Instant Download Technology in Action Introductory 13th Edition Alan Evans PDF All Chapters
Instant Download Technology in Action Introductory 13th Edition Alan Evans PDF All Chapters
com
https://textbookfull.com/product/technology-in-action-
introductory-13th-edition-alan-evans/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/technology-in-action-rental-
edition-17th-edition-alan-evans/
textboxfull.com
https://textbookfull.com/product/frank-woods-business-accounting-13th-
edition-alan-sangster/
textboxfull.com
https://textbookfull.com/product/technology-in-action-complete-
twelfth-global-edition-kendall-e-martin/
textboxfull.com
https://textbookfull.com/product/technology-in-mathematics-teaching-
selected-papers-of-the-13th-ictmt-conference-gilles-aldon/
textboxfull.com
Information Technology New Generations 13th International
Conference on Information Technology 1st Edition Shahram
Latifi (Eds.)
https://textbookfull.com/product/information-technology-new-
generations-13th-international-conference-on-information-
technology-1st-edition-shahram-latifi-eds/
textboxfull.com
https://textbookfull.com/product/e-commerce-2017-business-technology-
society-13th-edition-kenneth-c-laudon/
textboxfull.com
https://textbookfull.com/product/disability-and-technology-an-
interdisciplinary-and-international-approach-1st-edition-alan-
roulstone-auth/
textboxfull.com
https://textbookfull.com/product/oxford-case-histories-in-geriatric-
medicine-1st-edition-evans/
textboxfull.com
Technology
in Action
This page intentionally left blank
Technology
in Action
INTRODUCTORY
13th Edition
Copyright © 2016, 2015, 2014 Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the
United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior
to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical,
photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to
Pearson Education, Inc., Permissions Department, 1 Lake Street, Upper Saddle River, New Jersey, 07458.
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial
caps or all caps.
Library of Congress Control Number: 2015040435
10 9 8 7 6 5 4 3 2 1
EDITION
13
Contents at a Glance
Chapter 1
Using Technology to Change the World...................................................................................... 2
Chapter 2
Looking at Computers: Understanding the Parts...................................................................... 28
Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................................... 74
Technology in Focus
The History of the Personal Computer.................................................................................... 112
Chapter 4
Application Software: Programs That Let You Work and Play.................................................. 122
Chapter 5
System Software: The Operating System, Utility Programs, and File Management.................. 160
Technology in Focus
Information Technology Ethics................................................................................................ 202
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System.......................................... 222
Chapter 7
Networking: Connecting Computing Devices.......................................................................... 258
Technology in Focus
Under the Hood...................................................................................................................... 296
Chapter 8
Digital Devices and Media: Managing a Digital Lifestyle........................................................... 308
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices............................................ 346
Technology in Focus
Careers in IT........................................................................................................................... 396
Glossary................................................................................................................................. 408
Index...................................................................................................................................... 419
Contents at a Glance v
This page intentionally left blank
thirteenth
thirteenth
EDITION
13
Contents
Chapter 1
Using Technology to Change the World................................ 2
How Will You Put Technology in Action?.......................................................................4
Learning Outcome 1.1 You will be able to discuss the impact of technology on global
and national issues.
Technology on the World Stage...................................................................................... 4
Political Issues................................................................................................................. 4
Objective 1.1 Recognize how becoming proficient with technology can help you understand
and participate in political issues in the world at large.
Other Global Issues......................................................................................................... 5
Objective 1.2 Describe how technology affects social issues in different societies.
Technology and Our Society............................................................................................ 7
Technology Impacts How We Think................................................................................. 7
Objective 1.3 Describe how technology is changing our cognitive processes.
Technology Impacts How We Connect............................................................................ 7
Objective 1.4 Explain how technology is expanding the ways we collaborate.
Technology Impacts How We Consume.......................................................................... 8
Objective 1.5 Summarize how technology has impacted the way we choose and consume products
and services.
Try this: Skyping Around the World........................................................................... 10
MAKE THIS: MAKE: A Virtual Assistant........................................................................ 11
How Will Technology Improve Your Life?....................................................................12
Learning Outcome 1.2 You will be able to discuss personal impacts technology can have
on your life and your career.
Technology at Home....................................................................................................... 12
Computer Literacy......................................................................................................... 12
Objective 1.6 Characterize computer literacy, and list some of its benefits.
ETHICS IN IT: Ethics and Technology........................................................................... 14
Technology and Your Career......................................................................................... 15
Impact of Computer Literacy on Your Career................................................................. 15
Objective 1.7 Characterize the impact computer literacy has on a variety of careers.
DIG DEEPER: Augmentative and Virtual Realities......................................................... 19
SOLVE THIS: How Technology Is Used on the World Stage and
in My Personal Life................................................................................................... 27
Chapter 2
Looking at Computers: Understanding the Parts................ 28
Understanding Digital Components............................................................................30
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer..................................................................................... 30
Computers Are Data Processing Devices...................................................................... 30
Objective 2.1 Describe the four main functions of a computer system and how they interact with data
and information.
Contents vii
thirteenth
thirteenth
EDITION
13
Bits and Bytes: The Language of Computers................................................................. 31
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
Types of Computers...................................................................................................... 31
Objective 2.3 List common types of computers, and discuss their main features.
Input Devices.................................................................................................................. 34
Keyboards and Touch Screens...................................................................................... 34
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices................................................................................... 36
Objective 2.5 Describe the main types of mice and pointing devices.
Image and Sound Input................................................................................................. 37
Objective 2.6 Explain how images and sounds are input into computing devices.
DIG DEEPER: How Touch Screens Work..................................................................... 38
Output Devices............................................................................................................... 41
Monitors........................................................................................................................ 41
Objective 2.7 Name common types of monitors, and identify important aspects of their quality.
Printers.......................................................................................................................... 43
Objective 2.8 Describe various types of printers, and explain when you would use them.
Sound Output............................................................................................................... 45
Objective 2.9 Discuss options for outputting sound from your computing devices.
Try this: What’s Inside My Computer?...................................................................... 48
MAKE THIS: MAKE: A Mobile App............................................................................... 49
Processing, Storage, and Connectivity........................................................................50
Learning Outcome 2.2 You will be able to describe how computers process and store data and
how devices connect to a computer system.
Processing and Memory on the Motherboard............................................................. 50
The Motherboard and Memory...................................................................................... 50
Objective 2.10 Define motherboard and RAM.
Processing.................................................................................................................... 51
Objective 2.11 Explain the main functions of the CPU.
Storing Data and Information........................................................................................ 52
Hard Drives................................................................................................................... 52
Objective 2.12 List the various types of hard drives.
Cloud Storage............................................................................................................... 52
Objective 2.13 Define cloud storage, and explain how to use it.
Portable and Optical Storage Options............................................................................ 52
Objective 2.14 Describe the various portable and optical storage options.
ETHICS IN IT: What Is Ethical Computing?................................................................... 53
Connecting Peripherals to the Computer.................................................................... 55
Computer Ports............................................................................................................. 55
Objective 2.15 List the common types of ports used today.
TRENDS IN IT: Green Computing (Green IT)................................................................ 56
Adding Ports: Expansion Cards and Hubs..................................................................... 58
Objective 2.16 List the options for adding ports to your device.
Power Controls and Ergonomics.................................................................................. 59
Power Controls.............................................................................................................. 59
Objective 2.17 Describe how to manage power consumption on your computing devices.
Setting It All Up: Ergonomics......................................................................................... 59
Objective 2.18 Define ergonomics, and discuss the ideal physical setup for using computing devices.
TRENDS IN IT: Innovations in Printing.......................................................................... 63
SOLVE THIS: Technology Wish List.............................................................................. 73
viii Contents
thirteenth
thirteenth
EDITION
13
Chapter 3
Using the Internet: Making the Most of the
Web’s Resources.................................................................... 74
Working and Playing on the Web................................................................................76
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is
used for collaboration, communication, commerce, and entertainment purposes.
The Internet and How It Works..................................................................................... 76
The Origin of the Internet............................................................................................... 76
Objective 3.1 Describe how the Internet got its start.
How the Internet Works................................................................................................. 77
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web........................................................... 79
Collaborating with Web 2.0 Tools.................................................................................. 79
Objective 3.3 Discuss the tools and technologies used to collaborate and communicate on the web.
Communicating over the Web....................................................................................... 83
Objective 3.4 Summarize how e-mail and instant messaging are used to communicate over the web.
Business and Entertainment on the Web..................................................................... 85
Types of E-Commerce................................................................................................... 85
Objective 3.5 Describe the different types of e-commerce.
E-Commerce Safeguards.............................................................................................. 86
Objective 3.6 Summarize precautions you should take when doing business online.
Web Entertainment........................................................................................................ 87
Objective 3.7 Describe the types of multimedia files found on the web.
Try this: Create a OneDrive Account to Store and Share
Your Files in the Cloud.............................................................................................. 90
MAKE THIS: MAKE: A Web-Capable App.................................................................... 91
Using the Web Effectively.............................................................................................92
Learning Outcome 3.2 You will be able to describe the tools and techniques required
to navigate and search the web.
Accessing and Moving Around the Web...................................................................... 92
Web Browsers............................................................................................................... 92
Objective 3.8 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names........................................................................... 93
Objective 3.9 Explain what a URL is, and discuss its main parts.
Navigating the Web....................................................................................................... 94
Objective 3.10 Describe tools used to navigate the web.
Favorites, Live Bookmarks, and Tagging........................................................................ 96
Objective 3.11 Describe tools used to mark websites for future use.
DIG DEEPER: Discovering the Semantic Web.............................................................. 97
Searching the Web Effectively....................................................................................... 98
Using Search Engines................................................................................................... 98
Objective 3.12 Describe the types of tools used to search the web, and summarize strategies used
to refine search results.
Evaluating Websites.................................................................................................... 100
Objective 3.13 Describe how to evaluate a website to ensure it is appropriate to use for
research purposes.
TRENDS IN IT: Doing Business on a Shoestring—Thanks to the Internet................... 101
Contents ix
thirteenth
thirteenth
EDITION
13
Using the Web Ethically............................................................................................... 102
Intellectual Property and Cyberbullying......................................................................... 102
Objective 3.14 Demonstrate an understanding of intellectual property and cyberbullying.
Privacy and Geolocation.............................................................................................. 103
Objective 3.15 Demonstrate an understanding of the ethical issues regarding privacy and geolocation.
ETHICS IN IT: Plagiarism and Copyright Violation: What Can You
Borrow from the Internet?....................................................................................... 104
SOLVE THIS: Create a Report: Conducting Research on the Web............................. 111
TECHNOLOGY IN FOCUS
The History of the Personal Computer................................................112
Chapter 4
Application Software: Programs That Let You
Work and Play.................................................................... 122
Programs That Let You Work......................................................................................124
Learning Outcome 4.1 You will be able to describe the basic ways to access and use
software and identify the main types of productivity and business software.
The Nuts and Bolts of Software.................................................................................. 124
Software Basics........................................................................................................... 124
Objective 4.1 Describe the differences between application and system software.
Basic Types of Apps and Software............................................................................... 124
Objective 4.2 List different types of apps and software you can use on your computing devices.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce........................... 125
Productivity and Business Software........................................................................... 126
Productivity Software................................................................................................... 126
Objective 4.3 List the types of applications included in productivity software suites, and describe
their uses and features.
Personal Financial Software......................................................................................... 133
Objective 4.4 List software that individuals use to manage their finances.
Business Software....................................................................................................... 134
Objective 4.5 List common types of software that large and small businesses use.
Try this: Citing Website Sources............................................................................. 138
MAKE THIS: MAKE: A More Powerful App................................................................. 139
Programs That Let You Play.......................................................................................140
Learning Outcome 4.2 Describe the different types of multimedia and educational software
available, and discuss how best to manage your software.
Multimedia and Educational Software........................................................................ 140
Digital Image-Editing, Video-Editing, and Drawing Software......................................... 140
Objective 4.6 Describe the uses and features of digital image-editing, video-editing, and drawing software.
Digital Audio Software................................................................................................. 142
Objective 4.7 Describe the uses and features of digital audio software.
DIG DEEPER: How Cloud Computing Works............................................................. 143
App Creation Software................................................................................................ 144
Objective 4.8 Describe the features of app creation software.
Educational and Reference Software........................................................................... 145
Objective 4.9 Describe common types of educational and reference software and their features.
x Contents
thirteenth
thirteenth
EDITION
13
Managing Your Software............................................................................................. 146
Getting Software......................................................................................................... 146
Objective 4.10 Describe where to obtain the main types of software.
Software Licenses....................................................................................................... 148
Objective 4.11 Explain how software licenses function.
ETHICS IN IT: Can I Borrow Software That I Don’t Own?........................................... 149
Getting the Right Software for Your System................................................................. 150
Objective 4.12 Describe how to ensure software you purchase will work on your device.
Installing and Uninstalling Software.............................................................................. 150
Objective 4.13 Describe how to install and uninstall software.
SOLVE THIS: Analyzing Benchmark Data................................................................... 159
Chapter 5
System Software: The Operating System,
Utility Programs, and File Management........................... 160
Understanding System Software................................................................................162
Learning Outcome 5.1 You will be able to explain the types and functions of an operating
system and explain the steps in the boot process.
Operating System Fundamentals................................................................................ 162
Operating System Basics............................................................................................ 162
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Machinery, Networks, and Business........................................ 163
Objective 5.2 Explain the different kinds of operating systems for machines, networks, and business.
Operating Systems for Personal Use........................................................................... 164
Objective 5.3 Explain the most common operating systems for personal use.
What the Operating System Does............................................................................... 167
The User Interface....................................................................................................... 167
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination............................................................................................... 168
Objective 5.5 Explain how the operating system helps manage hardware such as the processor,
memory, storage, and peripheral devices.
ETHICS IN IT: The Great Debate: Is Mac OS X Safer Than Windows?........................ 171
Software Application Coordination............................................................................... 172
Objective 5.6 Explain how the operating system interacts with application software.
Starting Your Computer............................................................................................... 172
The Boot Process........................................................................................................ 172
Objective 5.7 Discuss the process the operating system uses to start up the computer and how
errors in the boot process are handled.
Try this: Using Virtual Desktops in Windows 10...................................................... 176
MAKE THIS: MAKE: A Notification Alert...................................................................... 177
Using System Software...............................................................................................178
Learning Outcome 5.2 You will be able to describe how system software is used, including
managing the user interface, file management, and utility programs.
The Windows Interface................................................................................................ 178
Using Windows 10...................................................................................................... 178
Objective 5.8 Describe the main features of the Windows interface.
File Management.......................................................................................................... 181
Contents xi
thirteenth
thirteenth
EDITION
13
Organizing Your Files................................................................................................... 181
Objective 5.9 Summarize how the operating system helps keep your computer organized.
TRENDS IN IT: Open Source Software: Why Isn’t Everyone Using Linux?.................. 182
Working with Files and Folders.................................................................................... 184
Objective 5.10 Summarize how to view, sort, name, and manage files and folders.
File Compression......................................................................................................... 187
Objective 5.11 Summarize how file compression works.
Utility Programs............................................................................................................ 189
Windows Administrative Utilities................................................................................... 189
Objective 5.12 Outline the tools used to enhance system productivity.
DIG DEEPER: How Disk Defragmenter Utilities Work................................................. 191
File and System Backup Utilities.................................................................................. 192
Objective 5.13 Summarize the utilities used to backup and restore files and the computer system.
Accessibility Utilities..................................................................................................... 192
Objective 5.14 Describe the assistive technology utilities used to make using the computer system easier.
SOLVE THIS: Mobile Operating Systems: Changing Market Share............................. 201
TECHNOLOGY IN FOCUS
Information Technology Ethics...........................................................202
Chapter 6
Understanding and Assessing Hardware:
Evaluating Your System...................................................... 222
Evaluating Key Subsystems.......................................................................................224
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware
functioning.
Your Ideal Computing Device...................................................................................... 224
Moore’s Law............................................................................................................... 224
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Select a Computing Device......................................................................................... 225
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem................................................................................... 226
How the CPU Works................................................................................................... 226
Objective 6.3 Describe how a CPU is designed and how it operates.
Measuring CPU Performance...................................................................................... 228
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
Evaluating the Memory Subsystem............................................................................ 230
Random Access Memory............................................................................................ 230
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM................................................................................................................ 232
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
Evaluating the Storage Subsystem............................................................................. 233
Types of Storage Drives............................................................................................... 233
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
DIG DEEPER: How Hard Drives Work........................................................................ 235
Storage Needs............................................................................................................ 236
Objective 6.8 Evaluate the amount and type of storage needed for a system.
xii Contents
thirteenth
thirteenth
EDITION
13
Try this: Measure Your System Performance........................................................... 240
MAKE THIS: MAKE: A Location-Aware App............................................................... 241
Evaluating Other Subsystems and Making a Decision.............................................242
Learning Outcome 6.2 You will be able to evaluate your system’s reliability and decide
whether to purchase a new system or upgrade an existing one.
Evaluating the Media Subsystems.............................................................................. 242
Video Cards................................................................................................................ 242
Objective 6.9 Describe the features of video cards.
TRENDS IN IT: USB 3.1 and USB-C.......................................................................... 244
Sound Cards............................................................................................................... 245
Objective 6.10 Describe the features of sound cards.
Evaluating System Reliability and Moving On........................................................... 247
Maintaining System Reliability...................................................................................... 247
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer............................................................................... 248
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All........................................................................... 250
SOLVE THIS: Laptop Alternatives............................................................................... 257
Chapter 7
Networking: Connecting Computing Devices................... 258
How Networks Function.............................................................................................260
Learning Outcome 7.1 You will be able to explain the basics of networking, including
the components needed to create networks, and describe the different ways you can
connect networks to the Internet.
Networking Fundamentals........................................................................................... 260
Understanding Networks............................................................................................. 260
Objective 7.1 Explain what a network is and the pros and cons of having one.
Network Architectures................................................................................................. 262
Network Architectures Defined by Distance................................................................. 262
Objective 7.2 Discuss how networks are defined by distance.
Network Architectures Defined by Levels of Administration.......................................... 263
Objective 7.3 Discuss how networks are classified by levels of administration.
Ethernet Protocols....................................................................................................... 264
Objective 7.4 Describe the Ethernet protocols for wired and wireless networks.
Network Components.................................................................................................. 265
Transmission Media..................................................................................................... 265
Objective 7.5 Describe the types of transmission media used in networks.
Basic Network Hardware............................................................................................. 267
Objective 7.6 Describe the basic devices necessary for networks.
Network Software........................................................................................................ 268
Objective 7.7 Describe the type of software necessary for networks.
ETHICS IN IT: Ethical Challenges of the Internet of Things.......................................... 269
Connecting to the Internet........................................................................................... 269
Wired Broadband Internet Connections....................................................................... 269
Objective 7.8 Compare and contrast the broadband options available to access the Internet.
Wireless Internet Access............................................................................................. 271
Objective 7.9 Explain how to access the Internet wirelessly.
Contents xiii
thirteenth
thirteenth
EDITION
13
Dial-Up Connections................................................................................................... 272
Objective 7.10 Summarize the pros and cons of dial-up connections.
Try this: Testing Your Internet Connection Speed.................................................... 274
MAKE THIS: MAKE: Networked Devices.................................................................... 275
Your Home Network....................................................................................................276
Learning Outcome 7.2 You will be able to describe what you need to install and configure
a home network and how to manage and secure a wireless network.
Installing and Configuring Home Networks............................................................... 276
Planning Your Home Network...................................................................................... 276
Objective 7.11 Explain steps you should take before creating a home network.
Connecting Devices to a Network............................................................................... 277
Objective 7.12 Describe what you need in order to connect devices to a network.
Specialized Home Networking Devices........................................................................ 278
Objective 7.13 Describe specialized devices you can add to a home network.
Configuring Software for Your Home Network............................................................. 281
Objective 7.14 Summarize how to configure home network software.
TRENDS IN IT: How Smart Is Your Home?................................................................ 284
Managing and Securing Wireless Networks.............................................................. 285
Troubleshooting Wireless Network Problems............................................................... 285
Objective 7.15 Describe the potential problems with wireless networks and how to avoid them.
Securing Wireless Networks........................................................................................ 285
Objective 7.16 Describe how to secure a wireless home network.
SOLVE THIS: Home Networking Guide....................................................................... 295
TECHNOLOGY IN FOCUS
Under the Hood....................................................................................296
Chapter 8
Digital Devices and Media: Managing a Digital
Lifestyle............................................................................... 308
Mobile Devices...........................................................................................................310
Learning Outcome 8.1 You will be able to discuss the nature of digital signals and how
mobile computing devices are designed and operated.
Digital Basics................................................................................................................ 310
Digital Convergence.................................................................................................... 310
Objective 8.1 Describe how digital convergence has evolved.
Digital vs. Analog......................................................................................................... 311
Objective 8.2 Explain the differences between digital and analog signals.
The Power of Smartphones......................................................................................... 313
Cellular Technology..................................................................................................... 313
Objective 8.3 Describe the technologies used to communicate across cellular networks.
Using Smartphones and Keeping Them Secure.......................................................... 317
Objective 8.4 Explain how to effectively use cellular devices and mobile Internet access and how to keep
your devices secure.
Mobile Computing........................................................................................................ 321
Variety of Devices........................................................................................................ 321
xiv Contents
thirteenth
thirteenth
EDITION
13
Objective 8.5 Demonstrate an understanding of the range of different mobile computing devices.
Selecting a Device....................................................................................................... 322
Objective 8.6 Describe how to evaluate which mobile device is appropriate for a specific user.
Try this: Creating and Publishing a Movie................................................................ 324
MAKE THIS: MAKE: A Video-Playing App.................................................................. 325
The Impact of Digital Information.............................................................................326
Learning Outcome 8.2 You will be able to describe how digital technology is used to
produce and distribute digital texts, music, and video.
Digital Publishing.......................................................................................................... 326
E-Readers................................................................................................................... 326
Objective 8.7 Describe e-readers, and discuss the different types of e-readers that are available.
Using e-Texts............................................................................................................... 327
Objective 8.8 Explain how to purchase, borrow, and publish e-texts.
Digital Music................................................................................................................. 328
Creating and Storing Digital Music............................................................................... 328
Objective 8.9 Describe how digital music is created and stored.
TRENDS IN IT: NFC Chips: Do You Have a Digital Wallet?......................................... 329
Distributing Digital Music............................................................................................. 331
Objective 8.10 Summarize how to stream and publish digital music.
DIG DEEPER: P2P File Sharing.................................................................................. 332
Digital Media................................................................................................................. 333
Digital Photography..................................................................................................... 333
Objective 8.11 Explain how best to create, print, and share digital photographs.
Digital Video................................................................................................................ 334
Objective 8.12 Describe how to create, edit, and distribute digital video.
ETHICS IN IT: Managing Your Copyrights: Copyleft Might Simplify Your Life............... 338
SOLVE THIS: Estimating Cellular Data Usage............................................................. 345
Chapter 9
Securing Your System: Protecting Your Digital
Data and Devices............................................................... 346
Threats to Your Digital Assets.....................................................................................348
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online
annoyances and the threats they pose to your digital security.
Identity Theft and Hackers.......................................................................................... 348
Identity Theft............................................................................................................... 349
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
Hacking....................................................................................................................... 349
Objective 9.2 List and describe the different types of hackers.
Hacking Tools and Attack Types.................................................................................. 350
Objective 9.3 Describe the various tools hackers use and the types of attacks they might launch
against computers.
Computer Viruses......................................................................................................... 353
Virus Basics................................................................................................................. 353
Objective 9.4 Explain what a computer virus is, why they are a threat to your security, how a
computing device catches a virus, and the symptoms it may display.
Types of Viruses.......................................................................................................... 353
Objective 9.5 List the different categories of computer viruses, and describe their behaviors.
Contents xv
thirteenth
thirteenth
EDITION
13
Online Annoyances and Social Engineering.............................................................. 355
Malware: Adware and Spyware................................................................................... 355
Objective 9.6 Explain what malware is, and list the common types of malware.
Spam.......................................................................................................................... 356
Objective 9.7 Define spam, and describe strategies to combat it.
Cookies....................................................................................................................... 358
Objective 9.8 Explain what cookies are and whether they pose a security threat.
Ethics in IT: You’re Being Watched...But Are You Aware You’re Being Watched?..... 359
Social Engineering....................................................................................................... 360
Objective 9.9 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
Trends in IT: Computers in Society: Spear Phishing: The Bane
of Data Breaches.................................................................................................... 362
Try this: Testing Your Network Security................................................................... 364
MAKE THIS: MAKE: A Password Generator............................................................... 365
Protecting Your Digital Property.................................................................................366
Learning Outcome 9.2 Describe various ways to protect your digital property and data
from theft and corruption.
Restricting Access to Your Digital Assets.................................................................. 366
Firewalls...................................................................................................................... 366
Objective 9.10 Explain what a firewall is and how a firewall protects your computer from hackers.
Preventing Virus Infections........................................................................................... 368
Objective 9.11 Explain how to protect your computer from virus infection.
Authentication: Passwords and Biometrics.................................................................. 370
Objective 9.12 Describe how passwords and biometric characteristics can be used for user
authentication on computer systems.
Anonymous Web Surfing: Hiding from Prying Eyes...................................................... 374
Objective 9.13 Describe ways to surf the web anonymously.
Keeping Your Data Safe............................................................................................... 377
Protecting Your Personal Information........................................................................... 377
Objective 9.14 Describe the types of information you should never share online.
Backing Up Your Data................................................................................................. 377
Objective 9.15 List the various types of backups you can perform on your computing devices,
and explain the various places you can store backup files.
Protecting Your Physical Computing Assets............................................................. 382
Environmental Factors and Power Surges.................................................................... 382
Objective 9.16 Explain the negative effects environment and power surges can have on
computing devices.
Preventing and Handling Theft..................................................................................... 383
Objective 9.17 Describe the major concerns when a device is stolen and strategies for solving
the problems.
DIG DEEPER: Computer Forensics: How It Works..................................................... 385
SOLVE THIS: Computer Security................................................................................ 395
TECHNOLOGY IN FOCUS
Careers in IT.........................................................................................396
Glossary................................................................................................................................. 408
Index...................................................................................................................................... 419
xvi Contents
thirteenth
thirteenth
EDITION
13
About the Authors
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer
science and business courses. He holds a BS in accounting from Rider
University and an MS in information systems from Drexel University, and
he is a certified public accountant. After a successful career in business,
Alan finally realized that his true calling is education. He has been teaching at the college
level since 2000. Alan enjoys attending technical conferences and meets regularly with
faculty and administrators from other colleges to discuss curriculum development and new
methods of engaging students.
13
Dedication
For my wife, Patricia, whose patience, understanding, and support
continue to make this work possible … especially when I stay up past
midnight writing! And to my parents, Jackie and Dean, who taught me
the best way to achieve your goals is to constantly strive to improve
yourself through education. Alan Evans
For all the teachers, mentors, and gurus who have popped in and out
of my life. Kendall Martin
xviii Dedication
thirteenth
thirteenth
EDITION
13
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching,
and they are a continual source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our
spouses and children made sacrifices (mostly in time not spent with us) to permit us to
make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience,
a few individuals deserve special mention. The constant support and encouragement we
receive from Jenifer Niles, Executive Acquisitions Editor, and Andrew Gilfillan, VP, Editorial
Director, continually make this book grow and change. Our heartfelt thanks go to Shannon
LeMay-Finn, our Developmental Editor. Her creativity, drive, and management skills helped
make this book a reality. We also would like to extend our appreciation to Jonathan Cheung
and Holly Haydash, our Editorial and Production Project Managers, who work tirelessly to
ensure that our book is published on time and looks fabulous. The timelines are always
short, the art is complex, and there are many people with whom they have to coordinate
tasks. But they make it look easy! We’d like to extend our thanks to the media and MyITlab
team: Eric Hakanson, Zach Alexander, and John Cassar for all of their hard work and
dedication.
There are many people whom we do not meet in person at Pearson and elsewhere who
make significant contributions by designing the book, illustrating, composing the pages,
producing multimedia, and securing permissions. We thank them all.
And finally, we would like to thank the reviewers and the many others who contribute
their time, ideas, and talents to this project. We appreciate their time and energy, as their
comments help us turn out a better product each edition. A special thanks goes to Elizabeth
McBride, a wonderfully talented graphic designer who helped by creating many new
graphics for this edition of the text.
Acknowledgments xix
thirteenth
thirteenth
EDITION
13
Technology in Action
Reviewers
Pearson and the authors would like to thank the following people for their help and
time in making this book what it is over the 13 editions. We couldn’t publish this
book without their contributions.
Neale Adams Iowa Central Community College Gerald Burgess Western New Mexico University
Paul Addison Ivy Tech Dave Burgett McLennan
Afrand Agah West Chester Ed Bushman Yavapai College
Jack Alanen CSU-Northridge Marcus Butler West LA
Karen Allen Community College of Rhode Island Eric Cameron Passaic County Community College
Ted Allen Reasoner IUPUI Jill Canine Ivy Tech
Peggy Anderson SUNY at Cortland Gene Carbonara Long Beach Community College
Barry Andrews Mt. SAC Gene Carbonaro Long Beach City College
Lou Ann Stroup Ivy Tech John Carlisle Nashua Community College
Mary Ann Zlotow College of DuPage Glenn Carter Sonoma State
Sabum Anyangwe Harford Community College Steve Carver Ivy Tech
Linda Arnold HACC Patricia Casey Trident Tech
Adnan Atshan Passaic County Community College Joni Catanzaro Louisiana State University
Adeleye Bamkole Passaic County Community College Afi Chamlou NOVA Alexandria
Guarav Bansal Wisconsin-Green Bay Robert Chirwa KCTCS-Bluegrass-Cooper-CIT 105
Susan Barkalow St. Cloud State Debbie Christenberry Randolph Community College
Bill Barnes Catawba Valley Community College Desmond Chun Chabot College
Ricky Barnes Catawba Valley Community College Sherri Clark Ivy Tech
Carolyn Barren Macomb Community College Kevin Cleary SUNY at Buffalo
Tony Basilico Community College of Rhode Island Cynthia Collings Central AZ
Steven Battilana West Chester Mark Connell SUNY at Cortland
Michelle Beets Iowa Central Community College Kae Cooper BCTC/KCTCS
Kourosh Behzadnoori Tarrant SE Dale Craig Fullerton College
Chris Belcher CCAC-South Becky Curtain William Rainer Harper College
Elise Bell CCSF Juliana Cypert Tarrant County College
Julie Bell Delgado Cmty Clg Paul Dadosky Ivy Tech
Robert Benavides Collin Cty Enoch Damson Akron
Garland Berry Columbia College James Dang Tarrant SE
Diane Bittle HACC Marvin Daugherty Ivy Tech
Burton Borlongan Mesa Community College John Dawson IUPUI
Carolyn Borne Louisiana State University Robert Deadman IUPUI
Gina Bowers-Miller HACC-Wildwood Ed Delean NOVA Alexandria
Jeff Bowker Montco Mary Dermody Chabot College
Vicki Brooks Columbia College Don Dershem Mt View
EDITION
13
Charles Dessasure Tarrant SE Jerry Gonnella Northern KY
Jeanette Dix Ivy Tech Holly Gould Ivy Tech
Sally Dixon Skagit Valley Community College Deidre Grafel Chandler-Gilbert Community
Gretchen Douglas SUNY at Cortland College
Judy Duff Louisiana Delta College Diedre Grafel Chandler Gilbert Community
College
Stacia Dutton SUNY Canton
Kemit Grafton Oklahoma State University-
Donna Earhart Genesee Community College Oklahoma City
Ed Eill Delaware City Community College Debra Grande Community College of Rhode
Pam Ellis PA College of Technology Island
Sylvia Emerson Rock Valley College Nancy Grant CCAC-South
John Enomoto East LA Wade Graves Grayson
Ron Enz Chattahoochee Tech Natalia Grigoriants Pierce College
Nancy Evans Indiana University-Purdue Glen Grimes Collin Cty
University Indianapolis Toby Gustafson UCR
James Fabrey West Chester Greg Hanson Ivy Tech
Deb Fells Mesa Community College A.C. Chapin Harford Community College
Pat Fenton West Valley Marie Hartlein
Marjorie Feroe Delaware City Community Montco Meng Has
College
Burlington County Lisa Hawkins
Beverly Fite Amarillo College
Carol Fletcher Louisiana Delta College Frederick Community Joan Heise
Barbara Fogle, Stuhr Trident Tech College
Ann Ford Tyson Florida State University Ivy Tech Sue Heistand
coordinator) Iowa Central Jessica Helberg
Tom Foster Chandler Gilbert Community Community College
College Northern Virginia Terri Helfand
Susan Fry Boise State University Community College
Barb Garrell Delaware City Community Chaffey Community Jaime Hicks
College College
Barbara Garrell Delaware County Community Ivy Tech Fred Hills
College McLennan Timothy Hinz
Rich Geglein Ivy Tech Genesee Community Andrew Hobbs
Janet Gelb Grossmont Community College College
Kevin Gentry Ivy Tech Delaware State Kristen Hockman
Ian Gibbons Hillsborough Community University
College-Ybor Univ of Missouri- Susan Hoggard
Columbia
Randy Gibson Indian River State College
Tulsa Community Don Holcomb
Ernie Gines Tarrant SE
College
Rebecca Giorcelli Fairmont State University
KCTCS-Bluegrass- Terry Holleman
Anita Girton PA College of Technology Cooper-CIT 105
Ellen Glazer Broward Community College, Catawba Valley Debbie Holt
South Community College
Cathy Glod Mohawk Valley Cmty College KCTCS-Bluegrass- Barbara Hotta
Valerie Golay Ivy Tech Cooper-CIT 105
13
Ellen Kessler HACC-Wildwood Blankenstein Nashua Community College
Allyson Kinney Gateway Community College Denise Nearing Indian River State College
REBECCA KIRK Augusta State University Jean-Claude Ngatchou New Jersey City Univ.
Ronald Kizior Loyola University Chicago Doreen Nicholls Mohawk Valley Cmty College
Meg Kletke Oklahoma State University Brenda Nielsen Mesa Community College
Paul Koester Tarrant County College, Northwest Keith Noe Ivy Tech
Kam Kong Delaware State University Kathy Olson Ivy Tech
Hon-Chung Kwok CCSF Helen Ortmann CCAC-South
Susan LaBrie Northampton Community College Meshack Osiro Ivy Tech
Don Lafond SJRCC (St. John’s River) Shelly Ota Leeward Community College
Rose LaMuraglia San Diego City ChongWoo Park Georgia Gwinnett College
David Lange Grand Valley Lucy Parker CSU-Northridge
Earl Latiolas Delgado Cmty Clg Rachel Pena South TX College
Janet Laubenstein Northampton Cmty Coll Wayne Phillips Chabot College
Lori Laudenbach St. Cloud State Jennifer Pickle Amarillo
Krista Lawrence Delgado Cmty Clg Blanca Polo Leeward Community College
Dr. Kate LeGrand Broward College Jim Poole Honolulu Community College
Kate LeGrand Broward Community College, Brian Powell West Virginia University
South Ernest Proctor LA Trade
Yi Li Zhuang Macomb Community College Diane Puopolo Bunker Hill Community College
Darrell Lindsey SJRCC (St. John’s River) Mike Puopolo Bunker Hill Community College
Bob Lingvall Southwestern James R. Anthos South University-Columbia
Duane Lintner Amarillo David R. Surma Indiana University South Bend
Thomas Liu New Jersey City Univ. Charles R. Whealton Delaware Technical and
Wei Liu Georgia Gwinnett College Community College
Lynne Lyon Durham College Pat Rahmlow Montco
Lydia Macaulay Tarrant SE Michelle Reznick Oakton Community College
Norma Marler Catawba Valley Community Leasa Richards Columbia College
College Kathie Richer Edmonds Community College
Benjamin Marrero Ivy Tech Darrell Riddell Ivy Tech
Ben Martz Northern KY Donald Riggs Schenectady County Community
Lydia Mata Eastern AZ College
Jenny Maurer PA College of Technology Don Riggs Schenectady County Community
John Mayhorne Harford Community College College
Glendora Mays SJRCC (St. John’s River) Terry Rigsby Hill College
James McBride Eastern AZ Amy Roche Northampton Community College
Kari Meck HACC Scott Rosen Santa Rosa Junior College
Doug Medin Western New Mexico University Peter Ross Univ. of Albany
John Messer PA College of Technology Scott Russell Eastern AZ
Hillary Miller Kingwood Amy Rutledge Oakland University
Saeed Molki South TX College Tom Ryan SJRCC (St. John’s River)
Phil Moorhead Ivy Tech Jessie Saldana Cypress
Linda Moulton Montco Lorraine Sauchin Duquesne
Rob Murray Ivy Tech Judy Scheeren Duquesne
EDITION
13
Lois Scheidt Ivy Tech James Taggart Atlantic Cape Community College
Marcia Schlafmitz New Jersey City Univ. Mel Tarnowski Macomb Community College
NAME SCHOOL Juliana.P. Cypert Tarrant County College-NE
Ken Schroeder Ivy Tech Joyce Thompson Lehigh Carbon Community
Todd Schultz Augusta State University College
Dick Schwartz Macomb Community College Janine Tiffany Reading Area Comm College
Francis Seidel Frederick Cmty College Faye Tippey Ivy Tech
Lili Shashaani Duquesne Matthew Trotter South TX College
Emily Shepard Central Carolina Community College Pam Uhlenkamp Iowa Central Community College
Helen Sheran East LA Pat Vacca El Camino College
Cliff Sherrill Yavapai College Nelmy Vasquez Broward Community College,
South
Lisa Simpson-Kyle Yavapai College
Pete Vetere Montco
Noah Singer Tulsa Community College
Susie Viars-Thomas Grayson
Steve Singer Kapiolani Community College
Gabriel Viera South TX College
Ann-Marie Smith Delaware City Community College
Cynthia Wagner McLennan
Will Smith Tulsa Community College
Rod Waller Indian River State College
Michele Smolnik Columbia College
Laurie Wallmark Raritan Valley Community College
Ali Soleymani NOVA Alexandria
Kari Walters Louisiana State University
Steve St. John Tulsa Community College
Stacy Ward Grafton High School
Neal Stenlund Northern Virginia Community
College Karen Weil McLennan
Steve Stepanek CSU-Northridge Charles Whealton Del Tech & Community
College-Dover
Jo Stephens University of AR Community
College -Batesville Deena White Grayson
Dennis Stewart NOVA Alexandria Phil Whitney Bakersfield College
Ben Stonebraker Ivy Tech Casey Wilhelm North Idaho College
Lynne Stuhr Trident Tech Billie Williams San Diego City
Alexis Stull Fairmont State University Melanie Williamson KCTCS-Bluegrass-Cooper-CIT
105
Denise Sullivan Westchester Community College
Xin Xu Georgia Gwinnett College
Dottie Sunio Leeward Community College
Thomas Yip Passaic County Community
Dave Surma IU South Bend College
Michael Swafford Tulsa Community College Roger Young Ivy Tech
Cheryl Sypniewski Macomb Community College Mary Zegarski Northampton Community College
Ann Taff Tulsa Community College
13
Letter from the Authors
Our 13th Edition—A Letter from the Authors
EDITION
13
7. Evaluating and upgrading computing devices
8. Understanding home networking options and keeping computing devices safe from
hackers
9. Going mobile with smartphones, netbooks, tablets, and laptops
10. Going behind the scenes, looking at technology in greater detail
We strive to structure the book in a way that makes navigation easy and reinforces key
concepts. In this edition, we have designed the text around learning outcomes and objectives,
making them a more prominent part of the chapter structure. Students will see the learning
outcomes and objectives in the chapter opener, throughout the text itself, as well as in the
summary so they understand just what they are expected to learn.
We continue to structure the book in a “spiraling” manner, intentionally introducing on a basic
level in the earlier chapters concepts that students traditionally have trouble with and then later
expanding on those concepts in more detail when students have become more comfortable
with them. Thus, the focus of the early chapters is on practical uses for the computer, with
real-world examples to help the students place computing in a familiar context.
For example, we introduce basic hardware components in Chapter 2, and then we go
into increasingly greater detail on some hardware components in Chapter 6 and in the
“Under the Hood” Technology in Focus feature. The Behind the Scenes chapters venture
deeper into the realm of computing through in-depth explanations of how programming,
networks, the Internet, and databases work. They are specifically designed to keep
more experienced students engaged and to challenge them with interesting research
assignments.
In addition to extensive review, practice, and assessment content, each chapter contains several
problem-solving, hands-on activities that can carried out in the classroom or as homework:
• The Try This exercises lead students to explore a particular computing feature related to the
chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to
reinforce the material taught in the text and to support both classroom lectures and distance
learning:
• The Helpdesk training content, created specifically for Technology in Action, enables
students to take on the role of a helpdesk staffer fielding questions posed by computer users.
These have been updated to reflect the way in which users access help today.
• Exciting Sound Byte multimedia—fully updated and integrated with the text—expand
student mastery of complex topics.
• The Tech Bytes Weekly updates deliver the latest technology news stories to you for use in
your classroom. Each is accompanied by specific discussion topics and activities to expand
on what is within the textbook materials.
This book is designed to reach the students of the twenty-first century and prepare them
for the role they can take in their own community and the world. It has been an honor to
work with you over the past 13 years to present and explain new technologies to students,
and to show them the rapidly growing importance of technology in our world.
EDITION
13
What’s New
Technology in Action, 13th Edition
Explore the Hallmarks and New Features of Technology in Action, 13th Edition
Instruction: Engage all types of learners with a Practice: Hands-on resources and simulations allow
variety of instructional resources students to demonstrate understanding
• Interactive e-Text provides an environment in which stu- • Try This Projects are hands-on projects that students
dents can interact with the learning resources directly and complete to practice what they are learning and demon-
receive immediate feedback. strate proficiency with important topics. Each project is
• NEW Preview Videos provide students with a quick look at accompanied by a how-to video.
what they will learn in the chapter. • Solve This! Projects put the concepts students are
• PowerPoint Presentations can be used in class for lecture learning into action through real-world problem solving
or assigned to students, particularly online students for using Microsoft Word, Access, and Excel. There is a grader
instruction and review. version available for most projects in the Practice folder.
• Audio PowerPoint Presentations deliver audio versions • Newly Redesigned Helpdesks are interactive lessons
of the PowerPoint presentations—an excellent lecture- based on the chapter objectives. Students are fully
replacement option for online students. engaged as they play the role of a helpdesk staffer assisting
customers via a live chat, decision-based simulation.
• TechBytes Weekly is a weekly newsfeed that keeps your
course current by providing interesting and relevant news items. • Sound Bytes provide an audio/visual lesson on additional
The articles come with ready-to-use discussion questions. topics related to the chapter, including a brief quiz at the end.
• Make This! Projects address the hot area of mobile app • IT Simulations provide 12 individual scenarios that
creation! Each chapter includes activities where students students work through in an active learning environment.
build programs that run on their mobile devices. Most of the • Windows 10 high-fidelity training simulations allow
chapters use App Inventor to build Android apps that can students to explore Windows in a safe, guided environment
be installed on any Android device. Even without an Android that provides feedback and Learning Aids (Watch and
device, students can use the emulator and still get creating. Practice) to assist them if they need help.
By the end of the course they will have built 11 small apps.
Each project includes instructions and a how-to video. Review: Self-check resources keep learning
An annotated instructor’s edition provides teaching tips, on track
homework and assessment suggestions, brief overviews of • Replay Videos for Parts 1 and 2 of the chapter provide
each chapter’s Try This, Make This, and Solve This exer- an objective-based review of what students should have
cises, as well as select Sound Byte talking points and ethics learned. Videos have a short quiz and can be accessed
debate starters. from mobile devices for a quick review.
13
• Check Your Understanding Quizzes Part 1 and 2 provide Chapter 3
a self-check covering objectives in each part of the chapter • Learning Outcomes and Learning Objectives have been in-
so that students can see how well they are learning the tegrated throughout the chapter and in the Chapter Review.
content.
• Throughout the chapter, text, figures, and photos have
• Adaptive Dynamic Study Modules are adaptive been updated.
flashcards that provide students with a personalized
• New content about project collaboration (video conferenc-
review based on their strengths and weaknesses.
ing, screen sharing, and project management tools) has
Assessment: Measure performance with ready-to- been added.
use resources • The Bits&Bytes “Making Safe Online Payments” has been
• Chapter Quiz provides a way for students to test that they updated by adding in biometric security measures.
have learned the material from the entire chapter. • A new Bits&Bytes, “Microsoft Edge: The New Browser,” has
• Critical Thinking Questions require that students demon- been added.
strate their understanding through written answers that are • New content on caret browsing has been added.
manually graded.
• A new Bits&Bytes, “Maintain Privacy while Searching the
• Testbank Exams provide customizable prebuilt, auto- Web,” has been added.
graded, objective-based questions covering the chapter
• A new Bits&Bytes, “Digital Agents and Predictive Search,”
objectives.
has been added.
In addition to these changes, all chapters have been • A new ethics section on using the web ethically that
updated with new images, current topics, and state-of-the includes content on intellectual property, cyberbullying,
art technology coverage. Some of the chapter changes privacy, and geolocation has been added.
are listed here:
Technology in Focus: The History of the Personal Computer
Chapter 1
• Learning Outcomes and Learning Objectives have been
• Learning Outcomes and Learning Objectives have been in- integrated throughout the Technology in Focus.
tegrated throughout the chapter and in the Chapter Review.
• Throughout the Technology in Focus, text, figures, and
• Throughout the chapter, text, figures, and photos have photos have been updated.
been updated.
Chapter 4
• New content on the political impact of technology has been
added. • Learning Outcomes and Learning Objectives have been
integrated throughout the chapter and in the Chapter
• Content on the use of technology in careers has been Review.
updated.
• Throughout the chapter, text, figures, and photos have
• New “Dig Deeper: Augmentative and Virtual Realities” has been updated.
been added.
• Next generation smartphone sensor technology is now
• New ethics section on rules for ethical conduct in a global, covered in the “How Cool Is This?” feature.
Internet-enabled world has been added.
• The section on app creation software has been updated.
Chapter 2 • Images and text have been updated to reflect Office 2016
• Learning Outcomes and Learning Objectives have been in- changes.
tegrated throughout the chapter and in the Chapter Review.
Chapter 5
• Throughout the chapter, text, figures, and photos have
• Learning Outcomes and Learning Objectives have been
been updated to reflect Windows 10 changes.
integrated throughout the chapter and in the Chapter
• The section on voice input has been updated to reflect in- Review.
formation on the latest intelligent personal assistants (such
• Microsoft HoloLens is now covered in the “How Cool Is
as Siri and Cortana).
This?” feature.
• A new Bits&Bytes, “Save Power and Avoid Eyestrain: Use
• New “How Cool Is This?” feature has been added on
Blackle,” has been added.
smartwatches.
ANCIENT LAW.
I. A Donation Extorted by Violence is Void.
A gift extorted by force and fear has no validity whatever.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com