in math but also sparks them to enjoy a subject they might have once hated. In colleges, more students may use interactive simulation games, such as McGraw-Hill’s Business Strategy Game, to apply their knowledge to real-world kinds of problems. And employees in company training programs may find themselves engaged in mock conversations with avatars —computer depictions of humans, as are often found in online videogames—that represent imaginary customers and coworkers, combining the best parts of computer-based learning with face-to-face interaction.16 Health: High Tech for Wellness How are computers being used in health and medicine? Neurologist Bart Demaerschalk of Phoenix, Arizona, was at home tucking into his Thanksgiving dessert when he received a message that a woman 200 miles away had developed drooping facial muscles and slurred speech. Within a few minutes, Demaerschalk was looking at her, asking questions, reviewing her brain scan, and confirming a diagnosis of stroke—all with the help of a two- way video and audio connection set up for just this kind of consultation.17 Damaerschalk’s story is an example of telemedicine —medical care deliv- ered via telecommunications. For some time, physicians in rural areas lacking local access to radiologists have used “teleradiology” to exchange computerized images such as X rays via telephone-linked networks with expert physicians in metropolitan areas. Now telemedicine is moving to an exciting new level, as the use of digital cameras and sound, in effect, moves patients to doctors rather than the reverse. Already telemedicine is being embraced by administrators in the American prison system, where by law inmates are guaranteed medical treat- ment—and where the increase in prisoners every year has led to the need to control health care costs. Computer technology is radically changing the tools of medicine. All medi- cal information, including that generated by X ray, lab test, and pulse monitor, Avatar. The simulated depic- tions of humans are a staple not only of videogames but also of computerized training programs. (What culture does “avatar” come from? See www. answers.com/topic/ avatar?catϭtechnology.)
  33. Introduction to Information Technology 7 can now be transmitted to

    a doctor in digital format. Image transfer technol- ogy allows radiologic images such as CT scans and MRIs to be immediately transmitted to electronic charts and physicians’ offices. Patients in inten- sive care, who are usually monitored by nurses during off-times, can also be watched over by doctors in remote “control towers” miles away. Electronic medical records and other computerized tools enable heart attack patients to get follow-up drug treatment and diabetics to have their blood sugar measured. Software can compute a woman’s breast cancer risk.18 Patients can use email to query their doctors about their records (although there are still privacy and security issues).19 Various robots —automatic devices that perform functions ordinarily performed by human beings, with names such as ROBO DOC, RoboCart, TUG, and HelpMate—help free medical workers for more critical tasks; the four-armed da Vinci surgical robot, for instance, can do cuts and stitches deep inside the body, so that surgery is less traumatic and recovery time faster.20 Hydraulics and computers are being used to help artificial limbs get “smarter.”21 And a patient paralyzed by a stroke has received an implant that allows com- munication between his brain and a computer; as a result, he can move a cursor across a screen by brainpower and convey simple messages—as in Star Trek. 22 Want to calculate how long you will live? Go to www.livingto100.com, an online calculator developed by longevity researchers at Harvard Medical School and Boston Medical Center. Want to gather your family health history to see if you’re at risk for particular inherited diseases? Go to www.hhs.gov/familyhistory to find out how. These are only two examples of health websites available to patients and health consumers. Although online health information can be mis- leading and even dangerous (for example, be careful about relying on Wikipedia for health advice), many people now tap into health care databases, email health professionals, or communicate with people who have similar conditions. Often patients are already steeped in information about their conditions when they arrive in the offices of health care professionals. This represents a fundamental shift of knowledge, and therefore power, from physicians to patients. In addition, health care consumers are able to share experiences and information with one another. Young parents, for example, can find an online gathering spot (chat room) at pediatrician Alan Greene’s website at www. drgreene.com. If you want to put your medical records on an electronic key- chain storage device, visit med-infochip.com. High-tech medicine. (left) Screenshot of the visual patient record software pioneered at Thy-Mors hospital. This patient has had a fracture of the femur in the right leg. This computer-based image shows a close-up view of the treated area. A click on the arrow or the highlighted femur would show the pertinent medical information from the record on the right panel. The tool allows doctors to easily zoom in an out on a particular body region or part and choose between many different views, for example, the cardiovascular system, the central nervous system, or the muscular system. (right) Open heart surgery is seen on a computer monitor as an Israeli medical team repairs a congenital defect in a boy’s heart at the Wolfson Medical Center in Tel Aviv. info! more Health Websites Some reliable sources: www.medlineplus.gov www.nimh.nih.gov www.4woman.gov www.mayoclinic.com www.nationalhealthcouncil.org www.yourdiseaserisk.wustl.edu/
  34. info! more 8 Chapter 1 Money: Toward the Cashless Society

    How will computers affect my financial matters? “The future of money is increasingly digital, likely virtual, and possibly univer- sal,” says one writer.23 Virtual means that something is created, simulated, or carried on by means of a computer or a computer network, and we cer- tainly have come a long way toward becoming a cashless society. Indeed, the percentage of all financial transactions done electronically, both phone-initiated and computer-initiated, was projected to rise to 18.4% in 2013, up from 0.9% in 1993.24 Besides currency, paper checks, and credit and debit cards, the things that serve as “money” include cash-value cards (such as subway fare cards), automatic transfers (such as direct-deposit paychecks), and digital money (“elec- tronic wallet” accounts such as PayPal). Many readers of this book will probably already have engaged in online buy- ing and selling, purchasing DVDs, books, airline tickets, or computers. But what about groceries? After all, you can’t exactly squeeze the cantaloupes through your keyboard. Even so, online groceries are expected to reach $7.5 billion in U.S. sales by 2012.25 To change decades of shopping habits, e-grocers keep their delivery charges low and delivery times convenient, and they take great pains in filling orders, knowing that a single bad piece of fruit will produce a devas- tating word-of-mouth backlash. Robots. (left) A humanoid robot, HRP-2 Promet, developed by the National Insti- tute of Advanced Industrial Science and Technology and Kawada Industries, Inc. Five feet tall, it performs traditional Japanese dancing. Priced at $365,000, the robot can help workers at construction sites and also drive a car. (middle) This sea bream is about 5½ pounds and can swim up to 38 minutes before recharging. The robot fish, created by Mitsubishi, looks and swims exactly like the real thing. (right) Humanoid robot KOBIAN displays an emotion of sadness during a demon- stration at Waseda University in Tokyo, Japan. KOBIAN, which can express seven programmed emotions by using its entire body, including facial expressions, has been developed by researchers at Waseda’s Graduate School of Advanced Sci- ence and Engineering. Financial Information The internet contains lots of financial information. Some of the better sources: www.finance.yahoo.com www.fool.com www.ragingbull.com www.usatoday.com/money/ default.htm
  35. Introduction to Information Technology 9 Only about 46% of U.S.

    workers have their paychecks electronically deposited into their bank accounts (as opposed to 95% or more in Japan, Norway, and Germany, for example), but this is sure to change as Americans discover that direct deposit is actually safer and faster. Online bill paying is also picking up steam. For more than two decades, it has been possible to pay bills online, such as those from phone and utility companies, with special software and online connections to your bank. Some banks and other businesses are backing an electronic-payment sys- tem that allows internet users to buy goods and services with micropayments, electronic payments of as little as 25 cents in transactions for which it is uneconomical to use a credit card. The success of Apple Computer’s iTunes online music service, which sells songs for 99 cents each, suggests that micro sales are now feasible. All kinds of businesses and organizations, from indepen- dent songwriters to comic book writers to the Legal Aid Society of Cleveland, now accept micropayments, using intermediaries such as BitPass and Pepper- coin.26 Thus, you could set up your own small business simply by constructing a website (we show you how later in the book) and accepting micropayments. Leisure: Infotech in Entertainment & the Arts How will my leisure activities be affected by information technology? Information technology is being used for all kinds of entertainment, ranging from videogames to telegambling. It is also being used in the arts, from paint- ing to photography. Let’s consider just two examples, music and film. Computers, the internet, and the World Wide Web are standing the sys- tem of music recording and distribution on its head—and in the process are changing the financial underpinnings of the music industry. Because of their high overhead, major record labels typically need a band to sell half a million CDs in order to be profitable, but independent bands, using online market- ing, can be reasonably successful selling 20,000 or 30,000 albums. Team Love, a small music label established in 2003, found it could promote its first two bands, Tilly and the Wall and Willy Mason, by offering songs online free for downloading —transferring data from a remote computer to one’s own computer —so that people could listen to them before paying $12 for a CD. It also puts videos online for sharing and uses quirky websites to reach fans. “There’s something exponential going on,” says one of Team Love’s founders. “The more music that’s downloaded, the more it sells.”27 Many independent musicians are also using the internet to get their music heard, hoping that giv- ing away songs will help them build audiences.28 The web also offers sources for instantly downloadable sheet music (see www.everynote.com, www.musicnotes.com, www.sheetmusicdirect.com, and www.sunhawk.com ) . One research engineer has devised a computerized scor- ing system for judging musical competitions that overcomes the traditional human-jury approach, which can be swayed by personalities and politics.29 And a Spanish company, Polyphonic HMI, has created Hit Song Science soft- ware, which they say can analyze the hit potential of new songs by, according to one description, “reference to a finely parsed universe of attributes derived from millions of past songs.”30 As for movies, now that blockbuster movies routinely meld live action and animation, computer artists are in big demand. The 1999 film Star Wars: Episode I, for instance, had 1,965 digital shots out of about 2,200 shots. Even when film was used, it was scanned into computers to be tweaked with ani- mated effects, lighting, and the like. Entire beings were created on computers by artists working on designs developed by producer George Lucas and his chief artist.31 What is driving the demand for computer artists? One factor is that anima- tion, though not cheap, looks more and more like a bargain, because hiring movie actors costs so much—some make $20 million a film. Moreover, special Download (reverse the direction of data transmission to upload) Mainframe Individual PC Satellite Upload Download Download (reverse the direction of data transmission to upload) info! more Free Music Online Places to look for free—and legal—music online: new.music.yahoo.com www.epitonic.com http://memory.loc.gov/ ammem/audio.html www.archive.org www.garageband.com
  36. info! more 10 Chapter 1 effects are readily understood by

    audiences in other countries, and major studios increasingly count on revenues from foreign markets to make a film profitable. Digital manipulation also allows a crowd of extras to be multiplied into an army of thousands. It can also be used to create settings: in the film Sky Captain and the World of Tomorrow, the actors—Gwyneth Paltrow, Ange- lina Jolie, and Jude Law—shot all their scenes in front of a blue screen, and computer-generated imagery was then used to transport them into an imagi- nary world of 1939.32 Computer techniques have even been used to develop digitally created actors—called “synthespians.” (Thespis was the founder of ancient Greek drama; thus, a thespian works in drama as an actor.) Actors ranging from the late James Dean to the late John Wayne, for instance, have been recruited for television commercials. And computerized animation is now so popular that Hollywood studios and movie directors are finding they can make as much money from creating videogames as from making movies.33 But animation is not the only area in which computers are revolutionizing movies. Digital editing has radically transformed the way films are assembled. Whereas traditional film editing involved reeling and unreeling spools of film and cutting and gluing pieces of highly scratchable celluloid together, nearly burying the editor in film, today an editor can access 150 miles of film stored on a computer and instantly find any visual or audio moment, allowing hun- dreds of variations of a scene to be called up for review. Even nonprofessionals can get into movie making as new computer-related products come to mar- ket. Now that digital video capture-and-edit systems are available for under $1,000, amateurs can turn home videos into digital data and edit them. Also, digital camcorders, which offer outstanding picture and sound quality, have steadily dropped in price. Government & Electronic Democracy: Participating in the Civic Realm In what ways are computers changing government and politics? The internet and other information technology have helped government deliver better services and have paved the way for making governmental operations more transparent to the public. For instance, during a health crisis involving salmonella-tainted peanut butter, the U.S. Food and Drug Administration sent out information 707 times per minute in response to citizens seeking infor- mation about it.34 The U.S. State Department has a “DipNote” blog read by 2 million readers, and it holds press conferences on YouTube.35 Congress has a publicly searchable website for all federal contracts and grants over $25,000, Entertainment. (left) Computer-generated special effects shot from the movie Up. (right) An indoor “winter” sports facility in Japan; the system uses microprocessors to keep lifts running, snow falling, and temperature at 26 degrees. Online Movie Tickets Three sites offer movie tickets, as well as reviews and other materials. In some cities you can print out tickets at home. www.fandango.com www.moviefone.com www.movietickets.com
  37. Introduction to Information Technology 11 and a growing number of

    states are putting everything from budgets to con- tracts to travel expenses online for the public to look at.36 The White House also has its own website (www.whitehouse.gov) with its Open Government Dialogue blog.37 Many local and state governments also have websites through which citizens can deal with everything from paying taxes and parking tickets, to renewing vehicle registration and driver’s licenses, viewing birth and mar- riage certificates, and applying for public sector jobs. The internet is also changing the nature of politics, enabling political can- didates and political interest groups to connect with voters in new ways, to raise money from multiple small donors instead of just rich fat cats, and (using cellphones and text messaging) to organize street protests.38 The Barack Obama campaign was said to be particularly adept at exploiting information technology during his run for the presidency in 2008 and afterward for stay- ing in touch with supporters to help him govern.39 Yet information also has its downside, as computers have allowed incumbent legislators to design (ger- rymander) voting districts that make it nearly impossible for them to be dis- lodged; electronic tools have also made it easier than ever for political parties to skirt or break campaign laws, and computerized voting machines still don’t always count votes as they are supposed to. Still, websites and bloggers have become important watchdogs on government. The website E-Democracy ( www.e- democracy.org ) , for instance, can help citizens dig up government conflicts of interest, and websites such as Project Vote Smart ( www.votesmart. org ) outline candidates’ positions. Jobs & Careers How could I use computers to advance my career? Today almost every job and profession requires computer skills of some sort. Some are ordinary jobs in which computers are used as ordinary tools. Oth- ers are specialized jobs in which advanced computer training combined with professional training gives people dramatically new kinds of careers. Consider: • In the hotel business, even front-desk clerks need to know how to deal with computerized reservation systems. Some hotels, however, also have a so-called computer concierge, someone with knowledge of computer systems who can help computer-carrying guests with online and other tech problems. • In law enforcement, police officers need to know how to use computers while on patrol or at their desks to check out stolen cars, criminal Electronic voting. Voting using computer technology and a touch screen to vote. info! more Online Government Help You can gain access to government agencies through the following websites: www.firstgov.gov www.govspot.com www.info.gov Careers. Front-desk workers at many hotels use computers to check guests in.
  38. 12 Chapter 1 records, outstanding arrest warrants, and the like.

    However, investigators with specialized computer backgrounds are also required to help solve fraud, computer break-ins, accounting illegalities, and other high-tech crimes. • In entertainment, computers are used for such ordinary purposes as budgets, payroll, and ticketing. However, there are also new careers in virtual set design, combining training in architecture and 3-D computer modeling, and in creating cinematic special effects. Clearly, information technology is changing old jobs and inventing new ones. To prosper in this environment, you need to combine a traditional education with training in computers and communications. You also need to be savvy about job searching, résumé writing, interviewing, and post- ings of employment opportunities. Advice about careers, job hunting, occu- pational trends, and employment laws is available at Yahoo!, Google, and other websites. Some starting annual salaries for recent college graduates are shown below; note that jobs involving degrees in computers and infor- mation systems occupy four of the seven top-paying starting salaries (• See Panel 1.2 .) Computers can be used both for you to find employers and for employers to find you. 40 WAYS FOR YOU TO FIND EMPLOYERS As you might expect, the first to use cyberspace as a job bazaar were companies seeking people with technical backgrounds and technical people seeking employment. However, as the pub- lic’s interest in commercial services and the internet has exploded, the focus of online job exchanges has broadened. Now, interspersed among ads for pro- grammers on the internet are openings for forest rangers in Idaho, physical therapists in Atlanta, models in Florida, and English teachers in China. Most websites are free to job seekers, although many require that you fill out an online registration form. (• See Panel 1.3.) WAYS FOR EMPLOYERS TO FIND YOU Posting your résumé online for prospec- tive employers to view is attractive because of its low (or zero) cost and wide reach. But does it have any disadvantages? Certainly it might if the employer who sees your posting happens to be the one you’re already working for. In addition, you have to be aware that you lose control over anything broadcast Police work. Syracuse, New York: An Onondaga County sheriff’s deputy enters infor- mation into a laptop in his squad car as he issues a ticket for an uninspected vehicle. The officer was using the sheriff’s department’s new computer database system.
  39. Introduction to Information Technology 13 into cyberspace. You’re putting your

    credentials out there for the whole world to see, and you need to be somewhat concerned about who might gain access to them. If you have a technical background, it’s definitely worth posting your résumé with an electronic jobs registry, since technology companies in par- ticular find this an efficient way of screening and hiring. However, posting may also benefit people with less technical backgrounds. Online recruitment is popular with companies because it prescreens applicants for at least basic computer skills. If you’ve mastered the internet, you’re likely to know some- thing about word processing, spreadsheets, and database searching as well, knowledge required in most good jobs these days. One wrinkle in job seeking is to prepare a résumé with web links and/or clever graphics and multimedia effects and then put it on a website to entice employers to chase after you. If you don’t know how to do this, there are many companies that—for a fee—can convert your résumé and publish it on their own websites. Some of these services can’t dress it up with fancy graphics or multimedia, but since complex pages take longer for employers to download anyway, the extra pizzazz is probably not worth the effort. A number of web- sites allow you to post your résumé for free. Another wrinkle is to pay extra to move your résumé higher in the listings so that it will stand out compared with competing résumés. For example, for an extra $20–$150 apiece, Career- builder.com will move your listing toward the top of the search heap, and the company says that employers click on upgraded résumés 200% more often than on regular ones.41 Career One Stop: www.jobbankinfo.org Career Builder: www.careerbuilder.com College Grad Job Hunter: www.collegegrad.com Erecruiting: www.erecruiting.com FedWorld (U.S. Government jobs): www.fedworld.gov NationJob Network: www.nationjob.com Indeed.com: www.indeed.com Yahoo! Hot Jobs: http://hotjobs.yahoo.com Jobs.com: www.jobs.com Jobs on Line: www.jobsonline.com MonsterTrak.com: www.jobtrak.com JobWeb: www.jobweb.org Monster.com: www. monster.com Simply Hired: www. simplyhired.com Computer science Computer engineering Electrical/electronics and communications engineering Mechanical engineering Civil engineering Management information systems/Business data processing Economics (business/managerial) Finance Accounting Business administration/Management Marketing/Marketing management Political science/Government History Biological sciences/Life sciences English language and literature/Letters Sociology |||||||||||||||||||||||||||||||||||||||||||||||||||||| $61,280 ||||||||||||||||||||||||||||||||||||||||||||||||||||| $60,280 ||||||||||||||||||||||||||||||||||||||||||||||||||| $57,503 ||||||||||||||||||||||||||||||||||||||||||||||||||| $57,024 ||||||||||||||||||||||||||||||||||||||||||||||||| $51,780 ||||||||||||||||||||||||||||||||||||||||||||||||| $51,489 |||||||||||||||||||||||||||||||||||||||||||| $51,062 |||||||||||||||||||||||||||||||||||||||||| $48,158 |||||||||||||||||||||||||||||||||||||||||| $48,020 ||||||||||||||||||||||||||||||||||||||||| $46,171 ||||||||||||||||||||||||||||||||||||| $41,506 ||||||||||||||||||||||||||||||||| $38,844 ||||||||||||||||||||||||||||||||| $38,056 ||||||||||||||||||||||||||||||| $35,522 ||||||||||||||||||||||||||||||| $35,453 ||||||||||||||||||||||||||||||| $35,434 Discipline (bachelor's degree) Current average starting salary Source: Adapted from the NACE Average Starting Salary Offer Survey Results (2008), Purdue University Calumet, posted February 27, 2009, http://209.85.173.132/search?qϭcache:http:// webs calumet.purdue.edu/careerservices/files/2008/10/nace-salary-survey.pdf (accessed April 21, 2009). The original survey is by the National Association of Colleges and Employers, copyright holder. © National Association of Colleges and Employers. All rights reserved. 62 Highland Ave., Bethlehem, PA 18017, www.nacewb.org. panel 1.2 Entering the job market Average starting salary offers for 2008 college graduates panel 1.3 Some websites that post job listings
  40. 14 Chapter 1 1.3 INFOTECH IS ALL-PERVASIVE: Cellphones, Email, the

    Internet, & the E-World How does information technology facilitate email, networks, and the use of the internet and the web; what is the meaning of the term cyberspace? One of the first computers, the outcome of military-related research, was deliv- ered to the U.S. Army in 1946. ENIAC (short for “Electronic Numerical Integra- tor And Calculator”) weighed 30 tons and was 80 feet long and two stories high, but it could multiply a pair of numbers in the then-remarkable time of three- thousandths of a second. (• See Panel 1.4 .) This was the first general-purpose, programmable electronic computer, the grandparent of today’s lightweight handheld machines—including the smart cellphone. Some of the principal his- torical developments are illustrated in the timeline below. (• See Panel 1.5 .) The Phone Grows Up How has the telephone changed? Cellphone e-mania has swept the world. All across the globe, people have acquired the portable gift of gab, with some users making 45 or more calls a day. Strategy Analytics has estimated that worldwide mobile phone subscrip- tions will rise to 3.9 billion in 2013; more than half the world’s population will be using mobile phones by 2010.42 It has taken more than 100 years for the Abacus is invented in Babylonia 3000 BCE First encyclopedia (Syria) 1270 BCE First postal service (China) 900 BCE Greeks start the first library 530 BCE First bound books 100 CE Inhabitants of the first known civilization in Sumer keep records of commericial transactions on clay tablets 4000–1200 BCE 3500 BCE–2900 BCE Phoenicians develop an alphabet; Sumerians develop cuneiform writing; Egyptians develop hierogylphic writing panel 1.4 Grandparent and offspring ENIAC (left) is the grand- parent of today’s smart- phones (right). panel 1.5 Timeline Overview of some of the historical developments in information technology. The timeline is modified in upcoming chapters to show you more about the people and advances con- tributing to developments in information technology.
  41. Introduction to Information Technology 15 Arabic numbers introduced to Europe

    700–800 First moveable type (clay) invented in China 1049 Newspapers appear in Europe 1450 Printing press (J. Gutenberg, Germany) 1455 First mechanical calculator that can add and subtract (Samuel Morland) 1666 1642 First mechanical adding machine (Blaise Pascal) Slide rule invented (Edmund Gunther) 1621 telephone to get to this point—getting smaller, acquiring push buttons, losing its cord connection. In 1964, the * and # keys were added to the keypad. In 1973, the first cellphone call was processed. In its most basic form, the telephone is still so simply designed that even a young child can use it. However, it is now becoming more versatile and complex—a way of connecting to the internet and the World Wide Web. Indeed, internet smartphones—such as the Apple iPhone, the Samsung Instinct, the palm Centro, and the Motorola Q9c—represent another giant step for infor- mation technology. Now you no longer need a personal computer to get on the internet. Smartphones in their various forms enable you not only to make voice calls but also to send and receive text messages, browse the World Wide Web, and obtain news, research, music, photos, movies, and TV programs. (And with camera and camcorder cellphones, you can send images, too.)43 According to one survey, the percentage of people who use nonvoice appli- cations for text messages is 27%; email 11%; internet 9%; and photography 6%—and the numbers of users for these options are growing all the time.44 “You’ve Got Mail!” Email’s Mass Impact What makes email distinctive from earlier technologies? It took the telephone 40 years to reach 10 million customers, and fax machines 20 years. Personal computers made it into that many American homes 5 years Smartphones. (left) Motorola Q9c smartphone. (middle) Ojo videophone, which allows face-to-face chats long distance. (right) Bandai Networks’ mobile phone that displays a novel. Bandai offers 150 books on its site for phone owners to download and read on their phones.
  42. 16 Chapter 1 after they were introduced. Email, which appeared

    in 1981, became popular far more quickly, reaching 10 million users in little more than a year.45 No technology has ever become so universal so fast. Thus, one of the first things new com- puter and internet users generally learn is how to send and receive email. Until 1998, hand-delivered mail was still the main means of correspondence. But in that year, the volume of email in the United States surpassed the volume of hand-delivered mail. In 2007, the total number of email messages sent daily has been estimated at 183 billion worldwide.46 Already, in fact, email is the leading use of PCs. Because of this explosion in usage, suggests a Busi- nessWeek report, “email ranks with such pivotal advances as the printing press, the telephone, and television in mass impact.”47 Using electronic mail clearly is different from calling on a telephone or writing a conventional letter. As one writer puts it, email “occupies a psychological space all its own. It’s almost as imme- diate as a phone call, but if you need to, you can think about what you’re going to say for days and reply when it’s convenient.”48 Email has blossomed, points out another writer, not because it gives us more immediacy but because it gives us less. “The new appeal of email is the old appeal of print,” he says. “It isn’t instant; it isn’t immediate; it isn’t in your face.” Email has succeeded for the same reason that the videophone—which allows callers to see each other while talking—has been so slow to catch on: because “what we actually want from our exchanges is the minimum human contact commensurate with the need to connect with other people.”49 It will be interesting to see, however, whether this observation holds up during the next few years if marketers roll out more videophones. What is interesting, though, is that in these times when images often seem to overwhelm words, email is actually reactionary. “The internet is the first new medium to move decisively backward,” points out one writer, because it essentially involves writing. Twenty years ago, “even the most literate of us wrote maybe a half a dozen letters a year; the rest of our lives took place on the telephone.”51 Email has changed all that—and has put pressure on business- people in particular to sharpen their writing skills. (A countertrend, unfor- tunately, is that the informal style of electronic messages is showing up in schoolwork.)52 First patent for a typewriter (England) 1714 The first mass- produced calculator, the Thomas Arithnometer 1820 William Austin patents the first workable typewriter in America 1829 A linked sequence of punched cards controls the weaving patterns in Jacquard’s loom 1801 1843 World’s first computer programmer, Ada Lovelace, publishes her notes 1833 Babbage’s difference engine (automatic calculator)
  43. 17 For many people, email is the online environment, more

    so than the World Wide Web. According to one study, 60% of people who do emailing at work aver- age 10 or fewer messages a day, 23% receive more than 20, and 6% receive more than 50.50 But some people receive as many as 300 emails a day—with perhaps 200 being junk email (spam), bad jokes, or irrelevant memos (the “cc,” previously “carbon copy,” now “courtesy copy”). It’s clear, then, that email will increase productivity only if it is used properly. Overuse or misuse just causes more problems and wastes time. The following are some ideas to keep in mind when using email: • Do your part to curb the email deluge: Put short mes- sages in the subject line so that recipients don’t have to open the email to read the note. Don’t reply to every email message you get. Avoid “cc:ing” (copying to) peo- ple unless absolutely necessary. Don’t send chain let- ters or lists of jokes, which just clog mail systems. • Be helpful in sending attachments: Attachments— computer files of long documents or images attached to an email—are supposed to be a convenience, but often they can be an annoyance. Sending a 1-megabyte file to a 500-person mailing list creates 500 copies of that file— and that many megabytes can clog the mail system. (A 1-megabyte file is about the size of a 300-page double- spaced term paper.) Ask your recipients beforehand if they want the attachment. • Be careful about opening attachments you don’t recog- nize: Some dangerous computer viruses—renegade pro- grams that can damage your computer—have been spread by email attachments that automatically activate the virus when they are opened. • Use discretion about the emails you send: Email should not be treated as informally as a phone call. Don’t send a message electronically that you don’t want some third party to read. Email messages are not written with disappearing ink; they remain in a computer system long after they have been sent. Worse, recipients can easily copy and even alter your messages and forward them to others without your knowledge. • Make sure emails to bosses, coworkers, and custom- ers are literate: It’s okay to be informal when emailing friends, but employers and customers expect a higher standard. Pay attention to spelling and grammar. • Don’t use email to express criticism and sarcasm: Because email carries no tone or inflection, it’s hard to convey emotional nuances. Avoid criticism and sarcasm in electronic messaging. Nevertheless, you can use email to provide quick praise, even though doing it in person will take on greater significance. • Be aware that email you receive at work is the property of your employer: Be careful of what you save, send, and back up. • Realize that deleting email messages doesn’t totally get rid of them: “Delete” moves the email from the vis- ible list, but the messages remain on your hard disk and can be retrieved by experts. Special software, such as Spytech Eradicator and Window Washer, will completely erase email from the hard disk. • Don’t neglect real personal contact: More companies are asking employees to trade email for more in-person contact with the people they work with, through such practices as banning the use of email on Fridays. This has come about because so many employees complain that they have to leave multiple messages when trying to get answers since coworkers don’t respond in timely fashion. PRACTICAL ACTION Managing Your Email Introduction to Information Technology 1854 George Boole publishes “An Investigation on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design 1844 Samuel Morse sends a telegraph message from Washington to Baltimore 1895 First radio signal transmitted 1907 First regular radio broadcasts, from New York 1920–1921 The word “robot,” derived from the Czech word for compulsory labor, is first used to mean a humanlike machine 1876 Alexander Graham Bell patents the telephone 1890 Electricity used for first time in a data- processing project— Hollerith’s automatic census-tabulating machine (used punched cards)
  44. 18 Chapter 1 The Internet, the World Wide Web, &

    the “Plumbing of Cyberspace” What’s the difference between the net, the web, and cyberspace? As the success of the cellphone shows, communications has extended into every nook and cranny of civilization (with poorer nations actually the lead- ers in cellphone growth), a development called the “plumbing of cyberspace.” The term cyberspace was coined by William Gibson in his novel Neuromancer (1984) to describe a futuristic computer network into which users plug their brains. ( Cyber comes from “cybernetics,” a term coined in 1948 to apply to the comparative study of automatic control systems, such as the brain/nervous system and mechanical-electrical communication systems.) In everyday use, this term has a rather different meaning. Today many people equate cyberspace with the internet. But it is much more than that. Cyberspace includes not only the web, chat rooms, online dia- ries (blogs), and member-based services such as America Online—all features we explain in this book—“but also such things as conference calls and auto- matic teller machines,” says David Whittler.53 We may say, then, that cyberspace encompasses not only the online world and the internet in particular but also the whole wired and wireless world of communications in general —the nonphysical terrain created by computer and communications systems. Cyber- space is where you go when you go online with your computer. THE NET & WEB DEFINED The two most important aspects of cyberspace are the internet and that part of the internet known as the World Wide Web. To give them formal definition: • The internet—“the mother of all networks”: The internet is at the heart of the Information Age. Called “the mother of all networks,” the internet (the “net”) is a worldwide computer network that connects hundreds of thousands of smaller networks. These networks link educational, commercial, nonprofit, and military entities, as well as individuals. • The World Wide Web—the multimedia part of the internet: The internet has been around for more than 40 years. But what made it popular, apart from email, was the development in the early 1990s of the World Wide Web , often called simply the “Web” or the “web”—an interconnected system of internet computers (called servers ) that support specially formatted documents in multimedia form. The word multimedia, from “multiple media,” refers to technology that presents information in more than one medium, such as text, still images, moving images, and sound. In other words, the web provides information in more than one way. 1944 1924 T.J. Watson renames Hollerith’s machine company, founded in 1896, to International Business Machines (IBM) 1927 First demonstration of television in USA 1941 Konrad Zuse (Germany) produces the first fully functional programmable digital computer, the Z3 (ran by perforated celluloid strips) 1942 First electronic digital computer (but non- programmable) developed by John Atanasoff and Clifford Berry First programmable electromechanical computer (Mark I) (owned by the U.S. government) 1945 John von Neumann introduces the concept of a stored program
  45. Introduction to Information Technology 19 THE INTERNET’S INFLUENCE There is

    no doubt that the influence of the net and the web is tremendous. At present, 75% of American adults use the inter- net, according to the Pew Internet & American Life Project.54 Seventy-two per- cent of American adult internet users use the net on an average day, with 60% using it to send or read email.55 But just how revolutionary is the internet? Is it equivalent to the invention of television, as some technologists say? Or is it even more important—equivalent to the invention of the printing press? “Tele- vision turned out to be a powerful force that changed a lot about society,” says USA Today technology reporter Kevin Maney. “But the printing press changed everything—religion, government, science, global distribution of wealth, and much more. If the internet equals the printing press, no amount of hype could possibly overdo it.”56 College Students & the E-World How does my use of information technology compare with that of other students? One thing we know already is that cyberspace is saturating our lives. The world- wide internet population was 1.59 billion (or nearly 24% of the world’s population in 2009). About 251 million of those internet users were in North America, repre- senting a penetration of 74% of the population.57 While the average age of users is 1952 UNIVAC computer correctly predicts election of Eisenhower as U.S. President 1946 First programmable electronic computer in United States (ENIAC) Invention of the transistor (enabled miniaturization of electronic devices) 1947 Computers are first sold commercially 1951 1958 Integrated circuit; first modem 1962 The first computer game is invented (Spacewar) 1969 ARPANet established by U.S. Advanced Research Projects Agency; led to internet Always on Most of today’s students don’t remember a time before the existence of cyberspace.
  46. 20 Chapter 1 rising, there’s no doubt that people ages

    18–29 love the internet, with 87% of them using it; among all computer users with a college education, 95% use the net.58 Teens and young adults (age 18–32) are the most likely of all groups to use the internet for communicating with friends and family; for entertainment— especially online videos, online games, and virtual worlds (such as for mul- tiplayer online role-playing games)—and for obtaining music. They are also considerably more likely than older users to use social networking sites— online communities, such as Facebook and Twitter, that allow members to keep track of their friends and share photos, videos, and the like. In addition, young people are more apt to send instant messages and to do text messaging (texting) with friends—send brief written messages between cellphones.59 We consider all these technologies later in the book. 1.4 THE “ALL-PURPOSE MACHINE”: The Varieties of Computers What are the five sizes of computers, and what are clients and servers? When the ✭alarm clock blasts you awake, you leap out of bed and head for the kitchen, where you check the ✭coffee maker. After using your ✭electronic toothbrush and showering and dressing, you stick a bagel in the ✭microwave, and then pick up the ✭TV remote and click on the ✭TV to catch the weather forecast. Later, after putting dishes in the ✭dishwasher, you go out and start up the ✭car and head toward campus or work. Pausing en route at a ✭traffic light, you turn on your ✭iPod to listen to some music. And you might use your ✭GPS system to get to your destination. You haven’t yet touched a PC, a personal computer, but you’ve already dealt with at least 11 computers—as you probably guessed from the ✭s. All these familiar appliances rely on tiny “computers on chips” called microprocessors. Maybe, then, the name “computer” is inadequate. As computer pioneer John von Neumann has said, the device should not be called the computer but rather the “all-purpose machine.” It is not, after all, just a machine for doing calculations. The most striking thing about it is that it can be put to any number of uses. What are the various types of computers? Let’s take a look. All Computers, Great & Small: The Categories of Machines What are the five sizes of computers? At one time, the idea of having your own computer was almost like having your own personal nuclear reactor. In those days, in the 1950s and 1960s, comput- ers were enormous machines affordable only by large institutions. Now they come in a variety of shapes and sizes, which can be classified according to their processing power: supercomputers, mainframe computers, workstations, microcomputers, and microcontrollers. We also consider servers. 1970 Micro- processor chips come into use; floppy disk introduced for storing data; first dynamic RAM chip 1976 Apple I computer (first personal computer sold in assembled form) 1975 First micro- computer (MIT’s Altair 8800) IBM introduces personal computer; mouse becomes regular part of a computer 1981 Portable computers 1982 5 " floppy disk; Atari home videogame; first spam email sent 1978 1 4 1972 First video- game (Pong)
  47. Introduction to Information Technology 21 Supercomputers Is there a chance

    I might use a supercomputer? Typically priced from $1 million to more than $350 million, supercomput- ers are high-capacity machines with thousands of processors that can perform more than several trillion calculations per second. These are the most expensive and fastest computers available. “Supers,” as they are called, have been used for tasks requiring the processing of enormous volumes of data, such as doing the U.S. census count, forecasting weather, designing aircraft, modeling molecules, and breaking encryption codes. More recently they have been employed for business purposes—for instance, sifting demo- graphic marketing information—and for creating film animation. The fastest computer in the world, costing $100 million and with roughly the computing power of 100,000 of today’s most powerful laptops, is the Roadrunner, developed by engineers from the Los Alamos National Laboratory and IBM Corp., primar- ily for nuclear weapons research, including simulat- ing nuclear explosions. Roadrunner’s speed is 1.105 petaflops, or 1,105 trillion operations per second.60 (• See Panel 1.6 .) In February 2009, IBM announced its intent to release “Sequoia,” a 20 petaflops super- computer, in 2011. This machine will have the power of approximately 2 million laptops. Apple Macintosh; first personal laser printer 1984 Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; first web browser invented 1994 PayPal is founded 1998 The “Y2K” nonproblem; the first U.S. presidential webcast 2000 Dell computers becomes the largest PC maker 2001 Friendster 2002 Facebook MySpace 2003 panel 1.6 Supercomputer Maker or Lab Top Speed, Teraflops Location Roadrunner Los Alamos Laboratory and IBM Blue Gene/L IBM Molecular Dynamics Machine Riken Grape-6 U. Tokyo Columbia SGI Earth Simulator NEC 1,105 280.6 78 64 61 41 U.S. U.S. Japan Japan U.S. Japan Source: Data from www.top500.org, reported in Don Clark, “Los Alamos Computer Keeps Title as the Fastest,” The Wall Street Journal, November 11, 2008, p. B9; www.newsfactor. com/story.xhtml?story_idϭ31771; www.supercomputingonline.com/print.php?sidϭ8879; and H. Josef Hebert, “Computer Proves It’s World’s Fastest,” San Francisco Chronicle, June 10, 2008, p. 47. Roadrunner supercomputer from Los Alamos National Laboratory and IBM This is the world’s fastest supercomputer. info! more FLOPS In computing, FLOPS is an abbreviation of Floating-point Operations Per Second. Flops is used as a measure of a comput- er’s performance, especially in fields of scientific calculations. Using floating-point encoding, extremely long numbers can be handled relatively easily. Com- puters operate in the trillions of flops; for comparison, any response time below 0.1 second is experienced as instanta- neous by a human operator, so a simple pocket calculator could be said to operate at about 10 flops. Humans are even worse floating-point processors. If it takes a person a quarter of an hour to carry out a pencil- and-paper long division with 10 significant digits, that person would be calculating in the mil- liflops range.
  48. 22 Chapter 1 Supercomputers are still the most powerful computers,

    but a new generation may be coming that relies on nanotechnology, in which molecule-size nano- structures are used to create tiny machines for holding data or performing tasks. ( Nano means “one-billionth.”) Computers the size of a pencil eraser could become available that work 10 times faster than today’s fastest supercomputer.61 Eventually nanotech could show up in every device and appliance in your life. Mainframe Computers What kind of services am I apt to get from a mainframe? The only type of computer available until the late 1960s, mainframes are water- or air-cooled computers that cost $5,000–$5 million and vary in size from small, to medium, to large, depending on their use. Small main- frames ($5,000–$200,000) are often called midsize computers; they used to be called minicomputers, although today the term is seldom used. Mainframes are used by large organizations—such as banks, airlines, insurance compa- nies, and colleges—for processing millions of transactions. Often users access a mainframe by means of a terminal , which has a display screen and a key- board and can input and output data but cannot by itself process data. Mainframes process billions of instructions per second. Workstations What are some uses of workstations? Introduced in the early 1980s, workstations are expensive, powerful personal computers usually used for complex scientific, math- ematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. Providing many capa- bilities comparable to those of midsize mainframes, workstations are used for such tasks as designing airplane fuselages, developing pre- scription drugs, and creating movie special effects. Workstations have caught the eye of the public mainly for their graphics capabilities, which are used to breathe three-dimensional life into movies such as WALL • E, Harry Potter, and X-Men Origins: Wolverine. The capabilities of low- end workstations overlap those of high-end desktop microcomputers. Microcomputers How does a microcomputer differ from a workstation? Microcomputers , also called personal computers ( PCs ), which cost $500 to over $5,000, can fit next to a desk or on a desktop or can be carried around. They either are stand-alone machines or are connected to a computer network, such as a local area network. A local area network (LAN) connects, usually by special cable, a group of desktop PCs and other devices, such as printers, in an office or a building. Microcomputers are of several types: desktop PCs, tower PCs, notebooks (laptops), netbooks, mobile internet devices (MIDs), and personal digital assistants—handheld computers or palmtops. IBM PC sold to Lenovo Group Flickr 2004 YouTube Wii 2005 Twitter 2006 Skype 2007 Foldable computers 2012 The Singularity 2030–2045 Mainframe computer Workstation Hewlett-Packard Touchsmart This desktop computer allows users to move items around on the screen with their hands, to open and close files, and to perform other functions manually.
  49. Introduction to Information Technology 23 Tower PC DESKTOP PCs Desktop

    PCs ( left) are older microcomputers whose case or main hous- ing sits on a desk, with keyboard in front and monitor (screen) often on top. TOWER PCs Tower PCs are microcomputers whose case sits as a “tower,” often on the floor beside a desk, thus freeing up desk surface space. Some desktop computers, such as Apple’s iMac, no longer have a boxy housing; most of the computer components are built into the back of the flat-panel display screen. NOTEBOOKS Notebook computers , also called laptop computers , are lightweight portable computers with built-in monitor, keyboard, hard-disk drive, CD/DVD drive, battery, and AC adapter that can be plugged into an elec- trical outlet; they weigh anywhere from 1.8 to 9 pounds. NETBOOKS A fairly recent category, netbooks are low-cost, lightweight, computers with tiny dimensions and functions designed for basic tasks, such as web searching, email, and word processing. They weigh anywhere from 2.25 to 3.2 pounds, cost generally between $270 and $500, have little processing power, and have screens between 8.9 and 12 inches wide diagonally.62 Netbooks fill a technological category between notebooks and handheld devices. MOBILE INTERNET DEVICES (MIDs) Smaller than notebook computers but larger and more powerful than PDAs (see below), mobile internet devices (MIDs) are for consumers and business professionals. Fully internet integrated, they are highly compatible with desktop microcomputers and laptops. The ini- tial models focus on data communication, not voice communication. PERSONAL DIGITAL ASSISTANTS Personal dig- ital assistants (PDAs) , also called handheld computers or palmtops, combine personal organization tools—schedule planners, address books, to-do lists—with the ability in some cases to send email and faxes. Some PDAs have touch-sensitive screens. Some also connect to desktop computers for sending or receiving information. (For now, we are using the word digital to mean “computer based.”) The range of hand- held wireless devices, such as multipurpose cellphones, has surged in recent years, and we consider these later in the book (Chapter 7). Microcontrollers What gadgets do I have that might contain microcontrollers? Microcontrollers , also called embedded computers , are the tiny, special- ized microprocessors installed in “smart” appliances and automobiles. These microcontrollers enable microwave ovens, for example, to store data about how long to cook your potatoes and at what power setting. Microcon- trollers have been used to develop a new universe of experimental electronic Small The Mac Mini has the smallest desktop microcomputer case, just 6.5 inches square and 2 inches tall. Notebook computers: Macbooks Netbook LG Mobile Internet Device (MID) Personal digital assistant (PDA)
  50. 24 Chapter 1 appliances—e-pliances. For example, they are behind single-function

    products such as digi- tal cameras, MP3 and MP4 players, and orga- nizers, which have been developed into hybrid forms such as gadgets that store photos and videos as well as music. They also help run tiny web servers embedded in clothing, jewelry, and household appliances such as refrigerators. In addition, microcontrollers are used in blood- pressure monitors, air bag sensors, gas and chemical sensors for water and air, and vibra- tion sensors. Servers How do servers work, and what do they do? The word server describes not a size of computer but rather a particular way in which a computer is used. Nevertheless, because servers have become so important to telecommunications, especially with the rise of the internet and the web, they deserve mention here. (Servers are discussed in detail in Chap- ters 2, 6, and 7.) A server , or network server , is a central computer that holds collections of data (databases) and programs for connecting or supplying services to PCs, workstations, and other devices, which are called clients. These clients are linked by a wired or wireless network. The entire network is called a client/server network. In small organizations, servers can store files, provide printing stations, and transmit email. In large organizations, servers may also house enormous libraries of financial, sales, and product information. You may never lay eyes on a supercomputer or mainframe or even a tiny microcontroller. But most readers of this book will already have laid eyes and hands on a personal computer. We consider this machine next. Microcontroller The MPXY8020A pressure sensor from Motorola reduces tire blowouts and improves gas mileage. This embedded computer notifies drivers, via a dashboard display, when tire pressure is not optimal. Servers A group of networked servers that are housed in one location is called a server farm or a server cluster. Cellphone microcontroller
  51. Introduction to Information Technology 25 1.5 UNDERSTANDING YOUR COMPUTER: How

    Can You Customize (or Build) Your Own PC? What four basic operations do all computers use, and what are some of the devices associated with each operation? How does communications affect these operations? Perhaps you know how to drive a car. But do you know what to do when it runs badly? Similarly, you’ve probably been using a personal computer. But do you know what to do when it doesn’t act right—when, for example, it suddenly “crashes” (shuts down)? Cars are now so complicated that professional mechanics are often required for even the smallest problems. With personal computers, however, there are still many things you can do yourself—and should learn to do, so that, as we’ve suggested, you can be effective, efficient, and employable. To do so, you first need to know how computers work. How Computers Work: Three Key Concepts What are the three fundamental principles everyone should understand about how computers work? Could you build your own personal computer? Some people do, putting together bare-bones systems for just a few hundred dollars. “If you have a logi- cal mind, are fairly good with your hands, and possess the patience of Job, there’s no reason you can’t . . . build a PC,” says science writer David Einstein. And, if you do it right, “it will probably take only a couple of hours,” because industry-standard connections allow components to go together fairly easily.63 Actually, probably only techies would consider building their own PCs. But many ordinary users order their own custom-built PCs. Let’s consider how you might do this. We’re not going to ask you to build or order a PC—just to pretend to do so. The purpose of this exercise is to give you a basic overview of how a computer works. That information will help you when you go shopping for a new system or, especially, if you order a custom-built system. It will also help you under- stand how your existing system works, if you have one. Before you begin, you will need to understand three key concepts. 1. PURPOSE OF A COMPUTER: TURNING DATA INTO INFORMATION Very simply, the purpose of a computer is to process data into information. • Data: Data consists of the raw facts and figures that are processed into information —for example, the votes for different candidates being elected to student-government office. • Information: Information is data that has been summarized or otherwise manipulated for use in decision making —for example, the total votes for each candidate, which are used to decide who won. 2. DIFFERENCE BETWEEN HARDWARE & SOFTWARE You should know the difference between hardware and software. • Hardware: Hardware consists of all the machinery and equipment in a computer system. The hardware includes, among other devices, the keyboard, the screen, the printer, and the “box”—the computer or processing device itself. Hardware is useless without software. • Software: Software , or programs , consists of all the electronic instructions that tell the computer how to perform a task. These instructions come from a software developer in a form (such as a CD, or compact disk) that will be accepted by the computer. Examples are Microsoft Windows and Office XP/Vista.
  52. 26 Chapter 1 3. THE BASIC OPERATIONS OF A COMPUTER

    Regardless of type and size, all computers use the same four basic operations: (1) input, (2) processing, (3) storage, and (4) output. To this we add (5) communications. • Input operation: Input is whatever is put in (“input”) to a computer system. Input can be nearly any kind of data—letters, numbers, symbols, shapes, colors, temperatures, sounds, pressure, light beams, or whatever raw material needs processing. When you type some words or numbers on a keyboard, those words are considered input data. • Processing operation: Processing is the manipulation a computer does to transform data into information. When the computer adds 2 + 2 to get 4, that is the act of processing. The processing is done by the central processing unit —frequently just called the CPU —a device consisting of electronic circuitry that executes instructions to process data. • Storage operation: Storage is of two types—temporary storage and permanent storage, or primary storage and secondary storage. Primary storage , or memory , is the internal computer circuitry that temporarily holds data waiting to be processed. Secondary storage , simply called storage , refers to the devices and media that store data or information permanently. A hard disk or CD/DVD is an example of this kind of storage. (Storage also holds the software—the computer programs.) • Output operation: Output is whatever is output from (“put out of”) the computer system—the results of processing, usually information. Examples of output are numbers or pictures displayed on a screen, words printed out on paper by a printer, or music piped over some loudspeakers. • Communications operation: These days, most (though not all) computers have communications ability, which offers an extension capability—in other words, it extends the power of the computer. With wired or wireless communications connections, data may be input from afar, processed in a remote area, stored in several different locations, and output in yet other places. However, you don’t need communications ability to write letters, do calculations, or perform many other computer tasks. These five operations are summarized in the illustration on the facing page. (• See Panel 1.7 .) Pretending to Order (or Build) a Custom-Built Desktop Computer: Basic Knowledge of How a Computer Works In what order would components be put together to build a custom desktop computer? Now let’s see how you would order a custom-built desktop PC, or even build one yourself. Remember, the purpose of this is to help you understand the internal workings of a computer so that you’ll be knowledgeable about using one and buying one. (If you were going to build it yourself, you would pretend that someone had acquired the PC components for you from a catalog com- pany and that you’re now sitting at a table about to begin assembling them. All you would need is a combination Phillips/flathead screwdriver, perhaps a small wrench, and a static-electricity-arresting strap for your wrist, to keep static electricity from adversely affecting some computer components. You would also need the manuals that come with some of the components.) Although prices of components are always subject to change, we have indicated general ranges of prices for basic equipment current as of 2009 so that you can get a sense of the relative importance of the various parts. (“Loaded” components— the most powerful and sophisticated equipment—cost more than the prices given here.) a Survival Tip Input is covered in detail in Chapter 5. Survival Tip Processing is covered in detail in Chapter 4. Survival Tip Storage is covered in detail in Chapter 4. Survival Tip Output is covered in detail in Chapter 5. Survival Tip Communications is covered in detail in Chapters 2, 6, and 7.
  53. Introduction to Information Technology 27 Note: All the system components

    you or anyone else chooses must be compatible —in other words, each brand must work with other brands. If you work with one company—such as Dell, or Hewlett-Packard—to customize your system, you won’t have to worry about compatibility. If you choose all the components yourself—for example, by going to a computer-parts seller such as ComputerGeeks.com ( www.geeks.com )—you will have to check on com- patibility as you choose each component. And you’ll have to make sure each component comes with any necessary cables, instructions, and component- specific software (called a driver ) that makes the component run. This section of the chapter gives you a brief overview of the components, which are all covered in detail in Chapters 2–6. We describe them in the following order: (1) input hardware—keyboard and mouse; (2) processing and memory hardware; (3) storage hardware—disk drives; (4) output hardware— video and sound cards, monitor, speakers, and printer; (5) communication hardware—the modem; and (6) software—system and application. Survival Tip Hardware Info Go to http://computers.bizrate. com/computers_software/ for a listing of virtually all types of hardware, their descriptions, ratings, and prices, and the names of sellers. 1 5 3 2 4 Processing: Once in the computer, data can be processed—numbers compared or sorted, text formatted, images or sounds edited. keyboard mouse speakers printer monitor Storage: Data and programs not currently being used are held in storage. Primary storage is computer circuitry. Secondary storage is usually some kind of disk (such as hard disk or CD/DVD) or tape. Output: Processed information is output on a monitor, speakers, printer, or other device. Communications: Often data or information can be transmitted by modem to or from other computers, as via email or posting to a website. Input: You input data into the computer, using a keyboard, mouse, or other device (such as a scanner, microphone, still camera, or video camera). The input data may be text, numbers, images and/or sounds. modem (This one is external. Modems are usually internal—on a circuit card inside the system unit.) system unit CD/DVD drive hard-disk drive (hidden) panel 1.7 Basic operations of a computer
  54. 28 Chapter 1 Input Hardware: Keyboard & Mouse What do

    the two principal input devices, keyboard and mouse, do? Input hardware consists of devices that allow people to put data into the com- puter in a form that the computer can use. At minimum, you will need two things: a keyboard and a mouse. KEYBOARD (Cost: $5–$100) On a microcomputer, a keyboard is the primary input device. A keyboard is an input device that converts letters, numbers, and other characters into electrical signals readable by the processor. A microcomputer keyboard looks like a typewriter keyboard, but besides having keys for letters and numbers it has several keys (such as F keys and Ctrl, Alt, and Del keys) intended for computer- specific tasks. After other components are assembled, the keyboard will be plugged into the back of the com- puter in a socket intended for that purpose. (Cord- less keyboards work differently.) MOUSE ($5–$50) A mouse is a nonkeyboard input device (“pointing device”) that is used to manipulate objects viewed on the computer dis- play screen. The mouse cord is plugged into the back of the computer or into the back of the keyboard after the other components are assembled. (Cordless mice are also available.) Processing & Memory Hardware: Inside the System Cabinet How do I distinguish the processing and memory devices in a computer? What does the motherboard do? The brains of the computer are the processing and memory devices, which are installed in the case or system cabinet. CASE & POWER SUPPLY (about $10–$200) Also known as the system unit , the case or system cabinet is the box that houses the processor chip (CPU), the memory chips, and the motherboard with power supply, as well as some secondary-storage devices —floppy-disk drive (if any), hard- disk drive, and CD or DVD drive, as we will explain. The case generally comes in desktop or tower models. It includes a power supply unit and a fan to keep the circuitry from overheating. PROCESSOR CHIP ($20–$1,000 or more) It may be small and not look like much, but it could be the most expensive hardware component of a build-it-yourself PC—and doubtless the most important. A processor chip (CPU, for central processing unit) is a tiny piece of silicon that contains millions of minia- ture electronic circuits. The speed at which a chip processes information is expressed in megahertz (MHz), millions of process- ing cycles per second, or gigahertz (GHz), billions of processing cycles per second. The faster the pro- cessor, the more expensive it is. For $50, you might get a 2-GHz chip, which is adequate for most stu- dent purposes. For $100, you might get a 3-GHz chip, which you would want if you’re running soft- ware with spectacular graphics and sound, such as those with some new videogames. Only older pro- cessors’ speed is measured in megahertz now, but if you want a cheap processor—for instance, because you plan to work only with text documents—you could get a 233-MHz processor for about $40. Keyboard Mouse Case Processor chip
  55. Introduction to Information Technology 29 MEMORY CHIPS ($20–$600) These chips

    are also small. Memory chips , also known as RAM (random access mem- ory) chips , represent primary storage, or temporary stor- age; they hold data before processing and information after processing, before it is sent along to an output or storage device. You’ll want enough memory chips to hold at least 1 gigabyte, or roughly 1 billion characters, of data, which is adequate for most student purposes. If you work with large graphics files, you’ll need more memory capacity, perhaps 2 gigabytes or more. (We will explain the numbers used to measure storage capacities in a moment.) MOTHERBOARD (about $45–$500) Also called the system board , the mother- board is the main circuit board in the computer. This is the big green circuit board to which everything else—such as the keyboard, mouse, and printer— attaches through connections (called ports ) in the back of the computer. The processor chip and memory chips are also installed on the motherboard. The motherboard has expansion slots —for expanding the PC’s capabil- ities—which give you places to plug in additional circuit boards, such as those for video, sound, and communications (modem). (• See Panel 1.8 .) 1 3 5 4 2 Power switch Floppy-disk drive CD/DVD drive Keyboard Mouse Hard-disk drive Expansion slots System cabinet Motherboard Built-in fan to cool the microprocessor BIOS Chip Attach motherboard to system cabinet Plug memory chips into motherboard Connect power supply unit (includes fan) Plug microprocessor chip into motherboard Connect wire to power switch panel 1.8 Putting the components together Memory chip (RAM chip) Memory chips mounted on module (Memory chip)
  56. 30 Chapter 1 PUTTING THE COMPONENTS TOGETHER Now the components

    can be put together. As the illustration on the previous page shows, ❶ the memory chips are plugged into the motherboard. Then ❷ the processor chip is plugged into the motherboard. Now ❸ the motherboard is attached to the system cabinet. Then ❹ the power supply unit is connected to the system cabinet. Finally, † the wire for the power switch, which turns the computer on and off, is connected to the motherboard. Storage Hardware: Hard Drive & CD/DVD Drive What kind of storage devices would I as a student probably want in my computer? With the motherboard in the system cabinet, the next step is installation of the storage hardware. Whereas memory chips deal only with temporary storage, secondary storage, or permanent storage, stores your data for as long as you want. For today’s student purposes, you’ll need a hard drive and a CD/DVD drive, and in older systems (called legacy systems ), you might have a floppy disk drive. These storage devices slide into the system cabinet from the front and are secured with screws. Each drive is attached to the motherboard by a flat cable (called a ribbon cable ). Also, each drive must be hooked up to a plug extending from the power supply. A computer system’s data/information storage capacity is represented by bytes, kilobytes, megabytes, gigabytes, terabytes, and petabytes, as follows: 1 byte ϭ 1 character of data (A character can be alphabetic—A, B, or C—or numeric—1, 2, or 3—or a special character—!, ?, *, $, %.) 1 kilobyte ϭ 1,024 characters 1 megabyte ϭ 1,048,576 characters 1 gigabyte ϭ more than 1 billion characters 1 terabyte ϭ more than 1 trillion characters 1 petabye ϭ about 1 quadrillion characters FLOPPY-DISK DRIVE ($25) A floppy-disk drive is a storage device that stores data on removable 3.5-inch- diameter diskettes. These diskettes, which are now used mostly on fairly old micro- computer systems, don’t seem to be “floppy,” because they are encased in hard plastic, but the mylar disk inside is indeed flexible or floppy. Each can store 1.44 million bytes (characters) or more of data. With a floppy- disk drive installed, you’ll later be able to insert a diskette through a slot in the front and remove it by pushing the eject button. HARD-DISK DRIVE ($35–$200, depending on storage capac- ity) A hard-disk drive is a storage device that stores billions of characters of data on a nonremovable disk platter. With 120–200 gigabytes of storage (about $40), you should be able to handle most student needs. (Some hard-disk drives store up to 2 tera- bytes of data.) Floppy disk Floppy disk Floppy disk drive Hard-disk drive (goes inside the computer case)
  57. Introduction to Information Technology 31 CD/DVD DRIVE ($30–$180) A CD

    (compact-disk) drive , or its more recent variant, a DVD (digital video-disk) drive , is a storage device that uses laser technology to read data from optical disks. (Some companies call a DVD a “digital versatile disk.”) Today new software is generally supplied on CDs or via the net. The system cabinet has lights on the front that indicate when these drives are in use. (You must not remove a disk from the drive until its light goes off, or else you risk damage to both disk and drive.) The wires for these lights need to be attached to the motherboard. Output Hardware: Video & Sound Cards, Monitor, Speakers, & Printer What kinds of output hardware are standard with a PC? Output hardware consists of devices that translate information processed by the computer into a form that humans can understand—print, sound, graph- ics, or video, for example. Now a video card and a sound card need to be installed in the system cabinet. Next the monitor, speakers, and a printer are plugged in. This is a good place to introduce the term peripheral device. A peripheral device is any component or piece of equipment that expands a comput- er’s input, storage, and output capabilities. In other words, a peripheral device is not part of the essential computer. Peripheral devices can be inside the computer or connected to it from the outside. Examples include printers and disk drives. VIDEO CARD ($30–$1,400) You doubtless want your monitor to display color (rather than just black-and-white) images. Your sys- tem cabinet will therefore need to have a device to make this possible. A video card converts the processor’s output informa- tion into a video signal that can be sent through a cable to the monitor. Remem- ber the expansion slots we mentioned? Your video card is plugged into one of these on the motherboard. (You can also buy a mother- board with built-in video.) SOUND CARD ($15–$300 and higher) You may wish to listen to music on your PC. If so, you’ll need a sound card , which enhances the computer’s sound- generating capabilities by allowing sound to be output through speakers. This, too, would be plugged into an expansion slot on the motherboard. (Once again, you can buy a motherboard with built-in sound.) With the CD drive connected to the card, you can listen to music CDs. MONITOR ($150–$300 or higher for a 17-inch model or a 19-inch model; $300–$1,200 or more for larger displays) As with television sets, the inch dimension on monitors is measured diagonally corner to corner. The moni- tor is the display device that takes the electrical signals from the video card and forms an image using points of colored light on the screen. Later, after the system cabinet has been closed up, the monitor will be con- nected by means of a cable to the back of the computer, using the clearly marked connector. The power cord for the monitor will be plugged into a wall plug. CD/DVD disk CD/DVD drive Monitor Slot on motherboard Insert slot on motherboard
  58. 32 Chapter 1 PAIR OF SPEAKERS ($25–$250) Speakers are the

    devices that play sounds transmitted as electrical signals from the sound card. They may not be very sophisticated, but unless you’re into high-fidelity recordings they’re prob- ably good enough. The two speakers are connected to a single wire that is plugged into the back of the computer once installation is completed. PRINTER ($50–$1,000) Especially for student work, you certainly need a printer , an output device that produces text and graphics on paper. There are various types of printers, as we discuss later. The printer has two connec- tions. One, which relays signals from the computer, goes to the back of the PC, where it connects with the motherboard. The other is a power cord that goes to a wall plug. Color printers are more expensive than black-and-white print- ers, and fast printers cost more than slow ones. Communications Hardware: Modem How is a modem installed? Computers can be stand-alone machines, unconnected to anything else. If all you’re doing is word processing to write term papers, you can do it with a stand-alone system. As we have seen, however, the communications compo- nent of the computer system vastly extends the range of a PC. Thus, while the system cabinet is still open, there is one more piece of hardware to install. MODEM ($10–$100) A standard modem is a device that sends and receives data over telephone lines to and from computers. The modem is mounted on an expansion card, which is fitted into an expansion slot on the moth- erboard. Later you can run a telephone line from the tele- phone wall plug to the back of the PC, where it will connect to the modem. Other types of communications connections exist, which we cover in Chapters 2 and 6. However, standard modems are still often used. Now the system cabinet is closed up. The person building the system will plug in all the input and output devices and turn on the power “on” button. Your microcomputer system will look similar to the one opposite. (• See Panel 1.9 .) Are you now ready to roll? Not quite. Software In what order are the two kinds of software installed? With all the pieces put together, the person assembling the computer (you, if you’re building it yourself) needs to check the motherboard manual for instruc- tions on starting the system. One of the most important tasks is to install soft- ware, the electronically encoded instructions that tell the computer hardware what to do. Software is what makes the computer worthwhile. There are two types— system software and application software. SYSTEM SOFTWARE First, system software must be installed. System soft- ware helps the computer perform essential operating tasks and enables the application software to run. System software consists of several elec- tronically coded programs. The most important is the operating system, the master control program that runs the computer. Examples of operating sys- tem software for the PC are various Microsoft programs (such as Windows 95, 98, XP, Vista, and 7), Unix, and Linux. The Apple Macintosh microcomputer is another matter altogether. As we explain in Chapter 3, it has its own hardware components and software, which often aren’t directly transferable to the PC. System software comes most often on CDs. The person building your com- puter system will insert these into your CD drive and follow the on-screen System software—a version of Microsoft Vista System software—a version of Microsoft 7 Speakers Printer Modem card
  59. Introduction to Information Technology 33 directions for installation. ( Installation

    is the process of copying software pro- grams from secondary-storage media—CDs, for example—onto your system’s hard disk, so that you can have direct access to your hardware.) After the system software is installed, setup software for the hard drive, the video and sound cards, and the modem must be installed. These setup programs ( drivers, discussed in Chapter 3) will probably come on CDs. Once again, the installer inserts these into the appropriate drive and then follows the instructions that appear on the screen. APPLICATION SOFTWARE Now we’re finally getting somewhere! After the application software has been installed, you can start using the PC. Appli- cation software enables you to perform specific tasks—solve problems, perform work, or entertain yourself. For example, when you prepare a term paper on your computer, you will use a word processing program. (Microsoft Word and Corel WordPerfect are two brands.) Application software is spe- cific to the system software you use. If you want to run Microsoft Word, for instance, you’ll need to first have Microsoft Windows system software on your system, not Unix or Linux. Application software comes on CDs packaged in boxes that include instruc- tions. You insert the CDs into your computer and then follow the instructions on the screen for installation. Later on you may obtain entire application pro- grams by getting (downloading) them off the internet, using your modem or another type of communications connection. We discuss software in more detail in Chapter 3. Is Getting a Custom-Built PC Worth the Effort? Why might I want to build a PC myself—and why not? Does the foregoing description make you want to try putting together a PC yourself? If you add up the costs of all the components (not to mention the value of your time), and then start checking ads for PCs, you might wonder why anyone would bother going to the trouble of building one. And nowa- days you would probably be right. “If you think you’d save money by putting together a computer from scratch,” says David Einstein, “think again. You’d be lucky to match the price PC-makers are charging these days in their zeal to undercut the competition.”64 Application software for rendering art Application software for photo manipulation Keyboard System unit Mouse CD/DVD drive Hard-disk drive Speaker Printer Output Output Output Storage Input Input Processing Memory Communications Processor, memory, hard-disk drive, video card, sound card, and modem are inside the system cabinet panel 1.9 Completely assembled PC hardware system
  60. 34 Chapter 1 But had you done this for real,

    it would not have been a wasted exercise: by knowing how to build a system yourself, not only would you be able to impress your friends but you’d also know how to upgrade any store-bought system to include components that are better than standard. For instance, as Einstein points out, if you’re into videogames, knowing how to construct your own PC would enable you to make a system that’s right for games. You could include the latest three-dimensional graphics video card and a state-of-the-art sound card, for example. More important, you’d also know how to order a custom- built system (as from Dell, Hewlett-Packard, Lenovo, or Gateway, some of the online computer makers) that’s right for you. In Chapters 4 and 5, we’ll expand on this discussion so that you can really know what you’re doing when you go shopping for a microcomputer system. 1.6 Where Is Information Technology Headed? What are three directions of computer development and three directions of communications development? How far we have come. At the beginning of the 20th century, most people thought they would live the same life their parents did. Today most people aren’t surprised by the prediction that the Information Age will probably trans- form their lives beyond recognition. Let’s consider the trends in the develop- ment of computers and communications and, most exciting, the area where they intersect. Three Directions of Computer Development: Miniaturization, Speed, & Affordability What are the three ways computers have developed? Since the days of ENIAC, computers have developed in three directions—and are continuing to do so. MINIATURIZATION Everything has become smaller. ENIAC’s old- fashioned radio-style vacuum tubes gave way after 1947 to the smaller, faster, more reliable transistor. A transistor is a small device used as a gateway to transfer electrical signals along prede- termined paths (circuits). The next step was the development of tiny integrated circuits. Inte- grated circuits are entire collections of electrical circuits or pathways that are now etched on tiny squares (chips) of silicon half the size of your thumbnail. Silicon is a natural element found in sand. In pure form, it is the base material for computer processing devices. The miniaturized processor, or microprocessor, in a personal desktop computer today can perform calculations that once required a computer filling an entire room. SPEED Thanks to miniaturization and new material used in mak- ing processors, computer makers can cram more hardware com- ponents into their machines, providing faster processing speeds and more data storage capacity. AFFORDABILITY Processor costs today are only a fraction of what they were 15 years ago. A state-of-the-art processor costing less than $1,000 provides the same processing power as a huge 1980s computer costing more than $1 million. These are the three major trends in computers. What about communications? Miniaturization A woman tries on a proto- type of a wearable computer, a jacket with a built-in display in its sleeve. This type of com- puter, from Pioneer, is expected to aid medi- cal workers, firefighters, and farm workers.
  61. Introduction to Information Technology 35 Three Directions of Communications Development:

    Connectivity, Interactivity, & Multimedia What are three things I do that represent these three features— connectivity, interactivity, and multimedia? Once upon a time, we had the voice telephone system—a one-to-one medium. You could talk to your Uncle Joe and he could talk to you, and with special arrangements (conference calls) more than two people could talk with one another. We also had radio and television systems—one-to-many media (or mass media). News announcers could talk to you on a single medium such as television, but you couldn’t talk to them. There have been three recent developments in communications: CONNECTIVITY Connectivity refers to the connection of computers to one another by a communications line in order to provide online information access and/or the sharing of peripheral devices. The connectivity resulting from the expansion of computer networks has made possible email and online shopping, for example. INTERACTIVITY Interactivity refers to two-way commu- nication; the user can respond to information he or she receives and modify what a computer is doing. That is, there is an exchange or dialogue between the user and the computer, and the computer responds to user requests. A noninteractive program, once started, continues with- out requiring human contact, or interaction. The ability to interact means users can be active rather than passive par- ticipants in the technological process. On the television net- works MSNBC or CNN, for example, you can immediately go on the internet and respond to news from broadcast anchors. Today, most application software is interactive. In the future, cars may respond to voice commands or feature computers built into the dashboard. MULTIMEDIA Radio is a single-dimensional medium (sound), as is most email (mainly text). As mentioned earlier in this chapter, multimedia refers to technology that presents information in more than one medium—such as text, pictures, video, sound, and animation—in a single inte- grated communication. The development of the World Wide Web expanded the internet to include pictures, sound, music, and so on, as well as text. Exciting as these developments are, truly mind-boggling possibilities have emerged as computers and communications have cross-pollinated. When Computers & Communications Combine: Convergence, Portability, Personalization, Collaboration, & Cloud Computing What are five developments growing out of the fusion of computers and communications? Sometime in the 1990s, computers and communications started to fuse together, beginning a new era within the Information Age. The result has been five additional developments. CONVERGENCE Convergence describes the combining of several industries through various devices that exchange data in the format used by computers. Interactivity A dashboard computer allows drivers to request information about the car’s operation, location, and nearby services.
  62. 36 Chapter 1 The industries are computers, communications, consumer electronics,

    entertainment, and mass media. Convergence has led to electronic products that perform multiple func- tions, such as TVs with internet access, cellphones that are also digital cameras, and a refrigerator that allows you to send email. PORTABILITY In the 1980s, portability, or mobility, meant trading off computing power and convenience in return for smaller size and weight. Today, however, we are close to the point where we don’t have to give up anything. As a result, experts have predicted that small, powerful, wireless personal electronic devices will transform our lives far more than the personal computer has done so far. “The new generation of machines will be truly personal computers, designed for our mobile lives,” wrote one journalist back in 1992. “We will read office memos between strokes on the golf course and answer messages from our children in the middle of busi- ness meetings.”65 Today such activities are commonplace, and smartphones are taking on other functions. The risk they bring is that, unless we’re careful, work will completely invade our personal time.66 PERSONALIZATION Personalization is the creation of infor- mation tailored to your preferences—for instance, programs that will automatically cull recent news and information from the internet on just those topics you have designated. Com- panies involved in e-commerce can send you messages about forthcoming products based on your pattern of purchases, usage, and other criteria. Or they will build products (cars, computers, clothing) customized to your heart’s desire. COLLABORATION A more recent trend is mass collaboration. Says New York Times technology writer John Markoff, “A remarkable array of software sys- tems makes it simple to share anything instantly, and sometimes enhance it along the way.”67 BusinessWeek writer Robert Hof observes that the huge numbers of people “online worldwide—along with their shared knowledge, social contacts, online reputations, computing power, and more—are rap- idly becoming a collective force of unprecedented power.”68 Examples are file-sharing, photo-sharing websites, calendar-sharing services, group-edited sites called wikis, social networking services, and so-called citizen- journalism sites, in which average people write their own news items on the internet and comment on what other people post—an interactive, democratic form of mass media.69 Pooled ratings, for instance, enable people to create personal- ized net music radio stations or Amazon.com’s millions of customer- generated product reviews. CLOUD COMPUTING: THE GLOBAL COMPUTER Not everyone agrees on exactly what “cloud computing” means.70 Previously called on-demand computing, grid computing, or software as a service, cloud computing basically means that, instead of storing your software or data on your own PC or your own company’s computers, you store it on servers on the internet. You don’t care where the servers are located; they’re out there somewhere—“in the cloud.” The idea here is that companies could tap into computers as they are needed, just as they do now with the electric power grid, splitting their com- puting workload between data centers in different parts of the world. The hope of technology people is that companies will find cloud computing cheaper and more reliable than managing their own PCs, servers, and software.71 (In a later chapter, we discuss an even more involved concept known as the singularity. ) According to inventor and futurist Raymond Kuzweil, technological change will become so rapid and so profound that human bodies and brains will merge with machines.
  63. Introduction to Information Technology 37 “E” Also Stands for Ethics

    What are the principal ethical concerns I should be conscious of in the use of information technology? Every computer user will have to wrestle with ethical issues related to the use of information technology. Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Because ethical questions arise so often in connection with information technology, we will note them, wherever they appear in this book, with the symbol shown at left. Below, for example, are some important ethical concerns pointed out by Tom Forester and Perry Morrison in their book Computer Ethics. 72 These considerations are only a few of many; we’ll discuss others in subsequent chapters. SPEED & SCALE Great amounts of information can be stored, retrieved, and transmitted at a speed and on a scale not possible before. Despite the benefits, this has serious implications “for data security and personal pri- vacy,” as well as employment, Forester and Morrison say, because informa- tion technology can never be considered totally secure against unauthorized access. UNPREDICTABILITY Computers and communications are pervasive, touching nearly every aspect of our lives. However, at this point, compared to other pervasive technologies—such as electricity, television, and automobiles— information technology seems a lot less predictable and reliable. COMPLEXITY Computer systems are often incredibly complex—some so com- plex that they are not always understood even by their creators. “This,” say Forester and Morrison, “often makes them completely unmanageable,” pro- ducing massive foul-ups or spectacularly out-of-control costs. Ethics and security can often be talked about in the same breath, since secure computer systems obviously go a long way toward keeping people ethi- cal and honest. When we discuss security, you will see this icon: ethics Illuminated plastic balls meant to represent cloud comput- ing go up and down on metal cables at the IBM stand at the CeBIT technology trade fair two days ahead of the fair’s opening on March 1, 2009, in Hanover, Germany. CeBIT is the world’s largest computer and IT trade fair. Survival Tip Recycling Old PCs Just got a new computer? Where to donate your old one? Check with schools, after-school programs, churches, and the following websites: www1.us.dell.com/content/ topics/segtopic.aspx/dell_ recycling?cϭus&csϭ19& lϭen&sϭdhs www.crc.org www.youthfortechnology.org/ frames.html http://earth911.org/recycling/ computer-recycling-reuse/ www.epa.gov/epaoswer/ hazwaste/recycle/ecycling/ donate.htm www.recycles.org/ http://ww1.pcdisposal. com/?gclidϭCOmh6b S75oCFRYiagodNwOFCA www.computerhope.com/ disposal.htm SECURITY
  64. 38 Chapter 1 An Experience Box appears at the end

    of each chap- ter. Each box offers you the opportunity to acquire useful experience that directly applies to the Digital Age. This first box illustrates skills that will benefit you in college, in this course and others. (Students reading the first eight editions of our book have told us they received substantial benefit from these suggestions.) “How on earth am I going to be able to keep up with what’s required of me?” you may ask yourself. “How am I going to handle the information glut?” The answer is: by learning how to learn. By building your skills as a learner, you certainly help yourself do better in college, and you also train yourself to be an information manager in the future. Using Your “Prime Study Time” Each of us has a different energy cycle. The trick is to use it effectively. That way, your hours of best performance will coincide with your heaviest academic demands. For exam- ple, if your energy level is high during the evenings, you should plan to do your studying then. To capitalize on your prime study time, take the follow- ing steps: (1) Make a study schedule for the entire term, and indicate the times each day during which you plan to study. (2) Find some good places to study—places where you can avoid distractions. (3) Avoid time wasters, but give yourself frequent rewards for studying, such as a TV show, a favorite piece of music, or a conversation with a friend. Learning to Focus Multitasking is shifting focus from one task to another in rapid succession. When you read this textbook while listen- ing to music and watching TV, you may think you’re simul- taneously doing three separate tasks, but you’re really not. “It’s like playing tennis with three balls,” says one expert.73 Today multitasking is easy and focus is hard because of all the things demanding our attention—phone calls, email, text messages, music, radio, TV, Twitter, MySpace, Facebook, var- ious blogs and websites. “You can drive yourself crazy try- ing to multitask and answer every email message instantly,” says one writer. “Or you can recognize your brain’s finite capacity for processing information.”74 Here are some tips on learning to concentrate: 75 Choose What to Focus On. “People don’t realize that attention is a finite resource, like money,” one expert says. “Do you want to invest your cognitive cash on endless Twittering or Net surfing or couch potatoing [watching TV]?” She adds, “Where did the idea come from that anyone who wants to contact you can do so at any time? You need to take charge of what you pay attention to instead of responding to the latest stimuli.”76 For example, to block out noise, you can wear earplugs while reading. Devote the First 1½ Hours of Your Day to Your Most Important Task. Writing a paper? Studying a hard sub- ject? Make it your first task of the day, and concentrate on it for 90 minutes. After that, your brain will probably need a rest, and you can answer email, return phone calls, and so on. But until that first break, don’t do any- thing else, because it can take the brain 20 minutes to refocus. Improving Your Memory Ability Memorizing is, of course, one of the principal requirements for succeeding in college. And it’s a great help for success in life afterward. Some suggestions: Space Your Studying, Rather than Cramming. Cram- ming—making a frantic, last-minute attempt to memo- rize massive amounts of material—is probably the least effective means of absorbing information. Research shows that it’s best to space out your studying of a subject over successive days. A series of study sessions over several days is preferable to trying to do it all dur- ing the same number of hours on one day. It is repeti- tion that helps move information into your long-term memory bank. Review Information Repeatedly—Even “Overlearn” It. By repeatedly reviewing information—known as “rehearsing”—you can improve both your retention and your understanding of it. Overlearning is continu- ing to review material even after you appear to have absorbed it. Use Memorizing Tricks. There are several ways to orga- nize information so that you can retain it better. For example, you can make drawings or diagrams (as of the parts of a computer system). Some methods of estab- lishing associations between items you want to remem- ber are given opposite. (• See Panel 1.10 .) How to Improve Your Reading Ability: The SQ3R Method SQ3R stands for “survey, question, read, recite, and review.”77 The strategy behind the method is to break down a read- ing assignment into small segments and master each before moving on. The five steps of the SQ3R method are as follows: EXPERIENCE BOX Better Organization & Time Management: Dealing with the Information Deluge in College— & in Life
  65. • Mental and physical imagery: Use your visual and other

    senses to construct a personal image of what you want to remember. Indeed, it helps to make the image humorous, action-filled, or outrageous in order to establish a personal connection. Example: To remember the name of the 21st president of the United States, Chester Arthur, you might visualize an author writing the number “21” on a wooden chest. This mental image helps you associate chest (Chester), author (Arthur), and 21 (21st president). • Acronyms and acrostics: An acronym is a word created from the first letters of items in a list. For instance, Roy G. Biv helps you remember the colors of the rainbow in order: red, orange, yellow, green, blue, indigo, violet. An acrostic is a phrase or sentence created from the first letters of items on a list. For example, Every Good Boy Does Fine helps you remember that the order of musical notes on the treble staff is E-G-B-D-F. • Location: Location memory occurs when you associate a concept with a place or imaginary place. For example, you could learn the parts of a computer system by imagining a walk across campus. Each building you pass could be associated with a part of the computer system. • Word games: Jingles and rhymes are devices frequently used by advertisers to get people to remember their products. You may recall the spelling rule “I before E except after C or when sounded like A as in neighbor or weigh.” You can also use narrative methods, such as making up a story. Introduction to Information Technology 39 1. Survey the chapter before you read it: Get an over- view of the chapter before you begin reading it. If you have a sense of what the material is about before you begin reading it, you can predict where it is going. In this text, we offer on the first page of every chapter a list of the main heads and accompanying key ques- tions. At the end of each chapter we offer a Summary, which recalls what the chapter’s terms and concepts mean and why they are important. 2. Question the segment in the chapter before you read it: This step is easy to do, and the point, again, is to get you involved in the material. After surveying the entire chapter, go to the first segment—whether a whole section, a subsection, or even just paragraph, depending on the level of difficulty and density of information. Look at the topic heading of that seg- ment (or first sentence of a very difficult paragraph). In your mind, restate the heading as a question. In this book, to help you do this, following each section head we present a Key Question. An example in this chapter was “What are three directions of computer development and three directions of communications development?” After you have formulated the question, go to steps 3 and 4 (read and recite). Then proceed to the next seg- ment of the chapter and restate the heading there as a question, and so on. 3. Read the segment about which you asked the ques- tion: When you read the segment you asked the ques- tion about, read with purpose, to answer the question you formulated. Underline or highlight sentences that you think are important, if they help you answer the question. Read this portion of the text more than once, if necessary, until you can answer the question. In addition, determine whether the segment covers any other significant questions, and formulate answers to these, too. After you have read the segment, pro- ceed to step 4. (Perhaps you can see where this is all leading. If you read in terms of questions and answers, you will be better prepared when you see exam ques- tions about the material later.) 4. Recite the main points of the segment: Recite means “say aloud.” Thus, you should speak out loud (or softly) the answer to the principal question or questions about the segment and any other main points. 5. Review the entire chapter by repeating ques- tions: After you have read the chapter, go back through it and review the main points. Then, without looking at the book, test your memory by repeating the questions and answers you formulated. Clearly the SQ3R method takes longer than simply read- ing with a rapidly moving color marker or underlining pen- cil. However, the technique is far more effective because it requires your involvement and understanding. These are the keys to all effective learning. Learning from Lectures Does attending lectures really make a difference? Research shows that students with grades of B or above were more apt to have better class attendance than students with grades of C- or below.78 Some tips for getting the most out of lectures: Take Effective Notes by Listening Actively. Research shows that good test performance is related to good panel 1.10 Some memorizing tricks
  66. 40 Chapter 1 note taking.79 And good note taking requires

    that you listen actively—that is, participate in the lecture pro- cess. Here are some ways to take good lecture notes: • Read ahead and anticipate the lecturer: Try to antic- ipate what the instructor is going to say, based on your previous reading. Having background knowledge makes learning more efficient. • Listen for signal words: Instructors use key phrases such as “The most important point is . . . ,” “There are four reasons for . . . ,” “The chief reason . . . ,” “Of special importance . . . ,” “Consequently . . .” When you hear such signal phrases, mark your notes with a ! or *. • Take notes in your own words: Instead of just being a stenographer, try to restate the lecturer’s thoughts in your own words, which will make you pay attention more. • Ask questions: By asking questions during the lec- ture, you necessarily participate in it and increase your understanding. Review Your Notes Regularly. Make it a point to review your notes regularly—perhaps on the afternoon after the lecture, or once or twice a week. We can- not emphasize enough the importance of this kind of reviewing.
  67. 41 Introduction to Information Technology application software (p. 33) Software

    that has been devel- oped to solve a particular problem, perform useful work on general-purpose tasks, or provide entertainment. Why it’s important: Application software such as word processing, spreadsheet, database management, graphics, and commu- nications packages are commonly used tools for increasing people’s productivity. avatar (p. 6) Computer depiction of a human, often found in online videogames. Why it’s important: Avatars can be helpful in training, such as by representing imaginary customers. case (p. 28) Also known as the system unit or system cabinet; the box that houses the processor chip (CPU), the memory chips, and the motherboard with power supply, as well as stor- age devices—floppy-disk drive, hard-disk drive, and CD or DVD drive. Why it’s important: The case protects many important processing and storage components. CD (compact-disk) drive (p. 31) Storage device that uses laser technology to read data from optical disks. Why it’s important: New software is generally supplied on CDs rather than diskettes. And even if you can get a program on floppies, you’ll find it easier to install a new program from one CD than to repeatedly insert and remove many diskettes. The new- est version is called DVD (digital video disk). The DVD format stores even more data than the CD format. central processing unit (CPU) See processor chip. chip See processor chip. clients (p. 24) Computers and other devices connected to a server, a central computer. Why it’s important: Client/server networks are used in many organizations for sharing data- bases, devices, and programs. cloud computing (p. 36) Concept of storing your software and/or data not on your own PC or company’s computers but rather on servers on the internet. Why it’s important: Users could tap into computers as they are needed, distributing computing workload among data centers in different parts of the world, perhaps making computing cheaper and more reliable. communications technology (p. 4) Also called telecommu- nications technology; consists of electromagnetic devices and systems for communicating over long distances. Why it’s important: Communications systems using electronic connec- tions have helped to expand human communication beyond face-to-face meetings. computer (p. 4) Programmable, multiuse machine that accepts data—raw facts and figures—and processes (manipu- lates) it into useful information, such as summaries and totals. Why it’s important: Computers greatly speed up problem solv- ing and other tasks, increasing users’ productivity. computer savvy (p. 3) Knowing what computers can do and what they can’t, knowing how they can benefit you and how they can harm you, and knowing when you can solve com- puter problems and when you have to call for help. Why it’s important: You will know how to make better buying decisions, how to fix ordinary computer problems, how to upgrade your equipment and integrate it with new products, how to use the internet most effectively, how to protect yourself against online villains, and what kinds of computer uses can advance your career. connectivity (p. 35) Ability to connect computers to one another by communications lines, so as to provide online infor- mation access and/or the sharing of peripheral devices. Why it’s important: Connectivity is the foundation of the advances in the Information Age. It provides online access to countless types of information and services. The connectivity resulting from the expansion of computer networks has made possible email and online shopping, for example. course-management software (p. 6) Software for admin- istering online assignments, schedules, examinations, and grades. Why it’s important: It helps to make administrative “housekeeping” more efficient. cyberspace (p. 18) Term used to refer to not only the online world and the internet in particular but also the whole wired and wireless world of communications in general. Why it’s important: More and more human activities take place in cyberspace. data (p. 25) Raw facts and figures that are processed into information. Why it’s important: Users need data to create useful information. desktop PC (p. 23) Microcomputer unit that sits on a desk, with the keyboard in front and the monitor often on top. Why it’s important: Desktop PCs and tower PCs are the most com- monly used types of microcomputer. distance learning (p. 6) Also known as e-learning; name given to online education programs. Why it’s important: Pro- vides students increased flexibility because they do not have to be in an actual classroom. download (p. 9) To transfer data from a remote com- puter to one’s own computer. Why it’s important: Allows text, music, and images to be transferred quickly by telecommunications. DVD (digital video-disk) drive See CD drive. email (electronic mail) (p. 5) Messages transmitted over a computer network, most often the internet. Why it’s important: Email has become universal; one of the first things new computer users learn is how to send and receive email. SUMMARY
  68. 42 Chapter 1 ethics (p. 37) Set of moral values

    or principles that govern the conduct of an individual or a group. Why it’s important: Ethical questions arise often in connection with information technology. expansion slots (p. 29) Internal “plugs” used to expand the PC’s capabilities. Why it’s important: Expansion slots give you places to plug in additional circuit boards, such as those for video, sound, and communications (modem). hard-disk drive (p. 30) Storage device that stores billions of characters of data on a nonremovable disk platter usually inside the computer case. Why it’s important: Hard disks hold much more data than diskettes do. Nearly all microcomput- ers use hard disks as their principal secondary-storage medium. hardware (p. 25) All machinery and equipment in a computer system. Why it’s important: Hardware runs under the control of software and is useless without it. However, hardware con- tains the circuitry that allows processing. information (p. 25) Data that has been summarized or otherwise manipulated for use in decision making. Why it’s important: The whole purpose of a computer (and com- munications) system is to produce (and transmit) usable information. information technology (IT) (p. 4) Technology that helps to produce, manipulate, store, communicate, and/or dissemi- nate information. Why it’s important: Information technology is bringing about the fusion of several important industries dealing with computers, telephones, televisions, and various handheld devices. input (p. 26) Whatever is put in (“input”) to a computer sys- tem. Input devices include the keyboard and the mouse. Why it’s important: Useful information cannot be produced without input data. interactivity (p. 35) Two-way communication; a user can respond to information he or she receives and modify the pro- cess. Why it’s important: Interactive devices allow the user to actively participate in a technological process instead of just reacting to it. internet (the “net”) (p. 18) Worldwide computer network that connects hundreds of thousands of smaller networks linking computers at academic, scientific, and commercial institutions, as well as individuals. Why it’s important: Thanks to the inter- net, millions of people around the world can share all types of information and services. keyboard (p. 28) Input device that converts letters, numbers, and other characters into electrical signals readable by the processor. Why it’s important: Keyboards are the most com- mon kind of input device. local area network (LAN) (p. 22) Network that connects, usu- ally by special cable, a group of desktop PCs and other devices, such as printers, in an office or a building. Why it’s important: LANs have replaced mainframes for many functions and are considerably less expensive. mainframe (p. 22) Second-largest computer available, after the supercomputer; capable of great processing speeds and data storage. Costs $5,000–$5 million. Small mainframes are often called midsize computers. Why it’s important: Main- frames are used by large organizations (banks, airlines, insur- ance companies, universities) that need to process millions of transactions. memory chip (p. 29) Also known as RAM (for “random access memory”) chip; represents primary storage or temporary stor- age. Why it’s important: Holds data before processing and information after processing, before it is sent along to an out- put or storage device. microcomputer (p. 22) Also called personal computer; small computer that fits on or next to a desk or can be carried around. Costs $500–$5,000. Why it’s important: The micro- computer has lessened the reliance on mainframes and has provided more ordinary users with access to computers. It can be used as a stand-alone machine or connected to a network. microcontroller (p. 23) Also called an embedded computer; the smallest category of computer. Why it’s important: Micro- controllers are the tiny, specialized microprocessors built into “smart” electronic devices, such as appliances and automobiles. micropayments (p. 9) Electronic payments of as little as 25 cents in transactions for which it is uneconomical to use a credit card. Why it’s important: Allows products to be sold that previously weren’t worth the effort of merchandising. mobile internet device (MID) (p. 23) Fully internet inte- grated, handheld computer highly compatible with desktop microcomputers and laptops. The initial models focus on data communication, not voice communication. Why it’s important: Some mobile devices are too small to adequately view images on screen, but viewers still want more pocket-size portability than is possible with a laptop. modem (p. 32) Device that sends and receives data over telephone lines to and from computers. Why it’s important: A modem enables users to transmit data from one computer to another by using standard telephone lines instead of spe- cial communications equipment. monitor (p. 31) Display device that takes the electrical signals from the video card and forms an image using points of colored light on the screen. Why it’s important: Monitors enable users to view output without printing it out. motherboard (p. 29) Also called the system board; main circuit board in the computer. Why it’s important: This is the big green circuit board to which everything else — such as the keyboard, mouse, and printer — is attached. The processor chip and memory chips are also installed on the motherboard. mouse (p. 28) Nonkeyboard input device, called a “pointing device,” used to manipulate objects viewed on the computer display screen. Why it’s important: For many purposes, a mouse is easier to use than a keyboard for inputting com- mands. Also, the mouse is used extensively in many graphics programs.
  69. 43 Introduction to Information Technology multimedia (p. 35) From “multiple

    media”; technology that presents information in more than one medium—including text, graphics, animation, video, and sound—in a single inte- grated communication. Why it’s important: Multimedia is used increasingly in business, the professions, and education to improve the way information is communicated. nanotechnology (p. 22) Technology whereby molecule-size nanostructures are used to create tiny machines for holding data or performing tasks. Why it’s important: Could result in tremendous computer power in molecular-size devices. netbook (p. 23) Low-cost, lightweight computer with tiny dimensions and with functions designed for basic tasks, such as web searching, email, and word processing; weighs 2.25–3.2 pounds. Why it’s important: Cheaper computers that fill a technological category between notebooks and handheld devices. network (p. 5) Communications system connecting two or more computers. Why it’s important: Networks allow users to share applications and data and to use email. The internet is the largest network. notebook computer (p. 23) Also called laptop computer; light- weight portable computer with a built-in monitor, keyboard, hard-disk drive, battery, and adapter; weighs 1.8–9 pounds. Why it’s important: Notebook and other small computers have provided users with computing capabilities in the field and on the road. online (p. 4) Using a computer or some other information device, connected through a network, to access information and services from another computer or information device. Why it’s important: Online communication is widely used by businesses, services, individuals, and educational institutions. output (p. 26) Whatever is output from (“put out of”) the com- puter system; the results of processing. Why it’s important: People use output to help them make decisions. Without out- put devices, computer users would not be able to view or use the results of processing. peripheral device (p. 31) Any component or piece of equip- ment that expands a computer’s input, storage, and output capabilities. Examples include printers and disk drives. Why it’s important: Most computer input and output functions are performed by peripheral devices. personal digital assistant (PDA) (p. 23) Also known as hand- held computer or palmtop; used as a schedule planner and address book and to prepare to-do lists and send email and faxes. Why it’s important: PDAs make it easier for people to do business and communicate while traveling. primary storage (p. 26) Also called memory; internal com- puter circuitry that temporarily holds data waiting to be pro- cessed. Why it’s important: By holding data, primary storage enables the processor to process. printer (p. 32) Output device that produces text and graphics on paper. Why it’s important: Printers provide one of the prin- cipal forms of computer output. processing (p. 26) The manipulation a computer does to transform data into information. Why it’s important: Process- ing is the essence of the computer, and the processor is the computer’s “brain.” processor chip (p. 28) Also called the processor, the CPU (central processing unit), or simply chip; tiny piece of silicon that contains millions of miniature electronic circuits used to process data. Why it’s important: Chips have made possible the development of small computers. robot (p. 7) Automatic device that performs functions ordinar- ily performed by human beings. Why it’s important: Robots help perform tasks that humans find difficult or impossible to do. secondary storage (p. 26) Also called storage; devices and media that store data and programs permanently—such as disks and disk drives, tape and tape drives, CDs and CD drives. Why it’s important: Without secondary storage, users would not be able to save their work. Storage also holds the com- puter’s software. server (p. 24) Central computer in a network that holds col- lections of data (databases) and programs for connecting PCs, workstations, and other devices, which are called clients. Why it’s important: Servers enable many users to share equipment, programs, and data. software (p. 25) Also called programs; step-by-step electroni- cally encoded instructions that tell the computer hardware how to perform a task. Why it’s important: Without software, hardware is useless. sound card (p. 31) Special circuit board that enhances the computer’s sound-generating capabilities by allowing sound to be output through speakers. Why it’s important: Sound is used in multimedia applications. Also, many users like to listen to music CDs and MP3 files on their computers. speakers (p. 32) Devices that play sounds transmitted as electrical signals from the sound card. Speakers are connected to a single wire plugged into the back of the computer. Why it’s important: See sound card. supercomputer (p. 21) High-capacity computer with thou- sands of processors that is the fastest calculating device ever invented. Costs up to $350 million or more. Why it’s important: Supercomputers are used primarily for research purposes, air- plane design, oil exploration, weather forecasting, and other activities that cannot be handled by mainframes and other less powerful machines. system software (p. 32) Software that helps the computer perform essential operating tasks. Why it’s important: Appli- cation software cannot run without system software. System software consists of several programs. The most important is the operating system, the master control program that runs the computer. Examples of operating system software for the PC are various Microsoft programs (such as Windows 95, 98, NT, Me, XP, and Vista), Unix, Linux, and the Macintosh operat- ing system. system unit See case.
  70. 44 Chapter 1 telemedicine (p. 6) Medical care delivered via

    telecommunica- tions. Why it’s important: Allows physicians in remote areas to consult over a distance. terminal (p. 22) Input and output device that uses a keyboard for input and a monitor for output; it cannot process data. Why it’s important: Terminals are generally used to input data to and receive data from a mainframe computer system. tower PC (p. 23) Microcomputer unit that sits as a “tower,” often on the floor, freeing up desk space. Why it’s important: Tower PCs and desktop PCs are the most commonly used types of microcomputer. video card (p. 31) Circuit board that converts the processor’s output information into a video signal for transmission through a cable to the monitor. Why it’s important: Virtually all computer users need to be able to view video output on the monitor. virtual (p. 8) Something that is created, simulated, or car- ried on by means of a computer or a computer network. Why it’s important: Allows actual objects to be represented in computer-based form. workstation (p. 22) Smaller than a mainframe; expensive, powerful computer generally used for complex scien- tific, mathematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. Why it’s important: The power of workstations is needed for specialized applications too large and complex to be handled by PCs. World Wide Web (the “web”) (p. 18) The interconnected sys- tem of internet servers that support specially formatted docu- ments in multimedia form—sounds, photos, and video as well as text. Why it’s important: The web is the most widely known part of the internet. More and more educators are favoring an approach to learn- ing (presented by Benjamin Bloom and his colleagues in Taxonomy of Educational Objectives) that follows a hierar- chy of six critical-thinking skills: (a) two lower-order skills— memorization and comprehension; and (b) four higher-order skills—application, analysis, synthesis, and evaluation. While you may be able to get through many introductory college courses by simply memorizing facts and comprehending the basic ideas, to advance further you will probably need to employ the four higher-order thinking skills. In the Chapter Review at the end of each chapter, we have implemented this hierarchy in a three-stage approach, as follows: • Stage 1 learning—memorization: “I can recognize and recall information.” Self-test questions, multiple-choice questions, and true/false questions enable you to test how well you recall basic terms and concepts. • Stage 2 learning—comprehension: “I can recall informa- tion in my own terms and explain it to a friend.” Using open-ended short-answer questions, we ask you to reexpress terms and concepts in your own words. • Stage 3 learning—applying, analyzing, synthesizing, evaluating: “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” In this part of the Chapter Review, we ask you to put the ideas into effect using the activities described, some of which include internet activities. The purpose is to help you take possession of the ideas, make them your own, and apply them realistically to your life. CHAPTER REVIEW s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.” Self-Test Questions 1. The ________ ________ ________ refers to the part of the internet that presents information in multimedia form. 2. The two main types of microcomputers are the ________ ________ , which sits on the desktop, and the ________ ________ , which usually is placed on the floor. 3. “ ________ technology” merges computing with high- speed communications. 4. A(n) ________ is an electronic machine that accepts data and processes it into information. 5. The ________ is a worldwide network that connects hundreds of thousands of smaller networks. 6. ________ refers to information presented in nontextual forms such as video, sound, and graphics. 7. ________ are high-capacity machines with thousands of processors. 8. Embedded computers, or ________, are installed in “smart” appliances and automobiles. 9. The kind of software that enables users to perform specific tasks is called ________ software. 10. RAM is an example of ________ storage, and a hard drive is an example of ________ storage.
  71. Introduction to Information Technology 45 1 1. A(n) ________ is

    a communications system connecting two or more computers. 12. The four basic operations of all computers are ________ , ________ , ________ , and ________. 13. The first programmable computer in the USA, which appeared in 1946, was called the ________ . 14. The ________ is the display device that takes the elec- trical signals from the video card and forms an image using points of colored light on the screen. 15. The base material for computer processing devices is ________ , a natural element found in sand. 16. The general term for all the machinery and equipment in a computer system is ________ . 17. ________ and ________ are the two most common input devices. 18. The processor chip, commonly called the ________ or a ________ , is a tiny piece of silicon that contains millions of miniature electronic circuits. 19. One gigabyte is approximately ________ characters. Multiple-Choice Questions 1. Which of the following devices converts computer out- put into displayed images? a. printer b. monitor c. floppy-disk drive d. processor e. hard-disk drive 2. Which of the following computer types is the smallest? a. mainframe b. microcomputer c. microcontroller d. supercomputer e. workstation 3. Which of the following is a secondary-storage device? a. processor b. memory chip c. floppy-disk drive d. printer e. monitor 4. Since the days when computers were first made avail- able, computers have developed in three directions. What are they? a. increased expense b. miniaturization c. increased size d. affordability e. increased speed 5. Which of the following operations constitute the four basic operations followed by all computers? a. input b. storage c. programming d. output e. processing 6. Supercomputers are used for a. breaking codes. b. simulations for explosions of nuclear bombs. c. forecasting weather. d. keeping planets in orbit. e. all of these f. only a, b, and c. 7. What is the leading use of computers? a. web surfing b. email c. e-shopping d. word processing 8. Which is the main circuit board in the computer? a. RAM chip (random access memory) b. CPU processor chip (central processing unit) c. motherboard (system board) d. hard drive 9. A terabyte is approximately a. one million characters. b. one billion characters. c. one trillion characters. d. one quadrillion characters. 10. Speakers are an example of a. an input device. b. an output device. c. a processor. d. a storage device. True/False Questions T F 1. Mainframe computers process faster than microcomputers. T F 2. Main memory is a software component. T F 3. The operating system is part of the system software. T F 4. Processing is the manipulation by which a com- puter transforms data into information. T F 5. Primary storage is the area in the computer where data or information is held permanently. T F 6. The keyboard and the mouse are examples of input devices. T F 7. Movies are a form of multimedia. T F 8. Computers are becoming larger, slower, and more expensive. T F 9. Modems store information. T F 10. A microcomputer is used to view very small objects. T F 1 1. A hard disk is an example of software. T F 12. Computers continue to get smaller and smaller. T F 13. Supercomputers are particularly inexpensive.
  72. 46 Chapter 1 s t a g e 2 LEARNING

    COMPREHENSION ”I can recall information in my own terms and explain it to a friend.” Short-Answer Questions 1. What does online mean? 2. What is the difference between system software and application software? 3. Briefly define cyberspace. 4. What is the difference between software and hardware? 5. What is a local area network? 6. What is multimedia? 7. What is the difference between microcomputers and supercomputers? 8. What is the function of RAM? 9. What does downloading mean? 10. What is meant by connectivity? 1 1. Describe some ways that information technology can be used to help people find jobs and to help jobs find people. 12. Compare the use of email to the use of the telephone and of conventional letters sent via the postal system. Which kinds of communications are best suited for which medium? 13. What is the basic meaning of cloud computing? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” Knowledge in Action 1. Do you wish there was an invention to make your life easier or better? Describe it. What would it do for you? Come up with ideas on how that device may be constructed. 2. Determine what types of computers are being used where you work or go to school. In which departments are the different types of computer used? Make a list of the input devices, output devices, and storage devices. What are they used for? How are they connected to other computers? 3. Imagine a business you could start or run at home. What type of business is it? What type(s) of computer(s) do you think you’ll need? Describe the computer system in as much detail as possible, includ- ing hardware components in the areas we have dis- cussed so far. Keep your notes, and then refine your answers after you have completed the course. 4. Has reality become science fiction? Or has science fic- tion become science fact? First, watch an old futuristic movie, such as 2001—A Space Odyssey, and take note of the then-futuristic technology displayed. Classify what you see according to input, output, processing, storage, and communications. Then watch a recent sci- ence fiction movie, and also list all the futuristic tech- nology used according to the given categories. What was futuristic in the old movie that is now reality? What in the new movie is not yet reality but seems already feasible? 5. From what you’ve read and what you have experienced and/or observed in your life, do you have a positive, negative, or impartial view of our rapidly converging technological society? Why? Reevaluate your answers at the end of the course. 6. Computer prices are constantly falling. Whatever you pay for a computer today, you can be certain that you will be able to buy a more powerful com- puter for less money a year from now, and quite possibly even just a month from now. So how can you decide when it’s a good time to upgrade to a better computer? Paradoxically, it seems that no matter how you time it, you’ll always lose, because prices will go down again soon, and yet you will also always gain, because, since you were going to upgrade sooner or later anyway, you will reap the benefits of having the more powerful equipment that much longer. Discuss the benefits and costs, both material and psychological, of “waiting until prices drop.” Gather more information on this topic by asking friends and colleagues what choices they have made about upgrad- ing equipment over the years and whether they feel satisfaction or regret about the timing when they finally did upgrade. 7. Computers are almost everywhere, and they affect most walks of life—business, education, government, the military, hobbies, shopping, research, and so on. What aspects of your life can you think of that still seem relatively unaffected by computers and technol- ogy? Is this a good thing or a bad thing, and is it likely to last? What aspects of your life have been the most conspicuously affected by technology? Has anything been made worse or harder in your life by the advance of computers? What about things that have been made better or easier?
  73. 47 Introduction to Information Technology 8. Have you become extremely

    dependent on some tech- nologies? Some people no longer write down telephone numbers anywhere; instead, they simply program them into their cellphones. Some people feel helpless in a foreign country unless they have a calculator in hand to compute currency conversions. Many people rely on their email archive to hold essential information, such as addresses and appointments. When any of these technologies fails us, we can feel lost. Make a list of technologies that have become indis- pensable to your life. Imagine the consequences if any of these technologies should fail you. What can you do to protect yourself against such failure? 9. It has been said that the computer is a “meta medium” because it can simulate (behave as) any other medium. Thus a computer can present text that can be read from virtual “pages” as if it were a book; it can let you compose and print text as if it were a typewriter; it can play music as if it were a boombox; it can display video as if it were a television set; it can make telephone calls as if it were a telephone; it can let you “draw” and “paint”; it can be programmed to serve as an answering machine; and so forth. Imagine a future in which computers have replaced all the things they can emulate: instead of books and magazines and newspapers, we would have text only on computers. Telephones, PDAs, television sets, VCRs, DVD players, stereo sets, and other electronic devices would all be gone or, rather, subsumed by computers. What benefits to your life can you see in such a future? What things might be worse? What dangers can you see? Do you think this kind of radical convergence is likely? If so, how long do you think it will take? Web Exercises If you are not yet familiar with web surfing, wait until you have finished Chapter 2 to do the following web exercises. 1. Are computers, cellphones, and other electronic devices bad for our health? You may have heard the term electromagnetic radiation and dismissed it as an obscure scientific term not worth understanding. Visit the links below to become educated on a topic that will be discussed more seriously and frequently when our society becomes completely wireless. www.howstuffworks.com/cell-phone-radiation.htm www.fda.gov/cellphones/ www.consumeraffairs.com/news04/2008/03/cells_ danger.html http://skeptoid.com/episodes/4117 2. List some pros and cons of a “paperless” environment. Do you believe that a paperless environment is some- thing worth striving for in the workplace? In the home? In the classroom? In banking? Run a web search to see what others are doing to implement this idea. 3. Computer pioneer John Von Neumann was one of a group of individuals who conceived the idea of the “stored program.” He could also divide two 8-digit num- bers in his head. Spend a few hours researching this remarkable man; at online bookstores, look up some of the books he wrote and read the reviews. 4. Looking for legally free programs? Some great places to start: www.download.com www.shareware.com www.freewarefiles.com/ www.freedownloadscenter.com/ 5. Visit the following websites to become aware of some topics of interest in the computing world. Full compre- hension of these topics isn’t necessary at this time; this is only to familiarize you with subject matter you may come in contact with. www.zdnet.com/eweek www.computeruser.com/ www.computermarket.com/news http://slashdot.org 6. “Moore’s Law” predicts the rate at which computers will continue to get smaller (and hence faster). The “law” has proved to be astonishingly accurate over many years. Do a web search for Moore’s Law, and see if you can find answers to the following questions: a. Who is Moore, and when did he make the prediction we know as Moore’s Law? b. What is the simplest statement of the law’s prediction? c. How has the law changed over time? d. How much longer is the law expected to hold true? e. How does the law affect business projections? 7. A Wiki is a website on which authoring and editing can be done very easily by anyone, anywhere, any- time using a web browser such as Internet Explorer or Netscape Navigator, with no need for special software or other special requirements. ( Wiki is Hawaiian for “quick.”) Most web pages are less than perfect. If it is a Wiki-page and you are annoyed by something, you can just hit the Edit button and change it! Over time, the site gets better (people hope)! Here are some examples of Wikis that deal with gen- eral knowledge: http://en.wikipedia.org www.wikimedia.org/ http://wiki.ehow.com/Main-Page And here are some specialized Wikis: www.rawfoodwiki.org/index.php/Encyclopedia http://london-crafts.org/ www.payrollwiki.com www.wikia.com/wiki/Wikia http://wikisineducation.wetpaint.com/ a. Make a small change on a page on one of the listed sites or on some other Wiki site you have identified. Submit your change, and note the results. Anyone navigating to that site will now see your change. Did you know that website authoring could be that easy? Are you surprised that someone would uncondition- ally open up his or her website for anyone to edit?
  74. 48 Chapter 1 b. Since you can make any change

    you wish, even some- thing totally nonsensical or simply wrong, it’s obvi- ously possible for incorrect or misleading content to appear on a Wiki. Given that, why do you think that Wikis have become so popular and so widespread? c. How significant a problem do you think vandalism and other acts of poor citizenship might be on “open” Wikis? How can you find out? d. Some Wikis contend with the threat of vandalism by requiring that a password be provided before a user is allowed to make changes. What advantages can you see to this approach? What disadvantages? Do you think the advantages of password protection outweigh the disadvantages? What do the Wikis you browse through have to say about this issue? e. What measures do you think an online shared space can take to limit the potential damage from vandal- ism, while not being overly restrictive? f. If you knew that a particular person was defacing a Wiki, what would you do about it? Report the per- son? Wait for the vandal to get bored and turn his or her mischief elsewhere? Or try to reform the per- son? Are the basic ethical considerations here the same as those regarding other forms of vandalism in our society? g. Do you think that open-access systems such as unrestricted Wikis will become more common over time, or do you think that abuse of such systems will destroy their usefulness and that Wikis will eventu- ally disappear?
  75. 49 THE INTERNET & the WORLD WIDE WEB Exploring Cyberspace

    2 Chapter Topics & Key Questions 2.1 Connecting to the Internet: Narrowband, Broadband, & Access Providers What are the means of connecting to the internet, and how fast are they? What are the three kinds of internet access provider? 2.2 How Does the Internet Work? What is the basic structure of the internet, and who controls it? 2.3 The World Wide Web How do the following work: websites, web pages, brows- ers, URLs, web portals, search tools, and search engines? What are HTML and hyperlinks? 2.4 Email & Other Ways of Communicating over the Net What are email and web- mail, attachments, instant messaging, FTP, newsgroups, listservs, real-time chat, and netiquette? 2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, & the Social Web What are internet telephony, various kinds of multimedia, RSS, and different web feeds (webcasting, blogging, podcasting), types of e-commerce, and the social web? 2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware How can I protect myself against snoopers, spam, spoofing, phishing, pharming, cookies, and spyware—adware, browser and search hijackers, and key loggers?
  76. info! more 50 Chapter 2 T he immensity of the

    changes wrought—and still to come—cannot be underestimated,” says futurist Graham Molitor. “This miraculous information channel—the internet—will touch and alter virtually every facet of humanity, business, and all the rest of civilization’s trappings.”1 Today the world of the internet permits activities hardly imaginable a dozen years ago. (• See Panel 2.1. ) Indeed, pervasive computing, ubiquitous com- puting, is already an established fact, with “everything connected to every- thing,” from cellphones to cameras to car navigation systems. Because of its standard interfaces and low rates, the internet has been the great leveler for communications—just as the personal computer was for computing. The basis for the internet began in 1969 as ARPANET (for ARPA, the Advanced Research Projects Agency of the U.S. Department of Defense), with four linked-together computers at different universities and defense contrac- tors. From there the network expanded to 62 computers in 1974, 500 com- puters in 1983, and 28,000 in 1987. However, it still remained the domain of researchers and academics, and it was still all text—no graphics, video, or sound. Not until the development of the World Wide Web in the early 1990s, which made multimedia available on the internet, and the first browser (for locating web pages), which opened the web to commercial uses, did the global network really take off. (• See Panel 2.2 for a brief history of telecommunica- tions.) Not everyone is interested in the internet—indeed a third of adults says they simply don’t want it, 13% can’t get access, and 9% find it too difficult.2 But by 2012, the internet is expected to have 1.9 billion users, or 30% of the world’s population.3 How does one become a participant in this network of networks? What is the first step? To connect to the internet, you need three things: an access device, such as a personal computer with a modem; a means of connec- tion, such as a telephone line, cable hookup, or wireless capability; and an internet access provider, such as an internet service provider (ISP), a com- mercial online service provider, or a wireless internet service provider. We cover these subjects in the next section. We then describe how the internet works. Hobbes’s Internet Timeline For more detailed internet timelines, go to: www.zakon.org/robert/ internet/timeline www.computerhistory.org/ internet_history www.webopedia.com/quick_ref/ timeline.asp www.factmonster.com/ipka/ A0193167.html panel 2.2 Timeline: Brief graphical history of telecommunications and the internet 1642 First mechanical adding machine (Blaise Pascal) 1843 World’s first computer programmer, Ada Lovelace, publishes her notes 1895 First radio signal transmitted 1907 First regular radio broadcast from New York Slide rule invented (Edmund Gunther) 1621 1876 Alexander Graham Bell patents the telephone 1844 Samuel Morse sends a telegraph message from Washington to Baltimore
  77. The Internet & the World Wide Web 51 Email &

    discussion groups Stay in touch worldwide through email, Facebook, and Twitter. Entertainment Amuse yourself with internet games, music, videos, and movies. Download files Get software, music, and documents such as e-books. E-shopping Price anything from plane tickets to cars; order anything from books to sofas. Financial matters Do investing, banking, and bill paying online. Auctions Sell old stuff, acquire more stuff, with online auctions. Telephony & conferencing Make inexpensive phone calls; have online meetings. Career advancement Search job listings, post résumés, interview online. Distance learning Attend online lectures, have discussions, write research papers, earn degrees. E-business Connect with coworkers, buy supplies, support customers, conduct negotiations. Internet user Internet access provider Research & information Find information on any subject, using browsers and search tools. News Stay current on politics, weather, entertainment, sports, and financial news. Search Famine Hits Africa Today’s Weather $$$$ 1944 First electro- mechanical computer (Mark I) 1927 First demonstration of television in USA 1946 First programmable electronic computer in United States (ENIAC) Vannevar Bush proposes hypertext; mobile phones first invented (cellphones not sold commercially until 1983) 1947 1958 Eisenhower administration creates the Advanced Research Projects Agency (ARPA) as part of the U.S. Department of Defense 1962 First commercially available modem (developed in the 1950s) panel 2.1 The world of the internet
  78. 52 Chapter 2 2.1 CONNECTING TO THE INTERNET: Narrowband, Broadband,

    & Access Providers What are the means of connecting to the internet, and how fast are they? What are the three kinds of internet access provider? In general terms, bandwidth, or channel capacity, is an expression of how much data—text, voice, video, and so on—can be sent through a com- munications channel in a given amount of time. The type of data trans- mission that allows only one signal at a time is called baseband transmission. When several signals can be transmitted at once, it’s called broadband trans- mission. Broadband —very high speed—connections include various kinds of high-speed wired connections (such as coaxial and fiber-optic, described in Chapter 6), as well as DSL, cable, and satellite and other wireless connections, discussed shortly. Today more than half (55%) of all adult Americans have broadband internet connections at home.4 THE PHYSICAL CONNECTION: WIRED OR WIRELESS? What are your choices of a physical connection —the wired or wireless means of connecting to the internet? A lot depends on where you live. As you might expect, urban and many suburban areas offer more broadband connections than rural areas do. Among the principal means of connection are (1) telephone (dial-up) modem; (2) several high-speed phone lines—ISDN, DSL, and T1; (3) cable modem; and (4) wireless—satellite and other through-the-air links. DATA TRANSMISSION SPEEDS Data is transmitted in characters or collections of bits. A bit, as we will discuss later, is the smallest unit of information used by computers. Today’s data transmission speeds are measured in bits, kilobits, megabits, and gigabits per second: • bps: A computer with an older modem might have a speed of 28,800 bps, which is considered the minimum speed for visiting websites with graphics. The bps stands for bits per second. (Eight bits equals one character, such as A, 3, or #.) • Kbps: This is the most frequently used measure; kilobits per second, or Kbps, are 1 thousand bits per second. The speed of a modem that is 28,800 bps might be expressed as 28.8 Kbps. • Mbps: Faster means of connection are measured in megabits per second, or Mbps —1 million bits per second. • Gbps: At the extreme are gigabits per second, Gbps —1 billion bits per second. UPLOADING & DOWNLOADING Why is it important to know these terms? Because the number of bits affects how fast you can upload and download 1969 ARPANET established at 4 U.S. universities (4 compu- ters linked by leased lines); led to internet (4 hosts) 1970 Microprocessor chips come into use; 15 ARPANET sites established (universities/ research), each with own address; 13 hosts on internet 1975 First micro- computer (MITS Altair 8800) 1973 ARPANET becomes international; 35 hosts on internet 1976 Queen Elizabeth sends the first royal email 1971 Email invented by computer engineer Ray Tomlinson; 23 hosts on internet 1974 TCP (Transmission Control Protocol) specification developed by U.S. Dept. of Defense; 62 hosts on internet
  79. The Internet & the World Wide Web 53 information from

    a remote computer. As we’ve said (Chapter 1), download is the transmission of data from a remote computer to a local computer, as from a website to your own PC. Upload is the transmission of data from a local computer to a remote computer, as from your PC to a website you are constructing . Narrowband (Dial-Up Modem): Low Speed but Inexpensive & Widely Available Why would I want to use dial-up to connect my computer to the internet? The telephone line that you use for voice calls is still the cheapest means of online connection and is available everywhere. Although the majority of U.S. adults, 55% in 2008, favor broadband internet connections, many home users still use what are called narrowband, or low-bandwith, connections.5 This mainly consists of dial-up connections —use of telephone modems to con- nect computers to the internet. CONNECTING THE MODEM As we mentioned in Chapter 1, a modem is a device that sends and receives data over telephone lines to and from computers. These days, the modem is generally installed inside your com- puter, but there are also external modems. The modem is attached to the tele- phone wall outlet. (• See Panel 2.3. ) (We discuss modems in a bit more detail in Chapter 6.) Most standard modems today have a maximum speed of 56 Kbps. That doesn’t mean that you’ll be sending and receiving data at that rate. The modem in your computer must negotiate with the modems used by your internet access provider, the regional, national, or wireless organization or busi- ness that connects you to the internet. Your provider may have modems operating at slower speeds, such as 28.8 Kbps. In addition, lower-quality phone lines or heavy traffic during peak hours—such as 5 p.m. to 11 p.m. in residential areas—can slow down your rate of transmission. MODEMS & CALL WAITING One disadvantage of a telephone modem is that while you’re online you can’t use that phone line to make voice calls unless you’ve installed special equipment. In addition, people who try to call you while you’re using the modem will get a busy signal. (Call wait- ing may interrupt an online connection, so you need to talk to your phone company about disabling it or purchase a new modem that can handle call waiting. The Windows operating system also has a feature for disabling call waiting.) You generally won’t need to pay long-distance phone rates, since most access providers offer local access numbers. The cost of a dial-up modem con- nection to the internet is as low as $7.95 a month, plus a possible setup charge of $10–$25.6 1976 Apple I computer (first personal computer sold in assembled form) 1978 TCP/IP developed (released in 1983) as standard internet transmission protocol; 111 hosts on internet IBM introduces Personal Computer; 213 hosts on internet 1981 1979 First Usenet newsgroups; 188 hosts on internet Apple Macintosh; first personal laser printer; William Gibson coins term “cyberspace”; Domain Name System (DNS) introduced 1984 1987 NSFNET (National Science Foundation Network) backbone established Digital cellular phones invented; first email message sent from China 1986 Download Upload Download (reverse the direction of data transmission to upload) Mainframe Individual PC Satellite
  80. 54 Chapter 2 High-Speed Phone Lines: More Expensive but Available

    in Most Cities What are my choices in high-speed phone lines? Waiting while your computer’s modem takes 25 minutes to transmit a 1- minute low-quality video from a website may have you pummeling the desk in frustra- tion. To get some relief, you could enhance your POTS —“plain old telephone Internal modem Jack (fits in connector) Phone Telephone wall outlet connector Phone connector Telephone outlet panel 2.3 The modem connection You connect the modem inside your computer from a port (socket) in the back of your com- puter to a line that is then connected to a wall jack. Your telephone is also connected to your computer so that you can make voice calls. Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; Netscape Navigator released; 28.8 K modem; the Japanese Prime Minister goes online; 3,864,000 hosts on internet (56,000 domains) 1994 Multimedia desktop computers; NAPs replace NSFNET; first graphical web browser, Mosaic, devel- oped by Marc Andreessen; the U.S. White House goes online; internet talk radio begins broad- casting; 2,056,000 hosts on internet (28,000 domains) 1993 9.6 K modem 14.4 K modem 1984 1989–1991 “Surfing the internet” coined by Jean Armour Polly; 1,136,000 hosts on internet (18,1000 domains) 1992 World Wide Web estab- lished by Tim Berners-Lee while working at the European Particle Physics Laboratory in Geneva, Switzerland; first home trials of fiber communications network; number of internet hosts breaks 100,000 1989 ARPANET decommis- sioned; first ISP comes on- line (dial-up access); Berners- Lee develops first web browser, World Wide Web; 313,000 hosts on internet (9,300 domains) 1990
  81. The Internet & the World Wide Web 55 system”— connection

    with a high-speed adapta- tion. Among the choices are ISDN, DSL, and T1, available in most major cities, though not in rural and many suburban areas. ISDN LINE ISDN (Integrated Services Digital Network) consists of hardware and software that allow voice, video, and data to be commu- nicated over traditional copper-wire telephone lines. Capable of transmitting 64 to 128 Kbps, ISDN is able to send digital signals over POTS lines. If you were trying to download an approxi- mately 6-minute-long music video from the World Wide Web, it would take you about 4 hours and 45 minutes with a 28.8-Kbps modem. A 128-Kbps ISDN connection would reduce this to an hour. Basically, ISDN is a viable solution for sin- gle users of small business networks when other high-speed options are not available. ISDN is not as fast as DSL, cable, or T1 and is expensive. DSL LINE DSL (digital subscriber line) uses regular phone lines, a DSL modem, and spe- cial technology to transmit data in megabits per second. Incoming data is significantly faster than outgoing data. That is, your computer can receive data at the rate of 1.5–10 Mbps, but it can send data at only 128 Kbps–1.5 Mbps. This arrangement may be fine, however, if you’re prin- cipally interested in obtaining very large amounts of data (video, music) rather than in sending such data to others. With DSL, you could download that 6-minute music video perhaps in only 11 minutes (compared to an hour with ISDN). A big advantage of DSL is that it is always on (so you don’t have to make a dial-up con- nection) and, unlike cable (discussed shortly), its transmission rate is relatively consistent. Also, you can talk on the phone and send data at the same time. There is one big drawback to DSL: You have to live within 3.3 miles of a phone company central switching office, because the access speed and reli- ability degrade with distance. However, DSL is becoming more popular, and phone companies are building thousands of remote switching facilities to NSFNET reverts to research project; internet now in com- mercial hands; the Vatican goes online 1995 Microsoft releases Internet Explorer; 56 K modem invented; cable modem introduced; 12,881,000 hosts on internet (488,000 domains) 1996 AOL membership surpasses 28 million; Napster goes to court 2001 2000 Web surpasses 1 billion indexable pages; 93,047,785 hosts on internet First official Swiss online election; flash mobs start in New York City; Facebook; MySpace 2003 More than 285,000,000 hosts on internet 2004 Blogs become popular; Friendster 2002 URL: Check online connections If youʼre using Windows XP on your computer, you can check your online connection speed by going to Control Panel, Network Connections; click on your Internet gateway icon, then on View Status of This Connection (on the left side of the screen):
  82. 56 Chapter 2 enhance service throughout their regions. Another drawback

    is that you have to choose from a list of internet service providers that are under contract to the phone company you use, although other DSL providers exist. A new competitor to DSL, available from Verizon, is a service (fiber optic, which we describe later) called FiOS, which is faster than DSL. However, FiOS is not available in all areas (see www.verizon.com/fios ).7 Still, the real problem for DSL—or any other kind of broadband—is that it is not available to most rural Americans, who thus lack the sort of high-speed services and opportuni- ties, such as distance learning and web-based commerce, that urban dwellers take for granted.8 T1 LINE How important is high speed to you? Is it worth $400–$1,500 a month? Then consider getting a T1 line, essentially a traditional trunk line that car- ries 24 normal telephone circuits and has a transmission rate of 1.5 to 6 Mbps. Generally, T1 lines are leased by corporate, government, and academic sites. Another high-speed line, the T3 line, transmits at 6–45 Mbps (the equiva- lent of about 672 simultaneous voice calls) and costs about $4,000 or more a month. Telephone companies and other types of companies are making even faster connections available: An STS-1 connection runs at 51 Mbps, and an STS-48 connection speeds data along at 2.5 Gbps (2.5 billion bits per second). T1 and T3 lines are commonly used by businesses connecting to the internet, by internet access providers, and in the internet high-speed transmission lines. Problem for Telephone Internet Connections: The Last Mile Why does the “last mile” of a wired connection often slow down the data rate? The distance from your home to your telephone’s switching office, the local loop, is often called the “last mile.” As we mentioned earlier, if you are using POTS for your initial internet connection—even if you use ISDN or DSL—data must pass back and forth between you and your telephone switching station. (This dis- tance is usually more than a mile; it is shorter than 20 miles and averages about 3 miles in metropolitan areas.) The “last mile” of copper wire is what really slows things down. This problem can be solved by installing newer transmission media, but communications companies are slow to incur this cost. There are about 130 million phone lines in the United States that use 650 million miles of copper wire. Considering that our planet is only about 93 million miles from the sun, 650 million miles of wire represents a huge challenge to replace! Cable Modem: Close Competitor to DSL What are the advantages and disadvantages of a cable modem connection? If DSL’s 11 minutes to move a 6-minute video sounds good, 2 minutes sounds even better. That’s the rate of transmission for cable modems, which can transmit out- going data at about 1.4 Mbps and incoming data at up to 30 Mbps. (The common Cable modem Survival Tip Broadband: Riskier for Security Unlike dial-up services, broad- band services, because they are always switched on, make your computer vulnerable to over-the-internet security breaches. Solution: Install fire- wall software (Chapter 6). YouTube; Wii 2005 Twitter 2006 Skype 2007 More than 625,226,456 hosts on internet — top 10 are USA, Japan, Germany, Italy, China, France, Australia, Netherlands, Mexico, Brazil 2009 The Singularity 2030–2045
  83. The Internet & the World Wide Web 57 residential transmission

    rate is 3 Mbps.) A cable modem connects a personal computer to a cable-TV system that offers an internet connection. The advantage of a cable modem is that, like a DSL connection, it is always on. However, unlike DSL, you don’t need to live near a telephone switching station. (• See Panel 2.4. ) A disadvantage, however, is that you and your cable-TV-viewing neighbors are sharing the system and consequently, during peak-load times, your ser- vice may be slowed to the speed of a regular dial-up modem. Also, using an internet connection that is always on—and that, in the case of cable, you share with other people—invites outside interference with your computer, a risk that we discuss later in the book. Cable companies may contract you to use their own internet access provider, but more commonly you may choose your own. (Note that cable modems are for internet connections. They do not by themselves take the place of your voice phone system.) Satellite Wireless Connections Why might I consider having a satellite connection? If you live in a rural area and are tired of the molasses-like speed of your cranky local phone system, you might—if you have an unobstructed view of the southern sky—consider tak- ing to the air. With a pizza-size satellite dish on your roof or on the side of your house, you can send data at the rate of about 512 Kbps and receive data at about 1.5 Mbps from a communi- cations satellite, a space station that transmits radio waves called microwaves from earth-based stations. Satellite internet connections are always on. To surf the inter- net using this kind of connection, you need an internet access provider that supports two-way satellite transmission. You will also have to lease or purchase satellite-access hardware, such as a dish. (We cover satellites in more detail in Chapter 6.) Survival Tip Connection Speeds To test the speed of your internet connection, go to www.computerhope.com/ issues/ch000539.htm http://us.mcafee.com/root/ speedometer/ www.auditmypc.com/speed test.asp DSLAM or CMTS Terminal Server Internet Email Servers Web Server Cable or DSL Modem High-Speed Connection ISP Network and POP User 1 DSL users connect their equipment to a typical phone line, whereas cable users connect their equipment to the coaxial cable used to deliver television programming. In both instances, unused portions of the wire or cable are used to send data. Both DSLAM and CMTS funnel data from multiple users into a single high- bandwidth connection to the internet. 2 3 DSL users connect to a DSLAM (DSL Access Multiplexer), whereas cable users connect to CMTS (Cable- Modem Termination System). The DSLAM is usually located at the central office of the phone company, and the CMTS is located at the head- end of the cable network. panel 2.4 Basic DSL/cable–PC system Sky connection. Setting up a home satellite dish.
  84. info! more info! more info! more 58 Chapter 2 Other

    Wireless Connections: Wi-Fi & 3G What are Wi-Fi and 3G wireless connections? More and more people are using laptop computers, smart cellphones, and per- sonal digital assistants to access the internet through wireless networks, which use radio waves to transmit data. Indeed, 62% of all Americans are part of a wireless, mobile population.9 We discuss various types of wireless networks in detail in Chapter 6, but here let us mention just two of the technologies: WI-FI Short for Wireless Fidelity, Wi-Fi is the name given to any of several standards—so-called 802.11 standards—set by the Institute of Electrical and Electronic Engineers (IEEE) for wireless transmission. One standard, 802.11b, permits wireless transmission of data at up to 54 Mbps for 300–500 feet from an access point, or hot spot, a station that sends and receives data to and from a Wi-Fi network; 802.11n can transmit up to 140 Mpbs. Many airports, hotels, libraries, convention centers, and fast-food facilities offer so-called hotspots —public access to Wi-Fi networks. The hotspot can get its internet access from DSL, cable modem, T1 local area network, dial-up phone service, or any other method. (Communications technology is covered in Chapter 6.) Once the hotspot has the internet connection, it can broadcast it wirelessly. Laptops are commonly used for Wi-Fi internet connections; they must be equipped with the necessary Wi-Fi hardware, however. 3G WIRELESS 3G, which stands for “third generation,” is loosely defined as high-speed wireless technology that does not need access points because it uses the existing cellphone system. This technology, which is found in many smartphones and PDAs that are capable of delivering down- loadable video clips and high-resolution games, is being provided by Cingular, Sprint, Verizon, and T-Mobile. The table at right shows the transmission rates for various connections, as well as their approximate costs (always subject to change, of course) and their pros and cons. (• See Panel 2.5. ) Internet Access Providers: Three Kinds How do I distinguish among the three types of providers? As we mentioned, in addition to having an access device and a means of connection, to get on the internet you need to go through an internet access provider. There are three types of such providers: internet service providers, commercial online services, and wireless internet service providers. INTERNET SERVICE PROVIDERS (ISPs) An internet service provider (ISP) is a company that connects online users through their communications lines to the company’s server, which links them to the internet via another company’s network access points. Examples are EarthLink and United Online. There are also some free ISPs. COMMERCIAL ONLINE SERVICES A commercial online service is a members- only company that provides not only internet access but other specialized con- tent as well, such as news, games, and financial data. The two best-known subscriber-only commercial online services are AOL (America Online) and MSN (Microsoft Network). WIRELESS INTERNET SERVICE PROVIDERS A wireless internet service provider (WISP) enables users with computers containing wireless modems—mostly laptops/notebooks—and web-enabled mobile smartphones and personal digi- tal assistants to gain access to the internet. Examples are Cingular, Sprint, T-Mobile, and Verizon. How much do you know about Wi-Fi? Take a quiz: http://computer.howstuffworks. com/wifi-quiz.htm Finding Wi-Fi Hot Spots www.wififreespot.com/ www.wifihotspotlist.com/ www.wifinder.com/ Finding ISPs For comparison shopping, go online to: www.thelist.com This site lists ISPs from all over the world and guides you through the process of finding one that’s best for you. Which ISPs are available in your area? Which ones supply both dial-up and wireless services? Survival Tip Some Free ISPs www.freei.com www.dailyedeals.com/free_ internet/free_isp.htm www.juno.com
  85. The Internet & the World Wide Web 59 Service Cost

    per Month (plus installation, equipment) Maximum Speed (download only) Pluses Minuses Telephone (dial-up) modem $0–$45 56 Kbps Inexpensive, available everywhere Slow; connection supports only a single user ISDN $40–$110 (+ $350–$700 installation cost) 64–128 Kbps (1.5 Mbps with spe- cial wiring) Faster than dial-up; uses conven- tional phone lines More expensive than dial-up; no longer extensively sup- ported by telephone com- panies for individuals; used mostly by small businesses DSL $25–$35, depend- ing on speed 768 kbps–7 Mbps Fast download, always on, higher security; uploads faster than cable; users can talk and transmit data at the same time Needs to be close to phone company switching station; limited choice of service providers; supports only a single user T1 line $350–$1,500 (+ $1,000 instal- lation cost) 1.5 Mbps (T5 ϭ 45 Mbps) Can support many users: 24 sep- arate circuits of 64 Kbps each; reliable high-speed download- ing and uploading; users can talk and transmit data at the same time Expensive, best for businesses Cable modem $40–$100 (+ $5 monthly for leased cable modem) Up to 30 Mbps (4 Mbps common) Fast, always on, most popular broadband type of connec- tion; can support many users; downloads faster than DSL; users can talk on phone and transmit cable data at the same time Slower service during high- traffic times, vulnerability to outside intrusion, limited choice of service provid- ers; not always available to businesses Satellite Up to $120 (+ about $300 installation) 512 Kbps–5 Mbps Wireless, fast, reliable, always on; goes where DSL and cable can’t; users can talk on phone and transmit satellite data at the same time High setup and monthly costs; users must have unobstructed view of the southern sky; because the satellite signals must travel so far (22,000 miles into space and then back again), latency (signal delay) is a problem for users who need real-time interactivity, such as when playing games; bad weather can cause service drop-outs Wi-Fi Nothing for users accessing hotspots sup- plied by others; about $300 for access-point hardware and up to $25 per month for sub- scription to a Wi-Fi access service 54–140 Mbps Uses a beefed-up version of the current cellphone network; ultimately should be available everywhere Range of access is usually only 50–300 feet (to access point) 3G $250 and up About 3 Mbps (about 15 sec- onds to down- load a 3-minute MP3 song) Functions like Wi-Fi but without the need for hot spots; uses existing cellphone network Low battery power on some models; phones are rela- tively large panel 2.5 Methods of going online compared
  86. 60 Chapter 2 2.2 HOW DOES THE INTERNET WORK? What

    is the basic structure of the internet, and who controls it? The inter national network known as the internet consists of hundreds of thou- sands of smaller networks linking educational, commercial, nonprofit, and military organizations, as well as individuals. Central to this arrangement is the client/server network. A client computer is a computer requesting data or services. A server, or host computer, is a central computer supplying data or services requested of it. When the client computer’s request—for example, for information on various airline flights and prices—gets to a server computer, that computer sends the information back to the client computer. Internet Connections: POPs, NAPs, Backbone, & Internet2 How do I distinguish a point of presence from a network access point, and what is the internet backbone? What does Internet2 do? Your journey onto the internet starts, in the case of dial-up, with your client computer’s modem connecting via a local phone call to your internet service pro- vider (ISP). (• See Panel 2.6. ) This is the slowest part of the internet connection. An ISP’s headquarters and network servers may be located almost anywhere. If you belong to a college or company, you may get internet access free. Many public libraries also offer free net con- nections. If these options are not avail- able to you, here are some questions to ask in your first phone call to an internet access provider: • Is there a contract, and for what length of time? Is there a trial period, or are you obligated to stick with the pro- vider for a while even if you’re unhappy with it? • Is there a setup fee? What kind of help do you get in set- ting up your connection? • How much is unlimited access per month? Is there a dis- count for long-term commitments? • Is the access number a local phone call so that you don’t have long-distance phone tolls? • Is there an alternative dial-up number if the main num- ber is out of service? • Is access available when you’re traveling, through either local numbers or toll-free 800 numbers? • Can you gain access to your email through the provider’s website? • Will the provider help you establish your personal web- site, if you want one, and is there sufficient space for it on the provider’s server? • Is there free, 24-hour technical support? Is it reachable through a toll-free number? • How long does it take to get tech support? Ask for the tech-support number before you sign up, and then call it to see how long a response takes. Also try connecting through the web. • Will the provider keep up with technology? For instance, is it planning to offer broadband access? Wireless access? • Will the provider sell your name to marketers? What kind of service does it offer to block unwanted junk messages (spam)? Once you have contacted an internet access provider and paid the required fee (charged to your credit card), you will be provided with information about local connec- tions and necessary communications software for setting up your computer and modem to make a connection. For this you use your user name (“user ID”) and your password, a secret word or string of characters that enables you to log on, or make a connection to the remote computer. The access provider will also help you establish your email address, which must be unique—that is, not the same as anyone else’s. PRACTICAL ACTION Looking for an Internet Access Provider: Questions to Ask at the Beginning
  87. The Internet & the World Wide Web 61 POINT OF

    PRESENCE To avoid making its customers pay long-distance phone charges to connect, the ISP provides each customer with a ❶ point of pres- ence (POP) —a local access point to the internet—a collection of modems and other equipment in a local area. The POP acts as a local gateway to the ISP’s network. NETWORK ACCESS POINT The ISP in turn connects to a ❷ network access point (NAP), a routing computer at a point on the internet where several connections come together. NAPs are owned by a network service provider (NSP), a large communications company, such as AGIS or MCI. The four orig- inal NAPs in the United States are in San Francisco, Washington, D.C., Chi- cago, and New Jersey. These NAPs were established in 1993, when the original network that became the internet was privatized. Much of the internet congestion occurs at NAPs. The four main NAPs quickly became overloaded, so Private/Peer NAPs, called PNAPs (“miniNAPs”) were established in the late 1990s. PNAPs facilitate more efficient routing (passing) of data back and forth on the internet by providing more backbone access locations. PNAPs are provided by commercial companies, such as Sav- vis Communications. INTERNET BACKBONE Each NAP has at least one computer, whose task is sim- ply to direct internet traffic from one NAP to the next. NAPs are connected by the equivalent of interstate highways, known collectively as the ❸ internet backbone, high-speed, high-capacity transmission lines that use the new- est communications technology to transmit data across the internet. Back- bone connections are supplied by internet backbone providers such as AT&T, Cable & Wireless, GTE, Sprint, Teleglobe, Verizon, and Deutsche Telekom. Local phone call (dial-up or cable connection) High-speed line Can also be a national ISP’s (online service’s) POP (for example, AOL’s local access number) Amazon.com servers U.S. Library of Congress University mainframe Internet backbone Internet backbone Internet backbone Network Access Point (NAP) ISP Internet connection Local ISP’s Point of Presence (POP) Modem inside User Another user The internet’s main communication lines are the backbone. The U.S. lines that make up the backbone exchange data at main points called Network Access Points (NAPs), which are located in major cities. National ISPs use their own dedicated lines to connect directly to the backbone. Local ISPs lease lines from telephone companies. You 3 1 Network Access Point (NAP) Internet connection 2 panel 2.6 How the internet works
  88. info! more info! more 62 Chapter 2 INTERNET2 Internet2 is

    a cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks. In effect, Internet2 adds “toll lanes” to the older internet to speed things up. The purpose is to advance videoconferencing, research, and academic collaboration—to enable a kind of “virtual university.” Presently Internet2 links more than 210 research universi- ties. Requiring state-of-the-art infrastructure, Internet2 operates a high-speed backbone network (formerly called Abiline), which many colleges use. A rival nonprofit organization is National LamdaRail, a fiber-optic network assembled for colleges’ use. Internet Communications: Protocols, Packets, & Addresses How do computers understand the data being transmitted over the internet? When your modem connects to a modem at your ISP’s POP location, the two modems go through a process called handshaking, whereby the fastest- available transmission speed is established. Then authentication occurs: your ISP needs to know you are who you say you are, so you will need to provide a user name and a password. These two items will have been established when you opened your account with your ISP. PROTOCOLS How do computers understand the data being transmitted? The key lies in data following the same protocol, or set of rules, that comput- ers must follow to transmit data electronically. The protocol that enables all computers to use data transmitted on the internet is called Transmis- sion Control Protocol/Internet Protocol, or TCP/IP, which was developed in 1978 by ARPA . TCP/IP is used for all internet transactions, from sending email to downloading pictures off a friend’s website. Among other things, TCP/IP determines how the sending device will indicate that it has finished sending a message and how the receiving device will indicate that it has received the message.10 PACKETS Most important, perhaps, TCP/IP breaks the data in a message into separate packets, fixed-length blocks of data for transmission. This allows a message to be split up and its parts sent by separate routes yet still all wind up in the same place. IP is used to send the packets across the internet to their final destination, and TCP is used to reassemble the packets in the correct order. The packets do not have to follow the same network routes to reach their destination because all the packets have the same IP address, as we explain next. IP ADDRESSES An Internet Protocol (IP) address uniquely identifies every computer and device connected to the internet. An IP address consists of four sets of numbers between 0 and 255 separated by decimals (called a dotted quad )—for example, 1.160.10.240. An IP address is similar to a street address, but street addresses rarely change, whereas IP addresses often do. Each time you connect to your internet access provider, it assigns your computer a new IP address, called a dynamic IP address, for your online session. When you request data from the internet, it is transmitted to your computer’s IP address. When you disconnect, your provider frees up the IP address you were using and reassigns it to another user. A dynamic IP address changes each time you connect to the internet. A static IP address remains constant each time a person logs on to the inter- net. Established organizational websites—such as your ISP’s—have static IP addresses. It would be simple if every computer that connects to the internet had its own static IP number, but when the internet was first conceived, the architects didn’t foresee the need for an unlimited number of IP addresses. Consequently, The Internet Traffic Report The Internet Traffic Report monitors the flow of data around the world. It displays values between 0 and 100 for many networks. Higher values indicate faster and more reli- able connections. Check out your area at: www.internettrafficreport.com Your IP Address Want to find out what your IP address is while you’re online? Go to: http://whatismyipaddress.com
  89. info! more The Internet & the World Wide Web 63

    there are not enough IP numbers to go around. To get around that problem, many internet access providers limit the number of static IP addresses they allocate and economize on the remain- ing number of IP addresses they possess by temporarily assign- ing an IP address from a pool of IP addresses. If your computer is constantly connected to the internet, through a local network at work or school, most likely you have a static IP address. If you have a dial-up connection to the internet or are using a computer that gets connected to the internet inter- mittently, you’re most likely picking up a dynamic IP address from a pool of possible IP addresses at your internet access pro- vider’s network during each log-in. After your connection has been made, your internet access provider functions as an interface between you and the rest of the internet. If you’re exchanging data with someone who uses the same provider, the data may stay within that organization’s network. Large national internet access providers operate their own backbones that connect their POPs throughout the coun- try. Usually, however, data travels over many different networks before it reaches your computer. Who Runs the Internet? What does ICANN do? Although no one owns the internet, everyone on the net adheres to standards overseen by the international Board of Trustees of ISOC, the I nternet Soc iety ( www.isoc.org ). ISOC is a professional, nonprofit society with more than 80 organizational and 28,000 individual members in more than 180 countries. The organizations include companies, governments, and foundations. ISOC provides leadership in addressing issues that confront the future of the inter- net and is the organizational home for groups responsible for internet infra- structure standards. In June 1998, the U.S. government proposed the creation of a series of non- profit corporations to manage such complex issues as fraud prevention, pri- vacy, and intellectual-property protection. The first such group, the Internet Corporation for Assigned Names and Numbers (ICANN), was established to regulate human-friendly internet domain names—those addresses ending with .com, .org, .net, and so on, that overlie IP addresses and identify the website type. ICANN (which can be accessed at www.icann.org ) is a global, private- sector, nonprofit corporation that has no statutory authority and imposes policies through contracts with its world members. Criticized for inefficiency, in 2003 it outlined what it called ICANN 2.0, intended to be a more responsive and agile agency that would consult better with the world internet community about the adoption of standards.11 One of its improvements is the ICANN Whosis Database, which returns the name and address of any domain name entered (entering microsoft.com, for instance, returns the name and address of Microsoft Corp.). However, various groups, including the International Telecommunication Union, a United Nations agency, have suggested that the United States through ICANN has too much control over the internet, and sev- eral countries have proposed that an international body take over ICANN. The United States in July 2005 asserted that it intended to retain its role in internet management.12 In June 2008, ICANN decided to “increase competition and choice” by allowing perhaps thousands of new internet domain names to join “.com,” beginning in 2009. Thus, for instance, new names could cover locations such as “.nyc” (for New York City) and “.berlin” or industries such as “.bank” or companies such as “.ebay.” An application would not be allowed if it conflicted with a trademark (such as “.pepsi”).13 Partial map of the internet based on January 15, 2005, data. Each line is drawn between two nodes, repre- senting two IP addresses. Different colors represent different countries (http:// commons.wikimedia.org/wiki/ File:Internet_map_1024.jpg). Non-English Domain Names In October 2009, ICANN approved the use of non-Latin character sets in domain names. This will allow domain names to be written in native character sets, such as Chinese, Arabic, and Greek. ICANN has argued that this change is necessary to expand use of the Web in regions where people don’t understand English. This also means that many of us in the USA, for example, will not be able to type such domain names. For more information, try: www.wired.com/ epicenter/2009/10/ icann- international-scripts/ http://news.cnet.com/8301- 1023_3-10387139-93.html http://arstechnica.com/web/ news/2009/10/domain- extensions-go-global- goodbye-com-welcome.ars
  90. info! more 64 Chapter 2 2.3 THE WORLD WIDE WEB

    How do the following work: websites, web pages, browsers, URLs, web portals, search tools, and search engines? What are HTML and hyperlinks? The internet and the World Wide Web, as we have said, are not the same. The internet is a massive network of networks, connecting millions of computers via protocols, hardware, and communications channels. It is the infrastruc- ture that supports not only the web but also other communications systems such as email, instant messaging, newsgroups, and other activities that we’ll discuss. The part of the internet called the web is a multimedia-based technol- ogy that enables you to access more than just text. That is, you can also down- load art, audio, video, and animation and engage in interactive games. The Face of the Web: Browsers, Websites, & Web Pages How would I explain to someone the difference between browsers, websites, and web pages? If a Rip Van Winkle had fallen asleep in 1989—the year computer scientist Tim Berners-Lee developed the web software—and awoke today, he would be com- pletely baffled by the new vocabulary that we now encounter on a daily basis: browser, website, web page, www. Let’s see how we would explain to him what these and similar web terms mean. Tim Berners-Lee was born in London, England; his parents, both mathematicians, were employed together on the team that built the Manchester Mark I, one of the earliest comput- ers. Berners-Lee graduated from the Queen’s College of Oxford University, where he built a computer with a soldering iron. In 1980, while an independent contractor at CERN (European Organization for Nuclear Research), Berners-Lee proposed a project based on the concept of hypertext, to facilitate shar- ing and updating information among researchers. With other researchers, he built a prototype system named Enquire. After leaving CERN, he used ideas similar to those used in Enquire to create the World Wide Web, for which he designed and built the first browser (called WorldWideWeb and developed into NeXTSTEP). Berners-Lee built the first website at http://info. cern.ch/ and it was first put online on August 6, 1991. It provided an explanation about what the World Wide Web was, how one could own a browser, how to set up a web server, and so on. In 1994, Berners-Lee founded the World Wide Web Consor- tium (W3C) at the Massachusetts Institute of Technology. It comprised various companies willing to create standards and recommendations to improve the quality of the internet. It was not until 2000 and 2001 that popular browsers began to support this standard. BROWSERS: SOFTWARE FOR SURFING THE WEB A browser, or web browser, is software that enables you to find and access the various parts of the web. The two best-known browsers are Microsoft Internet Explorer, more commonly used (with a 68% market share), and Mozilla Firefox (21%). (• See Panel 2.7. ) Apple Inc.’s Macintosh computers’ Safari is third (8%), and Google’s Chrome, introduced in 2008, is fourth (1%).14 Bing, a new browser from Microsoft, was introduced in 2009.15 These and other browsers allow you, like riding a wave with a surfboard, to surf the web. Surf means to explore the web by using your mouse to move via a series of connected paths, or links, from one location, or website, to another. Whence the Word Web? Why did people perceive the need for a “web,” and how did Berners-Lee develop what they needed? Go to: www.ibiblio.org/pioneers/lee. html http://en.wikipedia.org/wiki/ Tim_Berners-Lee Tim Berners-Lee
  91. The Internet & the World Wide Web 65 WEBSITE: THE

    LOCATION ON THE COMPUTER A website, or simply site, is a location on a particular computer on the web that has a unique address (called a URL, as we’ll explain). If you decided to buy books online from book- seller Barnes & Noble, you would visit its website, www.barnesandnoble.com; the website is the location of a computer somewhere on the internet. That computer might be located in Barnes & Noble’s offices, but it might be located somewhere else entirely. WEB PAGES: THE DOCUMENTS ON A WEBSITE A website is composed of a web page or collection of related web pages. A web page is a document on the World Wide Web that can include text, pictures, sound, and video. The first page you see at a website is like the title page of a book. This is the home page, or welcome page, which identifies the website and contains links to other pages at the site. (• See Panel 2.8, on next page. ) If you have your own personal website, it might consist of just one page—the home page. Large websites have scores or even hundreds of pages. How the Browser Finds Things: URLs How would I describe how a browser connects? Now let’s look at the details of how the browser finds a particular web page. URLS: ADDRESSES FOR WEB PAGES Before your browser can connect with a website, it needs to know the site’s address, the URL. The URL (Uniform Resource Locator) is a string of characters that points to a specific piece of information anywhere on the web. In other words, the URL is the web- site’s unique address. panel 2.7 Internet Explorer (top) and Mozilla Firefox (bottom) Notice the different tool- bar and tool setups. Survival Tip Do Home Pages Endure? The contents of home pages often change. Or they may disappear, and so the con- necting links to them in other web pages become links to nowhere. To find out how to view “dead” pages, go to: http://web.ticino.com/ multilingual/Search.htm
  92. 66 Chapter 2 A URL consists of (1) the web

    protocol, (2) the domain name or web server name, (3) the directory (or folder) on that server, and (4) the file within that directory (perhaps with an extension such as html or htm ). Consider the fol- lowing example of a URL for a website offered by the National Park Service for Yosemite National Park: Protocol Domain name (web server name) Directory name, or folder File (document) name and extension http://www.nps.gov/yose/home.htm Let’s look at these elements. • The protocol: http:// As mentioned, a protocol is a set of communication rules for exchanging information. The web protocol, HTTP, was developed by Tim Berners-Lee, and it appears at the beginning of some web addresses (as in http://www.mcgraw-hill.com ). It stands for HyperText Transfer Protocol (HTTP) , the communications rules that allow browsers to connect with web servers. (Note: Most browsers assume that all web addresses begin with http://, and so you don’t need to type this part; just start with whatever follows, such as www. ) • The domain name (web server name): www.nps.gov/A domain is simply a location on the internet, the particular web server. Domain names tell the location and the type of address. Domain-name components are separated by periods (called “dots”). The last part of the domain, called the top-level domain, is a three-letter extension that describes the domain type: . gov, .com, .net, .edu, .org, .mil, .int— government, commercial, network, educational, nonprofit, military, or international organization. In our example, the www stands for “World Wide Web,” of course; the . nps stands for “National Park Service,” and . gov is the top-level domain name indicating that this is a government website. panel 2.8 Home page This is a website’s first page, or welcome page.
  93. The Internet & the World Wide Web 67 The meanings

    of other internet top-level domain abbreviations appear in the box on the next page. (• See Panel 2.9. ) Some top-level domain names also include a two-letter code extension for the country—for example, . us for United States, . ca for Canada, . mx for Mexico, . uk for United Kingdom, . jp for Japan, . in for India, . cn for China. These country codes are optional. • The directory name: yose/ The directory name is the name on the server for the directory, or folder, from which your browser needs to pull the file. Here it is yose for “Yosemite.” For Yellowstone National Park, it is yell. • The file name and extension: home.htm The file is the particular page or document that you are seeking. Here it is home.htm, because you have gone to the home page, or welcome page, for Yosemite National Park. The . htm is an extension to the file name, and this extension informs the browser that the file is an HTML file. Let us consider what HTML means. URLs & EMAIL ADDRESSES: NOT THE SAME A URL, you may have observed, is not the same thing as an email address. The website for the White House (which includes presidential information, history, a tour, and a guide to fed- eral services) is www.whitehouse.gov. Some people might type president@ whitehouse.gov and expect to get a website, but that won’t happen. We explain email addresses in another few pages. Domain Name Authorized Users Example .aero air-transport industry [email protected] .biz businesses [email protected] .com originally commercial; now any- one can use [email protected] .coop cooperative associations [email protected] .edu postsecondary accredited educational and research institutions [email protected] .gov U.S. government agencies and bureaus [email protected] .info generic information service providers [email protected] .int organizations established by international treaties between governments sectretary_general@unitedna- tions.int .jobs human resources managers [email protected] .mil U.S. military organizations [email protected] .mobi providers of mobile products and services [email protected] .museum museums [email protected] .name individuals [email protected] .net generic networking organizations [email protected] .org generic organizations, often non- profit and professional (non- commercial) [email protected] .post Universal Postal Union* [email protected] .pro credentialed professionals & related entities [email protected] tel. For businesses and individuals to publish their contact data [email protected] .travel travel industry [email protected] .xxx adults-only website [email protected] Note: The number of domain names is expanding; for a list of current domain names, go to www. iana.org/gtld/gtld.htm. *Some groups pay $45,000 or more to ICANN for a particular domain name. panel 2.9 Internet top-level domain abbreviations and users
  94. 68 Chapter 2 panel 2.10 An HTML document and hyperlinks

    Using the mouse to click on the hyperlinked (underlined) text con- nects you to another location in the same website or at a different site. The Nuts & Bolts of the Web: HTML & Hyperlinks What are HTML and hyperlinks? The basic communications protocol that makes the internet work, as we described, is TCP/IP. The communications protocol used to access that part of the internet called the World Wide Web, we pointed out, is called HyperText Transfer Proto- col (HTTP). A hypertext document uses hypertext markup language (HTML), which uses hypertext links, to connect with other documents. The foun- dations of the World Wide Web, then, are HTML and hypertext links. HYPERTEXT MARKUP LANGUAGE (HTML) Hypertext markup language (HTML) is the set of special instructions (called “tags” or “markups”) that are used to specify document structure, formatting, and links to other mul- timedia documents on the web. Extensible hypertext markup language (XHTML) is the successor to and the current version of HTML. The need for a stricter version of HTML was perceived primarily because World Wide Web content now needs to be delivered to many devices (such as mobile phones) that have fewer resources than traditional computers have. HYPERTEXT LINKS Hypertext links —also called hyperlinks, hotlinks, or just links —are connections to other documents or web pages that con- tain related information; a word or phrase in one document becomes a connection to a document in a different place. Hyperlinks appear as under- lined or colored words and phrases. On a home page, for instance, the hyper- links serve to connect the main page with other pages throughout the website. Other hyperlinks will connect to pages on other websites, whether located on a computer next door or one on the other side of the world. An example of an HTML document with hyperlinks is shown below. (• See Panel 2.10. ) Marc Andreessen is best known as a cofounder of Netscape Communications Corporation and coauthor of Mosaic, an early web browser. Andreessen received his bach- elor’s degree in computer sci- ence from the University of Illinois, Urbana-Champaign. As an undergraduate, he interned one summer at IBM in Austin, Texas. He also worked at the university’s National Center for Supercomputing Applications, where he became familiar with ViolaWWW, created by Pei- Yuan Wei, which was based on Tim Berners-Lee’s open standards for the World Wide Web. These early browsers had been created to work only on expensive Unix worksta- tions, so Andreessen created an improved and more user- friendly version with integrated graphics that would work on personal computers. The resulting code was the Mosaic web browser. Soon after this develop- ment, Mosaic Communications Corporation was in business in Mountain View, California, with Andreessen as vice presi- dent. Mosaic Communications changed its name to Netscape Communications, and its flag- ship web browser became Netscape Navigator, which is available now only in archived versions (not technically supported).
  95. info! more The Internet & the World Wide Web 69

    Using Your Browser to Get around the Web What do I need to know to operate my browser? You can find almost anything you want on the more than 28.1 billion indexed web pages available around the world.16 In one month alone, one writer reported, he went on the web “to find, among other things, hotel reservations in California, a rose that will grow in the shade, information about volunteer fire departments, a used copy of an obscure novel, two ZIP codes, the com- plete text of A Midsummer Night’s Dream, and the news that someone I went to high school with took early retirement. I also heard, out of the blue, from two people I haven’t seen in years.”17 Among the droplets of what amounts to a Niagara Falls of information: Weather maps and forecasts. Guitar chords. Recipe archives. Sports schedules. Daily newspapers in all languages. Nielsen television ratings. The Alcoholism Research Data Base. U.S. government phone numbers. The Central Intelligence Agency world map. The daily White House press releases. And on and on. But it takes a browser and various kinds of search tools to find and make any kind of sense of this enormous amount of data. FIVE BASIC ELEMENTS OF THE BROWSER If you buy a new computer, it will come with a browser already installed. Most browsers have a similar look and feel and similar navigational tools. Note that the web browser screen has five basic elements: menu bar, toolbar, URL bar, workspace, and status bar. To execute menu-bar and toolbar commands, you use the mouse to move the pointer over the word, known as a menu selection, and click the left button of the mouse. This will result in a pull-down menu of other commands for other options. (• See Panel 2.11 .) After you’ve been using a mouse for a while, you may find moving the pointer around somewhat time consuming. As a shortcut, if you click on the right mouse button, you can reach many of the commands on the toolbar ( Back, Forward, and so on) via a pop-up menu. STARTING OUT FROM HOME: THE HOME PAGE The first page you see when you start up your browser is the home page or start page. (You can also start up from just a blank page, if you don’t want to wait for the time it takes to connect with a home page.) You can choose any page on the web as your start page, but a good start page offers links to sites you want to visit fre- quently. Often you may find that the internet access provider with which you arrange your internet connection will provide its own start page. How- ever, you’ll no doubt be able to customize it to make it your own personal home page. panel 2.11 Common tools and functions of a browser Do You Need to Know HTML to Build a Website? Most general web users do not need to know HTML. If you want to convert a word- processed document to HTML so that someone can post it on a website, applications such as Microsoft Word will convert it for you (for example, using the options Save as, Web page). Also, many website builders offer their services on the web; you can hire them to build a website for you. Many ISPs supply help with building web- sites and offer website stor- age on their servers to their subscribers. If you want to learn more about HTML formatting, try these websites: www.htmlcodetutorial.com/ www.make-a-web-site.com/ www.w3schools.com/html/ default.asp
  96. 70 Chapter 2 PERSONALIZING YOUR HOME PAGE Want to see

    the weather forecast for your college and/or hometown areas when you first log on? Or the day’s news (gen- eral, sports, financial, health, and so on)? Or the websites you visit most fre- quently? Or a reminder page (as for deadlines or people’s birthdays)? You can probably personalize your home page following the directions provided with the first start page you encounter. A customized start page is also provided by Yahoo!, Google, and similar services. GETTING AROUND: BACK, FORWARD, HOME, & SEARCH FEATURES Driving in a foreign city (or even Boston or San Francisco) can be an interesting experi- ence in which street names change, turns lead into unknown neighborhoods, and signs aren’t always evident, so that soon you have no idea where you are. That’s what the internet is like, although on a far more massive scale. Fortu- nately, unlike being lost in Rome, here your browser toolbar provides navi- gational aids. (• See Panel 2.12. ) Back takes you back to the previous page. Forward lets you look again at a page you returned from. If you really get lost, you can start over by clicking on Home, which returns you to your home page. Search lists various other search tools, as we will describe. Other navigational aids are history lists and favorites or bookmarks. Back: Moves you to a previous page or site Forward: Lets you visit a page you have just returned from Stop: Halts any ongoing transfer of page information Refresh: If page become stalled or garbled while loading, this will retrieve it again Home: Returns you to your personal start page Favorites/Bookmarks: Lists of sites you have saved so you can remember them and go to them quickly History: Names and descriptions of sites most recently visited Print: Prints the web page you are on Menu bar panel 2.12 More information on common browser functions panel 2.13 History list If you want to return to a previously viewed site in Internet Explorer or Fire- fox, click on History.
  97. The Internet & the World Wide Web 71 HISTORY LISTS

    If you are browsing through many web pages, it can be dif- ficult to keep track of the locations of the pages you’ve already visited. The history list allows you to quickly return to the pages you have recently visited. (• See Panel 2.13. ) FAVORITES OR BOOKMARKS One great helper for finding your way is the Favorites or Bookmarks feature, which lets you store the URLs of web pages you frequently visit so that you don’t have to remember and retype your favor- ite addresses. (• See Panel 2.14. ) Say you’re visiting a site that you really like and that you know you’d like to come back to. You click on Favorites (in Inter- net Explorer) or Bookmarks (in Firefox), which displays the URL on your screen, and then click on Add or Bookmark This Page, which automatically stores the address. Later you can locate the site name on your Favorites menu and click on it, and the site will reappear. (When you want to delete it, you can use the right mouse button and select the Delete command.) INTERACTIVITY: HYPERLINKS, RADIO BUTTONS, & SEARCH BOXES For any given web page that you happen to find yourself on, there may be one of three possible ways to interact with it—or sometimes even all three on the same page. (• See Panel 2.15. ) 1. By using your mouse to click on the hyperlinks, which will transfer you to another web page (p. 68). 2. By using your mouse to click on a radio button and then clicking on a Submit command or pressing the Enter key. Radio buttons are little circles located in front of various options; selecting an option with the mouse places a dot in the corresponding circle. 3. By typing text in a search box, a fill-in text box, and then hitting the Enter key or clicking on a Go or Continue command, which will transfer you to another web page. SCROLLING & FRAMES To the bottom and side of your screen display you will note scroll arrows, small up/down and left/ right arrows. Clicking on scroll arrows with your mouse pointer moves the screen so that you can see the rest of panel 2.14 Favorites If you are at a website you may want to visit again, click on Favorites (in Internet Explorer) or Bookmark (in Firefox) and choose Add to Favorites or Bookmark This Page. Later, to revisit the site, go to the Favorites menu, and the site’s URL will reappear. Radio buttons Act like station selector buttons on a car radio Search (text) boxes Require you to type in information panel 2.15 Radio buttons and text box
  98. 72 Chapter 2 the web page, a movement known as

    scrolling . You can also use the arrow keys on your keyboard for scrolling. Some web pages are divided into different rectangles known as frames, each with its own scroll arrows. A frame is an independently controllable section of a web page. A web page designer can divide a page into separate frames, each with different features or options. LOOKING AT TWO PAGES SIMULTANEOUSLY If you want to look at more than one web page at the same time, you can position them side by side on your dis- play screen. Select New from your File menu to open more than one browser window. Web Portals: Starting Points for Finding Information How can I benefit from understanding how portals work? Using a browser is sort of like exploring an enormous cave with flashlight and string. You point your flashlight at something, go there, and at that location you can see another cave chamber to go to; meanwhile, you’re unrolling the ball of string behind you so that you can find your way back. But what if you want to visit only the most spectacular rock formations in the cave and skip the rest? For that you need a guidebook. There are many such “guidebooks” for finding information on the web, sort of internet super- stations known as web portals. TYPES OF WEB PORTALS A web portal, or simply portal, is a type of gate- way website that functions as an “anchor site” and offers a broad array of resources and services, online shopping malls, email support, commu- nity forums, current news and weather, stock quotes, travel information, and links to other popular subject categories. In addition, there are wireless portals, designed for web-enabled portable devices. An example is Yahoo! Mobile, which offers Yahoo! oneSearch, Yahoo! Maps, Yahoo! Entertainment, and so on. Yahoo! Mobile users can access not only email, calendar, news, and stock quotes but also Yahoo!’s directory of wireless sites, movies, and auctions. Portals may be general public portals (horizontal portals or megaportals), such as Yahoo!, Google, Bing (formerly MSN), Lycos, and AOL. (• See Panel 2.16. ) There are also specialized portals—called vertical portals, or vortals, which focus on specific narrow audiences or communities—such as iVillage.com for women, Fool.com for investors, Burpee.com for gardeners, and Searchnet working.techtarget.com for network administrators. LOGGING ON TO A PORTAL When you log on to a portal, you can do three things: (1) check the home page for general information; (2) use the subject guide to find a topic you want; and (3) use a keyword to search for a topic. (• See Panel 2.17. ) • Check the home page for general information: You can treat a portal’s home or start page as you would a newspaper—for example, to get news headings, weather forecasts, sports scores, and stock-market prices. • Use the subject guide to find a topic: Before they acquired their other features, many of these portals began as a type of search tool known as a subject guide, providing lists of several categories of websites classified by topic, such as (with Yahoo!) “Business” or “Entertainment.” Such a category is also called a hypertext index, and its purpose is to allow you to access information in specific categories by clicking on a hypertext link. • Use search box and keywords to search for a topic: At the top of each portal’s home page is a search box, a blank space into which you can type a keyword, the subject word or words of the topic you wish to find.
  99. The Internet & the World Wide Web 73 panel 2.16

    Portals: Lycos and Bing panel 2.17 Yahoo! home page You can read headlines for news and weather, use the directory to find a topic, or use keywords in the Search text box to research specific topics. If you want a biography on Apple Computer founder Steve Jobs, then Steve Jobs is the keyword. This way you don’t have to plow through menu after menu of subject categories. The results of your keyword search will be displayed in a summary of documents containing the keyword you typed. Some popular portal sites are listed on the next page. (• See Panel 2.18. )
  100. 74 Chapter 2 Search Services & Search Engines, & How

    They Work How do search services build search engines, and what are the implications for me when I make a search? Search services are organizations that maintain databases accessible through websites to help you find information on the internet. Examples are not only parts of portals such as Yahoo! and Bing/MSN but also Google, Ask.com, and Gigablast, to name just a few. Search services also maintain search engines, programs that enable you to ask questions or use key- words to help locate information on the web. Search services compile their databases by using special programs called spiders —also known as crawlers, bots (for “robots”), or agents —that crawl through the World Wide Web, following links from one web page to another and indexing the words on that site. This method of gathering information has two important implications: A SEARCH NEVER COVERS THE ENTIRE WEB Whenever you are doing a search with a search engine, you are never searching the entire web. As one writer points out, “You are actually searching a portion of the web, captured in a fixed index created at an earlier date.”18 (An exception: Some news databases, such as Yahoo! News or Google Breaking News, offer up-to-the-minute reports on a number of subjects.) In addition, you should realize that there are a lot of databases whose material is not publicly available. Finally, a lot of published material from the 1970s and earlier has never been scanned into databases and made available. SEARCH ENGINES DIFFER IN WHAT THEY COVER Search engines list their results according to some kind of relevance ranking, and different search engines use different ranking schemes. Some search engines, for instance, rank web pages according to popularity (frequency of visits by people looking for a particular keyword), but others don’t. Four Web Search Tools: Individual Search Engines, Subject Directories, Metasearch Engines, & Specialized Search Engines What are the differences between the four different web search tools? There are many types of search tools, but the most popular versions can be categorized as (1) individual search engines, (2) subject directories, (3) meta- search engines, and (4) specialized search engines. The most popular search sites, measured in share of visitors, are Google, Yahoo!, Bing, and Ask.19 INDIVIDUAL SEARCH ENGINES An individual search engine compiles its own searchable database on the web. You search for information by typing one or more keywords, and the search engine then displays a list of web pages, or “hits,” that contain those keywords, ordered from most likely to least likely to contain the information you want. Hits are defined as the sites that a search engine returns after running a keyword search. Portal Name Site AOL www.aol.com Bing www.Bing.com Google www.google.com Lycos www.lycos.com MSN (part of Bing) www.msn.com Yahoo! www.yahoo.com p anel 2.18 Popular portal sites Survival Tip Urban Legends & Lies on the Internet To check the veracity of material on the internet, go to www.snopes.com, which lists, according to category, information circulated on the internet that isn’t true. Each category includes a key to col- or-coded bullets that precede each entry; the color lets you know how much truth there is to each item: green ϭ true red ϭ false yellow ϭ undetermined white ϭ unclassifiable
  101. The Internet & the World Wide Web 75 Examples of

    this kind of search engine are Ask, Bing, Google, and Yahoo!, as well as AllTheWeb, Gigablast, and Lycos.20 (• See Panel 2.19. ) The search engine Ask allows users to ask questions in a natural way, such as “What is the population of the United States?” Answers.com is a site-and-software com- bination providing instant “one-click” reference answers rather than lists of search engine links. SUBJECT DIRECTORIES Unlike a search engine, a subject directory is created and maintained by human editors, not electronic spiders, and allows you to search for information by selecting lists of categories or topics, such as “Health and Fitness” or “Science and Technology.” Directories tend to be smaller than search engine databases, usually indexing only the top-level pages of a website. Subject directories are best for browsing and for searches of a more general nature.21 Examples of subject directories are Beaucoup!, Galaxy, Google Directory, LookSmart, Open Directory Project, and Yahoo! Directory. (• See Panel 2.20. ) METASEARCH ENGINES A metasearch engine allows you to search several search engines simultaneously. Metasearch engines are very fast and can give you a good picture of what’s available across the web and where it can be found. Examples are Clusty, Dogpile, Mamma, MetaCrawler, and Webcrawler. (• See Panel 2.21. ) Clusty organizes search results into groups or clusters. Thus, for example, if you do a search on the word “Indians,” the top results will be grouped into clusters such as Tribe, Native Americans, Baseball, and Search Tool Site AllTheWeb www.alltheweb.com Answers.com www.answers.com Ask www.ask.com Bing www.bing.com Gigablast www.gigablast.com Lycos www.lycos.com Yahoo! www.yahoo.com Search Tool Site Beaucoup! www.beaucoup.com Galaxy www.galaxy.com/directory Google Directory http://directory.google.com Open Directory Project www.dmoz.org Yahoo! Directory http://dir.yahoo.com Search Tool Site Clusty http://clusty.com Dogpile www.dogpile.com Grokker www.grokker.com ixquick www.ixquick.com Kartoo www.kartoo.com Mamma www.mamma.com MetaCrawler www.metacrawler.com Webcrawler www.webcrawler.com Widow www.widow.com Zuula www.zuula.com panel 2.19 Individual search engines panel 2.20 Subject directories panel 2.21 Metasearch engines
  102. info! more 76 Chapter 2 Indian Students. Grokker displays categories

    in a circular map instead of ranked lists. Searching on the word “Indi- ans” with Grokker produces the categories of Mumbai Indians, American Indians, Cleveland Indians, and Indian Subcontinent, plus General, More, and other clusters. SPECIALIZED SEARCH ENGINES There are also special- ized search engines, which help locate specialized subject matter, such as material about movies, health, and jobs. These overlap with the specialized portals, or vortals, we discussed above. (• See Panel 2.22. ) Smart Searching: Three General Strategies How do I find what I want on the web? The phrase “trying to find a needle in a haystack” will come vividly to mind the first time you type a word into a search engine and back comes a response on the order of “63,173 listings found.” Clearly, it becomes mandatory that you have a strategy for narrowing your search. The following are some tips. IF YOU’RE JUST BROWSING—TWO STEPS If you’re just trying to figure out what’s available in your subject area, do as follows: • Try a subject directory: First try using a subject directory, such as Yahoo! Directory or Open Directory Project. • Try a metasearch engine: Next enter your search keywords into a metasearch engine, such as Dogpile or Mamma—just to see what else is out there. Example: You could type “search engine tutorial into Yahoo!, then Dogpile.” IF YOU’RE LOOKING FOR SPECIFIC INFORMATION If you’re looking for specific information, you can try Answers.com “one-click” search ( www.answers.com ). Or you can go to a major search engine such as Google or Yahoo! and then go to a specialized search engine. Example: You could type “Life expectancy in U.S.” first into Google and then into the Centers for Disease Control and Prevention’s search engine ( www.cdc. gov ). IF YOU’RE LOOKING FOR EVERYTHING YOU CAN FIND ON A SUBJECT If you want to gather up everything you can find on a certain subject, try the same search on several search engines. Example: You could type pogonip (a type of dense winter fog) into more than one search tool. (Of course, you will probably get some irrelevant responses, so it helps to know how to narrow your search, as explained in the box opposite.) Search Tool Site Career.com (jobs) www.career.com Expedia (travel) www.expedia.com Internet Movie Database (movies) www.imdb.com Monster Board (jobs) www.monster.com Motley Fool (personal investments) www.fool.com U.S. Census Bureau (statistics) www.census.gov WebMD (health) www.webmd.com panel 2.22 Specialized search engines Generalized List of Search Engines http://searchenginewatch. com/2156241 Search results for “worm” in Grokker map view; click on any category circle to explore its contents.
  103. The Internet & the World Wide Web 77 W ant

    to know what a term means? You could try the immensely popular Wikipedia ( http:// en.wikipedia.org ), a free online encyclopedia that anyone around the world can contribute to or edit. It has more than 200 million articles in more than 200 languages. A wiki, which founding programmer Ward Cunningham got from the Hawaiian term for “quick” (“wiki wiki”) when he cre- ated the WikiWiki Web in 1995, is a simple piece of software that can be downloaded for free and used to make a website that can be edited by anyone you like (or don’t like). Thus, for example, corporations such as Kodak use business wikis for cross-company collaboration, such as a Word document memo that is worked on by several coworkers simultane- ously. That use of wikis is valuable. But the Wikipedia is not considered reliable or authoritative by academics and librar- ians. As Larry Sanger, Wikipedia’s former editor in chief, who now lectures at Ohio State University, says: “The wide-open nature of the internet encourages people to disregard the importance of expertise.” As a result, Sanger does not allow his students to use Wikipedia for their papers.22 “You can expect to find everything on the web,” points out one library director, “silly sites, hoaxes, frivolous and serious personal pages, commercials, reviews, articles, full- text documents, academic courses, scholarly papers, refer- ence sources, and scientific reports.”23 It is “easy to post information on the internet, usually with no editorial over- sight whatsoever, and that means it is often of questionable quality,” adds a Columbia University instructor. “Few stu- dents are able to separate the good research from the bad, which is less of a problem with printed texts.”24 An alternative to Wikipedia has recently been launched by Google: Knol. This is a “monetizable” creation, whereby authors are held accountable for the articles they write (and their names appear). The authors can share in revenue from ads on their page. If you’re relying on web sources for research for a term paper, how do you determine what’s useful and what’s not? PRACTICAL ACTION Evaluating & Sourcing Information Found on the Web Guidelines for Evaluating Web Resources Anyone (including you) can publish anything on the World Wide Web—and all kinds of people do. Here are some ways to assess credibility of the infor- mation you find there:25 • On what kind of website does the information appear? Websites may be professional sites, maintained by recognized organizations and institutions. They may be news and journalistic sites, which may be anything from The New York Times to e-zines (electronic maga- zines, or small web-based publications) such as Network Audio Bits. They may be commercial sites, sponsored by companies ranging from the Disney Company to The Happy House Painter. They may be special-interest sites, maintained by activists ranging from those of the major political parties to proponents of legalization of mari- juana. They may be blogs or personal home pages, maintained by individuals of all sorts, from professors to children to struggling musicians. • Does the website author appear to be a legitimate authority? What kind of qualifications and credentials does the author have, and what kind of organization is he or she associated with? Does a web search show that the author published in other scholarly and professional publications? • Is the website objective, complete, and current? Is the website trying to sell you on a product, service, or point of view? Is the language balanced and objective, or is it one-sided and argumentative? Does the author cite sources, and do they seem to come from responsible publications? A variant on these guidelines has been framed by But- ler University librarian Brad Matthies as CRITIC. (• See Panel 2.23, next page). Multimedia Search Tools: Image, Audio, & Video Searching What kind of nontext search engines are available? Most web searches involve text, but there are many nontext kinds of resources as well, including videos and still images. (• See Panel 2.24, next page.) STILL IMAGES Interested in an image of Dilbert? You could go to Yahoo! Search—Image Search ( images.search.yahoo.com), Google Image Search
  104. info! more 78 Chapter 2 ( http://images.google.com ), or Bing

    Images ( www.bing.com/images ), where you’ll be offered several thousand choices of Dilbert still images. Other good image search engines are Exalead and Picsearch. AUDIO & VIDEO Other multimedia search engines offer audio as well as image and video searching. If you go to CampaignSearch.com, for instance, and type in keywords of your choosing, the search engine StreamSage will search audio and video broadcasts by analyzing speech. ShadowTV can provide continuous access to live and archived television content via the web. Yahoo! allows users to search for closed captioning associated with a broadcast and then to click for full-motion video of the words being spoken. Among the audio search engines available are Yahoo! Audio Search, AltaVista Audio Search, BlogDigger, SingingFish, FindSounds, ez2Find, and Blinkx. Among video search engines you can select from are All TheWeb, Sing- ingFish, the Open Video Project, AltaVista Video, Yahoo! Video Search, Google Video Search, and Blinkx Video Search. MULTIPLE SOURCES, INCLUDING MUSIC A9 culls information from multiple sources, including the web, images from Google, inside-the-book text from Amazon.com, movies (Internet Movie Database), and reference materials from Answers.com. Rocket Mobile has a music search program for cellphones called Song ID. “You can hold your cellphone up to a music source for 10 seconds,” says one account, “and it will identify the singer, the song, and the album.”26 • C—Claim: Is the source’s claim clear and reasonable, timely and relevant? Or is there evidence of motivationally based language? • R—Role of the claimant: Is the author of the information clearly identifiable? Are there reasons to suspect political, religious, philosophical, cultural, or finan- cial biases? • I—Information backing the claim: Is evidence for the claim presented? Can it be verified, or is the evidence anecdotal or based on testimony? Does the author cite credible references? • T—Testing: Can you test the claim, as by conducting your own quantitative research? • I—Independent verification: Have reputable experts evaluated and verified the claim? • C—Conclusion: After taking the preceding five steps, can you reach a conclu- sion about the claim? Source: Adapted from Brad Matthies, “The Psychologist, the Philosopher, and the Librarian: The Information-Literacy Version of CRITIC,” Skeptical Inquirer, May/June 2005, pp. 49–52. panel 2.23 CRITIC These guidelines will help you think critically about the reliability of online information. Search Tool Site altavista www.altavista.com/image/default A9 (Amazon.com) http://a9.com Blinkx www.blinkx.com Digital Library System www.fws.gov/dls Find Sounds www.findsounds.com/types.html Google Video http://video.google.com Internet Archive for Audio www.archive.org/details/audio Internet Archive for Moving Images www.archive.org/details/movies Picsearch www.picsearch.com Pixsta www.pixsta.com The University of Delaware Library www2.lib.udel.edu/subj/film/resguide/ streamingweb.htm Yahoo! Video http://video.search.yahoo.com panel 2.24 Some multimedia search engines Citing Web Sources in College Papers The four principal kinds of styles for citing sources— books, articles, and so on—are (1) the Modern Language Asso- ciation style (for humanities), (2) the American Psychological Association style (for social sci- ence subjects), (3) the Univer- sity of Chicago Press style, and (4) the Turabian style. To learn the format of these styles— including those for internet sources—go to: http://library.wustl.edu/ research/citesource.html www.lib.berkeley.edu/Teaching Lib/Guides/Internet/Style. html
  105. The Internet & the World Wide Web 79 You type

    “Bill Gates” into Google and get around 38,800,000 hits; in Yahoo!, 70,600,000. How useful is that? Following are some tricks of the trade. • Choose your search terms well, and watch your spell- ing: Use the most precise words possible. If you’re look- ing for information about novelist Thomas Wolfe (author of Look Homeward Angel, published 1929) rather than novelist/journalist Tom Wolfe (author of I Am Char- lotte Simmons, 2005), details are important: Thomas, not Tom; Wolfe, not Wolf. Use poodle rather than dog, Maui rather than Hawaii, Martin guitar rather than gui- tar, or you’ll get thousands of responses that have little or nothing to do with what you’re looking for. You may need to use alternate words and spellings to explore the topic you’re investigating: e-mail, email, electronic mail. • Type words in lowercase: Typing words in lowercase will help you find both lowercase and capitalized variations. • Use phrases with quotation marks rather than sepa- rate words: If you type ski resort, you could get results of (1) everything to do with skis, on the one hand, and (2) everything to do with resorts—winter, summer, moun- tain, seaside—on the other. Better to put your phrase in quotation marks— “ski resort” —to narrow your search. • Put unique words first in a phrase: Better to have “Tom Wolfe novels” rather than “Novels Tom Wolfe.” Or if you’re looking for the Hoagy Carmichael song rather than the southern state, indicate “Georgia on My Mind.” • Use Boolean operators—AND, OR, and NOT: Most search sites use symbols called Boolean operators to make searching more precise. To illustrate how they are used, suppose you’re looking for the song “Strawberry Fields Forever.”31 AND connects two or more search words and means that all of them must appear in the search results. Example: Strawberry AND Fields AND Forever. OR connects two or more search words and indi- cates that any of the two may appear in the results. PRACTICAL ACTION Serious Web Search Techniques Example: Strawberry Fields OR Strawberry fields. NOT, when inserted before a word, excludes that word from the results. Example: Straw- berry Fields NOT Sally NOT W.C. (to distinguish from the actress Sally Field and long-ago comedian W.C. Fields). • Use inclusion and exclusion operators—plus ( ؉ ) and minus ( ؊ ): With many search engines you can use the inclusion operator, the plus sign, and the exclusion oper- ator, the minus sign, to take the place of AND and NOT. The plus sign (ϩ), like AND, precedes a word that must appear. Example: ϩ Strawberry ϩ Fields. The minus sign (Ϫ), like NOT, excludes the word that follows it. Example: Strawberry Fields–Sally. • Use wildcards—asterisks ( * ) and question marks (?): If you want as many results as possible on a keyword, use an asterisk ( * ) or question mark (?) to mean “anything/ everything.” Example: Type dance * and you will get hits for dance, dances, dancers, dancing, dancewear, and so on. If you can’t remember how to spell something, use the question mark (?). Example: If you type Solzhe?, you will get page matches for the Russian author Solzhenitsyn. • Read the Help or Search Tips section: All search sites provide a Help section and tips. This could save you time later. • Try an alternate general search site or a specific search site: As we indicated in the text, if you’re look- ing for very specific information, a general type of search site such as Yahoo! may not be the best way to go. Instead, you should turn to a specific search site. Examples: To explore public companies, try Hoover’s Online ( www.hoovers.com ). For news stories, try Yahoo News ( http://dailynews.yahoo.com ) or CNN ( www.cnn. com ). For pay-per-view information from all sorts of articles, journals, and reports, try LexisNexis ( www. lexisnexis.com ) and Factiva (Dow Jones and Reuters at www.factiva.com ). SCHOLARLY Google offers Google Scholar ( www.scholar.google.com ), described as “a one-stop shop of scholarly abstracts, books, peer-reviewed papers, and technical papers intended for academics and scientists.”27 Google has also launched an ambitious project in which it is scanning page by page more than 50 million books (at a cost of about $10 for each book scanned) from several libraries—those at Harvard, Stanford, Oxford, and the University of Michigan, plus the New York Public Library. “This is one of the
  106. info! more 80 Chapter 2 Search Tool Site Archivarius www.likasoft.com/document-search

    Ask.com Desktop Search http://sp.ask.com/docs/desktop/ overview.shtml Blinkx Pico www2.blinkx.com/pico Copernic Desktop Search www.copernic.com/ Everything www.snapfiles.com Professional Google Desktop Search http://desktop.google.com Yahoo! Desktop Search http://us.config.toolbar.yahoo.com/yds panel 2.25 Some desktop search tools most transformative events in the history of information distribution since Gutenberg,” says New York Public Library CEO Paul LeClerc.28 The Google Print Library Project, as it is called, is currently being studied by the U.S. Justice Department to see if massive book scanning violates antitrust laws, since authors, campus researchers, and library groups have expressed serious concerns over the move.29 Desktop Search: Tools for Searching Your Computer’s Hard Disk How can I find things on my hard disk? These days an inexpensive desktop computer, points out BusinessWeek tech- nology writer Stephen Wildstrom, comes with enough hard-drive storage capacity to store the text of 13,000 copies of the long novel War and Peace. “All that space,” he observes, “means that anything you save, from Grandma’s email messages to a web page for a quaint bed-and-breakfast, is likely to stay there forever. Good luck trying to find it.”30 The solution: a desktop search engine, a tool that extends searching beyond the web to the contents of your personal computer’s hard disk. Desktop search allows users to quickly and easily find words and concepts stored on the hard- disk drive, using technology similar to that in web search engines. Desktop tools must be downloaded from the internet, often as part of a toolbar (a bar across the top of the display window on your computer screen, offering fre- quently executed options or commands). The tools remain in the background on your computer screen until you want to use them. Separate searches are usually required for the web and for the desktop. AltaVista premiered a version called Discovery in 1998, but the technol- ogy failed to catch on. Now all the principal search engine services offer it. (• See Panel 2.25. ) Tagging: Saving Links for Easier Retrieval Later How do I use tags to categorize things I’ve found on the web? Once you’ve found favorite websites, how do you keep them found so that you can get back to them easily? You can always use the bookmarking or favorites feature, but there is also another way called tagging. Tags are do-it-yourself labels that people can put on anything found on the internet, from arti- cles to photos to videos. Using so-called social-bookmarking websites such as del.icio.us or BlinkList or photo-sharing services such as Flickr, users can tag anything for easy retrieval later. Unlike bookmarks or favorites, these tags can be shared easily with other people, which allows people to share similar interests and ideas. Collaborative Categorization Some “social bookmarking” or photo-sharing web services with tagging features: BlinkList www.blinklist.com del.icio.us http://del.icio.us furl www.furl.net/index.jsp Flickr www.flickr.com 43 Things www.43things.com
  107. 1 2 3 4 5 6 Jake Jake’s ISP (SMTP

    server) POP Telephone company Routers Routers Network Access Point (NAP) Maria’s ISP Cable company POP3 Maria Network Access Point (NAP) Regional network Key to Connection types Regular phone lines DSL Cable Satellite T1, T2, T3 Lines Fiber optic cable Jake on the West Coast logs into his dial-up ISP and sends an email message to Maria on the East Coast. The message travels from Jake’s computer over a standard telephone line to his ISP’s local POP (point of presence). From there, the message is sent to an SMTP (Simple Mail Transport) server used to send outgoing mail. The SMTP server breaks down the message into multiple packets that take different routes to their eventual destination. The packets are forwarded by routers and may travel over faster regional networks before eventually ending up on one of several high-speed internet backbones. The packets are eventually routed off the backbone and delivered to the proper email server at Maria’s ISP. The packets are reassembled to re-create the message. Maria uses her cable modem to connect to the internet. When she checks her email, she is sending a request from her PC to the CMTS (Cable-Modem Termination System), which connects her to her ISP’s network. Maria’s ISP routes the “check email” request to its POP3 (Post Office Protocol 3) email server where messages are temporarily stored. The POP3 server sends Jake’s email message to Maria’s PC, along with other waiting messages. The Internet & the World Wide Web 81 panel 2.26 Sending and receiving emails 2.4 EMAIL & OTHER WAYS OF COMMUNICATING OVER THE NET What are email and webmail, attachments, instant messaging, FTP, newsgroups, listservs, real-time chat, and netiquette? Once connected to the internet, most people want to immediately join the mil- lions of users—probably 90% of them—who send and receive electronic mail, or email, the principal use of the internet. Your incoming mail is stored in your mailbox on the access provider’s computer, usually a server called a mail server. Outgoing mail is sent to a Simple Mail Transfer Protocol (SMTP) server. (• See Panel 2.26 .) When you use your email software to retrieve your mes- sages, the email is sent from the server to your computer using Post Office Protocol version 3 (POP3—not the same as “point of presence”) or Internet Message Access Protocol (IMAP), which has expanded functions compared to POP3. For example, if your access provider and email software support IMAP,
  108. info! more 82 Chapter 2 you can search through your

    email messages while they are still on the access provider’s server— before you download them. Then you can choose which messages to download on your machine. Two Ways to Send & Receive Email What’s the difference between an email program and web-based email? There are two ways to send and receive email—via email program or via web- based email. EMAIL PROGRAM An email program, also called email client software, enables you to send email by running email software on your computer, which interacts with an email server at your internet access provider to send and receive email. Your incoming mail is stored on the server in an electronic mailbox. When you access the email server, your incoming mes- sages are sent to your software’s inbox, where they are ready to be opened and read. Examples of such programs are Microsoft’s Outlook Express, now called Windows Mail, and Apple Inc.’s Mail. The advantage of standard email programs is that you can easily integrate your email with other applications, such as calendar, task list, and contact list. WEB-BASED EMAIL With web-based email, or webmail, you send and receive messages by interacting via a browser with a website. The big four email carriers are Yahoo! Mail, Windows Live Hotmail, Gmail (Google), and AOL Mail.32 The advantage of web-based email is that you can easily send and receive messages while traveling anywhere in the world. Moreover, because all your outgoing and incoming messages and folders for storing them (explained below) are stored on the mail server, you can use any personal computer and browser to keep up with your email. Many users will rely mostly on an email program in their personal computer, but when traveling without their PCs, they will switch over to web-based email (using computers belonging to friends or available—for a fee—in airports and hotels) to check messages. Or they use portable devices such as a BlackBerry to do text messaging. (• See Panel 2.27. ) How to Use Email What are some tips for being effective with email? You’ll need an email address, of course, a sort of electronic mailbox used to send and receive messages. All such addresses follow the same approach: user- name@domain. These are somewhat different from web URLs, which do not use the “@” (called “at”) symbol. You can check with your internet access pro- vider to see if a certain name is available. User name (User ID) [email protected] Domain (location) Country Top-level domain (domain type) Domain name Free Email For discussion of free email services, go to: www.emailaddresses.com panel 2.27 Mobile mail Portable devices such as this BlackBerry Wireless Handheld allow you to send and receive email messages from many locations.
  109. info! more The Internet & the World Wide Web 83

    • The user name: Joe_Black The user name, or user ID, identifies who is at the address—in this case, Joe_Black (note the underscore). There are many ways that Joe Black’s user name might be designated, with and without capital letters: Joe_Black, joe_black, joe.black, joeblack, jblack, joeb, and so on. • Domain name: @earthlink The domain name, which is located after the @ (“at”) symbol, tells the location and type of address. Domain-name components are separated by periods (called “dots”). The domain portion of the address (such as Earthlink, an internet service provider) provides specific information about the location—where the message should be delivered. • Top-level domain: . net The top-level domain, or domain code, is a three- letter extension that describes the domain type: . net, .com, .gov, .edu, .org, .mil, .int —network, commercial, government, educational, nonprofit, military, or international organization. • Country: . us Some domain names also include a two-letter extension for the country— .us for United States, . ca for Canada, . mx for Mexico. The illustration on the next page shows how to send, receive, and reply to email. (• See Panel 2.28. ) Here are some tips about using email: TYPE ADDRESSES CAREFULLY You need to type the address exactly as it appears, including capitalization and all underscores and periods. If you type an email address incorrectly (putting in spaces, for example), your message will be returned to you labeled “undeliverable.” USE THE REPLY COMMAND When responding to an e-message someone has sent you, the easiest way to avoid making address mistakes is to use the Reply command, which will automatically fill in the correct address in the “To” line. Be careful not to use the Reply All command unless you want your reply to be sent to all the original email’s recipients. USE THE ADDRESS-BOOK FEATURE You can store the email addresses of peo- ple sending you messages in your program’s “address book.” This feature also allows you to organize your email addresses according to a nickname or the person’s real name so that, for instance, you can look up your friend Joe Black under his real name, instead of under his user name, bugsme2, which you might not remember. The address book also allows you to organize addresses into various groups—such as your friends, your relatives, club members—so that you can easily send all members of a group the same message with a single command. DEAL WITH EACH EMAIL ONLY ONCE When a message comes in, delete it, respond to it, or file it away in a folder. Don’t use your inbox for storage. DON’T “BLOAT” YOUR EMAIL Email messages loaded with fancy typestyles, logos, and background graphics take longer to download. Keep messages simple. Sorting Your Email How can I keep my emails organized? On an average day, billions of business and personal emails are sent in North America. If, as many people do, you receive 50–150 emails per day, you’ll have to keep them organized so that you don’t lose control. Country Abbreviations What do you think the country abbreviations are for Micro- nesia? Botswana? Saint Lucia? Go to: www.eubank-web.com/William/ Webmaster/c-codes.htm www.thrall.org/domains.htm
  110. 84 Chapter 2 Send: Command for sending messages Address Book:

    Lists email addresses you use most; can be attached automatically to messages Subject line: Preview incoming email by reviewing the subject lines to see if you really need to read the messages cc: For copying (“carbon/ courtesy copy”) message to others Sending email Message area You can conclude every message with a custom “signature” bcc: For copying others (“blind carbon copy”) without the primary recipient knowing it Reply, Reply All, Forward, Delete: For helping you handle incoming email Inbox lists messages waiting in email box. (Unopened envelope icon shows unread mail.) Selected message displayed here Receiving email Use the Reply command icon, and the email program automatically fills in the To, From, and Subject lines in your reply. Replying to email panel 2.28 How to send, receive, and reply with email
  111. The Internet & the World Wide Web 85 One way

    to stay organized is by using instant organizers, also called filters, which sort mail on the basis of the name of the sender or the mailing list and put particular emails into one folder. (• See Panel 2.29. ) Then you can read emails sent to this folder later when you have time, freeing up your inbox for mail that needs your more immediate attention. Instructions on how to set up such organizers are in your email program’s Help section. Attachments What are the benefits of being able to do email attachments? You have written a great research paper and you immediately want to show it off to someone. If you were sending it via the Postal Service, you would write a cover note—“Folks, look at this great paper I wrote about globalization! See attached”—then attach it to the paper, and stick it in an envelope. Email has its own version of this. If the file of your paper exists in the computer from which you are sending email, you can write your email message (your cover note) and then use the Attach File command to attach the document. (• See Panel 2.30, next page. ) (Note: It’s important that the person receiving the email attachment have exactly the same software that created the attached file, such as Microsoft Word, or have software that can read and convert the attached file.) Downloading attachments from the mail server can take a lot of time—so you may want to discourage friends from sending you many attachments. You may also want to use compression software to reduce the size of your attachments. While you could also copy your document into the main message and send it that way, some email software loses formatting options such as bold or italic text or special symbols. And if you’re sending song lyrics or poetry, the lines of text may break differently on someone else’s display screen than they do on panel 2.29 Sorting email Email folders @ History of the @ Sign In 1972, Ray Tomlinson sent the first electronic message using the @ symbol to indicate the location or institution of the recipient. Tomlinson knew that he had to use a symbol that would not appear in anyone’s name. Before the @ sign became a character on the keyboard, where was it used? Some linguists believe that the symbol dates back to the 6th or 7th centuries, when Latin scribes adapted the Latin word ad, meaning “at,” “to,” or “toward.” Other linguists say that @ dates to its use in the 18th century as a symbol in commerce to indicate price per unit, as in 4 CDs @ $5 [each]. In 2000, a professor of history in Italy discovered some original 14th-century documents clearly marked with the @ sign to indicate a measure of quantity, based on the word amphora, meaning “jar.” The amphora was a standard-size earthenware jar used by merchants for wine and grain. In Florence, the capital “A” was written with a flourish and later became @ (“at the price of”). Other countries have different names for this symbol. For example: South Africa—aapstet, or “monkey’s tail” Czech Republic—zavinac, or “pickled herring” Denmark—snable-a, or “elephant’s trunk” France—petit escargot, “little snail” Greece—papaki, “little duck” Hungary—kukac, “worm” Taiwan—xiao lao-shu, “mouse sign” Norway—grisehale, “pig’s tail” Russia—sobachka, “little dog” Turkey—kulak, “ear” Source: www.pcwebopedia.com, January 28, 2003, and www.webopedia.com, August 2005.
  112. 86 Chapter 2 First, address the person who will receive

    the attachment. Second, write a “cover letter” email advising the recipient of the attachment. Third, use your email software’s toolbar buttons or menus to attach the file that contains the attachment. Fourth, click on Send to send the email message and attachment. Sending an email attachment 3 2 4 1 When you receive a file containing an attachment, you’ll see an icon indicating the message contains more than just text. You can click on the icon to see the attachment. If you have the software the attached file was created in, you can open the attachment immediately to read or print, or you can save the attachment in a location of your choice (on your computer). You can also forward the attachment to another person. Receiving an email attachment panel 2.30 Attach File function
  113. The Internet & the World Wide Web 87 yours. Thus,

    the benefit of the attachment feature is that it preserves all such formatting, provided the recipient is using the same word processing software that you used. You can also attach pictures, sounds, videos, and other files to your email message. Important Note: Many viruses —those rogue programs that can seriously damage your PC or programs—ride along with email as attached files. Thus, you should never open an attached file from an unknown source. (We describe viruses in Chapter 6.) Instant Messaging What are the benefits and drawbacks of my using instant messaging? Instant messages are like a cross between email and phone, allowing commu- nication that is far speedier than conventional email. With instant messaging (IM), any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system. (Instant messaging should not be confused with text messaging, or texting, the exchange of messages between mobile phones, as we discuss in Chapter 7. Nor should it be confused with twittering, the sending of text-based messages of up to 140 characters.) As soon as you use your computer or portable device to connect to the inter- net and log on to your IM account, you see a buddy list (or contacts list), a list you have created that consists of other IM users you want to communicate with. If all parties agree, they can initiate online typed conversations in real time (in a “chat room”). The messages appear on the display screen in a small window —a rectangular area containing a document or activity— so that users can exchange messages almost instantaneously while operating other programs. GETTING INSTANT-MESSAGING CAPABILITY Examples of present instant- message systems are AOL/AIM, MSN, Google Talk, MySpace, Facebook, and Yahoo! Messenger. To get instant messaging, which is often free, you down- load software and register with the service, providing it with a user name and password. When your computer or portable device is connected to the inter- net, the software checks in with a central server, which verifies your identity and looks to see if any of your “buddies” are also online. You can then start a conversation by sending a message to any buddy currently online. THE DOWNSIDE OF IM IM has become a hit with many users. Instant messag- ing is especially useful in the workplace as a way of reducing long-distance telephone bills when you have to communicate with colleagues who are geo- graphically remote but with whom you must work closely. However, you need to be aware of a few drawbacks: • Lack of privacy: Most IM services lack the basic privacy that most other forms of communication provide. Efforts are under way to develop IM security software and procedures, but for now IM users should be aware that they have virtually no privacy. • Lack of common standards: Many IM products do not communicate with one another. If you’re using AOL’s AIM, you cannot communicate with a buddy on Yahoo!. • Time wasters when you have to get work done: An instant message “is the equivalent of a ringing phone because it pops up on the recipient’s screen right away,” says one writer.33 Some analysts suggest that, because of its speed, intrusiveness, and ability to show who else is online, IM can destroy workers’ concentration in some offices. You can put off Survival Tip Accessing Email while Traveling Abroad To access your email using a local call while traveling outside North America, get a free email account with Yahoo! ( http://mail.yahoo.com ), Win- dows Live Hotmail ( www.hot- mail.com ) , or Mail.com ( www. mail.com ) .
  114. info! more 88 Chapter 2 acknowledging email, voice mail, or

    faxes. But instant messaging is “the cyber-equivalent of someone walking into your office and starting up a conversation as if you had nothing better to do,” says one critic. “It violates the basic courtesy of not shoving yourself into other people’s faces.”34 You can turn off your instant messages, but that is like turning off the ringer on your phone; after a while people will wonder why you’re never available. Buddy lists or other contact lists can also become very in-groupish. When that happens, people are distracted from their work as they worry about staying cur- rent with their circle (or being shut out of one). Incidentally, a 2008 survey of 2,134 adults found that although 58% said that email, cellphones, and the inter- net gave them more control over when to work, 46% also said that these technol- ogies increase the demands that they work more hours, and 49% said that the technologies made it harder to disconnect from work when they should be off.35 FTP—for Copying All the Free Files You Want What does FTP allow me to do? Many net users enjoy “FTPing”—cruising the system and checking into some of the tens of thousands of FTP sites, which predate the web and offer interest- ing free or inexpensive files to download. FTP (File Transfer Protocol) is a software standard for transferring files between computers with different operating systems. You can connect to a remote computer called an FTP site and transfer files to your own microcomputer’s hard disk via TCI/IP over the internet. Free files offered cover nearly anything that can be stored on a computer: software, games, photos, maps, art, music, books, statistics. (• See Panel 2.31. ) You can also set up your own private FTP site (for example, through ShareFile.com) to enable you and other people you allow to use your site to upload and download files that are too large to send as email attachments. Some FTP files are open to the public (at anonymous FTP sites ); some are not. For instance, a university might maintain an FTP site with private files (such as lecture transcripts) available only to professors and students with assigned user names and passwords. It might also have public FTP files open to anyone with an email address. You can download FTP files using either your web browser or special software (called an FTP client program ), such as Fetch and Cute. FTP CLients & Servers FTP software programs, called FTP clients, come with many operating systems, including Windows, DOS, Unix, and Linux. Web browsers also come with FTP clients. For lists of FTP cli- ents and FTP servers, go to: www.answers.com/main/ ntquery? methodϩ4&dsisϩ2 222&dekeyϭFTPϩclient&gwp ϩ11&curtabϩ2222 www.thefreecountry.com/web master/freeftpclients.shtml You can also set up your own FTP site, for example, by going to: www.sharefile.com panel 2.31 FTP software
  115. The Internet & the World Wide Web 89 Newsgroups—for Online

    Typed Discussions on Specific Topics What would probably be my favorite kind of newsgroup? A newsgroup (or forum ) is a giant electronic bulletin board on which users conduct written discussions about a specific subject. (• See Panel 2.32. ) There are thousands of internet newsgroups—which charge no fee— and they cover an amazing array of topics. In addition, for a small fee, services such as Meganetnews.com and CoreNews.com will get you access to more than 100,000 newsgroups all over the world. Newsgroups take place on a spe- cial network of computers called Usenet, a worldwide public network of servers that can be accessed through the internet ( www.usenet.com ). To participate, you need a newsreader, a program included with most brows- ers that allows you to access a newsgroup and read or type messages. (Messages, incidentally, are known as articles. ) One way to find a newsgroup of interest to you is to use a portal such as Yahoo! or Bing to search for specific topics. Or you can use Google’s Groups ( http://groups.google.com/grphp?hl + en&ie ϭ UTF-8 ), which presents the news- groups matching the topic you specify. About a dozen major topics, identified by abbreviations ranging from alt (alternative topics) to talk (opinion and dis- cussion), are divided into hierarchies of subtopics. Listservs: Email-Based Discussion Groups Why would I want to sign up for a listserv? Want to receive email from people all over the world who share your interests? You can try finding a mailing list and then “subscribing”—signing up, just as you would for a free newsletter or magazine. A listserv is an automatic mailing-list server that sends email to subscribers who regularly partici- pate in discussion topics. (• See Panel 2.33, next page. ) Listserv companies include L-Soft’s Listserv ( www.lsoft.com ), Majordomo ( www.majordomo.com ), and http://listserve.com/ . To subscribe, you send an email to the list-server moderator and ask to become a member, after which you will automatically receive email messages from anyone who responds to the server. Mailing lists are one-way or two-way. A one-way list either accepts or sends information, but the user interacts only with the list server and not other panel 2.32 Newsgroup message board from the Blogger Help Group, a Google group
  116. 90 Chapter 2 users. Most one-way mailing lists are used

    for announcements, newsletters, and advertising (and “spam,” discussed shortly). Two-way lists, which are lim- ited to subscribers, let users interact with other subscribers to the mailing list; this is the discussion type of mailing list. Real-Time Chat—Typed Discussions among Online Participants What discussion subjects might I like to participate in using RTC? With mailing lists and newsgroups, participants may contribute to a discus- sion, go away, and return hours or days later to catch up on others’ typed con- tributions. With real-time chat (RTC), participants have a typed discussion (“chat”) while online at the same time, just like a telephone conversation except that messages are typed rather than spoken. Otherwise, the format is much like a newsgroup, with a message board to which participants may send (“post”) their contributions. To start a chat, you use a service available on your browser such as IRC (Internet Relay Chat) that will connect you to a chat server. Unlike instant messaging, which tends to involve one-on-one conversation, real-time chat usually involves several participants. As a result, RTC is often like being at a party, with many people and many threads of conversation occurring at once. Netiquette: Appropriate Online Behavior What are the rules of courtesy for using email? You may think etiquette is about knowing which fork to use at a formal dinner. Basically, though, etiquette has to do with politeness and civility—with rules for getting along so that people don’t get upset or suffer hurt feelings. New internet users, known as “newbies,” may accidentally offend other people in a discussion group or in an email simply because they are unaware of netiquette, or “network etiquette”—appropriate online behavior. In ethics panel 2.33 Listserv mailing list software
  117. The Internet & the World Wide Web 91 general, netiquette

    has two basic rules: (1) Don’t waste people’s time; and (2) don’t say anything to a person online that you wouldn’t say to his or her face. Some more specific rules of netiquette are shown below: • Consult FAQs: Most online groups post FAQs (frequently asked questions) that explain expected norms of online behavior for a particular group. Always read these first—before someone in the group tells you you’ve made a mistake. • Avoid flaming: A form of speech unique to online communication, flaming is writing an online message that uses derogatory, obscene, or inappropriate language. Flaming is a form of public humiliation inflicted on people who have failed to read FAQs or have otherwise not observed netiquette (although it can happen just because the sender has poor impulse control and needs a course in anger management). Something that smooths communication online is the use of emoticons, keyboard-produced pictorial representations of expressions. (• See Panel 2.34. ) • Don’t SHOUT: Use of all-capital letters is considered the equivalent of SHOUTING. Avoid, except when they are required for emphasis of a word or two (as when you can’t use italics in your e-messages). • Be careful with jokes: In email, subtleties are often lost, so jokes may be taken as insults or criticism. • Avoid sloppiness, but avoid criticizing others’ sloppiness: Avoid spelling and grammatical errors. But don’t criticize those same errors in others’ messages. (After all, they may not speak English as a native language.) Most email software comes with spell-checking capability, which is easy to use. • Don’t send huge file attachments, unless requested: Your cousin living in the country may find it takes minutes rather than seconds for his or her computer to download a massive file (as of a video that you want to share). Better to query in advance before sending large files as attachments. Also, whenever you send an attachment, be sure the recipient has the appropriate software to open your attachment. • When replying, quote only the relevant portion: If you’re replying to just a couple of matters in a long email posting, don’t send back the entire message. This forces your recipient to wade through lots of text to find the reference. Instead, edit his or her original text down to the relevant paragraph and then put in your response immediately following. • Don’t “overforward”: Don’t automatically forward emails to your friends without checking if the contents are true and appropriate. Icon Meaning :) :] smiley or happy face :D XD laughing, big grin :( :c frown D: Dϭ horror, disgust :) *) wink :P :p ::b tongue sticking out :O surprise, shock :/ :\ skeptical, annoyed, uneasy :X :# sealed lips, embarrassed 0:) innocent :’( crying panel 2.34 Some emoticons
  118. 92 Chapter 2 2.5 THE ONLINE GOLD MINE: Telephony, Multimedia,

    Webcasting, Blogs, E-Commerce, & the Social Web What are internet telephony, various kinds of multimedia, RSS, and different web feeds (webcasting, blogging, podcasting), types of e-commerce, and the social web? “For vivid reporting from the enormous zone of tsunami disaster,” says a news- paper account, “it was hard to beat the blogs.”36 Blogs, as technology writer Lee Gomes points out, used to be regarded as web-based “daily diaries of people with no real lives to chronicle in the first place.”37 But the December 2004 Indian Ocean calamity that resulted in over 143,000 people killed and more than 146,000 missing also showed how quick and effective this form of web technology could be in spreading instant news, often beating out the mainstream news media. In particular, the tsunami spurred the distribution of video blogs, or vblogs, consisting of video footage mostly shot by vacationing foreign tourists during and after the disaster. One video, for example, showed an elderly couple overpowered by a wave, filmed at a beach hotel by a factory worker from Sweden.38 The opportunities offered by the internet and the web seem inexhaustible. Here we’ll examine several resources available to you. Telephony: The Internet Telephone & Videophone Why would I want to make phone calls via the internet? As we stated earlier, the internet breaks up conversations (as it does any other transmitted data) into “information packets” that can be sent over separate lines and then regrouped at the destination, whereas conventional voice phone lines carry a conversation over a single path. Thus, the internet can move a lot more traffic over a network than the traditional telephone link can. With internet telephony, or VoIP phoning (short for Voice over Internet Protocol )—using the net to make phone calls, either one to one or for audioconferencing —you can make long-distance phone calls that are sur- prisingly inexpensive or even free. (• See Panel 2.35. ) Indeed, it’s possible to do this without owning a computer, simply by picking up your standard tele- phone and dialing a number that will “packetize” your conversation. However, people also can use a PC with a sound card and a microphone, a modem linked to a standard internet service provider, and internet telephone software such panel 2.35 Internet telephony ad
  119. The Internet & the World Wide Web 93 as Microsoft

    NetMeeting and Windows Messenger. VoIP is offered by AT&T, Google Voice, Skype, Vonage, Yahoo! Voice, and scores of other companies. Although sound quality used to be a problem with VoIP systems, the wide- spread availability of broadband has made call quality no longer an issue.39 Besides carrying voice signals, internet telephone software also allows vid- eoconferencing, in which participants are linked by a videophone that will transmit their pictures, thanks to a video camera attached to their PCs. Multimedia on the Web How can I get images, sound, video, and animation as well as text? Many websites (especially those trying to sell you something) employ compli- cated multimedia effects, using a combination of text, images, sound, video, and animation. While most web browsers can handle basic multimedia elements on a web page, eventually you’ll probably want more dramatic capabilities. PLUG-INS In the 1990s, as the web was evolving from text to multimedia, browsers were unable to handle many kinds of graphic, sound, and video files. To do so, external application files called plug-ins had to be loaded into the system. A plug-in is a program that adds a specific feature to a browser, allowing it to play or view certain files. For example, to view certain documents, you may need to download Adobe Acrobat Reader. (• See Panel 2.36. ) To view high-quality video and hear radio, you may need to download RealPlayer. (• See Panel 2.37, next page. ) Quick- Time is a media player for the Apple Macintosh. Plug-ins are required by many websites if you want to fully experience their content. Recent versions of Microsoft Internet Explorer and Firefox can handle a lot of multimedia. Now if you come across a file for which you need a plug-in, the browser will ask whether you want it and then tell you how to go about down- loading it, usually at no charge. DEVELOPING MULTIMEDIA: APPLETS, JAVA, & VISUAL STUDIO.NET How do website developers get all those nifty special multimedia effects? Often web pages contain links to applets, small programs (software) that can be panel 2.36 Adobe Acrobat Reader
  120. 94 Chapter 2 quickly downloaded and run by most browsers.

    Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. Java applets enhance web pages by playing music, displaying graphics and animation, and providing interactive games. Java-compatible browsers such as Internet Explorer automatically download applets from the website and run them on your computer so that you can experience the multimedia effects. Microsoft offers Visual Studio.NET to compete with Java. TEXT & IMAGES Of course, you can call up all kinds of text documents on the web, such as newspapers, magazines, famous speeches, and works of litera- ture. You can also view images, such as scenery, famous paintings, and photo- graphs. Most web pages combine both text and images. One interesting innovation is that of aerial maps. Google Earth ( www.google. earth.com ) is a satellite imaging program that Google describes as “part flight simulator, part search tool.”40 You type in your ZIP code or street address and it feels like you’re looking down on a high-resolution aerial view of your house from a plane at 30,000 feet. Using Google Local Search, you can search for a business or other attraction in some city, and you’ll get an indicator on your satellite image; if you click again, the establishment’s web page opens. “Google sightseers can zoom in close enough to see airplanes parked in the desert, the baseball diamond at Wrigley Field, and cars in the Mall of America parking lot,” says one writer.41 Google Earth also extends under the sea. In 2009, the company released a 3-D mapping service “that lets users explore the ocean as if they were dolphins, swimming past submerged volcanoes and through underwater canyons.”42 ANIMATION Animation is the rapid sequencing of still images to create the appearance of motion, as in most videogames as well as in moving ban- ners displaying sports scores or stock prices. VIDEO Video can be transmitted in two ways. (1) A file, such as a movie or video clip, may have to be completely downloaded before you can view it. This may take several minutes in some cases. (2) A file may be displayed as streaming video and viewed while it is still being downloaded to your computer. Stream- ing video is the process of transferring data in a continuous flow so that you can begin viewing a file even before the end of the file is sent. For instance, RealPlayer offers live, television-style broadcasts over the internet as panel 2.37 RealPlayer
  121. The Internet & the World Wide Web 95 streaming video

    for viewing on your PC screen. You download and install this software and then point your browser to a site featuring RealVideo. That will produce a streaming-video television image in a window a few inches wide. A milestone in streaming video occurred in July 2005 when America Online broadcast seven separate live feeds of the Live 8 concerts from London, Phila- delphia, Paris, Berlin, Rome, and Toronto, as well as a separate global feed that included footage from four other venues. With more and more American households having the broadband connections that permit streaming video, movies-by-mail firms such as Netflix are moving toward the near-instant deliv- ery of movies streamed to subscribers’ TV sets via Net-enabled TV sets, set-top box systems, and Xbox 360 games systems.43 AUDIO Audio, such as sound or music files, may also be transmitted in two ways: • Downloaded completely before the file can be played: Many online music services, such as eMusic, iTunes Music Store, MusicMatch, Rhapsody, Virgin, Napster, Connect, and Walmart, offer music for a fee, either by subscription or by the song. Generally, music must be downloaded completely before the file can be played on a computer or portable music player. • Downloaded as streaming audio: Music that is downloaded as streaming audio allows you to listen to the file while the data is still being downloaded to your computer. A popular standard for transmitting audio is RealAudio. Supported by most web browsers, it compresses sound so that it can be played in real time, even though sent over telephone lines. You can, for instance, listen to 24-hour-a-day net radio, which features “vintage rock,” or English-language services of 19 shortwave outlets from World Radio Network in London. Many large radio stations outside the United States have net radio, allowing people around the world to listen in. (We explain a form of web audio known as podcasting shortly.) The Web Automatically Comes to You: Webcasting, Blogging, & Podcasting How would I explain webcasting, blogging, and podcasting to someone? It used to be that you had to do the searching on the web. Now, if you wish, the web will come to you. Let’s consider three variations—webcasting, blogging, and podcasting. PUSH TECHNOLOGY & WEBCASTING The trend began in the late 1990s with push technology, software that automatically downloads information to personal computers (as opposed to pull technology, in which you go to a web- site and pull down the information you want—in other words, the web page isn’t delivered until a browser requests or pulls it). One result of push technol- ogy was webcasting, in which customized text, video, and audio are sent to you automatically on a regular basis. The idea here is that you choose the categories, or (in Microsoft Internet Explorer) the channels, of websites that will automatically send you updated information. Thus, webcasting saves you time because you don’t have to go out searching for the information. Webcasting companies are also called sub- scription services, because they sell on-demand services. However, a lot of push technology fell out of favor because it clogged networks with information that readers often didn’t want. Then along came RSS. BLOGGING—RSS, XML, & THE RISE OF THE BLOGOSPHERE RSS was built to be simpler than push technology. RSS newsreaders, or RSS aggregators, are programs that scour the web, sometimes hourly or more frequently,
  122. info! more info! more 96 Chapter 2 and pull together

    in one place web “feeds” from several websites. The developers of RSS technology don’t agree on what the abbreviation stands for, but some say it means “Really Simple Syndication” or “Rich Site Summary,” although there are other variations as well.44 “RSS allows you to play news edi- tor and zero in on the information you really need,” says one account, “even as you expand the number of sites you sample.”45 This is because the information is so specifically targeted. RSS is based on XML, or extensible markup language, a web-document tagging and formatting language that is an advance over HTML and that two computers can use to exchange information. XML, in the form of RSS, has allowed people to have access to a whole new universe of content. One of the earliest adopters, for instance, was the Mormon Church, which used the system to keep in touch with members. Now, however, it has morphed into something called the blogosphere, the total universe of blogs— blog being short for web log, a diary-style web page. (• See Panel 2.38. ) “Blogs can be anything their creators want them to be, from newsy to deeply personal, argumentative to poetic,” says one writer. “Some are written by indi- viduals. Some are group projects. Some have readerships in the thousands and influence world media. Others are read by a handful of people—or not read at all, because they’re all pictures. Bloggers are a new breed of homegrown jour- nal writers and diarists who chronicle life as it happens, with words, photos, sound, and art.”46 Says another dedicated blogger, “Blogging is . . . to writing what extreme sports are to athletics: more free-form, more accident-prone, less formal, more alive. It is, in many ways, writing out loud.”47 Some people have succeeded in turning blogging into successful businesses, with those who receive 100,000 or more unique visitors a month earning an average of $75,000 a year (aided by online ads).48 But 95% of blogs are essentially abandoned, so the key to building a successful audience for a blog seems to be a nonstop, work-every-day workweek.49 Among other variations are video blogs, or vblogs or vogs, which seem to be simply video versions of blogs, and moblogs, or mobile blogs, in which picture blogs are posted to websites directly from camera-enabled cellphones. Blog Search Engines Some blog search engines: Technorati www.technorati.com Bloglines www.bloglines.com Blogdigger www.blogdigger.com Blog Search Engine www.blog searchengine.com/ Google Blog Search http://blog search.google.com/ Two Blogging Products Two popular blogging products are these: Blogger www.blogger.com/start Moveable Type’s TypePad (begins at $4.95 a month) www.typepad.com panel 2.38 The blogosphere: one way to create your own blog
  123. info! more The Internet & the World Wide Web 97

    PODCASTING Podcasting involves the recording of internet radio or simi- lar internet audio programs. The term derives not only from webcasting but also from the Apple iPod portable music player and other mobile listening devices, such as MP3 players. Blogging and podcasting seem to represent the frontier of personalized media, a subject to which we will return throughout the book, particularly in Chapter 7. E-Commerce: B2B Commerce, Online Finance, Auctions, & Job Hunting What are ways I might personally benefit from online e-commerce possibilities? The explosion in e-commerce (electronic commerce) —conducting busi- ness activities online— is not only widening consumers’ choice of products and services but also creating new businesses and compelling established businesses to develop internet strategies. Many so-called brick-and-mortar retailers—those operating out of physical buildings—have been surprised at the success of such online companies as Amazon.com, seller of books, CDs, and other products. As a result, traditional retailers from giant Walmart to very small one-person businesses now offer their products online. Retail goods can be classified into two categories—hard and soft. Hard goods are those that can be viewed and priced online, such as computers, clothes, groceries, and furniture, but are then sent to buyers by mail or truck. Soft goods are those that can be downloaded directly from the retailer’s site, such as music, software, travel tickets, and greeting cards. Some specific forms of e-commerce are as follows: B2B COMMERCE Of course, every kind of commerce has taken to the web, ranging from travel bookings to real estate. One of the most important vari- ations is B2B (business-to-business) commerce, the electronic sale or exchange of goods and services directly between companies, cutting out traditional intermediaries. Expected to grow even more rapidly than other forms of e-commerce, B2B commerce covers an extremely broad range of activities, such as supplier-to-buyer display of inventories, provision of whole- sale price lists, and sales of closed-out items and used materials—usually with- out agents, brokers, or other third parties. ONLINE FINANCE: TRADING, BANKING, & E-MONEY The internet has changed the nature of stock trading. Anyone with a computer, a connection to the global network, and the information, tools, and access to transaction systems required to play the stock market can do so online. Companies such as E * Trade have built one-stop financial supermarkets offering a variety of money-related services, including home mortgage loans and insurance. More than 1,000 banks have websites, offering services that include account access, funds transfer, bill payment, loan and credit-card applications, and investments.50 AUCTIONS: LINKING INDIVIDUAL BUYERS & SELLERS Today millions of buy- ers and sellers are linking up at online auctions, where everything is available from comic books to wines.51 The internet is also changing the tradition-bound art and antiques business (dominated by such venerable names as Sotheby’s, Christie’s, and Butterfield & Butterfield). There are generally two types of auc- tion sites: • Person-to-person auctions: Person-to-person auctions, such as eBay, connect buyers and sellers for a listing fee and a commission on sold items. (• See Panel 2.39, next page. ) • Vendor-based auctions: Vendor-based auctions, such as OnSale, buy merchandise and sell it at discount. Some auctions are specialized, such as Priceline, an auction site for airline tickets and other items. Some Auction Websites eBay www.ebay.com WeBidz www.webidz.com Overstock.com http://auctions. overstock.com
  124. 98 Chapter 2 ONLINE JOB HUNTING There are more than

    2,000 websites that promise to match job hunters with an employer. Some are specialty “boutique” sites look- ing for, say, scientists or executives. Some are general sites, the leaders being Monster.com, CareerPath.com, CareerMosaic.com, USAJOBS (U.S. govern- ment/federal jobs; www.usajobs.opm.gov ), and CareerBuilder.com. Job sites can help you keep track of job openings and applications by downloading them to your own computer. Résumé sites such as Employment911.com help you prepare professional-quality résumés. Relationships: Matchmaking Websites Would I use a dating website? A matchmaking, or dating, website is an online forum that people may join in hopes of meeting compatible potential mates. People who con- nect online before meeting in the real world have the chance to base their relationship on personality, intelligence, and sense of humor rather than on purely physical attributes. Five of the biggest and best-known sites are Ameri- canSingles, eHarmony, Match.com, True, and Yahoo! Personals. Facebook, the social-networking site, also offers the dating site called Are You Interested.52 Most dating sites charge a fee, but PlentyofFish, OKCupid, MatchDoctor, and BookofMatches are free. Most of the 1,000 or so dating sites are niche or spe- cialty sites for those with different political or religious beliefs, different eth- nicities, mature adults, and so on.53 Web 2.0 & the Social Web: Social Networking, Media Sharing, Social-Network Aggregation, & Microblogging What is Web 2.0, and which social-networking, media-sharing, social-network aggregator websites, and microblogging might be useful? Finally, we come to what is known as Web 2.0, which can be defined as the move toward a more social, collaborative, interactive, and responsive web.54 As websites have become easier to use, they allow users to better har- ness the collective power of people, which has led to a “social web” or “social media,” involving not only blogs and wikis (for sharing information) but also social networks and media sharing. The common theme of all these is human interaction. panel 2.39 eBay auction
  125. info! more info! more The Internet & the World Wide

    Web 99 MYSPACE, FACEBOOK, & OTHER SOCIAL-NETWORKING WEBSITES A social- networking website is an online community that allows members to keep track of their friends and share photos, videos, music, stories, and ideas with other registered members. Social-networking websites are led by MySpace (76 million U.S. members) and Facebook (55 million U.S. members) but also include the business-contact site LinkedIn (6.3 million U.S. members).55 Although 44% of U.S. adults who were online in 2007 did not participate in social networks, according to Forrester Research, another 25% were considered “joiners,” who vis- ited social-networking sites such as MySpace; “collectors” consisted of an elite 15% who collected and aggregated information; and the rest were “critics,” who posted ratings and reviews, as well as contributed to blogs and forums.56 YOUTUBE, FLICKR, & OTHER MEDIA-SHARING WEBSITES A media-sharing website is a type of online social network in which members share media such as photos, videos, and music. The most popular example is YouTube, but others are Hulu, Flickr, Shutterfly, Twango, and Yahoo! Video. Forty-eight percent of internet users in 2007 said they had visited video-sharing websites, according to the Pew Internet & American Life Project, and the daily traffic to such sites doubled in a year.57 Video-sharing sites include YouTube, Flickr, Photobucket, Imageshack, Vimeo, and Veoh. (Incidentally, part of the success of YouTube, where people watch around 3 billion videos a month, is that its founders have kept it pornography-free, using top-secret pattern-recognition software, according to one report.)58 Some Top Social- Networking Websites Bebo BlackPlanet.com Facebook Flixter Friendster Last.fm LinkedIn MySpace Ning Xanga Some Top Media- Sharing Websites Flickr Hulu Photobucket Imageshack Shutterfly Twango Yahoo! Video YouTube
  126. info! more 100 Chapter 2 FRIENDFEED, SPOKEO, & OTHER SOCIAL-NETWORK

    AGGREGATORS Cathy Brooks, 39, of San Francisco is described as a “typically unapologetic Sili- con Valley web addict.” In one week alone, it’s reported, “she produced more than 40 pithy updates on the text messaging service Twitter, uploaded two dozen videos to various video-sharing sites, posted seven graphs on . . . Flickr and one item to the online community calendar Upcoming.”59 She and her friends follow one another’s activities by funneling them into a single infor- mation broadcast, a content-aggregation system known as FriendFeed. Social-network aggregators, or social aggregators, collect content from all of a user’s various social networks profiles into one place, then allow them to track friends and share their other social network activities. Beside FriendFeed, other examples of “friend-tracking services” are Spokeo, Iminta, Plaxo, Readr, and Mugshot. TWITTER & TUMBLR SOCIAL NETWORKING & MICROBLOGGING SERVICES As you and your friends track each other’s every moment, you can also use services such as Twitter and Tumblr to do “thoughtcasting” or “microblogging”—send a text message from your mobile phone, which your friends will receive on the web/IM or on their phones.60 (The phenomenon is called microblogging, because messages have to be short, 140 characters or less, owing to length restrictions on text messaging.) Tumblr lets you express yourself using mul- tiple media, but in a way that’s easier than using traditional blog software. Some Social-Network Aggregators FriendFeed Spokeo Iminta Plaxo Readr Mugshot
  127. The Internet & the World Wide Web 101 Email is

    still king at the office, but research suggests that Twitter, Facebook, and other social media have overtaken email to become the fourth-most- popular way people spend time online (after search, portals, and software applications).61
  128. 102 Chapter 2 2.6 THE INTRUSIVE INTERNET: Snooping, Spamming, Spoofing,

    Phishing, Pharming, Cookies, & Spyware How can I protect myself against snoopers, spam, spoofing, phishing, pharming, cookies, and spyware—adware, browser and search hijackers, and key loggers? “The current internet model is just too wide open,” says Orion E. Hill, presi- dent of the Napa Valley (California) Personal Computer Users Group, which educates users about PCs. “The internet is just too accessible, and it’s too easy for people to make anything they want out of it.”62 Thus, although the inter- net may be affected to a degree by governing and regulatory bodies, just like society in general, that doesn’t mean that it doesn’t have its pitfalls or share of users who can do you real harm. We consider some of the other serious internet issues (such as viruses, worms, and crackers) in Chapter 6 and elsewhere, but here let us touch on a few of immediate concern that you should be aware of: snooping, spam, spoofing, phishing, pharming, cookies, and spyware. Snooping on Your Email: Your Messages Are Open to Anyone Who’s able to look at my private emails? The single best piece of advice that can be given about sending email is this: Pre- tend every electronic message is a postcard that can be read by anyone. Because the chances are high that it could be. (And this includes email on college cam- pus systems as well.) Think the boss can’t snoop on your email at work? The law allows employers to “intercept” employee communications if one of the parties involved agrees to the “interception.” The party “involved” is the employer.63 And in the work- place, email is typically saved on a server, at least for a while. Indeed, federal laws require that employers keep some email messages for years. Think you can keep your email address a secret among your friends? You have no control over whether they might send your e-messages on to someone else—who might in turn forward them again. (One thing you can do for your friends, however, is delete their names and addresses before sending one of their messages on to someone.) Think your internet access provider will protect your privacy? Often ser- vice providers post your address publicly or even sell their customer lists. If you’re really concerned about preserving your privacy, you can try certain technical solutions—for instance, installing software that encodes and decodes messages (discussed in Chapter 6). But the simplest solution is the easiest: Don’t put any sensitive or embarrassing information in your email. Even deleted email removed from trash can still be traced on your hard disk. To guard against this, you can use software such as Spytech Eradicator and Web- root’s Window Washer to completely eliminate deleted files. (Be aware, how- ever: your email may already have been backed up on the company—or campus—server.) Spam: Electronic Junk Mail Is it really possible to manage spam? Several years ago, Monty Python, the British comedy group, did a sketch in which restaurant customers were unable to converse because people in the background (a group of Vikings, actually) kept chanting “Spam, spam, eggs and spam . . .” The term spam was picked up by the computer world to describe another kind of “noise” that interferes with communication. Now spam refers to unsolicited email, or junk mail, in the form of advertising or chain letters. But the prob- lem of spam has metastasized well beyond the stage of annoyance. ethics SECURITY Survival Tip Look for the Padlock Icon To avoid having people spying on you when you are send- ing information over the web, use a secure connection. This is indicated at the bottom of your browser window by an icon that looks like a padlock or key.
  129. The Internet & the World Wide Web 103 • Delete

    without opening the message: Opening the spam message can send a signal to the spammer that some- one has looked at the on-screen message and there- fore that the email address is valid—which means you’ll probably get more spams in the future. If you don’t rec- ognize the name on your inbox directory or the topic on the inbox subject line, simply delete the message with- out reading it. Or you can use a preview feature in your email program to look at the message without opening it; then delete it. • Never reply to a spam message: The following advice needs to be taken seriously: Never reply in any way to a spam message! Replying confirms to the spammer that yours is an active email address. Some spam senders will tell you that if you want to be removed from their mail- ing list, you should type the word remove or unsubscribe in the subject line and use the Reply command to send the message back. Invariably, however, all this does is confirm to the spammer that your address is valid, set- ting you up to receive more unsolicited messages. • Opt out: When you sign up for or buy something online and are asked for an email address, remember to opt out of everything you’re sure you don’t want to receive. When you register for a website, for example, read its privacy policy to find out how it uses email address- es—and don’t give the site permission to pass along yours. PRACTICAL ACTION Tips for Fighting Spam 67 • Enlist the help of your internet access provider, or use spam fil- ters: Your IAP may offer a free spam filter to stop the stuff before you even see it. If it doesn’t, you can sign up for a filtering service, such as MailWise, for a small monthly charge. Or there are do-it-yourself spam-stopping programs. Examples: Choice- mail ( www.digiportal.com ) , MailWasher ( www.mailwasher. net/ ), Barracuda ( www.barracudanetworks.com ) and McAfee SpamKiller ( http://us.mcafee.com/root/product. asp? productid ϭ msk ). More complicated spam-blocker packages exist for businesses. Be warned, however: Even so-called spam killers don’t always work. “Nothing will work 100%, short of changing your email address,” says the operator of an online service called SpamCop. “No matter how well you try to filter a spammer, they’re always working to defeat the filter.”68 • Fight back: If you want to get back at spammers—and other internet abusers—check with abuse.net ( www. abuse.net ) or Ed Falk’s Spam Tracking Page ( www.rahul. net/falk ). Spamhaus ( www.spamhaus.org ) tracks the internet’s worst spammers and works with ISPs and law enforcement agencies to identify and remove persistent spammers from the internet. These groups will tell you where to report spammers, the appropriate people to complain to, and other spam-fighting tips. Spam has become so pestiferous that Smart Computing magazine refers to it as a “cockroach infestation.”64 In 2001, spam accounted for about 5% of the traffic on the internet; by 2004, it was more than 70%—in some regions more than 90%, more than a hundred billion unsolicited messages.65 In 2008, the number of spam messages globally was 164 billion per day, using enough electricity to power 2.4 million homes for a year.66 Spam plagues social net- works, such as Facebook. It is even migrating from computers to cellphones, messages that the recipients have to pay for. Usually, of course, you don’t recognize the spam sender on your list of incoming mail, and often the subject line will give no hint, stating something such as “The status of your application” or “It’s up to you now.” The solicita- tions can range from money-making schemes to online pornography. To better manage spam, some users get two email boxes. One is used for online shop- ping, business, research, and the like—which will continue to attract spam. The other is used (like an unlisted phone number) only for personal friends and family—and will probably not receive much spam. The Practical Action box gives some other tips for fighting spam.
  130. info! more info! more 104 Chapter 2 Spoofing, Phishing, &

    Pharming: Phony Email Senders & Websites How would I know if I were being spoofed, phished, or pharmed? A message shows up in your email supposedly from someone named “Sonia Saunders.” The subject line reads “Re: Hey there!” It could have been from someone you know, but it’s actually a pitch for porn. Or you receive what appears to be an “Urgent notice from eBay,” the online auction company, stat- ing that “failure to update billing information will result in cancellation of service” and asking you to go to the web address indicated and update your credit-card information. In the first instance you’ve been spoofed, in the sec- ond you’ve been phished. 69 SPOOFING—USING FAKE EMAIL SENDER NAMES Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is one of the main tactics used by spammers (and virus writers) to induce or trick recipients into opening and perhaps responding to their solicitations. Spoof- ing is generally not illegal and might even serve a legitimate purpose under some circumstances—say, a “whistle-blowing” employee fearful of retaliation who reports a company’s illegalities to a government agency. It is illegal, how- ever, if it involves a direct threat of violence or death.70 PHISHING—USING TRUSTED INSTITUTIONAL NAMES TO ELICIT CONFIDENTIAL INFORMATION Phishing (pronounced “fishing” and short for password harvesting fishing ) is (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to “phish” for, or entice people to share, their personal, financial, or password data. The names may be trusted names such as Citibank, eBay, or Best Buy.71 A variant is spear-phishing, in which a message seems to originate within your company, as when a “Security Department Assistant” asks you to update your name and password or risk suspension.72 Thus, you should be suspicious of any email that directs you to a website that requests confidential information, such as credit-card or Social Security number.73 PHARMING—REDIRECTING YOU TO AN IMPOSTOR WEB PAGE Pharming is a rela- tively new kind of phishing that is harder to detect. In pharming, thieves implant malicious software on a victim’s computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. One way to protect yourself is to make sure you go to special secure web pages, such as any financial website, which begin with https rather than the standard http and which use encryption to protect data transfer.74 Cookies: Convenience or Hindrance? Do I really want to leave cookies on my computer? Cookies are little text files—such as your log-in name, password, and preferences—left on your hard disk by some websites you visit. The web- sites retrieve the data when you visit again. A website that welcomes you by name uses cookies. THE BENEFITS OF COOKIES Cookies can be a convenience. If you visit an online merchant—such as BarnesandNoble.com for a book—and enter all your address and other information, the merchant will assign you an identification number, store your information with that number on its server, and send the number to your browser as a cookie, which stores the ID number on your hard disk. The next time you go to that merchant, the number is sent to the server, which looks you up and sends you a customized web page welcoming you. “Cookies actually Verifying Valid Websites For more on verifying if you’re dealing with a legitimate com- pany website, go to: www.trustwatch.com Deciphering Fake Email For more about spoofing and how to identify origins of fake emails, go to: www.mailsbroadcast.com/ email.broadcast.faq/46.email. spoofing.htm
  131. info! more The Internet & the World Wide Web 105

    perform valuable services,” says technology writer and computer talk-radio-show host Kim Komando. “For instance, they can shoot you right into a site so you don’t have to enter your password.”75 Says another writer: “They can also fill in a username on a site that requires logging in, or [help] a weather site remember a ZIP code so that it can show a local forecast on return visits.”76 THE DRAWBACKS OF COOKIES Cookies are not necessarily dangerous—they are not programs, and they can’t transmit computer viruses, for example. However, some websites sell the information associated with your ID number on their servers to marketers, who might use it to target customers for their products. “Unsatisfactory cookies,” in Microsoft’s understated term, are those that might allow someone access to personally identifiable information that could be used without your consent for some secondary purpose. This can lead to spyware, as we describe next. Webroot’s Window Washer, among other programs, can clean your computer of cookies. Spyware—Adware, Browser & Search Hijackers, & Key Loggers: Intruders to Track Your Habits & Steal Your Data What should I be afraid of about spyware? You visit a search site such as Yahoo! or Google and click on a text ad that appears next to your search results. Or you download a free version of some soft- ware, such as Kazaa, a file-sharing program. Or you simply visit some web merchant to place an order. The next thing you know, you seem to be getting pop-up ads, a form of online advertising in which, when you visit certain websites, a new window opens, or “pops up,” to display advertisements. You have just had an encounter with spyware, of which pop-up ads are only one form . Spyware may be defined as deceptive software that is surrepti- tiously installed on a computer via the web; once installed on your hard disk, it allows an outsider to harvest confidential information, such as key- strokes, passwords, your email address, or your his- tory of website visits. Spyware was found on the personal computers of 80% of the 329 homes participating in a study conducted by America Online Inc. and the National Cyber Security Alliance.77 Ways to avoid getting spyware are shown in the more info! in the margin at right. The most common forms of spyware are the following: ADWARE OR POP-UP GENERATORS Adware, or pop-up generators, is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads. This is the most common, and benign, type of spyware. Adware can be developed by legitimate companies such as Verizon and Panasonic but also by all kinds of fly-by-night purveyors of pornography and gambling operating from computer servers in Russia, Spain, and the Virgin Islands. BROWSER HIJACKERS & SEARCH HIJACKERS More damaging kinds of spy- ware are browser hijackers, which change settings in your browser with- out your knowledge, often changing your browser’s home page and replacing it with another web page, and search hijackers, which intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. “A better name for these programs is scumware,” says one writer. “One of them might reset your home page to a porn site or an obscure search engine Survival Tip Control Those Cookies! You can use your browser’s Help function to accept or reject cookies. For instance, in Internet Explorer, go to the Tools menu and click Internet Options; on the General tab, click Settings; then click View files, select the cookie you want to delete, and on the File menu click Delete. Software such as Cookie Pal ( www. kburra.com ) will also help block and control cookies, as will Webroot’s Window Washer. Fighting Spyware More information about ways to combat spyware may be found at: www.microsoft.com/athome/ security/spyware/default. mspx www.pcpitstop.com www.spywarewarrior.com/ rogue_anti-spyware.htm www.webroot.com www.cleansoftware.org www.lavasoftusa.com/ software/ Webroot’s Window Washer, among other programs, can clean your computer of cookies.
  132. 106 Chapter 2 and then refuse to let you change

    the page back. Or it might hijack your search requests and then direct them to its own page.”78 KEY LOGGERS Key loggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the internet, making it possible for strangers to learn your passwords and other infor- mation. For instance, some may secretly record the keystrokes you use to log in to online bank accounts and then send the information off to who knows where. In the past, spyware writers have relied on flaws in Microsoft’s Internet Explorer. On the PC, you may be protected if you keep your security features updated. Some people believe that getting rid of Internet Explorer and going to Mozilla Firefox, the most popular alternative, is a better solution.79 Another option is Opera. Internet access providers such as AOL and Earthlink offer scan-and-removal tools, but you can also employ specialized antispyware soft- ware. Some of the good ones appear below. (• See Panel 2.40. ) One big problem with spyware is that overburdened PCs begin to run more slowly as the hard drives cope with random and uncontrollable processes. If none of the antispyware works, you will need to wipe your hard drive clean of programs and data and start from scratch—a complicated matter that we discuss in Chapter 4. Program Name Site Ad Aware www.lavasoftusa.com/software/adaware AntiSpyware http://us.mcafee.com PC Tools Software www.pctools.com/spyware- doctor/?refϭgoogle77 Pest Patrol www.ca.com/products/pestpatrol Spybot Search & Destroy http://spywaresoftware.net SpyCatcher www.tenebril.com SpyCop www.spywareinfo.com/downloads.php Spy Sweeper www.webroot.com panel 2.40 Some antispyware programs You may not be able to completely avoid spyware, but doing the following may help: • Be careful about free and illegal downloads: Be choosy about free downloads, as from Grokster and Kazaa, or illegal downloads of songs, movies, or TV shows. Often they use a form of spyware. File-sharing programs, which are popular with students, often contain spyware. Porno- graphic websites also are common carriers of spyware. • Don’t just say “I agree”; read the fine print: Sites that offer games, music-sharing videos, screen savers, and weather data often are paid to distribute spyware. When you install their software, you might be asked to agree to certain conditions. If you simply click “I agree” without reading the fine print, you may be authorizing installation of spyware. “People have gotten in the habit of clicking next, next, next, without reading” when they install software, says a manager at McAfee Inc., which tracks spyware and viruses.80 • Beware of unsolicited downloads: If while you’re surfing the net your browser warns you a file is being down- loaded and you’re asked if you choose to accept, keep clicking no until the messages stop. PRACTICAL ACTION Tips for Avoiding Spyware
  133. The Internet & the World Wide Web 107 No matter

    how much students may be able to rationalize cheating in college—for example, trying to pass off someone else’s term paper as their own (plagiarism)—ignorance of the conse- quences is not an excuse. Most instructors announce the penalties for cheating at the beginning of the course— usually a failing grade in the course and possible suspen- sion or expulsion from school. Even so, probably every student becomes aware before long that the World Wide Web contains sites that offer term papers, either for free or for a price. Some dishonest stu- dents may download papers and just change the author’s name to their own. Others are more likely just to use the papers for ideas. Perhaps, suggests one article, “the fear of getting caught makes the online papers more a diversion than an invitation to wide-scale plagiarism.”81 How the Web Can Lead to Plagiarism Two types of term-paper websites are as follows: • Sites offering papers for free: Such a site requires that users fill out a membership form and then provides at least one free student term paper. (Good quality is not guaranteed, since free-paper mills often subsist on the submissions of poor students, whose contributions may be subliterate.) • Sites offering papers for sale: Commercial sites may charge $6–$10 a page, which users may charge to their credit card. (Expense is no guarantee of quality. More- over, the term-paper factory may turn around and make your $350 custom paper available to others—even fellow classmates working on the same assignment—for half the price.) How Instructors Catch Cheaters How do instructors detect and defend against student pla- giarism? Professors are unlikely to be fooled if they tailor term-paper assignments to work done in class, monitor stu- dents’ progress—from outline to completion—and are alert to papers that seem radically different from a student’s past work. One professor of art history requires that papers in his classes be submitted electronically, along with a list of World Wide Web site references. “This way I can click along as I read the paper. This format is more efficient than run- ning around the college library, checking each footnote.”82 Just as the internet is the source of cheating, it is also a tool for detecting cheaters. Search programs make it possible for instructors to locate texts containing identi- fied strings of words from the millions of pages found on the web. Thus, a professor can input passages from a stu- dent’s paper into a search program that scans the web for identical blocks of text. Indeed, some websites favored by instruc- tors build a database of papers over time so that students can’t recycle work previously handed in by others. One system, Turnitin’s Orig- inality Checking, can lock on to a stolen phrase as short as eight words. It can also identify copied material even if it has been changed slightly from the original. Another pro- gram professors use is the Self-Plagiarism Detection Tool, or SplaT. How the Web Can Lead to Low-Quality Papers William Rukeyser, coordinator for Learning in the Real World, a nonprofit information clearinghouse, points out another problem: The web enables students “to cut and paste together reports or presentations that appear to have taken hours or days to write but have really been assembled in minutes with no actual mastery or understanding by the student.”83 Philosophy professor David Rothenberg, of New Jersey Institute of Technology, reports that as a result of students’ doing more of their research on the web, he has seen “a disturbing decline in both the quality of the writing and the originality of the thoughts expressed.”84 How does an instructor spot a term paper based primarily on web research? Rothenberg offers four clues: • No books cited: The student’s bibliography cites no books, just articles or references to websites. Sadly, says Rothenberg, “one finds few references to careful, in-depth commentaries on the subject of the paper, the kind of analysis that requires a book, rather than an article, for its full development.” • Outdated material: A lot of the material in the bibliog- raphy is strangely out of date, says Rothenberg. “A lot of stuff on the web that is advertised as timely is actually at least a few years old.” • Unrelated pictures and graphs: Students may inter- sperse the text with a lot of impressive-looking pictures and graphs that actually bear little relation to the pre- cise subject of the paper. “Cut and pasted from the vast realm of what’s out there for the taking, they masquer- ade as original work.” • Superficial references: “Too much of what passes for information [online] these days is simply advertising for information,” points out Rothenberg. “Screen after screen shows you where you can find out more, how you can connect to this place or that.” Other kinds of information are detailed but often superficial: “pages and pages of federal documents, corporate propaganda, snippets of commentary by people whose credibility is difficult to assess.” EXPERIENCE BOX Web Research, Term Papers, & Plagiarism
  134. 108 Chapter 2 access point (p. 58) Station that sends

    and receives data to and from a Wi-Fi network. Why it’s important: Many pub- lic areas, such as airports and hotels, offer hot spots, or access points, that enable Wi-Fi-equipped users to go online wirelessly. adware (p. 105) Also called pop-up generators: kind of spy- ware that tracks web surfing or buying online. Why it’s impor- tant: Adware enables marketers to send you targeted and unsolicited pop-up and other ads. animation (p. 94) The rapid sequencing of still images to create the appearance of motion, as in a cartoon. Why it’s important: Animation is a component of multimedia; it is used in online video games as well as in moving banners displaying sports scores or stock prices. applets (p. 93) Small programs that can be quickly down- loaded and run by most browsers. Why it’s important: Web pages contain links to applets, which add multimedia capabilities. B2B (business-to-business) commerce (p. 97) Electronic sale or exchange of goods and services directly between compa- nies, cutting out traditional intermediaries. Why it’s impor- tant: Expected to grow even more rapidly than other forms of e-commerce, B2B commerce covers an extremely broad range of activities, such as supplier-to-buyer display of inventories, provision of wholesale price lists, and sales of closed-out items and used materials—usually without agents, brokers, or other third parties. backbones See internet backbone. bandwidth (p. 52) Also known as channel capacity; expression of how much data—text, voice, video, and so on—can be sent through a communications channel in a given amount of time. Why it’s important: Different communications systems use dif- ferent bandwidths for different purposes. The wider the band- width, the faster the data can be transmitted. bits per second (bps) (p. 52) Eight bits make up a character. Why it’s important: Data transfer speeds are measured in bits per second. blog (p. 96) Short for web log, an internet journal. Blogs are usually updated daily; they reflect the personality and views of the blogger. Why it’s important: Blogs are becoming important sources of current information. blogosphere (p. 96) The total universe of blogs. Why it’s important: The blogosphere has allowed the rise of a new breed of homegrown journal writers and diarists to chronicle life as it happens. broadband (p. 52) Very high speed connection. Why it’s important: Access to information is much faster than access with traditional phone lines. browser See web browser. browser hijacker (p. 105) A damaging kind of spyware that changes settings in your browser without your knowledge. Why it’s important: This spyware can reset your home page to a porn site or obscure search engine or change your home page and replace it with another web page. cable modem (p. 57) Device connecting a personal computer to a cable-TV system that offers an internet connection. Why it’s important: Cable modems transmit data faster than do standard modems. client (p. 60) Computer requesting data or services. Why it’s important: Part of the client/server network, in which the server is a central computer supplying data or services requested of it to the client computer. communications satellite (p. 57) Space station that transmits radio waves called microwaves from earth-based stations. Why it’s important: An orbiting satellite contains many communica- tions channels and receives signals from ground microwave stations anywhere on earth. cookies (p. 104) Little text files, such as your log-in name, password, and preferences, that are left on your hard disk by some websites you visit; the websites retrieve the data when you visit again. Why it’s important: Cookies can be beneficial in that they put you right into a website without having to enter your password. However, some websites sell the information associated with your ID number on their servers to market- ers, who might use it to target you as a customer for their products. dial-up connection (p. 53) Use of a telephone modem to con- nect a computer to the internet. Why it’s important: Cheapest means of online connection and available everywhere. domain (p. 66) A location on the internet, the particular web server. Why it’s important: A domain name is necessary for sending and receiving email and for many other internet activities. download (p. 53) To transmit data from a remote computer to a local computer. Why it’s important: Downloading enables users to save files on their own computers for later use, which reduces the time spent online and the corresponding charges. DSL (digital subscriber line) (p. 55) A hardware and software technology that uses regular phone lines to transmit data in megabits per second. Why it’s important: DSL connections are much faster than regular modem connections. e-commerce (electronic commerce) (p. 97) Conducting busi- ness activities online. Why it’s important: E-commerce not only is widening consumers’ choice of products and services but is also creating new businesses and compelling established busi- nesses to develop internet strategies. SUMMARY
  135. 109 The Internet & the World Wide Web email program

    (p. 82) Also called email client software; enables you to send email by running email software on your computer, which interacts with an email server at your internet access provider to send and receive email. Why it’s important: With this standard email program, unlike web-based email, you can easily integrate your email with other applications, such as calendar, task list, and contact list. FAQs (frequently asked questions) (p. 91) Guides that explain expected norms of online behavior for a particular group. Why it’s important: Users should read a group’s/site’s FAQs to know how to proceed properly. flaming (p. 91) Writing an online message that uses deroga- tory, obscene, or inappropriate language. Why it’s important: Flaming should be avoided. It is a form of public humiliation inflicted on people who have failed to read FAQs or have oth- erwise not observed netiquette (although it can happen just because the sender has poor impulse control and needs a course in anger management). frame (p. 72) An independently controllable section of a web page. Why it’s important: A web page designer can divide a page into separate frames, each with different features or options. FTP (File Transfer Protocol) (p. 88) Method whereby you can connect to a remote computer called an FTP site and trans- fer publicly available files to your own microcomputer’s hard disk via TCP/IP over the internet. Why it’s important: The free files offered cover nearly anything that can be stored on a computer: software, games, photos, maps, art, music, books, statistics. gigabits per second (Gbps) (p. 52) 1 billion bits per second. Why it’s important: Gbps is a common measure of data trans- mission speed. hit (p. 74) Site that a search engine returns after running a keyword search. Why it’s important: The web pages, or hits, that a search engine returns after you type in a keyword are the beginning of the types of information you are looking for. home page (p. 65) Also called welcome page; web page that, somewhat like the title page of a book, identifies the website and contains links to other pages at the site. Why it’s impor- tant: The first page you see at a website is the home page. host computer See server. hotspot (p. 58) Public access to Wi-Fi networks. Why it’s important: Hotspots in airports, hotels, and the like enable wireless-equipped users to go online without a physical connection. hypertext links (p. 68) Also called hyperlinks, hotlinks, or just links; connections to other documents or web pages that contain related information. Why it’s important: Allows a word or phrase in one document to become a connection to a docu- ment in a different place. hypertext markup language (HTML) (p. 68) Set of special instructions (called “tags” or “markups”) used to specify web document structure, formatting, and links to other documents. Why it’s important: HTML enables the creation of web pages. HyperText Transfer Protocol (HTTP) (p. 66) Communications rules that allow browsers to connect with web servers. Why it’s important: Without HTTP, files could not be transferred over the web. individual search engine (p. 74) Type of internet search tool that compiles its own searchable database on the web. You search for information by typing one or more keywords, and the search engine then displays a list of web pages, or “hits,” that contain those key words, ordered from most likely to least likely to contain the information you want. Why it’s important: Examples of this kind of search engine are Ask, Bing, Google, and Yahoo!, as well as AllTheWeb, Gigablast, and Lycos. These are the search engines most commonly used by individual users. instant messaging (IM) (p. 87) Service that enables any user on a given email system to send a message and have it pop up instantly on the screen of anyone else logged onto that system. Why it’s important: People can initiate online typed conversations in real time. As they are typed, the messages appear on the display screen in a small window. internet2 (p. 62) A cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks. Why it’s important: Internet2 creates a kind of “virtual university” by advancing videoconferencing, research, and academic collaboration. internet access provider (p. 53) Regional, national, or wireless organization or business that connects you to the internet. Why it’s important: This organization is necessary to connect people to the internet. internet backbone (p. 61) High-speed, high-capacity transmission lines that use the newest communications tech- nology. Why it’s important: The internet backbone transmits data across the internet. Internet Corporation for Assigned Names and Numbers (ICANN) (p. 63) Global, private-sector, nonprofit corporation that was established to regulate human-friendly internet domain names, those addresses ending with. com, .org, .net, and so on, that overlie IP addresses and identify the website type. Why it’s important: This organization helps humans organize and understand websites. Internet Protocol (IP) address (p. 62) Uniquely identifies every computer and device connected to the internet; con- sists of four sets of numbers between 0 and 255 separated by decimals—for example, 1.160.10.240. This address is similar to a street address. However, street addresses rarely change, but IP addresses often do. Why it’s important: Each time you connect to your ISP, the ISP will assign your computer a new IP address, called a dynamic IP address, for your online session. When you request data from the internet, it is transmitted to your computer’s IP address. When you disconnect, your ISP frees up the IP address you were using and reassigns it to another user.
  136. 110 Chapter 2 internet service provider (ISP) (p. 58) Company

    that con- nects you through your communications line to its servers, or central computer, which connects you to the Internet via another company’s network access points. Why it’s important: Unless they subscribe to an online information service (such as AOL) or have a direct network connection (such as a T1 line), microcomputer users need an ISP to connect to the internet. internet telephony (p. 92) Also known as VoIP phoning, short for Voice over Internet Protocol: using the internet to make phone calls, either one-to-one or for audioconferencing. Why it’s important: Long-distance phone calls by this means are surprisingly inexpensive. ISDN (Integrated Services Digital Network) (p. 55) Hardware and software that allow voice, video, and data to be communi- cated over traditional copper-wire telephone lines (POTS). Why it’s important: ISDN provides faster data transfer speeds than do regular modem connections. Java (p. 94) Complex programming language that enables pro- grammers to create animated and interactive web pages using applets. Why it’s important: Java applets enhance web pages by playing music, displaying graphics and animation, and pro- viding interactive games. key logger (p. 106) Also known as keystroke logger; type of spyware that can record each character you type and transmit that information to someone else on the internet. Why it’s important: A key logger can make it possible for strangers to learn your passwords and other information. keyword (p. 72) A keyword is the subject word or words that refer to the topic you wish to find. Why it’s important: You must use keywords to research topics on the internet. kilobits per second (Kbps) (p. 52) 1,000 bits per second. Why it’s important: Kbps is a common measure of data transfer speed. The speed of a modem that is 28,800 bps might be expressed as 28.8 Kbps. listserv (p. 89) Automatic mailing-list server that sends email to subscribers who regularly participate in discussion topics. To subscribe, the user sends an email to the list-server moderator and asks to become a member, after which he or she automati- cally receives email messages from anyone who responds to the server. Why it’s important: Anyone connected to the internet can subscribe to listserv services. Subscribers receive information on particular subjects and can post email to other subscribers. log on (p. 60) To make a connection to a remote computer. Why it’s important: Users must be familiar with log-on procedures to go online. matchmaking website (p. 98) Also called dating website; an online forum that people may join in hopes of meeting com- patible potential mates. Why it’s important: Matchmaking websites allow people with similar political or religious beliefs, different ethnicities, mature adults, and so on to find others with similar characteristics. media-sharing website (p. 99) Type of online social network, such as YouTube, Flickr, and Shutterfly, that allows members to share media. Why it’s important: Members can share their photos, videos, and music with others with great ease and convenience. megabits per second (Mbps) (p. 52) 1 million bits per second. Why it’s important: Mbps is a common measure of data trans- mission speed. metasearch engine (p. 75) Type of internet search tool that allows you to search several search engines simultaneously. Why it’s important: A metasearch engine enables you to expand the range of your search. modem (p. 53) Device that sends and receives data over telephone lines to and from computers. Why it’s important: The modem provides a means for computers to communicate with one another using the standard copper-wire telephone network, an analog system that was built to transmit the human voice but not computer signals. narrowband (p. 53) Low-bandwidth connection, such as dial-up (telephone). Why it’s important: Narrowband connect- ing technology is inexpensive and widely available. netiquette (p. 90) “Network etiquette,” or appropriate online behavior. Why it’s important: In general, netiquette has two basic rules: (1) Don’t waste people’s time, and (2) don’t say anything to a person online that you wouldn’t say to his or her face. network access point (NAP) (p. 61) A routing computer at a point on the internet where several connections come together. Why it’s important: NAPs connect internet service providers to the internet backbone. newsgroup (p. 89) Also called forum; giant electronic bulletin board on which users conduct written discussions about a specific subject. Why it’s important: There are thousands of newsgroup forums—which charge no fee—and they cover an amazing array of topics. newsreader (p. 89) Program included with most browsers that allows users to access a newsgroup and read or type mes- sages. Why it’s important: Users need a newsreader to partici- pate in a newsgroup. packet (p. 62) Fixed-length block of data for transmission. Why it’s important: TCP/IP breaks data in a message into separate packets, which allows the message to be split up and its parts sent by separate routes yet still all wind up in the same place. password (p. 60) A secret word or string of characters that enables you to log on, or make a connection, to a remote com- puter. Why it’s important: The password helps keep a computer system secure against intruders. pharming (p. 104) A type of phishing in which malicious soft- ware is implanted on a victim’s computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. Why it’s important: The purpose is to trick people into sharing their personal, financial, or password data.
  137. 111 The Internet & the World Wide Web phishing (p.

    104) Short for password harvesting fishing; (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. Why it’s important: The purpose of the fraudulent sender is to “phish” for, or entice people to share, their personal, financial, or password data. plug-in (p. 93) Program that adds a specific feature to a browser, allowing it to play or view certain files. Why it’s impor- tant: To fully experience the contents of many web pages, you need to use plug-ins. podcasting (p. 97) Recording of internet radio or similar inter- net audio programs. Why it’s important: Podcasting is another expression of personalized media. point of presence (POP) (p. 61) Collection of modems and other equipment in a local area. Why it’s important: To avoid making their subscribers pay long-distance phone charges, ISPs provide POPs across the country. The POP acts as a local gateway to the ISP’s network. pop-up ads (p. 105) Form of online advertising in which, when you visit certain websites, a new window opens, or “pops up,” to display advertisements. Why it’s important: Pop-up ads are one form of the nuisance known as spyware . POTS (plain old telephone system) (p. 54) Traditional kind of connection to the internet. Why it’s important: Slowest method of connecting to the internet. protocol (p. 62) Set of communication rules for exchanging information. Why it’s important: Transmission Control Proto- col/Internet Protocol (TCP/IP) enables all computers to use data transmitted on the internet. HyperText Transfer Protocol (HTTP) provides the communication rules that allow browsers to connect with web servers. push technology (p. 95) Software that automatically down- loads information to your computer, as opposed to pull technology, in which you go to a website and pull down the information you want. Why it’s important: With little effort, users can obtain information that is important to them. radio buttons (p. 71). An interactive tool displayed as little circles in front of options; selecting an option with the mouse places a dot in the corresponding circle. Why it’s important: Radio buttons are one way of interacting with a web page. real-time chat (RTC) (p. 90) Typed discussion (“chat”) among participants who are online at the same time; it is just like a telephone conversation, except that messages are typed rather than spoken. Why it’s important: RTC provides a means of immediate electronic communication. RSS newsreaders (p. 95) Also called RSS aggregators; programs that scour the web, sometimes hourly or more frequently, and pull together in one place web “feeds” from several websites. Why it’s important: RSS newsreaders give people access to a whole new universe of content and have led to the creation of the blogosphere. scroll arrows (p. 71) Small up/down and left/right arrows located to the bottom and side of your screen display. Why it’s important: Clicking on scroll arrows with your mouse pointer moves the screen so that you can see the rest of the web page, or the content displayed on the screen. scrolling (p. 72) Moving quickly upward or downward through text or some other screen display, using the mouse and scroll arrows (or the arrow keys on the keyboard). Why it’s impor- tant: Normally a computer screen displays only part of, for example, a web page. Scrolling enables users to view an entire document, no matter how long. search (text) box (p. 71) Fill-in text box. Why it’s important: Allows interaction with a web page. search engine (p. 74) Search tool that allows you to find spe- cific documents through keyword searches and menu choices, in contrast to directories, which are lists of websites classified by topic. Why it’s important: Search engines enable users to find websites of specific interest or use to them. search hijacker (p. 105) A damaging kind of spyware that can intercept your legitimate search requests made to real search engines and return results from phony search services. Why it’s important: Phony search services may send you to sites they run. search service (p. 74) Organization that maintains databases accessible through websites. Why it’s important: A search ser- vice helps you find information on the internet. server (p. 60) Central computer supplying data or services. Why it’s important: Part of the client/server network, in which the central computer supplies data or services requested of it to the client computer. site (p. 65) See website. social-network aggregator (p. 100) Also called social aggre- gator; this technology collects content from all of a user’s vari- ous social network profiles into one place. Why it’s important: Aggregators such as FriendFeed and Spokeo are “friend track- ing services” that allow members to track friends and share their other social network activities. social-networking website (p. 99) An online community that allows members to keep track of their friends and share ideas and media. Why it’s important: Social-networking websites such as MySpace, Facebook, and LinkedIn allow members to easily expand their circle of acquaintances and to exchange photos, videos, music, stories, and ideas with each other. spam (p. 102) Unsolicited email in the form of advertising or chain letters. Why it’s important: Spam filters are available that can spare users the annoyance of receiving junk mail, ads, and other unwanted email. spider (p. 74) Also known as crawler, bot, or agent; special program that crawls through the World Wide Web, following links from one web page to another. Why it’s important: A spi- der indexes the words on each site it encounters and is used to compile the databases of a search service.
  138. 112 Chapter 2 spoofing (p. 104) The forgery of an

    email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Why it’s important: Spoofing is one of the main tactics used by spammers to induce or trick recipients into responding to their solicitations. spyware (p. 105) Deceptive software that is surreptitiously installed on a computer via the web. Why it’s important: Once spyware is installed on your hard disk, it allows an outsider to harvest confidential information, such as keystrokes, pass- words, or your email address. streaming audio (p. 95) Process of downloading audio in which you can listen to the file while the data is still being down- loaded to your computer. Why it’s important: Users don’t have to wait until the entire audio is downloaded to the hard disk before listening to it. streaming video (p. 94) Process of downloading video in which the data is transferred in a continuous flow so that you can begin viewing a file even before the end of the file is sent. Why it’s important: Users don’t have to wait until the entire video is downloaded to the hard disk before watching it. subject directory (p. 75) Type of search engine that allows you to search for information by selecting lists of categories or subjects. Why it’s important: Subject directories allow you to look for information by categories such as “Business and Com- merce” or “Arts and Humanities.” surf (p. 64) To explore the web by using your mouse to move via a series of connected paths, or links, from one location, or website, to another. Surfing requires a browser. Why it’s impor- tant: Surfing enables you to easily find information on the web that’s of interest to you. 3G (third generation) (p. 58) High-speed wireless technology that does not need access points because it uses the existing cellphone system. Why it’s important: The technology is found in many new smartphones and PDAs that are capable of deliv- ering downloadable video clips and high-resolution games. T1 line (p. 56) Traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. Why it’s important: High-capacity T1 lines are used at many corporate, government, and academic sites; these lines pro- vide greater data transmission speeds than do regular modem connections. tags (p. 80) Do-it-yourself labels that people can put on any- thing found on the internet, from articles to photos to videos. Why it’s important: A tag is more powerful than a bookmark, because tags can be shared easily with other people. Transmission Control Protocol/Internet Protocol (TCP/ IP) (p. 62) Protocol that enables all computers to use data transmitted on the internet by determining (1) the type of error checking to be used, (2) the data compression method, if any, (3) how the sending device will indicate that it has fin- ished sending a message, and (4) how the receiving device will indicate that it has received a message. TCP/IP breaks data into packets, which are the largest blocks of data that can be sent across the internet (less than 1,500 characters, or 128 kilobytes). IP is used to send the packets across the internet to their final destination, and TCP is used to reassemble the packets in the correct order. Why it’s important: Internet com- puters use TCP/IP for all internet transactions, from sending email to downloading stock quotes or pictures off a friend’s website. upload (p. 53) To transmit data from a local computer to a remote computer. Why it’s important: Uploading allows users to easily exchange files over networks. URL (Uniform Resource Locator) (p. 65) String of characters that points to a specific piece of information anywhere on the web. A URL consists of (1) the web protocol, (2) the name of the web server, (3) the directory (or folder) on that server, and (4) the file within that directory (perhaps with an extension such as html or htm ). Why it’s important: URLs are necessary to dis- tinguish among websites. Usenet (p. 89) Worldwide network of servers that can be accessed through the internet. Why it’s important: News- groups take place on Usenet. VoIP phoning. See internet telephony. Web 2.0 (p. 98) Defined as the move toward a more social, collaborative, interactive, and responsive World Wide Web. Why it’s important: As websites have become easier to use, they allow users to better harness the collective power of people, which has led to a “social web” or “social media,” involving blogs, wikis, social networks, and media sharing. The common theme of all these is human interaction. web-based email (p. 82) Type of email in which you send and receive messages by interacting via a browser with a website. Why it’s important: Unlike standard email, web-based email allows you to easily send and receive messages while traveling anywhere in the world and to use any personal computer and browser to access your email. web browser (browser) (p. 64) Software that enables users to locate and view web pages and to jump from one page to another. Why it’s important: Users can’t surf the web with- out a browser. Examples of browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla Firefox, Opera, and Apple Macintosh Safari. webcasting (p. 95) Service, based on push technology, in which customized text, video, and audio are sent to the user automatically on a regular basis. Why it’s important: Users choose the categories, or the channels, of websites that will automatically send updated information. Thus, webcasting saves time because users don’t have to go out searching for the information. web page (p. 65) Document on the World Wide Web that can include text, pictures, sound, and video. Why it’s important: A website’s content is provided on web pages. The starting page is the home page. web portal (p. 72) Type of gateway website that functions as an “anchor site” and offers a broad array of resources and ser- vices, online shopping malls, email support, community forums,
  139. 113 The Internet & the World Wide Web current news

    and weather, stock quotes, travel information, and links to other popular subject categories. The most popu- lar portals are America Online, Yahoo!, Google, Microsoft Net- work, Netscape, and Lycos. Why it’s important: Web portals provide an easy way to access the web. website (site) (p. 65) Location of a web domain name in a computer somewhere on the internet. Why it’s important: Websites provide multimedia content to users. Wi-Fi (p. 58) Short for “wireless fidelity.” The name given to any of several standards—so-called 802.11 standards—set by the Institute of Electrical and Electronic Engineers for wire- less transmission. Why it’s important: Wi-Fi enables people to use their Wi-Fi-equipped laptops to go online wirelessly in certain areas such as airports that have public access to Wi-Fi networks. window (p. 87) A rectangular area on a computer dis- play screen that contains a document or activity. Why it’s important: In instant messaging, a window allows a user to exchange IM messages with others almost simultaneously while operating other programs. wireless network (p. 58) Network that uses radio waves to transmit data, such as Wi-Fi. Why it’s important: Wireless net- works enable people to access the internet without having a cabled or wired connection, using wireless-equipped laptops and smart cellphones. XML (extensible markup language) (p. 96) A Web-document tagging and formatting language that two computers can use to exchange information. Why it’s important: XML is an improvement over HTML and enables the creation of RSS newsreaders. CHAPTER REVIEW Self-Test Questions 1. Today’s data transmission speeds are measured in ________, Kbps, ________, and ________ . 2. A(n) ________ , ________ connects a personal com- puter to a cable-TV system that offers an internet connection. 3. A space station that transmits data as microwaves is a ________ . 4. A company that connects you through your commu- nications line to its server, which connects you to the internet, is a(n) ________ . 5. A rectangular area on the computer screen that con- tains a document or displays an activity is called a(n) ________ . 6. ________ is writing an online message that uses derog- atory, obscene, or inappropriate language. 7. A(n) ________ is software that enables users to view web pages and to jump from one page to another. 8. A computer with a domain name is called a(n) ________. 9. ________ comprises the communications rules that allow browsers to connect with web servers. 10. A(n) ________ is a program that adds a specific feature to a browser, allowing it to play or view certain files. 1 1. Unsolicited email in the form of advertising or chain let- ters is known as ________ . 12. The expression of how much data—text, voice, video, and so on—can be sent through a communications channel in a given amount of time is known as ________ . 13. A(n) ________ is a string of characters that points to a specific piece of information somewhere on the web. 14. Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called ________ . 15. Using trusted institutional names to elicit confidential information is called ________ . 16. The kind of spyware that can record each character you type and transmit that information to someone else on the internet, making it possible for strangers to learn your passwords and other information, is called . Multiple-Choice Questions 1. Kbps means how many bits per second? a. 1 billion b. 1 thousand c. 1 million d. 1 hundred e. 1 trillion s t a g e 1 LEARNING STAGE 1 LEARNING MEMORIZATION “I can recognize and recall information.” _____
  140. 114 Chapter 2 2. A location on the internet is

    called a a. network. b. user ID. c. domain. d. browser. e. web. 3. In the email address [email protected], Kim_ Lee is the a. domain. b. URL. c. site. d. user ID. e. location. 4. Which of the following is not one of the four compo- nents of a URL? a. web protocol b. name of the web server c. name of the browser d. name of the directory on the web server e. name of the file within the directory 5. Which of the following is the fastest method of data transmission? a. ISDN b. DSL c. modem d. T1 line e. cable modem 6. Which of the following is not a netiquette rule? a. Consult FAQs. b. Flame only when necessary. c. Don’t shout. d. Avoid huge file attachments. e. Avoid sloppiness and errors. 7. Which protocol is used to retrieve email messages from the server to your computer? a. HTTP (HyperText Transfer Protocol) b. SMTP (Simple Mail Transfer Protocol) c. POP3 (Post Office Protocol version 3) d. POP (point of presence) 8. Who owns the internet? a. Microsoft b. IBM c. Apple d. U.S. government e. No one owns the internet; the components that make up the Internet are owned and shared by thousands of public and private entities. 9. Each time you connect to your ISP, it will assign your computer a new address called a(n) a. domain. b. IP address. c. plug-in. d. POP. e. URL (Universal Resource Locator). 10. ISPs that don’t run their own backbones connect to an internet backbone through a a. NAP network access point. b. web portal. c. web browser. d. URL. e. TCP/IP. 1 1. Which of the following is not a protocol? a. TCP/IP b. IE c. HTTP d. SMTP 12. The sending of phony email that pretends to be from a credit-card company or bank, luring you to a website that attempts to obtain confidential information from you, is called a. spoofing. b. phishing. c. spamming. d. keylogging. e. cookies. True/False Questions T F 1. POP3 is used for sending email, and SMTP is used for retrieving email. T F 2. A dial-up modem is an ISP (internet service provider). T F 3. Replying to spam email messages with the state- ment “remove” will always get spammers to stop sending you unsolicited email. T F 4. All computer communications use the same bandwidth. T F 5. A T1 line is the slowest but cheapest form of internet connection. T F 6. A dynamic IP address gives you faster internet access than a static IP address does. T F 7. A bookmark lets you return to a favorite website quickly. T F 8. Radio buttons are used for listening to radio sta- tions on the internet. T F 9. Spoofing means using fake email sender names. T F 10. Hypertext refers to text presented with very large letters.
  141. 115 The Internet & the World Wide Web Short-Answer Questions

    1. Name three methods of data transmission that are faster than a regular modem connection. 2. What does log on mean? 3. What is netiquette, and why is it important? 4. Briefly define bandwidth. 5. Many web documents are “linked.” What does that mean? 6. Compare and contrast a cable modem service to a DSL service. 7. Explain the basics of how the internet works. 8. What expanded functions does IMAP (Internet Message Access Protocol) have? 9. Briefly explain what TCP/IP does. 10. Why was ICANN established? 1 1. What’s the difference between a dynamic IP address and a static IP address? 12. Explain what a blog is. 13. State your answer to a person who asks you the ques- tion “Who owns the internet?” 14. What is B2B commerce? 15. List and briefly describe three kinds of spyware. s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Knowledge in Action 1. Distance learning uses electronic links to extend col- lege campuses to people who otherwise would not be able to take college courses. Are you, or is someone you know, involved in distance learning? If so, research the system’s components and uses. What hardware and software do students need in order to communicate with the instructor and classmates? What courses are offered? Discuss the pros and cons of distance learning compared to classroom-based learning. 2. It’s difficult to conceive how much information is avail- able on the internet and the web. One method you can use to find information among the millions of docu- ments is to use a search engine, which helps you find web pages on the basis of typed keywords or phrases. Use your browser to go to the Google home page, and click in the Search box. Type the keywords “personal computers”; then click on Google Search, or press the Enter key. How many results did you get? 3. As more and more homes get high-speed broadband internet connections, the flow of data will become exponentially faster and will open up many new possi- bilities for sharing large files such as video. What types of interactive services can you envision for the future? 4. Draw a diagram of what happens when you log onto your ISP; include all the connections you think possible for your situation. 5. How do the latest cellphones incorporate the internet into their functions? What functions could be improved? Have any of these extra functions affected your daily life? 6. How has the internet affected your life? Start keeping a list. 7. Email and instant messaging (IM) are ways of sending text messages back and forth to other people on the internet. They seem very similar: in both, you compose a message, and when it’s ready, you send it; and when someone else sends something to you, you receive it on your device and can read it. But in practice, email and IM can be surprisingly different; each has its own rhythm, its own strengths and weaknesses, its own sociology, its own etiquette. Instant messaging is like using the telephone, whereas email is more like corresponding by letter. As you use email and IM during the course of the term, watch for differences between them. Which medium is more appropriate for which kinds of rela- tionships and communications? Which medium is more stressful to use? Which takes more time? Which is more convenient for you? Which one is more useful for getting real work done? Which medium would you use if you knew that whatever you wrote was eventually going to be published in a book? If you were restricted to using only one of these communications methods, which would it be? 8. Internet service providers (ISPs) often place limits on upload speeds, thus making it take much longer to send (upload) a large file than it would take to receive (down- load) a file of the same size from someone else. Do a comparison between upload and download speeds on your internet connection, perhaps by emailing yourself a file large enough to allow you to notice the difference. Why do you think there is a difference? (Consider both technological and economic factors.) 9. Imagine that an elderly relative wants to start using the internet for the first time. You want to help the person get started, but you need to be careful not to s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
  142. 116 Chapter 2 overwhelm your relative with more information than

    he or she can use. What three or four things would you tell and show your relative first? What things do you think will be hardest for him or her to master? How do you think using the internet is likely to change this person’s life? If possible, seek out such a relative or neighbor and actually introduce him or her to the internet. 10. As we have discussed in this chapter, the internet is both a goldmine and a minefield. There are vast riches of information, entertainment, education, and com- munication to be found, but there are also snoopers, spam, spoofing, phishing, spyware, adware, browser hijackers, and key loggers. What should you do to avoid these threats? 11. Some websites require you to register before you are allowed to use them. Others require that you have a paid membership. Others allow limited free access to everyone but require payment for further content. Why do you think different sites adopt these different atti- tudes toward use of their material? Web Exercises 1. Some websites go overboard with multimedia effects, while others don’t include enough. Locate a website that you think makes effective use of multimedia. What is the purpose of the site? Why is the site’s use of multi- media effective? Take notes, and repeat the exercise for a site with too much multimedia and one with too little. 2. If you have never done a search before, try this: Find out how much car dealers pay for your favorite cars, what they charge consumers for them, and what you should know about buying a new car. A company called Edmunds publishes a magazine with all that information, but you can get the same information on its website for free. Using the Google search engine ( www.google.com ), type “automobile buyer’s guide” and Edmunds in the search box, and hit the Google Search button. How many entries did you get? Click on a link to the Edmunds website. Explore the site, and answer the questions at the beginning of this exercise. 3. Ever wanted your own dot-com in your name? Visit these sites to see if your name is still available: www.register.com www.namezero.com www.domainname.com www.checkdomain.com/ www.domaindirect.com/ 4. Interested in PC-to-phone calls through your internet connection? Visit these sites and check out their services: http://voice.yahoo.com/ www.net2phonedirect.com www.iconnecthere.com www.skype.com www.voip.com/ 5. HTTP (HyperText Transfer Protocol) on the World Wide Web isn’t the only method of browsing and transfer- ring data. FTP is the original method and is still a useful internet function. To use FTP, you’ll need an FTP client software program, just as you need a web browser to surf the web. Download one of these shareware clients and visit its default FTP sites, which come preloaded: CuteFtp www.globalscape.com WS_FTP www.ipswitch.com FTP Voyager www.ftpvoyager.com SmartFTP www.smartftp.com FileZilla http://filezilla-project.org/ You will need an FTP client program to upload files to a server if you ever decide to build a website. Some online website builders have browser uploaders, but the conventional method has always been FTP. On some Macintosh computers, an FTP function is built into the Mac OS Finder (for downloading only—you have to use an FTP client to upload). 6. Video chat extensions to chat software are now gener- ally available, and they really constitute at least two- party videoconferencing. These extensions are available through AIM, Yahoo Messenger, MSN Messenger, and Apple’s iChat. All you need is a camera, a microphone, and an internet connection. Check out these sites and decide if this type of “video chat” interests you. 7. Visit these websites to learn more about creating web- sites with HTML: www.lissaexplains.com www.make-a-web-site.com www.htmlgoodies.com/primers/html/ www.htmlcodetutorial.com/ www.w3schools.com/html/default.asp Or do an internet search for “html primer,” “learn html,” or “html tutorial.” 8. To learn more about internet conventions, go to: http://members.tripod.com/~paandaa/smiley.htm http://research.microsoft.com/~mbj/Smiley/Smiley.html http://piology.org/smiley.txt www.cygwin.com/acronyms/ 9. Some hobbies have been dramatically changed by the advent of the World Wide Web. Particularly affected are the “collecting” hobbies, such as stamp collecting, coin collecting, antique collecting, memorabilia collecting, plate collecting, and so forth. Choose some such hobby that you know something about or have some interest in. Run a web search about the hobby and see if you can find: a. a mailing list about the hobby. b. an auction site that lists rare items and allows you to bid on them. c. a chat room or other discussion forum allowing enthusiasts to gather and discuss the hobby. d. a site on which someone’s formidable collection is beautifully and proudly displayed. 10. When the web first came into widespread use, the most popular search engine was AltaVista. For several years there were a variety of search engines available, but in recent years one search engine, Google, has become predominant and the word googling has entered the
  143. 117 The Internet & the World Wide Web language as

    a term that means “to use a search engine to find information.” Visit http://searchenginewatch.com/links/ for a list of many alternative search engines, as well as explana- tions about how they work and how to get your site listed on them. 11. E-commerce is booming. For any given product you may wish to buy on the web, there may be hundreds or thousands of possible suppliers, with different prices and terms—and not all of them will provide equally reputable and reliable service. The choices can be so numerous that it may sometimes seem difficult to know how to go about choosing a vendor. Websites that do comparison shopping for you can be a great help. Such a service communicates with many individual vendors’ websites, gathering informa- tion as it proceeds; it then presents its findings to you in a convenient form. Often, ratings of the various ven- dors are provided as well, and sales tax and shipping charges are calculated for you. Here are a few sites that can assist with comparison shopping: www.epinions.com/ www.bizrate.com/ www.pricescan.com/ http://shopper.cnet.com/ Practice “catch-and-release e-commerce” by researching the best deals you can find for: a rare or at least out-of-print book that you’d like to have. a high-end DVD recorder. a replacement ink or toner cartridge for your laser or inkjet printer. a pair of athletic shoes exactly like the shoes you currently have. Pursue each transaction right up to the last step before you would have to enter your credit-card number and actually buy the item, and then quit. (Don’t buy it. You can always do that another time.) 12. WebCams, or web cameras, are used by some websites to show pictures of their locations—either live video or still shots. To run your own WebCam site requires a suitable camera and a continuous internet connection. But to look at other people’s WebCam sites requires only a web browser. For example, try searching for “WebCam Antarctica.” Or go to www.webcam-index.com. Find and bookmark at least one interesting WebCam site in each of the following places: Africa, Asia, South America, Europe, Australia, Antarctica, Hawaii.
  144. 119 SOFTWARE Tools for Productivity & Creativity 3 Chapter Topics

    & Key Questions 3.1 System Software: The Power behind the Power What are three components of system software, what does the operating system (OS) do, and what is a user interface? 3.2 The Operating System: What It Does What are the principal functions of the operating system? 3.3 Other System Software: Device Drivers & Utility Programs What are the char- acteristics of device drivers and utility programs? 3.4 Common Features of the User Interface What are some common features of the graphical software environment, and how do they relate to the keyboard and the mouse? 3.5 Common Operating Systems What are some common desktop, network, and portable (embedded) OSs? 3.6 Application Software: Getting Started What are five ways of obtaining appli- cation software, tools available to help me learn to use software, three common types of files, and the types of software? 3.7 Word Processing What can I do with word processing software that I can’t do with pencil and paper? 3.8 Spreadsheets What can I do with an electronic spreadsheet that I can’t do with pencil and paper and a standard calculator? 3.9 Database Software What is database software, and what is personal informa- tion management software? 3.10 Specialty Software What are the principal uses of specialty software?
  145. info! more info! more 120 Chapter 3 W hat we

    need is a science called practology, a way of thinking about machines that focuses on how things will actually be used.” So says Alan Robbins, a professor of visual communications, on the subject of machine interfaces —the parts of a machine that people actually manipu- late. 1 An interface is a machine’s “control panel,” ranging from the volume and tuner knobs on an old radio to all the switches and dials on the flight deck of a jetliner. You may have found, as Robbins thinks, that on too many of today’s machines—digital watches, cameras, even stoves—the interface is often designed to accommodate the machine or some engineering ideas rather than the people actually using it. Good interfaces are intuitive—that is, based on prior knowledge and experience—like the twin knobs on a 1950s radio, immediately usable by both novices and sophisticates. Bad interfaces, such as a software program with a bewildering array of menus and icons, force us to relearn the required behaviors every time. So how well are computer hardware and software makers doing at giving us useful, helpful interfaces? The answer is, They’re getting better all the time, but they still have some problematic leftovers from the past. For instance, some interface screens have so many icons that they are confusing instead of helpful. And some microcomputer keyboards still come with a SysRq (for System Request) key, which was once used to get the attention of the central computer but now is rarely used. (The Scroll Lock key is also seldom used.) Improving interfaces is the province of human-computer interaction (HCI), which is concerned with the study, design, construction, and implementation of human-centric interactive computer systems. HCI goes beyond improving screens and menus into the realm of adapting interfaces to human reasoning and studying the long-term effects that computer systems have on humans. HCI encompasses the disciplines of information technology, psychology, soci- ology, anthropology, linguistics, and others. As computers become more per- vasive in our culture, HCI designers are increasingly looking for ways to make interfaces easier, safer, and more efficient. In time, as interfaces are refined, computers may become no more difficult to use than a car. Until then, however, for smoother computing you need to know something about how software works. Today people communicate one way, computers another. People speak words and phrases; computers process bits and bytes. For us to communicate with these machines, we need an intermediary, an interpreter. This is the function of software, particularly system software. 3.1 SYSTEM SOFTWARE: The Power behind the Power What are three components of system software, what does the operating system (OS) do, and what is a user interface? As we mentioned in Chapter 1, software, or programs, consists of all the electronic instructions that tell the computer how to perform a task. These instructions come from a software developer in a form (such as a CD or DVD, USB drive, or an internet download) that will be accepted by the computer. Application software is software that has been developed to solve a par- ticular problem for users—to perform useful work on specific tasks or to provide entertainment. System software enables the application software Who Was John Tukey? The term software was coined by John Tukey. Who was he? Did he coin any other important computer terms? Do a keyword search on his name and see what you can find out. HCI Careers! Could you make a career in HCI- associated areas? Go to: www.sigchi.org and www.hfcareers.com/Default. aspx Do you see some HCI-related areas that you might consider as a major?
  146. Software 121 to interact with the computer and helps the

    computer manage its inter- nal and external resources. We interact mainly with the application soft- ware, which interacts with the system software, which controls the hardware. New microcomputers are usually equipped not only with system software but also with some application software. There are three basic components of system software that you need to know about. (• See Panel 3.1 .) • Operating systems: An operating system is the principal component of system software in any computing system. • Device drivers: Device drivers help the computer control peripheral devices. • Utility programs: Utility programs are generally used to support, enhance, or expand existing programs in a computer system. A fourth type of system software, language translators, is covered elsewhere. 3.2 THE OPERATING SYSTEM: What It Does What are the principal functions of the operating system? The operating system (OS), also called the software platform, consists of the low-level, master system of programs that manage the basic opera- tions of the computer. These programs provide resource management ser- vices of many kinds. In particular, they handle the control and use of hardware resources, including disk space, memory, CPU time allocation, and peripheral devices. Every general-purpose computer must have an operating system to run other programs. The operating system allows you to concentrate on your own tasks or applications rather than on the complexities of managing the computer. Each application program is written to run on top of a particular operating system. panel 3.1 Three components of system software System software is the interface between the user and the application software and the com- puter hardware. Application Software word processing, spreadsheet, database, graphics, etc. System Software Operating system Device drivers Utility programs Hardware (computer plus peripheral devices) User User
  147. info! more info! more 122 Chapter 3 Different sizes and

    makes of computers have their own operating systems. For example, Cray supercomputers use UNICOS and COS; IBM mainframes use MVS and VM; PCs run Windows or Linux and Apple Macintoshes run the Macintosh OS. Cellphones have their own operating systems, such as Apple’s iPhone OS 3.0, which works with iPhones, or Google and the Open Hand- set Alliance’s Android operating system for mobile devices. 2 In general, an operating system written for one kind of hardware will not be able to run on another kind of machine. In other words, different operating systems are mutu- ally incompatible. Microcomputer users may readily experience the aggravation of such incompatibility when they acquire a new or used microcomputer. Do they get an Apple Macintosh with Macintosh system software, which won’t always run PC programs? Or do they get a PC (such as Dell or Hewlett-Packard), which won’t run Macintosh programs? Before we try to sort out these perplexities, we should have an idea of what operating systems do. We consider: • Booting • CPU management • File management • Task management • Security management Booting What is the boot process? The work of the operating system begins as soon as you turn on, or “boot,” the computer. Booting is the process of loading an operating system into a computer’s main memory. This loading is accomplished automati- cally by programs stored permanently in the computer’s electronic circuitry (called read-only memory, or ROM, described in Chapter 4). When you turn on the machine, programs called diagnostic routines test the main memory, the central processing unit, and other parts of the system to make sure they Survival Tip New Software & Compatibility Pay attention to compatibility requirements when you obtain new software. The system requirements for running the software will be listed on the box or included with the downloaded information. When it is time to update the software, you can usually do that by paying a small upgrade fee to the software manu- facturer and then download- ing the new version and/or obtaining a new CD/DVD. If Windows doesn’t boot prop- erly, it may go into Safe Mode. You can also get into Safe Mode by pressing the F8 key during the boot process. Safe Mode is used for diagnosing prob- lems and fixing them. When the system is in Safe Mode, only the essential parts of the system work—monitor, mouse, keyboard—and there are no fancy graphics on the screen. www.computerhope.com/ issues/chsafe.htm http://computer.howstuffworks. com/question575.htm Once you are in Safe Mode, you use the Device Manager to help you fix problems: https://kb.wisc.edu/helpdesk/ page.php?id ϭ 502 Going Backward Another way to get out of a system problem is to use Sys- tem Restore (see right), found by clicking on the System icon, via Start, Control Panel. Restore System restores the system files to a previous date and/ or time. Your data files (for example, documents) are not affected, and you can custom- ize your System Restore points via the System restore icon.
  148. Software 123 4 3 5 RAM Hard disk Processor ROM

    BIOS These instructions help load the operating system from the hard disk into RAM (main memory), and . . . . . . executing the part of the operating system’s start-up system (BIOS) located in ROM. . . . then they pass control to the OS. 1 When you turn on the computer . . . 2 . . . the processor (CPU) automatically begins . . . panel 3.2 Booting What happens when you turn on the computer are running properly. Next, BIOS (for “basic input/output system”) programs are copied to main memory and help the computer interpret keyboard char- acters or transmit characters to the display screen or to a disk. Then the boot program obtains the operating system, usually from the hard disk, and loads it into the computer’s main memory, where it remains until you turn the com- puter off. ( • See Panel 3.2 .) COLD BOOTS & WARM BOOTS When you power up a computer by turning on the power “on” switch, this is called a cold boot. If your computer is already on and you restart it, this is called a warm boot or a warm start. Until recently, computer users have had to endure up to three minutes of waiting while they waited for their machines to boot up. In 2009, however, new software—such as Presto, Hyperspace, and Splashtop—was introduced that allows for “instant on” computing (although there are still problems to be worked out). 3 THE BOOT DISK Normally, your computer would boot from the hard drive, but if that drive is damaged, you can use a disk called a boot disk to start up your computer. A boot disk is a floppy disk or a CD that contains all the files needed to launch the OS. When you insert the boot disk into your computer’s floppy or CD drive, you force-feed the OS files to the BIOS, thereby enabling it to launch the OS and complete the start-up routine. After the OS loads completely, you then can access the contents of the Windows drive, run basic drive mainte- nance utilities, and perform troubleshooting tasks that will help you resolve the problem with the drive. CPU Management How does CPU management work? The central component of the operating system is the supervisor. Like a police officer directing traffic, the supervisor, or kernel, manages the CPU (the central processing unit or processor, as mentioned in Chapter 1). It remains in memory (main memory or primary storage) while the computer is running and directs other “nonresident” programs (programs that are not in memory) to perform tasks that support application programs.
  149. 124 Chapter 3 MEMORY MANAGEMENT The operating system also manages

    memory—it keeps track of the locations within main memory where the programs and data are stored. It can swap portions of data and programs between main memory and secondary storage, such as your computer’s hard disk, as so-called virtual memory. This capability allows a computer to hold only the most immediately needed data and programs within main memory. Yet it has ready access to pro- grams and data on the hard disk, thereby greatly expanding memory capacity. GETTING IN LINE: QUEUES, BUFFERS, & SPOOLING Programs and data that are to be executed or processed wait on disk in queues (pronounced “Qs”). A queue is a first-in, first-out sequence of data and/or programs that “wait in line” in a tem- porary holding place to be processed. The disk area where the programs or docu- ments wait is called a buffer. Print jobs are usually spooled —that is, placed—into a buffer, where they wait in a queue to be printed. This happens because the com- puter can send print jobs to the printer faster than the printer can print them, so the jobs must be stored and then passed to the printer at a rate it can handle. Once the CPU has passed a print job to the buffer, it can take on the next process- ing task. (The term spooling dates back to the days when print jobs were reeled, or copied, onto spools of magnetic tape, on which they went to the printer.) File Management What should I know about file management? A file is (1) a named collection of data (data file), or (2) a program (pro- gram file) that exists in a computer’s secondary storage, such as a hard disk or CD/DVD. Examples of data files are a word processing document, a spreadsheet, images, songs, and the like. Examples of program files are a word processing program or spreadsheet program. (We cover files in more detail in Chapter 4.) FINDING & HANDLING FILES Files con- taining programs and data are located in many places on your hard disk and other secondary storage devices. The operating system records the stor- age location of all files. If you move, rename, or delete a file, the operating system manages such changes and helps you locate and gain access to it. For example, you can copy, or dupli- cate, files and programs from one disk to another. You can back up, or make a duplicate copy of, the contents of a disk. You can erase, or remove, from a disk any files or programs that are no longer useful. You can rename, or give new file names to, the files on a disk. ORGANIZING FILES: DIRECTORIES, SUB- DIRECTORIES, & PATHS The operating system’s file system arranges files in a hierarchical manner, first into directo- ries (also called folders ) and then into subdirectories. ( • See Panel 3.3 .) The topmost directory is called the root direc- tory; a directory below another directory is called a subdirectory; any directory above a subdirectory is called its parent directory. panel 3.3 Directories and subdirectories Letters Root Directory C:/ Term paper Section 1 . . . My Documents My Pictures Subdirectories My Music Files
  150. info! more Software 125 To find a particular file in

    an operating system’s file system, you type in the file’s pathname. The path is the route through the file system. A simple example of a pathname is C:mydocuments/ termpaper/section1.doc. “C” refers to the hard disk; “mydocu- ments” is the root directory, or main folder; “term paper” is the subdirectory, or subfolder; “sec- tion 1” is the name of the file; and “doc” is a file extension that indicates what type of file it is (document). Task Management What is the purpose of task management? A computer is required to per- form many different tasks at once (multitasking). In word pro- cessing, for example, it accepts input data, stores the data on a disk, and prints out a document—seemingly simultaneously. Most desktop and laptop operating systems are single-user systems that can handle more than one program at the same time—word pro- cessing, spreadsheet, database searcher. Each program is dis- played in a separate window on the screen. Other operating systems (multiuser systems) can accommodate the needs of several different users at the same time. All these examples illustrate task management (see left). A task is an operation such as storing, printing, or calculating. MULTITASKING: HANDLING MORE THAN ONE PROGRAM CONCURRENTLY Multitask- ing is the execution of two or more programs by one user almost at the same time on the same computer with one central processor. You may be writing a report on your computer with one program while another program plays a music CD. How does the computer handle both programs at once? The answer is that the operating system directs the processor to spend a predetermined amount of time executing the instructions for each program, one at a time. Thus, a small part of the first program is processed, and then the processor moves to the remaining programs, one at a time, processing small parts of each. The cycle is repeated until processing is complete. Because the processor is usually very fast, it may appear that all the programs are being executed at the same time. However, the processor is still executing only one instruction at a time. Task Manager If you want to see a list of pro- cesses being executed by your system, open the Task Manager in Windows by holding down the Ctrl, Alt, and Del keys. Both Windows ( left ) and the Mac operating system ( right ) provide a Find (Search) function for finding files if you don’t know the pathname.
  151. 126 Chapter 3 Security Management How does the OS help

    keep my computer secure? Operating systems allow users to control access to their computers—an espe- cially important matter when several people share a computer or the same computer network. Users gain access in the same manner as accessing their email—via a user name (user ID) and a password. As we stated in Chapter 2, a password (above left) is a special word, code, or symbol required to access a computer system. If you are using a computer at work, you may give yourself a password. When you first boot up a new personal computer, the OS will prompt you to choose a user name and a password. Then, every time after that, when you boot up your computer, you will be prompted to type in your user name and password. Some OSs even allow you to protect individual files with separate access pass- words. (The Help feature explains how to change or turn off your password.) Computer systems and security issues have become complicated and criti- cally important. We discuss this subject in more detail in Chapter 6. 3.3 OTHER SYSTEM SOFTWARE: Device Drivers & Utility Programs What are the characteristics of device drivers and utility programs? We said that the three principal parts of system software are the operating sys- tem, device drivers, and utility programs. Let’s now consider the last two. Device Drivers: Running Peripheral Hardware Why do I need device drivers? Device drivers are specialized software programs that allow input and output devices to communicate with the rest of the computer system. Each device’s brand and model are supported by a different driver that works with only one operating system. Many basic device drivers come with the system software when you buy a computer, and the system software will guide you through choosing and installing the necessary drivers. If, however, you buy a new peripheral device, such as a mouse, a scanner, or a printer, the package Survival Tip Update Your Drivers You should regularly (once a year, say) update your drivers. To do so, visit the websites of your peripheral devices’ manufacturers and download any updates. You can also buy utilities for back- ing up and restoring drivers, such as 3D2F.com Software Directory ( http://3d2f.com/ programs/54-281-my-drivers- download.shtml ) or Driver- Soft.com’s Driver Genius ( www. driver-soft.com ). Survival Tip Is Your Password Guessable? Don’t choose a password that could be easily guessed. Examples of weak passwords are birth date, anniversary date, boyfriend/girlfriend name, city/town name, pet’s name, fad words/expressions, or names of celebrities or famous movie/book charac- ters. Instead, use meaningless letters and numbers. The password is usually displayed as aster- isks or dots, so that anyone looking over your shoulder—a “shoulder surfer”—cannot read it. In Windows, you can access the Security Center via the Con- trol Panel to control additional security features.
  152. Software 127 panel 3.4 Device driver selection will include a

    device driver for the device (probably on a CD or DVD). Most new operating systems recog- nize many new hardware devices on their own and automatically install them. If your OS does not recognize your new hardware, it will display a message and ask you to install the driver from the CD that came with your hardware. ( • See Panel 3.4 .) Utilities: Service Programs Which utilities would be most important to me? Utility programs, also known as ser- vice programs, perform tasks related to the control and allocation of computer resources. They enhance existing functions or provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software. However, they may also be bought separately as external utility programs (such as Norton SystemWorks and McAfee Utilities). Among the tasks performed by utilities are backing up data, compressing files, recovering lost data, and identifying hardware problems. (See below.) Utility programs are incorporated into the operating system. Others, such as antivirus programs, are sold as stand-alone programs. Some important utility programs are as follows: Backup Suddenly your hard-disk drive fails, and you have no more programs or files. Fortunately, we hope, you have used a backup utility to make a backup, or duplicate copy, of the information on your hard disk. The backup can be made to PRACTICAL ACTION Utility Programs an external hard drive, an off- site networked (online) site, or other choices discussed later in the book. Examples of freestanding backup utili- ties are Norton Ghost (from Symantec) and DT Utilities PC Backup. Data Recovery One day in the 1970s, so the story goes, programming legend Peter Norton was working at his computer and accidentally
  153. 128 Chapter 3 Survival Tip Temp File Removal In Windows,

    to remove tem- porary and unnecessary files from your hard drive, Click Start, All Programs, Acces- sories, System Tools, and Disk Cleanup. Put checks in the boxes next to the types of file you want to delete, and click OK. deleted an important file. This was, and is, a common enough error. However, instead of reentering all the information, Norton decided to write a computer program to recover the lost data. He called the program “The Norton Utilities.” Ulti- mately it and other utilities made him very rich. A data-recovery utility is used to restore data that has been physically damaged or corrupted. Data can be dam- aged by viruses (see following), bad software, hardware fail- ure, and power fluctuations that occur while data is being written/recorded. Virus Protection If there’s anything that can make your heart sink faster than the sudden failure of your hard disk, it may be the realiza- tion that your computer system has been invaded by a virus. A virus consists of hidden programming instructions that are buried within an application or system program. Sometimes viruses copy themselves to other programs, causing havoc. Sometimes the virus is merely a simple prank that pops up in a message. Other times, however, it can destroy programs and data and wipe your hard disk clean. Viruses are spread when people exchange disks or CDs, download information from the internet and other computer networks, or open files attached to email. ( • See Panel 3.5 .) You must, therefore, install antivirus software. Antivirus software is a utility program that scans all disks and mem- ory to detect viruses. Some utilities destroy the virus on the spot. Others notify you of possible viral behavior. Because new viruses are constantly being created, you need the type of antivirus software that can detect unknown viruses. Examples of antivirus software are Symantec’s Norton Anti- Virus, Bit Defender, Avast!, and McAfee’s VirusScan. New viruses appear every day, so it’s advisable to look for an antivirus utility that offers frequent online updates without additional cost. We discuss viruses again in more detail in Chapter 6. Data Compression As you continue to store files on your hard disk, it will even- tually fill up. You then have several choices: You can delete old files to make room for the new. You can buy a new hard-disk cartridge drive and some cartridges and transfer the old files and programs to those. Or you can use a data com- pression utility, such as PK Zip, ZipIt, WinZip, or StuffIt. (As a result of the name “Zip,” people have come to refer to com- pressing a file as “zipping” and decompressing a file as “unzipping.”) Data compression utilities remove redundant ele- ments, gaps, and unnecessary data from a computer’s storage space so that less space (fewer bits) is required to store or transmit data. With a data compression utility, files can be made more compact for storage on your hard- disk drive. Given today’s huge-capacity hard drives, you may never fill yours up. Still, data compression remains an issue. With the increasing use of large graphic, sound, and video files, data compression is necessary both to reduce the storage space required and to reduce the time required to transmit such large files over a network. As the use of sophisticated multimedia becomes com- mon, compression and decompression are being increas- ingly taken over by built-in hardware boards that specialize in this process. That will leave the main processor free to work on other things, and compression/decompression software utilities will become obsolete. File Defragmentation Over time, as you delete old files from your hard disk and add new ones, something happens: The files become frag- mented. Fragmentation is the scattering of portions of files about the disk in nonadjacent areas, thus greatly slowing access to the files. When a hard disk is new, the operating system puts files on the disk contiguously (next to one another). How- ever, as you update a file over time, new data for that file is distributed to unused spaces. These spaces may not be contiguous to the older data in that file. It takes the operat- ing system longer to read these fragmented files. A defrag- menter utility program, commonly called a “defragger,” will find all the scattered files on your hard disk and reorganize them as contiguous files. Defragmenting the files will speed up the drive’s operation. Disk Scanner (ScanDisk or Check Disk) & Disk Cleanup These utilities detect and correct certain types of common problems on hard drives and CDs and search for and remove unnecessary files, such as temporary files, or “temp files.” Both Windows and the applications you run create temp files needed only for short tasks and system restore (return to normal operating conditions) after certain types of sys- tem problems. These files are stored in the Temp folder. For example, when you create a word document, Word will store a temp file version of it in the Temp folder. When you save this document, Word will save it to the location you desig- nated and delete the temp file. The computer should delete temp files when a program is closed, but this doesn’t always happen. Also, files will be left in the Temp folder if the com- puter crashes. Thus temp files can accumulate in the Temp folder and take up space. Many other utilities exist, such as those for transfer- ring files back and forth between a desktop microcom- puter and a laptop and for troubleshooting various types
  154. Software 129 of system problems. Generally, the companies selling utilities

    do not manufacture the operating system. OS developers usually eventually incorporate the features of a proven utility as part of their product. (Note: Indepen- dent, or external, utilities must be compatible with your system software; check the software packaging and user documentation.) For some unusual utili- ties, go to: NimiVisuals www.mynimi.net Defraggler www.defraggler.com FileAlyzer www.safer-networking. org/en/filealyzer Edgeless www.fxc.btinternet. co.uk/assistive.htm Fences www.stardock.com/ products/fences MaxiVista www.maxivista.com FreeOTFE www.freeotfe.org DoubleKiller www.bigbang enterprises.de/en/doublekiller JPEGsnoop www.impulseadven ture.com/photo/jpeg-snoop.html MarxioTimer www.marxio-tools.net/en/marxio-times.htm Edison www.verdiem.com/edison.asp panel 3.5 Preventing viruses 3.4 COMMON FEATURES OF THE USER INTERFACE What are some common features of the graphical software environment, and how do they relate to the keyboard and the mouse? The first thing you look at when you call up any system software on the screen is the user interface — the user-controllable display screen that allows you to communicate, or interact, with the computer. Like the dashboard on a car, the user interface has gauges that show you what’s going on and switches and buttons for controlling what you want to do. From this screen, you choose the application programs you want to run or the files of data you want to open. Survival Tip Free Antivirus Software For a list of free antivirus soft- ware, see: www.thefreecountry.com/ security/antivirus.shtml info! more PC Tune-Up: Stop at the Pitstop To find out what problems your PC has and to learn which utili- ties might improve its perfor- mance, go to: www.pcpitstop.com/default.asp and try their free computer scans. • If you download or install software from a network server (including the internet), bulletin board, or online service, always run virus scanning software on the directory you place the new files in before executing them. • Make sure you have a disk (e.g., CD) with your virus program. • Do not open any email from unknown sources. • Do not open email attachments from unknown sources. • Scan files attached to email before you open them. • If your internet connection is always on (for example, if you have a cable modem), purchase special software called firewall software to keep other internet users out of your computer. • Never start your computer from an unknown floppy disk. Always make sure your floppy-disk drive is empty before turning on or restarting your computer. • Run virus-scanning software on a new floppy disk or CD before executing, installing, or copying its files into your system.
  155. 130 Chapter 3 panel 3.6 Keyboard functions Using Keyboard &

    Mouse How do I use the keys on my keyboard and my mouse as a user interface? You can interact with the display screen using the keys on your keyboard. As well as having letter, number, and punctuation keys and often a calculator- style numeric keypad, computer keyboards have special-purpose and function keys. ( • See Panel 3.6 .) SPECIAL-PURPOSE KEYS Special-purpose keys are used to enter, delete, and edit data and to execute commands. An example is the Esc (for “Escape”) key, which tells the computer to cancel an operation or leave (“escape from”) the current mode of operation. The Enter, or Return, key, which you will use often, tells the computer to execute certain commands and to start new para- graphs in a document. Commands are instructions that cause the software to perform specific actions. Special-purpose keys are generally used the same way regardless of the application software package being used. Most keyboards include the fol- lowing special-purpose keys: Esc, Ctrl, Alt, Del, Ins, Home, End, PgUp, PgDn, Num Lock, and a few others. (For example, Ctrl means “Control,” Del means “Delete,” Ins means “Insert.”) FUNCTION KEYS Function keys, labeled “F1,” “F2,” and so on, are posi- tioned along the top or left side of the keyboard. They are used to execute commands specific to the software being used. For example, one applica- tion software package may use F6 to exit a file, whereas another may use F6 to underline a word. MACROS Sometimes you may wish to reduce the number of keystrokes required to execute a command. To do this, you use a macro. A macro, also called a keyboard shortcut, is a single keystroke or command—or a series F1 F2 F3 F4 Q W A Z E R F5 F6 F7 F8 Y T U I O F9 P S D G F H J X C B V N M K L A ; : , < . > 0 ) 9 ( 7 & 5 % 4 $ 3 # 2 @ 1! ` ~ 6 ^ 8 * Esc Tab Caps Lock Shift Ctrl Alt Function Keys These keys let you quickly perform specific tasks. For example, in many programs you can press F1 to display help information. Caps Lock and Shift Keys These keys let you enter text in uppercase (ABC) and lowercase (abc) letters. Press Caps Lock to change the case of all letters you type. Press the key again to return to the original case. Press Shift in combination with another key to type an uppercase letter. Escape Key You can press Esc to quit a task you are performing. Ctrl and Alt Keys You can use the Ctrl or Alt key in combination with another key to perform a specific task. For example, in some programs, you can press Ctrl and S to save a document. Spacebar You can press the Spacebar to insert a blank space. Windows Key You can press the Windows key to quickly display the Start menu when using many Windows operating systems.
  156. Software 131 of keystrokes or commands—used to automatically issue a

    longer, pre- determined series of keystrokes or commands. Thus, you can consolidate several activities into only one or two keystrokes. The user names the macro and stores the corresponding command sequence; once this is done, the macro can be used repeatedly. (To set up a macro, pull down the Help menu and type in macro. ) Although many people have no need for macros, individuals who find them- selves continually repeating complicated patterns of keystrokes say they are quite useful. THE MOUSE & POINTER You will also frequently use your mouse to interact with the user interface. The mouse allows you to direct an on-screen pointer to perform any number of activities. The pointer usually appears as an arrow, although it changes shape depending on the application. The mouse is used to move the pointer to a particular place on the display screen or to point to little symbols, or icons. You can activate the function corresponding to the symbol by pressing (“clicking”) buttons on the mouse. Using the mouse, you can pick up and slide (“drag”) an image from one side of the screen to the other or change its size. ( • See Panel 3.7 on page 132 .) The GUI: The Graphical User Interface How does a GUI make life easier for me? In the beginning, personal computers had command-driven interfaces, which required that you type in complicated-looking instructions (such as copy a: \ filename c: \ to copy a file from a floppy disk to a hard disk). In the next ver- sion, they also had menu-driven interfaces, in which you could use the arrow keys on your keyboard (or a mouse) to choose a command from a menu, or a list of activities. Today the computer’s “dashboard” is usually a graphical user interface (GUI) (pronounced “gooey”), which allows you to use a mouse or keystrokes F10 F11 Enter Shift Alt ' " / ? F12 + = } ] | \ { [ – — Backspace Print Screen Insert Delete Scroll Lock Pause Page Up Home End Page Down Num Lock Del Enter / 8 7 * 9 5 4 1 0 . 6 3 2 Home Pg Up End Pg Dn – + Ctrl Num Lock Caps Lock Scroll Lock Numeric Keypad When the Num Lock light is on, you can use the number keys (0 through 9) to enter numbers. When the Num Lock light is off, you can use these keys to move the cursor around the screen. To turn the light on or off, press Num Lock. Application Key You can press the Application key to quickly display the shortcut menu for an item on your screen. Shortcut menus display a list of commands commonly used to complete a task related to the current activity. These keys let you move the cursor around the screen. Arrow Keys Enter Key You can press Enter to tell the computer to carry out a task. In a word processing program, press this key to start a new paragraph. Backspace Key You can press Backspace to remove the character to the left of the cursor. Delete Key You can press Delete to remove the character to the right of the cursor. Status Lights These lights indicate whether the Num Lock or Caps Lock features are on or off.
  157. 132 Chapter 3 to select icons (little symbols) and commands

    from menus (lists of activi- ties). The GUIs on the PC and on the Apple Macintosh (which was the first easy-to-use personal computer available on a wide scale) are somewhat similar. Once you learn one version, it’s fairly easy to learn the other. However, the best- known GUI is that of Microsoft Windows system software. ( • See Panel 3.8 .) DESKTOP, ICONS, & MENUS Three features of a GUI are the desktop, icons, and menus. • Desktop: After you turn on the computer, the first screen you will encounter is the desktop (see right), a term that embodies the idea of folders of work (memos, schedules, to-do lists) on a businessperson’s desk. The desktop, which is the system’s main interface screen, displays pictures (icons) that provide quick access to programs and information. • Icons and rollovers: We’re now ready to give a formal definition: Icons are small pictorial figures that represent programs, data files, or procedures. For example, a trash can represents a place to dispose of a file you no longer want. If you click your mouse pointer on a little picture of a printer, you can print out a document. One of the most important icons is the folder, a representation of a manila folder; folders hold the files in which you store your documents and other data. Of course, you can’t always be expected to know what an icon or graphic means. A rollover feature, a small text box explaining the icon’s function, appears when you roll the mouse pointer over the icon. A rollover may also produce an animated graphic. Term Point Action Purpose Move mouse across desk to guide pointer to desired spot on screen. The pointer assumes different shapes, such as arrow, hand, or I-beam, depending on the task you’re performing. To execute commands, move objects, insert data, or similar actions on screen. Click Press and quickly release left mouse button. To select an item on the screen. Double-click Quickly press and release left mouse button twice. To open a document or start a program. Drag and drop Position pointer over item on screen, press and hold down left mouse button while moving pointer to location in which you want to place item, then release. To move an item on the screen. Right-click Press and release right mouse button. To display a shortcut list of commands, such as a pop-up menu of options. Click Click Click Click panel 3.7 Mouse language Icon: Symbol representing a program, data file, or procedure. Icons are designed to communicate their function, such as a floppy disk for saving. Rollover: When you roll your mouse pointer over an icon or graphic (in this case, the “Save” icon), a small box with text appears that briefly explains its function.
  158. Software 133 Outlook Express: Part of Microsoft’s browser, Internet Explorer,

    that enables you to use email. Microsoft Network: Click here to connect to Microsoft Network (MSN), the company’s online service. My Documents: Where your documents are stored (unless you specify otherwise), in folders you create and name. Network Neighborhood: If your PC is linked to a network, click here to get a glimpse of everything on the network. My Computer: Gives you a quick overview of all the files and programs on your PC, as well as available drives (A:, C:, D:, E:). Documents: Multitasking capabilities allow users to smoothly run more than one program at once. The opening screen is the desktop. Menu bar Title bar Minimize Maximize Close Start menu: After clicking on the Start button, a menu appears, giving you a quick way to handle common tasks. You can launch programs, call up documents, change system settings, get help, and shut down your PC. Start button: Click for an easy way to start using the computer. Taskbar: Gives you a log of all programs you have opened. To switch programs, click on the icon buttons on the taskbar. Multimedia: Windows XP features sharp graphics and video capabilities. Start menu Title bar Menu bar Document Opening desktop screen Taskbar panel 3.8 PC graphical user interface (desktop) ( Top ) Windows XP; ( bot- tom ) Windows Vista. (Icons may differ on your PC.)
  159. 134 Chapter 3 • Menus: Like a restaurant menu, a

    menu offers you a list of options to choose from —in this case, a list of commands for manipulating data, such as Print or Edit. Menus are of several types. Resembling a pull-down window shade, a pull-down menu, also called a drop-down menu, is a list of options that pulls down from the menu bar at the top of the screen. For example, if you use the mouse to “click on” (activate) a command (for example, File) on the menu bar, you will see a pull-down menu offering further commands. Choosing one of these options may produce further menus called cascading menus (left), menus that seem to fly back to the left or explode out to the right, wher- ever there is space. A pull-up menu is a list of options that pulls up from the menu bar at the bottom of the screen. In Windows XP, a pull-up menu appears in the lower left-hand corner when you click on the Start button. A pop-up menu is a list of command options that can “pop up” anywhere on the screen when you click the right mouse button. In contrast to pull-down or pull-up menus, pop-up menus are not connected to a menu bar. DOCUMENTS, TITLE BARS, MENU BARS, TOOLBARS, TASKBARS, & WINDOWS (SMALL “W”) If you want to go to a document, there are three general ways to begin working from a typical Microsoft Windows GUI desktop: (1) You can click on the Start button at the lower left corner and then make a selection from the pull-up menu that appears. (2) Or you can click on the My Computer icon on the desktop and pursue the choices offered there. (3) Or you can click on the My Documents icon and then on the folder that contains the document you want. In each case, the result is the same: the document is displayed in the window. ( • See Panel 3.9 .) Pull-down menu: When you click the mouse on the menu bar, a list of options appears or pulls down like a shade. Cascading menu: Moving the mouse pointer to an option on the pull-up menu produces a flyout menu with more options. Pull-up menu: When you click the mouse pointer on the Start button, it produces a pull-up menu offering access to programs and documents.
  160. Software 135 From Start menu Click on the Start button

    to produce Start menu, then go to Documents option, then to My Documents. Click on the item you want. From My Documents icon From My Computer Click on the My Computer icon, which opens a window that provides access to information on your computer. Click on the My Documents icon, which opens a window providing access to document files and folders. Click on C, which opens a window that provides access to information stored on your hard disk. Click on the document you want. Click on My Documents, which opens a window that shows the names of your documents/ document folders. Click on a document to open it. Click on document folder or ... panel 3.9 Three ways to go to a document in Windows XP
  161. 136 Chapter 3 Once past the desktop—which is the GUI’s

    opening screen—if you click on the My Computer icon, you will encounter various “bars” and window func- tions. ( • See Panel 3.10 .) • Title bar: The title bar runs across the very top of the display window and shows the name of the folder you are in —for example, “My Computer.” • Menu bar: Below the title bar is the menu bar, which shows the names of the various pull-down menus available. Examples of menus are File, Edit, View, Favorites, Tools, and Help. • Toolbar: The toolbar, below the menu bar, displays menus and icons representing frequently used options or commands. An example of an icon is the picture of two pages in an open folder with a superimposed arrow, which issues a Copy to command. • Taskbar: In Windows, the taskbar is the bar across the bottom of the desktop screen that contains the Start button and that appears by default. Small boxes appear here that show the names of open files. You can switch among the files by clicking on the boxes. • Windows: When spelled with a capital “W,” Windows is the name of Microsoft’s system software (Windows 95, 98, Me, XP, Vista, 7, and so on). When spelled with a lowercase “w,” a window is a rectangular frame on the computer display screen. Through this frame you can view a file of data—such as a document, spreadsheet, or database—or an application program. In the upper right-hand corner of the Windows title bar are some window controls—three icons that represent Minimize, Maximize and Restore, and Close. By clicking on these icons, you can minimize the window (shrink it down to an icon at the bottom of the screen), maximize it (enlarge it or restore Desktop icons Windows XP taskbar Title bar Toolbar Folder Menu bar panel 3.10 “Bars” and windows functions
  162. Software 137 it to its original size), or close it

    (exit the file and make the window disappear). You can also use the mouse to move the window around the desktop, by click- ing on and dragging the title bar. Minimize Maximize/ Close to Taskbar Restore Finally, you can create multiple windows to show programs running concur- rently. For example, one window might show the text of a paper you’re working on, another might show the reference section for the paper, and a third might show something you’re downloading from the internet. If you have more than one window open, click on the Maximize button of the window you want to be the main window to restore it. The Help Command What can the Help command do for me? Don’t understand how to do something? Forgotten a command? Accidentally pressed some keys that messed up your screen layout and you want to undo it? Most toolbars contain a Help command — a command generating a table of contents, an index, and a search feature that can help you locate answers. In addition, many applications have context-sensitive help, which leads you to information about the task you’re performing. ( • See Panel 3.11 .) Survival Tip Don’t Trash Those Icons Don’t delete unwanted soft- ware programs by using the mouse to drag their icons to the recycle bin. This might leave behind system files that could cause problems. Instead, use an “uninstall” utility. In Windows, go to Start, Set- tings, Control Panel; double- click Add/Remove Programs. Find the program you want to delete, and click the Add/ Remove button. The Help menu provides a list of help options. Question mark icon: Double-click to see Help screens. Search: Lets you hunt for Help topics that contain particular words or phrases Index: Lets you look up Help topics in alphabetical order panel 3.11 Help features ( Top ) The XP Help com- mand yields a pull-down menu; ( bottom ) the Help screen for Vista Survival Tip Getting Help On Windows computers, you can find the Help area by pressing the F1 key. Or use the mouse to click on Start in the lower left screen; then click on Help. On the Macintosh, Help is located under the main menu bar.
  163. 138 Chapter 3 3.5 COMMON OPERATING SYSTEMS What are some

    common desktop, network, and portable (embedded) OSs? The platform is the particular processor model and operating system on which a computer system is based. For example, there are “Mac platforms” (Apple Macintosh) and “Windows platforms” or “PC platforms” (for personal computers such as Dell, Compaq, Lenovo, Gateway, and Hewlett-Packard, which run Microsoft Windows). Sometimes the latter are called Wintel plat- forms, for “Windows + Intel,” because they often combine the Windows operat- ing system with the Intel processor chip. (We discuss processors in Chapter 4.) Despite the dominance of the Windows platform, some so-called legacy sys- tems are still in use. A legacy system is an older, outdated, yet still functional tech- nology, such as the DOS operating system. DOS (rhymes with “boss”) —for Disk Operating System—was the origi- nal operating system produced by Microsoft and had a hard-to-use command-driven user interface. ( • See Panel 3.12 .) Its initial 1982 version was designed to run on the IBM PC as PC-DOS. Later Microsoft licensed the same system to other computer makers as MS-DOS. Here we briefly describe the prin- cipal platforms used on single-user, stand-alone computers today, both desktops and laptops: the Apple Macintosh OS and Microsoft Win- dows. We discuss operating sys- tems for networks (servers) and for embedded systems (handheld com- puters and some consumer devices) in a few pages. Macintosh Operating System What significant contribution has the Mac OS made to personal computing? The Macintosh operating system (Mac OS), which runs only on Apple Macin- tosh computers, set the standard for icon-oriented, easy-to-use graphical user interfaces. Apple based its new interface on work done at Xerox, which in turn had based its work on early research at Stanford Research Institute (now SRI International). (See the timeline starting on page 166.) The software gener- ated a strong legion of fans shortly after its launch in 1984 and inspired rival Microsoft to upgrade DOS to the more user-friendly Windows operating sys- tems. Much later, in 1998, Apple introduced its iMac computer (the “i” stands for “internet”), which added capabilities such as small-scale networking. MAC OS X The Mac OS is proprietary, meaning that it is privately owned and controlled by a company. Some Mac users still use System 9, introduced in October 1999, which added an integrated search engine, updated the GUI, and improved networking services. The next version of the operating system, Mac OS X (“ex” or “10”) broke with 15 years of Mac software to use Unix (discussed shortly) to offer a dramatic new look and feel. ( • See Panel 3.13 .) Many Apple users claim that OS X won’t allow software conflicts, a frequent headache with Microsoft’s Windows operating systems. (For example, you might install a game and find that it interferes with the device driver for a sound card. Then, when you uninstall the game, the problem persists. With panel 3.12 DOS screen
  164. Software 139 Mac OS X, when you try to install

    an application program that conflicts with any other program, the Mac simply won’t allow you to run it.) Mac OS X also offers free universal email services, improved graphics and printing, improved security, CD/DVD burning capability, a CD/DVD player, easier ways to find files, and support for building and storing web pages. Mac OS X also uses: • Spotlight—for desktop search: A desktop search engine, you’ll recall from Chapter 2, is a tool that extends searching beyond the web to the contents of your personal computer’s hard disk. The Macintosh version, called Spotlight, helps you find information stored in the thousands of files on your hard drive. Spotlight also offers Smart Folders, permanent lists of search results that are automatically updated as files are added or deleted. • Dashboard—for creating desktop “widgets”: The Dashboard is a collection of little applications that Apple calls “widgets,” such as clock, calculator, weather report, or stock ticker, that can be available on your desktop at any time. Dashboard enables programmers to create customized widgets that provide notification on the desktop whenever there’s a newsworthy development, such as a change in stock price, that’s important to users—something that “could tame the flood of real-time data that threatens to overwhelm us,” says BusinessWeek ’s Stephen Wildstrom. 4 • Automator—for handling repetitive tasks: Automator is a personal robotic assistant that lets you streamline repetitive tasks into a script that will perform a sequence of actions with a single click, such as checking for new messages from a particular sender, then sending you an alert. The latest version of OS X, 10.6, or Snow Leopard, was released in 2009. As of 2009, Mac OS X is the second most popu- lar general-purpose operating system in use (almost 10%), after Microsoft Windows (about 88%). 5 ( • See Panel 3.14 .) WHERE IS MAC KING? Macintosh is still con- sidered king in areas such as desktop pub- lishing, and Macs are still favored in many educational settings. For very specialized applications, most programs are written for panel 3.13 Mac OS X screen Total Market Share 88.26% - Windows 9.93% - Mac 0.83% - Linux 0.48% - iPhone 0.04% - Playstation 0.01% - SunOS 0% 0% 0% 1% 10% 89% panel 3.14 OS market shares ( http://news.cnet. com/8301-10805_ 3-10154133-75.html )
  165. info! more 140 Chapter 3 the Windows platform. However, programs

    for games and for common busi- ness uses such as word processing and spreadsheets are also widely available for the Mac. Note that many Macs can work with Microsoft PC (Windows) applications, such as Word—if the Mac version of these applications has been installed on the Mac and the Mac has an Intel processor (Chapter 4). You can also use a PC-formatted disk in many Macs. (The reverse is not true: PCs will not accept Mac-formatted disks.) Microsoft Windows What has been the evolution of Windows? In the 1980s, taking its cue from the popularity of Mac’s easy-to-use GUI, Microsoft began working on Windows to make DOS more user-friendly. Also a proprietary system, Microsoft Windows is the most common operating system for desktop and portable PCs. Early attempts (Windows 1.0, 2.0, 3.0) did not catch on. However, in 1992, Windows 3.X emerged as the preferred system among PC users. (Technically, Windows 3.X wasn’t a full operating system; it was simply a layer or “shell” over DOS.) EARLY VERSIONS OF WINDOWS: WINDOWS 95, 98, & ME Windows 3.X evolved into the Windows 95 oper- ating system, which was succeeded by Windows 98 and Windows Me. Among other improvements over their predecessors, Windows 95, 98, and Me (for Mil- lennium Edition), which are still used in many homes and businesses, adhere to a standard called Universal Plug and Play, which is supposed to let a variety of electronics seamlessly network with each other. Plug and Play is defined as the ability of a computer to automatically configure a new hardware component that is added to it. WINDOWS XP Microsoft Windows XP, introduced in 2001, combined ele- ments of Windows networking software and Windows Me with a new GUI. It has improved stability and increased driver and hardware support. It also features built-in instant messaging; centralized shopping managers to help you keep track of your favorite online stores and products; and music, video, and photography managers. Windows XP comes in many versions: Windows Starter Edition is for new computer users in developing countries; Windows XP Home Edition is for typical home users; Windows XP Profes- sional Edition is for businesses of all sizes and for home users who need to do more than get email, browse the internet, and do word processing; Windows XP Tablet PC Edition is for business notebook computers that support data entry via a special pen used to write on the display screen ( • See Panel 3.15 .); Windows XP Embedded is for embedded systems in portable devices and con- sumer electronics. WINDOWS XP MEDIA CENTER EDITION/TV PACK 2008 In late 2004, Microsoft released Windows XP Media Center Edition 2005, a media-oriented operating system that supports DVD burning, high-definition television (HDTV), TV tun- ers, cable TV, and satellite TV and that provides a refreshed user interface. A key feature is support for wireless technology and in particular Media Cen- ter Extender, a technology that lets users wirelessly connect up to five TVs and some portable devices to the Media Center PC. Windows XP Media Center Edition is a premium version of Windows XP, designed to make the PC or the TV the media and entertainment hub of the home. Windows TV Pack 2008 is for Vista (see below). In addition to Mac Apps To see the wide variety of appli- cations available to download for the Mac, go to: www.apple.com/downloads/ macosx/ Bill Gates. The founder of Microsoft has been identified with every PC operating system since the 1980 DOS.
  166. Software 141 performing traditional PC tasks, the system can serve

    music, pictures, video, and live television to portable devices, stereos, and TVs while also enforcing digital rights set by content owners. Users can access a Windows XP Media Center PC—a combination of special Windows OS and hardware that includes a TV tuner, remote control, and other multimedia equipment—with a remote control through a special user interface on their TV. WINDOWS VISTA Windows Vista was introduced to consumers in January 2007 ( • See Panel 3.16 .) It is the equivalent of Windows version 12—preceded by 1.0, 2.0, 3.0, 3.1, NT, 95, NT 4.0, 98, 2000, ME, XP. To create Vista, Microsoft supposedly rebuilt Windows from scratch, and it does indeed have a dazzling interface, glitzier graphics, and improved security tools. However, so much computing power was required to run it that many people found their new PCs ran more slowly than their older, less powerful XP machines. 6 Vista was also criticized for software and hardware incompatibility issues with office suites and some printers, digital cameras, and other devices. So, many businesses decided that, given the downturn in the economy, they wouldn’t be upgrading panel 3.15 Windows XP ( left ) and Windows Tablet PC Survival Tip XP Service Packs 1, 2, & 3 In late 2002, Microsoft updated XP to a “second edition” by supplying a down- loadable service pack (an update) called Windows XP Service Pack 1 (SP1). In 2004, Microsoft released Service Pack 2 (SP2). In 2008, Service Pack 3(SP 3) was released, which includes Packs 1 and 2, as well as some additional updates, particularly involving security. These service pack updates, and subsequent smaller updates, improve the OS’s performance and strengthen security. However, they can cause compatibility problems with existing appli- cations on a user’s computer. So, if you are considering updating your version of XP, research compatibility and backup issues on the internet before going to Microsoft’s website to download these updates and/or Service Packs. panel 3.16 Vista desktop screen showing a computer’s various storage locations
  167. info! more 142 Chapter 3 from XP to Vista, because

    they saw no value in it and because it required buy- ing more powerful PCs and new software. To spur Vista sales, Microsoft announced it would stop selling Windows XP in June 2008—a move that launched a storm of protest. Microsoft thereupon softened its initial posture and said it would continue to make XP available and would provide extended customer support and fix bugs for XP until 2014. However, in spite of this change, Vista did not sell well, so Microsoft moved on to Windows 7, or Windows 2009. WINDOWS 7 Windows 7 (or Windows 2009), the newest version of Microsoft Windows was released in October 2009. The new operating system includes iPhone-like touch-screen applications called Microsoft Surface, an alternative to the computer mouse. Thus, you can manipulate objects on the screen with your hands, such as enlarge and shrink photos or navigate a city map by strok- ing the screen. ( • See Panel 3.17 .) Windows 7 is less power-hungry than Vista, boots up more quickly than previous Windows systems, and has improved networking and security features. As does XP, Windows 7 comes in various versions: • Starter • Home Basic • Home Premium • Professional • Enterprise (for multi-user businesses) • Ultimate (for retail businesses) Vista and XP users can upgrade to Windows 7, but with some difficulty and some cost. (See more info! on the next page.). There are many detailed issues involved with upgrading/changing an operating system. If you are a Windows user and are considering an upgrade, go to Microsoft’s support site ( www. support.microsoft.com ) to find out what options are open to you. A problem for any version of Windows, however, is that it builds off the same core architecture that represents more than 20 years of legacies. Some believe For more on how Media Centers work, go to: www.microsoft.com/ windows/windows-vista/ features/media-center.aspx http://on10.net/blogs/ maxpowerhouse7/ CES-2009-Windows- Media-Center-on-Windows- 7-with-Touch/ Survival Tip OEM If you buy a computer with Windows (or any other operat- ing system) already installed, the OS is called an OEM (origi- nal equipment manufacturer) version. If you buy your OS off the shelf, it is called a retail version. These two versions are almost identical, except an OEM version will install only on the specific machine for which it was intended. A retail version will install on any compatible machine. If you have an OEM version, you have to call the computer manufacturer, not the OS pro- ducer, for technical support. Because a retail version is not specifically tailored for your particular computer, Microsoft recommends that, before you buy a retail version of an OS, you run a compatibility check at its website ( http://support. microsoft.com ). Aerial view of Microsoft’s Redmond, Washington, main corporate campus, which spreads over several square miles of the Seattle suburb.
  168. Software 143 panel 3.17 Windows 7 screen displays ( top

    ) Flip screen (can be rotated); ( middle ) touch screen (hands-on inter- activity); ( bottom ) per- sonalizing Windows 7
  169. info! more info! more 144 Chapter 3 that Microsoft needs

    to do what Apple did when it introduced its Mac OS X in 2001: start over from scratch. Although this risked alienating some Macintosh users, since it forced them to buy new versions of their existing Mac applica- tions software, it also made the system less vulnerable to crashes. “A monolithic operating system like Windows perpetuates an obsolete design,” said one critic. “We don’t need to load up our machines with bloated layers we won’t use.” 7 Network Operating Systems: NetWare, Windows NT Server, Unix, & Linux How would I distinguish among the several network OSs? The operating systems described so far were principally designed for use with stand-alone desktop and laptop machines. Now let’s consider the important operating systems designed to work with sizeable networks—NetWare, Win- dows NT Server, Unix/Solaris, and Linux. NOVELL’S NETWARE NetWare has long been a popular network operat- ing system for coordinating microcomputer-based local area networks (LANs) throughout a company or a campus. LANs allow PCs to share pro- grams, data files, and printers and other devices. A network OS is usually located on a main server (see Chapter 1), which controls the connectivity of connected smaller networks and individual computers. Novell, the maker of NetWare, thrived as corporate data managers realized that networks of PCs could exchange information more cheaply than the previous generation of mainframes and midrange computers. The biggest challenge to NetWare has been the Windows’ versions of NT and Server. However, Novell is continuing to improve its networking OS with its new version, Open Enterprise Server, which combines Netware with the benefits of a more recently popular operat- ing system, Linux (discussed shortly). WINDOWS NT & NT SERVER Windows desktop operating systems (95/98/Me/ XP/Vista/7) can be used to link PCs in small networks in homes and offices. However, something more powerful was needed to run the huge networks linking a variety of computers—PCs, workstations, mainframes—used by many companies, universities, and other organizations, which previously were served principally by Unix and NetWare operating systems. Microsoft Win- dows NT (the NT stands for “New Technology”) and now called Windows Server 2008, is the company’s multitasking operating system designed to run on network servers in businesses of all sizes. It allows multiple users to share resources such as data, programs, and printers and to build web appli- cations and connect to the internet. The Windows NT/Server networking OS comes in various versions, and some of its functions are built into XP, Vista, and Windows 7. UNIX, SOLARIS, & BSD Unix (pronounced “ you -nicks”) was developed at AT&T’s Bell Laboratories in 1969 as an operating system for minicomputers. By the 1980s, AT&T entered into partnership with Sun Microsystems to develop a standardized version of Unix for sale to industry. Today Unix is a proprietary multitasking operating system for multiple users that has built-in net- working capability and versions that can run on all kinds of computers. ( • See Panel 3.18 .) It is used mostly on mainframes, workstations, and servers, rather than on PCs. Government agencies, universities, research institutions, large corporations, and banks all use Unix for everything from designing air- plane parts to currency trading. Because it is particularly stable and reliable, Unix is also used for website management and runs the backbone of the inter- net. The developers of the internet built their communications system around Unix because it has the ability to keep large systems (with hundreds of proces- sors) churning out transactions day in and day out for years without fail. XP versus Vista and 7 To compare Windows XP to Windows Vista and Windows 7, try: www.microsoft.com www.pcmag.com http://news.softpedia.com/ newsImage/Windows-7-vs- Vista-SP1-vs-XP-SP3- Feature-Comparison-3.jpg/ Survival Tip New Installation Every time you install or rein- stall Windows XP, Vista, or 7 you will have to get Microsoft’s permission to activate it. You can do this over the internet or via the phone. Upgrading to Windows 7 For a step-by step guide to upgrade to Windows 7: www.blogsdna.com/3217/step- by-step-guide-to-upgrade- windows-xp-to-windows-7. htm Or you can buy software to do it for you: www.laplink.com/pcmover/ pcmoverupgradeassistant. html
  170. Software 145 Nervous about spam, spyware, phishing, viruses, and other

    threats to your computer? That’s cer- tainly been the case for many Windows PC users. “Microsoft has paid so little attention to secu- rity over the years,” says distinguished technology writer Walter Mossberg, “that consumers who use Windows have been forced to spend more and more of their time and money fending off” these invasive demons. 8 In late 2004, the software giant rolled out a major, free operating system upgrade called Service Pack 2, or SP2. Among other things, this was supposed to reduce the risk to Microsoft’s Internet Explorer web browser of online attacks that had frustrated users and slowed businesses. However, the company conceded that SP2 interfered with about 50 known programs, including corporate products and a few games. And a couple of months later, Microsoft issued sev- eral “security advisories” urging consumers and businesses to patch 21 new flaws in Windows software products. In Feb- ruary 2005 it said that it was upgrading its Internet Explorer against malicious software and expected to include security defenses in its new operating system, Vista. Service Pack 3 (2008) was supposed to “cure” some more Windows secu- rity ills, but many users remain critical of Windows’ vulner- ability to viruses and the like. Microsoft’s Service Packs versus Patches As we have mentioned, a service pack (sometimes called a “service release”) is a collection of files for various updates, software bug fixes, and security improvements. A patch (sometimes called a “hotfix”) is an update that occurs between service packs; most patches are built to correct security vulnerabilities. Service packs are planned, or stra- tegic, releases. Patches are unplanned, interim solutions. A new service pack is supposed to “roll up” all previous service packs and patches. Microsoft recommends installing PRACTICAL ACTION Get a PC or Get a Mac? Security Issues both packs and patches as they become available but also checking the online bulletin accompanying every new patch to see what vulnerability risks it poses to your particular hardware and software configuration. It would appear, however, that the pack-and-patch approach to security for Microsoft products will be with us for a long time. “We don’t feel like we’ve ever crossed the finish line,” says Windows’ lead product manager. “We have to keep outrunning the bad guys.” 9 Switch to Mac? Perhaps because Apple Macintosh has a smaller percentage of the market share for microcomputers, it seems to have eluded most of the attention of the hackers and virus writ- ers. Similarly, for whatever reasons, Linux-based computers hardly get infected or invaded at all. Big-business users, it’s suggested, have too much money invested in Windows machines to think of switching to Macin- toshes; the costs of making the change would be astronomical. Individual users, however, might wish to give it some thought. What if you already have Microsoft Office files, such as Microsoft Word or Microsoft Excel, on a PC and want to move them to a Mac? In that case, you’ll need the current version of Microsoft Office for the Mac, which will handle the PC version, and a Mac with an Intel processor. Apple’s OS X also comes with a program called Mail and a word processor called Text Edit that will deal with Microsoft Word documents that come to you online. You can also get a Macintosh ver- sion of Internet Explorer, which is, in fact, considered safer than the Windows versions. Check out www.macvswindows.com/index.php?title ϭ Main_Page, or do keyword searches for “Mac vs. Windows” and “Mac vs. PC.” panel 3.18 Unix screen
  171. 146 Chapter 3 • Versions of Unix: Sun Microsystems’ Solaris

    is a version of Unix that is popular for handling large e-commerce servers and large websites. Another interesting variant is BSD, free software derived from Unix. BSD began in the 1970s in the computer science department of the University of California, Berkeley, when students and staff began to develop their own derivative of Unix, known as the Berkeley Software Distribution, or BSD. There are now three variations, which are distributed online and on CD. Other Unix variations are made by Hewlett-Packard (HP-UX) and IBM (AIX). • Unix interface—command or shell? Like MS-DOS, Unix Some Common Unix Commands ^h, [backspace] erase previously typed character ^u erase entire line of input typed so far cp copy files whoami who is logged on to this terminal mkdir make new directory mv change name of directory mail read/send email gzip, gunzip compress, recompress a file lpr send file to printer wc count characters, words, and lines in a file head show first few lines of a file tail show last few lines of a file find find files that match certain criteria panel 3.19 Linux screen ( inset ) uses a command-line interface (but the commands are different for each system). Some companies market Unix systems with graphical interface shells that make Unix easier to use. LINUX It began in 1991 when programmer Linus Torvalds, a graduate stu- dent in Finland, posted his free Linux operating system on the internet. Linux (pronounced “ linn -uks”) is the rising star of network software. Linux is a free (nonproprietary) version of Unix, and its continual improvements result from the efforts of tens of thousands of volunteer programmers. ( • See Panel 3.19 .) Whereas Windows NT/Server is Microsoft’s proprietary product, Linux is open-source software —meaning any programmer can download it from the internet for free and modify it with suggested improvements. The only qualification is that changes can’t be copyrighted; they must be made available to all and remain in the public domain. From these beginnings, Linux has attained cultlike status. “What makes Linux different is that it’s part of the internet culture,” says an IBM general manager. “It’s essentially being built by a community.” 10
  172. info! more info! more Software 147 • Linux and China:

    In 2000, the People’s Republic of China announced that it was adopting Linux as a national standard for operating systems because it feared being dominated by the OS of a company of a foreign power—namely, Microsoft. In 2005, Red Flag Software Company, Ltd., the leading developer of Linux software in China, joined the Open Source Development Labs, a global consortium dedicated to accelerating the adoption of Linux in the business world. In 2007, OSDL and the Free Standards Group merged to form The Linux Foundation ( http://osdl.org/en/Main_Page ), narrowing their respective focuses to that of promoting Linux in competition with Microsoft Windows. • The permutations of Linux: If Linux belongs to everyone, how do companies such as Red Hat Software—a company that bases its business on Linux—make money? Their strategy is to give away the software but then sell services and support. Red Hat, for example, makes available an inexpensive application software package that offers word processing, spreadsheets, email support, and the like for users of its PC OS version. It also offers more powerful versions of its Linux OS for small and medium- size businesses, along with applications, networking capabilities, and support services. • Google Chrome: In late 2008, Google launched its Chrome internet browser. Based on Linux, this browser is intended for people who do most of their computer activities on the web. However, most of the operating systems that computers run on were designed in an era when there was no web; so in July 2009, Google introduced the Chrome OS. This operating system is a lightweight, open-source Linux-based system with a new windowing arrangement that has initially been targeted at netbooks. The user interface is minimal, and internet connection is fast and secure. As with the Chrome browser, this OS has been created for people who spend most of their computer time on the web. Chrome does not support Microsoft Office, which will limit its usability in business, educational, and professional environments, but it does support OpenOffice, Google email, Google Docs, and cloud computing. The full version of Chrome OS was supposed to become available in 2010. Dell Computers now offers a Linux-based operating system, Ubuntu (the Zulu word for “humanity”), on some of its products. Some companies, such as Ibex, make dual-boot PCs that can switch back and forth between Windows and Linux by rebooting. Win4Lin, Inc., a leading supplier of specialized operating systems that run on Linux, has released Win4Lin Desktop 5, which runs Windows and Windows applications on Linux. More recently, several varieties of Linux have been introduced to run on the low-end kind of computers known as netbooks. They include Ubuntu, Hewlett-Packard’s Mi (which is based on Ubuntu), and Intel Corp.’s Mobilin. 11 • Linux in the future: Because it was originally built for use on the internet, Linux is more reliable than Windows for online applications. Hence, it is better suited to run websites and e-commerce software. Its real growth, however, may come as it reaches outward to other applications and, possibly, replaces Windows in many situations. IBM, Red Hat, Motorola Computing, Panasonic, Sony, and many other companies have formed the nonprofit, vendor-neutral Embedded Linux Consortium, which now, as part of The Linux Foundation, is working to make Linux a top operating system of choice for developers designing embedded systems, as we discuss next. The three major microcomputer operating systems are compared in the box on the next page. ( • See Panel 3.20 .) China’s Red Flag To learn more about China’s Red Flag Software Company, go to: www.redflag-linux.com/egyhq. html http://en.wikipedia.org/wiki/ Red_Flag_Linux Linux versus Windows Do you think Linux will over- take Windows? Will more users switch to Mac OS X? To research Linux, go to: www.kernel.org http://news.softpedia.com/ cat/Linux/ www.lwn.net For Mac OS, go to: www.macosrumors.com http://news.softpedia.com/ cat/Apple/, www.macrumors. com For Windows, go to: www.winsupersite.com www.neowin.net www.winbeta.org http://news.softpedia.com/ cat/Microsoft/ For general OS matters, go to: www.betanews.com www.osnews.com
  173. info! more info! more 148 Chapter 3 Embedded Operating Systems

    for Handhelds: Palm OS & Windows CE What are some different embedded OSs for handheld computers and PDAs? An embedded system is any electronic system that uses a CPU chip but that is not a general-purpose workstation, desktop, or laptop computer. It is a spe- cialized computer system that is part of a larger system or a machine. Embed- ded systems are used, for example, in automobiles, planes, trains, barcode scanners, fuel pumps, space vehicles, machine tools, watches, appliances, cellphones, PDAs, and robots. Hand- held computers and personal digital assistants rely on specialized operating systems, embedded operating systems, that reside on a single chip. Such oper- ating systems include the Palm OS and Windows CE. PALM OS—THE DOMINANT OS FOR HANDHELDS The Linux-based Palm OS, also known as Garnet OS and webOS, developed by Palm Inc., is a popular operating system for mobile devices, including smartphones, wrist watches, handheld gaming consoles, barcode readers and GPS devices. In 1994, Jeff Hawkins took blocks of mahogany and plywood into his garage and emerged with a prototype for the Windows XP Linux Mac OS X Pros: Pros: Pros: Runs on a wide range of hardware Has largest market share Has many built-in utilities Cons: Security problems Not efficient used as a server OS Have to reboot every time a network configuration is changed Proprietary software; only company programmers can fix bugs Easy to install Best GUI Secure and stable Cons: Supports only Apple computers Base hardware more expensive than other platforms Fewer utilities available Fewer games than for Windows Proprietary software; only company programmers can fix bugs Runs on a wide range of hardware Has largest number of user interface types Can be used as server or desktop PC open source software; anyone can fix bugs Cons: Limited support for games Limited commercial applications available Can be difficult to learn panel 3.20 OS comparison More on OS Comparisons For more details on OS com- parisons, go to: www.iterating.com/ productclasses/ Operating-Systems Open-Source Search Open-source utilities—some command-line interfaces, some GUIs—are available for Linux and Mac systems. What keywords could you use to find these utilities? Palm Pre ¯ OS screen Palm OS launcher screen
  174. info! more Software 149 PalmPilot, which led to the revolution

    in handheld computing. Palm Inc. sells the popular Preˉ Smartphone, the Centro Smartphone, and the Treo Pro Smartphone, as well as various models of PDAs. (Smartphones are cellular phones that have built-in music players and video recorders and that run com- puterlike applications and support internet activities beyond just email. We discuss them in detail in Chapter 7.) Early versions of handhelds cannot be upgraded to run recent versions of Palm OS. If you buy a PDA or a smartphone, therefore, you need to make sure that the OS is a current version and that the manufacturer plans to continue to support it. WINDOWS EMBEDDED—MICROSOFT WINDOWS FOR HANDHELDS & EMBEDDED SYSTEMS In 1996, Microsoft released Microsoft Windows CE, now known as Windows Embedded, a slimmed-down version of Windows, for handhelds such as those made by Garmin, ASUS, Dell, and Hewlett- Packard. The Windows handheld OS has the familiar Windows look and feel and includes mobile Microsoft OS for HP iPAQ Microsoft OS for Socket Mobile Palm OS For updates on the Palm OS for Palm PDAs and Treo Smart- phones, try: www.versiontracker.com/ palmos/ www.freeware-palm.com/ and http://kb.palm.com/wps/ portal/kb/na/centro/ centro/sprint/downloads/ page_en.html
  175. 150 Chapter 3 versions of word processing, spreadsheet, email, web

    browsing, text messaging, and other software. Windows Mobile, based on CE, is used in certain smart- phones. Special versions of Windows CE are also used in embedded systems such as ATMs, barcode scanners, kiosks, gaming devices, and set-top boxes. 3.6 APPLICATION SOFTWARE: Getting Started What are five ways of obtaining application software, tools available to help me learn to use software, three common types of files, and the types of software? At one time, just about everyone paid for microcomputer application software. You bought it as part of the computer or in a software store, or you downloaded it online with a credit card charge. Now, other ways exist to obtain software. Application Software: For Sale, for Free, or for Rent? What are the various ways I can obtain software? Although most people pay for software, usually popular brands that they can use with similar programs owned by their friends and coworkers, it’s possible to rent programs or get them free. ( • See Panel 3.21 .) Let’s consider these categories. COMMERCIAL SOFTWARE Commercial software, also called proprietary soft- ware or packaged software, is software that’s offered for sale, such as Micro- soft Word, Microsoft Office XP, or Adobe PhotoShop. Although such software may not show up on the bill of sale when you buy a new PC, you’ve paid for some of it as part of the purchase. And, most likely, whenever you order a new game or other commercial program, you’ll have to pay for it. This software is copyrighted. A copyright is the exclusive legal right that prohibits copying of intellectual property without the permission of the copyright holder. Software manufacturers don’t sell you their software; rather, they sell you a license to become an authorized user of it. What’s the difference? In paying for a software license, you sign a contract in which you agree not to make copies of the software to give away or resell. That is, you have bought only the company’s permission to use the software and not the software itself. This legal nicety allows the company to retain its rights to the program and limits the way its customers can use it. The small print in the licensing agreement usually allows you to make one copy (backup copy or archival copy) for your own use. (Each software company has a different license; there is no industry standard.) Several types of software licenses exist: • Site licenses allow the software to be used on all computers at a specific location. • Concurrent-use licenses allow a certain number of copies of the software to be used at the same time. Types Commercial software Public-domain software Shareware Freeware Rentalware Definition Copyrighted. If you don’t pay for it, you can be prosecuted. Not copyrighted. You can copy it for free without fear of prosecution. Copyrighted. Available free, but you should pay to continue using it. Copyrighted. Available free. Copyrighted. Lease for a fee. panel 3.21 Choices among application software Survival Tip What to Set Up First? When setting up a new micro- computer system, install your peripherals first—first your printer, any external storage drives, scanner, and so on. Test each one separately by restarting the computer. Then install the next peripheral. After this, install your applica- tions software, again testing each program separately.
  176. info! more info! more Software 151 • A multiple-user license

    specifies the number of people who may use the software. • A single-user license limits software use to one user at a time. Most personal computer software licenses allow you to run the program on only one machine and make copies of the software only for personal backup purposes. Personal computer users often buy their software in shrink-wrapped packages; once you have opened the shrink wrap, you have accepted the terms of the software license. Every year or so, software developers find ways to enhance their products and put forth new versions or new releases. A version is a major upgrade in a software product, traditionally indicated by numbers such as 1.0, 2.0, 3.0— for example, Adobe 8.0 and Adobe 9.0. More recently, other notations have been used. After 1995, Microsoft labeled its Windows and Office software ver- sions by year instead of by number, as in Microsoft’s Office 97, Office 2000, Office 2003, and Office 2007. A release, which now may be called an “add” or “addition,” is a minor upgrade. Often this is indicated by a change in number after the decimal point. (For instance, 8.0 may become 8.1, 8.2, and so on.) Some releases are now also indicated by the year in which they are marketed. And, unfortunately, some releases are not clearly indicated at all. (These are “patches,” which may be downloaded from the software maker’s website, as can version updates.) Once you have purchased an application, the manufac- turer will usually allow you to download small patches for free but will charge for major new versions. More recently, Apple Inc. has enjoyed huge success with its online Apple App Store, offering more than 1,600 business applications that can be downloaded directly to your cellphone. 12 Other “stores” offering downloadable applications are BlackBerry App World, Google Android Market, Palm Software Store, and Microsoft’s Windows Mobile Store. 13 PUBLIC-DOMAIN SOFTWARE Public-domain software is not protected by copyright and thus may be duplicated by anyone at will. Public- domain programs—sometimes developed at taxpayer expense by government agencies— have been donated to the public by their creators. They are often available through sites on the internet. You can download and duplicate public-domain software without fear of legal prosecution. SHAREWARE Shareware is copyrighted software that is distributed free of charge, but users are required to make a monetary contribution, or pay a registration fee, to continue using it —in other words, you can try it before you buy it. Once you pay the fee, you usually get supporting documentation, access to updated versions, and perhaps some technical support. Shareware is distributed primarily through the internet, but because it is copyrighted, you cannot use it to develop your own program that would compete with the original product. If you copy shareware and pass it along to friends, they are expected to pay the registration fee also, if they choose to use the software. FREEWARE Freeware is copyrighted software that is distributed free of charge, today most often over the internet. Why would any software creator let his or her product go for free? Sometimes developers want to see how users respond, so that they can make improvements in a later version. Sometimes they want to further some scholarly or humanitarian purpose—for instance, to create a standard for software on which people are apt to agree. In its most recent form, freeware is made available by companies trying to make money some other way—as, by attracting viewers to their advertising. (The web browsers Internet Explorer and Mozilla Firefox are of this type.) Freeware developers generally retain all rights to their programs; technically, you are not supposed to duplicate and redistribute the programs. (Freeware is different Important: Use of the enclosed software is subject to the license agreement included on this CD-ROM. You must read and agree to these terms and condi- tions before using the software. Any other use, copying, or distribu- tion of the software is strictly prohibited. Part of a software license Public Domain Software For information on public domain software and where to obtain it, go to: www.gnu.org/philosophy/ categories.html www.webcrawler.com/ webcrawler301/ws/results/ web/publicϩdomainϩ software/1/417/topnavigation/ relevance/iq ϭ true/ zoom ϭ off/_iceurlflag ϭ 7?_ice url ϭ true&gclid ϭ ckik1ifjspscfr wdagodtafvpa Shareware & Freeware What kinds of shareware and freeware are available? To find out, go to: www.searchalot.com/Top/ Computers/Software/ www.shareware.com www.tucows.com www.freewarehome.com www.download.com www.sharewareking.com
  177. info! more 152 Chapter 3 from free software, or public-domain

    software, which has no restrictions on use, modification, or redistribution.) RENTALWARE: ONLINE SOFTWARE Rentalware is online software that users lease for a fee and download whenever they want it. This is the concept behind application service providers (ASPs), or software-as-a-service (SaaS) technology, the idea of leasing software over the internet. The ASP stores the software on its servers and supplies users with support and other services. Today online software accounts for only a small part of business-software sales, but it could represent the wave of the future, because it frees businesses from having to buy computer servers and hire a staff to maintain them. Some business owners find that present-day online software isn’t as good as the tra- ditional software available. However, online software represents a stage in what in Chapter 1 we called “cloud computing,” the idea of obtaining comput- ing resources from the network of computers sitting beyond a user’s own four walls. 14 Some experts believe that future software is more apt to be available in a variety of ways: through traditional licensing, through online rentalware, through ad-supported online means, and even through open-source means. 15 PIRATED SOFTWARE Pirated software is software obtained illegally, as when you get a CD/DVD from a friend who has made an illicit copy of, say, a commercial video game. Sometimes pirated software can be downloaded off the internet. Sometimes it is sold in retail outlets in foreign countries. If you buy such software, not only do the original copyright owners not get paid for their creative work, but you risk getting inferior goods and, worse, picking up a virus. To discourage software piracy, many software manufacturers, such as Microsoft, require that users register their software when they install it on their computers. If the software is not registered, it will not work properly. ABANDONWARE “Abandonware” does not refer to a way to obtain software. It refers to software that is no longer being sold or supported by its publisher. U.S. copyright laws state that copyrights owned by corporations are valid for up to 95 years from the date the software was first published. Copyrights are not considered abandoned even if they are no longer enforced. Therefore, abandoned software does not enter the public domain just because it is no longer supported. Don’t copy it. CUSTOM SOFTWARE Occasionally, companies or individuals need software written specifically for them, to meet unique needs. This software is called custom software, and it’s created by software engineers and programmers. Recently many people who have never written a line of computer code have been inspired to learn programming as a possible way to make money devel- oping applications for downloading off the popular Apple iPhone. 16 Tutorials & Documentation How could software tutorials and documentation be helpful to me? How are you going to learn a given software program? Most commercial pack- ages come with tutorials and documentation. TUTORIALS A tutorial is an instruction book or program that helps you learn to use the product by taking you through a prescribed series of steps. For instance, our publisher offers several how-to books that enable you to learn different kinds of software. Tutorials may also form part of the software package. DOCUMENTATION Documentation is all information that describes a product to users, including a user guide or reference manual that provides a narra- tive and graphical description of a program. Although documentation may More about ASPs If you want to learn more about ASPs, go to: www.aspnews.com www.dmoz.org/Computers/ Software/Business/ E-Commerce/Business-to- Business/Application_ Service_Providers//
  178. Software 153 be print-based, today it is usually available on

    CD, as well as via the internet. Documentation may be instructional, but features and functions are usually grouped by category for reference purposes. For example, in word processing documentation, all features related to printing are grouped together so that you can easily look them up. A Few Facts about Files & the Usefulness of Importing & Exporting What are three types of files, and what do importing and exporting mean? There is only one reason for having application software: to take raw data and manipulate it into useful files of information. A file, as we said earlier, is (1) a named collection of data (data file) or (2) a program (program file) that exists in a com- puter’s secondary storage, such as hard disk, keychain (Chapter 4), or CD/DVD. THREE TYPES OF DATA FILES Three well-known types of data files are these: • Document files: Document files are created by word processing programs and consist of documents such as reports, letters, memos, and term papers. • Worksheet files: Worksheet files are created by electronic spreadsheets and usually consist of collections of numerical data such as budgets, sales forecasts, and schedules. • Database files: Database files are created by database management programs and consist of organized data that can be analyzed and displayed in various useful ways. Examples are student names and addresses that can be displayed according to age, grade-point average, or home state. EXCHANGING FILES: IMPORTING & EXPORTING It’s useful to know that often files can be exchanged—that is, imported and exported—between programs. • Importing: Importing is defined as getting data from another source and then converting it into a format compatible with the program in Tutorial: Microsoft Office training First page of downloaded documentation for Adobe Acrobat 8
  179. 154 Chapter 3 which you are currently working. For example,

    you might write a letter in your word processing program and include in it—that is, import—a column of numbers from your spreadsheet program. The ability to import data is very important in software applications because it means that one application can complement another. • Exporting: Exporting is defined as transforming data into a format that can be used in another program and then transmitting it. For example, you might work up a list of names and addresses in your database program and then send it—export it—to a document you wrote in your word processing program. Exporting implies that the sending application reformats the data for the receiving application; importing implies that the receiving application does the reformatting. Types of Application Software What is productivity software? Application software can be classified in many ways—for entertainment, per- sonal, education/reference, productivity, and specialized uses. ( • See Panel 3.22 .) In the rest of this chapter we will discuss types of productivity software — such as word processing programs, spreadsheets, and database managers— whose purpose is to make users more productive at particular tasks. Some productivity software comes in the form of an office suite, which bundles several applications together into a single large package. Microsoft Office, for example, includes (among other things) Word, Excel, and Access—word pro- cessing, spreadsheet, and database programs, respectively. (Office is available Entertainment software Games, etc. Personal software Cookbooks Medical Home decoration Gardening Home repair Tax preparation etc. Education/ reference software APPLICATIONS SOFTWARE Encyclopedias Phone books Almanacs Library searches etc. Productivity software Word processing Spreadsheets Database managers Personal information managers Web browser Email etc. Specialty software Presentation graphics Financial Desktop publishing Drawing & painting (image editing) Video/audio editing Animation Multimedia authoring Web page design Project management Computer- aided design PDF etc. Ch. 2 panel 3.22 Types of application software
  180. info! more Software 155 for both the PC and the

    Mac platforms.) Corel Corp. offers similar programs, such as the WordPerfect word processing program. Other productivity soft- ware, such as Lotus Notes, is sold as groupware —online software that allows several people to collaborate on the same project and share some resources. Google offers a free suite of applications called Google Aps (from www.google. com/apps ) . 17 We now consider the three most important types of productivity software: word processing, spreadsheet, and database software (including personal information managers). We then discuss more specialized software: presen- tation graphics, financial, desktop-publishing, drawing and painting, project management, computer-aided design, web page design, image/video/audio editing, and animation software. 3.7 WORD PROCESSING What can I do with word processing software that I can’t do with pencil and paper? After a long and productive life, the typewriter has gone to its reward. Indeed, it is practically as difficult today to get a manual typewriter repaired as to find a blacksmith. Word processing software offers a much-improved way of deal- ing with documents. Word processing software allows you to use computers to create, edit, format, print, and store text material, among other things. Word processing is the most common software application. The best-known word processing program is Microsoft Word, but there are others, such as Corel WordPerfect, Apple Pages, Google Apps (a free download from www.google.com/apps ), and Zoho Writer (a free download from www.zoho.com ). 18 There is even a full- fledged word processor, known as Quickoffice, that can be used on the Apple iPhone. 19 Word processing software allows users to work through a document and delete, insert, and replace text, the principal edit/correction activities. It also offers such additional features as creating, formatting, printing, and saving. Office Suites Commercial Office suites are fairly expensive— but there is a free alternative, available for a number of different OSs: OpenOffice.org. It can read most other file formats, includ- ing Microsoft Office, and it has most of the same features as MS Office.
  181. info! more 156 Chapter 3 Creating Documents What are word

    processing features I would use when creating a document? Creating a document means entering text using the keyboard or the dictation function associated with speech-recognition software. Word processing soft- ware has three features that affect this process—the cursor, scrolling, and word wrap. CURSOR The cursor is the movable symbol on the display screen that shows you where you may next enter data or commands. The symbol is often a blinking rectangle or an I-beam. You can move the cursor on the screen using the keyboard’s directional arrow keys or a mouse. The point where the cursor is located is called the insertion point. SCROLLING Scrolling means moving quickly upward, downward, or side- ways through the text or other screen display. A standard computer screen displays only 20–22 lines of standard-size text. Of course, most documents are longer than that. Using the directional arrow keys, or the mouse and a scroll bar located at the side of the screen, you can move (“scroll”) through the dis- play screen and into the text above and below it. WORD WRAP Word wrap automatically continues text to the next line when you reach the right margin. That is, the text “wraps around” to the next line. You don’t have to hit a “carriage-return” key or Enter key, as was necessary with a typewriter. SOME OTHER To help you organize term papers and reports, the Outline View feature puts tags on various headings to show the hierarchy of heads—for example, main head, subhead, and sub-subhead. Word processing software also allows you to insert footnotes that are automatically numbered and renumbered when changes are made. The basics of word processing are shown in the illustration at right. ( • See Panel 3.23 .) Editing Documents What are various kinds of editing I can do in a word processing document? Editing is the act of making alterations in the content of your document. Some features of editing are insert and delete, undelete, find and replace, cut/copy and paste, spelling checker, grammar checker, and thesaurus. Some of these com- mands are in the Edit pull-down menu and icons on the toolbar. INSERT & DELETE Inserting is the act of adding to the document. Simply place the cursor wherever you want to add text and start typing; the existing char- acters will be pushed along. If you want to write over (replace) text as you write, press the Insert key before typing. When you’re finished typing, press the Insert key again to exit Insert mode. Deleting is the act of removing text, usually using the Delete key or the Back- space key. The Undo command allows you to change your mind and restore text that you have deleted. Some word processing programs offer as many as 100 layers of “undo,” so that users who delete several paragraphs of text, but then change their minds, can reinstate the material. FIND & REPLACE The Find, or Search, command allows you to find any word, phrase, or number that exists in your document. The Replace command allows you to automatically replace it with something else. Cursor To clean your printer, first open the top by pressing the button on the left side near the top. Swing the lid_ _ Scrolling Creating a Watermark A character, word, or image that appears faintly in the background of a printed docu- ment is called a watermark or a background. To add one to your Word 2003 document, select Format, Background and Printed Watermark. Then select Picture Watermark or Text Watermark and provide the requested information. In Word 2007, in the Page Layout tab, in the Page Background group, click Watermark.
  182. Software 157 Title bar: Shows name of document you’re working

    on Tabs: with grouped command options Save Name of typeface Size of Typeface Set number of Columns Set Page color Text alignment buttons: Click on one to align text left, centered, right, or full justified. Redo Undo panel 3.23 Some word processing functions CUT/COPY & PASTE Typewriter users who wanted to move a paragraph or block of text from one place to another in a manuscript used scissors and glue to “cut and paste.” With word processing, moving text takes only a few keystrokes. You select (highlight with the mouse) the portion of text you want to copy or move. Then you use the Copy or Cut command to move it to the clipboard, a special holding area in the computer’s memory. From there, you use Paste to transfer the material to any point (indicated with the cursor) in the existing document or in a new document. The clipboard retains its material, so repeated pastes of the same item will work without your having to recopy each time.
  183. 158 Chapter 3 SPELLING CHECKER Most word processors have a

    spelling checker, which tests for incorrectly spelled words. As you type, the spelling checker indicates (per- haps with a squiggly line) words that aren’t in its dictionary and thus may be misspelled. ( • See Panel 3.24 at right.) Special add-on dictionaries are avail- able for medical, engineering, and legal terms. In addition, programs such as Microsoft Word have an Auto Correct func- tion that automatically fixes such common mistakes as transposed letters— replacing “teh” with “the,” for instance. GRAMMAR CHECKER A grammar checker highlights poor grammar, wordiness, incomplete sentences, and awkward phrases. The grammar checker won’t fix things automatically, but it will flag (perhaps with a different-color squiggly line) possible incorrect word usage and sentence structure. ( • See Panel 3.25 .) THESAURUS If you find yourself stuck for the right word while you’re writing, you can call up an on-screen thesaurus, which will present you with the appro- priate word or alternative words. Formatting Documents with the Help of Templates & Wizards What are some types of formatting I can do? In the context of word processing, formatting means determining the appear- ance of a document. You can always format your documents manually, but word processing programs provide a helpful device to speed the process up and make it more sophisticated. A template, called a wizard in older Office versions, is a preformatted document that provides basic tools for shap- ing a final document —the text, layout, and style for a letter, for example. Simply put, it is a style guide for documents. Because most documents are fairly standard in format, every word processing program comes with at least a few standard templates. When you use a template, you’re actually opening a copy of the template. In this way you’ll always have a fresh copy of the origi- nal template when you need it. After you open a copy of the template and add your text, you save this version of the template under the filename of your choice. In this way, for example, in a letterhead template, your project’s name, address, phone number, and web address are included every time you open your letterhead template file. Among the many aspects of formatting are these: FONT You can decide what font —typeface and type size—you wish to use. For instance, you can specify whether it should be Arial, Courier, or Freestyle Script. You can indicate whether the text should be, say, 10 points or 12 points in size and the headings should be 14 points or 16 points. (There are 72 points in an inch.) You can specify what parts should be underlined, italic, or boldface. SPACING & COLUMNS You can choose whether you want the lines to be sin- gle-spaced or double-spaced (or something else). You can specify whether you want text to be one column (like this page), two columns (like many magazines and books), or several columns (like newspapers). MARGINS & JUSTIFICATION You can indicate the dimensions of the margins— left, right, top, and bottom—around the text. You can specify the text justifi- cation —how the letters and words are spaced in each line. To justify means to align text evenly between left and right margins, as in most newspaper columns and this text. To left-justify means to align text evenly on the left. (Left-justified text has a “ragged-right” margin, as do many business letters.) Centering centers each text line in the available white space between the left and right margins. Word can help you choose templates Left-justified Justified Centered Right-justified
  184. Software 159 panel 3.24 Spelling checker How a word processing

    program checks for mis- spelled words and offers alternatives (Microsoft Word). Green wavy line indicates a possible grammar error. Choose Change to make the suggested correction. Dialog box suggests a correction. panel 3.25 Grammar checker This program points out possible errors in sentence structure and word usage and suggests alternatives (Microsoft Word). HEADERS, FOOTERS, & PAGE NUMBERS You can indicate headers or footers and include page numbers. A header is common text (such as a date or docu- ment name) printed at the top of every page. A footer is the same thing printed at the bottom of every page. If you want page numbers, you can determine what number to start with, among other things. Red wavy line Indicates spelling checker doesn’t recognize the word. Dialog box Suggests correct spellings. Choose Change to insert the highlighted word.
  185. 160 Chapter 3 OTHER FORMATTING You can specify borders or

    other decorative lines, shad- ing, tables, and footnotes. You can import graphics or drawings from files in other software programs, including clip art —collections of ready-made pic- tures and illustrations available online or on CDs/DVDs. DEFAULT SETTINGS Word processing programs (and indeed most forms of application software) come from the manufacturer with default settings. Default settings are the settings automatically used by a program unless the user specifies otherwise, thereby overriding them. Thus, for example, a word processing program may automatically prepare a document single- spaced, left-justified, with 1-inch right and left margins, unless you alter these default settings. Output Options: Printing, Faxing, or Emailing Documents What are some of my output options? Most word processing software gives you several options for printing. For example, you can print several copies of a document. You can print individual pages or a range of pages. You can even preview a document before printing it out. Previewing (print previewing) means viewing a document on-screen to see what it will look like in printed form before it’s printed. Whole pages are displayed in reduced size. You can also send your document off to someone else by fax or email attach- ment if your computer has the appropriate communications link. Saving Documents How can I save a document? Saving means storing, or preserving, a document as an electronic file permanently —on your hard disk or a CD, for example. Saving is a feature of nearly all application software. Having the document stored in electronic form spares you the tiresome chore of retyping it from scratch whenever you want to make changes. You need only retrieve it from the storage medium and make the changes you want. Then you can print it out again. (Always save your documents often while you are working; don’t wait!) Web Document Creation How do I format a document to put it on the web? Most word processing programs allow you to auto- matically format your documents into HTML so that they can be used on the web. To do this in Micro- soft Word, open File, Save As, Save As Type: Web page (*.htm, *.html). Tracking Changes & Inserting Comments How do I and any cowriters make changes visible in a document? What if you have written an important document and have asked other people to edit it? Word processing software allows editing changes to be tracked by highlight- ing them, underlining additions, and crossing out deletions. Each person working on the document can choose a different color so that you can tell who’s done what and when. And anyone can insert hidden questions or comments that become Survival Tip When Several Word Documents Are Open You can write with several Word documents open simul- taneously. To go (“toggle”) back and forth, hold down Ctrl and press F6. To display several documents at once, go to the Windows menu (2003) or the View tab (2007) and select Arrange All. You can cut and paste text from one document to another. Saving a document as a web page in Word 2007 Tracking in Word 2007
  186. Software 161 visible when you pass the mouse pointer over

    yellow-highlighted words or punc- tuation. An edited document can be printed out showing all the changes, as well as a list of comments keyed to the text by numbers. Or it can be printed out “clean,” showing the edited text in its new form, without the changes. 3.8 SPREADSHEETS What can I do with an electronic spreadsheet that I can’t do with pencil and paper and a standard calculator? What is a spreadsheet? Traditionally, it was simply a grid of rows and col- umns, printed on special light-green paper, that was used to produce financial projections and reports. A person making up a spreadsheet spent long days and weekends at the office penciling tiny numbers into countless tiny rect- angles. When one figure changed, all other numbers on the spreadsheet had to be erased and recomputed. Ultimately, there might be wastebaskets full of jettisoned worksheets. In 1978, Daniel Bricklin was a student at the Harvard Business School. One day he was staring at columns of numbers on a blackboard when he got the idea for computerizing the spreadsheet. He created the first electronic spread- sheet, now called simply a spreadsheet. The spreadsheet allows users to cre- ate tables and financial schedules by entering data and formulas into rows and columns arranged as a grid on a display screen. Before long, the electronic spreadsheet was the most popular small business program. Unfortu- nately for Bricklin, his version (called VisiCalc) was quickly surpassed by others. Today the principal spreadsheets are Microsoft Excel, Corel Quattro Pro, and IBM’s Lotus 1-2-3. Spreadsheets are used for maintaining student grade books, tracking investments, creating and tracking budgets, calculating loan payments, estimating project costs, and creating other types of financial reports. The Basics: How Spreadsheets Work What are the basic principles involved with manipulating a spreadsheet? A spreadsheet is arranged as follows. ( • See Panel 3.26, next page.) HOW A SPREADSHEET IS ORGANIZED A spreadsheet’s arrangement of col- umns, rows, and labels is called a worksheet. • Column headings: In the worksheet’s frame area (work area), lettered column headings appear across the top (“A” is the name of the first column, “B” the second, and so on). • Row headings: Numbered row headings appear down the left side (“1” is the name of the first row, “2” the second, and so forth). • Labels: Labels are any descriptive text that identifies categories, such as APRIL, RENT, or GROSS SALES. You use your computer’s keyboard to type in the various headings and labels. Each Office 2007 worksheet has 16,384 columns and 1,048,576 rows, and each spreadsheet file can technically hold up to 650 related worksheets— but the computer’s memory will not likely hold more than about 200. CELLS: WHERE COLUMNS & ROWS MEET Each worksheet has more than 17 million cells. • Cells & cell addresses: A cell is the place where a row and a column intersect; its position is called a cell address. For example, “A1” is the cell address for the top left cell, where column A and row 1 intersect.
  187. 162 Chapter 3 • Ranges: A range is a group

    of adjacent cells —for example, A1 to A5. • Values: A number or date entered in a cell is called a value . The values are the actual numbers used in the spreadsheet—dollars, percentages, grade points, temperatures, or whatever. Headings, labels, and formulas also go into cells. • Cell pointer: A cell pointer, or spreadsheet cursor, indicates where data is to be entered. The cell pointer can be moved around like a cursor in a word processing program. FORMULAS, FUNCTIONS, RECALCULATION, & WHAT-IF ANALYSIS Why has the spreadsheet become so popular? The reasons lie in the features known as formulas, functions, recalculation, and what-if analysis. • Formulas: Formulas are instructions for calculations; they define how one cell relates to other cells. For example, a formula might be ϭ SUM(A5:A15) or @SUM(A5:A15), meaning “Sum (that is, add) all the numbers in the cells with cell addresses A5 through A15.” • Functions: Functions are built-in formulas that perform common calculations. For instance, a function might average a range of numbers or round off a number to two decimal places. • Recalculation: After the values have been entered into the worksheet, the formulas and functions can be used to calculate outcomes. However, what was revolutionary about the electronic spreadsheet was its ability to easily do recalculation. Recalculation is the process of recomputing values, either as an ongoing process as data is entered or afterward, with the press of a key. With this simple feature, the hours of mind-numbing work Active cell location Title bar Labels Identify contents of cells Values Numbers are called values. Worksheet Area Heavy outline acts as cursor, to indicate current (active) cell. Sheet tabs Let you select a worksheet. (A spreadsheet file can contain several related worksheets, each covering a different topic.) Status bar Shows details about the document you’re working on. Formula bar Tabs with command groups Column headings Row headings panel 3.26 Electronic spreadsheet This program is Microsoft Excel.
  188. Software 163 required to manually rework paper spreadsheets has become

    a thing of the past. • What-if analysis: The recalculation feature has opened up whole new possibilities for decision making. In particular, what-if analysis allows the user to see how changing one or more numbers changes the outcome of the calculation. That is, you can create a worksheet, putting in formulas and numbers, and then ask, “What would happen if we change that detail?”—and immediately see the effect on the bottom line. WORKSHEET TEMPLATES You may find that your spreadsheet software makes worksheet templates available for specific tasks. Worksheet templates are forms containing formats and formulas custom-designed for particular kinds of work. Examples are templates for calculating loan payments, tracking travel expenses, monitoring personal budgets, and keeping track of time worked on projects. Tem- plates are also available for a variety of business needs—providing sales quotations, invoicing customers, creating purchase orders, and writing a business plan. MULTIDIMENSIONAL SPREADSHEETS Most spreadsheet applications are multidimensional, meaning that you can link one spreadsheet to another. A three-dimensional spreadsheet, for example, is like a stack of spreadsheets all connected by formulas. A change made in one spreadsheet automatically affects the other spreadsheets. Analytical Graphics: Creating Charts What are analytical graphics? You can use spreadsheet packages to create analytical graphics, or charts. Analytical graphics, or business graphics, are graphical forms that make numeric data easier to analyze than it is when organized as rows and columns of numbers. Whether viewed on a monitor or printed out, analyti- cal graphics help make sales figures, economic trends, and the like easier to comprehend and visualize. In Excel, you enter your data to the work- sheet, select the data, and use the Chart wiz- ard to step through the process of choosing the chart type and various options. Examples of analyti- cal graphics are column charts, bar charts, line graphs, pie charts, and scatter charts. ( • See Panel 3.27 .) If you have a color printer, these charts can appear in color. In addition, they can be displayed or printed out so that they look three-dimensional. Spreadsheets can even be linked to more excit- ing graphics, such as digitized maps. Mooving data. A dairy farmer enters feeding data into a spreadsheet. panel 3.27 Analytical graphics Bar charts, line graphs, and pie charts are used to display numbers in graphical form.
  189. 164 Chapter 3 3.9 DATABASE SOFTWARE What is database software,

    and what is personal information management software? In its most general sense, a database is any electronically stored collection of data in a computer system. In its more specific sense, a database is a col- lection of interrelated files in a computer system. These computer-based files are organized according to their common elements, so that they can be retrieved easily. Sometimes called a database manager or database management system (DBMS), database software is a program that sets up and controls the structure of a database and access to the data. The Benefits of Database Software What are two advantages of database software over the old ways of organizing files? When data is stored in separate files, the same data will be repeated in many files. In the old days, each college administrative office—registrar, financial aid, housing, and so on—might have a separate file on you. Thus, there was redundancy —your address, for example, was repeated over and over. This means that when you changed addresses, all the college’s files on you had to be updated separately. Thus, database software has two advantages. INTEGRATION With database software, the data is not in separate files. Rather, it is integrated. Thus, your address need only be listed once, and all the sepa- rate administrative offices will have access to the same information. INTEGRITY For that reason, information in databases is considered to have more integrity. That is, the information is more likely to be accurate and up to date. Databases are a lot more interesting than they used to be. Once they included only text. Now they can also include pictures, sound, and anima- tion. It’s likely, for instance, that your personnel record in a future company database will include a picture of you and perhaps even a clip of your voice. If you go looking for a house to buy, you will be able to view a real estate agent’s database of video clips of homes and properties without leaving the realtor’s office. Today the principal microcomputer database programs are Microsoft Access and Corel Paradox. (In larger systems, Oracle is a major player.) The Basics: How Databases Work What are the basic principles involved with manipulating a database? Let’s consider some basic features of databases: HOW A RELATIONAL DATABASE IS ORGANIZED: TABLES, RECORDS, & FIELDS The most widely used form of database, especially on PCs, is the relational database, in which data is organized into related tables. Each table contains rows and columns; the rows are called records, and the col- umns are called fields. An example of a record is a person’s address—name, street address, city, and so on. An example of a field is that person’s last name; another field would be that person’s first name; a third field would be that per- son’s street address; and so on. ( • See Panel 3.28 .) Just as a spreadsheet may include a workbook with several worksheets, so a relational database might include a database with several tables. For instance, if you’re running a small company, you might have one database
  190. Software 165 headed Employees, containing three tables— Addresses, Payroll, and

    Benefits. You might have another database headed Customers, with Addresses, Orders, and Invoices tables. LINKING RECORDS, USING A KEY In relational databases a key —also called key field, sort key, index, or keyword —is a field used to sort data. For example, if you sort records by age, then the age field is a key. The most fre- quent key field used in the United States is the Social Security number, but any unique identifier, such as employee number or student number, can be used. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is desig- nated the primary key and must hold a unique value for each record. A key field that identifies records in different tables is called a foreign key. Foreign keys are used to cross-reference data among relational tables. FINDING WHAT YOU WANT: QUERYING & DISPLAYING RECORDS The beauty of database software is that you can locate records quickly. For example, sev- eral offices at your college may need access to your records but for differ- ent reasons: registrar, financial aid, student housing, and so on. Any of these offices can query records— locate and display records—by calling them up on a computer screen for viewing and updating. Thus, if you move, your address field will need to be corrected for all relevant offices of the college. A person Because this is a relational database, it contains tables. Forms are used to enter data into tables. Tabs with command groups Fields Columns, such as all street addresses, are called fields. Records Rows, such as a complete address, are called records. A The results of a database query can be printed out in report form. 1 Status bar shows document details panel 3.28 Some database functions
  191. 166 Chapter 3 making a search might make the query,

    “Display the address of [your name].” Once a record is displayed, the address field can be changed. Thereafter, any office calling up your file will see the new address. SORTING & ANALYZING RECORDS & APPLYING FORMULAS With database software you can easily find and change the order of records in a table—in other words, they can be sorted in different ways—arranged alphabetically, numerically, geographically, or in some other order. For example, they can be rearranged by state, by age, or by Social Security number. In addition, database programs contain built-in mathematical formulas so that you can analyze data. This feature can be used, for example, to find the grade-point averages for students in different majors or in different classes. PUTTING SEARCH RESULTS TO USE: SAVING, FORMATTING, PRINTING, COPY- ING, OR TRANSMITTING Once you’ve queried, sorted, and analyzed the records and fields, you can simply save them to your hard disk, CD, or other secondary storage medium. You can format them in different ways, altering headings and typestyles. You can print them out on paper as reports, such as an employee list with up-to-date addresses and phone numbers. A common use is to print out the results as names and addresses on mailing labels —adhesive-backed stickers that can be run through your printer and then stuck on envelopes. You can use the Copy command to copy your search results and then paste them into a paper produced on your word processor. You can also cut and paste data into an email message or make the data an attachment file to an email, so that it can be transmitted to someone else. Personal Information Managers How could a personal information manager be valuable to me? Pretend you are sitting at a desk in an old-fashioned office. You have a calen- dar, a Rolodex-type address file, and a notepad. Most of these items could also be found on a student’s desk. How would a computer and software improve on this arrangement? Many people find ready uses for specialized types of database software known as personal information managers. A personal information manager (PIM) is software that helps you keep track of and manage information you use on a daily basis, such as addresses, telephone numbers, appoint- ments, to-do lists, and miscellaneous notes. Some programs feature phone dialers, outliners (for roughing out ideas in outline form), and ticklers (or reminders). With a PIM, you can key in notes in any way you like and then retrieve them later based on any of the words you typed. Popular PIMs are Microsoft Outlook and Lotus SmartSuite Organizer (PC), and Contactizer Pro and Yojimbo (Mac). Microsoft Outlook, for example, has The first mass- produced calculator, the Thomas Arithnometer 1820 1642 First mechanical adding machine (Blaise Pascal) Slide rule invented (Edmund Gunther) 1621 CE 1833 Babbage’s difference engine (automatic calculator) Abacus is invented in Babylonia 3000 BCE A linked sequence of punched cards controls the weaving patterns in Jacquard’s loom 1801 panel 3.29 Timeline Developments in software
  192. Software 167 sections such as Inbox, Calendar, Contacts, Tasks (to-do

    list), Journal (to record interactions with people), Notes (scratchpad), and Files. ( • See Panel 3.30 .) 3.10 SPECIALTY SOFTWARE What are the principal uses of specialty software? After learning some of the productivity software just described, you may wish to become familiar with more specialized programs. For example, you might first learn word processing and then move on to desktop publishing, or first learn spreadsheets and then learn personal-finance software. We will consider the following kinds of software, although they are but a handful of the thousands of specialized programs available: presentation graphics, financial, desktop-publishing, drawing and painting, project management, computer-aided design, video/audio editing, animation, and web page design software. 1930 General theory of computers (MIT) 1944 First electro- mechanical computer (Mark I) 1924 T.J. Watson renames Hollerith’s machine company, founded in 1896, to International Business Machines (IBM) 1890 Electricity used for first time in a data- processing project — Hollerith’s automatic census-tabulating machine (used punched cards) 1843 World’s first computer programmer, Ada Lovelace, publishes her notes 1854 George Boole publishes “An Investigation on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design panel 3.30 Personal information manager Microsoft Outlook 2007
  193. 168 Chapter 3 Presentation Graphics Software How could I do

    a visual presentation, using presentation graphics software? Presentation graphics software is intended primarily for the business user, for creating slide-show presentations, overhead transparencies, reports, portfo- lios, and training materials. Presentation graphics software uses graphics, animation, sound, and data or information to make visual presentations. Presentation graphics are much more fancy and complicated than are analyti- cal graphics. Pages in presentation software are often referred to as slides, and visual presentations are commonly called slide shows. They can consist, how- ever, not only of 35-mm slides but also of paper copies, overhead transparencies, video, animation, and sound. Completed presentations are frequently published in multiple formats, which may include print, the web, and electronic files. Most often, presentation projects are used in live sessions. They are com- monly projected onto large screens or printed on overhead transparencies. The slides may be distributed in printed form as handouts to accompany the live presentation. Slides are generally intended to be followed in an ordered sequence, although some presentations may utilize interactive forms of navi- gation. More and more of this software now has the ability to export to HTML for posting presentations on the web. You may already be accustomed to seeing presentation graphics because many college instructors now use such software to accompany their lectures. Well-known presentation graphics packages include Microsoft PowerPoint, Corel Presentations, Harvard Graphics, and Presentation Graphics SDK. ( • See Panel 3.31 .) Companies such as Presentation Load specialize in profes- sional templates for sophisticated business presentations. Presentation graphics packages often come with slide sorters, which group together a dozen or so slides in miniature. The person making the presenta- tion can use a mouse or a keyboard to bring the slides up for viewing or even start a self-running electronic slide show. You can also use a projection system from the computer itself. PowerPoint provides three types of movements: Entrance, emphasis, and exit of elements on a slide itself are controlled by what PowerPoint calls Cus- tom Animations. Transitions are movements between slides. These can be ani- mated in a variety of ways. Custom animation can be used to create small story boards by animating pictures to enter, exit, or move. Speech bubbles with edited text can be set on and off to create speech. Just as word processing programs offer templates for faxes, business let- ters, and the like, presentation graphics programs offer templates to help you organize your presentation, whether it’s for a roomful of people or over the internet. Templates are of two types: design and content. • Design templates: These offer formats, layouts, background patterns, and color schemes that can apply to general forms of content material. • Content templates: These offer formats for specific subjects. For instance, PowerPoint offers templates for “Selling Your Ideas,” “Facilitating a Meeting,” and “Motivating a Team.” 1970 Microprocessor chips come into use; floppy disk introduced for storing data 1967 1969–1971 Unix is developed and released by Bell Laboratories A graphical user interface (GUI) is a main theme of Jeff Raskin, who later became an Apple Macintosh team leader; handheld calculator 1946 First programmable electronic computer in United States (ENIAC)
  194. Software 169 1977 Apple I computer (first personal computer sold

    in assembled form) 1976 Apple II’s floppy disk drive leads to writing of many software programs 1975 Bill Gates and Paul Allen start Microsoft in Albuquerque, N.M. (move to Seattle in 1979); first microcomputer (MITS Altair 8800) Xerox PARC develops an experimental PC that uses a mouse and a GUI 1973 Outline View helps you organize the content of your material in standard outline form. Slide Sorter View displays all the slides as miniatures. Tabs with command groups Slide View shows you what a single slide looks like. Notes Page View shows a small version of the slide plus the notes you will be using as speaker notes. panel 3.31 Presentation graphics Microsoft Power- Point helps you pre- pare and make visual presentations. DRESSING UP YOUR PRESENTATION Presentation software makes it easy to dress up each visual page (“slide”) with artwork by pulling in (“dragging and dropping”) clip art from other sources. Although presentations may make use of some basic analytical graphics—bar, line, and pie charts—they generally use much more sophisticated elements. For instance, they may display different
  195. info! more 170 Chapter 3 textures (speckled, solid, cross-hatched), color,

    and three-dimensionality. In addition, you can add sound clips, special visual effects (such as blinking text), animation, and video clips. (You can, in fact, drag and drop art and other enhancements into desktop-publishing, word processing or other standard PC applications.) Financial Software What are the features of financial software that could be useful to me? Financial software is a growing category that ranges from personal-fi- nance managers to entry-level accounting programs to business finan- cial-management packages. Consider the first of these, which you may find particularly useful. Personal- finance managers let you keep track of income and expenses, write checks, do online banking, and plan financial goals. ( • See Panel 3.32 .) Such pro- grams don’t promise to make you rich, but they can help you manage your money. They may even get you out of trouble. Many personal-finance programs, such as Quicken and Microsoft Money, include a calendar and a calculator. FEATURES OF FINANCIAL SOFTWARE The principal features are these: • Tracking of income and expenses: The programs allow you to set up various account categories for recording income and expenses, including credit card expenses. Adding Clip Art For information on adding clip art to presentation slides, check out: www.communicateusing technology.com/articles/ using_clip_art_photo.htm www.clipartpress.com/43 http://presentationsoft. about.com/od/nextstepsin powerpoint/ss/add_pics.htm For information on obtaining clip art, go to: www.clipartinc.com http://dir.yahoo.com/ Computers_and_Internet/ Graphics/Clip_art/ http://office.microsoft.com/ en-us/clipart/default.aspx Portable computers 1982 Microsoft obtains DOS version that becomes PC-DOS for IBM PC. 1980 Xerox introduces mouse-operated icons, buttons, and menus on the Star computer; IBM introduces personal computer (IBM PC) 1981 Bill Gates announces the first version of the Windows operating system (and releases it two years later) 1983 Apple Macintosh; first personal laser printer; the Apple Macintosh introduces the first widely used GUI; Mac System 1.0 is introduced 1984 1978 The first electronic spreadsheet, VisiCalc, is introduced; WordStar, the first commercial word processor for consumers, is introduced Getting started in Microsoft Office PowerPoint 2007: 1 Tabs are designed to be task- oriented; 2 groups within each tab break a task into subtasks; 3 command but- tons in each group carry out a command or display a menu of commands.
  196. Software 171 • Checkbook management: All programs feature checkbook management,

    with an on-screen check-writing form and check register that look like the ones in your checkbook. Checks can be purchased to use with your computer printer. • Reporting: All programs compare your actual expenses with your budgeted expenses. Some will compare this year’s expenses to last year’s. • Income tax: All programs offer tax categories, for indicating types of income and expenses that are important when you’re filing your tax return. • Other: Some of the more versatile personal-finance programs also offer financial-planning and portfolio-management features. GOING BEYOND PERSONAL FINANCE Besides personal-finance managers, financial software includes small business accounting and tax software pro- grams, which provide virtually all the forms you need for filing income taxes. Tax programs such as TaxCut and TurboTax make complex calculations, check for mistakes, and even unearth deductions you didn’t know existed. Tax pro- grams can be linked to personal-finance software to form an integrated tool. Many financial software programs may be used in all kinds of enterprises. For instance, accounting software such as Intuit Quickbooks and Sage Soft- ware’s Peachtree automates bookkeeping tasks, while payroll software keeps records of employee hours and produces reports for tax purposes. Some programs go beyond financial management and tax and accounting management. For example, Business Plan Pro and Small Business Manage- ment Pro can help you set up your own business from scratch. 1985 Aldus PageMaker becomes the first integrated desktop publishing program; Microsoft Windows 1.0 is released; Mac. System 2.0 1987 Microsoftʼs Excel program introduced; Mac system 4.0, then 5.0 Mac System 3.0 1986 Mac System 6.0 1988 Microsoft introduces Windows 3.0 in May, intensifying its legal dispute with Apple over the softwareʼs “look and feel” resemblance to the Macintosh operating system 1990 Linus Torvalds introduces Linux; Mac System 7.0 1991 panel 3.32 Financial software Microsoft Money can be used for all sorts of money-related manage- ment. It includes guid- ance tips for setting up your accounts.
  197. 172 Chapter 3 Finally, there are investment software packages, such

    as StreetSmart Pro from Charles Schwab and Online Xpress from Fidelity, as well as various retirement-planning programs. Desktop Publishing What are the principal features of desktop-publishing software? Adobe Systems was founded in 1982, when John Warnock and Charles Geschke began to work on solving some of the long-standing problems that plagued the relationship between microcomputers and printers. Collaboration with Apple Computers produced the first desktop-publishing package, using Adobe Post- Script, a printer language that can handle many fonts and graphics, in 1984. By 1987, Adobe had agreements with IBM, Digital, AST Research, Hewlett- Packard, and Texas Instruments for them to use PostScript in their printers. Desktop publishing (DTP) involves mixing text and graphics to produce high-quality output for commercial printing, using a microcomputer and mouse, scanner, laser or ink-jet printer, and DTP software. Often the printer is used primarily to get an advance look before the completed job is sent to a typesetter service bureau for even higher-quality output. Service bureaus have special machines that convert the DTP files to film, which can then be used to make plates for offset printing. Offset printing produces higher-quality documents, especially if color is used, but is generally more expensive than laser printing. Desktop-publishing software. Named after the subatomic particle proposed as the build- ing block for all matter, the Quark company was founded in Colorado in 1981. QuarkXPress was released in 1987 and made an immediate impact on the fledgling desktop publishing business. QuarkXPress intro- duced precision typography, layout, and color control to the desktop computer. Mac OS 8 sells 1.25 million copies in its first two weeks; Mac System 8.0 1997 Windows 95 is released 1995 Windows 98 is released 1998 Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; Netscape’s first web browser is introduced (based on Mosaic, introduced in 1993) 1994 Multimedia desktop computers PDF software 1993 1992 Microsoft’s Access database program released
  198. Software 173 FEATURES OF DESKTOP PUBLISHING Desktop publishing has these

    characteristics: • Mix of text with graphics: Desktop-publishing software allows you to precisely manage and merge text with graphics. As you lay out a page on-screen, you can make the text “flow,” liquidlike, around graphics such as photographs. You can resize art, silhouette it, change the colors, change the texture, flip it upside down, and make it look like a photo negative. • Varied type and layout styles: As do word processing programs, DTP programs support a variety of fonts, or typestyles, from readable Times Roman to staid Tribune to wild Jester and Scribble. Additional fonts can be purchased on disk or downloaded online. You can also create all kinds of rules, borders, columns, and page-numbering styles. • Use of files from other programs: It’s usually not efficient to do word processing, drawing, and painting with the DTP software. As a rule, text is composed on a word processor, artwork is created with drawing and painting software, and photographs are input using a scanner and then modified and stored using image-editing software. Prefabricated art to illustrate DTP documents may be obtained from clip-art sources. The DTP program is used to integrate all these files. You can look at your work on the display screen as one page, as two facing pages (in reduced size), or as “thumbnails.” Then you can see it again after it has been printed out. ( • See Panel 3.33 .) Windows 2000 (ME) is released; Mac System 9.0 2000 Adobe InDesign 1999 Windows XP becomes available; Mac OS X ships 2001 Microsoft Vista OS (Pre-Beta) first introduced; Windows Mobile released 2003 Windows Vista commercially availiable; Mac OS X.5 (Leopard) available Most software will be open-source; 3-D user interface 2007 Cloud computing starts to take off 2008 Windows 7 2009 2012? 6 5 4 3 2 1 Text created with word processing software. Art created with drawing or painting software. Images scanned to disk by a scanner. The files created in Steps 1, 2, 3 are imported into a DTP document. DTP software is used to make up pages. A black-and-white or color printer, usually a laser printer, prints out the pages. panel 3.33 How desktop publishing uses other files
  199. info! more 174 Chapter 3 BECOMING A DTP PROFESSIONAL Not

    everyone can be successful at desktop publishing, because many complex layouts require experience, skill, and knowledge of graphic design. Indeed, use of these programs by nonprofessional users can lead to rather unprofessional-looking results. Never- theless, the availability of microcomputers and reasonably inexpensive software has opened up a career area formerly reserved for professional typographers and printers. QuarkXPress and Adobe InDesign are profes- sional DTP programs. Microsoft Publisher is a “low- end,” consumer-oriented DTP package. Some word processing programs, such as Word and WordPer- fect, also have many DTP features, although still not at the sophisticated level of the specialized DTP software. DTP packages, for example, give you more control over typographical characteristics and provide more support for full-color output. Drawing & Painting Programs How do drawing and painting programs differ? It may be no surprise to learn that commercial artists and fine artists have largely abandoned the paintbox and pen-and-ink for software versions of pal- ettes, brushes, and pens. However, even nonartists can produce good-looking work with these programs. There are two types of computer art programs, also called illustration soft- ware —drawing and painting. DRAWING PROGRAMS A drawing program is graphics software that allows users to design and illustrate objects and products. Some drawing programs are CorelDRAW, Adobe Illustrator, and Macromedia Freehand. Drawing programs create vector images —images created from geometrical formulas. Almost all sophisticated graphics programs use vector graphics. PAINTING PROGRAMS Painting programs are graphics programs that allow users to simulate painting on-screen. A mouse or a tablet stylus is used to simulate a paintbrush. The program allows you to select “brush” sizes, as well as colors from a color palette. Examples of painting programs are Adobe Pho- toShop, Microsoft Photo Editor, Corel Photopaint, and JASC’s PaintShop Pro. Painting programs produce bit-mapped images, or raster images, made up of little dots. Painting software is also called image-editing software because it allows you to retouch photographs, adjust the contrast and the colors, and add special effects, such as shadows. SOME GRAPHICS FILE FORMATS When you create an image, it’s important to choose the most appropriate graphics file format, which specifies the method of organizing information in a file. Among the most important graphics for- mats you are apt to encounter are these: • .bmp (BitMaP): This bitmap graphic file format is native to Microsoft Windows and is used on PCs. Microsoft Paint creates .bmp file formats. • .gif (Graphic Interchange Format): This format is used in Web pages and for downloadable online images. • .jpeg (Joint Photographic Experts Group): Pronounced “ jay-peg, ” this bitmap format is used for websites and for photos and other high- resolution images. Page design and layout in Adobe InDesign 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 1 2 3 4 5 6 7 8 910111213141516 12,13 12,3 5,3 Vector image 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Bit-mapped image File Formats For a complete list of file for- mats, go to: http://en.wikipedia.org/wiki/ List_of_file_formats
  200. info! more Software 175 • .tiff (Tagged Image File Format):

    This bitmap format is used on both PCs and Macs for high-resolution files that will be printed. • .png (Portable Network Graphics): This file format was specifically created for web page images and can be used as a public domain alternative to .gif for compression. Video/Audio Editing Software Could I benefit from using video/audio editing software? The popularity of digital camcorders (“camera recorders”) has caused an increase in sales of video-editing software. This software allows you to import video footage to your PC and edit it, for example, deleting parts you don’t want, reordering sequences, and adding special effects. Popular video-editing software packages include Adobe Premiere, Sony Pictures Digital Vegas, Apple Final Cut Express, Pinnacle Studio DV, and Ulead VideoStudio. Audio-editing software provides similar capabilities for working with sound tracks, and you can also clean up background noise (called artifacts ) and emphasize certain sound qualities. Sound-editing software includes Windows Sound Recorder, Sony Pictures Digital Sound Forge, Audacity (freeware), Felt Tip Software’s Sound Studio (shareware), GoldWave, and WavePad. Video and audio are covered in more detail in Chapter 5. Animation Software How does animation software differ from video software? Animation is the simulation (illusion) of movement created by displaying a series of still pictures, or frames, very quickly in sequence. Computer animation refers to the creation of moving images by means of a computer. Whereas video devices record continuous motion and break it up into discrete frames, animation starts with independent pictures and puts them together to form the illusion of continuous motion. Animation is one of the chief ingredi- ents of multimedia presentations and is commonly used on web pages. There are many software applications that enable you to create animations that you can display on a computer monitor. The first type of animation to catch on for web use was called GIF (for Graphics Interchange Format) animation, and it is still very popular today. GIF files contain a group of images that display very quickly to simulate movement when a web page viewer clicks on the file icon. Animated GIF Construction Professional enables users to easily create animation via the use of a wizard. It Survival Tip Compressing Web & Audio Files Video and audio files tend to be very large, so they need to be edited down and com- pressed to be as short as possible, especially if they are to be used on web pages. Your software documentation will explain how to do this. About Animation For sources about animation, go to: http://webreference.com/3d/ For schools offering training in computer-based graphics, including animation, check out: www.computertrainingschool. com/?googleanimation ϭ y&got ϭ 3d_animation_ training&t ϭ 30 Sophisticated application software. Animation artist at work at the Studio Ghibli, Mitaka, Japan.
  201. 176 Chapter 3 allows the creation of many special effects

    and supports compression, as well as offering tutorials. Among the many other GIF animation software packages are 3D GIF Designer and The Complete Animator. Multimedia Authoring Software What is multimedia authoring software? Multimedia authoring software combines text, graphics, video, animation, and sound in an integrated way to create stand-alone multimedia applica- tions. Content can be burned to CDs/DVDs or delivered via the web. Until the mid-1990s, multimedia applications were relatively uncommon, owing to the expensive hardware required. With increases in performance and decreases in price, however, multimedia is now commonplace. Nearly all microcomuters are capable of displaying video, though the resolution available depends on the power of the computer’s video adapter and CPU. Macromedia Director and Macromedia Authorware are two popular multimedia authoring packages. Many websites, as well as business training cen- ters and educational institutions, use multimedia to develop interactive applications. Web Page Design/Authoring Software How could using web page design software be to my benefit? Web page design/authoring software is used to cre- ate web pages with sophisticated multimedia fea- tures. A few of these packages are easy enough for beginners to use. Some of the best-known are Adobe Dreamweaver, Adobe Flash, Coffee Cup Visual Site designer, RealMac Rapid Weaver, Microsoft Expres- sion Web 2, and Dynamic HTML Editor. These tools generate the necessary HTML coding (and other, Screen from a GIF animation program Multimedia authoring software
  202. info! more info! more Software 177 newer language coding) based

    on the user’s design and content and present everything to the design in a WYSIWYG (“what you see is what you get”) form. ( • See Panel 3.34 .) Internet access providers also offer some free, easy-to-use web-authoring tools for building simple websites. They help you create web pages, using icons and menus to automate the process; you don’t need to know hypertext markup language (HTML, Chapter 2) to get the job done. These automated tools let you select a prepared, template web page design, type a few words, add a picture or two—and you’re done. To save the pages and make them accessible on the internet, the provider grants you a certain amount of space on its web servers. Website design can include much more than text: for example, animation, video, sound, interactivity, search-engine functions. But before creating a web- site, the designer must first plan exactly what is needed in the website—define the audience, as well as the purpose and the content. Once a web site is com- pleted, it must be uploaded (published) in order to be available to internet panel 3.34 ( Top ) HTML coded text; ( bottom ) the same text translated into WYSIWYG form by Reall’s HTML WYSIWYG Editor Web Authoring This site offers a lot of information on web authoring tools: http://webdesign.about.com/ od/htmleditors/HTML_ Editors_Web_Page_ Authoring_Tools.htm For 5 basic steps of web design, go to: www.grantasticdesigns. com/5rules.html For information on becoming a professional website designer, try: http://designeducation. allgraphicdesign.com/ http://websitetips.com/ business/education/ www.sessions.edu/courses/ index.asp www.tuj.ac.jp/newsite/main/ cont-ed/certificate/graphic_ design.html
  203. 178 Chapter 3 users via a browser. Some people with

    pow- erful personal computers and an always-on internet connection, such as cable, leave their websites on their own computers; the website is accessed by users typing in the site’s URL (web address; Chapter 2) in their browsers. Most people, however, use FTP software (Chap- ter 2) to upload their website files to a server host, where, for a fee, the website is stored for access. Complicated business websites are created and maintained by professional website devel- opers. Project Management Software Should I learn to use project management software? As we have seen, a personal information manager (PIM) can help you sched- ule your appointments and do some planning. That is, it can help you man- age your own life. But what if you need to manage the lives of others in order to accomplish a full-blown project, such as steering a political campaign or handling a nationwide road tour for a band? Strictly defined, a project is a one-time operation involving several tasks and multiple resources that must be organized toward completing a specific goal within a given period of time. The project can be small, such as an advertising campaign for an in-house Inserting an Adobe Photo- shop photo file into a Dream- weaver web page that is being designed Local and national internet access providers often offer web-page-building tools, as well as space on their serv- ers for storing your web page. Other sources of information for designing and building web pages are these: For Novices • Yahoo!: Yahoo! offers web-page-building tools and tem- plates under the name SiteBuilder ( http://webhosting. yahoo.com/ps/sb/index.php ), which enables you to add music and other special effects to your web pages and have components that track how many people visit your site. For a fee, Yahoo! offers unlimited storage for your website and will help you determine your URL (website address). • Lycos: Lycos offers templates and tools, and it also offers tutorials to help you get started if you want to build your own pages from scratch. Lycos also offers free space in its Tripod area ( www.tripod.lycos.com ). As with Yahoo!, you will have advertisements on your pages unless you pay a small fee to get rid of them. • Google Sites: Google offers this free online tool that makes it easy for anyone to create and publish web pages in just minutes. You can see what your pages will look like, and you can edit your pages right in your browser. Google will host your web pages on your own site at www.sites.google.com. Once you’ve created your website, you’ll need to “pub- lish” it—upload it to a web server for viewing on the internet. You can get upload instructions from your online service or internet access provider, which may also provide space (for free or for a fee) on its servers. (Or, as we mention below, if you have a powerful, large-storage-capacity microcomputer that has an always-on internet connection, you can use it to host your own website.) For much more information about building and stor- ing your own web pages, just do a keyword search using “build web page” or “website design” in any good search engine. PRACTICAL ACTION Help in Building Your Web Page
  204. Software 179 advertising department, or large, such as construction of

    an office tower or a jetliner. Project management software is a program used to plan and sched- ule the people, costs, and resources required to complete a project on time. (See • Panel 3.35 .) For instance, the associate producer on a feature film might use such software to keep track of the locations, cast and crew, materi- als, dollars, and schedules needed to complete the picture on time and within budget. The software would show the scheduled beginning and ending dates for a particular task—such as shooting all scenes on a certain set—and then the date that task was actually completed. Examples of project management software are Mindjet MindManager Pro 8, MindView, Intuit, Microsoft Proj- ect, FastTrackSchedule, and Project KickStart. Portable Document Format (PDF) Why is PDF useful? Short for Portable Document Format, PDF is a file format developed by Adobe Systems. PDF captures text, graphic, and formatting information from a variety of applications on different platforms making it possible to send documents and have them appear on the recipient’s monitor (or printer) as they were intended to be viewed. (See • Panel 3.36 , next page.) A properly prepared PDF file maintains the original fonts, images, colors, and graphics, as well as the exact layout of the file. Originally, PDF was mostly used by graphic artists, designers, and pub- lishers for producing color page proofs. Today, however PDF is used for virtually any data that needs to be exchanged among applications and users. Individuals, businesses, and government agencies around the world trust and rely on PDF to communicate. PDF files are widely used on websites and are also used to distribute electronic documents over networks and via email. panel 3.35 Project management software: Microsoft Project
  205. info! more 180 Chapter 3 A PDF file can be

    shared, viewed, and printed by anyone using the free downloadable Adobe Reader software regardless of the operating system and original application used. PDF can also be used on mobile devices. In addition, many applications, such as Microsoft Word, enable users to save their files in a PDF version. To be able to create and work with all of Adobe’s PDF features, you need to purchase the complete Adobe Acrobat Suite. Computer-Aided Design What could I do with a CAD program? Computers have long been used in engineering design. Computer-aided design (CAD) programs are intended for the design of products, struc- tures, civil engineering drawings, and maps. CAD programs, which are available for microcomputers, help architects design buildings and work- spaces and help engineers design cars, planes, electronic devices, roadways, bridges, and subdivisions. CAD and drawing programs are similar. However, CAD programs provide precise dimensioning and positioning of the elements being drawn, so they can be transferred later to computer-aided manufactur- ing (CAM) programs. Also, CAD programs lack some of the special effects for illustrations that come with drawing programs. One advantage of CAD soft- ware is that the product can be drawn in three dimensions and then rotated on the screen, so the designer can see all sides. ( • See Panel 3.36 .) Examples of popular CAD programs are Autodesk, AutoCAD, TurboCAD, Alibre Design, and PowerCADD. Computer-aided design/computer-aided manufacturing (CAD/CAM) software allows products designed with CAD to be input into an automated manufactur- ing system that makes the products. For example, CAD/CAM systems brought a whirlwind of enhanced creativity and efficiency to the fashion industry. The designs and specifications are then input into CAM systems that enable robot pattern-cutters to automatically cut thousands of patterns from fabric with only minimal waste. Whereas previously the fashion industry worked about a year in advance of delivery, CAD/CAM has cut that time to less than 8 months—a competitive edge for a field that feeds on fads. panel 3.36 Screen from the Adobe Acrobat PDF tutorial; (lower right corner) Adobe PDF file icon. Any file in the PDF format will have this icon next to the filename. The Ultimate CAD Directory This directory has information about all sorts of CAD products to suit every type of need: www.tenlinks.com/CAD Survival Tip Try before You Buy Free trial versions of software are often offered as down- loads from company sites.
  206. Software 181 panel 3.37 CAD CAD software is used for

    nearly all three- dimensional designing. ( Top ) TurboCAD; ( bottom ) Autodesk.
  207. 182 Chapter 3 Your screen flashes “Fatal Error.” Your new

    software upgrade totals your printer. You can’t connect to your internet access provider. No wonder one online survey found that nearly 20% of the respondents admitted they’d dropped a computer on the floor out of anger. 20 Because of the complicated mesh of elements—software, hardware, communications, people—Murphy’s Law (“If anything can go wrong, it will”) seems to apply in computing as almost nowhere else. Thus, one of the most valuable tasks you can learn is how to deal with tech support—getting tech- nical help on the phone or online when things don’t work. (There’s no need to be shy. One survey found that nearly half of all U.S. tech users said they needed assistance with their new gadgets.) 21 What’s Wrong with Tech Support? It has been found that for every $1 the typical company spends buying information technology, it will spend $4–$10 making it all work. 22 Thus, more than two decades after Apple Computer revolutionized PC software with intuitive, easy-to-use designs, software companies have begun to get the message about the importance of usability. 23 Simultaneously, technology companies have also had to try to improve their tech support operations, which custom- ers said were falling down on the job. The result was tedious delays on help lines and complaints about unhelpful tech advice, among other things. Two problems seem to affect the tech support industry: • Information technology is becoming more complex: The more personal computers and other infotech devices are expected to do—music, video, photos, DVDs, home networking, and so on—the more complex the interac- tion between the components and the harder it is to fig- ure out what’s wrong. In addition, points out technology writer Edward C. Baig, “The severe outbreak of viruses, worms, and spyware makes the support task more daunting.” 24 • Manufacturers practice a “blame game”: One com- puter user found he had a possible online virus (a rogue program that can damage a computer) when he started up his PC. He first called the computer manufacturer, who said it was a software issue, but the software maker could provide help only if he went online, which his affected computer didn’t allow him to do. Later he discovered the antivirus manufacturer had tech support phone numbers, but there was a charge ($3.95 a minute) for their use. Eventually a friend had to help him out. This kind of experience is not uncommon. Improving Your Chances for Avoiding Tech Support Hassles Wouldn’t it be wonderful if you never had to go through tech support agony in the first place? Here are three things tech- nology writer Baig suggests that you can do in advance to improve your chances: 25 • Never upgrade, and never add software: “ If your PC is working fine and you have no ambitions for doing more,” says Baig, “don’t mess around” by adding new hardware accessories or new software. Many prob- lems occur, for instance, because of conflicts between the operating system and special software (known as drivers ) that arise when people do upgrades or add software that didn’t come with the original system. (Of course, this would seem to defeat one of the purposes of having a computer in the first place—that you can save money by readily adding new things to it. If you must do so, ask the retailer from whom you buy them to handle the installation. But you probably can’t do this if you ordered your original equipment from an online seller.) • Use the web to research a manufacturer’s tech sup- port before you buy: If you decide to upgrade/add anyway, go to the manufacturer’s website and look at tech support resources to see “how coherent and eas- ily accessible” they are, advises Baig. This will also give you some feel for the kinds of problems customers are having. • Call tech support before you buy: Calling tech support in advance of purchasing may cost you something in long-distance charges, but you’ll also find out how con- fusing the voice menu is and how long it takes to reach a live human. We would add some other tips: • Create a fact sheet with your computer’s important specs: When you get a computer, create a fact sheet listing the important technical specifications and attach it to the outside of the case. This will provide you with the kind of information that tech support personnel are apt to ask should you call on them. Take a copy along with you whenever you buy a game or other video- and sound-intensive application to make sure it is compatible with the rest of your system. 26 • If you have a communication problem, hang up and call again: Many companies now hire people in offshore call centers as tech support specialists, and sometimes you may have trouble with foreign accents. If this happens to you, hang up and call again. EXPERIENCE BOX The Mysteries of Tech Support
  208. Software 183 Finding Your Own Personal Tech Support Can’t get

    any satisfaction from Microsoft (whose tech sup- port might charge you $35 per incident), Apple, Dell, or the like? Maybe you should turn to your own personal support service—for instance, to Support Freaks, iYogi, BluePhone, or Speak With a Geek. ( • See Panel 3.38 .) Because these services don’t have a stake in any particular kind of soft- ware or hardware, you are more apt to avoid the blame- game problem. “We’ll support your Gateway talking to your Compaq talking to your scanner talking to your digital cam- era,” says a representative of Speak With a Geek. 27 How- ever, because most of these operations are small, you may find yourself waiting while whoever answers the phone or online inquiry tracks down an on-call consultant to help you. If you’re prepared to pay, however, companies such as Geek Squad, as well as local specialists, will come to your house or office. Personalized tech support can be paid for on an hourly basis, service-call basis, or subscription basis, as the chart shows. Other Sources of Help Although usually less specific in solving your problem, there are nonetheless a number of other sources of help to be aware of: • Help: instruction manuals, software, and online: User guides or instruction manuals printed on paper have traditionally accompanied software. Now most software publishers rely more on Help programs on a CD/DVD or in downloadable PDF manuals. Help programs are also available through the internet. The problem with this approach, of course, is, How do you go online to solve the problem of your computer not working if your com- puter isn’t working? (It helps to have two computers.) • Commercial how-to books: How-to books are the kind of books found both in computer stores and in general bookstores such as Barnes & Noble or Borders and on Amazon.com. Examples are the “For Dummies” or “Com- plete Idiot’s” books (such as PCs for Dummies and The Complete Idiot’s Guide to Microsoft Office ). • Knowledgeable friends: Believe it or not, nothing beats having a knowledgeable friend: your instructor, a stu- dent more advanced than you, or someone with a tech- nical interest in computers. We can’t stress enough how important it is to get to know people—from your classes, from computer user groups (including online internet groups), from family, friends, or whatever—who can lend aid and expertise when your computer software gives you trouble. Company AAATechSupport.com 800-392-5938 www.aaatechsupport.com Ask Dr. Tech 800-AskDrTech www.AskDrTech.com geeks to go! Toll free: 888-433-5435 www.geekstogo.com/ Live Repair www.liverepair.com/com/ individual.asp Speak With A Geek 866-933-HELP www.speakwithageek.com Geek Squad 1-800-433-5778 www.geeksquad.com Geeks on Call 1-800-905-GEEK www.geeksoncall.com Nerds On Site 1-877-696-3737 www.nerdsonsite.us iYogi 866-242-4609 www.iyogi.net/tollfree1/ tech-support Mac Help 954-726-9525 www.lookatmymac.com/? gclid=CNiy7oW61JQCFR GiiQodggG5kA JustAnswer.mac http://mac.justanswer.com/ mac Price First 2 minutes free. $2.79 per minute after that. $149 per year, $39 per month, $19 per call free Varies Individual plan $34.95 per month From $29 to about $300, depending on the problem; at your location, one of their stores, or at a Best Buy store Varies, depending on the problem Same as above $120 per year $1.50 per minute or $90 per hour phone/live chat support; on-site $120 per hour Create an account and name your price for an answer to your problem; email and live chat Services Support for most computer products Phone, email, or online chat support for PCs and peripherals Live chat support with consultants and forums for numerous software and hardware problems Tech support via web-based chat for PCs, phone, and email Phone, email, or online chat PC support Almost any problem related to computers, electronics, and networks Same as above Same as above 24/7 PC and peripherals support Support for Mac-related issues Same as above panel 3.38 Some individual technical support services 800 and 888 numbers are toll-free. Most services are available 24 hours a day, 7 days a week. Note that not all operations serve Macintosh users, and not all have a phone option— which can be a handicap when you’re not able to go online.
  209. 184 Chapter 3 analytical graphics (p. 163) Also called business

    graphics; graphical forms that make numeric data easier to analyze than it is when organized as rows and columns of numbers. The principal examples of analytical graphics are bar charts, line graphs, and pie charts. Why it’s important: Whether viewed on a monitor or printed out, analytical graphics help make sales figures, economic trends, and the like easier to comprehend and analyze. animation (p. 175) The simulation (illusion) of movement cre- ated by displaying a series of still pictures, or frames, very quickly in sequence. Why it’s important: Animation is used in video games, movies, special-effects presentations, and even in email, to make it more interesting. application software (p. 120) Software that has been devel- oped to solve a particular problem for users—to perform useful work on specific tasks or to provide entertainment. Why it’s important: Application software consists of most of the soft- ware you are familiar with and use on a daily basis. (Compare system software. ) booting (p. 122) Loading an operating system into a computer’s main memory. Why it’s important: Without booting, comput- ers could not operate. The programs responsible for booting are stored permanently in the computer’s electronic circuitry. When you turn on the machine, programs called diagnostic routines test the main memory, the central processing unit, and other parts of the system to make sure they are running properly. Next, BIOS (basic input/output system) programs are copied to main memory and help the computer interpret key- board characters or transmit characters to the display screen or to a diskette. Then the boot program obtains the operat- ing system, usually from the hard disk, and loads it into the computer’s main memory, where it remains until you turn the computer off. cell (p. 161) Place where a row and a column intersect in a spreadsheet worksheet; its position is called a cell address. Why it’s important: The cell is the smallest working unit in a spreadsheet. Data and formulas are entered into cells. Cell addresses provide location references for spreadsheet users. computer-aided design (CAD) (p. 180) Programs intended for the design of products, structures, civil engineering drawings, and maps. Why it’s important: CAD programs, which are avail- able for microcomputers, help architects design buildings and workspaces and help engineers design cars, planes, electronic devices, roadways, bridges, and subdivisions. While similar to drawing programs, CAD programs provide precise dimension- ing and positioning of the elements being drawn, so they can be transferred later to computer-aided manufacturing pro- grams; however, they lack special effects for illustrations. One advantage of CAD software is that three-dimensional draw- ings can be rotated on-screen, so the designer can see all sides of the product. cursor (p. 156) Movable symbol on the display screen that shows where the user may next enter data or commands. The symbol is often a blinking rectangle or an I-beam. You can move the cursor on the screen using the keyboard’s directional arrow keys or a mouse. The point where the cursor is located is called the insertion point. Why it’s important: All application software packages use cursors to show the current work loca- tion on the screen. database (p. 164) Collection of interrelated files in a computer system. These computer-based files are organized according to their common elements, so that they can be retrieved easily. Why it’s important: Businesses and organizations build data- bases to help them keep track of and manage their affairs. In addition, online database services put enormous resources at the user’s disposal. database software (p. 164) Also called database manager or database management system (DBMS); application software that sets up and controls the structure of a database and access to the data. Why it’s important: Database software allows users to organize and manage huge amounts of data. default settings (p. 160) Settings automatically used by a pro- gram unless the user specifies otherwise, thereby overriding them. Why it’s important: Users need to know how to change default settings in order to customize documents. desktop (p. 132) The operating system’s main interface screen. Why it’s important: The desktop displays pic- tures (icons) that provide quick access to programs and information. desktop publishing (DTP) (p. 172) Application software and hardware system that involves mixing text and graphics to produce high-quality output for commercial printing, using a microcomputer and mouse, scanner, laser or ink-jet printer, and DTP software (such as QuarkXPress and In Design or, at a more consumer-oriented level, Microsoft Publisher). Often the printer is used primarily to get an advance look before the completed job is sent to a typesetter for even higher-quality output. Some word processing programs, such as Word and WordPerfect, have rudimentary DTP features. Why it’s impor- tant: Desktop publishing has reduced the number of steps, the time, and the money required to produce professional-looking printed projects. device drivers (p. 126) Specialized software programs— usually components of system software—that allow input and output devices to communicate with the rest of the computer system. Why it’s important: Drivers are needed so that the computer’s operating system can recognize and run periph- eral hardware. DOS (Disk Operating System) (p. 138) Original operating system produced by Microsoft, with a hard-to-use command- driven user interface. Its initial 1982 version was designed to SUMMARY
  210. 185 Software run on the IBM PC as PC-DOS. Later

    Microsoft licensed the same system to other computer makers as MS-DOS. Why it’s important: DOS used to be the most common microcomputer operating system, and it is still used on some microcomputers. Today the most popular operating systems use GUIs. exporting (p. 154) Transforming data into a format that can be used in another program and then transmitting it. Why it’s important: Users need to know how to export many types of files. file (p. 124) A named collection of data (data file) or a pro- gram (program file) that exists in a computer’s secondary storage, such as on a hard disk or CD. Why it’s important: Dealing with files is an inescapable part of working with computers. Users need to be familiar with the different types of files. financial software (p. 170) Application software that ranges from personal-finance managers to entry-level accounting programs to business financial-management packages. Why it’s important: Financial software provides users with power- ful management tools (personal-finance managers) as well as small business programs. Moreover, tax programs provide virtually all the forms needed for filing income taxes, make complex calculations, check for mistakes, and even unearth deductions you didn’t know existed. Tax programs can also be integrated with personal finance software to form an integrated tool. Accounting software automates bookkeep- ing tasks, while payroll software keeps records of employee hours and produces reports for tax purposes. Some programs allow users to set up a business from scratch. Financial soft- ware also includes investment software packages and various retirement planning programs. formulas (p. 162) In a spreadsheet, instructions for calcula- tions entered into designated cells. Why it’s important: When spreadsheet users change data in one cell, all the cells linked to it by formulas automatically recalculate their values. freeware (p. 151) Copyrighted software that is distributed free of charge, today most often over the internet. Why it’s impor- tant: Freeware saves users money. function keys (p. 130) Keys labeled “F1,” “F2,” and so on, positioned along the top or left side of the keyboard. Why it’s important: They are used to execute commands specific to the software being used. functions (p. 162) In a spreadsheet, built-in formulas that per- form common calculations. Why it’s important: After the values have been entered into the worksheet, formulas and functions can be used to calculate outcomes. graphical user interface (GUI) (p. 131) User interface in which icons and commands from menus may be selected by means of a mouse or keystrokes. Why it’s important: GUIs are easier to use than command-driven interfaces. Help command (p. 137) Command generating a table of con- tents, an index, and a search feature that can help users locate answers to questions about the software. Why it’s important: Help features provide a built-in electronic instruc- tion manual. icons (p. 132) Small pictorial figures that represent programs, data files, or procedures. Why it’s important: Icons have simpli- fied the use of software. The feature represented by the icon can be activated by clicking on the icon. importing (p. 153) Getting data from another source and then converting it into a format compatible with the program in which the user is currently working. Why it’s important: Users will often have to import files. key (p. 165) Also called key field, sort key, index, or keyword; field used to sort data in a database. For example, if users sort records by age, then the age field is a key. Why it’s important: Key fields are needed to identify and retrieve specific items in a database. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the primary key and must hold a unique value for each record. A key field that identifies records in different tables is called a foreign key. For- eign keys are used to cross-reference data among relational tables. The most frequent key field used in the United States is the Social Security number, but any unique identifier, such as employee number or student number, can be used. Linux (p. 146) Free (open-source) version of the Unix OS, sup- ported by the efforts of thousands of volunteer programmers. Why it’s important: Linux is an inexpensive, open-source oper- ating system useful for online applications and to PC users who have to maintain a web server or a network server. Macintosh operating system (Mac OS) (p. 138) System soft- ware that runs only on Apple Macintosh computers. Why it’s important: Although Macs are not as common as PCs, many people believe they are easier to use. Macs are often used for graphics and desktop publishing. macro (p. 130) Also called keyboard shortcut; a single key- stroke or command—or a series of keystrokes or commands— used to automatically issue a longer, predetermined series of keystrokes or commands. Why it’s important: Users can consolidate several activities into only one or two keystrokes. The user names the macro and stores the corresponding com- mand sequence; once this is done, the macro can be used repeatedly. menu (p. 134) Displayed list of options—such as commands—to choose from. Why it’s important: Menus are a feature of GUIs that make software easier to use. menu bar (p. 136) Bar across the top of the display window, below the title bar. Why it’s important: It shows the names of the various pull-down menus available. Microsoft Windows (p. 140) Most common operating system for desktop and portable microcomputers. Windows 95 was succeeded by Windows 98, Windows 2003, Windows Me, Windows XP, Vista, and, most recently, Windows 7 (Windows 2009). Why it’s important: Windows supports the most appli- cations written for microcomputers.
  211. 186 Chapter 3 Microsoft Windows Embedded (p. 149) Previously known

    as Windows CE; operating system for handhelds. Why it’s impor- tant: Windows Embedded offers pocket versions of Word and Excel that let users read standard word processing and spreadsheet files sent as email attachments from their PCs. It also enables web functions. A version of Windows Embdedded, Windows Mobile, is used in certain smartphones. Microsoft Windows NT (p. 144) NT stands for “New Technol- ogy”; Microsoft’s multitasking OS designed to run on network servers in businesses of all sizes. Why it’s important: It allows multiple users to share resources such as data, programs, and printers and to build web applications and connect to the internet. Microsoft Windows Vista (p. 141) Introduced to consumers in January 2007, the Vista operating system is the equivalent of Windows version 12—preceded by 1.0, 2.0, 3.0, 3.1, NT, 95, NT 4.0, 98, 2000, ME, XP. Why it’s important: To create Vista, Microsoft supposedly rebuilt Windows from scratch, with an interesting interface, glitzier graphics, and improved secu- rity tools. However, so much computing power was required to run it that many new PCs ran more slowly than older, less powerful XP machines. Vista was also criticized for software and hardware incompatibility issues with office suites and some printers, digital cameras, and other devices. Many busi- nesses decided that they would not upgrade from XP to Vista, because they saw no value in it and because it required buy- ing more powerful PCs and new software. For that reason, Microsoft turned to developing Windows 7. Microsoft Windows XP (p. 140) Recent Microsoft operating system for PCs. Why it’s important: With this OS version, Micro- soft finally gave up the last of the Windows software carried forward from the aging DOS programming technology. Windows XP was being replaced by Windows Vista but now is being replaced by Windows 7, Microsoft’s newest operating system. Microsoft Windows 7 (2009) (p. 142) Newest operating system developed by Microsoft; it follows Vista. Why it’s important: Windows 7 is less power-hungry than Vista, boots up more quickly than previous Windows systems, and has improved networking and security features. multimedia authoring software (p. 176) Application software that combines text, graphics, video, animation, and sound in an integrated way to create stand-alone multimedia applications. Why it’s important: Multimedia is now commonplace. Nearly all PCs are capable of handling multimedia. multitasking (p. 125) Feature of OS software that allows the execution of two or more programs concurrently by one user almost at the same time on the same computer with one CPU. For instance, you might write a report on your computer with one program while another plays a music CD. Why it’s important: Multitasking allows the computer to switch rapidly back and forth among different tasks. The user is generally unaware of the switching process and thus can work in more than one application at a time. NetWare (p. 144) Long-popular network operating system for coordinating microcomputer-based local area networks (LANs) throughout an organization. Why it’s important: LANs allow PCs to share programs, data files, and printers and other devices. open-source software (p. 146) Software that any program- mer can download from the internet free and modify with suggested improvements. The only qualification is that changes can’t be copyrighted; they must be made available to all and remain in the public domain. Why it’s important: Because this software is not proprietary, any programmer can make improvements, which can result in better-quality software. operating system (OS) (p. 121) Also called software platform; low-level master system of programs that manage the basic operations of the computer. Why it’s important: These pro- grams provide resource management services of many kinds. In particular, they handle the control and use of hardware resources, including disk space, memory, CPU time allocation, and peripheral devices. The operating system allows users to concentrate on their own tasks or applications rather than on the complexities of managing the computer. Palm OS (p. 148) Palm Source’s operating system for hand- helds. Why it’s important: Because it is not a Windows deriva- tive but was specifically designed for handhelds, Palm OS is a smoother-running operating system. PDF See portable document format. personal-finance manager (p. 170) Application software that lets users keep track of income and expenses, write checks, do online banking, and plan financial goals. Why it’s important: Personal-finance software can help people manage their money more effectively. personal information manager (PIM) (p. 166) Software that helps users keep track of and manage information they use on a daily basis, such as addresses, telephone numbers, appoint- ments, to-do lists, and miscellaneous notes. Some programs feature phone dialers, outliners (for roughing out ideas in out- line form), and ticklers (or reminders). Why it’s important: PIMs can help users better organize and manage daily business activities. pirated software (p. 152) Software that is obtained illegally. Why it’s important: If you buy such software, not only do the original copyright owners not get paid for their creative work but you risk getting inferior goods and, worse, picking up a virus. To discourage software piracy, many software manufac- turers require that users register their software when they install it on their computers. If the software is not registered, it will not work properly. platform (p. 138) Particular processor model and operat- ing system on which a computer system is based. Why it’s important: Generally, software written for one platform will not run on any other. Users should be aware that there are Mac platforms (Apple Macintosh) and Windows platforms, or “PC platforms” (for personal computers such as Dell, Compaq, Gateway, Hewlett-Packard, or IBM that run Microsoft Win- dows). Sometimes the latter are called Wintel platforms, for
  212. 187 Software “Windows + Intel,” because they often combine the

    Windows operating system with the Intel processor chip. pointer (p. 131) Indicator that usually appears as an arrow, although it changes shape depending on the application. The mouse is used to move the pointer to a particular place on the display screen or to point to little symbols, or icons. Why it’s important: Manipulating the pointer on the screen by means of the mouse is often easier than typing commands on a keyboard. portable document format (PDF) (p. 179) File format devel- oped by Adobe Systems. PDF captures text, graphic, and for- matting information from a variety of applications on different platforms, making it possible to send documents and have them appear on the recipient’s monitor (or printer) as they were intended to be viewed. Why it’s important: A properly prepared PDF file maintains the original fonts, images, colors, and graphics, as well as the exact layout of the file. A PDF file can be shared, viewed, and printed by anyone using the free downloadable Adobe Reader software. PDF can also be used on mobile devices. presentation graphics software (p. 168) Software that uses graphics, animation, sound, and data or information to make visual presentations. Why it’s important: Presentation graph- ics software provides a means of producing sophisticated graphics. productivity software (p. 154) Application software such as word processing programs, spreadsheets, and database man- agers. Why it’s important: Productivity software makes users more productive at particular tasks. project management software (p. 179) Program used to plan and schedule the people, costs, and resources required to complete a project on time. Why it’s important: Project man- agement software increases the ease and speed of planning and managing complex projects. public-domain software (p. 151) Software, often available on the internet, that is not protected by copyright and thus may be duplicated by anyone at will. Why it’s important: Public- domain software offers lots of software options to users who may not be able to afford much commercial software. Users may download such software from the internet free and make as many copies as they wish. range (p. 162) A group of adjacent cells in a spreadsheet—for example, A1 to A5. Why it’s important: Ranges help sort data for calculation or reports. recalculation (p. 162) The process of recomputing values in a spreadsheet, either as an ongoing process as data is entered or afterward, with the press of a key. Why it’s important: With this simple feature, the hours of mind-numbing work required to manually rework paper spreadsheets has become a thing of the past. relational database (p. 164) Database in which data is orga- nized into related tables. Each table contains rows and col- umns; the rows are called records, and the columns are called fields. An example of a record is a person’s address—name, street address, city, and so on. An example of a field is that person’s last name; another field would be that person’s first name; a third field would be that person’s street address; and so on. Why it’s important: The relational database is a com- mon type of database. rentalware (p. 152) Software that users lease for a fee and download whenever they want it. Why it’s important: This is the concept behind application service providers (ASPs). rollover (p. 132) Icon feature in which a small textbox explain- ing the icon’s function appears when you roll the mouse pointer over the icon. A rollover may also produce an animated graphic. Why it’s important: The rollover gives the user an immediate explanation of an icon’s meaning. saving (p. 160) Storing, or preserving, a document as an elec- tronic file permanently—on diskette, hard disk, or CD-ROM, for example. Why it’s important: Saving is a feature of nearly all application software. Having the document stored in elec- tronic form spares users the tiresome chore of retyping it from scratch whenever they want to make changes. Users need only retrieve it from the storage medium and make the changes, then resave it and print it out again. scrolling (p. 156) Moving quickly upward, downward, or side- ways through the text or other screen display. Why it’s impor- tant: A standard computer screen displays only 20–22 lines of standard-size text; however, most documents are longer than that. Using the directional arrow keys, or the mouse and a scroll bar located at the side of the screen, users can move (“scroll”) through the display screen and into the text above and below it. shareware (p. 151) Copyrighted software that is distributed free of charge but requires that users make a monetary con- tribution in order to continue using it. Shareware is distributed primarily through the internet. Because it is copyrighted, you cannot use it to develop your own program that would compete with the original product. Why it’s important: Like public-domain software and freeware, shareware offers an inexpensive way to obtain new software. software license (p. 150) Contract by which users agree not to make copies of software to give away or resell. Why it’s important: Software manufacturers don’t sell people software; they sell them licenses to become authorized users of the software. special-purpose keys (p. 130) Keys used to enter, delete, and edit data and to execute commands. For example, the Esc (for “Escape”) key tells the computer to cancel an operation or leave (“escape from”) the current mode of operation. The Enter, or Return, key tells the computer to execute certain commands and to start new paragraphs in a document. Why it’s important: Special-purpose keys are essential to the use of software. spreadsheet (p. 161) Application software that allows users to create tables and financial schedules by entering data and
  213. 188 Chapter 3 formulas into rows and columns arranged as

    a grid on a dis- play screen. Why it’s important: When data is changed in one cell, values in other cells in the spreadsheet are automatically recalculated. supervisor (p. 123) Also called kernel; the central compo- nent of the operating system that manages the CPU. Why it’s important: The supervisor remains in main memory while the computer is running. As well as managing the CPU, it directs other nonresident programs to perform tasks that support application programs. system software (p. 120) The software that helps the com- puter perform essential operating tasks and enables the application software to run. The most important component of system software is the operating system, the master control program that runs the computer. Examples of oper- ating system software for the PC are various Microsoft programs (such as Windows XP, Vista, and 7), Apple Macin- tosh OS X, Unix, and Linux. Why it’s important: Computers cannot run application software without having system software. taskbar (p. 136) Graphic toolbar that appears at the bottom of the Windows screen. Why it’s important: The taskbar presents the applications that are running. template (p. 158) In word processing, a preformatted docu- ment that provides basic tools for shaping a final document— the text, layout, and style for a letter, for example. Why it’s important: Templates make it very easy for users to prepare professional-looking documents, because most of the prepa- ratory formatting is done. title bar (p. 136) Bar across the very top of the display window. Why it’s important: It shows the name of the folder the user is in. toolbar (p. 136) Bar across the top of the display window, below the menu bar. It displays menus and icons repre- senting frequently used options or commands. Why it’s important: Toolbars make it easier to identify and execute commands. Unix (p. 144) Proprietary multitasking operating system for multiple users that has built-in networking capability and ver- sions that can run on all kinds of computers. Why it’s impor- tant: Government agencies, universities, research institutions, large corporations, and banks all use Unix for everything from designing airplane parts to currency trading. Unix is also used for website management. The developers of the internet built their communication system around Unix because it has the ability to keep large systems (with hundreds of processors) churning out transactions day in and day out for years with- out fail. user interface (p. 129) User-controllable display screen that allows the user to communicate, or interact, with his or her computer. Why it’s important: The interface determines the ease of use of hardware and software. The three types of user interface are command-driven, menu-driven, and graphical (GUI), which is now the most common. Without user interfaces, no one could operate a computer system. utility programs (p. 127) Also known as service programs; system software components that perform tasks related to the control and allocation of computer resources. Why it’s important: Utility programs enhance existing functions or provide services not supplied by other system software programs. Most computers come with built-in utilities as part of the system software; they usually include backup, data recovery, virus protection, data compression, and file defragmentation, along with check (scan) disk and disk cleanup. value (p. 162) A number or date entered in a spreadsheet cell. Why it’s important: Values are the actual numbers used in the spreadsheet—dollars, percentages, grade points, tempera- tures, or whatever. web page design/authoring software (p. 176) Software used to create web pages with sophisticated multimedia features. Why it’s important: Allows beginners as well as professional web designers to create web pages, which have become extremely important communications tools on the internet, for all sorts of purposes. what-if analysis (p. 163) Spreadsheet feature that employs the recalculation feature to investigate how changing one or more numbers changes the outcome of the calculation. Why it’s important: Users can create a worksheet, putting in formulas and numbers, and then ask, “What would hap- pen if we change that detail?”—and immediately see the effect. window (p. 136) Rectangular frame on the computer display screen. Through this frame users can view a file of data—such as a document, spreadsheet, or database—or an application program. Why it’s important: Using windows, users can display at the same time portions of several documents and/or pro- grams on the screen. Windows Mobile See Microsoft Windows Embedded. word processing software (p. 155) Application software that allows users to use computers to format, create, edit, print, and store text material, among other things. Why it’s impor- tant: Word processing software allows users to maneuver through a document and delete, insert, and replace text, the principal correction activities. It also offers such addi- tional features as creating, editing, formatting, printing, and saving. word wrap (p. 156) Special feature that automatically contin- ues text to the next line by “wrapping around” when the user reaches the right margin. Why it’s important: You don’t have to hit a “carriage-return” key or Enter key to move to the next line.
  214. 189 Software CHAPTER REVIEW Self-Test Questions 1. ________ software enables

    the computer to perform essential operating tasks. 2. ________ ________ is the term for programs designed to perform specific tasks for the user. 3. ________ is the activity in which a computer works on more than one process at a time. 4. ________ is the scattering of portions of files about the disk in nonadjacent areas, thus greatly slowing access to the files. 5. Windows and Mac OS are generally used on ________ computers. 6. ________ is the process of loading an operating system into a computer’s main memory. 7. A(n) ________ is a utility that will find all the scattered files on your hard disk and reorganize them as contigu- ous files. 8. The ________ is the component of system software that comprises the master system of programs that manage the basic operations of the computer. 9. The ________ is the user-controllable display screen that allows you to communicate, or interact, with your computer. 10. Disk scanner and disk cleanup utilities detect and correct certain types of common problems on hard disks, such as removing unnecessary files called ________ files that are created by Windows only for short tasks and system restore after system problems. 1 1. OSs allow users to control access to their computers via use of a ________ and a ________ . 12. Software or hardware that is ________ means that it is privately owned and controlled by a company. 13. Linux is ________ - ________ software—meaning any programmer can download it from the internet for free and modify it with suggested improvements. 14. When you power up a computer by turning on the power “on” switch, this is called a ________ boot. If your computer is already on and you restart it, this is called a ________ boot. 15. ________ software allows you to create and edit documents. 16. ________ is the activity of moving upward or downward through the text or other screen display. 17. Name four editing features offered by word pro- cessing programs: ________, ________ , ________ , ________. 18. In a spreadsheet, the place where a row and a column intersect is called a ________ . 19. The ________ is the movable symbol on the display screen that shows you where you may next enter data or commands. 20. When you buy software, you pay for a ________, a contract by which you agree not to make copies of the software to give away or resell. 21. Records in a database are sorted according to a ________ . 22. ________ involves mixing text and graphics to produce high-quality output for commercial printing. 23. A ________ allows users to create tables and do “what-if” financial analyses by entering data and for- mulas into rows and columns arranged as a grid on a display screen. 24. ________ automatically continues text to the next line when you reach the right margin. 25. Settings that are automatically used by a pro- gram unless the user specifies otherwise are called ________ . ________. 26. ________ - ________ software is not protected by copyright and may be copied by anyone. 27. ________ ________ are specialized software programs that allow input and output devices to communicate with the rest of the computer system. 28. The ________ format allows documents to be sent to almost any platform and be opened without los- ing any of their characteristics (text, colors, graphics, formatting). Multiple-Choice Questions 1. Which of the following are functions of the operating system? a. file management b. CPU management c. task management d. booting e. all of these s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.”
  215. 190 Chapter 3 2. Which of the following was the

    first major microcom- puter OS? a. Mac OS b. Windows c. DOS d. Unix e. Linux 3. Which of the following is a prominent network operat- ing system? a. Linux b. Ubuntu c. Windows NT d. DOS e. Mac OS 4. Which of the following is the newest Microsoft Windows operating system? a. Windows Vista b. Windows XP c. Windows 7 d. Windows NT e. Windows CE 5. Which of the following refers to the execution of two or more programs by one user almost at the same time on the same computer with one central processor? a. multitasking b. multiprocessing c. time-sharing d. multiprogramming e. coprocessing 6. Which of the following are specialized software pro- grams that allow input and output devices to communi- cate with the rest of the computer system? a. multitasking b. boot-disks c. utility programs d. device drivers e. service packs 7. Which of the following is not an advantage of using database software? a. integrated data b. improved data integrity c. lack of structure d. elimination of data redundancy 8. Which of the following is not a feature of word process- ing software? a. spelling checker b. cell address c. formatting d. cut and paste e. find and replace 9. What is the common consumer computer interface used today? a. command-driven interface b. graphical user interface c. menu-driven interface d. electronic user interface e. biometric user interface 10. Which type of software can you download and duplicate without any restrictions whatsoever and without fear of legal prosecution? a. commercial software b. shareware c. public-domain software d. pirated software e. rentalware True/False Questions T F 1. The supervisor manages the CPU. T F 2. The first graphical user interface was provided by Microsoft Windows. T F 3. All operating systems are mutually compatible. T F 4. Font refers to a preformatted document that provides basic tools for shaping the final document. T F 5. Unix crashes often and thus is not normally used for running important large systems. T F 6. Windows NT is the most recent Microsoft OS. T F 7. Spreadsheet software enables you to perform what-if calculations. T F 8. Public-domain software is protected by copyright and so is offered for sale by license only. T F 9. The records within the various tables in a data- base are linked by a key field. T F 10. QuarkXPress and Adobe InDesign are profes- sional desktop-publishing programs. T F 1 1. The best-known graphical user interface is the command-driven one. T F 12. Microsoft PowerPoint is an example of financial software. T F 13. Drawing programs create vector images, and painting programs produce bit-mapped images. T F 14. General computer users can design their own web pages using Adobe Dreamweaver, Adobe Flash, and Microsoft FrontPage.
  216. 191 Software Short-Answer Questions 1. Briefly define booting. 2. What

    is the difference between a command-driven interface and a graphical user interface (GUI)? 3. Why can’t you run your computer without system software? 4. Why is multitasking useful? 5. What is a device driver? 6. What is a utility program? 7. What is a platform? 8. What are the three components of system software? What is the basic function of each? 9. What is open-source software? 10. What does defragmenting do? 1 1. What is an embedded system? 12. What are the following types of application software used for? a. project management software b. desktop-publishing software c. database software d. spreadsheet software e. word processing software 13. Which program is more sophisticated, analytical graph- ics or presentation graphics? Why? 14. How are the following different from one another? Pop-up menu; pull-down menu; cascading menu. 15. What is importing? Exporting? 16. Briefly compare drawing programs and painting programs. 17. Explain what computer-aided design (CAD) programs do. 18. Discuss the various software licenses: site licenses, concurrent-use licenses, multiple-user licenses, single- user license. s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Knowledge in Action 1. Here’s a Windows XP exercise in defragmenting your hard-disk drive. Defragmenting is a housekeeping pro- cedure that will speed up your system and often free up hard-disk space. Double-click on My Computer on your Windows desktop (opening screen). Now use your right mouse button to click on C drive, then right-click on Proper- ties, then left-click on the General tab, and you will see how much free space there is on your hard disk. Next left-click on the Tools tab; to clear out any errors, click the Check Now button; this will run a scan. Once the scan is complete, return to the Tools win- dow and click the Defragment Now button. Click on Show Details. This will visually display on the screen the process of your files being reorganized into a contigu- ous order. Many times when your PC isn’t performing well, such as when it’s sluggish, running both ScanDisk (Check Now) and Defragment will solve the problem. 2. Ray Kurzweil is, among other things, the author of The Age of Intelligent Machines; The Age of Spiritual Machines, When Computers Exceed Human Intel- ligence; and The Singularity Is Near: When Humans Transcend Biology. He has said: “We are entering a new era. I call it ‘the Singularity.’ It’s a merger between human intelligence and machine intelligence that is going to create something bigger than itself. It’s the cutting edge of evolution on our planet” ( www. edge.org/3rd_culture/kurzweil_singularity/kurzweil_ singularity_index.html; accessed July 1, 2009). He envi- sions a future in which information technologies have advanced so far that they enable humans to transcend their biological limitations ( www.singularity.com ). What is “singularity”? Will it hurt? Will we hate it? Will we be able to notice it? Search the terms “Kurz- weil” and “Singularity” on www.singularity.com, www. kurzweilai.net, and other sites, and see if you can explain the concept to friends within 5 minutes or so. 3. What do you think is the future of Linux? Experts cur- rently disagree about whether Linux will become a seri- ous competitor to Windows. Research Linux on the web. Which companies are creating application software to run on Linux? Which businesses are adopting Linux as an OS? What are the predictions about Linux use? 4. How do you think you will obtain software for your com- puter in the future? Explain your answer. 5. Design your own handheld. Draw what your ideal hand- held would look like, and draw screens of what your user interface would look like. Describe the key fea- tures of your handheld. 6. What sorts of tasks do operating systems not do that you would like them to do? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
  217. 192 Chapter 3 7. If you were in the market

    for a new microcomputer today, what application software would you want to use on it? Why? What are some “dream” applications that you would like that have not yet been developed? 8. Several websites include libraries of shareware programs. Visit the www.5star-shareware.com site and identify three shareware programs that interest you. State the name of each program, the operating system it runs on, and its capabilities. Also, describe the contribution you must make to receive technical support. What about freeware? Check out www.freewarehome.com. 9. What is your opinion of downloading free music from the web to play on your own PC and/or CDs? Much attention has been given lately to music download- ing and copyright infringement. Research this topic in library magazines and newspapers or on the internet, and take a position in a short report. 10. How do you think you could use desktop publishing at home? For personal items? Family occasions? Holidays? What else? What hardware and software would you have to buy? 11. Think of three new ways that software companies could prevent people from pirating their software. 12. What is your favorite application software program of all? Why? 13. Did your computer come with a Windows Startup disk, and have you misplaced it? If your computer crashes, you’ll need this disk to reinstall the operating system. To learn the benefits of having a Startup disk, visit www.microsoft.com. Type startup in the “search for” box; then click on the links that interest you. Web Exercises 1. Go to http://list.driverguide.com/list/company243/ and identify the drivers that correspond to equipment you use. How does this website let you know which devices the drivers are for and which operating systems are compatible with them? If you own your own com- puter, go to the manufacturer’s website and locate its resource for updating drivers. Does the manufacturer recommend any driver updates that you could use? 2. Use a web search tool such as Google or Yahoo! to find some online antivirus sites—sites where users can regularly download updates for their antivirus software. Do you know what kind of antivirus software is installed on your computer? 3. Microsoft offers “patches,” or updates, for its Windows OS. Go to www.microsoft.com and search for the list of updates. What kinds of problems do these updates fix? Do you need any? 4. The History of Operating Systems: Visit the following websites to get an overview of the evolution and his- tory of the theory and function of operating systems: www.microsoft.com/windows/winhistoryintro.mspx www.computinghistorymuseum.org/teaching/papers/ research/history_of_operating_system_Moumina.pdf www.osdata.com/kind/history.htm www.answers.com/topic/history-of-operating-systems 5. Security Issue: Read about some security flaws and limitations of Microsoft Windows operating systems: www.sans.org/top20/ www.zdnetasia.com/news/ security/0,39044215,39242898,00.htm 6. Some people are fascinated by the error message com- monly referred to as the “Blue Screen of Death” (BSOD) or “Doom.” Run a search on the internet and find websites that sell T-shirts with the BSOD image on it, photo galleries of public terminals displaying the BSOD, fictional stories of BSOD attacks, and various other forms of entertainment based on the infamous error message. Do a search on the web to find users’ hypotheses of why the BSOD occurs, and find methods to avoid it. Here are a few sites: www.errornerds.com/error/blue-screen-of-death.php? gclid ϭ COL79bfTtZsCFRMUagodfAZ0Ow http://bluescreenofdeathfixer.com/ http://bsod.org/ http://bbspot.com/News/2000/9/bsod_death.html 7. Using Microsoft Excel or another spreadsheet program, make a food shopping list incorporating the estimated price for each item, and then have Excel calculate the overall cost. Then go buy your groceries and compare Excel’s price with the supermarket’s price. What else could Excel help you with? 8. The Windows operating system comes with a basic word processing program called Wordpad. Go to the Microsoft home page and to http://en.wikipedia.org/ wiki/WordPad and find out how Wordpad differs from Microsoft Word. Then use a keyword search in a search engine to get more information about these programs. Which one is right for you? 9. Curriculum Data Wales (CDW) is a public/private partnership that has been charged by the Welsh Assembly Government with the task of design- ing, building, and maintaining the National Grid for Learning Cymru as a bilingual service to schools and colleges in Wales. CDW’s website includes some short tutorials on desktop-publishing (DTP), spread- sheet, word processing, and database management software: www.ngfl-cymru.org.uk/vtc-home/vtc-ks4-home/ vtc-ks4-ict/vtc-ks4-ict-application_software.htm Work through the tutorials. Did they expand your knowledge of these applications? Do a search for “application software” & tutorials. What other useful tutorials did you find?
  218. 193 HARDWARE: THE CPU & STORAGE How to Choose a

    Multimedia Computer System 4 Chapter Topics & Key Questions 4.1 Microchips, Miniaturization, & Mobility What are the differences between transistors, integrated circuits, chips, and microprocessors? 4.2 The System Unit: The Basics How is data represented in a computer, what are the components of the system cabinet, and what are processing speeds? 4.3 More on the System Unit How do the processor and memory work, and what are some important ports, buses, and cards? 4.4 Secondary Storage What are the features of floppy disks, hard disks, optical disks, magnetic tape, smart cards, flash memory, and online secondary storage? 4.5 Future Developments in Processing & Storage What are some forthcoming developments that could affect processing power and storage capacity?
  219. 194 Chapter 4 T he microprocessor was “the most important

    invention of the 20th century,” says Michael Malone, author of The Microprocessor: A Biography. 1 Quite a bold claim, considering the incredible products that issued forth dur- ing those 100 years. More important than the airplane? More than television? More than atomic energy? According to Malone, the case for the exalted status of this thumbnail-size information-processing device is demonstrated, first, by its pervasiveness in the important machines in our lives, from computers to transportation. Sec- ond, “The microprocessor is, intrinsically, something special,” he says. “Just as [the human being] is an animal, yet transcends that state, so too the micro- processor is a silicon chip, but more.” Why? Because it can be programmed to recognize and respond to patterns in the environment, as humans do. Malone writes: “Implant [a microprocessor] into a traditional machine—say an auto- mobile engine or refrigerator—and suddenly that machine for the first time can learn, it can adapt to its environment, respond to changing conditions, become more efficient, more responsive to the unique needs of its user.” 2 4.1 MICROCHIPS, MINIATURIZATION, & MOBILITY What are the differences between transistors, integrated circuits, chips, and microprocessors? The microprocessor has presented us with gifts that we may only barely appreciate— portability and mobility in electronic devices. In 1955, for instance, portability was exemplified by the ads showing a young woman holding a Zenith television set over the caption: IT DOESN’T TAKE A MUSCLE MAN TO MOVE THIS LIGHTWEIGHT TV. That “light- weight” TV weighed a hefty 45 pounds. Today, by contrast, there is a handheld Casio 2.3-inch color TV weighing a mere 6.7 ounces. Had the transistor not arrived, as it did in 1947, the Age of Portability and consequent mobility would never have happened. To us a “portable” telephone might have meant the 40-pound backpack radio-phones carried by some American GIs during World War II, rather than the 3-ounce shirt-pocket cel- lular models available today. From Vacuum Tubes to Transistors to Microchips How do transistors and integrated circuits differ, and what does a semiconductor do? A circuit is a closed path followed or capable of being followed by an elec- tric current. Without circuits, electricity would not be controllable, and so we would not have electric or electronic appliances. Old-time radios used vacuum tubes—small lightbulb-size electronic tubes with glowing filaments, or wire circuits, inside them—to facilitate the transmission (flow) of electrons. One computer with these tubes, the ENIAC, was switched on in 1946 at the University of Pennsylvania and employed about 18,000 of them. Unfortunately, a tube failure occurred on average once every 7 minutes. Since it took more than 15 minutes to find and replace the faulty tube, it was difficult to get any useful computing work done—during a typical week, ENIAC was down for about one-third of the time. Moreover, the ENIAC was enormous, occupying
  220. Hardware: The CPU & Storage 195 1,800 square feet and

    weighing more than 30 tons. ENIAC could perform about 5,000 calculations per second—more than 10,000 times slower than modern PCs. Yet even at that relatively slow speed, ENIAC took about 20 seconds to complete a problem that had taken experts 1 or 2 days to complete manually. THE TRANSISTOR ARRIVES The transistor changed all that. A transistor is essentially a tiny electrically operated switch, or gate, that can alternate between “on” and “off ” many millions of times per second. The transistor was developed by Bell Labs in 1947. The first transistors were one-hundredth the size of a vacuum tube, needed no warm-up time, consumed less energy, and were faster and more reliable. (• See Panel 4.1.) Moreover, they marked the beginning of a process of miniaturization that has not ended yet. In 1960 one transistor fit into an area about a half-centimeter square. This was suf- ficient to permit Zenith, for instance, to market a transistor radio weighing about 1 pound (convenient, the company advertised, for “pocket or purse”). Today more than 6 million transistors can be squeezed into a centimeter, and a Sony headset radio, for example, weighs only 4.3 ounces. Hewlett-Packard is working on a transistor about 0.1 nanometer square. One nanometer is 1 billionth of a meter; a human hair is about 80,000 nanometers thick. In the old days, transistors were made individually and then formed into an electronic circuit with the use of wires and solder. Today transistors are part of an integrated circuit —an entire electronic circuit, including wires, formed on a single “chip,” or piece, of special material, usually silicon, as part of a single manufacturing process. Integrated circuits were developed by Jack Kilby at Texas Instruments, who demonstrated the first one in 1958. (• See the timeline, Panel 4.2, next page.) An integrated circuit embodies what is called solid-state technology. In a solid-state device, the electrons travel through solid material —in this case, silicon. They do not travel through a vacuum, as was the case with the old radio vacuum tubes. SILICON & SEMICONDUCTORS What is silicon, and why use it? Silicon is an element that is widely found in clay and sand. It is used not only because its abundance makes it cheap but also because it is a semiconductor. panel 4.1 Shrinking components The lightbulb-size 1940s vacuum tube was replaced in the 1950s by a transistor one- hundredth its size. Today’s transistors are much smaller, being microscopic in size.
  221. 196 Chapter 4 A semiconductor is a material whose electrical

    properties are inter- mediate between a good conductor of electricity and a nonconductor of electricity. (An example of a good conductor of electricity is the copper in household wiring; an example of a nonconductor is the plastic sheath around that wiring.) Because it is only a semiconductor, silicon has partial resistance to electricity. As a result, highly conducting materials can be over- laid on the silicon to create the electronic circuitry of the integrated circuit. (• See Panel 4.3.) Silicon alone has no processing power. A chip, or microchip, is a tiny piece of silicon that contains millions of microminiature integrated electronic circuits. Chip manufacture requires very clean environments, which is why chip manufacturing workers appear to be dressed for a surgical operation. Such workers must also be highly skilled, which is why chip makers are not found everywhere in the world. Miniaturization Miracles: Microchips, Microprocessors, & Micromachines What is a microprocessor? Microchips—“industrial rice,” as the Japanese call them— are responsible for the miniaturization that has revolution- ized consumer electronics, computers, and communications. They store and process data in all the electronic gadgetry we’ve become accustomed to—from microwave ovens to videogame controllers to music synthesizers to cameras to automobile fuel-injection systems to pagers to satellites. There are different kinds of microchips—for example, microprocessor, memory, logic, communications, graphics, and math coprocessor chips. We discuss some of these later in this chapter. Perhaps the most important is the micropro- cessor chip. A microprocessor (“microscopic processor” or “processor on a chip”) is the miniaturized circuitry of a computer processor—the CPU, the part that pro- cesses, or manipulates, data into information. When modified for use in machines other than computers, microprocessors are called microcontrollers or embedded computers. Mobility How have microprocessors helped make information technology more mobile? Smallness in TVs, phones, radios, camcorders, CD players, and comput- ers is now largely taken for granted. In the 1980s, portability, or mobility, Abacus is invented in Babylonia 3000 BCE First mechanical calculator that can add and subtract (Samuel Morland) 1666 The first mass- produced calculator, the Thomas Arithnometer 1820 1642 First mechanical adding machine (Blaise Pascal) Slide rule invented (Edmund Gunther) 1621 CE A linked sequence of punched cards controls the weaving patterns in Jacquard’s loom 1801 1833 Babbage’s difference engine (automatic calculator) panel 4.2 Timeline: Developments in processing and storage Modern chip with etched transistors. This chip would be about 1/2 inch by 1/2 inch and be several layers deep, with transistors etched on each level.
  222. Hardware: The CPU & Storage 197 1854 George Boole publishes

    “An Investigation on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design 1890 Electricity used for first time in a data- processing project – Hollerith’s automatic census-tabulating machine (used punched cards) 1877 Thomas Edison invents the phonograph 1843 World’s first computer programmer, Ada Lovelace, publishes her notes 1915 78 rpm record platters are introduced Chip designers checking out an enlarged drawing of chip circuits (above) Pentium 4 microprocessor chip mounted in protective frame with pins that can be connected to an electronic device such as a microcomputer. A wafer imprinted with many microprocessors. 1. A large drawing of the electrical circuitry is made; it looks something like the map of a train yard. The drawing is photographically reduced hundreds of times, to microscopic size. 2. That reduced photograph is then duplicated many times so that, like a sheet of postage stamps, there are multiple copies of the same image or circuit. 3. That sheet of multiple copies of the circuit is then printed (in a printing process called photolithography) and etched onto a round slice of silicon called a wafer. Wafers have gone from 4 inches in diameter to 6 inches to 8 inches, and now are moving toward 12 inches; this allows semiconductor manufacturers to produce more chips at lower cost. 4. Subsequent printings of layer after layer of additional circuits produce multilayered and interconnected electronic circuitry built above and below the original silicon surface. 5. Later an automated die-cutting machine cuts the wafer into separate chips, which are usually less than 1 centimeter square and about half a millimeter thick. A chip, or microchip, is a tiny piece of silicon that contains millions of microminiature electronic circuit components, mainly transistors. An 8-inch silicon wafer will have a grid of nearly 300 chips, each with as many as 5.5 million transistors. 6. After testing, each chip is mounted in a protective frame with protruding metallic pins that provide electrical connections through wires to a computer or other electronic device. panel 4.3 Making of a chip How microscopic circuitry is put onto silicon.
  223. info! more 198 Chapter 4 meant trading off computing power

    and convenience in return for smaller size and less weight. Today, however, we are getting close to the point where we don’t have to give up anything. As a result, experts have predicted that small, powerful, wireless personal electronic devices will transform our lives far more than the personal computer has done so far. “The new gen- eration of machines will be truly personal computers, designed for our mobile lives,” wrote one reporter back in 1992. “We will read office memos between strokes on the golf course, and answer messages from our children in the middle of business meetings.” 3 Today, of course, such activities are commonplace. Choosing an Inexpensive Personal Computer: Understanding Computer Ads What kind of features does a multimedia personal computer have? You’re in the market for a new PC and are studying the ads. What does “1 GB DDR SDRAM” mean? How about “160 GB SATA 7200 RPM Hard Drive”? Let’s see how to interpret a typical computer ad. (• See Panel 4.4.) Most desktop computers are multimedia computers, with sound and graph- ics capability. As we explained in Chapter 1, the word multimedia means “com- bination of media”—the combination of pictures, video, animation, and sound in addition to text. A multimedia computer features such equipment as a fast processor, DVD drive, sound card, graphics card, and speakers; and you may also wish to have headphones and a microphone. (Common peripherals are printer, scanner, sound recorder, and digital camera.) Let us now go through the parts of a computer system so that you can understand what you’re doing when you buy a new computer. First we look at how the system processes data. In the remainder of this chapter, we will con- sider the system unit and storage devices. In Chapter 5, we look at input devices and output devices. 4.2 THE SYSTEM UNIT: The Basics How is data represented in a computer, what are the components of the system cabinet, and what are processing speeds? Computers run on electricity. What is the most fundamental thing you can say about electricity? Electricity is either on or off. This two-state situation allows computers to use the binary system to represent data and programs. 1930 General theory of computers (MIT) 1944 First electro- mechanical computer (Mark I) 1924 T.J. Watson renames Hollerithʼs machine company, founded in 1896, to International Business Machines (IBM) 1945 John von Neumann introduces the concept of a stored program 1946 First programmable electronic computer in United States (ENIAC) 1936 Konrad Zuse develops the concept of a computer memory to hold binary information 1947 Magnetic tape enters the U.S. market; the first transistor is developed Learning More about Computer Technology Try the magazine Smart Com- puting in Plain English (www. smartcomputing.com). A more technical publication is PC Magazine (www.pcmag.com). See also www.webopedia http://computer.how stuffworks.com www.geek.com At www.pcpitstop.com you can get all sorts of information about testing your system’s performance and improving it.
  224. Hardware: The CPU & Storage 199 The Binary System: Using

    On/Off Electrical States to Represent Data & Instructions What does a computer’s binary system do, and what are some binary coding schemes? The decimal system that we are accustomed to has 10 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9). By contrast, the binary system has only two digits: 0 and 1. Thus, in the computer, the 0 can be represented by the electrical current being off and the 1 by the current being on. Although the use of binary systems is not restricted to computers, all data and program instructions that go into the com- puter are represented in terms of these binary numbers. (• See Panel 4.5. ) For example, the letter “G” is a translation of the electronic signal 01000111, or off-on-off-off-off-on-on-on. When you press the key for “G” on the computer keyboard, the character is automatically converted into the series of electronic impulses that the computer can recognize. Inside the computer, the character “G” is represented by a combination of eight transistors (as we will describe). Some are off, or closed (representing the 0s), and some are on, or open (rep- resenting the 1s). 1952 UNIVAC computer correctly predicts election of Eisenhower as U.S. President 1947–1948 Magnetic drum memory is introduced as a data storage device for computers 1958 Stereo records are produced 1954 Texas Instruments introduces the silicon transistor 1956 First computer hard disk is used 1949 45 rpm record platters are introduced 1962 Integrated circuit is nicknamed the “chip”; timesharing becomes common 1963 The American National Standards Institute accepts ASCII-7 code for information exchange • 7-Bay Mid-Tower Case • Intel Pentium Dual-Core Processor 2.80 GHz • 2 GB DDR2 SDRAM • 3 MB L2 Cache • 6 USB 2.0 Ports • 256 MB DDR2 Nvidia GeForce PCI Graphics • Sound Blaster Digital Sound Card • 56 Kbps Internal Modem • 320 GB SATA 7200 RPM Hard Drive • 24X DVD/CD-RW Combo Drive • Full-Sized Keyboard with Numeric Keypad • Microsoft IntelliMouse • 17" Flat Panel Display • HP Officejet Pro K5400 Details of this ad are explained throughout this chapter and the next. See the little magnifying glass: panel 4.4 Advertisement for a PC The terminology in micro- computer ads gener- ally does not change as quickly as the numbers; users will continue to need most of these com- ponents for a while, but the speeds and capaci- ties change quickly, as do methods of connection.
  225. 200 Chapter 4 MEASURING CAPACITY How many representations of 0s

    and 1s can be held in a computer or a storage device such as a hard disk? Capacity is denoted by bits and bytes and multiples thereof: • Bit: In the binary system, each 0 or 1 is called a bit, which is short for “binary digit.” • Byte: To represent letters, numbers, or special characters (such as ! or *), bits are combined into groups. A group of 8 bits is called a byte, and a byte represents one character, digit, or other value. (As we mentioned, in one scheme, 01000111 represents the letter “G.”) The capacity of a computer’s memory or of a floppy disk is expressed in numbers of bytes or multiples such as kilobytes and megabytes. (There are 256 combinations of 8 bits available: 28 ϭ 256.) • Kilobyte: A kilobyte (K, KB) is about 1,000 bytes. (Actually, it’s precisely 1,024 bytes, but the figure is commonly rounded.) The kilobyte was a common unit of measure for memory or secondary storage capacity on older computers. 1 KB equals about one-half page of text. • Megabyte: A megabyte (M, MB) is about 1 million bytes (1,048,576 bytes). Measures of microcomputer primary storage capacity today are expressed in megabytes. 1 MB equals about 500 pages of text. • Gigabyte: A gigabyte (G, GB) is about 1 billion bytes (1,073,741,824 bytes). This measure was formerly used mainly with “big iron” 1964 IBM introduces 360 line of computers; IBM’s seven-year long Sabre project, allowing travel agents anywhere to make airline reservations via terminals, is fully implemented; Control Data Corp.’s CDC 6600, designed by Seymour Cray, becomes the first commercially successful supercomputer 1968 Robert Noyce, Andy Grove, and Gordon Moore establish Intel, Inc. 1965 Audio cassette tape introduced; Gordon Moore pronounces “Moore’s Law” 1969 Klass Compaan conceives idea for CD 1970 Microprocessor chips come into use; floppy disk introduced for storing data; a chip inches square contains 1,000 transistors; the first and only patent on the smart card is filed 1 10 G W R O off on 01010111 01000111 01010010 01001111 panel 4.5 Binary data representation How the letters “G-R- O-W” are represented in one type of on/off, 1/0 binary code.
  226. info! more Hardware: The CPU & Storage 201 1971 First

    pocket calculator; the Intel 4004 micro- processor is developed— a “computer on a chip” 1972 Intel 8008 8-bit micro- processor 1975 First micro- computer (MITS Altair 8800) 1974 A DRAM chip becomes available 1973 Large-scale integration: 10,000 components are placed on a 1-sq.-cm. chip 1976 Apple I computer (first personal computer sold in assembled form); has 512 KB RAM 5 " floppy disk; Atari home videogame; Intel’s first 16-bit microprocessor, the 8086, debuts 1978 1 4 (mainframe) computers, but it is typical of the secondary storage (hard- disk) capacity of today’s microcomputers. One gigabyte equals about 500,000 pages of text. • Terabyte: A terabyte (T, TB) represents about 1 trillion bytes (1,009,511,627,776 bytes). 1 TB equals about 500,000,000 pages of text. Some high-capacity disk storage is expressed in terabytes. • Petabyte: A petabyte (P, PB) represents about 1 quadrillion bytes (1,048,576 gigabytes). The huge storage capacities of modern databases are now expressed in petabytes. • Exabyte: An exabyte (EB) represents about 1 quintillion bytes —that’s 1 billion billion bytes (1,024 petabytes—or 1,152,921,504,606,846,976 bytes). This number is seldom used. It is estimated that all the printed material in the world represents about 5 exabytes. 4 BINARY CODING SCHEMES Letters, numbers, and special characters are rep- resented within a computer system by means of binary coding schemes. (• See Panel 4.6. ) That is, the off/on 0s and 1s are arranged in such a way that they can be made to represent characters, digits, or other values. • EBCDIC: Pronounced “ eb -see-dick,” EBCDIC (Extended Binary Coded Decimal Interchange Code) is a binary code used with large Bigger Than an Exabyte? How big is a zettabyte? A yot- tabyte? Do an online search to find out. Survival Tip Decimal to Binary Conversion Use the Windows Calculator for quick decimal to binary conversions. Open Windows Calculator by choosing Start, All programs, Accessories, Calculator. Or you could just go to Start, Run, Calc. When the calculator opens, choose View, Scientific. This will change your calculator inter- face from a standard calcula- tor to a scientific calculator. Type in your number, and click the circle that says BIN. Also, while having the calculator on the Bin setting, you can type in any combination of 0s and 1s and convert them to deci- mal form by clicking on the DEC circle. A 1100 0001 0100 0001 B 1100 0010 0100 0010 C 1100 0011 0100 0011 D 1100 0100 0100 0100 E 1100 0101 0100 0101 F 1100 0110 0100 0110 G 1100 0111 0100 0111 H 1100 1000 0100 1000 I 1100 1001 0100 1001 J 1101 0001 0100 1010 K 1101 0010 0100 1011 L 1101 0011 0100 1100 M 1101 0100 0100 1101 Character EBCDIC ASCII-8 Character EBCDIC ASCII-8 N 1101 0101 0100 1110 O 1101 0110 0100 1111 P 1101 0111 0101 0000 Q 1101 1000 0101 0001 R 1101 1001 0101 0010 S 1110 0010 0101 0011 T 1110 0011 0101 0100 U 1110 0100 0101 0101 V 1110 0101 0101 0110 W 1110 0110 0101 0111 X 1110 0111 0101 1000 Y 1110 1000 0101 1001 Z 1110 1001 0101 1010 0 1111 0000 0011 0000 1 1111 0001 0011 0001 2 1111 0010 0011 0010 3 1111 0011 0011 0011 4 1111 0100 0011 0100 ! 0101 1010 0010 0001 5 1111 0101 0011 0101 6 1111 0110 0011 0110 7 1111 0111 0011 0111 8 1111 1000 0011 1000 9 1111 1001 0011 1001 ; 0101 1110 0011 1011 panel 4.6 Binary coding schemes: ASCII and EBCDIC
  227. 202 Chapter 4 computers, such as mainframes. It was deveoped

    in 1963–1964 by IBM and uses 8 bits (1 byte) for each character. • ASCII: Pronounced “ ask -ee,” ASCII (American Standard Code for Information Interchange) is the binary code most widely used with microcomputers. Depending on the version, ASCII uses 7 or 8 bits (1 byte) for each character. Besides having the more conventional characters, the version known as Extended ASCII includes such characters as math symbols and Greek letters. ASCII’s 256 characters, however, are not enough to handle such languages as Chinese and Japanese, with their thousands of characters. • Unicode: Developed in the early 1990s, Unicode uses 2 bytes (16 bits) for each character, rather than 1 byte (8 bits). Instead of having the 256 character combinations of ASCII, Unicode can handle 65,536 character combinations. Thus, it allows almost all the written languages of the world to be represented using a single character set. Machine Language How would I define machine language? Every brand of computer has its own binary language, called machine lan- guage. Machine language is a binary-type programming language built into the CPU that the computer can run directly. The machine language is specific to the particular CPU model; this is why, for example, software written for a Macintosh will not run on a Dell PC. To most people, an instruction writ- ten in machine language, consisting only of 0s and 1s, is incomprehensible. To the computer, however, the 0s and 1s represent precise storage locations and operations. How do people-comprehensible program instructions become computer- comprehensible machine language? Special system programs called language translators rapidly convert the instructions into machine language. This trans- lating occurs virtually instantaneously, so you are not aware it is happening. Because the type of computer you will most likely be working with is the microcomputer, we’ll now take a look at what’s inside the microcomputer’s system unit. The Computer Case: Bays, Buttons, & Boards What is a bay used for? The system unit houses the motherboard (including the processor chip and memory chips), the power supply, and storage devices. (• See Panel 4.7. ) In computer ads, the part of the system unit that is the empty box with just the power supply is called the case or system cabinet. For today’s desktop PC, the system unit may be advertised as something like a “4-bay mini-tower case” or an “8-bay mid-tower case.” A bay is a shelf 1979 Motorola introduces the 68000 chip, which later will support the Mac IBM introduces personal computer (with 8088 CPU and 16 KB RAM) 1981 Apple Macintosh; first personal laser printer; Sony and Philips introduce the CD-ROM; Intel’s 80286 chip is released 1984 Portable computers 1982 1983 The capacity of floppy disks is expanded to 360 KB; CDs are introduced to U.S. market 1985 Intel’s 80386 32-bit micro- processor is introduced Survival Tip Bay Access Drive bays are the openings in your computer’s case into which drives are installed. If the bay is “accessible,” it’s open to the outside of the PC (tape, floppy, CD/DVD drives). If it’s “hidden,” it’s closed inside the PC case (hard drive).
  228. Hardware: The CPU & Storage 203 The 3 " diskette

    is introduced for the Mac and becomes popular for the PC as well 1986 1 2 1988 Motorola’s 32-bit 88000 series of RISC microprocessors is introduced 1990 Motorola’s 68040 and Intel’s 1486 chips are released 1989 Double-sided, double-density floppy disks come on the market, increasing the 5 " diskette to 1.2 MB and the 3 " diskette to 1.4 MB; Intel’s 80486 chip with 1.2 million transistors is introduced; first portable Mac 1 4 1 2 Microprocessor chip RAM (main memory) chips mounted on modules (cards) Data transfer ribbon cable On/Off switch Floppy-disk drive CD/DVD optical- disk drive Power supply Power connector Hard-disk drive System unit Speaker Expansion slots (for video card, sound card, fax modem, etc.) Motherboard ROM chips Coprocessor chips CPU Power supply Motherboard CD/DVD drive Hard drive Power cords Ribbon cable Floppy drive Extra case fan Chip Fan Video card Moderm card Sound card panel 4.7 The system unit Interior views of the box, or case. It includes the motherboard, power sup- ply, and storage devices. (The arrangement of the components varies among models.)
  229. 204 Chapter 4 or an opening used for the installation

    of electronic equipment, gener- ally storage devices such as a hard drive or DVD drive. A computer may come equipped with four to eight bays. Empty bays are covered by a panel. A tower is a cabinet that is tall, narrow, and deep (so that it can sit on the floor beside or under a table) rather than short, wide, and deep. Originally a tower (full tower) was considered to be 24 inches high. Mini- (micro) and mid-towers may be less than half that size. At 6.5 inches square and 2 inches high, the Mac mini (Chapter 1, p. 23) is the smallest desktop microcomputer. The number of buttons on the outside of the computer case will vary, but the on/off power switch will appear somewhere, probably on the front. There may also be a “sleep” switch; this allows you to suspend operations without terminating them, so that you can conserve electrical power without the need for subsequently “rebooting,” or restarting, the computer. Inside the case—not visible unless you remove the cabinet—are various electrical circuit boards, chief of which is the motherboard, as we’ll discuss. Power Supply What does a computer’s power supply do? The electricity available from a standard wall outlet is alternating current (AC), but a microcomputer runs on direct current (DC). The power supply is a device that converts AC to DC to run the computer. The on/off switch in your computer turns on or shuts off the electricity to the power supply. Because electricity can generate a lot of heat, a fan inside the computer keeps the power supply and other components from becoming too hot. Electrical power drawn from a standard AC outlet can be quite uneven. For example, a sudden surge, or “spike,” in AC voltage can burn out the low-voltage DC circuitry in your computer (“fry the motherboard”). Instead of plugging your computer directly into a wall electrical outlet, it’s a good idea to plug it into a power protec- tion device. The three principal types are surge protectors, voltage regulators, and UPS units: SURGE PROTECTOR A surge protector, or surge suppressor, is a device that protects a computer from being damaged by surges (spikes) of high voltage. The computer is plugged into the surge protector, which in turn is plugged into a standard electrical outlet. (See the Practical Action box on page 205.) VOLTAGE REGULATOR A voltage regulator, or line conditioner, is a device that protects a computer from being damaged by insuf- ficient power—“brownouts” or “sags” in voltage. Brownouts can occur when a large machine such as a power tool starts up and Surge protector A line from the PC ad on page 199 Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; Power Macintosh based on Motorola’s Power PC 601 microprocessor; DNA computing proof of concept released 1994 Multimedia desktop computers; Intel introduces its first Pentium chip; Motorola releases the Power PC CPU 1993 1995 Intel’s Pentium Pro 1997 Intel’s Pentium II and Pentium MMX for games and multimedia 1998 Apple iMac 1999 Intel’s Pentium III; AMD’s Athlon CPU (800 MHz); Power Mac G4 available; end of the floppy disk predicted 2000 Intel’s Pentium 4; AMD’s Athlon CPU reaches 1 GHz 7-Bay Mid-Tower Case
  230. Hardware: The CPU & Storage 205 2001 Pentium 4 reaches

    2 GHz; USB 2.0 is introduced 2002 Pentium 4 reaches 3.06 GHz; Power Mac has 2 1-GHz Power PC CPUs; about 1 billion PCs have been shipped worldwide since the mid-70s 2003 Intel’s Pentium M/Centrino for mobile computing; 64-bit processors 2004 Intel Express chipsets for built-in sound and video capabilities (no cards needed); IBM sells its PC computing division to Lenovo Group 2006 Intel and AMD introduce dual- core processors; 64-bit processors enter the market 2005 Perpendicular recording for disk drives Ben Veligdan, a Brooklyn, New York, music teacher, wondered why his monthly electric bill exceeded $100 a month when his household consisted only of himself, his wife, and his cat. Then he looked around his modest one-bedroom apartment and thought, Could it be the computer? When he decided to unplug it while sleep- ing or not working, his electric bill fell almost immediately.5 You need power to run your computer, of course, but electricity can be very problematic: Leaving a computer turned on all the time is expensive. Having a computer on your thighs can quickly become hot and uncomfortable. Sudden power surges can devastate your hardware. Sudden power drops can wipe out your data. Here are a few things you can do to deal with these problems: • To reduce your electricity bill, turn off your computer when you’re not using it: It’s not just your computer. Many electronic gadgets—cellphone chargers, microwave ovens, and so on—suck electricity when they’re not being used (it’s called a “phantom” load). Indeed, it amounts to 5%–10% every year in American homes.6 Leaving PCs on overnight costs U.S. companies $2.8 billion a year.7 Devices are coming to market that can detect when an appliance is in standby mode (not working).8 But the best thing you can do is to plug your computer into some vari- ant of a power strip (discussed below), so that you can turn off the on-off switch when your PC is not in use. • If a laptop’s heat on your thighs is uncomfortable, put it on a “cool tray” with fan: A computer on your lap can generate heat that can quickly make you uncomfortable. Some companies now offer pads and so-called cool trays ($30–$50) with fans that you can slide under your laptop and can cool off both the machine and your lap. Devices are marketed by Logitech, Belkin, Kensington, and Microsoft.9 • Back up data regularly: You should faithfully make backup (duplicate) copies of your data every few min- utes as you’re working. Then, if your computer has power PRACTICAL ACTION Power Issues: Problems with Electrical Power to Your Computer problems, you’ll be able to get back in business fairly quickly once the machine is running again. • Use a surge protector to protect against too much elec- tricity: Plug all your hardware into a surge protector (sup- pressor), which will prevent damage to your equipment if there is a power surge. (You’ll know you’ve experienced a power surge when the lights in the room suddenly get very bright.) Surge protectors cost $10–$35. • Use a voltage regulator to protect against too little electricity: Plug your computer into a voltage regulator (line conditioner) to adjust for power sags or brownouts. If power is too low for too long, it’s as though the com- puter had been turned off. • Consider using a UPS to protect against complete absence of electricity: Consider plugging your computer into a UPS, or uninterruptible power supply (available at electronics stores for $35–$200). The UPS is kind of a short-term battery that, when the power fails, will keep your computer running long enough (5–30 minutes) for you to save your data before you turn off the machine. It also acts as a surge protector. • Turn ON highest-power-consuming hardware first: When you turn on your computer system, you should turn on the devices that use the most power first. This will avoid causing a power drain on smaller devices. The most com- mon advice is to turn on (1) printer, (2) other external peripherals, (3) system unit, (4) monitor—in that order. • Turn OFF lowest-power-consuming hardware first: When you turn off your system, follow the reverse order. This avoids a power surge to the smaller devices. • Unplug your computer system during lightning storms: Unplug all your system’s components—including phone lines—during thunder and lightning storms. If lightning strikes your house or the power lines, it can ruin your equipment.
  231. 206 Chapter 4 causes the lights in your house to

    dim. They also may occur on very hot sum- mer days when the power company has to lower the voltage in an area because too many people are running their air conditioners all at once. UPS A UPS (uninterruptible power supply) is a battery-operated device that provides a computer with electricity if there is a power failure. The UPS will keep a computer going for 5–30 minutes or more. It goes into operation as soon as the power to your computer fails. Power supply units are usually rated in joules, named after a 19th-century English physicist. The higher the number of joules, the better the power protec- tion. (One hundred joules of energy keep a 100-watt light going for 1 second.) The Motherboard & the Microprocessor Chip How is the motherboard important, and what are types of processor chips? As we mentioned in Chapter 1, the motherboard, or system board, is the main circuit board in the system unit. The motherboard consists of a flat board that fills one side of the case. It contains both soldered, nonremovable components and sockets or slots for components that can be removed—microprocessor chip, RAM chips, and various expansion cards, as we explain later. (• See Panel 4.8, next page. ) Making some components removable allows you to expand or upgrade your system. Expansion is a way of increasing a computer’s capabilities by add- ing hardware to perform tasks that are beyond the scope of the basic system. For example, you might want to add video and sound cards. Upgrad- ing means changing to newer, usually more powerful or sophisticated versions, such as a more powerful microprocessor or more memory chips. THE MICROPROCESSOR CHIP The moth- erboard may be thought of as your com- puter’s central nervous system. The brain of your computer is the microproces- sor chip. As we described in Chapter 1, a microprocessor is the miniaturized circuitry of a computer processor, contained on a small silicon chip. It stores program instructions that process, or manipulate, data into information. 2010 $1,000 buys a computer working at 10 quadrillion calculations per second 2015 Microcomputer storage in zettabytes 2025 Computers are able to simulate the entire human brain 2030 $1,000 buys a computer more powerful than... the human brain 2030–2045 The point of “singularity” is reached, when technical progress is so fast that unenhanced human intelligence can’t follow it. One can no longer distinguish between our biology and our technology. UPS processors modem card in slot expansion slots data transfer ribbon CPU fan Mac motherboard
  232. Hardware: The CPU & Storage 207 • Transistors—key parts of

    a chip: The key parts of the microprocessor are transistors. Transistors, we said, are tiny electronic devices that act as on/off switches, which process the on/off (1/0) bits used to represent data. According to Moore’s law, named for legendary Intel cofounder Gordon Moore, the number of transistors that can be packed onto a chip doubles about every 18 months, while the price stays the same, which has enabled the industry to shrink the size and cost of things such as computers and cellphones while improving their performance. In 1961 a chip had only 4 transistors. In 1971 it had 2,300; in 1979 it had 30,000; and in 1997 it had 7.5 million. In 2008, Intel announced a new Itanium chip with 2 billion transistors. 10 • The chipset—chips for controlling information among system components: The chipset consists of groups of interconnected chips on the motherboard that control the flow of information between the microprocessor and other system components connected to the motherboard. The chipset determines what types of processors, memory, and video card ports will work on the same motherboard. It also establishes the types of multimedia, storage, network, and other hardware the motherboard supports. TRADITIONAL MICROCOMPUTER MICROPROCESSORS Most personal computers in use today have one of two types of microprocessors— one for the PC, one for the Macintosh. The leading chip makers have been Intel, AMD, IBM, and Motorola/Freescale. • Intel-type processors for PCs—Intel and AMD chips: Most PCs use CPUs manufactured by Intel Corporation or Advanced Micro Devices (AMD). Indeed, the Microsoft Windows operating system was designed to run on Intel chips. Intel-type chips have a similar internal design and are made to run PCs. They are used by manufacturers such as Dell and Hewlett-Packard in their PC microcomputers. Since 1993, Intel has marketed its chips under such names as “Pentium,” “Pentium Pro,” “Pentium II,” and “Pentium III.” New computers usually have a “Pentium 4” (P4), “Celeron,” “Xeon,” or “Itanium” processor. Less expensive PCs use Pentium or Celeron processors; workstations and low-end servers use Xeon or Itanium Microprocessor chip (with CPU) RAM (main memory) chips mounted on modules (cards) Cards in expansion slots panel 4.8 The motherboard This main board offers slots or sockets for removable components: microprocessor chip, RAM chips, and various expansion cards. Intel Pentium Dual- Core Processor 2.80 GHz
  233. 208 Chapter 4 processors. AMD’s Opteron processors compete with Intel’s

    Xeon and Itanium families, and its Athlon processors compete with Intel’s Pentium and Celeron families. In 2008, Intel introduced a line of chips dubbed Atom, for use in so-called nettops and netbooks, Intel’s terms for low-priced desktop ($200–$300) and notebook ($200–$350) computers. AMD announced Puma as a new chip to help the company maintain its share in the laptop market. 11 • Motorola/Freescale and IBM processors for Macintoshes: Apple computers have used a design different from Intel-type processors. For many years, Motorola-type chips were made by Motorola and later its subsidiary Freescale Semiconductor for Apple Macintosh computers up to and including the Apple Mac G4. PowerMac G5 Macintoshes used the PowerPC family of processors, which were originally developed in a cooperative effort by Apple, Freescale, and IBM. Apple MacBooks use Intel Core 2 Duo processors, and the Mac Pros use Quad Core Intel Xeon processors. RECENT MICROCOMPUTER MICROPROCESSORS Some recent devel- opments in chips have had significant effects: • Intel processors for Macintoshes: In mid-2005, Apple announced that it would end its current line of products based on PowerPC chips from IBM and Freescale and would switch its machines to Intel chips. Although risky for Apple, the advantage of this major switch is that an Intel processor gives Mac users access to the vast array of Windows-based games and programs (at least those users who are willing to run a Windows OS as well as Mac OS on their systems). This appeals to Windows users who are attracted to Apple’s designs but have stayed away from Macs because they didn’t run Windows programs. 12 Even Windows users benefit, suggests well-known technology journalist Walter Mossberg, because, as the most innovative major computer maker, Apple’s impact on the industry is vastly greater than its market share. “Almost everything it does is later copied by the Windows PC makers,” he points out, “so keeping Apple strong and innovating is good for Windows users, too.” 13 • Multicore processors for PCs—dual core and quadcore: “You’ll be typing along on an email when suddenly the PC stops responding to your keystrokes, then catches up a few seconds later,” wrote BusinessWeek ’s Stephen Wildstrom. “Or a program that used to load in a few seconds inexplicably takes three times as long. Processors are faster than ever, but the demands of even routine computing are overwhelming them.” 14 The reason computers bog down is that, as Wildstrom explained, “no matter how fast a processor runs, it can do only one thing at a time.” Adding more transistors doesn’t help, because they generate too much heat. Enter a new kind of microcomputer chip— the multicore processor, designed to let the operating system divide the work over more than one processor, with two or more processor “cores” on a single piece of silicon. The concept is not new; large computer systems, such as IBM’s Blue Gene/L supercomputer, have featured as many as 65,000 processors working in unison. 15 But the beauty of having two or more cores is that chips can take on several tasks at once, eliminating the annoying pauses that Wildstrom mentioned. For desktop personal computers, Intel offers a Pentium Dual-Core, a Core 2 Duo, a Core 2 Extreme, and a Core 2 Quad (four processors). AMD Dell Inspiron Mini 9 netbook Motorola processor
  234. info! more Hardware: The CPU & Storage 209 offers the

    Athlon 64 FX/X2 Dual-Core. For servers, Intel offers a Xeon Dual-Core and Quad-Core Xeon, and AMD offers a Dual-Core Opteron a Quad-Core Opteron. In early 2009, Intel said it was developing an eight- core processor, the “Enterprise” Xeon processor, which would carry 2.3 billion transistors. 16 (The multicore technology takes advantage of a technology called hyperthreading, explained in a few pages.) • Processors for portable devices: Chip makers have been rushing to produce processors for a new breed of portable devices— mobile internet devices (Chapter 1), netbooks (Intel’s term), and other electronics, from cellphones to MP3 players to handheld game systems to household appliances. Among the contenders making processors for this market are Nvidia (with its Tegra system-on-a-chip), Qualcomm (Snapdragon), Texas Instruments (OMAP4), Via Technologies (the Via C7), and Intel (Atom and Moorestown, and the forthcoming Medfield). 17 What all such chips have in common is energy efficiency; Nvidia’s Tegra, for instance, can hold a battery charge five times longer than Intel’s Atom. 18 • Graphics processing units—specialized processors for 3-D graphics: A graphics processing unit (GPU) is a specialized processor used to manipulate three-dimensional (3-D) computer graphics. Unlike a general-purpose CPU, a GPU is able to perform a range of complex algorithms (problem-solving steps). GPUs are found in personal computers, workstations, cellphones, and game consoles. The first company to develop the GPU was Nvidia, whose GeForce 256 GPU has over 22 million transistors (compared to 9 million in the Pentium III) and can process billions of calculations per second. Processing Speeds: From Megahertz to Picoseconds How does the system clock work in my computer, and how is its speed measured? Often a PC ad will say something like “Intel Celeron processor 1.80 GHz,” “Intel Pentium 4 processor 2.80 GHz,” or “AMD Athlon 64 X2 processor 2.30 GHz.” GHz stands for “gigahertz.” These figures indicate how fast the micro- processor can process data and execute program instructions. Every microprocessor contains a system clock, which controls how fast all the operations within a computer take place. The system clock uses fixed vibrations from a quartz crystal to deliver a steady stream of digital pulses or “ticks” to the CPU. These ticks are called cycles. Faster clock speeds will result in faster processing of data and execution of program instructions, as long as the computer’s internal circuits can handle the increased speed. There are four main ways in which processing speeds are measured, as follows. FOR MICROCOMPUTERS: MEGAHERTZ & GIGAHERTZ Older microcomputer microprocessor speeds are expressed in megahertz (MHz), a measure of fre- quency equivalent to 1 million cycles (ticks of the system clock) per sec- ond. The original IBM PC had a clock speed of 4.77 megahertz, which equaled 4.77 million cycles per second. The latest-generation processors from AMD and Intel operate in gigahertz (GHz) —a billion cycles per second. Intel’s Pentium 4 operates at up to 3.60 gigahertz, or 3.60 billion cycles per second. Some experts predict that advances in microprocessor technology will pro- duce a 50-gigahertz processor by 2010, the kind of power that will be required to support such functions as true speech interfaces and real-time speech trans- lation. However, unfortunately, the faster a CPU runs, the more power it con- sumes and the more waste heat it produces. Thus, rather than increasing clock speeds, which requires smaller transistors and creates tricky engineering problems, chip makers such as Intel and AMD are now employing additional Which Intel Processor Is Better? Which is the better Intel pro- cessor, Pentium or Celeron, for basic word processing and web surfing versus video games and complex applications? Find out by doing a web search.
  235. 210 Chapter 4 CPU cores and running them in parallel—dual

    core or multicore technology, as we’ve described. 19 As for you, since a new high-speed processor can cost many hundred dollars more than a previous-generation chip, experts often recommend that buyers fret less about the speed of the processor (since the work most people do on their PCs doesn’t even tax the limits of the current hardware) and more about spending money on extra memory. (However, game playing does tax the sys- tem. Thus, if you’re an avid computer game player, you may want to purchase the fastest processor.) FOR WORKSTATIONS & MAINFRAMES: MIPS Processing speed can also be measured according to the number of instructions per second that a com- puter can process. MIPS stands for “millions of instructions per second.” MIPS is used to measure processing speeds of mainframes and workstations. A workstation might perform at 100 MIPS or more; a mainframe at as much as 981,024 MIPS. FOR SUPERCOMPUTERS: FLOPS The abbreviation flops stands for “floating- point operations per second.” A floating-point operation is a special kind of mathematical calculation. This measure, used mainly with supercomput- ers, is expressed as megaflops ( mflops, or millions of floating-point operations per second), gigaflops ( gflops, or billions), and teraflops ( tflops, or trillions). IBM’s Blue Gene/L (for “Lite”) supercomputer cranks out 280.6 teraflops, or 280.6 trillion calculations per second. (With the previous top speed of 70.72 teraflops, a person able to complete one arithmetic calculation every second would take more than a million years to do what Blue Gene/L does in a single second.) The latest champion supercomputer, Roadrunner, developed by Los Alamos National Laboratory and IBM (Chapter 1), has a speed of 1,105 tera- flops, or more than a petaflop (1,000 trillion operations per second). 20 FOR ALL COMPUTERS: FRACTIONS OF A SECOND Another way to measure cycle times is in fractions of a second. A microcomputer operates in microsec- onds, a supercomputer in nanoseconds or picoseconds—thousands or millions Year Processor Name Clock Speed Transistors 2008 Intel Core i7 2.66 GHz (each core) 410 million (each core; 4 cores usually used) 2008 Intel Tukwila Quad Core 2 GHz (each core) 2 billion 2007 Intel Core Quad 2.4–2.7 HZ 582 million 2006 Intel Pentium EE 840 dual core 3.2 GHZ (each core) 230 million 2005 Intel Pentium 4 660 3.6–3.7 GHz 169 million 2005 AMD Athlon 64 X2 dual core 2 GHz (each core) 105.9 million 2005 Intel Itanium 2 Montecito dual core 2 GHz (each core) 1.7 billion 2004 IBM PowerPC 970FX (G5) 2.2 GHz 58 million 2003 AMD Opteron 2–2.4 GHz 37.5 million 2002 Intel Itanium 2 1 GHz and up 221 million 2002 AMD Athlon MP 1.53–1.6 GHz 37.5 million 2001 Intel Xeon 1.4–2.8 GHz 140 million 2001 Intel Mobile Pentium 4 1.4–3.06 GHz 55 million 2001 AMD Athlon XP 1.33–1.73 GHz 37.5 million 2001 Intel Itanium 733–800 MHz 25.4–60 million 2000 Intel Pentium 4 1.4–3.06 GHz 42–55 million 1999 Motorola PowerPC 7400 (G4) 400–500 MHz 10.5 million Comparison of Some Popular Recent Microcomputer Processors
  236. Hardware: The CPU & Storage 211 of times faster. A

    millisecond is one-thousandth of a second. A microsecond is one-millionth of a second. A nanosecond is one-billionth of a second. A pico- second is one-trillionth of a second. 4.3 MORE ON THE SYSTEM UNIT How do the processor and memory work, and what are some important ports, buses, and cards? Technology moves on—toward simplifying on the one hand, toward mastering more complexity on the other. An example of simplifying: How about a $100 laptop that could be put into the hands of billions of schoolchildren in the world’s poorest nations? Nicho- las Negroponte of the Media Lab at the Massachusetts Institute of Technol- ogy has proposed just such a “world computer,” the One Laptop Per Child project’s XO laptop. The XO, which weighs 3.2 pounds, has no hard drive or expensive display system, comes with less capable batteries and a hand crank for charging them, and stretches wireless networks with a technology that lets each computer in a third-world village in Peru or Mexico, for example, relay data to the others. Originally intended to sell for $100, the initial generation of XOs cost $188, depending on whether it used Linux or (for about $20 more) a version of Windows. 21 The One Laptop effort has led to competing low-cost computers, such as the itty-bitty 2-pound Eee PC from Asus, available for as little as $299. 22 An example of mastering more complexity: IBM, Sony, and Toshiba announced a processor chip called Cell that has nine processing units, or cores, each of which can work independently, allowing the processor to tackle nine tasks at once. Cell’s processing power of 48 gigaflops is such that it would have been among the top 500 supercomputers in 2002, but a version of the chip was released in a Toshiba notebook in 2008. 23 To understand the different ways computers are diverging, let’s take a deeper look at how the system unit works. How the Processor or CPU Works: Control Unit, ALU, Registers, & Buses How do the CPU and its parts work? Once upon a time, the processor in a computer was measured in feet. A pro- cessing unit in the 1946 ENIAC (which had 20 such processors) was about 2 feet wide and 8 feet high. Today, computers are based on micro processors, less than 1 centimeter square. It may be difficult to visualize components so tiny. Yet it is necessary to understand how microprocessors work if you are to grasp what PC advertisers mean when they throw out terms such as “2 GB DDR-SDRAM” or “1 MB Level 2 Advanced Transfer Cache.” WORD SIZE Computer professionals often discuss a computer’s word size. Word size is the number of bits that the processor may process at any one time. The more bits in a word, the faster the computer. A 32-bit computer—that is, one with a 32-bit-word processor—will transfer data within each micropro- cessor chip in 32-bit chunks, or 4 bytes at a time. (Recall there are 8 bits in a byte.) A 64-bit-word computer is faster; it transfers data in 64-bit chunks, or 8 bytes at a time. THE PARTS OF THE CPU A processor is also called the CPU, and it works hand in hand with other circuits known as main memory to carry out processing. The CPU (central processing unit) is the “brain” of the computer; it fol- lows the instructions of the software (program) to manipulate data into information. The CPU consists of two parts—(1) the control unit and
  237. 212 Chapter 4 (2) the arithmetic/logic unit (ALU), both of

    which contain registers, or high-speed storage areas (as we dis- cuss shortly). All are linked by a kind of electronic “roadway” called a bus. (• See Panel 4.9. ) • The control unit—for directing electronic signals: The control unit deciphers each instruction stored in the CPU and then carries out the instruction. It directs the movement of electronic signals between main memory and the arithmetic/logic unit. It also directs these electronic signals between main memory and the input and output devices. For every instruction, the control unit carries out four basic operations, known as the machine cycle. In the machine cycle, the CPU (1) fetches an instruction, (2) decodes the instruction, (3) executes the instruction, and (4) stores the result. (• See Panel 4.10, opposite. ) • The arithmetic/logic unit— for arithmetic and logical operations: The arithmetic/logic unit (ALU) performs arithmetic operations and logical operations and controls the speed of those operations. Registers High-speed storage areas used by control unit and ALU to speed up processing Control unit Directs electronic signals between main memory and ALU Buses Electrical data roadways that transmit data within CPU and between CPU and main memory and peripherals Bus Expansion slots on motherboard Main memory (Random Access Memory, or RAM) Arithmetic/logic unit (ALU) Performs arithmetic and logical operations Bus CPU on motherboard (enlarged representation) panel 4.9 The CPU and main memory The two main CPU com- ponents on a micropro- cessor are the control unit and the ALU, which contain working storage areas called registers and are linked by a kind of electronic roadway called a bus. As you might guess, arithmetic operations are the fundamental math operations: addition, subtraction, multiplication, and division. Logical operations are comparisons. That is, the ALU compares two pieces of data to see whether one is equal to ( ϭ ), greater than (>), greater than or equal to (> ϭ ), less than (<), less than or equal to (< ϭ ), or not equal to (≠) the other. • Registers—special high-speed storage areas: The control unit and the ALU also use registers, special CPU areas that enhance the computer’s performance. Registers are high-speed storage areas that temporarily store data during processing. They may store a program instruction while it is being decoded, store data while it is being processed by the ALU, or store the results of a calculation. All data must be represented in a register before it can be processed. For example, if two numbers are to be multiplied, both numbers must be in registers, and the result is also placed in a register. (The register can contain the address of a memory location where data is stored rather than the actual data itself.) The number of registers that a CPU has and the size of each (number of bits) help determine the power and speed of a CPU. For example, a 32-bit CPU is one in which each register is 32 bits wide. Therefore, each CPU instruction can manipulate 32 bits of data. (There are several types of registers, including instruction register, address register, storage register, and accumulator register. )
  238. Hardware: The CPU & Storage 213 • Buses—data roadways: Buses,

    or bus lines, are electrical data roadways through which bits are transmitted within the CPU and between the CPU and other components of the motherboard. A bus resembles a multilane highway: The more lanes it has, the faster the bits can be transferred. The old-fashioned 8-bit-word bus of early microprocessors had only eight pathways. Data is transmitted four times faster in a computer with a 32-bit bus, which has 32 pathways, than in a computer with an 8-bit bus. Intel’s Pentium chip is a 64-bit processor, as are Intel’s dual-core and quad-core processors. Supercomputers usually have 128-bit processors. We return to a discussion of buses in a few pages. How Memory Works: RAM, ROM, CMOS, & Flash How do I distinguish among the four principal types of memory chips? So far we have described only the kinds of chips known as microprocessors. But other silicon chips called memory chips are attached to the motherboard. The four principal types of memory chips are RAM, ROM, CMOS, and flash. RAM CHIPS—TO TEMPORARILY STORE PROGRAM INSTRUCTIONS & DATA Recall from Chapter 1 that there are two types of storage: primary and secondary. Primary storage is temporary or working storage and is often called memory or main memory. Secondary storage, usually called just storage, is relatively permanent storage. Memory refers to storage media in the form of chips, and storage refers to media such as disks and tape. RAM (random access memory) chips temporarily hold (1) software instructions and (2) data before and after it is processed by the CPU. Think of RAM as the primary workspace inside your computer. When you open a file, a copy of the file transfers from the hard disk to RAM, and this copy in RAM is the one that changes as you work with the file. When you activate the Save command, the changed copy transfers from RAM back to permanent storage on the hard drive. Because its contents are temporary, RAM is said to be volatile —the con- tents are lost when the power goes off or is turned off. This is why you should frequently —every 5–10 minutes, say—transfer (save) your work to a secondary storage medium such as your hard disk, in case the electricity goes off while you’re working. (However, there is one kind of RAM, called flash RAM, that is not temporary, as we’ll discuss shortly.) 1 2 3 4 Execution cycle Fetch Execute Store Arithmetic/logic unit Decode Instruction cycle Main memory Central processing unit Control unit 1 2 3 4 Fetch Arithmetic/logic unit Decode Main memory Central processing unit Control unit Store 125 Data: Program instruction: ADD NEXT NUMBER TO TOTAL 75 50 +75 125 Execute panel 4.10 The machine cycle (Left) The machine cycle executes instructions one at a time during the instruction cycle and the execution cycle. (Right) Example of how the addi- tion of two numbers, 50 and 75, is processed and stored in a single cycle. Survival Tip What RAM for Your PC? Before adding more RAM to improve your computer’s per- formance, check the manufac- turer’s website as to the type of RAM modules required for the motherboard. RAM slots and chipsets vary, and differ- ent computer models cannot work with RAM chips of cer- tain speeds.
  239. info! more 214 Chapter 4 Several types of RAM chips

    are used in personal computers— DRAM, SDRAM, SRAM, and DDR-SDRAM: • DRAM: The first type (pronounced “dee-ram”), DRAM (dynamic RAM), must be constantly refreshed by the CPU or it will lose its contents. • SDRAM: The second type of RAM is SDRAM (synchronous dynamic RAM), which is synchronized by the system clock and is much faster than DRAM. Often in computer ads the speed of SDRAM is expressed in megahertz. • SRAM: The third type, static RAM, or SRAM (pronounced “ess-ram”), is faster than DRAM and retains its contents without having to be refreshed by the CPU. • DDR-SDRAM: The fourth type, DDR-SDRAM (double-data rate synchronous dynamic RAM), is the current standard of RAM chip in PCs used at home; the speed is measured in megahertz. An even faster version is DDR2 SDRAM, the most recent entry, which is found on gaming machines and multimedia machines, where speed is needed. Microcomputers come with different amounts of RAM, which is usually measured in megabytes or gigabytes. An ad may list “256 MB SDRAM,” but you can get more. The Mac Pro, for instance, can provide up to 32 gigabytes of RAM. The more RAM you have, the more efficiently the computer operates and the better your software performs. Having enough RAM is a critical matter. Before you buy a software package, look at the outside of the box or check the manufacturer’s website to see how much RAM is required. Microsoft Office XP, for instance, states that a minimum of 128 megabytes of RAM is required, depending on the operating system, plus 8 megabytes of RAM for each applica- tion the user plans to run simultaneously. Windows Vista requires 512 mega- bytes to 1 gigabyte minimum RAM, as does Apple’s OS X version 10.6. If you’re short on memory capacity, you can usually add more RAM chips by plugging a RAM memory module into the motherboard. A memory module is a small fiberglass circuit board that can be plugged into an expansion slot on the motherboard. There are two types of such modules: SIMMs and the newer DIMMs. • SIMM: A SIMM (single inline memory module) has RAM chips on only one side. SIMMs are available in either FPM (fast page mode) or EDO (extended data output) speeds, with EDO being the faster of the two. SIMMs are more expensive than modern memory modules because they are no longer in demand, which also makes them difficult to obtain. • DIMM: A DIMM (dual inline memory module) has RAM chips on both sides. DIMMs are the most popular and common type of RAM used today. ROM CHIPS—TO STORE FIXED START-UP INSTRUCTIONS Unlike RAM, to which data is constantly being added and removed, ROM (read-only memory) cannot be written on or erased by the computer user with- out special equipment. ROM chips contain fixed start-up instruc- tions. That is, ROM chips are loaded, at the factory, with programs containing special instructions for basic computer operations, such as those that start the computer (BIOS) or put characters on the screen. These chips are nonvolatile; their contents are not lost when power to the computer is turned off. In computer terminology, read means to transfer data from an input source into the computer’s memory or CPU. The opposite is write —to transfer data from the computer’s CPU or memory to an output device. Survival Tip Need More RAM? If your system is giving you low-system-resources mes- sages, you may need more memory. For detailed informa- tion on your system, go to: www.crucial.com www.kingston.com www.tomshardware.com SIMM DIMM RAM-ifications To find out more about how RAM works, go to: http://computer.howstuffworks. com/ram.htm 2 GB DDR2 SDRAM
  240. Hardware: The CPU & Storage 215 Thus, with a ROM

    chip, read-only means that the CPU can retrieve programs from the ROM chip but cannot modify or add to those programs. A variation is PROM (programmable read-only memory), which is a ROM chip that allows you, the user, to load read-only programs and data. However, this can be done only once. CMOS CHIPS—TO STORE FLEXIBLE START-UP INSTRUCTIONS Pronounced “ see -moss,” CMOS (complementary metal-oxide semiconductor) chips are powered by a battery and thus don’t lose their contents when the power is turned off. CMOS chips contain flexible start-up instructions—such as time, date, and calendar—that must be kept current even when the computer is turned off. Unlike ROM chips, CMOS chips can be reprogrammed, as when you need to change the time for daylight savings time. (Your system software may prompt you to do this; newer systems do it automatically.) FLASH MEMORY CHIPS—TO STORE FLEXIBLE PROGRAMS Also a nonvolatile form of memory, flash memory chips can be erased and reprogrammed more than once (unlike PROM chips, which can be programmed only once). Flash memory, which doesn’t require a battery and which can range from 128 megabytes to 32 gigabytes and up in capacity, is used to store programs not only in personal computers but also in pagers, cellphones, MP3 players, Palm organizers, printers, and digital cameras. Flash memory is also used in newer PCs for BIOS instructions; they can be updated electronically on flash memory—the chip does not need to be replaced, as a ROM chip would. One flash memory chip called the EcoRAM (from Spansion) has been developed that might replace DRAM chips, because it can record data faster yet con- sumes one-eighth the power of DRAM; this might enable customers to replace four DRAM-based servers with one system using EcoRAM chips. 24 How Cache Works How do cache and virtual memory differ? Because the CPU runs so much faster than the main system RAM, it ends up waiting for information, which is inefficient. To reduce this effect, we have cache. Pronounced “cash,” cache temporarily stores instructions and data that the processor is likely to use frequently. Thus, cache speeds up pro- cessing. SRAM chips are commonly used for cache. THREE KINDS OF CACHE There are three kinds of cache, as follows: • Level 1 (L1) cache—part of the microprocessor chip: Level 1 (L1) cache, also called internal cache, is built into the processor chip. Ranging from 8 to 256 kilobytes, its capacity is less than that of Level 2 cache, although it operates faster. • Level 2 (L2) cache—not part of the microprocessor chip: This is the kind of cache usually referred to in computer ads. Level 2 (L2) cache, also called external cache, resides outside the processor chip, and consists of SRAM chips. Capacities range from 64 kilobytes to 2 megabytes. (In Intel ads, L2 is called Advanced Transfer Cache. ) L2 cache is generally quite a bit larger than L1 cache (most new systems have at least 1 megabyte of L2 cache) and is the most commonly cited type of cache when measuring PC performance. • Level 3 (L3) cache—on the motherboard: Level 3 (L3) cache is a cache separate from the processor chip on the motherboard. It is found only on very high-end computers, only those that use L2 Advanced Transfer Cache. Cache is not upgradable; it is set by the type of processor purchased with the system. 3 MB L2 Cache
  241. 216 Chapter 4 VIRTUAL MEMORY In addition to including cache,

    most current computer operating systems allow for the use of virtual memory —that is, some free hard-disk space is used to extend the capacity of RAM. The processor searches for data or program instructions in the following order: first L1, then L2, then RAM, then hard disk (or CD). In this progression, each kind of mem- ory or storage is slower than its predecessor. Other Methods of Speeding Up Processing What are interleaving, bursting, pipelining, superscalar architecture, and hyperthreading? The placement of memory chips on the motherboard has a direct effect on sys- tem performance. Because RAM must hold all the information the CPU needs to process, the speed at which the data can travel between memory and the CPU is critical to performance. And because the exchanges of data between the CPU and RAM are so intricately timed, the distance between them becomes another critical performance factor. Ways to speed up data traveling between memory and CPU are interleaving, bursting, pipelining, superscalar architec- ture, and hyperthreading. When you see these terms in a computer ad, you’ll know that the processor’s speed is being boosted. INTERLEAVING The term interleaving refers to a process in which the CPU alternates communication between two or more memory banks. Interleaving is generally used in large systems such as servers and workstations. For exam- ple, SDRAM chips are each divided into independent cell banks. Interleaving between the two cell banks produces a continuous flow of data. BURSTING The purpose of bursting is to provide the CPU with additional data from memory based on the likelihood that it will be needed. So, instead of the CPU retrieving data from memory one piece at a time, it grabs a block of information from several consecutive addresses in memory. This saves time because there’s a statistical likelihood that the next data address the CPU will request will be sequential to the previous one. PIPELINING Pipelining divides a task into a series of stages, with some of the work completed at each stage. That is, large tasks are divided into smaller overlapping ones. The CPU does not wait for one instruction to complete the machine cycle before fetching the next instruction. Pipelining is available in most PCs; each processor can pipeline up to four instructions. SUPERSCALAR ARCHITECTURE & HYPERTHREADING Superscalar architecture means the computer has the ability to execute more than one instruction per clock cycle (a 200-MHz processor executes 200 million clock cycles per sec- ond). One type of such architecture is hyperthreading. With hyperthreading, software and operating systems treat the microprocessor as though it’s two microprocessors. This technology lets the microprocessor handle simultane- ous requests from the OS or from software, initially improving performance by around 30%–40%. A processor using hyperthreading technology manages the incoming data instructions in parallel by switching between the instruc- tions every few nanoseconds, essentially letting the processor handle two sep- arate threads of code at once. Ports & Cables What ports will I probably use most? A port is a connecting socket or jack on the outside of the system unit into which are plugged different kinds of cables. (• See Panel 4.11. ) A port allows you to plug in a cable to connect a peripheral device, such as a monitor, printer, or modem, so that it can communicate with the computer system.
  242. Hardware: The CPU & Storage 217 Ethernet port Modem port

    USB ports Serial port USB ports Mouse port Fan outlet Socket for power to computer Keyboard port S/Video port Microphone port Speaker port Line in S/Video port Speaker ports Monitor port FireWire ports Ethernet ports USB ports Fan outlet Socket for power to computer DVI port (Digital Video Interface) Optical audio in Optical audio in panel 4.11 Ports The backs of a PC and a Macintosh. Additional USB ports may be on the front or side of some system units. Ports are of several types, as follows. DEDICATED PORTS—FOR KEYBOARD, MOUSE, MONITOR, AUDIO, & MODEM/ NETWORK CONNECTION Dedicated ports are ports for special purposes, such as the round ports for connecting the keyboard and the mouse (if they’re not USB), the monitor port, the audio ports (green for speakers or headphones, pink for microphone, yellow for home stereo connection), the modem port to connect your computer to a phone line, and a network port for a high-speed internet connection. (There is also one connector that is not a port at all—the power plug socket, into which you insert the power cord that brings electricity from a wall plug.) PC Macintosh
  243. 218 Chapter 4 SERIAL, PARALLEL, & SCSI PORTS Most ports

    other than the dedicated ones just described are generally multipurpose. We consider serial, parallel, and SCSI ports: • Serial ports—for transmitting slow data over long distances: A line connected to a serial port will send bits one at a time, one after another, like cars on a one-lane highway. Because individual bits must follow each other, a serial port is usually used to connect devices that do not require fast transmission of data, such as keyboard, mouse, monitors, and dial-up modems. It is also useful for sending data over a long distance. • Parallel ports—for transmitting fast data over short distances: A line connected to a parallel port allows 8 bits (1 byte) to be transmitted simultaneously, like cars on an eight-lane highway. Parallel lines move information faster than serial lines do, but they can transmit information efficiently only up to 15 feet. Thus, parallel ports are used principally for connecting printers or external disk or magnetic-tape backup storage devices. • SCSI ports—for transmitting fast data to up to seven devices in a daisy chain: Pronounced “scuzzy,” a SCSI (small computer system interface) port allows data to be transmitted in a “daisy chain” to up to seven devices connected to a single port at speeds higher (32 bits at a time) than those possible with serial and parallel ports. Among the devices that may be connected are external hard-disk drives, CD drives, scanners, and magnetic-tape backup units. The term daisy chain means that several devices are connected in series to each other, so that data for the seventh device, for example, has to go through the other six devices first. Sometimes the equipment on the chain is inside the computer, an internal daisy chain; sometimes it is outside the computer, an external daisy chain. (• See Panel 4.12. ) USB PORTS—FOR TRANSMITTING DATA TO UP TO 127 DEVICES IN A DAISY CHAIN A single USB (universal serial bus) port can theoretically connect Internal daisy chain (inside computer) External daisy chain SCSI controller in expansion slot Back view of daisy-chained computer and peripherals Hard-disk drive Tape drive CD/DVD drive External hard-disk drive Computer Peripherals Laser printer Scanner Computer panel 4.12 Daisy chains
  244. Hardware: The CPU & Storage 219 up to 127 peripheral

    devices in a daisy chain. USB ports are mul- tipurpose, useful for all kinds of peripherals, and are included on all new computers. • The goals of USB: The designers of the USB standard had several goals in mind. They wanted it to . . . 1. Be low-cost so that it could be used in cheap peripherals such as mice and game controllers. 2. Be able to connect lots of devices and have sufficient speed that it could replace all the different ports on computers with a single standard. 3. Be “hot swappable” or “hot pluggable,” meaning that it could allow USB devices to be connected or disconnected even while the PC is running. 4. Permit plug and play —to allow peripheral devices and expansion cards to be automatically configured while they are being installed —to avoid the hassle of setting switches and creating special files, as was required of early users. USB has fulfilled these goals, so now just about every peripheral is available in a USB version, and it’s expected that soon microcomputers will have nothing but USB ports. • USB connections—daisy chains, hubs, and wireless: Can you really connect up to 127 devices on a single chain? An Intel engineer did set a world record at an industry trade show before a live audience by connecting 111 peripheral devices to a single USB port on a personal computer. But many USB peripherals do not support such long daisy chains. Thus, because some PCs contain only two USB ports, it’s worth shopping around to find a model with more than two. You can also hook up a USB hub to one of the USB ports. A USB hub typically has four USB ports. You plug the hub into your computer, and then plug your devices—or other hubs—into that. By chaining hubs together, you can build up dozens of available USB ports on a single computer. However, using a hub weakens data signals, so some peripherals, such as cable modems, work better when plugged directly into one of the computer’s USB ports. Individual USB cables can run as long as 5 meters (about 5.4 yards). With hubs, devices can be up to 30 meters (about 32.8 yards) away. Each USB cable has an A connector, which plugs into the computer, and a B connector, which plugs into the peripheral USB device. Wireless USB technology was introduced in 2004, and wireless USB products became available in 2006. This connection technology is useful in home and office networks in ranges of 9 to about 30 feet. • USB standards: Just about every peripheral made now comes in a USB version. Common USB standards are USB 1.1 and the more recent USB 2.0. Nearly all new PCs have USB 2.0 ports. Users with an older PC with USB 1.1 ports will have to buy a 2.0 add-on upgrade card to be able to hook up 2.0 peripherals. (USB 2.0 data “throughput”—the speed at which data passes through the cable—is 2–13 times faster than USB 1.1.) Windows 95 and Windows NT do not support USB. Super-speed USB 3.0 was released by Intel and its partners in November 2008. According to Intel, bus speeds will be 10 times faster than USB 2.0 owing to the inclusion of a fiber-optic link that works with traditional copper connectors. • USB connectors: There are four types of USB connectors: A, B, Mini B, and Mini A. USB 1.1 specifies the Type A and Type B. USB 2.0 specifies the Type A, Type B, and Mini B. The Mini A connector was developed as part of the USB OTG (an enhancement to USB) specification and is used for smaller peripherals, such as cellphones. USB hub connectors Survival Tip Powered versus Unpowered USB Hubs USB peripheral devices can draw their power from their USB connection. Printers and scanners have their own power supply. Mice and digital cameras draw power from the PC. If you have lots of self- powered devices (like printers and scanners), your hub need not be powered. If you have lots of unpowered devices (like mice and cameras), you prob- ably need a powered hub. 6 USB 2.0 Ports
  245. 220 Chapter 4 SPECIALIZED EXPANSION PORTS—FIREWIRE, MIDI, IRDA, BLUETOOTH, &

    ETH- ERNET Some specialized expansion ports are these: • FireWire ports—for camcorders, DVD players, and TVs: FireWire was created by Apple Computer and later standardized as IEEE-1394 (IEEE is short for Institute of Electrical and Electronics Engineers). It actually preceded USB and had similar goals. The difference is that FireWire (IEEE-1394) is intended for devices working with lots of data—not just mice and keyboards but digital video recorders, DVD players, gaming consoles, and digital audio equipment. Like USB, FireWire is a serial bus. However, whereas USB is limited to 12 megabits per second, FireWire currently handles up to 400 megabits per second. USB can handle 127 devices per bus, while FireWire handles 63. Both USB and FireWire allow you to plug and unplug devices at any time. FireWire doesn’t always require the use of a PC; you can connect a FireWire camcorder directly to a digital TV, for example, without a PC in the middle. Like USB devices, FireWire devices can be powered or unpowered, and they are also hot pluggable. FireWire requires a special card in the PC. • MIDI ports—for connecting musical instruments: A MIDI (pronounced “ mid- dee” and short for Musical Instrument Digital Interface) port is a specialized port used in creating, recording, editing, and performing music. It is used for connecting amplifiers, electronic synthesizers, sound cards, drum machines, and the like. • IrDA ports—for cableless connections over a few feet: When you use a handheld remote unit to change channels on a TV set, you’re using invisible radio waves of the type known as infrared waves. An IrDA, or infrared, port allows a computer to make a cableless connection with infrared- capable devices, such as some printers. (IrDA stands for “Infrared Data Association,” which sets the standards.) This type of connection requires an unobstructed line of sight between transmitting and receiving ports, and they can be only a few feet apart. • Bluetooth ports—for wireless connections up to 30 feet: Bluetooth technology consists of short-range radio waves that transmit up to 30 feet. It is used to connect cellphones to computers but also to connect computers to printers, keyboards, headsets, and other appliances (including refrigerators). • Ethernet—for LANs: Developed by the Xerox Corporation in the mid- 1970s, Ethernet is a network standard for linking all devices in a local area network. (The name comes from the concept of “ether.”) It’s commonly used to connect microcomputers, cable modems, and printers. (To use Ethernet, the computer must have an Ethernet network interface card, and special Ethernet cables are required. Bluetooth and Ethernet are also discussed in Chapter 6. MULTIMEDIA PORTS “The trend toward multimedia notebooks has introduced a whole slew of port types you may not be familiar with, but that you might need,” states a computer magazine. 25 These include ports for connecting your computer to the following: gaming consoles or camcorders (Composite In/RCA ports); cable boxes, TVs, or VCRs, so you can watch and record TV content on your computer (TV tuner/75-ohm coaxial port); speakers or stereo receivers to play digital audio (S/PDIF ports); digital projectors to LCD panels to dis- play in large format video content or a PowerPoint presentation (DVI port); digital cameras to display video stored on the cameras (S-video In port); and plasma or newer TV so you can view video content streaming from the com- puter (S-Video Out). Survival Tip Are Your PC’s USB Ports 1.1 or 2.0? Find the USB port by looking for the icon. If there’s a tiny ϩ (plus sign) next to the icon, you have USB 2.0. USB port FireWire port Parallel printer port on a notebook computer Infrared port Bluetooth logo
  246. Hardware: The CPU & Storage 221 Expandability: Buses & Cards

    What is the purpose of expansion buses and cards? Today many new microcomputer systems can be expanded. As mentioned earlier, expansion is a way of increasing a computer’s capabilities by adding hardware to perform tasks that are not part of the basic system. Upgrading means changing to a newer, usually more powerful or sophisticated version. (Computer ads often make no distinction between expansion and upgrading. Their main interest is simply to sell you more hardware or software.) CLOSED & OPEN ARCHITECTURE Whether a computer can be expanded depends on its “architecture”—closed or open. Closed architecture means a computer has no expansion slots; open architecture means it does have expan- sion slots. (An alternative definition is that closed architecture is a computer design whose specifications are not made freely available by the manufacturer. Thus, other companies cannot create ancillary devices to work with it. With open architecture, the manufacturer shares specifications with outsiders.) Expansion slots are sockets on the motherboard into which you can plug expansion cards. Expansion cards —also known as expansion boards, adapter cards, interface cards, plug-in boards, controller cards, add-ins, or add-ons —are circuit boards that provide more memory or that control peripheral devices. (• See Panel 4.13. ) Expansion card Expansion slot Type of Card (Board) What It Does Accelerator board Speeds up processing; also known as turbo board or upgrade board Cache card Improves disk performance Coprocessor board Contains specialized processor chips that increase processing speed of computer system Disk controller card Allows certain type of disk drive to be connected to computer system Emulator board Permits microcomputer to be used as a terminal for a larger computer system Fax modem board Enables computer to transmit and receive fax messages and data over telephone lines Graphics (video) Permits computer to have a particular graphics standard adapter board Memory expansion Enables additional RAM to be added to computer system board Sound board Enables certain types of systems to produce sound output panel 4.13 Expandability (Left) How an expansion card fits into an expan- sion slot. (Below) Types of cards.
  247. 222 Chapter 4 COMMON EXPANSION CARDS & BUSES Common expansion

    cards connect to the monitor (graphics card), speakers and microphones (sound card), and network (network card), as we’ll discuss. Most computers have four to eight expansion slots, some of which may already contain expansion cards included in your initial PC purchase. Expansion cards are made to connect with different types of buses on the motherboard. As we mentioned, buses are electrical data roadways through which bits are transmitted. The bus that connects the CPU within itself and to main memory is the frontside bus, also called the memory bus or the local bus. (• See Panel 4.14. ) The buses that connect the CPU with expansion slots on the motherboard and thus with peripheral devices are expansion buses. We already described the universal serial bus (USB), whose purpose, in fact, is to eliminate the need for expansion slots and expansion cards, since you can just connect USB devices in a daisy chain outside the system unit. Some expansion buses to be aware of are these: • PCI bus—for high-speed connections: At 32- or 64-bits wide, the PCI (peripheral component interconnect) bus is a high-speed bus that has been widely used to connect PC graphics cards, sound cards, modems, and high-speed network cards. A more recent standard is the PCI Express (PCIe), as we explain below. • AGP bus—for even higher speeds and 3-D graphics: The PCI bus was adequate for many years, providing enough bandwidth for all the peripherals most users wanted to connect—except graphics cards. In the mid-1990s, however, graphics cards were becoming more powerful, and three-dimensional (3-D) games were demanding higher performance. Because the PCI bus couldn’t handle all the information passing between the main processor and the graphics processor, Intel developed the AGP bus. The AGP (accelerated graphics port) bus, which transmits data at twice the speed of a PCI bus, is designed to support video and 3-D graphics. • PCIe Express bus—for outperforming AGP: In 2004, Intel developed the PCIe (PCI Express) bus , which can outperform AGP and is more CPU Frontside bus Memory controller PCI bus controller Pentium processor with integrated L1 and L2 cache (backside bus between CPU and L2 cache) Memory expansion connectors (for SIMMs, DIMMs, etc.) Chipset (supports the CPU) Memory controller Frontside bus panel 4.14 The frontside bus
  248. Hardware: The CPU & Storage 223 reliable. PCIe is the

    latest standard for expansion cards available on mainstream personal computers. TYPES OF EXPANSION CARDS Among the types of expansion cards are graph- ics, sound, modem, and network interface cards. A special kind of card is the PC card. • Graphics cards—for monitors: Graphics cards are included in all PCs. Also called a video card, video RAM (VRAM), or video adapter, a graphics card converts signals from the computer into video signals that can be displayed as images on a monitor. Each graphics card has its own memory chips, a graphics BIOS ROM chip, and a dedicated processor, the graphics processing unit (GPU), discussed earlier. The GPU works in tandem with the computer’s CPU to ease the load, resulting in faster overall speed. Some computers (such as Toshiba’s Qosimio X305-Q708 laptop) have more than one GPU, so that one GPU is used for normal activities such as word processing and email and then the machine kicks in with another GPU for superfast gaming. 26 • Sound cards—for speakers and audio output: A sound card is used to convert and transmit digital sounds through analog speakers, microphones, and headsets. Sound cards come installed on most new PCs. Cards such as PCI wavetable sound cards are used to add music and sound effects to computer videogames. Wavetable synthesis is a method of creating music based on a wave table, which is a collection of digitized sound samples taken from recordings of actual instruments. The sound samples are then stored on a sound card and are edited and mixed together to produce music. Wavetable synthesis produces higher-quality audio output than other sound techniques. • Modem cards—for remote communication via phone lines: Occasionally you may still see a modem that is outside the computer. Most new PCs, however, come with internal modems— modems installed inside as circuit cards. The modem not only sends and receives digital data over telephone lines to and from other computers but can also transmit voice and fax signals. (Modems are discussed in more detail in later chapters.) • Network interface cards—for remote communication via cable: A network interface card (NIC) allows the transmission of data over a cable network, which connects various computers and other devices such as printers. (Various types of networks are covered in Chapter 6.) • PC cards—for laptop computers: Originally called PCMCIA cards (for the Personal Computer Memory Card International Association), PC cards are thin, credit card–size flash memory devices used principally on laptop computers to expand capabilities, such as to access the internet wirelessly. (• See Panel 4.15. ) ExpressCard modules are used as removable flash memory devices; they can be used to add communications, multimedia, and memory capabilities. panel 4.15 PC card Example of a PC card used in a laptop 256 MB DDRZ Nvidia GeForce PCI graphic Sound Blaster Digital Sound Card 56 Kbps Internal Modem
  249. 224 Chapter 4 4.4 SECONDARY STORAGE What are the features

    of floppy disks, hard disks, optical disks, magnetic tape, smart cards, flash memory, and online secondary storage? You’re on a trip with your laptop, or maybe just a cellphone or a personal digital assistant, and you don’t have a crucial file of data. Or maybe you need to look up a phone number that you can’t get through the phone company’s directory assis- tance. Fortunately, you backed up your data online, using any one of several stor- age services (for example, Driveway, www.driveway.com; eSureIT, www.intronis. com; or X:Drive, www.xdrive.com ), and are able to access it through your modem. Here is yet another example of how the World Wide Web is offering alterna- tives to traditional computer functions that once resided within stand-alone machines. We are not, however, fully into the all-online era (“the cloud”) just yet. Let us consider more traditional forms of secondary storage hardware, devices that permanently hold data and information as well as programs. We look at these types of secondary storage devices: • Floppy disks • Hard disks • Optical disks • Magnetic tape • Smart cards • Flash memory • Online secondary storage Floppy Disks Are floppy disks still being used? Although floppy disks are almost obsolete, some microcomputer systems still offer the inclusion of an internal floppy disk drive, and external floppy disk drives are still available. Floppies are still used for emergency boots in aging systems that may lack support for CD-ROMs and USB devices, and you may come across them in older (legacy) computer systems used by certain companies. A floppy disk, often called a diskette or simply a disk, is a removable flat piece of mylar plastic packaged in a 3.5-inch plastic case. Data and programs are stored on the disk’s coating by means of magnetized spots, following standard on/off pat- terns of data representation (such as ASCII). The plastic case protects the mylar disk from being touched by human hands. Originally, when most disks were larger (5.25 inches) and cov- ered in paper, the disks actually were “floppy”; now only the disk inside the rigid plastic case is flexible, or floppy. Floppy disks each store about 1.44 megabytes, the equivalent of 400 typewritten pages. HOW FLOPPY DISKS WORK Floppy disks are inserted into a floppy-disk drive, a device that holds, spins, reads data from, and writes data to a floppy disk. Read means that the data in secondary storage is converted to electronic sig- nals and a copy of that data is transmitted to the computer’s memory (RAM). Write means that a copy of the electronic information processed by the com- puter is transferred to secondary storage. • Tracks, sectors, and clusters: On the diskette, data is recorded in concentric recording bands called tracks . Unlike on a vinyl phonograph record, these tracks are neither visible grooves nor a single spiral. Rather, Floppy disk
  250. Hardware: The CPU & Storage 225 they are closed concentric

    rings; each track forms a full circle on the disk. When a disk is formatted, the disk’s storage locations are divided into wedge-shaped sections, which break the tracks into small arcs called sectors . When you save data from your computer to a diskette, the data is distributed by tracks and sectors on the disk. That is, the system software uses the point at which a sector intersects a track to reference the data location. The smallest unit of disk space that holds data is called a cluster. A cluster is a group of sectors on a storage device. Tracks, sectors, and clusters are also used in hard disks, as we’ll discuss. • The read/write head: When you insert a floppy disk into the slot (the drive gate or drive door ) in the front of the disk drive, the disk is fixed in place over the spindle of the drive mechanism. The read/write head is used to transfer data between the computer and the disk. When the disk spins inside its case, the read/write head moves back and forth over the data access area on the disk. When the disk is not in the drive, a metal or plastic shutter covers this access area. An access light goes on when the disk is in use. After using the disk, you can retrieve it by pressing an eject button beside the drive. Hard Disks How does the hard disk in my computer work? Floppy disks use flexible plastic, but hard disks are rigid. Hard disks are thin but rigid metal, glass, or ceramic platters covered with a sub- stance that allows data to be held in the form of magnetized spots. Most hard-disk drives have at least two platters; the greater the number of platters, the larger the capacity of the drive. The platters in the drive are separated by spaces and are clamped to a rotating spindle that turns all the platters in uni- son. Hard disks are tightly sealed within an enclosed hard-disk-drive unit to prevent any foreign matter from getting inside. Data may be recorded on both sides of the disk platters. (• See Panel 4.16. ) sector arcs Tracks and sectors Bits on 1 sector track Platters (disks) Spindle Read/write heads Read/write heads Actuator arm Power connection Power connection Hard disks Drive spindle Actuator arm panel 4.16 Hard disk In a microcomputer, the hard disk is enclosed within the system unit. Unlike a floppy disk, it is not accessible. 320 GB SATA 7200 RPM Hard Drive
  251. info! more 226 Chapter 4 KEEPING TRACK OF DATA: THE

    VIRTUAL FILE ALLOCATION TABLE Like floppy disks, hard disks store data in tracks, sec- tors, and clusters. Computer operating systems keep track of hard-disk sectors according to clusters. The Windows operat- ing system assigns a unique number to each cluster and then keeps track of files on a disk by using a kind of table, a Vir- tual File Allocation Table (VFAT), as a method for storing and keeping track of files according to which clusters they use. (The VFAT was called a FAT in earlier operating systems.) That is, the VFAT includes an entry for each cluster that describes where on the disk the cluster is located. Occasionally, the operating system numbers a cluster as being used even though it is not assigned to any file. This is called a lost cluster. You can free up lost clusters and thus increase disk space in Windows by using the ScanDisk utility. HEAD CRASHES Hard disks are sensitive devices. The read/write head does not actually touch the disk but rather rides on a cushion of air about 0.000001 inch thick. (• See Panel 4.17, opposite page. ) The disk is sealed from impuri- ties within a container, and the whole apparatus is manufactured under ster- ile conditions. Otherwise, all it would take is a human hair, a dust particle, a fingerprint smudge, or a smoke particle to cause what is called a head crash. A head crash happens when the surface of the read/write head or particles on its surface come into contact with the surface of the hard-disk platter, causing the loss of some or all of the data on the disk. A head crash can also happen when you bump a computer too hard or drop something heavy on the system cabinet. An incident of this sort could, of course, be a disaster if the data has not been backed up. There are firms that specialize in trying to retrieve data from crashed hard disks (for a hefty price), though this cannot always be done. NONREMOVABLE HARD DISKS An internal nonremovable hard disk, also known as a fixed disk, is housed in the microcomputer system unit and is used to store nearly all programs and most data files. Usually it consists of several metallic or glass platters, from 1 to 5.25 inches (most commonly 3.5 inches) in diameter, stacked on a spindle, with data stored on both sides. Read/write heads, one for each side of each platter, are mounted on an access arm that moves back and forth to the right location on the platter. The entire apparatus is sealed within an airtight case to protect it from contaminants such as dust. The storage capacities of nonremovable hard drives for microcomputers range from 40 to 500 gigabytes. In large computer systems, a hard drive might hold 1.5 terabytes. A gigabyte holds around 20,000 pages of regular text, but video and sound files often run to 30 megabytes or more. A hard disk spins many times faster than a floppy disk, allowing faster access. Computer ads frequently specify hard-disk speeds in revolutions per minute (rpm), usually 5,400–7,200 rpm. Whereas a floppy-disk drive rotates at only 360 rpm, a 7,200-rpm hard drive is going about 300 miles per hour. (Newer hard dives can spin at 15,000 rpm.) PORTABLE HARD-DRIVE SYSTEMS: EXTERNAL & REMOVABLE HARD DISKS Two types of portable hard-drive systems are available: • External hard disk: An external hard disk is a freestanding hard-disk drive enclosed in an airtight case, which is connected by cable to the computer system unit through a FireWire, USB, or other port. Storage capacities run as high as 2 terabytes. They are used not only by businesses but also by households that want to back up files from all the computers in a home, allowing music, photos, videos, and other files to be accessed Relative size of a hard-disk drive Bits on disk. Magnetic bits on a disk surface, caught by a magnetic force microscope. The dark stripes are 0 bits; the bright stripes are 1 bits. Storage in the Old Days In 1978, a pioneering drive for home computers, the external Shugart SA4000, weighed 35 pounds, wholesaled for $2,550, and stored only 14.5 megabytes. Hard drives began to become popular with PC users in 1983, when Seagate made one that fit into the PC case. For more his- tory, go to: www.computerhistory.org
  252. info! more Hardware: The CPU & Storage 227 from all

    over the house. Such drives are made by Western Digital, Seagate, Iomega, Netgear, and Data Robotics, to name a few. 27 • Removable hard disk: A removable hard disk, or hard-disk cartridge, consists of one or two platters enclosed along with read/write heads in a hard plastic case, which is inserted into a cartridge drive built into the microcomputer’s system unit. Cartridges, which have storage capacities of 80–160 gigabytes and more, are frequently used to back up and transport huge files of data, such as those for large spreadsheets or desktop-publishing files. HARD-DISK CONTROLLERS When advertising hard-disk drives, computer ads may specify the type of hard-disk controller used, a special-purpose circuit board that positions the disk and read/write heads and manages the flow of data and instructions to and from the disk. The hard-disk controller may be part of the hard disk or an adapter card located inside the system unit. Two hard-disk controllers for connecting external hard-disk drives are FireWire and USB. Other standards are as follows: • EIDE: EIDE (Enhanced Integrated Drive Electronics) can support up to four hard disks at 137 gigabytes per disk. EIDE controllers are marketed under such names as SATA (for “Serial Advanced Technology Attachment”), Fast ATA, Ultra ATA, Fast IDE, ATA-2, ATA/100, and Serial ATA. Nowadays consumers are advised to buy SATA or Serial ATA, which have faster data transfer and less magnetic interference. • SCSI: SCSI (small computer system interface), pronounced “scuzzy,” supports several disk drives as well as other peripheral devices by linking them in a daisy chain. SCSI controllers are faster and have more storage capacity than EIDE controllers; they are typically found in servers and workstations. • Fibre Channel: Fibre Channel is an up-and-coming standard that is not expected to be used much with personal computers, though it may some day replace SCSI. This standard has the advantage of very fast data speeds and so will probably be used with host computers and high-end servers. HARD-DISK TECHNOLOGY FOR LARGE COMPUTER SYSTEMS: RAID Large data- bases, such as those maintained by insurance companies or AOL, require far bigger storage systems than the fixed-disk drives we’ve been describing, which send data to a computer along a single path. A RAID (redundant array of inde- pendent [ or inexpensive] disks) storage system, which links any number of disk drives within a single cabinet or connected along a SCSI chain, sends data to the computer along several parallel paths simultaneously. Response time is thereby significantly improved. Optical Disks: CDs & DVDs Why would I prefer an optical disk over other forms of secondary storage? Everyone who has ever played an audio CD is familiar with optical disks. An optical disk is a removable disk, usually 4.75 inches in diameter and less Human hair Dust particle Gap Fingerprint Smoke particle Hard-disk platter Read/write head panel 4.17 Gap between hard-disk read/write head and platter Were the apparatus not sealed, all it would take is a human hair, dust particle, fingerprint, or smoke particle to cause a head crash. Survival Tip Data Recovery Crashed your hard disk? Try these: www.drivesavers.com www.drivelabs.com www.harddriverecovery.org History of Storage For a short pictorial history of computer storage, go to: http://royal.pingdom. com/?pϭ274 RAID unit
  253. 228 Chapter 4 than one-twentieth of an inch thick, on

    which data is written and read through the use of laser beams. An audio CD holds up to 74 minutes (2 billion bits’ worth) of high-fidelity stereo sound. Some optical disks are used strictly for digital data storage, but many are used to distribute multimedia programs that combine text, visuals, and sound. HOW OPTICAL-DISK STORAGE WORKS With an optical disk, there is no mechanical arm, as with floppy disks and hard disks. Instead, a high-power laser beam is used to write data by burning tiny pits or indentations into the surface of a hard plastic disk. To read the data, a low-power laser light scans the disk surface: Pitted areas are not reflected and are interpreted as 0 bits; smooth areas are reflected and are inter- preted as 1 bits. (• See Panel 4.18. ) Because the pits are so tiny, a great deal more data can be represented than is possible in the same amount of space on a diskette and many hard disks. An optical disk can hold about 6 gigabytes of data, the equivalent of about 1.3 million typewritten pages. Nearly every PC marketed today contains a CD/DVD drive, which can also read audio CDs. These, along with their recordable and rewritable variations, are the two principal types of optical-disk technology used with computers. CD-ROM—FOR READING ONLY The first kind of optical disk for microcom- puters was the CD-ROM. CD-ROM (compact disk read-only memory) is an Optical disk Pit (0) Land Lens Pit Land (1) Laser diode Disk If light strikes land, it is reflected back toward the laser diode. If light strikes a pit, it scatters. Prism The surface of the reflective layer alternates between lands and pits. Lands are flat surface areas. Pits are tiny indentations in the reflective layer. These two surfaces are a record of the 1s and 0s used to store data. Survival Tip CD Read, Write, & Rewrite Speeds PC ads present CD speeds in different ways—e.g., 44X/24X/24X for “read/write/ rewrite” or 48X/24X/48X for “write/rewrite/read.” To clarify, do a web search for the CD drive manufacturer, brand, and model. Click on product details or specs.
  254. Hardware: The CPU & Storage 229 optical-disk format that is

    used to hold prerecorded text, graphics, and sound. Like music CDs, a CD-ROM is a read-only disk. Read-only means the disk’s content is recorded at the time of manufacture and cannot be written on or erased by the user. As the user, you have access only to the data imprinted by the disk’s manufacturer. A CD-ROM disk can hold up to 650 megabytes of data, equal to over 300,000 pages of text. A CD-ROM drive’s speed is important because, with slower drives, images and sounds may appear choppy. In computer ads, drive speeds are indi- cated by the symbol “X,” as in “56X,” which is a high speed. X denotes the original data-transfer rate of 150 kilobytes per second. The data-transfer rate is the time the drive takes to transmit data to another device. A 56X drive runs at 56 times 150, or 8,400 kilobytes (8.4 megabytes) per second. If an ad carries the word Max, as in “56X Max,” this indicates the device’s maximum speed. Drives range in speed from 16X to 75X; the faster ones are more expensive. CD-R—FOR RECORDING ONLY ONCE CD-R (compact disk–recordable) disks can be written to only once but can be read many times. This allows users to make their own CD disks. Once recorded, the information cannot be erased. CD-R is often used by companies for archiving—that is, to store vast amounts of information. If you’re still using a film camera, for example, once you’ve shot a roll of color film, you can take it for processing to a photo shop, which can produce a disk containing your images. You can view the disk on any personal computer with a CD-ROM drive and the right software. CD-RW—FOR REWRITING MANY TIMES A CD-RW (compact disk–rewritable) disk, also known as an erasable optical disk, allows users to record and erase data, so the disk can be used over and over again. CD-RW drives are becoming more common on microcomputers. CD-RW disks are useful for archiving and backing up large amounts of data or work in multimedia production or desktop publishing. CD-RW disks cannot be read by CD-ROM drives. CD-RW disks commonly have a capacity of 650–700 megabytes. DVD-ROM—THE VERSATILE VIDEO DISK A DVD-ROM (digital versatile disk or digital video disk, with read-only memory) is a CD-style disk with extremely high capacity, able to store 9.4 or more gigabytes. How is this done? Like a CD or CD-ROM, the surface of a DVD contains microscopic pits, which represent the 0s and 1s of digital code that can be read by a laser. The pits on the DVD, however, are much smaller and grouped more closely together than those on a CD, allowing far more information to be represented. Also, the laser beam used focuses on pits roughly half the size of those on current audio CDs. In addition, the DVD format allows for two layers of data-defining pits, not just one. Finally, engineers have succeeded in squeezing more data into fewer pits, principally through data compression. Most new computer systems now come with a DVD drive as standard equipment. A great advantage is that these drives can also take standard CD-ROM disks, so now you can watch DVD movies and play CD-ROMs using just one drive. DVDs are replacing CDs for archival storage, mass distribution of software, and entertainment. They not only store far more data but are different in quality from CDs. As one writer points out, “DVDs encompass much more: multiple dialogue tracks Survival Tip Did You Back Up Your Files? According to the Consumer Electronics Association, a 2008 study (“Amassing Digital Fortunes: A Digital Storage Study”) shows that nearly one in three (33%) of U.S. consum- ers don’t see the need to back up their files, while nearly a quarter (22%) say they aren’t backing up files because it’s too time consuming. Generally, consumers don’t know how to back up their data and if they do, they’re failing to back up data because they claim it takes too much time. The average American adult has 1,800 digital files.28 How about you? Will you be able to get your files back if something goes wrong with your computer system? Slide-out tray for DVD/CD disk drive CD/DVD, label side up 24X DVD/CD-RW Combo Drive
  255. info! more 230 Chapter 4 and screen formats, and best

    of all, smashing sound and video.” 29 The theater- quality video and sound, of course, are what made DVD a challenger to video- tape as a vehicle for movie rentals. Like CDs, DVDs have their recordable and rewritable variants: • DVD-R—recordable DVDs: DVD-R (DVD-recordable) disks allow one- time recording by the user. That is, they cannot be reused—written on more than once. • DVD-RW, DVD-RAM, DVD ϩ RW—reusable DVDs: Three types of reusable disks are DVD-RW (DVD-rewritable), DVD-RAM (DVD–random access memory), and DVD ϩ RW ( DVD ϩ rewritable ), all of which can be recorded on and erased (except for video) many times. DVD-R disks have a capacity of 4.7 (single-sided) to 9.4 (double-sided) gigabytes. BLU-RAY: THE NEXT-GENERATION OPTICAL DISK Blu-ray, also known as Blu- ray Disc (BD), is the name of a next-generation optical-disk format jointly developed by the Blu-ray Disc Association (BDA), a group of consumer elec- tronics and PC companies (including Dell, Hitachi, HP, JVC, LG, Mitsubishi, Panasonic, Pioneer, Philips, Samsung, Sharp, Sony, TDK, and Thomson). The Blu-ray optical format was developed to enable recording, rewriting, and playback of high-definition video, as well as storing of large amounts of data. A decision by Blu-ray rival Warner Brothers to withdraw support for its competing HD DVD optical disc format appeared to hand the future of home entertainment to Blu-ray. 30 A single-layer Blu-ray Disc can hold 25 gigabytes, which can be used to record over 2 hours of HDTV (or more than 13 hours of standard-definition TV). There are also dual-layer versions of the disks that can hold 50 gigabytes. While current optical-disk technologies such as DVD, DVD-R, DVD-RW, and DVD-RAM use a red laser to read and write data, the new format uses a blue-violet laser instead, hence the name Blu-ray. Blu-ray products are backward-compatible and allow use of CDs and DVDs. The benefit of using a blue-violet laser is that it has a shorter wavelength than a red laser, which makes it possible to focus the laser spot with even greater precision. This allows data to be packed more tightly and stored in less space, so it’s possible to fit more data on the disk even though it’s the same size as a CD/DVD. Not all the optical-disk drives and different types of optical media (read-only, rewritable, and so on) are mutually compat- ible. Thus, you need to check the product information before you buy to make sure you get what you want. THE WORLD’S DVD ZONES As a way to maximize movie reve- nues, the film industry decided to split the world up into six DVD zones. This is to prevent the DVD version of a movie made in one country from being sold in another country in which the theater version has not yet opened. DVD disks with a particular region code will play only on DVD play- ers with that region code. How- ever, some of the newest DVD players are code-free—they are not “region locked.” (Thus, if you plan to travel and use a DVD player for foreign mov- ies, check out the compatibility restrictions.) What’s a DVD Easter Egg? DVDs often contain hidden features, called “Easter eggs,” such as previews for movies, software, or music. For some great examples, go to: www.eeggs.com Sony’s first Blu-ray disc recorder
  256. Hardware: The CPU & Storage 231 Magnetic Tape Would I

    find magnetic tape storage useful? Similar to the tape used on an audio tape recorder (but of higher density), magnetic tape is thin plastic tape coated with a substance that can be magnetized. Data is represented by magnetized spots (representing 1s) Type Sides Layers Capacity Type Sides Layers Capacity Read only Rewritable (100,000 cycles) DVD-Video 1 1 4.7 GB (DVD-5) DVD-RAM Ver. 1 1 1 2.6 GB and 1 2 8.5 GB (DVD-9) DVD-RAM Ver. 1 2 1 5.2 GB DVD-ROM 2 1 9.4 GB (DVD-10) DVD-RAM Ver. 2 1 1 4.7 GB 2 2 17.0 GB (DVD-18) DVD-RAM Ver. 2 2 1 9.4 GB HD DVD 1 1 15.0 GB DVD-RAM (80 mm) 1 1 1.46 GB HD DVD 1 2 30.0 GB DVD-RAM (80 mm) 2 1 2.92 GB Write once Blu-ray 1 1 25.0 GB DVD-R (A) 1 1 3.95 GB Blu-ray 1 2 50.0 GB DVD-R (A) 1 1 4.7 GB HD DVD 1 1 20.0 GB DVD-R (G) 1 1 4.7 GB HD DVD 1 2 32.0 GB DVD-R (G) 2 1 9.4 GB Re-recordable (1,000 cycles) DVD ϩ R 1 1 4.7 GB DVD-RW 1 1 4.7 GB DVD ϩ RW 1 1 4.7 GB DVD ϩ RW 2 1 9.4 GB Common DVD Capacities g ( g ) 1 4 1 2 2 5 6 5 3 2 4 1 Six DVD regions. The DVD world is basically divided into six regions. This means that DVD players and DVDs are encoded for operation in a specific geo- graphical region. For example, the U.S. is in region 1; thus all DVD players sold in the U.S. are made to region 1 specifications. As a result, region 1 players can play only region 1 DVDs. On the back of each DVD package, you will find a region number (1 through 6).
  257. 232 Chapter 4 or nonmagnetized spots (representing 0s). Today, “mag

    tape” is used mainly for backup and archiving—that is, for maintaining historical records—where there is no need for quick access. On large computers, tapes are used on magnetic-tape units or reels and in special cartridges. These tapes offer terabytes of storage. On microcomputers, tape is used in the form of tape cartridges, modules resembling audiocas- settes that contain tape in rectangular, plastic housings. These cartridges can store up to 3.2 gigabytes; in groups, or arrays, they can store up to about 1.6 terabytes. The two most common types of tape drives are DAT (digital audio tape) from Hewlett-Packard, Sony, and Maxwell, for example, and Tra- van TR-3. (• See Panel 4.19. ) An internal or external tape drive is required to use tape media. Tape fell out of favor for a while, supplanted by such products as Iomega’s Jaz and Zip-disk cartridge drives (since discontinued). Moreover, as hard drives swelled to multigigabyte size, using Zip disks for backup became less convenient. Today, as we mentioned, CD-R and DVD-R are becoming the most popular backup methods. Smart Cards Would I ever have occasion to use smart cards? Today in the United States, most credit cards are old-fashioned magnetic-strip cards. A magnetic-strip card has a strip of magnetically encoded data on its back and holds about 0.2–0.9 kilobytes (KB) of data. The encoded data might include your name, account number, and PIN (personal identification number). The strip contains information needed to use the card, but the strip also has draw- backs. First, it can degrade over time, making the data unreadable. Second, the magnetic strip doesn’t hold much information. Third, such data as the magnetic strip does contain is easy to access and duplicate, raising the risk of fraud. Two other kinds of cards, smart cards and optical cards, which hold far more information, are already popular in Europe. Manufacturers are betting they will become more popular in the United States. panel 4.19 Magnetic-tape cartridges and tape- cartridge unit
  258. Hardware: The CPU & Storage 233 SMART CARDS A smart

    card is a plastic card the size of a credit card with an integrated circuit—a microprocessor and memory chips—built into it. Most smart cards have been designed with the look and feel of a credit or debit card but can function on at least three levels: credit, debit, and personal infor- mation. Smart cards include data storage capacity of around 10 megabytes. Owing to the portability and the size of smart cards, they are seen as the next generation of data exchange. Smart cards contain an operating system just like personal computers. Smart cards can store and process information and are fully interactive. Advanced smart cards also contain a file structure. Some smart cards can be reloaded for reuse. When inserted into a reader, a smart card transfers data to and from a central computer. It is more secure than a magnetic-strip card and can be programmed to self-destruct if the wrong password is entered too many times. As a financial transaction card, it can be loaded with digital money and used as a traveler’s check, except that variable amounts of money can be spent until the balance is zero. Smart cards are well suited for prepaid, disposable applications such as cash cards or telephone debit cards. For example, when you’re using a phone card, which is programmed to contain a set number of available minutes, you insert the card into a slot in the phone, wait for a tone, and dial the number. The length of your call is automatically calculated on the card, and the corre- sponding charge is deducted from the balance. Other uses of smart cards are as student cards, building-entrance cards, bridge-toll cards, and (as in Ger- many) national health care cards. Different forms of smart-card technology are available: • Contact smart cards: These kinds of cards, which must be swiped through card readers, are less prone to misalignment and being misread, but they tend to wear out from the contact. • Contactless smart cards: These cards, which are read when held in front of a low-powered laser, can be used in mobile applications, as by automated toll-collecting devices reading cards as drivers pass through toll booths without stopping. OPTICAL MEMORY CARDS Optical cards use the same type of technology as music compact disks but look like silvery credit cards. Optical memory cards A regular credit card (left) compared to a smart card (right).
  259. 234 Chapter 4 are plastic, laser-recordable, wallet-type cards used with

    an optical- card reader. Optical health cards have room not only for the individu- al’s medical history and health-insurance information but also for digital images, such as electrocardiograms. One form of optical memory card technology, the LaserCard, is used by the U.S. Immigration and Naturalization Service as new Permanent Resident and Border Crossing cards because of its highly secure, coun- terfeit-resistant features. In addition, LaserCards containing shipping manifest data are attached to shipping containers and sea vans, speed- ing up receipt processing considerably. Flash & Solid State Memory How useful is flash and sold state memory to me? Disk drives, whether for diskettes, hard disks, or CD-ROMs, all involve moving parts—and moving parts can break. By contrast, flash memory, which is a variation on conventional computer memory chips, has no moving parts. Flash memory is also nonvolatile—it retains data even when the power is turned off. A drawback, however, is that flash mem- ory circuits wear out after repeated use, limiting their life span. Flash memory media are available in three forms: flash memory cards, flash memory sticks, and flash memory drives. FLASH MEMORY CARDS Flash memory cards, or flash RAM cards, are removable storage media that are inserted into a flash mem- ory port in a digital camera, handheld PC, smartphone, or other mobile device. Unlike smart cards, flash memory cards have no processor; they are useful only for storage. Flash memory cards store up to 16 gigabytes. FLASH MEMORY STICKS Smaller than a stick of chewing gum, a flash memory stick is a form of flash memory media (Above) A collection of flash drives; (right) Swiss Army knife with a flash drive that folds out. Website for the LaserCard
  260. info! more Hardware: The CPU & Storage 235 that plugs

    into a memory stick port in a digi- tal camera, camcorder, notebook PC, photo printer, and other devices. It holds up to 4 giga- bytes of data. FLASH MEMORY DRIVES A flash memory drive, also called a USB flash drive, keychain drive, or key drive, consists of a finger-size module of flash memory that plugs into the USB ports of nearly any PC or Macintosh. It has storage capacities up to 64 gigabytes, making the device extremely useful if you’re traveling from home to office, say, and don’t want to carry a laptop. When you plug the device into your USB port, it shows up as an external drive on the computer screen. SOLID-STATE MEMORY DRIVES Instead of hard disk drives, some newer lap- tops (such as Apple’s MacBook Air laptop) now feature solid-state drives, which have far greater capacity than flash memory drives or keychain drives; like flash drives, they have no moving parts to break down, as hard disk drives do . Some solid-state drives use SDRAM instead of flash memory, but in either case such drives are lighter and use less power than conventional disk drives and can better withstand bumps and bangs. The drawback, however, is that so far solid-state drives are much more expen- sive than hard disk drives. 31 Online Secondary Storage Would I ever use an online storage service? Online storage services, mentioned at the start of this section, allow you to use the internet to back up your data. Some services are free; others charge a small fee. Examples are Syncplicity, Dropbox, Mozy, Carbonite, iDrivePro, iDrive.com, and (for business) iBackup.com and eSureIt Business. 32 Asus- tek Computer, maker of the low-cost ($300) Eee PC, offers free online stor- age. 33 When you sign up, you obtain software that lets you upload whatever files you wish to the company’s server. For security, you are given a pass- word, and the files are supposedly encrypted to guard against unwanted access. Incidentally, you should know that if you lose your cellphone, all those phone numbers in your address book are wirelessly backed up on a regular schedule by your cellphone carrier. 34 4.5 FUTURE DEVELOPMENTS IN PROCESSING & STORAGE What are some forthcoming developments that could affect processing power and storage capacity? Computer developers are obsessed with speed and power, constantly seeking ways to promote faster processing and more main memory in a smaller area. IBM, for instance, came up with a manufacturing process (called silicon-on- insular, or SOI ) that had the effect of increasing a chip’s speed and reducing its power consumption. This increasing power, says physicist Michio Kaku, is the reason you can get “a musical birthday card that contains more pro- cessing power than the combined computers of the Allied Forces in World War II.” 35 Does this mean that Moore’s law—Intel cofounder Gordon Moore’s 1965 prediction that the number of circuits on a silicon chip would keep doubling every 18 months—will never be repealed? After all, the smaller circuits get, the Survival Tip What’s the Life Span of Storage Media? Hard drives: 3–6 years CD/DVD-R: 2–15 years CD/DVD-RW: 25–30 years Flash drives: 10 years Online Storage Examples of online storage services: Backup, www.atbackup.com Connected Online Backup, www. connected.com Digital Iron Mountain, www .ironmountain.com/digital/ Driveway, www.driveway.com eSureIT, www.intronis.com MagicalDesk.com, www .magicaldesk.com X:Drive, www.xdrive.com
  261. 236 Chapter 4 more chip manufacturers bump up against material

    limits. “The fact that chips are made of atoms has increasingly become a problem for us,” said Moore in 2000. “In the next two or three generations, it may slow down to doubling every five years. People are predicting we will run out of gas in about 2020, There may come a time when your hard drive is so com- promised by spyware and other parasites and slows down your computer so much it’s as though you had lost two cylinders on your car engine. (This situation might have been avoided had you been running antispyware software, such as, for example, Ad-aware, AntiSpyware, CounterSpy, PestPatrol, Spybot Search & Destroy, SpyCatcher, or Spy Sweeper. But many people don’t do this, which is why one study found that 80% of computers were infected with spyware.)36 Or perhaps you’ve installed a new application, such as a speech-recognition program or new piece of hard- ware, whose drivers have the effect of causing such chaos in your system that you wish you’d never acquired the new item. What should you do now? Give up your computer, buy a new one (if you can afford it), and transfer all your old data to it? (Some people actually do this.) Or erase everything on your hard drive and reinstall your software and data files? Here’s what to do.37 Make a List of Everything in Your System & Tech Support Phone Numbers The first thing you need to do is take paper and pencil and make a list of all (1) hardware components, (2) software reg- istration codes, and (3) technical support phone numbers for your computer maker and your internet access provider, in case you run into problems while rebuilding your system. Make Sure You Have Disks with Copies of Your Software See if you have the original disks for all your software (your program files), including the Windows installation disks that came with your computer. If you don’t, create CD/DVD cop- ies. Or contact your computer maker for new ones (for which the company will probably charge you). Make Backup Copies of Your Data Files There are several different ways to back up your data files, those listed under My Documents, My Pictures, and My Music: • Copy to a server: If you’re on a network, you can save all your data files to a networked folder. • Copy to CDs or DVDs: Using a CD/DVD drives, you can back up your data files onto writable CDs or DVDs. (A 5-gigabyte DVD may be sufficient. Or you may use several CDs, which hold about 700 megabytes each.) • Copy to a keychain drive or an MP3 player: You can save all your data files to a keychain drive, an MP3 player, or another external hard drive and then transfer them to another computer to copy them onto CD/DVD disks. You might wish to make two copies of your backed-up files—just in case. Reformat Your Hard Drive & Reinstall Your Operating System Insert your operating system CD-ROM installation disks into the CD drive. When your computer asks you if you want to reformat your hard dive, answer yes. When it advises that if you continue all files will be deleted, respond that this is okay. It will take perhaps 60 minutes to reformat the hard disk. You will then be asked to fill in your name, time zone, country, and type of internet con- nection. Probably at this point you should also download any operating system updates (patches) from the manu- facturer’s website. Reboot your computer. Reinstall Your Programs & Drivers Reinstall all your programs, such as Microsoft Office, and all the drivers for your printer, camera, CD burner, and other peripherals. (Drivers may not be needed, because new OSs can recognize almost anything and find the driver online.) Install Security Software & Firewall To be sure you’re starting over with a secure system, now you should install updated security software (such as McAfee Virus Protection, Norton AntiVirus, Avast!, or ZoneAlarm Antivirus), which contains antivirus software and a firewall that prevents unauthorized users from gain- ing access to your network. Reboot your computer. Reinstall All Your Data Files Copy your saved data files from the backup source. Run scans on everything, using the security software. Reboot. By now, it’s hoped, you will have gotten rid of all your spy- ware and other nuisances. PRACTICAL ACTION Starting Over with Your Hard Drive: Erasing, Reformatting, & Reloading
  262. info! more Hardware: The CPU & Storage 237 and I

    don’t see how we get around that.” 38 Later, in 2005, he said, “I think we’ve got quite a bit more to go . . . but then I can never see more than 10 years.” 39 (• See Panel 4.20. ) Scientists have assumed that silicon chips can’t be made infinitely smaller because of leakage of electrons across boundaries that are supposed to serve as insulators. In addition, engineers are creating three-dimensional chips that consist of a multistory silicon stack that can run faster and cooler than ordinary chips. Still, chip makers continue to refine the technology. Intel, for example, has changed the materials used in its chips—using metal instead of silicon in a key component called a gate and replacing silicon dioxide as an insulating layer in its transistors with hafnium—to reduce energy consump- tion and increase processing speed. (This is known as “high-k” technology.) It is also reducing chip size from 180 nanometers (a nanometer is a billionth of a meter) in 1999 to an expected 32 nanometers in late 2009. IBM is working on a 22-nanometer memory chip. 40 For now, RAM is volatile, but researchers have developed new nonvolatile forms of RAM that may soon be available. One form is M-RAM —the M stands for “magnetic”—which uses minuscule magnets rather than electric charges to store the 0s and 1s of binary data. M-RAM uses much less power than cur- rent RAM, and whatever is in memory when the computer’s power is turned off or lost will remain there. A second type, OUM (ovonic unified memory) or phase-change memory, stores bits by generating different levels of low and high resistance on a glossy material. Future Developments in Processing What are ways that processing power could be increased in the future? What are the possible directions in which processors can go? Let us consider some of them: SELLING PROCESSING POWER OVER THE INTERNET In 2002, IBM launched a service, Virtual Linux Service, selling computer processing power on an as-needed basis, in the same way that power companies sell electricity. When, for example, a company wants to update its email or other programs, instead of buying more servers or the latest hardware to provide process- ing power, it rents the processing time on Linux servers. By now, many companies have gone into the business of what is now called application virtualization. 1970 1975 1980 1985 1990 1995 2000 2005 2010 2015 1,000 10,000 100,000 1 million 10 million 100 million 2 billion Number of transistors on a chip Pentium Pro 4004 8080 8086 80286 80386 80486 Pentium Pentium II Pentium III Pentium 4 Silicon replaced by graphene and nanoelectronics The Future Intel processors Moore’s law trend line Tukwila panel 4.20 Moore’s law: How much longer? Miraculously, Gordon Moore’s prediction that the number of transis- tors on a silicon chip will double every 18 months has held up since the 1960s. Eventually transis- tors will become so tiny that their components will approach the size of molecules, and the laws of physics will no longer allow this kind of doubling. Magnetic RAM M-RAM is the focus of the web- site at: http://mram-info.com
  263. info! more 238 Chapter 4 NANOTECHNOLOGY Nanotechnology, nanoelectronics, nanostructures, nano-

    fabrication—all start with a measurement known as a nanometer, a billionth of a meter, which means we are operating at the level of atoms and molecules. (• See Panel 4.21. ) In nanotechnology, molecules are used to create tiny machines for holding data or performing tasks. Experts attempt to do nanofabrication by building tiny nanostructures one atom or molecule at a time. When applied to chips and other electronic devices, the field is called nanoelectronics. Today scientists are trying to simulate the on/off of traditional transistors by creating transistor switches that manipulate a single electron, the subatomic particle that is the fundamental unit of electricity. In theory, a trillion of these electrons could be put on a chip the size of a fingernail—a chip made not of silicon, which has its physical limits, but of cylindrical wisps of carbon atoms known as carbon nanotubes. IBM has built some working nanocircuits, but it will probably not be until 2015 that factory chipmakers will be able to make them in huge quantities. 41 OPTICAL COMPUTING Today’s computers are electronic; tomorrow’s might be optical, or optoelectronic—using light, not electricity. With optical technol- ogy, a machine using lasers, lenses, and mirrors would represent the on/off codes of data with pulses of light. Light is much faster than electricity. Indeed, fiber-optic networks, which consist of hair-thin glass fibers instead of copper wire, can move information at speeds 3,000 times faster than conventional networks. However, the signals get bogged down when they have to be processed by silicon chips. Optical chips would remove that bottleneck. It’s suggested that mass-produced ver- sions of optical chips could not only slash costs of voice and data networks but also become a new type of technology for delivering high-bandwidth movies, music, and games. DNA COMPUTING Potentially, biotechnology could be used to grow cul- tures of bacteria that, when exposed to light, emit a small electrical charge, An ant carrying a 1-millimeter-square micro- chip illustrates the kind of scale involved in nanotechnology. Nokia’s nanotech Morph telephone More about Nanotechnology Is nanotechnology really here? To begin to find out, check out nanotechnology’s leading forum, the Foresight Institute (www.foresight.org), and leading critic, ETC (www.etcgroup.org). Also, what effects might nano- particles have on the body’s systems? Go to: www.cdc.gov/niosh/topics/ nanotech/ Each bar represents 1,000th of the bar above it . . . the width of 5 carbon atoms 1 billionth of a meter, or . . . 1 “nanometer,” or . . . Source: Ryan Randazzo, “Science of Small,” Reno-Gazette Journal, June 16, 2002, pp. 1E, 8E; Knight-Ridder. 1 meter (about 1 yard) 1/1,000th of a meter 1 millionth of a meter Line up 5 million carbon atoms, and the line would be about as long as the diameter of a grain of sand this big: panel 4.21 Nanotechnology: A matter of scale The world of nanotech- nology is so small it defies imagination.
  264. Hardware: The CPU & Storage 239 for example. The properties

    of this “biochip” could be used to represent the on/off digital signals used in computing. Or a strand of synthetic DNA might represent information as a pattern of molecules, and the information might be manipulated by subjecting it to precisely designed chemical reac- tions that could mark or lengthen the strand. For instance, instead of using binary, it could manipulate the four nucleic acids (represented by A, T, C, G ), which holds the promise of processing big numbers. This is an entirely nondigital way of thinking about computing. 42 QUANTUM COMPUTING Sometimes called the “ultimate computer,” the quantum computer is based on quantum mechanics, the theory of physics that explains the erratic world of the atom. Whereas an ordinary computer stores information as 0s and 1s represented by electrical currents or volt- ages that are either high or low, a quantum computer stores information by using states of elementary particles. Scientists envision using the ener- gized and relaxed states of individual atoms to represent data. For example, hydrogen atoms could be made to switch off and on like a conventional computer’s transistors by moving from low energy states (off) to high energy states (on). 43 EXTENDING BATTERY & RECHARGING TECHNOLOGY Where is the weak link in our high-tech world? Says one writer, “Computer chips double in speed every two years—your current BlackBerry is as powerful as your desktop computer once was—but the batteries powering these devices are improving only about 8% per year.” 44 Laptop, cellphone, and iPod users are tired of having their devices run out of electric charge after only a few hours. And claims that a laptop will get up to 5 hours and 40 minutes of battery life are “not even close,” says one expert. 45 Among the areas of research: Intel is working on developing wireless charg- ing, freeing gadgets from their recharging cords. 46 Companies are also experi- menting with developing new lithium-ion batteries, which may extend battery life. 47 Silver-zinc batteries may provide up to 30% higher capacity compared to existing lithium-ion batteries. 48 Tiny fuel-cell batteries, powered by com- bustible liquids or gases, could potentially power a laptop for days between refills. 49 Marvell Technology Group, which makes chips, is promoting the idea of “plug computers,” computing devices that plug into electrical sockets and Dr. Milan Stojanovik of Colum- bia University developed the first game-playing DNA com- puter, called Maya.
  265. 240 Chapter 4 that are about the same size yet

    would have enough power to manage people’s digital media. 50 ETHICAL MATTERS Of these future developments, nanotechnology has proba- bly received the most attention, and indeed the U.S. government has launched the National Nanotechnology Initiative. In fact, however, nanotechnology and other important fields have been melding into a new field of science vital to U.S. security and economic development. This field is known by the acronym NBIC (pronounced either “ en- bick” or “ nib- bick”), which represents the con- vergence of nanotechnology, biotechnology, information technology, and cog- nitive (brain) science. “NBIC are the power tools of the 21st century,” says James Canton, president of a technology trends research firm in San Fran- cisco called Institute for Global Futures. 51 But is there a possibility of “Gray Goo”? This is a scenario hypothesized in Wired magazine in which self-replicating molecule-size robots run amok and transform all earthly matter into nanobots. (It is also the plot for Michael Crichton’s science-fiction thriller Prey. ) People concerned about adverse effects of nanotechnology worry that the tiny particles might embed themselves in live tissue, with unknown harmful effects. 52 Future Developments in Secondary Storage What are ways that secondary storage could be increased in the future? As for developments in secondary storage, when IBM introduced the world’s first disk drive in 1956, it was capable of storing 2,000 bits per square inch. Today the company is shipping hard disks with densities of 14.3 billion bits, or 1.43 gigabits, per square inch. But that, too, is sure to change. HIGHER-DENSITY DISKS With 700 megabytes of storage space, and prices well under $1 each, blank CDs have replaced floppy disks and Zip disk cartridges as the most cost-effective storage medium. Present DVD disks currently hold up to 9.4 gigabytes of data. We mentioned the Blu-ray, which uses a blue-violet laser to record information; Blu-ray disks are able (at 25 gigabytes) to record more than 13 hours of standard TV programming and over 2 hours of digital high-definition video. Hard drive makers have begun employing a technology known as perpendicular record- ing technology, which involves stacking mag- netic bits vertically on the surface of a platter (instead of horizontally, as is usual). Based on this innovation, Seagate Technology makes a 1.5 terabyte hard drive, the Barracuda, for desktop PCs, servers, and external storage. Also using perpendicular recording, Hitachi Ltd’s Ultrastar can store up to 1,000 gigabytes (1 trillion bytes). (• See Panel 4.22. ) Another promising technology is the micro- holographic disk being developed by Gen- eral Electric Co., which GE says could store 540 gigabytes, or the content of 100 standard DVDs, on a single DVD (equivalent to 20 single- layer Blu-ray disks). Holographic technology can store data beneath the surface of a disk, ethics N S N N N N S S S S N S N S N S N S N S N S N S N S N S N S N S N S N S N S N S N S N S N S N S Each bit of information is represented by a collection of magnetized particles, with their north and south poles oriented in one direction or the other. In longitudinal recording, the particles' north and south poles are lined up parallel to the disk's surface in a ring around its center. Magnetic repulsion limits how closely packed those bits can be and still maintain data integrity. In this type of recording, the poles are arranged perpendicular to the disk's surface, which allows more bits to be packed onto a disk and reduces problems from magnetic interference. Conventional (Longitudinal) Recording Perpendicular Recording panel 4.22 Conventional versus perpendicular recording technologies
  266. Hardware: The CPU & Storage 241 whereas CDs, DVDs, and

    Blu-ray disks store data only on the surface. 53 A team of Australian researchers is going beyond this to develop “five- dimensional” storage, which would permit a 10-terabyte disk, the equivalent of storing 10,000 standard-definition movies on one disk. 54 MOLECULAR ELECTRONICS—STORAGE AT THE SUBATOMIC LEVEL An emerg- ing field, molecular electronics, may push secondary storage into another dimension entirely. Some possibilities include polymer memory, holograms, molecular magnets, subatomic lines, and bacteria. Polymer memory involves developing an alternative to silicon to create chips that store data on polymers, or plastics, which are cheaper than silicon devices. A bonus with polymers is that, unlike conventional RAM memory, it is nonvolatile—it retains information even after the machine is shut off. Poly- mer memory involves storing data based on the polymer’s electrical resistance. IBM is also developing so-called probe storage that uses tiny probes to burn pits in a Plexiglas-like polymer, in which each hole is about 10 nanometers wide, resulting in an experimental storage device of 200 gigabits per square inch. IBM has said that some day it expects as many as 25 million pages of text will be stored in an area no larger than a postage stamp.
  267. 242 Chapter 4 Choosing a laptop computer is trickier than

    buying a desktop PC,” says Wall Street Journal technol- ogy writer Walter Mossberg. 55 The reason: laptops are more diverse and more personal and include “a mind-boggling array of computers, from featherweight models that are great for travel to bulky multimedia machines that double as TV sets.” In addition, desktop “generic boxes” tend to be similar, at least within a price class. Trying to choose among the many Windows-based laptops is a particularly brow- wrinkling experience. Macintosh laptops tend to be more straightforward. Nevertheless, here are some suggestions: 56 Purpose. What are you going to use your laptop for? You can get one that’s essentially a desktop replacement and won’t be moved much. If you expect to use the machine a lot in class, in libraries, or on airplanes, however, weight and battery life are important. Whatever kind of computer you get (whether laptop or desktop), you want to be sure it works with your school’s system. Some departments within a college may require a specific computer configuration or software, so check beforehand. Certainly it should be up to date and able to get internet access through Ethernet and wireless connec- tions. “Don’t bring clunkers [to college],” says one article. “Older computers tend to be buggy, and often lack protec- tion against viruses and other malicious software.” 57 Basics. Writer Mossberg advises that if you’re buying an Apple laptop, 2 gigabytes of memory is plenty. If you’re using Microsoft Vista Home Premium, get 3 gigabytes for best performance. And make sure that you install antivirus and firewall software right away. Budget & Weight. Laptops range from $300 (with rebates) to $3,000, with high-end brands aimed mainly at business- people, hard-core videogamers, and people doing video production. Weight can range from about 3 pounds to over 10 pounds. Windows laptops are often less expensive than Apple laptops, and they tend to have a greater variety of ports and slots and come in more styles and sizes. But Apple laptops are considered to have a more reliable oper- ating system, to work faster, and to be more secure. • Low-budget: Laptops costing in the $350–$1,000 range weigh from 2.2 pounds to 7.5 pounds, have 8.9-, 13.3-, or 15.4-inch screens, run on an Intel Pentium, Celeron, or Atom chip, have 1–2 gigabytes of RAM, and have 60- to 80-gigabyte hard drives. Be sure the laptop comes with a CD burner (drive) or CD burner/DVD-ROM combination and Wi-Fi connection. Examples of this level of laptop are the Dell Inspiron 1525 and the ASUS Eee PC 900. • Middle range: Generally priced at $1,000–$2,000 and weighing 4–7 pounds, these laptops have a dual-core processor, a 17-inch screen, 2 gigabytes of RAM, a 160- gigabyte hard drive, and a CD/DVD-RW drive. Dell, Hewl- ett-Packard, Compaq, Sony, and Apple, among others, all sell middle-range laptops. • Lightweight ultraportables: Weighing under 4 pounds, ultraportable laptops have screen sizes ranging from 8.9 inches to 12.1 inches, 1.0- to 1.8-gigahertz processors, 1–2 gigabytes of RAM, and 160-gigabyte hard drives. Some models lack internal CD or DVD drives. Battery life varies from 2 to 4 or so hours. Cost is generally $1,300 –$2,500. Examples of lightweight laptops are Hewlett- Packard’s HP 2133 Mini-Note and the Apple MacBook Air. • High-end desktop replacements: Weighing 7–10 pounds and costing $2,500–$3,000, high-end laptops are bulky machines designed to be desktop replacements. Their 15.1- to 20-inch display screens with wide viewing angles allow four or five people to watch at once. These machines feature graphics processors, 2–4 gigabytes of RAM, 250- gigabyte hard drives, high-speed DVD-RW drives, and perhaps even TV tuners for watching TV on the display screen. Examples are the fully loaded Dell XPS M2010, the Apple MacBook Pro, and Toshiba’s Qosmio X305. Batteries: The Life–Weight Trade-Off. You should strive to find a laptop that will run for at least 3 hours on its bat- tery. A rechargeable lithium-ion battery lasts longer than the nickel-metal hydride battery. Even so, a battery in the less expensive machines will usually run continuously for only about 2¼ hours. (DVD players are particularly voracious consumers of battery power, so it’s the rare laptop that will allow you to finish watching a 2-hour movie.) The trade-off is that heavier machines usually have lon- ger battery life. The lightweight machines tend to get less than 2 hours, and toting extra batteries offsets the weight savings. (A battery can weigh a pound or so.) 58 Software. Laptops might come with less software than you would get with a typical desktop, though what you get will probably be adequate for most student purposes. For instance, notebook PCs might offer Microsoft Works rather than the more powerful Microsoft Office to handle word processing, spreadsheets, databases, and the like. Keyboards & Pointing Devices. The keys on a laptop key- board are usually the same size as those on a desktop machine, although they can be smaller. However, the up-and-down action feels different, and the keys may feel wobbly. In addition, some keys may be omitted altogether, or keys may do double duty or appear in unaccustomed arrangements. Most laptops have a small touch-sensitive pad in lieu of a mouse—you drag your finger across the touchpad to move EXPERIENCE BOX How to Buy a Laptop
  268. Hardware: The CPU & Storage 243 the cursor. Others use

    a pencil-eraser-size pointing stick in the middle of the keyboard. (But be sure to carry a regular mouse with your laptop, so when you are working on a large flat surface, you can just plug the mouse connector into the mouse port on the laptop and use it as you would on a desk- top computer.) Screens. If you’re not going to carry the notebook around much, go for a big, bright screen. Most people find they are comfortable with a 13- to 15-inch display, measured diago- nally, though screens can be as small as 8 inches and as large as 17 or 20 inches (which is better for viewing movies). Memory, Speed, & Storage Capacity. If you’re buying a laptop to complement your desktop, you may be able to get along with reduced memory, slow processor, small hard disk, and no CD-ROM. Otherwise, all these matters become important. Memory (RAM) is the most important factor in computer performance, even though processor speed is more heavily hyped. Most laptops have at least 1 gigabyte of memory, but 2–3 gigabytes of high-speed DDR SDRAM is best. A micro- processor running 1.6 gigaherz should be adequate. (But if you plan to work with a lot of graphics and/or video, get more RAM and a higher-speed processor, as well as a lap- top with a separate video card inside with its own additional memory.) A hard drive of 160 gigabytes or more is sufficient for most people, and make sure that you have an internal CD/ DVD drive, for backing up your files and to play movies and the like. Wireless. Most laptops come with Wi-Fi for wireless net- working; 802.11b technology is fine for ordinary use, but try to buy a laptop with the newer and faster “n” version. For more information about buying computers, go to www.zdnet.com/computershopper, www.computerhistory. org/?gclid ϭ CMeF-f7I6JQCFSkViQodlk2iSA, and http://com previews.about.com/od/buyers/bb/DesktopPCs.htm. Also, go green: look for manufacturers that sell Energy Star systems and provide instructions for recycling old com- puter equipment.
  269. 244 Chapter 4 AGP (accelerated graphics port) bus (p. 222)

    Bus that trans- mits data at very high speeds; designed to support video and three-dimensional (3-D) graphics. Why it’s important: An AGP bus is twice as fast as a PCI bus. arithmetic/logic unit (ALU) (p. 212) Part of the CPU that performs arithmetic operations and logical operations and controls the speed of those operations. Why it’s important: Arithmetic operations are the fundamental math operations: addition, subtraction, multiplication, and division. Logical operations are comparisons such as “equal to,” “greater than,” or “less than.” ASCII (American Standard Code for Information Inter- change) (p. 202) Binary code used with microcomput- ers. Besides having the more conventional characters, the Extended ASCII version includes such characters as math sym- bols and Greek letters. Why it’s important: ASCII is the binary code most widely used in microcomputers. bay (p. 202) Shelf or opening in the computer case used for the installation of electronic equipment, generally storage devices such as a hard drive or DVD drive. Why it’s important: Bays permit the expansion of system capabilities. A computer may come equipped with four or eight bays. binary system (p. 199) A two-state system used for data rep- resentation in computers; has only two digits—0 and 1. Why it’s important: In the computer, 0 can be represented by electrical current being off and 1 by the current being on. All data and program instructions that go into the computer are repre- sented in terms of these binary numbers. bit (p. 200) Short for “binary digit,” which is either a 0 or a 1 in the binary system of data representation in computer systems. Why it’s important: The bit is the fundamental element of all data and information processed and stored in a computer system. bluetooth (p. 220) Wireless technology that consists of short-range radio waves that transmit up to 30 feet. Why it’s important: It is used to connect cellphones to computers but also to connect computers to printers, keyboards, headsets, and other appliances. Blu-ray (p. 230) The Blu-ray optical format was developed to enable recording, rewriting, and playback of high-definition video, as well as storing of large amounts of data. Why it’s important: It’s possible to fit more data on a Blu-ray disk even though it’s the same size as a CD/DVD. bus (p. 213) Also called bus line; electrical data roadway through which bits are transmitted within the CPU and between the CPU and other components of the motherboard. Why it’s important: A bus resembles a multilane highway: The more lanes it has, the faster the bits can be transferred. byte (p. 200) Group of 8 bits. Why it’s important: A byte rep- resents one character, digit, or other value. It is the basic unit used to measure the storage capacity of main memory and secondary storage devices (kilobytes and megabytes). cache (p. 215) Special high-speed memory area on a chip that the CPU can access quickly. It temporarily stores instructions and data that the processor is likely to use frequently. Why it’s important: Cache speeds up processing. CD-R (compact disk–recordable) disk (p. 229) Optical-disk form of secondary storage that can be written to only once but can be read many times. Why it’s important: This format allows consumers to make their own CD disks, though it’s a slow pro- cess. Once recorded, the information cannot be erased. CD-R is often used by companies for archiving — that is, to store vast amounts of information. A variant is the Photo CD, an optical disk developed by Kodak that can digitally store photographs taken with an ordinary 35-millimeter camera. CD-ROM (compact disk read-only memory) (p. 228) Optical- disk form of secondary storage that is used to hold prere- corded text, graphics, and sound. Why it’s important: Like music CDs, a CD-ROM is a read-only disk. Read-only means the disk’s content is recorded at the time of manufacture and cannot be written on or erased by the user. A CD-ROM disk can hold up to 650–700 megabytes of data, equal to over 300,000 pages of text. CD-RW (compact disk–rewritable) disk (p. 229) Also known as erasable optical disk; optical-disk form of secondary stor- age that allows users to record and erase data, so the disk can be used over and over again. Special CD-RW drives and soft- ware are required. Why it’s important: CD-RW disks are useful for archiving and backing up large amounts of data or work in multimedia production or desktop publishing; however, they are relatively slow. chip (p. 196) Also called a microchip, or integrated circuit; con- sists of millions of microminiature electronic circuits printed on a tiny piece of silicon. Silicon is an element widely found in sand that has desirable electrical (or “semiconducting”) properties. Why it’s important: Chips have made possible the development of small computers. chipset (p. 207) Groups of interconnected chips on the moth- erboard that control the flow of information between the microprocessor and other system components connected to the motherboard. Why it’s important: The chipset determines what types of processors, memory, and video-card ports will work on the same motherboard. It also establishes the types of multimedia, storage, network, and other hardware the motherboard supports. CMOS (complementary metal-oxide semiconductor) chips (p. 215) Battery-powered chips that don’t lose their con- tents when the power is turned off. Why it’s important: CMOS chips contain flexible start-up instructions — such as time, date, and calendar — that must be kept current even when the computer is turned off. Unlike ROM chips, CMOS chips can be SUMMARY
  270. 245 Hardware: The CPU & Storage reprogrammed, as when you

    need to change the time for day- light savings time. control unit (p. 212) Part of the CPU that deciphers each instruction stored in it and then carries out the instruction. Why it’s important: The control unit directs the movement of electronic signals between main memory and the arithmetic/ logic unit. It also directs these electronic signals between main memory and the input and output devices. CPU (central processing unit) (p. 211) The processor; it follows the instructions of the software (program) to manipulate data into information. The CPU consists of two parts—(1) the control unit and (2) the arithmetic/logic unit (ALU), both of which con- tain registers, or high-speed storage areas. All are linked by a kind of electronic “roadway” called a bus. Why it’s important: The CPU is the “brain” of the computer. DVD-R (DVD-recordable) disks (p. 230) DVD disks that allow one-time recording by the user. Why it’s important: Record- able DVDs offer the user yet another option for storing large amounts of data. DVD-ROM (digital versatile disk or digital video disk, with read-only memory) (p. 229) CD-type disk with extremely high capacity, able to store 4.7 or more gigabytes. Why it’s important: It is a powerful and versatile secondary storage medium. EBCDIC (Extended Binary Coded Decimal Interchange Code) (p. 201) Binary code used with large computers. Why it’s important: EBCDIC is commonly used in mainframes. ethernet (p. 220) Network standard for linking all devices in a local area network. Why it’s important: It’s commonly used to connect microcomputers, cable modems, and printers. (To use Ethernet, the computer must have an Ethernet network inter- face card, and special Ethernet cables are required.) exabyte (EB) (p. 201) Approximately 1 quintillion bytes—1 billion billion bytes (1,024 petabytes—or 1,152,921,504,606,846,976 bytes). Why it’s important: Although this number is seldom used, it is estimated that all the printed material in the world represents about 5 exabytes. expansion (p. 206) Way of increasing a computer’s capabilities by adding hardware to perform tasks that are beyond the scope of the basic system. Why it’s important: Expansion allows users to customize and/or upgrade their computer systems. expansion card (p. 221) Also known as expansion board, adapter card, interface card, plug-in board, controller card, add-in, or add-on; circuit board that provides more memory or that controls peripheral devices. Why it’s important: Com- mon expansion cards connect to the monitor (graphics card), speakers and microphones (sound card), and network (net- work card). Most computers have four to eight expansion slots, some of which may already contain expansion cards included in your initial PC purchase. expansion slot (p. 221) Socket on the motherboard into which the user can plug an expansion card. Why it’s important: See expansion card. FireWire (p. 220) A specialized serial-bus port intended to connect devices working with lots of data, such as digital video recorders, DVD players, gaming consoles, and digital audio equipment. Why it’s important: Whereas the USB port handles only 12 megabits per second, FireWire handles up to 400 megabits per second. flash memory card (p. 234) Also known as flash RAM cards; form of secondary storage consisting of circuitry on credit- card-size cards that can be inserted into slots connecting to the motherboard on notebook computers. Why it’s important: Flash memory is nonvolatile, so it retains data even when the power is turned off. flash memory chip (p. 215) Chip that can be erased and repro- grammed more than once (unlike PROM chips, which can be programmed only once). Why it’s important: Flash memory, which can range from 32 to 128 megabytes in capacity, is used to store programs not only in personal computers but also in pagers, cellphones, printers, and digital cameras. Unlike stan- dard RAM chips, flash memory is nonvolatile — data is retained when the power is turned off. flash memory drive (p. 235) Also called a USB flash drive, keychain drive, or key drive; a finger-size module of flash memory that plugs into the USB ports of nearly any PC or Macintosh. Why it’s important: They generally have storage capacities up to 64 gigabytes, making the device extremely useful if you’re traveling from home to office and don’t want to carry a laptop. When you plug the device into your USB port, it shows up as an external drive on the computer. flash memory stick (p. 234) Smaller than a stick of chewing gum, a form of flash memory media that plugs into a memory stick port in a digital camera, camcorder, notebook PC, photo printer, and other devices. Why it’s important: It holds up to 4 gigabytes of data and is very convenient to transport and use. flops (p. 210) Stands for “floating-point operations per second.” A floating-point operation is a special kind of mathematical calculation. This measure, used mainly with supercomputers, is expressed as megaflops ( mflops, or millions of floating-point operations per second), gigaflops ( gflops, or billions), and tera- flops ( tflops, or trillions). Why it’s important: The measure is used to express the processing speed of supercomputers. gigabyte (G, GB) (p. 200) Approximately 1 billion bytes (1,073,741,824 bytes); a measure of storage capacity. Why it’s important: This measure was formerly used mainly with “big iron” (mainframe) computers but is typical of the secondary storage (hard-disk) capacity of today’s microcomputers. gigahertz (GHz) (p. 209) Measure of speed used for the latest generation of processors: 1 billion cycles per second. Why it’s important: Since a new high-speed processor can cost many hundred dollars more than a previous-generation chip, experts often recommend that buyers fret less about the speed of the processor (since the work most people do on their PCs doesn’t even tax the limits of the current hardware) and more about spending money on extra memory. graphics processing unit (GPU) (p. 209) Specialized proces- sor used to minipulate three-dimensional (3-D) computer
  271. 246 Chapter 4 graphics. Why it’s important: Unlike a general-purpose

    CPU, a GPU is able to perform a range of complex algorithms (prob- lem-solving steps). GPUs are found in personal computers, workstations, cellphones, and game consoles. graphics card (p. 223) Also called a video card or video adapter; expansion card that converts signals from the com- puter into video signals that can be displayed as images on a monitor. Why it’s important: The power of a graphics card, often expressed in megabytes, as in 8-, 16-, or 32- MB, deter- mines the clarity of the images on the monitor. hard disk (p. 225) Secondary storage medium; thin but rigid metal, glass, or ceramic platter covered with a substance that allows data to be stored in the form of magnetized spots. Hard disks are tightly sealed within an enclosed hard-disk-drive unit to prevent any foreign matter from getting inside. Data may be recorded on both sides of the disk platters. Why it’s impor- tant: Hard disks hold much more data than do floppy disks. All microcomputers use hard disks as their principal storage medium. integrated circuit (p. 195). An entire electronic circuit, including wires, formed on a single “chip,” or piece, of special material, usually silicon. Why it’s important: In the old days, transistors were made individually and then formed into an electronic circuit with the use of wires and solder. An inte- grated circuit is formed as part of a single manufacturing process. Intel-type chip (p. 207) Processor chip originally made for PCs; made principally by Intel Corp. and Advanced Micro Devices (AMD), but also by Cyrix, DEC, and others. Why it’s important: These chips are used by manufacturers such as Compaq, Dell, Gateway, Hewlett-Packard, and IBM. Since 1993, Intel has marketed its chips under the names “Pentium,” “Pen- tium Pro,” “Pentium MMX,” “Pentium II,” “Pentium III,” “Pen- tium 4,” “Xeon,” “Itanium,” and “Celeron.” Many ads for PCs contain the logo “Intel inside” to show that the systems run an Intel microprocessor. New Apple Macs use Intel dual-core and quad-core processors. IrDA port (p. 220) Port that allows a computer to make a cableless connection with infrared-capable devices, such as some printers. Why it’s important: Infrared ports eliminate the need for cabling. kilobyte (K, KB) (p. 200) Approximately 1,000 bytes (1,024 bytes); a measure of storage capacity. Why it’s important: The kilobyte was a common unit of measure for memory or sec- ondary storage capacity on older computers. machine cycle (p. 212) Series of operations performed by the control unit to execute a single program instruction. It (1) fetches an instruction, (2) decodes the instruction, (3) exe- cutes the instruction, and (4) stores the result. The machine cycle is the essence of computer-based processing. machine language (p. 202) Binary code (language) that the computer uses directly. The 0s and 1s represent precise storage locations and operations. Why it’s important: For a program to run, it must be in the machine language of the computer that is executing it. magnetic tape (p. 231) Thin plastic tape coated with a sub- stance that can be magnetized. Data is represented by magnetized spots (representing 1s) or nonmagnetized spots (representing 0s). Why it’s important: Today, “mag tape” is used mainly for backup and archiving — that is, for maintaining historical records — where there is no need for quick access. megabyte (M, MB) (p. 200) Approximately 1 million bytes (1,048,576 bytes); measure of storage capacity. Why it’s impor- tant: Microcomputer primary storage capacity is expressed in megabytes. megahertz (MHz) (p. 209) Measure of microcomputer pro- cessing speed, controlled by the system clock; 1 million cycles per second. Why it’s important: Generally, the higher the megahertz rate, the faster the computer can process data. A 550-MHz Pentium III–based microcomputer, for example, processes 550 million cycles per second. microprocessor (p. 196) Miniaturized circuitry of a computer processor. It stores program instructions that process, or manipulate, data into information. The key parts of the micro- processor are transistors. Why it’s important: Microprocessors enabled the development of microcomputers. MIDI port (p. 220) Pronounced “ mid- dee,” and short for Musical Instrument Digital Interface. A specialized port used in creating, recording, editing, and performing music. Why it’s important: It is used for connecting amplifiers, electronic syn- thesizers, sound cards, drum machines, and the like. MIPS (p. 210) Stands for “millions of instructions per sec- ond”; a measure of processing speed. Why it’s important: MIPS is used to measure processing speeds of mainframes, minicomputers, and workstations. A workstation might perform at 100 MIPS or more, a mainframe at up to 981,024 MIPS. Motorola-type chips (p. 208) Microprocessors made by Motorola for Apple Macintosh computers. Why it’s important: From 1993 until the arrival of the PowerPC, Motorola provided an alternative to the Intel-style chips made for PC microcom- puters. New Apple Macs now use Intel processors. multicore processor (p. 208) Microcomputer chip such as Intel’s dual-core and quad-core processors and AMD’s Athlon X2 processor, with two or more processor “cores” on a single piece of silicon. Why it’s important: Chips can take on several tasks at once because the operating system can divide its work over more than one processor. network interface card (NIC) (p. 223) Expansion card that allows the transmission of data over a cable network. Why it’s important: Installation of a network interface card in the com- puter enables the user to connect with various computers and other devices such as printers. optical disk (p. 227) Removable disk, usually 4.75 inches in diameter and less than one-twentieth of an inch thick, on which data is written and read through the use of laser beams. Why it’s important: An audio CD holds up to 74 minutes (2 bil- lion bits’ worth) of high-fidelity stereo sound. Some optical disks are used strictly for digital data storage, but many are
  272. 247 Hardware: The CPU & Storage used to distribute multimedia

    programs that combine text, visuals, and sound. optical memory card (p. 233) Plastic, laser-recordable, wallet-type card used with an optical-card reader. Why it’s important: Because optical cards can cram so much data into so little space, they may become more popular in the future. For instance, a health card based on an optical card would have room not only for the individual’s medical history and health-insurance information but also for digital images, such as electrocardiograms. parallel port (p. 218) A connector for a line that allows 8 bits (1 byte) to be transmitted simultaneously, like cars on an eight-lane highway. Why it’s important: Parallel lines move information faster than serial lines do. However, because they can transmit information efficiently only up to 15 feet, they are used principally for connecting printers or external disk or magnetic-tape backup storage devices. PC card (p. 223) Thin, credit card-size (2.1- by 3.4-inch) hard- ware device. Why it’s important: PC cards are used principally on laptop computers to expand capabilities. PCI (peripheral component interconnect) bus (p. 222) High-speed bus; at 32- or 64-bits wide. Why it’s important: PCI has been widely used in microcomputers to connect graphics cards, sound cards, modems, and high-speed net- work cards. PCIe (PCi Express) (p. 222) Intel’s PCI Express bus. Why it’s important: PCIe is the latest standard for expansion card available on mainstream personal computers and is faster and more reliable than AGP. petabyte (P, PB) (p. 201) Approximately 1 quadrillion bytes (1,048,576 gigabytes); measure of storage capacity. Why it’s important: The huge storage capacities of modern databases are now expressed in petabytes. plug and play (p. 219) USB peripheral connection standard that allows peripheral devices and expansion cards to be automatically configured while they are being installed. Why it’s important: Plug and play avoids the hassle of setting switches and creating special files, which plagued earlier users. port (p. 216) A connecting socket or jack on the outside of the system unit into which are plugged different kinds of cables. Why it’s important: A port allows the user to plug in a cable to connect a peripheral device, such as a monitor, printer, or modem, so that it can communicate with the computer system. power supply (p. 204) Device that converts AC to DC to run the computer. Why it’s important: The electricity available from a standard wall outlet is alternating current (AC), but a micro- computer runs on direct current (DC). RAM (random access memory) chips (p. 213) Also called pri- mary storage and main memory; chips that temporarily hold software instructions and data before and after it is processed by the CPU. RAM is a volatile form of storage. Why it’s impor- tant: RAM is the working memory of the computer. Having enough RAM is critical to users’ ability to run many software programs. read (p. 214) To transfer data from an input source into the computer’s memory or CPU. Why it’s important: Reading, along with writing, is an essential computer activity. read/write head (p. 225) Mechanism used to transfer data between the computer and the disk. When the disk spins inside its case, the read/write head moves back and forth over the data access area on the disk. Why it’s important: The read/ write head enables the essential activities of reading and writ- ing data. registers (p. 212) High-speed storage areas that temporar- ily store data during processing. Why it’s important: Registers may store a program instruction while it is being decoded, store data while it is being processed by the ALU, or store the results of a calculation. ROM (read-only memory) (p. 214) Memory chip that cannot be written on or erased by the computer user without spe- cial equipment. Why it’s important: ROM chips contain fixed start-up instructions. They are loaded, at the factory, with programs containing special instructions for basic com- puter operations, such as starting the computer or put- ting characters on the screen. These chips are nonvolatile; their contents are not lost when power to the computer is turned off. SCSI (small computer system interface) port (p. 218) Pro- nounced “scuzzy,” a connector that allows data to be trans- mitted in a “daisy chain” to up to seven devices at speeds (32 bits at a time) higher than those possible with serial and parallel ports. The term daisy chain means that several devices are connected in series to each other, so that data for the seventh device, for example, has to go through the other six devices first. Why it’s important: A SCSI enables users to con- nect external hard-disk drives, CD-ROM drives, scanners, and magnetic-tape backup units. secondary storage hardware (p. 224) Devices that per- manently hold data and information as well as programs. Why it’s important: Secondary storage — as opposed to pri- mary storage — is nonvolatile; that is, saved data and pro- grams are permanent, or remain intact, when the power is turned off. sectors (p. 225) The small arcs created in tracks when a disk’s storage locations are divided into wedge-shaped sec- tions. Why it’s important: The system software uses the point at which a sector intersects a track to reference the data location. semiconductor (p. 196) Material, such as silicon (in com- bination with other elements), whose electrical properties are intermediate between a good conductor and a noncon- ductor of electricity. When highly conducting materials are laid on the semiconducting material, an electronic circuit can be created. Why it’s important: Semiconductors are the materials from which integrated circuits (chips) are made.
  273. 248 Chapter 4 serial port (p. 218) A connector for

    a line that sends bits one after another, like cars on a one-lane highway. Why it’s impor- tant: Because individual bits must follow each other, a serial port is usually used to connect devices that do not require fast transmission of data, such as keyboard, mouse, monitors, and modems. It is also useful for sending data over a long distance. silicon (p. 195) An element that is widely found in clay and sand and is used in the making of solid-state integrated circuits. Why it’s important: It is used not only because its abundance makes it cheap but also because it is a good semi- conductor. As a result, highly conducting materials can be overlaid on the silicon to create the electronic circuitry of the integrated circuit. smart card (p. 233) Wallet-type card that looks like a credit card but has a microprocessor and memory chips embedded in it. When inserted into a reader, it transfers data to and from a central computer. Why it’s important: Unlike conven- tional credit cards, smart cards can hold a fair amount of data and can store some basic financial records. Thus, they are used as telephone debit cards, health cards, and student cards. solid-state device (p. 195) Electronic component, such as an integrated circuit, made of solid materials with no moving parts. Why it’s important: Solid-state integrated circuits are far more reliable, smaller, and less expensive than electronic circuits made from several components. solid-state drive (p. 235) Secondary storage device that has far greater capacity than flash memory drives or keychain drives; like flash drives, they have no moving parts to break down, as hard disk drives do . Why it’s important: Some newer laptops (such as Apple’s MacBook Air laptop) now feature solid-state drives. These drives are lighter and use less power than conventional disk drives and can better withstand bumps and bangs. sound card (p. 223) Expansion card used to convert and transmit digital sounds through analog speakers, microphones, and headsets. Why it’s important: Cards such as PCI wavetable sound cards are used to add music and sound effects to com- puter video games. system clock (p. 209) Internal timing device that uses fixed vibrations from a quartz crystal to deliver a steady stream of digital pulses or “ticks” to the CPU. These ticks are called cycles. Why it’s important: Faster clock speeds will result in faster processing of data and execution of program instruc- tions, as long as the computer’s internal circuits can handle the increased speed. tape cartridge (p. 232) Module resembling an audiocassette that contains tape in a rectangular plastic housing. The two most common types of tape drives are DAT and Travan TR-3. Why it’s important: Tape cartridges are used for secondary storage on microcomputers and also on some large comput- ers. Tape is used mainly for archiving purposes and backup. terabyte (T, TB) (p. 201) Approximately 1 trillion bytes (1,009,511,627,776 bytes); measure of storage capacity. Why it’s important: Some high-capacity disk storage is expressed in terabytes. tracks (p. 224) The rings on a diskette along which data is recorded. Why it’s important: See sectors. transistor (p. 195) Tiny electronic device that acts as an on/ off switch, switching between “on” and “off” millions of times per second. Why it’s important: Transistors are part of the microprocessor. Unicode (p. 202) Binary coding scheme that uses 2 bytes (16 bits) for each character, rather than 1 byte (8 bits). Why it’s important: Instead of the 256 character combinations of ASCII, Unicode can handle 65,536 character combinations. Thus, it allows almost all the written languages of the world to be rep- resented using a single character set. upgrading (p. 206) Changing to newer, usually more powerful or sophisticated versions, such as a more powerful micropro- cessor or more memory chips. Why it’s important: Through upgrading, users can improve their computer systems without buying completely new ones. USB (universal serial bus) port (p. 218) Port that can theo- retically connect up to 127 peripheral devices daisy-chained to one general-purpose port. Why it’s important: USB ports are useful for peripherals such as digital cameras, digital speak- ers, scanners, high-speed modems, and joysticks. Being “hot pluggable” or “hot swappable” means that USB allows such devices to be connected or disconnected even while the PC is running. virtual memory (p. 216) Type of hard-disk space that mimics primary storage (RAM). Why it’s important: When RAM space is limited, virtual memory allows users to run more software at once, provided the computer’s CPU and operating system are equipped to use it. The system allocates some free disk space as an extension of RAM; that is, the computer swaps parts of the software program between the hard disk and RAM as needed. volatile (p. 213) Temporary; the contents of volatile storage media, such as RAM, are lost when the power is turned off. Why it’s important: To avoid data loss, save your work to a secondary storage medium, such as a hard disk, in case the electricity goes off while you’re working. word size (p. 211) Number of bits that the processor may pro- cess at any one time. Why it’s important: The more bits in a word, the faster the computer. A 32-bit computer — that is, one with a 32-bit-word processor — will transfer data within each microprocessor chip in 32-bit chunks, or 4 bytes at a time. A 64-bit computer transfers data in 64-bit chunks, or 8 bytes at a time. write (p. 214) To transfer data from the computer’s CPU or memory to an output device. Why it’s important: See read.
  274. 249 Hardware: The CPU & Storage CHAPTER REVIEW Self-Test Questions

    1. A(n) ________ is about 1,000 bytes; a(n) ________ is about 1 million bytes; a(n) ________ is about 1 billion bytes. 2. The ________ is the part of the microprocessor that tells the rest of the computer how to carry out a pro- gram’s instructions. 3. The process of retrieving data from a storage device is referred to as ________ ; the process of copying data to a storage device is called ________ . 4. To avoid losing data, users should always ________ their files. 5. Formatted disks have ________ and ________ that the system software uses to reference data locations. 6. The ________ is often referred to as the “brain” of a computer. 7. The electrical data roadways through which bits are transmitted are called ________ . 8. A cable connected to a ________ port sends bits one at a time, one after the other; a cable connected to a ________ port sends 8 bits simultaneously. 9. Part of the disk-drive mechanism, the ________ trans- fers data between the computer and the disk. 10. ________ chips, also called main memory, are critical to computer performance. 1 1. ________ operations are the fundamental math opera- tions: addition, subtraction, multiplication, and division. ________ operations are comparisons such as “equal to,” “greater than,” or “less than.” 12. A group of 8 bits is a ________ . 13. The extra bit attached to the end of a byte for error checking is a ________ bit. 14. A tiny electronic device that acts as an on/off switch, switching between “on” and “off” millions of times per second, is called a ________ . 15. ________ is a form of flash memory media that plugs into a special port in a digital camera, camcorder, note- book PC, or photo printer and holds up to 1 gigabyte of data. Multiple-Choice Questions 1. Which of the following is another term for primary storage? a. ROM b. ALU c. CPU d. RAM e. CD-R 2. Which of the following is not included on a computer’s motherboard? a. RAM chips b. ROM chips c. keyboard d. microprocessor e. expansion slots 3. Which of the following is used to hold data and instruc- tions that will be used shortly by the CPU? a. ROM chips b. peripheral devices c. RAM chips d. CD-R e. hard disk 4. Which of the following coding schemes is widely used on microcomputers? a. EBCDIC b. Unicode c. ASCII d. Microcode e. Unix 5. Which of the following is used to measure processing speed in microcomputers? a. MIPS b. flops c. picoseconds d. megahertz e. millihertz 6. Which expansion bus specializes in graphics processing? a. PCI b. ROM c. CMOS d. AGP e. AMR 7. Which element is commonly used in the making of solid-state integrated circuits? a. pentium b. lithium s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.”
  275. 250 Chapter 4 c. copper d. iron e. silicon 8.

    DVD-Rs allow a. repeated rewriting. b. one-time recording by the user; they cannot be written on more than once. c. no writing; they are read-only. True/False Questions T F 1. A bus connects a computer’s control unit and ALU. T F 2. The machine cycle comprises the instruction cycle and the execution cycle. T F 3. Magnetic tape is the most common secondary storage medium used with microcomputers. T F 4. Main memory is nonvolatile. T F 5. Pipelining is a method of speeding up processing. T F 6. Today’s laptop computers can perform more calculations per second than the ENIAC, an enor- mous machine occupying more than 1,800 square feet and weighing more than 30 tons. T F 7. USB can theoretically connect up to 127 periph- eral devices. T F 8. A petabyte is approximately 1 quadrillion bytes. T F 9. Online secondary storage services test your com- puter’s RAM capacity. T F 10. Keychain memory is a pipelining device. s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Short-Answer Questions 1. What is ASCII, and what do the letters stand for? 2. Why should measures of capacity matter to computer users? 3. What’s the difference between RAM and ROM? 4. What is the significance of the term megahertz? 5. What is a motherboard? Name at least four compo- nents of a motherboard. 6. What are the most convenient forms of backup stor- age? Why? 7. Why is it important for your computer to be expandable? 8. What are three uses of a smart card? 9. What is nanotechnology? 10. What are the uses of a surge protector, voltage regula- tor, and UPS, and why are these devices important? 11. Explain the binary system. 12. What is Unicode? 13. Why is silicon used in the manufacture of microprocessors? 14. What is Blu-ray used for? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” Knowledge in Action 1. If you’re using Windows XP, you can easily determine what microprocessor is in your computer and how much RAM it has. To begin, click the Start button in the Windows desktop pull-up menu bar and then choose Control Panel. Then locate the System icon in the Con- trol Panel window and double-click on the icon. The System Properties dialog box will open. It con- tains several tabs: General, Computer Name, Hardware, System Restore, Automatic Updates, and Advanced. The name of your computer’s microprocessor will dis- play on the General tab, as well as its speed and your computer’s RAM capacity. 2. Visit a local computer store and note the system requirements listed on five software packages. What are the requirements for processor? RAM? Operating system? Available hard-disk space? CD/DVD speed? Audio/video cards? Are there any output hardware requirements? 3. Develop a binary system of your own. Use any two objects, states, or conditions, and encode the following statement: “I am a rocket scientist.” 4. The floppy drive no longer comes as a standard compo- nent of microcomputers. What do you think will be the next “legacy” device to be abandoned? 5. Storing humans: If the human genome is 800 million bytes (according to Raymond Kurzweil), how many humans could you fit on a 120-GB hard drive? 6. What are the predictions about how long Moore’s Law will continue to apply? Do a web search for four opinions; list the website sources and their predic- tions, and state how reliable you believe the sites are, and why.
  276. 251 Hardware: The CPU & Storage Web Exercises 1. The

    objective of this project is to introduce you to an online encyclopedia that’s dedicated to computer technology. The www.webopedia.com website is a good resource for deciphering computer ads and clearing up difficult concepts. For practice, visit the site and type processor into the Search text box and then press the Enter key or click on the Go! button. Click on some of the links that are displayed. Search for information on other topics of interest to you. 2. You can customize your own PC through a brand-name company such as Dell or Gateway, or you can create your own personal model by choosing each component on your own. Decide which method is best for you. Go to the following sites and customize your ideal PCs: www.dell.com www.gateway.com www.compaq.com www.hpshopping.com http://store.apple.com/us Write down the prices for your ideal customized PCs. Then go to www.pricewatch.com www.dealsdepot.com/Shop/Control/fp/SFV/14930/ view_page/custom/RID/118778?engine ϭ adwords+ 1&keyword ϭ custom+1 http://store.sysbuilder.com/desktop.html and see if you could save money by putting your own PC together piece by piece. (This includes purchasing each component separately and verifying compatibility of all components.) For a tutorial on building your own computer, go to www.pcmech.com/build.htm. 3. DVD formats: DVD ϩ R, DVD-R, DVD ϩ RW, DVD-RW, so many formats! Are they all the same? Visit these websites to get current information on the issues sur- rounding recordable DVD media: www.webopedia.com/DidYouKnow/Hardware_ Software/2003/DVDFormatsExplained.asp www.dvddemystified.com/dvdfaq.html#4.3 www.plextor.com/english/support/faqs/G00015.htm www.videohelp.com/dvd 4. What is a Qubit? You’ve learned about binary digits in this chapter; now learn about the Qubit, the basic unit of information in a quantum computer. Beware: When you step into the realm of quantum theory, things become bizarre. http://whatis.techtarget.com/ wsearchResults/1,290214,sid9,00.html?query ϭ qubit# www.thefreedictionary.com/quantum+bit www.qubit.org/ www.answers.com/topic/qubit?method ϭ 6 www.worldwidewords.org/turnsofphrase/tp-qub1.htm 5. DNA computing: Visit the following websites to learn more about DNA software and computing: www.arstechnica.com/reviews/2q00/dna/dna-1.html http://expertvoices.nsdl.org/cornell- cs322/2008/03/29/dna-computing/ www.tribuneindia.com/2008/20080711/science.htm http://computer.howstuffworks.com/dna-computer.htm 6. You mean the Matrix was real? Visit this website for analysis of real-world applications of concepts from the movie Matrix: www.kurzweilai.net/index. html?flash ϭ 2. 7. Security issue—credit card fraud: When buying parts or making any kind of purchase over the internet, always make sure that the web address says HTTPS to let you know it is an encrypted SSL (Secured Socket Layer) website. Visit these sites for safety tips when using your credit card online. http://money.howstuffworks.com/personal-finance/ debt-management/credit-card4.htm www.creditcards.com/credit-card-news/credit-card- fraud-and-online-shopping-1282.php http://idtheft.about.com/od/preventionpractices/a/ OnlineShopping.htm SECURITY
  277. 253 HARDWARE: INPUT & OUTPUT Taking Charge of Computing &

    Communications 5 Chapter Topics & Key Questions 5.1 Input & Output How is input/output hardware used by a computer system? 5.2 Input Hardware What are the three categories of input hardware, what devices do they include, and what are their features? 5.3 Output Hardware What are the two categories of output hardware, what devices do they include, and what are their features? 5.4 Input & Output Technology & Quality of Life: Health & Ergonomics What are the principal health and ergonomic issues relating to computer use? 5.5 The Future of Input & Output What are some examples of future input and out- put technology?
  278. 254 Chapter 5 A utomated teller machines have become so

    common, it now seems there are almost as many places to get cash as to spend it,” says one account. 1 Not only are automated teller machines (ATMs), or cash machines, in office buildings, convenience stores, nightclubs, and even the lobbies of some big apart- ment buildings; they are also becoming something quite different from simple devices for people who need fast cash. They are migrating into different kinds of kiosks (pronounced “ key -osks”), computerized booths or small standing structures providing any number of services, from electronic banking options to corporate job benefits, from tourism advice to garage-sale permits. (• See Panel 5.1. ) In Tampa, Florida, Kimberly Ruggiero, 22, a hospital inventory tracker, avoids a 30-minute bank line on Fridays by stopping at a 7-Eleven and using an ATM-like kiosk to cash her paycheck. “It’s extremely convenient and fast,” she says, “and I don’t have to wait in line.” 2 In New York City, kiosks can be used by citizens to pay parking tickets and check for building-code violations. In San Antonio, they pro- vide information on animals available for adoption. In Seattle, commuters at car- ferry terminals view images of traffic conditions on major highways. In Nevada, motorists can use kiosks at the Department of Motor Vehicles to get a driver his- tory printout. 3 Many colleges and universities use kiosks to provide students with information about classes, schedules, activity locations, maps, and so on. 4 Kiosks also sell stamps, print out checks, and issue movie and plane tick- ets. Many grocery stores have video-rental kiosks offering movie rentals for $1 a night. 5 Alamo car rental offices have kiosks at which travelers can print out directions, get descriptions of hotel services, and obtain restaurant menus and reviews—in four languages. At MainStay Suites, guests may not even find front-desk clerks; kiosks have replaced them at many locations. Many kiosks have been transformed into full-blown multimedia centers, offering publi- cized corporate and governmental activities, job listings, and benefits, as well as ads, coupons, and movie previews. The kiosk presents the two faces of the computer that are important to humans: It allows them to input data and to output information. For exam- ple, many kiosks use touch screens (and sometimes also keyboards) for input and thermal printers for output. In this chapter, we discuss what the principal input and output devices are and how you can make use of them. panel 5.1 Kiosks (Left) The Bell Atlantic public internet access kiosk at T. F. Green air- port in Warwick, Rhode Island. (Right) Check- cashing kiosk at a 7-Eleven store.
  279. Hardware: Input & Output 255 5.1 INPUT & OUTPUT How

    is input/output hardware used by a computer system? Recall from Chapter 1 that input refers to data entered into a computer for processing—for example, from a keyboard or from a file stored on disk. Input includes program instructions that the CPU receives after commands are issued by the user. Commands can be issued by typing keywords, defined by the application program, or pressing certain keyboard keys. Commands can also be issued by choosing menu options or clicking on icons. Finally, input includes user responses—for example, when you reply to a question posed by the application or the operating system, such as “Are you sure you want to put this file in the Recycle Bin?” Output refers to the results of processing—that is, information sent to the screen or the printer or to be stored on disk or sent to another computer in a network. Some devices combine input and output functions, examples being not only ATMs and kiosks, as we just mentioned, but also combination scanner-printer-fax devices. This chapter focuses on the common input and output devices used with a computer. (• See Panel 5.2. ) Input hardware consists of devices that trans- late data into a form the computer can process. The people-readable form of the data may be words like those on this page, but the computer-readable form consists of binary 0s and 1s, or off and on electrical signals. Output hardware consists of devices that translate information pro- cessed by the computer into a form that humans can understand. The computer-processed information consists of 0s and 1s, which need to be trans- lated into words, numbers, sounds, and pictures. Video capture card Light pen Scanner controller card Scanner (+ bar codes, MICR, OMR, OCR) Video source Display adapter Sound card Speakers Monitor Printers (and plotters) Ports Mouse (or trackball, joystick, touchpad) Digitizing tablet Digital camera Microphone SYSTEM UNIT (Video cards also output video) Webcam Port Keyboard Output Input panel 5.2 Common input and output devices
  280. 256 Chapter 5 5.2 INPUT HARDWARE What are the three

    categories of input hardware, what devices do they include, and what are their features? Consider the joystick, a vertical lever mounted on a base that is used as a point- ing device in videogames or flying or driving simulators. The joystick’s transla- tion of human movement into machine movement elegantly satisfies the three virtues of an input device—simplicity, efficiency, and control. The pointing device, however, is only one of three types of input hardware devices: keyboards, pointing devices, and source data-entry devices. (• See Panel 5.3. ) Quite often a computer system will combine all three. Keyboards How do traditional and specialty keyboards differ? A keyboard is a device that converts letters, numbers, and other charac- ters into electrical signals that can be read by the computer’s processor. The keyboard does this with its own processor and a grid of circuits under- neath the keys. When you press a key or combination of keys, the current flowing through the circuits is interrupted. The processor determines where the break occurs and compares the location information with a character map (organized by x,y coordinates) located on the keyboard’s ROM chip. The character informa- tion is briefly stored in the keyboard’s memory, which usually holds about 16 bytes. The keyboard then sends the data in a stream to the PC via a wired or wireless connection. (Laptops use an internal wired connection.) The com- puter has a keyboard controller, an integrated circuit whose job it is to process all the data that comes from the keyboard and forward it to the operating system. The operating system checks to see if the keyboard data is operating system-specific or application-specific. If, for example, you press Ctrl ϩ Alt ϩ Delete —the keyboard command for rebooting your computer—the OS will recognize the data as operating- system- specific and react accordingly (reboot). If, in contrast, you are doing word processing in Microsoft Word and press Alt ϩ F, the OS will recognize the data as application-specific and send it along to the current application, Word, to be executed. All this happens so quickly that you notice no time lapse between pressing keys and seeing results. The keyboard may look like a typewriter keyboard to which some special keys have been added. Alternatively, it may look like the keys on a bank ATM or the keypad of a pocket computer. It may even be a Touch-Tone phone or cable-TV set-top box. Keyboards T raditional computer keyboards Specialty keyboards and terminals: dumb terminals, intelligent terminals (ATMs, POS terminals), internet terminals Pointing Devices Mice, trackballs, pointing sticks, touchpads Touch screens Pen-based computer systems, light pens, digitizers (digitizing tablets) Optical sensor technology remotes, such as for Wii Source Data-Entry Devices Scanner devices: imaging systems, bar- code readers, mark- and character- recognition devices (MICR, OMR, OCR), fax machines Audio-input devices Webcams and video-input devices Digital cameras Speech-recognition systems Sensors Radio-frequency identification Human-biology input devices panel 5.3 Three types of input devices
  281. Hardware: Input & Output 257 Let’s look at traditional computer

    keyboards and various kinds of specialty keyboards and terminals. TRADITIONAL COMPUTER KEYBOARDS Picking up where we left off with the PC ad presented in Chapter 4 (Panel 4.4 on p. 199), we see that the seller lists a “full-sized keyboard with numeric keypad.” Con- ventional computer keyboards have all the keys on old typewriter keyboards, plus other keys unique to computers. This generally totals 104–108 keys for desktop computers and 80–85 keys for laptops. Newer keyboards include extra keys for special activities such as instant web access, CD/DVD controls, and Windows shortcut keys. Wired keyboards connect a cable to the computer via a serial port or a USB port. Wireless keyboards use either infrared-light (IR) technology or radio frequency (RF) technology to transmit signals to a receiver device plugged into the computer, usually via a USB port. Infrared wire- less keyboards have a transmission range of 6–10 feet and cannot have any obstacles in the transmission path (called the line of sight ). (Some laptop/notebook computers and printers come with built-in IR ports.) Radio-based keyboards have a range of up to 100 feet and have no line-of-sight problems. A final interest- ing variation is the VKB Virtual Keyboard. The size of a writing pen, it uses light (laser) to project a full-size computer keyboard onto almost any surface; the image disappears when not in use. The Virtual Keyboard can be used with PDAs and smartphones, allowing Inside a computer keyboard. In most keyboards, each key sits over a small, flexible rubber dome with a hard carbon center. When the key is pressed, a plunger on the bottom of the key pushes down against the dome. This pushes the carbon center down, which presses against the keyboard circuitry to com- plete an electrical circuit and send a signal to the computer. Wireless keyboard Seeing the light. The Virtual Keyboard uses light to project a full-size computer keyboard onto almost any surface. Used with smartphones and PDAs, this technology provides a way to do email, word processing, and other basic tasks without one’s having to carry a note- book computer. Full-sized keyboard with numeric keypad
  282. 258 Chapter 5 users a practical way to do email

    and word processing without having to take along a laptop computer. 6 The keyboard illustration in Chapter 3 shows keyboard and numeric key- pad functions. (Refer back to Panel 3.6, pp. 130–131.) SPECIALTY KEYBOARDS & TERMINALS Specialty keyboards range from Touch- Tone telephone keypads to keyboards featuring pictures of food for use in fast- food restaurants. Here we will consider dumb terminals, intelligent terminals, and internet terminals: • Dumb terminals: A dumb terminal, also called a video display terminal (VDT), has a display screen and a keyboard and can input and output but cannot process data. Usually the output is text only. For instance, airline reservations clerks use these terminals to access a mainframe computer containing flight information. Dumb terminals cannot perform functions independent of the mainframe to which they are linked. 7 • Intelligent terminals: An intelligent terminal has its own memory and processor, as well as a display screen and a keyboard. Such a terminal can perform some functions independent of any mainframe to which it is linked. One example is the familiar automated teller machine (ATM), the self-service banking machine that is connected through a telephone network to a central computer. Another example is the point-of-sale (POS) terminal, used to record purchases at a store’s checkout counter. Intelligent terminals can be connected to the main (usually mainframe) computer system wirelessly or via cables. A third example of an intelligent terminal is the mobile data terminal (MDT), a rugged notebook PC found in police cruisers, which must endure high-speed chases and nonstop use. MDTs may run Windows operating systems but use specialized software that lets officers track dispatch information, search for local and national warrants, verify license plate and vehicle registration, check criminal records, and more. Some systems, such as that used by the Tulsa, Oklahoma, police department, let officers complete reports online to avoid time-consuming in-office paperwork. Survival Tip How Do I Use the Print Scrn key? This PC key is a holdover from DOS days, before Windows. Then it sent the contents of the display screen to the printer. It still can, but in a roundabout way. When you press the key, an image of the screen is placed on the Win- dows clipboard. Open a blank document in any program that accepts graphics and choose Edit, Paste. The image is inserted, and you can print it. (Some new keyboards have eliminated this key.) Terminals. ( Left ) A dumb terminal at an airline check-in counter. ( Right ) A point-of-sale (POS) terminal at a retail store. It records purchases and processes the buyer’s credit card.
  283. Hardware: Input & Output 259 • Internet terminals: An internet

    terminal provides access to the internet —that is, it powers up directly into a browser. There are several variants: (1) internet TV, which distributes TV via the internet; (2) internet-ready TV, TV sets that allow viewers to also go online; (3) the network computer, a cheap, stripped-down computer that connects people to networks; (4) the online game player, which not only lets the user play games but also connects to the internet; and (5) the wireless pocket PC or personal digital assistant (PDA), a handheld computer with a tiny keyboard that can do two-way wireless messaging; most smartphones also act as internet terminals. SPECIAL KEYBOARDS FOR HANDHELDS Users of PDAs generally use a penlike device (a stylus, as we’ll describe) to enter data and commands . Some PDAs do include a small keyboard, but it is usually limited in function and hard to use. However, there are alternatives: • Foldable PDA keyboards: Many manufacturers offer foldable keyboards for PDAs. One example is Think Outside’s Stowaway Portable Keyboard, which folds up to roughly the size of a PDA and then unfolds into a full- size keyboard. Once the keyboard driver is installed, you can simply clip the PDA onto the keyboard, which runs off the PDA’s power, thus requiring no external power source. Wireless foldable keyboards are also available. • One-hand PDA keyboards: The FrogPad is a 20-key gadget designed to be used with just the five fingers of one hand. A clamshell allows people to plug in a smartphone and use the whole kit like a mini-laptop. Internet terminals—PDAs Stowaway Portable Keyboard for PDAs. This key- board folds up to roughly the size of a PDA (3.8 inches wide ϫ 5.1 inches deep ϫ 0.8 inch thick) and unfolds into a full-size keyboard measuring 13.8 inches wide ϫ 5.1 inches deep ϫ 0.4 inch thick. To use the keyboard, you simply unfold it and slide the sections together. FrogPad one-hand, 20-key keyboard for PDAs. Keys are the same size as those on a regular computer key- board. Fifteen keys represent letters, numbers, and punctuation marks; four keys alternate the symbols for each key; a Shift key is for capital letters. The key- board can also handle page navigation.
  284. info! more 260 Chapter 5 Pointing Devices How do pointing

    devices work, such as the mouse and its variants, touch screens, and pen-based systems? One of the most natural of all human gestures, the act of pointing, is incor- porated in several kinds of input devices. Pointing devices control the posi- tion of the cursor or pointer on the screen and allow the user to select options displayed on the screen. Pointing devices include the mouse and its variants, the touch screen, and various forms of pen input. We also describe recent innovations in handwriting input. THE MOUSE The principal pointing tool used with microcomputers is the mouse, a device that is rolled about on a desktop mouse pad and directs a pointer on the computer’s display screen. Making its first appearance at a demonstration in San Francisco in 1968, the mouse’s name is derived from the device’s shape, which is a bit like a mouse, with the cord to the computer being the tail. 8 The mouse went public in 1984 with the introduction of the Apple Macintosh. (• See the timeline, Panel 5.4. ) Once Microsoft Windows 3.1 made the GUI the PC standard, the mouse also became a standard input device. • How the mouse works: When the mouse is moved, a ball inside the mouse touches the desktop surface and rolls with the mouse. Two rollers inside the mouse touch the ball. One of the rollers detects motions in the x direction, and the other roller detects motions in the y direction (90 degrees opposite from the x direction). The rollers connect to a shaft that spins a disk with holes in it. On either side of the disk there is an infrared light-emitting diode (LED) and an infrared sensor. The holes in the disk break the beam of light coming from the LED so that the infrared sensor sees pulses of light. A processor chip in the mouse reads the pulses and turns them into binary data that the computer can understand. The chip sends the data to the computer through the mouse cord (serial, USB, or PS/2) or through a wireless connection (infrared or radio transmission). • Mechanical versus optical mouse: A mouse pad—a rectangular rubber/foam pad—provides traction for the traditional mouse, often called a mechanical mouse or a wheeled mouse. Newer mice are optical; that is, they use laser beams and special chips to encode data for the computer. Optical mice have no moving parts, have a smoother response, and don’t require a mouse pad. Mouse on a mouse pad—the cord looks a bit like a tail. Abacus is invented in Babylonia 3000 BCE 1642 First mechanical adding machine (Blaise Pascal) Slide rule invented (Edmund Gunther) 1621 CE Late 1700s First attempts to produce human speech by machine made by Ch.G. Kratzenstein, professor of physiology in Copenhagen—he produced vowel sounds using resonance tubes connected to organ pipes; Wolfgang von Kempelen produces the first mechanical speaking machine in Vienna The first mass- produced calculator, the Thomas Arithnometer 1820 First photographic image 1814 panel 5.4 Timeline: developments in input/output Hands-Free Mice If your mouse is causing arm and wrist pain, you could try the hands-free voice mouse models at: www.fentek-ind.com/ergmouse. htm Microsoft IntelliMouse
  285. Hardware: Input & Output 261 • Mouse pointers and buttons:

    The mouse pointer —an arrow, a rectangle, a pointing finger—is the symbol that indicates the position of the mouse on the display screen or that activates icons. When the mouse pointer changes to the shape of an I-beam, it shows the place where text may be inserted or selected for special treatment. On the top side of the mouse are one to five buttons. The first button is used for common functions, such as clicking and dragging. The functions of the other buttons are determined by the software you’re using. Some mice have a scroll wheel on top to make it easier for you to scroll down the screen. • Specialty mice: Many specialty mice versions are available. For example, the APC Biometric Mouse has a sensor that reads the user’s index fingerprint and keeps unauthorized people from using the system. William Austin patents the first workable typewriter in America 1829 First microphone 1821 1876 A. G. Bell patents the electric telephone 1877 Thomas Edison patents the phonograph 1844 Samuel Morse sends a telegraph message from Washington to Baltimore 1843 World’s first computer programmer, Ada Lovelace, publishes her notes; facsimile transmission (faxing) over wires invented by Alexander Bain, Scottish mechanic (via telegraph wires) Top Bottom Left button Roller ball Cable Right button Scroll button Arrow I-beam Mouse mechanics. ( Left ) Basic parts of a mouse. ( Center ) Inside a mouse; the processor chip is just below the ball. The rollers are to the top right and bot- tom left of the ball. ( Right ) The light-emitting diode (LED) shines through the bottom of the mouse. Survival Tip Setting Mouse Properties From the Start menu in Win- dows, go to Settings, Control Panel, Mouse to get a dialog box with several tabs that allow you to set mouse proper- ties, such as setting the mouse buttons for left-handed use, adjusting the speed at which the pointer moves across the screen, and changing the shape of the mouse pointer.
  286. 262 Chapter 5 Interlinks Electronics makes the DuraPoint Mouse the

    “world’s toughest mouse,” with stainless-steel casing that can survive almost anything, including being dropped five stories, being used as a hockey puck, and being run over by an 18-wheel truck. Immune to liquids, gases, dirt, and dust, the DuraPoint is ideal for industrial, manufacturing, and field- computing environments and any home with especially curious kids. Boost Technology’s Tracer mouse can be used by people who have trouble using their hands. It’s worn on and controlled by the head via a tiny gyroscope and radio waves. VARIATIONS ON THE MOUSE: TRACKBALL, POINTING STICK, & TOUCH- PAD There are three main variations on the mouse. (• See Panel 5.5. ) • Trackball: The trackball is a movable ball, mounted on top of a stationary device, that can be rotated using your fingers or palm. In fact, the trackball looks like the mouse turned upside down. Instead of moving the mouse around on the desktop, you move the trackball with the tips of your fingers. A trackball is not as accurate as a mouse, and it requires more frequent cleaning, but it’s a good alternative when desktop space is limited. Trackballs come in wired and wireless versions, and newer optical trackballs use laser technology. 1924 T.J. Watson renames Hollerith’s machine company, founded in 1896, to International Business Machines (IBM); first political convention photos faxed via AT&T telephone fax technology 1898 First telephone answering machine 1927 The first electronic TV picture is transmitted 1897 Karl Ferdinand Braun, German physicist, invents the first cathode- ray tube (CRT), the basis of all TV and computer monitors 1912 Motorized movie camera replaces hand-cranked movie camera Pros Cons Mouse Trackball Touchpad • Relatively inexpensive • Very little finger movement needed to reach buttons • Uses less desk space than mouse • Requires less arm and hand movement than mouse • Small footprint • Least prone to dust • Needs little cleaning • When gripped too tightly can cause muscle strain • Uses more desk space than other pointing devices • Must be cleaned occasionally • Wrist is bent during use • More finger movement needed to reach buttons than with other pointing devices • Requires frequent cleaning because of finger oils • Places more stress on index finger than other pointing devices do • Small active area makes precise cursor control difficult panel 5.5 Mouse, trackball, touchpad Trackball
  287. Hardware: Input & Output 263 • Pointing stick: A pointing

    stick looks like a pencil eraser protruding from the keyboard between the G, H, and B keys. When you move the pointing stick with your finger, the screen pointer moves accordingly. IBM developed the pointing stick for use with its notebook computers. (A forerunner of the pointing stick is the joystick, which consists of a vertical handle like a gearshift lever mounted on a base with one or two buttons.) • Touchpad: A touchpad is a small, flat surface over which you slide your finger, using the same movements as you would with a mouse. The cursor follows the movement of your finger. You “click” by tapping your finger on the pad’s surface or by pressing buttons positioned close by the pad. Touchpads are most often found on laptop computers, but freestanding touchpads are available for use with PCs. TOUCH SCREEN A touch screen is a video display screen that has been sensitized to receive input from the touch of a finger. (• See Panel 5.6. ) The specially coated screen layers are covered with a plastic layer. Depending on the type of touch screen, the pressure of the user’s finger creates a connection of electri- cal current between the layers, decreases the electrical charge at the touched point, or otherwise disturbs the electrical field. The change in electrical current creates a signal that is sent to the computer. You can input requests for information by pressing on displayed buttons or 1931 Reynold B. Johnson, a Michigan high- school science teacher, invents a test-scoring machine that senses conductive pencil marks on answer sheets 1939 First electrical speech-producing machine— New York World’s Fair; computer technology takes over speech synthesis in about 1970 1944 First electro- mechanical computer (Mark I) 1959 General Electric produces the first system to process checks in a banking application via magnetic-ink character recognition (MICR) 1936 Bell Labs invents the voice- recognition machine 1946 First programmable electronic computer in United States (ENIAC) Touchpad Pointing stick panel 5.6 Touch screens ( Left ) Touch screen menus at a Holiday Inn restaurant; they can keep track of the charges, as well as the carbs and the calories. ( Right ) Touch screen used to operate a sewing machine.
  288. 264 Chapter 5 menus. (• See Panel 5.7. ) The

    answers to your requests are then output as displayed words or pictures on the screen. (There may also be sound.) Already found in ATMs, Apple iPhones, and campus information kiosks, touch screens look very much like the wave of the future. Hewlett-Packard, Dell, Asus- Tek, and others are producing several touch-screen products, using the same type of finger-tapping interface made popular by the iPhone. 9 One is AsusTek’s Eee Top touch-sensitive computer designed for use in kitchens, which are gener- ally not friendly to computers. 10 Microsoft has added touch-screen capabilities to its latest operating system, Windows 7. Touch screens have become standard for Global Positioning System devices, e-book readers, and most especially cell- phones. 11 Incidentally, women with long fingernails will find that nails hitting the screen don’t work; you have to use the flesh part of the finger. 12 PEN INPUT Some input devices use variations on an electronic pen. Examples are pen-based systems, light pens, digitizers, and digital pens: • Pen-based computer systems: Pen-based computer systems allow users to enter handwriting and marks onto a computer screen by means of a penlike stylus rather than by typing on a keyboard. A stylus is a penlike device that is used to write text or draw lines on a touch- sensitive surface as input to a computer. Pen computers use handwriting- recognition software that translates handwritten characters made by the stylus into data that is usable by the computer. Handwriting recognition refers to the ability of a computer to receive intelligible written input. The system requires special software that interprets the movements of the stylus across the writing surface and translates the resulting cursive writing into digital information. (Alternatively, written text may be 1963 Ivan Sutherland uses the first interactive computer graphics in his Ph.D. thesis, which used a light pen to create engineering graphics 1970 Microprocessor chips come into use; floppy disk introduced for storing data; barcodes come into use; the daisy wheel printer makes its debut 1967 Hand- held calculator 1968 World debut of the computer mouse, in development since 1965 by Doug Engelbart at Stanford Research Institute (SRI) 1962 Bell Laboratories develops software to design, store, and edit synthesized music 1960 DEC introduces the PDP-1, the first commercial computer with a monitor for output and a keyboard for input panel 5.7 Touch-screen menus (Left) Touch-screen menu on a self-scanning checkout system. (Right) Touch-screen voter’s ballot. Survival Tip Games & Wireless Input If you’re a serious game fan, you’re advised to stick with wired input devices. Wireless devices tend to lag during data transmission, which will slow down your game response. (The lag time is called latency. )
  289. Hardware: Input & Output 265 scanned from a piece of

    paper, using optical character recognition, as we describe in the next section.) Handwriting recognition is com- monly used as an input method for PDAs. Earlier attempts to allow written input—the Apple Newton, IBM’s Think- pad tablet computer, and Microsoft Windows for Pen—were not commercially successful. Then Palm launched a successful series of PDAs based on the Graf- fiti recognition system. A currently successful handwriting-recognition system is Microsoft’s version of the Windows operating system for the Tablet PC. The Tablet PC is Microsoft’s version of a tablet PC, a special notebook computer outfitted with a digitizer tablet and a stylus that allows a user to handwrite text on the unit’s screen. (• See Panel 5.8. ) A Mac version is the Modbook from Axiotron. 13 A stylus can take the place of a keyboard when users use an on-screen input panel or tap letters and numbers directly on an on-screen key- board. Some tablets (such as ViewSonic and Motion Computing) also include a standard keyboard so that the computer can function as a laptop when the screen is repositioned. We discuss tablet PCs further in Chapter 7. Although handwriting recognition has become a popular input form, it is still generally accepted that keyboard input is both faster and more reliable. • Light pen: The light pen is a light-sensitive penlike device that uses a wired connection to a computer terminal. The user brings the pen to a desired point on the display screen and presses the pen button, which identifies that screen location to the computer. Light pens are used by engineers, graphic designers, and illustrators. They also are used in the health, food service, and chemical fields in situations in which users’ hands need to be covered. (• See Panel 5.9, next page. ) • Digitizer: A digitizer uses an electronic pen or a mouselike copying device called a puck that can convert drawings and photos to digital 1974 Simple version of optical character recognition (OCR) developed 1976 IBM develops the ink-jet printer 1973 The Alto, an experimental PC that uses a mouse and a GUI, is developed at Xerox PARC Apple Macintosh; first personal laser printer 1984 Dragon speech- recognition program recognizes 30,000 words; SVGA video standard 1990 panel 5.8 Pen-based computer systems Handheld tablet PCs
  290. 266 Chapter 5 data. One form of digitizer is the

    digitizing tablet, used in engineering and architecture applications, in which a specific location on an electronic plastic board corresponds to a location on the screen. (• See Panel 5.10. ) • Digital pen: A digital pen is a writing instrument that allows users to write on paper and send the writing as an image file to the computer. (• See Panel 5.11. ) Basically, there are two kinds of digital pens. The first version, such as Logitech’s Io pen and Leapfrog’s FLY Fusion pen, Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; web browser invented 1994 Wireless monitors available for certain industrial applications 2004 Wireless desktop printers commercially available 2005 TV can output odors; Full voice interaction with PCs; Digital X-ray glasses 2011? Thought recognition as everyday input means 2016? panel 5.9 Light pen This person is using a light pen to input medi- cal information to the computer. panel 5.10 Digitizing tablet Such tablets are often used in engineer- ing and architectural applications. panel 5.11 Handwritten notes via electronic pen
  291. Hardware: Input & Output 267 requires you to write on

    special paper that’s been printed with millions of nearly invisible microdots. A tiny camera in the pen tip learns its position, and a microchip in the pen converts the pen to digital ink, which can be transmitted to a PC. 14 Recent pens such as the LiveScribe Pulse and the Nokia Digital Pen SU-27W also require special paper. 15 The second version, such as the Mobile Digital Scribe, doesn’t need preprinted paper. Instead, you attach a small “clip” with an LCD screen to your standard paper notepad, and the pen signals its position to the clip using ultrasonic pulses and invisible infrared light. You then connect the clip to your computer to transfer the notes. 16 Scanning & Reading Devices How is source data entry different from keyboard entry? In old-fashioned grocery stores, checkout clerks read the price on every can and box and then enter those prices on the keyboard—a wasteful, dupli- cated effort. In most stores, of course, the clerks merely wave the products over a scanner, which automatically enters the price (from the bar code) in digital form. This is the difference between keyboard entry and source data entry. Source data-input devices do not require keystrokes (or require only a few keystrokes) to input data to the computer. In most cases, data is entered directly from the source, without human intervention. Source data-entry devices create machine-readable data on magnetic media or paper or feed it directly into the computer’s processor. One type of source data- entry device includes scanning and reading devices— scanners, bar-code readers, mark- and character-recognition devices, and fax machines. SCANNERS Scanners, or optical scanners, use light-sensing (optical) equipment to translate images of text, drawings, photos, and the like into digital form. (• See Panel 5.12, next page. ) The images can then be pro- cessed by a computer, displayed on a monitor, stored on a storage device, or transmitted to another computer. Scanners have led to a whole new industry called electronic imaging, the software- controlled integra tion and manipulation of separate images, using scanners, digital cameras, and advanced graphic computers. This technology has become invaluable for all kinds of reasons, such as to digitize and preserve Survival Tip Can Your PC Connect Your New Scanner? No USB ports on your PC? Then no USB scanner. Connec- tions must be compatible. How FLY Fusion works; it uses special paper to enable the pen to track positions of characters ( www.leap frog.com/en/ families/fly_fusion/learning_ systems/ff_Pentop.html ). FLY Fusion™ Pentop Computer The FLY Fusion Pentop Computer works only with FLY™ Paper. FLY paper and software sold separately. FLY Fusion Pentop Computer is not compatible with FLY 1.0 products. When you write with the FLY Fusion™ Pentop Computer on FLY™ Paper, everything is automatically captured and digitized. You can then upload it to your PC and convert to a document. Touch your pentop computer to FLY Paper, and you can quiz yourself on history, get help with a quar- dratic equation, or even play your favorite MP3. And when you’re ready for new software, simply connect to your PC again to purchase and download custom homework and gaming applications directly to your FLY Fusion Pentop Computer. Finally, technology designed for your Life, School, Music and Fun! This is Pentop Computing, the next generation of high-speed digital processing, developed to deliver high-speed homework help—in the palm of your hand.
  292. 268 Chapter 5 old books and manuscripts (for example, rel-

    ics from the golden age of Timbuktu) that would otherwise fall into decay. 17 PC users can get a decent scanner with good software for less than $100 or a fantastic one for about $1,000. • Dots and bitmaps: Scanners are similar to photocopy machines except they create electronic files of scanned items instead of paper copies. The system scans each image—color or black and white—with light and breaks the image into rows and columns of light and dark dots or color dots. Dots are stored in computer memory as digital code called a bitmap, a grid of dots. A dot is the smallest identifiable part of an image, and each dot is represented by one or more bits. The more bits in each dot, the more shades of gray and the more colors that can be represented. The amount of information stored in a dot is referred to as color depth, or bit depth. Good scanners have a 48-bit color depth. • Resolution: Scanners vary in resolution. In general, resolution refers to the clarity and sharpness of an image and panel 5.12 Image scanners ( Left ) Desktop scanner used in desktop publish- ing. ( Right ) Handheld scanner used to scan information from a hospi- tal patient’s ID bracelet. • In scanner resolution, the first number is the number of sensors the scanner uses to capture the image. The sec- ond number is the number of points the scanner stops at. The two numbers are usually the same. • Look for a high first number. Because the first number measures the number of sensors, it's the more impor- tant number. Some scanners will advertise a resolution of 1,200 by 2,400, but these scanners do not necessar- ily produce a higher quality image than a scanner with a resolution of 1,200 by 1,200. • Consider the resolution of your printer before buying a scanner. If you're scanning images primarily to print them, note the resolution of your printer. Purchasing a scan- ner with a higher resolution than your printer is a waste, because the quality of your images will be limited by your printer. • Settle for a 300 by 300 resolution scanner for text. If you need to capture only text with your scanner, you can save some money and get a low-end scanner with a low resolution. • Move up to a 600 by 600 resolution scanner for most image applications. While more expensive scanners offer resolutions of 1,200 by 1,200 or 2,400 by 2,400, a resolu- tion of 600 by 600 is adequate for capturing images for quality 4 by 6 or 5 by 7 prints. • Get a 1,200 by 1,200 or greater scanner only if you need to capture large images. Resolutions this high are not necessary unless you need to print 8 by 10 or larger images. (Adapted from www.ehow.com/how_2105727_choose- scanner-resolution.html) Choosing a Scanner
  293. info! more Hardware: Input & Output 269 is measured in

    dots per inch (dpi) —the number of columns and rows of dots per inch. The higher the number of dots, the clearer and sharper the image—that is, the higher the resolution. Popular color desktop scanners currently vary in dpi from 300 ϫ 200 up to 2,400 ϫ 2,400; some commercial scanners operate at 4,800 ϫ 9,600 dpi. The quality of the scanner’s optical equipment also affects the quality of the scanned images. • Types of scanners: One of the most popular types of scanners is the flatbed scanner, or desktop scanner, which works much like a photocopier—the image being scanned is placed on a glass surface, where it remains stationary, and the scanning beam moves across it. Three other types of scanners are sheet-fed, handheld, and drum. The four types are compared below. (• See Panel 5.13. ) Other single-purpose scanners are available, such as business-card, slide, and photo scanners. There are even scanner pens, such as the DocuPen, that can scan text from books and articles. BAR-CODE READERS On June 26, 1974, a customer at Marsh’s Supermarket in Troy, Ohio, made the first purchase of a product with a bar code—a pack of Wrigley’s Juicy Fruit chewing gum (which pack is now in the Smithsonian National Museum of National History in Washington, D.C.). Bar codes are the vertical, zebra-striped marks you see on most manufactured retail products —everything from candy to cosmetics to comic books. (• See Panel 5.14, next page. ) In North America, supermarkets, food manufacturers, and others have agreed to use a bar-code system called the Universal Product Code (UPC), established by the Uniform Code Council (UCC). Other kinds of bar-code systems are used on everything from FedEx and Postal Service packages to railroad cars, video-store videos, and the jerseys of long-distance runners. • Bar-code readers: Bar-code readers are photoelectric (optical) scanners that translate the symbols in the bar code into digital code. In this system, the price of a particular item is set within the store’s computer. Once the bar code has been scanned, the corresponding price appears on the salesclerk’s point-of-sale terminal and on your receipt. Records of sales from the bar-code readers are input to the store’s computer and used for accounting, restocking store inventory, and weeding out products that don’t sell well. “Want to skip long lines?” asks one writer. “Be your own cashier.” 18 The reference is to self-scanning, which is becoming increasingly available in What Is TWAIN? Maybe “Technology Without An Interesting Name”? It’s a driver that’s a go-between for a scanner and the applications on the computer. Borrowing from a Rudyard Kipling poem (“and never the twain [that is, two] shall meet,” about East- ern and Western cultures), someone used the word TWAIN to express the difficulty, at the time, of connecting scan- ners and personal computers, although this is no longer the case. Do a web search for TWAIN. When was it developed, and how does it work? Flatbed: Costs $60–$400. The type most PC users have. Operates like a photocopier—image lies atop glass, which is scanned by scanning beam. Useful for single-sheet documents, books, photos. Some models scan transparencies, slides. Sheet-fed: Costs $300–$500. Also popular for desktops because of compact size, which is smaller than flatbed. Operates similarly except sheet with image being scanned is fed into a slot and drawn past sensor. Useful only for single-page documents, photos; some accept slides. Handheld: Costs $130–$160. Popular for use in factory and field settings and student and research use because of portability. Handheld scanners are physically dragged by hand across a document. Most models are pen-shaped and scan in swaths 5 inches wide or less, and special software “knits” strips of images together into a complete image. Some models translate single words into other languages. Images can be transmitted to a PC, PDA, or cellphone via serial, infrared (IR), or USB connection. Drum: Costs in tens of thousands of dollars. Used by publishing industry to capture extremely detailed images. Image to be scanned is mounted on a glass cylinder, inside of which are sensors (photomultiplier tubes) that convert light signals into digital images. panel 5.13 Types of scanners compared
  294. 270 Chapter 5 stores throughout the United States. Do-it- yourself

    checkout is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance. The self-scanning checkout lane looks like a traditional checkout lane except that the shopper interacts with a computer’s user interface instead of a store employee. (• See Panel 5.15. ) Self-scanning has become popular in Walmart, Home Depot, Kroger, and many other name-brand stores. The next evolution in bar codes and groceries is the Ikan, a countertop appliance designed to eliminate trips to the grocery store. This device, which has a laser scanner and a Wi-Fi antenna that connects to your home wireless network, enables you to scan the bar code of an empty container, panel 5.14 Bar code and bar-code reader This bar-code reader is being used to update inventory, by scanning in the information on the stickers put on the boxes coming into the warehouse. panel 5.15 Self-Scanning System The NCR FastLane self- service scanning system allows consumers to check themselves out of the supermarket. The shopper begins the process by touching the computer’s welcome screen. Then the com- puter’s voice output pro- vides the shopper with instructions about how to scan the items and where to place them once they’ve been scanned. When the shopper scans in an item, the item’s bar code provides the computer with the infor- mation it needs to deter- mine what item is being scanned, its weight, and its price. The system also deactivates any security tags on the items. The shopper places the items in shopping bags sitting on security scales, so the system can check that heavy items were not substituted for light ones.
  295. info! more Hardware: Input & Output 271 whether it’s for

    milk, paper towels, or dog food; this enters the product into a database. After a few days of entering products, you can review your list online (at Ikan.net), then click to have everything delivered to your house at a time of your choosing. 19 TYPES OF BAR CODES Bar codes may be 1-D, 2-D, or 3-D. • 1-D codes, today’s ordinary vertical bar codes, can hold up to 16 ASCII characters. These are the bar codes commonly used by supermarkets. • 2-D bar codes, composed of different-size rectangles, with data recorded along both the height and the length of each rectangle, can hold 1,000–2,000 ASCII characters. 2-D codes are used on medication containers and for other purposes in which there is limited space for a bar-code label. Shipping company UPS uses a special 2-D bar code (based on hexagons). Many airlines now use 2-D bar codes on boarding passes that passengers can display on cellphones instead of paper documents. 21 A new use for this bar code is as a label on packages of fruit, so that customers can locate the farms that grew the fruit and find out their location and records of food safety. 20 And new 2-D bar codes (such as those created by ScanLife and Jagtag) are being rushed out that can be photographed with your cellphone camera, so that it acts as a magic wand to extract digital content from a variety of objects, such as magazine articles. 22 • 3-D bar codes, used on items such as automobile tires, are called “bumpy” bar codes because they are read by a scanner that differentiates by symbol height. 3-D codes are used on metal, hard rubber, and other surfaces to which ordinary bar codes will not adhere. Soon store 1-D bar codes may yield to so-called smart tags, radio- frequency identification (RFID) tags already now employed for the tracking of cattle or of electronic components in a warehouse. We discuss RFID on page 279. MARK-RECOGNITION/CHARACTER-RECOGNITION DEVICES There are three types of scanning devices that sense marks or characters. They are usually referred to by their abbreviations—MICR, OMR, and OCR: • Magnetic-ink character recognition: Magnetic-ink character recognition (MICR) is a character-recognition system that uses magnetizable ink and special characters. When an MICR document needs to be read, it passes through a special scanner that magnetizes the special ink and then translates the magnetic information into characters. MICR technology is used by banks. Numbers and characters found on the More Types of Bar Codes What are these proprietary bar codes used for: Aztec Code, Data Matrix, Code 1, Snowflake Code, QR Code? Go to: www.adams1.com/pub/ russadam/stack.html and find out. Conventional 1-D bar code 2-D bar code Maxicode is a 2-D bar code used by United Parcel Service (UPS). The ModelMaker 3-D scanning system can scan all types of surfaces in all sorts of lighting. It is used, among other things, to scan cars and motorcycles, or specific compo- nents, into a CAD/CAM system so that new models can be created.
  296. 272 Chapter 5 bottom of checks (usually containing the check

    number, sort number, and account number) are printed with a laser printer that accepts MICR toner. MICR provides a secure, high-speed method of scanning and processing information. • Optical mark recognition: Optical mark recognition (OMR) uses a special scanner that reads “bubble” marks and converts them into computer-usable form. The best-known example is the OMR technology used to read students’ answers to the College Board Scholastic Aptitude Test (SAT) and the Graduate Record Examination (GRE). In these cases, the scanner reads pencil marks that fill in circles, or bubbles, on specially designed documents. OMR is also used in forms and surveys. • Optical character recognition: These days almost all scanners come with OCR software. Optical character recognition (OCR) software converts scanned text from images (pictures of the text) to an editable text format (usually ASCII) that can be imported into a word processing application and manipulated. Special OCR characters appear on utility bills and price tags on department-store merchandise. The wand reader is a common OCR scanning device. (• See Panel 5.16. ) OCR software can deal with nearly all printed characters, but script fonts and handwriting still present problems. In addition, OCR accuracy varies with the quality of the scanner—a text with 1,200 dpi will take longer to scan than one with 72 dpi, but the accuracy will be higher. Some OCR programs are better than others, with lesser versions unable to convert tables, boxes, or other extensive formatting; high-quality OCR software can read such complex material without difficulty. Users wanting to scan text with foreign-language (diacritical) marks, such as French accents, should check the OCR package to see if the program can handle this. FAX MACHINES A fax machine —or facsimile transmission machine —scans an image and sends it as electronic signals over telephone lines to a receiving fax machine, which prints out the image on paper. There are two types of fax machines—dedicated fax machines and fax modems: • Dedicated fax machines: Dedicated fax machines are specialized devices that do nothing except send and receive fax documents. These are what we usually think of as fax machines. They are found not only in offices panel 5.16 Optical character recognition OCR is often used in stores to encode and read price tags. A hand- held wand is used as a reading device.
  297. Hardware: Input & Output 273 and homes but also alongside

    regular phones in public places such as airports. • Fax modems: A fax modem is installed as a circuit board inside the computer’s system cabinet. It is a modem with fax capability that enables you to send signals directly from your computer to someone else’s fax machine or computer fax modem. With this device, you don’t have to print out the material from your printer and then turn around and run it through the scanner on a fax machine. The fax modem allows you to send information more quickly than you could if you had to feed it page by page into a machine. The fax modem is another feature of mobile computing; it’s especially powerful as a receiving device. Fax modems are installed inside portable computers, including pocket PCs and PDAs. If you link up a cellular phone to a fax modem in your portable computer, you can send and receive wireless fax messages no matter where you are in the world. Why, you might wonder, does fax technology still exist in the era of email? Although email is certainly faster and cheaper (in terms of the cost of supplies), the fax machine is still more reliable, more secure, and cheaper in its equipment cost (a fax machine costs only $100 whereas the cost of a computer and monitor is more). 23 Audio-Input Devices What are ways of digitizing audio input? An audio-input device records analog sound and translates it for digital storage and processing. An analog sound signal is a continuously variable wave within a certain frequency range. For the computer to process them, these variable waves must be converted to digital 0s and 1s. The principal use of audio-input devices is to produce digital input for multimedia computers. TWO WAYS OF DIGITIZING AUDIO An audio signal can be digitized in two ways—by a sound board or a MIDI board: • Sound board: Analog sound from a cassette player or a microphone goes through a special circuit board called a sound board. A sound board is an add-on circuit board in a computer that converts analog sound to digital sound and stores it for further processing and/or plays it back, providing output directly to speakers or an external amplifier. • MIDI board: A MIDI board — MIDI, pronounced “middie,” stands for “Musical Instrument Digital Interface”—uses a standard for the interchange of musical information between musical instruments, synthesizers, and computers. MICROPHONES Also supporting audio input are microphones, devices that take varying air pressure waves created by voice or other sound sources and convert them into varying electric signals. Many new microcomputers and notebooks come with built-in microphones; stand-alone microphones can be connected via USB or some other connection. Microphones are used in speech-recognition input (discussed on page 276). Webcams & Video-Input Cards What are my options in video input? Are you the type who likes to show off for the camera? Maybe, then, you’d like to acquire a webcam, a video camera attached to a computer to record live moving images that can then be posted on a website in real time. Dedicated fax machine Fax modem circuit board, which plugs into an expansion slot inside the computer PC fax modem card, which plugs into a USB port on a notebook computer
  298. info! more 274 Chapter 5 (• See Panel 5.17. )

    Webcam connections require special software, usually included with the camera, and a USB or video cable or a wireless radio- frequency connection. Initially intended for personal videoconferencing, the webcam has become popular with web users. You can join thousands of other webcam users out there who are hosting such riveting material as a live 24-hour view of the aquarium of a turtle named Pixel. Or you might show your living quarters or messy desk for all to see. Twenty20’s VholdR Helmet Camera Camcorder is a digital video camera with a lens that straps onto your helmet—perfect for cap- turing your moves as you ski down a black-diamond trail. As with sound, most film and videotape traditionally has been in analog form; the signal is a continuously variable wave. For computer use, the sig- nals that come from a VCR or camcorder must be converted to digital form through a special digitizing card—a video-capture card or simply video card — that is installed in the computer. There are two types of video cards— frame- grabber and full-motion. FRAME-GRABBER VIDEO CARD The frame-grabber video card can capture and digitize only a single frame at a time. FULL-MOTION VIDEO CARD The full-motion video card can convert analog to digital signals at rates up to 30 frames per second, giving the effect of a con- tinuously flowing motion picture. (• See Panel 5.18. ) Digital Cameras How does a digital camera differ from a film camera? Digital cameras, which now greatly outsell film cameras in the United States, are particularly interesting because they have changed the entire industry of photography. The environmentally undesirable stage of chemical development required for conventional film is completely eliminated. Instead of using traditional (chemical) film, a digital camera uses a light- sensitive processor chip to capture photographic images in digital form and store them on a small diskette inserted into the camera or on flash memory cards. (• See Panel 5.19. ) The bits of digital information can then be copied right into a computer’s hard disk for manipulation, emailing, posting on websites, and printing out. Many digital cameras can be connected to a computer by a USB or FireWire connection (discussed in Chapter 6), so your computer’s operating system panel 5.17 Webcam in use The cameras are mounted on the top of the screens. Coffee Pot Cam The first webcam was the “Trojan room coffee pot cam.” What was this? Search the web to find out. Survival Tip Your Choice: More Colors or More Resolution? You can’t have the best of both. A video card may let you have 16.8 million col- ors at 800 ϫ 600 resolu- tion or 65,536 colors at 1,600 ϫ 1,200 resolution.
  299. Hardware: Input & Output 275 Video card 1010101 Digital video

    Display Storage Analog camera Analog videotape Full-motion video is accomplished by taking multiple pictures in sequence. Movie theater film uses 24 frames per second, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. TV video generates 30 interlaced frames per second, which is actually transmitted as 60 half frames (“fields” in TV lingo) per second. Video that has been digitized and stored in the computer can be displayed at varying frame rates, depending on the speed of the computer. The slower the computer, the jerkier the movement. Video input: Analog to Digital panel 5.18 How analog video input is changed to digital form Light Light enters the camera through the lens. Interface cable connects to computer A look at CCDs Smallest CCD Memory Light-sensitive photosite The smallest CCDs are 1/8 the size of a frame of 35mm film. The largest are the same size as a 35mm frame. Lower-end cameras start with 180,000 photosites. Professional cameras can have up to 6 million photosites. CCD detail The light is focused on the charge-coupled device (CCD), a solid-state chip made up of tiny, light-sensitive photosites. When light hits the CCD, it records the image electronically, just like film records images in a standard camera. The photosites convert light into electrons, which are then converted into digital information. The digital information is stored in the camera’s electronic memory, either built-in or removable. Using an interface cable, the digital photo can be downloaded onto a computer, where it can be manipulated, printed, placed on a web page, or emailed. 1 2 3 4 panel 5.19 Digital cameras and how they work ( Below ) This digital cam- era is attached to a desk- top computer in order to download its images to the computer.
  300. info! more 276 Chapter 5 must support these connections to

    recognize the camera’s driver. Most cam- eras store picture data on flash memory cards and memory sticks, from which later you can transmit photo data to your computer through a USB cable. Popular software applications for sophisticated digital photo manipulation include Adobe Photoshop, Corel Snapfire, Jasc Paint Shop Pro, and Microsoft Picture It! Digital Image Pro. CAMERA CAVEATS Three facts that all digital-camera users should be aware of: • Don’t use the “delete” function: Instead of using a camera’s “delete” function to remove images you don’t want from the camera’s memory card each night, you should download all the images to your computer and then reformat the card. This will prevent possible fragmentation and loss of your pictures. • Use a photo shop for printing: Photos printed out on standard computer printers do not last nearly as long as photos printed in the usual manner— that is, by a photo shop on good-quality paper. • Be aware of limitations of storage media: If you store your photos on such secondary storage media as CDs, be aware that such media may very well not be usable by information technology equipment 20 or 30 years from now. CAMERA PHONES Digital-camera tech- nology has, of course, migrated to cell- phones (which can also be used for web surfing, playing games, and download- ing music), enabling you to visually share your vacation experiences in real time. You compose the shot on your phone’s color LCD screen, point and shoot, then wait a minute or so for the picture to “develop,” and then send it. We discuss camera phones further in Chapter 7. Digital photo in an HP Photo- smart digital camera; the dock sends pictures to the computer. Digital-Camera Resource For more information on digital cameras, go to: www.dcresource.com
  301. Hardware: Input & Output 277 Speech-Recognition Systems How might I

    use a speech-recognition system? Can your computer tell whether you want it to “recognize speech” or “wreck a nice beach”? A speech-recognition system, using a microphone (or a tele- phone) as an input device, converts a person’s speech into digital signals by comparing the electrical patterns produced by the speaker’s voice with a set of prerecorded patterns stored in the computer. (• See Panel 5.20. ) Most of today’s speech-recognition packages have a database of about 200,000 words from which they try to match the words you say. These programs let you accomplish two tasks: turn spoken dictation into typed text and issue oral com- mands (such as “Print file” or “Change font”) to control your computer. Speech-recognition systems have had to overcome many difficulties, such as different voices, pronunciations, and accents. Recently, however, the sys- tems have measurably improved, at least up to a point. 24 Major recognition Output Computer recognizes word string and prints it on the screen. 1. Phonetic Models Describe what codes may occur for a given speech sound. 2. Dictionary Defines the phonetic pronunciation (sequence of sounds) of each word. 3. Grammar Defines what words may follow each other, using parts of speech. In the word how, what is the probability of the “ow” sound appearing between an H and a D? How does it work haw daz it werk How does <it> [work] Signal Processing The sound wave is transformed into a sequence of codes that represent speech sounds. Recognition Search Using the data from 1, 2, and 3, the computer tries to find the best matching sequence of words as learned from a variety of examples. How does it work? A person who’s going to use speech recognition software must first go through an enrollment. This consists of the person dictating text that is already known to the software for 10 minutes to an hour. From this sampling, the software creates a table of vocal references, which are the ways in which the speaker’s pronunciation of phonemes varies from models of speech based on a sampling of hundreds to thousands of people. Phonemes are the smallest sound units that combine into words, such as “duh,” “aw” and “guh” in “dog.” There are 48 phonemes in English. After enrollment, the speaker dictates the text he wants the software to transcribe into a microphone, preferably one that uses noise-cancellation to eliminate background sounds. The quality of the microphone and the computer’s processing power are the most important hardware factors in speech recognition. The speaker can use continuous speech, which is normal speech without pauses between words. Speech adv vt pron v How does it work? panel 5.20 How a speech- recognition system works
  302. 278 Chapter 5 systems are Dragon Naturally Speaking and speech-recognition

    software built into Windows Vista. 25 Other systems are ScanSoft and Nuance, Fonix Speech, Aculab, and Verbio. Special speech-recognition software is available for spe- cific professions, such as law, medicine, and public safety. Speech-recognition systems are finding many uses. Warehouse workers are able to speed inventory taking by recording inventory counts verbally. Traders on stock exchanges can communicate their trades by speaking to computers. Radiologists can dictate their interpretations of X rays directly into transcrip- tion machines. Nurses can fill out patient charts by talking to a computer. Users can do online voice searches on their cellphones, using programs such as Google Mobile App, Yahoo OneSearch with Voice, Vlingo, and ChaCha. 26 Speakers of Chinese can speak to machines that will print out Chinese char- acters. And for many individuals with disabilities, a computer isn’t so much a luxury or a productivity tool as a necessity, providing freedom of expression, independence, and empowerment. Sensors What are various kinds of uses for sensors? A sensor is an input device that collects specific data directly from the environment and transmits it to a computer. Although you are unlikely to see such input devices connected to a PC in an office, they exist all around us, often in nearly invisible form and as part of some larger electronic system. Sensors can be used to detect all kinds of things: speed, movement, weight, pressure, temperature, humidity, wind, current, fog, gas, smoke, light, shapes, images, and so on. An electronic device is used to measure a physical quantity such as temperature, pressure, or volume and convert it into an electronic sig- nal of some kind (for instance, a voltage). Adidas markets a running shoe with a sensor that adjusts cushioning for different surfaces. (• See Panel 5.21. ) Building security systems use sensors to detect movement. Sensors are used to detect the speed and volume of traf- fic and adjust traffic lights. They are used on highways in wintertime in Iowa as weather-sensing devices to tell workers when to roll out snowplows and on Interstate 95 to give drivers from New Jersey to North Carolina access to panel 5.21 Sensors ( Left ) On October 9, 2003, the 2,080-pound Liberty Bell made a 963- foot journey to a new home on Independence Mall in Philadelphia. High-tech sensors moni- tored the famous crack, to make sure it did not get larger. ( Right ) The Adidas-1 running shoe was advertised as the world’s first “intelligent shoe.” A microprocessor beneath the arch sends instructions to a small battery-powered motor that adjusts the cushion- ing level of the shoe.
  303. Hardware: Input & Output 279 real-time information on traffic flows,

    crashes, and travel time to help them anticipate delays. 27 In aviation, sensors are used to detect ice buildup on air- plane wings or to alert pilots to sudden changes in wind direction. In Cali- fornia, sensors have been planted along major earthquake fault lines in an experiment to see whether scientists can predict major earth movements. 28 Also in California, environmental scientists have hooked up a network of sen- sors, robots, cameras, and computers to produce an ecological picture of a lush world that is home to more than 30 rare and endangered species. 29 Radio-Frequency Identification Tags Is there any way I could benefit from RFID technology? Radio-frequency identification (RFID) tags are based on an identifying tag bearing a microchip that contains specific code numbers. These code numbers are read by the radio waves of a scanner linked to a database. RFID tags range in size “from small chips on paper labels to palm-size plastic boxes,” in one description. 30 Active RFID tags have their own power source and can transmit signals over a distance to a reader device. Passive RFID tags have no battery power of their own and must be read by some sort of scanner. RFID tags of both types are used for a wide range of purposes. Drivers with RFID tags breeze through tollbooths without having to even roll down their windows; the toll is automatically charged to their accounts. Radio-wave- readable ID tags are also used by the Postal Service to monitor the flow of mail, by stores for inventory control and warehousing, and in the railroad industry to keep track of rail cars. The Food and Drug Administration (FDA) and drug companies are working on tagging popular drugs with RFID devices to guard against counterfeit medicines. The technology is used to make sup- posedly “thiefproof” keys in millions of Fords, Toyotas, and Nissans (although researchers have succeeded in cracking the security). 31 Gambling casinos have put RFID tags inside gambling chips to help them track the betting habits of high rollers. 32 Visa and MasterCard “no-swipe” or “wave-and-pay” credit cards have been developed with embedded RFID technology that means cards don’t have to be swiped across a magnetic-strip reader but can just be waved near a scanner, which could help speed up lines in stores. 33 Walmart has required that all its vendors replace bar codes with RFID technology in order to improve inventory control. In the long run, the tags could end up on every product we buy, so that in the future we will no longer wait for a checkout counter but will breeze past readers that will scan our purchases in milliseconds. 34 Of great significance, all U.S. passports now must have RFID tags embed- ded in them. Machines can read the personal information in these passports— RFID. ( Left, center ) Drivers can buy RFID tags to drive past tollbooths without having to stop; the tolls are automatically charged to their account, usually established with a credit card. FastTrack is a common tollbooth RFID program. ( Right ) RFID tags are starting to replace bar codes.
  304. 280 Chapter 5 aiding customs and immigration officials but also,

    unfortunately making passport information vulnerable to terrorists and other criminals. 35 But con- cerns about the use of RFID technology go beyond this. First, tiny transmitters were installed in things ranging from cars to National Park Service cactuses to help authorities track thefts. 36 Then pet owners began putting RFID tags in their dogs and cats, to allow veterinarians with the right scanning equipment to identify the animals if they became separated from their owners. Then an epidemic of kidnappings led wealthy and some middle-class Mexicans to start implanting geolocator tags that can pinpoint their location by satellite. 37 In the United States, the FDA improved implantation of an implantable chip, the VeriChip, for medical purposes, on the premise that patient-specific information stored in the chip could speed vital information about a person’s medical history. However, privacy advocates fear that the technology could be used to track people’s movements and put sensitive personal information at risk to hackers. “If privacy protections aren’t built in at the outset,” says a policy analyst with the Health Privacy Project, “there could be harmful conse- quences for patients. 38 Human-Biology-Input Devices Have I ever seen biometrics in use? Security concerns following the terrorist attacks of September 11, 2001, on the New York World Trade Center and the Pentagon made more people aware of bio- metrics, the science of measuring individual body characteristics. Biomet- ric security devices identify a person through a fingerprint; hand, eye, or facial characteristics; voice intonation; or some other biological trait. (• See Panel 5.22. ) Hewlett-Packard, Toshiba, and Lenovo have produced notebook comput- ers equipped with biometric sensors that read fingerprints, instead of passwords, before allowing access to networks. 39 A new system helps a U.S. traveler flying overseas avoid customs lines at a foreign airport by swiping a digital ID card embedded with an image of his or her eye to verify the traveler’s identity. 40 5.3 OUTPUT HARDWARE What are the two categories of output hardware, what devices do they include, and what are their features? Computer output gets more innovative all the time. Ready to move up from one screen to two when you’re working at your computer? “As every office worker knows,” writes reporter Farhad Manjoo, “trying to get anything done on a computer that’s connected to the internet can be a test of wills.” 41 ethics panel 5.22 Some types of biometric devices ( Left ) Palm print recog- nition. ( Right ) Screen from a face recognition program.
  305. Hardware: Input & Output 281 With only a single display

    screen, you find yourself switching back and forth between, say, a word processing document, email, and web searches. Multiple monitors reduce distractions. Indeed, a study shows that people who use two display screens, rather than one, are 44% more productive at certain text-editing operations. 42 “The study reveals multi-screen users get on task quicker, work faster, and get more work done with fewer errors edit- ing documents, spreadsheets, and graphic files in comparison with single screen users,” said one of the study authors. 43 A cost-effective arrangement is to get two 22-inch monitors, one placed vertically, the other horizontally. 44 In this section, we discuss monitors and other output hardware, devices that convert machine-readable information, obtained as the result of pro- cessing, into people-readable form. The principal kinds of output are soft- copy and hardcopy. (• See Panel 5.23. ) • Softcopy: Softcopy is data that is shown on a display screen or is in audio or voice form; it exists only electronically. This kind of output is not tangible; it cannot be touched. It’s like music: You can see musical scores and touch CDs and tapes, but the music itself is intangible. Similarly, you can touch floppy disks on which programs are stored, but the software itself is intangible. Soft is also used to describe things that are easily changed or impermanent. In contrast, hard is used to describe things that are relatively permanent. • Hardcopy: Hardcopy is printed output. The principal examples are printouts, whether text or graphics, from printers. Film, including microfilm and microfiche, is also considered hardcopy output. There are several types of softcopy and hardcopy output devices. In the following three sections, we discuss, first, traditional softcopy output — display screens; second, traditional hardcopy output— printers; and, third, mixed output—including sound, voice, and video. Traditional Softcopy Output: Display Screens What are the principal things I need to know to make a good choice of display screen? Display screens —also variously called monitors or simply screens —are output devices that show programming instructions and data as they are being input and information after it is processed. The monitor is the com- ponent that displays the visual output from your computer as generated by the video card. It is responsible not for doing any real computing but rather for showing the results of computing. As with TV screens, the size of a computer screen is measured diagonally from corner to corner in inches. For desktop microcomputers, the most com- mon sizes are 15 inches to 30 inches. For laptop computers, they are 12 inches to 18 inches. Increasingly, computer ads state the actual display area, called the viewable image size (vis), which may be an inch or so less. A 15-inch moni- tor may have a 13.8-inch vis; a 17-inch monitor may have a 16-inch vis. The 22-inch wide display, available for around $200, is fast becoming the industry’s standard. (If you want to run two screens at once, you’ll need to install a video card to get them to work.) Hardcopy Softcopy Softcopy Devices CRT display screens Flat-panel display screen (e.g., liquid-crystal display) Hardcopy Devices Impact printers: dot-matrix printer Nonimpact printers: laser, ink-jet, thermal Other Devices Sound output Voice output Video output panel 5.23 Types of output devices
  306. 282 Chapter 5 In deciding which display screen to buy,

    you will need to consider issues of screen clarity (dot pitch, resolution, color depth, and refresh rate), type of display technology (active-matrix flat panel versus pas- sive-matrix flat panel), and color and resolution standards. SCREEN CLARITY: DOT PITCH, RESOLUTION, COLOR DEPTH, & REFRESH RATE Among the factors affecting screen clarity (often mentioned in ads) are dot pitch, resolution, color depth, and refresh rate. These relate to the individual dots on the screen known as pixels, which represent the images on the screen. A pixel, for “ pict ure el ement,” is the smallest unit on the screen that can be turned on and off or made dif- ferent shades. Pixels are tiny squares, not circles. • Dot pitch: Dot pitch (dp) is the amount of space between the centers of adjacent pixels; the closer the pixels, the crisper the image. For a .25-dp monitor, for instance, the dots (pixels) are 25/100ths of a millimeter apart. Generally, a dot pitch of .25 dp will provide clear images. • Resolution: Here resolution refers to the image sharpness of the display screen; the more pixels, or dots, there are per square inch, the finer the level of detail. As with scanners, resolution is expressed in dots per inch (dpi), the number of columns and rows of dots per inch. The higher the number of dots, the clearer and sharper the image. Resolution clarity is measured by the formula horizontal-row pixels ϫ vertical-row pixels. For example, a 1,024 ϫ 768 screen displays 1,024 pixels on each of 768 lines, for a total of 786,432 pixels. On color monitors, each pixel is assigned some red, some green, some blue, or particular shades of gray. (Note that higher resolutions appear crisper on a small screen and fuzzier on a large screen.) • Color depth: As we said about scanners, color depth, or bit depth, is the amount of information, expressed in bits, that is stored in a dot. The more bits in a dot or pixel, the more shades of gray and colors can be represented. With 24-bit color depth, for example, 8 bits are dedicated to each primary color—red, green, and blue. Eight-bit color is standard for most of computing; 24-bit, called true color, requires more resources, such as video memory. • Refresh rate: Refresh rate is the number of times per second that the pixels are recharged so that their glow remains bright. That is, refresh rate refers to the number of times that the image on the screen is redrawn each second. The higher the refresh rate, the more solid the image looks on the screen—that is, the less it flickers. In general, displays are refreshed 56–120 times per second, or hertz (Hz), with speeds of 70–87 hertz being common. A high-quality monitor has a refresh rate of 90 hertz—the screen is redrawn 90 times per second. A low-quality monitor will be under 72 hertz, which will cause noticeable flicker and lead to headaches and eyestrain. (The measurement hertz was named after the German professor of physics Heinrich Rudolf Hertz [1847–1894], who was the first to broadcast and receive radio waves.) TWO TYPES OF MONITORS: CRT & FLAT PANEL Display screens are of two types: CRT and flat panel. ( Note: Advertise- ments for desktop computers often do not include a monitor as part of the system. You need to be prepared to spend a few hundred dollars extra for the monitor.) (• See Panel 5.24. ) Standard bit depths for color 4-bit—16 colors 8-bit—256 colors 16-bit—65,536 colors 24-bit—10 million colors Larger dot pitch Smaller dot pitch The Letter “ ” Standard monitor resolutions, in pixels 640 ϫ 480 800 ϫ 600 1,024 ϫ 768 1,280 ϫ 1,024 1,600 ϫ 1,200 1,920 ϫ 1,400 These are becoming obsolete panel 5.24 CRT (left) versus flat- panel displays Pixels
  307. Hardware: Input & Output 283 • CRT: A CRT (cathode-ray

    tube) is a vacuum tube used as a display screen in a computer or video display terminal. (• See Panel 5.25. ) The same kind of technology is found not only in older desktop computers but also in older television sets and flight-information monitors in airports. • Flat panel: Compared to CRTs, flat-panel displays are much thinner, weigh less, and consume less power, which is why they are used in portable computers. Flat-panel displays are made up of two plates of glass separated by a layer of a substance in which light is manipulated. One flat-panel technology is liquid crystal display (LCD), in which molecules of liquid crystal line up in a way that alters their optical properties, creating images on the screen by transmitting or blocking out light. CRTs are still cheaper, but flat-panel prices have come down, and they have been matched by technical advances that make flat panels a better choice. The best flat-panel displays can also now do double duty as desktop television sets. ACTIVE-MATRIX VERSUS PASSIVE-MATRIX PANEL DISPLAYS Flat-panel screens are either active-matrix or passive-matrix displays, according to where their transistors are located. • Active matrix: In an active-matrix display, also known as TFT (thin-film transistor) display, each pixel on the flat-panel screen is controlled by its own transistor. Active-matrix screens are much brighter and sharper than passive-matrix screens, but they are more complicated and thus more expensive. They also require more power, affecting the battery life in laptop computers. • Passive matrix: In a passive-matrix display, a transistor controls a whole row or column of pixels on the flat-screen display. Passive matrix provides a sharp image for one-color (monochrome) screens but is more subdued for color. The advantage is that passive-matrix displays are less expensive and use less power than active-matrix displays, but they aren’t as clear and bright and can leave “ghosts” when the display changes quickly. Passive-matrix displays go by the abbreviations HPA, STN, or DSTN. Yoke Electron beam Microprocessor on the motherboard sends digital video data to the video card. Video card converts digital signals to analog signals and sends them via a cable to the monitor (CRT). Screen coated with phosphor dots on the back. Electron gun fires red, green, and blue signals against the phosphor- coated screen. CRT breaks the analog video signals into red, green, and blue signals. panel 5.25 How a CRT works A stream of bits from the computer’s CPU is sent to the electron gun, which converts the bits into electrons. The gun then shoots a beam of elec- trons through the yoke, which deflects the beam. When the beam hits the phosphor coating on the inside of the CRT screen, a number of pixels light up, making the image on the screen. 17” Flat-Panel Display
  308. 284 Chapter 5 COLOR & RESOLUTION STANDARDS FOR MONITORS: SVGA

    & XGA As men- tioned earlier, PCs come with graphics cards (also known as video cards or video adapters ) that convert signals from the computer into video signals that can be displayed as images on a monitor. The monitor then separates the video signal into three colors: red, green, and blue signals. Inside the monitor, these three colors combine to make up each individual pixel. Video cards have their own memory, video RAM, or VRAM, which stores the information about each pixel. The more VRAM you have, which can range from 2 to 64 megabytes, the higher the resolution you can use. Video gamers and desktop publishers (Pho- toshop users) will want a video card with lots of VRAM. The common color and resolution standards for monitors are XGA, SXGA, UXGA, QXGA, WXGA, and WUXGA. (• See Panel 5.26. ) • XGA: XGA (extended graphics array) has a resolution of up to 1,024 ϫ 768 pixels, with 65,536 possible colors. It is used mainly with 15- and 17-inch CRT monitors. It’s useful for simple applications plus spreadsheets and graphics software. • SXGA: SXGA (super extended graphics array) has a resolution of up to 1,280 ϫ 1,024 pixels. It is often used with 15-inch LCD monitors. • UXGA: UXGA (ultra extended graphics array) has a resolution of up to 1,600 ϫ 1,200 pixels and supports up to 16.8 million colors. It is commonly used with 1,280 ϫ 1,024 15- and 17-inch CRT monitors and 17- and 19-inch LCD monitors. Common applications for it include CAD (computer-aided design) and business presentations, such as trade show displays. • QXGA: QXGA (quantum extended graphics array) uses a resolution of up to 2,048 ϫ 1,536 pixels. Still relatively uncommon and very expensive in 2008, QXGA is being used for large LCD screens for computer users needing to view extreme detail in advanced graphics, for businesspeople needing to enlarge images that will still be crisp in big-screen presentations, for high-definition television (discussed in Chapter 7), and for special applications involving viewing multiple images on a single screen. New flat-panel displays • 1,024 x 768 15- and 17-inch CRT monitors: XGA (Extended Graphics Array) • 15-inch LCD monitors: SXGA (Super XGA) • 1,280 x 1,024 15-and 17-inch CRT monitors / 17- and 19-inch LCD monitors: UXGA (Ultra XGA) • 1,600 x 1,200 19-, 20-, 21-inch CRT monitors / 20-inch LCD monitors: QXGA (Quad XGA) • 2,048 x 1,536 21-inch and larger CRT monitors / 1,280 x 800 Wide Aspect 15.4-inch laptops: WXGA (Wide XGA) • 1,680 x 1,050 Wide Aspect 20-inch LCD monitors / 1,920 x 1,200 Wide Aspect 22-inch and larger LCD monitors: WUXGA (Wide Ultra XGA) A single pixel Common Display Standards and Resolutions panel 5.26 Video graphics standards compared for pixels Survival Tip Buying a Flat Panel Defective transistors stuck on or off can cause dead or bright pixels. A couple may not bother you, but check a new screen carefully.
  309. Hardware: Input & Output 285 • WXGA and WUXGA: WXGA

    (wide aspect [wide screen] extended graphics array) and WUXGA (wide aspect ultra extended graphics array) are the newest VGA standards, wide-screen versions of XGA and UXGA. WXGA has a resolution of 1,366 ϫ 768, and WUXGA 1,920 ϫ 1,200; these standards are used with high-definition (HD) TVs and HD movies and with wide-screen notebook computers. Traditional Hardcopy Output: Printers What kind of options do I have in printers? The prices in ads for computer systems often do not include a printer. Thus, you will need to budget an additional $100–$1,000 or more for a printer. A printer is an output device that prints characters, symbols, and perhaps graphics on paper or another hardcopy medium. As with scanners, the resolution, or quality of sharpness, of the printed image is indicated by dots per inch (dpi), a measure of the number of rows and columns of dots that are printed in a square inch. For microcomputer printers, the resolution is in the range of 600 ϫ 600 to 5,760 ϫ 1,440, with 1,200 ϫ 1,200 being most common. Printers can be separated into two categories, according to whether or not the image produced is formed by physical contact of the print mechanism with the paper. Impact printers do have contact with paper; nonimpact printers do not. We will also consider plotters and multifunction printers. IMPACT PRINTERS Impact printers, an old printing technology, are most func- tional in specialized environments where low-cost printing is essential. An impact printer forms characters or images by striking a mechanism such as a print hammer or wheel against an inked ribbon, leaving an image on paper. The most common form of impact printer is the dot-matrix printer. A dot-matrix printer contains a print head of small pins that strike an inked ribbon against paper, to form characters or images. Print heads are available with 9, 18, or 24 pins; the 24-pin head offers the best quality. Dot-matrix print- ers can print draft quality, a coarser-looking 72 dpi; or near-letter-quality (NLQ), a crisper-looking 240 dpi. The machines print 40–300 characters per second and can handle graphics as well as text. Impact printers are the only desktop printers that can use multilayered forms to print “carbon copies.” A disadvantage, however, is the noise they pro- duce, because of the print head striking the paper. Nowadays such printers are more commonly used with mainframes than with personal computers. NONIMPACT PRINTERS Nonimpact printers are faster and quieter than impact printers because no print head strikes paper. Nonimpact printers form char- acters and images without direct physical contact between the print- ing mechanism and paper. Two types of nonimpact printers often used with microcomputers are laser printers and inkjet printers. A third kind, the thermal printer, is seen less frequently. • Laser printers: Like a dot-matrix printer, a laser printer creates images with dots. However, as in a photocopying machine, these images are produced on a drum, treated with a magnetically charged inklike toner (powder), Survival Tip Buying a New Monitor? Be sure it can work with your computer and video card and has enough video RAM to sup- port what you want to do. HP Officejet Pro K5400 Laser printer
  310. 286 Chapter 5 and then transferred from drum to paper.

    (• See Panel 5.27. ) (Laser printers are still sometimes called page printers, because they print one page at a time.) Laser printers run with software called a page description language (PDL) . This software tells the printer how to lay out the printed page, and it supports various fonts. A laser printer comes with one of two types of PDL: PostScript (developed by Adobe) or PCL (Printer Control Language, developed by Hewlett-Packard). In desktop publishing, PostScript is the preferred PDL. Laser printers have their own CPU, ROM, and memory (RAM), usually 16 megabytes (expandable generally up to 512 megabytes for higher-cost printers). When you need to print out graphics-heavy color documents, your printer will need more memory. There are good reasons that laser printers are among the most common types of nonimpact printer. They produce sharp, crisp images of both text and graphics. They are quiet and fast—able to print 11–33 pages per minute (ppm) in color and 10.5–37 black-and-white pages per minute for individual microcomputers and up to 200 pages per minute for mainframes. They can print in different fonts —that is, sets of typestyles and type sizes. The more expensive models can print in different colors. Laser printers usually have a dpi of 1,200 ϫ 1,200. • Inkjet printers: Inkjet printers spray onto paper small, electrically charged droplets of ink from four nozzles through holes in a matrix at high speed. (• See Panel 5.28. ) Like laser and dot-matrix printers, 5 Intense heat is applied by rollers to fuse the toner to the paper. 4 The toner is transferred from the drum to the paper as the drum rotates. 3 The laser alters the electrical charge on the drum, which causes toner, a powdery substance, to stick to the drum. 1 As sheets of paper are fed into the printer, the photosensitive drum rotates. 2 Using patterns of small dots, a laser beam conveys information from the computer to a rotating mirror. The laser recreates the image on the rotating drum. panel 5.27 Laser printer How a laser printer works. Survival Tip Do I Have to Print the Whole Thing? If you click on the shortcut icon on the Windows toolbar (the one that looks like a printer), your entire document will be printed. To print only a portion of your document, go to File, Print and check the option you want in the dialog box that appears.
  311. Hardware: Input & Output 287 inkjet printers form images with

    little dots. Inkjet printers commonly have a dpi of 4,800 ϫ 1,200 (but can be as high as 9,600 ϫ 2,400); they spray ink onto the page a line at a time, in both high-quality black-and-white text and high-quality color graphics. (To achieve impressive color images, you should use high-quality, high-gloss paper, which prevents inkjet-sprayed dots from feathering, or spreading.) Inkjet cartridges come in various combinations: a single cartridge for black and all color inks, two separate black and color cartridges, or separate cartridges for black and each color. Some cartridges also include the print head, which is apt to wear out before the rest of the machine. The advantages of inkjet printers are that they can print in color, are quiet, and are generally less expensive than color laser printers. The disadvantages have been that they print a bit less precisely than laser printers do and traditionally they have been slower. Another disadvantage is that inkjet cartridges have to be replaced more often than laser-toner cartridges do and so may cost more in the long run. Moreover, a freshly inkjet-printed page is apt to smear unless handled carefully. For users who print infrequently, laser printers (which use toner, a dry powder) have the advantage of not drying out. Laser owners don’t have to deal with dried-out cartridges clogging nozzles and wasting expensive ink and time—a common problem for inkjet users. Still, experts maintain that users who want the best-quality photo output should get a photo inkjet printer. Laser printers in general are known for their mediocre photo output, with cheap personal laser printers often doing an especially poor job. Laser printers are known for handling a much higher volume of printouts than inkjet printers. Buyers who do a lot of printing should pay panel 5.28 Inkjet printer How an inkjet printer works. Four removable ink cartridges are attached to print heads with 64 firing chambers and nozzles apiece. 1 As the print heads move back and forth across the page, software instructs them where to apply dots of ink, what colors to use, and in what quantity. 2 To follow those instructions, the printer sends electrical pulses to thin resistors at the base of the firing chambers behind each nozzle. 3 The resistor heats a thin layer of ink, which in turn forms a vapor bubble. That expansion forces ink through the nozzle and onto the paper at a rate of about 6,000 dots per second. 4 A matrix of dots forms characters and pictures. Colors are created by layering multiple color dots in varying densities. 5 Ink Vapor bubble Resistor Survival Tip Digital Subscriptions Overwhelmed by too many dead-tree (paper) magazines and newspapers? Try digital subscriptions offered by NewsStand (www.newsstand. com/?nsemc ϭ nsiconvg01) and Zinio Systems (www.zinio.com) to read publications on your Tablet PC, desktop, or PDA.
  312. 288 Chapter 5 close attention to a printer’s monthly duty

    cycle, which determines how many printouts a printer can comfortably handle in a month. Going over this can often shorten the life of a printer. In general, cheaper printers have much lower duty cycles than the higher-end printers. • Thermal printers: Thermal printers are low- to medium-resolution printers that use a type of coated paper that darkens when heat is applied to it. The paper is moved past a line of heating elements that burn dots onto the paper. This technology is typically used in business for bar-code label applications and for printing cash register receipts. Until about 2000, most fax machines used direct thermal printing, though now only the cheapest models use it, the rest having switched to thermal wax- transfer, laser, or inkjet printing. • Thermal wax-transfer printers: Thermal wax-transfer printers print a wax-based ink onto paper. As the paper and ribbon travel in unison beneath the thermal print head, the wax-based ink from the transfer ribbon melts onto the paper. After it becomes cool, the wax adheres permanently to the paper. Although such printers are highly reliable, because of the small number of moving parts, they don’t compare with modern inkjet printers and color laser printers. However, because of their waterfastness, they find uses in industrial label printing. Wax-transfer printers are faster and less expensive to use than photo printers, but the dye-sublimation photo printers produce photo- realistic quality. Recently Polaroid introduced an inkless photo printer that prints 2 ϫ 3-inch photos sent to it via Bluetooth-enabled devices such as cellphones or from plugged-in digital cameras.45 Homaro Cantu, chef at Chi- cago’s Moto Restaurant, prints sushi on a Canon inkjet printer using edible paper made of soybeans and cornstarch and food-based inks of his own concoction. He then flavors the back of the paper with powdered soy sauce and sea- weed. Even Mr. Cantu’s menu is edible; diners crunch it up into soups. Survival Tip Is Your Printer Telling the Truth? Inkjet printers and laser print- ers display a message or a light when your ink/toner car- tridges need to be replaced. But are they telling the truth? In general, no. Cartridge sales are profitable to the manufac- turers. Your cartridges may have a much longer life than your printer is telling you. Locate the sensor and put a piece of black tape over it, and you may get much more print- ing out of your cartridges. Thermal printed cash-register receipt Wax-transfer thermal printed label
  313. Hardware: Input & Output 289 • Photo printers: Photo printers

    are specialized machines for printing continuous-tone photo prints (typically 3 ϫ 5 or 4 ϫ 6 inches), using special dye-receptive paper and ribbons with special transparent color dyes. Paper and ribbon pass together over the printhead, which contains thousands of heating elements producing varying amounts of heat. The hotter the element, the more dye is released, and as the temperature is varied, shades of each color can be overlaid on top of one another. The dyes are transparent and blend (sublimate) into continuous-tone color. Some inexpensive ($150–$200) photo printers are designed to be unplugged and taken on the go; in fact, they connect directly to a digital camera. 46 PLOTTERS A plotter is a specialized output device designed to produce large, high-quality graphics in a variety of colors. (• See Panel 5.29, next page. ) Plotter lines are not made up of dots; they are actually drawn. The plotter was the first computer output device that could not only print graphics but also accommodate full-size engineering, three-dimensional, and architectural drawings, as well as maps. Using different colored pens, it was also able to print in color long before inkjet printers became an alternative. Plotters are still the most affordable printing device for computer-aided design (CAD) and offer much higher resolutions than desktop printers do. Plotters are controlled by PCL and HPCL (Hewlett-Packard Control Language). Some questions to consider when you’re buying a printer: • Do I need color, or will black-only do? Are you mainly printing text, or will you need to produce color charts and illustrations (and, if so, how often)? If you print lots of black text, consider getting a laser printer. If you might occasionally print color, get an inkjet that will accept cartridges for both black and color. Unless you are in the publishing or design business, you will prob- ably not need an expensive color laser printer. • Do I have other special output requirements? Do you need to print envelopes or labels? Special fonts (type styles)? Multiple copies? Transparencies or on heavy paper? Unusual paper size? Find out if the printer comes with envelope feeders, sheet feeders holding at least 100 sheets, or whatever will meet your requirements. • Is the printer easy to set up? Can you easily pull the unit together, plug in the hardware, and adjust the software (the driver programs) to make the printer work with your computer? • Is the printer easy to operate? Can you add paper, replace ink/toner cartridges or ribbons, and otherwise PRACTICAL ACTION Buying a Printer operate the printer without much difficulty? • Does the printer provide the speed and quality I want? A laser printer prints about 11–37 pages per minute (ppm); a color inkjet prints about 17–34 ppm. Colors and graphics take longer to print. Are the blacks dark enough and the colors vivid enough? • Will I get a reasonable cost per page? Special paper, ink or toner cartridges (especially color), and ribbons are all ongoing costs. Inkjet color cartridges, for example, may last 100–500 pages and cost $2–$30 new. Laser toner cartridges can cost up to $100 each but last much longer. Ribbons for dot-matrix printers are inex- pensive. Ask the seller what the cost per page works out to. • Does the manufacturer offer a good warranty and good telephone technical support? Find out if the warranty for a printer lasts at least 2 years. See if the printer’s manufacturer offers telephone support in case you have technical problems. The best support systems offer toll- free numbers and operate evenings and weekends as well as weekdays. (If you can, try calling tech support before you buy and see what happens.) Dye-sublimation photo printer
  314. 290 Chapter 5 The three principal kinds of plotters are

    pen, electrostatic, and large-format: • Pen: A pen plotter uses one or more colored pens to draw on paper or transparencies. • Electrostatic: In an electrostatic plotter, paper lies partially flat on a tablelike surface, and toner is used in a photocopier-like manner. • Large-format: Large-format plotters operate somewhat like an inkjet printer but on a much larger scale. This type of plotter is often used by graphic artists. MULTIFUNCTION PRINTERS: PRINTERS THAT DO MORE THAN PRINT Multifunction printers combine several capabilities, such as printing, scanning, copying, and faxing. (• See Panel 5.30. ) Brother, Canon, Epson, and Hewlett-Packard make machines in a price range of $89–$266 that combine a photocopier, fax machine, scanner, and inkjet printer. Hewlett-Packard also offers an all-in-one printer that connects wirelessly to the Internet, allowing users to bypass their computer and print out Web content in paper form. 47 Multifunction printers take up less space and cost less than the four separate office machines that they replace. The drawback is that if one compo- nent breaks, nothing works. panel 5.29 Large-format plotter panel 5.30 Multifunction device This machine com- bines four functions in one—printer, copier, fax machine, and scanner. Proofreader Ed Kochanowski proofreads a Braille edition of Beowulf at the National Braille Press in Boston. SPECIALTY PRINTERS Specialty printers exist for such purposes as printing certain types of labels, tickets, and text in Braille. Mixed Output: Sound, Voice, & Video How would I explain sound, voice, and video output? Most PCs are now multimedia computers, capable of displaying and printing not only traditional softcopy and hardcopy text and graphics but also sound, voice, and video, as we consider next. SOUND OUTPUT Sound-output devices produce digitized sounds, ranging from beeps and chirps to music. To use sound output, you need appropriate software and a sound card. The sound card could be Sound Blaster or, since that brand has become a de facto standard, one that is “Sound Blaster– compatible.” Well- known brands include Creative Labs, Diamond, and Turtle Beach. The sound card plugs into an expansion slot in your computer; on newer computers, it is integrated with the motherboard.
  315. info! more Hardware: Input & Output 291 Not too long

    ago, the audio emerging from a computer had the crackly sound of an old vacuum-tube radio. Then, in 1997, audio in personal computers began to shift to three-dimensional sound. Now, a PC with two speakers can sound more like a “surround sound” movie house. Unlike conventional stereo sound, 3-D audio describes an expanded field of sound—a broad arc starting at the right ear and curving around to the left. Thus, in a video game, you might hear a rocket approach, go by, and explode off your right shoulder. The effect is achieved by boosting certain frequencies that provide clues to a sound’s location in the room or by varying the timing of sounds from different speakers. You can augment your computer’s internal speakers with external speakers for high-quality sound. VOICE OUTPUT Voice-output devices convert digital data into speechlike sounds. You hear such forms of voice output on telephones (“Please hang up and dial your call again”), in soft-drink machines, in cars, in toys and games, and in mapping software for vehicle-navigation devices. Voice portals read news and other information to users on the go. One form of voice output that is becoming popular is text-to-speech (TTS) systems, which convert computer text into audible speech. TTS benefits not only the visually impaired but also anyone with a computer system sound card and speakers who wants to reduce reading chores (and eyestrain) and do other tasks at the same time. Windows XP offers a TTS program called Nar- rator; Windows Vista offers Speech API. Others are CoolSpeech, CrazyTalk, and Digalo. AOL, Yahoo!, and MapQuest have licensed a high-quality TTS pro- gram developed by the AT&T Natural Voices Lab to read email, give driving directions, provide stock quotes, and more. VIDEO OUTPUT Video consists of photographic images, which are played at 15–29 frames per second to give the appearance of full motion. Video is input into a multimedia system using a video camera or VCR and, after edit- ing, is output on a computer’s display screen. Because video files can require a great deal of storage—a 3-minute video may require 1 gigabyte of storage— video is often compressed. Good video output requires a powerful processor as well as a video card. Another form of video output is videoconferencing, in which people in different geographic locations can have a meeting—can see and hear one another—using computers and communications. Videoconferencing sys- tems range from videophones to group conference rooms with cameras and multimedia equipment to desktop systems with small video cameras, micro- phones, and speakers. (We discuss videoconferencing further in Chapter 6.) 5.4 INPUT & OUTPUT TECHNOLOGY & QUALITY OF LIFE: Health & Ergonomics What are the principal health and ergonomic issues relating to computer use? Danielle Weatherbee, 29, of Seattle, a medical supplies saleswoman who’s on the road constantly, spends much of her time hunched over the keyboard of her notebook computer on planes, in coffee shops, in bed, and even in taxi- cabs. Her neck and wrists constantly ache. Her doctor has said she has the skeletal health of a 50-year-old. “But what can I do?” Weatherbee says. “My laptop is the only way to go for my work. I couldn’t live without it.” 48 Health Matters How could information technology adversely affect my health? The computer clearly has negative health consequences for some people. College students, for example, may be susceptible to back, shoulder, wrist, Survival Tip Customize Your Sounds In Windows, open the Control Panel and the Sounds section. Once there you can change all the sounds Windows outputs. Click on the event you want to alter the sound for, click the Browse button, and then select a new sound file from the folders. Don’t assign long sound sequences to com- mon events; they’ll become annoying. Many websites offer “themes” for your computer— you can download sound bites from your favorite movies and TV shows. AT&T’s TTS Program To find out more about this program and listen to audio demonstrations, go to: www.research.att.com/~ttsweb/ tts/demo.php
  316. info! more 292 Chapter 5 and neck aches because they

    often use laptops, which—unlike desktop computers—have keyboard and screen too close to each other. “When you use a laptop, you can make your head and neck comfortable, or you can make your hands and arms comfortable, but it’s impossible to do both,” says Tom Albin of the Human Factors and Ergonomics Society, an organization that issues standards on the use of computers. 49 Observes another expert about stu- dents, “They sit in lecture halls with built-in tables, hunched over their laptops eight hours a day, and you can see it’s very uncomfortable with them. Even if they could move their chairs, that would be a help. 50 Let’s consider some of the adverse health effects of computers. These may include repetitive strain injuries, eyestrain and headache, and back and neck pains. We will also consider the effects of electromagnetic fields and noise. REPETITIVE STRESS INJURIES Repetitive stress (or strain ) injuries (RSIs) are wrist, hand, arm, and neck injuries resulting when muscle groups are forced through fast, repetitive motions. Most victims of RSI are in dentistry, meatpacking, automobile manufacturing, poultry slaughtering, and clothing manufacturing, which require awkward wrist positions. Musicians, too, are often troubled by RSI (because of long hours of practice). People who use computer keyboards—some superstar data-entry operators reportedly regularly average 15,000 keystrokes an hour—account for some RSI cases that result in lost work time. Before computers came along, typists would stop to make corrections or change paper. These motions had the effect of providing many small rest breaks. Today keyboard users must devise their own mini-breaks to prevent excessive use of hands and wrists (or install a com- puter program that uses animated characters to remind users to take breaks and provide suggestions for exercises). People who use a mouse for more than a few hours a day—graphic designers, desktop-publishing professionals, and the like—are also showing up with increased RSI injuries. The best advice is to find a mouse large enough so that your hand fits comfortably over it, and don’t leave your hand on the mouse when you are not using it. Some cordless mice, such as the Logitech MX1000 and the MediaPlay cordless mouse, are said to offer relief to aching fingers. 51 You might also try using function keys instead of the mouse whenever possible. 52 Among the various RSIs, some, such as muscle strain and tendinitis, are painful but usually not crippling. These injuries may be cured by rest, anti- inflammatory medication, and change in typing technique. One type of RSI, carpal tunnel syndrome, is disabling and often requires surgery. Carpal tun- nel syndrome (CTS) is a debilitating condition caused by pressure on the median nerve in the wrist, producing damage and pain to nerves and tendons in the hands. It is caused by short repetitive movements, such as typing, knitting, and using vibrating tools for hours on end. The lack of rest in between these motions irritates and inflames the flexor tendons that travel with the median nerve to the hand through an area in the wrist called the “carpal tunnel,” which is surrounded by bones and a transverse ligament. The inflamed tendons squeeze the nerve against the ligament. It must be pointed out, however, that there is some dispute as to whether continuous typing is necessarily a culprit in CTS. A 2003 study by research- ers in Denmark found no association between computer use and CTS, and a 2001 Mayo Clinic study found that even 7 hours a day of computer use didn’t increase the disorder. 53 Other researchers have found limitations in both studies. 54 There is little clinical data to prove whether repetitive and forceful movements of the hand and wrist during work or leisure activities can cause carpal tunnel syndrome. Repeated motions performed in the course of normal work or other daily activities can result in repetitive motion disorders such as bursitis and tendonitis. Writer’s cramp—a condition in which a lack of fine motor skill coordination and ache and pressure in the fingers, wrist, or fore- arm is brought on by repetitive activity—is not a symptom of carpal tunnel syndrome. 55 RSIs The United Food and Com- mercial Workers International Union provides detailed infor- mation about RSIs at: www.ufcw.org/workplace_ connections/retail/safety_ health_news_and_facts/ rep_stress_overview.cfm
  317. info! more Hardware: Input & Output 293 EYESTRAIN & HEADACHES

    Vision problems are actually more common than RSI problems among computer users. Computers compel people to use their eyes at close range for a long time. However, our eyes were made to see most efficiently at a distance. It’s not surprising, then, that people develop what’s called computer vision syndrome. Computer vision syndrome (CVS) consists of eyestrain, headaches, double vision, and other problems caused by improper use of computer display screens. By “improper use,” we mean not only staring at the screen for too long but also failing to correct faulty lighting and screen glare and using screens with poor resolution. BACK & NECK PAINS Improper chairs or improper positioning of keyboards and display screens can lead to back and neck pains. All kinds of adjustable, special-purpose furniture and equipment are available to avoid or diminish such maladies. ELECTROMAGNETIC FIELDS Like kitchen appliances, hairdryers, and televi- sion sets, many devices related to computers and communications generate low-level electromagnetic field emissions. Electromagnetic fields (EMFs) are waves of electrical energy and magnetic energy. In recent years, stories have appeared in the mass media reflecting con- cerns that high-voltage power lines, cellphones, wireless mice, and CRT-type computer monitors might be harmful. There have been worries that moni- tors might be linked to miscarriages and birth defects and that cellphones and power lines might lead to some types of cancers. Is there anything to this? The answer, so far, is that no one is sure. The evidence seems scant that weak electromagnetic fields, such as those used for cellphones and found near high-voltage lines, cause cancer. Still, handheld cellphones do put the radio transmitter next to the user’s head. This causes some health professionals concern about the effects of radio waves entering the brain as they seek out the nearest cellular transmitter. Thus, in the United Kingdom, the Independent Expert Study Group on Mobile Phones recom- mended that children should use cellphones only when necessary, and Nor- way’s Ombudsman for Children has said that children under the age of 13 should not have their own mobile phones. Dr. Lief Salford of Lund University in Sweden, who has called the evolution of wireless phones “the largest bio- logical experiment in the history of the world,” reported that cellphone radia- tion damaged neurons in the brains of young rats. 56 Another study found that cellphone users face a 50% greater risk of developing tumors of the parotid gland than do people who do not use cellphones. 57 However, an August 2005 study found no increased risk of brain tumors associated with using a cell- phone for at least 10 years. 58 Cancer researcher Ronald Herberman suggests that, until conclusive data arrives in another couple of years, it’s prudent to consider cellphone use a health risk and consumers should buy phones (such as the Motorola Razr V3x) that emit low radiation. 59 The Federal Communications Commission (FCC) has created a measure- ment called Specific Absorption Rate (SAR) to give consumers data on the radiation levels their phones produce. Currently, the Motorola V195s and the Motorola W385 cellphones have the highest SAR levels (1.6 and 1.54 SAR), and the Motorola Razr V3x and the Samsung SGH-G800 have the lowest lev- els (0.14 and 0.23 SAR). The World Health Organization has said that further research is needed for long-term health assessment. As for CRT monitors, those made since the early 1980s produce very low emissions. Even so, users are advised to work no closer than arm’s length to a CRT monitor. The strongest fields are emitted from the sides and backs of terminals. Alternatively, you can use laptop computers, because their liquid crystal display (LCD) screens emit negligible radiation. The current advice from the Environmental Protection Agency is to exercise prudent avoidance. That is, we should take precautions that are relatively easy. More on CVS Do you have CVS? What are computer eyeglasses? Find out at: www.allaboutvision.com/cvs/ faqs.htm
  318. info! more info! more 294 Chapter 5 However, we should

    not feel compelled to change our whole lives or to spend a fortune minimizing exposure to electromagnetic fields. Thus, we can take steps to put some distance between ourselves and a CRT monitor. However, it is probably not necessary to change residences because we happen to be living near some high-tension power lines. NOISE The chatter of impact printers or hum of fans in computer power units can be psychologically stressful to many people. Sound-muffling covers are available for impact printers. Some system units may be placed on the floor under the desk to minimize noise from fans. Ergonomics: Design with People in Mind Why is ergonomics important? Previously, workers had to fit themselves to the job environment. However, health and productivity issues have spurred the development of a relatively new field, called ergonomics, that is concerned with fitting the job environ- ment to the worker. The purpose of ergonomics is to make working conditions and equip- ment safer and more efficient. It is concerned with designing hardware and software that are less stressful and more comfortable to use, that blend more smoothly with a person’s body or actions. Examples of ergonomic hardware are tilting display screens, detachable keyboards, and keyboards hinged in the middle to allow the users’ wrists to rest in a more natural position. We address some further ergonomic issues in the Experience Box at the end of this chapter. 5.5 THE FUTURE OF INPUT & OUTPUT What are some examples of future input and output technology? Biologists studying wildlife at the James San Jacinto Mountains Reserve in southern California found out something interesting about squirrels. It seems the little rodents chew on moss for the moisture. No one had known that before, but researchers learned it when the animals tripped motion sensors spread around a patch of wilderness, which activated tiny wireless cameras, which in turn were linked to a speedy wireless network. 60 Other scientists are using “smart dust,” grids of simple, low-powered devices called “motes” to monitor the environment and wirelessly pass along collected data. 61 Birds out- fitted with sensors have surprised scientists by their speed and routes during their migrations from the United States to Central and South America. 62 The uses of such “intelligent sensors”—digital sensors placed in all kinds of places and linked by wireless networks—“could be bigger than the internet,” suggests one expert. 63 Not only do they allow squirrels and other inhabitants of the natural world to communicate with the digital realm; they are also used for many other purposes—security, for example. Sensors that can detect bio- logical agents have been placed in thousands of locations across the United States to provide warnings of bioterror attacks. 64 Networks of sensors have been used to detect undersea intruders and accidents, as when the Russian submarine Kursk sank in August 2000. 65 A “virtual fence” consisting of sensors and cameras is planned for the Arizona border to catch illegal immigrants and drug runners. 66 Sensors could also occupy a big role in the rebuilding of U.S. bridges, roads, and the electrical grid, where wireless communications and computing power could lead to a “smarter” infrastructure. 67 As these examples show, input technology seems headed in two directions: (1) toward more input devices in remote locations and (2) toward more refine- ments in source data automation. Output is distinguished by (1) more output in remote locations and (2) increasingly realistic—even lifelike—forms, as we discuss in a few pages. SECURITY Ergonomics for Kids To learn how to set up an ergo- nomic workstation for children, go to: www.businessweek.com/ magazine/content/02_51/ b3813121.htm For more general government ergonomic guidelines, go to: www.osha.gov and then search for computer workstations. Science Sensors Want to see how biologists study 30 acres of nature with wireless-network-linked sen- sors? Go to: www.jamesreserve.edu
  319. info! more Hardware: Input & Output 295 Toward More Input

    from Remote Locations How can data be input from anywhere? The linkage of computers and telecommunications means that data may be input from nearly anywhere. For instance, X-ray machines are now going digi- tal, which means that a medical technician in the jungles of South America can take an X ray of a patient and then transmit a perfect copy of it by satellite uplink to a hospital in Boston. Visa and MasterCard are moving closer to using “smart cards,” or stored-value cards, for internet transactions. Toward More Source Data Automation How might source data automation be of help to me? Increasingly, input technology is being designed to capture data at its source, which will reduce the costs and mistakes associated with copying or otherwise preparing data in a form suitable for processing. We mentioned some possible innovations in high-capacity bar codes, more sophisticated scanners, smarter smart cards, and widespread use of sensors. Some reports from elsewhere on the input-technology front: INPUT HELP FOR THE DISABLED Some devices now available for people with physical disabilities, such as paraplegics, may portend new ways of entering and manipulating data input. For example, in one system a camera and special software enable users to operate the on-screen pointer with their eye move- ments instead of their hands. 68 In another hands-free system, a camera tracks the user’s body movements and the system converts them into mouse-pointer movements on the screen. In yet another system, the user’s breathing controls the screen pointer. In a fourth, the nose is used to direct the cursor on a com- puter screen. There is also a system that can be attached to a baseball cap, enabling head movements to control the pointer. There is a Web-based application called Web Any- where that provides verbal feedback and enables blind peo- ple to use any internet-connected computer, allowing them to type up a quick email at an internet café or check a flight time on a public computer at the airport. 69 Tongue move- ment alone, it’s been suggested, could become an input device for assisting with computers, home appliances, and wheelchair control. 70 Finally, there are ideas about implant- ing video cameras behind the false eyeball of those who have lost an eye. 71 MORE SOPHISTICATED TOUCH DEVICES As we mentioned, touch screens are becoming more and more popular. Microsoft, for instance, has developed the Surface table- top computer, an interactive, 30-inch touch-responsive table that can be used to order meals or display maps. It is now in use at Harrah’s Rio hotel in Las Vegas and in AT&T phone stores. Microsoft executives see surface computing as an alternative to the mouse and keyboard, one that could have far-reaching effects on the office, living room, and car. (“Multi-Touch” technology is included in Windows 7.) A highly coveted form of touch technology among educators is interactive whiteboards, essentially giant touchscreens. 72 Researchers in what is known as hepatic —active touch— systems are exploring how to create devices that will allow people to feel what isn’t there. With this kind of “virtual touch,” a dental stu- dent could train in drilling down into the decay of a simulated tooth with- out fear of destroying a real healthy tooth. Doctors would have new surgical Mouse-Pointer Systems for the Disabled To learn more about this sub- ject, use the following keywords to search the web: Quick Glance Eye-Gaze Tracking Sys- tem, CameraMouse, Quadjoy, Cordless Gyro-HeadMouse. ( Top ) One-handed keyboard. ( Bottom ) Special mouse/ digitizer and pointing stick to press keys.
  320. info! more 296 Chapter 5 tools, videogames would be made

    more realistic, and drivers would be able to manipulate dials and knobs without taking their eyes off the road. BETTER SPEECH RECOGNITION It’s possible that speech recognition may some- day fulfill world travelers’ fondest dream: You’ll be able to speak in English, and a speech-recognition device will instantly translate your remarks into another language, whether French, Swahili, or Japanese. At the moment, translation programs such as Easy Translator can translate text on web pages (English to Spanish, French, and German and the reverse), although they do so imper- fectly. Research is also going forward on speech-recognition software that can decode slight differences in pitch, timing, and amplitude, so that computers can recognize anger and pain, for example. 73 And already voice-recognition techniques have been applied to animal sounds, so that, for instance, farmers can be alerted to unrest in the pigpen or cows in heat. 74 IMPROVED DIGITAL CAMERAS Digital still cameras and video cameras are now commonplace. Now manufacturers are also bringing out compact digital camcorders, some that are coat-pocket size. Some will also produce both still photos and respectable video. Olympus has a camera with a 40-gigabyte hard drive that can store both photos and music. Microsoft has invented a wide-angle, fish-eye lens digital camera that can be worn like a badge, recording all the still and video images of the wearer’s daily life. 75 A boon to bird-watchers, sports spectators, and opera goers is the appearance of binoculars with built-in digital cameras, so that one can bring home photos or digital movies. 76 The newest development is the camera-on- a-chip, which contains all the control components necessary to take a photo- graph or make a movie. Such a device, called an active pixel sensor, based on NASA space technology, is now being made by Micron and by Photobit. A future feature of cellphone cameras is exploitation of a branch of a field of computer science called augmented reality— which gave us yellow first-down lines (which really don’t exist) on the field of televised football games—which will enable camera users to “see information about nearby restaurants, ATMs, and available jobs in front of buildings that house them,” in one description. 77 GESTURE RECOGNITION In the movie Minority Report, Tom Cruise, playing a police officer who fights crimes occurring in the future, gestures into the air and calls up computer images. Researchers have been trying to apply gesturing to computing input devices for decades, and we have already seen the development of the accelerometer, a motion sensor that allows machines to respond to movement without waiting for humans to push a button. The Apple iPhone and Nintendo’s Wii game console, for instance, currently feature similar technology, and many cellphones, computers, and other gadgets are being produced that are sensitive to motion. 78 In 2010, we should see gesture- reading technology incorporated in TVs, PCs, and similar devices. 79 Gesture recognition also is a key component in the idea of pervasive com- puting, which refers to having access to computing tools any place at any time. For example, a display could appear on a wall or wherever you want. To make pervasive computing work, however, users need to have an input device available wherever they are, a process often referred to as human-centric com- puting. Through human-centric computing, the user is always connected to computing tools. Gesture-recognition technology could provide the needed input capabilities for both types of computing. PATTERN-RECOGNITION & BIOMETRIC DEVICES Would you believe a computer could read people’s emotions, such as surprise and sadness, from changes in their facial patterns? Such devices are being worked on at Georgia Insti- tute of Technology and elsewhere. (• See Panel 5.31. ) Indeed, you can buy a face-recognition program so that you can have your computer respond only to your smile. Camera on a chip. Active pixel sensor, a digital camera (exclusive of the opticals) on a single 1 cm 2 chip. It can set the desired exposure time and control any number of imaging modes. Gesture Recognition For an update on the progress in gesture-recognition technol- ogy, go to: www.gesturecentral.com www.engineerlive.com/Asia- Pacific-Engineer/Automotive- Design/Gesture_%26lsq uo%3Brecognition%26rs quo%3B_could_improve_ automotive_safety/16927/ gesture ϩ recognition ϩ automotive www.igesture.org/
  321. Hardware: Input & Output 297 With the shift to digital

    cameras, peo- ple are accumulating thousands of photo- graphs—so many that they often fail to label them. Google’s geneal- ogy site MyHeritage and a handful of young companies (Eyealike, GazoPa, ILovePhotos, Like.com, Picasa, Vid- eoSurf) have adopted image-recognition tech- nology to help people sort through and label their photos, using facial recogni- tion techniques to group photos in which a similar person appears in different locations or wearing different clothes. 80 BRAINWAVE DEVICES Perhaps the ultimate input device analyzes the elec- trical signals of the brain and translates them into computer commands. In one experiment, 100 tiny sensors were implanted in the brain of a 25-year-old quad- riplegic who, using just his thoughts, was able to control a computer well enough to oper- ate a TV, open email, and play Pong with 70% accuracy. 81 At the University of Pittsburgh, macaque monkeys with electrical sensors in their brains have learned to feed themselves with robotic arms, an experiment billed as the first successful use of a “brain-machine inter- face” to control a robotic limb for a practical function. 82 Users have successfully moved a cursor on the screen through the sheer power of thought. 83 Emotiv Systems of San Fran- cisco even offers a noninvasive technology that allows players to manipulate objects in video games simply with their thoughts. 84 Toward More Output in Remote Locations How could information be output in far-flung places? Clearly, output in remote locations is the wave of the future. As TV and the personal computer converge, we can expect more scenarios like this: Your PC panel 5.31 Computers tuned to emotions At Georgia Institute of Technology, researchers have devised a computer system that can read people’s emotions from changes in their faces. Expressions of happi- ness, surprise, and other movements of facial muscles are converted by a special camera into digitized renderings of energy patterns. Quadriplegic Matt Nagle is connected to a computer by a cable that is screwed into his head. The 4-millimeter square chip, which is placed on the surface of the motor cortex area of the brain, contains 100 electrodes, each thinner than a hair, that detect neural electri- cal activity. The sensor is then connected to a computer via a small wire attached to a pedes- tal mounted on the skull. Nagle has been able to check email and play computer games sim- ply by using thoughts. He can also turn lights on and off and control a television, all while talking and moving his head. Suitor (Simple User Internet Tracker) eye-gaze technology is an attentive system that pays attention to what users do so it can attend to what users need. Suitor tracks computer users according to what they look at and how often they look at it.
  322. 298 Chapter 5 continually receives any websites covering topics of

    interest to you—CNN’s home page for news on Afghanistan, for example—which are stored on your hard disk for later viewing. The information, on up to 5,000 websites a day, is transmitted from a television broadcast satellite to an 18-inch satellite dish on your roof. Interested? The technology is available now with direct-broadcast services such as DirecTV Inc. Another idea of future remote output, being developed at Stanford Univer- sity, is a digital nagging device, a PDA or smart cellphone that reminds people to walk briskly for 150 minutes a week, make better diet choices, and similar health advice. 85 Toward More Realistic Output In what way is output being made more realistic? Another interesting new output technology: so-called audio spotlight or directed-sound technology projects sound in a focused beam so that only peo- ple in a certain spot can hear it. Court TV used the technology in New York and Atlanta bookstores to promote a murder mystery show. When custom- ers tripped a motion sensor, they would suddenly hear a voice whispering a 30-second message that said in part: “Don’t turn around. Do you ever think about murder? Committing the ultimate crime? I do. All the time.” Directed- sound devices use narrow beams of ultrasound waves that can’t be heard by human ears; the beam distorts air as it passes through, generating sound peo- ple can hear. The biggest use of such technology, unfortunately, is for adver- tising, so that messages could be sent to customers in grocery store checkout lines without disturbing the store’s staff. 86 Clearly, we are seeing increased realism appearing in all forms of output. Let’s consider what’s coming into view. DISPLAY SCREENS: BETTER & CHEAPER Computer screens are becoming crisper, brighter, bigger, and cheaper. Newer LCD monitors, for instance, have as high a resolution as previous larger CRT monitors, and the prices have dropped significantly. New gas-plasma technology is being employed to build flat-panel hang-on- the-wall screens as large as 50 inches from corner to corner. Using a technique known as microreplication, researchers have constructed a thin transparent sheet of plastic prisms that allows builders of portable computer screens to halve the amount of battery power required. PRINTERS: REDUCING PRINTER INK Xerox is hoping to help companies survive with fewer printers and copiers and less paper through a new technology they call erasable paper. The idea here is that you would print out a document you need only temporarily, then feed it through a machine with a heating element, which would make the document images disappear—so that you could reuse the paper for something else. 87 Another company, called Zink (short for “zero ink”), hopes to get rid of ink entirely. Its approach is to encode paper with bil- lions of dye crystals. To produce an image, a print head emits heat pulses that melt the dye crystals, turning them into the desired colors. 88 VIDEO: MOVIE QUALITY FOR PCS Today the movement of many video images displayed on a microcomputer comes across as fuzzy and jerky, with a per- son’s lip movements out of sync with his or her voice. This is because currently available equipment often is capable of running only about eight frames a second. New technology based on digital wavelet theory, a complicated mathemati- cal theory, has led to software that can compress digitized pictures into fewer bytes and do it more quickly than current standards. Indeed, the technology E Ink’s flexible screen on 0.3- millimeter thick electronic “paper” with millions of tiny capsules with black and white pigment chips and transmitting electrodes.
  323. info! more Hardware: Input & Output 299 can display 30–38

    frames a second—“real-time video.” Images have the look and feel of a movie. In addition, advanced graphics chips from firms such as Nvidia and NTI are increasing the realism of animation, making possible lifelike imagery. Nvidia’s computer-generated mermaid named Nalu, for instance, is described as hav- ing “a cloud of golden tresses that realistically seem to reflect dappled light and flow with the water [and] rosy, unusually lifelike skin.” 89 Such images use geometric building blocks called polygons, and Nalu is composed of 300,000 of them—far more than most video images today have. THREE-DIMENSIONAL OUTPUT In the 1930s, radiologists tried to create three- dimensional images by holding up two slightly offset X rays of the same object and crossing their eyes. Now the same effects can be achieved by computers. With 3-D technology, flat, cartoonlike images give way to rounded objects with shadows and textures. Artists can even add “radiosity,” so that a dog standing next to a red car, for instance, will pick up a red glow. In the early 21st century, we have 3-D versions of films such as Monsters vs. Aliens, My Bloody Valentine, and Up becoming hits in theaters. Indeed, for some of the top Hollywood filmmakers (such as Titanic director James Cam- eron, maker of the 2009 Avatar ), digital 3-D looks like the future of movies. 90 But 3-D is also a reality in home theaters, with many companies selling what they call “3-D ready” TV sets. 91 In addition, Nvidia markets the GeForce 3D Vision system, which consists of software and special glasses that connect wirelessly to your PC, which can be used for existing games and other soft- ware as well as movies. 92 But the same technology that makes images pop off movie screens is now being used for all kinds of other purposes as well. 93 Three-dimensional print- ers using inkjet printer heads are able to output layer after layer of images printed on starch or plaster, producing 3-D objects. In the future, this tech- nology may be used to print on plastics and metals to produce electronic components, such as transistors. Indeed, military engineers have developed something called a Mobile Parts Hospital in which technicians use worksta- tions and robotic machine tools to fabricate replacement parts, such as bolts or machine-gun mounts, that lasers then will “print” as powdered metal, layer by layer. 94 Medical researchers have even used 3-D printing technology to print layers of cells, building intricate tissue structures. Indeed, researchers have used older-model inkjet printers to spray cells onto a gauze scaffolding to cre- ate living tissue—artificial skin that may be of help to burn victims. Using the Smithsonian What kind of technology does the Smithsonian Museum in Washington, D.C., have on display? Find the museum’s website and enter keywords of computer terms.
  324. 300 Chapter 5 Whether you set up a desktop computer

    and never move it or tote a portable PC from place to place, you need to be concerned about protecting not only your computer but yourself. You don’t want your com- puter to get stolen or zapped by a power surge. You don’t want to lose your data. And you certainly don’t want to lose your health for computer-related reasons. Here are some tips for taking care of these vital areas. Guarding against Hardware Theft & Loss Portable computers are easy targets for thieves. Obviously, anything conveniently small enough to be slipped into your briefcase or backpack can be slipped into someone else’s. Never leave a portable computer unattended in a public place. It’s also possible to simply lose a portable—for exam- ple, forgetting it’s in the overhead-luggage bin in an air- plane. To help in its return, use a wide piece of clear tape to tape a card with your name and address to the out- side of the machine. You should tape a similar card to the inside also. In addition, scatter a few such cards in the pockets of the carrying case. Desktop computers are also easily stolen. However, for under $25, you can buy a cable and lock, like those used for bicycles, and secure the computer, monitor, and printer to a work area. If your hardware does get stolen, its recovery may be helped if you have inscribed your driver’s license number or home address on each piece. Some campus and city police departments lend inscribing tools for such purposes. Finally, insurance to cover computer theft or damage is surprisingly cheap. Look for advertisements in computer magazines. (If you have standard tenants’ or homeowners’ insurance, it may not cover your computer. Ask your insurance agent.) Guarding against Damage to Hardware Because desktop computers aren’t moved around much, they are less susceptible to damage. Laptops, however, are another story. According to a survey of 714 information tech- nology managers, physical damage to laptops with data loss resulted from the following causes: 34% from spilled food or liquids on them, 28% from dropping them, 25% from not protecting them during travel, and 13% from worker anger. 95 (Special “ruggedized” laptops exist, such as the Hewlett- Packard EliteBook 2530p and the Panasonic Toughbook F8, which are built to be shock resistant.) 96 Guarding against Damage to Software Systems software and applications software generally come on CD-ROM disks. The unbreakable rule is simply this: copy the original disk, either onto your hard-disk drive or onto another disk. Then store the original disk in a safe place. If your computer gets stolen or your software destroyed, you can retrieve the original and make another copy. Protecting Your Data Computer hardware and commercial software are nearly always replaceable, although perhaps with some expense and difficulty. Data, however, may be major trouble to replace or even be irreplaceable. If your hard-disk drive crashes, do you have the same data on a backup disk? Almost every microcomputer user sooner or later has the experience of accidentally wiping out or losing material and having no copy. This is what makes people true believers in backing up their data—making a duplicate in some form. If you’re work- ing on a research paper, for example, it’s fairly easy to copy your work onto a CD or keychain memory at the end of your work session. Then store the copy in a safe place. Protecting Your Health Could a computer put you in the emergency room? Actually, the number of injuries caused by computers in the home, caused by people tripping over wires or getting hit by fall- ing equipment, rose 732% from 1994 to 2006. 97 The leading cause of injury for small children and adults over 60 was tripping or falling over computer equipment. But injuries are also caused by not setting up comput- ers correctly. Many people, for instance, set up their com- puters, particularly laptops, on a desk or table. This means “the keyboard is too high, which makes your arms reach up, your shoulders hunch and your wrists bend down,” says one report. “The monitor is too low, which pulls your head and neck forward and down and puts a strain on your neck.” 98 (It’s best to separate the keyboard and the monitor so each can be placed at the proper height.) With a computer, it’s important to sit with both feet on the floor, thighs at right angles to your body. The chair should be adjustable and support your lower back. Your forearms should be parallel to the floor. You should look down slightly at the screen. (• See Panel 5.32. ) This setup is particularly important if you are going to be sitting at a computer for hours at a time. To avoid wrist and forearm injuries, keep your wrists straight and hands relaxed as you type. Instead of putting the keyboard on top of a desk, put it on a low table or in a keyboard drawer under the desk. Otherwise the nerves in your wrists will rub against the sheaths surrounding them, possibly leading to RSI pains. Or try setting an hourly alarm on your watch or on an alarm clock; when the alarm goes off, take a short break and rotate your wrists and hands a bit. Eyestrain and headaches usually arise because of improper lighting, screen glare, and long shifts staring at the screen. Make sure that your windows and lights don’t throw a glare on the screen and that your computer is not framed by an uncovered window. EXPERIENCE BOX Good Habits: Protecting Your Computer System, Your Data, & Your Health
  325. Hardware: Input & Output 301 Back and neck pains occur

    because furniture is not adjusted correctly or because of heavy computer use, espe- cially on laptops. Adjustable furniture and frequent breaks should provide relief. Head Directly over shoulders, without straining forward or backward, about an arm’s length from screen. Light source Should come from behind the head. Screen At eye level or slightly lower. Use an anti-glare screen. Fingers Gently curved. Feet Firmly planted on the floor. Shorter people may need a footrest. Keyboard Best when kept flat (for proper wrist positioning) and at or just below elbow level. Computer keys that are far away should be reached by moving the entire arm, starting from the shoulders, rather than by twisting the wrists or straining the fingers. Take frequent rest breaks. Neck Elongated and relaxed. Shoulders Kept down, with the chest open and wide. Back Upright or inclined slightly forward from the hips. Maintain the slight natural curve of the lower back. Elbows Relaxed, at about a right angle, try to keep forearms parallel to floor. Wrists Relaxed, and in a neutral position, without flexing up or down. Knees Slightly lower than the hips. Chair Sloped slightly forward to facilitate proper knee position. Use both hands to type combination key strokes. Twisting your hands puts strain on them. Resting on a wrist rest, the table, or arm rests while typing forces you to twist your hand to reach some keys. Instead, keep your hands moving freely above the keyboard, letting the strong muscles of your arms move your hands. It is also a bad idea to contort your hands in other ways. Your hand should be flat and parallel to the keyboard, without twisting. there should not be any pressure on your wrist or forearms while you type. You should NOT rest your wrists on a wrist rest except while taking a very short break from typing. A wrist rest of the proper height (level with the space bar) can serve as a reminder to keep your wrists straight. If you feel your wrist touching the rest, you know that your wrists are starting to dip. Don’t rest on the wrist pad. Don’t bend your hand in awkward angles to type key combinations. Yes Yes No No Keep wrists above the pad, and tilt the keyboard downward. panel 5.32 How to set up your computer work area
  326. 302 Chapter 5 active-matrix display (p. 283) Also known as

    TFT (thin-film transistor) display; flat-panel display in which each pixel on the screen is controlled by its own transistor. Why it’s important: Active-matrix screens are much brighter and sharper than passive-matrix screens, but they are more complicated and thus more expensive. They also require more power, affecting the battery life in laptop computers. audio-input device (p. 273) Hardware that records analog sound and translates it for digital storage and processing. Why it’s important: Analog sound signals are continuous variable waves within a certain frequency range. For the computer to process them, these variable waves must be converted to digital 0s and 1s. The principal use of audio-input devices is to produce digital input for multimedia computers. An audio signal can be digitized in two ways—by an audio board or a MIDI board. bar-code reader (p. 269) Photoelectric (optical) scanner that translates bar codes into digital codes. Why it’s important: With bar-code readers and the appropriate software system, store clerks can total purchases and produce invoices with increased speed and accuracy, and stores and other businesses can mon- itor inventory and services with increased efficiency. bar codes (p. 269) Vertical, zebra-striped marks imprinted on most manufactured retail products. Why it’s important: Bar codes provide a convenient means of identifying and tracking items. In North America, supermarkets, food manufacturers, and others have agreed to use a bar-code system called the Universal Product Code (UPC). Other kinds of bar-code sys- tems are used on everything from FedEx packages to railroad cars to the jerseys of long-distance runners. biometrics (p. 280) Science of measuring individual body characteristics. Why it’s important: Biometric security devices identify a person through a fingerprint, voice intonation, or some other biological characteristic. For example, retinal- identification devices use a ray of light to identify the distinc- tive network of blood vessels at the back of the eyeball. carpal tunnel syndrome (CTS) (p. 292) Debilitating condition caused by pressure on the median nerve in the wrist, produc- ing damage and pain to nerves and tendons in the hands. Why it’s important: CTS can be caused by overuse or misuse of computer keyboards. color depth (p. 282) Also called bit depth; the amount of information, expressed in bits, that is stored in a dot. Why it’s important: The more bits in a dot or pixel, the more shades of gray and colors can be represented. With 24-bit color depth, for example, 8 bits are dedicated to each primary color — red, green, and blue. Eight-bit color is standard for most of com- puting; 24-bit, called true color, requires more resources, such as video memory. computer vision syndrome (CVS) (p. 293) Eyestrain, head- aches, double vision, and other problems caused by improper use of computer display screens. Why it’s important: CVS can be prevented by not staring at the display screen for too long, by correcting faulty lighting, by avoiding screen glare, and by not using screens with poor resolution. CRT (cathode-ray tube) (p. 283) Vacuum tube used as a dis- play screen in a computer or video display terminal. Why it’s important: This technology is found not only in the screens of some desktop computers but also in television sets and flight- information monitors in airports. digital camera (p. 274) Electronic camera that uses a light- sensitive processor chip to capture photographic images in digital form and store them on a small diskette inserted into the camera or on flash memory chips (cards). Why it’s impor- tant: The bits of digital information — the snapshots you have taken, say — can be copied right onto a computer’s hard disk for manipulation and printing out. The environmentally unde- sirable stage of chemical development required for conven- tional film is completely eliminated. digital pen (p. 266) Writing instrument that allows users to write on paper and send the writing as an image file to the computer. Why it’s important: You can easily store your hand- written notes in digital form. digitizer (p. 265) Input unit based on an electronic pen or a mouselike copying device called a puck that converts drawings and photos to digital data. Why it’s important: See digitizing tablet. digitizing tablet (p. 266) One form of digitizer; an electronic plastic board on which each specific location corresponds to a location on the screen. When the user uses a puck, the tablet converts his or her movements into digital signals that are input to the computer. Why it’s important: Digitizing tablets are often used to make maps and engineering drawings, as well as to trace drawings. display screen (p. 281) Also called monitor, CRT, or simply screen; output device that shows programming instructions and data as they are being input and information after it is processed. Why it’s important: Screens are needed to display softcopy output. dot pitch (dp) (p. 282) Amount of space between the centers of adjacent pixels; the closer the pixels (dots), the crisper the image. Why it’s important: Dot pitch is one of the measures of display-screen crispness. For a .25dp monitor, for instance, the dots are 25/100ths of a millimeter apart. Generally, a dot pitch of .25dp will provide clear images. dots per inch (dpi) (p. 269) Measure of the number of columns and rows of dots per inch. For microcomputer printers, resolu- tion is usually in the range 1,200 ϫ 1,200 dpi. Why it’s impor- tant: The higher the dpi, the better the resolution. (See also resolution. ) dumb terminal (p. 258) Also called video display terminal (VDT); display screen and a keyboard hooked up to a computer system. It can input and output but not process data. Why it’s SUMMARY
  327. 303 Hardware: Input & Output important: Dumb terminals are used,

    for example, by airline reservations clerks to access a mainframe computer contain- ing flight information. electromagnetic fields (EMFs) (p. 293) Waves of electrical energy and magnetic energy. Why it’s important: Some people have worried that CRT monitors might be linked to miscar- riages and birth defects and that cellphones and power lines might lead to some types of cancers. However, the evidence is unclear. ergonomics (p. 294) Study, or science, of working conditions and equipment with the goal of improving worker safety and efficiency. Why it’s important: On the basis of ergonomic prin- ciples, stress, illness, and injuries associated with computer use may be minimized. fax machine (p. 272). Also called a facsimile transmission machine; input device that scans an image and sends it as electronic signals over telephone lines to a receiving fax machine, which prints the image on paper. Two types of fax machines are dedicated fax machines and fax modems. Why it’s important: Fax machines permit the transmission of text or graphic data over telephone lines quickly and inexpensively. They are found not only in offices and homes but also along- side regular phones in some public places such as airports. flat-panel display (p. 283) Display screen that is much thinner, weighs less, and consumes less power than a CRT. Flat-panel displays are made up of two plates of glass separated by a layer of a substance in which light is manipulated. Why it’s important: Flat-panel displays are essential to portable com- puters, and are commonly used for desktop computers as well. flatbed scanner (p. 269) Also called desktop scanner; the image being scanned is placed on a glass surface, where it remains stationary, and the scanning beam moves across it. Three other types of scanners are sheet-fed, handheld, and drum. Why it’s important: Flatbed scanners are one of the most popular types of scanner. handwriting recognition (p. 264) System in which a com- puter receives intelligible written input, using special software to interpret the movement of a stylus across a writing ser- vice and translating the resulting cursive writing into digital information. Why it’s important: Handwriting recognition is a commonly used input method for PDAs, some handheld vid- eogames, and tablet PCs. hardcopy (p. 281) Printed output. The principal examples are printouts, whether text or graphics, from printers. Film, including microfilm and microfiche, is also considered hardcopy output. Why it’s important: Hardcopy is an essential form of computer output. impact printer (p. 285) Printer that forms characters or images by striking a mechanism such as a print hammer or wheel against an inked ribbon, leaving an image on paper. Why it’s important: Nonimpact printers are more commonly used than impact printers, but dot-matrix printers are still used in some businesses. inkjet printer (p. 286) Printer that sprays onto paper small, electrically charged droplets of ink from four nozzles through holes in a matrix at high speed. Like laser and dot-matrix printers, inkjet printers form images with little dots. Why it’s important: Because they produce high-quality images on spe- cial paper, inkjet printers are often used in graphic design and desktop publishing. However, traditionally inkjet printers have been slower than laser printers and they print at a lower reso- lution on regular paper. input hardware (p. 255) Devices that translate data into a form the computer can process. Why it’s important: Without input hardware, computers could not function. The computer- readable form consists of 0s and 1s, represented as off and on electrical signals. Input hardware devices are categorized as three types: keyboards, pointing devices, and source data- entry devices. intelligent terminal (p. 258) Hardware unit with its own mem- ory and processor, as well as a display screen and keyboard, hooked up to a larger computer system. Why it’s important: Such a terminal can perform some functions independent of any mainframe to which it is linked. Examples include the auto- mated teller machine (ATM), a self-service banking machine connected through a telephone network to a central computer, and the point-of-sale (POS) terminal, used to record purchases at a store’s customer checkout counter. Recently, many intel- ligent terminals have been replaced by personal computers. internet terminal (p. 259) Terminal that provides access to the internet. There are several variants of internet terminal: (1) the set-top box or web terminal, which displays web pages on a TV set; (2) the network computer, a cheap, stripped-down computer that connects people to networks; (3) the online game player, which not only lets you play games but also con- nects to the Internet; (4) the full-blown PC/TV (or TV/PC), which merges the personal computer with the television set; and (5) the wireless pocket PC or personal digital assistant (PDA), a handheld computer with a tiny keyboard that can do two-way wireless messaging. Why it’s important: In the near future, most likely, internet terminals will be everywhere. keyboard (p. 256) Input device that converts letters, numbers, and other characters into electrical signals that can be read by the computer’s processor. Why it’s important: Keyboards are the most popular kind of input device. laser printer (p. 285) Nonimpact printer that creates images with dots. As in a photocopying machine, images are produced on a drum, treated with a magnetically charged inklike toner (powder), and then transferred from drum to paper. Why it’s important: Laser printers produce much better image quality than do dot-matrix printers and can print in many more colors; they are also quieter. Laser printers, along with page descrip- tion languages, enabled the development of desktop publishing. light pen (p. 265) Light-sensitive penlike device connected by a wire to the computer terminal. The user brings the pen to a desired point on the display screen and presses the pen button, which identifies that screen location to the computer. Why it’s important: Light pens are used by engineers, graphic designers, and illustrators. liquid crystal display (LCD) (p. 283) Flat-panel display in which molecules of liquid crystal line up in a way that alters their optical properties, creating images on the screen by
  328. 304 Chapter 5 transmitting or blocking out light. Why it’s

    important: LCD is useful not only for portable computers but also as a display for various electronic devices, such as watches and radios. magnetic-ink character recognition (MICR) (p. 271) Scan- ning technology that reads magnetized-ink characters printed at the bottom of checks and converts them to digital form. Why it’s important: MICR technology is used by banks to sort checks. MIDI board (p. 273) MIDI, pronounced “middie,” stands for “Musical Instrument Digital Interface.” MIDI sound boards use this standard. Why it’s important: MIDI provides a standard for the interchange of musical information between musical instruments, synthesizers, and computers. mouse (p. 260) A pointing device that is rolled about on a desktop mouse pad and directs a pointer on the computer’s display screen. The name is derived from the device’s shape, which is a bit like a mouse, with the cord to the computer being the tail. Why it’s important: The mouse is the principal pointing tool used with microcomputers. multifunction printer (p. 290) Hardware device that combines several capabilities, such as printing, scanning, copying, and faxing. Why it’s important: Multifunction printers take up less space and cost less than the four separate office machines that they replace. The downside, however, is that if one com- ponent breaks, nothing works. nonimpact printer (p. 285) Printer that forms characters and images without direct physical contact between the printing mechanism and paper. Two types of nonimpact printers often used with microcomputers are laser printers and inkjet print- ers. A third kind, the thermal printer, is seen less frequently. Why it’s important: Nonimpact printers are faster and quieter than impact printers. optical character recognition (OCR) (p. 272) Software tech- nology that converts scanned text from images (pictures of the text) to an editable text format (usually ASCII) that can be imported into a word processing application and manipulated. Why it’s important: Special OCR characters appear on utility bills and price tags on department-store merchandise. The wand reader is a common OCR scanning device. These days almost all scanners come with OCR software. optical mark recognition (OMR) (p. 272) Scanning technology that reads “bubble” marks and converts them into computer- usable form. Why it’s important: OMR technology is used to read the College Board Scholastic Aptitude Test (SAT) and the Graduate Record Examination (GRE). output hardware (p. 255) Hardware devices that convert machine-readable information, obtained as the result of pro- cessing, into people-readable form. The principal kinds of output are softcopy and hardcopy. Why it’s important: Without output devices, people would have no access to processed data and information. page description language (PDL) (p. 286) Software that describes the shape and position of characters and graphics to the printer. PostScript and PCL are common page description languages. Why it’s important: Page description languages are essential to desktop publishing. passive-matrix display (p. 283) Flat-panel display in which a transistor controls a whole row or column of pixels. Passive matrix provides a sharp image for one-color (monochrome) screens but is more subdued for color. Why it’s important: Passive-matrix displays are less expensive and use less power than active-matrix displays, but they aren’t as clear and bright and can leave “ghosts” when the display changes quickly. Passive-matrix displays go by the abbreviations HPA, STN, or DSTN. pen-based computer system (p. 264) Input system that allows users to enter handwriting and marks onto a computer screen by means of a penlike stylus rather than by typing on a keyboard. Pen computers use handwriting-recognition software that translates handwritten characters made by the stylus into data that is usable by the computer. Why it’s impor- tant: Many handheld computers and PDAs have pen input, as do digital notebooks. pixel (p. 282) Short for “picture element”; the smallest unit on the screen that can be turned on and off or made differ- ent shades. Why it’s important: Pixels are the building blocks that allow text and graphical images to be displayed on a screen. plotter (p. 289) Specialized output device designed to produce high-quality graphics in a variety of colors. The inkjet plotter employs the same principle as an inkjet printer; the paper is output over a drum, enabling continuous output. In an electro- static plotter, paper lies partially flat on a tablelike surface, and toner is used in a photocopier-like manner. Why it’s important: Plotters are used to create hardcopy items such as maps, architectural drawings, and three-dimensional illustrations, which are usually too large for regular printers. pointing device (p. 260) Hardware that controls the position of the cursor or pointer on the screen. It includes the mouse and its variants, the touch screen, and various forms of pen input. Why it’s important: In many contexts, pointing devices permit quick and convenient data input. pointing stick (p. 263) Pointing device that looks like a pencil eraser protruding from the keyboard between the G, H, and B keys. The user moves the pointing stick with a forefinger. Why it’s important: Pointing sticks are used principally in video games, in computer-aided design systems, and in robots. printer (p. 285) Output device that prints characters, sym- bols, and perhaps graphics on paper or another hardcopy medium. Why it’s important: Printers provide one of the princi- pal forms of computer output. QXGA (quantum extended graphics array) (p. 284) Expen- sive display standard with a resolution of up to 2,048 ϫ 1,536 pixels. Why it’s important: QXGA is used for large LCD screens for computer users needing to view extreme detail, for busi- nesspeople needing to enlarge images that will still be crisp in big-screen presentations, for high-density television, and for special applications involving viewing multiple images on a single screen.
  329. 305 Hardware: Input & Output radio-frequency identification (RFID) tags (p.

    279) Source data-entry technology based on an identifying tag bearing a microchip that contains specific code numbers. These code numbers are read by the radio waves of a scanner linked to a database. Why it’s important: Drivers with RFID tags can breeze through tollbooths without having to even roll down their windows; the toll is automatically charged to their accounts. Radio-wave-readable ID tags are also used by the Postal Service to monitor the flow of mail, by stores for inven- tory control and warehousing, and in the railroad industry to keep track of rail cars. refresh rate (p. 282) Number of times per second that screen pixels are recharged so that their glow remains bright. In gen- eral, displays are refreshed 56–120 times per second. Why it’s important: The higher the refresh rate, the more solid the image looks on the screen — that is, the less it flickers. repetitive stress (or strain) injuries (RSIs) (p. 292) Several wrist, hand, arm, and neck injuries resulting when muscle groups are forced through fast, repetitive motions. They include muscle strain and tendinitis, which are painful but usually not crippling, and carpal tunnel syndrome, which is dis- abling and often requires surgery. Why it’s important: People who use computer keyboards account for some of the RSI cases that result in lost work time. resolution (pp. 269, 282) Clarity or sharpness of display- screen/scanned/printed images; the more pixels (dots) there are per square inch, the finer the level of detail attained. Resolution is expressed in terms of the formula: horizontal pixels ϫ vertical pixels. Each pixel can be assigned a color or a particular shade of gray. Standard screen resolutions are 1,024 ϫ 768, 1,280 ϫ 1,024, and 1,600 ϫ 1,200 pixels. Common scanner resolutions are 300 ϫ 200, 600 ϫ 600, 600 ϫ 1,200, 1,200 ϫ 1,200, and 1,200 ϫ 2,400. Why it’s important: Users need to know what resolution is appropriate for their purposes. scanner (p. 267) Source data-input device that uses light- sensing (optical) equipment to translate images of text, draw- ings, photos, and the like into digital form. Why it’s important: Scanners simplify the input of complex data. The images can be processed by a computer, displayed on a monitor, stored on a storage device, or communicated to another computer. sensor (p. 278) Input device that collects specific data directly from the environment and transmits it to a computer. Why it’s important: Although you are unlikely to see such input devices connected to a PC in an office, they exist all around us, often in nearly invisible form. Sensors can be used to detect all kinds of things: speed, movement, weight, pressure, temperature, humidity, wind, current, fog, gas, smoke, light, shapes, images, and so on. In aviation, for example, sensors are used to detect ice buildup on airplane wings and to alert pilots to sudden changes in wind direction. softcopy (p. 281) Data on a display screen or in audio or voice form. This kind of output is not tangible; it cannot be touched. Why it’s important: This term is used to distinguish nonprinted output from printed (hardcopy) output. sound board (p. 273) An add-on circuit board in a computer that converts analog sound to digital sound and stores it for further processing and/or plays it back, providing output directly to speakers or an external amplifier. Why it’s impor- tant: The sound board enables users to work with audible sound. sound-output device (p. 290) Hardware that produces digi- tized sounds, ranging from beeps and chirps to music. Why it’s important: To use sound output, the user needs appropriate software and a sound card. Such devices are used to produce the sound effects when the user plays a CD-ROM, for example. source data-entry devices (p. 267) Data-entry devices that create machine-readable data on magnetic media or paper or feed it directly into the computer’s processor, without the use of a keyboard. Categories include scanning devices (imaging systems, bar-code readers, mark- and character-recognition devices, and fax machines), audio-input devices, video input, photographic input (digital cameras), voice-recognition sys- tems, sensors, radio-frequency identification devices, and human-biology-input devices. Why it’s important: Source data- entry devices lessen reliance on keyboards for data entry and can make data entry more accurate. speech-recognition system (p. 276) Input system that uses a microphone (or a telephone) as an input device and converts a person’s speech into digital signals by comparing the electrical patterns produced by the speaker’s voice with a set of prere- corded patterns stored in the computer. Why it’s important: Voice-recognition technology is useful in situations where people are unable to use their hands to input data or need their hands free for other purposes. SXGA (super extended graphics array) (p. 284) Graphics board standard that supports a resolution of 1,280 ϫ 1,024 pixels. Why it’s important: SXGA is often used with 15-inch LCD monitors. thermal printer (p. 288) Printer that uses colored waxes and heat to produce images by burning dots onto special paper. The colored wax sheets are not required for black-and-white output. Thermal printers are expensive, and they require expensive paper. Why it’s important: For people who want the highest-quality color printing available with a desktop printer, thermal printers are the answer. touch screen (p. 263) Video display screen that has been sensitized to receive input from the touch of a finger. The screen is covered with a plastic layer, behind which are invisible beams of infrared light. Why it’s important: Users can input requests for information by pressing on buttons or menus displayed. The answers to requests are displayed as output in words or pictures on the screen. (There may also be sound.) Touch screens are found in kiosks, ATMs, airport tourist direc- tories, hotel TV screens (for guest checkout), and campus information kiosks making available everything from lists of coming events to (with proper ID and personal code) student financial-aid records and grades. touchpad (p. 263) Input device; a small, flat surface over which the user slides a finger, using the same movements as those used with a mouse. The cursor follows the movement of the finger. The user “clicks” by tapping a finger on the pad’s surface or by pressing buttons positioned close by the pad.
  330. 306 Chapter 5 Why it’s important: Touchpads let users control

    the cursor/ pointer with a finger, and they require very little space to use. Most laptops have touchpads. trackball (p. 262) Movable ball, mounted on top of a station- ary device, that can be rotated by the user’s fingers or palm. It looks like the mouse turned upside down. Instead of mov- ing the mouse around on the desktop, you move the trackball with the tips of your fingers. Why it’s important: A trackball requires less space to use than does a mouse. UXGA (ultra extended graphics array) (p. 284) Graphics board standard that supports a resolution of 1,600 ϫ 1,200 pixels, producing up to 16.8 million colors. Why it’s important: UXGA is popular with graphic artists, engineering designers, and others using 15- and 19-inch LCD monitors. video (p. 291) Output consisting of photographic images played at 15–29 frames per second to give the appearance of full motion. Why it’s important: Video is input into a multimedia sys- tem using a video camera or VCR and, after editing, is output on a computer’s display screen. Because video files can require a great deal of storage — a 3-minute video may require 1 gigabyte of storage — video is often compressed. Digital video has revolu- tionized the movie industry, as in the use of special effects. videoconferencing (p. 291) Form of video output in which people in different geographic locations can have a meeting— can see and hear one another—using computers and com- munications. Why it’s important: Many organizations use videoconferencing to take the place of face-to-face meetings. Videoconferencing systems range from videophones to group conference rooms with cameras and multimedia equipment to desktop systems with small video cameras, microphones, and speakers. voice-output device (p. 291) Hardware that converts digital data into speechlike sounds. Why it’s important: We hear such voice output on telephones (“Please hang up and dial your call again”), in soft-drink machines, in cars, in toys and games, and recently in mapping software for vehicle-navigation devices. For people with physical challenges, computers with voice out- put help to level the playing field. webcam (p. 273) A video camera attached to a computer to record live moving images that can then be posted on a website in real time. Why it’s important: The webcam is an affordable tool that enables users to have video- conferencing capabilities and may change the future of communications. XGA (extended graphics array) (p. 284) Graphics board dis- play standard with a resolution of up to 1,024 ϫ 768 pixels, corresponding to 65,536 possible colors. Why it’s important: XGA is used mainly on 15- and 17-inch CRT monitors for simple applications plus spreadsheets and graphics software. CHAPTER REVIEW s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.” Self-Test Questions 1. A(n) ________ terminal is entirely dependent for all its processing activities on the computer system to which it is connected. 2. The two main categories of printer are ________ and ________ . 3. ________ is the study of the physical relationships between people and their work environment. 4. A(n) ________ is an input device that is rolled about on a desktop and directs a pointer on the computer’s dis- play screen. 5. ________ consists of devices that translate information processed by the computer into a form that humans can understand. 6. ________ is the science of measuring individual body characteristics. 7. CRT is short for ________ . 8. LCD is short for ________. 9. An ________ is software that describes the shape and position of characters and graphics to the printer. 10. When people in different geographic locations can have a meeting using computers and communications, it is called ________ . 11. ________ -matrix screens are much brighter and sharper than ________ -matrix screens, but they are more complicated and thus more expensive. 12. A debilitating condition caused by pressure on the median nerve in the wrist, producing damage and pain to nerves and tendons in the hands, is called ________ . 13. The measure of the number of dots that are printed in a linear inch is called ________ or ________ . 14. A printer that forms characters or images by striking a mechanism such as a print hammer or wheel against an inked ribbon, leaving images on a paper, is called a(n) ________ printer. 15. ________ printers enabled the development of desktop publishing. Multiple-Choice Questions 1. Which of the following is not a pointing device? a. mouse
  331. 307 Hardware: Input & Output b. touchpad c. keyboard d.

    joystick 2. Which of the following is not a source data-entry device? a. bar-code reader b. sensor c. digital camera d. scanner e. mouse 3. Which of the following display standards has the high- est screen resolution? a. XGA b. UXGA c. VGA d. SVGA e. QXGA 4. Which of the following isn’t considered hardcopy output? a. spreadsheet printout b. microfilm c. fax report d. Word document computer file e. printed invoice 5. Which of the following factors does not affect the qual- ity of a screen display? a. refresh rate b. speed c. resolution d. pixels e. color depth True/False Questions T F 1. On a computer screen, the more pixels that appear per square inch, the higher the resolution. T F 2. Photos taken with a digital camera can be down- loaded to a computer’s hard disk. T F 3. Resolution is the amount of space between the centers of adjacent pixels. T F 4. The abbreviation dpi stands for “dense pixel intervals.” T F 5. Pointing devices control the position of the cur- sor on the screen. T F 6. Output hardware consists of devices that trans- late information processed by the computer into a form that humans can understand. T F 7. Optical character-recognition software reads “bubble” marks and converts them into comput- er-usable form. T F 8. The lower the refresh rate, the more solid the image looks on the screen. T F 9. CRTs consume more power than flat-panel dis- plays do. T F 10. Computer users have no need to be concerned about ergonomics. T F 11. It has been proven that electromagnetic fields pose no danger to human beings. T F 12. Plotters are used to print architectural drawings and in computer-aided design. Short-Answer Questions 1. What is a common use of dumb terminals? 2. What characteristics determine the clarity of a com- puter screen? 3. Describe two situations in which scanning is useful. 4. What is source data entry? 5. What is pixel short for? What is a pixel? 6. Briefly describe RSI and CTS. Why are they problems? 7. What is a font? 8. Discuss the different types of printers and their features. 9. Explain the differences between CRT monitors and LCD monitors. 10. What is OCR used for? s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Knowledge in Action 1. Cut out several advertisements from newspapers or magazines that feature new microcomputer systems. Circle all the terms that are familiar to you now that you have read the first five chapters of this text. Define these terms on a separate sheet of paper. Is this com- puter expandable? How much does it cost? Is a monitor included in the price? A printer? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
  332. 308 Chapter 5 2. Paperless office is a term that

    has been around for some time. However, the paperless office has not yet been achieved. Do you think the paperless office is a good idea? Do you think it’s possible? Why do you think it has not yet been achieved? 3. Many PC warranties do not cover protection against lightning damage, which is thought to be an “act of God.” Does your PC warranty provide coverage for “acts of God”? Read it to find out. 4. Compare and contrast the pros and cons of different types of monitors. Decide which one is best for you and explain why. Do some research on how each monitor type creates displayed images. 5. Do you have access to a computer with (a) speech- recognition software, and (b) word processing software that determines writing level (such as eighth grade, ninth grade, and so on)? Dictate a few sentences about your day into the microphone. After your speech is encoded into text, use the word processing software to determine the grade level of your everyday speech. 6. A pixel is the smallest unit on the screen that can be turned on and off. In most high-quality digital photos, you can’t see the pixilation unless you zoom in real close. However, even when you don’t zoom in, you know that the pixilation is there, a series of different pixels all plotted on a grid. How can you relate this to our experi- ence of reality? Via high-tech microscopes we see that everything is made of smaller particles not visible to the naked eye, such as atoms, subatomic particles, and quarks. How are the basic building blocks of computer imaging and the basic building blocks of physical matter alike, and how are they different? 7. Biometrics: Which form of biometric technology do you prefer for identification purposes: fingerprints, voice intonation, facial characteristics, or retinal identifica- tion? Which do you think will become most commonly used in the future? Web Exercises 1. Visit an online shopping site such as www.yahoo.com. Click on Shopping; then type Printers in the Shopping search box. Investigate five different types of printers by clicking on the printer names and then on Full Speci- fications. Note (a) the type of printer, (b) its price, (c) its resolution, and (d) its speeds for black-and-white print- ing and for color printing, if applicable. Which operating system is each printer compatible with? Which printer would you choose? Why? 2. There is an abundance of information about elec- tronic devices on the internet. People write all kinds of reviews either raving about the device that made their lives better or lamenting the device that became their evil nemesis. Go to www.consumerreports.org/cro/ search.htm?query ϭ reviews and find out how people at ConsumerReports.org rate some of your favorite elec- tronic devices. 3. Go to www.touchscreens.com and find a touch screen that appeals to you. 4. Concerned about electromagnetic radiation? For a question-and-answer session on electromagnetic frequencies, go to www.u-g-h.com/2007/02/28/emf- dangerous-or-not/ and www.articlesbase.com/article- tags/emf-danger. 5. Do you see any ethical problems involved with self- scanning checkout? Can people cheat the system? Are store jobs being lost to automation? Are people without credit cards and/or computer experience being excluded? Do a keyword search for self- scanning and self-checkout and other terms related to these issues. Do you think self-scanning is a good idea? 6. Research the development of Smart Labels. Visit these websites for more information on radio-frequency tagging: http://smart-labels.vista-files.org/ www.answers.com/topic/rfid-tag 7. The human cyborg: Visit Professor Kevin Warwick’s website to learn about the implant microchips he has been creating and surgically implanting in his body to allow it to communicate with a computer. Investigate the many applications he has been working on. After visiting his site, run a search on “Kevin Warwick” to read what others have to say about him and his ideas. www.kevinwarwick.com/ www.kevinwarwick.com/Cyborg1.htm www.wired.com/wired/archive/8.02/warwick.html (Kevin Warwick outlines his plan to become one with his computer) 8. PostScript is the most important page description language in desktop publishing. Read the information at Answer.com, www.answers.com/topic/postscript- 1?hl ϭ postscript&hl ϭ printing, and find out why. You almost certainly will need some familiarity with PostScript. 9. What is the difference between a screen font and a printer font? Go to Answers.com and Wikipedia to find out. What does WYSIWYG mean? 10. How many images can the newest digital cameras hold? Do a web search and find out.
  333. 309 COMMUNICATIONS, NETWORKS, & SAFEGUARDS The Wired & Wireless World

    6 Chapter Topics & Key Questions 6.1 From the Analog to the Digital Age How do digital data and analog data differ, and what does a modem do? 6.2 Networks What are the benefits of networks, and what are their types, compo- nents, and variations? 6.3 Wired Communications Media What are types of wired communications media? 6.4 Wireless Communications Media What are types of wireless communications media, both long distance and short distance? 6.5 Cyberthreats, Hackers, & Safeguards What are areas I should be concerned about for keeping my computer system secure?
  334. 310 Chapter 6 T he essence of all revolution, stated

    philosopher Hannah Arendt, is the start of a new story in human experience. Before the 1950s, computing devices processed data into information, and communications devices communicated information over distances. The two streams of technology developed pretty much independently, like rails on a railroad track that never merge. Now we have a new story, a revolution. For us, the new story has been digital convergence —the gradual merger of computing and communications into a new information environment, in which the same information is exchanged among many kinds of equipment, using the language of computers. ( • See Panel 6.1. ) At the same time, there has been a convergence of several important industries—computers, telecommu- nications, consumer electronics, entertainment, mass media—producing new electronic products that perform multiple functions. panel 6.1 Digital convergence— the fusion of computer and communications technologies Today’s new informa- tion environment came about gradually from the merger of two separate streams of technological development—computers and communications. 1642 First mechanical adding machine (Blaise Pascal) Computer Technology Slide rule invented (Edmund Gunther) 1621 CE 1843 World’s first computer programmer, Ada Lovelace, publishes her notes 1833 Babbage’s difference engine (automatic calculator) 1890 Electricity used for first time in a data- processing project (punched cards); Hollerith’s automatic census-tabulating machine (used punched cards) 1639 First printing press in North America 1562 First monthly newspaper (Italy) 1594 First magazine (Germany) 1827 Photographs on metal plates 1835 Telegraph (first long- distance digital communication system) 1846 High- speed printing 1857 Trans- atlantic telegraph cable laid 1876 Telephone invented Communications Technology Radio waves identified 1888 Edison makes a movie 1894
  335. Communications, Networks, & Safeguards 311 6.1 FROM THE ANALOG TO

    THE DIGITAL AGE How do digital data and analog data differ, and what does a modem do? Why have the worlds of computers and of telecommunications been so long in coming together? Because computers are digital, but most of the world has been analog. Let’s take a look at what this means. We will elaborate on two subjects we introduced earlier—digital signals and modems. The Digital Basis of Computers: Electrical Signals as Discontinuous Bursts What does “digital” mean? Computers may seem like incredibly complicated devices but, as we’ve seen, their underlying principle is simple. Because they are based on on/off electri- cal states, they use the binary system, which consists of only two digits—0 and 1. At their most basic level computers can distinguish between just these two values, 0 and 1, or off and on. There is no simple way to represent all the values in between, such as 0.25. All data that a computer processes must be encoded digitally, as a series of 0s and 1s. In general, digital means “computer-based.” Specifically, digital describes any system based on discontinuous data or events; in the case of comput- ers, it refers to communications signals or information represented in a two-state (binary) way using electronic or electromagnetic signals. Each 0 and 1 signal represents a bit. 1930 General theory of computers (MIT) 1944 First electro- mechanical computer (Mark I) 1946 First program- mable electronic computer in United States (ENIAC) Motion pictures become a big business 1912 Marconi develops radio; motion- picture camera invented 1895 AT&T long- distance service reaches San Francisco 1915 First TV demonstrated; first sound movie 1928 Commercial TV broad- casting 1939 Color TV demon- strated 1946 Transistor invented 1947 Reel- to-reel tape recorder 1948 1950 Cable TV 1907 First regular radio broadcast from New York 1949 First theories for self- replicating programs (viruses) 1952 UNIVAC computer correctly predicts election of Eisenhower as U.S. President 1964 IBM introduces 360 line of computers 1967 Hand- held calcu- lator 1969 ARPANet estab- lished, led to internet
  336. 312 Chapter 6 The Analog Basis of Life: Electrical Signals

    as Continuous Waves What does “analog” mean? “The shades of a sunset, the flight of a bird, or the voice of a singer would seem to defy the black or white simplicity of binary representation,” points out one writer. 1 Indeed, these and most other phenomena of the world are analog, continuously varying in strength and/or quality—fluctuating, evolving, or continually changing. Sound, light, temperature, and pressure values, for instance, can be anywhere on a continuum or range. The highs, lows, and in- between states have historically been represented with analog devices rather than in digital form. Examples of analog devices are a speedometer, a ther- mometer, and a tire-pressure gauge, all of which can measure continuous fluctuations. Humans experience most of the world in analog form—our vision, for instance, perceives shapes and colors as smooth gradations. But most ana- log events can be simulated digitally. A newspaper photograph, viewed through a magnifying glass, is made up of an array of dots—so small that most newspaper readers see the tones of the photograph as continuous (that is, analog). Traditionally, electronic transmission of telephone, radio, television, and cable-TV signals has been analog. The electrical signals on a telephone line, for instance, have been analog-data representations of the original voices, trans- mitted in the shape of a wave (called a carrier wave ). Why bother to change analog signals into digital ones, especially since the digital representations are only approximations of analog events? The reason is that digital signals are easier to store and manipulate electronically. 1971 First pocket calculator 1973 FTP is developed 1976 Apple I computer (first personal computer sold in assembled form); has 512 KB RAM 1975 First micro- computer (MITS Altair 8800) IBM introduces personal computer 1981 Apple Macintosh; first personal laser printer; desktop publishing takes hold; Domain Name System (DNS) is introduced 1984 Portable computers; TCP/IP is established as an internet standard; internet is coined 1982 1970 Micro- processor chips come into use; floppy disk introduced for storing data 5 " floppy disk; Atari home videogame 1978 1 4 1961–1968 Packet- switching networks developed 1952 Direct- distance dialing (no need to go through operator); transistor radio introduced 1957 First satellite launched (Russia’s Sputnik) 1968 Portable video recorders; video- cassettes 1975 Flat- screen TV; GPS First inter- active cable TV 1977 First viruses 1981 Compact disks; European consortium launches multiple communi- cations satellites 1982 3-D TV demonstrated 1979 Cellular phone; Nintendo 1985
  337. Communications, Networks, & Safeguards 313 Purpose of the Dial-Up Modem:

    Converting Digital Signals to Analog Signals & Back How does a telephone modem change analog to digital signals and the reverse? Michelle Philips, an Indianapolis real-estate agent, used to drive to her office at odd hours just to check her email messages and search the web on her company’s high-speed internet lines because her dial-up connection at home was too slow. “At home, I can do laundry, take a shower, and wash dishes while the computer is logging on to the internet,” she said with a laugh. 2 No wonder so many Americans have switched from the slower dial-up means of access to high-speed connections. Nevertheless, let’s stick with the telephone modem for a moment to help illustrate the differences between digital and analog transmission. Consider a graphic representation of an on/off digital signal emitted from a computer. Like a regular light switch, this signal has only two states—on and off. Compare this with a graphic representation of a wavy analog signal emit- ted as a signal. The changes in this signal are gradual, as in a dimmer switch, which gradually increases or decreases brightness. Because telephone lines have traditionally been analog, you need to have a dial-up modem if your computer is to send communications signals over a telephone line. As we’ve seen, the modem translates the computer’s digital signals into the telephone line’s analog signals. The receiving computer also needs a modem to translate the analog signals back into digital signals. ( • See Panel 6.2, next page. ) How, in fact, does a modem convert the continuous analog wave to a dis- continuous digital pulse that can represent 0s and 1s? The modem can make Computer Technology Communications Technology Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; web browser Mosaic invented 1994 Multimedia desktop computers; personal digital assistants 1993 Network computers; Pathfinder robot lands on Mars 1997 Microsoft .NET announced; BlackBerry 2000 Windows XP; Mac OS X; MP3 2001 By this date, some experts predict, all electronically encodable information will be in cyberspace 2047? First computer virus in the public sphere 1986 CD-ROM games (Sega) 1991 FCC selects HDTV standard 1994 Napster popular; 3.8% of music sales online 2000 2.5G wireless services; Wi-Fi and Bluetooth 2001 Facebook launched; MySpace in operation 2004 3G wireless services 2005 112 million blogs are tracked 2007 Power rationing due to grid shortage 2010? Internet telephone- to-telephone service 1997 2003 Mac G5; iPod 2005 Mac mini; Apple video iPod
  338. 314 Chapter 6 adjustments to the frequency—the number of cycles

    per second, or the number of times a wave repeats during a specific time interval (the fastness/ slowness). Or it can make adjustments to the analog signal’s amplitude—the height of the wave (the loudness/softness). Thus, in frequency, a slow wave might represent a 0 and a quick wave might represent a 1. In amplitude, a low wave might rep- resent a 0 and a high wave might represent a 1. ( • See Panel 6.3. ) Modem is short for “ mo dulate/ dem odulate.” A sending modem modu- lates digital signals into analog signals for transmission over phone lines. A receiving modem demodulates the analog signals back into digital sig- nals. The modem provides a means for computers to communicate with one another using the standard copper-wire telephone network, an analog system that was built to transmit the human voice but not computer signals. Our concern, however, goes far beyond telephone transmission. How can the analog realities of the world be expressed in digital form? How can light, sounds, colors, temperatures, and other dynamic values be represented so that they can be manipulated by a computer? Let us consider this. panel 6.2 Analog versus digital signals, and the modem Note that an analog signal represents a con- tinuous electrical signal in the form of a wave. A digital signal is discon- tinuous, expressed as discrete bursts of on/off electrical pulses. ... is converted to digital form through frequency modulation—the frequency of the cycle increases to represent a 1 and stays the same to represent a 0. ... or is converted to digital form through amplitude modulation—the height of the wave is increased to represent a 1 and stays the same to represent a 0. The continuous, even cycle of an analog wave ... Amplitude Amplitude Frequency OR 0 0 1 1 0 0 1 1 panel 6.3 How analog waves are modified to resemble digital pulses Hi! Analog signal 0 1 1 Digital signal 1 11 1 1 00 0 0 Digital signal 1 11 1 1 00 0 0 Modem: Modulate (converts digital pulses to analog form) Modem: Demodulate (converts analog signals back to digital form) Hi!
  339. info! more Communications, Networks, & Safeguards 315 Converting Reality to

    Digital Form How is sampling used to express analog reality in digital form? Suppose you are using an analog tape recorder to record a singer during a per- formance. The analog wave from the microphone, which is recorded onto the tape as an analog wave as well, will produce a near duplicate of the sounds— including distortions, such as buzzings and clicks, or electronic hums if an amplified guitar is used. The digital recording process is different. The way that music is cap- tured for digital audio CDs, for example, does not provide a duplicate of a musical performance. Rather, the digital process uses a device (called an analog-to-digital converter ) to record representative selections, or samples, of the sounds and convert the analog waves into a stream of numbers that the computer then uses to express the sounds. To play back the music, the stream of numbers is converted (by a digital-to-analog converter ) back into an analog wave. The samples of sounds are taken at regular intervals— nearly 44,100 times a second—and the copy obtained is virtually exact and free from distortion and noise. The sampling rate of 44,100 times per sec- ond and the high precision fool our ears into hearing a smooth, continuous sound. Digital photography also uses sampling: A computer takes samples of val- ues such as brightness and color. The same is true of other aspects of real-life experience, such as pressure, temperature, and motion. Does digital sampling cheat us out of our experience of “reality” by allow- ing computers to sample sounds, images, and so on? Actually, people willingly made this compromise years ago, before computers were invented. Movies, for instance, carve up reality into 24 frames a second. Conventional televi- sion pictures (before high-definition TV) were drawn at 30 frames per second. These processes happen so quickly that our eyes and brains easily jump the visual gaps. Digital processing of analog experience is just one more way of expressing or translating reality. Turning analog reality into digital form provides tremendous opportunities. One of the most important is that all kinds of multimedia can now be changed into digital form and transmitted as data to all kinds of devices. Now let us examine the digital world of telecommunications. We begin with the subject of networks and then discuss how networks are connected—first by wired means, then by wireless means. 6.2 NETWORKS What are the benefits of networks, and what are their types, components, and variations? More and more people are now designing their homes to accommodate net- works. For instance, when Lisa Guernsey and her husband, Rob Krupicka, were planning their new house, they wanted modern conveniences without the modern-day headaches. “We didn’t want to face another nest of tangled cables or to see speaker wires snaking beneath the rugs,” Guernsey said. “What Rob and I wanted was . . . a so-called networked home with ‘digital plumbing’ for internet and television connections hidden behind walls, and just enough equipment to make tapping into video and audio as easy as filling a glass of water.” 3 Whether wired or wireless or both, a network, or communications net- work, is a system of interconnected computers, telephones, or other communications devices that can communicate with one another and share applications and data. The tying together of so many communications devices in so many ways is changing the world we live in. Sampling For detailed information, go to: www.informit.com/articles/ article.aspx?pϭ372009 http://en.wikipedia.org/wiki/ Digitizing
  340. 316 Chapter 6 The Benefits of Networks What are five

    ways I might benefit from networks? People and organizations use networks for the fol- lowing reasons, the most important of which is the sharing of resources. SHARING OF PERIPHERAL DEVICES Peripheral devices such as laser printers, disk drives, and scanners can be expensive. Consequently, to justify their purchase, management wants to maximize their use. Usually the best way to do this is to connect the peripheral to a network serving several computer users. SHARING OF PROGRAMS & DATA In most organi- zations, people use the same software and need access to the same information. It is less expen- sive for a company to buy one word processing program that serves many employees than to buy a separate word processing program for each employee. Moreover, if all employees have access to the same data on a shared storage device, the organization can save money and avoid serious problems. If each employee has a separate machine, some employees may update customer addresses while others remain ignorant of the changes. Updating informa- tion on a shared server is much easier than updating every user’s individual system. Finally, network-linked employees can more easily work together online on shared projects. BETTER COMMUNICATIONS One of the greatest features of networks is elec- tronic mail. With email, everyone on a network can easily keep others posted about important information. SECURITY OF INFORMATION Before networks became com- monplace, an individual em- ployee might have been the only one with a particular piece of in- formation, which was stored in his or her desktop computer. If the employee was dismissed—or if a fire or flood demolished the office—the company would lose that information. Today such data would be backed up or duplicated on a networked stor- age device shared by others. ACCESS TO DATABASES Net- works enable users to tap into numerous databases, whether private company databases or public databases available online through the internet. Internet cafe in Laos
  341. Communications, Networks, & Safeguards 317 Types of Networks: WANs, MANs,

    LANs, HANs, PANs, & Others How do the sizes of networks differ? Networks, which consist of various combinations of computers, storage devices, and communications devices, may be divided into several main cat- egories, differing primarily in their geographic range and purposes. WIDE AREA NETWORK A wide area network (WAN) is a communications network that covers a wide geographic area, such as a country or the world. Most long-distance and regional telephone companies are WANs. A WAN may use a combination of satellites, fiber-optic cable, microwave, and copper-wire connections and link a variety of computers, from mainframes to terminals. ( • See Panel 6.4. ) WANs are used to connect local area networks (see below) together, so that users and computers in one location can communicate with users and com- puters in other locations. A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared-user) networks. The best example of a WAN is the internet. METROPOLITAN AREA NETWORK A metropolitan area network (MAN) is a communications network covering a city or a suburb. The purpose of a MAN is often to bypass local telephone companies when accessing long- distance services. Many cellphone systems are MANs. LOCAL AREA NETWORK A local area network (LAN), or local net, connects computers and devices in a limited geographic area, such as one office, one building, or a group of buildings close together. LANs are the basis for most office networks. The LANs of different offices on a university campus may also be linked together into a so-called campus-area network. HOME AREA NETWORK A home area network (HAN) uses wired, cable, or wireless connections to link a household’s digital devices —not only multi- ple computers, printers, and storage devices but also VCRs, DVDs, televisions, panel 6.4 Wide area network Mobile employee Microwave Communications satellite Communications satellite Local telephone exchange Cellular dial-up Fiber-optic cable Telecommuting employee Microwave Satellite earth station Satellite earth station International office International office Fiber-optic cable Telephone wires
  342. 318 Chapter 6 fax machines, videogame machines, and home security

    systems. 4 (A variant of the HAN is the GAN—the garden area network —which can be used to link watering systems, outdoor lights, and alarm systems.) PERSONAL AREA NETWORK Slightly different from a HAN because it doesn’t use wires or cables, a personal area network (PAN) , or wireless personal area network (WPAN), uses short-range wireless technology to connect an individual’s personal electronics, such as cellphone, PDA, MP3 player, notebook PC, and printer. PANs are made possible with such inexpensive, short-range wireless technologies as Bluetooth, ultra wideband, and wireless USB, which have a range of 30 feet or so, as we will describe. HOME AUTOMATION NETWORK A home automation network relies on very inexpensive, very short-range, low-power wireless technology in the under- 200-Kbps range to link switches and sensors around the house. 5 Such net- works, which use wireless standards such as Insteon, ZigBee, and Z-Wave, as we will describe, run on inexpensive AA batteries and use wireless remotes, in- wall touch screens, and PDAs, along with special software, to control lights and switches, thermostats and furnaces, smoke alarms and outdoor floodlights. How Networks Are Structured: Client/Server & Peer to Peer What’s the difference between client/server and peer-to-peer networks? Two principal ways in which networks are structured are client/server and peer to peer. ( • See Panel 6.5. ) CLIENT/SERVER NETWORKS A client/server network consists of clients, which are microcomputers that request data, and servers, which are computers used to supply data. The server is a powerful microcomputer that manages shared devices, such as laser printers. It runs server software for applications such as email and web browsing. Different servers may be used to manage different tasks. A file server is a computer that acts like a disk drive, storing the programs and data files shared by users on a LAN. A data- base server is a computer in a LAN that stores data but doesn’t store programs. A print server controls one or more printers and stores the print-image output from all the microcomputers on the system. Web servers contain web pages that can be viewed using a browser. Mail servers manage email. PEER-TO-PEER NETWORKS The word peer denotes one who is equal in stand- ing with another (as in the phrases “peer pressure” and “jury of one’s peers”). In a peer-to-peer (P2P) network, all microcomputers on the network com- municate directly with one another without relying on a server. Every computer can share files and peripherals with all other computers on the net- work, given that all are granted access privileges. Peer-to-peer networks are less expensive than client/server networks and work effectively for up to 25 computers. Beyond that, they slow down under heavy use. They are appropri- ate for small networks, such as home networks. Intranets, Extranets, & VPNs What are the differences among intranets, extranets, and VPNs? Early in the Online Age, businesses discovered the benefits of using the World Wide Web to get information to customers, suppliers, or investors. For example, in the mid-1990s, FedEx found it could save millions by allowing customers to click through web pages to trace their parcels, instead of having
  343. Communications, Networks, & Safeguards 319 Shared file server Shared network

    printer Local printer Shared network printer Local printer Client/server LAN In a client/server LAN, individual microcomputer users, or “clients,” share the services of a centralized computer called a “server.” In this case, the server is a file server, allowing users to share files of data and some programs. Peer-to-peer LAN In a peer-to-peer LAN, computers share equally with one another without having to rely on a central server. panel 6.5 Two network structures: client/server and peer to peer FedEx customer-service agents do it. From there, it was a short step to the application of the same technology inside companies—in internal internet networks called intranets. INTRANETS: FOR INTERNAL USE ONLY An intranet is an organization’s internal private network that uses the infrastructure and standards of the internet and the web. When a corporation develops a public website, it is making selected information available to consumers and other interested par- ties. When it creates an intranet, it enables employees to have quicker access to internal information and to share knowledge so that they can do their jobs better. Information exchanged on intranets may include employee email addresses and telephone numbers, product information, sales data, employee benefit information, and lists of jobs available within the organization. EXTRANETS: FOR CERTAIN OUTSIDERS Taking intranet technology a few steps further, extranets offer security and controlled access. As we have seen, intranets are internal systems, designed to connect the members of a specific group or a single company. By contrast, extranets are private intranets that
  344. info! more 320 Chapter 6 connect not only internal personnel

    but also selected suppliers and other strategic parties. Extranets have become popular for standard transactions such as purchasing. Ford Motor Company, for instance, has an extranet that connects Ford dealers worldwide. Called FOCALpt, the extranet supports sales and servicing of cars, with the aim of improving service to Ford customers. VIRTUAL PRIVATE NETWORKS Because wide area networks use leased lines, maintaining them can be expensive, especially as distances between offices increase. To decrease communications costs, some companies have established their own virtual private networks ( VPNs), private networks that use a public network (usually the internet) to connect remote sites. Company intranets, extranets, and LANs can all be parts of a VPN. Components of a Network What are the various parts of a network? Regardless of size, networks all have several components in common. WIRED AND/OR WIRELESS CONNECTIONS Networks use a wired or wireless connection system. Wired connections may be twisted-pair wiring, coaxial cable, or fiber-optic cable, and wireless connections may be infrared, micro- wave (such as Bluetooth), broadcast radio (such as Wi-Fi), or satellite, as we describe shortly. HOSTS & NODES A client/server network has a host computer, a mainframe or midsize central computer that controls the network. The other devices on the network are called nodes. A node is any device that is attached to a network—for example, a microcomputer, terminal, storage device, or printer. For instance, a device called a wireless access point (WAP) when attached to a network essentially extends the range of the network by offering several wireless nodes, enabling you, say, to wirelessly connect a computer in a back bedroom to a network at the front of the house. PACKETS Electronic messages are sent as packets. A packet is a fixed-length block of data for transmission. A sending computer breaks an electronic message apart into packets, each of which typically contains 1,000–1,500 bytes. The various packets are sent through a communications network—often using different (and most expedient) routes, at different speeds, and sandwiched in between packets from other messages. Once the packets arrive at their destination, the receiving computer reassembles them into proper sequence to complete the message. PROTOCOLS A protocol, or communications protocol, is a set of conven- tions governing the exchange of data between hardware and/or software components in a communications network. Every device connected to a network has an internet protocol (IP) address so that other computers on the network can properly route data to that address. Sending and receiving devices must follow the same set of protocols. Protocols are built into the hardware or software you are using. The proto- col in your communications software, for example, will specify how receiver devices will acknowledge sending devices, a matter called handshaking. Hand- shaking establishes the fact that the circuit is available and operational. It also establishes the level of device compatibility and the speed of transmission. In addition, protocols specify the type of electrical connections used, the timing of message exchanges, and error-detection techniques. A packet, or electronic message, carries four types of information that will help it get to its destination—namely, the sender’s address (the IP), the intended receiver’s address, how many packets the message has been broken into, and the number of the individual packet. The packets carry the data in the protocols that the internet uses—that is, TCP/IP. Tunneling For a short tutorial on VPNs, go to: http://computer.howstuffworks. com/vpn.htm
  345. Communications, Networks, & Safeguards 321 NETWORK LINKING DEVICES: HUBS, SWITCHES,

    BRIDGES, GATEWAYS, ROUT- ERS, & BACKBONES Networks are often linked together—LANs to MANs and MANs to WANs, for example. The means for connecting them are hubs, switches, bridges, routers, and gateways. ( • See Panel 6.6. ) • Hubs: In general, a hub is the central part of a wheel where the spokes come together. In computer terminology, a hub is a common connection point for devices in a network—a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. With hubs, bandwidth is shared by all components. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. A hub is a half-duplex device, meaning it transmits data in both directions but only in one direction at a time. • Switches: A switch is a device that connects computers to a network. Unlike a hub, it sends messages only to a computer that is the intended recipient. A switch is a full-duplex device, meaning data is transmitted back and forth at the same time, which improves the performance of the network. Switches allow each component full use of the bandwidth. Computers with network interface cards (nodes) File server (hub) and/or switch LAN MAN WAN MAN Shared network printer (node) Shared hard disk (node) Server Router Bridge Bridge Local printer (node) Another LAN Fiber-optic backbone Gateway to a MAN Gateway to a WAN Gateway Gateway Backbone Cabling (node) (node) LAN LAN LAN Backbone panel 6.6 Components of a typical network
  346. info! more 322 Chapter 6 Switches are used only in

    certain configurations; hubs and switches can be used in combination. • Bridges: A bridge is an interface used to connect the same types of networks. For instance, similar local area networks can be joined together to create larger area networks. • Gateways: A gateway is an interface permitting communication between dissimilar networks —for instance, between a LAN and a WAN or between two LANs based on different network operating systems or different layouts. Gateways can be hardware, software, or a combination of the two. • Routers: A router is a special computer that directs communicating messages when several networks are connected together. High-speed routers can serve as part of the internet backbone, or transmission path, handling the major data traffic. • Backbones: The backbone consists of the main highway—including gateways, routers, and other communications equipment—that connects all computer networks in an organization. People frequently talk about the internet backbone, the central structure that connects all other elements of the internet. As we discussed in Chapter 2, several commercial companies provide these major high-speed links across the country; these backbones are connected at network access points (NAPs). NETWORK INTERFACE CARDS As we stated in Chapter 4, a network interface card (NIC) enables the computer to send and receive messages over a cable network. The network card can be inserted into an expansion slot in a micro- computer. Alternatively, a network card in a stand-alone box may serve a number of devices. New computers often come with network cards already installed. NETWORK OPERATING SYSTEM The network operating system (NOS) is the system software that manages the activity of a network. The NOS supports access by multiple users and provides for recognition of users based on pass- words and terminal identifications. Depending on whether the LAN is client/ server or peer-to-peer, the operating system may be stored on the file server, on each microcomputer on the network, or on a combination of both. Examples of popular NOS software are Novell NetWare, Microsoft Win- dows Server 2008, Solaris, Unix, and Linux. Peer-to-peer networking can also be accomplished with Microsoft Windows 95/98/Me/XP/Vista/7. Network Topologies: Bus, Ring, & Star What are three popular configurations for networks? Networks can be laid out in different ways. The logical layout, or shape, of a network is called a topology . The three basic topologies, or configurations, are bus, ring, and star. BUS NETWORK The bus network works like a bus system at rush hour, with various buses pausing in different bus zones to pick up passengers. In a bus network, all communications devices are connected to a common channel. ( • See Panel 6.7. ) That is, in a bus network, all nodes are connected to a single wire or cable, the bus, which has two endpoints. Each commu- nications device on the network transmits electronic messages to other devices. If some of those messages collide, the sending device waits and tries to transmit again. Backbones The National Science Founda- tion (NSF) created the first high-speed backbone in 1987. Called NSFNET, it was a T1 line that connected 170 smaller net- works together. A T3 line was developed the following year. Backbones are typically fiber- optic trunk lines, with multiple fiber-optic cables combined to increase capacity. Some large companies that provide backbone connectivity are MCI, UUnet, British Telecom, AT&T, and Teleglobe. Scientists in the U.S. invented the internet, and the computers that oversee the network are still controlled by the U.S. Department of Com- merce. Some people believe that the internet should be put under international control through the United Nations. What do you think? To see various internet back- bone maps, go to: www.nthelp.com/images/agis. jpg www.nthelp.com/maps.htm
  347. Communications, Networks, & Safeguards 323 Terminal Computer Computer Computer Printer

    Terminal Server The advantage of a bus network is that it may be organized as a client/ server or peer-to-peer network. The disadvantage is that extra circuitry and software are needed to avoid collisions between data. Also, if a connection in the bus is broken—as when someone moves a desk and knocks the connec- tion out—the entire network may stop working. This arrangement connects the network’s devices in a closed loop. RING NETWORK A ring network is one in which all microcomputers and other communications devices are connected in a continuous loop. ( • See Panel 6.8. ) There are no endpoints. Electronic messages are passed around the ring until they reach the right destination. There is no central server. An example of a ring network is IBM’s Token Ring Network, in which a bit pattern (called a “token”) determines which user on the network can send information, as we’ll discuss. The advantage of a ring network is that messages flow in only one direction. Thus, there is no danger of collisions. The disadvantage is that if a connection is broken, the entire network stops working. STAR NETWORK A star network is one in which all microcomputers and other communications devices are directly connected to a central server. ( • See Panel 6.9, next page. ) Electronic messages are routed through the cen- tral hub to their destinations. The central hub monitors the flow of traffic. A PBX system—a private telephone system, such as that found on a college campus, that connects telephone extensions to each other—is an example of a star network. Traditional star networks are designed to be easily expandable because hubs can be connected to additional hubs of other networks. The advantage of a star network is that the hub prevents collisions between messages. Moreover, if a connection is broken between any communications device and the hub, the rest of the devices on the network will continue operat- ing. However, if the hub goes down, the entire network stops. panel 6.7 Bus network A single channel con- nects all communications devices. panel 6.8 Ring network This arrangement con- nects the network’s devices in a closed loop. Terminal Terminal Computer Computer Computer Printer Scanner Server
  348. 324 Chapter 6 Two Ways to Prevent Messages from Colliding:

    Ethernet & Token Ring How do the two methods of keeping messages from colliding work? When you deal with small LANs, especially when they use wired or cable (twisted-pair, coaxial, or fiber-optic) connections, you may hear about Ethernet and Token Ring, two LAN protocols, or technologies, used to keep messages from bumping into one another along the transmission line. ETHERNET In 1973, at Xerox Corpora- tion’s Palo Alto Research Center (more commonly known as PARC), researcher Bob Metcalfe designed and tested the first Ethernet network. While working on a way to link a particular computer to a printer, Metcalfe developed the physical method of cabling that connected devices on the Ethernet as well as the standards that governed communication on the cable. Ethernet has since become the most popular and most widely deployed network technology in the world. Ethernet is a LAN technology that can be used with almost any kind of computer and that describes how data can be sent in packets in between computers and other networked devices usually in close proximity. When two nodes try to send data at the same time that might collide, Ethernet instructs the nodes to resend the data one packet at a time. It is frequently used in a star topology. Ethernet devices used to be able to have only a few hundred meters of cable between them, making it impractical to connect geographically dispersed locations. Modern advances have increased these distances considerably, allowing Ether- net networks to span tens of kilometers. The most common ver- sion (called 10Base-T ) han- dles about 10 megabits per second. A newer version, Fast Ethernet (or 100Base-T ) transfers data at 100 mega- bits per second. The newest version, Gigabit Ethernet (or 1000Base-T ) transmits data at the rate of 1 gigabit (1,000 megabits) per second. Most new microcomputers come equipped with an Ethernet card and an Ethernet port (Chapter 4). TOKEN RING A technology developed by IBM, Token Ring is a LAN technology that transmits a special control message or message frame, called a “token,” around a network to each node, signaling the node that it can then send a message. The node then panel 6.9 Star network This arrangement con- nects at the network’s devices to a central host computer, through which all communications must pass. Traders work on the floor of the heavily networked New York Stock Exchange. Hard disk drive Hub Computer Computer Printer Terminal Terminal Terminal Server
  349. Communications, Networks, & Safeguards 325 sends the token on to

    the next node, thus guaranteeing that each computer or device on the network will transmit at regular intervals. The Token Ring standard is mainly used in star or ring topologies. The advantage of Token Ring is that broken cable connections are easily detected and thus easily fixed. 6.3 WIRED COMMUNICATIONS MEDIA What are types of wired communications media? It used to be that two-way individual communications were accomplished mainly in two ways. They were carried by the medium of (1) a telephone wire or (2) a wireless method such as shortwave radio. Today there are many kinds of communications media, although they are still wired or wireless. Commu- nications media, or communications channels, carry signals over a com- munications path, the route between two or more communications media devices. The speed, or data transfer rate, at which transmission occurs—and how much data can be carried by a signal—depends on the media and the type of signal. Wired Communications Media: Wires & Cables What is the difference between the three types of wired communications media? Three types of wired communications media are twisted-pair wire (conven- tional telephone lines), coaxial cable, and fiber-optic cable. The various kinds of wired internet connections discussed in Chapter 2—dial-up modem, DSL, ISDN, cable modem, T1 lines, as well as internet backbones—are created by using these wired communications media. TWISTED-PAIR WIRE The telephone line that runs from your house to the pole outside, or underground, is probably twisted-pair wire. Twisted-pair wire consists of two strands of insulated copper wire, twisted around each other. This twisted-pair configuration (compared to straight wire) somewhat reduces interference (called “crosstalk”) from electri- cal fields. Twisted-pair is relatively slow, carrying data at the rate of 1–128 megabits per second (normally 56 Kbps). Moreover, it does not protect well against electrical interference. However, because so much of the world is already served by twisted-pair wire, it will no doubt be used for years to come, both for voice messages and for modem-transmitted computer data (dial-up connections). The prevalence of twisted-pair wire gives rise to what experts call the “last- mile problem.” That is, it is relatively easy for telecommunications companies to upgrade the physical connections between cities and even between neigh- borhoods. But it is expensive for them to replace the “last mile” of twisted-pair wire that connects to individual houses. COAXIAL CABLE Coaxial cable, com- monly called “co-ax,” is a high- frequency transmission cable that consists of insu- lated copper wire wrapped in a solid or braided metal shield and then in an external plastic cover. Co-ax is widely used for cable television and cable internet connections. Thanks to the extra insulation, coaxial cable is much better than twisted- pair wiring at resisting noise. Moreover, Twisted-pair wire Coaxial cable
  350. info! more 326 Chapter 6 it can carry voice and

    data at a faster rate (up to 200 megabits per second; residential cable, 4–10 megabits per second). Often many coaxial cables are bundled together. FIBER-OPTIC CABLE A fiber-optic cable consists of dozens or hundreds of thin strands of glass or plastic that transmit pulsating beams of light rather than electricity. These strands, each as thin as a human hair, can transmit up to about 2 billion pulses per second (2 gigabits); each “on” pulse represents 1 bit. When bundled together, fiber-optic strands in a cable 0.12 inch thick can support a quarter- to a half-million voice conversations at the same time. Moreover, unlike electrical signals, light pulses are not affected by random electromagnetic interference in the environment. Thus, fiber-optic cable has a much lower error rate than normal telephone wire and cable. In addition, fiber-optic cable is lighter and more durable than twisted-pair wire and co-ax cable, although it is more expensive. A final advantage is that it cannot easily be wiretapped, so transmissions are more secure. Wired Communications Media for Homes: Ethernet, HomePNA, & HomePlug What is the difference between the three types of wired communications media used for home networks? Many households now have more than one computer, and many have taken steps to link their equipment in a home network. Indeed, some new high-tech homes include network technology that links as many as 12 televisions posi- tioned around the house plus computers, telephones, lights, audio, and alarm systems. Traditionally, wired media have been used to connect equipment. Three wired network technologies are Ethernet, HomePNA, and HomePlug. ETHERNET Most personal PCs come with Ethernet capability. Homes wanting to network with this technology use the kind of cabling (Cat5) that permits either regular Ethernet data speeds (10 megabits per second) or Fast Ether- net speeds (100 megabits per second). Besides cabling, which will have to be installed throughout the house (by you or by a professional installer), a home Ethernet network may require a router and a hub, which may be available from your internet access provider. HOMEPNA: USING THE HOME’S EXISTING TELEPHONE WIRING Does your house have a phone jack in every room in which you have a computer? Then you might be interested in setting up a phoneline network, using conventional phonelines to connect the nodes in a network. The means for doing this is HomePNA (HPNA) technology, an alliance of leading technology compa- nies working to ensure the adoption of a single, unified existing wire (telephone and cable) home-networking standard that transmits data at about 320 megabits per second. HOMEPLUG: USING THE HOME’S EXISTING ELECTRIC-POWER WIRING Alter- natively, you might want to set up a power-line network, using conventional power lines in a home to connect the nodes in a network, using HomePlug . HomePlug technology is a standard that allows users to send data over a home’s existing electrical (AC) power lines, which can be transmitted at up to 200 megabits per second . This kind of communications medium has an advantage, of course, in that there is at least one power outlet in every room. Some households have a combination of wired and wireless networks, but more are going over to all-wireless. Fiber-optic strands Do We Need More Fiber Optics? Google has long been buying up data communications capac- ity, especially fiber-optics. Its search engine works by making copies of nearly every page of the internet in its own data centers. That requires Google to move a huge amount of data around the world on a regular basis. And its plans to deliver applications over the internet will use even more bandwidth (www.googlizationofeverything. com/2007/09/do_we_need_ more_fiberoptic_cab.php, accessed August 13, 2009).
  351. Communications, Networks, & Safeguards 327 Christie Thomas, 33, of Morgan

    Hill, California, is a “mompreneur.” A loan officer and independent con- tractor for Pacific West Financial, she does loan work and research while her 2-year-old daughter sleeps and when her husband, a teacher, gets home from work. “It’s very lucrative,” says Thomas, who also manages other loan officers. However, she adds, “You do have to manage your time very well. I can work in my pajamas.”6 Home-based working moms, or mompreneurs, are the beneficiaries of technology such as high-speed internet access, the widespread availability of personal computers, and the willingness of budget-conscious companies to rely on home-based free agents. But if this kind of “home work” was once primarily the province of technical employees, it is also now moving into senior management ranks.7 The rise of remote working arrangements may be part of a larger trend. “Powerful economic forces are turning the whole labor force into an army of freelancers—temps, con- tingents, and independent contractors and consultants,” says business strategy consultant David Kline. The result, he believes, is that “computers, the net, and telecommut- ing systems will become as central to the conduct of 21st- century business as the automobile, freeways, and corporate parking lots were to the conduct of mid-20th- century business.”8 The transformation gathered momentum dur- ing the 2008–2009 economic downturn, when companies looked to save money on office real estate costs.9 Two offshoots of nontraditional office work are telecom- muting and telework. Telecommuting: Working from Home Working at home while in telecommunication with the office is called telecommuting. In the United States, telecom- muting has been gaining favor for several years. Accord- ing to one research group, in 2008 17.2 million Americans were working at least one day a month for their employer remotely or at home, an increase of 74% since 2005.10 A great many of these workers were employees who tele- commute to traditional offices. Telecommunication can have many benefits. The advan- tages to society are reduced traffic congestion, energy con- sumption, and air pollution. The advantages to employees are lower commuting and workplace-wardrobe costs and more choices about how they handle their time. The advantage to employers, it’s argued, is increased productivity, because tele- commuters may experience fewer distractions at home than in the office and can work flexible hours. Absenteeism may be reduced, teamwork improved, and the labor pool expanded because hard-to-get employees don’t have to uproot them- selves from where they want to live. Costs for office space, parking, insurance, and other overhead are reduced. PRACTICAL ACTION Telecommuting & Telework: The Nontraditional Workplace Despite the advantages, however, telecommuting has some drawbacks. Employees sometimes feel isolated, even deserted, or they are afraid that working outside the office will hinder their career advancement. They also find the arrangements blur the line between office and home, straining family life. Employers may feel telecommuting causes resentments among office- bound employees, and they may find it difficult to measure employees’ productivity. In addition, with teamwork now more of a workplace requirement, managers may worry that telecommuters cannot keep up with the pace of change. Finally, some employers are concerned that telecommuters create more opportunities for security breaches by hackers or equipment thieves.11 Telework: Working from Anywhere More recently, the term telework (or virtual office) has been adopted to replace the term “telecommuting” because it encompasses not just working from home but working from anywhere: “a client’s office, a coffee shop, an airport lounge, a commuter train,” in one description. “With cell- phones, broadband at home, Wi-Fi, virtual private networks, and instant messaging becoming ubiquitous, telework has become easier than ever.”12 Employees at big high-tech companies work from their homes, cars, and other nontraditional work sites. Thus, the workplace exists more in virtual than physical space, and the actual office may be little more than a computer, a high-bandwidth connection, and a cellphone, with most communication with the outer world being through a voice mail system, an email address, a web page, and a post office box. (Indeed, you can live any- where you want in the world but have a local business presence with a prestigious physical mailing address and local phone number by hiring a virtual office web ser- vice such as Officescape, whose staff can handle all your office information locally and forward your physical mail and packages.) Despite the history of productivity, some managers fear losing control over employees who become teleworkers, picturing them at home watching TV instead of working. The way to avoid that, suggests Robert Smith, director of ITAC (formerly the International Telework Association & Council), is for companies to install ways of measuring productivity. “Good organizations put into place performance require- ments,” he says. “They have a process in which managers can set performance goals and properly evaluate whether those goals are met. If you have that in place, you’ll have a more effective organization, whether an employee is 10 feet or 10 miles away.”13
  352. 328 Chapter 6 6.4 WIRELESS COMMUNICATIONS MEDIA What are types

    of wireless communications media, both long distance and short distance? Wireless connection has become increasingly popular, with 56% of Ameri- cans reporting in 2009 they got on the internet through wireless, many (39%) through a laptop, others (32%) through a mobile device, such as a cellphone. 14 Wireless, mobile technology has led to a new class of worker that scholars David Pauleen and Brian Harmer have dubbed nanobots: “Empowered by their mobile devices and remote access to the corporate network, nanobots put in long hours, sometimes seven days a week—just not at their office desks. Different from mobile workers, who usually stay in close contact with manag- ers, nanobots thrive on their driven natures and on the personal freedom with which they are entrusted.” 15 Cellphones are only one kind of wireless communication. We consider (1) the electromagnetic spectrum, (2) the five types of long-distance wireless communications media, (3) long-distance wireless, and (4) short-distance wireless. The Electromagnetic Spectrum, the Radio-Frequency (RF) Spectrum, & Bandwidth What is the electromagnetic spectrum, and how do electromagnetic waves differ? Often it’s inefficient or impossible to use wired media for data transmission, and wireless transmission is better. To understand wireless communication, we need to understand transmission signals and the electromagnetic spectrum. THE ELECTROMAGNETIC SPECTRUM Telephone signals, radar waves, micro- waves, and the invisible commands from a garage-door opener all represent 54–88 MHz Broadcast TV channels, analog and digital/shared with medical telemetry equipment such as wireless heart monitors in hospitals (76–88, 174–216) 72–76 MHz Remote-control toys 118 MHz–137 MHz Aviation use (aircraft navigation, etc.) 43–50 MHz Older cordless phones 462–467 MHz Family radio services (FRS) 470–890 MHz Broadcast TV (channels 14 to 83)/ medical telemetry 1,000–1,600 MHz Includes air traffic control, aerospace, military, radar, GPS, and other satellite communications 746–802 MHz Reallocated from TV channels 60–69 for commercial and public safety uses 900 MHz Digital cordless phones 869–894 MHz Cellphones 824–849 MHz Cellphones 174-216 MHz Broadcast TV (channels 7 to 13)/ medical telemetry 928–929 MHz, 932, 941, 952–960 MHz Point-to-point communications (ATMs, etc.) 76–88 MHz– 88–108 MHz FM radio 49 MHz Baby monitors 535 kHz–1.7 MHz AM radio 5.9 MHz– 26.1 MHz Short wave radio Around 40 MHz Garage door openers . . . 500 0 1,000 1,500 panel 6.10 The radio-frequency spectrum The radio-frequency spectrum, which carries most communications signals, appears as part of the electromagnetic spectrum.
  353. Communications, Networks, & Safeguards 329 different waves on what is

    called the electromagnetic spectrum of radiation. The electromagnetic spectrum of radiation is the basis for all telecommu- nications signals, carried by both wired and wireless media. Part of the electromagnetic spectrum is the radio-frequency (RF) spec- trum, fields of electrical energy and magnetic energy that carry most communications signals. ( • See Panel 6.10. ) Internationally, the RF spectrum is allocated by the International Telecommunications Union (ITU) in Geneva, Switzerland. Within the United States, the RF spectrum is further allocated to nongovernment and government users. The Federal Communications Commission (FCC), acting under the author- ity of Congress, allocates and assigns frequencies to nongovernment users. The National Telecommunications and Information Administration (NTIA) is responsible for departments and agencies of the U.S. government. Electromagnetic waves vary according to frequency —the number of times a wave repeats, or makes a cycle, in a second. The radio-frequency spectrum ranges from low-frequency waves, such as those used for garage-door open- ers (40 megahertz), through the medium frequencies for certain cellphones (824–849 megahertz) and air-traffic control monitors (960–1,215 megahertz), to deep-space radio communications (2,290–2,300 megahertz). Frequencies at the very ends of the spectrum take the forms of infrared rays, visible light, ultraviolet light, X rays, and gamma rays. BANDWIDTH The bandwidth is the range, or band, of frequencies that a transmission medium can carry in a given period of time. For ana- log signals, bandwidth is expressed in hertz (Hz), or cycles per second. For example, certain cellphones operate within the range 824–849 megahertz— that is, their bandwidth is 25 megahertz. The wider a medium’s bandwidth, the more frequencies it can use to transmit data and thus the faster the transmission. There are two general classes of bandwidth—narrow and broad—which can be expressed in hertz but also in bits per second (bps): 1,850–1,990 MHz Broadband personal communications services 2,290–2,300 MHz Government deep-space- to-Earth communications 2,500–2,690 MHz Potential 3rd- generation (3G) cellular services 2,400–2,483 MHz Cordless “spread spectrum” phones; Wi-Fi wireless networking systems 2,345–2,360 MHz Digital radio satellite services 2,110–2,150 MHz 3rd generation (3G) cellular services 1,710–1,855 MHz Spectrum targeted for 3G communications 2,540 MHz Microwave ovens 5.8 GHz New cordless phones Visible light Infrared 6 7 8 9 0 # * 1 2 3 4 5 6 7 8 9 0 # * 1 2 3 4 5 2,000 2,500 1,500 100 GHz . . .
  354. 330 Chapter 6 • Narrowband: Narrowband, also known as voiceband,

    is used for regular telephone communications —that is, for speech, faxes, and data. Transmission rates are usually 1.5 megabits per second or less. Dial-up modems use this bandwidth. • Broadband: Broadband is used to transmit high-speed data and high- quality audio and video. Transmission speeds are 1.5 megabits per second to (for super-broadband and ultra-broadband) 1 gigabit per second or more. Currently, the average download speed in the United States is 4.9 megabits per second, compared with 63.6 megabits per second for Japan. That’s why the United States ranks 15 out of 30 in broadband deployment, trailing such coun- tries as South Korea and Japan, with their blinding megabit speeds. 16 WAP: WIRELESS APPLICATION PROTOCOL Wireless handheld devices such as cellphones use the Wireless Application Protocol for connecting wireless users to the World Wide Web. Just as the protocol TCP/IP gives you a wired con- nection to your internet access provider, the Wireless Application Protocol (WAP) is designed to link nearly all mobile devices to your telecommuni- cations carrier’s wireless network and content providers. Five Types of Wireless Communications Media What are the differences between the five types of wireless communications media? The five types of wireless media are infrared transmission, broadcast radio, cel- lular radio, microwave radio, and communications satellite. INFRARED TRANSMISSION Infrared wireless transmission sends data signals using infrared-light waves at a frequency too low (1–16 mega- bits per second) for human eyes to receive and interpret. Infrared ports can be found on some laptop computers, PDAs, digital cameras, and printers, as well as wireless mice. TV remote-control units use infra- red transmission. The drawbacks are that line-of-sight communication is required—there must be an unob- structed view between transmitter and receiver—and transmission is confined to short range. BROADCAST RADIO When you tune in to an AM or FM radio station, you are using broadcast radio, a wireless transmission medium that sends data over long distances at up to 2 megabits per second — between regions, states, or coun- tries. A transmitter is required to send messages and a receiver to receive them; sometimes both sending and receiving functions are combined in a transceiver. In the lower frequencies of the radio spec- trum, several broadcast radio bands are reserved not only for conventional AM/FM radio but also for broadcast television, CB (citizens band) radio, ham (amateur) radio, cellphones, and private radio-band mobile services (such as police, fire, Line-of- sight signal Microwave relay station
  355. Communications, Networks, & Safeguards 331 and taxi dispatch). Some organizations

    use specific radio frequencies and networks to support wireless communications. For example, UPC (Universal Product Code) bar-code readers are used by grocery-store clerks restocking store shelves to communicate with a main computer so that the store can con- trol inventory levels. In addition, there are certain web- enabled devices that follow standards such as Wi-Fi (wireless fidelity), as we discuss in a few pages. CELLULAR RADIO Actually a form of broadcast radio, cellular radio is widely used for cellphones and wireless modems, using high-frequency radio waves to transmit voice and digital messages. Unlike CB (citizens band) radio, used by truck drivers, which has a few radio channels that everyone must share, cellular radio channels are reused simultaneously in nearby geo- graphic areas, yet customers do not interfere with each others’ calls. 17 We discuss cellphones in more detail starting on p. 336. MICROWAVE RADIO Microwave radio transmits voice and data at 45 mega- bits per second through the atmosphere as superhigh-frequency radio waves called microwaves, which vibrate at 2.4 gigahertz (2.4 billion hertz) per second or higher. These frequencies are used not only to operate micro- wave ovens but also to transmit messages between ground-based stations and satellite communications systems. One short-range microwave standard used for communicating data is Bluetooth, as we shall discuss. Nowadays horn-shaped microwave reflective dishes, which contain trans- ceivers and antennas, are nearly everywhere—on towers, buildings, and hill- tops. Why, you might wonder, do we have to interfere with nature by putting a microwave dish on top of a mountain? As with infrared waves, microwaves are line-of-sight; they cannot bend around corners or around the earth’s curvature, so there must be an unobstructed view between transmitter and receiver. Thus, microwave stations need to be placed within 25–30 miles of each other, with no obstructions in between. The size of the dish varies with the distance (perhaps 2–4 feet in diameter for short distances, 10 feet or more for long distances). In a string of microwave relay stations, each station will receive incoming mes- sages, boost the signal strength, and relay the signal to the next station. More than half of today’s telephone systems use dish microwave transmis- sion. However, the airwaves are becoming so saturated with microwave signals that future needs will have to be satisfied by other channels, such as satellite systems. COMMUNICATIONS SATELLITES To avoid some of the limitations of microwave earth stations, communications companies have added microwave “sky stations”— communications satellites. Communications satel- lites are microwave relay stations in orbit around the earth. Transmitting a signal from a ground sta- tion to a satellite is called uplinking; the reverse is called downlinking. The delivery process will be slowed if, as is often the case, more than one satel- lite is required to get the message delivered. Satel- lites cost from $300 mil- lion to $700 million each. A satellite launch costs between $50 million and Microwave towers on buildings in Shanghai Communications satellites Satellite launch in India
  356. 332 Chapter 6 $400 million. Communications satellites are the basis

    for the Global Posi- tioning System (GPS), as we shall discuss. Satellite systems may occupy one of three zones in space: GEO, MEO, and LEO. • GEO: The highest level, known as geostationary earth orbit (GEO), is 22,300 miles and up and is always directly above the equator. Because the satellites in this orbit travel at the same speed as the earth, they appear to an observer on the ground to be stationary in space—that is, they are geostationary. Consequently, microwave earth stations are always able to beam signals to a fixed location above. The orbiting satellite has solar- powered transceivers to receive the signals, amplify them, and retransmit them to another earth station. At this high orbit, fewer satellites are required for global coverage; however, their quarter-second delay makes two-way conversations difficult. • MEO: The medium-earth orbit (MEO) is 5,000–10,000 miles up. It requires more satellites for global coverage than does GEO. • LEO: The low-earth orbit (LEO) is 200–1,000 miles up and has no signal delay. LEO satellites may be smaller and are much cheaper to launch. Long-Distance Wireless: One-Way Communication How do the Global Positioning System and one-way pager systems work? Mobile wireless communications have been around for some time. The Detroit Police Department started using two-way car radios in 1921. Mobile telephones were introduced in 1946. Today, however, we are in the midst of an explosion in mobile wireless use that is making worldwide changes. GEO Orbit: 22,300 miles at the equator Orbits: Inclined to the equator, about 6,000 miles up MEO Orbits: 400–1,000 miles above the earth’s surface LEO
  357. Communications, Networks, & Safeguards 333 There are essentially two ways

    to move information through the air long distance on radio frequencies—one way and two way. One-way communications, discussed below, is typified by the sat- ellite navigation system known as the Global Positioning System and by some pagers. Two-way communications, described on page 335, is exemplified by cellphones. THE GLOBAL POSITIONING SYSTEM Doreen Rosimos of Marl- borough, New Hampshire, who heads a firm that funds micro- enterprises, sometimes brings along her Rottweiler, Zelda, when she takes business trips. One day in Kentucky when Zelda became sick, Rosimos quickly typed “veterinarian” in her car’s global posi- tioning device and found one nearby within minutes. 18 A $10 billion infrastructure developed by the military, the Global Positioning System (GPS) consists of 24–32 MEO earth-orbiting satellites continuously transmitting timed radio signals that can be used to identify earth locations. • How GPS works: The U.S. military developed and implemented this satellite network in the 1970s as a military navigation system, but on May 1, 2000, the federal government opened it up to everyone else. Each of these 3,000- to 4,000-pound, solar- powered satellites circles the earth twice a day at an altitude of 11,000 nautical miles. A GPS receiver—handheld or mounted in a vehicle, plane, or boat—can pick up transmissions from any four satellites, interpret the information from each, and pinpoint the receiver’s longitude, latitude, and altitude. ( • See Panel 6.11 on the next page. ) The system is accurate within 3–50 feet, with 10 feet being the norm. About half of the mobile phones in the United States have GPS. 19 • The uses of GPS: Besides being the technology behind car onboard navigation systems, the GPS is used for such activities as tracking trucks, buses, and taxis; locating stolen cars; orienting hikers; and aiding in surveying. An aerial camera connected to a GPS receiver can automatically tag photos with GPS coordinates, showing where the photograph was taken, which can be useful to surveyors, forestry managers, search- and-rescue teams, and archaeologists. GPS has been used by scientists to keep a satellite watch over a Hawaiian volcano, Mauna Loa, and to capture infinitesimal movements that may be used to predict eruptions. In one technology, cellular carriers have E911 (for “Enhanced 911”) capability that is able to locate, through tiny GPS receivers embedded in users’ digital cellphones, the position of every person making an emergency 911 call. 20 This blind woman is using a GPS unit with a Braille keyboard and voice output to find her way around a park. The RoamEO Location System is designed for pet owners to quickly and accurately locate their pets by using GPS technology. Up to three dogs can each wear a GPS-equipped collar; the collars are tracked by the dog walker’s handheld GPS unit. Many cars come with GPS units to guide users to their destinations.
  358. 334 Chapter 6 panel 6.11 GPS The Global Positioning System

    uses 24 satellites, developed for military use, to pinpoint a location on the earth’s surface. The ABCs of GPS Developed by the U.S. military to aid ship and plane navigation, the Global Positioning System has evolved to serve a variety of purposes, with GPS receivers in everything from cars to handheld devices. The system has three main components—a satellite constellation, ground control, and receivers. Space There are about 24–32 satellites orbiting the Earth at an altitude of 11,000 nautical miles. Each is equipped with an atomic clock that keeps time to three-billionths of a second. The satellites send time-stamped radio signals to Earth at the speed of light. The signals include information about each satellite’s exact position. Ground control Five stations around the world monitor the satellites and send them information about their orbital position. The main control center is in Colorado Springs, Colorado. Connect four The basic premise of GPS is a concept called triangulation. Using this concept, the exact location of a golf ball on a two-dimensional course can be calculated by determining its distance from three pins. The distance from pin 1 reveals possible locations anywhere along the edge of an imaginary circle. The distances from pins 1 and 2 reveal two possible ball locations—the point where the circles intersect. The distances from pins 1, 2, and 3 reveal one possible location—the point where all three circles intersect. Triangulation works the same way in three-dimensional space, but with spheres instead of circles and a fourth reference point is needed. The receiver The receiver must pick up signals from at least four satellites. It calculates its distance from each satellite by comparing the time stamp of the signal to the time it reached the receiver. The receiver’s clock isn’t nearly as accurate as the atomic clocks in the satellites, but mathematical adjustments are made to account for inaccuracies. 3 1 2 1 1 2 • “Geocaching” hobbyists practice an activity in which they hide a metal or plastic receptacle (a cache) filled with pens, pins, pliers, and other inexpensive trinkets; give the location a funny name (“Indiana Jones Fortress of Doom”); and post the GPS coordinates on the official
  359. Communications, Networks, & Safeguards 335 geocachers’ website ( www. geocaching.com

    ). Cache hunters then punch the coordinates into their handheld GPS units ($90–$700 at sporting-goods and electronics stores) and follow electronic prompts to the site, where they sign a log and replace some trinkets with gewgaws of their own. • The limitations of GPS: Not all services based on GPS technology are reliable, as any frequent user of online mapping systems (such as those of MapQuest, MSN Maps and Directions, Google Earth, and Yahoo Maps) knows by now. Indeed, about 1 in 50 computer- generated directions is a dud, according to Doug Richardson, executive director of the Association of American Geographers, mostly because of inaccurate road information. “You have to have the latest data about road characteristics—things like one-way streets, turns, and exits in order for it to generate accurate directions,” he says. 21 Emergency operators answering E911 cellphone calls have also often found some unsettling results, in which the information giving the caller’s location either didn’t appear or was inaccurate. The Federal Communications Com- mission has ordered that wireless carriers must meet standards of accuracy for 95% of E911 systems by September 2012. 22 PAGERS Known as beepers, for the sound they make when activated, pagers are simple radio receivers that receive data sent from a special radio trans- mitter. The radio transmitter broadcasting to the pager sends signals over a specific frequency. All of the pagers for that particular network have a built-in receiver that is tuned to the same frequency broadcast from the transmitter. The pagers listen to the signal from the transmitter constantly as long as the pager is turned on. Although generally obsolete, pagers are still used in areas where cellphones are unreliable or prohibited, such as large hospital complexes. They are also used to reach some emergency personnel and to control traffic signals and some irrigation systems. Long-Distance Wireless: Two-Way Communication How do I distinguish among five types of long-distance wireless technologies? Residential home phone users have been doing “cord cutting” to the point where in the United States in 2009 about 20% of homes had only cellphones compared with 17% with landlines but no cellphones. 23 About a third of people ages 18–24 live in households with only cellphones. Worldwide, in 2008 there were more than three times as many mobile phone subscriptions as fixed tele- phone lines—4.1 billion versus 1.1 billion. 24 Two-way wireless communications devices have evolved over time from two-way pagers and wireless email devices such as the original BlackBerry, which has become an all-in-one wireless data and voice device, so popular among users that it has earned the nickname “CrackBerry.” 25 The categories Pager Brian Sniatkowski holds a GPS unit in the Kekeout Reservoir Forest while geo- caching, engaging in a high-tech treasure hunt for GPS users. Participants set up caches all over the world and share the locations via the internet. GPS users can then use the location coordinates to find the caches. Each cache may pro- vide the finder with a variety of rewards; each finder is asked to put something new in the cache. BlackBerry
  360. 336 Chapter 6 of long-distance wireless devices we will discuss

    use the transmission medium known as cellular radio, which has several levels: 1G, 2G, 3G, and 4G. 1G (FIRST-GENERATION) CELLULAR SERVICE: ANALOG CELLPHONES “In the fall of 1985,” wrote USA Today technology reporter Kevin Maney, “I went to Los Angeles to research a story about a new phenomenon called a cellphone. I got to use one for a day. The phones then cost $1,000 and looked like field radios from M * A * S * H. Calls were 45 cents a minute, and total cellphone users in the world totaled 200,000.” 26 By 2013, it is estimated, there will be 6.5 billion cellphones in use worldwide. 27 Cellphones are essentially two-way radios that operate using either analog or digital signals. Analog cellphones are designed primarily for communicat- ing by voice through a system of ground-area cells. Each cell is hexagonal in shape, usually 8 miles or less in diameter, and is served by a transmitter- receiving tower. Communications are handled in the bandwidth of 824–894 megahertz. Calls are directed between cells by a mobile-telephone switching office (MTSO). Movement between cells requires that calls be “handed off” by this switching office. ( • See Panel 6.12. ) This technology is known as 1G, for “first generation.” Inside a cellphone FPO Call wirelessly finds nearest cellular tower. Towers broadcast recipient’s number via radio frequency. A voice line is established via the tower by the MTSO. Recipient’s cellphone “hears” broadcast. It establishes a connection with the nearest tower. . . . a land-based phone . . . . . . or initiates search for recipient on the cellular network by sending recipient’s phone number to all its towers. MTSO routes call over phone network to . . . Tower sends signal via traditional phone network and lines to a mobile telephone switching office (MTSO). Call originates from a cell phone. Conventional phone Mobile telephone switching office (MTSO) As you travel, the signal is passed from cell to cell. One cell 1 3 2 7 9 8 6 5 4 panel 6.12 Cellular connections
  361. info! more Communications, Networks, & Safeguards 337 Handing off voice

    calls between cells poses only minimal problems. However, handing off data transmission (where every bit counts), with the inevitable gaps and pauses on moving from one cell to another, is much more difficult. 2G (SECOND-GENERATION) WIRELESS SERVICES: DIGITAL CELLPHONES & PDAs Digital wireless services — which support digital cellphones and personal digital assistants — use a network of cell towers to send voice communications and data over the airwaves in digital form. Known as 2G, for “second-generation,” technology, digital cellphones began replacing analog cellphones during the 1990s as telecommunications companies added digital transceivers to their cell towers. 2G (second-generation) technology was the first digital voice cellular network; data communication was added as an afterthought, with data speeds ranging from 9.6 to 19.2 kilobits per second. 2G technology not only dramatically increased voice clarity; it also allowed the telecommunications companies to cram many more voice calls into the same slice of bandwidth. 3G (THIRD-GENERATION) WIRELESS DIGITAL SERVICES 3G cellphones look more like PDAs. 3G (third-generation) wireless digital services, often called broadband technology, are based on the U.S. GSM standard and support devices that are “always on,” carry data at high speeds (144 kilobits per sec- ond up to 2.4 megabits per second), accept emails with attachments, provide internet and web access, are able to display color video and still pictures, and play music. There are several 3G standards. ( • See Panel 6.13. ) 4G (FOURTH-GENERATION) WIRELESS DIGITAL SERVICES: WIMAX The latest standard, 4G (fourth-generation) wireless services, uses the standard known as WiMax (for Worldwide Interoperability for Microwave Access), a wireless standard capable of transmitting at a typical range of 6–10 miles at up to 20 megabits per second. (Wi-Fi, the popular short-range standard, is similar to WiMax but doesn’t transmit as far.) There are two varieties of WiMax, one fixed and one mobile. Sprint Nextel Corp. launched the first WiMax 4G network in Baltimore in October 2008. 28 Atlanta, Charlotte, Chicago, Dallas, Ft. Worth, Honolulu, Las Vegas, Philadelphia, Portland, and Seattle were scheduled to have Spring 4G rollouts by the end of 2009, and residents of Boston, Houston, New York, San Francisco, and Washington, DC were supposed to receive the service in 2010. 29 Short-Range Wireless: Two-Way Communication How do I distinguish among the three types of short-range wireless technologies? We have discussed the standards for high-powered wireless digital commu- nications in the 800–1,900 megahertz part of the radio-frequency spectrum, which are considered long-range waves. Now let us consider low-powered wireless communications in the 2.4–7.5 gigahertz part of the radio spectrum, which are short-range and effective only within several feet of a wireless Survival Tip Cellphone Minutes If you have a limited amount of daytime/anytime minutes on your cellphone service, you can conserve minutes by calling your cellphone voice mail from a land-line POTS telephone. panel 6.13 3G standards Standard Speed in Kbps GSM (Global System for Mobile Communication) About 9.6 UMTS (Universal Mobile Telecommunications System) 220–320 GPRS (General Packet Radio Service) 30–50 CDMA (Code Division Multiple Access) About 14.4 EDGE (Enhanced Data for Global Evolution) Up to 236 EVDO (Evolution Data Optimized) 400–700 Ideal Cellphone & Service What’s the ideal cellphone and service for your area? To com- pare plans, go to: www.cellmania.com http://reviews.cnet.com/4520- 7609_7-5537615-1.html
  362. 338 Chapter 6 access point—generally between 30 and 250 feet.

    This band is available globally for unlicensed, low-power uses and is set aside as an innovation zone where new devices can be tested without the need for a government license; it’s also used for industrial, scientific, and medical devices. There are three kinds of networks covered by this range: • Local area networks—range 100–228 feet: These include the popular Wi-Fi standards. • Personal area networks—range 30–32 feet: These use Bluetooth, ultra wideband, and wireless USB. • Home automation networks—range 100–150 feet: These use the Insteon, ZigBee, and Z-Wave standards. SHORT-RANGE WIRELESS FOR LOCAL AREA NETWORKS: WI-FI B, A, G, & N Wi-Fi is known formally as an 802.11 network, named for the wireless technical stan- dard specified by the Institute of Electrical and Electronics Engineers (IEEE). As we mentioned in Chapter 2, Wi-Fi — short for “wi reless fi delity ”— is a short-range wireless digital standard aimed at helping portable computers and handheld wireless devices to communicate at high speeds and share internet connections at distances of 100–228 feet. You can find Wi-Fi connections, which operate at 2.4–5 gigahertz, inside offices, airports, and internet cafés, and some enthusi- asts have set up transmitters on rooftops, distributing wire- less connections throughout their neighborhoods. ( • See Panel 6.14. ) Wi-Fi camera Wi-Fi A land-based internet connection (DSL, cable modem, TI line, etc.) . . . . . . is connected to an antenna, also known as an access point. The access point translates the internet signal into radio waves and broadcasts them over an area about the size of a house. Notebook computer Receiving antenna Anyone within range who has a receiving antenna, usually attached to a notebook computer, can pick up the signal. Access point Cable panel 6.14 Wi-Fi
  363. info! more Communications, Networks, & Safeguards 339 There are four

    varieties of Wi-Fi standards—Wi-Fi a, Wi-Fi b, Wi-Fi g, and Wi-Fi n: • Wi-Fi b, a, and g: Named for variations on the IEEE 802.11 standard (802.11b, 802.11a, 802.11g), these all typically transmit at data rates ranging from 11 megabits per second up to about 126 feet indoors (for Wi-Fi b, the older and slower version) to 54 megabits per second up to 120 feet (for Wi-Fi a and g). • Wi-Fi n with MIMO: Wi-Fi n—when used with a technology called MIMO (pronounced “my-moh” and short for “multiple input multiple output”), which extends the range of Wi-Fi by using multiple transmitting and receiving antennas (instead of the one transmit and two receive antennas typical for most Wi-Fi)—is able to transmit at 108–320 megabits per second up to about 228 feet. Increasingly, people are installing Wi-Fi networks in their homes, going online through wireless hot spots at Starbucks and other establishments, or bringing a device called a MiFi on their travels, a 2-ounce, credit-card-size gadget that acts as a private Wi-Fi network. 30 Some airlines also offer Wi-Fi connections on certain planes and routes. 31 Whatever the means of connec- tion, it’s extremely important to make sure the Wi-Fi connection is secure against cyberspying. “If you’re using a mobile connection, you may not even be aware that you’re connected to an unverified access point because the con- nection can be made without your knowledge,” says one writer. “Disable your Wi-Fi software, instead of leaving it on to autoconnect, whenever you’re not using it. This will keep you from unknowingly connecting to a fraudulent net- work and wasting your laptop’s battery.” 32 We give some more security tips in another few pages. SHORT-RANGE WIRELESS FOR PERSONAL AREA NETWORKS: BLUETOOTH, ULTRA WIDEBAND, & WIRELESS USB As we stated, personal area networks (PANs) use short-range wireless technology to connect personal electron- ics, such as cellphones, PDAs, MP3 players, and printers in a range of 30–32 (sometimes up to 320) feet. The principal wireless technology used so far has been Bluetooth, which is now being joined by ultra wideband (UWB) and wireless USB. • Bluetooth: Bluetooth is a short-range wireless digital standard aimed at linking cellphones, PDAs, computers, and peripherals up to distances of about 30 feet. (The name comes from Harald Bluetooth, the 10th-century Danish king who unified Denmark and Norway.) Now transmitting up to 3 megabits per second, the original version of Bluetooth was designed to replace cables connecting PCs to printers and PDAs or wireless phones and to overcome line-of-sight problems with infrared transmission. When Bluetooth-capable devices come within range of one another, an automatic electronic “conversation” takes place to determine whether they have data to share, and then they form a mini-network to exchange that data. (• See Panel 6.15, next page. ) Bluetooth 2.1 has a data rate of about 3 megabits per second, faster than the original Bluetooth, although not as high-speed as Wi-Fi g or n. This version also has lower battery consumption than the older version. Bluetooth 3.0 ϩ HS, released in April 2009, has a data rate of around 24 megabits per second, considerably faster and useful in transferring large amounts of data. Bluetooth technology is found in many Palm PDAs, Pocket PCs, and some cellphones. • Ultra wideband (UWB): Developed for use in military radar systems, ultra wideband (UWB) is a promising technology operating in the range of 480 megabits per second up to about 30 feet that uses a low-power Lastest Bluetooth Devices What are the newest Bluetooth devices? See: www.bluetooth.com Bluetooth symbol on a note- book computer
  364. info! more 340 Chapter 6 source to send out millions

    of bursts of radio energy every second over many different frequencies, which are then reassembled by a UWB receiver. It operates over low frequencies not used by other technologies, making it a candidate to replace many of the cables that now currently connect household and office devices. UWB systems tend to be short-range and indoor applications. High-data-rate UWB can enable wireless monitors, the efficient transfer of data from digital camcorders, wireless printing of digital pictures from a camera without the need for an intervening personal computer, and the transfer of files among cellphones and other handheld devices such as personal digital audio and video players. Although UWB is 100 times as fast as Bluetooth and should be a natural successor to Wi-Fi, unfortunately the industry committee that is supposed to be setting specifications for it has been deadlocked between two technical approaches and has failed to agree on a standard. Thus, some predict that UWB is effectively dead in consumer and computer markets. 33 • Wireless USB: Wireless USB (WUSB) has a typical range of 32 feet and a maximum data rate of 480 megabits per second. Wireless USB is used in game controllers, printers, scanners, digital cameras, MP3 players, hard disks, and flash drives. SHORT-RANGE WIRELESS FOR HOME AUTOMATION NETWORKS: INSTEON, ZIGBEE, & Z-WAVE Home automation networks—those that link switches and sensors around the house and yard—use low-power, narrowband wireless tech- nology, which operate in a range of 100–150 feet but at relatively slow data rates of 13.1–250 kilobits per second. The current standards are Insteon, ZigBee, and Z-Wave. All three are so-called mesh technologies— networked devices equipped with two-way radios that can communicate with each other rather than just with the controller, the device that serves as central command for the network. Meshing The following websites provide more information about these mesh technologies: www.insteon.net www.zigbee.org www.z-wavealliance.com. Printer Palm Windows PC Macintosh Internet access point Headset Pocket PC Cellphone panel 6.15 Bluetooth Bluetooth allows two devices to interact wirelessly in some- times novel ways. A Bluetooth- equipped notebook, for example, can connect through a similarly enabled cellphone or internet access point to send and receive email. In addition to the links shown, Bluetooth can be used to network similar devices—for example, to send data from PC to PC, as long as they are up to 33–320 feet apart. Line of sight is not required.
  365. info! more Communications, Networks, & Safeguards 341 • Insteon: Insteon

    combines electric power line and wireless technologies and is capable of sending data at 13.1 kilobits a second at a typical range of 150 feet. With this kind of technology, you might drive up to your house, and the garage door device would recognize your car and open to let you in. The lights would come on and your favorite radio station would start playing. • ZigBee: ZigBee is an entirely wireless, very power-efficient technology that can send data at 128 kilobytes per second at a range of about 250 feet. It is primarily touted as sensor network technology and can be used in everything from automatic meter readers and medical sensing and monitoring devices to wireless smoke detectors and TV remote controls. One of the best features is that it can run for years on inexpensive batteries, eliminating the need to be plugged into an electric power line. • Z-Wave: Z-Wave is also an entirely wireless, power-efficient technology, which can send data at 127 kilobits per second to a range of 100 feet. With a Z-Wave home, you could program the lights to go on when the garage door opens. You could program devices remotely, turning the thermostat up on the drive home from work. 6.5 CYBERTHREATS, HACKERS, & SAFEGUARDS What are areas I should be concerned about for keeping my computer system secure? San Francisco internet executive Lew Tucker found his desktop computer so compromised by internet-borne infections that he was spending time every week dealing with them. Rather than get rid of the offending programs, how- ever, he took a radical step: He threw out the whole computer. “I was losing the battle,” he says. “It was cheaper and faster to go to the store and buy a low-end PC.” 34 Is throwing your virus-overrun computer in the dumpster a rational response? Many would disagree. However, there’s no question that the ongoing dilemma of the Digital Age is balancing convenience against security. Security is a system of safeguards for protecting information technology against unau- thorized access and systems failures that can result in damage or loss. Secu- rity matters are a never-ending problem, with attacks on computers and data becoming more powerful and more complex. 35 We consider the following aspects of security as it relates to telecommunica- tions: • Cyber threats: denial-of-service attacks, worms, viruses, and Trojan horses • Perpetrators of cyber mischief: hackers and crackers • Computer safety: antivirus software, firewalls, passwords, biometric authentication, and encryption Cyber Threats: Denial-of-Service Attacks, Worms, Viruses, & Trojan Horses What are denial-of-service attacks, worms, viruses, and Trojan horses? Internet users, especially home users, are not nearly as safe as they believe, according to a study by McAfee and the nonprofit National Cyber Security Alliance. 36 Consumers suffer from complacency and a lack of expert advice on keeping their computer systems secure. The study found that 92% of 378 SECURITY Curious about Net- worked Homes? For starters, try: www.sciencedaily.com/ releases/2007/12/ 071221215021.htm www.technewsworld.com/ story/Home-Automation- The-Unfulfilled-Promise- 66973.html?wlcϭ1250196188
  366. info! more 342 Chapter 6 adults believed that they were

    safe from viruses; however, only 51% had up-to- date virus software. And 73% thought they had a firewall installed, but only 64% actually had it enabled. Little more than half had anti-spyware protec- tion, and only about 12% had phishing protection. As we will explain, these kinds of protections are musts in guarding against important cyber threats such as denial-of-service attacks, worms, viruses, and Trojan horses and other kinds of “malware.” DENIAL-OF-SERVICE ATTACKS A denial-of-service (DoS) attack , or distrib- uted denial-of-service (DDoS) attack, consists of making repeated requests of a computer system or network, thereby overloading it and denying legitimate users access to it. Because computers are limited in the number of user requests they can handle at any given time, a DoS onslaught will tie them up with fraudulent requests that cause them to shut down. The assault may come from a single computer or from hundreds or thousands of comput- ers that have been taken over by those intending harm. WORMS Worms, viruses, and Trojan horses are three forms of malware, or malicious software, that attack computer systems. The latest Symantec Inter- net Security Threat Report identified over 1.6 million instances of “malicious code” (worms and viruses) in 2008, a 165% increase over 2007. 37 A worm is a program that copies itself repeatedly into a comput- er’s memory or onto a disk drive. Sometimes it will copy itself so often it will cause a computer to crash. Among some famous worms are Code Red, Nimda, Klez, Sasser, Bagle, Blaster, Sobig, and Melissa. The 2002 worm Klez, dubbed the most common worm ever, spread its damage through Microsoft products by being inside email attachments or part of email mes- sages themselves, so that merely opening an infected message could infect a computer running Outlook or Outlook Express. ( • See Panel 6.16. ) The Sasser worm was estimated to account for 26% of all virus infections in the first half of 2004. Incredibly, one person, Sven Jaschan, 18, who admitted programming the Sasser and other worms and who was arrested in Ger- many in May 2004, was responsible for 70% of the virus infections in the early part of that year. 38 In 2008–2009, a worm known as Conficker or Downadup, spread through a Microsoft Windows vulnerability that allowed guessing of network passwords and by people hand-carrying such gadgets as USB keys, infected millions of computers. The Conficker authors cleverly updated the worm through sev- eral versions, playing a cat-and-mouse game that kept them one step ahead of security experts. Some researchers feared that Conficker could be turned into a powerful offensive weapon that could disrupt the internet itself. April 1, Cyber Security Tips Go to Stay Safe Online at: www.staysafeonline.info/ panel 6.16 How one worm works This is the Klez worm, but others work in similar ways. If you don’t rec- ognize the sender of an email message and you don’t open the message, but instead just imme- diately delete it, your PC will not be infected. 2 When you open the email or attachment, Klez infects your PC. The worm looks through your Windows, Outlook, and other address books, choosing names at random. 1 You receive an email infected with the Klez worm, which disguises where it came from by pretending it came from somewhere it did not. 3 Using its built-in email software, Klez sends copies of itself to the names in your address books.
  367. info! more Communications, Networks, & Safeguards 343 2009, was supposed

    to be the day the worm would launch a massive cyber attack, but the day came and went without incident. 39 VIRUSES A virus is a “deviant” program, stored on a computer floppy disk, hard drive, or CD, that can cause unexpected and often undesir- able effects, such as destroying or corrupting data. ( • See Panel 6.17. ) The famous email Love Bug (its subject line was I LOVE YOU), which originated in the Philippines in May 2000 and did perhaps as much as $10 billion in dam- age worldwide, was both a worm and a virus, spreading faster and causing more damage than any other bug before it. The Love Bug was followed almost immediately by a variant virus. This new Love Bug didn’t reveal itself with an I LOVE YOU line but changed to a random word or words each time a new computer was infected. More recent viruses have targeted Twitter, YouTube, website advertising, and digital photo-holding frames. 40 A virus called Koob- face attacked Facebook. 41 Fast-spreading Clampi took aim at business finan- cial accounts. 42 A fired computer programmer embedded a malicious virus in servers run by financial institution Fannie Mae. 43 The virus usually attaches itself to your hard disk. It might then display annoying messages (“Your PC is stoned—legalize marijuana”) or cause Ping- Pong balls to bounce around your screen and knock away text. More seri- ously, it might add garbage to your files and then erase or destroy your system • Boot-sector virus: The boot sector is that part of the system software containing most of the instructions for booting, or powering up, the system. The boot-sector virus replaces these boot instructions with some of its own. Once the system is turned on, the virus is loaded into main memory before the operating system. From there it is in a position to infect other files. Any diskette that is used in the drive of the computer then becomes infected. When that diskette is moved to another computer, the contagion continues. Examples of boot-sector viruses: AntCMOS, AntiEXE, Form.A, NYB (New York Boot), Ripper, Stoned.Empire.Monkey. • File virus: File viruses attach themselves to executable files—those that actually begin a program. (In DOS these files have the extensions .com and .exe.) When the program is run, the virus starts working, trying to get into main memory and infecting other files. • Multipartite virus: A hybrid of the file and boot-sector types, the multipartite virus infects both files and boot sectors, which makes it better at spreading and more difficult to detect. Examples of multipartite viruses are Junkie and Parity Boot. A type of multipartite virus is the polymorphic virus, which can mutate and change form just as human viruses can. Such viruses are especially troublesome because they can change their profile, making existing antiviral technology ineffective. A particularly sneaky multipartite virus is the stealth virus, which can temporarily remove itself from memory to elude capture. An example of a multipartite, polymorphic stealth virus is One Half. • Macro virus: Macro viruses take advantage of a procedure in which miniature programs, known as macros, are embedded inside common data files, such as those created by email or spreadsheets, which are sent over computer networks. Until recently, such documents have typically been ignored by antivirus software. Examples of macro viruses are Concept, which attaches to Word documents and email attachments, and Laroux, which attaches to Excel spreadsheet files. Fortunately, the latest versions of Word and Excel come with built-in macro virus protection. • Logic bomb: Logic bombs, or simply bombs, differ from other viruses in that they are set to go off at a cer- tain date and time. A disgruntled programmer for a defense contractor created a bomb in a program that was supposed to go off two months after he left. Designed to erase an inventory tracking system, the bomb was discovered only by chance. • Trojan horse: The Trojan horse covertly places illegal, destructive instructions in the middle of a legitimate pro- gram, such as a computer game. Once you run the program, the Trojan horse goes to work, doing its damage while you are blissfully unaware. An example of a Trojan horse is FormatC. • Email hoax: These are really not virus programs; they are email messages sent by usually well-meaning people to warn others about a new virus they have read or heard of. These false warning messages often say “be sure to send this to everyone you know.’’ Hoax virus warnings can cause huge amounts of internet traffic and unnecessary worry. Users should check with knowledgeable sources before forwarding such messages. panel 6.17 Types of worms and viruses Free Online Virus & Security Check Go to Symantec.com at: http://security.symantec.com/ sscv6/home.asp?langidϭie& venidϭsym&plfidϭ23&pkjϭIH QYJABOKQYWTFVRHRM and run the check. What are your results? What do you plan to do next?
  368. info! more 344 Chapter 6 software. It may evade your

    detection and spread its havoc elsewhere, infecting every floppy disk, CD/DVD, and even digital-camera flash memory used by the system. TROJAN HORSES If, as a citizen of Troy around 1200–1500 B.C.E., you looked outside your fortified city and saw that the besieging army of Greeks was gone but a large wooden horse was left standing on the battlefield, what would you think? Maybe you would decide it was a gift of the gods, as the Trojans did, and haul it inside the city gates—and be unpleasantly surprised when late at night several Greek soldiers climbed out of the horse and opened the gates for the invading army. This is the meaning behind the illegal program known as a Trojan horse, which, though not technically a virus, can act like one. A Trojan horse is a program that pretends to be a useful program, usu- ally free, such as a game or screen saver, but carries viruses, or destruc- tive instructions, that perpetrate mischief without your knowledge. One particularly malicious feature is that a Trojan horse may allow so-called backdoor programs to be installed. A backdoor program is an illegal program that allows illegitimate users to take control of your computer without your knowledge. An example is the kind of program that records what people type, logging individual keystrokes, paying particular attention to user names and passwords, which can be used to access and even open bank accounts online. HOW MALWARE IS SPREAD Worms, viruses, and Trojan horses are passed in the following ways: • By infected floppies or CDs: The first way is via an infected floppy disk or CD, perhaps from a friend or a repair person. • By opening unknown email attachments: The second way is from an email attachment. This is why a basic rule of using the internet is: Never click on an email attachment that comes from someone you don’t know. This advice also applies to unknown downloaded files, as for free video games or screen savers. • By clicking on infiltrated websites: Some crackers “seed” web pages with contagious malware that enables them to steal personal data, so that by simply clicking on a website you can unwittingly compromise your PC. The risk can be minimized if you have a firewall and keep antivirus software on your computer up to date, as we describe below. (You might also consider switching to Mozilla Firefox from Internet Explorer as your browser.) • Through infiltrated Wi-Fi hot spots: As mentioned earlier, if you’re a user of Wi-Fi wireless access points, or hot spots, you have to be aware that your laptop or PDA could be exposed to wireless transmitted diseases from illegal users. Many hot spots do not require passwords; which means that anyone with a wireless connection and hacking know-how can hop aboard the network. Here, too, having wireless firewalls can reduce risks. CELLPHONE MALWARE A recent concern is that worms and viruses have been found to attack cellphones. A cellphone virus is basically the same thing as a computer virus: an unwanted executable file that “infects” a device and then copies itself to other devices. But whereas a computer virus or worm spreads through email attachments and internet downloads, a cellphone virus or worm spreads via internet downloads, MMS (multimedia messaging service) attach- ments, and Bluetooth transfers. The most common type of cellphone infection right now occurs when a cellphone downloads an infected file from a PC or the internet, but phone-to-phone viruses are on the rise. Infected files usually show up disguised as applications such as games, security patches, add-on functionalities, and, of course, erotica and free stuff. Here are some steps you can take to decrease your chances of installing a virus: Survival Tip Keep Antivirus Soft- ware Updated The antivirus software that comes with your computer won’t protect you forever. To guard against new worms and viruses, visit the antivirus software maker’s website frequently and enable the software’s automatic update feature. Protect against Cell- phone Viruses According to HowStuffWorks (http://electronics.howstuff works.com/cell-phone-virus4. htm), the best way to protect yourself from cellphone viruses is the same way you protect yourself from computer viruses: never open anything if you don’t know what it is, haven’t requested it, or have any sus- picions whatsoever that it’s not what it claims to be.
  369. Communications, Networks, & Safeguards 345 Some tips for minimizing the

    chances of infecting your computer are as follows: • Don’t open, download, or execute any files, email mes- sages, or email attachments if the source is unknown or if the subject line of an email is questionable or unexpected. • Delete all spam and email messages from strangers. Don’t open, forward, or reply to such messages. • Use webmail (HTML email) sparingly, since viruses can hide in the HTML coding of the email. Even the simple act of previewing the message in your email program can activate the virus and infect your computer. • Don’t start your computer with a floppy disk in the floppy-disk drive (drive A). • Back up your data files regularly, and keep the backup CD or whatever in a location separate from your com- puter (or use an online backup service). Then if a virus (or a fire) destroys your work files, your data won’t be totally devastated. • Make sure you have virus protection software, such as McAfee VirusScan (www.mcafee.com) or Norton AntiVirus PRACTICAL ACTION Ways to Minimize Virus Attacks (www.symantec.com/nav) activated on your machine. You can download it from these companies; then follow the installation instructions. • Buying a new computer with antivirus software on it does not mean you are automatically protected. The software could be six months old and not cover new viruses. You have to register it with the designer company, and you need to receive antivirus updates. • Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that. Often the software can be set to scan each time the computer is rebooted or on a periodic schedule. Also scan any new CDs and the like before using them. • Update your antivirus software regularly. There are virus and security alerts almost every day. Most antivirus software is automatically linked to the internet and will add updated antivirus code to your system whenever the software vendor discovers a new threat. • If you discover you have a virus, you can ask McAfee or Norton to scan your computer online. Then follow the company’s directions for cleaning or deleting it. Cellphone viruses currently target Symbian Series 60 phones with Bluetooth and MMS capabilities, like the Nokia 6620. Future possibilities include viruses that bug phones—so someone can see every number you call and listen to your conversations—and viruses that steal financial information, which would be a serious issue if smartphones end up being used as common payment devices. Ultimately, more connectivity means more exposure to viruses and faster spreading of infection. • Turn off Bluetooth discoverable mode: Set your phone to “hidden” so other phones can’t detect it and send it the virus. You can do this on the Bluetooth options screen. • Check security updates to learn about filenames you should keep an eye out for. It’s not foolproof—the Commwarrior program generates random names for the infected files it sends out, so users can’t be warned not to open specific filenames—but many viruses can be easily identified by the filenames they carry. Security sites with detailed virus information include F-Secure, McAfee, and Symantec. Some of these sites will send you email updates with new virus information as it gets posted. • Install some type of security software on your phone: Numerous companies are developing security software for cellphones, some for free download, some for user purchase, and some intended for cellphone service providers.
  370. 346 Chapter 6 Now let’s consider the people who perpetrate

    cyber threats—hackers and crackers. Some Cyber Villains: Hackers & Crackers What are the various kinds of hackers and crackers? The popular press uses the word hacker to refer to people who break into com- puter systems and steal or corrupt data, but this is not quite the exact defini- tion. Perhaps it helps to distinguish between hackers and crackers, although the term cracker has never caught on with the general public. HACKERS Hackers are defined (1) as computer enthusiasts, people who enjoy learning programming languages and computer systems, but also (2) as people who gain unauthorized access to computers or networks, often just for the challenge of it. Considering the second kind of hacker, those who break into computers for relatively benign reasons, we can say there are probably two types: • Thrill-seeker hackers: Thrill-seeker hackers are hackers who illegally access computer systems simply for the challenge of it. Although they penetrate computers and networks illegally, they don’t do any damage or steal anything; their reward is the achievement of breaking in. • White-hat hackers: White-hat hackers are usually computer professionals who break into computer systems and networks with the knowledge of their owners to expose security flaws that can then be fixed. 44 (The term “white hat” refers to the hero in old Western movies, who often wore a white hat, as opposed to the villain, who usually wore a black hat—see below.) Kevin Mitnik, for instance, became a tech security consultant after serving five years in prison for breaking into corporate computer systems in the mid-1990s. CRACKERS As opposed to hackers, who do break-ins for more or less positive reasons, crackers are malicious hackers, people who break into comput- ers for malicious purposes —to obtain information for financial gain, shut down hardware, pirate software, steal people’s credit information, or alter or destroy data. There seem to be four classes of crackers: • Script kiddies: On the low end are script kiddies, mostly teenagers without much technical expertise who use downloadable software or source code to perform malicious break-ins. Script kiddies (or “script bunnies”) use published source code to construct viruses. Although releasing the viruses themselves is illegal, publishing the code for viruses is not; it is allowed under the First Amendment right to free speech. • Hacktivists: Hacktivists are “hacker activists,” people who break into a computer system for a politically or socially motivated purpose. For example, they might leave a highly visible message on the home page of a website that expresses a point of view that they oppose. • Black-hat hackers: Black-hat hackers are those who break into computer systems to steal or destroy information or to use it for illegal profit. They are usually not bored, crafty teenagers but often professional criminals, the people behind the increase in cyberattacks on corporate networks, the Russian cybercrooks, such as the one nicknamed A-Z, who target high bank balances online and pull off Web scams on a vast scale. 45 Recently, such hackers have gone after cellphones and Twitter. 46
  371. Communications, Networks, & Safeguards 347 • Cyberterrorists: Cyberterrorism, according to

    the FBI, is any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by sub-national groups or clandestine agents.” 47 Thus, cyberterrorists are politically motivated persons who attack computer systems so as to bring physical or financial harm to a lot of people or destroy a lot of information. Particular targets are power plants, water systems, traffic control centers, banks, and military installations. Cyberattacks on U.S. government computer networks climbed 40% in 2008. 48 Recently, U.S. and South Korean officials reported cyberwarfare on government and commercial websites, probably by China and/or North Korea. 49 The most flagrant cases of cracking are met with federal prosecution. For instance, Jeffrey Lee Parson of Hopkins, Minnesota, was an 18-year-old high school senior when he unleashed a variant of the Blaster internet worm in 2003 that crippled an estimated 48,000 computers—a crime for which he could have been sentenced to 10 years in prison and fined $250,000. Because Parson was a minor at the time of the crime, however, a federal district court judge gave him 18 months in prison. 50 Online Safety: Antivirus Software, Firewalls, Passwords, Biometric Authentication, & Encryption What should I be doing to keep my computer safe against cyber threats? Now let us consider a few things you can do to try to keep your computer sys- tem safe: antivirus software, firewalls, passwords, biometric authentication, and encryption. ANTIVIRUS SOFTWARE A variety of virus-fighting programs are available. Antivirus software scans a computer’s hard disk, CDs, and main memory to detect viruses and, sometimes, to destroy them. Such virus watchdogs operate in two ways. First, they scan disk drives for “signatures,” characteris- tic strings of 1s and 0s in the virus that uniquely identify it. Second, they look for suspicious viruslike behavior, such as attempts to erase or change areas on your disks. Examples of antivirus programs are McAfee VirusScan, Norton AntiVirus, Pc-cillin Internet Security, Avast!, and ZoneAlarm with Antivirus. Others worth considering are CA Internet Security Suite Plus, Panda Antivirus Platinum, and McAfee Virex for Macs. 51 Other ways of protecting your computer against viruses are given in the Practical Action box on page 345. FIREWALLS A firewall is a system of hardware and/or software that pro- tects a computer or a network from intruders. The firewall software moni- tors all internet and other network activity, looking for suspicious data and preventing unauthorized access. Always-on internet connections such as cable modem, satellite, and DSL, as well as some wireless devices, are particularly susceptible to unauthorized intrusion. • If you have one computer—software firewall: If you have just one computer, a software firewall is probably enough to protect you while you’re connected to the internet. (Windows XP/Windows Vista and Mac OS X have built-in software firewalls that can be activated quickly.) • If you have more than one computer—hardware firewall: If you have more than one computer and you are linked to the internet by a cable modem or DSL, you probably need a hardware firewall, such as a hub/ router, which is available for as little as $50. Firewall software Survival Tip Firewalls Windows XP/Vista/7 and Mac OS X have built-in firewalls. Many companies sell their own firewall versions. If you buy separate firewall software, turn off the operating sys- tem’s firewall.
  372. info! more 348 Chapter 6 PASSWORDS When New York’s World

    Trade Center was destroyed during the September 11, 2001, terrorist attack, debt-trading firm Cantor Fitzgerald lost 700 of its 1,000 employees—and no one knew the deceased workers’ pass- words, the special words, codes, or symbols required to access a computer sys- tem. Although records had been backed up and existed in another location, to maintain its customers’ confidence, the company realized it had to be back up and running within two days. That meant discovering the passwords needed to get into essential files. What was it to do? According to one account, what surviving employees did was this: “They sat around in a group and recalled everything they knew about their colleagues, everything they had done, every- where they had been, and everything that had ever happened to them. And they managed to guess the passwords. 52 As this story shows, protecting your internet access accounts and files with a password isn’t enough. Passwords (and PINs, too) can be guessed, forgotten, or stolen. To foil a stranger’s guesses, experts say, you should never choose a real word or variations of your name, your birth date, or those of your friends or family. Instead you should mix letters, numbers, and punctuation marks in an oddball sequence of no fewer than eight characters. Examples of some good passwords are 2b/orNOT2b% and Alfred!E!Newman7. Or you can also choose an obvious and memorable password but shift the position of your hands on the keyboard, creating a meaningless string of characters—the best kind of password. (Thus, ELVIS becomes R;BOD when you move your fingers one position right on the keyboard.) Some other practical advice about passwords is given in the Practical Action box on page 349. BIOMETRIC AUTHENTICATION A hacker or cracker can easily breach a com- puter system with a guessed or stolen password. But some forms of identi- fication can’t be easily faked—such as your physical traits. Biometrics, the science of measuring individual body characteristics, tries to use these in security devices. Biometric authentication devices authenticate a person’s iden- tity by comparing his or her physical or behavioral characteristics with digital code stored in a computer system. There are several kinds of devices for verifying physical or behavioral characteristics that can be used to authenticate a person’s identity. ( • See Panel 6.18. ) More Password Tips Get more password tips at: www.phoronix.com/scan.php? pageϭarticle&itemϭ213&n umϭ1www.washington.edu/ computing/windows/issue27/ password.html http://computing.wayne.edu/ safecomputing/passwords. php www.microsoft.com/protect/ yourself/password/create. mspx panel 6.18 Biometric device A soldier holds a HIIDE scanner during a mis- sion in Afghanistan. The mission was to disrupt Taliban activity and find weapons caches in the southeast tip of Paktika Province, 10 miles from the Pakistan Border. HIIDE stands for Hand- held Interagency Identity Detection Equipment enrollment and recogni- tion device. It is a bio- metric security camera, used to identify unknown military people; it incor- porates an iris scanner, fingerprint scanner, face scanner, and passport reader.
  373. Communications, Networks, & Safeguards 349 Here’s how easy it is

    to get someone’s password: In 2005, 35 of 100 Internal Revenue Service employees and managers contacted by Treasury Department inspectors posing as computer technicians pro- vided their computer user name and their password. “With an employee’s user account name and password,” said the Trea- sury Department report, “a hacker could gain access to that employee’s access privileges. Even more significant, a disgrun- tled employee could use the same . . . techniques and obtain another employee’s username and password.”54 Employees complying with the request, which was in violation of IRS rules, said they were not aware of the hacking technique or they wanted to be as helpful as possible to the computer techni- cians. Some got approval from their managers to cooperate. Rules in Creating Passwords The IRS study suggests the obvious first rule in the following list of rules: • Rule 1: Don’t tell anyone your user name and pass- word: Of course you shouldn’t tell strangers. You also shouldn’t even tell friends or relatives. • Rule 2: Don’t use passwords that can be easily guessed: Don’t use “12345,” the word “password,” variations on your name, your nickname, your street address, moth- er’s maiden name, pet’s name, college name, or name of your favorite sports team. • Rule 3: Avoid any word that appears in a dictionary: Instead, use weird combinations of letters, numbers, and punctuation. Mix uppercase and lowercase, along with special characters such as !, #, and %. • Rule 4: Create long passwords, especially for sensitive sites: For financial accounts, for instance, 15-character passwords are recommended (which are 33,000 times harder to crack than an 8-character one).55 • Rule 5: Don’t use the same password for multiple sites: Avoid reusing the same password at different sites, since if hackers or scammers obtain one account, they poten- tially have your entire online life. If you do use the same password for multiple purposes, use it only for low-risk sites, such as newspaper registrations. • Rule 6: Change passwords often: Change passwords often, such as every 4 or 6 weeks or on a set sched- ule such as the first day of spring, summer, and so on. Change passwords when you use a computer in insecure locations such as libraries, airports, or internet cafés. Tips for Remembering Passwords How on earth are you going to remember a dozen or more passwords of at least eight characters, mixing PRACTICAL ACTION How to Deal with Passwords letters, numbers, and spe- cial characters— especially if you can’t use words? First, Rules 7 and 8 below are things that people do that you should not do. Rule 9 offers some suggestions for memorizing your passwords. • Rule 7: Don’t write passwords on sticky notes, in a note- book, or in a handheld computer or tape them under your keyboard: Avoid writing out passwords on sticky notes (Post-its) and attaching them to your monitor or putting passwords in a notebook or PDA. And don’t hide them under your keyboard—one of the first places a tech-knowledgeable person will look. • Rule 8: Don’t carry the passwords in your wallet: Lots of people do this, but of course if you lose your wallet the consequences can be dire. • Rule 9: Create a system for remembering passwords without writing them down: One technique is to think of a phrase from a song, such as, “Oh, say, can you see, by the dawn’s early light,” from The Star-Spangled Ban- ner. Then use the last letter of each word in the phrase to construct the password: hynueyesyt. Mix it up by inserting a number or special character (#, ٙ, ϩ) after each third letter or making every other letter upper- case. Another trick, says one writer, is to “begin with your random-looking string [of characters] and add a constant you memorize, such as ‘4!5.’ End with some- thing related to the website, such as the first four con- sonants of the domain name.”56 Technical Tricks for Safeguarding Passwords There are several technical solutions you can draw on for storing passwords. Two of the most available are the following: • Software with encrypted file: You can save all your passwords in a single, easily accessible encrypted file. (Encryption is discussed below.) Two popular ones are Any Password (free from www.romanlab.com) and Pass- wordSafe (free from www.ghostware.nl). PwdHash runs along with your web browsers; when you type a pass- word into a web page, PwdHash encrypts the typed password before sending it on to the website (free test versions at http://crypto.stanford.edu/PwdHash/). Nor- ton Confidential and Apple Computer’s Keychain also help store keywords in secure encrypted form. Google, IBM, Microsoft, and Yahoo! are backing a system called OpenID, which, in one description, promotes “logging onto one OpenID website with one password, [which] will grant entrance during that session to all websites that accept OpenID credentials.”57
  374. 350 Chapter 6 • Hand-geometry systems: Also known as full-hand

    palm scanners, these are devices to verify a person’s identity by scanning the entire hand, which, for each person, is as unique as a fingerprint and changes little over time. • Fingerprint scanners: These range from optical readers, in which you place a finger over a window, to swipe readers, such as those built into laptops and some handhelds, which allow you to run your finger across a barlike sensor. Microsoft offers optical fingerprint readers to go with Windows XP/Vista. • Iris-recognition systems: Because no two people’s eyes are alike, iris scans are very reliable identifiers. In Europe, some airports are using iris-scanning systems as a way of speeding up immigration controls. The Nine Zero, an upscale hotel in Boston, has experimented with letting guests enter one of its more expensive suites by staring into a camera that analyzes iris patterns. • Face-recognition systems: Facial-recognition systems may come to play an important role in biometric photos embedded in U.S. passports and those of other industrialized nations during the next few years. The technology, which compares a live face image with a digitized image stored in a computer, is even used now as a security system for some notebook computers. 53 • Voice-recognition systems: These systems compare a person’s voice with digitized voice prints stored in a computer, which the individual has previously “trained” to recognize his or her speech patterns. ENCRYPTION Encryption is the process of altering readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or even virtually impossible to break. Suppose you wanted to send a message to a company colleague stating, “Our secret product will be revealed to the world on April 14.” If you sent it in this undisguised, readable form, it would be known as plain text. To send it in disguised, unreadable form, you would encrypt that message into cyber- text, and your colleague receiving it would then decrypt it, using an encryption key —a formula for encrypting and decrypting a coded message. There are two basic forms of encryption— private key and public key: • Private key: Private-key (symmetric) encryption means that the same secret key is used by both sender and receiver to encrypt and decrypt a • Fingerprint readers for master password: Micro- soft offers fingerprint readers for Windows XP/Vista, and other fingerprint scanners are available such as BioMouse and Ethenticator that are able to encrypt and keep track of all your various user names, pass- words, and personal identification numbers (PINs). The fingerprint readers work only with the computer they are connected to, and the security of your various web accounts, bank accounts, frequent-flyer accounts, and so on depends on how unbreakable your passwords are. But at least you no longer have to memorize them. Besides using encryption to secure email messages or transactions on e-commerce websites, you may also want to protect files on your computer—especially laptops and PDAs, in case you leave them behind on a train or bus. You can use special software to encrypt individual files, but experts recommend deploying whole-disk encryption, cloaking every file on your computer and granting access only to those with the proper password. Windows Vista comes with a free whole-disk encryption system called BitLocker.58
  375. info! more Communications, Networks, & Safeguards 351 message. The encryption

    system DES (for “Data Encryption Standard”) was adopted as a federal standard for private-key encryption in 1976. • Public key: Public-key encryption means that two keys are used—a public key, which the receiver has made known beforehand to the sender, who uses it to encrypt the message, and a private key, which only the receiver knows and which is required to decrypt the message. Examples of public- key encryption technologies are PGP (for “Pretty Good Privacy”), RSA encryption, and Fortezza. Examples of the two types are shown above. ( • See Panel 6.19. ) WHAT CAN REPLACE THE PASS- WORD? Even if you make every effort to protect your password, there is nothing you can do if, say, hackers break into ATMs in conve- nience stores and steal customers’ PIN codes, including yours. This actually happened in San Jose, Cal- ifornia, where hackers got inside Citibank’s network of ATMs inside 7-Eleven stores, netting themselves millions of dollars. 59 Thus, experts are suggesting users abandon passwords and use log-on systems that rely on cryptography, accessed with so-called information cards, bringing the concept of an identity card, like a driver’s license to the online world. 60 Dear Nicole, I have reviewed the new… §ßƒø¥6rd ‡4hl9 /r ߧl2…\9b 9(k˜t"u Dear Nicole, I have reviewed the new… Original data Scrambled data Original data Private (symmetric) key Private (symmetric) key Private-key encryption Encryption Decryption Dear Nicole, I have reviewed the new… §ßƒø¥6rd ‡4hl9 /r ߧl2…\9b 9(k˜t"u Dear Nicole, I have reviewed the new… Original data Scrambled data Original data Public key Private key Public-key encryption Encryption Decryption panel 6.19 Examples of two types of encryption Wi-Fi connection in Manhattan, New York City Encryption Software Some kinds of encryption soft- ware worth investigating: PGP Personal Desktop (www. pgp.com) WinMagic’s SecureDoc (www. winmagic.com)
  376. 352 Chapter 6 I don’t usually put on lipstick before

    making a phone call,” wrote Anita Hamilton, “but this time was different. I was placing my first video phone call over the internet.” 61 Although video online chatting has been available for a long time, it has been hampered by the slowness of low- bandwidth dial-up modems, so pictures have not translated well. Now that more people have broadband (DSL, cable-modem, or even T1 connections) the online video quality is much better. The videophone is more than a luxury for personal use, however. In business, organizational ideas about distance are changing, influencing when people meet face-to-face and when they link up electronically. If you’re of a genera- tion that’s already used to instant-message chats (and multitasking by simultaneously watching TV, talking on the phone, and doing your homework), you may find yourself in a comfortable relationship with virtual meetings at work. 62 Types of Virtual Meetings: Remote Conferencing There are several ways in which people can conduct “virtual meetings”—meetings that don’t entail physical travel—as follows. 63 Audioconferencing. Audioconferencing (or teleconfer- encing ) is simply telephone conferencing. A telephone conference-call operator can arrange this setup among any three or more users. Users don’t need any special equipment beyond a standard telephone. Audioconfer- encing is an inexpensive way to hold a long-distance meeting and is often used in business. Computer-based audio, involving microphones, headsets or speakers, and internet-based telephony, is also used for audioconferencing. Videoconferencing Using Closed-Circuit TV. “I was a little nervous about going in front of the camera,” said job applicant Mark Dillard, “but I calmed down pretty quickly after we got going, and it went well.” 64 Interview- ing for a job can be uncomfortable for many people. However, Dillard had just talked to a job recruiter in New York while sitting in front of a video camera in a booth at a local Kinko’s store in Atlanta. Some of the more sophisticated equipment is known as telepresence technology, high-definition videocon- ference systems that simulate face-to-face meetings between users. Whereas traditional videoconferencing systems can be set up in a conventional conference room, telepresence systems require specially designed rooms with multiple cameras and high-definition video screens, simulating “the sensation of two groups of people at identical tables facing each other through windows,” according to one report. 65 Videoconferencing Using a Webcam. A webcam is a tiny, often eyeball-shaped camera that sits atop a com- puter monitor and displays its output on a web page. Some cameras are able to automatically follow your face as you move. Headsets with built-in speakers and microphones are required. Yahoo! and MSN offer free video chatting through their instant-message programs. Videoconferencing Using PC Video Cameras. This kind of videoconferencing involves people making a video telephone call over the internet, with both parties being able to see each other as they talk. PC video cameras (which are available for less than $100) are positioned atop computer monitors and are connected to the com- puter through the USB or FireWire port. Videoconferencing Using Videophones. Videophones don’t involve use of a PC, although the calls take place on the internet. The internet company 8 ϫ 8 Inc., for example, makes a VoIP (voice over internet protocol) videophone. Workgroup Computing or Web Conferencing. The use of groupware allows two or more people on a network to share information, collaborating on graphics, slides, and spreadsheets while linked by computer and telephone. WebEx and PlaceWare are two of several web-based services that allow participants to conduct meetings using tools such as “whiteboards,” which can display drawings or text, along with group presentations (using PowerPoint, which displays slides on everyone’s screen) and online chatting. Usually people do these things while talking to one another on the telephone. Users can collaborate by writing or editing word processing documents, spreadsheets, or presentations. EXPERIENCE BOX Virtual Meetings: Linking Up Electronically “
  377. 353 Communications, Networks, & Safeguards analog (p. 312) Continuous and

    varying in strength and/or quality. An analog signal is a continuous electrical signal with such variation. Why it’s important: Sound, light, temperature, and pressure values, for instance, can fall anywhere on a con- tinuum or range. The highs, lows, and in-between states have historically been represented with analog devices rather than in digital form. Examples of analog devices are a speedometer, a thermometer, and a tire-pressure gauge, all of which can measure continuous fluctuations. The electrical signals on a telephone line have traditionally been analog-data represen- tations of the original voices. Telephone, radio, television, and cable-TV technologies have long been based on analog data. analog cellphone (p. 336) Mobile telephone designed primarily for communicating by voice through a system of ground-area cells. Calls are directed to cells by a mobile-telephone switch- ing office (MTSO). Moving between cells requires that calls be “handed off” by the MTSO. Why it’s important: Cellphone sys- tems allow callers mobility. antivirus software (p. 347) Software that scans a computer’s hard disk, floppy disks and CDs, and main memory to detect viruses and, sometimes, to destroy them. Why it’s important: Antivirus software can protect your computer from disaster. backbone (p. 322) The main highway—including gateways, routers, and other communications equipment—that connects all computer networks in an organization. Why it’s important: The internet backbone is the central structure that connects all other elements of the internet. bandwidth (p. 329) Also called band; range of frequencies that a transmission medium can carry in a given period of time and thus a measure of the amount of information that can be delivered. The bandwidth is the difference between the lowest and the highest frequencies transmitted. For analog signals, bandwidth is expressed in hertz (Hz), or cycles per second. For digital signals, bandwidth is expressed in bits per second (bps). In the United States, certain bands are assigned by the Fed- eral Communications Commission (FCC) for certain purposes. Why it’s important: The wider the bandwidth, the faster the data can be transmitted. The narrower the band, the greater the loss of transmission power. This loss of power must be overcome by using relays or repeaters that rebroadcast the original signal. biometrics (p. 348) Science of measuring individual body characteristics. Why it’s important: Biometric devices authen- ticate a person’s identity by comparing his or her physical identity with digital code stored in a computer system. Such devices can reduce attempts by unauthorized people to breach a computer system. Bluetooth (p. 339) Short-range wireless digital standard aimed at linking cellphones, PDAs, computers, and peripherals. Why it’s important: Bluetooth technology can replace cables between PCs and printers and can connect PCs to PDAs and wireless phones. bridge (p. 322) Interface used to connect the same types of networks. Why it’s important: Similar networks (local area net- works) can be joined together to create larger area networks. broadband (p. 330) Bandwidth characterized by very high speed. Transmission speeds are 1 megabit per second to as high (for super-broadband and ultra-broadband) as 100 mega- bits per second. Why it’s important: The wider a medium’s bandwidth, the more frequencies it can use to transmit data and thus the faster the transmission. Broadband can transmit high-quality audio and video data. Compare with narrowband. broadcast radio (p. 330) Wireless transmission medium that sends data over long distances—between regions, states, or countries. A transmitter is required to send messages and a receiver to receive them; sometimes both sending and receiv- ing functions are combined in a transceiver. Why it’s important: In the lower frequencies of the radio spectrum, several broad- cast radio bands are reserved not only for conventional AM/ FM radio but also for broadcast television, CB (citizens band) radio, ham (amateur) radio, cellphones, and private radio-band mobile services (such as police, fire, and taxi dispatch). Some organizations use specific radio frequencies and networks to support wireless communications. bus network (p. 322) Type of network in which all nodes are connected to a single wire or cable (the bus) that has two endpoints. Each device transmits electronic messages to other devices. If some of those messages collide, the device waits and then tries to retransmit. Why it’s important: The bus net- work is relatively inexpensive to install. However, if the bus itself fails, the entire network fails. cellular radio (p. 331) Type of radio widely used for cellphones and wireless modems, using high-frequency radio waves to transmit voice and digital messages. Why it’s important: Unlike CB (citizens’ band) radio, used by truck drivers, which has a few radio channels that everyone must share, cel- lular radio channels are reused simultaneously in nearby geographic areas, yet customers do not interfere with one another’s calls. client/server network (p. 318) Local area network that con- sists of clients, which are microcomputers that request data, and servers, which are computers used to supply data. Why it’s important: In small organizations, servers can store files, pro- vide printing stations, and transmit email. In large organiza- tions, servers may also house enormous libraries of financial, sales, and product information. Compare with peer-to-peer network. coaxial cable (p. 325) Commonly called “co-ax”; insulated copper wire wrapped in a solid or braided metal shield and then in an external plastic cover. Why it’s important: Co-ax is widely used for cable television. Because of the extra insula- tion, coaxial cable is much better than twisted-pair wiring at resisting noise. Moreover, it can carry voice and data at a faster rate. SUMMARY
  378. 354 Chapter 6 communications media (p. 325) Any medium that

    carries signals over a communications path, the route between two or more communications media devices. Why it’s important: Media may be wired or wireless. Three types of wired channels are twisted-pair wire (conventional telephone lines), coaxial cable, and fiber-optic cable. communications satellite (p. 331) Microwave relay station in orbit around the earth. Why it’s important: Transmitting a signal from a ground station to a satellite is called uplinking; the reverse is called downlinking. The delivery process will be slowed if, as is often the case, more than one satellite is required to get the message delivered. cracker (p. 346) Person who breaks into computers for mali- cious purposes — to obtain information for financial gain, shut down hardware, pirate software, steal people’s credit informa- tion, or alter or destroy data. Why it’s important: Crackers can do major damage to computers and networks. Compare with hacker. denial-of-service (DoS) attack (p. 342) Also called distrib- uted denial of service (DDoS) attack; Form of technological assault that consists of making repeated fraudulent requests of a computer system or network, thereby overloading it. The assault may come from a single computer or from hundreds or thousands of computers that have been taken over by those intending harm. Why it’s important: A denial-of-service attack denies legitimate users access to the computer system. digital (p. 311) Communications signals or information rep- resented in a two-state (binary) way using electronic or elec- tromagnetic signals. Why it’s important: Digital signals are the basis of computer-based communications. Digital is usually synonymous with computer-based. digital wireless services (p. 337) Two-way, second- generation (2G) wireless services that support digital cellphones and PDAs. They use a network of cell towers to send voice com- munications and data over the airwaves in digital form. Why it’s important: This technology is a dramatic improvement over analog cellphones. Voice clarity is better, and more calls can be squeezed into the same bandwidth. electromagnetic spectrum of radiation (p. 329) All the fields of electrical energy and magnetic energy, which travel in waves. This includes all radio signals, light rays, X rays, and radioactiv- ity. Why it’s important: The part of the electromagnetic spec- trum of particular interest is the area in the middle, which is used for communications purposes. Various frequencies are assigned by the federal government for different purposes. encryption (p. 350) The process of using powerful mathemati- cal concepts to create coded messages that are difficult or impossible to read. To send a message in disguised, unreadable form, you would encrypt that message into cybertext, and your colleague receiving it would then decrypt it, using an encryp- tion key —a formula for encrypting and decrypting a coded mes- sage. Why it’s important: Using encryption to alter readable data into unreadable form can prevent unauthorized access. Ethernet (p. 324) LAN technology that can be used with almost any kind of computer and that describes how data can be sent in packets in between computers and other networked devices usually in close proximity. Why it’s important: Ethernet has become the most popular and most widely deployed net- work technology in the world. extranet (p. 319) Private intranet that connects not only inter- nal personnel but also selected suppliers and other strategic parties. Why it’s important: Extranets have become popular for standard transactions such as purchasing. fiber-optic cable (p. 326) Cable that consists of dozens or hundreds of thin strands of glass or plastic that trans- mit pulsating beams of light rather than electricity. Why it’s important: These strands, each as thin as a human hair, can transmit up to 2 billion pulses per second (2 Gbps); each “on” pulse represents 1 bit. When bundled together, fiber-optic strands in a cable 0.12-inch thick can support a quarter- million to a half-million voice conversations at the same time. Moreover, unlike electrical signals, light pulses are not affected by random electromagnetic interference in the environment. Thus, they have much lower error rates than normal telephone wire and cable. In addition, fiber-optic cable is lighter and more durable than twisted-pair wire and co-ax cable. A final advantage is that it cannot easily be wiretapped, so transmis- sions are more secure. firewall (p. 347) System of hardware and/or software that protects a computer or a network from intruders. Always-on internet connections such as cable modem and DSL, as well as some wireless devices, are particularly susceptible to unau- thorized intrusion and so need a firewall. Why it’s important: The firewall monitors all internet and other network activ- ity, looking for suspicious data and preventing unauthorized access. gateway (p. 322) Interface permitting communication between dissimilar networks. Why it’s important: Gateways permit com- munication between a LAN and a WAN or between two LANs based on different network operating systems or different layouts. Global Positioning System (GPS) (p. 333) A series of earth- orbiting satellites continuously transmitting timed radio signals that can be used to identify earth locations. Why it’s important: A GPS receiver—handheld or mounted in a vehicle, plane, or boat—can pick up transmissions from any four sat- ellites, interpret the information from each, and calculate to within a few hundred feet or less the receiver’s longitude, lati- tude, and altitude. Some GPS receivers include map software for finding one’s way around, as with the Guidestar system available with some rental cars. hacker (p. 345) A hacker can be either (1) a computer enthu- siast, a person who enjoys learning programming languages and computer systems; or (2) a person who gains unauthorized access to computers or networks, often just for the challenge of it. Why it’s important: Unlike crackers who have malevolent purposes, a hacker may break into computers for more or less positive reasons. home area network (HAN) (p. 317) Network using wired, cable, or wireless connections to link a household’s digital devices. Why it’s important: A HAN can connect not only
  379. 355 Communications, Networks, & Safeguards multiple computers, printers, and storage

    devices but also VCRs, DVDs, televisions, fax machines, video game machines, and home security systems. home automation network (p. 318) Network that relies on very inexpensive, very short-range, low-power (AA batteries) wireless technology in the under-200-Kbps range, such as Insteon, ZibBee, and Z-Wave. Why it’s important: This network can be used to link switches and sensors around the house and can control lights and switches, thermostats and fur- naces, smoke alarms and outdoor floodlights. HomePlug (p. 326) Technological standard that allows users to send data over a home’s existing electrical (AC) power lines, which can be transmitted at 14 megabits per second . Why it’s important: HomePlug can use a home’s existing electric-power wiring to create a computer network. HomePNA (HPNA) (p. 326) Alliance of leading technology companies working to ensure the adoption of a single, uni- fied existing wire (telephone and cable) home-networking standard that transmits data at about 320 megabits per second. Why it’s important: This standard allows people to use a home’s existing telephone wiring to develop a home network. host computer (p. 320) A computer in a client/server net- work that controls a network and the devices on it, called nodes. Why it’s important: The host computer controls access to the hardware, software, and other resources on the network. hub (p. 321) A common connection point for devices in a network—a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. Why it’s important: Hubs are commonly used to connect segments of a LAN. infrared wireless transmission (p. 330) Transmission of data signals using infrared-light waves. Why it’s important: Infrared ports can be found on some laptop computers and printers, as well as wireless mice. The advantage is that no physical connection is required among devices. The drawbacks are that line-of-sight communication is required—there must be an unobstructed view between transmitter and receiver—and transmission is confined to short range. intranet (p. 319) An organization’s internal private network that uses the infrastructure and standards of the internet and the web. Why it’s important: When an organization creates an intranet, it enables employees to have quicker access to internal information and to share knowledge so that they can do their jobs better. Information exchanged on intranets may include employee email addresses and telephone numbers, product information, sales data, employee benefit information, and lists of jobs available within the organization. local area network (LAN) (p. 317) Communications network that connects computers and devices in a limited geographic area, such as one office, one building, or a group of buildings close together (for instance, a college campus). Why it’s impor- tant: LANs have replaced large computers for many functions and are considerably less expensive. metropolitan area network (MAN) (p. 317) Communications network covering a city or a suburb. Why it’s important: The purpose of a MAN is often to bypass local telephone compa- nies when accessing long-distance services. Many cellphone systems are MANs. microwave radio (p. 331) Transmission of voice and data through the atmosphere as superhigh-frequency radio waves called microwaves. These frequencies are used to transmit messages between ground-based stations and satellite com- munications systems. Why it’s important: Microwaves are line-of-sight; they cannot bend around corners or around the earth’s curvature, so there must be an unobstructed view between transmitter and receiver. Thus, microwave stations need to be placed within 25–30 miles of each other, with no obstructions in between. In a string of microwave relay stations, each station receives incoming messages, boosts the signal strength, and relays the signal to the next sta- tion. Nowadays dish- or horn-shaped microwave reflective dishes, which contain transceivers and antennas, are nearly everywhere. modem (p. 314) Short for “modulate/demodulate”; device that converts digital signals into a representation of ana- log form (modulation) to send over phone lines. A receiving modem then converts the analog signal back to a digital signal (demodulation). Why it’s important: The modem provides a means for computers to communicate with one another using the standard copper-wire telephone network, an analog sys- tem that was built to transmit the human voice but not com- puter signals. narrowband (p. 330) Also known as voiceband. Bandwidth used for short distances. Transmission rates are usually 100 kilobits per second or less. Why it’s important: Narrowband is used in telephone modems and for regular telephone communications—for speech, faxes, and data. Compare with broadband. network (p. 315) Also called communications network; system of interconnected computers, telephones, or other communi- cations devices that can communicate with one another and share applications and data. Why it’s important: The tying together of so many communications devices in so many ways is changing the world we live in. node (p. 320) Any device that is attached to a network. Why it’s important: A node may be a microcomputer, terminal, stor- age device, or peripheral device, any of which enhance the usefulness of the network. packet (p. 320) Fixed-length block of data for transmission. The packet also contains instructions about the destination of the packet. Why it’s important: By creating blocks, in the form of packets, a transmission system can deliver the data more efficiently and economically. pager (p. 335) Commonly known as beeper; simple radio receiver that receives data sent from a special radio transmit- ter. The pager number is dialed from a phone and travels via the transmitter to the pager. Why it’s important: Pagers have become a common way of receiving notification of phone calls so that the user can return the calls immediately; some
  380. 356 Chapter 6 pagers can also display messages of up

    to 80 characters and send preprogrammed messages. peer-to-peer (P2P) network (p. 318) Type of network in which all computers on the network communicate directly with one another rather than relying on a server, as client/ server networks do. Why it’s important: Every computer can share files and peripherals with all other computers on the network, given that all are granted access privileges. Peer-to- peer networks are less expensive than client/server networks and work effectively for up to 25 computers, making them appropriate for home networks. Compare with client/server network. personal area network (PAN) (p. 318) Type of network that uses short-range wireless technology such as Bluetooth, ultra wideband, and wireless USB, to connect a person’s per- sonal electronics; also called wireless personal area network (WPAN). Why it’s important: PANs are used to connect per- sonal electronic devices such as cellphones, PDAs, MP3 play- ers, notebook PCs, and printers. protocol (p. 320) Also called communications protocol; set of conventions governing the exchange of data between hard- ware and/or software components in a communications net- work. Why it’s important: Protocols are built into hardware and software. Every device connected to a network must have an internet protocol (IP) address so that other computers on the network can route data to that address. radio-frequency (RF) spectrum (p. 329) The part of the electromagnetic spectrum that carries most communications signals. Why it’s important: The radio spectrum ranges from low-frequency waves, such as those used for aeronautical and marine navigation equipment; through the medium frequen- cies for CB radios, cordless phones, and baby monitors; to ultrahigh-frequency bands for cellphones; and also microwave bands for communications satellites. ring network (p. 323) Type of network in which all communi- cations devices are connected in a continuous loop and mes- sages are passed around the ring until they reach the right destination. There is no central server. Why it’s important: The advantage of a ring network is that messages flow in only one direction and so there is no danger of collisions. The disadvan- tage is that if a connection is broken, the entire network stops working. router (p. 322) Special computer that directs communicating messages when several networks are connected together. Why it’s important: High-speed routers can serve as part of the internet backbone, or transmission path, handling the major data traffic. star network (p. 323) Type of network in which all micro- computers and other communications devices are connected to a central hub, such as a file server. Electronic messages are routed through the central hub to their destinations. The central hub monitors the flow of traffic. Why it’s important: The advantage of a star network is that the hub prevents col- lisions between messages. Moreover, if a connection is broken between any communications device and the hub, the rest of the devices on the network will continue operating. switch (p. 321) A device that connects computers to a net- work. Unlike a hub, it sends messages only to a computer that is the intended recipient. Why it’s important: A switch is a full-duplex device, meaning data is transmitted back and forth at the same time, which improves the performance of the network. topology (p. 322) The logical layout, or shape, of a network. The three basic topologies are star, ring, and bus. Why it’s important: Different topologies can be used to suit different office and equipment configurations. Trojan horse (p. 344) A program that pretends to be a use- ful program, such as a game or screen saver, but that car- ries viruses, or destructive instructions. Why it’s important: A Trojan horse can perpetrate mischief without your knowl- edge, such as allow installation of backdoor programs, illegal programs that allow illegitimate users to take control of your computer without your knowledge. twisted-pair wire (p. 325) Two strands of insulated copper wire, twisted around each other. Why it’s important: Twisted- pair wire has been the most common channel or medium used for telephone systems. However, it is relatively slow and does not protect well against electrical interference. ultra wideband (UWB) (p. 339) A promising technology oper- ating in the range of 480 megabits per second up to 30 feet that uses a low power source to send out millions of bursts of radio energy every second over many different frequen- cies, which are then reassembled by a UWB receiver. Why it’s important: UWB operates over low frequencies not used by other technologies, making it a candidate to replace many of the cables that now currently connect household and office devices. virtual private network (VPN) (p. 320) Private network that uses a public network, usually the internet, to connect remote sites. Why it’s important: Because wide area networks use leased lines, maintaining them can be expensive, especially as distances between offices increase. To decrease communications costs, some companies have established their own VPNs. Company intranets, extranets, and LANS can all be parts of a VPN. virus (p. 343) Deviant program that can cause unexpected and often undesirable effects, such as destroying or corrupting data. Why it’s important: Viruses can cause users to lose data and/or files or can shut down entire computer systems. wide area network (WAN) (p. 317) Communications net- work that covers a wide geographic area, such as a country or the world. Why it’s important: Most long-distance and regional telephone companies are WANs. A WAN may use a combination of satellites, fiber-optic cable, microwave, and copper-wire connections and link a variety of computers, from mainframes to terminals. Wireless Application Protocol (WAP) (p. 330) Communica- tions protocol designed to link nearly all mobile devices to your telecommunications carrier’s wireless network and content providers. Why it’s important: Wireless devices such as cell- phones use the Wireless Application Protocol for connecting wireless users to the World Wide Web.
  381. 357 Communications, Networks, & Safeguards wireless personal area network (WPAN)

    See personal area network (PAN). wireless USB (WUSB) (p. 340) Wireless standard with a typical range of 32 feet and a maximum data rate of 480 megabits per second. Why it’s important: Because USB is already the most used interface among PC users, a wireless version could combine the speed and security of wired technology with the ease of use of wireless. It could be a natural replacement for USB cable links for printers, scanners, MP3 players, hard disks, and the like. worm (p. 342) Program that repeatedly copies itself into a computer’s memory or onto a disk drive until no space is left. Why it’s important: Worms can shut down computers. CHAPTER REVIEW Self-Test Questions 1. A(n) ________ converts digital signals into analog sig- nals for transmission over phone lines. 2. A(n) ________ network covers a wide geographic area, such as a state or a country. 3. ________ cable transmits data as pulses of light rather than as electricity. 4. ________ refers to waves continuously varying in strength and/or quality; ________ refers to communi- cations signals or information in a binary form. 5. A(n) ________ is a private network that uses a public network (usually the internet) to connect remote sites. 6. A(n) ________ is a computer that acts as a disk drive, storing programs and data files shared by users on a LAN. 7. The ________ is the system software that manages the activities of a network. 8. Modem is short for ________ . 9. ________ is a short-range wireless digital standard aimed at linking cellphones, PDAs, computers, and peripherals up to distances of 30 feet. 10. ________ programs can screen out objectionable mate- rial on the internet. 11. Any device that is attached to a network is called a ________ . 12. A set of conventions governing the exchange of data between hardware and software components in a com- munications network is called a ________ . Multiple-Choice Questions 1. Which of the following best describes the telephone line that is used in most homes today? a. coaxial cable b. modem cable c. twisted-pair wire d. fiber-optic cable e. LAN 2. Which of the following do local area networks enable? a. sharing of peripheral devices b. sharing of programs and data c. better communications d. access to databases e. all of these 3. Which of the following is not a type of server? a. file server b. print server c. mail server d. disk server e. database server 4. Which of the following is not a short-distance wireless standard? a. Bluetooth b. PDA c. Wi-Fi d. WAP 5. Which type of local area network connects all devices through a central hub, such as a file server? a. bus network b. star network c. mesh network d. ring network e. router 6. Which is the type of local area network in which all microcomputers on the network communicate directly with one another without relying on a server? a. client/server b. domain c. peer to peer d. MAN e. WAN s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.”
  382. 358 Chapter 6 7. How do fiber-optic cables transmit data?

    a. via copper wire b. via infrared c. via AC electric current d. via radio waves e. via pulsating beams of light True/False Questions T F 1. In a LAN, a bridge is used to connect the same type of networks, whereas a gateway is used to enable dissimilar networks to communicate. T F 2. Frequency and amplitude are two characteristics of analog carrier waves. T F 3. A range of frequencies is called a spectrum. T F 4. Twisted-pair wire commonly connects residences to external telephone systems. T F 5. Wi-Fi signals can travel up to almost 300 feet. T F 6. Microwave transmissions are a line-of-sight medium. T F 7. 2G is the newest cellphone standard. T F 8. Wi-Fi is formally known as an 802.11 network. T F 9. A Trojan horse copies itself repeatedly into a computer’s memory or onto a hard drive. s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Short-Answer Questions 1. What is the difference between an intranet and an extranet? 2. What is the difference between a LAN and a WAN? 3. Why is bandwidth a factor in data transmission? 4. What is a firewall? 5. What do 2G and 3G mean? 6. Explain the differences between ring, bus, and star networks. 7. What is the electromagnetic spectrum? 8. What does a protocol do? 9. What are the three basic rules for creating passwords? 10. What do we need encryption for? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” Knowledge in Action 1. Are the computers at your school connected to a network? If so, what kind of network(s)? What types of computers are connected? What hardware and software allows the network to function? What department(s) did you contact to find the information you needed to answer these questions? 2. Using current articles, publications, and/or the web, research cable modems. Where are they being used? What does a residential user need to hook up to a cable modem system? Do you think you will use a cable modem in the near future? 3. Research the role of the Federal Communications Com- mission in regulating the communications industry. How are new frequencies opened up for new communica- tions services? How are the frequencies determined? Who gets to use new frequencies? 4. Are you a fan of analog or of digital? Explain. 5. Research the Telecommunications Act of 1996. Do you think it has had a positive or a negative effect? Why? 6. Would you like to have a job for which you telecommute instead of “going in to work”? Why or why not? 7. From your experience with cellphones, do you think it is wise to continue also paying for a “land-line” POTS phone line, or is cellphone service reliable enough to use as your sole means of telephony? As cell service advances, how do you think the POTS infrastructure will be used? Web Exercises 1. Compare digital cable and satellite TV in your area. Which offers more channels? Which offers more fea- tures? How much do the services cost? Do both offer internet connectivity? What are the main differences between the two types of service? 2. Calculate the amount of airborne data transmission that travels through your body. To do this, research the amount of radio and television station broadcast signals in your area, as well as the estimated number of mobile-phone users. Imagine what the world would look like if you could see all the radio-wave signals the way you can see the waves in the ocean. 3. On the web, go to www.trimble.com and work through some of the tutorial on “About GPS Technology.” Then write a short report on the applications of a GPS system.
  383. 359 Communications, Networks, & Safeguards 4. As mentioned in Chapter

    4, microchips are implanted in animals to track them with GPS technology. Humans can now be tracked when they use their cellphones. Visit the following websites for more details: www.wired.com/news/business/0,1367,21781,00.html www.washingtonpost.com/wp-dyn/content/ article/2007/11/22/AR2007112201444.html www.usatoday.com/money/topstories/2008-06-04- 750914861_x.htm 5. What is wardriving? Visit these sites to see what is being done to fix this security hole: www.wardriving.com/ http://havenworks.com/vocabulary/a-z/w/war-driving/ www.wordspy.com/words/wardriving.asp http://en.wikipedia.org/wiki/Wardriving www.wardrive.net/ 6. Test your ports and shields. Is your internet con- nection secure, or is it inviting intruders to come in? Use the buttons at the bottom of the page at https://grc.com/x/ne.dll?bh0bkyd2 to test your port security and your shields and receive a full report on how your computer is communicating with the internet. 7. Learn about the method of triangulation. This method helps when you use your cellphone to locate, for example, the nearest movie theater or restaurant. Visit the sites below to learn more. Run your own search on triangulation. www.qrg.northwestern.edu/projects/vss/docs/ navigation/1-what-is-triangulation.html www.al911.org/wireless/triangulation_location.htm www.ehow.com/how_2385973_triangulate-cell-phone. html www.securityfocus.com/columnists/376 8. TDMA, GSM, CDMA, and iDEN. What do these terms mean? The following websites do a good job of explain- ing these technologies and other cellphone-related issues. http://reviews.ebay.com/Cell-Phone- technologies-GSM-CDMA-TDMA- iDEN_W0QQugidZ10000000003636609 www.dslreports.com/faq/5668 9. Security issue—Wi-Fi security issues: As Wi-Fi becomes more widespread, how will users protect their net- works? Wi-Fi is hacked almost as a harmless hobby to detect its vulnerabilities. Visit the following websites to learn about some issues of the Wi-Fi future. http://wifinetnews.com/archives/008102.html http://usatoday.jiwire.com/wi-fi-security-introduction- overview.htm www.businessweek.com/the_thread/techbeat/ archives/2007/01/taking_wi-fi_--.html?chan ϭ search
  384. 361 PERSONAL TECHNOLOGY The Future Is You 7 Chapter Topics

    & Key Questions 7.1 Convergence, Portability, & Personalization What are the pros and cons of the major trends in personal technology? 7.2 Portable Media Players What should I know about portable media players? 7.3 High-Tech Radio: Satellite, HD, & Internet How do the three forms of high-tech radio differ? 7.4 Digital Cameras: Changing Photography What are some of the things I can do with digital cameras? 7.5 Personal Digital Assistants & Tablet PCs How could I use a PDA and tablet PC to help me in college? 7.6 The New Television What’s new about the new television? 7.7 E-Book Readers: The New Reading Machines Can electronic books really improve on printed books? 7.8 Smartphones: More Than Talk How are smartphones different from basic cellphones? 7.9 Videogame Systems: The Ultimate Convergence Machine? How do the three principal videogame consoles compare?
  385. 362 Chapter 7 T he march of digital technologies through

    cameras, videos, and a flurry of gadgets is reshaping old standbys and broadening their use,” says Gary McWilliams. “Clock radios are turning into überstereos,” continues The Wall Street Journal writer, “and cameras into slim wonders that beam images to a TV or printer. Television, which had evolved only gradually since the advent of color in the 1950s, is now a digital jungle of new screen types, shapes, and technologies.” 1 It’s all leading to what Jerry Yang and David Filo, the founders of Yahoo!, call the internet’s “second act,” when broadband extends to every electronic gadget. The internet’s first period, they say, involved shifting real-world activi- ties such as shopping and dating into a virtual world, one dominated by the PC. In the net’s second act, they believe, “creative power will shift into the hands of individuals, who will be just as likely to generate and share their own content as to consume someone else’s.” 2 Indeed, this was readily demonstrated with the cellphone and blog-based outpouring of breaking news and shared information about the December 2004 tsunami in Asia and the July 2005 terrorist subway bombings in Lon- don. 3 It’s also evident in the phenomenon known as mash-ups, in which a per- son takes a set of data from one website and attaches it to a map file on Google Maps, thus, for example, showing the day’s cheapest gas stations anywhere in the United States, the location of potholes in New York, inches of snowfall for skiers, and where trucks that serve tacos are parked in Seattle. 4 (See www .googlemapsmania.blogspot.com. ) “What we’re seeing,” says one technology observer, “is nothing less than the future of the World Wide Web. Suddenly, hordes of volunteer programmers are taking it upon themselves to combine and remix the data and services of unrelated, even competing sites. The result: entirely new offerings.” 5 7.1 CONVERGENCE, PORTABILITY, & PERSONALIZATION What are the pros and cons of the major trends in personal technology? Is a phone with motion sensing really useful? What happens if you’re calling while on a bumpy road? Regardless, the device seems to embody three princi- pal results of the fusion of computers and communi- cations that we mentioned in Chapter 1— convergence, portability, and personalization. Let’s see what these developments, which began to build in strength during the 1990s, are like today. Convergence How can I evaluate whether a hybrid convergence device is good or bad? Ming Ma, 28, a Los Angeles–based systems administra- tor, bought an Xbox to play videogames. But soon after he brought it home, Ma realized it could be used for mul- tiple purposes. “I initially purchased it to play games,”
  386. Personal Technology 363 he said, “but now I use it

    to watch DVD movies, play music CDs, and to chat with friends while we play multiplayer games. I like how I can do everything on one device—I have a small apartment, so this is ideal, for me—plus, I don’t have to buy individual devices, so it also saves me money along with space.” 6 As we said in Chapter 1, convergence, or digital convergence, describes the combining of several industries—computers, communications, con- sumer electronics, entertainment, and mass media—through various devices that exchange data in digital form. Long predicted but not fulfilled, convergence is now a reality, with 62% of all Americans having some experi- ence with mobile access to digital data and tools. 7 More households throughout the world have also been going to broadband, with the faster internet connec- tions changing the computer, cable, telephone, music, and movie businesses. Convergence, as we’ve pointed out, has led to electronic products that perform multiple functions, such as TVs with internet access, cellphones that are also digital cameras, and a refrigerator that allows you to send email. Hybrid convergence devices have pros and cons, as follows: CONVERGENCE: THE UPSIDE Ma’s multiple uses of the Xbox are an instance in which convergence makes sense. So, perhaps, is Sony’s PlayStation Por- table, which you can use not only to play videogames but also to surf the web, watch video, and read e-books. So are cellphones with address books or digital cameras that also shoot video. The new Holy Grail of convergence seems to be a “digital Swiss Army knife,” a universal device that will perform several func- tions. Over the past decade, as computing and communications have migrated from expensive desktop computers, which were mainly used by upper-income Americans, to easier-to-use and more affordable cellphones, users have also changed, with a much greater diversity of people being involved. And they are using their handhelds for many more non-voice data applications, such as taking pictures, accessing the internet for news, playing music, and texting. 8 Indeed, engineers have succeeded in designing the cellphone so you can use it as a universal remote to control your music, your TV, your PowerPoint presen- tation, or whatever. 9 CONVERGENCE: THE DOWNSIDE Not all hybrid gadgets are necessarily prac- tical. “Just because companies can converge technologies into one device doesn’t [always] mean they should do it,” says the research director of Jupi- ter Research. “Any convergent device where, as a result, a primary feature is compromised is just not a good idea.” 10 For example, what about trying to use those tiny keyboards on a cellphone to do texting? Convergence. Home entertain- ment centers bring together several electronic functions to access music, video, TV, and the internet, as well as support some computer functions.
  387. 364 Chapter 7 Portability What are the positives and negatives

    of portability? Smart cellphones are, of course, an example of portability. Not too many years ago, having a phone in your car was a badge of affluence, affordable mainly by Hollywood movie producers and Manhattan real estate developers. Now, thanks to increasing miniaturization, faster speeds, and declining costs, more and more mobilephone and other electronic components can be crammed into smaller and smaller gadgets. But as today’s students are well aware, a host of other devices are also portable: portable media players, digital cameras, BlackBerries, notebook computers, PDAs, tablet PCs, and the like. Portability also has its upside and downside. PORTABILITY: THE UPSIDE The advantages of portability seem obvious: being able to do phone calls and emails from anywhere that you can make a connec- tion, keeping up with your social networks, listening to hundreds of songs on a digital music player such as an iPod, taking photos or video anywhere on a whim, watching TV anywhere anytime. One reason that manufacturers have targeted turning cellphones into hybrids, incidentally, is that people carry them wherever they go, unlike laptop computers, portable media play- ers, or digital cameras. PORTABILITY: THE DOWNSIDE The same portable technology that enables you to access information and entertainment anytime anywhere often means that others can find you equally conveniently (for them). Thus, you have to become disciplined about preventing others from wasting your time, as by screening your cellphone calls with Caller ID, a feature that shows the name and/or number of the calling party on the phone’s display when you receive an incoming call. You may also find yourself bombarded throughout the day by unnecessary incoming emails and those web services known as RSS aggregators that automatically update you on new information from various sites. Nonstop connectivity may rain digital information on you, but it can also have the paradoxical result of removing you from real human con- tact. Consequently, the professor whose recommendation you may need someday for an employment or graduate school reference may never get to know you, because your interaction will never be face-to-face, as during his or her normal office hours. Businesses, incidentally, have recently had to deal with recurring complaints from employees about their inability to reach coworkers to get critical information they need—because their coworkers don’t respond in timely fashion via email—and so some companies have taken measures to increase person-to-person contact, as by banning email use on Fridays. 11 Personalization What are the pluses and minuses of personalization? Telecommunications can be organized through two kinds of arrangements: the tree-and-branch model and the switched-network model. In the tree-and- branch telecommunications model, a centralized information provider sends out messages through many channels to thousands of consumers. This is the model of most mass media, such as AM radio and network televi- sion broadcasting. In the switched-network telecommunications model, a common carrier provides circuit switching among public users; that is, a temporary con- nection is established by closing a circuit. This is the model of the tele- phone system, of course, and also of the internet. In a telephone network, a connection for voice transmission is made by dialing; in a packet switching network (Chapter 6), a temporary connection is established between points iPod portability. ( Above ) Apple’s iPod Classic, available in 80- and 160-gigabyte models, is a handheld device that allows users to watch TV shows, music videos, and home mov- ies, as well as listen to music and audiobooks. ( Below ) iPod with controls on the headset.
  388. Personal Technology 365 for transmitting data in the form of

    packets. People on the system are not only consumers of information (“content”) but also possible providers of it. Dur- ing the past several years, mass-media radio and television have been losing listeners and viewers to the more personalized media based on the switched- network model. This has opened the door to more personalized uses of infor- mation technology. PERSONALIZATION: THE UPSIDE As a consumer, you may have downloaded hundreds or thousands of songs, so that you have your own personalized library of music on your computer and portable media player. You may also have created your own list of “favorites” or “bookmarks” on your PC so that you can readily access your own favorite websites. And you may have accessed or contributed to certain blogs, or personalized online diaries. In addition, of course, PC software can be used to create all kinds of personal projects, rang- ing from artwork to finances to genealogy. PERSONALIZATION: THE DOWNSIDE The downside of personalization is that people may feel overburdened with too much choice. Indeed, Swarthmore Col- lege psychology professor Barry Schwartz, author of The Paradox of Choice: Why More Is Less, has identified several factors by which choice overload hurts us. As available options increase, he says, the following may happen: 12 • Regret: People are more likely to regret their decisions. • Inaction: People are more likely to anticipate regretting decisions, and the anticipated regret prevents people from actually deciding. • Excessive expectations: Expectations about how good the decision will be go up. Thus, reality has a hard time living up to the expectations. • Self-blame: When decisions have disappointing results, people tend to blame themselves, because they feel the unsatisfying results must be their fault. One result of having several choices is that many people do multitasking — performing several tasks at once, shifting focus from one task to another in rapid succession. When you read this textbook while listening to music and watching TV, you may think you’re simultaneously doing three separate tasks, but you’re really not. “It’s like playing tennis with three balls,” says one psychiatrist. 13 You may think you’re one of those people who has no trouble juggling all this, but medical and learning experts say the brain has limits and can do only so much at one time. For instance, it has been found that people who do two demanding tasks simultaneously—drive in heavy traffic and talk on a cellphone, for example—do neither task as well as they do each alone. 14 Indeed, the result of constantly shifting attention is a sacrifice in quality for any of the tasks with which one is engaged. The phenomenon of half- heartedly talking to someone on the phone while simultaneously surfing the web, reading emails, or trading instant messages has been called “surfer’s voice.” Experts who study these things call it “absent presence.” 15 “Life,” says Winifred Gallagher, author of Rapt, “is the sum of what you focus on.” 16 Another writer says, “You can drive yourself crazy trying to multitask and answer every email message instantly. Or you can recognize your brain’s finite capacity for processing information.” 17 Popular Personal Technologies What personal technologies am I familiar with? Where are you, technologically speaking, with the personal electronic devices you use every day? Let’s explore what’s out there (knowing full well that this book won’t be able to keep up with all the new devices).
  389. 366 Chapter 7 In the coming sections, we consider the

    following kinds of personal technology: • Portable media players • Satellite, HD, and internet radios • Digital cameras • Personal digital assistants and tablet PCs • The new television • E-books • Smartphones • Videogame systems 7.2 PORTABLE MEDIA PLAYERS What should I know about portable media players? Exemplified by the Apple iPod, portable media players (PMPs) are small por- table devices that enable you to play digital audio, video, or still- image files. PMPs are also known as MP3 players, portable devices for playing digital audio files. MP3 is a format that allows audio files to be compressed so they are small enough to be sent over the internet or stored as digital files. (MP3 is short for MPEG Audio Layer 3, an audio compression technol- ogy.) MP3 files are about one-tenth the size of uncompressed audio files. For example, a 4-minute song on a CD takes about 40 megabytes of space, but an MP3 version of that song takes only about 4 megabytes. PMPs differ from MP3 players, however, in that they can handle not only audio but also video and image files. Thus, you may be able to carry several hours of music or video—in the case of an 80-gigabyte Apple iPod as many as 20,000 songs, 120 minutes of video, or 25,000 still images. How MP3 Players Work What’s useful to know about digital audio players? The most famous of digital music players is Apple Computer’s iPod, al though there are many other players as well—with more coming along all the time. These companies have been challenging the iPods on price, looks, and extras such as built-in FM tuners and color LCD screens that can display photo clips and arcade- style videogames, as well as record voice and music. Basically, however, digital music players can be divided into those that have hard-disk drives for storage (which store more songs but are more expensive) and those that have flash memory (fewer songs but less expensive). Some have both hard-drive and flash memory. DATA STORAGE—HARD DRIVE Apple dominates the digital music player mar- ket with 75%–80% of hard-drive-based players. Apple’s full-size iPod models, which all have hard drives, come with up to 160 gigabytes of storage. (Eighty gigabytes holds about 20,000 songs.) The iPod Touch stores 32 gigabytes (good for 7,000 songs). Some hard-drive PMP competitors, all with at least 30 giga- bytes of storage, are Creative’s Zen Vision and the Archos 505. DATA STORAGE—FLASH MEMORY If you jog or do other strenuous activity that might make a PMP’s hard drive crash, you might want a player with flash memory, which usually takes the form of a card that can be slipped into a player’s memory slot and is nonvolatile, holding its contents even after the power is turned off. For example, the iPod nano, which is about the size of MP3 player Zen X-Fi, a high-capacity flash- based digital media player that adds Xtreme Fidelity (X-Fi) sound technology, a built-in speaker, a few wireless func- tions, and a whole lot of extra buttons to the company’s origi- nal ZEN device.
  390. Personal Technology 367 a playing card and thin enough to

    slip under a door, has 8 giga- bytes of flash memory and holds as much music (as well as album art and photographs) as some hard-drive players. The Apple iPod shuffle is a finger-size, low-priced “mini-mini” music player that holds about 1,000 songs on a 4-gigabyte flash chip. The capacity of flash memory cards ranges up to 8 gigabytes for most portable media players. SAMPLING RATE How many songs your PMP holds is affected not only by the storage capacity but also by the sound quality selected, which you can determine yourself when you’re down- loading songs from your computer to your player. Downloading and converting a digital audio track from a music CD to the MP3 format is called ripping. If you want high-quality sound when you’re ripping (converting), the files will be relatively large, which means your PMP will hold fewer songs. If you’re willing to have lower-quality sound, perhaps for the device you use while jogging, you can carry more songs on your player. The quality is deter- mined by the sampling rate, the number of times, expressed in kilobits per second, that a song is measured (sampled) and converted to a digi- tal value. For instance, a song sampled at 192 kilobits per second is three times the size of a song sampled at 64 kilobits per second and will be of bet- ter sound quality. TRANSFERRING FILES When you buy a PMP, it comes with software that allows you to transfer MP3 files to it from your personal computer, using a high-speed port such as a FireWire or universal serial bus port (USB 1.0 or 2.0). BATTERY LIFE Battery life varies. The iPod shuffle will run up to 12 hours before recharging, the iPod nano 14 hours, the iPod mini 18 hours, and the iPod Touch 36 hours. COLOR SCREENS & PHOTO VIEWING The top-of-the-line 80-gigabyte iPod comes with a crisp 2-square-inch color screen and allows you (with an inex- pensive attachment) to download photos directly from your digital camera. If you want, you can even hook up the iPod to a TV and view a slide show. Some flash-based audio players have color screens that can display JPEG and BMP digital images. OTHER FEATURES Many PMPs, particularly flash- based devices, offer FM radio reception. Many players also are able to make high-quality music recordings, using an extra microphone. Some also have a small internal microphone for voice recording, appropri- ate for capturing conversation or a lecture but usu- ally unsuitable for music. Some devices come with a pair of earphone jacks so that two people can listen together. PMP IN YOUR CAR It’s dangerous, and in most places illegal, to use earphones while driving. How- ever, there are gadgets that allow you to listen to your MP3 collection while you’re behind the wheel. There are two ways to do this—car-stereo adapters and FM transmitters. One way, although an expensive one, is to get a car-stereo adapter, which uses a dock connector on the bottom of dockable iPods and iPod minis. A less expensive way is to get a device that turns your audio player into a miniature radio station that broadcasts an FM signal to your car’s radio antenna and thus through your car radio. Software for soft wear. Instead of wearing your heart on your sleeve, you can wear MP3 and cellphone technology, incorporated into this German- made jacket. The player is controlled through cloth but- tons on the left sleeve, and the headphones are built into the collar. MP3 sunglasses. These sun- glasses, called Thump, plug into your computer’s USB jack so that you can download MP3s from the computer to the glasses. Then, just put on the glasses, put the earbuds in your ears, and enjoy the music.
  391. 368 Chapter 7 The Societal Effects of PMPs How have

    audio players changed listening habits? “I’ve called the iPod the first cultural icon of the 21st century,” says Michael Bull, an instructor in media and cultural studies at the University of Sussex in Eng- land. Bull has spent more than a decade researching the societal effects of por- table audio devices, starting with Sony’s Walkman portable cassette player and extending to Apple’s iPod, which was introduced in 2001. The iPod, he says, “per- mits you to join the rhythm of your mind with the rhythm of the world,” causing a cultural shift away from large communal areas—such as a cathedral, “a space we could all inhabit”—to the world of the iPod, “which exists in our heads.” 18 One in five U.S. adults owns an iPod or other MP3 player. 19 Although clearly young people have taken to MP3 players with gusto, so have many older people. Bob Levens, 48, and his wife own three iPods between them, and the device, he says, has helped him to enjoy his music collection more. “Whereas before, I would stick a CD into the hi-fi and sit and listen or maybe read,” he reports, “the iPod has allowed me to carry my music around with me and also to listen to some CDs that had been relegated to the back of the shelf. I rarely listen to mainstream commercial radio.” 20 Note: With about 12% of children and teens in the U.S. suffering from noise- induced hearing loss, hearing experts are concerned about the effect of hours of listening to audio players. The threshold for safe, extended listening is 85 decibels for 8 hours, according to the National Institute of Occupational Safety and Health, but the volume of most portable compact-disk players has been found to be 91–121 decibels, with in-the-ear earphones (earbuds) adding another 7–9 decibels. 21 Using PMPs in College How could I use an audio player to help me in my college work? College instructors and students have found ways to expand the uses of the iPod beyond just the enjoyment of music. For instance, some PMPs can also be used to store schedules, phone-number lists, and other personal informa- tion management software. At Duke University, instructors have helped their students to employ PMPs as storage drives or as sound devices with the help of microphone attachments. “A journalism professor encourages students to use them to record interviews instead of simply taking notes,” says one report. “An economics professor records lectures for her 300-person survey course on her iPod and posts them online as a pre-exam study. An engineering professor has students use their iPods to transfer research data from dormitory com- puters to laboratory machines.” 22 Some other uses are shown below. 23 ( • See Panel 7.1. ) panel 7.1 College uses for portable media players • Professors record lectures and post them online for students to download for later review, as when students have dead time (such as riding the bus). • Interviews with guest speakers and messages from administrators may also be sent straight to students’ portable media players. • Some classes, such as those in music, foreign languages, or radio broadcasting, can especially benefit from use of audio players. • Students record their own study group sessions and interviews, using their music players with microphones. • Students record “audio web logs” during off-campus jobs to connect with peo- ple on campus. • Students subscribe to feeds of frequently updated audio content from pod- casts; students produce their own audio shows and podcast them. A “PodPage” website can be created that is devoted to such podcasts.
  392. Personal Technology 369 7.3 HIGH-TECH RADIO: Satellite, HD, & Internet

    How do the three forms of high-tech radio differ? “Portable satellite radio receivers . . . offer a real alternative to the iPod in the fight for your pocket space,” says one reviewer. 24 He described taking a bike ride around New York City’s Central Park listening to comedy legends Eddie Murphy, Billy Crystal, and Richard Pryor—who are not usually available on standard “terrestrial” radio—on a satellite radio clipped to his jersey. The radio industry, with its 235 million regular listeners, is being trans- formed by a number of trends, of which satellite radio is only one. Others are HD radio, internet radio, and podcasting. Satellite Radio How would satellite radio be different for me? Satellite radio, also called digital radio, is a radio service in which digital signals are sent from satellites in orbit around the Earth to subscribers owning special radios that can decode the encrypted signals. The CD- quality sound is much better than that of regular radio, and there are many more channels available than there are on regular radio. Unlike standard broadcasters, satellite radio broadcasters are for the most part not regulated by the Federal Communications Commission, although the FCC established the playing field back in the early 1990s when it began selling parts of the radio-wave spectrum for this new class of service. TWO PROVIDERS MERGE In 2008, the FCC approved the merger of the only two U.S. sat- ellite digital audio radio service (SDARS) pro- viders, market leader XM Satellite Radio, which started delivering content in 2001, and Sirius Satellite Radio, which began in 2002. Most of the content is commercial-free, and the result- ing merged provider, called Sirius XM, which offers 300 channels, supports itself by monthly subscription fees starting at $13 a month. There are currently about 18.5 million subscribers. 25 In spring 2009, the company began streaming its service to the iPhone and iPod Touch devices. 26 ADVANTAGES OF SATELLITE RADIO A particular attraction with satellite radio is that listeners avoid the endless commercials and limited number of formats of regular AM/FM stations, and the broadcasters serve a diverse group of niche markets, such as reggae, salsa, African folk songs, NASCAR racing, National Football League games, Howard Stern fans, and even 24/7 Elvis Presley songs and other formats not available on existing radio stations. HD Radio How does HD radio differ from traditional radio? Traditional radio broadcasters “were quite nervous back in 1995 when the FCC was considering licensing two satellite digital audio radio service . . . providers,” says one account. “This was the potential death knell (or so they thought) of tra- ditional radio. Something had to be done.” 27 Enter HD radio, which provides CD-quality sound and allows broadcasters to squeeze one analog and two digital stations on the same frequency. ( • See Panel 7.2, next page. ) That is, HD Radio combines digital and analog broadcast signals, enabling stations to The Sirius Starmate Replay, equipped to receive satellite radio
  393. 370 Chapter 7 offer an analog main channel and digital

    “sidebands,” so that multiple types of content can be broadcast from the same position on the dial. An additional advantage over satellite radio, at least so far, is that broadcasts are free; there are no subscription charges. (Incidentally, HD does not stand for “high defini- tion”; it is simply the branding language for the technology.) Traditional broadcasters are hoping HD Radio can introduce more local or innovative programming and blunt the threat from satellite radio. They also say that AM digital will have FM-like audio quality, and both AM and FM digital will be static-free and crystal clear. Wire- less data services include on-demand audio, featur- ing services such as on- demand news, weather, and traffic reports. Spe- cialized HD programming now available across the United States includes classical music, bluegrass, alternative rock, and coun- try music (country musi- cian Gretchen Wilson, for instance, appears on Miami’s HD Radio station Gretchen 99.9). Currently, about 1,800 of the 13,000 AM and FM stations in the United States are broadcasting in HD. 28 HD radios are avail- able ranging from the $50 panel 7.2 How HD radio works 93.7 01100111010 K D K A Radio stations bundle (gather together) analog and digital audio signals (including news reports, artist and song information, weather, traffic information etc.—as well as music) 1 Receivers reduce interference, such as when part of a signal bounces off a tall building and arrives at a different time than the main signal, by smoothing out the reflected signals. The signal will be compatible with the receivers and analog radios The digital signal layer is compressed at the station 2 The combined analog and digital signals are transmitted Recepter HD Radio 3 4
  394. info! more Personal Technology 371 Insignia HD Radio Portable Player

    to $100–$200 models from Sony, Coby, iLuv, and others. Unlike satellite radio, which is available in about half of all new cars, HD radio has been slow to catch on with automakers; however, it is available in cars made by Hundai, Volvo, BMW, and Mercedes-Benz. An HD Radio feature called “iTunes tagging” lets listeners hit a “tag” button on their radio when they hear a song they like, which will be listed on iTunes after syncing with the iPod and purchased. 29 Internet Radio How could I benefit from internet radio? As of mid-2009, there were about 19 million subscribers to satellite radio in the United States. 30 However, a year earlier, internet radio was drawing 33 million American listeners, reaching 13% of the American population over age 12. 31 With ad sales rising at a double-digit pace, traditional radio giants such as Clear Channel Communications have focused more and more on online broad- casting. 32 Shoutcast.com lists thousands of free online stations. The most popular internet-only radio sites are owned by online companies such as Yahoo!, AOL, and MSN. Yahoo!’s Musicmath service, for instance, allows listeners to pick a category, such as alternative rock, and then play a number of songs in that genre, with fewer ads than are found on traditional radio. However, there are also numerous mom-and-pop web broadcast- ers, such as Radioparadise.com , described as “a format-busting station that spins a tasteful mix of music ranging from the Beatles to Norah Jones to the Strokes,” which is run by a couple from their home in Paradise, California, as a commercial-free operation. 33 Other popular internet music services are Pandora, Last.fm, Slacker, and Rhapsody. 34 Many of these (such as Pandora and Slacker) can be heard on a BlackBerry Storm or an Apple iPhone. At present, most internet radio listeners tune in at the office. People who listen at home can obtain networking products that enable them to stream music from their computers to their stereo systems. Eventually, as the wireless internet expands, consumers may be able to go online from moving vehicles, with internet radio receivers on their dashboards. Podcasting How could I get involved in podcasting? As we stated in Chapter 2, podcasting involves the recording of internet radio or similar internet audio programs. Unlike traditional radio, podcasting requires no studio or broadcast tower, and there’s no Federal Communications Commission regulation (so hosts can say whatever they want). Podcasting soft- ware now allows amateur deejays and hobbyists to create their own radio shows and offer them free over the internet. Listeners can then download shows onto their portable players. According to eMarketer, the total podcast audience in the United States was 18.5 million in 2007 and will rise to 65 million by 2012. 35 Some people describe podcasts as “TiVo for radio.” Just as TiVo technology allows you to capture a television program while you’re away from the set and then watch it at a time of your convenience, podcasting enables people to down- load their favorite radio shows to an MP3 device and then listen to them later whenever and wherever they please. To subscribe to a podcast, you need not only a computer and PMP but also podcast-receiving software called an aggregator. 7.4 DIGITAL CAMERAS: Changing Photography What are some of the things I can do with digital cameras? By now both professional and amateur photographers alike have pretty much abandoned film. “The evolution is having profound and unforeseen effects on Free Aggregators Free podcast-receiving soft- ware is available at: www.iPodder.orgwww .dopplerradio.ne A tutorial on how to subscribe to a podcast is available at: http://radio.about.com/od/ podcastin1/a/aa030805a .htm
  395. 372 Chapter 7 society,” says one analysis, “from changing the

    way that people record their daily lives to making it harder to trust the images we see.” 36 How Digital Cameras Work What would motivate me to buy a digital camera? We described general principles of digital cameras in Chapter 5. Here we con- sider the subject in more detail. The most obvious statement to make about digital cameras (or “digicams”) is this: They do not use film. Instead, a digital camera uses a light-sensitive processor chip to capture photo- graphic images in digital form and store them on a flash memory card. You can review your just-shot picture on the camera’s LCD monitor, the little screen that displays what the camera lens sees, and decide whether to keep it or to try another angle in your next shot. In general, digital cameras seem to be getting smaller, thinner (the size but not the thickness of a credit card), and less expensive, but they are also capable of performing more tricks. Product releases occur so frequently that it is impossible to present an up-to-date picture of the various models. However, we can outline certain general guidelines. POINT-AND-SHOOT VERSUS SINGLE-LENS REFLEX (SLR) “Point-and-shoots are fun to tote around,” says David Ritz, who runs the 1,200-store Ritz Camera Centers, “but with an SLR, the picture is brighter and crisper.” 37 • Point-and-shoot: A point-and-shoot camera is a camera, either film or digital, that automatically adjusts settings such as exposure and focus. Generally such cameras cost under $500. Manufacturers of digital point- and-shoots include Canon, Casio, Fuji, Hewlett-Packard, Kodak, Konika, Nikon, Olympus, Panasonic, Pentax, Samsung, Sony, and Vivitar, whose prices range from $100 up to about $500. (Average: $146.) 38 Point-and- shoots vary in size from subcompacts to compacts to superzooms. 39 While a point-and-shoot autofocus will do most of the work for you automatically, you may find it useful to get a camera that also has manual controls, so that you can take it over if you want. (A new example is a brand-new camera format called “micro four thirds,” developed by Olympus and Panasonic, which basically “lets compact cameras behave more like expensive SLRs,” in one description, so you can use interchangeable lenses and accessory flashes.) 40 Of course, there are also disposable point-and-shoot cameras, such as the Kodak Zoom and the Fugifilm QuickSnap True Definition, selling for $12–$16, which are useful if you’re afraid you might leave an expensive camera behind on the beach (and if you don’t need high-quality images). • Single-lens reflex: A single-lens reflex (SLR) camera is a camera, either film or digital, that has a mirror that reflects the incoming light in such a way that the scene viewed by the viewer through the viewfinder is the same as what’s framed by the lens. A digital SLR (DSLR), which may cost anywhere from $450 on up, is the choice of “prosumers” (professional consumers, such as professional photographers and serious amateurs) because it provides more manual options and better image quality and allows the use of interchangeable lenses, from wide angle to telephoto. Some manufacturers in this category include Canon, Nikon, Pentax, and Olympus, whose prices range from $450 to An Apple Powerbook with a connected digital camera
  396. Personal Technology 373 Point-and-shoot cameras are less expensive than SLR

    cam- eras. SLR cameras are more sophisticated than point-and- shoot cameras. $1,300 (and $750–$2,700 for advanced SLRs). However, Nikon and Canon now make a less-costly “mini-SLR” that puts sophisticated features into lighter camera bodies. 41 RESOLUTION: MEGAPIXELS & SENSORS Resolution refers to image sharpness. A digital cam- era’s resolution is expressed in megapixels, or millions of pic- ture elements, the electronic dots making up an image. The more megapixels a digital cam- era has, the better the resolution and the higher the quality of the image, and so the higher the price of the camera. The millions of pixels are tightly packed together on the camera’s image sensor, a half-inch-wide silicon chip. When light strikes a pixel, it generates an electric current that is converted into the digital data that becomes your photograph. • How many megapixels are best? Megapixels measure the maximum resolution of an image taken by the camera at its top settings. Megapixels are in the range of 7–12 for subcompact point-and- shoot cameras, 7–12 for compact cameras, and 5–12 for single-lens reflex cameras. “If you shoot mainly 4 ϫ 6s and rarely crop pictures,” says Consumer Reports, “most cameras that have 7 or 8 megapixels should be fine. But if you print poster- sized shots or do major cropping, an 8-, 10-, or even 12-megapixel model makes more sense.” 42 • Don’t forget sensor size: But there’s another consideration besides megapixels: sensor size. The best overall predictor of image quality is not megapixels but the size of the sensor inside the camera. “Big sensors
  397. 374 Chapter 7 absorb more light, so you get better

    color and sharper low- light images,” points out one technology writer. “Small sensors pack too many light-absorbing pixels into too little space, so heat builds up, creating digital ‘noise’ (random speckles) on your photos.” 43 Thus, in response to a reader who asks whether he should get 7 or 10–12 megapixels for a point-and-shoot, technology expert David Einstein points out that sensors in SLR digital cameras, such as those used by professional photographers, use sensors the size of a 35-mm negative, so they can easily handle more than 12 megapixels. However, he says, “most point-and-shoot sensors . . . are fingernail-size. If you cram too many pixels onto them, they produce interference (noise) that can hurt picture quality.” 44 Thus, he suggests looking for a point-and-shoot with 7 or 8 megapixels. LENSES People talk as though megapixels are the main factor affecting photo- graphic quality, but that’s not all. You need to have a lens that ensures that your picture is properly focused and that pulls in enough light to get good exposure. As for zoom lenses, you should be aware of the difference between digital zoom and optical zoom: • Digital zoom: Manufacturers like to tout digital zoom, but, says one description, it’s just another way of saying “we’ll crop the image for you in the camera.” 45 Indeed, it actually lowers the resolution and often can produce a grainier photo. • Optical zoom: Only an optical zoom will bring you closer to your subject without your having to move. That is, the lens actually extends to make distant objects seem larger and closer. Optical zooms may be of the telescoping type or internal (untelescoping) type; the latter allows a camera to start up fast. Most subcompact and compact point-and-shoot cameras come with a 3X to 7X optical zoom, which is good for wide-angle, normal, and telephoto shots. If you’re an experienced photographer, you should look for a superzoom camera with 10X to 18X optical zoom. STORAGE Instead of being stored on film, the camera’s digital images are stored on flash memory cards inside the camera. ( • See Panel 7.3. ) Cards come Digicam. HP Photosmart digital camera. panel 7.3 Digital camera’s flash memory card
  398. info! more Personal Technology 375 Reviews of Digital Cameras For

    independent reviews of digital cameras, try the follow- ing sites: www.cnet.comwww.dpreview .com www.pcmag.com in a variety of formats, including Secure Digital (SD), Multimedia, Compact Flash, Memory Stick, and Smart Media. Most cameras come with “starter” cards, usually 16 or 32 megabytes, which hold only a handful of photos. You’ll need a card (which is reusable) with at least 128 megabytes of storage space, which will hold about 80 images from a 3-megapixel camera (depending on the resolution you set it at). A 1-gigabyte card will hold 600 still images at top resolution or more than 40 minutes of video from a 5-megapixel camera. OPTICAL VIEWFINDERS & LCD SCREENS The original digital cameras had tiny screens, which made it difficult to review photos before deciding whether to save or delete them. Now more cameras come with both optical viewfinders and LCD screens. • Optical viewfinders: The optical viewfinder is the eye-level optical glass device on the camera that, when you look through it, shows the image to be photographed. Some digital cameras omit the viewfinder, forcing you to use only the LCD, which forces you to hold the camera with arms extended, making you more apt to shake the camera. • LCD screens: The LCD (liquid crystal display) screens usually measure 2 inches or more diagonally and allow you to review the photos you take. It’s best to get a camera with an LCD that can be seen well in daylight if you do a lot of outdoor shooting. START-UP TIME, SHUTTER LAG, & CONTINUOUS SHOOTING A digital camera, like a PC, needs time to start up. You should look for one that takes no longer than a second or two, so that you won’t miss that one-of-a-kind shot that sud- denly appears out of nowhere. Another recommendation: You should look for a digicam with the least shutter lag, that annoying delay between the time you press the shutter-release button and the time the exposure is complete. Many digital cameras have a special setting called “burst” or “continuous” mode, which allows you to squeeze off a limited number of shots without pausing— helpful if you’re taking pictures at sports events. BATTERY LIFE “For digital photographers,” says one writer, “film is no lon- ger a worry. But batteries are more important than ever.” 46 Some cameras come with rechargeable batteries, although they aren’t always replaceable at the nearest drugstore (and replacements can be expensive, perhaps $40–$60). Some require you to recharge the battery inside the camera; others, in a sepa- rate charger; others, in both ways. Some cameras also require proprietary bat- teries, which also aren’t as readily available. Regardless, you should be sure you have lots of batteries before setting out on a trip. “A good rule of thumb,” says technology writer Walter Mossberg, “is that a camera should be able to get a day’s worth of shooting out of a single bat- tery charge. Depending on how you use your camera, this could mean 20, 50, 100, or 200 shots. Battery life varies depending on the size and quality of the images, how much of the time you use the flash, and whether you keep the LCD screen on all the time or use it sparingly.” 47 Survival Tip Reformat Your Memory Card to Avoid Losing Your Photos Some picture takers delete unwanted photos as they go along. But they can lose (“crash”) their saved images if they aren’t careful. The rea- son: Using the camera’s Delete function to remove unwanted images simply spreads the pictures around the card, causing fragmentation that leads to the same errors that can plague a computer’s hard drive. To avoid this problem, you should download all your images to a computer each night and then reformat the memory card. Or if you don’t have access to a PC, you should bring extra memory cards. Free battery tips from http:// malektips.com/digital_ camera_battery_help_and_ tips.html
  399. 376 Chapter 7 SHOOTING VIDEO CLIPS Although at one time

    digital cameras could shoot only about 30 seconds of video, today some digicams are available that, with a 1- gigabyte memory card, can shoot as much as 44 minutes at 30 frames per second—the same frame rate as camcorders. However, other cameras shoot at only 15 frames per second, which may store as little as 20 seconds on a clip and present a slightly jerky image. Digicams have begun to become popular for their video features because they are smaller in size than camcorders, which won’t fit in a pocket. Yet despite the advances in video quality, digital cameras still have limita- tions compared with video camcorders: • Zoom: Most camcorders allow you to zoom in and out while shooting. Most digital cameras don’t. • Sound: Camcorders shoot in stereo sound. Digicams record in mono sound from tiny microphones of lower quality. • Storage: A camcorder can store images on a 60-minute MiniDV tape cassette costing about $5. A digital camera storing 44 minutes requires a 1-gigabyte memory card costing about $20. TRANSFERRING IMAGES Let’s assume you’ve spent a day taking pictures. How do you get them out of your camera? Here are the principal methods: • Use a direct connection between your camera and your computer: You’ll need to have used the installation CD included with your digital camera to install the drivers and software on your PC. Then you can connect your camera to the computer using the USB or FireWire cable that came with it. (One end attaches to a slot on the camera, the other end to an open USB or FireWire port on the computer.) Most newer cameras support USB 2.0. After connecting the camera (which must be turned on during the process), you open its software and use it to transfer the photos into the PC, typically placing the pictures into a default folder, such as My Pictures in the My Documents folder. • Insert the memory card into your computer or a card reader: Assuming your PC has a built-in slot for your memory card (USB card) or has a card reader attached to a USB port, you can remove the memory card from the camera and insert it into the slot. External card readers cost $20 or so. • Put your camera in a cradle attached to your PC: Many camera manufacturers include cradles into which you can set your camera and use it to transfer photos to your PC. Some cradles also are able to charge your camera, if it has rechargeable batteries. • Use an online photo developer: After downloading your photo to your computer, you can go online and send your images to an online photo developer, such as Shutterfly, Kodak EasyShare, Flickr, or others mentioned in the Practical Action box on p. 377. • Use a photo printer with a built-in card slot: If you’ve bought one of the newer photo printers, you can skip using a PC entirely and insert the memory card from your camera into a slot in the printer. • Use a portable hard drive, CD burner, or MP3 player: If you’re traveling and don’t have access to a PC (not even a laptop), you could pack a portable hard drive. There are portable CD burners available that can record images directly from your camera memory card. Finally, if you have a portable media player, such as an Apple iPod, you can use its several megabytes or even gigabytes of hard drive to store your photos. What’s needed is a device (such as Delkin Devices’ USB Bridge) that will directly transfer data from the memory card to the PMP.
  400. Personal Technology 377 You have a great photo of the

    sunset at Lake Tahoe. How do you share it with others? You could always print it out and mail it via U.S. mail. Or you could try the following alternatives. • Send as an email attachment: You can download your photos to a PC and then send them as attached com- puter files to an email message. The drawback, however, is that if you have a lot of photos, it can quickly fill up the recipient’s email inbox or take a lot of time if you are sending multiple images to multiple people. • Use an online photo-sharing service: Web-based photo- sharing services provide online storage space for your photos and make it easier to share, especially if they are high-resolution files. Examples are Shutterfly, Kodak EasyShare Gallery, Snapfish, Flickr, AOL Pictures, dot- Photo, Webshots, Fotki, MyPhotoAlbum, Funtigo, Smug- mug, and PhotoSite. No special software is required for you to upload from your computer, but a broadband PRACTICAL ACTION Online Viewing & Sharing of Digital Photos connection is strongly rec- ommended. Some charge fees, some do not. Be sure to find out whether you have to renew member- ship or make a purchase in order to keep your photos from being deleted after 6 or 12 months. • Use an online service that allows direct transfer between computers: This third approach uses peer- to-peer technology, which avoids your having to upload your photos on the company’s server. An example is OurPictures. • If you have a camera with Wi-Fi transmitter, transmit your photos wirelessly: Some kinds of cameras (such as the Nikon P1 and P2 or Kodak EasyShareOne) are built with Wi-Fi transmitters for wireless networking. Thus, if you’re within range of a Wi-Fi hotspot in a coffee shop or airport lounge, you can post pictures to your website or to a photo-sharing service such as Flickr. • Use a photo-printing kiosk: Various photo-printing kiosks are available at fast-food restaurants, big retailers, amusement parks, scrapbook-making stores, cruise ships, hospitals, and other high-traffic areas and can produce a standard 4 ϫ 6 print in 4 seconds. • Use a photo lab: Photo stores and labs, as well as Costco, Kinko’s, Target, Walgreens, and Walmart, often sell inexpensive services (perhaps $3–$7) in which they will transfer the images on a memory card onto a CD and then clear the card for reuse. They will also print photos for you. • Bring along your own card reader and CDs and use others’ computers: If you bring along your own card reader and blank CDs, you can use other people’s computers to store your images. These PCs could belong to friends, of course, but also to hotel business centers and internet cafés. The Societal Effects of Digital Cameras How have digital cameras changed the way people take pictures? One result of the evolution in photography is that people are taking their cameras everywhere, either in backpacks or purses or as mobile phones with built-in cameras. (We describe cellphones and smartphones in another few pages.) Another is that people take far more pictures than they used to— perhaps 20 or more of a single scene, instead of three or four—since they don’t have to worry about the cost of film and processing, and with digital it’s easy to simply delete bad shots. (About 23% of all digital images captured by cam- eras are deleted.) 48 A third consequence may be that photography is becoming
  401. info! more 378 Chapter 7 more casual, with more off-the-cuff

    snapshots being taken instead of subjects being asked to pose stiffly for formal portraits. The digital camera “leads to more openness,” says sociologist John Grady of Wheaton College in Massa- chusetts, whose research specialty involves photography. “People are getting more documentary in style.” 49 Yet Grady also thinks that people are taking more care than ever with the photos they keep, shooting a flurry of images but then spending time selecting the best one and touching it up to eliminate small blemishes. All these developments may be bringing about different sensibilities about the value of photographs. On the one hand, images are now being viewed as less important. People take a quick look at photos emailed to them, for instance, and then immediately trash them. Or, since only a fraction of all digi- tal photos are ever printed out, they park the images on their computer hard drives and then forget about them. (Only about 13% of digital images cap- tured ever end up on paper—compared to 98% of film images.) 50 On the other hand, those photos that do end up being saved and treasured may have been so doctored to improve reality, with the help of photo-altering programs such as Apple’s iPhoto or Adobe’s Photoshop Elements, that tomorrow’s generations may question their authenticity. Muses one writer, will future anthropologists wonder “Why do all those people look so good?” 51 7.5 PERSONAL DIGITAL ASSISTANTS & TABLET PCS How could I use a PDA and tablet PC to help me in college? There you are in an unfamiliar city, looking for a restaurant. Fortunately, you have your Palm Treo with software, Zagat to Go, that has not only a review of the restaurant but also a map of how to get there and even a formula for cal- culating tips. Maybe you also have an application called WorldMate, software offering other tools for the sophisticated traveler, such as “weather forecasts, a clock that can display times around the world, a currency converter, a tax and tip calculator, clothing size converters, and international dialing codes,” as one report describes it. 52 Palm and Pocket PC are two of the best-known handhelds or palmtops, more usually called personal digital assistants. As we mentioned in Chapter 1, a personal digital assistant (PDA) is a portable device that stores personal organization tools, such as schedule planner, address book, and to-do list, along with other, more specialized software, if you want it. In 2007, the top vendors of handheld devices (PDAs) were Palm (36.2% market share) and Hewlett-Packard (25%), followed by Mio, Sharp, and Fujitsu Siemens. 53 However, shipments of handheld devices slipped 53% at the end of that year, as users turned their attention to other devices that could do the same thing, most especially smartphones, the converged devices that combine PDAs and cellphones. How a PDA Works What things should I know about PDA operation? As we’ve mentioned elsewhere, a PDA is basically a small computer, with spe- cially designed processors and operating system software, the principal ones being Palm OS (found on Palm and Sony PDAs) and Microsoft Windows Mobile (found on Hewlett-Packard and other PDAs). All feature touch- sensitive screens that allow you to enter data with a stylus, by tapping or writing on the screen. DATA STORAGE Data is stored in RAM (128 megabytes), ordinarily a volatile form of storage that loses all contents when shut off (as in a desktop PC) but which in PDAs is kept functioning with a small amount of power running off Downloads for Handhelds Websites offering software downloads for PDAs and smartphones: www.download.com www.handango.com www.pocketgear.com
  402. Personal Technology 379 the battery even after you’ve turned the

    machine off. The built-in RAM can be augmented by storage on flash memory cards (256 megabytes up to 1 giga- byte), which slide into a slot in the PDA. The latest versions contain an actual miniature hard drive, which enables users to view hours of video and play hundreds of songs. POWER SOURCES Batteries in PDAs are usually lithium ion, which can be recharged. Adapters also enable you to plug your PDA into a standard AC wall electrical outlet. TRANSFERRING FILES To transfer files from your PDA to your desktop PC or laptop (and the reverse), you can do three things: (1) You can pull out your PDA’s flash card and insert it into your computer’s card reader, either built in or connected through a USB port. (2) You can put your PDA in a special cradle that is plugged into a USB port. Finally, (3) you can transfer data wirelessly, using (in the latest models) the PDA’s built-in Wi-Fi or Bluetooth capability. The Future of PDAs In what ways could PDAs evolve? As smart cellphones continue to usurp many of the personal information man- agement kinds of features that characterized the original PDAs, it seems likely that new PDAs will take on specialized functions. Examples: DISPLAYING TELEVISION & PHOTOGRAPHS Instead of being personal informa- tion organizers, the original purpose of PDAs, handhelds may migrate toward single-purpose uses such as playing TV shows or displaying photographs. HANDHELD WEATHER METERS A handheld weather meter can range from a simple and inexpensive wind meter, useful for golfers and windsurfers, to a high-tech device that tracks almost all other aspects of weather, including fig- uring out the wind chill, useful for skiers and snowboarders. GPS LOCATORS Global Positioning System locators have already become pop- ular with hiking buffs. “With a GPS, rediscovering a swell secret swimming hole year after year can be about as stressful as making your way to your own mailbox,” says one writer. 54 Wristwatch models are also available to help run- ners pace themselves and track performance. Portable GPS navigators, such as those made by Garmin, TomTom, and Magellan, range in price between $149 and $699. 55 However, GPS is yet another feature that is now made avail- able with most smartphones, as we’ll discuss. 56 Tablet PCs How useful would a tablet PC be to me? The PDA seems to be evolving into a different kind of appliance, perhaps a smartphone. Could the same be true of the tablet PC? As we stated earlier, a tablet PC is a special notebook computer outfitted with a digitizer tablet and a stylus that allows a user to handwrite text on the unit’s screen. The stylus can take the place of a keyboard when users use an on-screen input panel or tap letters and numbers directly on an on-screen key- board. ( • See Panel 7.4, next page. ) Tablet PCs have not had the success that was anticipated for them, with only about 3% of laptops sold being tablets in 2007. 57 One problem is that tra- ditionally tablets have cost $200–$400 more than notebook PCs. Even so, these portable devices have found their uses in a handful of schools for student use in classes on such subjects as English, foreign languages, math, science, and social studies. PDA. ( Top ) LifeDrive mobile managers feature gigabytes of storage and both Wi-Fi and Bluetooth. They allow you to carry files from your desktop computer and access them wherever you go. You can also access the internet and email, record voice messages, and listen to MP3 files. ( Bottom ) Inexpensive Peek mobile email- only PDA.
  403. 380 Chapter 7 7.6 THE NEW TELEVISION What’s new about

    the new television? “It’s a transformation as significant as when we went from black-and-white to color,” says Newsweek technology writer Steven Levy, “and it’s already under way.” We are nearing the day when we can watch almost any kind of TV programming anywhere, on a huge high-definition screen or on a smart cellphone. 58 Interactive, Internet-Ready, & Mobile TV How do experts distinguish between different technological ways TV can be used? Today there are many kinds of equipment available for watching TV, some of the more interesting of which are as follows. INTERACTIVE TV Interactive TV lets you interact with the show you’re watch- ing, so that you can request information about a product or play along with a game show. We see this type of TV used with shows involving viewer voting, such as that for American Idol or Dancing with the Stars. A system being tested by Backchannel Media offers viewers programs and ads they can respond to by clicking on icons they see on their screens, and the system then sends informa- tion to a site on the viewer’s computer, where he or she can look it up. 59 INTERNET TV Internet TV is television distributed via the internet, allow- ing users to choose shows from a library of shows. Thus, if you’re accustomed to paying $40 or more a month for TV channels, you should know that all the major networks—ABC, CBS, NBC, and Fox—post many of their shows online (see Hulu.com and uStream). About 11% of adults ages 18–34 already watch TV online at least once a week. 60 This means that internet TV can be distrib- uted via broadband, Wi-Fi, cable, or satellite. Thus, for example, you use a Netflix set-top box (made by Roku) to connect your broadband network to your TV and have access to Netflix’s library of more than 10,000 movies and TV shows on demand. 61 INTERNET-READY TV Internet-ready TV (which some people also call “inter- net TV”) consists of television sets that allow viewers to watch TV shows as well as go online to get news, stream movies, view photos, and the like. The models introduced by LG, Panasonic, Samsung, Sony, and Toshiba fea- ture a built-in Ethernet port, so that you can plug an Ethernet cable into the back of the TV. At present, internet-ready TVs do not have browsers, so you can’t just go to any website you want in cyberspace. 62 If you don’t own an internet-ready TV but want to send videos or photos from your PC screen onto your TV set’s screen, you can do so by buying a $300 panel 7.4 Tablet PC Three views of a Pana- sonic Toughbook tablet PC. These Toughbook computers are manufac- tured to endure 6-foot drops, to withstand violent shocks and vibra- tions, and to operate at temperatures over 140 Њ and below –20 Њ Fahren- heit and function both at high altitude and under increased atmospheric pressure.
  404. info! more Personal Technology 381 box called SlingCatcher. 63 Some

    open-source software called Boxee, which you install on your computer, can act as a program guide to a lot of the video avail- able on the internet that you can view on your TV. 64 Finally, Adobe Systems is hoping that its standard for online video known as Adobe Flash will be widely adopted so that Hollywood studios and other content creators can cheaply distribute video to TVs and mobile phones. 65 MOBILE TV “Tiny TV,” television displayed on cellphone screens, has been available in Japan and South Korea for a number of years and more recently in Switzerland and Italy. Now broadcasters across Europe and the United States are investing in the necessary equipment to make mobile TV more widely available. Three Kinds of Television: DTV, HDTV, SDTV Why is it important to differentiate among the three types of TV? When most of us used to tune in our TV sets, we got analog television, a sys- tem of varying signal amplitude and frequency that represents picture and sound elements. Since 1996, however, things have become more complicated. DIGITAL TELEVISION (DTV) In 1996, broadcasters and their government regu- lator, the Federal Communications Commission (FCC), adopted a standard called digital television (DTV), which uses a digital signal, or series of 0s and 1s. DTV is much clearer and less prone to interference than the old ana- log TV, which disappeared on June 12, 2009, requiring viewers to acquire a converter box. HIGH-DEFINITION TELEVISION (HDTV) A form of digital TV, high-definition television (HDTV) works with digital broadcasting signals and has a wider screen and higher resolution than analog television had. Whereas stan- dard analog TV has a width-to-height ratio, or aspect ratio, of 4 to 3, HDTV has an aspect ratio of 16 to 9, which is similar to the wide-screen approach used in movies. In addition, compared to analog display screens, an HDTV display has 10 times more pixels on a screen—1,920 ϫ 1,080 pixels or more. Thus, HDTV could have 1,080 lines on a screen, compared with 525-line resolu- tion for analog TV. STANDARD-DEFINITION TELEVISION (SDTV) HDTV takes a lot of bandwidth that broadcasters could use instead for standard-definition television (SDTV), which has a lower resolution, a minimum of 480 vertical lines, and a pic- ture quality similar to that required to watch DVD movies. What’s impor- tant about the SDTV standard is that it enables broadcasters to transmit more information within the HDTV bandwidth. That is, broadcasters can multicast their products, transmitting up to five SDTV programs simultaneously—and getting perhaps five times the revenue—instead of just one HDTV program. “Multicast services piggyback on digital signals from local stations,” says one report, “including those offering HDTV versions of ABC, CBS, Fox, NBC, and PBS. . . . Stations typically get multicast programming for free and sell five minutes an hour of air time. The networks sell an additional five minutes to national advertisers.” 66 With so many extra channels, having enough content becomes a problem. Thus, we will no doubt see tons of reruns of vintage TV shows, from The Lone Ranger to The Addams Family. 3 9 4 16 HDTV Analog TV Extra image area Choosing a TV For HDTV FAQs, go to http://hometheater.about.com/ od/televisionbasics/
  405. 382 Chapter 7 The Societal Effects of the New TV

    How has technology changed the way people experience television? “The ethos of New TV can be captured in a single sweeping mantra,” says Ste- ven Levy, “anything you want to see, any time, on any device” (his emphasis). 69 TIME SHIFTING: CHANGING WHEN YOU WATCH TV Personal video recorders like those marketed by TiVo allow viewers to watch favorite shows at their own convenience rather than following a broadcast schedule. They also enable viewers to freeze-frame action sequences and to skip commercials. (What this could eventually do to advertising as the economic underpinning for free-to- viewers television can only be guessed at.) Another technology affecting the “when” is video on demand (VOD or VoD), which consists of a wide set of technologies that enable viewers to select videos or TV programs from a central server to watch when they want, rather than when TV programmers offer them. SPACE SHIFTING: CHANGING WHERE YOU WATCH TV New technology is allow- ing you to download or receive TV programs, either stored or real-time, and watch them on some sort of handheld device. For instance, the SlingCatcher and the SlingPlayer Mobile from Sling Media enable you to watch a program play- ing on your living room TV on your laptop computer—anywhere in the world. CONTENT SHIFTING: CHANGING THE NATURE OF TV PROGRAMS Perhaps the most important development is the movement of television to the internet. This is made possible by IPTV, short for Internet Protocol Television , in which television and video signals are sent to viewers using internet protocols. Cable and satellite channels have limited capacity, but the internet “has room for everything,” Levy points out. As a consequence, you may be able to cram even more programs on your screen simultaneously—and what does that do to the human attention span? (Multiple-channel TV sets are now available with Picture-tube, or CRT, tele- visions are still available, and they are low-priced, but they are bulky and rap- idly disappearing. The most popular HDTVs are flat-panels, which are of three basic types. 67 • LCD TVs: Liquid-crystal display (LCD) screens are thin (some about 1 inch thick) and lightweight, so they can be hung on a wall. Smaller sets, those below 40 inches in size, are only available in LCD models. LCDs tend to have a longer life than plasmas, about 50,000 hours, but a narrower viewing angle, so viewers sitting to the sides may see less contrast and color saturation. At one point, LCDs had a reputation for being too slow for fast-paced sports events, but manufacturers have suc- ceeded in fixing this problem. • LED TVs: To increase sales, several manufacturers have introduced what they call LED TVs, but there is really no such thing as an LED TV. As one writer points out, “they are simply LCD TVs that use LEDs [light-emitting diodes], rather than fluorescent lamps, to light the screen.” 68 Some LED sets can approach the level of deepest blacks that plasma sets have already achieved, but they could well cost more than twice as much. • Plasma TVs: Although life span is only about 30,000 hours, plasma TVs offer higher image sharpness and better viewing angles than LCD TVs do. They are also often cheaper in price than LCDs. PRACTICAL ACTION Buying the Right Flat-Panel TV
  406. Personal Technology 383 what are known as “mosaic” screens that

    allow sports fans, for instance, to watch eight separate games on one screen.) 7.7 E-BOOK READERS: The New Reading Machines Can electronic books really improve on printed books? How much content could you comfortably read online? A few paragraphs from a Wikipedia entry? Some gossip about Jennifer Aniston? An entire novel? A textbook? Many people find it difficult to read at length on a computer screen, which is why printed textbooks, for instance, remain more popular than online ver- sions of the same thing. In recent years, however, e-books and e-book readers have begun to gain some ground over paper-and-print versions of the book. An e-book , or electronic book, is an electronic text, the digital-media equivalent of a conventional printed book. You can read an e-book on your personal computer or smartphone (such as the iPhone or BlackBerry), the kind of devices Barnes & Noble is aiming for in offering 700,000 e-books. 70 (Scribd Inc. is one website that allows people to post and read e-books online.) 71 Or you can read it on a specialized piece of hardware known as an e-book reader , a device specifically designed to allow people to read electronic books. The most well-known examples are Amazon’s Kindle (in three versions) and Sony’s Reader, but competitors are coming forward with their own devices, such as Barnes & Noble’s Plastic Logic eReader. 72 (Other e-book readers: Bookeen’s Cybook, Elonex’s eBook, Endless ideas’s BeBook, Astak’s Hanlin eReader and EZ Reader, Interead’s COOL-ER, Samsung’s Papyrus and SNE- 50K, iRex’s iLiad and Digital Reader, Foxit’s eSlick.) How an E-Book Reader Works What is electronic paper? Different e-book readers use different e-software formats. They include Adobe Acrobat, Microsoft Reader, and an open format called ePub. Amazon’s Kindle uses a format called Topaz (which can be read on the iPod Touch and the iPhone as well). The Sony Reader uses ePub, and it can also handle PDF documents. The SlingPlayer is a companion to the Slingbox. SlingPlayer Mobile lets you watch and control your home TV and DVR, via your Slingbox, on your BlackBerry, iPhone, Windows Mobile, or Palm OS. ( Left ) SlingPlayer Mobile device; ( top ) back of Slingbox; ( bottom ) front of Slingbox.
  407. 384 Chapter 7 What makes e-book readers supposedly easier to

    read than e-books viewed on your PC monitor? Both Kindle and Sony use something called Vizplex (made by E Ink), the trade-marked name of a layered substance that makes up the 6-inch-high display area that you read from. Vizplex is an “electronic paper” that was developed to act like real paper, to rely on reflected light, not the backlight used by computers and phone screens, which can be hard on the eyes. Thus, the Kindle 2 supports 16 shades of gray (but no color), to make photos sharp, and there’s no glare, no eyestrain—and no battery consumption (you use power only when you actually turn the page; the rest of the time, the ink pattern remains on the screen without power). 73 Once you’ve acquired an e-book reader—for what could be $300 (Sony Reader), $299 (Kindle 2), or $489 (Kindle DX), for example—you may then download books by wireless access. In the case of the Kindle 2, this is more than 230,000 titles. 74 The machine features control buttons (next/previous page, menu, and so on). Built-in batteries last about two weeks if the wire- less capability is off, about four days if it’s on. If you turn the DX on its side, the screen changes from portrait to landscape. The Kindle DX has a 9.7-inch screen (compared to Kindle 2’s 6-inch), which is designed to be used with newspapers, magazines, and textbooks. The Benefits of E-Book Readers What good would an e-book reader be to me? There are many benefits to having an e-book reader. One e-book reader can store hundreds or even thousands of books—1,500 books, in the case of the Kin- dle 2, 3,500 for the Kindle DX. 75 Thus, instead of carrying several books around, you carry just a single gadget, which will be lighter and occupy less space than a conventional book or books. You can download e-books through a wireless connection. Type size and type faces can be adjusted. An e-book can be read in low light. The e-book will automatically open to the page where you left off. Text can be searched automatically and cross-referenced. You can bookmark pages, search within your library, look up definitions, and annotate text. Text-to-speech software can produce an audio version of an e-book. 76 Some machines, such as the Kindle DX, also play MP3s and have a crude web browser. 77 At present, many e-books are being offered at bargain-basement prices— $9.99 or less, in the case of Kindle, as compared to hardcover prices of (for Survival Tip E-Book Cautions E-books can be convenient and interesting to use. However: • They require electrical power; the battery can run down. • They are more fragile than paper books. • They can malfunction (hardware/software problems). • They are more likely to be stolen than paper books. • They can be easily hacked. • Most publishers don’t produce e-book versions of their printed books. For more information, do a keyword search on “e-books.” ( Left ) The Kindle 2; ( right ) Sony Reader PRS 700.
  408. Personal Technology 385 novels) $25–$27. 78 However, it’s doubtful this

    introductory pricing will last. Although e-books mean publishers save on the cost of paper, binding, and shipping, publishers argue these costs make up only 12.5% of the average hardcover retail list price, while the costs of writing, editing, and marketing remain the same. 79 The Drawbacks of E-Book Readers Why might I avoid using an e-book? The biggest complaint about the 2009 e-book readers has been the high price, although this will no doubt change. Consumers have to weigh the risk of buy- ing a $300 or $400 reading appliance that may be easily lost, damaged, stolen, or hacked compared to buying a regular book at a tenth or less of its price (and that may be resold). One also has to consider that the reader doesn’t actually own the e-books that are downloaded to the e-book reader; rather, they are like licensing a piece of software—you can only run them on certain designated devices and they can’t be resold or passed on to someone else. 80 One writer also found fault with the way photographs, charts, diagrams, foreign characters, and tables appeared on the gray screen of the Kindle. The beautiful illustrations and drawings in the print version of one science book turned out to be hard to make out in the electronic version. Tables in a medical book were garbled and the color coding was lost. An elaborate chart in a highly expensive engineering book was totally illegible in its electronic form. 81 Many students, both high school and college, are reportedly less than enam- ored with e-books as textbooks. Some complain that the e-texts cost too much at the outset, that they are awkward and inconvenient, that publishers make them difficult to share and print, that they can’t be kept for future reference, and that they can’t be resold. Indeed, one study of 504 college students found that 75% said they preferred print to digital texts. 82 Peter Fader, co-director of the Wharton Interactive Media Initiative, believes the e-book reader will probably go the way of other single-use machines. In an age in which cellphones double as cameras, music players, and computers, he suggests, it is only a matter of time before electronic readers will be embed- ded on some future version of the iPod Touch. 83 Growing numbers of people, however, have already turned to their mobile phones to do their reading. 84 We consider smartphones next. 7.8 SMARTPHONES: More Than Talk How are smartphones different from basic cellphones? “There’s a digital land rush going on,” says New York Times technology writer Steve Lohr, “driven by rapid advances in technology that make it possible to put more and more tools of higher and higher quality into phones.” 85 Lohr is referring to smartphones, cellular telephones with micropro- cessor, memory, display screen, and built-in modem. A smartphone “com- bines the functionality of a PDA (or Pocket PC) with a phone,” in one writer’s description. 86 It differs from a standard cellphone, he suggests, in that users can get their email “pushed” directly to their smartphone anywhere in the world as it arrives; they can view the desktop version of web pages; they have more robust applications for keeping track of contacts and appointments; they can read and edit Word, Excel, and PowerPoint documents on the go; and they can tap into third-party applications, from musical instrument tuners to games. 87 Smartphones offer a wealth of gadgetry: email access, text mes- saging, cameras, music players, videogames, digital-TV viewing, search tools, personal information management, GPS locators, and even phones doubling as credit cards in some locations (as for use with parking meters and vending machines).
  409. 386 Chapter 7 The leading worldwide vendors of smartphones midway

    through 2009— Nokia (38.3% worldwide share of the market), Samsung (19.4%), LG Elec- tronics (11.1%), Motorola (5.5%), and Sony Ericsson (5.1%)—are companies well known for making TVs, camera, and stereos. 88 In the United States, the top-selling smartphones through March 2009 were the RIM BlackBerry Curve (nearly 50% of the market), Apple iPhone 3G, RIM BlackBerry Storm, RIM BlackBerry Pear, and the T-Mobile G1. 89 Smartphones are rising fast from the status of gadgets to necessities, and they are also edging out other single-function electronic gadgets, such as music players and GPS devices. 90 Let us consider how smartphones work. How a Mobile Phone Works What are the basic elements of a mobile phone? In Chapter 6, we described how wireless services use their networks of cell towers to send voice and data over the airwaves in digital form to your cell- phone, handing off your call from one cell to another as you move through a series of geographically overlapping cells. The cellphone or smartphone con- tains many of the same attributes as a personal computer: processor, memory, input/output devices, and operating system (such as the Palm OS, Microsoft Windows Mobile OS, or Mac OSx for the iPhone). The OS, which is stored in read-only memory (ROM) and is run by the processor, provides you with the interface that allows you to store data, change settings, and so on. STORAGE The data you store in your phone, such as telephone numbers, is stored in ROM, which means that when you turn off the phone, the data does not disappear. Phones now come with 8, 16, or even 32 gigabytes of memory in which you can carry your music, photos, videos, and the like. INPUT At minimum, cellphones have a keypad for entering numbers and text (and doing text messaging) and a microphone for picking up your voice. Some are also mobile speakerphones, giving you a hands-free option and offering voice-activated dialing. Some phones also offer a touch-sensitive screen or a screen with a stylus. Xerox has developed software to turn a phone into a portable document scanner. Of course, there are phones with built-in digital cameras and camcorders, as we’ll describe. OUTPUT A cellphone includes a receiver or speaker, of course, for picking up voice calls. Mobile phones also have displays ranging from LCD to full- color, high-resolution plasma, suitable for watching TV and playing vid- eogames, as we’ll describe. Some phones act as MP3 players and offer FM radio and stereo sound. Others are also able to tap into Wi-Fi and Bluetooth networks. Incidentally, many states are targeting teenagers and other inexperienced or careless motorists to restrict their use of cellphones behind the wheel. Thus, drivers can now be ticketed in many states for talking on a cellphone without a headset or other hands-free device. Many manufacturers make wireless Blue- tooth headsets available. 91 Smartphone Services What smartphone services would be most useful to me? Proof that the phone is morphing into an “everything device” is everywhere. The percentages of people who view nonvoice applications on their cellphones as important features, according to one survey, are as follows: text messaging (73%), camera (67%), email capabilities (63%), accessing the internet (61%), music (34%), and video capability (33%). 92 Let’s consider these and other ser- vices offered for mobile phones. Apple iPhone 3Gs with touch- movable application icons
  410. info! more info! more Personal Technology 387 TEXT MESSAGING Text

    messaging, or texting, is the sending of short messages, generally no more than a couple of hundred char- acters in length, to a pager, PDA, smart- phone, or other handheld device, including notebook computer. They can also be sent to desktop computers and land-line phones. Originally text messaging appeared during the days of mainframe computers, when work- ers sitting at terminals would send short text messages to each other. In the internet world, these evolved into instant messaging and live text chat sessions. Today text messaging com- bines the portability of cellphones with the convenience of email and instant messaging. Text messaging is particularly appropriate for situations in which making a cellphone call is intrusive, as when you want to tell someone “I’m 15 minutes late.” Sometimes text messages (“texts”) are called SMSes. SMS stands for Short Mes- sage Service, a text message service origi- nally designed for GSM mobile phones but now available on a range of networks, including 3G networks. As teenagers have become accustomed to texting, there has developed a streamlined language, so-called text message lingo, with terms such as XLnt (“excellent”), fbi (“I’ll look into it”), and PCM (“please call me”). ( • See Panel 7.5, next page. ) Some people program into their phone such standard reply phrases as “Yes,” “No,” “Call me,” and “Will call you later.” Incidentally, texters need to be aware that it’s unwise to assume that when they hit the Delete button, the messages are gone forever. Like email and instant messages, text messages are often saved on servers, at least for a while. DOWNLOADED RINGTONES When Shannon Dunham’s phone rings, it goes “Knick, knack, patty whack, give your dog a bone”—the Reno, Nevada, wom- an’s favorite childhood jingle—and it indicates to her that the person trying to call her is her mother. Dunham also has 17 other distinct ringtone tunes, including “Maple Leaf Rag” to signal it’s her boyfriend calling. 93 If your phone’s ringtone, the audible sound a phone makes to announce that a call is coming in, is still an old-fashioned “ring, ring,” perhaps you have some catch- ing up to do. Now, as one writer puts it, your phone could be “vibrating, flash- ing a photo of the caller across the phone’s screen, and, above all, playing music—preferably an actual clip from a song like ‘Drop It Like It’s Hot’ by Snoop Dogg.” 94 Some ringtones may be had for free; others, which you may download from your wireless carrier (such as Cingular, Verizon Wireless, Sprint, and T- Mobile), may cost anywhere from about $1.25 to $4 per tune (not per ring). Ringtones may be monophonic, sounding more like beeps or the basic sounds that come on your cellphone when you buy it; polyphonic, sounding digitized, sort of like elevator music; or music tones (also called master tones or true tones ), real audio clips from songs. Ringtones have become so big that at one time Billboard magazine, which follows the music industry, even created a chart of popular hits for them. EMAIL The most well-known handheld device for sending wireless email is the BlackBerry, produced by Canadian company Research In Motion (RIM) Ltd., which practically created the industry. However, RIM has been joined Voice-to-Text Dictation The Samsung P207 features built-in “speech-to-text” tech- nology that turns what you dictate into text on the screen. For more information: www.cingularwireless.com www.voicesignal.com Downloading Ringtones Some are free. Check if your phone is compatible with the site. www.3gforfree .comwww.3gupload.com www.mbuzzy.comwww .myphonefiles.com www.matrix.com
  411. info! more 388 Chapter 7 Spell It Like It Sounds!

    One way of shortening words is to spell them like they sound. For example: • any ϭ ne • are ϭ r • be ϭ b • cutie ϭ qt • see ϭ c • we ϭ v • why ϭ y • you ϭ u Using Numbers and Symbols as Words or Parts of Words Many words can be spelled like numbers, or at least a part of them can. Also, don’t even think about spelling out numbers! Simply use the actual number. • anyone ϭ ne1 • and ϭ & or n • at ϭ @ • ate ϭ 8 • for ϭ 4 • forgot ϭ 4got or 4gt • great ϭ gr8t • later ϭ l8r • no one ϭ no 1 • percent ϭ % • to/too/two ϭ 2 Other Text Messaging Shortcuts Common SMS practices for shortening words that can’t be condensed with any of the above-mentioned methods: 1. Leaving out vowels, 2. removing the e in words ending with e, 3. replacing o with u for correct sound, 4. shortening double consonants to one, • at work ϭ @wrk • give ϭ giv • love ϭ luv • please ϭ plz • right ϭ ryt • sorry ϭ sry • thanks ϭ thx • through ϭ thru panel 7.5 Text message lingo (adapted from http:// medialiteracy.suite101. com/article.cfm/ decoding_text_ messaging_lingo) by a host of rivals—most of which also offer telephone and other smart- phone capabilities. Examples are those from Apple (the iPhone), Nokia, Palm (the Pre ˉ), Samsung, HTC (the Google G1), and Motorola (the Android phone). Dell, Acer, Lenovo, and Asustek have also brought smartphones to market. As with text messaging, something that most users need to pay attention to before buying is the layout and size of the keys. The BlackBerry 7100 series smartphones, for example, cram all letters and numbers onto just 14 keys. (As you type, built-in software anticipates the correct word, something that takes some getting used to.) Incidentally, as we mentioned, many of the personal organizing functions formerly found in personal digital assistants—such as address book, schedule planner, and to-do list—have now migrated to smartphones. What happens if you break or lose your cellphone (as people do all the time)? How do you Making Sense of Text Lingo To translate regular English into text lingo, go to: www.transl8it.com
  412. Personal Technology 389 replace your built-in telephone numbers and contacts?

    Some carriers and technology companies offer services that, for a small monthly fee, back up such data wirelessly. INTERNET ACCESS Many smartphone owners use their devices to perform web searches of one sort or another, accessing not only Yahoo! and Google but also such things as maps and directions, using the Global Positioning System, if their phones are so equipped. For instance, MapQuest enables you to pull up a map on your mobile phone while you’re in transit and then navigate as you go along. Yahoo!, which also provides mapping services, has a local search system for cellphones. If you type in the word pizza and an address in Chicago, for example, your phone will display all pizza restaurants in that neighbor- hood, as well as maps showing their location and driving directions. An important capability for wireless internet access is the ability to make connections to Wi-Fi networks. For instance, the BlackBerry Curve automati- cally detects when it’s near a pre-set Wi-Fi network and uses that network for voice calling or data instead of T-Mobile’s cellphone connections. Phone calls started in the cellular network will switch over to Wi-Fi and vice versa. 95 Other smartphones, such as the Motorola CN620, allow you to use the VoIP (voice-over IP) technology, which we described in Chapter 2, to make phone calls on the internet. Thus, the device will work where cell service is offered as well as in Wi-Fi-accessible areas. PHOTOGRAPHY Camera phones are making the spontaneous snapshot an everyday part of life, and, says one observer, “turning ordinary citizens into documentarians, fine-art photographers, and, in cases such as hit-and-run accidents, community watchdogs.” 96 Indeed, the devices have even inspired a trend called mobile blogging, or “moblogging,” in which phones are used to visually record both still photos and videos of all kinds of events, both mun- dane and highly personal, which are then displayed and transmitted to web- sites such as Mobog, Textamerica, and Yafro. In one experiment, 52 patients with leg ulcers were examined in person by doctors on-site and remotely by other doctors who had only pictures of the wounds taken by camera phone, and both sets of physicians were in remarkable agreement in their diagnoses and suggested treatment. 97 Camera phone manufacturers are learning that consumers will take more pictures if the quality is improved and the printing made easier. Thus, there are now available 8-megapixel phones (as from Samsung) and phones that can connect directly to many home printers. Camera phones are also being made with memory card slots, so that images stored on a memory card can then be taken directly to a retailer to have prints made. And the wireless carriers them- selves are getting in on the act. Sprint, for instance, charges for using its network to transfer photos from camera phones. Many wireless carriers also make kiosks available for downloading and printing out camera images. GAMES In the past, cellphones used as game devices left something to be desired, with “flat, cartoonish graphics and simple scenes,” in one description. 98 More recent smartphones, however, have powerful graphics chips and better screen quality that allow three-dimensional images, faster computing capabili- ties, realistic drawings, and fast-moving action. RADIO & MUSIC Some smartphones allow users to listen to FM radio. Sprint and RealNetworks have introduced an internet radio service for Sprint wire- less customers. Phone games. WildTangent’s online video game “24”
  413. 390 Chapter 7 In addition, cellphones can now store hundreds,

    if not thousands, of songs. An 8-gigabyte phone memory card, for instance, can store about 2,000 songs. Some of the biggest music companies and phone companies have been pairing up to make available song downloads—or songs and music videos to watch on mobile display screens—that customers may purchase through their phones. Short-range wireless Bluetooth technology enables cellphone users to put on headphones so they can connect to their cellphones without cords. TV & VIDEO One mother confesses she uses her cellphone’s TV feature to keep her 3-year-old son occupied while she waits in line at the post office. After tuning in the Cartoon Network, she says, “I just give him the phone and he’s quiet.” 99 Movie studios have also developed “mobi-toons” that can play as mini- television shows on smartphone displays. Major-league baseball has arranged for TV clips to be posted to phones, offering video coverage of games. With the new generation of phones, viewers should be able to watch TV shows even in moving cars and trains. 100 TV programs made for a handheld mobile device with a 2-inch or 2¼-inch display screen pose particular challenges. For one thing, although cellphone screen quality has gotten better, there are still limitations in battery life, pro- cessing power, and storage capacity. In addition, most viewers don’t have the patience to watch a 90-minute feature film on a screen this size. “Cell phone cinema has to hold your attention before your mind jets off to do something else with your phone, such as surf the web, check your email, or, gasp, make a phone call,” says one analysis. “No time to develop character. No room for special effects. Not enough screen resolution for moody shadows or shades of meaning.” 101 Whether it’s a sitcom, news show, or sports highlights, TV pro- grams designed for cellphones have to rely heavily on close-ups, more static shots, and little movement within the frame—the opposite of MTV video. In the end, then, the producers of such fare have to rely more on writing and storytelling. OTHER FEATURES We have mentioned GPS locators and video cameras, but there seems to be no end of other features existing and forthcoming for smartphones. In the United States, students at the University of Califor- nia, Santa Barbara, pay for parking stalls by charging the fee to an account through their cellphones. In Japan, customers can pay for purchases not Survival Tip You Dropped Your Phone in Water? What to Do Next Dropped your phone in water while texting in the bathroom or forget to remove it from your pocket before putting clothes through the wash? First, don’t turn it on! Next, remove the battery, rinse the phone with distilled water, wrap it in a dry washcloth and aluminum foil, and bake it in the oven for several hours at a low setting. Or use a hair dryer set on “cool.” 102 People are using electronic devices everywhere: digital cameras, computers, cellphones.
  414. info! more Personal Technology 391 with cash or credit cards

    but by making electronic payments through a smartphone. Also in Japan, mobile phones have been turned into control- lers for model racing cars, for use as television remotes, and as devices for fingerprint recognition. In South Korea, cellphones have been modified to allow diabetics to check their blood-sugar levels, and the data can be sent to their physicians. The Societal Effects of Cellphones Have mobile phones been a positive or negative force? The effects of the cellphone and the smartphone are mixed. The positive attri- butes are many: Parents can more easily monitor the safety of their children, police dispatchers can help people who are lost, information and amusements of all kinds are readily available, you can phone your apologies when you’ll be late for an appointment, and so on. However, people’s personal behavior in using phones has not necessarily been improved. One survey found that 78% of those interviewed said that people are less polite, courteous, and respectful in cellphone manners than they were 5 years earlier. (Yet 95% thought their own cellphone manners were just fine.) 103 Cellphones regularly ring—and are answered—in theaters, despite movie screen advisories. Bus and train travelers become enraged by the loud conversations of fellow passengers. The serenity of nature’s wonders in national parks is disrupted by people yakking on their phones. Bosses feel obliged to rebuke their employees whose cellphones ring in meetings. Phone use by car drivers makes even young people drive erratically, mov- ing and reacting more slowly and increasing their risk of accidents. 104 People inadvertently dial numbers in their phone’s address book when they’ve had too much to drink (a phenomenon known as “drunk dialing”). 105 Camera- equipped phones have been used to take pictures of people in bathroom stalls, to cheat on school tests, and to allow thieves to capture credit card numbers. 106 Pornography companies see cellphones as a new frontier. 107 Employers can hire companies that can keep track of their employees’ out-of-office locations through GPS tracking of their cellphones. 108 But just as technology can create unforeseen problems, perhaps technol- ogy can also provide solutions. Some countries—but not the United States yet—are permitting the use of radio-jamming equipment that keeps nearby cellphones from working whether the phone user likes it or not. This would certainly allow restaurants, theaters, and the like to impose a “cone of silence” that would provide relief to long-suffering members of the public who have been forced to unwillingly share in others’ cell conversations. 7.9 VIDEOGAME SYSTEMS: The Ultimate Convergence Machine? How do the three principal videogame consoles compare? The “convergence of computing, communications, and entertainment has been promised before,” says a Wall Street Journal article, “only to evaporate because of consumer indifference and technology that wasn’t ready for prime time. But now the pieces are finally coming together. And corporations are scrambling to make sure they aren’t left behind.” 109 The principal strategy under which this is happening is the placement of entertainment devices in your living room. Microsoft Corp., for example, is attempting to put its Xbox 360 into people’s homes under the guise of provid- ing an online videogame system, but what it is really aiming at is installing a “miniature electronic ecosystem” there, with Microsoft at the center. Someday you may wake up and find that Xbox “entered your house under the humble pretense of being a game machine, a toy for the kids, but it just ate your CD Big Boss Is Watching? Read the article at: http://news.cnet.com/ Big ϩ boss ϩ is ϩ watching/ 2100-1036_3-5379953.html
  415. 392 Chapter 7 player and your DVD player, and it’s

    looking hungrily at your telephone,” sug- gests a Time article. “It’s talking to your iPod, your digital camera, your TV, your stereo, your PC, your credit card, and the internet.” 110 Several industries—videogame console makers, consumer-electronics com- panies, PC companies, cable companies, and telephone companies—are inter- ested in this area. Here let us consider just the first: the makers of gameboxes. The big videogame hardware makers are Microsoft (until now mainly a soft- ware rather than hardware business), Sony, and Nintendo. Let’s see how their consoles compare. ( • See Panel 7.6. ) Microsoft’s Xbox 360 Why might I be inclined to buy an Xbox? Released in fall 2005, the Xbox 360 has double the power of the previous Xbox. As we said, the ostensible principal intended use of the new Xbox is for online videogames; Microsoft has invested heavily in its subscription ser- vice, Xbox Live, which allows Xbox players to meet online—and also to talk to people with whom they are playing via voice chat (a possible forerunner to a general internet telephone system). However, Microsoft really is trying to Multiplayer. Could videogame machines such as the Micro- soft Xbox, Sony PlayStation, and the Nintendo Wii become the “miniature electronic eco- system” that finally represents the convergence of computing, communications, and enter- tainment that has long been anticipated? Microsoft Xbox 360 Sony PlayStation 3 Nintendo Wii Optical drive CPU Storage Types of online connections 12x dual-layer DVD disks 3.2 GHz PowerPC-based three-in-one processing chip 20- or 120-gigabyte hard disk; two memory card ports Wi-Fi; built-in Ethernet con- nection; Xbox Live online service included; USB 2.0 ports; ability to stream from Windows PCs, digital cameras, music portables Blu-ray 3.2 GHz Cell processor 40- or 80-gigabyte hard drive; memory card slots for SD, MemoryStick, Wi-Fi; built-in Ethernet con- nection; Bluetooth wire- less connections; USB 2.0 ports Proprietary optical drive 729 MHz IBM “Broadway” processor from IBM 512 megabytes internal flash memory; SD memory cards Wi-Fi; Bluetooth 2.0 for controllers; USB 2.0 ports panel 7.6 Principal videogame consoles compared All are supposed to be backward-compatible, so that users can play games developed for ear- lier gameboxes.
  416. info! more Personal Technology 393 make the device a living-room

    hub for all kinds of digital media—not only videogames but also movies, music, and online content. The Xbox enables users to connect cameras, digital music players, high-def- inition televisions, surround-sound stereo systems, and the like, and a 20-gigabyte hard drive is avail- able on which users can copy music CDs, photos, and other digital content. With this gadget, Micro- soft is also positioning itself to be a supplier of video on demand in competition with cable operators. Sony’s PlayStation 3 Is the PS3 a better game machine? Released in 2006, Sony’s PlayStation 3, or PS3, is designed to exploit the dominance of the TV-console market that Sony estab- lished with the PlayStation 2. The PS3 uses an ultra-powerful multiprocessor, the Cell chip from International Business Machines and Toshiba Corp, which is 35 times more powerful than the one in PS2. It’s called a “cell” because software instructions can be divided up in cells and distributed among differ- ent processors and devices (TVs, music players, and the like). This means a network can be organized without human intervention, such as, in one dem- onstration, 48 separate high-definition video feeds to a single dis- play screen. PS3 enables gamers not only to videoconference over the internet but also to have movie-quality graphics, with lifelike textures, colors, and motion. Users are able to stream and down- load music and movies, handling several streams at once (so that you can play a videogame and watch a movie at the same time). Nintendo’s Wii What distinguishes the Wii console from the others? Released in 2006, Nintendo’s Wii doesn’t emphasize power and graphics so much as innovative, networked game play and sim- pler, cheaper game development. Thus, the company is position- ing itself with new versions of two decades’ worth of tried-and-true videogames, such as Mario, Zelda, and Metroid. Its one-handed remote controller, which is fitted with motion sensors, allows players to wave it around frenetically, swish it gently through the air, or kick, punch, jump, or steer their way through on-screen action. Nintendo also introduced the Nin- tendo DS, an advanced portable game console that enables users to wirelessly connect via Wi-Fi to other users with Wi-Fi capabilities. Unlike Microsoft’s and Sony’s, however, Nintendo’s gamebox won’t play movies on DVD unless users buy a separate device. The Results of Personal Technology: The “Always On” Generation What technological “generation” am I part of? With all these personal digital devices, it’s no wonder that anyone born since 1982 is called a member of the “Always On” generation. They are the genera- tion that has for their entire lives been surrounded by and using the toys and tools of the Digital Age. If you belong to this group, does it make you different from previous generations? We consider this question in the following Experi- ence Box . Showgoers try out games at the PlayStation 3 exhibit, 2009 in Los Angeles, California. Prepared for the Workplace? Some people believe that Net- Geners are not prepared for today’s corporate workplace. Read the article at: www.zazamedia.de/pages/ Commentary21.html Experience the joys of gam- ing or surfing the net with a wireless Wii remote. Attach the compact Wii console to your TV or computer to fit your lifestyle. Game, exercise, and other types of DVDs are inserted in the console slot. Wii Tech
  417. 394 Chapter 7 Videogames, computers, cellphones, portable music players, email,

    the inter- net, instant messaging, the web, video cameras, and similar personal technology. Is this what you grew up with? Then you’re a member of the Always On generation, also known as NetGeners (for “Net Generation”) and Millennials (for “Millennial Generation”). “Seventy-four percent of teens use instant messaging,” says high-tech magazine editor Tony Perkins. “No matter what numbers you look at, the Always On generation is in full swing. They communicate through the computer.” 111 A survey by Sprint finds that 76% of teens ages 15–19 and 90% of people in their early 20s regularly use their cellphones for text mes- saging, ringtones, and games. 112 Indeed, teens with cellphones average 2,272 text messages a month (compared with 203 phone calls). 113 Even low-income teens may regularly owe well over $100 a month in phone charges—and skip lunch so they can pay the bills. 114 Members of this cohort “have never known life without computers and the internet,” says one report. “To them the computer is not a technology—it is an assumed part of life.” 115 As a result, say observers such as Marc Prensky, “today’s students think and process information fundamen- tally differently from their predecessors” (his emphasis). 116 Not every person in college fits this profile. Indeed, a high proportion of students in higher education, 39%, are over age 25, many going to school part-time, quite often having depen- dents or being single parents. Those most likely to have the mindset and characteristics of Always On were, as we said, born on or after the year 1982. Unlike older students (members of the “Baby Boomers” and the generation that followed them, “Generation X”), Millennials tend to exhibit distinct learning styles. “Their learning preferences tend toward teamwork, experiential activities, structure, and the use of technology,” says Diana Oblinger, executive director of higher education for Microsoft Corporation. 117 With such students, listening to music, sending instant messages, chatting on the phone, and doing homework all at the same time is second nature. Let’s consider some of the characteristics of these students. Staying Connected Is Essential After a college class lets out, students step into the hallway and immediately activate their cellphones, PDAs, or note- book computers, talking to or texting friends or checking their email. At rock concerts, when the lights dim, one may see the glow of tiny blue screens, as concert goers text- message friends or have them listen to music via their cellphones—or observe the action through camera phones. “Connecting is what the current generation of students is all about,” says one report. “College students use the inter- net as much for social reasons as for academic reasons.” 118 At the University of North Carolina, for example, sophomore Dax Varkey carries his laptop computer everywhere, using it not only to take notes in class but also to instant-message or email friends. In his dorm room, he even IMs his roommate a few feet away. He uses his cellphone to call his buddy who lives one floor above him. “I always feel like I have a means of communication—in class, out of class,” says Varkey, 19. 119 Besides maintaining social contacts, students get home- work assignments and lecture outlines online and partici- pate in class discussions. They instant-message friends to brainstorm class projects and other assignments. They email professors with questions at any time—a boon for students too shy (or lazy) to visit during an instructor’s regular office hours. 120 All in all, the lines between work, social life, and studying are blurring. Multitasking Is a Way of Life Multitasking is second nature. “It’s perfectly normal for a group of college students to watch TV with their laptops in front of them,” said one recent college graduate. “They’ll check their campus mailbox once a day but their email every five minutes.” 121 Says Prensky, such students “are used to receiving information really fast. They like to parallel process and multitask. They prefer their graphics before their text rather than the opposite. They prefer random access (like hypertext).” 122 They are also, having grown up with video- games, accustomed to learning how to take in many sources of information at once and how to incorporate peripheral information. Finally, games have taught them how to use and manage a large database of information. 123 Students Are Impatient & Results-Oriented Today’s students have grown up on the “twitch speed” of videogames, instant messaging, MTV, and a customer- service kind of culture. Thus, they “have a strong demand for immediacy and little tolerance for delays,” says one analysis. “They expect that services will be available 24 ϫ 7 in a vari- ety of modes (web, phone, in person) and that responses will be quick.” 124 One result of this is that many students prefer typing to handwriting: It’s faster. Another result: Students expect to be engaged, which is why online forums, blogs, and use of RSS aggregators to update subjects are popu- lar. 125 They don’t want to be preached to, ignored, or bored. They are also experiential learners—they prefer to learn by doing rather than learn by listening. 126 They Respect Differences & Gravitate toward Group Activity NetGeners are racially and ethnically diverse and consequently “accept differences that span culture, ability—or disability— and style,” says one report. Indeed, they “are more comfortable with their learning differences than any other generation has been.” 127 They also gravitate toward group and team activities, owing to their group-gaming experiences and their constant communication with friends through cellphones, IM, and email. EXPERIENCE BOX The “Always On” Generation
  418. 395 Personal Technology Caller ID (p. 364) Feature that shows

    the name and/or number of the calling party on the phone’s display when you receive an incoming call, enabling you to screen telephone calls. Why it’s important: Caller ID helps you become disci- plined about preventing others from wasting your time. convergence (p. 363) Also known as digital convergence; the combining of several industries—computers, communica- tions, consumer electronics, entertainment, and mass media— through various devices that exchange data in digital form. Why it’s important: Convergence has led to electronic products that perform multiple functions, such as TVs with internet access, cellphones that are also digital cameras, and a refrig- erator that allows you to send email. digital television (DTV) (p. 381) Television standard adopted in 1996 that uses a digital signal, or series of 0s and 1s. It uses digital cameras, digital transmission, and digital receivers and is capable of delivering movie-quality pictures and CD-quality sound. The Federal Communications Commission mandated that all TV stations be capable of broadcasting DTV by 2009. Why it’s important: DTV is much clearer and less prone to interference than analog TV. It may allow viewers to receive various kinds of information services, such as announcements from public safety and fire departments. e-book (p. 384) Also known as electronic book; electronic text, the digital-media equivalent of a conventional printed book. Why it’s important: Allows users to more easily read text, such as books, on personal computer, smartphone, or e-book reader. e-book reader (p. 384) A handheld device specifically designed to allow people to read electronic books. Why it’s important: Allows users to download electronic books (text), as by wireless access, and read them as conveniently as printed books. HD radio (p. 369) Form of radio that provides CD-quality sound and allows broadcasters to squeeze one analog and two digital stations on the same frequency. Why it’s important: HD radio combines digital and analog broadcast signals, enabling stations to offer an analog main channel and digital “side- bands,” so that multiple types of content can be broadcast from the same position on the dial. high-definition television (HDTV) (p. 381) A form of televi- sion that works with digital broadcasting signals. Why it’s important: HDTV has a wider screen and higher resolu- tion than analog television had. Whereas analog TV has a width-to-height ratio, or aspect ratio, of 4 to 3, HDTV has an aspect ratio of 16 to 9, which is similar to the wide-screen approach used in movies. In addition, compared to analog display screens, an HDTV display has 10 times more pixels on a screen— 1,920 ϫ 1,080 pixels or more. Thus, HDTV could have 1,080 lines on a screen, compared with 525-line resolution for analog TV. interactive TV (p. 380) Type of television that lets viewers interact with the show they’re watching, allowing audience voting, such as that for American Idol. Why it’s important: Interactive TV allows viewers to request information about a product or play along with a game show. internet TV (p. 380) Type of television service, such as the MSN TV Service (formerly WebTV), that enables users to receive the internet through their television sets, using a set-top box. Why it’s important: Internet TV lets viewers read email, internet text, and web pages on their television sets. internet-ready TV (p. 380) (sometimes also called “internet TV”) Television set that allows viewers to watch TV shows as well as go online to get news, stream movies, view photos, and the like. Why it’s important: Internet-ready TVs allow users to watch TV and do many things on the internet, but, at present, internet-ready TVs do not have browsers, so you can’t just go to any website you want in cyberspace IPTV (Internet Protocol Television) (p. 383) Technology in which television and video signals are sent to viewers using internet protocols. Cable and satellite channels have limited capacity, but the internet has much more room. Why it’s important: Enables the movement of television to the internet. megapixels (p. 373) In a digital camera, the millions of picture elements, the electronic dots making up an image; the number of megapixels expresses the camera’s resolution, or image sharpness. The millions of pixels are tightly packed together on the camera’s image sensor, a half-inch-wide silicon chip. When light strikes a pixel, it generates an electric current that is converted into the digital data that becomes your photograph. Why it’s important: The more megapixels a digital camera has, the better the resolution and the higher the quality of the image. MP3 (p. 366) Format that allows audio files to be compressed. MP3 files are about one-tenth the size of uncompressed audio files. For example, a 4-minute song on a CD takes about 40 megabytes of space, but an MP3 version of that song takes only about 4 megabytes. Why it’s important: MP3 allows audio files to be made small enough to be sent over the internet or stored as digital files. MP3 digital audio player See portable media player. multitasking (p. 365) Performing several tasks at once, such as studying while eating, listening to music, talking on the phone, and handling email. Why it’s important: Medical and learning experts say the brain has limits and can do only so much at one time. For instance, it has been found that people who do two demanding tasks simultaneously, such as driving in heavy traffic and talking on a cellphone, do neither task as well as they do each alone. Indeed, the result of constantly shifting attention is a sacrifice in quality for any of the tasks with which one is engaged. personal digital assistant (PDA) (p. 378) Also known as handheld or palmtop; a portable device that stores personal organization tools, such as schedule planner, address book, SUMMARY
  419. 396 Chapter 7 and to-do list, along with other, more

    specialized software. Examples are Palm and Pocket PC. Why it’s important: Because many of the functions of the PDA are also now incorporated in smartphones, sales of general-purpose PDAs have declined, and it’s been predicted that the device will die out. podcasting (p. 371) The recording of internet radio or similar internet audio programs. Why it’s important: Podcasting soft- ware allows amateur deejays and hobbyists to create their own radio shows and offer them free over the internet. Listen- ers can then download shows onto their MP3 players like the iPod. point-and-shoot camera (p. 372) A camera, either film or digital, that automatically adjusts settings such as exposure and focus. Generally such cameras cost under $500. Why it’s important: A point-and-shoot autofocus will do most of the work for you automatically, although you may find it useful to get a camera that also has manual controls, so that you can take over if you want. portable media players (PMPs) (p. 366) Small portable devices that enable you to play digital audio, video, and/or still-image files. Why it’s important: Also known as MP3 play- ers, portable devices for playing digital audio files. PMPs dif- fer from MP3 players in that they can handle not only audio but also video and image files. Thus, you may be able to carry several hours of music or video—in the case of an 80-gigabyte Apple iPod as many as 20,000 songs, 120 minutes of video, or 25,000 still images. ringtone (p. 387) The audible sound a phone makes to announce that a call is coming in. A ringtone may be an old- fashioned “ring, ring” or a clip from a popular song. Why it’s important: Users can customize the ringtones on their cellphones. sampling rate (p. 367) The number of times, expressed in kilobits per second, that a song is measured (sampled) and converted to a digital value when it is being recorded as a digital file. Why it’s important: The sampling rate affects the audio quality. For instance, a song sampled at 192 kilobits per second is three times the size of a song sampled at 64 kilobits per second and will be of better sound quality. satellite radio (p. 369) Also called digital radio; a radio service in which signals are sent from satellites in orbit around the Earth to subscribers owning special radios that can decode the encrypted signals. Why it’s important: The CD-quality sound is much better than that of regular radio, and because the signals are digital, there are many more channels available than those on traditional radio. Also, unlike standard broad- casters, satellite radio broadcasters are for the most part not regulated by the Federal Communications Commission. single-lens reflex (SLR) camera (p. 372) A camera, either film or digital, that has a mirror that reflects the incoming light in such a way that the scene viewed by the viewer through the viewfinder is the same as what’s framed by the lens. Why it’s important: A digital SLR, which may cost anywhere from $450 on up, is used by professional photographers and serious amateurs because it provides more manual options and better image quality and allows the use of interchangeable lenses, from wide angle to telephoto. smartphone (p. 385) Cellular telephone with microprocessor, memory, display screen, and built-in modem. Why it’s impor- tant: Some types of this multimedia phone, which combine some of the capabilities of a PC with a handset, offer a wealth of gadgetry: text messaging, cameras, music players, videog- ames, email access, digital TV viewing, search tools, personal information management, GPS locators, internet phone ser- vice, and even phones doubling as credit cards. SMS (Short Message Service) (p. 387) A text message service originally designed for GSM mobile phones but now available on a range of networks, including 3G networks. Why it’s impor- tant: Text messaging has long been wildly popular in Europe and Asia but in recent years has become more mainstream in North America. standard-definition television (SDTV) (p. 381) A TV standard that has a lower resolution than HDTV, a minimum of 480 vertical lines, and a picture quality similar to that required to watch DVD movies. Why it’s important: The SDTV standard enables broadcasters to transmit more information within the HDTV bandwidth, allowing them to multicast their products, transmitting up to five SDTV programs simultaneously—and getting perhaps five times the revenue—instead of just one HDTV program. (Analog broadcasts only one program at a time.) Thus, instead of beaming high-definition pictures, some broadcasters are splitting their digital streams into several SDTV channels. switched-network telecommunications model (p. 364) Model of telecommunications whereby a common carrier provides circuit switching among public users; that is, a tem- porary connection is established by closing a circuit. Why it’s important: This is the model of the telephone system and also of the internet. In a telephone network, a connection for voice transmission is made by dialing; in a packet-switching net- work, a temporary connection is established between points for transmitting data in the form of packets. People on the system are not only consumers of information (“content”) but also possible providers of it. (Compare tree-and-branch tele- communications model. ) text messaging (p. 387) Also known as texting; the sending of short messages, generally no more than a couple of hundred characters in length, to a pager, PDA, smartphone, or other handheld device, including notebook computer, as well as to desktop computers and fixed-line phones. Why it’s important: Text messaging combines the portability of cellphones with the convenience of email and instant messaging. Text messag- ing is particularly appropriate for situations in which making a cellphone call is intrusive. tree-and-branch telecommunications model (p. 364) A model of telecommunications in which a centralized informa- tion provider sends out messages through many channels to thousands of consumers. This is the model of most mass media, such as AM radio and network television broadcasting. ( Compar e switched-network telecommunications model. ) Why it’s important: Mass-media radio and television have been losing listeners and viewers to the more personalized media based on the switched-network model. video on demand (VOD or VoD) (p. 383) Set of technologies that enable viewers to select videos or TV programs from a
  420. 397 Personal Technology central server to watch when they want.

    An example is the device offered by Akimbo, a TiVo-like set-top box with a hard drive that can hold 200 hours of video and offers a library of programs that, for a fee, can be downloaded. Why it’s impor- tant: VOD allows viewers to watch programs when they want rather than when TV programmers offer them. CHAPTER REVIEW Self-Test Questions 1. The combining of several industries through various devices that exchange data in digital form is called ________ . 2. ________ allows amateur deejays and hobbyists to cre- ate their own radio shows and offer them free over the internet. 3. The type of communications model used for the telephone system and the internet is the ________ model. 4. The electronic dots that make up a digital-camera image are called ________ . 5. Performing several tasks at once is called ________ . 6. A portable, handheld computer that manages personal tasks is called a(n) ________ . 7. ________ is a format that allows files to be compressed so they are small enough to be sent over the internet as digital files. 8. Converting a CD audio track to play on an MP3 player is called ________ . 9. ________ works with digital broadcasting signals and has a wider screen and higher resolution than standard TV. 10. A ________ camera is one that automatically adjusts settings such as exposure and focus. Multiple-Choice Questions 1. The number of times that a song is measured and con- verted to a digital value is called a. SLR. b. ripping. c. sampling rate. d. mash-up. 2. The two U.S. satellite radio signal suppliers are a. Sirius; Worldscope. b. XM; Sirius. c. Casio; Konika. d. XM; Treo. e. Worldscope; Tivo. 3. A digital camera’s resolution is expressed in a. dpi. b. rpm. c. pda. d. megapixels. e. betapixels. 4. Smartphones have a. a microprocessor. b. a display screen. c. memory. d. a modem. e. all of these 5. Which of the following concerns does not apply to smartphone use? a. often causes erratic driving b. people can track users’ movements without their knowledge c. users can take photos in inappropriate situations d. signals can open locked car doors e. loud conversations and ringtones can irritate people in the user’s vicinity True/False Questions T F 1. The most well-known handheld device for send- ing wireless email is the Blackberry. T F 2. The increased availability of broadband con- nections slowed down the process of digital convergence. T F 3. MP3 increases the size of digital audio files in order to improve the sound quality. T F 4. For 8 ϫ 10 photo prints, 2-megapixel digital cam- eras are best. T F 5. Memory Stick is a type of flash memory card. T F 6. Sending photos as email attachments to many people is more efficient than using an online photo-sharing service. T F 7. One cannot transfer files from a PDA to a desk- top computer. T F 8. HDTV uses analog signals. s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.”
  421. 398 Chapter 7 s t a g e 2 LEARNING

    COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Short-Answer Questions 1. Briefly explain how satellite radio works. What are two advantages of satellite radio? 2. What could you use a mash-up for? 3. Why are MP3 files smaller than regular audio files, such as a purchased CD? 4. Why would you use an online photo-sharing service? 5. How does sampling rate relate to the size of MP3 files? 6. What is the difference between satellite radio and high- definition radio? 7. Which digital camera would you choose: point-and- shoot or single-lens reflex? Why? APPLYING, s t a g e 3 LEARNING ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” Knowledge in Action 1. Does almost everyone you know download and listen to MP3 files? Describe a few ways in which the iPod-types whom you have observed are being distracted from certain activities and some responsibilities. Do you per- ceive a problem? 2. List five situations in which you often find yourself mul- titasking. How any things have you done at once? How do you think your manner of multitasking affects the quality of what you achieve? 3. What questions would you ask a friend in order to determine which digital camera, with which character- istics, you would advise her or him to buy? 4. Describe how one can transfer images from a digital camera to a computer. Web Exercises 1. Current rules of both the FCC and the U.S. Federal Aviation Administration ban in-flight cellular calling. The primary FCC concern has been possible disruption of cellphone communication on the ground. The FAA’s worry is how cellphones might interfere with a plane’s navigation and electrical systems. However, plans are in the works to assign new bandwidths to allow cellphone use in the air. 2. Do several keyword searches and find three reasons to allow cellphone use during airplane flights, and three reasons not to allow it. Provide information to support each reason. What is your opinion on this issue? 3. In 2008, California joined the list of U.S. states that have restricted cellphone use by automobile drivers since New York passed the first such law in 2001. It is now illegal in Connecticut, as well as New York, New Jersey, and major cities such as Washington and Chi- cago for drivers to use handheld cellphones. Connecti- cut drivers can be ticketed only if they are pulled over for another moving violation, although in many states, including New York, police can stop drivers using hand- held cellphones. However, Connecticut’s broad law bans “any activity not related to the actual operation of a motor vehicle in a manner that interferes with the safe operation of such vehicle.” That can include eating, fid- dling with the CD player, personal grooming, attending to children, reading, and the like. In addition, according to the National Conference of State Legislatures, 10 states have enacted legislation restricting use of electronics by teenage drivers. Do an internet search and find out what the law says about driving and cellphone use in the state where you are going to school and in the state where you come from. The rules on driving and cellphone use in many other countries are much stricter than they are in the United States; for more information, go to www.cellular-news .com/car_bans/. According to the Automobile Association of Amer- ica (AAA), hands-free phones are not risk free. The hands-free feature is simply a convenience: it does not increase safety. Studies show that hands-free cell- phones distract drivers the same as handheld phones do. Why? Because it’s the conversation that distracts the driver, not the device. Search the internet and find some reports that support this view. Why do you think people don’t just turn off their cellphones while they are driving and let voicemail col- lect messages to be retrieved later? 4. The Convergence Center ( http://dcc.syr.edu/index. htm ) supports research on and experimentation with media convergence. The Center is a joint effort of the Syracuse University School of Information Studies and the Newhouse School of Public Communications. Its mission is to understand the future of digital media and to engage students and faculty in the process of defin- ing and shaping that future. Go to their site and click on What’s New, Articles; choose one article to read; then write a couple of paragraphs that summarize the article. 5. Now that cellphones have cameras, camera voyeur- ism is becoming a problem. The U.S. Video Voyeurism
  422. 399 Personal Technology Prevention Act of 2004 has made this

    behavior a fed- eral offense. This act prohibits photographing or vid- eocapturing (including with cellphones) a naked person without his or her consent in any place where there can be “a reasonable expectation of privacy.” Punish- ment includes fines of up to $100,000 or up to a year in prison, or both. Cellphone vendors say this law may be hard to enforce and may even be a deterrent to promising tech- nology and create a false sense of security. Some cell- phone manufacturers deny that voyeurs are any more likely to snoop using a cellphone camera than using other technologies such as digital cameras. But other people say the opportunity differs, that most people don’t carry digital cameras around with them. With a cellphone camera there is more opportunity to take snapshots of interesting images, and unfortunately this can include images that can threaten privacy. Voyeurs using cellphone cameras could easily pretend to be doing something else, such as dialing or talking. Some state legislators have proposed legislation requiring camera phones sold to emit an audible noise or flash a light when users press the shutter. But such noise and light would disturb happy occasions such as weddings, where people use cellphone cameras to take pictures and send them instantly to loved ones who couldn’t attend. Research the cameraphone voyeurism problem on the internet. How could you protect your privacy in public situations? 6. Schools are starting to offer online digital photography courses. Check out www.worldwidelearn.com/online- courses/digital-photography-course.htm. Are such courses offered at your school? If not, should they be? 7. The Cellular Telecommunications & Internet Association (CTIA) reminds us that text messaging can be a fast, efficient, and reliable way to communicate in the event of an emergency. And if more wireless users rely on text messaging in crisis situations, the people who need to make voice calls the most—emergency responders and 911 callers—can get through more easily. 8. “Everyone should have a plan for communicating in times of emergencies, and text messaging can be an efficient way to reach your friends, family or loved ones. In the time it takes one person to make a 1-minute voice call, hundreds of thousands of text messages can be exchanged,” said Tom Wheeler, President and CEO of CTIA. “In these days of increased terrorist threats and heightened awareness, learning all the options on your wireless phone is an important piece of being prepared.” Text messages have also been used around the world to alert citizens in times of danger. In Kuwait, during the 1990 conflict, Kuwaitis were warned about imminent attacks from Iraq via text messaging. And in Hong Kong, some years ago, a wireless carrier set up a system to provide SARS updates via mobile phone. Users punched in a three-digit number and received a text message indicating if they were near any buildings where SARS victims lived or worked. The information was obtained from a daily list released by the Health Department. In the frantic days leading up to the landfall of Hur- ricane Rita in September 2005, Houston radio station KRBE offered to deliver hurricane alerts via text mes- saging across cellphones to listeners, enabling informa- tion to be delivered anytime, anywhere, regardless of whether a person was near a radio or a computer. At a time when traditional media networks experienced coverage issues from storm damage, power lines were down, and cars were running out of gas, KRBE was able to provide a continuous two-way stream of information via the cellphone. Many listeners expressed gratitude for information on road closures, fuel availability, evacu- ation orders, and storm damage during a frightening experience. Do an internet search on how text messaging has been used to help in various types of emergencies around the world. What types of suppliers have pro- vided the messages? Using what types of systems? How do cellphone users know where/how to retrieve the messages?
  423. 401 DATABASES & INFORMATION SYSTEMS Digital Engines for Today’s Economy

    8 Chapter Topics & Key Questions 8.1 Managing Files: Basic Concepts What are the data storage hierarchy, the key field, types of files, and some methods of data access and storage? 8.2 Database Management Systems What are the benefits of database manage- ment systems, and what are the main types of database access? 8.3 Database Models What are five types of database models? 8.4 Data Mining How does data mining work, and how could it be useful to me? 8.5 Databases & the Digital Economy: E-Business & E-Commerce What are e-business and e-commerce, and what are three types of e-commerce systems? 8.6 Information Systems in Organizations: Using Databases to Help Make Deci- sions How does information flow within an organization, and what are different types of information systems? 8.7 Artificial Intelligence What are the main areas of artificial intelligence? 8.8 The Ethics of Using Databases: Concerns about Privacy & Identity Theft What are two ethical concerns about the uses of databases?
  424. 402 Chapter 8 T he Library of Congress, the largest

    library in the world, has 130 million items on about 530 miles of bookshelves. How does the information on the internet compare? Digital information is being created at a faster pace than previously thought, and for the first time, the amount of digital information created each year has exceeded the world’s available storage space, according to a report from analyst firm IDC. “This is our first time . . . we couldn’t store all the information we create even if we wanted to,” states the report, “The Diverse and Exploding Digital Universe.” 1 The amount of information created, captured, and replicated in 2007 was 281 exabytes (281 billion gigabytes), 10% more than IDC previously believed— and more than the 264 exabytes of the estimated available storage on hard drives, tapes, CDs, DVDs, and memory. 2 It was estimated that the size of the digital universe would jump to 1,200 exabytes by 2010 (and that would include 500 billion cellphone images alone). 3 How will all such information be organized and made accessible? The answer has to do with databases. The arrival of databases has changed the nature of many of our business and social institutions. Today, for instance, because of the huge increase in online internet sales, credit card fraud has boomed, and so slight changes in your spending patterns— buying much more clothing than usual or filling your car’s gas tank twice in one day—will trigger an alert that may freeze your card. 4 But databases are everywhere now and promise to bring even more changes in the future. Wiki- pedia ( www.wikipedia.org ), for instance, is a web-based, free-content, multilingual encyclopedia that anyone can log on to and add to or edit as he or she sees fit; it has 9.25 million articles in approximately 250 languages. 5 The National Geographic Society and IBM’s Watson Research Labs launched a massive database called the Genographic Project that is cataloging genetic markers and is capable of tracing the geographic origins of your and other peo- ple’s ancestors back 10,000 years. 6 Google has been try- ing to create a database consisting of millions of digitally scanned books from several university libraries. 7 Traditional electronic databases include those that handle airline reserva- tion systems, many library catalogs, magazine subscriptions for large pub- lishing companies, patient tracking in large hospitals, and inventories for supermarkets and big-box stores like Walmart. These databases typically use text- and numeric-based data. Newer types of databases include multimedia data and formulas for data analysis. Before we discuss traditional types of databases and recent innovations in database management, we need to discuss some basic concepts of file management. 8.1 MANAGING FILES: Basic Concepts What are the data storage hierarchy, the key field, types of files, and some methods of data access and storage? An electronic database is not just the computer-based version of what used to go into manila folders and filing cabinets. A database is a logically organized collection of related data designed and built for a specific purpose, Instant ID. The IBIS Mobile Identification System can verify a person’s identity in minutes from a remote location. It uses fingerprint information cap- tured by the handheld device; the information is transmitted to the Automated Fingerprint Identification System (AFIS), a huge database used by law enforcement officers, among others.
  425. info! more Databases & Information Systems 403 a technology for

    pulling together facts that allows the slicing and dicing and mixing and matching of data in all kinds of ways. The data in a database has some inherent meaning. In other words, a random assortment of data cannot correctly be called a database. A database can be of any size and of any degree of complexity, and it can be maintained manually or by software on comput- ers. This chapter, of course, covers computer databases. How Data Is Organized: The Data Storage Hierarchy What are the units of data, from smallest to largest? Data in a database can be grouped into a hierarchy of categories, each increas- ingly more complex. The data storage hierarchy consists of the levels of data stored in a computer database: bits, characters (bytes), fields, records, and files. ( • See Panel 8.1 , next page.) BITS Computers, as we have said, are based on the principle that electricity may be on or off. Thus, the bit is the smallest unit of data the computer can store in a database—represented by 0 for off or 1 for on. CHARACTERS A character (byte) is a letter, number, or special character. A, B, C, 1, 2, 3, #, $, % are all examples of single characters. A combination of bits represents a character. Bits and bytes are the building blocks for representing data, whether it is being processed, telecommunicated, or stored in a database. The computer deals with the bits and bytes; you, however, will need to deal mostly with fields, records, and files. FIELD A field is a unit of data consisting of one or more characters (bytes). It is the smallest unit of meaningful information in the database. Each field has a field name that describes the kind of data that should be entered into the field. An example of a field is your first name, or your street address, or your Social Security number. Fields can be designed to be a certain maximum length or a variable length, and they can also be designed to hold different types of data, such as text only, numbers only, dates only, time, a “yes” or “no” answer only, web links only, or pictures, sound, or video. RECORD A record is a collection of related fields. Each record stores data about only one entity, which can be a person, a place, a thing, an occurrence, Tools of the Library of Congress Go to the Library of Congress website at: www.loc.gov Click on Researchers, and look at the research tools offered. Could any help you with your research work? Explore a few that interest you. Feline phrasing. The toy maker Takara of Japan has marketed a “cat’s words translator,” which uses a database of cat voices to output cat “phrases.” Humans can use these transla- tors to communicate with their cats.
  426. 404 Chapter 8 Type of data Contains Example Database Several

    files Your personal database Friends’ addresses file, CD titles file, Term papers file, etc. File Several records Friends’ addresses file Bierce, Ambrose 0001; London, Jack 0234; Stevenson, Robert L. 0081; etc. Record Several fields Ambrose Bierce’s name and address 13 Fallaway St. San Francisco, CA 94123 Field Characters (bytes) First name field Ambrose Character Bits (0 or 1) Letter S 1110 0010 Record Key field Field Character – — — ——— ———— ———— ——— ———— ——— —— ———— ——— ——— —— —— Spread- sheet File records pages rows and columns (cells) bitmap vectors (display list) digitized music or voice multiple bit- maps and other codes fields words What hardware sees - – — — - – — — - – — — - – — — - – — — - – — — - – — — - – — — - – — — Data File Text File Vector File Sound File Raster File Video File Bytes Bits What users see is controlled by software or a phenomenon. An example of a record would be your name and address and Social Security number. FILE A file is a collection of related records. An example of a file would be data collected on everyone employed in the same department of a company, including all names, addresses, and Social Security numbers. You use files a lot because the file is the collection of data or information that is treated as a unit by the computer. The file is at the top of the data hierarchy. A collection of related files forms the database. A company database might include files on all past and current employ- ees in all departments. There would be various files for each employee: payroll, retirement benefits, sales quotas and achievements (if in sales), and so on. The Key Field What is a key field, and what is probably my most important key field? An important concept in data organization is that of the key field. ( • See Panel 8.1 again.) As we said in Chapter 3, a key field is a field that is chosen to uniquely identify a record so that it can be easily retrieved and processed. The key field is often an identification number, Social Security number, customer account number, or the like or a combination of letters and numbers set up as a mean- ingful code. The primary characteristic of the key field is that it is unique. Thus, numbers are clearly preferable to names as key fields because there are panel 8.1 How data is organized
  427. Databases & Information Systems 405 Survival Tip Some Records Have

    to Be Hardcopy You could scan your birth certificate, will, or car owner- ship title into your computer to make a digital record. But such records printed off a hard drive aren’t always legally acceptable. Original docu- ments are often required by government agencies and the court system. Survival Tip Guard Your Social Security Number The Social Security number is an important key field to records about you. Don’t carry it with you. Don’t print it on checks. Don’t give it out unless really necessary. many people with common names like James Johnson, Susan Williams, Ann Wong, or Roberto Sanchez, whose records might be confused. Student records are often identified by student ID numbers used as key fields. As we mentioned in Chapter 3, most database management systems allow you to have more than one key field, so that you can sort records in different ways. One of the keys is designated the primary key and must hold a unique value for each record. A key field that identifies records in different tables is called a foreign key. Foreign keys are used to cross-reference data. Types of Files: Program Files & Data Files What’s the difference between a program file and a data file? As we said, the file is the collection of data or information that is treated as a unit by the computer. Files are given names— filenames . If you’re using a word processing program to write a psychology term paper, you might name it “Psychreport.” In a database, a filename might be “AccountingPersonnel.” Filenames also have extensions, or extension names, usually three let- ters added after a period following the filename. For example, the .doc in Psychreport.doc is recognized by Microsoft Word as a “document.” Extensions are usually inserted automatically by the application software. When you look up the filenames listed on your hard drive, you will notice a number of extensions, such as .doc, .exe, and .com. There are many kinds of files, but two principal ones are program files and data files. PROGRAM FILES: FOR SOFTWARE INSTRUCTIONS Program files are files con- taining software instructions. Examples are word processing or spreadsheet programs, which are made up of several different program files. The two most important are source program files and executable files. Source program files contain high-level computer instructions in the original form written by the programmer. Some source program files have the exten- sion of the language in which they are written, such as .bas for BASIC, .pas for Pascal, or .jav for Java. (Programming languages are described in Chapter 10.) For the processor to use source program instructions, they must be trans- lated into an executable file, which contains the instructions that tell the com- puter how to perform a particular task. You can identify an executable file by its extension, .exe or .com. You use an executable file by running it—as when you select Microsoft Excel from your on-screen menu and run it. (There are some executable files that you cannot run—other computer programs called runtime libraries cause them to execute. These are identified by such exten- sions as .dll, .drv, ocx, .sys, and . vbx. ) DATA FILES: FOR HOLDING DATA Data files are files that contain data— words, numbers, pictures, sounds, and so on. These are the files used in data- bases. Unlike program files, data files don’t instruct the computer to do any- thing. Rather, data files are there to be acted on by program files. Examples of common extensions in data files are .txt (text) and .xls (Excel worksheets). Certain proprietary computer programs apply their own extensions, such as .ppt for PowerPoint and .mdb for Access. Three types of files worth particular attention are graphics, audio, and video files. • Graphics files: Some important ones are .bmp, .tiff, .gif, .jpeg, and .png. • Audio files: The ones you’re most apt to encounter are .mp3, .wav, and .mid. • Animation/video files: Common files are .qt, .mpg, .wmv, .avi., and .rm. The box describes these and other common types of files. ( • See Panel 8.2 , next page.)
  428. 406 Chapter 8 panel 8.2 Common types of files Graphics

    files • .bmp (BitMaP): Bitmap graphic format native to Microsoft Windows. Some Macintosh programs can also read .bmp files. • .gif (Graphic Interchange Format): Pronounced “jiff.” Format used on web pages and downloadable images. • .jpeg or .jpg (Joint Photographic Experts Group): Pronounced “jay-peg.” Used for web images and for digital photography, especially for high-resolution images. • .pcx: Format introduced for PC Paintbrush. Used for other graphics packages as well. • .pict (PICTure): Format used by Apple for use on Macintosh computers. • .png (Portable Network Graphic): Pronounced “ping.” Patent-free alternative to .gif. • .tiff or .tif (Tagged Image File Format): High-resolution bitmap graphics file widely used on both Macintosh and PC computers. Used in exchanging bitmap files that will be printed. Audio files • .au: Low-fidelity monaural format now often used to distribute sample sounds online. • .mid (MIDI, Musical Instrument Digital Interface): Format meant to drive music synthesizers. • .mp3 (MPEG-3): File format used to compress CD-quality music while preserving much of the original sound quality. • .wav (WAVe): Waveform file format that contains all the digital information needed to play speaker-quality music. Video files • .avi (Audio Video Interleaved): Video file format recognized by Windows Media Player. Not good for broadcast-quality video. • .mov or .qt (QuickTime): Video file formats developed by Apple for QuickTime video player. Can play broadcast-quality video. • .mpg or .mpeg (Motion Picture Experts Group): Video formats for full-motion video. MPEG-2 format used by DVD-ROM disks. MPEG-4 recognized by most video player software. • .rm (RealMedia): Popular file format for streaming video. • .wmv (Windows Media Video): Video format recognized by Windows Media Player. Other files • ASCII files: Text-only files containing no graphics and no formatting such as boldface or italic. ASCII format is used to transfer documents between computers, such as PC and Macintosh. Such files may use the .txt (for text) extension. • Web files: Files carried over World Wide Web. Extensions include .html, .htm, .xml, and .asp (active server page). • Desktop publishing files: Include PostScript commands, which instruct a PostScript printer how to print a file and use .eps (encap- sulated PostScript). • Drivers: Software drivers often have the extension .drv. • Windows operating system files: Files such as Autoexec.bat and Config.sys relate to OS setup. • PDF (Portable Document Format) files: Files that use Adobe Acro- bat’s format for all types of document exchange as well as for publishing documents on the web that are downloaded and read independently of the HTML pages. These files use the extension .pdf. Editable PDF files are created with Adobe’s Acrobat software. Acro- bat can convert a wide variety of document types on Windows, Mac, and Unix to the PDF format.
  429. Databases & Information Systems 407 Compression & Decompression: Putting More

    Data in Less Space How are large files compressed and decompressed? The vast streams of text, audio, and visual information threaten to over- whelm us. To fit large multimedia files into less space and increase the speed of data transmission, a technique called compression/decompression, or codec, is used. Compression is a method of removing repetitive elements from a file so that the file requires less storage space and therefore less time to transmit. Later the data is decompressed—the repeated patterns are restored. There are two principal methods of compressing data—lossless and lossy. In any situation, which of these two techniques is more appropriate will depend on whether data quality or storage space is more critical. Lossless compression uses mathematical techniques to replace repetitive pat- terns of bits with a kind of coded summary. During decompression, the coded summaries are replaced with the original patterns of bits. In this method, the data that comes out is exactly the same as what went in; it has merely been repackaged for purposes of storage or transmission. Lossless techniques are used when it’s important that nothing be lost—for instance, for computer data, database records, spreadsheets, and word processing files. Lossy compression techniques permanently discard some data during compression. Lossy data compression involves a certain loss of accuracy in exchange for a high degree of compression (to as little as 5% of the original file size). This method of compression is often used for graphics files and sound files. Thus, a lossy codec might discard subtle shades of color or sounds out- side the range of human hearing. Most users wouldn’t notice the absence of these details. Examples of two lossy compression file formats are .jpeg and .mpeg. 8.2 DATABASE MANAGEMENT SYSTEMS What are the benefits of database management systems, and what are the main types of database access? As we’ve said, a database is an organized collection of related (integrated) files. A database may be small, contained entirely within your own personal com- puter, or it may be massive, available through online connections. Such massive databases are of particular interest because they offer phenomenal resources that until recently were unavailable to most ordinary computer users. In the 1950s, when commercial use of computers was just beginning, a large organization would have different files for different purposes. For example, a university might have one file for course grades, another for stu- dent records, another for tuition billing, and so on. In a corporation, people in the accounting, order-entry, and customer-service departments all had their own separate files. Thus, if an address had to be changed, for example, each file would have to be updated separately. The database files were stored on magnetic tape and had to be accessed in sequence in what was called a file-processing system. Later, magnetic-disk technology came along, allowing any file to be accessed randomly. This permitted the development of new technology and new soft- ware: the database management system. A database management system (DBMS), or database manager, is software written specifically to control the structure of a database and access to the data. In a DBMS, an address change need be entered only once, and the updated information is then avail- able in any relevant file. (Strictly speaking, the database is the collection of the data, and the database management system is the software—but many profes- sionals use “database” to cover both meanings.)
  430. 408 Chapter 8 The Benefits of Database Management Systems What

    are four advantages of a DBMS? The advantages of database management systems are these: REDUCED DATA REDUNDANCY Data redundancy, or repetition, means that the same data fields (a person’s address, say) appear over and over again in dif- ferent files and often in different formats. In the old file-processing system, separate files would repeat the same data, wasting storage space. In a data- base management system, the information appears just once, freeing up more storage capacity. In the old data storage systems, if one field needed to be updated, someone had to make sure that it was updated in all the places it appeared—an invitation to error. IMPROVED DATA INTEGRITY Data integrity means that data is accurate, con- sistent, and up to date. In the old system, when a change was made in one file, it might not have been made in other necessary files. The result was that some reports were produced with erroneous information. In a DBMS, reduced redundancy increases the chances of data integrity—the chances that the data is accurate, consistent, and up to date—because each updating change is made in only one place. Also, many DBMSs provide built-in check systems that help ensure the accuracy of the data that is input. The expression “garbage in, garbage out” (abbreviated GIGO ) refers to the fact that a database with incorrect data can- not generate correct information. INCREASED SECURITY Although various departments may share data, access to specific information can be limited to selected users. Thus, through the use of passwords, a student’s financial, medical, and grade information in a university database is made available only to those who have a legitimate need to know. EASE OF DATA MAINTENANCE Database management sys- tems offer standard procedures for adding, editing, and delet- ing records, as well as valida- tion checks to ensure that the appropriate type of data is being entered properly and completely into each field type. Data backup utilities ensure availability of data in case of primary system failure. Three Database Components What do the three principal components of a database do? A database management system may have three components integrated into the software—a data dictionary, DBMS utilities, and a report generator. Image database. Corbis is a database of more than 100 mil- lion images. Many of them are available for free to be used in many types of documents and publications.
  431. Databases & Information Systems 409 How long are those CDs

    or tapes on which you’re storing your important documents going to last? Will you, or anyone else, be able to make use of them 15 or 25 or 50 years from now? In 1982, software pioneer Jaron Lanier created a video game called Moondust for the then-popular Commodore 64 personal computer. Fifteen years later, when asked by a museum to display the game, he couldn’t find a way to do it—until he tracked down an old microcomputer of exactly that brand, type, and age, along with a joystick and video interface that would work with it.8 Would this have been a problem if Lanier had originally published a game in a book? Probably not. Books have been around since about 1453, when Johannes Gutenberg developed the printing press and used it to print 150 copies of the Bible in Latin. Some of those Gutenberg Bibles still exist—and are still readable (if you can read Latin). Digital storage has a serious problem: It isn’t as long- lived as older forms of data storage. Today’s books printed on “permanent” (low-acid, buffered) paper may last up to 500 years. Even books printed on cheap paper that crum- bles may still be readable. By contrast, data stored on diskettes, magnetic tape, and optical disks is subject to two hazards: • Short life span of storage media: The storage media themselves have varying life expectancies, and often the degradation is not apparent until it’s too late. The maximum life of a CD-RW seems to be about 10 years. Very high-quality CD-Rs and DVD-Rs might last up to 100 years, but light (UV rays) can “kill” the disks way before that.9 The magnetic tapes holding government records, which are stored in the National Archives in Washing- ton, D.C., need to be “refreshed”—copied onto more advanced tapes—every 10 years. PRACTICAL ACTION Storing Your Stuff: How Long Will Digitized Data Last? • Hardware and software obsolescence: As Jaron Lanier found out, even when tapes and disks remain intact, the hardware and software needed to read them may no longer be available. Without the programs and computers used to encode data, digital information may no longer be readable. Eight-inch floppy disks and drives, popular 25 years ago, are now extinct, as are their 5¼-inch successors. Even 3½-inch floppy disks are increasingly rare, disap- pearing in favor of CD/DVDs. “Optical and magnetic disks recorded under nonstandard storage schemes will be increasingly useless,” one writer points out, “because of the lack of working equipment to read them.”10 What about the personal records you store on your own PC, such as financial records, inventories, genealogies, and photographs? New York Times technology writer Stephen Manes has a number of suggestions:11 1. Choose your storage media carefully. CD-R disks are probably best for archiving—especially if you also keep a paper record. 2. Keep it simple. Store files in a standard format, such as text files and uncompressed bitmapped files. 3. Store data along with the software that created it. 4. Keep two copies, stored in separate places, preferably cool, dry environments. 5. Use high-quality media, not off-brands. 6. When you upgrade to a new hardware or software prod- uct, have a strategy for migrating the old data. And remember that there are always printouts (paper!!); books from the 15th and 16th centuries are still around, as is the first photograph, dating from 1826. DATA DICTIONARY: FOR DEFINING DATA DEFINITIONS & STRUCTURE A data dictionary, also called a repository, is a document or file that stores the data definitions and descriptions of the structure of data used in the database. Data dictionaries contain no actual data from the database, only information for managing it. Without a data dictionary, however, a DBMS cannot access data from the database. The data dictionary defines the basic organization of the database and contains a list of all files in the database, the number of records in each file, and the names and types of each field. The data dictionary may also help protect the security of the database by indicating who has the right to access it. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroy- ing its contents.
  432. info! more 410 Chapter 8 UTILITIES: FOR MAINTAINING THE DATABASE

    DBMS utilities are programs that allow you to maintain the database by creating, editing, and delet- ing data, records, and files. The utilities enable you to monitor the types of data being input and to sort your database by key fields, making searching and organizing information much easier. REPORT GENERATOR: FOR PRODUCING DOCUMENTS A report generator is a program for producing an on-screen or printed document from all or part of a database. You can specify the format of the report in advance—row headings, column headings, page headers, and so on. With a report generator, even nonexperts can create attractive, readable reports on short notice. The Database Administrator What does a DBA do? Large databases are managed by a specialist called a database administrator. The database administrator (DBA) coordinates all related activities and needs for an organization’s database, ensuring the database’s recoverability, integrity, security, availability, reliability, and performance. Database adminis- trators determine user access privileges; set standards, guidelines, and control procedures; assist in establishing priorities for requests; prioritize conflicting user needs; and develop user documentation and input procedures. They are also concerned with security—establishing and monitoring ways to prevent unauthorized access and making sure data is backed up and recoverable should a failure occur—and to establish and enforce policies about user privacy. 8.3 DATABASE MODELS What are five types of database models? Just as files can be organized in different ways, so can database management systems. Organizations may use one kind of DBMS for daily processing of transactions (such as sales figures) and then move the processed data into another DBMS that’s better suited for random inquiries and analysis. Older DBMS models, introduced in the 1960s, are hierarchical and network. New models are relational, object-oriented, and multidimensional. ( • See Panel 8.3 .) Hierarchical Database How does a hierarchical database resemble a family tree? In a hierarchical database, fields or records are arranged in related groups resembling a family tree, with child (lower-level) records subordinate to parent (higher-level) records. The parent record at the top of the database is called the root record or root parent. ( • See Panel 8.4 .) Health Databases Certain health databases allow you to store all your personal health information and down- load it for participating doctors and hospitals to use. To learn more, go to: www.iHealthrecord.org panel 8.3 Timeline: Developments in database technology First mechanical calculator that can add and subtract (Samuel Morland) 1666 1642 First mechanical adding machine (Blaise Pascal) Slide rule invented (Edmund Gunther) 1621 Inca civilization creates the khipu coding system to store the results of mathematical calculations 3000 BCE–1400 CE Domesday Book: William I orders a survey of England to assess value for taxing purposes 1086 Inhabitants of the first known civili- zation in Sumer keep records of commercial transactions on clay tablets 4000–1200 BCE
  433. Databases & Information Systems 411 The hierarchical database is the

    oldest and simplest of the five models. It lent itself well to the tape storage systems used by mainframes in the 1970s. It is still used in some types of passenger reservation systems. In hierarchi- cal databases, accessing or updating data is very fast, because the relation- ships have been predefined. However, because the structure must be defined in advance, it is quite rigid. There can be only one parent per child, and no relationships among the child records are possible. Moreover, adding new fields to database records requires that the entire database be redefined. A new database model was needed to address the problems of data redun- dancy and complex data relationships. Network Database How does a network database differ from a hierarchical database? The network database was in part developed to solve some of the problems of the hierarchical database model. A network database is similar to a hierar- chical database, but each child record can have more than one parent panel 8.4 Hierarchical database Example of a cruise ship reservation system Records are arranged in related groups resembling a family tree, with “child” records subordinate to “parent” records. Cabin numbers A-1 A-3 Sailing dates April 15 Names of ships QM 2 The Oriana Ports of departure Miami Sailing dates (April 15, May 30, July 15) are children of the parent Seascape. New York A-2 May 30 Los Angeles The Seascape July 15 The parent at the top, Miami, is called the “root parent.” Cabin numbers (A-1, A-2, A-3) are children of the parent July 15. The first mass-produced calculator, the Thomas Arithnometer 1820 1854 George Boole publishes “An Investigation on the Laws of Thought,” a system for symbolic and logical reasoning that will become the basis for computer design 1843 World’s first computer programmer, Ada Lovelace, publishes her notes 1890 Hollerith’s automatic census-tabulating machine (used punched cards) tabulates U.S. Census in 2–3 months (compared to 7 years needed previously)
  434. 412 Chapter 8 record. ( • See Panel 8.5 .)

    Thus, a child record, which in network database ter- minology is called a member, may be reached through more than one parent, which is called an owner. Also used principally with mainframes, the network database is more flex- ible than the hierarchical arrangement, because different relationships may be established between different branches of data. However, it still requires that the structure be defined in advance, and, as with the hierarchical model, the user must be familiar with the structure of the database. Moreover, there are limits to the number of possible links among records, and to examine a field one must retrieve the entire record. Although the network database was an improvement over the hierarchical database, some people in the database community believed there had to be a better way to manage large amounts of data. panel 8.5 Network database Example of college class- scheduling system Courses Instructors Students Student A Student E Student B Student C Student D D. Barry R. DeNiro Broadcasting 210 Journalism 101 B. Williams Flim making 200 This is similar to a hierarchical database, but each child, or “member,” record can have more than one parent, or “owner.” The owner Broadcasting 210 has three members—D. Barry, R. DeNiro, and B. Williams. Student B’s owners are instructors D. Barry and R. DeNiro. 1961 Prototype of first DBMS 1964 IBM introduces 360 line of computers 1967–1968 National Crime Information Center (NCIC) goes online with 95,000 pieces of information in five databases, handling 2 million transactions in its first year 1962 Stanford and Purdue Universities establish the first departments of computer science 1969 ARPANet established, led to internet 1970 Micro- processor chips come into use; floppy disk introduced for storing data; E.F. Codd develops the relational database, which evolved into IBM’s System R project, which in turn evolved into SQL 1967 Hand- held calculator
  435. info! more Databases & Information Systems 413 Relational Database How

    does a relational database work? More flexible than hierarchical and network database models, the relational database relates, or connects, data in different files through the use of a key, or common data element. ( • See Panel 8.6 .) Examples of microcom- puter DBMS programs, all of which are relational, are Paradox and Access. Examples of relational models used on larger computer systems are Oracle, Informix, and Sybase. HOW A RELATIONAL DATABASE WORKS In the relational database, there are no access paths down through a hierarchy. Instead, data elements are stored in different tables made up of rows and columns. In database terminology, the tables are called relations (files), the rows are called tuples (records), and the columns are called attributes (fields). Whereas in the hierarchical and net- work database models data is arranged according to physical address, in the Who Was E. F. Codd? The relational database was developed in 1970 by E. F. Codd. To learn about him and others who influenced database tech- nology, go to: www.scsite.com/dc2003/ people.htm Parking violation citation file/table Moving violation citation file/table Car owner file/table Driver’s license file/table Key fields linked Key fields linked Key fields linked Citation number Date cited Parking violation type Fines paid/ not paid Car license number Citation number Date cited Moving violation type Fines paid/ not paid Driver’s license number of driver cited Car make and year Street address City State Zip Car license number Street address Expiration date City State Zip Driver’s license number Owner’s name Driver’s name This kind of database relates, or connects, data in different files through the use of a key, or common data element. The relational database does not require predefined relationships. panel 8.6 Relational database Example of a state department of motor vehicles database 1971 First pocket calculator; all U.S. states and Washington, D.C. can access NCIC criminal data 1978 Introduction of SQL (Structured Query Language); publication of OSI model by the International Standards Organization 1975 First micro- computer (MITS Altair 8800) IBM introduces personal computer 1981 Wayne Ratliff develops dBASE II, the first database program for personal computers; during the 1980s, the hierarchical and network database models fade into the background 1980 1976 1976 Queen Elizabeth sends the first royal email Apple I computer (first personal computer sold in assembled form)
  436. 414 Chapter 8 relational model data is arranged logically, by

    content. Hence, the physical order of the records or fields in a table is completely immaterial. Each record in the table is identified by a field—the primary key—that contains a unique value. These two characteristics allow the data in a relational database to exist independently of the way it is physically stored on the computer. Thus, unlike with the older models, a user is not required to know the physical location of a record in order to retrieve its data. USING STRUCTURED QUERY LANGUAGE To retrieve data in a relational data- base, you specify the appropriate fields and the tables to which they belong in a query to the database, using a query language. Structured query language ( SQL, pronounced “sequel”) is the standard query language used to cre- ate, modify, maintain, and query relational databases. The three compo- nents of a basic SQL query are the SELECT . . . FROM statement, the WHERE clause, and the ORDER BY clause. The fields used in the query are specified with SELECT, and the tables to which they belong are specified with FROM. Selection criteria are determined by WHERE, and the query results can be sorted in any sequence with ORDER. Most popular database programs provide a graphical query-building tool, so the user does not need to have a thorough knowledge of SQL. ( • See Panel 8.7 .) Here is an example of an SQL query: SELECT PRODUCT-NUMBER, PRODUCT-NAME FROM PRODUCT WHERE PRICE < 100.00 ORDERBY PRODUCT-NAME; This query selects all records in the product file for products that cost less than $100.00 and displays the selected records alphabetically according to product name and including the product number—for example: C-50 Chair A-34 Mirror D-168 Table QUERY BY EXAMPLE One feature of most query languages is query by exam- ple. Often a user will seek information in a database by describing a procedure for finding it. However, in query by example (QBE), the user asks for infor- mation in a database by using a sample record form, or table, to define the qualifications he or she wants for selected records; in other words, the user fills in a form. ( • See Panel 8.8 .) For example, a university’s database of its student-loan records might have the column headings (field names) NAME, ADDRESS, CITY, STATE, ZIP, AMOUNT OWED. When you use the QBE method, the database would dis- play an empty record with these column headings. You would then type in the search conditions that you want in the appropriate columns. Apple Macintosh; first personal laser printer; release of Ashton-Tate dBase III 1984 The first object- oriented DBMSs are released Early 1990s Apple and IBM introduce PCs with full-motion video built in; wireless data transmission for small portable computers; web browser first invented 1994 Human Genome Project completes mapping all 90,000 or so genes for massive database 2003 Google claims a searchable database of 25 billion web pages 2006 Insect-like robots used for crop pollination Effective AI prediction of natural disasters 2011 Multimedia desktop computers 1993
  437. Databases & Information Systems 415 panel 8.7 Database queries: SQL

    panel 8.8 Database queries: QBE Thus, if you wanted to find all Beverly Hills, California, students with a loan balance due of $3,000 or more, you would type BEVERLY HILLS in the CITY column, CA in the STATE column, and Ͼϭ3000 (“greater than or equal to $3,000”) in the AMOUNT OWED column. Query Wizard Access’ Query Wizard will easily assist you to begin creating a select query. • Click the Greate query by using wizard icon in the database window to have Access step you through the process of creating a query. • From the first window, select fields that will be included in the query by first selecting the table from the drop–down Tables/Queries menu. Select the fields by clicking the Ͼ button to move the field from the Available Fields list to Selected Fields. Click the double arrow button ϾϾ to move all of the fields to Selected Fields. Select another table or query to choose from more fields and repeat the process of moving them to the Selected Fields box, Click Next Ͼ when all of the fields have been selected. • On the next window, enter the name for the query and click Finish
  438. 416 Chapter 8 Some DBMSs, such as Symantec’s Q&A, use

    natural language interfaces, which allow users to make que- ries in any spoken language, such as English. With this software, you could ask your questions—either typing or speaking (if the system has voice recognition)—in a natural way, such as “How many sales reps sold more than one million dollars’ worth of books in the Western Region in January?” Object-Oriented Database How would I describe the principle behind an object-oriented database? Traditional database models, including the relational model, have worked well in traditional business situa- tions. However, they fall short in areas such as engineer- ing design and manufacturing, scientific experiments, telecommunications, geographic information systems, and multimedia. The object-oriented database model was developed to meet the needs of these applications. An object-oriented database uses “objects,” software written in small, reusable chunks, as elements within database files. An object consists of (1) data in any form, including graphics, audio, and video, and (2) instructions on the action to be taken on the data. Examples of object-oriented databases are FastObjects, GemStone, Objectivity DB, Jasmine Object Database, and KE Texpress. Many high-tech companies exist that can create custom databases. A MULTIMEDIA DATABASE An object-oriented database is a multimedia database; it can store more types of data than a relational database can. For example, an object- oriented student database might contain each student’s photograph, a “sound bite” of his or her voice, and even a short piece of video, in addition to grades and personal data. Moreover, the object would store operations, called methods, the programs that objects use to process them- selves. For example, these programs might indicate how to calculate the student’s grade-point average or how to display or print the student’s record. TYPES OF OBJECT-ORIENTED DATABASES One type of object-oriented database is a hypertext database, or web database, which contains text links to other documents. Another type is a hypermedia database, which contains these links as well as graphics, sound, and video. These two types of object- oriented databases, which are created by software such as ColdFusion, are accessible via the web. In addition, companies such as Microsoft, IBM, Informix, Sybase, and Oracle have developed object-relational, or enhanced-relational, database mod- els. Examples are DB2, Cloudscape, ASE, Sybase IQ, SQL Anywhere, and Oracle9i. These handle both hierarchical and network data (structured data) and relational and object-oriented data. Multidimensional Database How is a multidimensional database different from the other four types of databases? The multidimensional database was developed during the past decade for use when the purpose is to analyze data rather than perform online transactions. Database technology is crucial to managing inventory in large warehouses. Computer-generated model of DNA; it was constructed from data in a multimedia database.
  439. info! more Databases & Information Systems 417 A multidimensional database

    (MDB) models data as facts, dimensions, or numerical measures for use in the interactive analysis of large amounts of data for decision-making purposes. Examples are InterSystems Caché, ContourCube, and Cognos PowerPlay. A multidimensional database uses the idea of a cube to represent the dimensions of data available to a user, using up to four dimensions. ( • See Panel 8.9 .) For example, “sales” could be viewed in the dimensions of (1) product model, (2) geography, (3) time, or (4) some additional dimension. In this case, “sales” is known as the main attribute (or measure) of the data cube and the other dimensions are seen as “feature” attributes. Unlike relational databases, which often require SELECT . . . FROM and other types of SQL queries to provide information, multidimensional data- bases allow users to ask questions in more colloquial English, such as “How many type Z dog leashes have been sold in New Jersey so far this year?” The (Left) Geological multimedia databases are used in the mining industry. (Right) A weather map generated from a multimedia meteoro- logical database. Sample sales spreadsheet Product Number of purchases by city Aalborg Copenhagen Los Angeles New York City Milk 123 555 145 5,001 Bread 102 250 54 2,010 Jeans 20 89 32 345 Light bulbs 22 213 32 9,450 2000 2001 123 127 57 45 56 67 211 Copenhagen Aalborg Bread Milk Sample cube capturing sales data. Data cubes support viewing of up to four dimensions simultaneously. In this case, the cube generalizes the spreadsheet from the table to three dimensions—product, city, year. panel 8.9 Multidimensional database cube Sample cube captur- ing sales data. Data cubes support viewing of up to four dimensions simultaneously. Cool, Clear Water? The Environmental Protection Agency uses data on drinking water to help manage environ- mental programs. For public access to EPA databases, go to: www.epa.gov/safewater/ databases.html
  440. info! more 418 Chapter 8 means for doing so is

    online analytical processing (OLAP) software, which can quickly provide answers to complex database queries. OLAP software is used in business reporting for sales, marketing, management reporting, trend analysis, and similar areas. An OLAP application that accesses data from a multidimensional database is known as a MOLAP (multidimensional OLAP) application. 8.4 DATA MINING How does data mining work, and how could it be useful to me? A personal database, such as the address list of friends you have on your microcomputer, is generally small. But some databases are almost unimagin- ably vast, involving records for millions of households and trillions of bytes of data. Some record-keeping activities require the use of so-called massively parallel database computers that cost $1 million or more. “These machines gang together scores or even hundreds of the fastest microprocessors around,” says one description, “giving them the oomph to respond in minutes to com- plex database queries.” 12 These large-scale efforts go under the name “data mining.” Data mining (DM) is the computer-assisted process of sifting through and analyzing vast amounts of data in order to extract hidden patterns and meaning and to discover new knowledge. The purpose of DM is to describe past trends and predict future trends. Thus, data-mining tools might sift through a company’s immense collections of customer, marketing, production, and financial data and identify what’s worth noting and what’s not. The Process of Data Mining What are the steps in the data-mining process? In data mining, data is acquired and prepared for what is known as a “data warehouse” through the following steps. ( • See Panel 8.10 .) 1. DATA SOURCES Data may come from a number of sources: (a) point-of-sale transactions in files (flat files) managed by file management systems on main- frames, (b) databases of all kinds, and (c) other—for example, news articles transmitted over newswires or online sources such as the internet. To the mix may also be added (d) data from data warehouses, as we describe below. 2. DATA FUSION & CLEANSING Data from diverse sources, whether from inside the company (internal data) or purchased from outside the company (external data), must be fused together and then put through a process known as data cleansing, or scrubbing. Even if the data comes from just one source, such as one company’s mainframe, the data may be of poor quality, full of errors and inconsistencies. Therefore, for data mining to produce accurate results, the source data has to be “scrubbed”—that is, cleaned of errors and checked for consistency of formats. 3. DATA & META-DATA The cleansing process yields both the cleaned-up data and a variation of it called meta-data. Meta-data is essentially data about data; it describes how and when and by whom a particular set of data was collected and how the data is formatted. (The data in a data dictionary, for example, is meta-data.) Meta-data is essential for understanding information stored in data ware- houses. Meta-data shows the origins of the data, the transformations it has undergone, and summary information about it, which makes it more useful than the cleansed but unintegrated, unsummarized data. The meta-data also describes the contents of the data warehouse. Culturally Significant Plants What are “culturally significant plants”? Go to: http://plants.usda.gov/java/ factSheet
  441. Databases & Information Systems 419 Data sources: lat iles, databases,

    newswire feeds, data warehouses, other sources Data fusion: assembles diverse data (internal and/or purchased external) Data transport: load data and meta-data into warehouse periodically Meta-data: shows transformations and summarization of data, contents of data warehouse, and origins of data Data cleansing or scrubbing: checks for consistency of formats, identiies errors, performs quality checks, strips out poor-quality data, and creates meta-data Data warehouse Report ndings Interpret results Take action based on ndings Using query-and-report tools, multidimensional- analysis tools, intelligent agents Customers Products Vendors Sales panel 8.10 The data-mining process 4. DATA TRANSPORT TO THE DATA WAREHOUSE Both the data and the meta- data are sent to the data warehouse. A data warehouse is a special database of cleaned-up data and meta-data. It is a replica, or close reproduction, of a mainframe’s data. The data warehouse is stored on disk using storage technology such as RAID (redundant arrays of independent disks). Small data warehouses may hold 100 gigabytes of data or less; large ones may store terabytes of data. MINING THE DATA: SEARCHING FOR PATTERNS & INTERPRETING THE RESULTS Data in the warehouse is usually analyzed—or mined—using one of two popular algorithms, or step-by-step problem-solving procedures: • Regression analysis: Basically, regression analysis takes a particular set of numerical data and develops a mathematical formula that fits the data.
  442. info! more 420 Chapter 8 This formula is then applied

    to new sets of data of the same type to predict future situations. • Classification analysis: Classification analysis is a statistics pattern- recognition process that is applied to data sets with more than just numerical data. Some Applications of Data Mining What are some ways in which I might see data mining used? Some short-term payoffs from data mining can be dramatic. One telephone company, for instance, mined its existing billing data to identify 10,000 sup- posedly “residential” customers who spent more than $1,000 a month on their phone bills. When it looked more closely, the company found that these cus- tomers were really small businesses trying to avoid paying the more expensive business rates for their telephone service. 13 The Internal Revenue Service has a program designed to catch tax cheaters by locating inconsistencies between mortgage payments and income. 14 However, the payoffs in the long term could be truly astonishing. Sifting subatomic-particle information may reveal new insights into the nature of the universe. Mining medical research data may reveal new knowledge about dis- eases. 15 Text-mining programs, which build on data-mining principles, may scour 250,000 pages an hour of scholarly articles, automatically categorizing information, making links between unconnected documents, and providing visual maps. 16 Some other applications of data mining are as follows. 17 SPORTS Brian James, coach of the Toronto Raptors, has used data mining to “rack and stack” his team against the rest of the National Basketball Asso- ciation (NBA). A coach in the U.S. Gymnastics Federation used a DM tool called IDIS (Iowa Drug Information Service) to discover what long-term fac- tors contributed to athletes’ performance, so as to know what problems to treat early on. MARKETING Marketers use DM tools to mine point-of-sale databases of retail stores, which contain facts (such as prices, quantities sold, and dates of sale) Data mining. This type of credit card analysis determines the most influential factors com- mon to nonprofitable custom- ers. In this case, BusinessMiner from Business Objects deter- mined that the credit limit had the greatest effect on profitability and prioritized the results in graphical form. Data Mining & Cancer Detection The important goal in cancer detection and treatment is to understand the relationship between variations in human DNA sequences and variability in disease susceptibility. The data-mining technique used to perform this task is known as multifactor dimensionality reduction.
  443. info! more Databases & Information Systems 421 for thousands of

    products in hundreds of geographic areas. By understanding customer preferences and buying patterns, marketers hope to target consum- ers’ individual needs. One way that grocery stores create profiles is by the use of data mining. Data mining is a process that is used to predict future behaviors and trends by discerning patterns and relationships from large amounts of warehoused raw (from disparate sources) data through the use of statistics and other math- ematical techniques. HEALTH A Los Angeles hospital used IDIS to see what subtle factors affect success and failure in back surgery. Another system helps health care organi- zations pinpoint groups whose costs are likely to increase in the near future, so that medical interventions can be made. SCIENCE DM techniques are being employed to find new patterns in genetic data, molecular structures, global climate changes, and more. For instance, one DM tool (called SKICAT, for “SKy Image CATaloging”) has been used to catalog more than 50 million galaxies. COUNTERTERRORISM In recent years, the federal government has used data- mining tools to look through databases for clues on terrorism. Counterter- rorism experts analyze records “on travel habits, calling patterns, email use, financial transactions, and other data to pinpoint possible terrorist activity,” according to one report, although there is some question as to how effective the effort is. 18 SENTIMENT ANALYSIS Companies concerned about how online opinion among users of blogs and social networks can make or break their products in the marketplace are now turning to “sentiment analysis” tools to analyze what is being said online. 19 EXPLORING THE “DEEP WEB” In summer 2008, Google’s search engine added the one-trillionth address to the list of addresses it knows about—but that represents only a fraction of the entire World Wide Web, and no one search engine is capable of reaching it all. Beyond Google’s trillion pages, says one report, is a vaster Web of hidden data: “financial information, shopping cata- logs, flight schedules, medical research, and all kinds of other material stored in databases that remain largely invisible to search engines.” 20 New search tools are now being devised to match searches with the databases most likely to produce the relevant information. 8.5 DATABASES & THE DIGITAL ECONOMY: E-Business & E-Commerce What are e-business and e-commerce, and what are three types of e-commerce systems? At one time there was a difference between the Old Economy and the New Economy. The first consisted of traditional companies—car makers, pharma- ceuticals, retailers, publishers. The second consisted of computer, telecommu- nications, and internet companies (AOL, Amazon, eBay, and a raft of “dot-com” firms). Now, however, most Old Economy companies have absorbed the new internet-driven technologies, and the differences between the two sectors have dwindled. In other words, most companies are now engaged in e-business, using the internet to facilitate every aspect of running a business. As one arti- cle puts it: “At bottom the internet is a tool that dramatically lowers the cost of communication. That means it can radically alter any industry or activity that depends on the flow of information.” 21 IDIS & IDIN The University of Iowa’s Division of Drug Information Service, within the College of Pharmacy, offers IDIS, a bibliographic database, and IDIN (Iowa Drug Information Network), which provides drug information. Go to: www.uiowa.edu/~idis
  444. info! more 422 Chapter 8 One sign of growth is

    that the number of internet host computers has been almost doubling every year. But the mushrooming of computer networks and the booming popularity of the World Wide Web are only the most obvious signs of the digital economy. Behind them lies something equally important: the growth of vast stores of information in databases. How are databases underpinning the digital economy? Let us consider two aspects: e-commerce and types of e-commerce systems — B2B, B2C, and C2C. E-Commerce: Online Buying & Selling What is e-commerce, and what technologies have made it possible? The internet might have remained the text-based province of academi- cians and researchers had it not been for the creative contributions of Tim Berners-Lee, whom we introduced in Chapter 2. He was the com- puter scientist who came up with the coding system (hypertext markup language, or HTML), linkages, and addressing scheme (URLs) that debuted in 1991 as the graphics-laden and multimedia World Wide Web. “It’s hard to overstate the impact of the global system he created,” states technology writer Joshua Quittner. “He took a powerful communications system [the internet] that only the elite could use, and turned it into a mass medium.” 22 The arrival of the web, aided by the growth and the increasing sophistica- tion of enormous databases, has led to e-commerce, or electronic commerce, the buying and selling of products and services through computer net- works. E-commerce is reshaping entire industries and revamping the very notion of what a company is. Indeed, online shop- ping is growing even faster than the increase in com- puter use, which has been fueled by the falling price of personal computers. Two well-known e-firms are Amazon.com , which sells books and many other goods, and priceline. com , which lets you name the price you’re willing to pay for airline tickets and hotel rooms. (eBay is con- sidered an online shopping bazaar, or auction place, rather than an online retailer.) Probably the foremost example of e-commerce is Amazon.com . AN EXAMPLE OF E-COMMERCE: AMAZON.COM In 1994, seeing the potential for electronic retailing on the World Wide Web, Jeffrey Bezos left a successful career on Wall Street to launch an online bookstore called Amazon.com . Why the name “Amazon”? “Earth’s biggest river, Earth’s biggest bookstore,” said Bezos in a 1996 inter- view. “The Amazon River is ten times as large as the next largest river, which is the Mississippi, in terms of volume of water. Twenty percent of the world’s fresh water is in the Amazon River Basin, and we have six times as many titles as the world’s largest physical bookstore.” 23 A more hardheaded reason is Harrah’s casino empire uses data mining to identify gam- bling patron preferences for marketing and special promotions. Find out more about what e-commerce companies do at www.netsuite.com/portal/ home.shtml. Comparing Prices at the Local Mall Some online companies allow you to compare prices in local stores: www.cairo.com www.shoplocal.com
  445. Databases & Information Systems 423 that, according to consumer tests,

    words starting with “A” show up on search- engine lists first. 24 Still, Bezos realized that no bookstore with four walls could possibly stock the more than 2.5 million titles that are now active and in print. Moreover, he saw that an online bookstore wouldn’t have to make the same investment in retail clerks, store real estate, or warehouse space (in the beginning, Amazon. com ordered books from the publisher after it took the book buyer’s order), so it could pass savings along to customers in the form of discounts. In addition, he appreciated that there would be opportunities to obtain demographic infor- mation about customers in order to offer personalized services. For example, Amazon could let customers know of books that might be of interest to them. Such personalized attention is difficult for traditional large bookstores. Finally, Bezos saw that there could be a good deal of online interaction: customers could post reviews of books they read and could reach authors by email to provide feedback. All this was made possible on the web by the recording of information on giant databases. Amazon.com sold its first book in July 1995, and by 2008 was No. 1 in the Internet Retailer Top 500 Guide, with sales of $4.06 billion. 25 What began as Earth’s biggest bookstore also has rapidly become Earth’s biggest anything store, offering CDs, DVDs, videos, electronics, toys, tools, home furnishings, clothing, prescription drugs, and film-processing services. For a long time the company put market share ahead of profits, but now it’s focusing on profits. ONLINE RETAILERS: E-TAILERS Some e-commerce businesses are also known as e-tailers, or electronic retailers. The effectiveness of e-tailing was evident as early as 1997, when Dell Computer reported taking multimillion-dollar orders at its website. E-tailing has resulted in the development of e-tailware, software tools for creating online catalogs and managing the business connected with doing online retailing. Some e-commerce groups (such as shopping.com and shopzilla) offer price-comparison websites that can quickly compare prices from a number of different e-tailers and link you to them. Some particularly interesting technologies that have helped online retailers survive are the following: • 360-degree images: People might well buy a book or a computer off the web on the basis of a blurry photograph, but a sweater or a sofa? Today zoom technologies allow for close inspection of nearly anything, from the detail on jewelry to the rooms in a house. With technology from iPix, 360- degree images can be created using just two standard photographs. • Order tracking: The average Federal Express package is scanned between 15 and 20 times between pickup and delivery, with the location of each package stored in a database. For a long time, FedEx used such order tracking strictly for internal use, but in 1994 the company turned it into a customer-service application—a brilliant marketing stroke. Now all customers can track their orders. • Shop bots: The buying of online wares has also been facilitated by the arrival of shopping robots— shop bots, or trading agents, concierge programs that help users search the internet for a particular product or service, then bring up price comparisons, locations, and other information. Examples of shop bots are mySimon, DealTime, PriceGrabber.com , Shop-Bot.com , and BookFinder.com .
  446. 424 Chapter 8 Types of E-Commerce Systems: B2B, B2C, &

    C2C How would I distinguish the three types of e-commerce systems? Three main types of e-commerce systems are business-to-business (B2B), business-to-consumer (B2C), and consumer-to-consumer (C2C). BUSINESS-TO-BUSINESS (B2B) SYSTEMS In a business-to-business (B2B) system, a business sells to other businesses, using the internet or a pri- vate network to cut transaction costs and increase efficiencies. Besides selling products, a business might sell advertising, employee training, mar- ket research, technical support, banking services, and other business support services. Online B2B exchanges have been developed to serve a variety of busi- nesses, from manufacturers of steel and airplanes to convenience stores to olive oil producers. B2B exchanges help business by moving beyond pricing mechanisms and encompassing product quality, customer support, credit terms, and shipping reliability, which often count for more than price. The name given to this system is the business web, or b-web, in which suppliers, distributors, customers, and e-commerce service providers use the internet for communications and transactions. In addition, b-webs are expected to provide extra revenue from ancillary services, such as financing and logistics. ( • See Panel 8.11 .) None of these innovations is possible without databases and the communi- cations lines connecting them. B2B used to be conducted mostly over leased communications lines; now, however, many B2B businesses use the internet, an extranet, and/or a virtual private network. Logistics Content management Sellers Buyers The B2B World Internet Exchange Value-Added Services Order management Financial Marketing Customer service Shipping panel 8.11 B2B exchanges
  447. Databases & Information Systems 425 BUSINESS-TO- CONSUMER (B2C) SYSTEMS In

    a business-to-consumer (B2C) system, a business sells goods or services to consumers, or members of the general public. This kind of e-commerce system essentially removes the middleman and often even the need for a physi- cal (“bricks-and- mortar”) store. Examples of B2C systems are those of Amazon.com and Barnes andNoble.com , as well as many financial institutions and the U.S. government. CONSUMER-TO-CONSUMER (C2C) SYSTEMS In a consumer-to-consumer (C2C) system, consumers sell goods or services directly to other consumers, often with the help of a third party, such as eBay, the online auction company. Such intermediaries mediate between consumers who want to buy and sell, taking a small percentage of the seller’s profit as a fee. Examples of C2C exchanges are classified ads (such as TradingPost.com ), music and file sharing ( morpheus.com ), career and job web- sites ( monster.com ), social or dating websites ( myspace.com , friendster.com ), and online communities (craigslist.org). The advantage of C2C e-commerce is most often the reduced costs and a smaller but profitable customer base. It also gives many small business owners a way to sell their goods without run- ning a costly bricks-and-mortar store. 8.6 INFORMATION SYSTEMS IN ORGANIZATIONS: Using Databases to Help Make Decisions How does information flow within an organization, and what are different types of information systems? The data in databases is used to build information, and information—and how it is used—lies at the heart of every organization. Of course, how useful information is depends on the quality of it, as well as the information systems used to distribute it. Let us consider these subjects. The Qualities of Good Information What are the qualities of good information? In general, all information to support intelligent decision making within an organization must be as follows: • Correct and verifiable: This means information must be accurate and checkable. • Complete yet concise: Complete means information must include all relevant data. Concise means it includes only relevant data. • Cost effective: This means the information is efficiently obtained and understandable. A B2C business
  448. 426 Chapter 8 • Current: Current means timely yet also

    time sensitive, based on historical, present, or future information needs. • Accessible: This means the information is quickly and easily obtainable. Information Flows within an Organization: Horizontally between Departments & Vertically between Management Levels What are the six departments and three management levels to which information must flow? Consider any sizable organization with which you are familiar. Its purpose is to perform a service or deliver a product. If it’s nonprofit, for example, it may deliver the service of educating students or the product of food for famine victims. If it’s profit-oriented, it may, for example, sell the service of fixing computers or the product of computers themselves. Information—whether computer-based or not—has to flow within an organization in a way that will help managers, and the organization, achieve their goals. To this end, organi- zations are often structured horizontally and vertically—horizontally to reflect functions and vertically to reflect management levels. THE HORIZONTAL FLOW OF INFORMATION BETWEEN SIX DEPARTMENTS Depending on the services or products they provide, most organizations have departments that perform six functions: research and development (R & D), production ( or operations), marketing and sales, accounting and finance, human resources (personnel), and information systems (IS). ( • See Panel 8.12 .) Vice Pres. Research and Development Vice Pres. Production Vice Pres. Marketing and Sales Vice Pres. Accounting and Finance Vice Pres. Human Resources Top management Middle management Lower management Information Systems (IS) Director of Finance Director of Personnel/ Payroll Manager of Reports Manager of Accounts Payable Manager of Accounts Receivable Chief Executive Officer Director of Accounting panel 8.12 Organization chart The six functional responsibilities are shown on the opposite page at the bottom of the pyramid. The three management levels are shown along the sides.
  449. Databases & Information Systems 427 • Research and development: The

    research and development (R&D) department does two things: (1) It conducts basic research, relating discoveries to the organization’s current or new products. (2) It does product development and tests and modifies new products or services created by researchers. Special software is available to aid in these functions. • Production (operations): The production department makes the product or provides the service. In a manufacturing company, it takes the raw materials and has people or machinery turn them into finished goods. In many cases, this department uses CAD/CAM software and workstations, as well as robots (described on p. 438). In another type of company, this department might manage the purchasing, handle the inventories, and control the flow of goods and services. • Marketing and sales: The marketing department oversees advertising, promotion, and sales. The people in this department plan, price, advertise, promote, package, and distribute the services or goods to customers or clients. The sales reps may use laptop computers, cellphones, wireless email, and faxes in their work while on the road. • Accounting and finance: The accounting and finance department handles all financial matters. It handles cash management, pays bills and taxes, issues paychecks, records payments, makes investments, and compiles financial statements and reports. It also produces financial budgets and forecasts financial performance after receiving information from other departments. • Human resources: The human resources, or personnel, department finds and hires people and administers sick leave and retirement matters. Nonmanagement employees Responsible for strategic planning Responsible for tactical planning Responsible for operational Lower management: structured decisions Middle management: semistructured decisions Top management: unstructured decisions Chief Executive Officer (CEO) Accounting and finance Production Marketing Research and development Human resources Information Systems (IS) planning
  450. 428 Chapter 8 It is also concerned with compensation levels,

    professional development, employee relations, and government regulations. • Information systems (IS): The IS department manages the organization’s computer-based systems and plans for and purchases new ones. THE VERTICAL FLOW OF INFORMATION BETWEEN MANAGEMENT LEVELS Large organizations traditionally have three levels of management— strategic management, tactical management, and operational management. These lev- els can be shown on an organization chart, a schematic drawing showing the hierarchy of formal relationships among an organization’s employees. Man- agers on each of the three levels have different levels of responsibility and are therefore required to make different kinds of decisions. ( • See Panel 8.12 again .) • Strategic-level management: Top managers are concerned with long- range, or strategic, planning and decisions. This top level is headed by the chief executive officer (CEO) along with several vice presidents or managers with such titles as chief financial officer (CFO), chief operating officer (COO), and chief information officer (CIO). Strategic decisions are complex decisions rarely based on predetermined routine procedures; they involve the subjective judgment of the decision maker. For instance, strategic decisions relate to how growth should be financed and what new markets should be tackled first. Determining the company’s 5-year goals, evaluating future financial resources, and formulating a response to competitors’ actions are also strategic decisions. • Tactical-level management: Tactical, or middle-level managers, make tactical decisions to implement the strategic goals of the organization. A tactical decision is made without a base of clearly defined informational procedures; it may require detailed analysis and computations. Examples of tactical-level managers are plant manager, division manager, sales manager, branch manager, and director of personnel. • Operational-level management: Operational, or low-level (supervisory level), managers make operational decisions—predictable decisions that can be made by following well-defined sets of routine procedures. These managers focus principally on supervising nonmanagement employees, monitoring day-to-day events, and taking corrective action where necessary. An example of an operational-level manager is a warehouse manager in charge of inventory restocking. Note that, because there are fewer people at the level of top management and many people at the bottom, this management structure resembles a pyra- mid. It’s also a hierarchical structure because most of the power is concen- trated at the top. NEW INFORMATION FLOW: THE DECENTRALIZED ORGANIZATION The hierar- chical, pyramid-oriented structure is changing in the computer-network era to a decentralized form in which employees are linked to a centralized data- base. Although the different responsibilities of the various types of managers remain, the pyramid is flattened somewhat owing to increased participation of all employees via computer-enabled systems. Nowadays, for instance, organizations that have computer networks often use groupware to enable cooperative work by groups of people—what are known as computer-supported cooperative work (CSCW) systems. Through the shared use of databases, software, videoconferencing, email, intranets, orga- nization forms and reports, and so on, many people can work together from different locations to manage information.
  451. Databases & Information Systems 429 Computer-Based Information Systems What are

    six computer-based information systems? The purpose of a computer-based information system is to provide managers (and various categories of employees) with the appropriate kind of informa- tion to help them make decisions. It is used to collect and analyze data from all departments and is designed to provide an organization’s management with up-to-date information at any time. There are several types of computer-based information systems, which serve different levels of management: • Office information systems • Transaction processing systems • Management information systems • Decision support systems • Executive support systems • Expert systems Office Information Systems What is an office information system? Office information systems (OISs), also called office automation sys- tems (OASs), combine various technologies to reduce the manual labor required in operating an efficient office environment and to increase productivity. Used throughout all levels of an organization, OIS technolo- gies include fax, voice mail, email, scheduling software, word processing, and desktop publishing, among others. ( • See Panel 8.13 .) The backbone of an OIS is a network—LAN, intranet, extranet—that con- nects everything. All office functions—dictation, typing, filing, copying, fax, microfilm and records management, telephone calls and switchboard operations—are candidates for integration into the network. Transaction Processing Systems What is a TPS, and what are its principal features? In most organizations, particularly business organizations, most of what goes on consists largely of structured information known as transactions. A transaction is a recorded event having to do with routine business activi- ties. A transaction may be recorded manually or via a computer system and includes everything concerning the product or service in which the Office Information Systems Electronic Publishing Systems Electronic Communications Systems Word processing Desktop publishing Copying systems Electronic mail Voice mail Facsimile Desktop videoconferencing Electronic Collaboration Systems Electronic meeting systems Collaborative work systems Teleconferencing Telecommuting Image Processing Systems Electronic document management Other image processing Presentation graphics Multimedia systems Office Management Systems Electronic office accessories Electronic scheduling Task management panel 8.13 Office information systems The backbone is a network linking these technologies.
  452. 430 Chapter 8 organization is engaged: production, distribution, sales, orders.

    It also includes materials purchased, employees hired, taxes paid, and so on. Today in most organizations, the bulk of such transactions is recorded in a com- puter-based information system. These systems tend to have clearly defined inputs and outputs, and there is an emphasis on efficiency and accuracy. Transaction processing systems record data but do little in the way of con- verting data into information. THE DEFINITION OF TIPS A transaction processing system (TPS) is a computer-based information system that keeps track of the transactions needed to conduct business. The transactions can be handled via batch process- ing, also known as offline processing —that is, the data is gathered and processed in batches at periodic intervals, such as at the end of the day or once a week. Or they may be handled via real-time processing, also known as online transaction processing (OLTP) —that is, each transaction is processed immediately as it is entered. The data collected by a TPS is typically stored in databases. FEATURES OF A TPS Some features of a TPS are as follows: • Input and output: The inputs to the system are transaction data: bills, orders, inventory levels, and the like. The output consists of processed transactions: bills, paychecks, and so on. • For operational managers: Because the TPS deals with day-to-day matters, it is principally of use to operational-level or supervisory managers, although it can also be helpful to tactical-level managers. • Produces detail reports: A manager at the operational level typically receives information in the form of detail reports. A detail report contains specific information about routine activities. An example might be the information needed to decide whether to restock inventory. • One TPS for each department: Each department or functional area of an organization usually has its own TPS. For example, the accounting and finance TPS handles order processing, accounts receivable, inventory and purchasing, accounts payable, and payroll. • Basis for MIS and DSS: The database of transactions stored in a TPS provides the basis for management information systems and decision support systems, as we describe next. Management Information Systems What are the characteristics of an MIS? The next level of information system is the management information system. DEFINITION OF MIS A management information system (MIS) (pronounced “em-eye-ess”) is a computer-based information system that uses data recorded by a TPS as input into programs that produce routine reports as output. FEATURES OF AN MIS Features of an MIS are as follows: • Input and output: Inputs consist of processed transaction data, such as bills, orders, and paychecks, plus other internal data. Outputs consist of summarized, structured reports: budget summaries, production schedules, and the like. • For tactical managers: An MIS is intended principally to assist tactical- level managers. It enables them to spot trends and get an overview of current business activities. • Draws from all departments: The MIS draws from all six departments or functional areas, not just one.
  453. Databases & Information Systems 431 • Produces several kinds of

    reports: Managers at this level usually receive information in the form of several kinds of reports: summary, exception, periodic, demand. Summary reports show totals and trends. An example is a report showing total sales by office, by product, and by salesperson, as well as total overall sales. Exception reports show out-of-the-ordinary data. An example is an inventory report listing only those items of which fewer than 10 are in stock. Periodic reports are produced on a regular schedule. Such daily, weekly, monthly, quarterly, or annual reports may contain sales figures, income statements, or balance sheets. They are usually produced on paper, such as computer printouts. Demand reports produce information in response to an unscheduled demand. A director of finance might order a demand credit-background report on an unknown customer who wants to place a large order. Demand reports are often produced on a terminal or microcomputer screen, rather than on paper. Decision Support Systems What are the characteristics of a DSS? A more sophisticated information system is the decision support system. DEFINITION OF DSS A decision support system (DSS) is a computer-based information system that provides a flexible tool for analysis and helps managers focus on the future. A DSS aims to produce collected information known as business intelligence, gathering data from a wide range of sources in a way that can be interpreted by humans and used to support better business decision making. Some decision support systems come very close to acting as artificial intelligence agents (covered in the next section). DSS applications are not single information resources, such as a database or a program that graphi- cally represents sales figures, but a combination of integrated resources work- ing together. Whereas a TPS records data and an MIS summarizes data, a DSS analyzes data. To reach the DSS level of sophistication in information technol- ogy, an organization must have established TPS and MIS systems first. FEATURES OF A DSS Some features of a DSS are as follows: • Inputs and outputs: Inputs include internal data—such as summarized reports and processed transaction data—and also data that is external to the organization. External data may be produced by trade associations, marketing research firms, the U.S. Bureau of the Census, and other government agencies. The outputs are demand reports on which a top manager can make decisions about unstructured problems. • Mainly for tactical managers: A DSS is intended principally to assist tactical-level managers in making tactical decisions. Questions addressed by the DSS might be, for example, whether interest rates will rise or whether there will be a strike in an important materials-supplying industry. • Produces analytic models: The key attribute of a DSS is that it uses models. A model is a mathematical representation of a real system. The models use a DSS database, which draws on the TPS and MIS files, as well as external data such as stock reports, government reports, and national and international news. The system is accessed through DSS software. The model allows the manager to do a simulation—play a “what-if” game—to reach decisions. Thus, the manager can simulate an aspect of the organization’s environment in order to decide how to react to a change in conditions affecting it. By changing the hypothetical inputs to the model, the manager can see how the model’s outputs are affected. SOME USES OF DSSs Many DSSs are developed to support the types of deci- sions faced by managers in specific industries, such as airlines or real estate. Curious how airlines decide how many seats to sell on a flight when so many
  454. 432 Chapter 8 passengers are no-shows? American Airlines developed a

    DSS, the yield man- agement system, that helps managers decide how much to overbook and how to set prices for each seat so that a plane is filled and profits are maximized. Wonder how owners of those big apartment complexes set rents and lease terms? Investors in commercial real estate have used DSSs to forecast property values up to 40 years into the future, based on income, expense, and cash-flow projections. Ever speculate about how insurance carriers set different rates or how Arby’s and McDonald’s decide where to locate a store? Many companies use DSSs called geographic information systems (GISs), such as MapInfo and Atlas GIS, which integrate geographic databases with other business data and display maps. ( • See Panel 8.14 .) Executive Support Systems How does an ESS differ from information systems used by lower-level managers? Also called an executive information system (EIS), an executive support sys- tem (ESS) is an easy-to-use DSS made especially for strategic managers; it specifically supports strategic decision making. It draws on data not only from systems internal to the organization but also from those outside, such as news services or market-research databases. ( • See Panel 8.15 .) panel 8.14 Geographic DSS for earthquake insurance Using geographic infor- mation systems, such as MapInfo, insurance underwriters can set rates and examine poten- tial liability in the event of a natural disaster. This one presents a visual analysis of policyholders living near earthquake fault lines. Executives Executive workstation ESS software DBMS software Communications software Strategic information displays External databases Internal operations databases Special management databases panel 8.15 Components of an ESS
  455. Databases & Information Systems 433 An ESS might allow senior

    executives to call up predefined reports from their personal computers, whether desktops or laptops. They might, for instance, call up sales figures in many forms—by region, by week, by antic- ipated year, by projected increases. The ESS includes capabilities for ana- lyzing data and doing “what-if” scenarios. ESSs also have the capability to browse through summarized information on all aspects of the organization and then zero in on (“drill down” to) detailed areas the manager believes require attention. ESSs are relatively user-friendly and require little training to use. Expert Systems Would I be apt to use an expert system? An expert system, or knowledge-based system, is a set of interactive com- puter programs that helps users solve problems that would otherwise require the assistance of a human expert. Expert systems are created on the basis of knowledge collected on specific topics from human specialists, and they imitate the reasoning process of a human being. As we describe in the next section, expert systems have emerged from the field of artificial intel- ligence, the branch of computer science that is devoted to the creation of com- puter systems that simulate human reasoning and sensation. Expert systems are used by both management and nonmanagement per- sonnel to solve specific problems, such as how to reduce production costs, improve workers’ productivity, or reduce environmental impact. Because of their giant appetite for memory, expert systems are usually run on large com- puters, although some microcomputer expert systems also exist. For example, Negotiator Pro for IBM and Macintosh computers helps executives plan effec- tive negotiations by examining the personality types of the other parties and recommending negotiating strategies. 8.7 ARTIFICIAL INTELLIGENCE What are the main areas of artificial intelligence? You’re having trouble with your new computer program. You call the customer “help desk” at the software maker. Do you get a busy signal or get put on hold to listen to music (or, worse, advertising) for several minutes? Technical sup- port lines are often swamped, and waiting is commonplace. Or, to deal with your software difficulty, do you find yourself dealing with . . . other software? The odds are good that you will. For instance, a software technology called automated virtual representatives, or vReps, offers computer-generated images (animation or photos of real models) that answer customer questions in real time, using natural language. vReps, which are becoming more and more common on self-service websites, are examples of expert systems, which, as we suggested above, are programs that can walk you through a problem and help solve it. Expert systems are one of the most useful applications of artificial intelligence (AI), a group of related technologies used for developing machines to emulate human qualities, such as learning, rea- soning, communicating, seeing, and hearing. As will become clear, AI would not be possible without developments in database technology. Today the main areas of AI are these: • Expert systems • Natural language processing Hank, the Coca-Cola vRep
  456. info! more 434 Chapter 8 • Intelligent agents • Pattern

    recognition • Fuzzy logic • Virtual reality and simulation devices • Robotics We consider these areas and then distinguish between weak AI and strong AI. We also consider an area known as artificial life. Expert Systems How does an expert system work? As we said in the last section, an expert system is an interactive computer pro- gram used to solve problems that would otherwise require the assistance of a human specialist. As the name suggests, it is a system imbued with knowledge by human experts. EXAMPLES OF EXPERT SYSTEMS Expert systems have been designed both for microcomputers and for larger computer systems with huge databases. One of the earliest expert systems, MYCIN helped diagnose infectious diseases. PROS- PECTOR was the first expert system for assessing geological data to locate min- eral deposits. Business Insight helps businesses find the best strategies for marketing a product. CARES (Com- puter Assisted Risk Evaluation System) helps nonprofit organizations evalu- ate risks and protect clients and staff. CLUES (Countrywide Loan Underwrit- ing Expert System) evaluates home- mortgage loan applications. CLIPS (C Language Integrated Production System), widely used in government, industry, and academia, is an expert system used to build other expert sys- tems. Whale Watch is an expert system used to identify whales. STREAMES assists water managers to evaluate the effect of large stream nutrient loads on stream nutrient retention. HOW EXPERT SYSTEMS DRAW ON KNOWLEDGE All these programs simulate the reasoning process of experts in certain well-defined areas. That is, pro- fessionals called knowledge engineers interview the experts and determine the rules and knowledge that must go into the system. For example, to develop Muckraker, an expert system to assist newspaper reporters with investigative reporting, the knowledge engineers interviewed journalists. Programs incorporate not only the experts’ surface knowledge (“textbook knowledge”) but also their deep knowledge (“tricks of the trade”). What, exactly, is deep knowledge? “An expert in some activity has by definition reduced the world’s complexity by his or her specialization,” say some authori- ties. One result is that “much of the knowledge lies outside direct conscious awareness.” 26 THE THREE COMPONENTS OF AN EXPERT SYSTEM An expert system consists of three components. ( • See Panel 8.16 .) Expert system. This software company offers strategic- planning software that uses an expert knowledge base in the area of business marketing strategy. Build on Expert System You can build an expert system for your own company. For example, go to: www.logicnets.com/the_ package.htm
  457. Databases & Information Systems 435 • Knowledge base: A knowledge

    base is an expert system’s database of knowledge about a particular subject, including relevant facts, information, beliefs, assumptions, and procedures for solving problems. The basic unit of knowledge is expressed as an IF-THEN-ELSE rule. (“IF this happens, THEN do this, ELSE do that.”) Programs can have many thousands of rules. A system called ExperTAX, for example, which helps accountants figure out a client’s tax options, consists of more than 3,000 rules. Other systems have 80,000 or 100,000 rules, which means that very large computer systems are required. • Inference engine: The inference engine is the software that controls the search of the expert system’s knowledge base and produces conclusions. It takes the problem posed by the user and fits it into the rules in the knowledge base. It then derives a conclusion from the facts and rules contained in the knowledge base. • User interface: The user interface is the display screen. It gives the user the ability to ask questions and get answers. It also explains the reasoning behind the answer. People fearful about machines taking over our lives need to understand that expert systems are designed to be users’ assistants, not replacements. Also, the success of these systems depends on the quality of the data and rules obtained from the human experts. Natural Language Processing When have I encountered the use of natural language processing? Natural languages are ordinary human languages, such as English. (A second definition, discussed in Chapter 10, is that natural languages are fifth-generation programming languages.) Natural language processing is the study of ways for computers to recognize and understand human language, whether in spoken or written form. Major advances in natural language processing have occurred in speech recognition, in which computers translate spoken speech into text. Think how challenging it is to make a computer translate English into another language. In one instance, the English sentence “The spirit is willing, but the flesh is weak” came out in Russian as “The wine is agreeable, but the meat is spoiled.” The problem with human language is that it is often ambigu- ous; different listeners may arrive at different interpretations. Most existing language systems run on large computers, although scaled- down versions are now available for microcomputers. For example, a product called Intellect uses a limited English vocabulary to help users orally query databases on both mainframes and microcomputers. LUNAR, developed to help analyze moon rocks, answers questions about geology on the basis of an extensive database. User can ask questions, get input, explain reasoning behind answers Rules: IF–THEN–ELSE User interface Inference engine Knowledge base panel 8.16 Components of an expert system
  458. 436 Chapter 8 Intelligent Agents Have I ever used an

    intelligent agent? How do you find information in the vast sea of the internet? As one solution, computer scientists have been developing so-called intelligent agents to find information on computer networks and filter it. An intelligent agent is a form of software with built-in intelligence that monitors work patterns, asks questions, and performs work tasks on your behalf, such as roaming net- works and compiling data. One type of intelligent agent is a kind of electronic assistant that will filter messages, scan news services, and perform similar sec- retarial chores. For example, Assistant Editor will reorganize your notes into a competently edited, logical, narrative sequence. We mentioned another kind in the shop bots, or shopping robots, used in online shopping. Also known as bots or network agents, these intelligent agents search the internet and online databases for information and bring the results back to you. Pattern Recognition Should I be concerned about pattern recognition? Pattern recognition involves a camera and software that identify recurring patterns in what they are seeing and recognize the connections between the perceived patterns and similar patterns stored in a database. Pattern recognition is used in data mining to discover previously unnoticed patterns from massive amounts of data. Another principal use is in facial-recognition software, which allows computers to identify faces, using a digital “faceprint.” Video surveillance cameras have been used to pick out suspicious individuals in crowds. Pattern recognition is also used for handwriting recognition, fin- gerprint identification, robot vision, and automatic voice recognition. Fuzzy Logic What is fuzzy logic? The traditional logic behind computers is based on either-or, yes-no, true- false reasoning. Such computers make “crisp” distinctions, leading to precise decision making. Fuzzy logic is a method of dealing with imprecise data and uncertainty, with problems that have many answers rather than one. Unlike classical logic, fuzzy logic is more like human reasoning: It deals with probability and credibility. That is, instead of being simply true or false, a proposition is mostly true or mostly false, or more true or more false. For example, fuzzy logic has been applied in running elevators. How long will most people wait for an elevator before getting antsy? About a minute and a half, say researchers at the Otis Elevator Company. The Otis artificial intelligence divi- sion has thus done considerable research into how elevators may be programmed to reduce waiting time. Ordinarily, when someone on a floor in the middle of the building pushes the call button, the system will send whichever elevator is clos- est. However, that car might be filled with passengers, who will be delayed by the new stop (perhaps making them antsy), whereas another car that is farther away might be empty. In a fuzzy-logic system, the computer assesses not only which car is nearest but also how full the cars are before deciding which one to send. Fuzzy-logic circuitry also enables handheld autofocus video cameras to focus properly. If your hand is unsteady, the circuitry in the camera deter- mines which parts in the visual field should stand still and which should move and makes the necessary adjustments in the image. Virtual Reality & Simulation Devices How would I define VR and simulation? Virtual reality (VR), a computer-generated artificial reality, projects a person into a sensation of three-dimensional space. ( • See Panel 8.17 .) To SECURITY
  459. Databases & Information Systems 437 panel 8.17 Virtual reality (Top

    left) A research assistant works on a virtual real- ity program at the Virtual Reality in Medicine labora- tory at the University of Illinois at Chicago. Surgeons use such programs to practice surgery on patients’ “virtual organs” before making the first real cut. (Top right) Although it may look realistic, the pilot shown here is flying a conceptual aircraft. In Grumman’s simu- lation system development laboratory, the pilot sees high-resolution images projected onto the interior of a simulation dome. (Middle left) This digital reconstruc- tion, from Virginia’s Institute for Advanced Technology in the Humanities, shows the steps on the back side of the Caesarian speakers’ platform, the Aemilia Basilica law court at left, and the Basilica Julia law court at right, part of the ancient Roman Forum, used for the simula- tion of the historic city at its peak in 400 C.E. (Middle right) This experimental virtual-reality computer simu- lation at Madigan Army Medical Center at Fort Lewis, Washington, shows a first-person view of a simulated attack on a military convoy in Iraq. Psychologists plan to begin using virtual reality in the future to treat soldiers suffering from posttraumatic stress disorder. (Bottom right) Passenger airline flight simulation that allows people who are afraid to fly to experience an airplane trip without leaving the ground.
  460. info! more info! more 438 Chapter 8 put yourself into

    virtual reality, you need software and special headgear; then you can add gloves, and later perhaps a special suit. The headgear—which is called a head-mounted display (marketed as a VR Headset)—has two small video display screens, one for each eye, to create the sense of three-dimension- ality. Headphones pipe in stereophonic sound or even 3-D sound so that you think you are hearing sounds not only near each ear but also in various places all around you. The glove has sensors for collecting data about your hand movements. Once you are wearing this equipment, software gives you interac- tive sensory feelings similar to real-world experiences. You may have seen virtual reality used in arcade-type games, such as Star Wars Encounter. However, there are far more important uses—for example, in simulators for training. Simulators are devices that represent the behavior of physical or abstract systems. Virtual-reality simulation technologies are applied a great deal in training. For instance, to train bus drivers, they create lifelike bus control panels and various scenarios such as icy road conditions. They are used to train pilots on various aircraft and to prepare air-traffic control- lers for equipment failures. Surgeons in training can develop their skills through simulation on “digital patients.” Architects create virtual walkthroughs of the structures they are designing. Virtual-reality therapy has been used for autistic children and in the treatment of phobias, such as extreme fear of public speaking or of being in public places or high places. And athletes train with simulators. Robotics How would I define robotics? In the 1956 film Forbidden Planet, Robby the Robot could sew, distill bourbon, and speak 187 languages. We haven’t caught up with science-fiction movies, but maybe we’ll get there yet. Robotics is the development and study of machines that can perform work that is normally done by people. The machines themselves are called robots. ( • See Panel 8.18 .) As we said in Chapter 1, a robot is an automatic device that performs functions ordinarily executed by human beings or that operates with what appears to be almost human intelligence. (The word robot, derived from the Czech word for “compulsory labor,” was first used by Karel Câpek in an early 1920s play.) Shakey, developed in 1970, was the first robot to use artificial intelligence to navigate. Today Rosie and Roscoe are R2D2-like robots that perform a vari- ety of courier duties for hospitals, saving nurses from having to make trips to supply areas, pharmacies, and cafeterias. ScrubMate—a robot equipped with computerized controls, ultrasonic “eyes,” sensors, batteries, three dif- ferent cleaning and scrubbing tools, and a self-squeezing mop—can clean bathrooms. ROBODOC is used in surgery to bore the thighbone so that a hip implant can be attached. A driverless harvester, guided by satellite signals and an artificial vision system, is used to harvest alfalfa and other crops. A robot dog named AIBO is able to learn how to sit, roll over, fetch, and do other activities. You can buy your own robot vacuum cleaner, Roomba, or the more advanced Scooba, which will not just pick up dirt but also wash, scrub, and dry the floor. At the Massachusetts Institute of Technology, a robot will water a tomato plant when the soil needs it. 27 Roborier is a robot house sitter that rolls around a house and uses infrared sensors to detect suspicious movements and transmit images to absent owners. 28 Robots are also used for more exotic purposes such as fighting oil-well fires, doing nuclear inspections and cleanups, and checking for land mines and booby traps. An eight-legged, satellite-linked robot called Dante II was used to explore the inside of Mount Spurr, an active Alaskan volcano, sometimes with- out human guidance. A six-wheeled robot vehicle called Sojourner was used in NASA’s 1997 Pathfinder exploration of Mars to sample the planet’s atmosphere and soil and to radio data and photos back to Earth. A similar robot has been designed for use on the next Mars expedition. Virtual Reality Products For more about VR products: www.vrealities.com/main.html Be a Train Engineer How does it feel to drive a train? You can find out with Microsoft’s Train Simulator, pretending to direct trains over routes in the United States, United Kingdom, Austria, and Japan: www.microsoft.com/games/pc/ trainsim.aspx
  461. Databases & Information Systems 439 panel 8.18 Robots (Top left)

    Many Japanese people are fond of robotic pets, such as this Sega Poochi. (Top middle) This Robonaut is a robotic system aimed at giving spacewalking astronauts a hand in space station construction. (Top right) The Robo- Soldier is an armed, unmanned ground vehicle that never gets tired, hungry, or scared. (Middle left) Dr. Cynthia Breazeal, at the Massachusetts Institute of Technology’s Artificial Intelligence Laboratory, interacts with Kismet, a robotic head that interacts with humans in a humanlike way. (Middle right) A robotic surgery device, called the Da Vinci Surgical System, manipulates robotic arms during a gallbladder operation at a hospital in New Jersey. (Bottom left) Marc Raibert with a running quadriped, a biomimetic robot called BigDog. (Bottom right) “Mei Mei,” a waitress robot in Chinese dress, carries a couple of glasses of water to a table in a Tokyo restaurant. The robot moves to tables using an infrared sensor and serves water and delivers menus to customers with a bow and words of welcome.
  462. info! more info! more 440 Chapter 8 Two Approaches to

    Artificial Intelligence: Weak versus Strong AI What is the difference between weak and strong AI? Two principal approaches to artificial intelligence are weak AI and strong AI. WEAK AI Weak AI makes the claim that computers can be programmed to simulate human cognition—that some “thinking-like” features can be added to computers to make them more useful tools. We have already seen this kind of AI—call it “AI lite”—in expert systems, speech-recognition software, computer games, and the like. A useful concept for considering weak AI is that of brute force. In program- ming and in AI, brute force is a technique for solving a complex problem by using a computer’s fast processing capability to repeat a simple procedure many times. For example, a spelling checker in a word processing program doesn’t really check the spelling of words; rather, it compares all the words you type into your document to a dictionary of correctly spelled words. Similarly, a chess-playing program will calculate all the possible moves that can apply to a given situation and then choose the best one; it will not analyze and strat- egize the way a human chess player would. Even IBM’s Deep Blue program, which defeated Russian chess master Garry Kasparov in May 1997, basically took advantage of a supercomputer’s fast processing abilities to examine 200 million possible plays per second. STRONG AI Strong AI makes the claim that computers can be made to think on a level that is at least equal to humans and possibly even be conscious of themselves. So far, most AI advances have been piecemeal and single-purpose, such as factory robots, but proponents of strong AI believe that it’s possible for computers to have the kind of wide-ranging, problem-solving ability that people have. Two different approaches are Cyc and Cog. • Cyc—stuffing a database with facts and rules: Cyc (pronounced “psych”) is a knowledge-engineering project based in Austin, Texas, that was launched by former Stanford University professor Douglas Lenat. Since 1984, teams of programmers, linguists, theologians, mathematicians, and philosophers have been feeding a database named Cyc 1.4 million basic truths and generalities about daily life. The idea, in one description, is to enable Cyc to “automatically make assumptions humans make: Creatures that die stay dead. Dogs have spines. Scaling a cliff requires intense physical effort.” 29 The challenge, then, is to create a computer database that knows as much as a 12-year-old. Besides stuffing the database with straightforward facts, researchers have also instructed Cyc to ask questions if it needs clarity and to generalize as much as possible, based on what it already knows, until further generalization is false. Eventually, Cyc may learn on its own. • Cog—using sensory systems to search for patterns: Cog takes a different approach. A project backed by MIT professor Rodney Brooks in Cambridge, Massachusetts, Cog doesn’t follow predetermined sets of rules but rather tries to identify and search for patterns. Controlled by a network of many different microcontrollers, Cog is a humanoid robot with sensory systems that mimic the visual, hearing, and tactile systems of humans. The philosophy of the researchers is that the form of our bodies is important in the development of internal thought and language as we interact with our environments. This approach provides the robot with a better context for deciphering and imitating human behavior and is intended to allow the robot to learn socially, as humans do. Some other forms of strong AI are described in the box at right. ( • See Panel 8.19 .) COGnition For more about Cog, go to: www.ai.mit.edu/projects humanoid-robotics-group/ AI Conversation What does Cyc know? Go to: www.cyc.com/cyc/ technology/whatiscyc_dir/ whatdoescycknow
  463. Databases & Information Systems 441 Neural Networks. Neural networks use

    physical electronic devices or software to mimic the neurological structure of the human brain. Because they are structured to mimic the rudimentary circuitry of the cells in the human brain, they learn from example and don’t require detailed instructions. To understand how neural networks operate, we may compare them to the operation of the human brain. • The human neural network: The human body has a neural network consisting of neurons, or nerve cells. The neurons are connected by a three-dimensional lattice called axons. Electrical connections between neurons are activated by synapses. The human brain is made up of about 100 billion neurons. However, these cells do not act as “computer memory” sites. No cell holds a picture of your dog or the idea of happiness. You could eliminate any cell—or even a few million—in your brain and not alter your “mind.” Where do memory and learning lie? In the electrical connections between cells, the synapses. Using electrical pulses, the neurons send on/off messages along the synapses. • The computer neural network: In a hardware neural network, the nerve cell is replaced by a transistor, which acts as a switch. Wires connect the cells (transistors) with one another. The synapse is replaced by an electronic component called a resistor, which determines whether a cell should activate the electricity to other cells. A software neural network emulates a hardware neural network, although it doesn’t work as fast. Computer-based neural networks use special AI software and complicated fuzzy-logic processor chips to take inputs and convert them to outputs with a kind of logic similar to human logic. Neural networks are already being used in a variety of situations. At a San Diego hospital emergency room in which patients complained of chest pains, the same information was given to a neural-network program and to doctors. The network correctly diagnosed patients with heart attacks 97% of the time, compared to 78% for the human physicians. Banks that use neural-network software to spot irregularities in purchasing patterns within individual accounts often notice when a credit card is stolen before its owner does. Genetic Algorithms. A genetic algorithm is a program that uses Darwinian principles of random mutation to improve itself. The algorithms are lines of computer code that act like living organisms. Different sections of code haphazardly come together, producing programs. As in Darwin’s rules of evolution, many chunks of code compete to see which can best fulfill the goal of the program. Some chunks will even become extinct. Those that survive will combine with other survivors to produce offspring programs. Expert systems can capture and preserve the knowledge of expert specialists, but they may be slow to adapt to change. Neural networks can sift through mountains of data and discover obscure causal relationships, but if there is too much data, or too little, they may be ineffective. Genetic algorithms, by contrast, use endless trial and error to learn from experience—to discard unworkable approaches and grind away at promising approaches with the kind of tireless energy of which humans are incapable. In 2000, scientists at Brandeis University reached a major milestone when they created a computerized robot that designs and builds other robots, automatically evolving without any significant human intervention. The “robotic life forms” are only a few inches long and are composed of a few plastic parts with rudimentary nervous systems made of wire. They do only one thing: inch themselves, worm-like, along a horizontal surface, using miniature motors. With no idea what a successful design might look like, the Brandeis computer was given the goal of moving on a horizontal surface; a list of possible parts to work with; a group of 200 randomly constructed, nonworking designs; and the physical laws of gravity and friction. Mimicking evolution through classic survival-of-the-fittest selection, the computer changed pieces in the designs, mutated the programming instructions for controlling movements, and ran simulations to test the designs. After 300–600 generations of evolution, the computer sent the design to a machine to build the robot. The robots currently have the brainpower of bacteria, say researchers, who say they hope to get up to insect level in a couple of years. Cyborgs. Cyborgs are hybrids of machine and organisms. One example is a hockey-puck- sized robot on wheels controlled by living tissue, an immature lamprey eel brain. The brain had been removed from the eel, kept alive in a special solution, and attached to the robot by wires. The brain is thus able to receive signals from the robot’s electronic eyes and in turn can send commands to move the machine’s wheels. A number of cyborgs are in existence today—for instance, the estimated 10% of the American population with electronic heart pacemakers, artificial joints, implanted corneal lenses, and drug implant systems. Future cyborgs, however, might consist of bacteria attached to computer chips to map pollutants, insects used as parts of sensors to detect land mines and chemical weapons, and rodent brains to help identify new medicines. In his book I, Cyborg, British cybernetics professor Kevin Warwick described having an electrode in his arm pick up neural signals and send them to a computer, which converted them into instructions for a three-fingered robot hand elsewhere. panel 8.19 Three types of strong AI: Neural networks, genetic algorithms, and cyborgs
  464. 442 Chapter 8 ã —Judith Anne Gunther, “An Encounter with

    A.I.,” Popular Science, June 1994. “Computer: As a psychoanalyst, I am familiar with discussing such marital troubles with you as the patient on the couch. If you don’t have a bad marriage just pretend that you do. Please start with ‘My wife . . .’ or ‘My husband . . .’. Judge: OK, I’ll pretend I have a bad marriage. Let’s say the reason is because he never picks up his dirty underwear. Is this marriage irreparable? Computer: Well, if you think I’m hopeless, you can always just swear at me.” panel 8.20 The Turing test Artificial Life, the Turing Test, & AI Ethics How could I tell if a computer actually achieved human intelligence? What is life, and how can we replicate it in silicon chips, networks, and soft- ware? We are dealing now not with artificial intelligence but with artificial life. Artificial life, or A-life, is the field of study concerned with “creatures”— computer instructions, or pure information—that are created, replicate, evolve, and die as if they were living organisms. Thus, A-life software (such as LIFE) tries to simulate the responses of a human being. Of course, “silicon life” does not have two principal attributes associated with true living things—it is not water- and carbon-based. Yet in other respects such creatures mimic life: If they cannot learn or adapt, then they perish. HOW CAN WE KNOW A MACHINE IS TRULY INTELLIGENT? How can we know when we have reached the point at which computers have achieved human intelligence? How will you know, say, whether you’re talking to a human being on the phone or to a computer? Clearly, with the strides made in the fields of artificial intelligence and artificial life, this question is no longer just academic. Interestingly, Alan Turing, an English mathematician and computer pio- neer, addressed this very question in 1950. Turing predicted that by the end of the 20th century computers would be able to mimic human thinking and to conduct conversations indistinguishable from a person’s. Out of these obser- vations came the Turing test, which is intended to determine whether a com- puter possesses “intelligence” or “self-awareness.” In the Turing test, a human judge converses by means of a computer ter- minal with two entities hidden in another location—one a person typing on a keyboard, the other a computer program. Following the conversation, the judge must decide which entity is human. In this test, intelligence—the abil- ity to think—is demonstrated by the computer’s success in fooling the judge. ( • See Panel 8.20 .) Judith Anne Gunther participated as one of eight judges in the third annual Loebner Prize Competition, which is based on Turing’s ideas. (There have Cyber human. With the help of new scanning and computing technologies, medical imag- ing technology can now show real-time activities inside the human body. One such system is 4-D Imaging System’s “Cyber Human,” discussed here by Dr. Naoki Suzuki of the National Museum of Emerging Science and Innovation in Tokyo.
  465. info! more Databases & Information Systems 443 been other competitions

    since.) The “conversations”— each limited to 15 minutes—are restricted to predeter- mined topics, such as baseball, because even today’s best programs have neither the databases nor the syntactical ability to handle an unlimited number of subjects. Gunther found that she wasn’t fooled by any of the computer programs. The winning program, for example, relied as much on deflection and wit as it did on respond- ing logically and conversationally. (For example, to a judge trying to discuss a federally funded program, the computer said: “You want logic? I’ll give you logic: shut up, shut up, shut up, shut up, shut up, now go away! How’s that for logic?”) However, Gunther was fooled by one of the five humans, a real person discussing abor- tion. “He was so uncommunicative,” wrote Gunther, “that I pegged him for a computer.” 30 A new sort of Turing test, one that’s simple for humans but that will baffle sophisticated computer programs, has been devised in the form of cognitive puzzles called Captchas, an acronym for “Completely Automated Public Tur- ing Test to Tell Computers and Humans Apart.” Captchas are most commonly used to prevent rogue bots from spamming comments or signing up for web services. Yahoo!, for example, uses a Captcha for screening when you sign up for an account. 31 SMARTER-THAN-HUMAN COMPUTERS: THE CONCEPT OF “THE SINGULAR- ITY” Several research projects are under way that have the aim of making computers think and act more like humans. The U.S. military, for example, is spending billions to develop robots that aid or replace human soldiers. 32 Other efforts concentrate on making driverless cars, software-based personal assis- tants, and an artificial brain that mimics the actions of 100 million brain neu- rons. 33 All of these seem to be part of a march toward a theoretical future point that scientist and science fiction writer Vernor Vinge called, in 1993, the Sin- gularity, or the technological singularity, a moment when humans would have created self-aware, smarter-than-human machines that are capable of designing computers and robots that are better than humans can today. At this point, Vinge suggested, technological progress would have accelerated so much that machine intelligence would dominate, and the “human era would be ended.” 34 Vinge thought that computers would become powerful enough by 2030 to allow the rise of such superintelligent, self-aware machines. Others, such as Raymond Kurzweil, have taken the Singularity idea a great leap further, envisioning transferring the contents of human brains and thought processes into a computing environment, making a form of immortal- ity possible. Thinkers such as Kevin Kelly take another tack, visualizing “the emergence of a global brain—the idea that the planet’s interconnected com- puters might someday act in a coordinated fashion and perhaps exhibit intel- ligence,” in one description. 35 Will the machines take over the world? “Science is nowhere close to under- standing what human intelligence is,” notes one writer, “much less coming up with a formula to repeat it in silicon and electrons.” We can program comput- ers to say “I’m sorry” when they hear certain words, he points out, but they remain rigidly logical, unable to match the human mind “in its uniquely holis- tic and sometimes illogical ways.” 36 ETHICS IN AI Behind everything to do with artificial intelligence and artifi- cial life—just as it underlies everything we do—is the whole matter of ethics. In his book Ethics in Modeling, William A. Wallace, professor of decision sci- ences at Rensselaer Polytechnic Institute, pointed out that computer software, including expert systems, is often subtly shaped by the ethical judgments and assumptions of the people who create it. 37 In one instance, he noted, a bank Alan Turing (right) in 1951, work- ing on the Mark I computer. Take a Few Captcha Tests To get a feel for captchas, go to: www.captcha.net ReCaptcha is a new version of Captcha; besides doing what Captcha does, it helps to clarify scrambled scanned files of poor-quality old books: http://reccaptcha.net/ learnmore.html
  466. info! more info! more 444 Chapter 8 had to modify

    its loan-evaluation software on discovering that the software rejected certain applications because it unduly emphasized old age as a nega- tive factor. Many computer scientists are also concerned that developments in artifi- cial intelligence might lead to loss of human control over computer systems, causing profound social disruptions, destruction of jobs, and even dangerous consequences. 38 For example, criminals might be able to exploit AI systems, as in using speech synthesis systems to masquerade as human beings or in min- ing personal information from smartphones. Clearly, there is no such thing as completely “value-free” technology. Human beings build it, use it, and have to live with the results. 8.8 THE ETHICS OF USING DATABASES: Concerns about Privacy & Identity Theft What are two ethical concerns about the uses of databases? If you’re under 30, maybe you’re at ease in sharing your activities and loca- tions with your friends, as through Facebook or Twitter. But are you comfort- able about having your movements tracked, as through GPS-locator phones, E-ZPasses, and satellite high-definition imagery (Google Earth)? Do you care if you’re leaving a digital trail behind you that may wind up in corporate or government databases—or that that data might be widely disseminated, used for advertising, or stolen? 39 The Threat to Privacy What are some ways my privacy is being threatened? Privacy is the right of people not to reveal information about themselves. Whom you vote for in a voting booth and what you say in a letter sent through the U.S. mail are private matters. However, the ease of pulling together infor- mation from databases and disseminating it over the internet has put privacy under extreme pressure. Many people are worried about the loss of their right to privacy—more than 90% of respondents to one survey called online privacy a “really” or “somewhat” important issue—fearing they will lose all control of the personal information being collected and tracked by computers. 40 There are good reasons for this concern, as the following discussion shows. NAME MIGRATION Once you’re in a database, your name can easily migrate to other databases. For example, many school districts and colleges are allowed to sell or share student lists that contain names, ages, addresses and so on. 41 Par- ents installing software (Sentry, FamilySafe) to monitor their children’s online activities unwittingly may have allowed the software developer to gather mar- keting data from children as young as 7 and to sell that information. 42 Making certain purchases, such as flowers, through your smartphone may put your name on the mailing list of 1-800-FLOWERS.com and lead to targeted ads for flowers on your phone, a form of advertising known as behavioral targeting. 43 No wonder the Federal Trade Commission has expressed sharp words to inter- net companies, saying they are not explaining to users clearly enough what information they collect about them and how they are using it. 44 RÉSUMÉ RUSTLING & ONLINE SNOOPING When you post your résumé on an internet job board, you assume that it’s private, and indeed it is supposed to be restricted to recruiters and other employers. But job boards that are just start- ing up may poach résumés from other job websites as a way of building up their own databases. Another problem is that much of your life may already be online and available to anyone. For instance, Camberley Crick, a part-time computer tutor, went to the apartment of a prospective client and discovered ethics ethics AI Ethical Concerns To learn more about ethical concerns and AI, go to: www.msu.edu/~troyerco/atl/ review5.html http://www.nickbostrom.com/ ethics/ai.html http://ethics.csc.ncsu.edu/ risks/ai/ Ways to Guard Your Privacy The following websites offer ways to guard your privacy: www.epic.org www.identitytheft.org www.privacyfoundation.org www.eff.org www.ftc.gov/privacy/index.html www.junkbusters.com www.kidsprivacy.org www.spamfree.org
  467. info! more Databases & Information Systems 445 he had pulled

    all kinds of facts about her simply by typing her name into the search engine Google. Among the things he found: “her family website, a com- puter game she had designed for a freshman college class, a program from a concert she had performed in, and a short story she wrote in elementary school called ‘Timmy the Turtle.’” 45 GOVERNMENT PRYING & SPYING As part of its war on terrorism, the govern- ment has been taking steps that make defenders of privacy worried. One, for instance, was a controversial data-mining project for the U.S. Defense Depart- ment’s Total Information Awareness program that would have compiled elec- tronic dossiers on Americans. The U.S. Senate forced restrictions on the TIA program, saying that it would amount to a domestic spying apparatus. Another concern to some is the Secure Flight program, which is meant to replace the canceled Computer Assisted Passenger Prescreening Program (CAPPS II), designed to screen out supposedly dangerous commercial airline passengers. This program involves looking through commercial and govern- ment data on all air travelers without their knowledge or permission and using the information to give every flyer a security-risk ranking. Librarians and booksellers worry that the USA PATRIOT Act, passed by Congress six weeks after the September 11, 2001, attacks, allows FBI agents (through Section 215 of the act) to obtain a warrant from a secret federal court for library or bookstore records of anyone connected to an investigation of international terrorism or spying. The law prohibits librarians and booksellers from telling patrons that the FBI has requested their records. Unlike conven- tional search warrants, agents need not show that the target is suspected of a crime or possesses evidence of a crime. PRIVACY LAWS Over the years, concerns about privacy have led to the enact- ment of a number of laws to protect individuals from invasions of privacy. ( • See Panel 8.21 .) Still, the tension between security and privacy worries Right to Privacy? There is no explicit right to pri- vacy in the United States Con- stitution. The Supreme Court has ruled that there is a limited constitutional right of privacy based on several provisions in the Bill of Rights. This includes a right to privacy from govern- ment surveillance into an area where a person has a “reason- able” expectation of privacy and also in matters relating to marriage, procreation, contra- ception, sexual activity, family relationships, child rearing, and education. The Supreme Court has also recognized a right of anonymity and the right of political groups to prevent disclosure of their members’ names to government agencies. Some states within the United States have incorporated explicit privacy protections into their constitutions. Go to: www.privacyinternational.org/ article.shtml?cmd[347]= x-347-559478 Freedom of Information Act (1970) Fair Credit Reporting Act (1970) Privacy Act (1974) Family Educational Rights and Privacy Act (1974) Right to Financial Privacy Act (1978) Privacy Protection Act (1980) Cable Communications Policy Act (1984) Computer Fraud and Abuse Act (1984) Electronic Communications Privacy Act (ECPA) (1986) Computer Security Act (1987) Computer Matching and Privacy Protection Act (1988) Video Privacy Protection Act (1988) Telephone Consumer Protection Act (1988) Cable Act (1992) Computer Abuse Amendments Act (1994) Communications Assistance for Law Enforcement Act (1994) National Information Infrastructure Protection Act (1996) No Electronic Theft (NET) Act (1997) Children’s Online Privacy Protection Act (1998) Identity Theft and Assumption Deterrence Act (1998) Digital Millennium Copyright Act (1998) Financial Services Modernization Act (1999) Children’s Online Privacy Protection Act (COPPA) (2000) USA PATRIOT Act (2001) Health Insurance Portability and Accountability Act (2003) panel 8.21 Important federal privacy laws For further information on these laws, go to: www.epic.org
  468. info! more 446 Chapter 8 many observers. Recently, an idea

    has been to use cost-benefit analysis to weigh the benefits of tighter domestic security against the costs of lost privacy and freedom. The idea has attracted an unusual array of supporters, ranging from conservatives who fret about “big government” to civil-liberties lawyers. A NATIONAL ID CARD? Demand for photo identification has transformed driver’s licenses into a primary identification document, with a number of states now using digital fingerprinting and facial-recognition security systems for their licenses. Although there is no present nationwide identity card, Con- gress has required (under the 2002 Enhanced Border Security and Visa Entry Reform Act) the definition of a standard under which the State Department and immigration service can issue machine-readable documents that can be used at the most porous border entry points. Foreign governments are also required to use improved identity-system (biometric) technology in their passports. Does this mean that we’re on our way to some national ID card, a sort of internal passport like those carried by citizens in some European countries? Critics from conservatives to civil-liberties defenders so dislike the idea that even efforts to get state governments to standardize driver’s licenses have been met with extreme resistance. One answer, perhaps, is to have a voluntary nationally accepted ID card: private companies would issue cards that adhere to strict government standards, and anyone who signs up for one would be checked against government criminal and watch-list databases that are con- stantly updated. Still, Congress has weighed legislation in which applicants for driver’s licenses would be required to show four types of identification, such as a photo ID, a birth certificate or passport, a Social Security card, or some other document that would prove name, address, and residency. The purpose would be to turn state-issued driver’s licenses into a kind of national identity card. Identity Theft What’s the definition of identity theft? Identity theft, or theft of identity (TOI), is a crime in which thieves hijack your name and identity and use your good credit rating to get cash or buy things. In 2008, the number of identity thefts jumped 22% over the previ- ous year, to 9.9 million. 46 Consumer identity theft complaints in 2008, accord- ing to the Federal Trade Commission, were nearly twice the number (313,982) they were in 2008. 47 But these are just statistics. “It’s a whole other thing when you’re suddenly faced with the reality of a stranger living your life,” says one victim. 48 Often this begins with someone getting hold of your Social Security number. We discuss identity theft further in the Experience Box . Checking Your Personal Records Browse the full text of FBI documents and files released under the Freedom of Informa- tion Act at: www.usdoj.gov/oip/index.html For instructions on how to check and repair your personal credit reports, go to: www.frbsf.org/publications/ consumer/creditrights.html For more information on the privacy of personal health records, go to the U.S. Depart- ment of Health and Human Services at: www.hhs.gov/ocr/hipaa
  469. 448 Chapter 8 One day, Kathryn Rambo of Los Gatos,

    California, learned that she had a new $35,000 sports util- ity vehicle listed in her name, along with five credit cards, a $3,000 loan, and even an apartment—none of which she’d asked for. “I cannot imagine what would be weirder, or would make you angrier, than having someone pretend to be you, steal all this money, and then leave you to clean up all their mess later,” said Rambo, a special-events planner. 49 Added to this was the eerie matter of constantly having to prove that she was, in fact, herself: “I was going around saying, ‘I am who I am!’” 50 Identity Theft: Stealing Your Good Name—and More Theft of identity (TOI) is a crime in which thieves hijack your very name and identity and use your good credit rating to get cash or to buy things. To begin, all they need is your full name and Social Security number. Using these, they tap into internet databases and come up with other information— your address, phone number, employer, driver’s license number, mother’s maiden name, and so on. Then they’re off to the races, applying for credit everywhere. In Rambo’s case, someone had used information lifted from her employee-benefits form. The spending spree went on for months, unbeknownst to her. The reason it took so long to discover the theft was that Rambo never saw any bills. They went to the address listed by the impersonator, a woman, who made a few payments to keep creditors at bay while she ran up even more bills. For Rambo, straighten- ing out the mess required months of frustrating phone calls, time off from work, court appearances, and legal expenses. One survey found that a third of victims of identity theft had still been unable to repair their tainted identities even a year after the information was stolen, and most victims on average spent 3 to 5,840 hours trying to resolve their cases. 51 How Does Identity Theft Start? Identity theft typically starts in one of several ways: • Wallet or purse theft: There was a time when a thief would steal a wallet or purse, take the cash, and toss everything else. No more. Everything from keys to credit cards can be parlayed into further thefts. (One famous victim of identity theft was Federal Reserve chairman Ben Bernanke, whose wife, Anna, had her purse stolen in a Starbucks coffee shop. The thief, it turned out, made as much as $50,000 a day on identity theft scams.) 52 • Mail theft: Thieves also consider mailboxes fair game. The mail will yield them bank statements, credit card statements, new checks, tax forms, and other personal information. (So it’s best to receive your mail in a locked box—and mail your outgoing letters at a postbox.) • Mining the trash: You might think nothing of throwing away credit card offers, portions of utility bills, or old canceled checks. But “dumpster diving” can produce gold for thieves. Credit card offers, for instance, may have limits of $5,000 or so. • Telephone solicitation: Prospective thieves may call you up and pretend to represent a bank, credit card com- pany, government agency, or the like in an attempt to pry loose essential data about you. • Insider access to databases: You never know who has, or could have, access to databases containing your personnel records, credit records, car-loan applications, bank documents, and so on. This is one of the harder TOI methods to guard against. • Outsider access to databases: In recent years, data burglars and con artists have tapped into big data- bases at such companies as ChoicePoint, Reed Elsevier, DSW Shoe Warehouse, Bank of America/Wachovia. Other institutions, such as CitiFinancial, the University of California at Berkeley, Time Warner, and MCI, have exposed files of data through carelessness. These losses have put millions of people at risk. What to Do Once Theft Happens If you’re the victim of a physical theft (or even loss), as when your wallet is snatched, you should immediately contact— first by phone, and then in writing—all your credit card companies, other financial institutions, the Department of Motor Vehicles, and any other organizations whose cards you use that are now compromised. Be sure to call utility companies—telephone, electricity, and gas; identity thieves can run up enormous phone bills. Also call the local police and your insurance company to report the loss. File a com- plaint with the Federal Trade Commission (1-877-ID-THEFT, or www.ftc.gov ), which maintains an ID theft database. It’s important to notify financial institutions within 2 days of learning of your loss because then you are legally respon- sible for only the first $50 of any theft. If you become aware of fraudulent transactions, immediately contact the fraud units of the three major credit bureaus: Equifax, Experian, and TransUnion. ( • See Panel 8.22 .) If your Social Security number has been fraudulently used, alert the Social Security Administration (800-772-1213). If you have a check guarantee card that was stolen, if your checks have been lost, or if a new checking account has been opened in your name, call your bank immediately. If your mail has been used for fraudulent purposes or if an identity thief filed a change of address form, look in the EXPERIENCE BOX Preventing Your Identity from Getting Stolen
  470. Databases & Information Systems 449 phone directory under U.S. Government

    Postal Service for your local postal inspector’s office and call them. In some states, you can freeze your credit reports, pre- venting lenders and others from reviewing your credit history, which will prevent identity thieves from opening fraudulent accounts using your name. How to Prevent Identity Theft One of the best ways to keep your finger on the pulse of your financial life is, on a regular basis—once a year, say—to get a copy of your credit report from one or all three of the main credit bureaus. This will show you whether there is any unauthorized activity. Reports are free from the major credit bureaus (Equifax, Experian, and Transunion). To learn more, go to www.annualcreditreport.com or call toll-free 877-322-8228. In addition, there are some specific measures you can take to guard against personal information getting into the public realm. • Check your credit card billing statements: If you see some fraudulent charges, report them immediately. If you don’t receive your statement, call the creditor first. Then call the post office to see if a change of address has been filed under your name. • Treat credit cards and other important papers with respect: Make a list of your credit cards and other important documents and a list of numbers to call if you need to report them lost. (You can photocopy the cards front and back, but make sure the numbers are legible.) Carry only one or two credit cards at a time. Carry your Social Security card, passport, or birth certificate only when needed. Don’t dispose of credit card receipts in a public place. Don’t give out your credit card numbers or Social Secu- rity number over the phone or on the internet unless you have some sort of trusted relationship with the party on the other end. Tear up credit card offers before you throw them away. Even better, buy a shredder and shred these and other such documents. Keep a separate credit card for online transactions, so that if anything unusual happens you’re more likely to notice it and you can more easily close the account. Keep tax records and other financial documents in a safe place. • Treat passwords with respect: Memorize passwords and PINs. Don’t use your birth date, mother’s maiden name, or similar common identifiers, which thieves may be able to guess. • Treat checks with respect: Pick up new checks at the bank. Shred canceled checks before throwing them away. Don’t let merchants write your credit card number on the check. • Watch out for “shoulder surfers” when using phones and ATMs: When using PINs and passwords at public tele- phones and automated teller machines, shield your hand so that anyone watching through binoculars or using a video camera—“shoulder surfers”—can’t read them. • Don’t bother signing up for ID-theft protection pro- grams: Companies such as LifeLock and Invisus offer to keep watch on your credit reports and public records and to alert credit bureaus if they encounter fraud activity. However, these are all things you can do your- self, without having to pay up to $300 a year for a pro- tection plan. 53 Equifax To check your credit report: 800-685-1111 www.equifax.com TransUnion To check your credit report: 800-493-2392 www.transunion.com Experian To check your credit report: 800-397-3742 www.experian.com panel 8.22 The three major credit bureaus
  471. 450 Chapter 8 artificial intelligence (p. 433) Group of related

    technologies used for developing machines to emulate human qualities, such as learning, reasoning, communicating, seeing, and hear- ing. Why it’s important: Today the main areas of AI are expert systems, natural language processing, intelligent agents, pattern recognition, fuzzy logic, virtual reality and simulation devices, and robotics. business-to-business (B2B) system (p. 424) Direct sales between businesses that involve using the internet or a pri- vate network to cut transaction costs and increase efficien- cies. Why it’s important: Business-to-business activity helps business by moving beyond pricing mechanisms and encom- passing product quality, customer support, credit terms, and shipping reliability, which often count for more than price. business-to-consumer (B2C) system (p. 425) System in which a business sells goods or services to consumers, or members of the general public. An example is Amazon.com . Why it’s important: This kind of e-commerce system essen- tially removes the middleman and often even the need for a physical (“bricks-and-mortar”) store. character (p. 403) Also called byte; a single letter, number, or special character. Why it’s important: Characters—such as A, B, C, 1, 2, 3, #, $, %—are part of the data storage hierarchy. compression (p. 407) Method of removing repetitive ele- ments from a file so that the file requires less storage space, then later decompressing the removed data, or restoring the repeated patterns. Why it’s important: Compression/decom- pression makes storage and transmission of large files, such as multimedia files, more feasible. consumer-to-consumer (C2C) system (p. 425) System in which consumers sell goods or services directly to other con- sumers, often with the help of a third party, such as eBay. Why it’s important: The advantage of C2C e-commerce is most often the reduced costs and a smaller but more profitable customer base. It also gives many small business owners a way to sell their goods without running a costly bricks-and-mortar store. data dictionary (p. 409) Also called repository; a procedures document or disk file that stores data definitions and descrip- tions of database structure. It may also monitor new entries to the database as well as user access to the database. Why it’s important: The data dictionary monitors the data being entered to make sure it conforms to the rules defined during data definition. The data dictionary may also help protect the security of the database by indicating who has the right to gain access to it. data files (p. 405) Files that contain data—words, numbers, pictures, sounds, and so on. Why it’s important: Unlike pro- gram files, data files don’t instruct the computer to do any- thing. Rather, data files are there to be acted on by program files. Examples of common extensions in data files are .txt (text) and .xls (spreadsheets). Certain proprietary software programs have their own extensions, such as .ppt for Power- Point and .mdb for Access. data mining (DM) (p. 418) Computer-assisted process of sift- ing through and analyzing vast amounts of data in order to extract hidden patterns and meaning and to discover new knowledge. Why it’s important: The purpose of DM is to describe past trends and predict future trends. Thus, data- mining tools might sift through a company’s immense collec- tions of customer, marketing, production, and financial data and identify what’s worth noting and what’s not. data storage hierarchy (p. 403) The levels of data stored in a computer database: bits, bytes (characters), fields, records, and files. Why it’s important: Understanding the data storage hierarchy is necessary to understand how to use a database. data warehouse (p. 419) A database containing cleaned-up data and meta-data (information about the data) stored using high-capacity-disk storage technology. Why it’s important: Data warehouses combine vast amounts of data from many sources in a database form that can be searched, for example, for patterns not recognizable with smaller amounts of data. database (p. 402) Logically organized collection of related data designed and built for a specific purpose, a technology for pulling together facts that allows the slicing and dicing and mixing and matching of data. Why it’s important: Businesses and organizations build databases to help them keep track of and manage their affairs. In addition, online database services put enormous research resources at the user’s disposal. database administrator (DBA) (p. 410) Person who coordi- nates all related activities and needs for an organization’s database. Why it’s important: The DBA determines user access privileges; sets standards, guidelines, and control procedures; assists in establishing priorities for requests; prioritizes con- flicting user needs; develops user documentation and input procedures; and oversees the system’s security. database management system (DBMS) (p. 407) Also called database manager; software that controls the structure of a database and access to the data. It allows users to manipulate more than one file at a time. Why it’s important: This software enables sharing of data (same information is available to different users); economy of files (several departments can use one file instead of each individually maintaining its own file, thus reducing data redundancy, which in turn reduces the expense of storage media and hardware); data integrity (changes made in the files in one department are automati- cally made in the files in other departments); and security (access to specific information can be limited to selected users). DBMS utilities (p. 410) Programs that allow users to maintain databases by creating, editing, and deleting data, records, and files. Why it’s important: DBMS utilities allow people to establish what is acceptable input data, to monitor SUMMARY
  472. 451 Databases & Information Systems the types of data being

    input, and to adjust display screens for data input. decision support system (DSS) (p. 431) Computer-based information system that helps managers with nonroutine decision-making tasks. Inputs consist of some summarized reports, some processed transaction data, and other inter- nal data plus data from sources outside the organization. The outputs are flexible, on-demand reports. Why it’s impor- tant: A DSS is installed to help top managers and middle managers make strategic decisions about unstructured problems. e-commerce (p. 422) Electronic commerce; the buying and selling of products and services through computer networks. Why it’s important: U.S. e-commerce and online shopping are growing even faster than the increase in computer use. executive support system (ESS) (p. 432) Also called an exec- utive information system (EIS); DSS made especially for top managers. It draws on data from both inside and outside the organization. Why it’s important: The ESS includes capabilities for analyzing data and doing “what if” scenarios to help with strategic decision making. expert system (p. 433) Also called knowledge-based sys- tem; set of interactive computer programs that helps users solve problems that would otherwise require the assistance of a human expert. Expert systems are created on the basis of knowledge collected on specific topics from human spe- cialists, and they imitate the reasoning process of a human being. Why it’s important: Expert systems are used by both management and nonmanagement personnel to solve spe- cific problems, such as how to reduce production costs, improve workers’ productivity, or reduce environmental impact. field (p. 403) Unit of data consisting of one or more charac- ters (bytes). Examples of fields are your first name, your street address, or your Social Security number. Why it’s important: A collection of fields makes up a record. file (p. 404) Collection of related records. An example of a file is a stored listing of everyone employed in the same depart- ment of a company, including all names, addresses, and Social Security numbers. Why it’s important: A file is the collection of data or information that is treated as a unit by the computer; a collection of related files makes up a database. filename (p. 405) The name given to a file. Why it’s important: Files are given names so that they can be differentiated. File- names also have extension names of up to three or four let- ters added after a period following the filename. fuzzy logic (p. 436) Method of dealing with imprecise data and uncertainty, with problems that have many answers rather than one. Why it’s important: Unlike “crisp,” yes/no digital logic, fuzzy logic deals with probability and credibility. hierarchical database (p. 410) Database in which fields or records are arranged in related groups resembling a family tree, with child (lower-level) records subordinate to parent (higher- level) records. The parent record at the top of the database is called the root record. Why it’s important: The hierarchical database is one of the common database structures. identity theft (p. 447) Also called theft of identity (TOI); crime in which thieves hijack a person’s name and identity and use his or her good credit rating to get cash or buy things. Why it’s important: Identity theft is on the rise in developed countries; it can ruin a person’s life for many years. intelligent agent (p. 436) Software with built-in intelligence that monitors work tasks, asks questions, and performs work tasks, such as roaming networks, on the user’s behalf. Why it’s important: An intelligent agent can filter messages, scan news services, travel over communications lines to databases, and collect files to add to a personal database. management information system (MIS) (p. 430) Computer- based information system that uses data recorded by TPS as input into programs that produce summary, exception, periodic, and on-demand reports of the organization’s per- formance. Why it’s important: An MIS principally assists middle managers, helping them make tactical decisions— spotting trends and getting an overview of current business activities. multidimensional database (MDB) (p. 417) Type of database that models data as facts, dimensions, or numerical measures for use in the interactive analysis of large amounts of data for decision-making purposes. A multidimensional database uses the idea of a cube to represent the dimensions of data avail- able to a user, using up to four dimensions. Why it’s important: A multidimensional database allows users to ask questions in colloquial English. natural language processing (p. 435) Study of ways for com- puters to recognize and understand human language, whether in spoken or written form. Why it’s important: Natural lan- guages make it easier to work with computers. network database (p. 411) Database similar in structure to a hierarchical database; however, each child record can have more than one parent record. Thus, a child record, which in network database terminology is called a member, may be reached through more than one parent, which is called an owner. Why it’s important: The network database is one of the common database structures. object-oriented database (p. 416) Database that uses “objects,” software written in small, reusable chunks, as ele- ments within database files. An object consists of (1) data in any form, including graphics, audio, and video, and (2) instructions for the action to be taken on the data. Why it’s important: A hierarchical or network database might contain only numeric and text data. By contrast, an object-oriented database might also contain photographs, sound bites, and video clips. More- over, the object would store operations, called methods—the programs that objects use to process themselves. office information system (OIS) (p. 429) Also called office automation system (OAS); computer information system that combines various technologies to reduce the manual labor needed to operate an office efficiently and increase productiv- ity; used at all levels of an organization. Why it’s important:
  473. 452 Chapter 8 An OIS uses a network to integrate

    such technologies as fax, voice mail, email, scheduling software, word processing, and desktop publishing and make them available throughout the organization. pattern recognition (p. 436) Use of camera and software to identify recurring patterns and to recognize the connections between the perceived patterns and similar patterns stored in a database. Why it’s important: Pattern recognition is used in data mining to discover previously unnoticed patterns; in facial recognition software to identify faces; and in handwrit- ing recognition, fingerprint identification, robot vision, and automatic voice recognition. program files (p. 405) Files containing software instructions. Why it’s important: Contrast data files. query by example (QBE) (p. 414) Feature of query-language programs whereby the user asks for information in a database by using a sample record to define the qualifications he or she wants for selected records. Why it’s important: QBE simplifies database use. record (p. 403) Collection of related fields. An example of a record is your name and address and Social Security number. Why it’s important: Related records make up a file. relational database (p. 413) Database structure that relates, or connects, data in different files through the use of a key field, or common data element. In this arrangement there are no access paths down through a hierarchy. Instead, data elements are stored in different tables made up of rows and columns. In database terminology, the tables are called rela- tions (files), the rows are called tuples (records), and the columns are called attributes (fields). All related tables must have a key field that uniquely identifies each row; that is, the key field must be in all tables. Why it’s important: The rela- tional database is one of the common database structures; it is more flexible than hierarchical and network database models. report generator (p. 410) In a database management sys- tem, a program users can employ to produce on-screen or printed-out documents from all or part of a database. Why it’s important: Report generators allow users to produce finished- looking reports without much fuss. robotics (p. 438) Development and study of machines that can perform work normally done by people. Why it’s important: Commercial and industrial robots perform jobs more cheaply or with greater accuracy and reliability than humans. They are also used for jobs that are too dirty, dangerous, or dull to be suitable for humans. Robots are widely used in manufacturing, assembly and packing, transport, earth and space explora- tion, surgery, weaponry, laboratory research, and mass pro- duction of consumer and industrial goods. simulator (p. 438) Device that represents the behavior of physical or abstract systems. Why it’s important: Virtual- reality simulation technologies are widely applied for training purposes. the Singularity (p. 443) Also called the technological sin- gularity, a moment when humans would have created self- aware, smarter-than-human machines that are capable of designing computers and robots that are better than humans can today. Why it’s important: According to this concept, technological progress would have accelerated so much that machine intelligence would dominate, transfer- ring the contents of human brains and thought processes into a computing environment, making a form of immortality possible. structured query language (SQL) (p. 414) Standard language used to create, modify, maintain, and query relational data- bases. Why it’s important: SQL simplifies database use. transaction processing system (TPS) (p. 430) Computer- based information system that keeps track of the transac- tions needed to conduct business. Inputs are transaction data (such as bills or orders). Outputs are processed transactions (such as bills or paychecks). Why it’s important: The TPS helps supervisory managers in making operational decisions. virtual reality (VR) (p. 436) Computer-generated artificial reality that projects a person into a sensation of three- dimensional space. Why it’s important: VR is employed in simulators for training programs. CHAPTER REVIEW s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.” Self-Test Questions 1. According to the data storage hierarchy, databases are composed of ________ , ________ , ________ , ________ , and ________ . 2. An individual piece of data within a record is called a(n) ________ . 3. A(n) ________________ coordinates all activities related to an organization’s database.
  474. 453 Databases & Information Systems 4. ________________ is the right

    of people not to reveal information about themselves. 5. The five types of database models are ________ , ________ , ________ , ________ , and ________ . 6. ________ files contain software instructions; ________ files contain data. 7. ________ is done so that files require less storage space and take less time to transmit. 8. A single letter or number is considered a(n) ________ . 9. A(n) ________ is a logically organized collection of related data designed and built for a specific purpose. 10. A(n) ________ is a collection of related fields. 1 1. A(n) ________ is an automatic device that performs functions ordinarily performed by human beings. 12. The goal of ________ is to enable the computer to communicate with the user in the user’s native language. 13. ________ is a group of related technologies used for developing machines to emulate human qualities such as learning, reasoning, communicating, seeing, and hearing. 14. Devices that represent the behavior of physical or abstract systems are called ________ . 15. When unauthorized persons use your name to get cash and buy things, it is called ________ . 16. Most organizations have six departments: ________ , ________ , ________ , ________ , ________ , and ________ . 17. ________ is used to create, modify, maintain, and query relational databases. Multiple-Choice Questions 1. Which of the following is not an advantage of a DBMS? a. file sharing b. reduced data redundancy c. increased data redundancy d. improved data integrity e. increased security 2. Which of the following database models stores data in any form, including graphics, audio, and video? a. hierarchical b. network c. object-oriented d. relational e. offline 3. What are .exe, .bas, .pas, .jav, .dll, .sys, pdf., and .vbx examples of? a. programming languages b. file extensions c. databases d. data files e. master files 4. Which of the following qualities are necessary for infor- mation to be “good”? a. concise b. complete c. verifiable d. current e. all of these 5. Which of the following database models relates, or con- nects, data in different files through the use of a key, or common data element? a. hierarchical b. network c. object-oriented d. relational e. offline 6. Which of the following areas of study is not included in AI? a. pattern recognition b. fuzzy logic c. transaction processing systems d. natural language processing e. robotics 7. Which of the following levels is not a management level? a. strategic b. tactical c. hierarchical d. operational e. all of these are management levels True/False Questions T F 1. The use of key fields makes it easier to locate a record in a database. T F 2. A network database models data as facts, dimensions, or numerical measures for use in interactive analysis of large amounts of data for decision-making purposes. T F 3. A database is an organized collection of inte- grated files. T F 4. Data mining is used only for small databases. T F 5. A character is smaller than a field. T F 6. A report generator is a machine that produces electricity by calculating complex algorithms. T F 7. A data dictionary defines the basic organization of the database and contains a list of all files in the database. T F 8. Most types of storage media last indefinitely. T F 9. Expert systems are not interactive. T F 10. You need only software to create virtual reality. T F 1 1. A knowledge base is part of a natural language system. T F 12. Program files contain all the documents you have created.
  475. 454 Chapter 8 s t a g e 2 LEARNING

    COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Short-Answer Questions 1. Name three responsibilities of a database administrator. 2. What is data mining? 3. Briefly explain what a data warehouse is. 4. List four basic advantages provided by database man- agement systems. 5. What is the difference between a data file and a pro- gram file? 6. What are expert systems used for? 7. What is SQL? QBE? Oracle? Access? DB2? 8. Explain e-commerce. 9. What are some things you can do if identity theft hap- pens to you? 10. What are two problems regarding long-term digital storage? 11. What are intelligent agents used for? 12. What do you need to experience virtual reality? 13. What is the main difference between weak AI and strong AI? 14. What are the four main areas of artificial intelligence? 15. What is a DSS used for? An ESS? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” Knowledge in Action 1. Interview someone who works with or manages an organization’s database. What types of records make up the database? Which departments use it? What database structure is used? What are the types and sizes of storage devices? Are servers used? Was the database software custom-written? 2. Are you comfortable with giving away some of your pri- vacy for increased security? Why or why not? How far would you let the government go in examining people’s private lives? 3. Can identity theft be prevented? Propose some new solutions to this problem. 4. If you could design a robot, what kind would you cre- ate? What would it do? 5. If you could build an expert system, what would it do? What kinds of questions would you ask experts in order to elicit the appropriate information? 6. Should internet-purchased products or services have a sales tax (like items purchased in regular stores)? Why or why not? 7. Do you know someone who refuses to use the inter- net in any manner that requires entering any personal information whatsoever? Give some reasons for dis- agreeing and for agreeing with this person. Web Exercises 1. Have you ever thought of starting your own B2C busi- ness? Visit www.marketingterms.com/dictionary/b2c/ and read what the three major obstacles are for a suc- cessful B2C business. Search for other articles on this topic. If you decide to go ahead with your venture, will you use PayPal? Why or why not? Search for answers. 2. Visit these sites about data mining and the search for meaningfulness in large quantities of data: www.dmbenchmarking.com www.dmg.org www.anderson.ucla.edu/faculty/jason.frand/teacher/ technologies/palace/datamining.htm www.dwreview.com/Data_mining/index.html www.autonlab.org/tutorials/ What do you think the next technology will be for han- dling and analyzing massive amounts of data? 3. Grocery store loyalty cards ask consumers to trade away extremely detailed personal information in return for the promise of savings—which may in fact not exist. Some experts say the reason that stores offer cards is so that they can profile and target their custom- ers more accurately—not to give you savings but to increase their bottom line. Also, your personal informa- tion can be sold or traded to third parties. One way that grocery stores create customer pro- files is by the use of data mining. There are positive aspects to data mining, such as fraud detection, but there is a darker side to data mining, too. Stores may use the address information from your loyalty card application to match up your shopping history with data from other databases or public records (income, how much you paid for your house) so that the store knows what kinds of specials to offer you. Information about your shopping habits can be accessed with a subpoena or warrant and used against you in court proceedings. In a “trip-and-fall” case in California, a man shopping at a Southern California grocery store sued after falling in one of the aisles. It was reported (although the store denied it) that the store threatened to use his shopping history—which
  476. 455 Databases & Information Systems included large amounts of alcohol—against

    him in the proceedings. Some states limit the types of information that a grocery store can collect from you when you register for a loyalty card. For example, California state law prohibits a grocery store from requiring that you turn over your social security card or your driver’s license number. However, data matching techniques mean that this provides very little protection to your privacy rights. Find out more about loyalty cards. Start with the Seattle Press article at www.seattlepress.com/article- 9715.html. Then read the BusinessWeek article at www.businessweek.com/bwdaily/dnflash/jun2002/ nf20020620_7007.htm and the About.com article at http://couponing.about.com/od/groceryzone/ a/ loyaltyprograms.htm. Find a few more articles and then write a short report on the ethical aspects and the practical aspects of using loyalty cards. 4. How much information about you is out there? Run various search strings about yourself to see just how private your life is. 5. An extensive database featuring photographs of and detailed information on each inmate of the Florida Department of Corrections can be found at this website: www.dc.state.fl.us/inmateinfo/inmateinfomenu.asp Click on Search All Corrections Offenders Databases. Then, in the text boxes, type in a common last name and a common first name, and anything else you care to enter, and click on Submit Request. Click on any of the following links to see the offender records that matched your search criteria: Inmate Population Search Results Inmate Release Search Results Supervised Population Search Results Absconder/Fugitive Search Results What kind of databases do you think these are? Do you think such databases are useful? Ethical? If you think they are useful, give your reasons. 6. What is a DNA database? Visit the following websites to learn more: www.familyhelix.com/articles/national-dna-database/ index.php www.guardian.co.uk/uk/2005/apr/11/science.ukcrime www.ebi.ac.uk/embl/ http://ndbserver.rutgers.edu/ www.msnbc.com/news/710648.asp?cp1=1 7. Read the following articles regarding the Homeland Security Database: www.foxnews.com/story/0,2933,70992,00.html www.cdispatch.com/articles/2008/07/18/local_news/ area_news/area02.txt www.twotigersonline.com/resources.html www.msnbc.msn.com/id/13822662/ What is your opinion of the efficacy of such a data- base? Have you any concerns about the ethics or con- stitutionality of any aspects of this database? 8. Visit these websites for more information on identity theft: www.fool.com/ccc/check/check06.htm http://illinoisissues.uis.edu/features/2002mar/name. html www.usdoj.gov/criminal/fraud/websites/idtheft.html www.ftc.gov/bcp/edu/microsites/idtheft/ Are you putting yourself at risk? What can you do to improve your situation? 9. Virtual reality is being used in some surprising areas. Visit: http://coe.sdsu.edu/eet/articles/VRApps/start.htm www.answers.com/virtual%20reality?gwp=11 www.emedicine.com/neuro/TOPIC463.HTM www.sciencedaily.com/news/computers_math/ virtual_reality/ http://science.howstuffworks.com/virtual-military.htm http://cic.vtt.fi/4d/
  477. 457 THE CHALLENGES OF THE DIGITAL AGE Society & Information

    Technology Today 9 Chapter Topics & Key Questions 9.1 Truth Issues: Manipulating Digital Data What are some ways digitized output can be manipulated to fool people? 9.2 Security Issues: Threats to Computers & Communications Systems What are some key threats to computers? 9.3 Security: Safeguarding Computers & Communications What are the characteristics of the five components of security? 9.4 Quality-of-Life Issues: The Environment, Mental Health, Child Protection, & the Workplace How does information technology create environmental, mental-health, pornography, and workplace problems? 9.5 Economic & Political Issues: Employment & the Haves/Have-Nots How may technology affect employment and the gap between rich and poor?
  478. 458 Chapter 9 C omputers have invaluable uses for specialized

    work,” says San Francisco historian and commentator Harold Gilliam, “but we need to question the assumption that whatever ails modern society can be cured by more information.” Indeed, Gilliam goes on, many users “are hypnotized by the computer’s power to summon endless arrays of facts—information without context, data with- out values, knowledge without perspective.” 1 Such matters have taken on more urgency since the beginning of the war on terrorism that started on September 11, 2001, when terrorist-hijacked planes destroyed the World Trade Center Twin Towers in New York City and part of the Pentagon in Washington, D.C. The sense of urgency was reinforced by the 2005 terrorist bombings in London and then the 2008 attacks on the Taj Hotel in Mumbai, India. Will the resulting tougher security rules imposed everywhere (including on use of information technology) be beneficial? How can we evaluate the effect of more names in more databases, for instance, on lost privacy and even lost liberty? What kind of context or perspective will help us? As we mentioned in Chapter 8, one possible tool used by advocates at both ends of the political spectrum is cost- benefit analysis—to analyze the trade-offs of heightened security on privacy, convenience, and ease of move- ment. Even if we can’t always assign precise dollar amounts, it’s important to weigh issues in a way that will prevent security goals from overtaking common sense. 2 College students continually face issues of infor- mation technology about which benefits need to be balanced against costs. For instance, should the Department of Defense be allowed to collect infor- mation about students for a database designed for military recruiting purposes, and does that invade your privacy rights? 3 Should your Social Security number be used as a key identifier in campus records if there’s a chance low-paid clerks might steal it to apply for bogus credit cards? 4 Should laptops and wireless technology be allowed in classrooms if students will mainly use them to text and web surf instead of attending to the lecture? 5 Should online instructor rating systems be allowed if prospec- tive employers can also access them to see whether you mainly took easy courses? 6 Should there be tighter government scrutiny of foreign students, even though this may result in their going to other countries instead of to the United States? 7 Such are the examples of the many infotech challenges that confront us. Elsewhere in the book we have considered ergonomics (Chapter 5) and privacy (Chapter 8). In this chapter, we consider some other major issues: • Truth issues—manipulation of sound and images in digital data • Security issues—accidents, natural hazards, terrorism hazards, and crime • Quality-of-life issues—environment, mental health, child protection, the workplace • Economic and political issues—employment and the haves/have-nots The Mumbai terrorist attacks, November 2008, killed at least 173 people and wounded at least 308. Here firefight- ers try to douse the fire as smoke rises from the Taj Hotel building.
  479. The Challenges of the Digital Age 459 9.1 TRUTH ISSUES:

    Manipulating Digital Data What are some ways digitized output can be manipulated to fool people? The enormous capacities of today’s storage devices have given photographers, graphics professionals, and others a new tool—the ability to manipulate images at the pixel level. For example, photographers can easily do morphing — transforming one image into another—using image-altering software such as Adobe Photoshop. In morphing, a film or video image is displayed on a com- puter screen and altered pixel by pixel, or dot by dot. As a result, the image metamorphoses into something else—a pair of lips morphs into the front of a Toyota, for example, or an owl into a baby. The ability to manipulate digitized output—images and sounds—has brought a wonderful new tool to art. However, it has created some big new problems in the area of credibility, especially for journalism. How can we know that what we’re seeing or hearing is the truth? Con- sider the following. Manipulation of Sound Could I tell whether or not sound has been manipulated? In recent times, pop music vocals have been sounding “note- and pitch- perfect,” and even some hip-hop singers have been hitting their notes with exaggerated precision, points out one writer. How is this done? Through a technology called Auto-Tune that “can take a vocal and instantly nudge it onto the proper note or move it to the correct pitch. . . . it can transform wavering performance into something technically flawless.” 8 Unfortunately, when most songs seem to have perfect pitch, they are harder to differentiate from one another, leading to bland sameness. Technological manipulation of music is not new. In 2004, country music artist Anita Cochran released some new vocals, including a duet, “(I Wanna Hear) a Cheatin’ Song,” with Conway Twitty—who had died a decade before the song was written. The producers pulled snippets of Twitty’s voice from his recording sessions, put them on a computer hard drive in digital form, and used software known as Pro Tools to patch the pieces together. 9 Ten years earlier Frank Sinatra’s 1994 album Duets paired him through techno- logical tricks with singers like Barbra Streisand, Liza Minnelli, and Bono of U2. Sinatra recorded solos live in a recording studio. His singing partners, while listening to his taped performance on earphones, dubbed in their own voices. These second voices were recorded not only at different times but often, through distortion-free phone lines, from different places. The illu- sion in the final recording is that the two singers are standing shoulder to shoulder. Newspaper columnist William Safire called Duets “a series of artistic frauds.” Said Safire, “The question raised is this: When a performer’s voice and image can not only be edited, echoed, refined, spliced, corrected, and enhanced—but can be transported and combined with others not physically present—what is performance? . . . Enough of additives, plasticity, virtual venality; give me organic entertainment.” 10 Some listeners feel that the technology changes the character of a performance for the better. Others, however, think the practice of assembling bits and pieces in a studio drains the music of its essential flow and unity. Whatever the problems of misrepresentation in art, however, they pale beside those in journalism. What if, for example, a radio station were to edit a stream of digitized sound so as to misrepresent what actually happened? ethics
  480. 460 Chapter 9 Manipulation of Photos How can digitally distorted

    photographs be detected? When in 2005 editors at Newsweek ran a cover photo of style guru Martha Stewart, who had been sent to prison for lying to federal investigators, they put a photo of her face on someone else’s body, making the 63-year-old look terrific after five months behind bars. 11 When O. J. Simpson was arrested in 1994 on suspicion of murder, a Time artist working with a computer modified the police department mug shot and darkened the image so that O.J.’s face had a sinister cast to it. ( Newsweek ran the mug shot unmodified.) 12 Should a magazine that reports the news be taking such artistic license? At the least, shouldn’t magazines be running credit lines (as the New York Times Magazine often does) that say something such as “Photographic illustration by X” or “Photomon- tage by Y, with digital manipulation by Z”? 13 The creator of the image-editing program known as Photoshop in 1989, John Knoll, said later, “Mostly we saw the possibilities, the cool things, not how it would be abused.” 14 But Photoshop and similar programs designed to edit (“morph”) digital images can also be used to distort and falsify them. In one case a Danish computer company employee created an image purporting to show a photo from a 1954 issue of Popular Mechanics of what a future home computer was expected to look like. ( • See Panel 9.1.) Before the 2004 presidential election, opposition groups, in an attempt to harm Democratic candidate John Kerry’s election bid, circulated a composite photo, made of two photos taken a year apart, that purported to show Kerry and actress Jane Fonda, known for her anti–Vietnam War views, on a speaker’s platform at a 1971 antiwar rally. The Boston Globe published manip- ulated photos of alleged sexual abuse of Iraqi women by U.S. soldiers, images taken from a pornographic website. 15 panel 9.1 Photo manipulation A manipulated photo of a mock submarine console was passed off as a 1950s projection of the 2004 home computer. A well- known CEO of a computer technology company actually used the photo, believing it was real, dur- ing a speech in 2004. The image was created by a Danish hardware and software distributor, who originally entered it in a photo-manipulation contest. He said he had not intended to create a believable fake.
  481. The Challenges of the Digital Age 461 The potential for

    abuse is clear. “For 150 years, the photographic image has been viewed as more persuasive than written accounts as a form of ‘evi- dence,” says one writer. “Now this authenticity is breaking down under the assault of technology.” 16 Asks a former photo editor of the New York Times Magazine, “What would happen if the photograph appeared to be a straight- forward recording of physical reality, but could no longer be relied upon to depict actual people and events?” 17 Fortunately, some steps are being taken to combat this kind of digital decep- tion. Corbis, the online stock photo agency, places an imperceptible digital watermark on the 100 million images it makes available, which encodes infor- mation about the owner of the image within the pixels of the photograph and can be traced even if the image has been modified. 18 In another technique, Dartmouth College computer science professor Hany Farid has devised algo- rithms that can detect changes in photographic images, provided the pictures are uncompressed. (Compressed files are harder.) Electrical and computer engineering professor Jessica Fridrich, of the State University of New York at Binghamton, is doing research in which a digital camera would take a picture of a subject and at the same time a picture of the photographer’s iris, a distinc- tive form of identification, that would be hidden inside the larger picture just taken. 19 Manipulation of Video & Television Can videos and films be manipulated to present a different reality? The technique of morphing, used in still photos, takes a massive jump when used in movies, videos, and television commercials. Digital image manipula- tion has had a tremendous impact on filmmaking. Director and digital pio- neer Robert Zemeckis (Death Becomes Her) has compared the technology to the advent of sound in Hollywood. 20 It can be used to erase jet contrails from the sky in a western and to make digital planes do impossible stunts. It can even be used to add and erase actors. For instance, actor Steve McQueen, who died in 1980, was revived in his character of Lt. Frank Bullitt, from the film Bullitt, to promote the 2005 redesigned Ford Mustang in a commercial called “Cornfield.” Films and videotapes are widely thought to accurately represent real scenes. Thus, the possibility of digital alterations raises some real problems. Video- tapes supposed to represent actual events could easily be doctored. Another concern is for film archives: Because digital videotapes suffer no loss in reso- lution when copied, there are no “generations.” Thus, it will be impossible for historians and archivists to tell whether the videotape they’re viewing is the real thing or not. Indeed, it is possible to create virtual images during live television events. These images—such as a Coca-Cola logo in the center of a soccer field—don’t exist in reality but millions of viewers see them on their TV screens. Accuracy & Completeness What are five limitations I should be aware of when using databases for research? Databases—including online encyclopedias such as Wikipedia—can provide you with more facts and faster facts but not always better facts. Penny Wil- liams, professor of broadcast journalism at Buffalo State College in New York and formerly a television anchor and reporter, suggests five limitations to bear in mind when using databases for research: 21 YOU CAN’T GET THE WHOLE STORY For some purposes, databases are only a foot in the door. There may be many facts or facets of the topic that are not in Survival Tip Is It True? Snopes.com, a website for debunking urban legends and hoaxes, includes a section on composite photos, some true, some fake. Go to: www.snopes.com
  482. 462 Chapter 9 a database. Reporters, for instance, find a

    database is a starting point. It may take intensive investigation to get the rest of the story. IT’S NOT THE GOSPEL Just because you see something on a computer screen doesn’t mean it’s accurate. Numbers, names, and facts must be verified in other ways. For instance, because in the past nearly anyone could contribute to Wikipedia, physicians have questioned the reliability of medical entries on that site. 22 KNOW THE BOUNDARIES One database service doesn’t have it all. For exam- ple, you might find full text articles from the New York Times on one service, from the Wall Street Journal on another, and from the Los Angeles Times on yet another, but no service carrying all three. FIND THE RIGHT WORDS You have to know which keywords (search words) to use when searching a database for a topic. As Lynn Davis, a professional researcher with ABC News, points out, if you’re searching for stories on guns, the keyword “can be guns, it can be firearms, it can be handguns, it can be pis- tols, it can be assault weapons. If you don’t cover your bases, you might miss something.” 23 HISTORY IS LIMITED Most public databases, Davis says, have informa- tion going back to 1980, and a few into the 1970s, but this may pose prob- lems if you’re trying to research something that happened—or was written about—earlier. 9.2 SECURITY ISSUES: Threats to Computers & Communications Systems What are some key threats to computers? Internet users just don’t have “street smarts” about online safety, one survey found, and that makes them vulnerable. 24 And another study suggested that while users think they are able to recognize when they are being manipulated, either legally or illegally, in fact they are quite naïve. 25 As one might expect, most Americans now believe that the government should do more to make the internet safe, even though they don’t trust the federal institutions, such as Congress and the Federal Trade Commission, that are responsible for creating and enforcing the laws online. 26 But there is much that we as individuals can and must do to protect our own security. Security issues go right to the heart of the workability of computer and communications systems. Here we discuss the following threats. ( • See Panel 9.2.) • Errors and accidents • Natural hazards • Computer crimes • Computer criminals Errors & Accidents What are the kinds of errors and accidents I need to be alert for in computer systems? In general, errors and accidents in computer systems may be classified as human errors, procedural errors, software errors, “dirty data” problems, and elec- tromechanical problems.
  483. The Challenges of the Digital Age 463 HUMAN ERRORS Which

    would you trust—human or computer? If you were a pilot and your plane’s collision-avoidance computer tells you to ascend but a human air-traffic controller tells you to descend, which order would you fol- low? In 2001, a Russian pilot near the Swiss-German border ignored his com- puter (against mandatory regulations) and complied with erroneous human orders, resulting in a collision with another plane. 27 Human errors can be of several types. Quite often, when experts speak of the “unintended effects of technology,” what they are referring to are the unex- pected things people do with it. Among the ways in which people can compli- cate the workings of a system are the following: 28 • Humans often are not good at assessing their own information needs: For example, many users will acquire a computer and communications system that either is not sophisticated enough or is far more complex than they need. • Human emotions affect performance: For example, one frustrating experience with a computer is enough to make some people abandon the whole system. But smashing your keyboard isn’t going to get you any closer to learning how to use it better. • Humans act on their perceptions, which may not be fast enough to keep up: In modern information environments, human perceptions are often too slow to keep up with the equipment. Human perception may be affected by information overload, for example, or vagueness about the value of information, as happened when English government workers carelessly lost computer disks containing personal and financial details about 25 million residents worth $2.5 billion on the black market. 29 It may also be affected by unwarranted self-assurance about one’s own abilities, as happens every day when people text on the itty-bitty keyboards of their cellphones in cars hurtling along at 65 miles per hour (a topic we take up later in the chapter). PROCEDURAL ERRORS Some spectacular computer failures have occurred because someone didn’t follow procedures. In 1999, the $125 million Mars Climate Orbiter was fed data expressed in pounds, the English unit of force, Threat Category Types of Threats Errors and accidents • Human errors • Procedural errors • Software errors • Electromechanical problems • “Dirty data” problems Natural hazards Computer crimes • Theft of hardware • Theft of software • Theft of online music and movies • Theft of time and services • Theft of information • Internet-related fraud • Taking over your PC: zombies, botnets, and blackmail • Crimes of malice: crashing entire systems Computer criminals • Individuals or small groups • Employees • Outside partners and suppliers • Corporate spies • Foreign intelligence services • Organized crime • Terrorists panel 9.2 Threats to computers and communications systems
  484. 464 Chapter 9 instead of newtons, the metric unit (about

    22% of a pound). As a result, the spacecraft flew too close to the surface of Mars and broke apart. 30 A few years earlier, Nasdaq, the nation’s second-largest stock market, was shut down for 2½ hours by an effort, ironically, to make the computer system more user- friendly. Technicians were phasing in new software, adding technical improve- ments a day at a time. A few days into this process, technicians trying to add more features to the software flooded the data storage capability of the com- puter system. The result was to delay the opening of the stock market and shorten the trading day. In 2001, a failed software upgrade halted trading on the New York Stock Exchange for an hour and a half. 31 In 2009, a highly con- fidential document listing U.S. nuclear sites was inadvertently posted on the Government Printing Office’s website. 32 SOFTWARE ERRORS We are forever hearing about “software glitches” or “soft- ware bugs.” A software bug is an error in a program that causes it not to work properly. For example, in 2008 experts found a software glitch that would have allowed attackers to gain control of water treatment plants, natural gas pipelines, and other utilities. 33 Also in 2008, patients at Veterans Administration health centers were given incorrect drug doses, were delayed in treatments, and experi- enced other medical errors because of software glitches in health records. 34 “DIRTY DATA” PROBLEMS When keyboarding a research paper, you undoubt- edly make a few typing errors (which, hopefully, you clean up). So do all the data-entry people around the world who feed a continual stream of raw data into computer systems. A lot of problems are caused by this kind of “dirty data.” Dirty data is incomplete, outdated, or otherwise inaccurate data. A good reason for having a look at your records—credit, medical, school—is so that you can make any corrections to them before they cause you complica- tions. Although databases are a time-saving resource for information seekers, they can also act as catalysts, speeding up and magnifying bad data. ELECTROMECHANICAL PROBLEMS: ARE “NORMAL ACCIDENTS” INEVITA- BLE? Mechanical systems, such as printers, and electrical systems, such as cir- cuit boards, don’t always work. They may be faultily constructed, get dirty or overheated, wear out, or become damaged in some other way. Two examples: • Electrical problems: Power failures (brownouts and blackouts) can shut a system down. Power surges can also burn out equipment. One major area of concern is that as information technology spreads, lightning strikes that once simply made the houselights flicker will now burn out computers, phones, web connections, and servers. Since some areas experience more electrical hits than other areas do, lightning frequency could significantly affect regional economies. 35 • Voting machine breakdowns: As examples of how badly information technology can work, we have only to consider failures in voting machines, when printers jammed, servers crashed, and poorly designed touch-screen ballots led voters to make mistakes that invalidated their votes. 36 Modern systems are made up of thousands of parts, all of which interrelate in ways that are impossible to anticipate. Because of that complexity, argues Yale University sociologist Charles Perrow, what he calls “normal accidents” are inevitable. 37 That is, it is almost certain that some combinations of minor failures will eventually amount to something catastrophic. Indeed, it is just such collections of small failures that led to catastrophes such as the blowing up of the Challenger space shuttle in 1986 and the near-meltdown of the Three Mile Island nuclear-power plant in 1979. In the Digital Age, “normal accidents” will not be anomalies but are to be expected. They will also, suggests urbanist and philosopher Paul Virilio, be more global in their impact. 38
  485. The Challenges of the Digital Age 465 All these considerations

    suggest that we need to take a hard look at the concept of storing all our information “in the cloud”—that is, online instead of on our own personal computers. Putting all our information online means we can never be quite sure who has access to it or whether it might be destroyed, either deliberately or inadvertently. 39 Natural Hazards What kind of natural hazards in my area might be a threat to my computer system? Some disasters do not merely lead to temporary system downtime; they can wreck the entire system. Examples are natural hazards. Whatever is harmful to property (and people) is harmful to computers and communications systems. This certainly includes natural disasters: fires, floods, earthquakes, tornadoes, hurricanes, blizzards, and the like. If they inflict damage over a wide area, as have ice storms in eastern Canada or hur- ricanes in the Gulf Coast states, natural hazards can disable all the electronic systems we take for granted. Without power and communications connec- tions, cellphones, automated teller machines, credit card verifiers, and bank computers are useless. Computer Crimes What are examples of various crimes involving computers and computer systems? Because of the opening of borders, the growth of low-cost international trans- portation, and the rise of the internet, crime in general has become global- ized, and computer crime is a big part of it. 40 A computer crime can be of two types. (1) It can be an illegal act perpetrated against computers or telecommunications, or (2) it can be the use of computers or telecommunications to accomplish an illegal act. The following are crimes of both types. THEFT OF HARDWARE Hardware theft can range from shoplift- ing an accessory in a computer store to removing a laptop or cellular phone from someone’s car. Professional criminals may steal shipments of microprocessor chips off a loading dock or even pry cash machines out of shopping-center walls. College students are frequent targets. At the University of Nevada, Reno, one student left her laptop on a study desk at the Knowledge Center while she went to the restroom, and it was gone when she returned. Another left his $2,500 MacBook Pro in a backpack in a stack of cubbies at the student union café. “The cubbies have metal loops that students can slip through their backpacks and they bring a lock to secure them so a thief can’t grab it and run,” said a campus police officer. “But nobody locks them up.” 41 THEFT OF SOFTWARE Pirated software, as we stated in Chapter 3, is software obtained illegally, as when you make an illegal copy of a commercial video- game. This is so commonplace that software makers secretly prowl electronic bulletin boards in search of purloined products and then try to get a court order to shut down the bulletin boards. They also look for organizations that “softlift”—companies, colleges, or other institutions that buy one copy of a program and make copies for many computers. In addition, software pirates often operate in China, Taiwan, Mexico, Russia, and various parts of Asia and Latin America, where the copying or counterfeiting of well-known software programs is practiced on a large scale. In some countries, most of the U.S. microcomputer software in use is thought to be illegally copied. Survival Tip Keeping Track of Your Cellphone Here are some ways to avoid losing your cellphone: • Tape your name and contact info to your phone. • When traveling, check seats (plane, bus) and hotel rooms when leaving. • Consider paying for a device-finding service in case you lose it. • When going through airport security, put your phone in your carry-on bag. • Back up your phone’s direc- tory to your PC at home. Laptop on a car seat. Comput- ers left in cars are temptations for smash-and-grab thieves. Survival Tip Reporting Software Pirates Software pirates can be reported to: www.siia.net/piracy/default. asp www.idsa.com/piracy.html www.elspa.com/?cϭ/ menu/&mϭpiracy
  486. 466 Chapter 9 Many software pirates are reported by coworkers

    or fellow students to such organizations as the Software and Information Industry Association, the Interactive Digital Software Association, and the Entertainment and Leisure Software Publishers Association. THEFT OF ONLINE MUSIC & MOVIES Many students may feel that illegally downloading music and movies is a victimless crime, but to the entertainment industry it is just plain piracy or theft. • Stealing music: College students were quick to discover the internet music service Napster, which in its original form allowed millions of people to exchange songs for free. 42 Then, as illegal file swapping shifted from client/server services like Napster to peer-to-peer services like Kazaa, Grokster, Limeware, and StreamCast and music-CD sales shrank, music companies decided to go after downloaders. They did so by getting their names and addresses from internet access providers and by deploying electronic “robots” to monitor traffic on file-swapping networks and seek out Internet Protocol (IP) addresses. In a recent year, for example, the record industry filed copyright infringement lawsuits against students illegally downloading songs on file-sharing networks at 21 college campuses. Some settled, at fees ranging from $2,000 to $10,000 and fines of $12,000 to $17,500. 43 The U.S. Supreme Court also ruled against a pair of file-sharing networks, and two days later record companies sued 784 people for illegally distributing songs from the networks. 44 In 2009, a Minnesota woman, Jammie Thomas- Rasset, 32, was compelled by a federal jury to pay record companies $80,000 for each of 24 songs ($1.92 million total) that she illegally shared on a file-sharing site. 45 (People who download music illegally are liable for damages as high as $150,000 per song. Fortunately, student sharing of music files has declined drastically.) 46 • Stealing movies: The film industry has also taken aggressive aim at pirated movies. For instance, in 2005 the government announced an 11-nation crackdown on organizations called “warez” (pronounced “wares”), groups that are sort of underground internet co-ops set up to trade in copyrighted materials. Four men were charged with conspiring to violate copyright laws for operating an internet site that offered stolen movies. 47 Still, illegal movie downloads by digital pirates continue to cost the film industry billions every year; one film, X-Men Origins: Wolverine, even appeared online a full month before its scheduled theater release date. 48 Piracy of intellectual property, whether software, music, or movies, ulti- mately harms everyone, directly or indirectly, because, says one writer, “thieves do not invest in research, design, production, development, or advertising.” The result is “fewer advances in science, fewer new products, fewer new music CDs, fewer new movies, less new software, and higher prices for whatever is created.” 49 While piracy will never entirely disappear, however, it seems that new business models, such as the Apple iTunes store, which sells songs for as low 69 cents per download, (and $1.29 for the biggest hits), are replacing the older systems of distribution. 50 THEFT OF TIME & SERVICES The theft of computer time is more common than you might think. Probably the biggest instance is people using their employer’s computer time to play games, do online shopping, or dip into web pornogra- phy. Some people even operate sideline businesses. For years “phone phreaks” have bedeviled the telephone companies. For example, they have found ways to get into company voice mail systems and then use an extension to make long-distance calls at the company’s expense. They have also found ways to tap into cellular phone networks and dial for free. Satellite-TV piracy has also grown at an alarming rate.
  487. The Challenges of the Digital Age 467 THEFT OF INFORMATION

    Paris Hilton, the heiress and reality-TV personality, woke up one day to report that her Sidekick—a high-tech device that com- bines phone, organizer, and camera and also allows users to send and receive email—had been hacked, and all her contact information for her social net- work (and some racy photos) had been posted on the internet. During the same week, ChoicePoint Inc., one of the largest buyers and sellers of personal data, announced that criminals posing as legitimate buyers had purchased sensi- tive information on about 145,000 people. 51 This, however, was small pota- toes compared to data thefts still to come: In 2009, a cracker stole more than 500,000 patient records from a state-run database that tracked prescriptions in Virginia and demanded ransom for the return of the information. 52 Also in that year, a young American and two Russian accomplices were indicted for carrying out the largest computer data theft in history, charged with stealing data from more than 130 million credit and debit cards. 53 Clearly, information thieves are having a field day. They have infiltrated the files of the Social Security Administration, stolen confidential personal records, and sold the information. On college campuses, they have snooped on or stolen private information such as grades. They have broken into comput- ers of the major credit bureaus and stolen credit information and have then used the information to charge purchases or have resold it to other people. They have plundered the credit card numbers of millions of Americans and sold stolen identity data to conspirators in other countries. 54 INTERNET-RELATED FRAUD Internet or online service fraud is a runaway problem, accounting for 90% of all consumer-fraud complaints to the Fed- eral Trade Commission in 2008. The most common complaints, according to the Internet Crime Complaint Center, were nondelivery of merchandise and/or payment (32.9%), internet auction fraud (25.5%), and credit/debit card fraud (9.0%). 55 • The Nigerian letter scam: An example of a classic kind of confidence fraud is the persistent one known as the Nigerian letter scam. Most Nigerian-letter perpetrators claim to have discovered inactive or delinquent accounts that hold vast amounts of money ready to be claimed. Victims are given a chance to receive nonexistent government money, often from the “Government of Nigeria,” as long as they pay a fee to help transfer the money to an overseas account. Similar kinds of cyberspace fraud involve nonexistent investment deals and phony solicitations. • Other scams, including Evil Twin attacks: The majority of scams involve ruses such as those we described in Chapters 2 and 6. Among them are Survival Tip Fraud Baiters The following websites tell sto- ries about outwitting online fraud artists. “419” refers to a section of the Nigerian legal code. www.scamorama.com www.419eater.com www.b2g4.com/boards/board. cgi?userϭakerenx www.419legal.org www.aa419.org www.scamvictimsunited.com
  488. 468 Chapter 9 phishing (sending emails that appear to come

    from a trusted source, which direct you to a website where you’re asked to reveal personal information), pharming (in which malicious software is implanted in your computer that redirects you to an impostor web page), and Trojan horses (a program such as a screen saver that carries viruses that perpetuate mischief without your knowledge). 56 A variant on conventional phishing is Wi-Fi phishing, known as the Evil Twin attack, in which a hacker or cracker sets up a Wi-Fi hot spot or access point that makes your computer think it’s accessing a safe public network or your home network and then monitors your communications and steals data you enter into a website, if the computer doesn’t have the right security measures. Some internet access providers offer phishing-site blockers. “Wireless users should enter private information only into sites that protect data with encryption technology,” advises one article, “which is signi- fied by a little lock on the bottom of the page.” 57 TAKING OVER YOUR PC: ZOMBIES, BOTNETS, & BLACKMAIL Betty Carty, 54, a New Jersey grandmother of three, was flabbergasted when her internet access provider curtailed her outbound email privileges. The reason: an intruder had taken over her PC without her knowledge and turned it into a device for dis- seminating as many as 70,000 emails a day. 58 Carty’s machine had become what is known as a zombie, or drone, a com- puter taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels. The New Jersey woman’s PC, however, was only one of several home and business personal computers in what is known as a botnet, short for “robot network,” a network of com- puters compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the person controlling that network. These remote-controlled networks are best detected by the inter- net access provider, which can block the illicit network connections and help users disinfect their PCs. The zombie computers and botnet are used to launch phishing attacks or send spam messages. They can also be used to launch denial-of-service attacks, perhaps to extort money from the targeted sites in return for halting the attacks. For instance, one cyber-blackmailer threatened to paralyze the servers of a small online-payment processing company unless it sent a $10,000 bank wire—and when the company refused, its servers were bombarded with barrages of data for four days. 59 Blackmail has also been used in conjunction with the theft of credit card numbers or documents. 60 One thief broke into the systems of internet retailer CD Universe, stole 300,000 customers’ credit card numbers, and when the company’s executives refused to pay a ransom demand, sold them off piecemeal on the internet (for others to illegally charge on) until he was stopped. CRIMES OF MALICE: CRASHING ENTIRE SYSTEMS Sometimes criminals are more interested in abusing or vandalizing computers and telecommunica- tions systems than in profiting from them. For example, a student at a Wis- consin campus deliberately and repeatedly shut down a university computer system, destroying final projects for dozens of students; a judge sentenced him to a year’s probation, and he left the campus. In 2003, the website of WeaKnees, an online seller of digital video recorders, was overwhelmed by an electronic attack that knocked out its email system for weeks, the result of cyber- mercenaries allegedly hired by an entrepreneur who had been rebuffed by WeaKnees over a proposed business deal. 61 Other kinds of malevolent attacks could be far more serious, as follows. • Attacks on power-control systems: One possibility that concerns security specialists is cyberattacks on the nation’s water, power,
  489. The Challenges of the Digital Age 469 transportation, and communications

    systems, causing them to crash and disrupting services to thousands, even millions, of people. 62 This has already happened in at least one instance, when in 2009 someone severed eight fiber-optic cables in California’s Silicon Valley, cutting out cellphone, landline, ATM, and internet service to more than 100,000 people. 63 Also in 2009, cyberspies, probably from China and Russia, penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system. 64 • Attacks on the internet—could the entire net crash? Also quite worrisome is the possibility of an attack on the internet that could actually crash the whole worldwide network. This would involve crackers’ tampering with something called the border gateway protocol, which individual networks use to announce their routes so they can carry each other’s messages. By falsifying the announcements, a cracker could direct messages to nonexistent routes, thereby overloading and perhaps crashing parts of the internet. On a few occasions, parts of a large internal networking company have been made to disappear, so that no contact could be made for several hours, which shows that a real threat may exist. The reason it hasn’t hap- pened yet, speculates one pair of writers, is that “hackers, thieves, and terrorists have come to depend on the internet just like everyone else, and don’t want it wrecked.” 65 Computer Criminals What kind of people are threats to computers? Known as the most remote city in the lower 48 states, Ely is a desert town of 4,000 or so residents located on the eastern edge of Nevada. Yet the day after the 2003 war with Iraq began, computers at a 40-bed hospital in Ely came under electronic attack. Initially this was traced to an Arab news network, sug- gesting cyberterrorism, but later it was pinned to a source in the former Soviet Union. “Here’s tiny Ely, a place where people leave doors unlocked, and we get hacked by the Russian Mafia, who are pretending to be Arab,” said a hos- pital technology manager. “We may be remote in geography, the most distant city from any metropolitan area, but with the internet we might as well be in downtown New York or Los Angeles.” 66 As this report shows, there’s almost no telling where the next threat to com- puter security will come from. In Chapter 6, we considered threats in the form of hackers, crackers, and cyberterrorists. Let us expand this discussion to con- sider some other threats. INDIVIDUALS OR SMALL GROUPS Earlier we discussed phishers, pharmers, and creators of spyware and viruses, along with various types of crackers and hackers. These include individuals or members of small groups who use fraud- ulent email and websites to obtain personal information that can be exploited, either for monetary gain or sometimes simply to show off their power and give them brag- ging rights with other members of the hacker/ cracker community. EMPLOYEES In one survey of 1,009 chief security officers and security experts, the opinion was that the people who posed the greatest threat to their company’s technology infrastructure as a result of cyberattacks were current employees (53%), former employees (10%), and nonemployees (28%). 67 Actually, preventing theft and fraud by employees—of
  490. info! more 470 Chapter 9 all kinds of things, not

    just information technology—is a huge problem, espe- cially for small businesses. For instance, in 2008, retailers in one survey lost $36.5 billion to theft, or 1.5% of overall sales; employee theft and shoplifting accounted for $28.6 billion of those losses. 68 Unfortunately, although crime is soaring in cyberspace, many companies keep it quiet—in part because cyber- crime is harder to detect than crime in the real world. 69 Workers may use information technology for personal profit or to steal hardware or information to sell. They may also use it to seek revenge for real or imagined wrongs, such as being passed over for promotion; indeed, the dis- gruntled employee is a principal source of computer crime. 70 OUTSIDE PARTNERS & SUPPLIERS Suppliers and clients may also gain access to a company’s information technology and use it to commit crimes, especially since intranets and extranets have become more commonplace. Partners and vendors also may be the inadvertent source of hacker mischief because their systems may not be as well protected as the larger partner’s networks and computers, and so a third party may penetrate their security. CORPORATE SPIES Competing companies or individuals may break into a company’s computer system to conduct industrial espionage—obtain trade secrets that they can use for competitive advantages. In France, for example, investigators stumbled on an incident in which a hacker illegally collected data on Greenpeace, which opposes nuclear power, on behalf of Électricité de France, the world’s largest operator of nuclear power plants, to collect infor- mation on antinuclear campaigners. 71 ORGANIZED CRIME Members of organized crime rings not only steal hard- ware, software, and data; they also use spam, phishing, and the like to commit identity theft and online fraud. Even street gangs now have their own web- sites, most of them perfectly legal, but some of them possibly used as chat rooms for drug distribution. 72 In addition, gangs use computers the way legal businesses do—as business tools—but they use them for illegal purposes, such as keeping track of gambling debts and stolen goods. CYBERWAR FIGHTERS Cyberwarfare, or cyberwar, is the use of comput- ers and the internet to attack an enemy’s information systems. Attacks on U.S. government computer networks increased 40% in 2008, according to the U.S. Computer Emergency Readiness team. 73 In April 2009, the Pen- tagon reported it spent more than $100 million in the previous six months responding to and repairing damage from cyberattacks and other computer network problems. 74 Computer spies even broke into the Pentagon’s Joint Strike Fighter project. 75 Cyberwar may be conducted on the level of psy- chological warfare, as has happened in the Middle East, for instance, where Israeli and Palestinian opponents in the Gaza war have used cellphones to warn the other side of impending attacks. 76 Or it may be conducted as a tactical maneuver in which one side hacks into the others side’s computers and alters information that drives them into the first side’s gunsights, as the Americans did with members of Al Qaeda in Iraq. 77 Or it may be on the scale of widespread cyberattacks on government websites, such as those North Korea inflicted on South Korea and the United States (where Trea- sury Department and Federal Trade Commission websites were shut down). 78 Recognizing these dangers, the government made online security a high priority, with President Electronic Monitoring The 2007 Electronic Monitoring & Surveillance Survey states that 28% of U.S. companies have fired employees for email misuse; 66% of employers monitor employees’ use of the internet. Read about the report at: www.gpsdaily.com/reports/ The_2007_Electronic_ Monitoring_And_ Surveillance_Survey_999.hml A member of the Dutch bomb squad with a security robot at Schiphol Airport terminal 1 after examining a suspicious suitcase found in the luggage department.
  491. The Challenges of the Digital Age 471 Peter Whitney, 27,

    launched an internet blog chroni- cling his life, friends, and job handling mail and the front desk at a division of Wells Fargo—and he prob- ably would have been all right until he began criti- cizing a few people he worked with and he was fired.83 That’s when he learned that his employers had been monitoring his online activity. (Today most people are more cautious; in one poll, 57% of respondents said they would consider what their boss might think when they post comments, photos, and the like on social-network websites, versus 37% who said they would not.)84 More and more employers are using surveillance tech- niques to monitor their employees, from using cameras and phone taps to recording website visits and visiting the files that employees delete. Snooping on email is now standard workplace procedure, with 60% of companies in one survey saying they now use some type of software to watch incom- ing and outgoing employee electronic mail.85 In most states, the companies don’t have to inform employees of this fact. (Connecticut and Delaware are exceptions.) In addition, soft- ware is available to measure the performance and activities of independent workers such as those working from home across the country.86 What are employers looking for that you should be aware of? Here are the principal areas. Less Productivity There’s a word for all those hours employees spend each workday talking on the phone with friends, getting coffee, or gossiping—“undertime.” Some such goofing off is tolerated in the name of workplace morale. The internet, however, has created whole new ways to slack off at work. One 2002 sur- vey of 305 human resource managers and 250 employees found that workers spent an average of 8.3 hours a week (more than an entire workday) peeking at non-work-related websites. The sites that employees said they visited most were news (67%), shopping (37%), gambling (2%), and por- nography (2%).87 Misleading Résumés Employers are carrying out more rigorous background checks on prospective workers since the September 11, 2001, terrorist attacks in New York City and Washington, D.C. Among the problems not listed on résumés or application forms that turned up in 1.8 million background checks by one screening company: driving violations (35%—moving violations, driving while intoxicated, or suspended license); poor credit records (26%—judgment, lien, bankruptcy, or PRACTICAL ACTION Is the Boss Watching You? Trust in the Workplace collection agency activity); lack of job and/or education (24%); and criminal record (6%).88 Fraud Fraud is a major concern of employers. For example, a sur- vey of 53 computer security officers and senior security executives found that they are most concerned about fraud by employees (55%), hackers (38%), and business partners or vendors (8%), in that order.89 A poll of 617 workers found that one in five employees say they’ve witnessed fraud in the workplace, saying their coworkers are doing the fol- lowing: taking office supplies and shoplifting (37%), steal- ing products or cash (25%), claiming extra hours worked (18%), inflating expense accounts (8%), accepting kickbacks from suppliers (6%), and doing phony bookkeeping (3%).90 Of great concern to employers is web fraud, as when com- panies are ripped off by people with stolen credit card numbers.91 Risk of Lawsuits & Viruses One reason corporate executives are becoming more aggressive about spying on employees is that, besides fer- reting out job shirkers and office-supply thieves, “they have to worry about being held accountable for the misconduct of their subordinates,” says one report. “Even one offen- sive email message circulated around the office by a single employee can pose a liability risk for a company” under fed- eral anticorruption and corporate governance laws.92 In addition, employers are worried about workers using company computers to download copyrighted music and movies, because these acts not only are a drain on cor- porate resources but also expose employers to the risk of lawsuits from record and movie companies as well as open company networks to viruses.93 What Employers Must Do: Shred Personal Data On the other hand, employees catch a break under part of the Fair and Accurate Credit Transactions Act passed in late 2003. Regardless of size, employers must destroy—by “shredding or burning” or “smashing or wiping”—any per- sonal information about employees before they throw it out if they got the information from a credit report.94 In addition, employees transmitting text messages from devices supplied by their employer caught a break in 2008 when the Ninth U.S. Circuit Court of Appeals in San Francisco ruled that companies transmitting those messages can’t disclose their contents without the recipient’s consent.95
  492. 472 Chapter 9 Barack Obama appointing a cybersecurity coordinator within

    the White House and introducing a plan for stemming cyberthreats. 79 The Pentagon also created a new agency called the Cyber Command to centralize and elevate cybersecu- rity. 80 A decade behind China, the U.S. is also now officially focused on using cyberwarfare offensively as well as defensively. 81 The new cybersecurity strat- egy supposedly will provide protections for personal privacy and civil liberties. However, Pentagon officials say these will be difficult to implement. 82 9.3 SECURITY: Safeguarding Computers & Communications What are the characteristics of the five components of security? The ongoing dilemma of the Digital Age is balancing convenience against security. Security is a system of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss. We consider five components of security. • Deterrents to computer crime • Identification and access • Encryption • Protection of software and data • Disaster-recovery plans Deterrents to Computer Crime What are some ways to deter computer crime? As information technology crime has become more sophisticated, so have the people charged with preventing it and disciplining its outlaws. ENFORCING LAWS Campus administrators are no longer being quite as easy on offenders and are turning them over to police. Industry organizations such as the Software Publishers Association are going after software pirates large and small. (Commercial software piracy is now a felony, punishable by up to 5 years in prison and fines of up to $250,000 for anyone convicted of stealing at least 10 copies of a program, or more than $2,500 worth of software.) Police departments as far apart as those in Medford, Massachusetts, and San Jose, California, now have officers patrolling a “cyber beat.” They regularly cruise online bulletin boards and chat rooms looking for pirated software, stolen trade secrets, child molesters, and child pornography. CERT: THE COMPUTER EMERGENCY RESPONSE TEAM In 1988, after one wide- spread internet break-in, the U.S. Defense Department created the Computer Emergency Response Team (CERT). Although it has no power to arrest or pros- ecute, CERT provides round-the-clock international information and security- related support services to users of the internet. Whenever it gets a report of an electronic snooper, whether on the internet or on a corporate email system, CERT stands ready to lend assistance. It counsels the party under attack, helps thwart the intruder, and evaluates the system afterward to protect against future break-ins. TOOLS FOR FIGHTING FRAUDULENT & UNAUTHORIZED ONLINE USES Among the tools used to detect fraud are the following: • Rule-based-detection software: In this technique, users such as merchants create a “negative file” that states the criteria each transaction Survival Tip Deal with Secure Websites Be wary of what personal information (for example, Social Security or credit card numbers) you give to an unfa- miliar website. Best to deal with secure websites, those beginning with https:// (not http://) or showing a closed- padlock icon.
  493. The Challenges of the Digital Age 473 must meet. These

    criteria include not only stolen credit card numbers but also price limits, matches of the cardholder’s billing address and shipping address, and warnings if a large quantity of a single item is ordered. • Predictive-statistical-model software: In this technique, tons of data from previous transactions are examined to create mathematical descriptions of what a typical fraudulent transaction is like. The software then rates incoming orders according to a scale of risk based on their resemblance to the fraud profile. 96 Thus, for example, if some thief overhears you giving out your phone company calling-card number and he or she makes 25 calls to a country that you never have occasion to call, AT&T’s software may pick up the unusual activity and call you to see if it is you who is making the calls. • Employee internet management (EIM) software: Programs made by Websense, SmartFilter, and Pearl Echo-Suite are used to monitor how much time workers spend on the web and even block access to gambling and porn sites. • Internet filtering software: Some employers use special filtering software to block access to pornography, bootleg-music download, and other unwanted internet sites that employees may want to access. • Electronic surveillance: Employers use various kinds of electronic surveillance that includes visual and audio monitoring technologies, reading of email and blogs, and recording of keystrokes. Some companies even hire undercover agents to pretend to be coworkers. Identification & Access What are three ways a computer system can verify legitimate right of access? Are you who you say you are? The computer wants to know. There are three ways a computer system can verify that you have legiti- mate right of access. Some security systems use a mix of these techniques. The systems try to authenticate your identity by determining (1) what you have, (2) what you know, or (3) who you are. WHAT YOU HAVE—CARDS, KEYS, SIGNATURES, & BADGES Credit cards, debit cards, and cash-machine cards all have magnetic strips or built-in computer chips that identify you to the machine. Many require that you display your signature, which may be compared with any future signature you write. Com- puter rooms are always kept locked, requiring a key. Many people also keep a lock on their personal computers. A computer room may also be guarded by security officers, who may need to see an authorized signature or a badge with your photograph before letting you in. Of course, credit cards, keys, and badges can be lost or stolen. Signatures can be forged. Badges can be counterfeited. WHAT YOU KNOW—PINs & PASSWORDS To gain access to your bank account through an automated teller machine (ATM), you key in your PIN. A PIN (per- sonal identification number) is the security number known only to you that is required to access the system. Telephone credit cards also use a PIN. If you carry either an ATM or a phone card, never carry the PIN written down else- where in your wallet (even disguised). As we stated earlier in the book, passwords are special words, codes, or sym- bols required to access a computer system. Passwords are one of the weakest security links, and most can be easily guessed or stolen. We gave some sugges- tions on passwords in Chapter 6. Some computer security systems have a “callback” provision. In a callback system, the user calls the computer system, punches in the password, and
  494. 474 Chapter 9 hangs up. The computer then calls back

    a certain preauthorized number. This measure will block anyone who has somehow gotten hold of a password but is calling from an unauthorized telephone. WHO YOU ARE—PHYSICAL TRAITS Some forms of identification can’t be eas- ily faked—such as your physical traits. Biometrics , the science of measuring individual body characteristics, tries to use these in security devices, as we pointed out in Chapter 6. Biometric authentication devices authenticate a per- son’s identity by verifying his or her physical or behavioral characteristics with a digital code stored in a computer system. Encryption Encryption sounds like a good idea, but how could it be harmful to us? Encryption, as we said in Chapter 6, is the process of altering readable data into unreadable form to prevent unauthorized access, and it is what has given people confidence to do online shopping and banking. Encryption is clearly useful for some organizations, especially those concerned with trade secrets, military matters, and other sensitive data. Many financial organi- zations, such as Bank of America, Time Warner, and Citigroup’s CitiFinan- cial division, stung by misplaced data of nearly 6 million people, decided to encrypt the backup tapes of customer information that they store with third- party vendors. 97 A very sophisticated form of encryption is used in most personal comput- ers and is available with every late-model web browser to provide for secure communications over the internet. However, from the standpoint of society, encryption is a two-edged sword. For instance, the 2001 attacks on the World Trade Center and Pentagon raised the possibility that the terrorists might have communicated with each other using unbreakable encryption programs. (There is no evidence they did.) Should the government be allowed to read the coded email of overseas terrorists, drug dealers, and other enemies? What about the email of all American citizens? The U.S. government has maintained that it needs access to scrambled data for national security and law enforcement. Indeed, during the 1990s, officials urged that encryption companies be required to include a “back door” in their products that would allow the government to peek at messages exchanged by SECURITY Unattractive passport photos have become mandatory. Why? Because computers do not like smiles. A United Nations agency that sets standards for passports wants all countries to switch to a document that includes a digital representation of the bear- er’s face recorded on an embedded computer chip. In airports and at border crossings, a machine will read the chip—but the machine can be fooled by smiles, which introduce teeth, wrinkles, lines, and other distortions. Sigmatek’s facial identifica- tion technology for corporate security at the International Security & Defense Exhibition in Tel Aviv, Israel.
  495. The Challenges of the Digital Age 475 criminals and terrorists.

    Companies and consumers said they would not use such a product and contended that criminals surely would not either. It was also argued that many people with the most basic education in mathematics could write their own encryption systems. Ultimately, the back-door idea was dropped. 98 The 2001 terrorist incidents resurrected the debate. Some academics who, over the objections of the government, had freely published their research on how to make unbreakable codes were haunted by the idea that law enforce- ment might have figured out terrorist plans if the encryption techniques had been kept secret. Although publicly available encryption allows ordinary peo- ple to protect their privacy and businesses to protect their data, it is clear that a by-product is a limitation on the ability to fight lawbreakers and terrorists. 99 Protection of Software & Data What are three ways that organizations can protect software and data? Organizations go to tremendous lengths to protect their programs and data. As might be expected, this includes educating employees about making backup disks, protecting against viruses, and so on. Other security procedures include the following: CONTROL OF ACCESS Access to online files is restricted to those who have a legitimate right to access—because they need them to do their jobs. Many organizations have a system of transaction logs for recording all accesses or attempted accesses to data. AUDIT CONTROLS Many networks have audit controls for tracking which pro- grams and servers were used, which files opened, and so on. This creates an audit trail, a record of how a transaction was handled from input through processing and output. PEOPLE CONTROLS Because people are the greatest threat to a computer sys- tem, security precautions begin with the screening of job applicants. Résumés are checked to see if people did what they said they did. Another control is to separate employee functions, so that people are not allowed to wander freely into areas not essential to their jobs. Manual and automated controls—input controls, processing controls, and output controls—are used to check if data is handled accurately and completely during the processing cycle. Printouts, printer ribbons, and other waste that may reveal passwords and trade secrets to outsiders are disposed of through shredders or locked trash barrels. Disaster-Recovery Plans What is a disaster-recovery plan? A disaster-recovery plan is a method of restoring information-processing operations that have been halted by destruction or accident. “Among the countless lessons that computer users have absorbed in the hours, days, and weeks after the [1993 New York] World Trade Center bombing,” wrote one reporter, “the most enduring may be the need to have a disaster-recovery plan. The second most endur- ing lesson may be this: Even a well-practiced plan will quickly reveal its flaws.” 100 Although the second (2001) attack on the World Trade Center reinforced these lessons in a spectacular way, as did Hurricane Katrina in New Orleans 4 years later, interestingly Disaster. Severe flooding hit Iowa in the spring of 2008; here we see Cedar Rapids.
  496. info! more 476 Chapter 9 many companies have not gotten

    the message. A survey of 1,200 businesses found that nearly one-third of them did not have emergency continuity plans in place—up from 25% a year earlier. The survey also found that two-thirds of companies that suffered through a disaster lost business. 101 Many small com- panies may not have any backup systems at all, since they may see installing a system as pricey and difficult. 102 Mainframe computer systems are operated in separate departments by pro- fessionals, who tend to have disaster plans. Whereas mainframes are usually backed up, many personal computers, and even entire local area networks, are not, with potentially disastrous consequences. It has been reported that, on average, a company loses as much as 3% of its gross sales within 8 days of a sustained computer outage. A disaster-recovery plan is more than a big fire drill. It includes a list of all business functions and the hardware, software, data, and people that support those functions, as well as arrangements for alternate locations. The disaster- recovery plan also includes ways for backing up and storing programs and data in another location, ways of alerting necessary personnel, and training for those personnel. 9.4 QUALITY-OF-LIFE ISSUES: The Environment, Mental Health, Child Protection, & the Workplace How does information technology create environmental, mental-health, pornography, and workplace problems? In this chapter and earlier ones we have discussed some of the worrisome effects of technology on intellectual property rights, on truth in art and jour- nalism, on censorship issues, on health matters and ergonomics, and on pri- vacy and security. In the following we briefly explore some other quality-of-life issues related to information technology. Environmental Problems What environmental concerns are created by information technology? The data servers that make the internet run are huge energy hogs. A study for the Environmental Protection Agency estimated in 2007 that data centers, their servers, and their associated cooling and auxiliary infrastructure use about 1.5% of the United States’ total electricity consumption. 103 Thus, many companies are taking steps to redesign their data centers to reduce the energy drain. Man- ufacturers of personal computers are also tackling the energy problem, add- ing green features such as speeding up going into power-saving sleep mode. 104 You can also save a good deal on your household electricity bill by simply unplugging your com- puter when you’re sleep- ing or not working. 105 Many other environmen- tal challenges remain—for example, manufacturing and usage by-products, disposal by-products, envi- ronmental pollution, and possible risks of nano- technology. Composition of a Desk- top Microcomputer Plastics Lead Aluminum Ger- manium Gallium Iron Tin Copper Barium Nickel Zinc Tantalum Indium Vanadium Terbium Beryllium Gold Europium Titanium Ruthenium Cobalt Palladium Manganese Silver Antimony Bismuth Chromium Cadmium Selenium Niobium Yttrium Rhodium Platinum Mer- cury Arsenic Silica . . . For more information, go to: www.eoearth.org/article/ computer_recycling Old computers and elec- tronic parts collect in piles at E-Parisara, an electronic waste recycling factory in Dobbspet, 45 kilometers from Bangalore, India. India’s growing digital economy has contributed to the amount of e-waste it gen- erates. According to the Karna- taka, a state pollution control board, more than 10 tons of electronic waste is produced in Bangalore alone every year, and about 80% of the e-waste generated in the United States is exported to India, China, and Pakistan to be recycled.
  497. info! more The Challenges of the Digital Age 477 Donating

    Old PCs & Cellphones Want to get rid of that old PC or Mac? For guidance, try: http://ww2.pcdisposal.com/?g clidϭCI6w_5vSsZUCFSD8iAo d3U9okQ www.worldcomputerexchange. org www.epa.gov/e-cycling/donate. htm For unwanted cellphones: www.collectivegood.com www.donateaphone.com www.cellforcash.com www.phonefund.com Chemical Source Lead Cadmium Mercury Chromium PVC (polyvinyl chloride) plastics Brominated flame retardants • Cathode-ray tubes (CRTs) in amounts of 4–8 pounds. Also found in solder in circuit boards. Discarded electronics account for 30–40% of lead in the waste stream. • Circuit boards, semiconductors. More than 2 million pounds estimated to exist in discarded computers in 2005. • Switches, batteries, fluorescent bulbs in liquid- crystal displays. By 2005, 400,000 pounds discarded. • Circuit boards, corrosion protection in steel. By 2005, 1.2 million pounds discarded. • Connectors, cables, housings, plastic covers; about 250 million pounds discarded each year. • Printed circuit boards, connectors, plastic covers, cables. panel 9.3 Problem chemicals in PCs MANUFACTURING & USAGE BY-PRODUCTS Many communities are eager to have computer and chip manufacturers locate there because they perceive them to be “clean” industries. But there have been lawsuits charging that the semiconductor industry has knowingly exposed workers to a variety of hazardous toxins, some of which were linked to miscarriages, and there is speculation that others may be linked to cancer and birth defects. 106 Wireless systems can disrupt pacemakers and other lifesaving devices in hospitals. 107 The world’s data centers are projected to surpass the airline industry as green- house gas polluters by 2020. 108 DISPOSAL BY-PRODUCTS Technologies are quickly going obsolete. It has been estimated that 3% of microprocessors and memory chips, for example, go obsolete each month. 109 What to do with the “e-waste”—nearly 400 mil- lion electronic products Americans discard per year (including 157 million computer products, up from 47 million in 2005)? 110 Less than 20% of all elec- tronic waste is recycled, according to the Environmental Protection Agen- cy. 111 Much of the electronic waste that winds up in the nation’s 2,200 landfills contains large amounts of lead and other toxins that can leach into ground- water or produce dioxins and other cancer-causing agents when burned. 112 ( • See Panel 9.3.) The problem is worsening as new computer models are introduced on faster cycles. Many people feel that the United States should follow the lead of Europe and Japan and pass laws forcing manufacturers to reduce the use of toxic materials in new products and take back old comput- ers for recycling. 113 Don’t always assume you can get a school or local charity to take your old personal computer; some will, but many are tired of being stuck with junk. Fortunately, the Electronic Industries Alliance Consumer Education Initiative offers a website ( www.eiae.org ) that helps consumers locate donation programs and recycling companies. Dell, Gateway, and Hewlett-Packard have all cre- ated programs whereby users can send unwanted computer gear for donation, refurbishing, or recycling. Cellphones may also be turned in for recycling or reuse. Staples takes back old printer cartridges for recycling. Hewlett-Packard makes new printers from recycled material. 114 ENVIRONMENTAL BLIGHT Call it “techno-blight.” This is the visual pollution represented by the forest of wireless tow- ers, roof antennas, satellite dishes, and all the utility poles
  498. 478 Chapter 9 topped with transformers and strung with electric,

    phone, cable-TV, and other wires leading off in all directions. As the nation’s electrical grid becomes more pervasive, so, people worry, will the obtrusive, ugly technology in our physi- cal environment. Environmentalists worry about its impact on vegetation and wildlife, such as the millions of birds and bats that collide with cellular towers. Residents worry about the effect on views and property values, although anten- nas can be made into “stealth towers”—fake water towers, flagpoles, trees, and the like—to blend in better with the environment. Some people worry that there may be unknown health effects. Few of the thousands of miles of lines are buried underground, and most of those are in large cities. Ultimately the decision to approve or deny wireless towers resides with the Federal Commu- nications Commission. 115 POSSIBLE RISKS OF NANOTUBES Some environmentalists worry that the spread of nanotechnology—manipulating materials such as carbon, zinc, and gold at the molecular level—could create contaminants whose tiny size makes them especially hazardous. 116 Many animal studies involving carbon nano- tubes, superstrong carbon fibers that are now used in products such as tennis rackets and that might replace silicon in ever tinier transistors, have not found them to be risky. However, research in which nanotubes were injected into the abdomens of mice found that they developed lesions on the lungs similar to those induced by the inhalation of asbestos, which can lead to a deadly cancer. Most people are prob- ably not endangered by nanotubes, scientists concluded, but those working with them in laboratories or at nanotube manufacturers are advised to take extra precautions. 117 Mental-Health Problems What problems with isolation, gambling, and stress can derive from information technology? Some of the mental-health problems linked to information technology are the following: ISOLATION? Automation allows us to go for days without actually speaking with or touching another person, from buying gas to playing games. A few years ago, a Stanford University survey led by Norman H. Nie of the Stan- ford Institute for the Quantitative Study of Society found that, as people spent more time online, they had less time for real-life relationships with family and friends. “As internet use becomes more widespread,” predicted a study coau- thor, “it will have an increasingly isolating effect on society.” 118 Further research by the Stanford group found that the average internet user, who spends 3 hours a day online, watches less television, spends less time sleeping, and also spends less time socializing with friends. Indeed, according to the study, an hour of time spent using the internet reduces face-to-face contact with friends, coworkers, and family by 23.4 minutes. 119 A poll of 2,030 people ages 12 and older found that 28% of Americans in 2008 said they had been spending less time with members of their household as compared to 11% who said that two years earlier, a change coinciding with the rise of social networks. 120 Recently, parents and mental-health professionals have worried that the popularity of videogames has a dark side. When Grand Theft Auto IV was announced in spring 2008, Ryan Holt, a student at the University of North- ern Colorado, said he was planning to spend $90 to get the collector’s edi- tion. Even though it severely pinched his budget, he said there were things he would sacrifice before a great videogame. “I’d probably give up my cellphone,” he said. “Probably not food. That’s really tough. I like food.” 121 Earlier that year, Stanford University School of Medicine researchers showed that areas of the brain responsible for generating feelings of addiction and reward are Fighting techno-blight. Envi- ronmentally friendly cellphone towers disguised as cacti. Dell PCs engineered specifically with the environment in mind.
  499. The Challenges of the Digital Age 479 activated during videogame

    play. 122 Almost one in 10 American children, ages 8 to 18, are addicted to videogames, in the same way that people are addicted to drugs and gambling. 123 GAMBLING Gambling is already widespread in North America, but informa- tion technology makes it almost unavoidable. Instead of driving 40 minutes to a Connecticut casino, for example, Rhode Island resident Beverly Richard dis- covered that slots, roulette, and blackjack were just a mouse click away, and she quickly found herself $13,000 in debt. “It was too convenient,” she said. “I don’t have to leave home.” 124 Although gambling by wire is illegal in the United States, host computers for internet casinos and sports books have been established in Caribbean tax havens. Satellites, decoders, and remote-control devices allow TV viewers to do racetrack wagering from home. In these circumstances, law enforcement is extremely difficult. Despite U.S. efforts to curb gambling on the web, bet- tors in the United States generate an estimated 70% of global online gambling revenues, and the legal sites operating offshore are fighting back against U.S. Justice Department crackdowns as being unconstitutional. 125 STRESS In one survey of 2,802 American PC users, three-quarters of the respondents (ranging in age from children to retirees) said personal comput- ers had increased their job satisfaction and were a key to success and learning. However, many found PCs stressful: Fifty-nine percent admitted getting angry at their PCs within the previous year, and 41% said they thought computers had reduced job opportunities rather than increased them. 126 Another survey found that 83% of corpo- rate network administrators reported “abusive and violent behavior” by employees toward computers— including smashing monitors, throwing mice, and kicking system units. 127 Yet another—but probably not very scientific—survey by the Institute of Psychi- atry at the University of London for Hewlett-Packard found that excessive day-to-day use of technology, whether using cellphones or sending emails, pro- duced what they called “info-mania,” which resulted in a 10-point drop in IQ. 128 Protecting Children: Pornography, Sexual Predators, & Online Bullies What kinds of steps can parents take to protect their children from inappropriate material? Since computers are simply another way of communicating, it is no surprise that they are used to communicate about pornography, sexual solicitations, and threats and violence. Let’s consider these. PORNOGRAPHY One of the biggest cultural changes in the United States of the past quarter century has been the widespread distribution of sexually explicit material, making adult entertainment or pornography a $12 billion yearly business. Indeed, some of America’s most well-known companies, such as General Motors, Time Warner, and Marriott, are now said to make mil- lions selling pornography, as on closed-circuit TV channels in hotels. 129 Audio files called “porncasts” are available for downloading for adult podcasts. On the highways, motorists have complained of “dirty driving” as they found themselves looking at X-rated fare playing in other cars outfitted with DVD players. As for the internet, the number of pornography websites rose from 88,000 in 2000 to 1.6 million 4 years later. 130 In April 2005, it was found that two of Survival Tip Alleviating Info-Mania Hewlett-Packard offers a six- page “Guide to Avoiding Info- Mania” at: http://demo.ort.org.il/clickit2/ fi les/forums/920455712/ 548653262.pdf
  500. info! more 480 Chapter 9 five internet users in the

    United States had visited a porn site. 131 Fully one- quarter of employees who use the internet visit porn sites during the workday, according to 2008 figures—up 23% from a year earlier—and most such sex sites experience the most hits during office hours. 132 Some of the most inno- vative and experimental of web entrepreneurs, in fact, have been online por- nographers, who were among the first to exploit video streaming, pop-up ads, and electronic billing. 133 Particularly bold are disseminators of child pornog- raphy, despite the efforts of Verizon, Sprint, Time Warner Cable, and others to block access to such internet bulletin boards and websites featuring such material. 134 Of course, all this is of great concern to parents, who fear their children will be exposed to inappropriate sexual and also violent material, both on the web and in videogames. In 2008, the U.S. Supreme Court upheld a federal provision imposing a mandatory five-year prison term on people convicted of promoting child porn. It also upheld an earlier law prohibiting possession of child pornography. 135 Following are some steps being taken to shield children from adult material. • Online blocking software: Some software developers have discovered a golden opportunity in making programs such as SurfWatch, Cybersitter, Cyber Patrol, and Net Nanny. These blocking programs are designed to screen out objectionable material, typically by identifying certain unapproved keywords in a user’s request or comparing the user’s request for information against a list of prohibited sites. The leading online access providers also offer software filters. • DVD filters: A DVD player made by RCA includes filtering technology developed by ClearPlay that allows parents to edit out the inappropriate parts—such as disturbing images, violence, nudity, swear words, and ethnic and social slurs—of DVD movies they own or rent. (The RCA player comes with built-in filters for 2,000-plus movies, and owners can get updated filters for a monthly fee.) • Videogame rating systems: The Entertainment Software Ratings Board has a videogame ratings system that is linked to children’s ages. ( • See Panel 9.4.) To search for game ratings, parents may go to www. esrb.org/index-js.jsp and type in the name of a game they are considering buying. For example, if you type in the popular “Grand Theft Auto,” you will get ratings for 161 variations on the game, most of them T (Teen) or M (Mature) but one of them AO (Adults Only—this version is Grand Theft Increased Storage Capacity ϭ Stupidity??? Well-known technology writer John C. Dvorak suggests that improved hard-drive technology and devices like TiVo are driving the increase in global laziness and stupidity. Go to: www.go.pcmag.com/dvorak and read what he has to say. • EC (Early Childhood): Ages 3 and older. Contains no inappropriate material. • E (Everyone): Ages 6 and older. May contain minimal or mild violence and/or infrequent mild language. • E10+ (Everyone 10 and older): May contain more mild violence, mild language, and/or minimal suggestive themes. • T (Teen): Ages 13 and older.May contain violence, suggestive themes, crude humor, minimal blood, and/or infrequent use of strong language. • M (Mature): Ages 17 and older. May contain intense violence, blood and gore, sexual content, and/or strong language. • AO (Adults Only): Ages 18 and over. May contain prolonged scenes of intense violence and/or graphic sexual content and nudity. • RP (Rating Pending): Means game has been submitted to ERSB and is awaiting rating (used in advertising prior to game’s release). Source: Entertainment Software Ratings Board, ESRB Game Ratings, www.esrb.org/ esrbratings_guide.asp. panel 9.4 Videogame industry’s rating system These ratings are sup- posed to appear on vid- eogame packages.
  501. The Challenges of the Digital Age 481 Auto San Andreas,

    which has strong sexual content and use of drugs). However, compliance among retailers selling videogames is voluntary and spotty, and one study found that 69% of children ages 13–16 were able to purchase M-rated games (supposedly reserved for those age 17 and up). 136 • The V-chip: The 1996 Telecommunications Law officially launched the era of the V-chip, a device that is required equipment in all new television sets with screen size of 13 inches or larger sold after January 2000. The V-chip allows parents to automatically block out programs that have been labeled as high in violence, sex, or other objectionable material. Unfortunately, to turn on the controls, owners have to follow complicated instructions and menu settings, and then they have to remember their passwords when they want to watch reruns of The Sopranos or Deadwood. • “xxx” web addresses: In mid-2005, the internet’s primary oversight body, the Internet Corporation for Assigned Names and Numbers, approved a plan for pornographic websites to use new addresses ending in .xxx. The purpose of the new domain would be to enable parents to more easily apply filtering software and so more effectively block access to porn sites. 137 ONLINE SEXUAL PREDATORS A task force created by 49 state attorneys gen- eral concluded in 2009 that, despite popular perceptions, sexual solicitation of children online, as on social networks like MySpace and Facebook, is really not a significant problem. 138 Even so, many parents are concerned about internet predators reaching their children. A 2005 study of 1,501 regular internet users ages 10–17 found that over a two-year period one in five children received a sexual solicitation. 139 Girls were the primary target, receiving two-thirds of the solicitations. Moreover, it has been found that, despite the popular view, child molesters looking for victims online typically aren’t pursuing young children. According to a study of 129 suspected molesters, most victims are girls 13–15 who willingly meet their predators and also usually willingly agree to have sex. 140 In addition, it was found that only 5% of the molesters pretended to be peers, that they messaged online future victims for more than a month, and only one in five mentioned wanting sex before the first meeting. Some suggested prevention strategies are as follows: 141 • Monitor internet use: Parents are advised to monitor their children’s internet use and to install filters. • Be candid: Parents should also make children aware that having sex with an adult is a crime and explain that molesters capitalize on teenagers’ needs for acceptance. • Caution about revealing too much: Children, particularly teenagers, reveal far too much about themselves online, which can make them targets for predators or bullies. 142 For instance, 20% of teens (and a third of young adults 20–26) say they’ve sent or posted naked or semi-naked photos or videos of themselves, mostly to be “fun or flirtatious,” according to one survey. 143 This particularly risky practice is called sexting, the act of sending sexually revealing pictures of oneself through cellphone text messages or email. 144 Another survey found that at least a quarter of the teenagers polled had posted something they later regretted. 145 CYBERBULLIES In yet another example of how information technology can negatively affect the social lives of children, there have been numerous reports of so-called cyberbullying, in which children in the 9–18 age range use the inter- net to unleash merciless taunting, nasty rumors, humiliating pictures, and other put-downs of fellow adolescents who have fallen into disfavor. The tactics include stealing each other’s screen names, forwarding private material to peo- ple for whom it was not intended, and posting derogatory material on blogs. 146
  502. 482 Chapter 9 Some suggested tactics for dealing with cyberbullies

    are as follows: 147 • Save the evidence: Children should print out offending messages and show them to their parents, who should then contact parents of the bully as well as inform school officials. • Block messages: Victims should use the Block function to block further online communication from the bully. Parents should also contact email services and change the victim’s screen name (and the victim should tell only his or her friends the new name). • Contact an attorney or the police: If there are threats of violence or sexual harassment, parents should contact a lawyer or the police. Incidentally, cyberbullying is also a problem in the workplace. 148 Workplace Problems: Impediments to Productivity What are some ways informa- tion technology does not make us productive? First the mainframe computer, then the desktop stand-alone PC, and recently the networked computer were all brought into the workplace for one reason only: to improve productivity. How is it working out? Let’s consider three aspects: misuse of technology, fussing with computers, and information overload. MISUSE OF TECHNOLOGY “For all their power,” said an economics writer, “computers may be costing U.S. companies tens of billions of dollars a year in downtime, maintenance and training costs, useless game playing, and infor- mation overload. 149 Employees may look busy, as they stare into their computer screens with brows crinkled. But sometimes they’re just hard at work playing videogames. Or browsing online malls (forcing corporate mail rooms to cope with a del- uge of privately ordered parcels). Or looking at their investments or pornogra- phy sites. Indeed, one study found that recreational web surfing accounts for nearly one-third of office workers’ time online. 150 FUSSING WITH COMPUTERS Another reason for so much wasted time is all the fussing that employees do with hardware, software, and online connec- tions. One study in the early 1990s estimated that microcomputer users wasted 5 billion hours a year waiting for programs to run, checking computer output for accuracy, helping coworkers use their applications, organizing cluttered disk storage, and calling for technical support. 151 And that was before most people had to get involved with making online connections work or experi- ence the frustrations of untangling complications wrought by spam, phishing,
  503. The Challenges of the Digital Age 483 T here is

    a handful of activities that can drain hours of time, putting studying—and therefore college—in serious jeopardy. They include excessive television watching, partying, and working too many hours while going to school. They also include misuse of the computer. PRACTICAL ACTION When the Internet Isn’t Productive: Online Addiction & Other Time Wasters The Great Campus Goof-Off Machine? “I have friends who have spent whole weekends doing nothing but playing Quake or Warcraft or other interactive computer games,” reported Swarthmore viruses, and other internet deviltry. The Stanford study led by Nie, referred to above, found that junk email and computer maintenance take up a significant amount of time spent online each day. Indeed, people surveyed said they spent 14 minutes daily dealing with computer problems, which would add up to a total of 10 days a year. 152 Comments technology writer Dan Gillmor, “We would never buy a TV that forced us to reboot the set once a month, let alone once a week or every other day.” 153 INFORMATION OVERLOAD “It used to be considered a status symbol to carry a laptop computer on a plane,” says futurist Paul Saffo. “Now anyone who has one is clearly a working dweeb who can’t get the time to relax. Carrying one means you’re on someone’s electronic leash.” 154 The new technology is definitely a two-edged sword. Cellphones, pagers, and laptops may untether employees from the office, but these employees tend to work longer hours under more severe deadline pressure than do their tethered coun- terparts who stay at the office, according to one study. 155 Moreover, the devices that once promised to do away with irksome business travel by ushering in a new era of communications have done the opposite. They have created the office-in- a-bag that allows businesspeople to continue to work from airplane seats, hotel desks, and their own kitchen tables. The diminishing difference between work and leisure is what Motorola calls the “blurring of life segments.” 156 Some studies have found an increase in labor productivity in the early years of the 21st century, most of it attributed to more investment in information technology and efficiency improvements made possible by this technology. 157 However, says Stephen Roach, chief economist of Morgan Stanley Dean Witter, “the dirty little secret of the information age is that an increasingly large slice of work goes on outside the official work hours the government recognizes. . . . The ‘24/7’ culture of nearly round-the-clock work is endemic to the wired economy. . . . But improving productivity is not about working longer; it’s about adding more value per unit of work time.” 158 An additional interesting wrinkle in the internet age is how much work is done that is voluntary or donated work, as in all the user-generated content that is contributed to YouTube, WikiPedia, the Spore’s Creature Creator universe-simulation game, and so on. 159 David M. Levy, a computer scientist at the University of Washington, is concerned that “our workload and speed [do] not leave room for thoughtful reflection.” 160 Adds Bill McKibben, author of Enough: Staying Human in an Engineered Age, “There is a real danger that one is absorbing and responding to bursts of information, rather than having time to think.” 161
  504. 484 Chapter 9 College sophomore Nate Stulman, in an article

    headed “The Great Campus Goof-Off Machine.” He went on: “And many others I know have amassed overwhelming collections of music on their computers. It’s the searching and finding they seem to enjoy: some of them have more music files on their computers than they could play in months.”162 In Stulman’s opinion, having a computer in the dorm is more of a distraction than a learning tool for students. “Other than computer science or mathematics majors, few students need more than a word processing program and access to email in their rooms.” Most educators wouldn’t banish computers completely from student living quarters. Nevertheless, it’s important to be aware that your PC can become a gigantic time sink, if you let it. Reports Rutgers communications professor Robert Kubey: “About 5%–10% of students, typically males and more frequently first- and second-year students, report staying up late at night using chat lines and email and then feeling tired the next day in class or missing class altogether.”163 Internet Addiction/Dependency “A student emails friends, browses the World Wide Web, blows off homework, botches exams, flunks out of school.”164 This is a description of the downward spiral of the “net addict,” often a college student—because schools give students no- cost/low-cost linkage to the internet—but it can be anyone. Some become addicted to chat groups, some to online por- nography, some simply to the escape from real life.165 Stella Yu, 21, a college student from Carson, California, was rising at 5 a.m. to get a few hours online before school, logging on to the internet between classes and during her part-time job, and then going home to web surf until 1 a.m. Her grades dropped and her father was irate over her phone bills. “I always make promises I’m going to quit; that I’ll just do it for research,” she said. “But I don’t. I use it for research for 10 minutes, then I spend two hours chatting.”166 College students are unusually vulnerable to internet addiction, which is defined as “a psychological dependence on the internet, regardless of type of activity once ‘logged on,’” according to psychologist Jonathan Kandell.167 The American Psychological Association, which officially rec- ognized “pathological internet use” as a disorder in 1997, defines the internet addict as anyone who spends an aver- age of 38 hours a week online.168 (The average internet user spends 5½ hours a week on the activity.169) More recently, psychologist Keith J. Anderson of Rensselaer Polytechnic Institute found that internet-dependent students, who make up at least 10% of college students, spent an average of 229 minutes a day online for nonacademic reasons, com- pared with 73 minutes a day for other students. As many as 6% spend an average of more than 400 minutes a day— almost 7 hours—using the internet.170 Internet addiction is often accompanied by another kind of dependency—data addiction—say Harvard University psychi- atrists Edward Hallowell and John Ratey. The constant stimu- lation provided by frequent incoming data and the constant multitasking that goes with it have produced a condition they call “pseudo-attention deficit disorder.” Its sufferers, says one description, “become frustrated with long-term proj- ects, thrive on the stress of constant fixes of information, and physically crave the bursts of stimulation from checking e-mail or voice mail or answering the phone.”171 What are the consequences of internet addiction? A study of the freshman dropout rate at Alfred University in New York found that nearly half the students who quit the preceding semester had been engaging in marathon, late- night sessions on the internet.172 The University of California, Berkeley, found that some students linked to excessive com- puter use neglected their course work.173 A survey by Vik- tor Brenner of State University of New York at Buffalo found that some internet addicts had “gotten into hot water” with their school for internet-related activities.174 “Grades decline, mostly because attendance declines,” says psychologist Anderson about internet-dependent students. “Sleep pat- terns go down. And they become socially isolated.” The first Internet addiction center, called ReSTART, opened in Fall City, Washington, a suburb of Seattle, in the summer of 2009.175 Online Gambling A particularly risky kind of internet dependence is online gambling. David, a senior at the University of Florida, Gaines- ville, owed $1,500 on his credit cards as a result of his online gambling habit, made possible by easy access to offshore casinos in cyberspace. He is not alone. A survey of 400 stu- dents at Southern Methodist University found that 5% said they gambled frequently via the internet.176 Some students have even gambled away their tuition money. 9.5 ECONOMIC & POLITICAL ISSUES: Employment & the Haves/Have-Nots How may technology affect employment and the gap between rich and poor? In recent times, a number of critics have provided a counterpoint to the hype and overselling of information technology to which we have long been exposed. Some critics find that the benefits of information technology are balanced by a real downside. Other critics make the alarming case that technological
  505. The Challenges of the Digital Age 485 progress is actually

    no progress at all—indeed, it is a curse. The two biggest charges (which are related) are, first, that information technology is killing jobs and, second, that it is widening the gap between the rich and the poor. Technology, the Job Killer? Could technology put me out of a job? Certainly ATMs do replace bank tellers, E-Z pass elec- tronic systems do replace turnpike toll takers, and internet travel agents do lure customers away from small travel agencies. Hundreds of companies are replacing service representatives with voice software. 177 In new so-called lights-out factories, machines make things—for example, the tiny cutting devices you see mounted on dental-floss containers—even when no one is there; as much as possible is done with no labor. 178 The contribution of technological advances to economic progress is steady, but the contribution to social progress is not purely positive. But is it true, as technology critic Jeremy Rifkin has said, that intelligent machines are replacing humans in countless tasks, “forcing millions of blue- collar and white-collar workers into temporary, contingent, and part-time employment and, worse, unemployment”? 179 This is too large a question to be fully considered in this book. We can say for sure that the U.S. economy is undergoing powerful structural changes, brought on not only by the widespread diffusion of technology but also by greater competition, increased global trade, the sending of jobs offshore, the shift from manufacturing to service employment, the weakening of labor unions, more flexible labor markets, more rapid immigration, partial deregu- lation, and certainly the great recession of 2008–2009. 180 One futurist argues that by 2100 perhaps 2% of the U.S. non-farm workforce will be needed to handle white-collar “know-how” functions, such as those of most of today’s office workers, but that “hyper-human” service workers, who will be required for creativity, social skills, conscious perception, positive feelings, hypothesiz- ing, and the like, will zoom to over 90%. 181 A counterargument is that jobs don’t disappear—they just change. Accord- ing to some observers, the jobs that do disappear represent drudgery. “If your job has been replaced by a computer,” says Stewart Brand, “that may have been a job that was not worthy of a human.” 182 Of course, that means little to someone who has no job at all. Gap between Rich & Poor What is the “digital divide”? “In the long run, improvements in technology are good for almost everyone,” economist and columnist Paul Krugman has said. “Unfortunately, what is true in the long run need not be true over shorter periods.” 183 We are now, he believes, living through one of those difficult periods in which technology doesn’t produce widely shared economic gains but instead widens the gap between those who have the right skills and those who don’t. More disadvantaged people may have access to computers than ever before, particularly at work, where many computer skills are, in point of fact, not very high tech or demanding. However, it may be a different story at home. Accord- ing to a Ford Foundation–financed report, “Bringing a Nation Online: The Importance of Federal Leadership , ” there still exists a so-called digital divide “between high and low income households, among different racial groups, between Northern and Southern states, and rural and urban households.” 184 For instance, only 29% of school-age children from households with incomes of less than $15,000 a year use a home computer to complete school assignments. A lights-out factory. The ABA- PGT plastics engineering plant.
  506. 486 Chapter 9 By contrast, 77% of children from households

    with annual incomes of $75,000 or more use a home computer for homework. 185 In college, says one report, “some minority students are still puttering along in the breakdown lane of the information superhighway.” 186 Although computer hardware is getting cheaper, high-speed internet connections can be prohibitively expensive for poor and working-class families. The digital divide also extends to the nations of the world. As New York Times columnist Thomas Friedman has written, in The World Is Flat, the world is “flattening,” becoming more interconnected as the result of the internet, wire- less technology, search engines, file sharing, digital photography, and other cutting-edge technologies. 187 This may be good for many advanced nations. But half the world—Africa, much of Latin America, and rural areas of India and China—isn’t flattening at all. And the future may be risky for America as well, because the fiber-optic cables that have been laid across the Pacific Ocean have made it easy to send offshore the jobs of all kinds of workers—accountants, radiologists, illustrators, and so on—whose work is knowledge-based. 188 Whom Does the Internet Serve? How could corporate and foreign government control affect internet access? Because of its unruly nature, perhaps the internet truly serves no one—and that is both its blessing and its curse. Business executives, for instance, find the public internet so unreliable that they have moved their most critical applications to semiprivate networks, such as intranets and extranets. That means that more of the network is increasingly brought under commercial control, which for consumers might mean more fees for special services and the stifling of cultural empowerment and free speech. Despite early euphoria that the internet would unleash a democratic spirit, nonprofit uses, and pro- gressive websites, some see increasing corporate consolidation, at least in the United States. For many restrictive governments outside the United States—China, Saudi Arabia, Iran, Singapore, United Arab Emirates, Bahrain, for example—that try to control internet access by their citizens, the net poses threats to their authority. China, for instance, is second only to the United States in the num- ber of people online; its nondemocratic government has cracked down on some kinds of internet political activism but tolerated others—largely because there is so much online chatter that it can’t censor it all. 189 (Some of the more than 1,000 words and phrases filtered by the Chinese instant-messaging ser- vice include “democracy,” “human rights,” and “oppose corruption.”) But if such governments want to join the global economy, an important goal for most, perhaps they will find that less control and regulation will translate into greater e-commerce. In a World of Breakneck Change, Can You Still Thrive? Where will you be in the future? “The most surprising thing that could happen in the future,” writes futurist Edward Cornish, “is if it offered no surprises, especially since the future has surprised us so often in the past.” 190 Clearly, information technology is driving the new world of jobs, services, and leisure, and nothing is going to stop it. People pursuing careers find the rules are changing very rapidly. Up-to-date skills are becoming ever more cru- cial. Job descriptions of all kinds are metamorphosing, and even familiar jobs are becoming more demanding. Where will you be in all this? Today, experts advise, you must be willing to continually upgrade your skills, to specialize, and to market yourself. In a world of breakneck change, you can still thrive.
  507. The Challenges of the Digital Age 487 Information technology is

    very much a part of the col- lege experience, of course. Elsewhere we discussed such matters as distance learning, web research, online plagiarism, and internet addiction. Here we describe some other issues regarding students’ computer use. Using Computers in the Classroom Although they’re more expensive than desktop computers, laptops are useful because you can take them not only to libraries, to help with reading or term-paper notes, but also to class to use in taking lecture notes. 191 You might even try using a palmtop computer, which costs half as much as a laptop and comes with word processing and spreadsheet software. 192 Be aware, however, that the small palmtop key- board requires some dexterity. With either laptop or palm- top, battery life may also be a factor. The use of computers in classrooms is still controversial in certain quarters. Some campuses allow students to bring laptops to class but are imposing rules about what they are allowed to do. “More students are sending instant messages to one another (chatting and note passing, 21st-century style),” says one article about business-school campuses, “day trading (as opposed to daydreaming), and even start- ing their own companies, all in class.” 193 Computer-generated voices that accompany the downloading of email attach- ments are another classroom annoyance. Notes Posted on the Web Wouldn’t it be nice, when you’re out sick, to be able to go to a website and get the notes of lectures for the classes you missed? This is possible on campuses served by some commer- cial firms. Many such services are free, since the firms try to generate revenue by selling online advertising, but some charge a fee. Such services can be a real help to students who learn best by reading rather than by hearing. They also provide additional reinforcement to students who feel they have not been able to grasp all of a professor’s ideas during the lecture. However, they are no substitute for the class- room experience, with its spontaneous exchange of ideas. Moreover, as one writer points out, “the very act of taking notes—not reading somebody else’s notes, no matter how stellar—is a way of engaging the material, wrestling with it, struggling to comprehend or take issue.” 194 In other words, you’ll be better able to remember the lecture if you’ve rein- forced the ideas by writing them down yourself. Some faculty members have no problem with note- taking operations. Indeed, for some time some professors have been posting their lecture notes, practice exams, and read- ing lists on web pages linked to the World Lecture Hall (www.utexas.edu). Oth- ers disapprove, however. Among the criticisms: (1) Note- taking services don’t always ask permission. (2) Instructors are reluctant to share their unpublished research in class if they think their ideas might end up posted in a public place and ripped off. (3) They might not wish to share controver- sial opinions with students if their views might be criticized in a worldwide forum. (4) Students might not come to class, especially if they think the lectures are boring or if they are given to chronic oversleeping or hangovers. (5) The notes may be sloppy, inaccurate, or incomplete. Sloppy notes are a serious concern. “The notes were very, very inaccurate and included gross errors,” said one Yale University professor of environmental studies who checked out a website with material on her course. “For example, there was a review of an educational film that had obviously been shown in another course—or perhaps it was shown by a visiting professor last year.” 195 A newspaper reporter investigating lecture-note websites took 118 pages of notes during her seven class visits, whereas the notes posted on the web of those same events “were, at most, a few para- graphs per lecture.” 196 Bottom line: These websites may be helpful, but they are certainly no substitute for going to class. Online Student Evaluations Student evaluations of courses and professors on the inter- net can be useful. But since such evaluations are often expressed anonymously, they can also be inaccurate and unfair—even vicious, if students receiving poor grades take revenge by vilifying their instructors online. According to a spokesperson for the American Federation of Teachers, there has been a rise in false-accusation cases, which can have a severe impact on instructors’ careers. 197 Justine Heinze Giardello, 18, whose father is a professor, says students don’t understand how hard instructors work. And she feels that students should not be able to bash teach- ers in a public forum. “I think it is horrible,” she said, com- menting on postings to a student-run teacher- evaluation website in which an openly gay community-college instruc- tor was anonymously called “homomanic,” “racist,” and “mentally ill.” “How would we feel,” she asks, “if there was a student review judging us on a personal basis?” 198 In reading teacher evaluations, it’s useful to pay close attention to how civil and fair-minded the reports seem. And, of course, you should try to be as considerate as pos- sible when writing them. EXPERIENCE BOX Student Use of Computers: Some Controversies
  508. 488 Chapter 9 biometrics (p. 474) Science of measuring individual

    body characteristics. Why it’s important: Biometric technology is used in some computer security systems to restrict user access. Biometric devices, such as those that use fingerprints, eye scans, palm prints, and face recognition, authenticate a person’s identity by verifying his or her physical or behavioral characteristics. botnet (p. 468) Short for robot network. A network of com- puters compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the person controlling that network. Why it’s important: If your PC becomes part of a botnet, it may be victimized by spam, phish- ing attacks, or denial-of-service attacks. computer crime (p. 465) Crime of two types: (1) an illegal act perpetrated against computers or telecommunications; (2) the use of computers or telecommunications to accomplish an ille- gal act. Why it’s important: Crimes against information tech- nology include theft—of hardware, of software, of computer time, of cable or telephone services, or of information. Other illegal acts are crimes of malice and destruction. cyberwarfare (p. 470) The use of computers and the internet to attack an enemy’s information systems. Why it’s important: Attacks may be conducted as tactical maneuvers against an opponent or on the scale of widespread cyberattacks to impair government and military information systems. disaster-recovery plan (p. 475) Method of restoring information-processing operations that have been halted by destruction or accident. Why it’s important: Such a plan is important if an organization desires to resume computer operations quickly. encryption (p. 474) Process of altering readable data so that it is not usable unless the changes are undone. Why it’s important: Encryption is clearly useful for some organiza- tions, especially those concerned with trade secrets, mili- tary matters, and other sensitive data. Some maintain that encryption will determine the future of e-commerce, because transactions cannot flourish over the internet unless they are secure. Evil Twin attack (p. 468) A variant on conventional phish- ing, in which a hacker or cracker sets up a Wi-Fi hot spot or access point that makes your computer think it’s accessing a safe public network or your home network and then moni- tors your communications. Why it’s important: The hacker can steal data you enter into a website, if it doesn’t have the right security measures. security (p. 472) System of safeguards for protecting infor- mation technology against disasters, system failures, and unauthorized access that can result in damage or loss. Five components of security are deterrents to computer crime, identification and access, encryption, protection of software and data, and disaster-recovery plans. Why it’s important: With proper security, organizations and individuals can mini- mize information technology losses from disasters, system failures, and unauthorized access. sexting (p. 481) The act of sending sexually revealing pictures of oneself through cellphone text messages or email. Why it’s important: May lead to embarrassments later in life—for example, when one is applying for a job—to legal troubles, or draw the attention of predators. zombie (p. 468). Also known as a drone. A computer taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels. Why it’s impor- tant: People whose computers become zombies may be victim- ized by spam messages, phishing attacks, or denial-of-service attacks. SUMMARY CHAPTER REVIEW s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.” Self-Test Questions 1. The five limitations to remember when using databases for research are ________ , ________, ________ , ________ , and ________ . 2. So that information-processing operations can be restored after destruction or accident, organizations should adopt a(n) ________ . 3. ________ is the altering of readable data so that it is not usable unless the changes are undone. 4. ________ is incomplete, outdated, or otherwise inaccu- rate data. 5. An error in a program that causes it not to work prop- erly is called a(n) ________ .
  509. 489 The Challenges of the Digital Age 6. CERT, created

    by the U.S. Department of Defense, stands for ________________________________ . 7. Software obtained illegally is called ________ software. Multiple-Choice Questions 1. Which of the following are crimes against computers and communications? a. natural hazards b. software theft c. information theft d. software bugs e. procedural errors 2. Which of the following methods or means are used to safeguard computer systems? a. signatures b. keys c. physical traits of users d. worms e. Internet2 3. Which of the following are threats to computer systems? a. zombies b. evil twins c. crackers d. Trojan horses e. all of these True/False Questions T F 1. The category of computer crimes includes dirty- data problems. T F 2. Software bugs include procedural errors. T F 3. Two types of encryption are public-key and private-key. T F 4. It is impossible to detect when a photo has been morphed. T F 5. If they got it from an employee’s credit report, employers must destroy any personal informa- tion about the employee before they throw it out. Short-Answer Questions 1. Give some examples of dirty data. 2. Briefly describe how encryption works. 3. What is a procedural error? 4. Name five threats to computers and communications systems. 5. The definition of computer crime distinguishes between two types. What are they? 6. What is phishing? 7. If your employer is checking on you, what might he or she be watching for? 8. What are three ways of verifying legitimate right of access to a computer system? 9. Name four environmental problems caused by computers. 10. What is the “digital divide”? s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Knowledge in Action 1. What, in your opinion, are the most significant disad- vantages of using computers? What do you think can be done about these problems? 2. What’s your opinion about the issue of free speech on an electronic network? Research some recent legal decisions in various countries, as well as some articles on the topic. Should the contents of messages be cen- sored? If so, under what conditions? 3. Research the problems of stress and isolation experi- enced by computer users in the United States, Japan, and one other country. Write a brief report on your findings. 4. How can you ensure that information is accurate and complete? Make a list of things to remember when you are doing research on the internet for a term paper. Web Exercises 1. What is 128-bit encryption? Is your browser equipped? Visit the following websites to learn more about browser security: http://iasweb.com/articles/webshopping.html www.us-cert.gov/cas/tips/ST05-001.html Go to http://bcheck.scanit.be/bcheck/ and www. jasons-toolbox.com/BrowserSecurity/ to run a s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.”
  510. 490 Chapter 9 browser security check on your computer. What

    are the results? What do you plan to do about any prob- lems that were detected? 2. Here’s a way to semi-encrypt an email message to a friend. Type out your message; then go to the Edit menu and choose Select All. Next go to the Format menu and select Font; then choose a font such as Wingdings that doesn’t use letters. When your friend receives your message, he or she need only change the font back to an understandable one (such as Times New Roman) in order to read it. This certainly isn’t high- level encryption, but it’s a fun activity to try. 3. Visit the following websites, which discuss general internet addiction: www.netaddiction.com/ www.addictionrecov.org/internet.aspx Do you have an internet problem? What do you plan to do about it? 4. If you’re spending too much time indoors using a PC or watching TV, you might want to consider going outside. Visit the following websites to learn about indoor air versus outdoor air: www.epa.gov/iaq/ia-intro.html www.lbl.gov/Education/ELSI/pollution-main.html Also, to read more about internet addiction that may cause isolation from the real world, visit www.mysocialnetwork.net/blog/410/r16/2006/10/ does_internet_addiction_create.html http://findarticles.com/p/articles/mi_m2248/ is_138_35/ai_66171001 http://news-service.stanford.edu/news/2005/ february23/internet-022305.html http://archives.cnn.com/2000/HEALTH/06/13/ internet.addiction.wmd/ www.eurekalert.org/pub_releases/2004-02/uoa- nhi020404.php www.newscientist.com/blog/technology/2008/03/ are-we-all-internet-addicts-now.html What’s your opinion on this issue? The following websites discuss computer health and safety: www.ics.uci.edu/_ chair/comphealth2.html www.osha.gov/SLTC/computerworkstation/ www.usernomics.com/workplace-ergonomics.html 5. How much do you know about the U.S. Department of Homeland Security’s rules and policies concerning com- puter users’ privacy? Go to www.dhs.gov and find out how you are affected.
  511. 491 SYSTEMS ANALYSIS & PROGRAMMING Software Development, Programming, & Languages

    10 Chapter Topics & Key Questions 10. 1 Systems Development: The Six Phases of Systems Analysis & Design What are the six phases of the systems development life cycle? 10.2 Programming: A Five-Step Procedure What is programming, and what are the five steps in accomplishing it? 10.3 Five Generations of Programming Languages What are the five generations of programming languages? 10.4 Programming Languages Used Today What are some third-generation lan- guages, and what are they used for? 10.5 Object-Oriented & Visual Programming How do OOP and visual programming work? 10.6 Markup & Scripting Languages What do markup and scripting languages do?
  512. 492 Chapter 10 O rganizations can make mistakes, of course,

    and big organizations can make really big mistakes. California’s Department of Motor Vehicles’ databases needed to be modern- ized, and Tandem Computers said it could do it. “The fact that the DMV’s database system, designed around an old IBM-based platform, and Tandem’s new system were as different as night and day seemed insignificant at the time to the experts involved,” said one writer who investigated the project. 1 The massive driver’s license database, containing the driving records of more than 30 million people, first had to be “scrubbed” of all information that couldn’t be translated into the language used by Tandem computers. One such scrub yielded 600,000 errors. Then the DMV had to translate all its IBM programs into the Tandem language. “Worse, DMV really didn’t know how its current IBM applications worked anymore,” said the writer, “because they’d been custom-made decades before by long departed programmers and rewritten many times since.” Eventually the project became a staggering $44 million loss to California’s taxpayers. 10.1 SYSTEMS DEVELOPMENT: The Six Phases of Systems Analysis & Design What are the six phases of the systems development life cycle? Needless to say, not all mistakes are so huge. Computer foul-ups can range from minor to catastrophic. But this example shows how important plan- ning is, especially when an organization is trying to launch a new kind of system. The best way to avoid such mistakes is to employ systems analysis and design. But, you may say, you’re not going to have to wrestle with problems on the scale of motor-vehicle departments. That’s a job for computer professionals. You’re mainly interested in using computers and communications to increase your own productivity. Why, then, do you need to know anything about sys- tems analysis and design? In many types of jobs, you may find that your department or your job is the focus of a study by a systems analyst. Knowing how the procedure works will help you better explain how your job works or what goals your department is supposed to achieve. In progressive companies, management is always inter- ested in suggestions for improving productivity. Systems analysis provides a method for developing such ideas. The Purpose of a System How would I define a system, and what is its purpose? A system is defined as a collection of related components that interact to perform a task in order to accomplish a goal. A system may not work very well, but it is nevertheless a system. The point of systems analysis and design is to ascertain how a system works and then take steps to make it better. An organization’s computer-based information system consists of hard- ware, software, people, procedures, and data, as well as communications set- ups. These components work together to provide people with information for running the organization.
  513. Systems Analysis & Programming 493 Getting the Project Going: How

    It Starts, Who’s Involved Who are the three kinds of users of a project? A single individual who believes that something badly needs changing is all it takes to get the project rolling. An employee may influence a supervisor. A customer or supplier may get the attention of someone in higher manage- ment. Top management may decide independently to take a look at a system that seems inefficient. A steering committee may be formed to decide which of many possible projects should be worked on. Participants in the project are of three types: • Users: The system under discussion should always be developed in consultation with users, whether floor sweepers, research scientists, or customers. Indeed, if user involvement in analysis and design is inadequate, the system may fail for lack of acceptance. • Management: Managers within the organization should also be consulted about the system. • Technical staff: Members of the company’s information systems (IS) department, consisting of systems analysts and programmers, need to be involved. For one thing, they may have to execute the project. Even if they don’t, they will have to work with outside IS people contracted to do the job. Complex projects will require one or several systems analysts. A systems analyst is an information specialist who performs systems analysis, design, and implementation. The analyst’s job is to study the information and communications needs of an organization and determine what changes are required to deliver better information to the people who need it. “Better” information means information that is summarized in the acronym CART — complete, accurate, relevant, and timely. The systems analyst achieves this goal through the problem-solving method of systems analysis and design. The Six Phases of Systems Analysis & Design What are the six phases of the systems development life cycle? Systems analysis and design is a six-phase problem-solving proce- dure for examining an informa- tion system and improving it. The six phases make up what is called the systems development life cycle. The systems development life cycle (SDLC) is the step-by-step process that many organizations follow during systems analysis and design. Whether applied to a Fortune 500 company or a three-person engineering business, the six phases in systems analysis and design are as shown in the illustration. ( • See Panel 10.1 .) Phases often overlap, and a new one may start before the old one is finished. After the first four phases, management must decide whether to proceed to the next phase. User input and review are critical parts of each phase. panel 10.1 The systems development life cycle An SDLC typically includes six phases. 1. Preliminary investigation 4. Systems development 2. Systems analysis 6. Systems maintenance 3. Systems design 5. Systems implementation
  514. 494 Chapter 10 The First Phase: Conduct a Preliminary Investigation

    What four steps are involved in the first phase? The objective of Phase 1, preliminary investigation, is to conduct a prelim- inary analysis, propose alternative solutions, describe costs and benefits, and submit a preliminary plan with recommen- dations. ( • See Panel 10.2 .) 1. CONDUCT THE PRELIMINARY ANALYSIS In this step, you need to find out what the organization’s objectives are and the nature and scope of the prob- lem under study. Even if a problem pertains only to a small segment of the organization, you cannot study it in isolation. You need to find out what the objec- tives of the organization itself are. Then you need to see how the problem being studied fits in with them. 2. PROPOSE ALTERNATIVE SOLUTIONS In delving into the organization’s objectives and the specific problem, you may have already discovered some solutions. Other possible solutions can come from interviewing people inside the organization, clients or customers affected by it, suppliers, and consultants. You can also study what competitors are doing. With this data, you then have three choices. You can leave the system as is, improve it, or develop a new system. 3. DESCRIBE THE COSTS & BENEFITS Whichever of the three alterna- tives is chosen, it will have costs and benefits. In this step, you need to indicate what these are. Costs may depend on benefits, which may offer savings. A broad spectrum of benefits may be derived. A process may be speeded up, streamlined through elimination of unnecessary steps, or combined with other processes. Input errors or redundant output may be reduced. Systems and subsystems may be better integrated. Users may be happier with the system. Customers’ or suppliers’ interactions with the system may be more satisfactory. Security may be improved. Costs may be cut. 4. SUBMIT A PRELIMINARY PLAN Now you need to wrap up all your findings in a written report. The readers of this report will be the executives who are in a position to decide in which direction to proceed—make no changes, change a little, or change a lot—and how much money to allow for the project. You should describe the potential solutions, costs, and benefits and indicate your recommendations. The Second Phase: Do an Analysis of the System What three steps are involved in analyzing a system? The objective of Phase 2, systems analysis, is to gather data, analyze the data, and write a report. ( • See Panel 10.3 .) In this second phase of the SDLC, you will follow the course that management has indicated after having read your Phase 1 feasibility report. We are assuming that management has ordered you to perform Phase 2—to do a careful analysis or study of the exist- ing system in order to understand how the new system you proposed would differ. This analysis will also consider how people’s positions and tasks will have to change if the new system is put into effect. 1. GATHER DATA In gathering data, you will review written documents, inter- view employees and managers, develop questionnaires, and observe people and processes at work. 1. Conduct preliminary analysis. This includes stating the objectives, defining the nature and scope of the problem. 2. Propose alternative solutions: leave system alone, make it more efficient, or build a new system. 3. Describe costs and benefits of each solution. 4. Submit a preliminary plan with recommendations. panel 10.2 First phase: Preliminary investigation
  515. Systems Analysis & Programming 495 2. ANALYZE THE DATA Once

    the data has been gathered, you need to come to grips with it and analyze it. Many analytical tools, or modeling tools, are available. Modeling tools are analytical tools such as charts, tables, and diagrams used by systems analysts to present graphic, or pictorial, repre- sentations of a system. An example of a modeling tool is a data flow diagram (DFD) , which graphically shows the flow of data through a system —that is, the essential processes of a system, along with inputs, outputs, and files. ( • See Panel 10.4 .) CASE tools may also be used during the analysis phase, as well as in most other phases. CASE (computer-aided software engineering) tools are computer-automated means of designing and changing systems. This technology is intended to speed up the process of developing systems and to improve the quality of the resulting systems. Such tools can generate and store diagrams, produce documentation, analyze data relationships, generate com- puter code, produce graphics, and provide project management functions. (Project management software, discussed in Chapter 3, consists of programs panel 10.4 Data flow diagram Example of data flow dia- gram and explanation of symbols. panel 10.3 Second phase: Systems analysis 1. Gather data, using tools of written documents, inter- views, questionnaires, and observations. 2. Analyze the data, using modeling tools: grid charts, decision tables, data flow diagrams, systems flow- charts, connectivity diagrams. 3. Write a report. DATA SOURCE Name Name or or or DATA DESTINATION Process 1 Data flow 1 Process 2 Data flow 3 Data flow 5 Name Data flow 4 Data flow 2 Terminator Symbols (entity name) (person or organization outside the system boundaries) Data Store Symbol Process Symbol Data Flow Symbol (inputs and outputs) D1 DATA STORE1 Explanation of standard data flow diagram symbols D2 DATA STORE 2 File Name File Name Name Name
  516. info! more 496 Chapter 10 used to plan, schedule, and

    control the people, costs, and resources required to complete a project on time.) Examples of such programs are Analyst Pro, Visible Analyst, and System Architect. 3. WRITE A REPORT Once you have completed the analysis, you need to docu- ment this phase. This report to management should have three parts. First, it should explain how the existing system works. Second, it should explain the problems with the existing system. Finally, it should describe the requirements for the new system and make recommendations on what to do next. At this point, not a lot of money will have been spent on the systems analy- sis and design project. If the costs of going forward seem prohibitive, this is a good time for the managers reading the report to call a halt. Otherwise, you will be asked to move to Phase 3. The Third Phase: Design the System What three steps are involved in designing a system? The objective of Phase 3, systems design, is to do a preliminary design and then a detail design and to write a report. ( • See Panel 10.5 .) In this third phase of the SDLC, you will essentially create a “rough draft” and then a “detail draft” of the proposed information system. 1. DO A PRELIMINARY DESIGN A preliminary design describes the general func- tional capabilities of a proposed information system. It reviews the system requirements and then considers major components of the system. Usually several alternative systems (called candidates ) are considered, and the costs and the benefits of each are evaluated. Tools used in the design phase may include CASE tools and project man- agement software. Prototyping is often done at this stage. Prototyping refers to using work- stations, CASE tools, and other software applications to build working models of system components so that they can be quickly tested and evaluated. Thus, a prototype is a limited working system, or part of one, developed to test design concepts. A prototype, which may be constructed in just a few days, allows users to find out immediately how a change in the system might benefit them. For example, a systems analyst might develop a menu as a possible screen display, which users could try out. The menu can then be redesigned or fine-tuned, if necessary. 2. DO A DETAIL DESIGN A detail design describes how a proposed informa- tion system will deliver the general capabilities described in the preliminary design. The detail design usually considers the following parts of the system CASE tools are important. For more information, try: http://searchcio- midmarket. techtarget.com/ sDefinition/0,,sid183_ gci213838,00.html www.thedacs.com/databases/ url/key/153 www.thedacs.com/databases/ url/key/153 panel 10.5 Third phase: Systems design 1. Do a preliminary design, using CASE tools, prototyping tools, and project management soft- ware, among others. 2. Do a detail design, defining requirements for output, input, storage, and processing and system controls and backup. 3. Write a report.
  517. Systems Analysis & Programming 497 in this order: output requirements,

    input requirements, storage requirements, processing requirements, and system controls and backup. 3. WRITE A REPORT All the work of the preliminary and detail designs will end up in a large, detailed report. When you hand over this report to senior man- agement, you will probably also make some sort of presentation or speech. The Fourth Phase: Develop the System What are the three steps required in developing a system? In Phase 4, systems development, the systems analyst or others in the organization develop or acquire the software, acquire the hardware, and then test the system. ( • See Panel 10.6 .) Depending on the size of the project, this phase will probably involve the organization in spending substantial sums of money. It could also involve spending a lot of time. However, at the end you should have a workable system. 1. DEVELOP OR ACQUIRE THE SOFTWARE During the design stage, the systems analyst may have had to address what is called the “make-or-buy” decision, but that decision certainly cannot be avoided now. In the make-or-buy decision, you decide whether you have to create a program—have it custom-written—or buy it, meaning simply purchase an existing software package. Sometimes programmers decide they can buy an existing program and modify it rather than write it from scratch. If you decide to create a new program, then the question is whether to use the organization’s own staff programmers or to hire outside contract pro- grammers (outsource it). Whichever way you go, the task could take many months. Programming is an entire subject unto itself, which we discuss later in this chapter, along with programming languages. 2. ACQUIRE HARDWARE Once the software has been chosen, the hardware to run it must be acquired or upgraded. It’s possible your new system will not require any new hardware. It’s also possible that the new hardware will cost millions of dollars and involve many items: microcomputers, mainframes, monitors, modems, and many other devices. The organization may find it’s better to lease than to buy some equipment, especially since, as we mentioned (Moore’s law), chip capability has traditionally doubled every 18 months. 3. TEST THE SYSTEM With the software and hardware acquired, you can now start testing the system. Testing is usually done in two stages: unit testing, then system testing. • Unit testing: In unit testing, the performance of individual parts is examined, using test (made-up or sample) data. If the program is written panel 10.6 Fourth phase: Systems development 1. Develop or acquire the software. 2. Acquire the hardware. 3. Test the system.
  518. 498 Chapter 10 as a collaborative effort by multiple programmers,

    each part of the program is tested separately. • System testing: In system testing, the parts are linked together, and test data is used to see if the parts work together. At this point, actual organization data may be used to test the system. The system is also tested with erroneous data and massive amounts of data to see if the system can be made to fail (“crash”). At the end of this long process, the organization will have a workable infor- mation system, one ready for the implementation phase. The Fifth Phase: Implement the System What’s required to implement a new system? Whether the new information system involves a few handheld computers, an elaborate telecommunications network, or expensive mainframes, the fifth phase will involve some close coordination in order to make the system not just workable but successful. Phase 5, systems implementation, consists of converting the hardware, software, and files to the new system and train- ing the users. ( • See Panel 10.7 .) 1. CONVERT TO THE NEW SYSTEM Conversion, the process of transition from an old information system to a new one, involves converting hardware, soft- ware, and files. There are four strategies for handling conversion: direct, par- allel, phased, and pilot. • Direct implementation: This means that the user simply stops using the old system and starts using the new one. The risk of this method should be evident: What if the new system doesn’t work? If the old system has truly been discontinued, there is nothing to fall back on. • Parallel implementation: This means that the old and new systems are operated side by side until the new system has shown it is reliable, at which time the old system is discontinued. Obviously there are benefits in taking this cautious approach. If the new system fails, the organization can switch back to the old one. The difficulty with this method is the expense of paying for the equipment and people to keep two systems going at the same time. • Phased implementation: This means that parts of the new system are phased in separately—either at different times (parallel) or all at once in groups (direct). • Pilot implementation: This means that the entire system is tried out, but only by some users. Once the reliability has been proved, the system panel 10.7 Fifth phase: Systems implementation 1. Convert hardware, software, and files through one of four types of conversions: direct, parallel, phased, or pilot. 2. Train the users.
  519. Systems Analysis & Programming 499 is implemented with the rest

    of the intended users. The pilot approach still has its risks, since all of the users of a particular group are taken off the old system. However, the risks are confined to a small part of the organization. 2. TRAIN THE USERS Various tools are available to familiarize users with a new system—from documentation (instruction manuals) to videotapes to live classes to one-on-one, side-by-side teacher-student training. Sometimes training is done by the organization’s own staffers; at other times it is con- tracted out. The Sixth Phase: Maintain the System Is maintaining a system an elaborate process? Phase 6, systems maintenance, adjusts and improves the system by having system audits and periodic evaluations and by making changes based on new conditions. ( • See Panel 10.8 .) Even with the conversion accomplished and the users trained, the system won’t just run itself. There is a sixth—and continuous—phase in which the information system must be monitored to ensure that it is successful. Maintenance includes not only keeping the machin- ery running but also updating and upgrading the system to keep pace with new products, services, customers, government regulations, and other requirements. After some time, maintenance costs will accelerate as attempts continue to keep the system responsive to user needs. At some point, these maintenance costs become excessive, indicating that it may be time to start the entire SDLC again. 10.2 PROGRAMMING: A Five-Step Procedure What is programming, and what are the five steps in accomplishing it? To see how programming works, we must understand what constitutes a pro- gram. A program is a list of instructions that the computer must follow to process data into information. The instructions consist of statements used in a programming language, such as BASIC. Examples are programs that do word processing, desktop publishing, or payroll processing. panel 10.8 Sixth phase: Systems maintenance The sixth phase is to keep the system running through system audits and periodic evaluations.
  520. info! more 500 Chapter 10 The decision whether to buy

    or create a program forms part of Phase 4 in the systems development life cycle. Once the decision is made to develop a new system, the programmer goes to work. A program, we said, is a list of instructions for the computer. Programming is a five-step process for creating that list of instructions. Programming is sometimes called software engineering; however, the latter term includes in its definition the use of best-practice processes to create and/or maintain soft- ware, whether for groups or individuals, in an attempt to get rid of the usual haphazard methods that have plagued the software industry. Software engi- neering involves the establishment and use of recognized engineering prin- ciples to obtain software that is reliable and works efficiently. It requires the application of a systematic, disciplined, quantifiable approach to the develop- ment, operation, and maintenance of software. The five steps in the programming process are as follows: 1. Clarify/define the problem—include needed output, input, processing requirements. 2. Design a solution—use modeling tools to chart the program. 3. Code the program—use a programming language’s syntax, or rules, to write the program. 4. Test the program—get rid of any logic errors, or “bugs,” in the program (“debug” it). 5. Document and maintain the program—include written instructions for users, explanation of the program, and operating instructions. Coding—sitting at the keyboard and typing words into a computer—is how many people view programming. As we see, however, it is only one of the five steps. The First Step: Clarify the Programming Needs How are programming needs clarified? The problem clarification (definition) step consists of six mini-steps— clarifying program objectives and users, outputs, inputs, and process- ing tasks; studying the feasibility of the program; and documenting the analysis. ( • See Panel 10.9 .) Let us consider these six mini-steps. 1. CLARIFY OBJECTIVES & USERS You solve problems all the time. A problem might be deciding whether to take a required science course this term or next, or selecting classes that allow you also to fit a job into your schedule. In such cases, you are specifying your objectives. Programming works the same way. You need to write a statement of the objectives you are trying to accomplish— the problem you are trying to solve. If the problem is that your company’s systems analysts have designed a new computer-based payroll-processing Systemantics Who wrote this, and when? “Systems are seductive. They promise to do a hard job faster, better, and more easily than you could do it by yourself. But if you set up a system, you are likely to find your time and effort now being consumed in the care and feeding of the system itself. New problems are created by its very pres- ence. Once set up, it won’t go away, it grows and encroaches. It begins to do strange and wonderful things. Breaks down in ways you never thought possible. It kicks back, gets in the way, and opposes its own proper function. Your own perspective becomes distorted by being in the system. You become anxious and push on it to make it work. Eventu- ally you come to believe that the misbegotten product it so grudgingly delivers is what you really wanted all the time. At that point encroachment has become complete . . . you have become absorbed . . . you are now a systems person!” 1. Clarify objectives and users. 2. Clarify desired outputs. 3. Clarify desired inputs. 4. Clarify desired processing. 5. Double-check feasibility of implementing the program. 6. Document the analysis. panel 10.9 First step: Clarify programming needs
  521. info! more info! more Systems Analysis & Programming 501 proposal

    and brought it to you as the programmer, you need to clarify the programming needs. You also need to make sure you know who the users of the program will be. Will they be people inside the company, outside, or both? What kind of skills will they bring? 2. CLARIFY DESIRED OUTPUTS Make sure you understand the outputs—what the system designers want to get out of the system—before you specify the inputs. For example, what kind of hardcopy is wanted? What information should the outputs include? This step may require several meetings with sys- tems designers and users to make sure you’re creating what they want. 3. CLARIFY DESIRED INPUTS Once you know the kind of outputs required, you can then think about input. What kind of input data is needed? In what form should it appear? What is its source? 4. CLARIFY THE DESIRED PROCESSING Here you make sure you understand the processing tasks that must occur in order for input data to be processed into output data. 5. DOUBLE-CHECK THE FEASIBILITY OF IMPLEMENTING THE PROGRAM Is the kind of program you’re supposed to create feasible within the present budget? Will it require hiring a lot more staff? Will it take too long to accomplish? Occasionally programmers suggest to managers that they buy an existing program and modify it rather than having one written from scratch. 6. DOCUMENT THE ANALYSIS Throughout program clarification, program- mers must document everything they do. This includes writing objective spec- ifications of the entire process being described. The Second Step: Design the Program How is a program designed? Assuming the decision is to make, or custom-write, the program, you then move on to design the solution specified by the systems analysts. To design the solution, you first need to create an algorithm. An algorithm is a formula or set of steps for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point. We use algorithms every day. For example, a recipe for baking bread is an algorithm. Most pro- grams, with the exception of some artificial intelligence applications, consist of algorithms. In computer programming, there are often different algorithms to accomplish any given task, and each algorithm has specific advantages and disadvantages in different situations. Inventing elegant algorithms—algorithms that are simple and require the fewest steps possible—is one of the principal challenges in programming. Algorithms can be expressed in various ways. In the program design step, the software is designed in two mini-steps. First, the program logic is determined through a top-down approach and modularization, using a hierarchy chart . Then it is designed in detail, either in narrative form, using pseudocode, or graphically, using flowcharts. ( • See Panel 10.10 .) It used to be that programmers took a kind of seat-of-the-pants approach to programming. Programming was considered an art, not a science. Today, however, most programmers use a design approach called structured program- ming. Structured programming takes a top-down approach that breaks programs into modular forms. It also uses standard logic tools called control structures (sequence, selection, case, and iteration). The point of structured programming is to make programs more efficient (with fewer lines of code) and better organized (more readable) and to have better notations so that they have clear and correct descriptions. Algorithm: What’s the Origin of This Word? The word algorithm originates in the name of an Arab math- ematician, Al-Khowarizmi, of the court of Mamun in Baghdad in the 800s. His treatises on Hindu arithmetic and on alge- bra made him famous. He is also said to have given algebra its name. Much of the math- ematical knowledge of medieval Europe was derived from Latin translations of his works. How Does One Go about Solving a Problem? According to Gary Hadler, who lectures on this subject, one way is to follow 4 stages: rec- ognize and define the problem, determine possible solutions, choose the best solution, implement the solution: www.tuition.com.hk/the- stages-of-problem-solving. htm In general, problems are not solved just by pondering them; specific problem-solving skills are required. For more informa- tion, try: www.bizmove.com/skills/m8d. htm
  522. 502 Chapter 10 The two mini-steps of program design are

    as follows. 1. DETERMINE THE PROGRAM LOGIC, USING A TOP-DOWN APPROACH Deter- mining the program logic is like outlining a long term paper before you pro- ceed to write it. Top-down program design proceeds by identifying the top element, or module, of a program and then breaking it down in hierar- chical fashion to the lowest level of detail. The top-down program design is used to identify the program’s processing steps, or modules. After the program is designed, the actual coding proceeds from the bottom up, using the modu- lar approach. • Modularization: The concept of modularization is important. Modularization dramatically simplifies program development, because each part can be developed and tested separately. A module is a processing step of a program. Each module is made up of logically related program statements. (Sometimes a module is called a subprogram or subroutine. ) An example of a module might be a programming instruction that simply says “Open a file, find a record, and show it on the display screen.” It is best if each module has only a single function, just as an English paragraph should have a single, complete thought. This rule limits the module’s size and complexity. • Top-down program design: Top-down program design can be represented graphically in a hierarchy chart. A hierarchy chart, or structure chart, illustrates the overall purpose of the program, by identifying all the modules needed to achieve that purpose and the relationships among them. ( • See Panel 10.11 .) It works from the general down to the specific, starting with the top-level (high-level) view of what the program is to do. Then each layer refines and expands the previous one until the bottom layer can be made into specific programming modules. The program must move in sequence from one module to the next until all have been processed. There must be three principal modules corresponding to the three principal computing operations—input, processing, and output. (In Panel 10.11 they are “Read input,” “Calculate pay,” and “Generate output.”) 2. DESIGN DETAILS, USING PSEUDOCODE AND/OR FLOWCHARTS Once the essential logic of the program has been determined, through the use of top- down programming and hierarchy charts, you can go to work on the details. There are two ways to show details—write them or draw them; that is, use pseudocode or use flowcharts. Most projects use both methods. • Pseudocode: Pseudocode is a method of designing a program using normal human-language statements to describe the logic and the processing flow. ( • See Panel 10.12 .) Pseudocode is like an outline or summary form of the program you will write. 1. Determine program logic through top-down approach and modular- ization, using a hierarchy chart. 2. Design details using pseudocode and/or flowcharts, preferably involving control structures. panel 10.10 Second step: Program design
  523. Systems Analysis & Programming 503 panel 10.12 Pseudocode 1.0 2.1

    2.2 4.1 4.2 3.1.1 3.1.2 3.2.1 3.2.2 3.1 3.2 2.0 3.0 4.0 Each module has a single entry point (execution of the program module always starts at the same place) and a single exit point (control always leaves the module at the same place). If one module refers to or transfers control to another module, the latter module returns control to the point from which it was “called” by the first module. Each module must be of manageable size. Each module should be independent and have a single function. The functions of input and output are clearly defined in separate modules. 1. 2. 3. 4. 5. Payroll process Read input Calculate pay Generate output Generate payroll report Generate paychecks Read employee master record Read individual time card Calculate deductions Calculate overtime Calculate regular pay Calculate gross pay Calculate taxes Calculate net pay START DO WHILE (so long as) there are records Read a customer billing account record IF today’s date is greater than 30 days from date of last customer payment Calculate total amount due Calculate 5% interest on amount due Add interest to total amount due to calculate grand total Print on invoice overdue amount ELSE Calculate total amount due ENDIF Print out invoice END DO END panel 10.11 A hierarchy chart This represents a top-down design for a payroll program. Here the modules, or processing steps, are represented from the highest level of the program down to details. The three principal process- ing operations—input, processing, and output—are represented by the modules in the second layer: “Read input,” “Calcu- late pay,” and “Generate output.” Before tasks at the top of the chart can be per- formed, all the ones below must be per- formed. Each module represents a logical processing step.
  524. 504 Chapter 10 Sometimes pseudocode is used simply to express

    the purpose of a particular programming module in somewhat general terms. With the use of such terms as IF, THEN, or ELSE, however, the pseudocode follows the rules of control structures, an important aspect of structured programming, as we shall explain. • Program flowcharts: A program flowchart is a chart that graphically presents the detailed series of steps (algorithm, or logical flow) needed to solve a programming problem. The flowchart uses standard symbols—called ANSI symbols, after the American National Standards Institute, which developed them. ( • See Panel 10.13 .) The symbols at the left of the drawing might seem clear enough. But how do you figure out the logic of a program? How do you reason the program out so that it will really work? The answer is to use control structures, as explained next. • Control structures: When you’re trying to determine the logic behind something, you use words like if and then and else. (For example, without using these exact words, you might reason along these lines: “If she comes over, then we’ll go out to a movie, else I’ll just stay in and watch TV.”) Control structures make use of the same words. A control structure, or logic structure, is a structure that controls the logical sequence in which computer program instructions are executed. In structured program design, three control structures are used to form the logic of a program: sequence, selection, and iteration (or loop). ( • See Panel 10.14 , page 506.) These are the tools with which you can write structured programs and take a lot of the guesswork out of programming. (Additional variations of these three basic structures are also used.) COMPARING THE THREE CONTROL STRUCTURES One thing that all three con- trol structures have in common is one entry and one exit. The control structure is entered at a single point and exited at another single point. This helps sim- plify the logic so that it is easier for others following in a programmer’s foot- steps to make sense of the program. (In the days before this requirement was instituted, programmers could have all kinds of variations, leading to the kind of incomprehensible program known as spaghetti code. ) Let us consider the three control structures: • Sequence control structure: In the sequence control structure, one program statement follows another in logical order. For instance, in the example shown in Panel 10.14 , there are two boxes (“Statement” and “Statement”). One box could say “Open file,” the other “Read a record.” There are no decisions to make, no choices between “yes” or “no.” The boxes logically follow one another in sequential order. • Selection control structure: The selection control structure —also known as an IF-THEN-ELSE structure —represents a choice. It offers two paths to follow when a decision must be made by a program. An example of a selection structure is as follows: IF a worker’s hours in a week exceed 40 THEN overtime hours equal the number of hours exceeding 40 ELSE the worker has no overtime hours. A variation on the usual selection control structure is the case control structure. This offers more than a single yes-or-no decision. The case structure allows several alternatives, or “cases,” to be presented. (“IF Case 1 occurs, THEN do thus-and-so. IF Case 2 occurs, THEN follow an alternative course. . . .” And so on.) The case control structure saves the programmer the trouble of having to indicate a lot of separate IF-THEN- ELSE conditions.
  525. Systems Analysis & Programming 505 Symbol Use Name Terminal Process

    Input/Output (I/O) Decision Predefined Process Connector Flowlines and Arrowheads Indicates the beginning and end of a program. A calculation or assigning of a value to a variable. Any statement that causes data to be input to a program (INPUT, READ) or output from the program, such as printing on the display screen or printer. Program decisions. Allows alternate courses of action based on a condition. A decision indicates a question that can be answered yes or no (or true or false). A group of statements that together accomplish one task. Used extensively when programs are broken into modules. Can be used to eliminate lengthy flowlines. Its use indicates that one symbol is connected to another. Used to connect symbols and indicate the sequence of operations. The flow is assumed to go from top to bottom and from left to right. Arrowheads are only required when the flow violates the standard direction. NO YES Start Stop Input Price Input Property Value Input Tax Rate Calculate Sales Tax = Price x Rate Start Stop Print Tax Print Name Input Name YES NO Print Property Tax Start Stop Value> 100,000 ? Calculate Tax = Value x .12 Calculate Tax = Value x .15 Input Name Input Property Value Name = “End” ? panel 10.13 Example of a program flowchart and explanation of flowchart symbols This example represents a flowchart for a payroll program.
  526. 506 Chapter 10 Selection control structure (IF-THEN-ELSE) Sequence control structure

    (one program statement follows another in logical order) Iteration control structures: DO UNTIL and DO WHILE Statement Statement IF (test condition) YES NO Case 1 Case 2 Case 3 Case 4 Variation on selection: the case control structure (more than a single yes-or-no decision) Condition Case Process Process Process Process THEN (statement) ELSE (statement) Loop statement NO YES DO UNTIL DO WHILE DO UNTIL (test condition) DO WHILE (test condition) NO YES Loop statement panel 10.14 The three control structures The three structures used in structured pro- gram design to form the logic of a program are sequence, selection, and iteration. Case is an important version of selection. • Iteration control structure: In the iteration, or loop, control structure, a process may be repeated as long as a certain condition remains true. There are two types of iteration structures—DO UNTIL and DO WHILE. Of these, DO UNTIL is more often encountered.
  527. info! more Systems Analysis & Programming 507 An example of

    a DO UNTIL structure is as follows: DO read in employee records UNTIL there are no more employee records. An example of a DO WHILE structure is as follows: DO read in employee records WHILE [that is, as long as] there continue to be employee records. What is the difference between the two iteration structures? It is simply this: If several statements need to be repeated, you must decide when to stop repeating them. You can decide to stop them at the beginning of the loop, using the DO WHILE structure. Or you can decide to stop them at the end of the loop, using the DO UNTIL structure. The DO UNTIL iteration means that the loop statements will be executed at least once, because in this case the iteration statements are executed before the program checks whether to stop. The Third Step: Code the Program What is involved in coding a program? Once the design has been developed, the actual writing, or coding, of the pro- gram begins. ( • See Panel 10.15 .) Coding is what many people think of when they think of programming, although it is only one of the five steps. Coding consists of translating the logic requirements from pseudocode or flow- charts into a programming language —the letters, numbers, and symbols that make up the program. 1. SELECT THE APPROPRIATE HIGH-LEVEL PROGRAMMING LANGUAGE A pro- gramming language is a set of rules that tells the computer what opera- tions to do. Examples of well-known programming languages are C, C ϩ ϩ , and Java. These are called high-level languages, as we explain in a few pages. Not all languages are appropriate for all uses. Some, for example, have strengths in mathematical and statistical processing. Others are more appropriate for data- base management or support a specific operating system, such as Unix. Some languages take more storage space than oth- ers; if you are writing code for an embedded processor (Chap- ter 1), for example, you would choose a language that is space efficient. And some languages are faster than others. Thus, in choosing the language, you need to consider what pur- pose the program is designed to serve and what languages are already being used in your organization or in your field. We consider these matters in Section 10.3 below. Sequence, Selection, Iteration In the 1960s it was mathemati- cally proved that any problem that can be solved with a computer can be defined using sequence, selection, and itera- tion. Do an internet search to find out who determined this and when. 1. Select the appropriate high-level programming language. 2. Code the program in that language, following the syntax carefully. panel 10.15 Third step: Program coding The third step in pro- gramming is to translate the logic of the program worked out from pseudo- code or flowcharts into a high-level programming language, following its grammatical rules.
  528. info! more 508 Chapter 10 2. CODE THE PROGRAM IN

    THAT LANGUAGE, FOLLOWING THE SYNTAX For a program to work, you have to follow the syntax, the rules of the program- ming language. Programming languages have their own grammar just as human languages do. But computers are probably a lot less forgiving if you use these rules incorrectly. The Fourth Step: Test the Program How is a program tested? Program testing involves running various tests and then running real- world data to make sure the program works. ( • See Panel 10.16 .) Two prin- cipal activities are desk-checking and debugging. These steps are called alpha testing. 1. PERFORM DESK-CHECKING Desk-checking is simply reading through, or checking, the program to make sure that it’s free of errors and that the logic works. In other words, desk-checking is like proofreading. This step should be taken before the program is actually run on a computer. 2. DEBUG THE PROGRAM Once the program has been desk-checked, further errors, or “bugs,” will doubtless surface. To debug means to detect, locate, and remove all errors in a computer program. Mistakes may be syntax errors or logic errors. Syntax errors are caused by typographical errors and incorrect use of the programming language. Logic errors are caused by incorrect use of control structures. Programs called diagnostics exist to check program syntax and display syntax-error messages. Diagnostic pro- grams thus help identify and solve problems. Sometimes debugging is partially done in the third step, program coding, using the “buddy system.” In this system, two people sit side by side; while one person (the “driver”) codes, the other person (the “navigator”) checks the code, corrects it, and offers suggestions for improvement. 2 3. RUN REAL-WORLD DATA After desk-checking and debugging, the pro- gram may run fine—in the laboratory. However, it needs to be tested with real data; this is called beta testing. Indeed, it is even advisable to test the program with bad data—data that is faulty, incomplete, or in overwhelming quantities—to see if you can make the system crash. Many users, after all, may be far more heavy-handed, ignorant, and careless than programmers have anticipated. panel 10.16 Fourth step: Program testing The fourth step is to test the program and “debug” it of errors so that it will work properly. The word “bug” dates from 1945, when a moth was discov- ered lodged in a relay of the Mark I computer. The moth disrupted the exe- cution of the program. More about Software Testing Go to www.softwareqatest.com and read the FAQs about soft- ware testing. Would you like to be a software tester? Find some job information at: www.essortment.com/all/ softwaretesting_rxng.htm
  529. Systems Analysis & Programming 509 Several trials using different test

    data may be required before the program- ming team is satisfied that the program can be released. Even then, some bugs may persist, because there comes a point where the pursuit of errors is uneco- nomical. This is one reason why many users are nervous about using the first version (version 1.0) of a commercial software package. The Fifth Step: Document & Maintain the Program What is involved in documenting and maintaining a program? Writing the program documentation is the fifth step in programming. The resulting documentation consists of written descriptions of what a pro- gram is and how to use it. Documentation is not just an end-stage process of programming. It has been (or should have been) going on throughout all programming steps. Documentation is needed for people who will be using or be involved with the program in the future. ( • See Panel 10.17 .) Documentation should be prepared for several different kinds of readers— users, operators, and programmers. 1. WRITE USER DOCUMENTATION When you buy a commercial software pack- age, such as a spreadsheet, you normally get a manual with it. This is user documentation. Nowadays manuals are usually on the software CD. 2. WRITE OPERATOR DOCUMENTATION The people who run large computers are called computer operators. Because they are not always programmers, they need to be told what to do when the program malfunctions. The operator docu- mentation gives them this information. 3. WRITE PROGRAMMER DOCUMENTATION Long after the original program- ming team has disbanded, the program may still be in use. If, as is often the case, a fifth of the programming staff leaves every year, after 5 years there could be a whole new bunch of programmers who know nothing about the software. Program documentation helps train these newcomers and enables them to maintain the existing system. 4. MAINTAIN THE PROGRAM A word about maintenance: Maintenance includes any activity designed to keep programs in working condition, error-free, and up to date—adjustments, replacements, repairs, measurements, tests, and so on. The rapid changes in modern organizations—in products, marketing strategies, accounting systems, and so on—are bound to be reflected in their computer systems. Thus, maintenance is an important matter, and documen- tation must be available to help programmers make adjustments in existing systems. The five steps of the programming process are summarized in the table on the following page. ( • See Panel 10.18 .) 1. Write user documentation. 2. Write operator documentation. 3. Write programmer documentation. 4. Maintain the program. panel 10.17 Fifth step: Program documentation and maintenance The fifth step is really the culmination of activity that has been going on through all the programming steps— documentation. Written descriptions and proce- dures about a program and how to use it need to be developed for dif- ferent people—users, operators, and program- mers. Maintenance is an ongoing process.
  530. 510 Chapter 10 10.3 FIVE GENERATIONS OF PROGRAMMING LANGUAGES What

    are the five generations of programming languages? As we’ve said, a programming language is a set of rules that tells the computer what operations to do. Programmers, in fact, use these languages to create other kinds of software. Many programming languages have been written, some with colorful names (SNOBOL, HEARSAY, DOCTOR, ACTORS, EMER- ALD, JOVIAL). Each is suited to solving particular kinds of problems. What do all these languages have in common? Simply this: Ultimately they must be reduced to digital form—a 1 or 0, electricity on or off—because that is all the computer can work with. To see how this works, it’s important to understand that there are five lev- els, or generations, of programming languages, ranging from low level to high level. The five generations of programming languages start at the lowest level with (1) machine language. They then range up through (2) assem- bly language, (3) high-level languages (procedural languages and object- oriented languages), and (4) very-high-level languages (problem-oriented languages). At the highest level are (5) natural languages. Programming languages are said to be lower-level when they are closer to the language that the computer itself uses—the 1s and 0s. They are called higher level when they are closer to the language people use—more like English, for example. Beginning in 1945, the five levels, or generations, have evolved over the years, as programmers gradually adopted the later generations. The births of the generations are as follows. ( • See Panel 10.19 .) panel 10.18 Summary of the five programming steps Step Activities Step 1: Problem clarification 1. Clarify program objectives and pro- gram users 2. Clarify desired outputs. 3. Clarify desired inputs. 4. Clarify desired processing. 5. Double-check feasibility of imple- menting the program. 6. Document the analysis. Step 2: Program design 1. Determine program logic through topdown approach and modulariza- tion, using a hierarchy chart. 2. Design details using pseudocode and/or using flowcharts, preferably on the basis of control structures. 3. Test design with structured walkthrough. Step 3: Program coding 1. Select the appropriate high-level programming language. 2. Code the program in that language, following the syntax carefully. Step 4: Program testing 1. Desk-check the program to discover errors. 2. Run the program and debug it (alpha testing). 3. Run real-world data (beta testing). Step 5: Program documentation and maintenance 1. Write user documentation. 2. Write operator documentation. 3. Write programmer documentation. 4. Maintain the program.
  531. Systems Analysis & Programming 511 • First generation, 1945— machine

    language • Second generation, mid-1950s— assembly language • Third generation, mid-1950s to early 1960s— high-level languages (procedural languages and object-oriented); for example, FORTRAN, COBOL, BASIC, C, and C ϩ ϩ • Fourth generation, early 1970s— very-high-level languages (problem-oriented languages); for example, SQL, Intellect, NOMAD, FOCUS • Fifth generation, early 1980s— natural languages Let’s consider these five generations. First Generation: Machine Language How would I characterize first-generation programming language? Machine language is the basic language of the computer, representing data as 1s and 0s. ( • See Panel 10.20 , next page.) Each CPU model has its own machine language. Machine-language programs vary from computer to com- puter; that is, they are machine-dependent. Machine-language binary digits, which correspond to the on and off electri- cal states of the computer, are clearly not convenient for people to read and use. Believe it or not, though, programmers did work with these mind- numbing First-Generation Language First-Generation Language Second-Generation Language Third-Generation Language Fourth-Generation Language machine language assembly language COBOL, BASIC, C, compilers, interpreters report generators, query languages, application generators Fifth-Generation Language natural language More technical More flexible Less user friendly • Faster Less technical Less flexible More user friendly Slower Current and future development panel 10.19 The five generations of programming languages
  532. 512 Chapter 10 digits. There must have been great sighs

    of relief when the next generation of programming languages—assembly language—came along. Second Generation: Assembly Language Could I write a computer program in assembly language? Assembly language is a low-level programming language that allows a programmer to write a program using abbreviations or more easily remembered words instead of numbers, as in machine language; essen- tially, assembly language is a mnemonic version of machine language. (Refer to Panel 10.20 again.) For example, the letters “MP” could be used to represent the instruction MULTIPLY and “STO” to represent STORE. As you might expect, a programmer can write instructions in assembly lan- guage more quickly than in machine language. Nevertheless, it is still not an easy language to learn, and it is so tedious to use that mistakes are frequent. Moreover, assembly language has the same drawback as machine language in that it varies from computer to computer—it is machine-dependent. We now need to introduce the concept of language translator. Because a computer can execute programs only in machine language, a translator or con- verter is needed if the program is written in any other language. A language translator is a type of system software that translates a program written in a second-, third-, or higher-generation language into machine language. Language translators are of three types: • Assemblers • Compilers • Interpreters First generation Machine language 11110010 01110011 1101 001000010000 0111 000000101011 11110010 01110011 1101 001000011000 0111 000000101111 11111100 01010010 1101 001000010010 1101 001000011101 11110000 01000101 1101 001000010011 0000 000000111110 11110011 01000011 0111 000001010000 1101 001000010100 10010110 11110000 0111 000001010100 Second generation Assembly language Third generation COBOL PACK 210(8,13),02B(4,7) PACK 218(8,13),02F(4,7) MP 212(6,13),21D(3,13) SRP 213(5,13),03E(0),5 UNPK 050(5,7),214(4,13) OI 054(7),X’FO’ MULTIPLY HOURS-WORKED BY PAY-RATE GIVING GROSS-PAY ROUNDED. panel 10.20 Three generations of programming languages (Top) Machine language is all binary 0s and 1s—difficult for people to work with. (Middle) Assembly language uses abbreviations for major instructions (such as MP for “MULTIPLY”). This is easier for people to use, but still challenging. (Bottom) COBOL, a third- generation language, uses English words that people can understand.
  533. Systems Analysis & Programming 513 An assembler, or assembler program,

    is a program that translates the assembly-language program into machine language. We describe compil- ers and interpreters in the next section. Third Generation: High-Level or Procedural Languages Could I learn to read third-generation languages? A high-level, or procedural/object-oriented, language resembles some human language such as English; an example is COBOL, which is used for business applications. (Refer again to Panel 10.20 .) A procedural language allows users to write in a familiar notation, rather than numbers or abbreviations. Also, unlike machine and assembly languages, most are not machine-dependent—that is, they can be used on more than one kind of computer. Familiar languages of this sort include FORTRAN, COBOL, BASIC, Pascal, and C. (We cover object- oriented languages shortly.) For a procedural language to work on a computer, it needs a language translator to translate it into machine language. Depending on the procedural language, either of two types of translators may be used—a compiler or an interpreter. COMPILER—EXECUTE LATER A compiler is a language-translator program that converts the entire program of a high-level language into machine language before the computer executes the program. The programming instructions of a procedural language are called the source code. The compiler translates it into machine language, which in this case is called the object code. The important point here is that the object code can be saved and thus can be executed later (as many times as desired), rather than run right away. ( • See Panel 10.21 .) These executable files—the output of compilers—have the .exe extension. Examples of procedural languages using compilers are COBOL, FORTRAN, Pascal, and C. INTERPRETER—EXECUTE IMMEDIATELY An interpreter is a language- translator program that converts each procedural language statement IF COUNT = 10 PRINT “SUCCESS” ELSE PRINT “YOU HAVE TROUBLE” ENDIF 10010101001010001010100 10101010010101001001010 10100101010001010010010 Object Code (machine languge) Source Code (high-level language) Language translator program What the program creates What the hardware sees panel 10.21 Compiler This language translator converts the procedural language (source code) into machine language (object code) before the computer can execute the program.
  534. info! more 514 Chapter 10 into machine language and executes

    it immediately, statement by statement. In contrast to the compiler, an interpreter does not save object code. Therefore, interpreted code generally runs more slowly than compiled code. However, the code can be tested line by line. BASIC is a procedural language using an interpreter. WHY DOES IT MATTER? Who cares, you might say, whether you can run a pro- gram now or later? (After all, “later” could be only a matter of seconds or min- utes.) Here’s the significance: When a compiler is used, it requires two steps (the source code and the object code) before the program can be executed. The interpreter, on the other hand, requires only one step. The advantage of a com- piler language is that, once you have obtained the object code, the program executes faster. The advantage of an interpreter language, on the other hand, is that programs are easier to develop. Some language translators—such as those with C ϩ ϩ and Java, covered shortly—can both compile and interpret. Some of the most popular procedural languages are Visual BASIC, C, and C ϩ ϩ . ( • See Panel 10.22 .) Fourth Generation: Very-High-Level or Problem-Oriented Languages What are three categories of fourth-generation languages? Third-generation languages tell the computer how to do something. Fourth- generation languages, in contrast, tell the computer what to do. Very-high-level, or problem-oriented or nonprocedural, languages, also called fourth- generation languages (4GLs), are much more user-oriented and allow users to develop programs with fewer commands compared with procedural languages, although they require more computing power. These languages are called problem-oriented because they are designed to solve specific problems, whereas procedural languages are more general-purpose languages. Three types of problem-oriented languages are report generators, query lan- guages, and application generators. REPORT GENERATORS A report generator, also called a report writer, is a pro- gram for end-users that produces a report. The report may be a printout or a screen display. It may show all or part of a database file. You can specify the format in advance—columns, headings, and so on—and the report genera- tor will then produce data in that format. Report generators (an example is RPGIII) were the precursors to today’s query languages. QUERY LANGUAGES A query language is an easy-to-use language for accessing and manipulating data from a database management system. The query may be expressed in the form of a sentence or near-English command. Or the query may be obtained from choices on a menu. Examples of query languages are SQL (for “Structured Query Language”) and Intellect. For example, with Intellect, which is used with IBM mainframes, you can make an English-language request such as “Tell me the number of employees in the sales department.” APPLICATION GENERATORS An application generator is a programmer’s tool consisting of modules that have been preprogrammed to accomplish various tasks. The benefit is that the programmer can generate application programs from descriptions of the problem rather than by traditional programming, in which he or she has to specify how the data should be processed. Programmers use application generators to help them create parts of other programs. For example, the software is used to construct on-screen menus or types of input and output screen formats. NOMAD and FOCUS, two database management systems, include application generators. SQL Example If you were to update the data on a salesperson for all cus- tomers in a particular region, the procedural-language way might look something like this: do until eof if rs(“state”) 5 “NH” then rs(“salesperson”) 5 “Mike” end if rs.next loop The SQL way would be: UPDATE customers SET sales- person 5 “Mike” WHERE state 5 “NH” (www.paragoncorporation.com/ ArticleDetail .aspx?ArticleIDϭ27)
  535. Systems Analysis & Programming 515 Pascal if INVOICEAMOUNT > 500.00

    then DISCOUNT := 0.07 * INVOICEAMOUNT else DISCOUNT := 0.0; INVOICEAMOUNT := INVOICEAMOUNT – DISCOUNT C if (invoice_amount > 500.00) discount = 0.07 * invoice_amount; else discount = 0.00; invoice_amount = invoice_amount – discount; IF (XINVO .GT. 500.00) THEN DISCNT = 0.07 * XINVO ELSE DISCNT = 0.0 ENDIF XINVO = XINVO – DISCNT FORTRAN OPEN-INVOICE-FILE. OPEN I-O INVOICE FILE. READ-INVOICE-PROCESS. PERFORM READ-NEXT-REC THROUGH READ-NEXT-REC-EXIT UNTIL END-OF-FILE. STOP RUN. READ-NEXT-REC. READ INVOICE-REC INVALID KEY DISPLAY ’ERROR READING INVOICE FILE’ MOVE ’Y’ TO EOF-FLAG GOTO READ-NEXT-REC-EXIT. IF INVOICE-AMT > 500 COMPUTE INVOICE-AMT = INVOICE-AMT – (INVOICE-AMT * .07) REWRITE INVOICE-REC. READ-NEXT-REC-EXIT. EXIT. COBOL 10 REM 20 REM 30 REM 40 REM 50 INPUT “What is the Invoice Amount”; INV.AMT 60 IF INV.AMT > 500 THEN LET DISCOUNT = .07 ELSE LET DISCOUNT = 0 70 REM Display results 80 PRINT “Original Amt”, “Discount”, “Amt after Discount” 90 PRINT INV.AMT, INV.AMT * DISCOUNT, INV.AMT – INV.AMT * DISCOUNT 100 END This Program Calculates a Discount Based on the Invoice Amount If Invoice Amount is Greater Than 500, Discount is 7% Otherwise Discount is 0 BASIC panel 10.22 Third-generation languages compared This shows how five lan- guages handle the same statement. The state- ment specifies that a customer gets a discount of 7% of the invoice amount if the invoice is greater than $500; if the invoice is lower, there is no discount.
  536. info! more 516 Chapter 10 Fifth Generation: Natural Languages Have

    I ever seen or used a fifth-generation language? Natural languages are of two types. The first comprises ordinary human languages: English, Spanish, and so on. The second type comprises pro- gramming languages that use human language to give people a more nat- ural connection with computers. With a problem-oriented language, you can type in some rather routine inquiries, such as (in the language known as FOCUS) the following: SUM SHIPMENTS BY STATE BY DATE. Natural languages, by contrast, allow questions or commands to be framed in a more conversational way or in alternative forms—for example: I WANT THE SHIPMENTS OF PERSONAL DIGITAL ASSISTANTS FOR ALA- BAMA AND MISSISSIPPI BROKEN DOWN BY CITY FOR JANUARY AND FEBRUARY. ALSO, MAY I HAVE JANUARY AND FEBRUARY SHIPMENTS LISTED BY CITIES FOR PERSONAL COMMUNICATORS SHIPPED TO WISCONSIN AND MINNESOTA. Natural languages are part of the field of study known as artificial intelli- gence (discussed in Chapter 8). Artificial intelligence (AI) is a group of related technologies that attempt to develop machines capable of emulating human qualities, such as learning, reasoning, communicating, seeing, and hearing. The dates of the principal programming languages are shown in the time line running along the bottom of these pages. ( • See Panel 10.23 .) 10.4 PROGRAMMING LANGUAGES USED TODAY What are some third-generation languages, and what are they used for? We now turn back and consider some of the third-generation, or high-level, languages in use today. FORTRAN: The Language of Mathematics & the First High-Level Language What is FORTRAN useful for? Developed from 1954 to 1956 by John Backus and others at IBM, FORTRAN (for FORmula TRANslator ) was the first high-level language. (Refer back to Panel 10.22 .) Originally designed to express mathematical formulas, it is still What Can SQL Do? • execute queries against a database • retrieve data from a database • insert records in a database • update records in a database • delete records from a database • create new databases • create new tables in a database • create stored procedures in a database • create views in a database • manipulate tables (www.w3schools.com/SQl/ sql_intro.asp) panel 10.23 Timeline: Brief history of the development of programming languages and formatting tools 1950 ED SAC assem bly language 1843 W orld’s first com puter program m er, Ada Lovelace, publishes her notes. G race M urray H opper develops A-O , the first com piler. 1954 FO RTR A N — the language of m athem atics 1958 ALG O L-58 1958 LISP— for artificial intelligence program s 1960 C O BO L— the language of business 1964 R PG — the easy language for business reports 1964 PL/1— the best of FO RTR AN and C O BO L? 1965 BASIC — the easy language 1967 Sim ula— the first conceptual object-oriented language (also, the term software engineering is introduced) 1970 Pascal— the sim ple language 1951- 1952
  537. info! more Systems Analysis & Programming 517 the most widely

    used language for mathematical, scientific, and engineering problems. It is also useful for complex business applications, such as forecast- ing and modeling. However, because it cannot handle a large volume of input/ output operations or file processing, it is not used for more typical business problems. FORTRAN has both advantages and disadvantages: ADVANTAGES (1) FORTRAN can handle complex mathematical and logical expressions. (2) Its statements are relatively short and simple. (3) FORTRAN programs developed on one type of computer can often be easily modified to work on other types. DISADVANTAGES (1) FORTRAN does not handle input and output operations to storage devices as efficiently as some other higher-level languages. (2) It has only a limited ability to express and process nonnumeric data. (3) It is not as easy to read and understand as some other high-level languages. COBOL: The Language of Business How would I characterize the purpose of COBOL? Developed under the auspices of the U.S. Department of Defense, with Grace Murray Hopper as a major contributor, and formally adopted in 1960, COBOL (for COmmon Business-Oriented Language ) is the most frequently used busi- ness programming language for large computers. (Refer again to Panel 10.22 .) Its most significant attribute is that it is extremely readable. For example, a COBOL line might read: MULTIPLY HOURLY-RATE BY HOURS-WORKED GIVING GROSS-PAY Writing a COBOL program resembles writing an outline for a research paper. The program is divided into four divisions—Identification, Environ- ment, Data, and Procedure. The divisions in turn are divided into sections, which are divided into paragraphs, which are further divided into sections. The Identification Division identifies the name of the program and the author (programmer) and perhaps some other helpful comments. The Environment Division describes the computer on which the program will be compiled and executed. The Data Division describes what data will be processed. The Proce- dure Division describes the actual processing procedures. Some people believe that COBOL is becoming obsolete. However, others dis- agree. Few things that were around in the IT industry in 1960 are still around today, except perhaps in museums and in basements. Yet the COBOL language, albeit highly evolved from its origins, remains relevant. The corporate assets 1970 Sm alltalk— based on Sim ula the first pure object-oriented program m ing language 1971 FO RTH — for processing data quickly 1972 PRO LO G — for artificial intelligence applications 1972 C — for portability and scientific use 1979 Ada— a possible new standard 1981 M odula-2— a Pascal-like language for w riting system s software 1982 dBASE— a D BM S and program m ing language 1984 Turbo Pascal— object-oriented version of Pascal 1987 H yperC ard— M acintosh hypertext 2007 Tcl, R uby, PH P 1990s Visual BASIC, Perl, W idget, H TM L, VR M L, XM L, Java, ActiveX, C G I, R 2012? Large program s, no longer w ritten by hum an program m ers, are grow n in a com puter through evolutionary program m ing. In 2008, the California state government had trouble push- ing through spending cuts because of a lack of skilled COBOL programmers. It wanted to cut wages, but its payroll system is written in COBOL. It’s a problem many organizations are facing, according to Andy Sinclair, senior director of prod- uct management at software supplier Micro Focus. “COBOL is still used by most banks, gov- ernments and big businesses,” he said. But despite this, the IT industry is experiencing a shortage of skilled COBOL staff. Many people expected COBOL to disappear by the year 2000, said Sinclair, but the competi- tive edge its systems give to businesses means it is still widely used. The fact that COBOL systems have been built for more than 30 years means each one is unique and is tailored to each individual business’s needs. These systems have given com- panies their competitive edge and have proved far harder to replace or rewrite than expected. (www.computerweekly.com/ Articles/2008/08/07/231774/ cobol-programmer-shortage- starts-to-bite.htm)
  538. info! more info! more 518 Chapter 10 represented by the

    billions (trillions?) of lines of COBOL code still running on commercial computers aren’t about to be abandoned. Nor should they be. New tools that help integrate legacy (read: COBOL) systems with PC applica- tions, web services, new data formats, and protocols have been available since distributive systems emerged years ago. As today’s application environment has evolved, .NET for instance, so has COBOL’s capability to link to it, merge with it, and interact with it. Stretching the lifespan of an enterprise’s legacy systems increases the value and productivity of its IT development staff and of the assets they produce. 3 COBOL, too, has both advantages and disadvantages. ADVANTAGES (1) It is machine-independent. (2) Its English-like statements are easy to understand, even for a nonprogrammer. (3) It can handle many files, records, and fields. (4) It easily handles input/output operations. DISADVANTAGES (1) Because it is so readable, it is wordy. Thus, even simple programs are lengthy, and programmer productivity is slowed. (2) It cannot handle mathematical processing as well as FORTRAN. BASIC: The Easy Language Have I ever written a program in BASIC or could I? BASIC was developed by John Kemeny and Thomas Kurtz in 1964 for use in training their students at Dartmouth College. By the late 1960s, it was widely used in academic settings on all kinds of computers, from mainframes to PCs. BASIC ( Beginner’s All-purpose Symbolic Instruction Code ) used to be the most popular microcomputer language and is considered the easiest program- ming language to learn. (Refer to Panel 10.22 .) Although it is available in com- piler form, the interpreter form is more popular with first-time and casual users. This is because it is interactive, meaning that user and computer can communicate with each other during the writing and running of the program. Today there is no one version of BASIC. One of the popular current evolutions is Visual BASIC, discussed shortly. The advantage and disadvantages of BASIC are these: ADVANTAGE The primary advantage of BASIC is its ease of use. DISADVANTAGES (1) Its processing speed is relatively slow, although compiler versions are faster than interpreter versions. (2) There is no one version of BASIC, although in 1987 ANSI adopted a new standard that elimi- nated portability problems—that is, problems with running it on different computers. Pascal: The Simple Language When might I program in Pascal? Named after the 17th-century French mathematician Blaise Pascal and devel- oped in 1970 by Niklaus Wirth, Pascal is an alternative to BASIC as a language for teaching purposes and is relatively easy to learn. (Refer to Panel 10.22 .) A difference from BASIC is that Pascal uses structured programming. A compiled language, Pascal offers the following advantages and disadvantage: ADVANTAGES (1) Pascal is easy to learn. (2) It has extensive capabilities for graphics programming. (3) It is excellent for scientific use. DISADVANTAGE Pascal has limited input/output programming capabilities, which limits its business applications. Government in Action In 2009, the governor of California fired about 10,000 temporary and part-time work- ers and reduced the pay levels of about 200,000 permanent employees. However, a week later, the state controller pointed out that the state payroll records could not be changed to accommodate the cuts, because they were writ- ten in COBOL—and the only state employees who knew the code were among the fired part-time employees (www. funnytimes.com/ February 2009). 99 Bottles of Beer This website holds a collec- tion of the song “99 Bottles of Beer” programmed in 1,216 dif- ferent programming languages: www.99-bottles-of-beer.net/
  539. Systems Analysis & Programming 519 C: For Portability & Scientific

    Use What is C mainly used for? C is the successor of B, which was the successor of BCPL, which was the suc- cessor of CPL (Computer Programming Language), an early programming language that was not implemented. Developed by Dennis Ritchie at Bell Lab- oratories in the early 1970s, C is a general-purpose, compiled language that was developed for midrange computers (minicomputers) but that works well for microcomputers and is portable among many computers. (Refer to Panel 10.22 .) It was originally developed for writing system software. The first major program written in C was the Unix operating system, and for many years C was considered to be inextricably linked with Unix. Now, however, C is an important language independent of Unix. Today it is widely used for writing applications, including word processing, spreadsheets, games, robotics, and graphics programs. It is now considered a necessary language for program- mers to know. Here are the advantages and disadvantages of C: ADVANTAGES (1) C works well with microcomputers. (2) It has a high degree of portability—it can be run without change on a variety of computers. (3) It is fast and efficient. (4) It enables the programmer to manipulate individual bits in main memory. (5) It requires less memory than many other programming languages. DISADVANTAGES (1) C is considered difficult to learn. (2) Because of its con- ciseness, the code can be difficult to follow. (3) It is not suited to applications that require a lot of report formatting and data file manipulation. LISP: For Artificial Intelligence Programs What is LISP used for? LISP ( LISt Processor ) is a third-generation language used principally to con- struct artificial intelligence programs. Developed at the Massachusetts Insti- tute of Technology in 1958 by mathematician John McCarthy, LISP is used to write expert systems and natural language programs. As we saw in Chapter 8, expert systems are programs that are imbued with knowledge by a human expert; the programs can walk you through a problem and help solve it. 10.5 OBJECT-ORIENTED & VISUAL PROGRAMMING How do OOP and visual programming work? Consider how it was for the computer pioneers, programming in machine lan- guage or assembly language. Novices putting together programs in BASIC or C can breathe a collective sigh of relief that they weren’t around at the dawn of the Computer Age. Even some of the simpler third-generation languages pres- ent challenges, because they are procedure-oriented, forcing the programmer to follow a predetermined path. Fortunately, two developments have made things easier—object-oriented programming and visual programming. Object-Oriented Programming: Block by Block What is an object? Imagine you’re programming in a traditional third-generation language, such as BASIC, creating your coded instructions one line at a time. As you work on some segment of the program (such as how to compute overtime pay), you may think, “I’ll bet some other programmer has already written something
  540. 520 Chapter 10 like this. Wish I had it. It

    would save a lot of time.” Fortunately, a kind of recycling technique exists. This is object-oriented programming, an improved version of 3GLs. HOW OOP WORKS: OBJECT, MESSAGE, & METHOD Object-oriented program- ming consists of the following components: 1. What OOP is: In object-oriented programming ( OOP, pronounced “oop”), data and the instructions for processing that data are combined into a self-sufficient “object” that can be used in other programs. The important thing here is the object. 2. What an “object” is: An object is a self-contained module consisting of preassembled programming code. The module contains, or encapsulates, both (1) a chunk of data and (2) the processing instructions that may be performed on that data. 3. When an object’s data is to be processed — sending the “message”: Once the object becomes part of a program, the processing instructions may or may not be activated. A particular set of instructions is activated only when the corresponding “message” is sent. A message is an alert sent to the object when an operation involving that object needs to be performed. 4. How the object’s data is processed — the “methods”: The message need only identify the operation. How it is actually to be performed is embedded within the processing instructions that are part of the object. These processing instructions within the object are called the methods. RECYCLING BLOCKS OF PROGRAM CODE Once you’ve written a block of pro- gram code (that computes overtime pay, for example), it can be reused in any number of programs. Thus, with OOP, unlike traditional programming, you don’t have to start from scratch—that is, reinvent the wheel—each time. Object-oriented programming takes longer to learn than traditional pro- gramming because it means training oneself to a new way of thinking. How- ever, the beauty of OOP is that an object can be used repeatedly in different applications and by different programmers, speeding up development time and lowering costs. Three Important Concepts of OOP How would I define the three basic concepts of OOP? Object-oriented programming has three important concepts, which go under the jaw-breaking names of encapsulation, inheritance, and polymorphism. Actually, these are not as fearsome as they look: ENCAPSULATION Encapsulation means an object contains (encapsulates) both (1) data and (2) the relevant processing instructions, as we have seen. Once an object has been created, it can be reused in other programs. An object’s uses can also be extended through the concepts of class and inheritance. INHERITANCE Once you have created an object, you can use it as the foundation for similar objects that have the same behavior and characteristics. All objects that are derived from or related to one another are said to form a class. Each class contains specific instructions (methods) that are unique to that group. Classes can be arranged in hierarchies—classes and subclasses. Inheritance is the method of passing down traits of an object from classes to subclasses in the hierarchy. Thus, new objects can be created by inheriting traits from exist- ing classes. Writer Alan Freedman gives this example: “The object MACINTOSH could be one instance of the class PERSONAL COMPUTER, which could inherit Conventional Programs Object-Oriented Programs
  541. info! more Systems Analysis & Programming 521 properties from the

    class COMPUTER SYSTEMS.” 4 If you were to add a new computer, such as DELL, you would need to enter only what makes it differ- ent from other computers. The general characteristics of personal computers could be inherited. POLYMORPHISM Polymorphism means the presence of “many shapes.” In object-oriented programming, polymorphism means that a message (general- ized request) produces different results based on the object that it is sent to. Polymorphism has important uses. It allows a programmer to create pro- cedures about objects whose exact type is not known in advance but will be at the time the program is actually run on the computer. Freedman gives this example: “A screen cursor may change its shape from an arrow to a line depending on the program mode.” The processing instructions “to move the cursor on screen in response to mouse movement would be written for ‘cursor,’ and polymorphism would allow that cursor to be whatever shape is required at runtime.” It would also allow a new cursor shape to be easily integrated into the program. EXAMPLES OF OOP LANGUAGES: C ϩ ϩ & JAVA Two important examples of OOP languages are C ϩ ϩ and Java. • C ϩ ϩ : C ϩ ϩ —the plus signs stand for “more than C”—combines the traditional C programming language with object-oriented capability. C ϩ ϩ was created by Bjarne Stroustrup. With C ϩ ϩ , programmers can write standard code in C without the object-oriented features, use object- oriented features, or do a mixture of both. • Java: A high-level programming language developed by Sun Microsystems in 1995, Java, also an object-oriented language, is used to write compact programs that can be downloaded over the internet and immediately executed on many kinds of computers. Java is similar to C ϩ ϩ but is simplified to eliminate language features that cause common programming errors. It is often used to collect information from networked computers. Small Java applications are called Java applets and can be downloaded from a web server and run on your computer by a Java-compatible web browser, such as Mozilla Firefox or Microsoft Internet Explorer. Java applets make websites more interactive and attractive, adding features such as animation and calculators—but only if a browser is capable of supporting Java. Users also can download free Java applets from various sites on the internet. Visual Programming: The Example of Visual BASIC How would I characterize visual programming? Essentially, visual programming takes OOP to the next level. The goal of visual programming is to make programming easier for programmers and more accessible to nonprogrammers by borrowing the object orientation of OOP languages but exercising it in a graphical or visual way. Visual program- ming enables users to think more about the problem solving than about han- dling the programming language. There is no learning of syntax or actual writing of code. Visual programming is a method of creating programs in which the programmer makes connections between objects by drawing, pointing, and clicking on diagrams and icons and by interacting with flowcharts. Thus, the programmer can create programs by clicking on icons that repre- sent common programming routines. An example of visual programming is Visual BASIC, a Windows-based, object-oriented programming language from Microsoft that lets users develop What’s an Applet? An applet is typically a small, limited program designed to be executed within another application. Applets are often embedded inside a web page and run in the context of the browser. Check out this applet tutorial: http://java.sun.com/docs/ books/tutorial/deployment/ applet/
  542. 522 Chapter 10 Windows and Office applications by (1) creating

    command buttons, textboxes, windows, and toolbars, which (2) then may be linked to small BASIC programs that perform certain actions. Visual BASIC is event-driven, which means that the program waits for the user to do something (an “event”), such as click on an icon, and then the program responds. At the beginning, for example, the user can use drag-and-drop tools to develop a graphical user interface, which is created automatically by the program. Because of its ease of use, Visual BASIC allows even novice programmers to create impressive Windows-based applications. Since its launch in 1990, the Visual BASIC approach has become the norm for programming languages. Now there are visual environments for many programming languages, including C, C ϩ ϩ , Pascal, and Java. Visual BASIC is sometimes called a rapid application development (RAD) system because it enables programmers to quickly build prototype applications. 10.6 MARKUP & SCRIPTING LANGUAGES What do markup and scripting languages do? A markup language is a kind of coding, or “tags,” inserted into text that embeds details about the structure and appearance of the text. Markup languages have codes for indicating layout and styling (such as boldface, ital- ics, paragraphs, insertion of graphics, and so on) within a text file—for exam- ple, HTML. The name “markup” is derived from the traditional publishing practice of “marking up” a manuscript, that is, adding printer’s instructions in the margins of a paper manuscript. Some early examples of markup languages available outside the publish- ing industry could be found in typesetting tools on Unix systems. In these systems, formatting commands were inserted into the document text so that typesetting software could format the text according to the editor’s specifica- tions. After a time it was seen that most markup languages had many features in common. This led to the creation of SGML (Standard Generalized Markup Language), which specified a syntax for including the markup in documents, as well as another system (a so-called metalanguage ) for separately describing what the markup meant. This allowed authors to create and use any markup they wished, selecting tags that made the most sense to them. SGML was developed and standardized by the International Organization for Standards (ISO) in 1986. SGML is used widely to manage large documents that are subject to fre- quent revisions and need to be printed in different formats. Because it is a large and complex system, it was not yet widely used on personal computers. This changed dramatically when Tim Berners-Lee used some of the SGML syn- tax, without the metalanguage, to create HTML (Hypertext Markup Language, Chapter 2). HTML may be the most used document format in the world today. For some people, the term script may conjure up images of actors and actresses on a sound stage practicing lines from a book of text. In web terms, however, a script is a short list of self-executing commands embedded in a web page that perform a specific function or routine. Scripts are similar to the macros used in Microsoft Word or the batch files used in the early days of DOS, both of which performed functions ranging from generating text to dis- playing the date and time. Because they are self-executing, scripts can perform their work without user involvement, although some are initiated by an action on the part of the user (such as a mouse click) and others require user input to complete a task. In general, script languages are easier and faster to code in than the more structured, compiled languages such as C and C ϩ ϩ and are ideal for programs of very limited capability or that can reuse and tie together existing compiled programs. 5 On web pages, scripting languages are used to perform many duties. For example, they create traffic counters and scrolling text, set cookies so
  543. info! more info! more Systems Analysis & Programming 523 that

    websites can remember user preferences, and switch out graphics and text when users click buttons or pass their mouse over items. They are also used for processing forms that the user fills out on screen. Any time you see something interesting occurring on a website, there is a good chance that a script is involved. Scripting languages are often designed for interac- tive use. Following are some popular markup and scripting languages. HTML: For Creating 2-D Web Documents & Links What would I use HTML for? As we discussed in Chapter 2, HTML (Hypertext Markup Language) is a markup language that lets people create on-screen documents for the internet that can easily be linked by words and pictures to other docu- ments. HTML is a type of code that embeds simple commands within stan- dard ASCII text documents to provide an integrated, two-dimensional display of text and graphics. In other words, a document created in any word proces- sor and stored in ASCII format can become a web page with the addition of a few HTML commands. One of the main features of HTML is the ability to insert hypertext links into a document. Hypertext links enable you to display another web document simply by clicking on a link area—usually underlined or highlighted—on your current screen (Chapter 2). One document may contain links to many other related documents. The related documents may be on the same server as the first document, or they may be on a computer halfway around the world. A link may be a word, a group of words, or a picture. VRML: For Creating 3-D Web Pages How is VRML used? Mark Pesce and Tony Parisi created VRML at Silicon Graphics in 1994. VRML rhymes with “thermal.” VRML (Virtual Reality Modeling [ or Markup] Lan- guage) is a type of programming language used to create three- dimensional web pages including interactive animation. Even though VRML’s designers wanted to let nonprogrammers create their own virtual spaces quickly and painlessly, it’s not as simple to describe a three-dimensional scene as it is to describe a page in HTML. However, many existing modeling and CAD tools now offer VRML support, and new VRML-centered software tools are arriv- ing. An example of a VRML scene might be a virtual room where the viewer can use controls to move around inside the room (or move the room itself) as though she or he were walking through it in real space. To view VRML files, users need a special VRML browser (in addition to an internet connection and a web browser). The VRML browser is what interprets VRML commands and lets the user interact with the virtual world. VRML browsers typically work as plug-ins for traditional web browsers, but newer browsers may already have the appropriate VRML browser plug-in installed. There are several VRML browsers available for Windows users, such as Cosmo and Cortona. Web designers use new software such as WireFusion to create 3-D web page components that no longer require a plug-in for users to view them with their browser. (The successor to VRML is called X3D. ) XML: For Making the Web Work Better How does XML improve on HTML? The chief characteristics of HTML are its simplicity and its ease in combin- ing plain text and pictures. But, in the words of journalist Michael Krantz, “HTML simply lacks the software muscle to handle the business world’s HTML Tutorial For an easy-to-follow tutorial on using HTML, go to: http://computer. howstuffworks .com/web-page2.htm After you work through the tutorial, create a sample HTML- tagged document for what could become your personal website. VRML Plug-In Four places to download VRML add-ins are these: www.parallelgraphics.com/ products/cortona/download/ iexplor http://cic.nist.gov/vrml/ cosmoplayer.html www.pinecoast.com/sw_ examples.htm http://cic.nist.gov/vrml/ vbdetect.html
  544. info! more info! more info! more 524 Chapter 10 endless

    and complex transactions.” 6 Another, newer markup language is XML, a standard maintained by the World Wide Web Consortium for creating special-purpose markup languages. XML (eXtensible Markup Language) is a metalanguage (a language used to define another language) written in SGML that allows one to facilitate the easy interchange of documents on the internet. Unlike HTML, which uses a set of “known” tags, XML allows you to create any tags you wish (thus it’s extensible) and then describe those tags in a meta- language known as the DTD (Document Type Definition). XML is similar to the concept of SGML, and in fact XML is a subset of SGML in general terms. The main purpose of XML (as opposed to SGML) is to keep the system simpler by focusing on a particular problem—documents on the internet. Whereas HTML makes it easy for humans to read websites, XML makes it easy for machines to read websites by enabling web developers to add more “tags” to a web page. At present, when you use your browser to locate a website, search engines can turn up too much, so it’s difficult to find the specific site you want—say, one with a recipe for a low-calorie chicken dish for 12. According to Krantz, “XML makes websites smart enough to tell other machines whether they’re looking at a recipe, an airline ticket, or a pair of easy-fit blue jeans with a 34-inch waist.” XML lets website developers put “tags” on their web pages that describe information in, for example, a food recipe as “ingredients,” “calories,” “cooking time,” and “number of portions.” Thus, your browser no longer has to search the entire web for a low-calorie poultry recipe for 12. Following are examples of XML and HTML tags. Note that the XML statements define data content, whereas the HTML lines deal with fonts and display (boldface). XML defines “what it is,” and HTML defines “how it looks.” XML <firstName>Maria</firstName> <lastName>Roberts</lastName> <dateBirth>10-29-52</dateBirth> HTML <font size ϭ “3”>Maria Roberts</font> <b>October 29, 1952<b> JavaScript: For Dynamic Web Pages How can JavaScript be helpful? JavaScript is a popular object-oriented scripting language that is widely supported in web browsers. It adds interactive functions to HTML pages, which are otherwise static, since HTML is a display language, not a program- ming language. JavaScript is easier to use than Java but not as powerful and deals mainly with the elements on the web page. JavaScript was originally developed by Netscape Communications under the name “LiveScript” but was then renamed to “JavaScript” and given a syntax closer to that of Sun Micro- systems’ Java language. The change of name happened at about the same time that Netscape was including support for Java technology in its Netscape Navigator browser. Consequently, the change proved to be a source of much confusion. There is no real relation between Java and JavaScript; their only similarities are some syntax and the fact that both languages are used exten- sively on the World Wide Web. Many website designers use JavaScript technology to create powerful dynamic web applications. One major use of JavaScript is to write little func- tions that are embedded in HTML pages and interact with the browser to per- form certain tasks not possible in static HTML alone, such as opening a new window and changing images as the mouse cursor moves over them. What Are Lateral Thinking Tools? Lateral thinking tools help peo- ple think clearly, logically, and creatively. Do a keyword search and find out what they are. For a more detailed description of XML, try: http://searchsoa.techtarget .com/sDefinition/0,,sid26_ gci213404,00.html www.pcmag.com/encyclopedia_ term/0,2542,tϭXML&i ϭ55048,00.asp http://cplus.about.com/od/ glossar1/g/xmldefn.htm JavaScript Tutorial Go to: www.w3schools.com/js/ js_intro.asp for a tutorial and information about using JavaScript.
  545. info! more info! more info! more Systems Analysis & Programming

    525 ActiveX: For Creating Interactive Web Pages Would I ever need to use ActiveX? ActiveX was developed by Microsoft as an alternative to Java for creating interactivity on web pages. Indeed, Java and ActiveX are the two major con- tenders in the web war for transforming the World Wide Web into a complete interactive environment. ActiveX is a set of controls, or reusable components, that enable pro- grams or content of almost any type to be embedded within a web page. Whereas Java requires that you download an applet each time you visit a web- site, with ActiveX the component is downloaded only once (to a Windows- based computer) and then stored on your hard drive for later and repeated use. ActiveX is built into Microsoft’s Internet Explorer and is available as a plug-in for Mozilla Firefox. The chief characteristic of ActiveX is that it features reusable components— small modules of software code that perform specific tasks (such as a spell- ing checker), which may be plugged seamlessly into other applications. With ActiveX, you can obtain from your hard disk any file that is suitable for the web—such as a Java applet, animation, or pop-up menu—and insert it directly into an HTML document. Programmers can create ActiveX controls or components in a variety of programming languages, including C, C ϩ ϩ , Visual BASIC, and Java. Thou- sands of ready-made ActiveX components are now commercially available from numerous software development companies. Perl: For CGI Scripts Perl ( Practical Extraction and Report Language ) is a general-purpose program- ming language developed for text manipulation and now used for web develop- ment, network programming, system administration, GUI development, and other tasks. Perl is widely used to write web server programs for such tasks as automatically updating user accounts and newsgroup postings, processing removal requests, synchronizing databases, and generating reports. The major features of Perl are that it is easy to use and it supports both procedural and object-oriented programming. Perl was developed in 1987 by Larry Wall, and it combines syntax from several Unix utilities and languages. Perl has also been adapted to non-Unix platforms. CGI (Common Gateway Interface) CGI is a standard protocol for interfacing external application software with a web server; it manages the exchange of information between a web server and computer programs that are external to it. The external programs can be written in any programming language that is supported by the operating system on which the web server is running. Forms, counters, and guestbooks are common examples of CGI programs that process data taken from the user. CGI programs can help make Web pages more interactive. Tcl (Tool Command Language) Created for the Unix platform by John Ousterhout along with students at the University of California at Berkeley, Tcl (pronounced “tickle”) is an inter- preted script language from Sun Microsystems. It is comparable to Netscape’s JavaScript and Microsoft’s Visual Basic and is used to develop a variety of applications, including GUIs, prototypes, and CGI scripts. Tcl also provides an interface into compiled applications (for example, C, C ϩ ϩ ). Ruby Created by Yukihiro Matsumoto and named after the birthstone of one of his colleagues, the Ruby programming language is very basic and is completely Genetic Programming Genetic programming is a type of programming that imitates genetic algorithms, which use mutation and replication to produce algorithms that represent the “survival of the fittest.” For more information, visit: www.genetic-programming.org www.geneticprogramming.com/ Tutorial/ www.genetic-programming. com/ Phone Apps People buy a lot of phone apps, so developing programs for the new generation of smart mobile phones can be a money-maker: www.usatoday.com/tech/ news/2009-09-22-invent- applications-phones_N.htm www.mutualmobile.com/ www.slideshare.net/ a1technwyork/mobile- phone-java-applications A Perl at Any Price Visit the Perl language page at: www.perl.org/
  546. info! more info! more 526 Chapter 10 object-oriented; this means

    every type of data handled by the language is treated as an object. The source code can be interpreted by the official Ruby interpreter or by JRuby, a Java-based interpreter. Ruby is an open-source language, which means it is free to download and use. It can be compiled and run on just about any operating system, including Unix, Windows, and Mac OS X. PHP (Personal Home Page, or PHP Hypertext Preprocessor) & R PHP allows web developers to create dynamic content that interacts with data- bases. PHP applications are normally found on Linux servers and in conjunc- tion with MySQL databases. Originally designed for producing dynamic web pages, PHP is a widely used free, general-purpose scripting language that is especially suited for web development and can be embedded into HTML. It generally runs on a web server, taking PHP code as its input and creating web pages as output. R is another popular programming language used by statisticians and data analysts in data mining applications (Chapter 8). R is free, open-source soft- ware similar to C, Java, and Perl in that users can perform tasks by using a collection of commands instead of having to understand the “guts” of the pro- gram language. 7 What’s R? Information about R: http://cran.r-project.org/doc/ manuals/R-intro.html www.r-project.org/ What’s a Widget? Widgets are compact, single- purpose programs. Typical Wid- gets include GUI buttons, dialog boxes, pull-down menus, etc. Among other things, Widgets can be used to enhance blogs. For Widget info, go to: www.widgetbox.com/widget/ free-widgets-for-websites- and-blogs-feedzilla www.techterms.com/definition/ widget www.businessweek.com/ print/technology/content/ feb2008/tc20080229_131531. htm Want to make your own Widget? www.widgetbox.com/info/ products/blidget-pro/make/
  547. Systems Analysis & Programming 527 Clear thinkers aren’t born that

    way. They work at it. The systems development life cycle is basically an exercise in clear thinking—critical thinking. Criti- cal thinking is fundamental to systems analysis and design—particularly in the first phase, preliminary analysis. Reaching for the truth may not come easily; it is a stance toward the world, developed with practice. To achieve this, we have to wrestle with obstacles that are mostly of our own making: mindsets. By the time we are grown, our minds have become “set” in various patterns of thinking that affect the way we respond to new situations and new ideas. Such mindsets determine what ideas we think are important and, conversely, what ideas we ignore. To break past mindsets, we need to learn to think criti- cally. Critical thinking means sorting out conflicting claims, weighing the evidence for them, letting go of personal biases, and arriving at reasoned conclusions. Critical think- ing means actively seeking to understand, analyze, and evaluate information in order to solve specific problems. Learning to identify fallacious (incorrect) arguments will help you avoid patterns of faulty thinking in your own writ- ing and thinking and to identify these in others’ work. Jumping to Conclusions. In the fallacy called jumping to conclusions, also known as hasty generalization, a decision maker reaches a conclusion before all the facts are avail- able. Example: A company instituted the strategy of total quality management (TQM) 12 months ago. As a new man- ager of the company, you see that TQM has not improved profitability over the past year, and you order TQM junked, in favor of more traditional business strategies. However, what you don’t know is that the traditional business strate- gies employed prior to TQM had an even worse effect on profitability. Irrelevant Reason or False Cause. In the faulty reasoning known as non sequitur (Latin for “it does not follow”), which might better be called false cause or irrelevant reason, the conclusion does not follow logically from the supposed rea- son or reasons stated earlier. There is no causal relation- ship. Example: You receive an A on a test. However, because you felt you hadn’t been well prepared, you attribute your success to your friendliness with the professor. Or to your horoscope. Or to wearing your “lucky shirt.” None of these supposed reasons have anything to do with the result. Irrelevant Attack on a Person or Opponent. Known as an ad hominem argument (Latin for “to the person”), the irrelevant attack on an opponent attacks a person’s repu- tation or beliefs rather than his or her argument. Example: Your boss insists you may not hire a certain person as a pro- grammer because he or she has been married and divorced nine times, although the person’s marital history plainly has no bearing on his or her skills as a programmer. Slippery Slope. Slippery slope is a failure to see that the first step in a possible series of steps does not lead inevitably to the rest. Example: The “domino the- ory,” under which the United States waged wars against Communism for half a century, was a slippery-slope argu- ment. It assumed that if Communism triumphed in one country (for example, Nicaragua), then it would inevita- bly triumph in other regions (the rest of Central America), finally threatening the borders of the United States itself. Appeal to Authority. The appeal-to-authority argu- ment (known in Latin as argumentum ad verecundiam ) uses authority in one area in an effort to validate claims in another area where the person is not an expert. Example: You see the appeal-to-authority argument used all the time in advertising. But how qualified is a professional golfer to speak about headache remedies? Circular Reasoning. In circular reasoning, a statement to be proved true is rephrased, and then the new formulation is offered as supposed proof that the original statement is in fact true. Example: You declare that you can drive safely at high speeds with only inches separating you from the car ahead because you have driven this way for years without an accident. Straw Man Argument. In the straw man argument, you misrepresent your opponent’s position to make it easier to attack, or you attack a weaker position while ignoring a stronger one. In other words, you sidetrack the argument from the main discussion. Example: Politicians use straw man arguments all the time. If you attack a legislator for being “fiscally irresponsible” in supporting funds for a gun- control bill, when what you really object to is the fact of gun control, you’re using a straw man argument. Appeal to Pity. In the appeal-to-pity argument, the advo- cate appeals to mercy rather than making an argument on the merits of the case itself. Example: Begging the dean not to expel you for cheating because your parents are poor and made sacrifices to put you through college would be a blatant appeal to pity. Questionable Statistics. Statistics can be misused in many ways as supporting evidence. The statistics may be unknowable, drawn from an unrepresentative sample, or otherwise suspect. Example: Stating how much money is lost to taxes because of illegal drug transactions is speculation because such transactions are hidden or unrecorded. EXPERIENCE BOX Critical Thinking Tools
  548. 528 Chapter 10 ActiveX (p. 525) A set of controls,

    or reusable components, that enable programs or content of almost any type to be embedded within a web page. Why it’s important: ActiveX fea- tures reusable components—small modules of software code that perform specific tasks, such as a spelling checker, which may be plugged seamlessly into other applications. algorithm (p. 501) Formula or set of steps for solving a par- ticular problem. Why it’s important: All programs consist of algorithms. assembler (p. 513) Also called assembler program; language- translator program that translates assembly-language pro- grams into machine language. Why it’s important: Language translators are needed to translate all upper-level languages into machine language, the language that actually runs the computer. assembly language (p. 512) Second-generation program- ming language; it allows a programmer to write a program using abbreviations instead of the 0s and 1s of machine language. Why it’s important: A programmer can write instructions in assembly language faster than in machine language. CASE (computer-aided software engineering) tools (p. 495) Software that provides computer-automated means of design- ing and changing systems. Why it’s important: CASE tools may be used in almost any phase of the SDLC. coding (p. 507) In the programming process, the third step, consisting of translating logic requirements from pseudocode or flowcharts into a programming language. Why it’s impor- tant: Coding is the actual writing of a computer program, although it is only the third of five steps in programming. compiler (p. 513) Language translator that converts the entire program of a high-level language (called the source code ) into machine language (called the object code ) for execution later. Examples of compiler languages: COBOL, FORTRAN, Pascal, and C. Why it’s important: Unlike other lan- guage translators (assemblers and interpreters), a compiler program enables the object code to be saved and executed later rather than run right away. The advantage of a compiler is that, once the object code has been obtained, the program executes faster. control structure (p. 504) Also called logic structure; in structured program design, the programming structure that controls the logical sequence in which computer program instructions are executed. Three control structures are used to form the logic of a program: sequence, selection, and itera- tion (or loop). Why it’s important: One thing that all three control structures have in common is one entry and one exit. The control structure is entered at a single point and exited at another single point. This helps simplify the logic so that it is easier for others following in a programmer’s footsteps to make sense of the program. data flow diagram (DFD) (p. 495) Modeling tool that graphi- cally shows the flow of data through a system—essential processes, including inputs, outputs, and files. Why it’s impor- tant: A DFD diagrams the processes that change data into information. debug (p. 508) Part of program testing; the detection, loca- tion, and removal of syntax and logic errors in a program. Why it’s important: Debugging may take several trials using different data before the programming team is satisfied the program can be released. Even then, some errors may remain, because trying to remove them all may be uneconomical. desk-checking (p. 508) Form of program testing; program- mers read through a program to ensure it’s error-free and log- ical. Why it’s important: Desk-checking should be done before the program is actually run on a computer. documentation (p. 509) Written descriptions of what a pro- gram is and how to use it; supposed to be done during all programming steps. Why it’s important: Documentation is needed for all people who will be using or be involved with the program—users, operators, programmers, and future systems analysts. generations of programming languages (p. 510) Five increasingly sophisticated levels (generations) of program- ming languages: (1) machine language, (2) assembly language, (3) high-level languages, (4) very-high-level languages, (5) natu- ral languages. Why it’s important: Programming languages are said to be lower-level when they are closer to the language used by the computer (0s and ls) and higher-level when closer to the language used by people. High-level languages are easier for most people to use than are lower-level languages. hierarchy chart (p. 502) Also called structure chart; a dia- gram used in programming to illustrate the overall purpose of a program, identifying all the modules needed to achieve that purpose and the relationships among them. Why it’s impor- tant: In a hierarchy chart, the program must move in sequence from one module to the next until all have been processed. There must be three principal modules corresponding to the three principal computing operations—input, processing, and output. high-level languages (p. 513) Also known as procedural or object-oriented languages; third-generation programming lan- guages. They somewhat resemble human languages. Examples: FORTRAN, COBOL, BASIC, Pascal, and C. Why it’s important: High-level languages allow programmers to write in a familiar notation rather than numbers or abbreviations. Most can also be used on more than one kind of computer. HTML (Hypertext Markup Language) (p. 523) HTML (Hyper- text Markup Language) is a markup language that lets people create on-screen documents for the internet that can easily be linked by words and pictures to other documents. Why it’s important: HTML is used to create web pages. SUMMARY
  549. 529 Systems Analysis & Programming interpreter (p. 513) Language translator

    that converts each high-level language statement into machine language and executes it immediately, statement by statement. An example of a high-level language using an interpreter is BASIC. Why it’s important: Unlike a compiler translator, an interpreter does not save object code. The advantage of an interpreter is that programs are easier to develop. JavaScript (p. 524) Object-oriented scripting language used, for example, to write little functions that are embedded in HTML pages and interact with the browser to perform cer- tain tasks not possible in static HTML alone. There is no real relationship between JavaScript and Java. Why it’s impor- tant: JavaScript is used to create powerful dynamic web applications. language translator (p. 512) Type of system software that translates a program written in a second-, third-, or higher- generation language into machine language. Language trans- lators are of three types: (1) assemblers, (2) compilers, and (3) interpreters. Why it’s important: Because computers run only using machine language, all higher-level languages must be translated. logic errors (p. 508) Programming errors caused by incorrect use of control structures. Why it’s important: Logic errors pre- vent a program from running properly. machine language (p. 511) Lowest-level (first-generation) programming language; the language of the computer, representing data as 1s and 0s. Most machine-language programs vary from computer to computer—they are machine- dependent. Why it’s important: Machine language is the language that actually runs the computer. markup language (p. 522) A kind of coding, or “tags,” inserted into text that embeds details about the structure and appear- ance of the text within a text file—for example, HTML. The word “markup” is derived from the traditional publishing practice of “marking up” a manuscript, that is, adding printer’s instructions in the margins of a paper manuscript. An example of a markup language is SGML (Standard Generalized Markup Language). Why it’s important: Markup languages have codes for indicating layout and styling, such as boldface, italics, paragraphs, and insertion of graphics. modeling tools (p. 495) Analytical tools such as charts, tables, and diagrams that are used by systems analysts. Examples are data flow diagrams, decision tables, systems flowcharts, and object-oriented analysis. Why it’s important: Modeling tools enable a systems analyst to present graphic, or pictorial, rep- resentations of a system. module (p. 502) Sometimes called subprogram or subroutine; a processing step of a program. Each module is made up of logically related program statements. Why it’s important: Each module has only a single function, which limits the module’s size and complexity. natural languages (p. 516) (1) Ordinary human languages (for instance, English, Spanish); (2) fifth-generation program- ming languages that use human language to give people a more natural connection with computers. Why it’s important: Natural languages are part of the field of artificial intelli- gence; these languages are approaching the level of human communication. object (p. 520) In object-oriented programming, a block of preassembled programming code that is a self-contained module. The module contains (encapsulates) both (1) a chunk of data and (2) the processing instructions that may be called on to be performed on that data. Once the object becomes part of a program, the processing instructions may be activated only when a “message” is sent. Why it’s important: The object can be reused and interchanged among programs, thus mak- ing the programming process much easier, more flexible and efficient, and faster. object-oriented programming (OOP) (p. 520) Programming method in which data and the instructions for processing that data are combined into a self-sufficient object —a piece of software that can be used in other programs. Why it’s important: Objects can be reused and interchanged among programs, producing greater flexibility and efficiency than is possible with traditional programming methods. preliminary investigation (p. 494) Phase 1 of the SDLC; the purpose is to conduct a preliminary analysis (determine the organization’s objectives, determine the nature and scope of the problem), propose alternative solutions (leave the system as is, improve the efficiency of the system, or develop a new system), describe costs and benefits, and submit a preliminary plan with recommendations. Why it’s important: The prelimi- nary investigation lays the groundwork for the other phases of the SDLC. problem clarification/definition (p. 500) Step 1 in the pro- gramming process. The problem-definition step requires performing six mini-steps: specifying objectives and users, outputs, inputs, and processing tasks and then studying the feasibility of the program and documenting the analysis. Why it’s important: Problem definition is the forerunner to step 2, program design, in the programming process. program (p. 499) List of instructions the computer follows to process data into information. The instructions consist of statements written in a programming language (for example, BASIC). Why it’s important: Without programs, computers could not process data into information. program design (p. 501) Step 2 in the programming process; programs are designed in two mini-steps: (1) the program logic is determined through a top-down approach and modularization, using a hierarchy chart; (2) the program is designed in detail, using pseudocode or flowcharts with logical tools called control structures. Why it’s important: Program design is the forerun- ner to step 3, writing (coding), in the programming process. program flowchart (p. 504) Chart that graphically presents the detailed series of steps needed to solve a programming problem; it uses standard symbols called ANSI symbols. Why it’s important: The program flowchart is an important program design tool. program testing (p. 508) Step 4 in the programming process; involves running various tests and then running real-world
  550. 530 Chapter 10 data to make sure the program works.

    Why it’s important: The program must be tested before it is released to be sure that it works properly. programming (p. 500) Five-step process for creating soft- ware instructions: (1) Clarify/define the problem; (2) design a solution; (3) write (code) the program; (4) test the program; (5) document and maintain the program. Why it’s important: Programming is one step in the systems development life cycle. programming language (p. 507) Set of rules (words and sym- bols) that allow programmers to tell the computer what opera- tions to follow. The five levels (generations) of programming languages are (1) machine language, (2) assembly language, (3) high-level (procedural) languages, (4) very-high-level (non- procedural) languages, and (5) natural languages. Why it’s important: Not all programming languages are appropriate for all uses. Thus, languages must be chosen to suit the purpose of the program and to be compatible with other languages being used. prototype (p. 496) A limited working system, or part of one, developed to test design concepts. Why it’s important: A pro- totype, which may be constructed in just a few days, allows users to find out immediately how a change in the system might benefit them. prototyping (p. 496) Using workstations, CASE tools, and other software applications to build working models of system components so that they can be quickly tested and evalu- ated. Why it’s important: Prototyping is part of the preliminary design stage of Phase 3 of the SDLC. pseudocode (p. 502) Tool for designing a program in narrative form using normal human-language statements to describe the logic and processing flow. Using pseudocode is like doing an outline or summary form of the program to be written. Why it’s important: Pseudocode provides a type of outline or sum- mary of the program. script (p. 522) A short list of self-executing commands embedded in a web page that perform a specific function or routine, often without user involvement. Why it’s important: Because they are self-executing, scripts can perform their work without user involvement. structured programming (p. 501) Method of programming that takes a top-down approach, breaking programs into mod- ular forms and using standard logic tools called control struc- tures (sequence, selection, case, iteration). Why it’s important: Structured programming techniques help programmers write better-organized programs, using standard notations with clear, correct descriptions. syntax (p. 508) “Grammar” rules of a programming language. Why it’s important: Each programming language has its own syntax, just as human languages do. syntax errors (p. 508) Programming errors caused by typo- graphical errors and incorrect use of the programming lan- guage. Why it’s important: If a program has syntax errors, it will not run correctly or perhaps not run at all. system (p. 492) Collection of related components that inter- act to perform a task in order to accomplish a goal. Why it’s important: Understanding a set of activities as a system allows one to look for better ways to reach the goal. systems analysis (p. 494) Phase 2 of the SDLC; the purpose is to gather data (using written documents, interviews, question- naires, and observation), analyze the data, and write a report. Why it’s important: The results of systems analysis determine whether the system should be redesigned. systems analysis and design (p. 493) Problem-solving pro- cedure for examining an information system and improving it; consists of the six-phase systems development life cycle. Why it’s important: The point of systems analysis and design is to ascertain how a system works and then take steps to make it better. systems analyst (p. 493) Information specialist who per- forms systems analysis, design, and implementation. Why it’s important: The systems analyst studies the information and communications needs of an organization to deter- mine how to deliver information that is complete, accurate, timely, and useful. The systems analyst achieves this goal through the problem-solving method of systems analysis and design. systems design (p. 496) Phase 3 of the SDLC; the purpose is to do a preliminary design and then a detail design and to write a report. Why it’s important: Systems design is one of the most crucial phases of the SDLC. systems development (p. 497) Phase 4 of the SDLC; con- sists of acquiring and testing hardware and software for the new system. This phase begins once management has accepted the report containing the design and has approved the way to development. Why it’s important: This phase may involve the organization in investing substantial time and money. systems development life cycle (SDLC) (p. 493) Six-phase process that many organizations follow during systems analysis and design: (1) preliminary investigation; (2) systems analysis; (3) systems design; (4) systems development; (5) sys- tems implementation; (6) systems maintenance. Phases often overlap, and a new one may start before the old one is fin- ished. After the first four phases, management must decide whether to proceed to the next phase. User input and review are a critical part of each phase. Why it’s important: The SDLC is a comprehensive tool for solving organizational problems, particularly those relating to the flow of computer-based information. systems implementation (p. 498) Phase 5 of the SDLC; con- sists of converting the hardware, software, and files to the new system and training the users. Why it’s important: This phase involves putting design ideas into operation. systems maintenance (p. 499) Phase 6 of the SDLC; consists of keeping the system working by having system audits and periodic evaluations and by making changes based on new conditions. Why it’s important: This phase is important for keeping a new system operational and useful.
  551. 531 Systems Analysis & Programming top-down program design (p. 502)

    Method of program design; a programmer identifies the top or principal process- ing step, or module, of a program and then breaks it down in hierarchical fashion to the lowest level of detail. Why it’s important: This design enables an entire program to be more easily developed, because the parts can be developed and tested separately. very-high-level languages (p. 514) Also known as problem- oriented and nonprocedural languages and fourth-generation languages (4GLs); more user-oriented than third-generation languages, 4GLs require fewer commands. 4GLs consist of report generators, query languages, and application genera- tors. Why it’s important: Programmers can write programs that need to tell the computer only what they want done, not all the procedures for doing it, which saves them the time and the labor of having to write many lines of code. visual programming (p. 521) Method of creating programs in which the programmer makes connections between objects by drawing, pointing, and clicking on diagrams and icons and by interacting with flowcharts. Programming is made easier because the orientation of object-oriented programming is used in a graphical or visual way. Why it’s important: Visual programming enables users to think more about the problem solving than about handling the programming language. VRML (Virtual Reality Modeling [Markup] Language) (p. 523) Type of programming language used to create three-dimen- sional (3-D) web pages. Why it’s important: VRML expands the information-delivering capabilities of the web. writing the program documentation (p. 509) Step 5 in the programming process; programmers write procedures explain- ing how the program was constructed and how it is to be used. Why it’s important: Program documentation is the final stage in the five-step programming process, although documenta- tion should also be an ongoing task accompanying all steps. XML (eXtensible Markup Language) (p. 524) Metalanguage used to make it easy for machines to read websites by allow- ing web developers to add more “tags” to a web page. Why it’s important: XML is more powerful than HTML, allowing informa- tion on a website to be described by general tags—for exam- ple, identifying one piece of information in a recipe as “cooking time” and another as “ingredients.” CHAPTER REVIEW Self-Test Questions 1. The ________________________ comprises six phases of examining an information system and improving it. 2. The first major program written in C was the ________________ operating system. 3. ______________________ is a method of creating pro- grams in which the programmer makes connections between objects by drawing, pointing, and clicking on diagrams and icons and by interacting with flowcharts. 4. Software engineering, or ______________ , refers to cre- ating instructions for computers. 5. A(n) ________________ is a formula or a set of steps for solving a particular problem. 6. A(n) ________________ is a collection of related com- ponents that interact to perform a task in order to accomplish a goal. 7. ________________ is the basic language of the com- puter, representing data as 0s and 1s. Multiple-Choice Questions 1. One of the following activities is not an objective of Phase 1 of the SDLC, preliminary investigation. Which one? a. conduct preliminary analysis b. describe costs and benefits c. acquire new software and hardware d. submit a preliminary plan e. propose alternative solutions 2. One of the following activities is not an objective of Phase 4 of the SDLC, systems development. Which one? a. convert files to the new system b. acquire software c. acquire hardware d. test the system e. address the make-or-buy decision 3. Third-generation programming languages include all the following languages except which one? a. FORTRAN b. BASIC c. COBOL d. XML e. Pascal True/False Questions T F 1. Programming errors caused by incorrect use of control structures are called logic errors. s t a g e 1 LEARNING MEMORIZATION “I can recognize and recall information.”
  552. 532 Chapter 10 T F 2. CASE tools—programs that automate

    various activities of the SDLC—are used only in Phase 3. T F 3. Four methods of systems implementation are direct, parallel, phased, and pilot. T F 4. User training takes place during Phase 1 of the SDLC. T F 5. JavaScript is an object-oriented scripting language used in web browsers to add interactive functions to HTML pages. T F 6. There are four generations of programming languages. s t a g e 2 LEARNING COMPREHENSION “I can recall information in my own terms and explain it to a friend.” Short-Answer Questions 1. What is the straw man argument? Appeal to pity? What are some of the other elements of critical thinking? 2. What does a systems analyst do? 3. What are the four ways to implement a new system? 4. What are the five steps in the programming process? 5. What are the six phases of the SDLC? 6. What is a software bug? 7. What is a prototype, and what does it do? s t a g e 3 LEARNING APPLYING, ANALYZING, SYNTHESIZING, EVALUATING “I can apply what I’ve learned, relate these ideas to other concepts, build on other knowledge, and use all these thinking skills to form a judgment.” Knowledge in Action 1. Alice is a 3D programming environment that makes it easy to create animation for telling a story, playing an interactive game, or making a video to share on the web. Alice is also a teaching tool for learning object- oriented programming. It allows you to learn fundamen- tal programming concepts in the context of creating animated movies and simple video games. In Alice, you drag and drop graphic tiles to create a program, where the instructions correspond to standard statements in a programming language such as Java or C ϩ ϩ . Alice allows you to immediately see how your animation programs run, enabling you to easily under- stand the relationship between the programming state- ments and the behavior of objects in their animation. By manipulating the objects in their virtual world, you gain experience with all the programming constructs typically taught in an introductory programming course. Download Alice 2.2 from www.alice.org/index.php?page ϭ downloads/ download_alice2.2 Then watch the demonstration videos at www.alice. org/index.php?page ϭ what_is_alice/what_is_alice Next, give Alice a try! (Here is an Alice tutorial: www. dickbaldwin.com/tocalice.htm. ) 2. Design a system that would handle the input, process- ing, and output of a simple form of your choice. Use a data flow diagram to illustrate the system. 3. Have you participated in a project that failed? Why did it fail? Based on what you know now, what might you have done to help the project succeed? 4. Which step of the SDLC do you find most interesting? Why? 5. Are you interested in learning how to program? Which languages would you choose to learn? Why? 6. Create a prototype invention (of anything) and have classmates test and evaluate it. Once the evaluations are received, write a detailed report, as you would at the end of Phase 3 in the SDLC process. Web Exercises 1. The waterfall model and the spiral model are varia- tions of the SDLC. Do keyword searches to find out how these models differ from the basic approach. 2. Compare the SDLC process to the scientific method. How are they alike? How do they differ? If you need to be refreshed on the scientific method, you can visit http://teacher.pas.rochester.edu/phy_labs/ appendixe/appendixe.html or run a search on “scientific method.” 3. Using an internet search tool, identify a company that develops CASE tools. In a few paragraphs, describe what this company’s CASE tools are used for. 4. One of the most beneficial courses you can take in college is critical thinking. The Experience Box in this chapter has an introduction to fallacious arguments. A background in logic and identification of fallacies is essential not only for making valid arguments but for life in general. After reading the Experience Box, visit the following websites: www.datanation.com/fallacies/index.htm www.don-lindsay-archive.org/skeptic/arguments. html For a humorous account of how not to argue, read the Monty Python Argument sketch: www.infidels.org/news/atheism/sn-python.html
  553. 533 Systems Analysis & Programming After familiarizing yourself with the

    subject mat- ter, watch TV for an hour (especially commercials) and identify 10 fallacies. Write them down and dis- cuss them with your class the next day. Are our collective reality assumptions valid and cohesive? Command of logic and critical thinking will help you tremendously if you decide to get into computer programming. 5. Curious about the educational requirements for a sys- tems designer/analyst? Go to www.umuc.edu/prog/ugp/majors/ifsm.shtml www.bls.gov/oco/ocos042.htm 6. Do a keyword search for “programming” and “jobs.” Which languages are most in demand now? Which of the jobs seems most interesting to you? Extra exercise: Here are two simple examples of algo- rithms. Choose another simple statement and develop an algorithm for it. Algorithm: Calling a friend on the telephone Input: The telephone number of your friend. Output: None Steps: 1. Pick up the phone and listen for a dial tone. 2. Press each digit of the phone number on the phone. 3. If busy, hang up phone, wait 5 minutes, jump to step 2. 4. If no one answers, leave a message, then hang up. 5. If no answering machine, hang up and wait 2 hours, then jump to step 2. 6. Talk to friend. 7. Hang up phone. Assumptions: • Step 1 assumes that you live alone and no one else could be on the phone. • The algorithm assumes the existence of a working phone and active service. • The algorithm assumes you are not deaf or mute. • The algorithm assumes a normal corded phone. (www.cs.pitt.edu/~jmisurda/teaching/cs4/2064/ cs0004-2064-algorithm.htm) Algorithm: Sorting by colors This is an example of an algorithm for sorting cards with colors on them into piles of the same color: 1. Pick up all the cards. 2. Pick a card from your hand and look at the color of the card. 3. If there is already a pile of cards of that color, put this card on that pile. 4. If there is no pile of cards of that color, make a new pile of just this card. 5. If there is still a card in your hand, go back to the second step. 6. If there is not still a card in your hand, then the cards are sorted; you are done. (http://simple.wikipedia.org/wiki/Algorithm)
  554. Notes 535 22. Associated Press, “Implant Transmits Brain Signals Directly

    to Computer,” The New York Times, October 22, 1998, p. A22. 23. Cynthia G. Wager, “Money’s Digital Future,” The Futurist, January– February 2003, pp. 14–15. 24. The Nilson Report, cited in “Elec- tronic Transactions on the Rise,” USA Today, October 6, 2003, p. 1B. 25. Jupiter Research, cited in “Online Grocery Sales a Tough Sale,” RedOr- bit, March 17, 2008, www.redorbit. com/news/technology/1299393/online_ grocery_sales_a_tough_sale/index.html (accessed June 1, 2009). 26. Daniel Nasaw, “A Dollar Here, a Dol- lar There,” The Wall Street Journal, May 24, 2004, p. R6; and Dan Fost, “Tiny Bills—Big Deal,” San Fran- cisco Chronicle, September 8, 2004. pp. C1, C4. 27. Heather Green, “Kissing Off Big Labels,” BusinessWeek, September 6, 2004, pp. 90, 92. 28. Susan Wlosczyna, “When Free Is Profitable,” USA Today, May 21, 2004, p. 1E; Jon Pareles, “No Fears: Laptop D.J.’s Have a Feast,” The New York Times, September 10, 2004, pp. B1, B8; and Shelly Banjo and Kelly K. Spors, “Musician Finds a Follow- ing Online,” The Wall Street Journal, December 30, 2008, p. B2. 29. James Barron, “Best Musical Score (by a Laptop),” The New York Times, June 26, 2004, p. A13. 30. Bill Werde, “We’ve Got Algorithm, but How about Soul?” The New York Times, March 21, 2004, sec. 4, p. 12. 31. Peter Stack, “An Animated Future,” San Francisco Chronicle, May 19, 1999, p. E1. 32. William Keck, “Their World of Tomorrow Revolves around Play- time,” USA Today, September 6, 2004, p. 10D. 33. Laura M. Holson, “Out of Holly- wood, Rising Fascination with Video Games,” The New York Times, April 10, 2004, pp. A1, B2; and Robert A. Guth and Merissa Marr, “Videogames Go Hollywood,” The Wall Street Jour- nal, May 10, 2004, pp. B1, B4. 34. Ellen S. Miller, “Internet Empower- ment,” USA Today, March 17, 2009, p. 9A. 35. “State Goes YouTube,” U.S. News & World Report, December 8, 2008, p. 23. to College, September 15, 2002, www. pewinternet.org/pdfs/PIP_ College_Report.pdf (accessed January 4, 2009). 11. Catherine Yang, “Big Program on Campus,” BusinessWeek, September 20, 2004, pp. 96, 98. 12. Kim Clark, “E-Learning Clicks with Students,” U.S. News & World Report, May 2009, pp. 48–50. 13. Greg Toppo, “Profound Shift in Home Schooling,” USA Today, May 29, 2009, p. 1A. 14. “Federal Student Aid to Undergradu- ates Shows Slow Growth, While Published Tuition Prices Continue to Increase,” The College Board, Octo- ber 22, 2007, www.collegeboard.com/ press/releases/189547.html (accessed July 8, 2009). 15. Dan Carnevale, “Many Online Courses Work Best at No Distance at All,” The Chronicle of Higher Educa- tion, July 30, 2004, p. A22. 16. Jeanette Borzo, “Almost Human,” The Wall Street Journal, May 24, 2004, pp. R4, R10; and K. Platoni, “Seeing Is Believing: Maybe Virtual Reality Isn’t Just a Game Anymore; Maybe It’s a Way to Build a Better You,” Stanford Magazine, January/February 2008, pp. 48–55. 17. Kim Painter, “Diagnosis by Telemedi- cine,” USA Today, February 16, 2009, p. 5D. See also Christopher Lawton, “ Cough, Cough. Is There a Doctor in the Mouse?” The Wall Street Journal, March 5, 2009, pp. D1, D2. 18. Stephanie Nano, “Computers Seen as Aid in X-Ray Reading,” San Francisco Chronicle, October 2, 2008, p. A2. 19. Steve Lohr, “Health Care That Puts a Computer on the Team,” The New York Times, December 27, 2008, pp. B1, B3. 20. Bernard Wysocki Jr., “Robots in the OR,” The Wall Street Journal, February 26, 2004, pp. B1, B6; Mike Crissey, “Hospital Robots Aid the Staff,” San Francisco Chronicle, July 12, 2004, pp. F1, F5; and Robert Davis, “Robo Doc: Medicine by ‘Extension,’ ” USA Today, August 4, 2004, p. 8D. 21. Jesse Ellison, “A New Grip on Life,” Newsweek, December 15, 2008, p. 64; and Pam Belluck, “In New Procedure, Artificial Arm Listens to Brain,” The New York Times, February 11, 2001, pp. A1, A17. Chapter 1 1. Study by Council for Research Excel- lence, reported in Brian Stelter, “8 Hours a Day Spent on Screens, Study Finds,” The New York Times, March 27, 2009, p. B6. 2. Anthropologist Susan D. Blum, quoted in Christine Rosen, “It’s Not Theft, It’s Pastiche,” The Wall Street Journal, April 16, 2009, p. A13. 3. “Ground-Breaking Study of Video Viewing Finds Younger Boomers Consume More Video Media than Any Other Group,” press release, March 27, 2009, on study conducted on behalf of Council for Research Excellence by Ball State University’s Center for Media Design, www.researchexcellence.com/ news/032609_vcm.php (accessed May 30, 2009). See also Stelter, “8 Hours a Day Spent on Screens, Study Finds.” 4. “A World Transformed: What Are the Top 30 Innovations of the Last 30 Years?” Knowledge@Wharton, Febru- ary 18, 2009, knowledge.wharton. upenn.edu/article.cfm?articleidϭ2163 (accessed May 28, 2009). See also “Life Changers,” The New York Times, March 8, 2009, p. BU-2. 5. Kevin Maney, “Net’s Next Phase Will Weave through Your Life,” USA Today, March 2, 2001, pp. 1B, 2B. 6. Sara Rimer, “At M.I.T., Large Lec- tures Are Going the Way of the Black- board,” The New York Times, January 13, 2009, p. A12. 7. Katie Hafnet, “In Class, the Audience Weighs In,” The New York Times, April 29, 2004, pp. E1, E6. 8. Greg Toppo, “Schools Achieving a Dream: Near-Universal Net Access,” USA Today, June 9, 2004, p. 6D. 9. Les Smith, “Technology Can Be Use- ful in the Classroom,” Reno Gazette- Journal, March 10, 2009, p. 2D. For a brilliant discussion on the use of technology in the classroom in the service of teaching science, see Carl Wieman, “Why Not Try a Scientific Approach to Science Education?” Scientific Blogging, March 10, 2009, and his subsequent articles, www. scientificblogging.com/carl_wieman/ why_not_try_scientific_approach_ science_education (accessed May 2, 2009). 10. Steve Jones, Pew Internet & Ameri- can Life Project: The Internet Goes Notes
  555. 536 Notes Kerry E. Grace and Justin Scheck, “Notebook Computers

    Outpace Desk- top PCs,” The Wall Street Journal, December 24, 2008, p. B6; and David Pogue, “When Laptops Go Light,” The New York Times, March 26, 2009, p. B1, B8. 63. David Einstein, “Custom Computers,” San Francisco Chronicle, April 15, 1999, pp. B1, B3. 64. Ibid. 65. Laurence Hooper, “No Compro- mises,” The Wall Street Journal, November 16, 1992, p. R8. 66. See John Markoff, “Do You Have That Portable in a Midsize?” The New York Times, May 11, 2008, p. BU 4; Eric A. Taub, “Smaller Than a Laptop, but Bigger Than a Phone,” The New York Times, June 5, 2008, p. C6; and Roger Yu, “Business Travelers Lighten Up on Tech,” USA Today, June 19, 2008, p. 5B. 67. John Markoff, “By and for the Masses,” The New York Times, June 29, 2005, pp. C1, C5. 68. Robert D. Hof, “The Power of Us,” BusinessWeek, June 20, 2005, pp. 74–82. 69. Verne Kopytoff, “Citizen Journalism Takes Root Online,” San Francisco Chronicle, June 6, 2005, pp. E1, E5. 70. For a discussion of meanings of “cloud computing,” see Ben Worthen, “Overuse of the Term ‘Cloud Computing’ Clouds Meaning of the Tech Buzz Phrase,” The Wall Street Journal, September 23, 2008, p. B8; Daniel Lyons, “Today’s Fore- cast: Cloudy,” Newsweek, November 10, 2008, p. 24; Geoffrey A. Fowler and Ben Worthen, “The Internet Industry Is on a Cloud—Whatever That May Mean,” The Wall Street Journal, March 26, 2009, pp. A1, A9; and “No Man Is an Island: The Promise of Cloud Computing,” Knowledge@Wharton, April 1, 2009, http://knowledge.wharton.upenn.edu/ article.cfm?articleidϭ2190 (accessed June 1, 2009). 71. David Lagesse, “Taking a Walk in ‘the Cloud,’ ” U.S. News & World Report, March 2009, pp. 71–73. 72. Tom Forester and Perry Morrison, Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing (Cambridge, MA: MIT Press, 1990), pp. 1–2. 73. Psychiatrist Edward M. Hallowell, quoted in Alma Tugend, “Multitask- ing Can Make You Lose . . . Um . . . Focus,” The New York Times, Octo- ber 25, 2008, p. B7. Hallowell is the author of CrazyBusy: Overstretched, Overbooked, and About to Snap! (New York: Ballantine, 2006). 74. John Tierney, “Ear Plugs to Lasers: The Science of Concentration,” The New York Times, May 5, 2009, p. D2. 49. Adam Gopnik, “The Return of the Word,” The New Yorker, December 6, 1999, pp. 49–50. 50. Deborah Fallows, Pew Internet & American Life Project, “Email at Work,” December 8, 2002, www. pewinternet .org/pdfs/PIP_Work_ Email_Report.pdf (accessed July 1, 2009). 51. Gopnik, “The Return of the Word.” 52. Tamar Lewin, “Informal Style of Elec- tronic Messages Is Showing Up in Schoolwork, Study Finds,” The New York Times, April 25, 2008, p. A12. 53. David A. Whittler, quoted in “Living Online,” The Futurist, July–August 1997, p. 54. 54. Pew Internet & American Life Project, “Demographics of Inter- net Users,” February 15, 2008, www.pewinternet.org/trends/User_ Demo_2.15.08.htm (accessed June 1, 2009). 55. Pew Internet & American Life Proj- ect, “Daily Internet Activities,” Febru- ary 15, 2008, http://www. pewinternet. org/trends/Daily_ Internet_Activities_ 2.15.08.htm (accessed July 1, 2009). 56. Kevin Maney, “The Net Effect: Evo- lution or Revolution?” USA Today, August 9, 1999, pp. 1B, 2B. 57. Internet Coaching Library, “World Internet Users and Population Stats,” Internet World Stats, May 30, 2009, www.internetworldstats.com/stats.htm (accessed June 1, 2009). 58. Pew Internet & American Life Project, “Demographic of Internet Users,” December 20, 2008, www. pewinternet.org/Static-Pages/Data- Tools/Download-Data/~ /media/ Infographics/Trend%20Data/ January%202009%20updates/ Demographics%20of%20 Internet%20Users%201%206%2009. jpg (accessed June 1, 2009). 59. Sidney Jones and Susannah Fox, Pew Internet & American Life Proj- ect, “Generations Online in 2009,” January 28, 2009, www.pewinternet. org/~/media//Files/Reports/2009/PIP_ Generations_2009.pdf (accessed June 1, 2009). 60. Top500.org, reported in Don Clark, “Los Alamos Computer Keeps Title as the Fastest,” The Wall Street Journal, November 17, 2008, p. B9. 61. David M. Ewalt, “The Next (Not So) Big Thing,” InformationWeek, May 13, 2002, www.informationweek.com/ story/IWK20020510S0005 (accessed June 1, 2009). 62. Ryan Kim, “Time Is Right Now for Netbooks,” San Francisco Chronicle, November 29, 2008, p. C1, C2; Ste- phen Williams, “Netbooks Keep It Light,” The New York Times, Decem- ber 2, 2008, p. F1, F4; “Netbooks Make Big Impact,” Reno Gazette- Journal, December 8, 2008, p. 7A; 36. Tracy Loew, “States Put Spending Details Online,” USA Today, February 23, 2009, p. 3A. 37. Joe Garofoli, “White House Web Site Jolts the Bureaucracy,” San Francisco Chronicle, January 24, 2009, pp. A1, A6. 38. Justin Berton, “Web Gives Forum for Protest,” San Francisco Chronicle, October 1, 2008, p. A13. 39. David Carr, “Obama’s Personal Linke- dIn,” The New York Times, November 10, 2008, pp. B1, B6; Beth Fouhy, “Obama Team Envisions Web List as Potent Tool,” San Francisco Chronicle, November 23, 2008, p. A4; Kenneth T. Walsh, “For Obama, Governing in the Age of YouTube,” U.S. News & World Report, December 8, 2008, p. 32; Carla Marinucci, “Obama Using Netroots to Lobby for Stimulus,” San Francisco Chronicle, February 3, 2009, p. A8; Sheryl Gay Stolberg, “Obama Makes History in Live Inter- net Video Chat,” The New York Times, March 27, 2009, p. A15. 40. See Steve Cerocke, “IT Jobs Are Fore- cast to Grow by 24 Percent through 2016,” Reno Gazette-Journal, June 2, 2008, p. 7A; Amy Dobson, “Informa- tion Technology: The Next Genera- tion,” San Francisco Chronicle, June 8, 2008, p. H1; and Steve Cerocke, “Breaking into Information Technol- ogy Sector Requires Some Experi- ence,” Reno Gazette-Journal, June 17, 2008, p. 7A. 41. Susan Stellin, “Getting Your Resume to the Top of the Electronic Pile Can Be a Matter of Paying an Extra Fee; But Does It Translate into Better Results?” The New York Times, Janu- ary 20, 2003, p. C3. 42. “Worldwide Mobile Subscriptions to Reach 5.6 Billion by 2013,” press release, Strategy Analytics, www.strat- egyanalytics.com/default.aspx?mod5P ressReleaseViewer&a054018 (accessed June 1, 2009). 43. Bob Tedeschi, “Navigating the New World of Cellphones, as the Options Pile Up,” The New York Times, June 19, 2008, p. C6. 44. ForceNine Consulting/Wirthlin Worldwide and Harris Interactive, in “Cellphones Add Features,” USA Today, November 29, 2004, p. 1D. 45. Michael Specter, “Your Mail Has Van- ished,” The New Yorker, December 6, 1999, pp. 96–103. 46. About.com , “How Many Emails Are Sent Every Day?” Heinz Tschab- itscher, http://email.about.com (accessed July 8, 2009). 47. “Like It or Not, You’ve Got Mail,” BusinessWeek, October 4, 1999, pp. 178–184. 48. Robert Rossney, “E-Mail’s Best Asset—Time to Think,” San Francisco Chronicle, October 5, 1995, p. E7.
  556. Notes 537 Truth,” The New York Times, June 15, 2005,

    p. A29. 23. Ellen Chamberlain, “Bare Bones 101: A Basic Tutorial on Searching the Web,” University of South Carolina, Beaufort Library, September 7, 2006, www.sc.edu/beaufort/library/pages/ bones/lesson5.shtml (accessed June 8, 2009). 24. Adam Gregerman, “Online Research Is So Easy, So Unreliable” [letter], The New York Times, June 23, 2004, p. A26. 25. Janet Hogan, “The ABCDs of Evalu- ating Internet Resources,” Bingham- ton University Libraries, November 2, 2004, http://library.lib.binghamton. edu/search/evaluation.html; Hope N. Tillman, “Evaluating Quality on the Net,” Babson College, March 28, 2003, www.hopetillman.com/ findqual.html; and Esther Grassian, “Thinking Critically about World Wide Web Resources,” UCLA College Library, September 6, 2000, www. library.ucla.edu/ libraries/college/help/ critical/index.htm (all accessed June 8, 2009). 26. E. Schwartz, “Google, Yahoo Video Search Is the Tip of the Iceberg,” InfoWorld, January 26, 2005, http:// weblog.infoworld.com/techwatch/ archives/001024.html (accessed June 8, 2009). 27. Daniel Terdiman, “A Tool for Scholars Who Like to Dig Deep,” The New York Times, November 25, 2004, p. B6. See also Jeffrey R. Young, “Google Unveils a Search Engine Focused on Scholarly Materials,” The Chronicle of Higher Education, December 3, 2004, p. A34. 28. Jefferson Graham, “Google’s Library Plan ‘a Huge Help,’ ” USA Today, December 15, 2004, p. 3B. See also Kevin DeLaney and Jeffrey A. Tra- chtenberg, “Google Goes to College,” The Wall Street Journal, December 14, 2004, pp. D1, D4. 29. “Google’s Book Scanning Project Runs into Legal Hurdles,” domain-b. com, June 10, 2009, www.domain-b. com/companies/companies_g/ google/20090610_book_scanning_proj- ect.html (accessed June 10, 2009). 30. Stephen H. Wildstrom, “Search- Boosters for Your PC,” BusinessWeek, April 26, 2004, p. 26. 31. Matt Lake, “Desperately Seeking Susan OR Suzie NOT Sushi,” The New York Times, September 3, 1998, p. D1. 32. Jefferson Graham, “E-Mail Carri- ers Deliver Gifts of Nifty Features to Lure, Keep Users,” USA Today, April 16, 2008, p. 4B. 33. Michelle Slatalla, “The Office Meet- ing That Never Ends,” The New York Times, September 23, 1999, pp. D1, D8. 12. Victoria Shannon, “U.S. Seeks to Keep Role on Internet,” The New York Times, July 4, 2005, p. C6, reprinted from International Herald Tribune. 13. Charisse Jones, “New Web Endings Could Be Start of Billion-Dollar Turf Wars,” USA Today, April 7, 2008, p. 4B; Anick Jesdanun, “Internet Org Paves Way for Hundreds of New Domains,” Wired News, June 26, 2008, http://news.wired.com/ dynamic/stories/t/tec_new_internet_n ames?site ϭ wire&section ϭ home&t emplate ϭ default (accessed June 7, 2009) or http://thedudedean.newsvine. com_news/2008/06/27/1619091- internet-org-paves-way-for-hundreds- of-new-domains (accessed July 25, 2009); and Michelle Kessler, “Internet Group Opens Door to Domains Beyond .com,” USA Today, July 27, 2008, p. 1B. 14. Research by Net Applications, reported in John Letzing, “Microsoft Loses Share in Rivalry for Browser,” The Wall Street Journal, January 5, 2009, p. B3. 15. Nick Wingfield and Suzanne Vran- ica, “Microsoft’s ‘Bing’ to Take on Google,” The Wall Street Journal, May 29, 2009, p. B5; Walt Mossberg, “Is Bing the Thing?” The Wall Street Journal, June 2, 2009, p. R4; Kath- erine Boehret, “Microsoft Effort to Best Google Yields Results,” The Wall Street Journal, June 3, 2009, pp. D1, D3; and Stuart Elliott, “Search for Bing? It’ll Be Baked in TV and Online Fare,” The New York Times, June 5, 2009, p. B3. 16. “The Size of the World Wide Web,” WorldWideWebSize.com, June 8, 2009, www.worldwidewebsize.com (accessed June 8, 2009). 17. Kitty Burns Florey, “Around the (Vir- tual) World in Half a Second” [letter], The New York Times, March 2, 2004, p. A26. 18. Melanie Hanes-Ramos, “Bare Bones 101: A Basic Tutorial on Searching the Web,” University of South Caro- lina, Beaufort Library, February 5, 2009, www.sc.edu/beaufort/library/ pages/bones/bones.shtml (accessed June 8, 2009). 19. May 30, 2009, figures from Hit- wise, reported in “Top Ten Search Engines,” seoconsultants.com, June 1, 2009, www.seoconsultants.com/ search-engines (accessed June 8, 2009). 20. Linda Bertland, “Searching the Inter- net: Search Engines and Subject Indexes,” May 15, 2009, www. sldirectory.com/search.html (accessed June 8, 2009). 21. Hanes-Ramos, “Bare Bones 101.” 22. Chris Taylor, “It’s a Wiki, Wiki World,” Time, June 6, 2005, pp. 40–42. See also Stacy Schiff, “The Interactive 75. Winifred Gallagher, cited in Tierney, “Ear Plugs to Lasers.” Gallagher is the author of Rapt (New York: Pen- guin Press, 2009). 76. Winifred Gallagher, quoted in book review, David G. Myers, “Please Pay Attention,” The Wall Street Journal, April 20, 2009, p. A13. 77. Francis P. Robinson, Effective Study, 4th ed. (New York: Harper & Row, 1970). 78. Bruce K. Broumage and Richard E. Mayer, “Quantitative and Qualita- tive Effects of Repetition on Learn- ing from Technical Text,” Journal of Educational Psychology, 78, 1982, 271–278. 79. Robin J. Palkovitz and Richard K. Lore, “Note Taking and Note Review: Why Students Fail Questions Based on Lecture Material,” Teaching of Psy- chology, 7, 1980, 159–161. Chapter 2 1. Graham T. T. Molitor, “Five Forces Transforming Communications,” The Futurist, September–October 2001, pp. 32–37. 2. Report by the Pew Internet & Ameri- can Life Project, reported in Jack Gillum, “A Third of Adults without Internet Don’t Want It,” USA Today, February 3, 2009, p. 7D. 3. IDC estimate, reported in David H. Deans, “Digital Landscapes,” Digital Divide Network, July 7, 2008, www.digitaldivide.net/blog/dhdeans/ view?PostID ϭ 27986 (accessed June 4, 2009). 4. John Horrigan, Home Broadband Adoption 2008, Pew Internet & Amer- ican Life Project, July 2, 2008, www. pewinternet.org/PPF/r/257/report_dis- play.asp (accessed June 4, 2009). 5. Ibid. 6. Andrew LaVallee, “Postponing Dial- Up’s Demise,” The Wall Street Journal, February 26, 2009, p. B8. 7. Azadeh Ensha, “How to Travel at a Million Files a Minute,” The New York Times, August 21, 2008, p. C6. 8. Leslie Cauley, “Rural Americans Long to Be Linked,” USA Today, June 8, 2008, pp. 1B, 2B. 9. John Horrigan, Mobile Access to Data and Information, Pew Internet & American Life Project, March 5, 2008, www.pewinternet.org/PPF/r/244/ report_display.asp (accessed June 7, 2009). 10. For a short history of the devel- opment of the Internet and pro- tocols, see Stephen D. Crocker, “How the Internet Got Its Rules,” The New York Times, April 7, 2009, p. A25. 11. Scarlett Pruitt, “ICANN Works on Going Global,” InfoWorld, March 26, 2003, www.infoworld.com (accessed June 8, 2009).
  557. 538 Notes York Times, May 4, 2008, business section, p.

    4. 60. N’Gai Croal, “Thoughtcasting: U R So Vain,” Newsweek, June 16, 2008, p. 56. See also Walter S. Mossberg, “Birds of a Feather Twitter Together,” The Wall Street Journal, December 3, 2008, p. D8; Don Campbell, “Tweet! (You Won’t Believe What I’m Doing Right Now!)” USA Today, April 1, 2009, p. 11A; and Claire Cain Miller, “Putting Twitter’s World to Use,” The New York Times, April 14, 2009, pp. B1, B4. 61. Nielsen research, reported in Scott Kleinberg, “Facebook, Twitter and Other Social Media Are More Used than Email, Surveys Sug- gest,” chicagotribune.com, March 16, 2009, www.chicagotribune. com/news/nationworld/chi-talk-- less-emailmar16,0,3686520.story (accessed June 11, 2009). 62. Timothy L. O’Brien and Saul Hansell, “Barbarians at the Digital Gate,” The New York Times, September 19, 2004, sec. 3, pp. 1, 4. 63. Jared Sandberg, “Monitoring of Workers Is Boss’s Right but Why Not Include Top Brass?” The Wall Street Journal, May 18, 2005, p. B1. 64. “Egregious Email,” Smart Computing, October 2002, pp. 95–97. 65. Michael Specter, “Damn Spam,” The New Yorker, August 6, 2007, pp. 36–41. See also Tom Abate, “3 Decades Later, We’ve Got Spam,” San Francisco Chronicle, May 3, 2008, pp. C1, C2. 66. Sabina Vrhnjak, “Spam Pollutes More than Your Email In-Boxes,” San Fran- cisco Chronicle, April 16, 2009, pp. C1, C2. 67. Tom Spring, “Spam Fighting Tips for the New Year,” PC World, January 24, 2005, www.pcworld.com/news/ article/0,aid,119358,00.asp (accessed June 12, 2009); Sean Carroll, “Slam the Spam,” PC Magazine, February 25, 2003, pp. 74–97. 68. Julian Haight, quoted in David Lazarus, “Fan Spam Is Hard to Shake,” San Francisco Chronicle, Feb- ruary 7, 2000, pp. C1, C2. 69. Riva Richmond, “Companies Target E-Mail ‘Spoofing,’ ” The Wall Street Journal, June 9, 2004, p. D9; and Amey Stone, “How to Avoid the ‘Phish’ Hook,” BusinessWeek online, May 24, 2004, www.businessweek. com/technology/content/may2004/ tc20040524_8133_tc024.htm (accessed June 12, 2009). 70. “Email Spoofing,” SearchSecurity. com Definitions, November 20, 2003, http://searchsecurity.techtarget.com/ sDefinition/0,,sid14_gci840262,00.html (accessed June 12, 2009). 71. Kim Komando, “Phishing Attacks on the Rise, Getting Personal,” Reno 46. Janet Kornblum, “Welcome to the Blogosphere,” USA Today, July 8, 2003, p. 7D. 47. Andrew Sullivan, “Why I Blog,” The Atlantic, November 2008, pp. 106–113. 48. Michael Agger, Slate.com, reported in “Blogging for Fun and Profit,” The Week, October 17, 2008, p. 44. 49. Daniel Lyons, “Time to Hang Up the Pajamas,” Newsweek, February 16, 2009, p. 19; and Douglas Quenqua, “Blogs Falling in an Empty Forest,” The New York Times, June 7, 2009, Sunday Styles, pp. 1, 7. 50. Maggie O’Neil, “Paperless Payments,” Reno Gazette-Journal, June 19, 2008, pp. 1D, 5D. 51. Virginia Heffernan, “Lost and Found,” The New York Times Maga- zine, March 30, 2008, pp. 23–24. See also Kristina Dell, “eBay Bids for Revitalization,” Time, December 22, 2008, pp. Global 1–4; Geoffrey A. Fowler, “ eBay Retreats as Web Retailer,” The Wall Street Journal, March 12, 2009, pp. A1, A11; Geof- frey A. Fowler, “eBay Sellers Not Sold on Strategy,” The Wall Street Journal, March 13, 2009, p. B3; and Geoffrey A. Fowler, “Auctions Fade in eBay’s Bid for Growth,” The Wall Street Jour- nal, May 26, 2009, pp. A1, A16. 52. Alan Krauss, “Piggybacking on Face- book,” The New York Times, February 20, 2008, p. NY 7. 53. Brian K. Williams, Stacey C. Sawyer, and Carl M. Wahlstrom, Marriages, Families, & Intimate Relationships: A Practical Introduction, 2nd ed. (Bos- ton: Pearson, 2009), p. 160. 54. Daniel Nations, “What Is Web 2.0?” About.com , 2007, http://webtrends. about.com/od/web20/a/what-is-web20. htm (accessed June 11, 2009). 55. Michael Arrington, “Social Network- ing: Will Facebook Overtake MySpace in the U.S. in 2009?” TechCrunch, January 13, 2009, www.techcrunch. com/2009/01/13/social-networking-will- facebook-overtake-myspace-in-the-us-in- 2009 (accessed June 11, 2009). 56. Forrester Research, cited in “ ‘Not a Site, but a Concept’: Tapping the Power of Social Networking,” Knowl- edge@Wharton, July 9, 2008, http:// knowledge.wharton.upenn.edu/article. cfm?articleid ϭ 2009 (accessed June 11, 2009). 57. Lee Rainie, Increased Use of Video- Sharing Sites, Pew Internet & Ameri- can Life Project, January 9, 2008, www.pewinternet.org/PPF/r/232/ report_display.asp (accessed June 11, 2009). 58. Virginia Heffernan, “File-Sharing Fetish,” The New York Times Maga- zine, July 6, 2008, pp. 17–18. 59. Brad Stone, “Friends May Be the Best Guide through the Noise,” The New 34. Jeanne Hinds, quoted in Slatalla, 1999. 35. Study by the Pew Internet and Ameri- can Life Project, reported in Peter Svensson, “Mixed Feelings Found about Jump in E-Mail,” San Francisco Chronicle, September 29, 2008, p. D4. 36. John Schwartz, “Blogs Provide Raw Details from Scene of the Disaster,” The New York Times, December 28, 2004, p. A14. See also John Schwartz, “A Catastrophe Strikes, and the Cyberworld Responds,” The New York Times, January 2, 2005, sec. 3, p. 4; John Schwartz, “Myths Run Wild in Blog Tsunami Debate,” The New York Times, January 3, 2005, p. A9; Scott Shane and Nicholas Confessore, “In Seeking Help and Giving It, Comput- ers Become a Lifeline,” The New York Times, January 5, 2005, p. A8; Kevin Maney, “Cellphones, Net Could Have Saved Thousands from Waves,” USA Today, January 5, 2005, p. 5B; and Rebecca Buckman, “Relief, High- Tech Style,” The Wall Street Journal, January 5, 2005, pp. B1, B6. 37. Lee Gomes, “How the Next Big Thing in Technology Morphed into a Really Big Thing,” The Wall Street Journal, October 4, 2004, p. B1. 38. Antonio Regalado and Jessica Mintz, “Video Blogs Break Out with Tsunami Scenes,” The Wall Street Journal, January 3, 2005, pp. B1, B5. 39. David Pogue, “Video Chats Overcome Clunkiness,” The New York Times, February 5, 2009, pp. B1, B8. 40. Stephen H. Wildstrom, “Google’s Magic Carpet Ride,” BusinessWeek, July 18, 2005, p. 22. 41. Steven Levy, “The Earth Is Ready for Its Close-up,” Newsweek, June 6, 2005, p. 13. See also James Fallows, “An Update on Stuff That’s Cool (Like Google’s Photo Maps),” The New York Times, April 17, 2005, sec. 3, p. 5; Verne Kopytoff, “Google’s Free 3-D Service Brings Views of Earth Down to the PC,” San Francisco Chronicle, June 29, 2005, pp. A1, A16; John Markoff, “Marrying Maps to Data for a New Web Service,” The New York Times, July 18, 2005, pp. C1, C8; and Verne Kopytoff, “Microsoft, Google in Sky Fight,” San Francisco Chronicle, July 26, 2005, pp. D1, D2. 42. Verne Kopytoff, “Google Peeks Beneath the Waves,” San Francisco Chronicle, February 3, 2009, pp. A1, A14. 43. Mike Snider, “Streaming Movies Grows Dramatically,” USA Today, January 29, 2009, p. 1D. 44. Dan Carnevale, “A New Technology Lets Colleges Spread Information to People Who Want It,” The Chronicle of Higher Education, February 13, 2004, pp. A31–A32. 45. Chris Taylor, “Let RSS Go Fetch,” Time, May 30, 2005, p. 82.
  558. Notes 539 13. Sara Silver, “What’s in Store,” The Wall

    Street Journal, February 17, 2009, pp. R4, R5; and Jeffrey M. O’Brien, “The Wizard of Apps,” For- tune, May 25, 2009, pp. 29–30. 14. “Cloud Computing: The Evolution of Software-as-a-Service,” Knowledge @ W. P. Carey, June 4, 2008, http:// knowledge.wpcarey.asu.edu/article. cfm?articleid=1614 (accessed July 24, 2009). 15. “Why Software Business Models of the Future Probably Won’t Come in a Box,” Knowledge@Wharton, Febru- ary 7, 2007, http://knowledge.wharton. upenn.edu/article.cfm?articleid=1651 (accessed July 24, 2009). 16. Ryan Kim, “For Apps, Amateurs Finding Success,” San Francisco Chronicle, April 20, 2009, pp. A1, A12; and Ryan Kim, “Stanford iTunes U Class Tops 1 Million Downloads,” San Francisco Chronicle, May 19, 2009, pp. C1, C3. 17. Rhonda Abrams, “Free Applications from Google Make Running an Office Easier,” Reno Gazette-Journal, Octo- ber 7, 2008, p. 6A. 18. Rhonda Abrams, 2008; and Randall Stross, “The Word Processor Is Look- ing at Home on the Web,” The New York Times, April 5, 2009, Business section, p. 4. 19. Walter S. Mossberg, “Quickoffice Brings Editing to iPhones, but Put It on Hold,” The Wall Street Journal, May 7, 2009, p. D1. 20. Study by Kent Norman, Laboratory of Automation Psychology and Deci- sion Processes, University of Mary- land, cited in Katherine Seligman, “Computer Crashes Booming Busi- ness,” San Francisco Chronicle, April 17, 2005, pp. A1, A21. 21. Survey by Pew Internet and American Life Project, reported in Jack Gil- lum, “Half of New-Gadget Users Call for Help,” USA Today, November 18, 2008, p. 6D. 22. James Aley, “Software That Doesn’t Work; Customers Are in Revolt; Here’s the Plan,” Fortune, November 25, 2002, pp. 147–158. 23. Jane Black, “Usability Is Next to Profitability,” BusinessWeek online, December 4, 2002, www. businessweek.com/technology content/dec2002 (accessed July 24, 2009). 24. Edward C. Baig, “Have You Tried to Get Tech Support Lately? Arrgh!#*!!” USA Today, August 27, 2004. 25. Edward C. Baig, “Tech Support: Not Quite at Our Beck and Call,” USA Today, July 17, 2002, p. 3D. 26. Adapted from Jane Spencer, “Com- puter Glitches? Rent Your Own Tech,” The Wall Street Journal, August 22, 2002, table, p. D3. 27. Stan Sams, quoted in ibid., p. D3. Chapter 3 1. Alan Robbins, “Why There’s Egg on Your Interface,” The New York Times, December 1, 1996, sec. 3, p. 12. 2. Ryan Kim, “OS 3.0 for iPhone in Works,” San Francisco Chronicle, March 18, 2009, pp. C1, C2; Justin Scheck and Nick Wingfield, “A Chal- lenge to Microsoft, PC Makers Test Laptops Running Google Software,” The Wall Street Journal, April 1, 2009, p. B1; and Justin Scheck, “Dell Stud- ies Google’s Android for Future Prod- ucts,” The Wall Street Journal, May 1, 2009, p. B4. 3. Matt Richtel and Ashlee Vance, “In New Age of Impatience, Cutting Computer Start Time,” The New York Times, October 26, 2008, pp. A1, A24; Randall Stross, “30 Seconds to Boot Up? That’s 29 Too Many,” November 2, 2008, Business section, p. 4; Ryan Kim, “Booting Could Get a Kick-Start,” San Francisco Chronicle, November 10, 2008, pp. D1, D4; and Jefferson Graham, “Imagine Booting Up and Getting Online Before Your Hair Turns Gray,” USA Today, March 18, 2009, p. 4B. 4. Stephen H. Wildstrom, “Tiger Makes Mac’s Edge Even Sharper,” Business- Week, May 9, 2005, p. 28. 5. Jonathan Skillings, “Windows 7, Mac OS Make Gains in January,” cnet news, http://news.cnet.com/8301- 10805_3-10154133-75.html, accessed June 20, 2009. 6. Jefferson Graham, “Can Vista Bust Out?” USA Today, April 30, 2008, pp. 1B, 2B. 7. Randall Stross, “Windows Could Use a Rush of Fresh Air,” The New York Times, June 29, 2008, Business sec- tion, p. 4. 8. Walter S. Mossberg, “Free Security Upgrade to Windows XP Has Value but Falls Short,” The Wall Street Jour- nal, August 19, 2004, p. B1. 9. Greg Sullivan, quoted in Edward C. Baig, “Windows Upgrade Makes Strides to Outrun the Bad Guys,” USA Today, August 12, 2004, p. 3B. 10. Irving Wladawsky-Berger, quoted in Deborah Solomon, “Could Linux Outdo Windows?” USA Today, March 9, 2000, pp. 1B, 2B. 11. Ashlee Vance, “A Software Populist Who Doesn’t Do Windows,” The New York Times, January 11, 2009, Busi- ness section, pp. 1, 6; Don Clark, “Intel Unveils Software That Rivals Windows,” The Wall Street Journal, May 20, 2009, p. B7; and Nick Wing- field, “Little Laptops with Linux Have Compatibility Issues,” The Wall Street Journal, May 28, 2009, p. D1. 12. Mina Kimes, “Apple’s App Store Thinks Small,” Fortune, May 11, 2009, p. 39. Gazette-Journal, January 5, 2009, p. 2C. See also Deborah Gage, “Hack- ers Gain Access to Bank Accounts,” San Francisco Chronicle, September 1, 2008, pp. D1, D2. 72. Brian Grow, “Spear-Phishers Are Sneaking In,” BusinessWeek, July 11, 2005, p. 13. 73. David F. Gallagher, “Users Find Too Many Phish in the Internet Sea,” The New York Times, September 20, 2004, p. C4; and Ann Grimes, “No Phishing Allowed,’” The Wall Street Journal, September 16, 2004, p. B4. 74. Kevin J. Delaney, “‘Evil Twins’ and ‘Pharming,’ ” The Wall Street Journal, May 17, 2005, pp. B1, B2; and Jon Swartz, “Thieves Hit Internet with Sneakier Software,” USA Today, May 18, 2005, p. 1B. 75. Kim Komando, “5 Tips for Spurning Spyware and Browser Hijackers,” Microsoft Small Business Center, 2005, www.microsoft.com/smallbusiness/ issues/marketing/privacy_spam/5_tips_ for_spurning_spyware_and_browser_ hijackers.mspx (accessed June 12, 2009). 76. David Kesmodel, “Marketers Seek to Make Cookies More Palatable,” The Wall Street Journal, June 17, 2005, pp. B1, B2. 77. America Online and the National Cyber Security Alliance, AOL/NCSA Online Safety Study, October 2004, www.staysafeonline.info/news/safety_ study_v04.pdf (accessed June 12, 2009). 78. Lee Gomes, “Spyware Is Easy to Get, Difficult to Remove, Increasingly Malicious,” The Wall Street Journal, July 12, 2004, p. B1. 79. Brock Read, “As Security Concerns Rise, New Web Browsers Gain Favor at Colleges,” The Chronicle of Higher Education, July 15, 2005, p. A37. 80. Joseph Telafici, quoted in Vincent Kiernan, “The Next Plague,” The Chronicle of Higher Education, Janu- ary 28, 2005, pp. A36–A38. 81. Ellen Laird, “Internet Plagiarism: We All Pay the Price,” The Chronicle of Higher Education, June 13, 2001, p. B5. See also Sara Rimer, “A Cam- pus Fad That’s Being Copied: Internet Plagiarism,” The New York Times, September 3, 2008, www.nytimes. com/2003/09/03/education/03CHEA. html?scp ϭ 3&sqϭplagiarism&st ϭ cse (accessed June 12, 2009). 82. Eugene Dwyer, “Virtual Term Papers” [letter], The New York Times, June 10, 1997, p. A20. 83. William L. Rukyser, “How to Track Down Cyber-Cheaters” [letter], The New York Times, June 14, 1997, Sec. 6, p. 14. 84. David Rothenberg, “How the Web Destroys the Quality of Students’ Research Papers,” The Chronicle of Higher Education, August 15, 1997.
  559. 540 Notes 2008, p. C6; and Walter S. Mossberg, “Network

    Hard Disk by Western Digital Offers Easy Backup,” The Wall Street Journal, April 2, 2009, p. D1. 28. “Consumers Fail to Properly Back Up Large Digital Libraries, Says CEA,” www.reuters.com/article/press- Release/idUS157293+18-Mar-2008- +BW20080318 (accessed August 2, 2009). 29. Edward Baig, “Be Happy, Film Freaks,” BusinessWeek, May 26, 1997, pp. 172–173. 30. Matt Richtel and Brad Stone, “Blu- ray’s Fuzzy Future,” The New York Times, January 5, 2009, pp. B1, B4. 31. “Solid Computing, for a Price,” The New York Times, September 18, 2008, p. C8. See also J. Santo Domingo, “Credit-Card Hard Drives,” PC Maga- zine, Digital Edition, July 2009, p. 17. 32. Peter Wayner, “You Know about Backups; Now, Do It Online,” The New York Times, October 23, 2008, www.nytimes.com/2008/10/23/tech- nology/personaltech/23basics1.html (accessed July 4, 2009); and Anne Eisenberg, “A Digital Storage Option for Workers on the Go,” The New York Times, January 18, 2009, Business section, p. 4. 33. Ting-I Tsai, “Asustek Adds Online Storage to Low-Cost Eee PC,” The Wall Street Journal, September 5, 2008, p. B3. 34. E. K. Boehret, “Lost Cellphone? Your Carrier Has Your Backup,” The Wall Street Journal, February 25, 2009, p. D1. 35. Michio Kaku, “What Will Replace Silicon?” Time, June 19, 2000, p. 99. 36. October 2004 study by America Online and the National Cyber Secu- rity Alliance, cited in Rachel Dodes, “Terminating Spyware with Extreme Prejudice,” The New York Times, December 30, 2004, pp. E1, E6. 37. Alan Luber, “Hard Drive Backup & Restore Basics, Part 1,” Smart Com- puting, August 2004, p. 96; Dodes, “Terminating Spyware with Extreme Prejudice”; Rachel Dodes, “Tools to Make Your Hard Drive Forget Its Past,” The New York Times, December 30, 2004, p. E6; Jeff Dodd, “How to Install Operating Systems,” Smart Computing, February 2005, pp. 60–63; and Nigel Powell, “Archive Your Drive,” Popular Science, March 2005, pp. 73–74. 38. Gordon Moore, quoted in “Gordon Moore Q&A,” Time, June 19, 2000, p. 99. 39. Gordon Moore, quoted in Matthew Yi, “Faster and Faster, Smaller and Smaller—It’s the Law,” San Francisco Chronicle, April 18, 2005, p. E1. 40. Don Clark, “Intel Pushes Ahead with Tiny Circuitry,” The Wall Street Jour- nal, December 10, 2008, p. B4. 15. Adam Aston, “More Life for Moore’s Law,” BusinessWee k, June 20, 2005, pp. 108–109. 16. Wolfgang Gruener, “Intel’s 8-Core CPUs Will Have 2.3 Billion tran- sistors,” TG Daily, February 9, 2009, www.tgdaily.com/content/ view/41371/135/ (accessed July 2, 2009). 17. Michael V. Copeland, “Intel’s Secret Plan,” Fortune, May 25, 2009, pp. 52–57. 18. John Markoff, “ Do You Have That Portable in a Midsize?” The New York Times, May 11, 2008, p. BU-4; Tom Abate, “Tiny Via Girds to Defend Turf against Giant Intel,” San Francisco Chronicle, May 25, 2008, pp. D1, D3; Don Clark, “Chip Makers Rush to Fill MID Gadgets,” The Wall Street Journal, June 2, 2008, p. B6; Eric A. Taub, “Smaller Than a Laptop, but Bigger Than a Phone,” The New York Times, June 5, 2008, p. C6; and John Markoff, “Intel’s Dominance Is Chal- lenged by a Low-Power Upstart,” The New York Times, June 30, 2008, pp. C1, C5. 19. James Gorbold, “Product Reviews: Intel CPUs,” Custom PC, June 5, 2005, www.custompc.co.uk/custompc/ processors/reviews/72870/intel-penti- um-extreme-edition-840.html. 20. Don Clark, “Los Alamos Computer Keeps Title as the Fastest,” The Wall Street Journal, November 11, 2008, p. B9. 21. Frank Bajak, “Peruvian Village Shows Promise of One Laptop Per Child Project,” San Francisco Chronicle, December 26, 2007, pp. D1, D3; John Markoff, “Intel Quits Effort to Get Computers to Children,” The New York Times, January 5, 2008, p. B3; Brian Bergstein, “$100 Laptops to Be Loaded with Windows for an Addi- tional Fee,” San Francisco Chronicle, May 16, 2008, p. C4; and Steve Lohr, “Microsoft Joins Effort for Laptops for Children,” The New York Times, May 16, 2008, pp. C1, C4. 22. Michelle Kessler, “Asus Pins Future on Small but Mighty Laptop,” USA Today, May 14, 2008, p. 3B. 23. Michael Kwan, “Cell Processor Powers the Toshiba Qosmio G55,” Mobile Magazine, July 15, 2008, www. mobilemag.com/2008/07/15/cell-pro- cessor-powers-the-toshiba-qosmio-g55 (accessed July 2, 2009). 24. Don Clark, “Chip Firms Address Energy Drain,” The Wall Street Jour- nal, June 24, 2008, p. B4. 25. Cisco Cheng and Erik Rhey, “Ports,” PC Magazine, April 26, 2005, p. 66. 26. Jefferson Graham, “Power of the Graphics Card,” USA Today, Novem- ber 26, 2008, p. 4B. 27. Daniel Sorid, “Network Storage Comes Home, Not without Some Dif- ficulty,” The New York Times, June 19, Chapter 4 1. Michael S. Malone, “The Tiniest Transformer,” San Jose Mercury News, September 10, 1995, pp. 1D, 2D; excerpted from The Microprocessor: A Biography (New York: Telos/Springer Verlag, 1995). 2. Malone, “The Tiniest Transformer.” 3. Laurence Hooper, “No Compro- mises,” The Wall Street Journal, November 16, 1992, p. R8. 4. “Exabyte,” The Sharpened Glossary: Definitions of Computer Terms, www. sharpened.net/glossary/definition. php?exabyte (accessed July 29, 2009s). 5. Ernest Scheyder, “Save Some Cash, Get Unplugged,” Reno Gazette- Journal, April 11, 2009, p. 8A. 6. Ibid. 7. Report by 1E and Alliance to Save Energy, 2009 Energy Report, reported in Jon Swartz, “Leaving PCs on Over- night Costs Companies $2.8B a Year,” USA Today, March 25, 2009, p. 4B. 8. Thomas Catan, “Switching Off Standby Mode,” The Wall Street Jour- nal, November 28, 2008, p. B5. 9. Katherine Boehret, “Cool Trays Take the Heat Off Your Lap,” The Wall Street Journal, April 1, 2009, p. D4. 10. Sharon Gaudon, “Intel Squeezes 2 Billion Transistors onto New Itanium Chip,” ComputerWorld, February 4, 2008, www.computerworld.com/ action/article.do?command ϭ viewArtic leBasic&articleId ϭ 9060900 (accessed July 29, 2009). 11. Peter Svensson, “Tiny Atom Chip Gives Intel Boost,” San Francisco Chronicle, June 2, 2008, p. D3; Don Clark, “Intel Looks to Power Bottom of Market,” The Wall Street Journal, June 3, 2008, p. B3; Laurie J. Flynn, “AMD Set to Introduce a New Chip for Laptops,” The New York Times, June 4, 2008, p. C4; and Joe Nocera, “AMD and Its War with Intel,” The New York Times, June 21, 2008, pp. B1, B8. 12. Nick Wingfield and Don Clark, “With Intel Inside Apple, Macs May Be Faster, Smaller,” The Wall Street Journal, June 7, 2005, pp. B1, B7; Matthew Yi and Benny Evangelista, “Apple Gains Room to Grow,” San Francisco Chronicle, June 7, 2005, pp. A1, A8; Walter S. Mossberg, “What the Apple Plan to Switch to Intel Chips Means for Consumers,” The Wall Street Journal, June 9, 2005, p. B1; John Markoff, “Think Similar,” The New York Times, June 11, 2005, pp. B1, B13; and Peter Burrows, “Tougher Days, Bolder Apple,” Busi- nessWeek, June 20, 2005, pp. 38, 40. 13. Mossberg, “What the Apple Plan to Switch to Intel Chips Means for Consumers.” 14. Stephen H. Wildstrom, “Chips with Two Brains,” BusinessWeek, August 1, 2005, p. 20.
  560. Notes 541 5. Randall Stross, “When the Price Is Right,

    the Future Can Wait,” The New York Times, July 12, 2009, Business section, p. 3. 6. Peter Wayner, “A Keyboard That Bends to Your Needs,” The New York Times, March 12, 2009, p. B7. 7. Kevin J. Delaney, “Dumber PCs That Use the Net for Processing, Storage Get Hot—Again,” The Wall Street Journal, December 27, 2004, p. B1. 8. Charles Burress, “A Stunned Crowd Saw the PC Born—Mouse and All,” San Francisco Chronicle, December 8, 2008, pp. A1, A15. 9. Walter S. Mossberg, “A Tiny Touch Screen for Less,” The Wall Street Journal, March 18, 2009, p. D2; Jus- tin Scheck, “H-P Tries to Revive PC Sales with Touch Screens,” The Wall Street Journal, May 15, 2009, p. B1; and Ashlee Vance, “In Novelty of Touching, PC Makers See a Future,” The New York Times, June 3, 2009, p. B3. 10. Peter Svenson, “Cooked Up for Kitchen Duty,” San Francisco Chroni- cle, February 16, 2009, p. C4. 11. Jenna Wortham and Matt Richtel, “Makers Hope Touch Screens Will Help Cellphone Sales,” The New York Times, December 1, 2008, p. B1, B5; and Peter Svenson, “Touch Screens, QWERTY to Dominate Newest Cell Phones,” Reno Gazette-Journal, April 3, 2009, p. 7A. 12. Ryan Kim, “Long Nails on Touch Screens Can Be Grating,” San Fran- cisco Chronicle, December 8, 2008, pp. D1, D2. 13. Edward C. Baig, “Start-up Axiotron Converts MacBook into Tablet PC,” USA Today, May 1, 2008, p. 1B; and Edward C. Baig, “Pen May Be Might- ier Than MacBook’s Keyboard, but Not at This Price,” USA Today, May 1, 2008, p. 3B. 14. David Pogue, “Gadget Fanatics Take Note,” The New York Times, May 8, 2008, pp. C1, C9. 15. Edward C. Baig, “Livescribe Pulse Digital Pen Brings Your Notes to Life,” USA Today, May 8, 2008, p. 1B; and Edward C. Baig, “Pulse Gets Points for Design, Good Sound,” USA Today, May 8, 2008, p. 3B. 16. Peter Svensson, “A Useful Digital Pen,” Reno Gazette-Journal, June 9, 2008, p. 9A; and David Pogue, “Digital Pens to Write on Any Paper,” The New York Times, July 3, 2008, pp. C1, C7. 17. John Noble Wilford, “Project Digi- tizes Works from the Golden Age of Timbuktu,” The New York Times, May 20 2008, p. D2. 18. Marlon Manuel, “Scan-It-Yourself Part, Parcel of Life,” San Francisco Chronicle, January 30, 2005, p. E3. 55. Walter S. Mossberg, “Shopping for a Laptop? Expect Lots of Choices, and a Range of Prices,” The Wall Street Journal, April 14, 2005, p. B1. 56. “Notebooks,” PC Magazine, Novem- ber 30, 2004, pp. 121–134; Mossberg, “Shopping for a Laptop?”; “Inside Notebooks,” PC Magazine, April 26, 2005, pp. 62–68; Bill Howard, “Mul- timedia Notebooks,” PC Magazine, July 2005, pp. 89–102; Wilson Roth- man, “Laptops and Desktops: Basics, Bells and Whistles,” The New York Times, August 3, 2005, p. E6; Walter S. Mossberg, “Consider Your Needs, Then Use This Guide to Buying a Laptop,” The Wall Street Journal, April 10, 2008, http://ptech.allthingsd. com/20080410/consider-your-needs- then-use-this-guide-to-buying-a- laptop/ (accessed August 1, 2008); Aaron Boigon, “Several Things You Should Consider When Buying a Bargain Computer,” Reno Gazette- Journal, March 14, 2009, p. 7A; Ran- dall Stross, “The PC Doesn’t Have to Be an Anchor,” The New York Times, April 19, 2009, Business section, p. 4; Justin Scheck and Loretta Chao, “Leaner Laptops, Lower Prices,” The Wall Street Journal, April 22, 2009, pp. D1, D6; Ting-I. Tsai and Ian Johnson, “As Giants Step In, Asustek Defends a Tiny PC,” The Wall Street Journal, May 1, 2009, p. B1; “Tech Edge: Owner Tested,” Fortune Small Business, June 2009, p. 30; Ashlee Vance, “Acer’s Everywhere; How Did That Happen?” The New York Times, June 28, 2009, Business section, pp. 1, 6. 57. John Schwartz, “Back to School,” The New York Times, August 3, 2005, pp. E1, E6. 58. Lyons, “Hurry Up and Type”; David Pogue, “Decoding Battery Life for Laptops,” The New York Times, June 25, 2009, pp. B1, B6; and Walter S. Mossberg, “New Mac Laptops Use Batteries Sealed for Power,” The Wall Street Journal, June 25, 2009, p. D1. Chapter 5 1. David F. Gallagher, “2 Rooms, River View, ATM in Lobby,” The New York Times, June 6, 2002, p. E1. 2. Mary Kathleen Flynn, “Banking with a Big Gulp,” U.S. News & World Report, April 25, 2005, pp. EE10, EE12. 3. “DMV Installs New Kiosks,” The Record-Courier, August 8, 2008, p. 2. 4. Jeffrey Selingo, “Want to Rent a Movie? Help Yourself,” The New York Times, September 2, 2004, p. E3; Linda Stern, “Here Come the Kiosks,” Newsweek, March 22, 2004, p. E4; and Christopher Elliott, “Invasion of the Kiosks,” U.S. News & World Report, March 5, 2004, p. 82. 41. John Markoff, “IBM Plans to Announce Tiny Transistor,” The New York Times, December 9, 2002, p. C4; and Don Clark, “IBM, Xilinx Pass a Milestone in Race to Shrink Circuitry,” The Wall Street Journal, December 16, 2002, p. B5. 42. Michael Kanellos, “HP Nanotech Takes Chips beyond Transistors,” CNET News.com, February 10, 2005. 43. Aston, “More Life for Moore’s Law”; John Markoff, “Chip Maker Develops Denser Storage Method,” The New York Times, May 9, 2005, p. C3. 44. K. Naughton, “Now We’re Cooking with Batteries,” Newsweek, December 1, 2008, pp. 42–46. 45. Daniel Lyons, “Hurry Up and Type,” Newsweek, June 29, 2009, p. 27. 46. John Markoff, “Intel Moves to Free Gadgets from Their Recharging Cords,” The New York Times, August 21, 2008, p. C4; and Jordan Rob- ertson, “Intel Lights Up at Idea of Wireless Charging,” San Francisco Chronicle, August 22, 2008, p. C3. 47. Naughton, “Now We’re Cooking with Batteries”; and Daniel Lyons, “It Takes Power to Cut the Cord,” News- week, October 13, 2008, p. 24. 48. Dirk Lammers, “Fuel Cell-Powered Devices Coming Soon,” Reno Gazette- Journal, December 1, 2008, p. 7A. 49. Ibid. 50. Don Clark, “Marvell Bets on ‘Plug Computers,’ ” The Wall Street Journal, February 23, 2009, p. B4. 51. James Canton, quoted in Barnaby J. Feder, “Scientists of Very Small Draw Disciplines Together,” The New York Times, February 10, 2003, p. C4. 52. Barnaby J. Feder, “Nanotechnology Has Arrived; A Serious Opposition Is Forming,” The New York Times, August 19, 2002, p. C3; Barnaby J. Feder, “From Nanotechnology’s Sidelines, One More Warning,” The New York Times, February 1, 2003, pp. C1, C3; James M. Pethokoukis, “Devil in the Details?” U.S. News & World Report, January 27/February 3, 2003, p. 44; Mike Treder, “Molecular Nanotech: Benefits and Risks,” The Futurist, January–February 2004, pp. 42–46; Dan Vergano, “Creating a Monster?” USA Today, September 28, 2004, p. 6D; Fred Krupp and Chad Holliday, “Let’s Get Nanotech Right,” The Wall Street Journal, June 14, 2005, p. B2; and Kevin Maney, “Scared of New Nano-Pants? Hey, You May Be onto Something,” USA Today, June 22, 2005, p. 3B. 53. Paul Glader, “GE Disk Can Store 100 DVDs,” The Wall Street Journal, April 28, 2009, p. B5. 54. Mark Hachman, “The Bottomless DVD,” PC Magazine Digital Edition, July 2009, p. 9.
  561. 542 Notes Street Journal, September 30, 2003, p. D6. 53.

    Johan H. Andersen, Jane F. Thomsen, Erik Overgaard, Christina F. Lassen, Lars P. A. Brandt, Imogen Vilstrup, Ann I. Kryger, and Sigurd Mikkelsen, “Computer Use and Carpal Tun- nel Syndrome: A 1-Year Follow-up Study,” Journal of the American Medical Association 283 (2003): 2963– 2969; and J. Clarke Stevens, John C. Witt, Benn E. Smith, and Amy L. Weaver, “The Frequency of Carpal Tunnel Syndrome in Computer Users at a Medical Facility,” Neurology 56 (2001): 1568–1570. 54. Cornell University Ergonomics Web, “Carpal Tunnel Syndrome and Com- puter Use—Is There a Link?” http:// ergo.human.cornell.edu/JAMAMay oCTS.html (accessed August 8, 2009). 55. www.ninds.nih.gov/disorders/car- pal_tunnel/detail_carpal_tunnel.htm (accessed August 9, 2009). 56. “Cellular Phone Health,” www.cellu- larphonehealth.com (accessed March 31, 2005). 57. Siegal Sadetzki, Angela Chetrit, Avital Jarus-Hakak, Elisabeth Cardis, Yonit Deutch, Shay Duvdevani, Ahuva Zultan, Ilya Novikov, Laurence Freed- man, and Michael Wolf, “Cellular Phone Use and Risk of Benign and Malignant Parotid Gland Tumors—A Nationwide Case-Control Study,” American Journal of Epidemiology 167 (4) (2008): 457–467. 58. Minouk Schoemaker, Anthony Swerd- low et al., “Mobile Phone Use and Risk of Acoustic Neuroma: Results of the Interphone Case-Control Study in Five North European Countries,” British Journal of Cancer, August 31, 2005, reported in Matt Moore, “No Link Between Cellphones, Tumors: Study,” GlobeandMail.com, August 8, 2008, www.globetechnology.com/ servlet/story/RTGAM.20050831. gttumouraug31/BNStory/ Technology. 59. Ronald Herberman, cited in Agam Shah, “Reduce Cell-Phone Cancer Risk,” PC World, July 31, 2008, www.pcworld.com/businesscenter/ article/149227/reduce_cellphone_ cancer_risk.html (accessed August 8, 2009). See also Tara Parker-Pope, “Experts Revive Debate over Cell- phones and Cancer,” The New York Times, June 3, 2008, p. D5. 60. Benjamin Fulford, “Sensors Gone Wild,” Forbes, October 28, 2002, pp. 306–308. 61. Don Clark, “Low-Cost Device for Monitoring Is Set for Market,” The Wall Street Journal, September 20, 2004, p. B5; and Karen F. Schmidt, “‘Smart Dust’ Is Way Cool,” U.S. News & World Report, February 16, 2004, pp. 56–57. “Chips in Official ID Cards Raise Privacy Fears,” Reno Gazette-Journal, July 12, 2009, p. 4B. 36. “Theft Deterrence for an Arizona Icon,” The New York Times, October 12, 2008, news section, p. 31. 37. William Falk, “The Two Weeks You Missed,” The New York Times, Sep- tember 6, 2008, p. A23. 38. Diedtra Henderson, “Implantable Chip Sparks Privacy Concerns,” Reno Gazette-Journal, October 14, 2004, p. 4A. 39. Benjamin Pimentel, “Biometrics Puts Security at a User’s Fingertips,” San Francisco Chronicle, July 11, 2005, pp. E1, E2; Andrew Morse, “New Biometric Identifier Is at Hand,” The Wall Street Journal, July 21, 2005, p. B4; and Thomas Frank, “Biometric IDs Could See Massive Growth,” USA Today, August 15, 2005, p. 1B, 2B. 40. Thomas Frank, “Digital IDs Make Clearing Customs Easier,” USA Today, April 24, 2009, p. 3A. 41. Farhad Manjoo, “Boss, I Need a Big- ger Screen; For Work Efficiency, of Course,” The New York Times, Janu- ary 15, 2009, p. B9. 42. Janet Colvin, Nancy Tobler, and James A. Anderson, “Productivity and Multi-Screen Displays,” Rocky Moun- tain Communication Review, Summer 2004, pp. 31–53. 43. James A. Anderson, University of Utah, quoted in “Multiple Monitor Computing Demonstrates Tangible Benefits for Corporate Workforce,” NEC press release, October 6, 2003, www.necus.com/necus/media/press_ releases/template.cfm?DID ϭ 1947 (accessed July 20, 2009). 44. Manjoo, “Boss, I Need a Bigger Screen.” 45. Walter S. Mossberg, “Printer Makes a New Kind of Polaroid Magic,” The Wall Street Journal, June 18, 2008, p. D6. 46. “Small Photo Printers Bring Digital Images to Life,” San Francisco Chron- icle, August 18, 2008, p. D1. 47. Ryan Kim, “HP Unveils Web-Ready Printer,” San Francisco Chronicle, June 23, 2009, pp. C1, C3. 48. Danielle Weatherbee, quoted in Steve Friess, “Laptop Design Can Be a Pain in the Posture,” USA Today, April 13, 2005, p. 8D. 49. Tom Albin, quoted in Friess, “Lap- top Design Can Be a Pain in the Posture.” 50. Tamara James, quoted in Friess, “Laptop Design Can Be a Pain in the Posture.” 51. Rachel Konrad, “Logitech Spawns New Breed of Mice That Is Twice as Nice,” San Francisco Chronicle, Sep- tember 27, 2004, p. F4. 52. Albert R. Karr, “An Ergo-Unfriendly Home Office Can Hurt You,” The Wall 19. David Pogue, “Grocery Shopping Made Easy,” The New York Times, June 19, 2008, pp. C1, C7. 20. Julie Schmit, “Labels Will Tell Buy- ers Where Their Berries Grew,” USA Today, February 2, 2009, p. 8B. 21. Thomas Frank, “Paperless Boarding Passes Set to Take Off,” USA Today, October 22, 2008, p. 3A. 22. Byron Acohido, “New ‘2D Barcodes’ Put Info at Your Fingertips,” USA Today, May 20, 2009, p. 3B. 23. Robert Johnson, “The Fax Machine: Technology That Refuses to Die,” The New York Times, March 27, 2005, sec. 3, p. 8. 24. Katie Hafner, “At Your Service (or Wits’ End),” The New York Times, September 9, 2004, pp. E1, E7. 25. David Einstein, “Prepaid Wireless Plan Is an Option,” San Francisco Chronicle, February 23, 2009, pp. C1, C3. 26. John Markoff, “Google Is Taking Your Questions (Spoken, via the iPhone),” The New York Times, November 11, 2008, pp. B1, B7; and Edward C. Baig, “Online Voice Searches by Cellphone Can Be Hit or Miss,” USA Today, February 12, 2009, p. 6B. 27. Larry Copeland, “Project Will Help Drivers Go More with Traffic Flow,” USA Today, June 13, 2008, p. 1A; and Larry Copeland, “Test Project Will Gather Highway Traffic Data,” USA Today, June 13, 2008, p. 6A. 28. Alicia Chang, “Sensors to Keep Tabs on Fault,” Reno Gazette-Journal, March 29, 2009, pp. 1B, 3B. 29. William J. Broad, “A Web of Sensors Taking Earth’s Pulse,” The New York Times, May 10, 2005, pp. D1, D4. 30. Laura Landro, “The Hospital Is Watching You,” The Wall Street Jour- nal, November 12, 2008, p. D4. 31. John Schwartz, “Graduate Cryptogra- phers Unlock Code of ‘Thiefproof’ Car Key,” The New York Times, January 29, 2005, p. A10. 32. Peter Sanders, “Casinos Bet on Radio-ID Gambling Chips,” The Wall Street Journal, May 13, 2005, pp. B1, B7. 33. Jenny Strasburg, “Chase Introduces No-Swipe Plastic,” San Francisco Chronicle, May 20, 2005, pp. C1, C6; and Mindy Fetterman, “Wave-and- Pay Credit Cards May Make Buying Too Easy,” USA Today, May 24, 2005, p. 1B. See also Don Clark, “Enhanced Tracking Technology May Propel Adoption of RFID,” The Wall Street Journal, April 14, 2008, p. B4. 34. James M. Pethokoukis, “Big Box Meets Big Brother,” U.S. News & World Report, January 24, 2005, pp. 46–47. 35. Mimi Hall, “ID Scan Gives Border Agents Leg Up,” USA Today, Novem- ber 24, 2008, p. 1A; and Todd Lewan,
  562. Notes 543 96. Josh Quittner, “The Klutz’s Compan- ion,” Time,

    October 13, 2008, p. 66; and John Biggs, “It Takes a Drop and Doesn’t Stop,” The New York Times, November 13, 2008, p. B6. 97. “Computers Causing Injuries in the Home,” Medline Plus, June 9, 2009, www.nlm.nih.gov/medlineplus/news/ fullstory_85396.html (accessed July 23, 2009). 98. Melinda Beck, “When Your Laptop Is a Big Pain in the Neck,” The Wall Street Journal, December 16, 2008, p. D1. Chapter 6 1. “What Does ‘Digital’ Mean in Regard to Electronics?” Popular Science, August 1997, pp. 91–94. 2. Ken Belson, “Dial-Up Internet Starts to Go the Way of Rotary Phones,” The New York Times, June 21, 2005, pp. C1, C5. 3. Lisa Guernsey, “With Wires in the Walls, the Cyberhome Hums,” The New York Times, March 27, 2003, pp. D1, D7. 4. S. Zeadally and P. Kubher, “Internet Access to Heterogeneous Home Area Network Devices with an OSGi-Based Gateway,” International Journal of Ad Hoc and Ubiquitous Computing, 3 (1), 48–56. 5. See Michael Fitzgerald, “Finding and Fixing a Home’s Power Hogs,” The New York Times, July 27, 2008, www.nytimes.com/2008/07/27/ technology/27proto.html?ex ϭ 1374811 200&en ϭ a965d02fc80765e1&ei ϭ 5124 &partner ϭ permalink&exprod ϭ permali nk (accessed August 12, 2009). 6. Christie Thomas, quoted in Stephanie Armour, “Job Opening? Work-at- Home Moms Fill Bill,” USA Today, July 20, 2005, p. 3B. See also Taylor Lindstrom, “Time to Telecommute?” San Francisco Chronicle, June 15, 2008, p. H1. 7. Kris Maher, “Corner Office Shift: Telecommuting Rises in Executive Ranks,” The Wall Street Journal, Sep- tember 21, 2004, pp. B1, B10. 8. David Kline, quoted in W. James Au, “The Lonely Long-Distance Worker,” PC Computing, February 2000, pp. 42–43. 9. Michelle Conlin, “Home Offices: The New Math,” BusinessWeek, March 9, 2009, pp. 66–68. 10. WorldatWork, Telework Trendlines 2009: A Survey Brief by WorldatWork, February 2009, p. 5, www.worldat- work.org/waw/adimLink?id ϭ 31115 (accessed August 7, 2009). 11. Jim Hopkins, “How Solo Workers Keep from Getting Depressed,” USA Today, May 9, 2001; Stepha- nie Armour, “Telecommuting Gets Stuck in the Slow Lane,” USA Today, June 25, 2001, pp. 1A, 2A; 79. Cliff Edwards, “Soon TVs and PCs May Work Like the Wii,” Business- Week, April 13, 2009, pp. 52–53; and Jerry A. DiColo, “ ‘Virtual Touch’ within Reach,” The Wall Street Jour- nal, April 29, 2009, p. B5. 80. Verne Kopytoff, “Finding Faces amid Photos,” San Francisco Chronicle, September 29, 2008, pp. D1, D3. 81. Kevin Maney, “Scientists Gingerly Tap into Brain’s Power,” USA Today, October 11, 2004, pp. 1B, 2B. See also Andrew Pollack, “With Tiny Brain Implants, Just Thinking May Make It So,” The New York Times, April 13, 2004, p. D5. 82. Alex Nussbaum, “Monkeys Think, and Prosthetic Arms Do,” San Francisco Chronicle, May 29, 2008, p. A4. 83. Anne Eisenberg, “Moving Mountains with the Brain, Not a Joystick,” The New York Times, June 8, 2008, business section, p. 3. 84. David Ho, “Hearing Voices? It’s Not in Your Imagination,” San Fran- cisco Chronicle, February 19, 2008, pp. E1, E5. 85. Kara Platoni, “iProd,” Stanford, July/ August 2008, pp. 65–68. 86. Mike Snider, “3D: Coming at You in a Home Theater Near You,” USA Today, June 24, 2008, p. 6D. 87. Daniel Lyons, “The Paper Chas- ers,” Newsweek, December 1, 2008, pp. E6–E9. 88. Jeremy Caplan, “Ink Inc.,” Time, Sep- tember 15, 2009, p. Global 6. 89. Don Clark, “Videogames Get Real,” The Wall Street Journal, April 14, 2004, pp. B1, B2. 90. Brooks Barnes, “Stereo Vision on the Silver Screen,” The New York Times, January 12, 2009, pp. B1, B6; Brooks Barnes, “A Tiny Studio Enters the Third Dimension,” The New York Times, February 8, 2009, business section, pp. 1, 5; Peter Hartlaub, “3-D Rises from the Dead,” San Francisco Chronicle, March 20, 2009, pp. E1, E2; and Josh Quittner, “The Next Dimension,” Time, March 30, 2009, pp. 53–62. 91. Don Clark, Ben Charny, and Jerry DiColo, “Animators Envision 3-D TV at Home,” The Wall Street Journal, January 5, 2009, pp. B1, B6. 92. Stephen H. Wildstrom, “Coming at You: 3D on Your PC,” BusinessWeek, January 19, 2009, p. 65. 93. Michael V. Copeland, “3-D Gets Down to Business,” Fortune, March 30, 2009, pp. 32–40. 94. Adam Ashton, “If You Can Draw It, They Can Make It,” BusinessWeek, May 23, 2005, pp. MTL7–MTL8. 95. Survey by Ponemon Institute for Dell, reported in “How Workers Damage Laptops,” USA Today, March 4, 2009, p. 1A. 62. Cornelia Dean, “Charting Bird Migra- tions by Using Tiny Backpacks,” The New York Times, February 13, 2009, p. A15. 63. Clark Nguyen, professor of electrical engineering, quoted in Fulford, “Sen- sors Gone Wild.” 64. Mimi Hall, “Sensors to Provide Early Warning for Bioterror Attacks,” USA Today, January 23, 2003, p. 3A. 65. David Perlman, “H-Bomb Sensors Yield New Benefits,” San Francisco Chronicle, December 9, 2002, p. A9. 66. Mimi Hall, “ ‘Virtual Fence’ Gets Sec- ond Chance on U.S. Border,” USA Today, March 11, 2009, p. 4A. 67. David R.Baker, “Intel’s Next Crop of Eco-Devices,” San Francisco Chron- icle, December 4, 2008, p. C1; and Michael Totty, “Smart Roads; Smart Bridges; Smart Grids,” The Wall Street Journal, February 17, 2009, pp. R1, R3. 68. Robert Davis, “Now There’s Hope in His Eyes,” USA Today, June 19, 2008, p. 6D. 69. Donna Gordon Blankinship, “Web- Based Program Gives the Blind Inter- net Access,” Nevada Appeal, July 20, 2008, p. A6. 70. Greg Bluestein, “Tongue May Become a Device Disabled Could Use as a Control,” San Francisco Chronicle, August 25, 2008, p. D2. 71. Justin Berton, “Not Just Sci-Fi: A Growing Urge to Use Tech Objects in Human Bodies,” San Francisco Chronicle, January 1, 2009, pp. A1, A11; and Anne Eisenberg, “Inside These Legends, a Digital Dimension,” The New York Times, April 26, 2009, business section, p. 4. 72. Matthew Philips, “It Makes Teachers Touchy,” Newsweek, September 22, 2008, p. 10. 73. Faith Keenan, “PCs and Speech: A Rocky Marriage,” BusinessWeek, September 9, 2002, pp. 64–66; and Anne Eisenberg, “Teaching Machines to Hear Your Prose and Your Pain,” The New York Times, August 1, 2002, p. E9. 74. Douglas Heingartner, “Attention, Cows: Please Speak into the Micro- phone,” The New York Times, August 1, 2002, p. E5. 75. Benny Evangelista, “Microsoft Team Works on Getting Ahead of Its Time,” San Francisco Chronicle, June 14, 2004, p. D4. 76. David Pogue, “Sizing Up a New Species: Camera-Binoculars,” The New York Times, March 24, 2005, pp. E1, E4. 77. Leslie Berlin, “Kicking Reality Up a Notch,” The New York Times, July 12, 2009, business section, p. 3. 78. Peter Wayner, “Just a Twist (and Tilt) of the Wrist,” The New York Times, May 29, 2008, p. C6.
  563. 544 Notes August 21, 2008, pp. C1, C2; Roger Yu,

    “In-Flight Net Access Takes Off on Virgin America,” USA Today, November 24, 2008, p. 3B; and David Koenig, “American Airlines to Expand In-Flight Access to the Inter- net,” San Francisco Chronicle, March 31, 2009, p. C2. 32. Marshall Loeb, “Securing Your Home Wi-Fi Network Saves Money,” Reno Gazette-Journal, June 30, 2005, p. 3D. 33. In-Stat, reported in Rick Merritt, “Ultrawideband Dies by 2013,” EE Times, May 4, 2009, www. eetimes.com/news/latest/showArticle. jhtml?articleID ϭ 217201265 (accessed August 10, 2009). 34. Lew Tucker, quoted in Matt Richtel and John Markoff, “Corrupted PC’s Discover a Home: The Dumpster,” The New York Times, July 17, 2005, sec. 1, p. 13. 35. “Enhancing Information and Data Security: A Never Ending Quest,” Knowledge@SMU, June 4, 2008, http://knowledge.smu.edu.sg/article. cfm?articleid ϭ 1144 (accessed August 9, 2009); John Markoff, “Internet Attacks Are Growing More Potent and Complex,” The New York Times, November 10, 2008, p. B8; Deborah Gage, “Rising Threat: Online Crime,” San Francisco Chronicle, December 9, 2008, pp. D1, D4; John Markoff, “Panel Presses to Bolster Security in Cyberspace,” The New York Times, December 9, 2008, p. B5; Peter Eisler, “Raids on Federal Computer Data Soar,” USA Today, February 17, 2009, p. 1A; and Byron Acohido, “Website- Infecting Attacks Spike to 450,000 a Day,” USA Today, March 17, 2009, p. 1B. 36. McAfee/NCSA Cyber Security Survey, Newsworthy Analysis, October 2007, http://download.mcafee.com/products/ manuals/en-us/McAfeeNCSA_Analy- sis09-25-07.pdf?cid ϭ 36665 (accessed September 21, 2009). 37. Symantec, Internet Security Threat Report, Volume XIV: Analysis of Threat Activity, January–December 2008, April 2009, www.symantec.com/busi- ness/theme.jsp?themeid ϭ threatreport (accessed August 14, 2009). 38. Munir Kotadia, “One Man Created Most PC Viruses,” San Francisco Chronicle, July 29, 2004, p. C3. 39. Symantec, Internet Security Threat Report, Volume XIV, April 2009, www.symantec.com/business/theme. jsp?themeid ϭ threatreport (accessed August 9, 2009). 40. Byron Acohido, “Cybercrooks Descend on Twitter with Spam, Attacks,” USA Today, July 6, 2009, p. 1B; “Sneaky New Attack—Hackers Create Fake YouTube Pages to Spread Virus,” San Francisco Chronicle, Octo- ber 13, 2008, p. D2; Emily Steel, “Web 21. Christopher Elliott, “Online Maps That Steer You Wrong,” The New York Times, June 28, 2005, p. C8; See also Donna Leinwand, “Caution: Watch Where You’re Going,” USA Today, March 12, 2009, p. 3A. 22. Brad Reed, “FCC Details E911 Accu- racy Requirements,” PC World, Sep- tember 13, 2007, www.pcworld.com/ article/137169/fcc_details_e911_accu- racy_requirements.html (accessed August 14, 2009). 23. Survey by Centers for Disease Control and Prevention, reported in “More Cellphone Users Drop Landlines Entirely,” The Wall Street Journal, May 7, 2009, p. D4. See also Ryan Kim, “Cell-Phone-Only Homes Top Those with Landlines for 1st Time,” San Francisco Chronicle, May 7, 2009, p. C2; and Mike Mokryzycki, “Oklahoma, Utah Lead in Going Cell Phone-Only,” Reno Gazette-Journal, March 12, 2009, p. 3B. 24. United Nations International Tele- communication Union, March 2009, reported in “Cellphones Overtake Land Lines,” USA Today, May 7, 2009, p. 1A. 25. Jason Hidalgo, “iPhone vs. Black- Berry,” Reno Gazette-Journal, July 23, 2008, pp. 7A, 9A. 26. Kevin Maney, “A Very Different Future Is Calling—on Billions of Cell- phones,” USA Today, July 27, 2005, p. 3B. 27. Data from Ericsson, reported in “Nearly 6.5 Billion Cellphones Will Be in Operation by 2013,” European Telecom, June 1, 2008, http://goliath. ecnext.com/coms2/gi_0199-8038098/ Nearly-6-5-billion-cellphones.html (accessed August 15, 2009). 28. Don Clark, “Curtain Rises on WiMax,” The Wall Street Journal, Sep- tember 28, 2008, p. B8; Leslie Cauley, “Mobile Broadband Hits the Air,” USA Today, October 2008, pp. 1B, 2B; and Peter Wayner, “With WiMax, Walking on the Wireless Side in Bal- timore,” The New York Times, July 30, 2009, p. B5. 29. Darren Murph, “Sprint Unveils WiMax Expansion Cities, Devices for 2009 and 2010,” Engadget, March 25, 2009, www.engadget.com/2009/03/25/ sprint-unveils-wimax-expansion-cities- devices-for-2009-and-2010/ (accessed August 9, 2009). 30. David Pogue, “Wi-Fi to Go, No Café Needed,” The New York Times, May 7, 2009, pp. B1, B9; Edward C. Baig, “MiFi Lets You Take Your Own Wi-Fi Hot Spot with You,” USA Today, May 14, 2009, p. 4B; and Katherine Boehret, “Web Surfing in a Wireless Network of Your Very Own,” The Wall Street Journal, June 10, 2009, p. D3. 31. Ryan Kim, “American Airlines Wi-Fi Takes Off,” San Francisco Chronicle, Stephanie Armour, “More Bosses Keep Tabs on Telecommuters,” USA Today, July 24, 2001, p. 1B; Kath- erine Reynolds Lewis, “Working from Home Not Always the Right Fit,” San Francisco Chronicle, July 14, 2003, p. E2; Sue Shellenbarger, “‘Shed Boy Is on Line One’: Some Tales from the Growing World of Home Offices,” The Wall Street Journal, June 17, 2004, p. D1; Joyce M. Rosenberg, “Letting Staff Telecommute Changes Office,” San Francisco Chronicle, September 7, 2008, p. H3; and Mintel Survey of 812 white-collar workers, reported in “Is Teleworking a Good Idea?” USA Today, October 28, 2008, p. 1B. 12. Carolyn Said, “Work Is Where You Hang Your Coat,” San Francisco Chronic le, July 18, 2005, p. E5. 13. Robert Smith, quoted in Said, “Work Is Where You Hang Your Coat,” p. E5. See also Sue Shellenbarger, “Work at Home? Your Employer May Be Watching,” The Wall Street Journal, July 30, 2008, pp. D1, D2. 14. Pew Internet, “Mobile Internet Use Increases Sharply in 2009 as More than Half of All Americans Have Got- ten Online by Some Wireless Means,” press release, July 22, 2009, www. pewinternet.org/Press-Releases/2009/ Mobile-internet-use.aspx# (accessed August 8, 2009). 15. David Pauleen and Brian Harmer, “Away from the Desk . . . Always,” The Wall Street Journal, December 15, 2009, p. R6. 16. 2008 ITIF Broadband Rankings, in Robert D. Atkinson, Daniel K. Cor- rea, and Julie A. Hedlund, Explaining International Broadband Leader- ship, May 1, 2008, the Information Technology and Innovation Founda- tion, www.itif.org/index.php?id ϭ 142 (accessed August 12, 2009). 17. Paul Bedell, Wireless Crash Course (New York: McGraw-Hill, 2005), p. 2. 18. Roger Yu, “GPS Becomes a Vital Tool for Frequent Travelers,” USA Today, July 8, 2008, p. 8B. 19. Berg Insight, reported in Bob Tede- schi, “Exactly Where Are You? New Devices Make the Answer Easier,” The New York Times, October 19, 2008, p. B10. 20. For other uses, see Marisol Bello, “Holiday Heads Up to Thieves: GPS Devices on Board the Baby Jesus,” USA Today, December 12, 2008, p. 1A; Natalie Angier, “GPS for Forest Creatures on the Move,” The New York Times, February 3, 2009, pp. D1, D2; David Pogue, “Peekaboo, Zoom- bak Sees You,” The New York Times, April 23, 2009, pp. B1, B8; and Mar- ian Bond, “Firm Uses GPS System to Monitor Car Fleets,” Reno Gazette- Journal, May 5, 2009, pp. 5A, 6A.
  564. Notes 545 63. Steve Cerocke, “New Interest in Vir- tual

    Communication Solutions Like Video Conferencing,” Reno Gazette- Journal, July 7, 2008, p. 7A; and Steve Lohr, “Face Time That Relies on Screens,” The New York Times, July 22, 2008, pp. C1, C8. See also Dana Mattioli, “Next on the Agenda: Kisses from the Honey Bunny,” The Wall Street Journal, June 10, 2008, pp. D1, D4. 64. Mark Dillard, quoted in Marcia Vick- ers, “Don’t Touch That Dial: Why Should I Hire You?” The New York Times, April 13, 1997, sec. 3, p. 11. 65. Justin Scheck and Bobby White, “ ‘Telepresence’ Is Taking Hold,” The Wall Street Journal, May 6, 2008, p. B6. See also Lohr, “Face Time That Relies on Screens.” Chapter 7 1. Gary McWilliams, “It All Connects— and Converges,” The Wall Street Jour- nal, January 31, 2005, p. R3. 2. Jerry Yang and David Filo, cited in Cliff Edwards, “The Web’s Future Is You,” BusinessWeek, April 25, 2005, p. 18. 3. Joyce Cohen, “Armed with Right Cell- phone, Anyone Can Be a Journalist,” The New York Times, July 18, 2005, p. C3; and Mark Memmott, “Disaster Photos: Newsworthy or Irrespon- sible?” USA Today, August 5, 2005, p. 4A. 4. Kevin Maney, “Multiple Mash-ups Ensue as Google Maps Mate with Net Info,” USA Today, August 16, 2005, www.usatoday.com/tech/columnist/ kevinmaney/2005-08-16-maney-google- mashups_x.htm# (accessed August 29, 2009). 5. Robert D. Hof, “Mix, Match, and Mutate,” BusinessWeek, July 25, 2005, pp. 72, 75. 6. Ming Ma, quoted in Marc Saltzman, “Convergence Is King with Today’s Devices,” USA Today, May 17, 2004, p. 4E. 7. John Horrigan, “”Mobile Access to Data and Information,” Pew Internet & American Life Project, March 2008, www.pewinternet.org/Reports/2008/ Mobile-Access-to-Data-and-Informa- tion.aspx (accessed August 30, 2009). 8. John B. Horrigan, “Seeding the Cloud: What Mobile Access Means for Usage Patterns and Online Content,” March 5, 2008, Pew Research Center Publications, http://pewresearch.org/ pubs/754/cloud-computing (accessed August 20, 2009). 9. John Biggs, “The Universal Remote Dormant in Your Smartphone,” The New York Times, March 19, 2009, p. B5. 10. Michael Gartenberg, quoted in Saltz- man, “Convergence Is King with Today’s Devices.” March 29, 2009, pp. 1B, 4B; and John Markoff and Thom Shanker, “U.S. Weighs Risks on Civilian Harm in Cyberwarfare,” The New York Times, August 2, 2009, pp. A1, A8. 50. “Teen Is Sentenced to 18 Months in Jail for Computer Worm,” The Wall Street Journal, January 31, 2005, p. B3. 51. Ashlee Vance, “For Symantec and McAfee, ‘Arms Race’ for Security,” The New York Times, July 6, 2009, pp. B1, B6. 52. Duncan J. Watts, “Unraveling the Mysteries of the Connected Age,” The Chronicle of Higher Education, Febru- ary 14, 2003, pp. B7–B9. 53. Mary Dalrymple, “Employees Prove Vulnerable to Hackers Posing as IT Employees,” Information Week, March 17, 2005, www.informa- tionweek.com/story/showArticle. jhtml?articleID ϭ 159901703 (accessed August 15, 2009). 54. Anick Jesdanun, “Simple Passwords Don’t Suffice Online,” San Francisco Chronicle, June 1, 2004, pp. C1, C5. 55. Victor Zapana, “Experts Offer Tips to Creating More Secure PINs, Pass- words,” San Francisco Chronicle, July 20, 2009, p. D2, reprinted from Pitts- burgh Post-Gazette. 56. David Einstein, “The Future Is Now for Data Safety,” San Francisco Chronicle, May 26, 2008, p. D1. 57. Randall Stross, “Goodbye, Passwords. You Aren’t a Good Defense,” The New York Times, August 10, 2008, business section, p. 4. See also Elaine Mills, “One Key Fits All,” The Wall Street Journal, September 29, 2009, p. R11. 58. Brian Bergstein, “Guarding Comput- ers: Encrypt All Files, Wipe the Drive Clean,” San Francisco Chronicle, June 1, 2008, p. C5. 59. Jordan Robertson, “Citibank ATM Breach Reveals Password Security Problems,” Reno Gazette-Journal, July 2, 2008, p. 6A. 60. Laurie J. Flynn, “Technology Lead- ers Favor Online ID Card over Pass- words,” The New York Times, June 24, 2008, p. C8; and Stross, “Good- bye, Passwords; You Aren’t a Good Defense.” 61. Anita Hamilton, “Can You See Me Now?” Time, March 15, 2004, p. 96. 62. David Pogue, “Video Chats Overcome Clunkiness,” The New York Times, February 5, 2009, pp. B1, B8; Ashlee Vance, “Cisco Says Travel Is Over- rated,” The New York Times, February 9, 2009, p. B4; Joe Sharkey, “Embrac- ing a Life without the Roller Bag,” The New York Times, February 24, 2009, p. B6; Jennifer Alsever, “All You Can Meet,” FSB, March 2009, pp. 39–40; and Walter S. Mossberg, “Easy Way to Log In Face Time,” The Wall Street Journal, June 17, 2009, p. D3. Ad Sales Open Door to Viruses,” The Wall Street Journal, June 15, 2009, p. B7; and Deborah Gage, “Digital Frames Carry Risk of Infection,” San Francisco Chronicle, January 2, 2009, pp. C1, C2. 41. Verne Kopytoff, “Koobface Virus Hits Users of Facebook,” San Francisco Chronicle, December 4, 2008, pp. C1, C2; and Byron Acohido, “Koobface Not Just on Facebook,” USA Today, March 4, 2009, p. 8B. 42. Byron Acohido, “Virus Targets Firms’ Financial Accounts,” USA Today, July 31, 2009, p. 1B. 43. Siobhan Gorman, “Virus Was Set to Destroy Fannie Mae Data,” The Wall Street Journal, February 1, 2009, p. A2. 44. Steve Boggan, “Meet the Hackers,” The Week, September 26, 2008, pp. 44–45, originally published by The London Times; Lolita C. Baldor, “Officials Seek Hackers for Network Defense,” Reno Gazette-Journal, April 19, 2009, p. 7B; and Christopher Drew and John Markoff, “Contractors Vie for Plum Work, Hacking for U.S.,” The New York Times, May 31, 2009, main news section, pp. 1, 4. 45. Byron Acohido, “Meet A-Z: He’s Behind a Cybercrime Wave,” USA Today, August 5, 2008, pp. 1B, 2B; and Roger Cheng, “Hackers on the Move,” The Wall Street Journal, August 11, 2008, p. R3. 46. Byron Acohido, “Cell Security Seen as Profit Frontier,” USA Today, June 24, 2008, p. 1B; Claire Cain Miller and Brad Stone, “Twitter Hack Raises Flag on Security,” The New York Times, July 16, 2009, pp. B1, B9; and Jordan Robertson, “Phones Vulner- able to Text Hacks,” Reno Gazette- Journal, July 31, 2009, p. 6C. 47. Federal Bureau of Investiga- tion, quoted in TechTarget Secu- rity Media, “Glossary,” http:// searchsecurity.techtarget.com/ gDefinition/0,294236,sid14_ gci771061,00.html (accessed April 14, 2009s). 48. Peter Eisler, “Raids on Federal Com- puter Data Soar,” USA Today, Febru- ary 17, 2009, p. 1A. 49. “The Rise of the Cyberspy,” The Week, June 5, 2009, p. 13; Choe Sang-Hun and John Markoff, “Cyberattacks Jam Government and Commercial Web Sites in U.S. and South Korea,” The New York Times, July 9, 2009, p. A4; Siobhan Gorman and Evan Ram- stad, “Cyber Blitz Hits U.S., Korea,” The Wall Street Journal, July 9, 2009, pp. A1, A4; and John Markoff, “Web’s Anonymity Makes Cyberattack Hard to Trace,” The New York Times, July 17, 2009, p. A5. See also Charmaine Noronha, “Group: Hackers’ Scope Is Global,” Reno Gazette-Journal,
  565. 546 Notes podcasts-taking-off-again-emarketer / (accessed August 20, 2009). 36. Todd

    Wallack, “Torrent of Images Is Leaving Film in the Dust,” San Francisco Chronicle, May 23, 2005, pp. A1, A5. 37. David Ritz, quoted in Jefferson Gra- ham, “Digital Cameras Get Smaller but Do More Tricks,” USA Today, Feb- ruary 22, 2005, p. 6B. 38. Jefferson Graham, “Digital Cameras Are Always Improving, So Here’s What to Consider,” USA Today, December 3, 2008, p. 6B. 39. Consumer Reports Electronics Buy- ing Guide, Spring 2009 (Yonkers, NY: Consumers Union of the United States, 2009), pp. 104–111. 40. Jefferson Graham, “New Tech Gives Point-and-Shoot Cameras Fancy New Tricks,” USA Today, August 20, 2009, p. 3B. 41. David Pogue, “The Quest to Shrink the SLR,” The New York Times, April 16, 2009, pp. B1, B8. 42. “Best Digital Cameras,” Consumer Reports, July 2008, pp. 20–31. 43. David Pogue, “Big Sensor, a Small Step for Cameras,” The New York Times, July 24, 2008, pp. C1, C8. 44. David Einstein, “For Digital Cameras, More Megapixels May Not Mean Sharper Shots,” San Francisco Chron- icle, August 4, 2008, p. D3. See also Russ Juskalian, “Pixels Are Like Cup- cakes; Let Me Explain,” The New York Times, November 13, 2008, p. B6; and David Einstein, “Cameras—Sensor Size Does Matter,” San Francisco Chronicle, June 8, 2009, pp. C1, C2. 45. Jefferson Graham, “Tips for Buyers,” USA Today, May 17, 2004, p. 9E. 46. Jefferson Graham, “Get Lots of Bat- teries before You Go,” USA Today, July 12, 2004, p. 2B. 47. Walter C. Mossberg, “Missed Moments: Pitfalls of Buying a Digital Camera,” The Wall Street Journal, March 3, 2004, pp. D1, D12. 48. International Data Corporation, cited in Maria Puente, “Memories Gone in a Snap,” USA Today, January 21, 2005, pp. 1D, 2D. 49. John Grady, quoted in Wallack, “Tor- rent of Images Is Leaving Film in the Dust,” p. A5. 50. Certified Digital Photo Processors, cited in Puente, “Memories Gone in a Snap,” p. 2D. 51. Puente, “Memories Gone in a Snap,” p. 1D. 52. Susan Stellin, “Fitting the World’s Biggest Travel Guide in a Pocket,” The New York Times, March 8, 2005, p. C8. 53. “Handheld Devices Sink 53.2% dur- ing Fourth Quarter But Protracted Decline Appears to Be Slowing, Says IDC,” IDC, February 12, 2008, http:// idc.com/getdoc.jsp;jsessionid ϭ IGV Wall Street Journal, June 17, 2008, pp. D1, D3; John Dunbar, “Merger of Sirius and XM Satellite Radio Imminent,” Reno Gazette-Journal, July 25, 2008, p. 15A; John Dunbar, “FCC Narrowly Approves XM-Sirius Merger after Long Dispute,” Reno Gazette-Journal, July 26, 2008, p. 10A; Andrew Ross Sorkin, “Sirius Chief Undaunted by Challenge,” The New York Times, August 6, 2008, pp. C1, C4; Jon Birger, “Mel Karmazin Fights to Rescue Sirius,” Fortune, March 30, 2009, pp. 85–88; and Sarah McBride, “Getting Sirius: Satellite Radio Broadens Reach,” The Wall Street Journal, May 6, 2009, pp. D1, D3. 26. Deborah Yao, “Sirius XM Radio Gets Ready to Stream to iPhone, iPod Touch,” San Francisco Chronicle, March 13, 2009, p. C3. 27. Anthony Armstrong, “Satellite Radio vs. High-Definition Radio for the Layperson: The Battle for America’s Ears Has Begun,” http://stereos.about. com/od/homestereotechnologies/a/ radio.htm (accessed August 17, 2009). 28. Sarah McBride, “Weak Signals: Can HD Radio Find Listeners?” The Wall Street Journal, November 4, 2008, p. D1; and Edward C. Baig, “Two New Riffs on Radio Hit Flat Notes,” USA Today, July 16, 2009, p. 3B. 29. Mike Snider, “HD Radio Sends Strong Signal, but Audience Weak,” USA Today, July 8, 2008, p. 1D; Mike Snider, “HD Tunes In to Every- thing,” USA Today, July 8, 2008, p. 3D; Chris Woodyard, “More Cars Sing with Digital Radio,” USA Today, July 8, 2008, p. 1B; McBride, “Weak Signals”; Stephanie Clifford, “Radio’s Revenue Falls Even as Audi- ence Grows,” The New York Times, November 26, 2008, p. B2; and David Pogue, “HD Radio Crying Out to Be Heard,” The New York Times, April 9, 2009, pp. B1, B8. 30. McBride, “Getting Sirius.” 31. Helen Leggatt, “Internet Radio: 33 Million U.S. Listeners Each Week,” BizReport, March 19, 2008, www. bizreport.com/2008/03/internet_ radio_33m_us_listeners_each_week. html (accessed August 30, 2009). 32. Sarah McBride, “As Online-Radio Grows, Rival Ad Sellers Merge,” The Wall Street Journal, October 16, 2008, p. B6. 33. Daren Fonda, “The Revolution in Radio,” Time, April 19, 2004, pp. 55–56. 34. Bob Tedeschi, “Singing in the Car Along with Your Personal Radio Sta- tion,” The New York Times, June 18, 2009, p. B8. 35. eMarketer, reported in Duncan Riley, “Podcasts Taking Off (Again): eMar- keter,” TechCrunch, February 4, 2008, www.techcrunch.com/2008/02/04/ 11. Stephanie Armour, “Some Firms Trade Email for Face Time,” USA Today, December 7, 2004, p. 1B. 12. Barry Schwartz, The Paradox of Choice: Why More Is Less (New York: HarperCollins, 2005). See also Barry Schwartz, “Choice Overload Burdens Daily Modern Life,” USA Today, Janu- ary 5, 2004, p. 13A. 13. Edward M. Hallowell, quoted in Alina Tugend, “Multitasking Can Make You Lose . . . Um . . . Focus,” The New York Times, October 25, 2008, p. B7. Hallowell is the author of CrazyBusy: Overstretched, Overbooked, and About to Snap! (New York: Ballantine, 2006). 14. Robin Marantz Henig, “Driving? Maybe You Shouldn’t Be Reading This,” The New York Times, July 13, 2004, p. D5; Jeremy Peters, “Hi, I’m Your Car. Don’t Let Me Distract You,” The New York Times, November 26, 2004, pp. C1, C3; and “More States Say Phones and Driving Don’t Mix,” USA Today, June 25, 2008, p. 3B. 15. Dennis K. Berman, “Technology Has Us So Plugged into Data, We Have Turned Off,” The Wall Street Journal, November 10, 2003, p. B1; and Olivia Barker, “Got That Virtual Glow?” USA Today, August 3, 2009, pp. 1D. 1D. 16. Winifred Gallagher, quoted in book review, David G. Myers, “Please Pay Attention,” The Wall Street Journal, April 20, 2009, p. A13. Gallagher is author of Rapt (New York: Penguin Press, 2009). 17. John Tierney, “Ear Plugs to Lasers: The Science of Concentration,” The New York Times, May 5, 2009, p. D2. 18. Michael Bull, quoted in Benny Evan- gelista, “The iPod Generation,” San Francisco Chronicle, December 27, 2004, pp. E1, E6. 19. John B. Horrigan, “A Typology of Information and Communication Technology Users,” May 7, 2007, Pew Internet & American Life Project, http://ecoustics-cnet.com.com/Wired ϩ but ϩ not ϩ Web ϩ 2.0 ϩ Thats ϩ normal, ϩ study ϩ says/2100-1041_3-6181884. html (accessed August 20, 2009). 20. Bob Levins, quoted in Evangelista, “The iPod Generation.” 21. Shirley Wang, “Experts: Loud iPods Can Damage Ears,” Reno Gazette- Journal, August 9, 2005, pp. 1E, 5E. 22. Brock Read, “Seriously, iPods Are Educational,” The Chronicle of Higher Education, March 18, 2005, pp. A30–A32. 23. Adapted from ibid.; and Associated Press, “Software Makes Podcasts Mobile,” Reno Gazette-Journal, August 25, 2005, p. 3D. 24. Adam Aston, “Satellite Radio,” Busi- nessWeek, May 16, 2005, p. 116. 25. Sarah McBride and Amy Schatz, “The Dish on Satellite Radio’s Future,” The
  566. Notes 547 85. Steve Lohr, “How Much Is Too Much?”

    The New York Times, May 4, 2005, pp. E1, E9. 86. Dan Hart, “Cell Phones and Smart- phones: What’s the Difference?” Smartphone & Pocket PC, August/ September 2008, p. 18. 87. Ibid., p. 19. 88. Statistics from IDC, “Smartphone Growth Encouraging, Yet the Worldwide Mobile Phone Market Still Expected to Shrink in 2009, Notes IDC,” press release, July 30, 2009, www.idc.com/getdoc. jsp?containerId ϭ prUS21950309 (accessed August 28, 2009). 89. The NPD Group, “RIM Unseats Apple in the NPD Group’s Latest Smart- phone Ranking,” press release, May 4, 2009, www.npd.com/press/releases/ press_090504.html (accessed August 28, 2009). 90. Steve Lohr, “Smartphone Rises Fast from Gadget to Necessity,” The New York Times, June 10, 2009, pp. B1, B7; and Christopher Lawton and Sara Silver, “Smart Phones Are Edging Out Other Gadgets,” The Wall Street Jour- nal, March 24, 2009, p. D1. 91. Bob Tedeschi, “A Hands-Free Headset Cool Enough for a Teenager,” The New York Times, April 23, 2009, p. B7; Matt Richtel, “Dismissing the Risks of a Deadly Habit,” The New York Times, July 19, 2009, news section, pp. 1, 18; John Diaz, “Cell Phones in Cars—the Danger and the Denial,” San Francisco Chronicle, Insight sec- tion, July 26, 2009, p. E3; “Ban Cell- phoning While Driving? Not So Fast” and David Teater, “How Many More Must Die?” editorials, USA Today, July 29, 2009, p. 8A; and “Driving Must Be Your Only Job When You’re Behind the Wheel,” editorial, Reno Gazette- Journal, July 30, 2009, p. 7A. 92. Survey of cellphone users commis- sioned by AccessSystems Ameri- cas and conducted by Amplitude Research, reported in “Text Messag- ing Remains Important Feature for Cell Phone Buyers,” Cellular-News, July 2, 2008, www.cellular-news.com/ story/32172.php (accessed August 28, 2009). 93. “Who’s Calling? Check the Ring,” Reno Gazette-Journal, October 18, 2004, pp. 1B, 3B. 94. Walter S. Mossberg, “Sorting Out the Three-Ring Circus of Ringtones,” The Wall Street Journal, January 5, 2005, p. D8. 95. Katherine Boehret, “A BlackBerry That’s Easy on Your Thumbs,” The Wall Street Journal, January 28, 2009, pp. D1, D6. 96. James Sullivan, “Time Waits for Everyone, Now that We’ve All Got Camera Phones,” San Francisco Chronicle, May 20, 2004, p. E2. 67. Electronics Buying Guide, Spring 2009, pp. 26–37; and Eric A. Taub, “So Many Flat-Panel TVs. Which Is Right for You?” The New York Times, June 18, 2009, p. B8. 68. Taub, “So Many Flat-Panel TVs.” 69. Levy, “Television Reloaded,” p. 50. 70. Motoko Rich, “Chain Plans an Exten- sive E-Bookstore,” The New York Times, July 21, 2009, pp. B1, B5. 71. Jeffrey A. Trachtenberg and Geof- frey A. Fowler, “Simon & Schuster in E-Books Deal,” The Wall Street Jour- nal, June 12, 2009, p. B6. 72. Jeffrey A. Trachtenberg and Geoffrey A. Fowler, “Barnes & Nobel Chal- lenges Amazon’s Kindle,” The Wall Street Journal, July 21, 2009, p. B1. 73. David Pogue, “The Kindle: Good Before, Now Better,” The New York Times, February 24, 2009, pp. B1, B2; and Stephen H. Wildstrom, “Kindle 2: The Delight Is in the Details,” BusinessWeek, March 9, 2009, pp. 73–74. 74. Walter S. Mossberg, “Amazon’s Kindle 2 Improves the Good, Leaves Out the Bad,” The Wall Street Journal, February 26, 2009, p. D1. 75. Pogue, “The Kindle: Good Before, Now Better”; and Edward C. Baig, “Kindle DX Is a Nifty—If Costly— Way to Carry Your Library,” USA Today, June 11, 2009, p. 3B. 76. Geoffrey A. Fowler and Jeffrey A. Trachtenberg, “New Kindle Audio Feature Causes a Stir,” The Wall Street Journal, February 10, 2009, p. B9. 77. Baig, “Kindle DX Is a Nifty—If Cost- ly—Way to Carry Your Library.” 78. Jeffrey A. Trachtenberg and Geof- frey A. Fowler, “As Industry Debates E-Book Prices, Small Publisher With- holds a Title,” The Wall Street Journal, July 13, 2009, pp. B1, B2. 79. Motoko Rich, “Steal This Book (for $9.99),” The New York Times, May 17, 2009, news section, p. 9. 80. Geoffrey A. Fowler, “Buyer’s E-Morse: ‘Owning’ Digital Books,” The Wall Street Journal, July 22, 2009, p. A11. 81. Nicholson Baker, “A New Page,” The New Yorker, August 3, 2009, pp. 24–30. 82. Study by Student Public Interest Research Group, reported in Ryan Knutson and Geoffrey A. Fowler, “Book Smarts? E-Texts Receive Mixed Reviews from Students,” The Wall Street Journal, July 16, 2009, pp. D1, D2. 83. “Technological Evolution Stirs a Publishing Revolution,” Knowledge@ Wharton, August 5, 2009, http:// knowledge.wharton.upenn.edu/article. cfm?articleid ϭ 2307 (accessed August 28, 2009). 84. Olga Kharif, “Shakespeare’s on the (Cell) Phone,” BusinessWeek, January 19, 2009, p. 53. VZD5PNL5OQCQJAFICFFAKBEAU MIWD?containerId ϭ prUS21083408 (accessed August 18, 2009s). 54. Louise Rafkin, “We Are Here,” San Francisco Chronicle Magazine, May 23, 2004, pp. 10–13. 55. Troy Dreier, “Best GPS for Your Budget,” Mobile Gadget Guide, 2009, pp. 80–83. 56. Christopher Lawton and Sara Silver, “Smart Phones Are Edging Out Other Gadgets,” The Wall Street Journal, March 24, 2009, pp. D1, D3. 57. Statistics from IDC, cited in Edward C. Baig, “Start-up Axiotron Converts MacBook into Tablet PC,” USA Today, May 1, 2008, p. 1B. 58. Steven Levy, “Television Reloaded,” Newsweek, May 30, 2005, pp. 49–55. 59. Stuart Elliott, “Remote Clicks That Do More Than Just Change Chan- nels,” The New York Times, June 16, 2008, p. C8. 60. Knowledge Networks, reported in Emily Brandon, “Watch TV Free Online,” U.S. News & World Report, special year-end issue, 2008, p. 61. See also Laura M. Holson, “Who Needs a TV? I’m Watching on a Lap- top,” The New York Times, December 4, 2008, p. B9; and Brian Stelter, “CBS News to Let a Web Site Pick Up Its Live Coverage,” The New York Times, June 2, 2009, p. B4. 61. Josh Quittner, “The Idiot Box Gets Smart,” Time, June 2, 2008, p. 51. 62. Reed Tucker, “Are You Ready for Internet TVs?” USA Weekend, August 21–23, 2009, p. 10. See also Nick Wingfield and Don Clark, “Internet- Ready TVs Usher Web into Living Room,” The New York Times, January 5, 2009, p. B3; Saul Hansell, “To Connect to the Internet, Just Turn on Your TV,” The New York Times, January 12, 2009, p. B6; Matt Richtel, “What Convergence? TV’s Hesitant March to the Net,” The New York Times, February 16, 2009, pp. B1, B8; and Katherine Boehret, “Yahoo Wid- gets Lend Brains to Boob Tube,” The Wall Street Journal, March 25, 2009, p. D1. 63. Edward C. Baig, “SlingCatcher Shows Lots of PC-to-TV Potential,” USA Today, December 4, 2008, p. 5B. 64. Stephen H. Wildstrom, “Internet TV Just Got a Lot Closer,” BusinessWeek, March 16, 2009, pp. 65–66. See also Ryan Kim, “ZillionTV’s New Device Aims to Please Viewers, Business,” San Francisco Chronicle, March 4, 2009, pp. C1, C2. 65. Brad Stone, “Adobe in Push to Spread Web Video to TV Sets,” The New York Times, April 20, 2009, p. B4. 66. Kevin J. O’Brien, “Mobile TV Spreading in Europe and to the U.S.,” The New York Times, May 5, 2008, p. C2.
  567. 548 Notes 127. Ricard and Oblinger, “The Next- Generation Student,”

    p. 4. Chapter 8 1. Jon Brodkin Framingham, “Data Creation Outstrips Storage for First Time: IDC—It’s Not All Doom and Gloom, However,” http://computer- world.co.nz/news.nsf/mgmt/1ABF8 843DB07A127CC2574120001BCC8 (accessed August 22, 2008). 2. Ibid. 3. Ron Lieber, “When Visa Thinks You’re a Thief,” The Wall Street Journal, April 24, 2003, pp. D1, D2; “American Express Kept a (Very) Watchful Eye on Charges,” The New York Times, January 31, 2009, pp. B1, B5. 4. Mark Lewis, “Information 2.0,” Writ- ers Summit 2008, EMC Corporation, April 4, 2008, http://emc.typepad.com/ mark/presentations/WritersSummit 2008.pdf (accessed September 12, 2009). 5. “Wikipedia Size Comparisons,” http:// en.wikipedia.org/wiki/Wikipedia:Size_ comparisons (accessed August 22, 2008); and Ron Lieber “When Visa Thinks You’rea Thief.” 6. Charles Forelle, “Project Hopes to Trace Your Ancestors Back 10,000 Years,” The Wall Street Journal, April 13, 2005, pp. B1, B11; and Benjamin Pimentel, “DNA Study of Human Migration,” San Francisco Chronicle, April 13, 2005, pp. A1, A6; D. M. Behar, S. Rosset, J. Blue-Smith, O. Balanovsky, S. Tzur, D. Comas, J. R. Mitchell, L. Quintana-Murci, C. Tyler- Smith, R. S. Wells, The Genographic Consortium, “The Genographic Proj- ect Public Participation Mitochon- drial DNA Database,” PLoS Genetics, June 29, 2007, www.plosgenetics. org/article/info:doi/10.1371/journal. pgen.0030104 (accessed September 12, 2009). 7. Mark Y. Herring, “Don’t Get Goggle- Eyed over Google’s Plan to Digitize,” The Chronicle of Higher Education, March 11, 2005, p. B20; Verne Kopy- toff, “Google, 5 Big Libraries Team to Offer Books,” San Francisco Chron- icle, December 14, 2004, pp. D1, D4; Nate Anderson, “Google to Scan 800,000 Manuscripts, Books from Indian University,” http://arstechnica. com/authors.ars/Nate+Anderson (accessed August 22, 2009) ; and Noam Cohen, “Millions of Books, but No Card Catalog,” The New York Times, February 2, 2009, p. B6; Eliza- beth Williamson, Jeffrey A. Trachten- berg, and Jessica E. Vascellaro, “U.S. Steps Up Probe of Google in Books,” The Wall Street Journal, June 10, 2009, pp. A1, A12; James Temple, “Google’s Book-Scanning Project Far from Set- tled,” San Francisco Chronicle, August 19, 2009, pp. C1, C4; James Temple, “Google’s Book Plan Debated,” San 112. Jyoti Thottam, “How Kids Set the (Ring) Tone,” Time, April 4, 2005, pp. 40–45. 113. Nielsen Co. research, reported in Donna St. George, “6,473 Texts a Month, but at What Cost?” The Washington Post, February 22, 2009, p. A1. 114. Heather Knight, “Cell Phones a High Priority, Even among Poor Teens,” San Francisco Chronicle, February 27, 2005, pp. A17, A21. 115. Diana Oblinger, “Boomers, Gen- Xers, and Millennials: Understand- ing the New Students,” EDUCAUSE Review, July/August 2003, pp. 37–47. 116. Marc Prensky, “Digital Natives, Digital Immigrants,” from On the Horizon, October 2001, © 2001 Marc Prensky, www.marcprensky. com/writing/Prensky%20-%20Digi- tal%20Natives,%20Digital%20Immi- grants%20-% 20Part1.pdf (accessed May 15, 2009). 117. Oblinger, “Boomers, Gen-Xers, and Millennials,” p. 38. See also Harry Hurt III, “A Generation with More than Hand-Eye Coordination,” The New York Times, December 21, 2008, Business section, p. 5. 118. Wendy Ricard and Diana Oblinger, “The Next-Generation Student,” Higher Education Leaders Sympo- sium, Redmond, WA, June 17–18, 2003, p. 2, http://download.micro soft.com/download/d/c/7/dc70bbbc- c5a3-48f3-855b-f01d5de42fb1/ TheNextGenerationStudent.pdf (accessed May 15, 2009s). 119. Paul Davidson, “Gadgets Rule on College Campuses,” USA Today, March 29, 2005, pp. 1B, 2B. 120. Ibid. 121. Andrew Payne, quoted in Ricard and Oblinger, “The Next-Generation Student,” p. 5. 122. Prensky, “Digital Natives, Digital Immigrants,” p. 2. 123. Marc Prensky, “What Kids Learn That’s POSITIVE from Playing Vid- eogames,” © 2002 Marc Presnsky, www.marcprensky.com/writing/ Prensky%20-%20What%20Kids%20 Learn%20Thats%20POSITIVE%20 From%20Playing%20Video%20 Games.pdf (accessed June 12, 2009). 124. Oblinger, “Boomers, Gen-Xers, and Millennials,” p. 40, citing Jason Frand, “The Information Age Mindset: Changes in Students and Implications for Higher Education,” EDUCAUSE Review, September/ October 2000, pp. 15–24. 125. Kevin J. Delaney, “Teaching Tools,” The Wall Street Journal, January 17, 2005, pp. R4, R5. 126. Diana G. Oblinger, “The Next Gener- ation of Educational Engagement,” Journal of Interactive Media in Edu- cation, May 21, 2004, pp. 1–18. 97. “Picture It: A Diagnosis via Cell- phone,” USA Today, February 22, 2005, p. 6D. 98. Anne Eisenberg, “Cellphone Games Take a Big Leap Forward into 3-D,” The New York Times, June 17, 2004, p. E8. 99. Roger O. Crockett, “Multimedia Phones,” BusinessWeek, May 16, 2005, pp. 100–104. 100. David Lieberman, “Coming Soon to Cellphones: Free, Over-the-Air TV,” USA Today, January 8, 2009, p. 1B. 101. “Cell Phones: The Next Movie Screens?” Reno Gazette-Journal, September 28, 2004, p. 3F; reprinted from Chicago Tribune. 102. Sara Silver, “You Dropped Your Cell Phone Where? Turn It Off, Dry It Off, Keep Your Cool,” San Francisco Chronicle, October 265, 2008, p. C5; reprinted from The Wall Street Journal. 103. 2004 Sprint Wireless Courtesy Report, cited in Steven Winn, “The Cell Phone Warning Has a Familiar Ring. Who’s Listening?” San Fran- cisco Chronicle, December 16, 2004, pp. E1, E4. 104. “Phone Use Slows Driver Reaction,” The Wall Street Journal, February 3, 2005, p. D5. 105. Carol S. Lede, “The New Social Etiquette: Friends Don’t Let Friends Dial Drunk,” The New York Times, January 30, 2005, sec. 4, p. 16. 106. “Camera-Equipped Cell Phones Spreading New Types of Mischief,” Reno Gazette-Journal, July 10, 2003, pp. 1A, 4A; Dennis K. Berman, David Pringle, and Phred Dvorak, “You’re on Candid Cellphone!” The Wall Street Journal, September 30, 2003, pp. B1, B6; Carolyn Said, “Are Camera Phones Too Reveal- ing?” San Francisco Chronicle, May 16, 2004, pp. A1, A10; and Ryan Kim, “School District Bans Taking Photos with Cell Phones,” San Fran- cisco Chronicle, August 23, 2004, pp. B1, B5. 107. Bob Keefe, “Pornography Industry Sees Cell Phones as New Frontier,” San Francisco Chronicle, January 3, 2005, p. F3. 108. Steven Levy, “A Future with Nowhere to Hide?” Newsweek, June 7, 2004, p. 76. 109. Michael Totty, “Who’s Going to Win the Living-Room Wars?” The Wall Street Journal, April 25, 2005, pp. R1, R4. 110. Lev Grossman, “Out of the Xbox,” Time, May 23, 2005, p. 51. 111. Tony Perkins, quoted in Bill O’Driscoll, “Expert: Business Needs to Tap the ‘Always On’,” Reno Gazette-Journal, February 12, 2003, pp. 1D, 6D.
  568. Notes 549 38. Markoff, “Ay Robot! Scientists Worry Machines May

    Outsmart Man.” 39. Peter Eisler, “Commercial Satellites Alter Global Security,” USA Today, November 7, 2008, pp. 13A, 14A; Peter Funt, “Google Is Watching,” Boston Globe, February 9, 2009, www. boston.com/bostonglobe/editorial_ opinion/oped/articles/2009/02/09/ google_is_watching (accessed Sep- tember 17, 2009); Leslie Cauley, “Feel Like Someone’s Watching You?” USA Today, February 9, 2009, pp. 1B, 2B; Randall Stross, “When Everyone’s a Friend, Is Anything Private?” The New York Times, March 8, 2009, Business section, p. 3; and Adam Cohen, “A Casualty of the Technology Revolution: ‘Locational Privacy’,” The New York Times, September 1, 2009, p. A24. 40. Survey of more than 1,000 Americans conducted by TRUSTe, reported in Stephanie Clifford, “Many See Pri- vacy on Web as Big Issue, Survey Says,” The New York Times, March 16, 2009, p. B5. 41. Jeff Martin, “Privacy Concerns Arise over Student Data,” USA Today, August 24, 2009, p. 3A. 42. Deborah Yao, “Web-Monitoring Soft- ware Gathers Data from Kids’ Private Chats—Then Sells It,” San Francisco Chronicle, September 8, 2009, p. D2. 43. Jessica E. Vascellaro and Emily Steel, “Something New Gains with Something Borrowed,” The Wall Street Journal, June 5, 2009, p. B6; and Miguel Helft, “Google to Offer Ads Based on Interests, with Privacy Rights,” The New York Times, March 11, 2009, p. B3. 44. Saul Hansell, “Agency Skeptical of Internet Privacy Policies,” The New York Times, February 13, 2009, p. B5. 45. Jennifer 8. Lee, “Trying to Elude the Google Grasp,” The New York Times, July 25, 2001, pp. E1, E6. 46. Study by Javelin Strategy & Research, reported in “ID Theft Up, but Victims Find It Faster,” San Francisco Chroni- cle, February 9, 2009, p. A6. 47. Federal Trade Commission, February 2009, reported in “Identity Theft Is Sneaking Up,” USA Today, March 23, 2009, p. 1A. 48. David Lazarus, “I Found an ID Theft on My Credit Report,” San Fran- cisco Chronicle, October 27, 2002, pp. G1, G4. 49. Kathryn Rambo, quoted in Ramon G. McLeod, “New Thieves Prey on Your Very Name,” San Francisco Chronicle, April 7, 1997, pp. A1, A6. 50. Rambo, quoted in T. Trent Gegax, “Stick ’Em Up? Not Anymore; Now It’s Crime by Keyboard,” Newswee k, July 21, 1997, p. 14. 51. “Working to Resolve Identity Theft,” Identity Theft Resource Center, www. 23. Jeff Bezos, quoted in K. Southwick, interview, October 1996, www.upside. com. 24. D. Levy, “On-line Gamble Pays Off with Rocketing Success,” USA Today, December 24, 1998, pp. 1B, 2B. 25. “Amazon Posts 35% Sales Growth in North America and Raises 2008 Fore- cast,” www.internetretailer.com/daily- News.asp?id=2720 (accessed August 23, 2009). 26. Robert Benfer Jr., Louanna Furbee, and Edward Brent Jr., quoted in Steve Weinberg, “Steve’s Brain,” Colum- bia Journal Review, February 1991, pp. 50–52. 27. Natalie Angier, “In an Age of Robots, One to Clean the House? Still but a Dream,” The New York Times, Novem- ber 25, 2008, p. D4; and Melissa Tru- jillo, “I, Robot—MIT Droids Tend to Plants,” Reno Gazette-Journal, April 11, 2009, p. 8A. 28. Hiroko Tabuchi, “Robots Unplugged,” The New York Times, July 13, 2009, pp. B1, B6. 29. Brian Bergstein, “Teaching Com- puter a Thing or Million,” San Francisco Chronicle, June 10, 2002, pp. E1, E3. 30. Judith Gunther, “An Encounter with AI,” Popular Science, June 1994, p. 90. 31. Anne Eisenberg, “New Puzzles That Tell Humans from Machines,” The New York Times, May 24, 2009, busi- ness section, p. 4. 32. “Making Robots More Like Us,” Knowledge@Wharton, April 1, 2009, http://knowledge.wharton.upenn.edu/ article.cfm?articleid=2194 (accessed September 15, 2009). 33. Kevin Fagan, “Artificial Brain Project Gets Boost—$4.9 Million Grant,” San Francisco Chronicle, November 20, 2008, p. B-1; and John Markoff, “Ay Robot! Scientists Worry Machines May Outsmart Man,” The New York Times, July 26, 2009, News section, pp. 1, 4. 34. Vernor Vinge, “The Coming Techno- logical Singularity,” Vision-21: Inter- disciplinary Science & Engineering in the Era of Cyberspace, Proceedings of Symposium Held at NASA Lewis Research Center, NASA Conference Publication CP-10129, March 30–31, 1993, http://rohan.sdsu.du/faculty/ vinge/misc/singularity.html (accessed September 15, 2009). 35. John Markoff, “The Coming Super- brain,” The New York Times, May 24, 2009, Week in Review section, pp. 1, 4. 36. Brian E. Coggins, “Human vs. Machine: Which Brain Is Ahead?” [letter], The New York Times, July 30, 2009, p. A24. 37. William A. Wallace, Ethics in Model- ing (New York: Elsevier Science, 1994). Francisco Chronicle, August 29, 2009, pp. D1, D4; Jessica E. Vascellaro and Geoffrey A. Fowler, “Amazon Objects to Google’s Books Pact,” The Wall Street Journal, September 2, 2009, p. B4; James Kanter and Eric Pfanner, “Google Tackles Fears on Rights in Book Deal,” The New York Times, September 8, 2009, pp. B1, B4; Miguel Helft, “11th-Hour Filings Oppose Google’s Book Settlement,” The New York Times, September 9, 2009, p. B4; and Michael Liedtke, “Top Copyright Official Opposes Google’s Digital Book Deal,” Reno Gazette-Journal, September 11, 2009, p. 11A. 8. Stephen Manes, “Time and Technol- ogy Threaten Digital Archives . . . ,” The New York Times, April 7, 1998, p. B15; 9. Jim Barksdale and Francine Berman, “Saving Our Digital Heritage,” www. washingtonpost.com/wp-dyn/content/ article/2007/05/15/AR2007051501873. html (accessed August 23, 2009). 10. Marcia Stepanek, “From Digits to Dust,” BusinessWeek, April 20, 1998, pp. 128–130. 11. Manes, “Time and Technology Threaten Digital Archives . . .” 12. Jonathan Berry, John Verity, Kathleen Kerwin, and Gail DeGeorge, “Data- base Marketing,” BusinessWeek, Sep- tember 5, 1994, pp. 56–62. 13. Cheryl D. Krivda, “Data Mining Dynamite,” Byte, October 1995, pp. 97–62. 14. Martin Vaughan, “IRS to Mine Pay- ment Data on Mortgages,” The Wall Street Journal, September 1, 2009, p. A5. 15. Eric Schadt, “Enlisting Computers to Unravel the True Complexity of Dis- ease,” The New York Times, August 25, 2009, p. D3. 16. Lisa Guernsey, “Digging for Nuggets of Wisdom,” The New York Times, October 16, 2003, pp. E1, E9; and Anne Eisenberg, “Lines and Bubbles and Bars, Oh My! New Ways to Sift Data,” The New York Times, August 31, 2008, p. BU-4. 17. Sara Reese Hedberg, “The Data Gold Rush,” Byte, October 1995, pp. 83–88. 18. Eric Lichtblau, “Study of Data Min- ing for Terrorists Is Urged,” The New York Times, October 8, 2008, p. A20. 19. Alex Wright, “Mining the Web for Feelings, Not Facts,” The New York Times, August 24, 2009, pp. B1, B7. 20. Alex Wright, “Exploring a ‘Deep Web’ That Google Can’t Grasp,” The New York Times, February 23, 2009, pp. B1, B4. 21. Michael J. Mandel and Robert D. Hof, “Rethinking the Internet,” Business- Week, March 26, 2001, p. 118. 22. Joshua Quittner, “Tim Berners-Lee,” Time, March 29, 1999, pp. 193–194.
  569. 550 Notes 33. Jordan Robertson, “Software Glitch Leaves Utilities Open

    to Attack,” San Francisco Chronicle, June 12, 2008, p. C4. 34. Hope Yen, “VA Ordered to Explain Risky Software Flaws,” San Francisco Chronicle, January 15, 2009, p. A8. 35. Justin Lahart, “There Go the Serv- ers: Lightning’s New Perils,” The Wall Street Journal, August 25, 2009, p. A10. 36. Richard Wolf, “Get Out Your Pencils: Paper Ballots Make a Return,” USA Today, February 29, 2008, p. 2A; Rich- ard Wolf, “Flawed Ballots Cited in Study,” Reno Gazette-Journal, July 21, 2008, p. 1B; Adam Cohen, “A Tale of Three (Electronic Voting) Elections,” The New York Times, July 31, 2008, p. A22; Deborah Hastings, “Touch- Screen Voting Machines—Store or Scrap?” San Francisco Chronicle, August 25, 2008, p. D3; and Gary Fin- eout, “Invalid Ballots in Florida Dou- bled in 2008,” The New York Times, February 26, 2009, p. A19. 37. Charles Perrow, Normal Accidents: Living with High-Risk Technologies (New York: Basic Books, 1984). 38. Paul Virilio, reported in Alan Riding, “Expounding a New View of Acci- dents,” The New York Times, Decem- ber 26, 2002, pp. B1, B2. 39. Stephen H. Wildstrom, “What to Entrust to the Cloud,” BusinessWeek, April 6, 2009, pp. 89–90; and Jona- than Zittrain, “Lost in the Cloud,” The New York Times, July 20, 2009, Week in Review section, p. A17. 40. Stephen Aguilar-Millan, Joan E. Foltz, John Jackson, and Amy Oberg, “The Globalization of Crime,” The Futurist, November–December 2008, pp. 41–50. 41. Lenita Powers, “Stolen Laptop’s Camera Gives Police a Lead,” Reno Gazette-Journal, December 10, 2008, p. 7A. 42. “File-Sharing Networks Return with Legitimate Ways to Share Music— and Make Money,” Knowledge_com- matWharton, August 6, 2008, http:// knowledge.wharton.upenn.edu/article. cfm?articleid ϭ 20 (accessed Septem- ber 22, 2009); and Benny Evangelista, “How Napster Made an Industry Change Its Tune,” San Francisco Chronicle, June 1, 2009, pp. A1, A10. 43. Jefferson Graham, “College Students Sued over Music Downloads,” USA Today, March 24, 2005, p. 5B. 44. Larem Gullo, “Record Industry Sues 784 Users for Illegally Sharing Music Online,” San Francisco Chronicle, June 30, 2005, pp. C1, C2. 45. “Music Labels Win $2 Million in Web Case,” The New York Times, June 19, 2009, p. B2. 46. Report by Pew Internet & American Life Project, reported in “Sharing of Music Files by Students Has Declined 16. Jonathan Alter, “When Photographs Lie,” Newsweek, June 30, 1990, pp. 44–45. 17. Fred Ritchin, quoted in ibid.; see also Alex Williams, “I Was There; Just Ask Photoshop,” The New York Times, August 17, 2008, Styles section, pp. 1, 12; and Bill Marsh, “Look, and Then Look Again,” The New York Times, August 23, 2009, Week in Review sec- tion, p. 4. 18. Hafner, “The Camera Never Lies, but the Software Can,” p. E7. 19. Noah Shachtman, “For Doctored Photos, a New Flavor of Digital Truth Serum,” The New York Times, July 22, 2004, p. E5. 20. Robert Zemeckis, cited in Laurence Hooper, “Digital Hollywood: How Computers Are Remaking Movie Making,” Rolling Stone, August 11, 1994, pp. 55–58, 75. 21. Peggy Williams, “Database Dangers,” Quill, July/August 1994, pp. 37–38. 22. Kevin Pho, “Wikipedia Isn’t Really the Patient’s Friend,” USA Today, July 15, 2009, p. 11A. 23. Davis, quoted in Williams, “Database Dangers.” 24. May 2004 survey commissioned by Wells Fargo & Co, reported in Julie Dunn, “Poor ‘Street Smarts’ Make Web Users Vulnerable,” San Francisco Chronicle, August 17, 2004, p. C8; reprinted from Denver Post. 25. May 2005 study by Annenberg PublicPolicy Center, University of Pennsylvania, reported in Tom Zeller, Jr., “You’ve Been Scammed Again? Maybe the Problem Isn’t Your Com- puter,” The New York Times, June 6, 2005, p. C4. 26. June 2005 survey funded by Cyber Security Industry Alliance of Wash- ington, reported in Ted Bridis, “Users Want Net to Be Made Safer,” San Francisco Chronicle, June 15, 2005, p. C3. 27. Scott McCartney, “Pilots Go to ‘the Box’ to Avoid Midair Collisions,” The Wall Street Journal, July 18, 2002, p. D3; and George Johnson, “To Err Is Human,” The New York Times, July 14, 2002, sec. 4, pp. D1, D7. 28. We are grateful to Professor John Durham for contributing these ideas. 29. Ben Worthen, “Workers Losing Com- puter Data May Lack Awareness of Its Value,” The Wall Street Journal, November 27, 2007, p. B3. 30. John Allen Paulos, “Smart Machines, Foolish People,” The Wall Street Jour- nal, October 5, 1999, p. A26. 31. Alex Berenson, “Software Failure Halts Big Board Trading for over an Hour,” The New York Times, June 9, 2001, pp. B1, B3. 32. H. Josef Hebert, “Nuclear Sites Posted on Internet in Error,” San Francisco Chronicle, June 4, 2009, p. A4. idtheftcenter.org/artman2/publish/m_ facts/Facts_and_Statistics.shtml (accessed August 25, 2009). 52. Jon Hilsenrath and Brent Kendall, “Bernanke Falls Victim to Identity Theft,” The Wall Street Journal, August 23, 2009, p. A3. 53. David Einstein, “Say No to ID-Theft Protection Programs,” San Francisco Chronicle, August 18, 2008, p. D2. Chapter 9 1. Harold Gilliam, “Mind over Matter,” San Francisco Chronicle, February 9, 2003, pp. D1, D6. 2. Edmund L. Andrews, “New Scale for Toting Up Lost Freedom vs. Security Would Measure in Dollars,” The New York Times, March 11, 2003, p. A11. 3. Sara Lipka, “Pentagon System to Gather Student Data Raises Privacy Fears,” The Chronicle of Higher Edu- cation, July 8, 2005, p. A30. 4. Andrea L. Foster, “ID Theft Turns Students into Privacy Activists,” The Chronicle of Higher Education, August 2, 2002, pp. A27–A28. 5. Ian Ayres, “Lectures vs. Laptops,” The New York Times, March 20, 2001, p. A29; John Schwartz, “Professors Vie with Web for Class’s Attention,” The New York Times, January 2, 2003, pp. A1, A14; and Lisa Guernsey, “When Gadgets Get in the Way,” The New York Times, August 19, 2004, pp. E1, E7. 6. Tamar Lewin, “New Online Guides Rate Professors,” The New York Times, March 24, 2003, p. A9. 7. Ann Davis, “Some Colleges Balk at FBI Request for Data on Foreigners,” The Wall Street Journal, November 25, 2002, pp. B1, B5; and Andrews, “New Scale for Toting Up Lost Freedom vs. Security.” 8. Josh Tyrangiel, “Singer’s Little Helper,” Time, February 16, 2009, pp. 49–51. 9. Kevin Maney, “Late Performers Get Chance to Record Live,” USA Today, July 7, 2004, p. 4B. 10. William Safire, “Art vs. Artifice,” The New York Times, January 3, 1994, p. A11. 11. “Newsweek Gives Stewart a New Body,” San Francisco Chronicle, March 4, 2005, p. A14. 12. Cover, Newsweek, June 27, 1994, and cover, Time, June 27, 1994. 13. Byron Calame, “Pictures, Labels, Per- ception and Reality,” The New York Times, July 3, 2005, sec. 4, p. 10. 14. John Knoll, quoted in Katie Hafner, “The Camera Never Lies, but the Software Can,” The New York Times, March 11, 2004, pp. E1, E7. 15. Daryl Plummer, “Give Counterfeit Reality a Closer Look,” USA Today, July 20, 2004, p. 13A.
  570. Notes 551 Months of Cyberattacks,” San Fran- cisco Chronicle, April

    8, 2009, p. C3. 75. Jack Goldsmith, “Defend America, One Laptop at a Time,” The New York Times, July 2, 2009, p. A21. 76. Jim Michaels, “Cellphones Put to ‘Unnerving’ Use in Gaza,” USA Today, January 14, 2009, p. 4A. 77. David E. Sanger, John Markoff, and Thom Shanker, “U.S. Plans Attack and Defense in Web Warfare,” The New York Times, April 28, 2009, pp. A1, A14. 78. “U.S. Officials Eye N. Korea in Cyber Attack,” Reno Gazette-Journal, July 9, 2009, p. 1B. 79. David E. Sanger, “Pentagon Plans New Arm to Wage Computer Wars,” The New York Times, May 29, 2009, pp. A1, A17; Byron Acohido, “Obama Vows to Prioritize Cybersecurity,” USA Today, June 1, 2009, p. 4B; and Chloe Albanesius, “Obama’s Cyber- space Crackdown,” PC Magazine, Digital Edition, July 2009, pp. 7–8. 80. Siobhan Gorman and Yochi Dreazen, “Military Command Is Created for Cyber Security,” The Wall Street Jour- nal, July 24, 2009, p. A6. 81. L. Gordon Crovitz, “Obama and Cyber Defense,” The Wall Street Jour- nal, June 29, 2009, p. A11. 82. Thom Shanker and David E. Shanker, “Privacy May Be a Victim in Cyberde- fense Plan,” The New York Times, June 13, 2009, pp. A1, A3; and Siob- han Gorman, “Troubles Plague Cyber- spy Defense,” The Wall Street Journal, July 3, 2009, pp. A1, A10. 83. Stephanie Armour, “Beware the Blog: You May Get Fired,” Reno Gazette- Journal, June 25, 2005, pp. 1E, 4E. 84. Deloitte’s Ethics and Workplace sur- vey, reported in “Social Networking and the Boss,” USA Today, June 24, 2009, p. 1B. 85. American Management Associa- tion survey of 840 U.S. companies, reported in Pai-Wing Tam, Erin White, Nick Wingfield, and Kris Maher, “Snooping E-Mail by Soft- ware Is Now a Workplace Norm,” The Wall Street Journal, March 9, 2005, pp. B1, B3. 86. Damon Darlin, “Software That Moni- tors Your Work, Wherever You Are,” The New York Times, April 12, 2009, Business section, p. 4. 87. Websense and Harris Interactive, August 2002 survey, reported in Brad Stone, “Is the Boss Watching?” Newsweek, September 30, 2002, pp. 38J, 38L. 88. ADP Screening & Selection Services, reported in Joann S. Lublin, “Check, Please,” The Wall Street Journal, March 11, 2002, p. R11; and Stepha- nie Armour, “Worker Background Checks Raise Privacy Concerns,” USA Today, May 21, 2002, p. 1A. 58. Byron Acohido and Jon Swartz, “Are Hackers Using Your PC to Spew Spam and Steal?” USA Today, Sep- tember 8, 2004, pp. 1B, 4B. 59. Cassell Bryan-Low, “Tech-Savvy Blackmailers Hone a New Form of Extortion,” The Wall Street Journal, May 5, 2005, pp. B1, B3. 60. Brian Grow, “Hacker Hunters,” Busi- nessWeek, May 30, 2005, pp. 74–82; and Tom Zeller Jr., “Black Market in Credit Cards Thrives on Web,” The New York Times, June 21, 2005, pp. A1, C4. 61. Cassell Bryan-Low, “Seeking New Payoff, Hackers Now Strike Web Sites for Cash,” The Wall Street Journal, November 30, 2004, pp. A1, A8. 62. Robertson, “Software Glitch Leaves Utilities Open to Attack.” See also Paul Davidson, “Power Grid Open to Hack- ing,” USA Today, April 9, 2009, p. 3 B. 63. Nanette Asimov, Ryan Kim, and Kevin Fagan, “South Bay Phone Cha- os—Vandals Slice Vital Cables,” San Francisco Chronicle, April 10, 2009, pp. A1, A12. 64. Siobhan Gorman, “Electricity Grid in U.S. Penetrated by Spies,” The Wall Street Journal, April 8, 2009, pp. A1, A2; and Siobhan Gorman, “Electricity Industry to Scan Grid for Spies,” The Wall Street Journal, June 18, 2009, p. A3. 65. Bank and Richmond, “Where the Dangers Are.” 66. Frank X. Mullen Jr., “Hackers into Ely Hospital’s Computers Traced to Russia,” Reno Gazette-Journal, April 7, 2003, pp. 1A, 6A. 67. CSO magazine survey, reported in “Companies and Cyber Attacks,” USA Today, October 7, 2002, p. 1B. 68. University of Florida and the National Retail Federation, National Retail Security Survey, preliminary results, June 2009, reported in Matthew Lynch, “Retail Theft Soars in Economic Down- turn,” WWD, September 2, 2009, www.rila.org/news/Documents/ WWD%20BD%20ORC.pdf (accessed October 2, 2009). 69. Bob Tedeschi, “Crime Is Soaring in Cyberspace, but Many Companies Keep It Quiet,” The New York Times, January 27, 2003, p. C4. 70. “Rogues’ Gallery,” The Wall Street Journal, July 18, 2003, p. R3. 71. David Jolly, “In France, Intricate Tale of Corporate Espionage,” The New York Times, August 25, 2009, p. B4. 72. Karen Kaplan, “Gangs Finding New Turf,” Los Angeles Times, May 31, 2001, pp. A1, A8. 73. U.S. Computer Emergency Readiness team, reported in “U.S. Computers Vulnerable,” The Week, February 27, 2009, p. 6. 74. Lolita C. Baldor, “Pentagon Says It Spent $100 Million Fending Off 6 Drastically, New Pew Survey Finds ,” The Chronicle of Higher Education, January 16, 2004, p. A34. 47. “Raids Aim at Web Piracy,” The New York Times, July 1, 2005, p. C6; “Web Piracy Suspects Arraigned on Charges of Copyright Violation,” San Fran- cisco Chronicle, July 15, 2005, p. B1. 48. Brian Stelter and Brad Stone, “Digital Pirates Winning Battle with Major Hollywood Studios,” The New York Times, February 5, 2009, pp. A1, A19; and Brian Stelter, “Piracy Puts Film Online One Month Before Open,” The New York Times, April 2, 2009, p. B3. 49. Pat Choate, Hot Property: The Steal- ing of Ideas in an Age of Globalization (New York: Alfred A. Knopf, 2005), quoted in Michael Lind, “Freebooters of Industry,” The New York Times Book Review, July 10, 2005, p. 34. 50. Tom Zeller Jr., “The Imps of File Sharing May Lose in Court, but They Are Winning in the Marketplace,” The New York Times, July 4, 2005, p. C3; Saul Hansell, “Forget the Bootleg, Just Download the Movie Legally,” The New York Times, July 4, 2005, pp. C1, C4; “Dell, Napster to Promote Legal Downloads to Students,” San Francisco Chronicle, July 7, 2005, p. C3; and Brad Stone, “Copy an iTunes Song? Go Ahead, Apple Says,” The New York Times, January 7, 2009, pp. A1, B6. 51. John Schwartz, “Some Sympathy for Paris Hilton,” The New York Times, February 27, 2005, sec. 4, pp. 1, 14; and Jon Swartz and Sandra Block, “Underground Market for Stolen IDs Thrives,” USA Today, March 3, 2005, pp. 1B, 2B. 52. Ben Worthen, “New Epidemic Fears: Hackers,” The Wall Street Journal, August 4, 2009, p. A6. 53. Siobhan Gorman, “Arrest in Epic Cyber Crime,” The Wall Street Journal, August 18, 2009, pp. A1, A4. 54. Brad Stone, “A Global Trail That Revealed a Cyber-Ring,” The New York Times, August 12, 2008, pp. A1, A17. See also Kathleen Pender, “How to Protect Yourself against Having Your Financial Data Stolen,” San Francisco Chronicle, June 15, 2008, pp. C1, C5. 55. National White Collar Crime Center, “IC3 2008 Annual Report on Internet Crime Released,” March 31, 2008, www.ic3.gov/media/2009/090331.aspx (accessed October 2, 2009). 56. Byron Acohido, “Cracking the Code,” USA Today, April 23, 2009, pp. 1A, 8A. 57. David Bank and Riva Richmond, “Where the Dangers Are,” The Wall Street Journal, July 18, 2005, pp. R1, R3.; see also Jon Swartz, “Hackers Want to Be Your (Malicious) Friend,” USA Today, August 13, 2008, p. 3B.
  571. 552 Notes 28, 2004, p. 6D; Kevin Maney, “Nan- otechnology’s

    in Your Pants, on Your Face, Even Your Bling,” USA Today, June 1, 2005, p. 4B; Fred Krupp and Chad Holliday, “Let’s Get Nanotech Right,” The Wall Street Journal, June 14, 2005, p. B2; and Kevin Maney, “Scared of New Nano-Pants? Hey, You May Be onto Something,” USA Today, June 22, 2005, p. 3B. 117. Kenneth Chang, “In Study, Researchers Find Nanotubes May Pose Health Risks Similar to Asbes- tos,” The New York Times, May 21, 2008, p. A18. 118. Lutz Erbring, coauthor of Stanford University survey of 4,113 people about internet impact on daily activities, quoted in Joellen Perry, “Only the Cyberlonely,” U.S. News & World Report, February 28, 2000, p. 62. 119. Norman H. Nie, Alberto Simpser, Irena Stepanikova, and Lu Zheng, Ten Years after the Birth of the Inter- net, How Do Americans Use the Internet in Their Daily Lives? (Stan- ford, CA: Stanford Institute for the Quantitative Study of Society, 2004), www.stanford.edu/group/siqss/ SIQSS_Time_Study_04.pdf (accessed July 20, 2009). 120. Study by Annenberg Center for the Digital Future, University of South- ern California, reported in “Is the Internet Behind Less Family Face Time?” USA Today, June 16, 2009, p. 6D. See also Brad Stone, “Cof- fee Can Wait. The Day’s First Stop Is Online,” The New York Times, August 10, 2009, pp. A1, A3. 121. Matt Richtel, “For Gamers, the Craving Won’t Quit,” The New York Times, April 29, 2008, pp. C1, C4. 122. Jennifer Seter Wagner, ”When Play Turns to Trouble,” U.S. News & World Report, May 19, 2008, pp. 51–52. 123. Study by Iowa State University, reported in Staci Hupp, “1 in 10 Kids Addicted to Video Games,” Reno Gazette-Journal, April 21, 2009, p. 1B. 124. Tom Verdin, “Rapid Growth of Cyber-Gambling Prompts Calls for Regulation,” San Francisco Chroni- cle, March 9, 2000, p. A9. 125. Ian Urbina, “Online Poker: Hold ’Em and Hide ’Em,” The New York Times, March 14, 2004, p. C11; Julia Angwin, “Could U.S. Bid to Curb Gambling on the Web Go Way of Prohibition?” The Wall Street Journal, August 2, 2004, p. B1; Lor- raine Woellert, “Can Online Betting Change Its Luck?” BusinessWeek, December 20, 2004, pp. 66–67; and Jon Swartz, “Online Gambling Sites Expect Big Payoffs,” USA Today, February 8, 2005, p. 1B. Chronicle, January 30, 2004, pp. B1, B4; Benjamin Pimentel, “Tech to Study Cancer Data,” San Francisco Chronicle, March 19, 2004, pp. C1, C3; and Benjamin Pimentel, “Dust on Gadgets Is Toxic,” San Francisco Chronicle, June 4, 2004, pp. C1, C3. 107. Lindsey Tanner, “Wireless Systems May Be Deadly,” San Francisco Chronicle, June 25, 2008, p. A6. 108. Steve Lohr, “Data Centers as Pollut- ers,” The New York Times, May 5, 2008, p. C6. 109. Lee Gomes, “Companies Struggle to Keep Up as Technologies Grow Obsolete,” The Wall Street Journal, April 29, 2008, p. B7. 110. “Where Old Electronics Go When They Die,” USA Today, December 24, 2008, p. 1A. 111. Environmental Protection Agency, reported in G. Jeffrey MacDonald, “Don’t Recycle ‘E-Waste’ with Haste, Activists Warn,” USA Today, July 7, 2008, p. 5D. 112. Jon Swartz, “Got an Old PC? Don’t Trash It: Recycle It,” USA Today, January 7, 2005, p. 7B; Andy Rein- hardt and Rachel Tiplady, “Europe Says: Let’s Get the Lead Out,” BusinessWeek, February 7, 2005, p. 12; John R. Quinn, “How Do I Dump My PC?” U.S. News & World Report, April 11, 2005, p. 83; Rachel Konrad, “Activists Push Recycling to Fight ‘E-Waste,” Reno Gazette- Journal, April 24, 2005, p. 4C; Edward Epstein, “Congress Exam- ines Disposal Options for Electron- ics,” San Francisco Chronicle, June 6, 2005, pp. A1, A7; and Michael Cabanatuan, “Bay Area’s Easy End- ings for Electronics,” San Francisco Chronicle, June 6, 2005, p. A7. 113. “Where Old Electronics Go When They Die.” 114. Ryan Kim, “HP Plans to Lighten Carbon Footprint,” San Francisco Chronicle, May 24, 2008, pp. C1, C2. 115. Julie Rawe, “Cellular’s New Cam- ouflage,” Time Inside Business, December 9, 2002, pp. A9–A10; Elaine Goodman, “Cell Towers Go Incognito,” Reno Gazette-Journal, February 2, 2004, pp. 1B, 2B; Paul Davidson, “Cellphone Tower Rules May Loosen Up,” USA Today, Sep- tember 9, 2004, p. 3B; and Katie Hafner, “First Come Cellphone Tow- ers, Then the Babel,” The New York Times, May 1, 2005, sec. 1, pp. 1, 24. 116. Kathy Jo Wetter, ETC Group, quoted in Jim Krane, “Risks of Nanotech- nology Debated,” San Francisco Chronicle, September 9, 2002, p. E6. See also Bernadette Tansey, “An Insider’s View of Nanotech,” San Francisco Chronicle, February 1, 2004, p. I1; Dan Vergano, “Creating a Monster?” USA Today, September 89. CSO magazine survey, reported in “Cyber Security,” USA Today, Febru- ary 4, 2003, p. 1B. 90. Poll by Ernst & Young, June 3–6, 2002, reported in “Crime Spree,” BusinessWeek, September 9, 2002, p. 8. 91. Erik Sherman, “Fighting Web Fraud,” Newsweek, June 10, 2002, pp. 32B, 32D. 92. Marci Alboher Nusbaum, “New Kind of Snooping Arrives at the Office,” The New York Times, July 13, 2003, sec. 3, p. 12. 93. Stephanie Armour, “Workers’ Down- loading Puts Employers at Risk,” USA Today, July 30, 2002, p. 1B. 94. Mindy Fetterman, “Employers Must Shred Personal Data,” USA Today, June 1, 2005, p. 3B. 95. Bob Egelko, “U.S. Appeals Court Limits Release of Text Messages,” San Francisco Chronicle, June 19, 2008, p. B3; and Jennifer Ordonez, “They Can’t Hide Their Pryin’ Eyes,” Newsweek, July 7/July 14, 2008, p. 22. 96. Sherman, “Fighting Web Fraud.” 97. Jon Swartz, “Data Losses Push Busi- nesses to Encrypt Backup Tapes,” USA Today, June 13, 2005, p. 1B. 98. John Schwartz, “Disputes on Elec- tronic Message Encryption Take on New Urgency,” The New York Times, September 25, 2001, pp. C1, C16. 99. Gina Kolata, “Scientists Debate What to Do When Findings Aid an Enemy,” The New York Times, Sep- tember 25, 2001, pp. D1, D2. 100. John Holusha, “The Painful Lessons of Disruption,” The New York Times, March 17, 1993, pp. C1, C5. 101. Amanda Cantrell, “Business After Disaster,” CNNMoney, Octo- ber 4, 2005, http://cnnmoney. com/2005/10/04/technology/ disaster_ recovery (accessed October 5, 2009). 102. Michelle Kessler, “Backing Up Data Keeps Companies Running Even When Disaster Strikes,” USA Today, September 6, 2005, p. 2B. 103. Environmental Protection Agency study, reported in William M. Bulke- ley, “Cutting Tech’s Energy Bill,” The Wall Street Journal, September 9, 2008, p. B6; and Kent Garber, “Pow- ering the Information Age,” U.S. News & World Report, April 2009, pp. 46–48. 104. Jim Carlton, “The PC Goes on an Energy Diet,” The Wall Street Jour- nal, September 8, 2009, p. R8. 105. Ernest Scheyder, “Unplug It, Save Some Money,” San Francisco Chron- icle, April 13, 2009, pp. C1, C2. 106. David Lazarus, “Toxic Technol- ogy,” San Francisco Chronicle, December 3, 2000, pp. B1, B4, B8; Benjamin Pimentel, “The Val- ley’s Toxic History,” San Francisco
  572. Notes 553 p. A28. Another survey by Harris Interactive also

    found that one in five teens had “sexted”; see Donna Leinwand, “Survey: 1 in 5 Teens ‘Sext’ Despite Risks,” USA Today, June 24, 2009, p. 3A. 144. Wendy Koch, “More Teens Caught Up in ‘Sexting,” USA Today, March 12, 2009, p. 1A; Justin Berton, “Is Your Teen ‘Sexting’? Experts Say It’s Unlikely,” San Francisco Chronicle, March 21, 2009, pp. A1, A8; Sha- ron Jayson, “Study: ‘Sexting’ about Power, Not Sex,” USA Today, May 15, 2009, p. 10B; Jaclyn O’Malley, “Sexting on Rise among Teenagers,” Reno Gazette-Journal, May 17, 2009, pp. 1A, 5A. 145. Survey by Common Sense Media, reported in Jill Tucker, “Teens Show, Tell Too Much Online,” San Fran- cisco Chronicle, August 10, 2009, pp. A1, A6. 146. Amy Harmon, “Internet Gives Teen- age Bullies Weapons to Wound from Afar,” The New York Times, August 26, 2004, pp. A1, A21; Jon Swartz, “Schoolyard Bullies Get Nastier Online,” USA Today, March 7, 2005, pp. 1A, 2A; Casey Labrack, “Safety Group: Cyberbullying Is a Bigger Threat to Children,” Reno Gazette- Journal, June 19, 2008, p. 5C; Janet Kornblum, “Cyberbullying Grows Bigger and Meaner,” USA Today, July 15, 2008, pp. 1D, 2D; Cynthia G. Wagner, “Beating the Cyberbul- lies,” The Futurist, September– October 2008, pp. 14–15; Betsy Taylor, “First Cases Filed under New Online Bullying Laws,” San Francisco Chronicle, December 21, 2008, p. A25; Catherine Cortez Masto, “New Law Will Help End Cyber- Bullying,” Reno Gazette- Journal, August 19, 2009, p. 6A; and Elizabeth Charnock, “Monitor to Prevent Cyberbullying,” San Fran- cisco Chronicle, September 2, 2009, p. A19. 147. Swartz, “Schoolyard Bullies Get Nastier Online,” 2005; “Cyberbul- lies Cause Real Pain” [letters], The New York Times, August 30, 2004, p. A20; and Jeff Chu, “You Wanna Take This Online?” Time, August 8, 2005, pp. 52, 55; and Wagner 2008; and Sue Shellenbarger, “Cyberbully Alert: Web Sites Make It Easier to Flag Trouble,” The Wall Street Journal, December 17, 2008, p. D1.. 148. Cari Tuna, “Lawyers and Employers Take the Fight to ‘Workplace Bul- lies’,” The Wall Street Journal, August 4, 2008, p. B6. 149. Jonathan Marshall, “Some Say High-Tech Boom Is Actually a Bust,” San Francisco Chronicle, July 10, 1995, pp. A1, A4. 138. Enhancing Child Safety and Online Technologies: Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attor- neys General of the United States, The Berkman Center for Internet and Society at Harvard University, 2009, http://cyber.law.harvard.edu/ pubrelease/isttf/ (accessed Septem- ber 29, 2009). See also Brad Stone, “Despite News Reports, Task Force Finds Online Threat to Children Overblown,” The New York Times, January 14, 2009, p. A14; and Emily Steel, “No Easy Answer for Protect- ing Kids Online,” The Wall Street Journal, January 14, 2009, p. B4. 139. David Finkelhor, Kimberbly J. Mitchell, and James Wolak, Online Victimization: A Report on the Nation’s Youth, June 2000, Crimes Against Children Research Center, University of New Hampshire, Dur- ham, NH. See also Jane L. Levere, “Blunt Ads for Teenagers Warn of Net Predators,” The New York Times, June 8, 2005, p. C10. 140. Janis Wolak, Kimberly Mitchell, and David Finkelhor, Internet Sex Crimes against Minors: The Response of Law Enforcement, November 2003, Crimes Against Children Research Center, University of New Hamp- shire, Durham, NH, www.missing- kids.com/en_US/publications/NC132. pdf (accessed July 25, 2009). See also Marilyn Elias, “Survey Paints Different Portrait of Online Abuser,” USA Today, August 2, 2004, p. 8D. 141. Elias, “Survey Paints Different Por- trait”; and Levere, “Blunt Ads for Teenagers.” 142. Megan A. Moreno, MD, Ann Vander- Stoep, Malcolm R. Parks, Frederick J. Zimmerman, Ann Kurth, and Dimitri A. Christakis, “Reducing At-Risk Adolescents’ Display of Risk Behavior on a Social Networking Web Site: A Randomized Controlled Pilot Intervention Trial,” Archives of Pediatrics and Adolescent Medicine, January 2009, pp. 35–41. 143. Sex and Tech: Results from a Sur- vey of Teens and Young Adults, The National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com, s urvey by Teen- age Research Unlimited of 1,280 teens and young adults online, September 25–October 3, 2008, www.thenationalcampaign.org/ sextech/PDF/SexTech_Summary.pdf (accessed September 29, 2009). See also Sharon Jayson, “Flirting Goes High-Tech, Low-Taste,” USA Today, December 10, 2008, p. 1A; and Irene Sege, “Nude Photos of Teens Getting Unexpected Play,” San Francisco Chronicle, December 12, 2008, 126. Survey by Microsoft Corp., reported in Don Clark and Kyle Pope, “Poll Finds Americans Like Using PCs, but May Find Them to Be Stressful,” The Wall Street Journal, April 10, 1995, p. B3. 127. Survey by Concord Communica- tions, reported in Matt Richtel, “Rage against the Machine: PCs Take Brunt of Office Anger,” The New York Times, March 11, 1999, p. D3. 128. Study by Glenn Wilson and scien- tists from the Institute of Psychiatry at the University of London for Hewlett-Packard, reported in Ben- jamin Pimentel, “E-mail Addles the Mind,” San Francisco Chronicle, May 4, 2005, pp. C1, C6. 129. “Porn in the U.S.A.,” 60 Min- utes, CBSNews.com , Septem- ber 5, 2004, www.cbsnews.com/ stories/2003/11/21/60minutes/ main585049.shtml (accessed July 20, 2009). 130. Websense Inc., 2004, and Nielsen/ Net Ratings, 2004, reported in “Internet Porn Grows,” USA Today, June 20, 2004, p. 12A. 131. Tracking by comScore Media Metrix, reported in Anick Jesdanun, “Will a Virtual Red-Light District on the Web Help Parents Curb Online Porn?” San Francisco Chronicle, June 13, 2005, p. E2. 132. Nielsen Online October 2008 fig- ures, reported in Anna Kuchment and Karen Springen, “The Tangled Web of Porn in the Office,” News- week, December 8, 2008, p. 14. 133. Jon Swartz, “Online Porn Often Leads High-Tech Way,” USA Today, March 9, 2004, pp. 1B, 2B. 134. Danny Hakim, “Web Providers to Block Sites with Child Sex,” The New York Times, June 10, 2008, pp. A1, A18; “3 Internet Providers to Block Child Porn,” Reno Gazette- Journal, June 11, 2008, p. 9A; and Wendy Koch, “Ban on Child Porn Web Forums Affects Few,” USA Today, June 13, 2008, p. 3A. 135. U.S. Supreme Court decision, reported in Mark Sherman, “Court Upholds Child-Porn Law,” Reno Gazette-Journal, May 20, 2009, p. 1B. 136. Federal Trade Commission 2003 study, cited in Anita Hamilton, “Video Vigilantes,” Time, January 10, 2005, pp. 60, 63. 137. Ted Bridis, “World Wide Web Gets Its Own Red-Light District,” Reno Gazette-Journal, June 2, 2005, p. 1C; “Fence Off Internet Porn” (editorial), USA Today, Septem- ber 15, 2005, p. 12A; and Patrick Trueman, “XXX Would Legitimize Porn,” USA Today, September 15, 2005, p. 12A.
  573. 554 Notes 182. Stewart Brand, in “Boon or Bane for

    Jobs?” The Futurist, January– February 1997, pp. 13–14. 183. Paul Krugman, “Long-Term Riches, Short-Term Pain,” The New York Times, September 25, 1994, sec. 3, p. 9. 184. Leslie Harris & Associates, “Bring- ing a Nation Online: The Impor- tance of Federal Leadership,” a report by the Leadership Conference on Civil Rights Education Fund and the Benton Foundation, with support from the Ford Founda- tion, July 2002, www.civilrights.org/ publications/reports/nation_online/ bringing_a_nation.pdf. See also John Schwartz, “Report Disputes Bush Approach to Bridging ‘Digital Divide,” The New York Times, July 11, 2002, p. A16; and Anastasia Usti- nova, “State’s Digital Divide Widens Even as More Citizens Log On,” San Francisco Chronicle, June 26, 2008, pp. C1, C4. 185. Paul Lamb, “Spanning the New Digital Divide,” San Francisco Chronicle, June 14, 2005, p. B7. 186. Elizabeth F. Farrell, “Among Fresh- men, a Growing Digital Divide,” The Chronicle of Higher Education, Feb- ruary 4, 2005, p. A32. 187. Thomas L. Friedman, The World Is Flat: A Brief History of the Twenty- First Century (New York: Farrar, Straus & Giroux, 2005). 188. Paul Magnusson, “Globalization Is Great—Sort Of,” BusinessWeek, April 25, 2005, p. 25. See also Fareed Zakaria, “The Wealth of Yet More Nations,” The New York Times Book Review, May 1, 2005, pp. 10–11; Russ L. Juskalian, “Pros- pering in Brave New World Takes Adaptation,” USA Today, May 2, 2005, p. 4B; and Roberto J. Gon- zalez, “Falling Flat,” San Francisco Chronicle, May 15, 2005, pp. B1, B4. 189. Charles Hutzler, “Yuppies in China Protest via the Web—and Get Away with It,” The Wall Street Journal, March 10, 2004, pp. A1, A8; How- ard W. French, “Despite an Act of Leniency, China Has Its Eye on the Web,” The New York Times, June 27, 2004, sec. 1, p. 6; Charles Hutzler, “China Finds New Ways to Restrict Access to the Internet,” The Wall Street Journal, September 1, 2004, pp. B1, B2; Tom Zeller, Jr., “Beijing Loves the Web until the Web Talks Back,” The New York Times, December 6, 2004, p. C15; Jim Yardley, “A Hundred Cellphones Bloom, and Chinese Take to the Streets,” The New York Times, April 25, 2005, pp. A1, A6; Bruce Einhorn and Heather Green, “Blogs under Its Thumb,” BusinessWeek, August 8, 2005, pp. 42–43; Michael Wines San Francisco Chronicle, April 5, 1995, pp. D1, D3. 166. Stella Yu, quoted in Hamilton and Kalb, “They Log On, but They Can’t Log Off.” 167. Jonathan Kandell, quoted in J. R. Young, “Students Are Unusually Vulnerable to Internet Addiction, Article Says,” The Chronicle of Higher Education, February 6, 1998, p. A25. 168. American Psychological Association, reported in R. Leibrock, “AOLa- holic: Tales of an Online Addict ,” Reno News & Review, October 22, 1997, pp. 21, 24. 169. Hamilton and Kalb, “They Log On, but They Can’t Log Off.” 170. Keith J. Anderson, reported in Leo Reisberg, “10% of Students May Spend Too Much Time Online,” The Chronicle of Higher Education, June 16, 2000, p. A43. 171. Matt Richtel, “The Lure of Data: Is It Addictive?” The New York Times, July 6, 2003, sec. 3, pp. 1, 8, 9. 172. R. Sanchez, “Colleges Seek Ways to Reach Internet-Addicted Students,” San Francisco Chronicle, May 23, 1996, p. A16; reprinted from Wash- ington Post. 173. Ibid. 174. Ibid. 175. Nicholas K. Geranios, “First Internet Addiction Center Opens in the U.S.,” Reno Gazette-Journal, September 6, 2009, p. 7B. See also Jonathan Zim- merman, “Hooked on Facebook,” San Francisco Chronicle, March 20, 2009, p. A19; Jillian Lenahan, “MySpace Addictions—No Need for Rehab,” San Francisco Chronicle, March 20, 2009, p. A19; and Hugh Delehanty, “Confessions of a Face- book Addict,” AARP, July & August, pp. 41–43. 176. Ben Gose, “A Dangerous Bet on Campus,” The Chronicle of Higher Education, April 7, 2000, pp. A49–A51. 177. Jon Swartz, “More Firms Replace Operators with Software,” USA Today, May 20, 2002, p. 1B. 178. Timothy Aeppel, “Workers Not Included,” The Wall Street Journal, November 10, 2002, pp. B1, B11. 179. Jeremy Rifkin, “Technology’s Curse: Fewer Jobs, Fewer Buyers,” San Francisco Examiner, December 3, 1995, p. C19. 180. Robert Kuttner, “The Myth of a Natural Jobless Rate,” Business- Week, October 20, 1997, p. 26; and Clyde Prestowitz, “Globalization’s Next Victim: Us,” San Francisco Chronicle, July 10, 2005, pp. F1, F6. 181. Richard W. Samson, “How to Succeed in the Hyper-Human Economy,” The Futurist, September– October 2004, pp. 38–43. 150. Surfwatch Checknet, cited in Keith Naughton, Joan Raymond, Ken Shulman, and Diane Struzzi, “Cyberslacking,” Newsweek, Novem- ber 29, 1999, pp. 62–65. 151. STB Accounting Systems 1992 survey, reported in Del Jones, “On- line Surfing Costs Firms Time and Money,” USA Today, December 8, 1995, pp. 1A, 2A. 152. Nie et al., Ten Years after the Birth of the Internet, How Do Americans Use the Internet in Their Daily Lives? 153. Dan Gillmor, “Online Reliability Will Carry a Price,” San Jose Mercury News, July 18, 1999, pp. 1E, 7E. 154. Paul Saffo, quoted in Laura Even- son, “Pulling the Plug,” San Fran- cisco Chronicle, December 18, 1994, Sunday sec., p. 53. 155. Daniel Yankelovich Group report, cited in Barbara Presley Noble, “Electronic Liberation or Entrap- ment?” The New York Times, June 15, 1994, p. C4. 156. Kevin Maney, “No Time Off? It’s Tech Giants’ Fault,” USA Today, July 21, 2004, p. 4B. See also Michael Sanserino, “Suits Question After- Hours Demands of Email and Cell- phones,” The Wall Street Journal, August 10, 2009, pp. B1, B2. 157. U.S. Labor Department, reported in Sue Kirchoff, “Worker Productivity Rises at Fastest Rate since 1950,” USA Today, February 7, 2003, p. 5B. See also Janet Rue-Dupree, “Inno- vation Should Mean More Jobs, Not Less,” The New York Times, January 4, 2009, Business sec- tion, p. 3. 158. Stephen S. Roach, “Working Bet- ter or Just Harder?” The New York Times, February 14, 2000, p. A27. 159. N’Gai Croal, “The Internet Is the New Sweatshop,” Newsweek, July 7/ July 14, 2008, p. 54. 160. David Levy, quoted in Joseph Hart, “Technoskeptic Techie,” Utne, Janu- ary–February 2005, pp. 28–29. 161. Bill McKibben, quoted in Jeffrey R. Young, “Knowing When to Log Off,” The Chronicle of Higher Education, April 22, 2005, pp. A34–A35. 162. Nate Stulman, “The Great Campus Goof-Off Machine,” The New York Times, March 15, 1999, p. A25. 163. Robert Kubey, “Internet Generation Isn’t Just Wasting Time,” The New York Times, March 21, 1999, sec. 4, p. 14. 164. Marco R. della Cava, “Are Heavy Users Hooked or Just Online Fanat- ics?” USA Today, January 16, 1996, pp. 1A, 2A. 165. Kenneth Hamilton and Claudia Kalb, “They Log On, but They Can’t Log Off,” Newsweek, December 18, 1995, pp. 60–61; and Kenneth Howe, “Diary of an AOL Addict,”
  574. Notes 555 Chapter 10 1. Gary Webb, “Potholes, Not ‘Smooth

    Transition,’ Mark Project,” San Jose Mercury News, July 3, 1994, p. 18A. 2. Jim Remsik, “For Software Writing, a Buddy System,” The New York Times, September 20, 2009, p. 8. 3. Jerome Garfunkel, “COBOL: Still Relevant after All These Years,” December 17, 2003, www.cobolreport. com/columnists/jermoe/02172003.asp (accessed January 10, 2009). 4. Alan Freedman, The Computer Glos- sary, 6th ed. (New York: AMACOM, 1993), p. 370. 5. http://searchenterpriselinux. techtarget.com/sDefinition/0,,sid39_ gci213098,00.html# (accessed August 30, 2009). 6. Michael Krantz, “Keeping Tabs Online,” Time, November 10, 1997, pp. 81–82. 7. Ashlee Vance, “Data Analysts Mes- merized by Power of R,” The New York Times, January 7, 2009, p. 6. Francisco Chronicle, April 20, 2000, p. B3; reprinted from The New York Times. 194. Todd Gitlin, quoted in Dora Straus, “Lazy Teachers, Lazy Students” [let- ter], The New York Times, September 12, 1999, sec. 4, p. 18. 195. Jean Richardson, quoted in Wendy R. Leibowitz, “At Yale’s Demand, a Web Site Drops Lecture Notes from the University’s Classes,” The Chron- icle of Higher Education, March 17, 2000, pp. A49–A50. 196. Tanya Schevitz, “Web Sites Snag Students,” San Francisco Chronicle, October 18, 1999, pp. A1, A13. 197. Jamie Horwitz, American Federa- tion of Teachers, reported in Marco R. della Cava, “Blackboard Jungle Turns Ugly Online,” USA Today, May 8, 2000, p. 3D. 198. Tanya Schevitz, “Prof Fights Web Trash Talk,” San Francisco Chroni- cle, April 6, 2000, pp. A1, A14. and Andrew Jacobs, “To Shut Off Tiananmen Talk, China Blocks More Web Sites,” The New York Times, June 3, 2009, p. A13; Jeannie Nuss, “Web Site Tracks Online Censorship Reports,” San Francisco Chronicle, August 24, 2009, p. D2; and Jona- than Ansfield, “China Adds Layer of Web Surveillance with a Rule Seek- ing Users’ Names,” The New York Times, September 6, 2009, News section, p. 4. 190. Edward Cornish, “The Wild Cards in Our Future,” The Futurist, July– August 2003, pp. 18–22. 191. Stephen H. Wildstrom, “What Does a Freshman Need?” BusinessWeek, August 7, 2000, p. 22. 192. Richard A. Seigel, “Palmtop Com- puters Prove Useful in Class” [letter], The Chronicle of Higher Edu- cation, February 4, 2000, p. B10. 193. “Business Schools Struggle to Impose Laptop Etiquette,” San
  575. Credits 557 Credits Chapter 1 Page 1: Coco Marlet/Photo Alto/Getty

    Images; p. 3 (bottom): CD is Absolute Couples Image 100/Punchstock; p. 3 (top): Ed Bock/ Corbis; p. 5: Syracuse Newspapers/Greenlar/The Image Works; p. 7 (top left): Courtesy of IBM; p. 7 (top right): David Silverman/ Getty Images; p. 8 (bottom): Shizuo Kambayashi/AP Images; p. 8 (top left): Fujifotos/The Image Works; p. 8 (top right): Fujifotos/ The Image Works; p. 10 (left): ©Walt Disney Co./Courtesy Everett Collection; p. 10 (right): Torin Boyd; p. 11 (bottom): Rob Crandall/ The Image+ Works; p. 11 (top): Jeff Greenberg/The Image Works; p. 12: Syracuse Newspapers/Jim Commentucci/The Image Works; p. 14 (left): Courtesy of Unisys Archives; p. 14 (right): Mark Richards/PhotoEdit; p. 15 (left): Courtesy of Motorola; p. 15 (middle): Courtesy of Motorola; p. 15 (right): Katsumi Kasahara/AP Images; p. 19: Coco Marlet/Photo Alto/Getty Images; p. 21: Courtesy of IBM; p. 22 (bottom): Courtesy of Hewlett-Packard; p. 22 (middle): Courtesy of Hewlett-Packard; p. 22 (top): Courtesy of Unisys; p. 23 (bottom left): Courtesy of Intel; p. 23 (bottom right): Courtesy of Hewlett-Packard; p. 23 (middle left): MANPREET ROMANA/ AFP/Getty Images; p. 23 (middle right): Courtesy of Hewlett-Packard; p. 23 (top): Courtesy of Apple Computer; p. 23 (top right): Courtesy of Gateway Computer; p. 24 (bottom left): Courtesy of Hewlett-Packard; p. 24 (bottom right): Courtesy of Hewlett-Packard; p. 24 (middle left): Courtesy of Intel; p. 24 (top): Courtesy of Motorola Corp. ; p. 28 (bottom left): Courtesy of Intel; p. 28 (bottom right): Don Mason/Corbis; p. 32 (bottom): Courtesy of Microsoft Corporation; p. 32 (bottom): Courtesy of Microsoft Corporation: p. 33 (bottom): Courtesy of Adobe Systems Inc.; p. 33 (top): Courtesy of Adobe Systems Inc.; p. 34: Shizuo Kambayashi/AP Images; p. 35: Courtesy of PR NewsFoto; p. 36: John Foxx/Getty Images; p. 37: Sean Gallup/Getty Images. Chapter 2 Page 49: Royalty-Free/Corbis; p. 56: Judy Mason; p. 57: Courtesy of DirectTV; p. 64: Elise Amendola/AP Images; p. 68: Richard Drew/ AP Images; p. 82: Courtesy of Research in Motion Ltd. Chapter 3 Page 129: Courtesy of Symantec; p. 140: Chris Farina/Corbis; p. 141 (top right): Courtesy of Microsoft; p. 142: Dan Lamont/Corbis; p. 143 (bottom): Courtesy of Microsoft Corporation; p. 143 (middle): Courtesy of Microsoft Corporation: p. 143 (top): Courtesy of Microsoft Corporation; p. 148 (left): Courtesy of Palm; p. 149 (left): Courtesy of Hewlett-Packard; p. 149 (right): Courtesy of Socket Mobile; p. 163: Peter Beck/Corbis; p. 175: Tom Wagner. Chapter 4 Page193: Courtesy of Apple Computer; p. 195: Courtesy of IBM Archives; p. 196: Courtesy of Intel; p. 197 (bottom right): Courtesy of Intel; p. 197 (left): Courtesy of Intel; p. 197 (top right): Courtesy of Intel; p. 204: Courtesy of www.apc.com; p. 206 (bottom): Courtesy of Apple; p. 206 (top): Courtesy of www.apc.com; p. 207 (bottom): Courtesy of AMD; p. 207 (middle): Courtesy of Intel; p. 207 (top): Courtesy of Intel; p. 208 (bottom): Courtesy of Intel; p. 208 (middle): Courtesy of Motorola; p. 208 (top): Courtesy of Dell Computing; p. 214 (bottom): Courtesy of Intel; p. 214 (top): Courtesy of Intel; p. 217 (bottom): Suzie Ross/McGraw-Hill; p. 217 (top): Courtesy of Hewlett-Packard; p. 219 (bottom): Courtesy of Hewlett-Packard; p. 219 (top): Courtesy of Adaptec; p. 220 (bottom): Courtesy of Hewlett-Packard; p. 220 (top): Courtesy of Hewlett-Packard; p. 221: Brian Williams; p. 223: Courtesy of Hewlett-Packard; p. 224: Royalty-Free/Corbis; p. 226 (bottom): Courtesy of IBM; p. 226 (top): Courtesy of IBM; p. 227: Courtesy of Apple Computer; p. 228: Jeffrey Coolidge/PhotoDisc/Getty Images; p. 229: Brian Williams; p. 230 (bottom): Courtesy of Samsung; p. 230 (top): YOSHIKAZU TSUNO/AFP/Getty Images; p. 232 (bottom): Courtesy of Hewlett-Packard; p. 232 (top): Courtesy of Hewlett-Packard; p. 233: Kat- sumi Kasahara/AP Images; p. 234 (bottom): Fabian Bimmer/AP Images; p. 234 (middle): Tony Cenicola/New York Times/Redux Pictures; p. 235: Courtesy of Corsair; p. 238 (bottom): Frank Franklin II/AP Images; p. 238 (middle): Courtesy of Nokia; p. 238 (top): Kurt Stier/Corbis. Chapter 5 Page 253: Courtesy of Intermec Technologies; p. 254 (left): Najlah Feanny/Corbis; p. 254 (right): Jon Freilich/AP Images; p. 257 (bot- tom): Jochen Luebke/AFP/Getty Images; p. 257 (middle): Courtesy of Microsoft; p. 257 (top left): Judy Mason; p. 258 (bottom right): John Slater/Taxi/Getty Images; p. 258 (left): Ryan McVay/Getty Images; p. 258 (top right): Peter Cade/Getty Images; p. 259 (bottom left): Courtesy of Think Outside; p. 259 (bottom right): Courtesy of Ed Loera/FrogPad.com; p. 259 (top): Courtesy of QSI Corporation; p. 261 (top middle): Judy Mason; p. 261 (top right): Courtesy of Logitech; p. 262: Courtesy of Logitech; p. 263 (bottom left): Courtesy of Motion Computing; p. 263 (bottom right): Joe Gill/The Express Times/AP Images; p. 263 (middle): Courtesy of Hewlett Packard; p. 263 (top): Courtesy of IBM; p. 264 (top left): Shell Oil/AP Images; p. 264 (top right): Rich Pedroncelli/AP Images; p. 265 (left): Courtesy of Acer; p. 265 (right): Courtesy of Axiotron; p. 266 (bottom): Courtesy of Livescribe Inc.; p. 266 (left): Courtesy of Wacom Technology; p. 266 (top): Ed Kashi/Corbis; p. 267: Courtesy of Leapfrog Enterprises; p. 268 (left): Christopher Fitzgerald/The Image Works; p. 268 (right): Wenatchee World, Mike Bonnicksen/AP Images; p. 270 (bottom): Courtesy of NCR Corporation; p. 270 (top): Courtesy of Intermec Technologies; p. 271 (left): Courtesy of 3D Scanners Ltd./www.3dscanners.com; p. 271 (right): Courtesy of 3D Scanners Ltd./ www.3dscanners.com; p. 272 (bottom): Courtesy of Symbol Technology; p. 273 (bottom): Courtesy of Sony Ericcson; p. 273 (middle): Courtesy of IBM; p. 273 (top): Courtesy of Hewlett-Packard; p. 274 (left): Courtesy of Hewlett-Packard; p. 274 (right): Left Lane Pro- ductions/Corbis; p. 276 (bottom left): Courtesy of Sony Ericcson; p. 276 (bottom right): Courtesy of Samsung; p. 276 (middle): Courtesy of Hewlett-Packard; p. 276 (top): Courtesy of Hewlett-Packard; p. 278 (left): William Thomas Cain/Getty Images; p. 278 (right): CP/ Aaron Harris/AP Images; p. 279 (left): Gilles Mingasson/Getty Images; p. 279 (middle): Gilles Mingasson/Getty Images; p. 279 (right): Courtesy of Texas Instruments; p. 280 (left): Michael Probst/AP Images; p. 280 (right): Courtesy of Identix; p. 281: Tony Cenicola/New York Times/Redux Pictures; p. 282: Courtesy of Hewlett-Packard; p. 284: Courtesy of Hewlett-Packard; p. 285: Courtesy of Xerox Corp; p. 287: Courtesy of Hewlett-Packard; p. 288 (bottom): Courtesy of JCM American Corporation/PRNewsFoto; p. 288 (middle): Barry Batchelor/PA Wire/AP Images; p. 288 (top left): Peter Thompson/New York Times/ Redux Pictures; p. 288 (top right): Peter Thompson/ New York Times/ Redux Pictures; p. 289: Courtesy of Sony Corporation; p. 290 (bottom): Steven Senne/AP Images; p. 290 (middle): Courtesy of Hewlett-Packard; p. 290 (top): Courtesy of Hewlett-Packard; p. 295 (bottom): Richard T.Nowitz/Corbis; p. 295 (top): Owen Franken/Corbis; p. 296: Courtesy of Micron; p. 297 (bottom): Courtesy of Tobii Technology; p. 297 (middle): Rick Friedman/Corbis; p. 297 (top): Dr.Irfan Essa/Georgia Tech; p. 298: Courtesy of E-Ink Corp. and L.G.Phillips.
  576. 558 Credits Chapter 6 Page 309 (left): HO/AP Images; p.

    309 (right): Pallava Bagla/Corbis; p. 316: Fievet Laurent/AFP/Getty Images; p. 324: PETER FOLEY/ epa/Corbis; p. 325 (bottom): Eric Myer/Getty Images; p. 325 (middle): Ed Degginger/Getty Images; p. 325 (top): Corbis; p. 326: Steve Allen/Brand X Pictures/Corbis; p. 327: Pallava Bagla/Corbis; p. 330 (left): Bob Rowan;Progressive Image/Corbis; p. 330 (right): Brian Williams; p. 331 (bottom left): Pallava Bagla/Corbis; p. 331 (bottom right): HO/AP Images; p. 331 (middle): Olivier Prevosto/Corbis; p. 331 (top): Liu Liqun/Corbis; p. 333 (bottom left): Najtah Feanny/Corbis; p. 333 (bottom right): Courtesy of White Bear Technologies; p. 333 (bottom right): Courtesy of White Bear Technologies; p. 333 (top): Courtesy of Pulse Data; p. 335 (bottom): Courtesy of Research in Motion Ltd.; p. 335 (middle): Corbis; p. 335 (top): James Leynse/Corbis; p. 336: Judy Mason; p. 338: Courtesy of Kodak; p. 339: Courtesy of IBM; p. 347: Courtesy of Symantec; p. 348: Chad Hunt/Corbis; p. 351: Chris Hondros/Getty Images. Chapter 7 Page 361: Peter Kramer/Getty Images; p. 362: Lee Jin-man/AP Images; p. 363: Shizuo Kambayashi/AP Images; p. 364 (bottom): Cour- tesy of Apple Computer; p. 364 (top): Courtesy of Apple Computer; p. 366 (bottom): Courtesy of Creative Technology Ltd.; p. 366 (top): Courtesy of Creative Technology Ltd.; p. 367 (bottom): Reed Saxon/AP Images; p. 367 (top): Martin Meissner/AP Images; p. 369: Courtesy of Sirius/PRNewsFoto/NewsCom; p. 372: Courtesy of Apple Computer; p. 374 (bottom): Eric Risberg/AP Images; p. 374 (top): Courtesy of Hewlett-Packard; p. 379 (bottom): Courtesy of Peek; p. 379 (top): Courtesy of Palm Inc.; p. 380: Courtesy of Panasonic; p. 380: Courtesy of Panasonic; p. 380: Courtesy of Panasonic; p. 383: Courtesy of Sling Media; p. 383: Courtesy of Sling Media; p. 383: Courtesy of Sling Media; p. 384 (left): Courtesy of Amazon.com; p. 384 (right): Courtesy of Sony Corp.; p. 386: Courtesy of Apple Com- puter; p. 387: PNC/Getty Images; p. 389: Courtesy of PRNewsFoto; p. 390: StockByte/PunchStock; p. 392: Peter Kramer/Getty Images; p. 393 (top): David McNew/Getty Images. Chapter 8 Page 401: NOAA/Reuters/Corbis; p. 402: Courtesy of Identix; p. 403: Noboru Hashimoto/Corbis; p. 416 (bottom): Corbis; p. 416 (top): Charlie Westerman/Getty Images; p. 417 (left): Courtesy of TECHBASE International; p. 417 (right): NOAA/Reuters/Corbis; p. 422: Brian Williams; p. 437 (bottom left): Courtesy of Bernard Frischer of Virginia’s Institute for Advanced Technology in the Humanities/ AP Images; p. 437 (bottom right): Bob Mahoney/The Image Works; p. 437 (middle right): Ted S. Warren/AP Images; p. 437 (top left): M. Spencer Green/AP Images; p. 437 (top right): AP Images; p. 439 (bottom left): Jodi Hilton/New York Times/ Redux Pictures; p. 439 (bot- tom right): Shizuo Kambayashi/AP Images; p. 439 (middle left): Lisa Poole/AP Images; p. 439 (middle right): Mike Derer/AP Images; p. 439 (top left): Bertil Ericson/AP Images; p. 439 (top middle): Brett Coomer/AP Images; p. 439 (top right): Kim Jae-Hwan/AFP/Getty Images; p. 442 (bottom right): Tetra Images/Getty Images; p. 442 (top): AFP/Getty Images; p. 443: Science Museum/SSPL/ The Image Works. Chapter 9 Page 457 (bottom left): LWA-Sharie Kennedy/Corbis; p. 457 (bottom right): J.W.Burkey/Getty Images; p. 457 (top): Bob Elsdale/Getty Images; p. 458: HARISH TYAGI/epa/Corbis; p. 459: Bob Elsdale/Getty Images; p. 460 (bottom): Courtesy of Troels Eklund Andersen; p. 460 (middle): MedicalRf.com/Getty Images; p. 460 (top): J.W.Burkey/Getty Images; p. 465: Brian Williams; p. 470: Michael Kooren/ Reuters/Corbis; p. 474 (left): Ricki Rosen/Corbis; p. 474 (right): Tony Cenicola/New York Times/ Redux Pictures; p. 475: MANDEL NGAN/AFP/Getty Images; p. 476: Uriel Sinai/Getty Images; p. 477: Gabe Palmer/Corbis; p. 478 (bottom): Courtesy of Dell Computer; p. 478 (top): Courtesy of Larson, a DMB Company; p. 479: LWA-Sharie Kennedy/Corbis; p. 485: David M.Russell; p. 486: MANDEL NGAN/AFP/Getty Images. Chapter 10 Page 491 (bottom left): Digital Vision/Getty Images; p. 491 (bottom right): Comstock/PictureQuest; p. 491 (top left): Comstock/Picture- Quest; p. 491 (top right): Photodisc/Getty Images; p. 493: PhotoDisc/Getty Images; p. 494: Comstock/PictureQuest; p. 495: Photodisc/ Getty Images; p. 496: Photodisc/Getty Images; p. 497: Photodisc/Getty Images; p. 498: Photodisc/Getty Images; p. 499: Image Source/ PunchStock; p. 500: Ryan McVay/Getty Images; p. 502: Eric Audras/Photoalto/PictureQuest; p. 507: fStop/Getty Images; p. 508: Pho- toDisc/Getty Images; p. 509: Digital Vision/Getty Images.
  577. Index 559 Index IT timeline and, 166–173 licenses for, 150–151

    methods for obtaining, 150–152 multimedia authoring software, 176 painting programs, 174 presentation graphics software, 168–170 project management software, 178–179 review questions/exercises on, 189–192 specialty software, 167–181 spreadsheet programs, 161–163 tech support for, 182–183 tutorials for, 152 types of, 154–155 versions and releases of, 151 video editing software, 175 web page design/authoring software, 176–178 word processing software, 155–161 Application virtualization, 237 Archival copy, 150 Arendt, Hannah, 310 Arithmetic/logic unit (ALU), 212, 244 Arithmetic operations, 212 ARPANET, 50 Artifacts, 175 Artificial intelligence (AI), 433–444, 450, 516 cyborgs, 441 ethics of, 443–444 expert systems, 434–435 fuzzy logic, 436 genetic algorithms, 441 intelligent agents, 436 natural language processing, 435 neural networks, 441 pattern recognition, 436 review questions/exercises on, 452–455 robotics, 438–439 simulators, 438 Turing test and, 442–443 virtual reality, 436–438 weak vs. strong, 440 Artificial life (A-life), 442 Art programs, 174–175 ASCII coding scheme, 201, 202, 244 ASCII files, 406 Aspect ratio, 381 Assemblers, 513, 528 Assembly language, 512–513, 528 ATMs (automated teller machines), 254, 258, 473 Attachments, email, 85–87, 342, 344 Attentive systems, 297 Auctions, online, 97–98 Audio digital sampling of, 315 directed, 298 editing software for, 175 input, 273 MP3 format, 366 output, 290–291 search tools for, 78 streaming, 95 web-based, 78, 95 Audio CDs, 315 Audioconferencing, 352 Audio files, 405, 406 Audio-input devices, 273, 302 Audio spotlight, 298 Boldface page numbers indicate pages on which key terms are defined. A Abandonware, 152 Accelerator board, 221 Accelerometer, 296 Access points, 58, 108, 338 Access security biometrics and, 474 control of access and, 475 techniques used for, 473–474 Accounting and finance department, 427 Acronyms, 39 Acrostics, 39 Active-matrix display, 283, 302 Active pixel sensor, 296 Active RFID tags, 279 ActiveX controls, 525, 528 Addicts, internet, 484 Address-book feature, 83 Addresses email, 82–83 website, 65–67 Adware, 105, 108 Aerial maps, 94 Agents, 74 Aggregator software, 371 AGP (accelerated graphics port) bus, 222, 244 Algorithms, 419, 501, 528, 533 Alpha testing, 508 “Always On” generation, 2, 393, 394 Amazon.com, 422–423 American Psychological Association (APA), 484 Amplitude modulation, 314 Analog cellphones, 336–337, 353 Analog signals, 312, 353 converting into digital signals, 315 modem conversion of, 313–314 Analog-to-digital converter, 315 Analytical graphics, 163, 184 Analyzing systems. See Systems analysis Anderson, Keith J., 484 Andreesen, Marc, 68 Animation, 9–10, 94, 108, 175, 184 Animation files, 405 Animation software, 175–176 Anonymous FTP sites, 88 ANSI symbols, 504 Antivirus software, 128, 344, 345, 347, 353 Appeal-to-authority argument, 527 Appeal-to-pity argument, 527 Applets, 93–94, 108, 521 Application generator, 514 Application service providers (ASPs), 152 Application software, 33, 41, 120, 150–181, 184 animation software, 175–176 audio editing software, 175 computer-aided design programs, 180–181 database software, 164–167 desktop publishing programs, 172–174 documentation for, 152–152 drawing programs, 174 file types and, 153 financial software, 170–172
  578. 560 Index Browser hijackers, 105–106, 108 Browser software. See Web

    browsers Brute force technique, 440 BSD operating system, 146 Buffer, 124 Bugs, software, 464 Bull, Michael, 368 Bursting, 216 Buses, 213, 222–223, 244 Business, online, 97–98, 421–425 See also E-commerce Business graphics, 163 Business-to-business (B2B) systems, 424, 450 Business-to-consumer (B2C) systems, 425, 450 Business webs (b-webs), 424 Bus network, 322–323, 353 Buying considerations for flat-panel TVs, 382 for laptop computers, 242–243 for personal computers, 198, 199 for printers, 289 Bytes, 30, 200, 244 C C programming language, 515, 519 Cϩϩ programming language, 521 Cable modems, 56–57, 59, 108 Cache, 215, 244 Cache card, 221 CAD programs, 180–181, 184 CAD/CAM programs, 180 Callback systems, 473–474 Caller ID, 364, 395 Call waiting, 53 Camera phones, 276, 389 Cameras. See Digital cameras Campus-area networks, 317 Cancer detection, 420 Canton, James, 240 Cantu, Homaro, 288 Capek, Karel, 438 Captchas, 443 Career information, 11–13 See also Job searches Carpal tunnel syndrome (CTS), 292, 302 Carrier waves, 312 Carty, Betty, 468 Cascading menus, 134 Case (system cabinet), 28, 41, 202–204 Case control structure, 504, 506 CASE tools, 495–496, 528 CD drive, 31, 41 CD-R disks, 229, 244 CD-ROM disks, 228–229, 244 CD-ROM drive, 229 CD-RW disks, 229, 244 Cell pointer, 162 Cells, spreadsheet, 161, 184 Cellular radio, 331, 353 Cellular telephones, 14–15, 335–337 analog, 336–337 broadband, 337 digital, 337 E-911 capability, 333, 335 health issues and, 293 how they work, 386 keeping track of, 465 recycling, 477 services and features, 386–391 smartphones as, 15, 385–391 societal effects of, 391 viruses on, 344–345 Central processing unit (CPU), 26, 28, 211–213, 245 internal management of, 123–124 CGI (Common Gateway Interface), 525 Channel capacity, 52 Character-recognition devices, 271–272 Characters, 403, 450 Audit controls, 475 Augmented reality, 296 Authentication process, 62 Auto Correct function, 158 Automated teller machines (ATMs), 254, 258, 473 Automated virtual representatives (vReps), 433 Automator feature, 139 Avatars, 6, 41 B B2B (business-to-business) commerce, 97, 108 Backbone, 353 internet, 61, 322 network, 322 Backdoor programs, 344 Backups application software, 150 importance of, 229 Backup utility, 127 Backus, John, 516 Baig, Edward C., 182 Bandwidth, 52, 108, 329–330, 353 Banking, online, 97 Bar charts, 163 Bar-code readers, 269–271, 302 Bar codes, 269, 271, 302 Baseband transmission, 52 BASIC programming language, 515, 518 Batch processing, 430 Batteries digital camera, 375 future of, 239–240 laptop, 242 PDA, 379 portable media player, 367 Bays, 202, 204, 244 Berners-Lee, Tim, 64, 422, 522 Beta testing, 508 Bezos, Jeffrey, 422 Binary coding schemes, 201–202 Binary system, 199–202, 244, 311 Bing browser, 64 Biometric Mouse, 261 Biometrics, 280, 296, 302, 348, 350, 353, 474, 488 BIOS programs, 123 Bit depth, 268, 282 Bit-mapped images, 174 Bitmaps, 268 Bits (binary digits), 200, 244 Bits per second (bps), 52, 108 Blackberry devices, 335, 387 Black-hat hackers, 346 Blackmail, 468 Blocking software, 480 Blogosphere, 96, 108 Blogs, 92, 96, 108 Bloom, Benjamin, 44 Bluetooth technology, 220, 244, 331, 339, 353 Blu-ray Disc (BD), 230, 240, 244 Bookmarks, 71 Boolean operators, 79 Boot disk, 123 Booting, 122–123, 184 Boot-sector virus, 343 Border gateway protocol, 469 Botnet, 468, 488 Bots, 74, 436 Brainwave-input technology, 297 Brand, Stewart, 485 Breazeal, Cynthia, 439 Brenner, Viktor, 484 Bricklin, Daniel, 161 Bridges, 322, 353 Broadband connections, 52, 56, 108, 330, 353 Broadband wireless services, 337 Broadcast radio, 330–331, 353 Brooks, Cathy, 100 Brooks, Rodney, 440
  579. Index 561 Comprehension, 44 Compression, 407, 450 lossless vs. lossy,

    407 utility programs for, 128 video and audio, 175 Computer-aided design (CAD) programs, 180–181, 184 Computer-aided design/computer-aided manufacturing (CAD/CAM) programs, 180 Computer-aided software engineering (CASE) tools, 495–496, 528 Computer animation, 175 Computer Assisted Passenger Prescreening Program (CAPPS II), 445 Computer-based information systems, 429–433 decision support systems, 431–432 executive support systems, 432–433 expert systems, 433 management information systems, 430–431 office information systems, 429 review questions/exercises on, 452–453 transaction processing systems, 429–430 Computer crime, 465–470, 488 deterrents to, 472–473 perpetrators of, 469–470 types of, 465–469 Computer Emergency Response Team (CERT), 472 Computer Ethics (Forester and Morrison), 37 Computer operators, 509 Computers, 4, 41 basic operations of, 26 crimes related to, 465–470, 472–473 custom-built, 25, 26–27, 33–34 digital basis of, 311 environmental issues related to, 476–478 guarding against theft, 300 hardware of, 25, 28–32 health issues related to, 291–294, 300–301 recycling, 37, 477 software of, 25, 32–33 student use of, 487 types of, 20–24 See also Personal computers Computer savvy, 3–4, 41 Computer-supported cooperative work (CSCW) systems, 428 Computer technology, 4 contemporary examples of, 5–13 future developments in, 235–241 overview of developments in, 34 publications about, 198 timeline of progress in, 14–22, 310–313 See also Information technology Computer vision syndrome (CVS), 293, 302 Concentration, 38 Concurrent-use license, 150 Connectivity, 35, 41 Consumer-to-consumer (C2C) systems, 425, 450 Contactless smart cards, 233 Contact smart cards, 233 Content templates, 168 Context-sensitive help, 137 Control structures, 501, 504, 506, 528 Control unit, 212, 245 Convergence, 35–36, 362–363, 395 Conversion audio file, 367 signal, 313–314 system, 498–499 Cookies, 104–105, 108 Coprocessor board, 221 Copy command, 157 Copyright, 150 Cornish, Edward, 486 Corporate spies, 470 Cost-benefit analysis, 458 Counterterrorism, 421 Course-management software, 6, 41 CPU. See Central processing unit Crackers, 346, 354 Charge-coupled devices (CCDs), 275 Charts, 163 Cheating, 107 Children, protecting, 479–482 Chips, 196, 244 CMOS, 215 flash memory, 215 making of, 197 memory, 213–215 microprocessor, 196, 206–209 RAM, 213–214 ROM, 214–215 Chipsets, 207, 244 Circuit, 194 Circular reasoning, 527 Classes, 520–521 Classification analysis, 420 Classrooms, computer use in, 487 Clients, 24, 41, 60, 108 Client/server networks, 318, 319, 353 Clip art, 160, 170 Clipboard, 157 Clock speed, 209 Closed architecture, 221 Closed-circuit television, 352 Closing windows, 137 Cloud computing, 36, 37, 41 Clusters, 225 CMOS (complementary metal-oxide semiconductor) chips, 215, 244–245 Coaxial cable, 325–326, 353 COBOL programming language, 512, 513, 515, 517–518 Cochran, Anita, 459 Codd, E. F., 413 Codecs, 407 Coding, 507–508, 528 Cog project, 440 Cold boot, 123 Collaboration, 36 Color depth, 268, 282, 302 Column charts, 163 Columns spreadsheet, 161 text, 158 Command-driven interface, 131 Commands, 130 Comments, inserting, 160–161 Commerce, electronic. See E-commerce Commercial online services, 58 Commercial software, 150–151 Communications, 26, 27 Communications hardware, 32 Communications media, 325, 354 wired, 325–326 wireless, 328–341 Communications satellites, 57, 59, 108, 331–332, 354 Communications technology, 4–5, 41, 309–359 bandwidth and, 329–330 cellular telephones, 335–337 contemporary examples of, 5–13 electromagnetic spectrum and, 328–329 Global Positioning System, 333–335 networks, 315–325 overview of developments in, 35 pagers, 335 radio-frequency spectrum and, 328–329 review questions/exercises on, 357–359 satellites and, 331–332 security issues and, 341–351 telecommuting and, 327 timeline of progress in, 14–22, 310–313 videoconferencing and, 352 virtual office and, 327 wired, 325–326 wireless, 328–341 workgroup computing and, 352 See also Information technology Compilers, 513, 528
  580. 562 Index Data files, 450 Data flow diagram (DFD), 495,

    528 Data integrity, 408 Data mining (DM), 418–421, 450 applications of, 420–421 process of, 418–420 Data-recovery utility, 127–128 Data redundancy, 408 Data scrubbing, 418 Data storage hierarchy, 403–404, 450 Data transmission speeds, 52 Data warehouse, 419, 450 Dating websites, 98 Davis, Lynn, 462 DBMS utilities, 410, 450–451 See also Database management system DDR-SDRAM chips, 214 Debugging programs, 508, 528 Decentralized organizations, 428 Decision making computer-based information systems for, 431–432 make-or-buy decisions, 497 management levels and, 428 Decision support system (DSS), 431–432, 451 Dedicated fax machines, 272–273 Dedicated ports, 217 Deep knowledge, 434 Default settings, 160, 184 Defragmenter, 128 Deleting text, 156 Demaerschalk, Bart, 6 Demand reports, 431 Democracy, online, 10–11 Denial-of-service (DoS) attacks, 342, 354 Departments, organizational, 426–428 Design templates, 168 Desk-checking programs, 508, 528 Desktop, 132, 184 Desktop PCs, 23, 41 Desktop publishing (DTP), 172–174, 184 Desktop scanners, 268 Desktop search engines, 80 Detail design, 496–497 Developing information systems. See S ystems development Device drivers, 121, 126–127, 184 Diagnostic programs, 508 Diagnostic routines, 122–123 Dial-up connections, 53, 59, 108 Digital cameras, 274–276, 296, 302, 371–378 features of, 374–375 how they work, 275, 372 improvement of, 296 point-and-shoot, 372 resolution of, 373–374 sharing photos from, 377 single-lens reflex, 372–373, 396 societal effects of, 377–378 transferring images from, 376–377 video clips and, 376 warnings about, 276 Digital convergence, 310, 363 Digital divide, 485–486 Digital nagging device, 298 Digital natives, 2 Digital pens, 266–267, 302 Digital radio, 369 Digital sampling, 315 Digital signals, 311, 354 converting analog signals into, 315 modem conversion of, 313–314 Digital subscriptions, 287 Digital television (DTV), 381, 395 Digital-to-analog converter, 315 Digital wireless services, 337, 354 Digital zoom, 374 Digitizers, 265–266, 302 Digitizing tablets, 266, 302 Dillard, Mark, 352 Cramming, 38 Crawlers, 74 Creating documents, 156 Credit bureaus, 448, 449 Crichton, Michael, 240 Critical thinking, 44, 527, 532–533 CRITIC guidelines, 78 Crosstalk, 325 CRT (cathode-ray tube), 283, 302 Cunningham, Ward, 77 Cursor, 156, 184 Custom-built PCs, 25, 26–27, 33–34 Custom software, 152 Cut command, 157 Cyberbullying, 481–482 Cyberspace, 18, 41 Cyberterrorists, 347 Cyberwarfare, 470, 472, 488 Cyborgs, 441 Cycles, 209 Cyc project, 440 D Daisy chains, 218 Dashboard feature, 139 Data, 25, 41 accuracy of, 461–462 analyzing, 166, 495–496 backing up, 127, 236 completeness of, 461–462 compressing, 128 digital vs. analog, 311–312 gathering, 494 hierarchical organization of, 403–404 importing and exporting, 153–154 longevity of, 409 manipulation of, 459–461 permanent storage of, 26, 30–31 privacy issues and, 444–446 protecting, 300, 475 recovering, 227 Data access area, 225 Database administrator (DBA), 410, 450 Database files, 153 Database management system (DBMS), 407–410, 450 advantages of, 408 components of, 408–410 Databases, 164, 184, 402–433, 450 accuracy of information on, 461–462 components of, 408–410 data mining and, 418–421 data storage hierarchy and, 403–404 decision-making process and, 425–433 e-commerce and, 421, 422–425 ethical issues related to, 444–447 file types and, 405–406 hierarchical, 410–411 identity theft and, 448 IT timeline and, 410–414 key field in, 404–405 management systems for, 407–410 multidimensional, 416, 417–418 network, 411–412 object-oriented, 416 privacy issues and, 444–446 querying, 414–416 relational, 164–165, 413–416 review questions/exercises on, 452–455 security of, 408 Database servers, 318 Database software, 164–167, 184 benefits of, 164 features of, 164–166 illustrated overview of, 165 personal information managers, 166–167 Data cleansing, 418 Data compression utilities, 128 Data dictionary, 409, 450
  581. Index 563 plagiarism issues and, 107 software for, 154 See

    also Learning EIDE controllers, 227 Einstein, David, 25, 33, 374 E-learning, 6 Electrical power issues, 204–206 Electromagnetic fields (EMFs), 293, 303 Electromagnetic spectrum, 328–329, 354 Electromechanical problems, 464 Electronic imaging, 267 Electronic Monitoring & Surveillance Survey, 470 Electronic paper, 384 Electronic spreadsheets. See Spreadsheets Electronic surveillance, 473 Electrostatic plotters, 290 Email (electronic mail), 5, 15–16, 41, 81–87 addresses, 82–83 attachments, 85–87, 342, 344 fake, 104 filters for, 85 hoax virus warnings, 343 how to use, 82–83 instant messaging and, 87 junk, 102–103 mailing lists, 89–90 mobile devices for, 82 netiquette, 90–91 privacy issues, 102 remote access to, 87 replying to, 83, 84 sending and receiving, 82, 84 software and services, 82 sorting, 83, 85 tips on managing, 17 viruses passed via, 87 web-based, 82 wireless, 387–389 Email program, 82, 109 Embedded systems, 148 Emoticons, 91 Emotion-recognition devices, 296–297 Employee crime, 469–470 Employee internet management (EIM) software, 473 Employee monitoring, 471 Employment computer training and, 11–12 contemporary changes in, 483, 485 online resources for, 12–13 technology issues and, 471 See also Job searches Emulator board, 221 Encapsulation, 520 Encryption, 350–351, 354, 474–475, 488 Enhanced-relational databases, 416 ENIAC computer, 14, 194–195, 211 Enough: Staying Human in an Engineered Age (McKibben), 483 Entertainment software, 154 Environmental problems, 476–478 Environmental Protection Agency (EPA), 293, 417, 476, 477 Erasable optical disk, 229 Erasable paper, 298 Ergonomics, 294, 300–301, 303 Errors human, 463 procedural, 463–464 software, 464 E-tailing, 423 Ethernet, 220, 245, 324, 326, 354 Ethics, 37, 42 artificial intelligence and, 443–444 information accuracy and, 461–462 media manipulation and, 459–461 nanotechnology and, 240 plagiarism and, 107 privacy and, 102, 444–446 RFID tags and, 280 DIMMs, 214 Directed-sound technology, 298 Direct implementation, 498 Dirty data problems, 464 Disabled computer users, 295, 297 Disaster-recovery plans, 475–476, 488 Disk cleanup utility, 128 Disk controller card, 221 Diskettes, 224–225 Disk scanner utility, 128 Display screens, 281–285, 302 future developments in, 298 health issues related to, 293–294, 300 laptop computer, 243 touch screens, 263–264 Distance learning, 6, 41 DNA computing, 238–239 Documentation, 152–153, 509, 528 Document files, 153 creating, 156 editing, 156–158 formatting, 158–160 illustrated overview of, 157 inserting comments into, 160–161 printing, 160 saving, 160 toggling between, 160 tracking changes in, 160–161 web, 160 Document Type Definition (DTD), 524 Domain names, 63, 67, 83 Domains, 66, 83, 108 DOS (Disk Operating System), 138, 184–185 Dot-matrix printers, 285 Dot pitch (dp), 282, 302 Dots per inch (dpi), 269, 282, 285, 302 Dotted quad, 62 Downlinking, 331 Downloading, 9, 41, 53, 108 Draft quality output, 285 DRAM chips, 214 Drawing programs, 174 Drive bays, 202 Drive gate, 225 Drivers. See Device drivers Drone computers, 468 Drop-down menu, 134 Drum scanners, 269 DSL (digital subscriber line), 55–56, 57, 59, 108 Dumb terminal, 258, 302–303 Dunham, Shannon, 387 DuraPoint Mouse, 262 DVD drive, 31 DVD filters, 480 DVD-R disks, 230, 245 DVD-ROM disks, 229–230, 245 DVD zones, 230–231 Dvorak, John, 480 Dynamic IP address, 62 E E-911 (Enhanced 911), 333, 335 EBCDIC coding scheme, 201–202, 245 E-book readers, 383–385, 395 benefits of, 384–385 drawbacks of, 385 how they work, 383–384 E-books, 383, 395 E-business, 421 E-commerce (electronic commerce), 97–98, 108, 421, 422–425, 451 examples of, 422–423 systems for, 424–425 Economic issues, 484–486 Editing documents, 156–158 Education distance learning and, 6 information technology and, 5–6
  582. 564 Index Floppy-disk drive, 30 Floppy disks, 224–225 Flops, 21,

    210, 245 Flowcharts, 501, 502, 504, 505 Focusing, 38 Foldable PDA keyboards, 259 Folders, 124, 132 Fonts, 158 Food and Drug Administration (FDA), 280 Footers, 159 Foreign keys, 165 Forester, Tom, 37 Formatting documents, 158–160 hard drives, 236 Formulas, 162, 166, 185 FORTRAN programming language, 515, 516–517 Fourth-generation (4G) technology, 337 Fourth-generation languages (4GLs), 514 Fragmentation, 128 Frame-grabber video card, 274 Frames, 72, 109 Fraud internet, 467–468 workplace, 471 Freedman, Alan, 520 Freedom of Information Act (1970), 446 Freeware, 151–152, 185 Frequency modem technology and, 314 radio signals and, 329 Frequency modulation, 314 Fridrich, Jessica, 461 Friedman, Thomas, 486 Frontside bus, 222 FTP (File Transfer Protocol), 88, 109 Full-duplex transmission, 321 Full-hand palm scanners, 350 Full-motion video card, 274 Function keys, 130, 185 Functions, 162, 185 Fuzzy logic, 436, 451 G Gambling, online, 479, 484 Games online game players, 259 smartphone, 389 videogame systems, 391–393 Garden area networks, 318 Gates, Bill, 140 Gateways, 322, 354 Generations of programming languages, 510–511, 528 Genetic algorithms, 441 Genetic programming, 525 Genographic Project, 402 Geocaching, 334–335 Geographic information system (GIS), 432 Geostationary earth orbit (GEO), 332 Geschke, Charles, 172 Gesture recognition, 296 Giardello, Justine Heinze, 487 Gibson, William, 18 GIF animation, 175–176 Gigabit Ethernet, 324 Gigabits per second (Gbps), 52, 109 Gigabyte (G, GB), 30, 200, 245 Gigahertz (GHz), 28, 209, 245 Gilliam, Harold, 458 Gillmor, Dan, 483 Global Positioning System (GPS), 332, 333–335, 354, 379 Gomes, Lee, 92 Google, 79–80, 178, 326, 402, 421 Google Chrome, 64, 147 Google Earth, 94 Google Scholar, 79 Government domestic spying by, 445 Ethics in Modeling (Wallace), 443 Event-driven program, 522 Evil Twin attack, 468, 488 Exabyte (EB), 201, 245 Exception reports, 431 Executable files, 405 Executive information system (EIS), 432–433 Executive support system (ESS), 432–433, 451 Expansion, 206, 221, 245 Expansion buses, 222–223 Expansion cards, 221–223, 245 Expansion slots, 29, 42, 221, 222, 245 Expert systems, 433, 434–435, 451 Exporting data, 154, 185 Extensible markup language (XML), 96, 113, 523–524, 531 Extension names, 405 External cache, 215 External hard disks, 226–227 Extranets, 319–320, 354 Eye-gaze technology, 297 Eyestrain, 293, 300 F Face-recognition systems, 350 Fader, Peter, 385 Fair and Accurate Credit Transactions Act (2003), 471 Fake email, 104 False cause argument, 527 FAQs (frequently asked questions), 91, 109 Farid, Hany, 461 Fast Ethernet, 324 Favorites, 71 Fax machines, 272–273, 303 Fax modems, 221, 273 Feathering, 287 Federal Communications Commission (FCC), 293, 329, 369, 381 Fiber-optic cable, 326, 354 Fibre Channel controllers, 227 Fields, 164, 403, 451 Filenames, 405, 451 File-processing system, 407 Files, 124, 185, 404, 451 backing up, 127 compressing, 407 converting, 498–499 data, 405–406 exporting, 154 graphics, 174–175 importing, 153–154 managing, 124–125 program, 405 transferring, 367, 376–377, 379 types of, 153, 405–406 File servers, 318 File virus, 343 Film making, 9–10 Filo, David, 362 Filters email, 85 spam, 103 Finance, online, 8–9, 97 Financial software, 170–172, 185 Find command, 156 Fingerprint scanners, 350 Firewalls, 347, 354 FireWire, 220, 245 First-generation (1G) technology, 336–337 Fixed disks, 226 Flaming, 91, 109 Flash memory, 234–235, 366–367 Flash memory cards, 234, 245, 374–375 Flash memory chips, 215, 245 Flash memory drive, 235, 245 Flash memory sticks, 234–235, 245 Flatbed scanners, 269, 303 Flat-panel displays, 283, 303 Flat-panel TVs, 382
  583. Index 565 Hawkins, Jeff, 148 Headaches, 293, 300 Head crash,

    226 Headers, 159 Head-mounted display, 438 Health issues computer use and, 291–294, 300–301 data mining and, 421 medical technology and, 6–7 online information about, 7 storing data about, 410 Help command, 137, 185 Help programs, 183 Hepatic systems, 295 Herberman, Ronald, 293 Hertz (Hz), 282, 329 Hertz, Heinrich Rudolf, 282 Hierarchical databases, 410–411, 451 Hierarchy chart, 501, 502, 503, 528 High-definition (HD) radio, 369–371, 395 High-definition television (HDTV), 381, 395 High-density disks, 240–241 High-level programming languages, 507, 513–514, 515, 528 High-speed phone lines, 54–56 HIIDE scanner, 348 Hill, Orion E., 102 Hilton, Paris, 467 History list, 71 Hits, 74, 109 Hoax virus warnings, 343 Hof, Robert, 36 Home area networks (HANs), 317–318, 354–355 Home automation networks, 318, 338, 340–341, 355 Home entertainment centers, 363 Home page, 65, 69, 109 personalizing, 70 web portal, 72 HomePlug technology, 326, 355 HomePNA (HPNA) technology, 326, 355 Hopper, Grace Murray, 517 Host computer, 60, 320, 355 Hotspots, 58, 109 HTML (Hypertext Markup Language), 68, 109, 160, 523, 528 HTTP (HyperText Transfer Protocol), 66, 68, 109 Hubs, 321, 355 Human-biology input devices, 280 Human-centric computing, 296 Human-computer interaction (HCI), 120 Human errors, 463 Human resources department, 427–428 Hyperlinks, 68, 71 Hypermedia database, 416 Hypertext database, 416 Hypertext index, 72 Hypertext links, 68, 109, 523 Hypertext Markup Language (HTML), 68, 109, 160, 523, 528 HyperText Transfer Protocol (HTTP), 66, 68, 109 Hyperthreading, 209, 216 I IBIS Mobile Identification System, 402 ICANN (Internet Corporation for Assigned Names and N umbers), 63, 109 Icons, 132, 185 Identification systems, 348, 350 Identity theft, 446–447, 448–449, 451 IF-THEN-ELSE structure, 504, 506 Illustration software, 174–175 Image-editing software, 174 Image files search tools for, 77–78 transferring, 376–377 web-based, 77–78, 94 Imagery, 39 Impact printers, 285, 303 Implementing systems. See Systems implementation Importing data, 153–154, 185 Income gap, 485–486 information technology and, 10–11 privacy laws and, 445 GPS. See Global Positioning System Grady, John, 378 Grammar checker, 158, 159 Graphical user interface (GUI), 131–137, 185 Graphics analytical, 163 presentation, 168–170 Graphics cards, 221, 223, 246, 284 Graphics files, 174–175, 405, 406 Graphics processing unit (GPU), 209, 245–246 Greene, Alan, 7 Groupware, 155 Gunther, Judith Anne, 442–443 Gutenberg, Johannes, 409 H Hackers, 346, 354 Hacktivists, 346 Hadler, Gary, 501 Half-duplex transmission, 321 Hallowell, Edward, 484 Hamilton, Anita, 352 Hand-geometry systems, 350 Handheld computers, 23 operating systems for, 148–149 special keyboards for, 259 See also Personal digital assistants Handheld scanners, 268, 269 Handshaking process, 62, 320 Handwriting recognition, 264–265, 303 Hardcopy output, 281, 303 Hard-disk cartridges, 227 Hard-disk controller, 227 Hard-disk drive, 30, 42 Hard disks, 225–227, 246 crashing of, 226 defragmenting, 128 external, 226–227 future developments in, 240–241 large computer system, 227 nonremovable, 226 portable media player, 366 removable, 227 starting over with, 236 Hard goods, 97 Hardware, 25, 28–32, 42, 193–251 buying, 198, 199 cache, 215 communications, 32 computer case, 202–204 converting, 498–499 CPU, 211–213 ergonomics and, 294, 300–301 expansion cards, 221–223 future developments in, 235–241, 294–299 health issues related to, 291–294, 300–301 input, 28, 255, 256–280 IT timeline and, 196–206, 260–266 memory, 28–29, 213–215 microchips, 196, 197 miniaturization of, 196 mobility of, 196, 198 motherboard, 206, 207 obtaining for systems, 497 output, 31–32, 255, 280–291 ports, 216–220 power supply, 204 processing, 28–29, 206–209 protecting, 300 review questions/exercises on, 249–251, 306–308 secondary storage, 30–31, 224–235 system unit, 202–204 theft of, 465 transistors, 195 Harmer, Brian, 328 Hasty generalization, 527
  584. 566 Index Interactive TV, 380, 395 Interactivity, 35, 42, 71

    Interfaces, 120 Interleaving, 216 Internal cache, 215 International Telecommunications Union (ITU), 329 Internet, 18, 42, 49–117 addiction to, 484 attacks on, 469 bandwidth and, 52 blogs on, 96 business conducted on, 97–98 cellphone access to, 389 citing sources from, 78 college students and, 19–20 discussion groups, 89–90 distance learning via, 6 domain abbreviations on, 67 email and, 81–87 evaluating information on, 74, 77, 78 examples of uses for, 51 fraud on, 467–468 FTP sites on, 88 government resources on, 10–11 historical emergence of, 50–56 how it works, 60–63 influence of, 19 intrusiveness of, 102–106 ISPs and, 58, 60 job searching on, 12–13 netiquette, 90–91 newsgroups on, 89 personal computing and, 2 physical connections to, 52–58, 59 plagiarism issues, 107 programming for, 522–526 protocol used on, 62 real-time chat on, 90 regulation of, 63, 486 review questions/exercises on, 113–117 telephone calls via, 92–93 tips for searching, 79 workplace issues and, 471 See also World Wide Web Internet2, 62, 109 Internet access providers, 53, 109 Internet backbone, 61, 109 Internet Corporation for Assigned Names and Numbers (ICANN), 63, 109 Internet Crime Complaint Center, 467 Internet Explorer, 64, 65 Internet filtering software, 473 Internet Message Access Protocol (IMAP), 81 Internet Protocol (IP) address, 62–63, 109 Internet Protocol Television (IPTV), 382–383, 395 Internet radio, 371 Internet-ready TV, 380–381, 395 Internet Service Providers (ISPs), 58, 60, 110 comparison shopping for, 58 questions to ask of, 60 Internet Society (ISOC), 63 Internet telephony, 92–93, 110 Internet terminal, 259, 303 Internet Traffic Report, 62 Internet TV, 259, 380, 395 Interpreters, 513–514, 529 Intranets, 319, 355 iPods, 364, 366–368 how they work, 366–367 societal effects of, 368 using in college, 368 IPTV (Internet Protocol Television), 382–383, 395 IrDA ports, 220, 246 Iris-recognition systems, 350 Irrelevant attack, 527 Irrelevant reason, 527 ISDN (Integrated Services Digital Network), 55, 59, 110 Individual search engines, 74–75, 109 Inference engine, 435 Info-mania, 479 Information, 25, 42 accuracy of, 461–462 completeness of, 461–462 evaluation of, 77, 78 flow within organizations, 426–428 manipulation of, 459–461 privacy issues and, 444–446 qualities of good, 425–426 theft of, 467 See also Data Information overload, 483 Information systems. See Computer-based information systems Information technology (IT), 4, 42 business and, 9 contemporary trends in, 34–37 crime related to, 465–470, 472–473 economic issues and, 484–486 education and, 5–6 employment resources and, 12–13 entertainment industry and, 9–10 ethics and, 37 finances and, 8–9 government and, 10–11 health/medicine and, 6–7 innovations in, 2 jobs/careers and, 11–13 leisure and, 9–10 modern examples of, 5–13 quality-of-life issues and, 476–483 security issues and, 462–476 timeline of progress in, 14–22 See also Communications technology; Computer technology Infrared wireless transmission, 330, 355 Inheritance, 520–521 Inkjet printers, 286–288, 303 Input, 26, 27, 42, 255 Input hardware, 28, 255, 256–280, 303 audio-input devices, 273 digital cameras, 274–276 digital pens, 266–267 digitizers, 265–266 disabled users and, 295, 297 ergonomics and, 294, 300–301 future of, 295–297 health issues related to, 291–294, 300–301 human-biology input devices, 280 IT timeline and, 260–266 keyboards, 28, 256–259 light pens, 265, 266 mouse, 28, 260–263 pen-based computer systems, 264–267 pointing devices, 260–267 radio-frequency identification tags, 279–280 remote locations and, 295 review questions/exercises on, 306–308 scanning/reading devices, 267–273 sensors, 278–279 source data-entry devices, 267–273 speech-recognition systems, 277–278 touch screens, 263–264 types of, 256 video-input cards, 274 webcams, 273–274 Inserting text, 156 Installation process, 33 Instant messaging (IM), 87–88, 109 Insteon technology, 341 Instruction manuals, 183 Integrated circuits, 34, 195, 246 Intelligence, artificial. See Artificial intelligence Intelligent agents, 436, 451 Intelligent sensors, 294 Intelligent terminal, 258, 303 Intel-type chips, 207–208, 246
  585. Index 567 lectures and, 39–40 memorization and, 38, 39 note

    taking and, 39–40 prime study time for, 38 reading method for, 38–39 See also Education LeClerc, Paul, 80 Lectures, 39–40 LED TVs, 382 Legacy systems, 138 Leisure activities, 9–10 Lenat, Douglas, 440 Levens, Bob, 368 Levy, David M., 483 Levy, Steven, 380, 382 Library of Congress website, 403 Life analog basis of, 312 artificial, 442 Light pens, 265, 266, 303 Lights-out factories, 485 Line graphs, 163 Line-of-sight systems, 257, 330 Links. See Hyperlinks Linux, 146–147, 185 Liquid crystal display (LCD), 283, 303–304, 375, 382 LISP programming language, 519 Listserv, 89–90, 110 Local area networks (LANs), 22, 42, 317, 355 client/server, 318, 319 components of, 320–322 operating systems for, 144 peer-to-peer, 318, 319 topology of, 322–324 wireless, 338–339 Local bus, 222 Location memory, 39 Logical operations, 212 Logic bomb, 343 Logic errors, 508, 529 Logic structures, 504 Log-on procedures, 60, 110 Lohr, Steve, 385 Long-distance wireless communications, 332–337 Loop control structure, 506–507 Lossless compression, 407 Lossy compression, 407 Lost clusters, 226 Low-earth orbit (LEO), 332 Lucas, George, 9 Lycos, 178 M Ma, Ming, 362 Machine cycle, 212, 213, 246 Machine interfaces, 120 Machine language, 202, 246, 511–512, 529 Macintosh operating system (Mac OS), 138–140, 148, 185 Macros, 130–131, 185 Macro virus, 343 Magnetic-ink character recognition (MICR), 271–272, 304 Magnetic-strip card, 232 Magnetic tape, 231–232, 246 Mail, electronic. See Email Mailing labels, 166 Mailing lists, 89–90 Mail servers, 81, 318 Mainframes, 22, 42 Main memory, 213 Maintenance data, 408 program, 509 system, 499 Make-or-buy decision, 497 Malone, Michael, 194 Malware, 342 how it’s spread, 344 Isolation, 478–479 ISPs. See Internet Service Providers Iteration control structure, 506–507 J James, Brian, 420 Java programming language, 94, 110, 521 JavaScript, 524, 529 Job searches, 12–13 posting your résumé online, 12–13 websites for, 13, 98 See also Employment Joules, 206 Joystick, 256 Jumping to conclusions, 527 Junk email, 102–103 Justification, 158 K Kaku, Michio, 235 Kandell, Jonathan, 484 Kasparov, Garry, 440 Kelly, Kevin, 443 Kemeny, John, 518 Kernel, 123 Kerry, John, 460 Keyboards, 28, 42, 256–259, 303 laptop computer, 242 layout and features, 130–131 repetitive stress injuries from, 292, 300 specialty, 258–259 traditional, 257–258 Keyboard shortcuts, 130–131 Key field, 165, 185, 404–405 Key loggers, 106, 110 Keywords, 72–73, 110 Kilobits per second (Kbps), 52, 110 Kilobyte (K, KB), 30, 200, 246 Kindle e-book reader, 384 Kiosks, 254 Knoll, John, 460 Knowledge base, 435 Knowledge engineers, 434 Komando, Kim, 105 Krantz, Michael, 523 Krugman, Paul, 485 Kubey, Robert, 484 Kurtz, Thomas, 518 Kurzweil, Raymond, 36, 443 L Labels mailing, 166 spreadsheet, 161 Languages, programming. See Programming languages Language translators, 121, 202, 512, 529 Lanier, Jaron, 409 LANs. See Local area networks Laptop computers, 23 classroom use of, 487 durability of, 300 guarding against theft, 300 tips on buying, 242–243 See also Handheld computers Large-format plotters, 290 LaserCard technology, 234 Laser printers, 285–286, 303 Last-mile problem, 56, 325 Lateral thinking tools, 524 Laws personal privacy, 445 software piracy, 472 Lawsuits, 471 Learning critical-thinking skills for, 44 distance, 6 information technology and, 5–6
  586. 568 Index Microreplication, 298 Microsoft Internet Explorer, 64, 65 Microsoft

    Tablet PC, 265 Microsoft Windows, 140–144, 185 Microsoft Windows 7, 142–144, 186 Microsoft Windows Embedded, 149–150, 186 Microsoft Windows NT, 144, 186 Microsoft Windows Vista, 141–142, 186 Microsoft Windows XP, 140–141, 148, 186 Microsoft Xbox 360, 391, 392–393 Microwave radio, 331, 355 Middle-level managers, 428 MIDI board, 273, 304 MIDI ports, 220, 246 Midsize computers, 22 Millennials, 394 Mindsets, 527 Miniaturization, 34 Minicomputers, 22 Minimizing windows, 136 MIPS, 210, 246 Mitnik, Kevin, 346 Mobile blogs, 96, 389 Mobile data terminal (MDT), 258 Mobile internet devices (MIDs), 23, 42, 209 Mobile phones. See Cellular telephones Mobile-telephone switching office (MTSO), 336 Mobile TV, 381 Mobility, 194, 196, 198 Modeling tools, 495, 529 Models, 431 Modem cards, 223 Modems, 32, 42, 53, 110, 314, 355 cable, 56–57 dial-up, 53–54 fax, 273 signal conversion by, 313–314 Modules, 502, 529 MOLAP applications, 418 Molecular electronics, 241 Molitor, Graham, 50 Money information technology and, 8–9 software for managing, 170–172 Monitors, 31, 42, 281–285 See also Display screens Monophonic ringtones, 387 Moore, Gordon, 207, 235–237 Moore’s law, 207, 235–237 More Info! icons, 4 Morphing, 459, 461 Morrison, Perry, 37 Mossberg, Walter, 145, 208, 242, 375 Motherboard, 29, 42, 206, 207 Motorola-type chips, 208, 246 Mouse, 28, 42, 131, 260–263, 304 functions performed by, 132 pros and cons of, 262 setting properties for, 261 specialty versions of, 261–262 variant forms of, 262–263 See also Pointing devices Mouse pointer, 131, 261 Movie industry, 9–10, 466 Mozilla Firefox, 64, 65 MP3 format, 366, 395 MP3 players. See Portable media players M-RAM, 237 Multicasting, 381 Multicore processors, 208–209, 246 Multidimensional databases (MDAs), 416, 417–418, 451 Multidimensional spreadsheets, 163 Multifactor dimensionality reduction, 420 Multifunction printers, 290, 304 Multimedia, 18, 35, 43 databases for storing, 416 portable media players and, 366–368 search tools for, 77–78 Malware—Cont. trojan horses, 344 types of, 343 viruses, 343–344 worms, 342–343 Management CPU, 123–124 database, 407–410 file, 124–125 memory, 124 security, 126 task, 125 Management information system (MIS), 430–431, 451 Managers computer-based information systems for, 429–433 levels and responsibilities of, 428 participation in systems development by, 493 Manes, Stephen, 409 Maney, Kevin, 19, 336 Margins, 158 Marketing data mining used in, 420–421 organizational department for, 427 Markoff, John, 36 Mark-recognition devices, 271–272 Markup languages, 522–524, 529 Mash-ups, 362 Matchmaking websites, 98, 110 Matsumoto, Yukihiro, 525 Matthies, Brad, 77 Maximizing windows, 136–137 McCarthy, John, 519 McKibben, Bill, 483 McWilliams, Gary, 362 Media manipulation, 459–461 Media-sharing websites, 99–100, 110 Medical technology, 6–7 See also Health issues Medium-earth orbit (MEO), 332 Meetings, virtual, 352 Megabits per second (Mbps), 52, 110 Megabyte (M, MB), 30, 200, 246 Megahertz (MHz), 28, 209, 246 Megapixels, 373, 395 Memorization, 38, 39, 44 Memory, 26, 213–215 flash, 215, 234–235, 366–367 main, 213 managing, 124 read-only, 214–215 virtual, 124, 216 Memory bus, 222 Memory chips, 29, 42, 213–215 Memory expansion board, 221 Memory hardware, 28–29 Memory modules, 214 Mental-health problems, 478–479 Menu, 134, 185 Menu bar, 136, 185 Menu-driven interface, 131 Mesh technologies, 340 Message, 520 Meta-data, 418 Metalanguage, 522 Metasearch engines, 75–76, 110 Metcalfe, Bob, 324 Methods, 520 Metropolitan area networks (MANs), 317, 355 Microblogging, 100–101 Microchips. See Chips Microcomputers, 22–23, 42 networking, 22 types of, 22–23 See also Personal computers Microcontrollers, 23–24, 42 Micropayments, 9, 42 Microphones, 273 Microprocessors, 20, 194, 196, 206–209, 246
  587. Index 569 Norton, Peter, 127 Notebook computers, 23, 43 See

    also Laptop computers Note taking tips for students, 39–40 web-based services, 487 O Obama, Barack, 11, 472 Object, 520, 529 Object code, 513 Object-oriented databases, 416, 451 Object-oriented programming (OOP), 519–521, 529 Object-relational databases, 416 Oblinger, Diana, 394 OEM operating systems, 142 Office automation systems (OASs), 429 Office information systems (OISs), 429, 451–452 Office suites, 154–155 Offline processing, 430 OLAP software, 418 One-hand PDA keyboards, 259 One-way communications, 332–335 Online, 4–5, 43 Online analytical processing (OLAP) software, 418 Online colleges, 5 Online connections, 59 Online game player, 259 Online retailers, 423 Online services. See Internet Service Providers Online snooping, 444–445 Online storage, 235 Online transaction processing (OLTP), 430 Open architecture, 221 Open Source Development Labs (OSDL), 147 Open-source software, 146, 148, 186 Operating systems (OS), 32, 121–126, 138–150, 186 comparison of, 148 DOS, 138 functions of, 121–126 handheld computer, 148–150 Linux, 146–147 Macintosh, 138–140, 148 NetWare, 144 network, 144–147 Palm OS, 148–149 researching, 147 Unix, 144–146 Windows, 140–144, 147, 148 See also System software Operational-level management, 428 Operator documentation, 509 Operators, Boolean, 79 Optical character recognition (OCR), 272, 304 Optical computing, 238 Optical disks, 227–231, 246–247 Optical mark recognition (OMR), 272, 304 Optical memory cards, 233–234, 247 Optical mouse, 260 Optical scanners, 267–269 Optical viewfinders, 375 Optical zoom, 374 Organization chart, 426 Organizations decentralized, 428 departments in, 426–428 flow of information within, 426–428 management levels in, 428 review questions/exercises on, 452–453 Organized crime, 470 OUM (ovonic unified memory), 237 Ousterhout, John, 525 Outline View feature, 156 Output, 26, 27, 43, 255, 281 Output hardware, 31–32, 255, 280–291, 304 display screens, 281–285 ergonomics and, 294, 300–301 future of, 297–299 software for creating, 176 World Wide Web and, 64, 77–78, 93–95 Multimedia authoring software, 176, 186 Multimedia computers, 198 Multimedia ports, 220 Multipartite virus, 343 Multiple-user license, 151 Multitasking, 38, 125, 186, 365, 394, 395 Music online sources of, 9, 95 portable media players and, 366–368 search tools for, 78 smartphones and, 389–390 theft of, 466 Music tones, 387 My Computer icon, 134, 135 My Documents icon, 134, 135 N Nagle, Matt, 297 Name migration, 444 Nanobots, 328 Nanotechnology, 22, 43, 238, 478 Narrowband connections, 53, 110, 330, 355 National ID cards, 446 National Telecommunications and Information Administration (NTIA), 329 Natural hazards, 465 Natural language processing, 435, 451 Natural languages, 516, 529 NBIC technology, 240 Near-letter-quality (NLQ) output, 285 Negroponte, Nicholas, 211 Netbooks, 23, 43, 209 NetGeners, 393, 394 Netiquette, 90–91, 110 NetWare, 144, 186 Network access point (NAP), 61, 110 Network agents, 436 Network computers, 259 Network databases, 411–412, 451 Network interface cards (NICs), 223, 246, 322 Network operating system (NOS), 322 Networks, 5, 43, 315–325, 355 benefits of, 316 client/server, 24, 318, 319 components of, 320–322 Ethernet, 324 extranets, 319–320 firewalls for, 347 home area, 317–318 home automation, 318, 338, 340–341 intranets, 319 local area, 317, 319, 338–339 metropolitan area, 317 operating systems for, 144–147 peer-to-peer, 318, 319 personal area, 318, 338, 339–340 topologies of, 322–324 types of, 317–318 virtual private, 320 wide area, 317 wireless, 58 Network service provider (NSP), 61 Neural networks, 441 Neuromancer (Gibson), 18 Newsgroups, 89, 110 Newsreader program, 89, 110 Nie, Norman H., 478 Nigerian letter scam, 467 Nintendo Wii, 392, 393 Node, 320, 355 Noise-cancellation technology, 277 Noise-induced hearing loss, 368 Noise pollution, 294 Nonimpact printers, 285, 304 Nonremovable hard disks, 226 Normal accidents, 464
  588. 570 Index Personal-finance managers, 170, 186 Personal information managers (PIMs),

    166–167, 186 Personalization, 36, 364–365 Personal software, 154 Personal technology, 361–399 convergence and, 362–363 digital cameras, 371–378 e-book readers, 383–385 high-tech radio, 369–371 multitasking and, 365, 394 NetGeners and, 393, 394 new television, 380–383 personal digital assistants, 378–379 personalization and, 364–365 portability and, 364 portable media players, 366–368 review questions/exercises on, 397–399 smartphones, 385–391 tablet PCs, 379 videogame systems, 391–393 Personal video recorders, 382 Pervasive computing, 2, 296 Pesce, Mark, 523 Petabyte (P, PB), 30, 201, 247 Pharming, 104, 110, 468 Phase-change memory, 237 Phased implementation, 498 Philips, Michelle, 313 Phishing, 104, 111, 468 Phonemes, 277 Photography camera phones and, 276, 389 digital cameras and, 274–276, 296, 371–378 Photolithography, 197 Photo manipulation, 460–461 Photo printers, 289 Photo-sharing services, 377 PHP programming language, 526 Physical connections, 52–58, 59 broadband, 52 cable modems, 56–57 dial-up modems, 53–54 high-speed phone lines, 54–56 wireless systems, 57–58 Pie charts, 163 Pilot implementation, 498–499 PIN (personal identification number), 473 Pipelining, 216 Pirated software, 152, 186, 465–466 Pixels, 282, 304 Plagiarism, 107 Plasma TVs, 382 Platform, 138, 186–187 PlayStation 3 (PS3), 392, 393 Plotters, 289–290, 304 Plug and play, 219, 247 Plug-ins, 93, 111 Podcasting, 97, 111, 371, 396 Point-and-shoot cameras, 372, 396 Pointer, 131, 187 Pointing devices, 260–267, 304 disabled users and, 295 laptop computer, 242–243 mouse and its variants, 260–263 pen input devices, 264–267 pros and cons of, 262 touch screens, 263–264 Pointing stick, 263, 304 Point of presence (POP), 61, 111 Point-of-sale (POS) terminal, 258 Polygons, 299 Polymer memory, 241 Polymorphic virus, 343 Polymorphism, 521 Polyphonic ringtones, 387 Pop-up ads, 105, 111 Pop-up menu, 134 Pornography, 479–481 Output hardware—Cont. health issues related to, 291–294, 300–301 IT timeline and, 260–266 printers, 285–290 realism and, 298–299 remote locations and, 297–298 review questions/exercises on, 306–308 sound-output devices, 290–291 types of, 281 video, 291 voice-output devices, 291 Overlearning, 38 P Packaged software, 150 Packets, 62, 110, 320, 355 Padlock icon, 102 Page description language (PDL), 286, 304 Page printers, 286 Pagers, 335, 355–356 Painting programs, 174 Palm OS, 148–149, 186 Palmtops, 23 Paradox of Choice: Why More Is Less, The (Schwartz), 365 Parallel implementation, 498 Parallel ports, 218, 247 Parent directory, 124 Parisi, Tony, 523 Parity bit, 247 Parson, Jeffrey Lee, 347 Pascal, Blaise, 518 Pascal programming language, 515, 518 Passive-matrix display, 283, 304 Passive RFID tags, 279 Passport photos, 474 Passwords, 60, 110 access security and, 126, 473 creating, 348, 349 online safety and, 348 tips for managing, 349–350 Paste command, 157 Patches, 145 Pathnames, 125 Pattern recognition, 296–297, 436, 452 Pauleen, David, 328 PC cards, 223, 247 PCI (peripheral component interconnect) bus, 222, 247 PCIe (PCI Express) bus, 222–223, 247 PCs. See Personal computers PC video cameras, 352 PDAs. See Personal digital assistants PDF files, 179–180, 406 Peer-to-peer (P2P) networks, 318, 319, 356 Pen-based computer systems, 264–267, 304 Pen plotters, 290 Periodic reports, 431 Peripheral devices, 31, 43 Perkins, Tony, 394 Perl (Practical Extraction and Report Language), 525 Perpendicular recording technology, 240 Perrow, Charles, 464 Personal area networks (PANs), 318, 338, 339–340, 356 Personal computers (PCs) buying, 198, 199 custom-built, 25, 26–27, 33–34 environmental issues related to, 476–478 guarding against theft, 300 health issues related to, 291–294, 300–301 problem chemicals in, 477 recycling, 37, 477 tune-ups for, 129 types of, 22–23 See also Computers; Laptop computers Personal digital assistants (PDAs), 23, 43, 378–379, 395–396 future of, 379 how they work, 378–379 special keyboards for, 259 web resources, 378
  589. Index 571 history and evolution of, 516–517 machine language, 202,

    511–512 markup, 522–524 natural, 516 scripting, 522–523, 524–526 very-high-level or problem-oriented, 514 website development, 522–526 See also names of specific languages Programming process, 500–510 clarifying programming needs, 500–501 coding the program, 507–508 designing the program, 501–507 documenting the program, 509 maintaining the program, 509 summary of steps in, 510 testing the program, 508–509 Programs, 25, 120, 499, 529 creating, 500–510 utility, 121, 127–129 See also Software Program testing, 508–509, 529–530 Project management software, 178–179, 187 PROM (programmable read-only m emory), 215 Proprietary software, 138, 150 Protocols, 62, 111, 320, 356 Prototypes, 496, 530 Prototyping, 496, 530 Pseudocode, 501, 502, 503, 504, 530 Public-domain software, 151, 187 Public-key encryption, 351 Pull-down menu, 134 Pull technology, 95 Pull-up menu, 134 Push technology, 95, 111 Q Quality-of-life issues, 476–483 environmental problems, 476–478 mental-health problems, 478–479 protection of children, 479–482 workplace problems, 482–483, 485 Quantum computing, 239 Queries, database, 165–166, 414–416 Query by example (QBE), 414–415, 452 Query language, 514 Questionable statistics, 527 Queues, 124 Quittner, Joshua, 422 QXGA (quantum extended graphics array), 284, 304 R R programming language, 526 Radio broadcast, 330–331 cellular, 331 high-definition, 369–371 Internet, 371 microwave, 331 podcasts, 371 satellite, 369 smartphone, 389 Radio buttons, 71, 111 Radio-frequency (RF) spectrum, 328–329, 356 Radio-frequency identification (RFID) tags, 271, 279–280, 305 Raibert, Marc, 439 RAID storage system, 227 RAM (random access memory), 29, 213–214 See also Memory Rambo, Kathryn, 448 RAM chips, 213–214, 247 Range, spreadsheet, 162, 187 Rapid application development (RAD) system, 522 Raster images, 174 Ratey, John, 484 Reading data, 214, 224, 247 Reading skills, 38–39 Read-only memory (ROM), 122, 214–215 CD-ROM disks, 229 Portability, 36, 194, 364 Portable computers. See Handheld c omputers; Laptop computers Portable Document Format (PDF), 179–180, 187 Portable media players (PMPs), 366–368, 396 how they work, 366–367 societal effects of, 368 using in college, 368 Ports, 29, 216–220, 247 Post Office Protocol version 3 (POP3), 81 POTS connection, 54–55, 111 Power supply, 204, 247 Predictive-statistical-model software, 473 Preliminary design, 496 Preliminary investigation, 494, 529 Prensky, Marc, 394 Presentation graphics software, 5, 168–170, 187 illustrated overview of, 169 templates, 168 views, 169 Previewing documents, 160 Primary key, 165 Primary storage, 26, 29, 43 Prime study time, 38 Printers, 32, 43, 285–290, 304 buying considerations, 289 dot-matrix, 285 future developments in, 298, 299 inkjet, 286–288 laser, 285–286 multifunction, 290 photo, 289 plotter, 289–290 specialty, 290 thermal, 288 three-dimensional, 299 Printing documents, 160 Print Scrn key, 258 Print servers, 318 Privacy, 444 databases and, 444–446 email messages and, 102 federal laws on, 445 government spying and, 445 information on guarding, 444 Private-key encryption, 350–351 Private/Peer NAPs (PNAPs), 61 Probe storage, 241 Problem clarification, 500–501, 529 Problem-oriented programming la nguages, 514 Problem solving, 501 Procedural errors, 463–464 Procedural programming languages, 513–514, 515 Processing, 26, 27, 43 future developments in, 237–240 hardware components for, 28–29 IT timeline and, 196–206 speed of, 34, 209–211, 216 Processor chips, 28, 43, 196, 206–209 Production department, 427 Productivity issues, 471 Productivity software, 154–155, 187 Program design, 501–507, 529 Program documentation, 509 Program files, 405, 452 Program flowchart, 504, 505, 529 Programming, 500–510, 530 internet, 522–526 languages used for, 507, 510–519 object-oriented, 519–521 review questions/exercises on, 531–533 steps in process of, 500–510 structured, 501–507 visual, 521–522 Programming languages, 507, 530 assembly language, 512–513 contemporary examples of, 516–519 generations of, 510–511 high-level or procedural, 513–514
  590. 572 Index Salford, Lief, 293 Sampling process, 315 Sampling rate,

    367, 396 Sanger, Larry, 77 Satellite radio, 369, 396 Satellites, communications, 57, 59, 108, 331–332, 354 Saving files, 160, 187 Scanners, 267–269, 305 Scanning and reading devices, 267–273 bar-code readers, 269–271 character-recognition devices, 271–272 fax machines, 272–273 mark-recognition devices, 271–272 optical scanners, 267–269 Scatter charts, 163 Scholarly works, 79–80 Schwartz, Barry, 365 Science, data mining used in, 421 Sciolla, Gabriella, 5 Screens. See Display screens Scripting languages, 522–523, 524–526 Script kiddies, 346 Scripts, 522, 530 Scroll arrows, 71, 111 Scrolling, 72, 111, 156, 187 SCSI controllers, 227 SCSI ports, 218, 247 SDLC. See Systems development life cycle SDRAM chips, 214 Search (text) box, 71, 72, 111 Search command, 156 Search engines, 74, 111 blog, 96 desktop, 80 individual, 74–75 metasearch, 75–76 multimedia, 77–78 specialized, 76 Search hijackers, 105–106, 111 Searching the web, 74–80 multimedia content and, 77–78 serious techniques for, 79 strategies for, 76 tools for, 74–76 Search services, 74, 111 Secondary storage, 26, 43, 224–235 future developments in, 240–241 longevity of data and, 409 online, 235 Secondary storage hardware, 30–31, 224–235, 247 flash memory, 234–235 floppy disks, 224–225 hard disks, 225–227 life span of, 235 magnetic tape, 231–232 optical disks, 227–231 optical memory cards, 233–234 smart cards, 233 solid-state drives, 235 Second-generation (2G) technology, 337 Sectors, 225, 247 Security, 341–351, 462–476, 472, 488 access rights and, 473–474 biometric, 280, 348, 350, 474 broadband connections and, 56 components of, 472 computer crime and, 465–470, 472–473 cyberwarfare and, 470, 472 database, 408 denial-of-service attacks and, 342 disaster-recovery plans and, 475–476 employee monitoring and, 471 encryption and, 350–351, 474–475 errors/accidents and, 462–465 free online check of, 343 general procedures for, 475 hackers/crackers and, 346–347 identification systems and, 473–474 Read/write head, 225, 247 Real-time chat (RTC), 90, 111 Real-time processing, 430 Recalculation, 162, 187 Recharging technology, 239–240 Records, 164, 403–404, 452 Recycling computers, 37, 477 Refresh rate, 282, 305 Registers, 212, 247 Regression analysis, 419–420 Relational databases, 164–165, 187, 413–416, 452 Relationships, online, 98–101 Releases, software, 151 Remote locations input from, 295 output in, 297–298 Removable hard disks, 227 Rentalware, 152, 187 Repetitive stress injuries (RSIs), 292, 300, 305 Replace command, 156 Report generator, 410, 452, 514 Research, web-based, 107 Research and development (R&D) department, 427 Resolution, 268–269, 282, 305, 373–374 Résumés misleading information on, 471 posting on the internet, 12–13 privacy issues and, 444 Review questions/exercises, 44 on application software, 189–192 on artificial intelligence, 452–455 on communications technology, 357–359 on computer-based information systems, 452–453 on databases, 452–455 on hardware, 249–251, 306–308 on information technology, 44–48 on the internet, 113–117 on organizations, 452–453 on personal technology, 397–399 on programming, 531–533 on security, 488–490 on systems analysis and design, 531–533 on system software, 189–192 Revolutions per minute (rpm), 226 Ribbon cable, 30 Richard, Beverly, 479 Richardson, Doug, 335 Rifkin, Jeremy, 485 Ring network, 323, 356 Ringtones, 387, 396 Ripping process, 367 Ritchie, Dennis, 519 Ritz, David, 372 Roach, Stephen, 483 Roadrunner supercomputer, 21 Robbins, Alan, 120 Robotics, 438–439, 452 Robots, 7, 8, 43, 438–439 Rollover feature, 132, 187 ROM (read-only memory), 122, 214–215, 247 ROM chips, 214–215 Root directory, 124 Root record, 410 Rothenberg, David, 107 Routers, 322, 356 Row headings, 161 RSS newsreaders, 95–96, 111 Ruby programming language, 525–526 Ruggiero, Kimberly, 254 Rukeyser, William, 107 Rule-based-detection software, 472–473 Runtime libraries, 405 S Safari browser, 64 Safe Mode, 122 Saffo, Paul, 483 Safire, William, 459
  591. Index 573 firewall, 347 freeware, 151–152 IT timeline and, 166–173

    make-or-buy decision for, 497 open-source, 146 origins of term, 120 pirated, 152, 465–466 productivity, 154–155 protecting, 300, 475 public-domain, 151 rentalware, 152 security, 347 shareware, 151 tech support, 182–183 theft of, 465–466 tutorials, 152 utility, 127–129 versions/releases, 151 See also Application software; System software Software engineering, 500 See also Programming Software license, 150–151, 187 Software Publishers Association (SPA), 472 Solaris, 146 Solid-state devices, 195, 248 Solid-state drives, 235, 248 Sony PlayStation 3 (PS3), 392, 393 Sorting database records, 166 email messages, 83, 85 Sound board, 273, 305 Sound card, 31, 43, 221, 223, 248, 290 Sound manipulation, 459 Sound-output devices, 290–291, 305 Source code, 513 Source data-entry devices, 267–273, 295–297, 305 Source program files, 405 Spacing, text, 158 Spaghetti code, 504 Spam, 102–103, 111 Speakers, 32, 43 Spear-phishing, 104 Specialized search engines, 76 Special-purpose keys, 130, 187 Specialty printers, 290 Specialty software, 154, 167–181 Specific Absorption Rate (SAR), 293 Speech-recognition systems, 277–278, 296, 305, 435 Speed data transmission, 52 processing, 34, 209–211, 216 Spelling checker, 158, 159 Spiders, 74, 111 Spoofing, 104, 112 Spooling, 124 Sports, data mining used in, 420 Spotlight search engine, 139 Spreadsheets, 161–163, 187–188 creating charts from, 163 features of, 161–163 illustrated overview of, 162 Spyware, 105–106, 112 SQ3R reading method, 38–39 SQL (Structured Query Language), 514, 516 SRAM chips, 214 Standard-definition television (SDTV), 381, 396 Star network, 323–324, 356 Start button, 134, 135 Static IP address, 62–63 Statistics, questionable, 527 Stealth virus, 343 Stewart, Martha, 460 Stojanovik, Milan, 239 Storage, 26, 27 digital camera, 374–375 future of, 240–241 IT timeline and, 196–206 online, 235 Macintosh OS and, 145 natural hazards and, 465 OS management of, 126 password, 348, 349–350 patches and, 145 review questions/exercises on, 488–490 service packs and, 145 software for, 347 terrorism and, 347 Trojan horses and, 344 types of threats to, 462, 463 viruses and, 343–344 websites and, 344, 472 WiFi technology and, 339, 344 worms and, 342–343 Selection control structure, 504, 506 Self-scanning checkout, 269–270 Semiconductors, 196, 247 Sensors, 278–279, 294, 305 Sentiment analysis, 421 Sequence control structure, 504, 506 Serial ports, 218, 248 Servers, 24, 43, 60, 111 Service packs, 141, 145 Service programs, 127 Services, theft of, 466 Sexting, 481, 488 Sexual predators, 481 SGML (Standard Generalized Markup Language), 522 Shareware, 151, 187 Sheet-fed scanners, 269 Sheet music, 9 Shells, 146 Shop bots, 423 Short-range wireless communications, 337–341 Signal words, 40 Silicon, 34, 195, 248 SIMMs, 214 Simpson, O. J., 460 Simulators, 438, 452 Sinatra, Frank, 459 Sinclair, Andy, 517 Single-lens reflex (SLR) cameras, 372–373, 396 Single-user license, 151 Singularity, the, 443, 452 Site license, 150 Slide shows, 168 SlingPlayer Mobile, 382, 383 Slippery slope, 527 Smart cards, 233, 248 Smartphones, 15, 385–391, 396 how they work, 386 services and features, 386–391 societal effects of, 391 See also Cellular telephones Smart tags, 271 Smith, Robert, 327 SMS (Short Message Service), 387, 396 SMTP server, 81 Snopes.com website, 461 Snow Leopard operating system, 139 Social-bookmarking websites, 80 Social-network aggregators, 100, 111 Social-networking websites, 99, 111 Social Security number (SSN), 405, 448 Softcopy output, 281, 305 Soft goods, 97 Software, 25, 32–33, 43, 120 abandonware, 152 antivirus, 128, 347 blocking, 480 commercial, 150–151 compatibility requirements, 122 converting, 498–499 creating, 500–510 custom, 152 documentation, 152–153 errors in, 464
  592. 574 Index Help command, 137 IT timeline and, 166–173 language

    translators, 121, 202 operating systems, 121–126, 138–150 review questions/exercises on, 189–192 service packs, 141, 145 tech support for, 182–183 user interface, 129–137 utility programs, 121, 127–129 System testing, 498 System unit, 28, 198–223 T T1 line, 56, 59, 112 Tablet PCs, 265, 379, 380 Tactical-level management, 428 Tags, 80, 112 Tape cartridges, 232, 248 Taskbar, 136, 188 Task management, 125 Taxonomy of Educational Objectives (Bloom), 44 Tax software programs, 171 Tcl (Tool Command Language), 525 Technical staff, 493 Techno-blight, 477–478 Technological singularity, 443 Tech support, 182–183 Telecommunications, 4 historical emergence of, 50–56 switched-network model of, 364–365 tree-and-branch model of, 364 See also Communications technology Telecommuting, 327 Teleconferencing, 352 See also Videoconferencing Telemedicine, 6, 44 Telephones cellular, 14–15, 335–337 internet telephony and, 92–93 modems connected to, 53–54, 313–314 smartphones, 15 Television, 380–383 closed-circuit, 352 manipulation of content on, 461 modern technologies for, 380–381 smartphones and, 390 societal effects of new, 382–383 three types of, 381 Telework, 327 Temp file removal, 128 Templates, 158, 188 document, 158 presentation graphics, 168 worksheet, 163 Terabyte (T, TB), 30, 201, 248 Terminals, 22, 44, 258–259 Term papers, 107 Testing information systems, 497–498 internet connection speed, 57 program code, 508–509 Text messaging, 387, 388, 396 Text-to-speech (TTS) systems, 291 TFT display, 283 Theft hardware, 300, 465 identity, 446–447, 448–449 information, 467 music and movie, 466 software, 465–466 time and services, 466 Thermal printers, 288, 305 Thermal wax-transfer printers, 288 Thesaurus, 158 Thinking skills, 44 Third-generation (3G) technology, 337 Storage—Cont. PDA, 378–379 primary, 26, 27, 29 secondary, 26, 27, 30–31, 224–235 smartphone, 386 volatile, 213 Strategic-level management, 428 Straw man argument, 527 Streaming audio, 95, 112 Streaming video, 94–95, 112 Stress, 479 Strong AI, 440, 441 Stroustrup, Bjarne, 521 Structured programming, 501–507, 530 Structured query language (SQL), 414, 452 Students classroom computer use by, 487 distance learning for, 6 infotech challenges for, 458 internet addiction among, 484 online evaluations by, 487 plagiarism issues for, 107 portable media players used by, 368 study and learning tips for, 38–40 Study skills, 38–39 Stulman, Nate, 484 Stylus, 264 Subdirectories, 124 Subject directories, 75, 112 Subject guide, 72 Subprograms/subroutines, 502 Subscription services, 95 Suitor eye-gaze technology, 297 Summary reports, 431 Supercomputers, 21–22, 43 Superscalar architecture, 216 Supervisor, 123, 188 Supervisory managers, 428 Surfing the web, 64, 112 Surge protector, 204, 205 Suzuki, Naoki, 442 Switch, 321–322, 356 Switched-network telecommunications model, 364–365, 396 SXGA (super extended graphics array), 284, 305 Syntax, 508, 530 Syntax errors, 508, 530 System, 492, 530 System board. See Motherboard System cabinet, 28, 202–204 System clock, 209, 248 System Restore, 122 Systems analysis, 494–496, 530 Systems analysis and design, 493, 530 participants in, 493 purpose of, 492 review questions/exercises on, 531–533 six phases of, 493–499 See also Systems development life cycle Systems analyst, 493, 530 Systems design, 496–497, 530 Systems development, 497–498, 530 Systems development life cycle (SDLC), 493–499, 530 analyzing the system, 494–496 designing the system, 496–497 developing/acquiring the system, 497–498 implementing the system, 498–499 maintaining the system, 499 overview of phases in, 493 participants in, 493 preliminary investigation, 494 Systems implementation, 498–499, 530 Systems maintenance, 499, 530 System software, 32–33, 43, 120–150, 188 components of, 121 device drivers, 121, 126–127
  593. Index 575 Utility programs, 121, 127–129, 188 DBMS utilities, 410

    open-source utilities, 148 UXGA (ultra extended graphics array), 284, 306 V Vacuum tubes, 194 Values, spreadsheet, 162, 188 Vandalism, computer, 468–469 Varkey, Dax, 394 V-chip technology, 481 Vector images, 174 Versions, software, 151 Vertical portals, 72 Very-high-level programming languages, 514, 531 Video, 291, 306 analog to digital, 275 digital cameras and, 376 editing software for, 175 future developments in, 298–299 manipulation of, 461 search tools for, 78 streaming, 94–95 web-based, 78, 94–95 Video blogs, 92, 96 Video cards, 31, 44, 274, 284 Videoconferencing, 291, 306, 352 Video display terminals (VDTs), 258 See also Display screens Video files, 405, 406 Videogame ratings, 480–481 Videogame systems, 391–393 Microsoft Xbox 360, 391, 392–393 Nintendo Wii, 392, 393 Sony PlayStation 3, 392, 393 Video on demand (VOD), 382, 396–397 Videophones, 352 Viewable image size (vis), 281 Vinge, Vernor, 443 Virilio, Paul, 464 Virtual, meaning of, 8, 44 Virtual File Allocation Table (VFAT), 226 Virtual Keyboard, 257–258 Virtual Linux Service, 237 Virtual meetings, 352 Virtual memory, 124, 216, 248 Virtual office, 327 Virtual private networks (VPNs), 320, 356 Virtual reality (VR), 436–438, 452 Virtual Reality Modeling Language (VRML), 523, 531 Viruses, 128, 343–344, 356 as attached files, 87, 344 cellphone, 344–345 free online check for, 343 how they’re spread, 344 software for protecting against, 128, 344, 345, 347 tips on preventing, 129, 345 types of, 343 Visual BASIC, 521–522 Visual programming, 521–522, 531 Vocal references, 277 Voiceband communications, 330 Voice mouse, 260 Voice-output devices, 291, 306 Voice-recognition systems, 350 VoIP phoning, 92–93, 389 Volatile storage, 213, 248 Voltage regulator, 204, 205, 206 Von Neumann, John, 20 Vortals, 72 Voting technology, 11 VRML (Virtual Reality Modeling L anguage), 523, 531 W Wafers, 197 Wall, Larry, 525 Thomas, Christie, 327 Thomas-Rasset, Jammie, 466 3-D display systems, 299 3-D printers, 299 3G technology, 58, 59, 112 Thrill-seeker hackers, 346 Time, theft of, 466 Title bar, 136, 188 TiVo systems, 382 Token Ring technology, 324–325 Tomlinson, Ray, 85 Toolbar, 136, 188 Top-down program design, 502, 531 Top-level domain, 66, 83 Top managers, 428 Topology of networks, 322–324, 356 Torvalds, Linus, 146 Touchpad, 263, 305–306 Touch screens, 263–264, 295, 305 Tower PCs, 23, 44, 204 Tracer mouse, 262 Trackball, 262, 306 Tracking document changes, 160–161 Tracks, 224–225, 248 Trading agents, 423 Transaction processing system (TPS), 429–430, 452 Transceivers, 330 Transferring files digital cameras, 376–377 PDA devices, 379 portable media players, 367 Transistors, 34, 195, 207, 248 Transmission Control Protocol/Internet Protocol (TCP/IP), 62, 112 Tree-and-branch telecommunications model, 364, 396 Trojan horse, 343, 344, 356, 468 Tucker, Lew, 341 Tukey, John, 120 Turing, Alan, 442, 443 Turing test, 442–443 Tutorials, 152 TWAIN technology, 269 Twisted-pair wire, 325, 356 Twitter and Tumblr, 100–101 Two-way communications, 333, 335–341 U Ubiquitous computing, 2 Ultra wideband (UWB) technology, 339–340, 356 Undo command, 156 Unicode, 202, 248 Uninstall utility, 137 Unit testing, 497–498 Unix, 144–146, 188, 519 Upgrading, 206, 221, 248 Uplinking, 331 Uploading, 53, 112 UPS (uninterruptible power supply), 205, 206 URL (Uniform Resource Locator), 65–66, 112 USA PATRIOT Act (2001), 445 USB flash drive, 235 USB hubs, 219 USB ports, 218–219, 248 Usenet, 89, 112 User ID, 83 User interface, 129–137, 188 expert system, 435 GUI features, 131–137 Help command, 137 keyboard, 130–131 mouse, 131, 132 User name, 83 Users participation in systems development by, 493 preparing documentation for, 509 training on new systems, 499
  594. 576 Index Wireless communications, 328–341 bandwidth and, 329–330 electromagnetic spectrum

    and, 328–329 internet connections and, 57–58 laptop computers and, 243 long-distance, 332–337 radio-frequency spectrum and, 328–329 short-range, 337–341 types of, 330–332 Wireless email devices, 387–389 Wireless internet service providers (WISPs), 58 Wireless keyboards, 257 Wireless LANs, 338–339 Wireless networks, 58, 113 Wireless pocket PC, 259 Wireless portals, 72 Wireless USB, 340, 357 Wirth, Niklaus, 518 Wizards, 158 Word games, 39 Word processing software, 155–161, 188 creating documents, 156 editing documents, 156–158, 159 formatting documents, 158–160 illustrated overview of, 157 printing documents, 160 saving documents, 160 tracking document changes, 160–161 web documents and, 160 Word size, 211, 248 Word wrap, 156, 188 Workgroup computing, 352 Workplace monitoring employees in, 471 quality-of-life issues and, 482–483, 485 See also Employment Worksheet files, 153 Worksheet templates, 163 Workstations, 22, 44 World Is Flat, The (Friedman), 486 World Wide Web (the “web”), 18, 44, 64–80 addiction to, 484 addresses used on, 65–67 blogs on, 96 browser software, 64, 69–72 business conducted on, 97–98 citing sources from, 78 domain abbreviations on, 67 evaluating information on, 74, 77, 78 government resources on, 10–11 hidden data on, 421 HTML and, 68 hyperlinks on, 68 intrusiveness of, 102–106 job searching on, 12–13 lecture notes posted on, 487 multimedia on, 64, 77–78, 93–95 navigating, 69–72 plagiarism issues, 107 podcasting and, 97 portal sites on, 72–74 programming for, 522–526 push technology and, 95 review questions/exercises on, 113–117 RSS newsreaders on, 95–96 searching, 74–80 social interactions on, 98–101 telephone calls via, 92–93 terminology associated with, 64–65 tips for searching, 79 workplace issues and, 471 See also Internet; Websites World Wide Web Consortium (W3C), 64 Worms, 342–343, 357 Writing data, 214, 224, 248 Writing program documentation, 509, 531 WUXGA (wide aspect ultra extended graphics array), 285 WXGA (wide aspect extended graphics array), 285 Wallace, William A., 443 Warm boot, 123 Warnock, John, 172 Watermark, 156 Wavetable synthesis, 223 Weak AI, 440 Weatherbee, Danielle, 291 Weather meters, 379 Web 2.0, 98, 112 Web-based email, 82, 112 Web browsers, 64, 112 development of, 68 features of, 69, 70 navigating the Web with, 69–72 Webcams, 273–274, 306, 352 Webcasting, 95, 112 Web conferencing, 352 Web database, 416 Web documents, 160 Web exercises on application software, 192 on artificial intelligence, 454–455 on communications technology, 358–359 on databases, 454–455 on hardware, 251, 308 on information technology, 47–48 on the internet, 116–117 on personal technology, 398–399 on security, 489–490 on systems analysis and design, 532–533 on system software, 192 See also Review questions/exercises Webmail, 82 Web page design/authoring software, 176–178, 188 Web pages, 65, 112 hyperlinks on, 68, 71 interactivity of, 71 multimedia effects on, 93–95 resources for building, 178 software for creating, 176–178 See also Websites Web portals, 72–74, 112–113 Web servers, 318 Websites, 65, 113 bookmarking, 71 history of visited, 71 job hunting, 13, 98 matchmaking, 98 media-sharing, 99–100 secure, 472 social-networking, 99 See also Web pages; World Wide Web What-if analysis, 163, 188 White-hat hackers, 346 White House website, 11 Whitney, Peter, 471 Whittler, David, 18 Wide area networks (WANs), 317, 356 Widgets, 526 Wi-Fi phishing, 468 Wi-Fi technology, 58, 59, 113, 338–339, 389 Wikipedia, 77, 402 Wikis, 36, 77 Wildcards, 79 Wildstrom, Stephen, 80, 208 Williams, Penny, 461 WiMax wireless standard, 337 Window (computer display), 87, 113, 136, 188 Windows operating systems, 140–144 Windows 7, 142–144 Windows Embedded, 149–150 Windows NT, 144 Windows Server 2008, 144 Windows Vista, 141–142 Windows XP, 140–141, 148 Windows XP Media Center Edition, 140–141 Wired communications media, 325–326 Wireless Application Protocol (WAP), 330, 356
  595. Index 577 Z Zemeckis, Robert, 461 ZigBee technology, 341 Zombie

    computers, 468, 488 Z-wave technology, 341 X Xbox 360, 391, 392–393 XGA (extended graphics array), 284, 306 XML (Extensible Markup Language), 96, 113, 523–524, 531 Y Yahoo!, 73, 178 Yang, Jerry, 362 Yu, Stella, 484