100% found this document useful (2 votes)
260 views79 pages

(Ebook PDF) Computing Essentials 2021 28th Edition Available Full Chapters

Educational file: (eBook PDF) Computing Essentials 2021 28th EditionInstantly accessible. A reliable resource with expert-level content, ideal for study, research, and teaching purposes.

Uploaded by

mpmhjppaiv6058
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
260 views79 pages

(Ebook PDF) Computing Essentials 2021 28th Edition Available Full Chapters

Educational file: (eBook PDF) Computing Essentials 2021 28th EditionInstantly accessible. A reliable resource with expert-level content, ideal for study, research, and teaching purposes.

Uploaded by

mpmhjppaiv6058
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

(eBook PDF) Computing Essentials 2021 28th

Edition pdf download

https://ebookluna.com/product/ebook-pdf-computing-essentials-2021-28th-edition/

★★★★★ 4.6/5.0 (27 reviews) ✓ 237 downloads ■ TOP RATED


"Excellent quality PDF, exactly what I needed!" - Sarah M.

DOWNLOAD EBOOK
(eBook PDF) Computing Essentials 2021 28th Edition pdf
download

TEXTBOOK EBOOK EBOOK LUNA

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Computing Essentials
Making IT work for you
INTRODUCTORY 2021

oLe23994_fm_i-xxv.indd 1 11/13/19 9:07 PM


Contents

Communication 34
1 Social Networking 34
Blogs, Microblogs, Podcasts, and Wikis 35
INFORMATION TECHNOLOGY, Messaging 36
THE INTERNET, AND YOU 2 E-mail 37
Search Tools 39
Introduction 4 Search Engines 39
Information Systems 4 Content Evaluation 39
People 6 Electronic Commerce 40
Software 7 Security 41
System Software 7 Cloud Computing 42
Application Software 8 The Internet of Things 43
Making IT work for you: Careers in IT 44
A Look to the Future:
Free Antivirus Program 9
Home Smart Home 45
Hardware 10
Types of Computers 10
Visual Summary 46
Cell Phones 11
Key Terms 50
Personal Computer Hardware 11
Multiple Choice 51
Data 13 Matching 52
Connectivity and the Mobile Internet 14 Open-Ended 52
Careers in IT 15 Discussion 53
A Look to the Future: Using and Understanding
Information Technology 16

Visual Summary 17 3
Key Terms 20
Multiple Choice 21
APPLICATION SOFTWARE 54
Matching 22 Introduction 56
Open-Ended 22 Application Software 56
Discussion 23 User Interface 56
Common Features 58
General-Purpose Applications 58
2 Word Processors 58
Spreadsheets 61
THE INTERNET, THE WEB, AND Presentation Software 63
Database Management Systems 64
ELECTRONIC COMMERCE 24 Specialized Applications 65
Introduction 26 Graphics Programs 65
The Internet and the Web 26 Video Game Design Software 66
Web Authoring Programs 67
Making IT work for you: Other Specialized Applications 68
Online Entertainment 28 Mobile Apps 68
Apps 68
Internet Access 30 App Stores 69
Providers 30 Software Suites 70
Browsers 30 Office Suites 70
Web Utilities 32 Cloud Computing 70
Filters 32 Specialized and Utility Suites 70
File Transfer Utilities 32 Careers in IT 71
Internet Security Suites 33

viii

oLe23994_fm_i-xxv.indd 8 11/13/19 9:07 PM


Making IT work for you: Making IT work for you:
Cloud Office Suites 72 Gaming 110
A Look to the Future: VR and AR Applications in Wearable Computers 112
the Workplace 74 Components 112
System Board 113
Visual Summary 75 Microprocessor 114
Key Terms 78 Microprocessor Chips 115
Multiple Choice 79 Specialty Processors 115
Matching 80 Memory 116
Open-Ended 80 RAM 116
Discussion 81 ROM 116
Flash Memory 116
Expansion Cards and Slots 117
Bus Lines 118
4 Expansion Buses 118
SYSTEM SOFTWARE 82 Ports 119
Standard Ports 119
Introduction 84 Specialized Ports 119
System Software 84 Cables 120
Operating Systems 85 Power Supply 120
Functions 85 Electronic Data and
Features 86 Instructions 121
Categories 87 Numeric Representation 121
Mobile Operating Systems 88 Character Encoding 122
Desktop Operating Systems 89 Careers in IT 123
Windows 89 A Look to the Future: Brain–Computer
macOS 89 Interfaces 124
UNIX and Linux 90
Virtualization 90
Visual Summary 125
Utilities 91 Key Terms 128
Multiple Choice 129
Making IT work for you:
Matching 130
Virtual Assistant 92 Open-Ended 130
Discussion 131
Operating System Utilities 94
Utility Suites 97
Careers in IT 97
A Look to the Future: Making Better Computers 6
by Making Them More Human 98
INPUT AND OUTPUT 132
Visual Summary 99 Introduction 134
Key Terms 102 What Is Input? 134
Multiple Choice 103 Keyboard Entry 134
Matching 104 Keyboards 135
Open-Ended 104 Pointing Devices 136
Discussion 105 Touch Screen 136
Mouse 136
Game Controllers 136
5 Scanning Devices 137
Optical Scanners 137
THE SYSTEM UNIT 106 Card Readers 138
Bar Code Readers 138
Introduction 108 RFID Readers 138
System Unit 108 Character and Mark Recognition
Smartphones 108 Devices 139
Tablets 108 Image Capturing Devices 139
Laptops 109 Digital Cameras 139
Desktops 109 Webcams 140

CONTENTS ix

oLe23994_fm_i-xxv.indd 9 11/13/19 9:07 PM


Audio-Input Devices 140
Making IT work for you:
Voice Recognition Systems 140
What Is Output? 141 Cloud Storage 172
Monitors 141
Mass Storage Devices 174
Features 141
Enterprise Storage System 174
Flat-Panel Monitors 142
Storage Area Network 175
E-book Readers 142
Other Monitors 143
Careers in IT 175
Printers 144 A Look to the Future:
Features 144 Next-Generation Storage 176
Inkjet Printers 145
Laser Printers 145 Visual Summary 177
3D Printers 145 Key Terms 180
Other Printers 145 Multiple Choice 180
Audio-Output Devices 146 Matching 181
Combination Input and Output Open-Ended 182
Devices 146 Discussion 182
Headsets 146
Multifunctional Devices 147
Virtual Reality Head-Mounted Displays
and Controllers 147
Drones 147
8
COMMUNICATIONS
Making IT work for you: AND NETWORKS 184
Headphones 148 Introduction 186
Robots 150 Communications 186
Ergonomics 150 Connectivity 186
Portable Computers 152 The Wireless Revolution 187
Careers in IT 152 Communication Systems 187
A Look to the Future: The Internet of
Communication Channels 188
Wireless Connections 188
Things 153
Physical Connections 189
Connection Devices 190
Visual Summary 154 Modems 190
Key Terms 158 Connection Service 190
Multiple Choice 159
Matching 160 Making IT work for you:
Open-Ended 160
Discussion 161 The Mobile Office 192
Data Transmission 194
Bandwidth 194
Protocols 194
7 Networks 195
Terms 195
SECONDARY STORAGE 162
Network Types 197
Introduction 164 Local Area Networks 197
Storage 164 Home Networks 197
Solid-State Storage 165 Wireless LAN 198
Solid-State Drives 165 Personal Area Network 198
Flash Memory Cards 166 Metropolitan Area Networks 198
USB Drives 166 Wide Area Networks 199
Hard Disks 167 Network Architecture 199
Internal Hard Disks 167 Topologies 200
External Hard Disks 167 Strategies 201
Network Drives 167 Organizational Networks 201
Performance Enhancements 168 Internet Technologies 201
Optical Discs 169 Network Security 202
Cloud Storage 170 Careers in IT 203

x CONTENTS

oLe23994_fm_i-xxv.indd 10 11/13/19 9:07 PM


A Look to the Future: Telepresence Lets You Be Management Levels 246
There without Actually Being There 204 Information Flow 247
Computer-Based Information
Systems 248
Visual Summary 205 Transaction Processing Systems 249
Key Terms 208 Management Information Systems 251
Multiple Choice 209 Decision Support Systems 252
Matching 210
Executive Support Systems 253
Open-Ended 210
Other Information Systems 255
Discussion 211
Expert Systems 256
Careers in IT 256
A Look to the Future: IBM’s Watson:
9 The Ultimate Information-Finding Machine 257

PRIVACY, SECURITY, Visual Summary 258


AND ETHICS 212 Key Terms 260
Multiple Choice 261
Introduction 214 Matching 262
People 214 Open-Ended 262
Privacy 214 Discussion 263
Big Data 215
Private Networks 217
The Internet and the Web 217
Online Identity 220 11
Major Laws on Privacy 221
Security 221 DATABASES 264
Cybercrime 221 Introduction 266
Social Engineering 223
Data 266
Malicious Software 223
Data Organization 267
Malicious Hardware 223
Key Field 268
Measures to Protect Computer
Batch versus Real-Time Processing 268
Security 224
Databases 269
Making IT work for you: Need for Databases 270
Database Management 270
Security and Technology 229 DBMS Structure 272
Ethics 230 Hierarchical Database 272
Cyberbullying 230 Network Database 273
Copyright and Digital Rights Relational Database 273
Management 230 Multidimensional Database 274
Plagiarism 231 Object-Oriented Database 275
Careers in IT 232 Types of Databases 276
Individual 276
A Look to the Future: End of Anonymity 233 Company 276
Distributed 277
Visual Summary 234 Commercial 277
Key Terms 237 Database Uses and Issues 278
Multiple Choice 238 Strategic Uses 278
Matching 239 Security 278
Open-Ended 239 Careers in IT 279
Discussion 240 A Look to the Future: The Future
of Crime Databases 280

10 Visual Summary 281


Key Terms 284
INFORMATION SYSTEMS 242 Multiple Choice 285
Matching 286
Introduction 244 Open-Ended 286
Organizational Information Flow 244 Discussion 287
Functions 244

CONTENTS xi

oLe23994_fm_i-xxv.indd 11 11/13/19 9:07 PM


Desired Output 316
Input Data 316
12 Processing Requirements 317
Program Specifications Document 317
SYSTEMS ANALYSIS Step 2: Program Design 318
Top-Down Program Design 318
AND DESIGN 288 Pseudocode 319
Introduction 290 Flowcharts 319
Systems Analysis and Design 290 Logic Structures 321
Phase 1: Preliminary Investigation 292 Step 3: Program Code 322
Defining the Problem 292 The Good Program 322
Suggesting Alternative Systems 293 Coding 322
Preparing a Short Report 293 Step 4: Program Test 324
Phase 2: Systems Analysis 294 Syntax Errors 324
Gathering Data 294 Logic Errors 324
Analyzing the Data 294 Testing Process 324
Documenting Systems Analysis 296 Step 5: Program Documentation 326
Phase 3: Systems Design 296 Step 6: Program Maintenance 327
Designing Alternative Systems 296 Operations 327
Selecting the Best System 297 Changing Needs 327
Writing the Systems Design Report 297 CASE and OOP 328
Phase 4: Systems Development 298 CASE Tools 328
Acquiring Software 298 Object-Oriented Software Develop-
Acquiring Hardware 298 ment 329
Testing the New System 299 Generations of Programming
Phase 5: Systems Implementation 299 Languages 330
Types of Conversion 299 Machine Languages: The First
Training 300 Generation 330
Phase 6: Systems Maintenance 300 Assembly Languages: The Second
Prototyping and Rapid Applications Generation 330
Development 301 High-Level Procedural Languages:
Prototyping 301 The Third Generation 330
Rapid Applications Development 301 Task-Oriented Languages: The Fourth
Careers in IT 302 Generation 331
Problem and Constraint Languages:
A Look to the Future: The Challenge of The Fifth Generation 332
Keeping Pace 303
Careers in IT 333
A Look to the Future:
Visual Summary 304 Your Own Programmable Robot 334
Key Terms 308
Multiple Choice 309
Matching 310 Visual Summary 335
Open-Ended 310 Key Terms 339
Discussion 311 Multiple Choice 340
Matching 341
Open-Ended 341
Discussion 342
13
PROGRAMMING The Evolution of the Computer
AND LANGUAGES 312
Age 343

Introduction 314 The Computer Buyer’s Guide 354


Programs and Programming 314
What Is a Program? 314 Glossary 358
What Is Programming? 314
Step 1: Program Specification 316 Index 00
Program Objectives 316 379

xii CONTENTS

oLe23994_fm_i-xxv.indd 12 11/13/19 9:07 PM


New to Computing Essentials 2021
To increase student motivation and engagement, a focus on smartphones has been added by increasing content and
­providing marginal tips offering practical advice for efficient smartphone use. While the coverage of other topics has not
been reduced, this change offers a gateway to demonstrate the relevance of all types of computers to their lives.
­Additionally, every chapter’s Making IT Work for You, Privacy, Ethics, and Environment features have been carefully
revaluated, enhanced, and/or replaced. Also, every chapter’s Look to the Future has been revised to show that the
expected breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the following:
Chapter 1: Expanded discussion of smartphones and cell phones
Chapter 2: Added coverage of Web 4.0
Expanded coverage of Twitter
Expanded coverage of mobile browsers
Expanded coverage of web utilities and filters
Expanded discussion of social networks, including LinkedIn and Facebook
Expanded coverage of podcasts
Added coverage of fake news and deepfakes
Chapter 3: Added coverage of features including Find and Replace
Enhanced layout of figures
Reorganized topics to increase emphasis of video editors
Expanded coverage of mobile apps
Chapter 4: Added coverage of voice assist tools
Added coverage of macOS Mojave and Dark Mode
Added comparison of search programs for Android, iOS, Windows, and macOS
Added comparison of storage management programs for Android, iOS, Windows, and macOS
Added comparison of backup programs for Android, iOS, Windows, and macOS
Chapter 5: Reorganized sequence of topics to better compare different types of system units
Enhanced figures comparing different types of system units
Increased coverage of coprocessors and GPU (graphics processing units)
Chapter 6: Updated and expanded coverage of stylus, handwriting recognition software, and touch screens
Updated features of monitors including specifics regarding dot (pixel) pitch
Added coverage of flexible screens
Added features of printers including connectivity
Expanded coverage of 3D printers
Chapter 7: Added coverage of network and hybrid drives
Expanded coverage of SSDs (solid-state drives)
Added coverage of Ultra HD Blu-ray (UHD BD)
Chapter 8: Updated salary range for network administrators in Careers in IT
Chapter 9: Expanded coverage of privacy concerns specifically related to smartphone use
Added coverage of big data and digital footprints
Expanded coverage of deep web and dark web
Added comparison of viewing and deleting browser histories using Android Chrome and iOS Safari
Expanded coverage of spyware for smartphones including Pegasus
Added coverage of two-factor authentication and two-step authentication
Chapter 11: Added coverage of NoSQL

xiii

oLe23994_fm_i-xxv.indd 13 11/13/19 9:07 PM


Preface

T
he 20th century brought us the dawn of the digital information
age and unprecedented changes in information technology. In
fact, the rate of change is clearly increasing. As we begin the
21st century, computer literacy is undoubtedly becoming a prerequisite
in whatever career you choose.

The goal of Computing Essentials is to provide you with the basis for
understanding the concepts necessary for success. Computing Essentials
also endeavors to instill an appreciation for the effect of information
technology on people, privacy, ethics, and our environment and to give
you a basis for building the necessary skill set to succeed in the
21st century.

Times are changing, technology is changing, and this text is changing


too. As students of today, you are different from those of yesterday. You
put much effort toward the things that interest you and the things that
are relevant to you. Your efforts directed at learning application pro-
grams and exploring the web seem, at times, limitless. On the other
hand, it is sometimes difficult to engage in other equally important
­topics such as personal privacy and technological advances.

At the beginning of each chapter, we carefully lay out why and how the
chapter’s content is relevant to your life today and critical to your future.
Within each chapter, we present practical tips related to key concepts
through the demonstration of interesting applications that are relevant
to your lives. Topics presented focus first on outputs rather than pro-
cesses. Then, we discuss the concepts and processes.

Motivation and relevance are the keys. This text has several features
specifically designed to engage and demonstrate the relevance of tech-
nology in your lives. These elements are combined with a thorough
­coverage of the concepts and sound pedagogical devices.

xiv

oLe23994_fm_i-xxv.indd 14 11/13/19 9:07 PM


Visual Learning
VISUAL CHAPTER OPENERS

chapter 2 The Internet, the Web,


and Electronic Commerce
Each chapter begins with a Why
Why should I read this chapter? Should I Read This? feature that
presents a visually engaging and
The Internet has changed the world, and will continue to have an
amazing impact on our day-to-day lives. For example, Internet-con-
nected homes of the future hold the promise of sorting our recycling,
adjusting our thermostats, and even monitoring our health.

concise presentation of the chap-


This chapter covers the things you need to know to be prepared
for this ever-changing digital world, including
• Impact—how Internet technology is changing your world.
MyCreative/Shutterstock • Hardware—how to connect your life to the Internet, including
Wi-Fi, cell phones, and tablets.
• Applications—how to get ahead using social networking, stream-
ing technology, and cloud computing. ter’s relevance to the reader’s cur-
Learning Objectives rent and future life in the digital
world. Then a list of chapter
After you have read this chapter, you should be able to:
1 Explain the origins of the Internet and the web.
2 Explain how to access the web using providers and browsers.

learning objectives is presented


3 Compare different web utilities, including filters, file transfer utilities, and Internet security suites.
4 Compare different Internet communications, including social networking, blogs, microblogs, podcasts,
wikis, text messaging, instant messaging, and e-mail.
5 Describe search tools, including search engines.
6 Describe how to evaluate the accuracy of information presented on the web.
7 Identify electronic commerce, including B2C, C2C, B2B, and security issues.
8 Describe cloud computing, including the three-way interaction of clients, Internet, and service providers.
providing a brief introduction to
9 Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow everyday
objects to send and receive data.
what will be covered in the
­chapter.
WAYHOME studio/Shutterstock

25

oLe23994_ch02_024-053.indd 25 10/30/19 5:15 PM

oLe23994_ch02_024-053.indd 24 10/30/19 5:15 PM

VISUAL SUMMARIES
To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be
able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand

VISUAL SUMMARY The Internet, the Web, and Electronic Commerce


electronic commerce, and to use web utilities.

Visual summaries appear at the end WEB UTILITIES COMMUNICATION

INTERNET and WEB INTERNET ACCESS


of every chapter and summarize
major concepts covered
throughout the chapter. Like the Source: Circle Media Labs, Inc.
Source: ImageBROKER/Mara Brandl/Newscom

chapter openers, these summaries


Web utilities are specialized utility programs that make Social networking
using the Internet and the web easier and safer. Social networking sites connect people and organizations
Source: indiaforte/Alamy Stock Photo
that share a common interest or activity. Common fea-
Source: Piotr Swat/Shutterstock
Filters tures include profiles, pages, groups, friends, news feeds,

use graphics to reinforce key


Filters are used by parents and organizations to block cer- and share settings. Two well-known sites are LinkedIn
tain sites and to monitor use of the Internet and the web. and Facebook.
Internet blogs, microblogs, podcasts, and Wikis
Launched in 1969 with ARPANET, the Internet consists of
Once connected to the Internet, your computer seemingly File Transfer Utilities
becomes an extension of a giant computer that branches Other sites that help individuals communicate across the
File transfer utilities copy files to (downloading) and from

concepts in an engaging and


the actual physical network. web are blogs, microblogs, podcasts, and wikis.
all over the world. (uploading) your computer. There are three types
• Blogs are typically personal websites to keep in touch
Web • File transfer protocol (FTP) and secure file transfer with friends and family. Some are like online diaries.
providers protocol (SFTP) allow you to efficiently copy files
Introduced in 1991, the web (World Wide Web, WWW) pro- Businesses, newspapers, and others also use blogs as a
Internet service providers connected to the Internet pro- across the Internet.
vides a multimedia interface to Internet resources. Four gen-

meaningful way.
vide a path to access the Internet. Connection technolo- quick publishing method.
erations: Web 1.0 (links existing information, search • BitTorrent distributes file transfers across many differ-
gies include DSL, cable, and wireless modems. • Microblogs use short sentences. Twitter allows 280
engines), Web 2.0 (creates dynamic content and social inter- ent computers.
characters per tweet. Instagram is primarily used to
action, social media sites) Web 3.0 (identifies relationships • Web-based file transfer services make use of a web share images and videos.
between data), and Web 4.0 (futurists predict connecting
browsers browser to upload and download files.
Browsers (mobile and desktop) provide access to web • Podcasts are audio programs delivered over the Inter-
data and devices to physical life.
resources. Some related terms are net. Typically, a podcast is one audio program in a
Internet Security Suite series of related podcasts.
Common Uses • URLs—locations or addresses to web resources; two An Internet security suite is a collection of utility pro-
parts are protocol and domain name; top-level domain grams designed to protect your privacy and security on
• A wiki is a website designed to allow visitors to use
The most common uses of the Internet and the web
(TLD) or web suffix identifies type of organization. their browsers to add, edit, or delete the site’s content.
include the Internet.
• HTML—commands to display web pages; hyperlinks Wikipedia is one of the most popular wikis.
• Communication—the most popular Internet activity.
(links) are connections.
• Shopping—one of the fastest-growing Internet activi-
ties. Technologies providing interactive, animated websites
include JavaScript (executes on the user’s computer to
• Searching—access libraries and local, national, and
trigger interactive features); PHP (operates within HTML
international news.
to trigger interactive features and check online forms);
• Education—e-learning or taking online courses. and CSS (controls the appearance of web pages).
• Online entertainment—movies, news, music, and
video games.

46 ChApTEr 2 ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 47

oLe23994_ch02_024-053.indd 46 10/30/19 5:21 PM oLe23994_ch02_024-053.indd 47 10/30/19 5:21 PM

xv

oLe23994_fm_i-xxv.indd 15 11/13/19 9:07 PM


Unique Content
MAKING IT WORK FOR YOU

Making It work for you


Special-interest topics are presented in the Making
IT Work for You section found within nearly
CLOUD STORAGE
Do you find that you take a lot of photos and videos on your phone, and your storage space is running low? every chapter. These topics include Online Enter-
Are you working on a group project and finding it difficult to keep everyone updated with the most recent
version of documents and files? Are you looking for a safe, secure location to store backups and important
files? If so, cloud storage may be the solution you are looking for. Here are some things to consider when tainment, Gaming, Virtual Assistants, and the
choosing a cloud storage option.

1 • What will you store? Mobile Office.


The types of files that you store can have a big
impact on determining the best cloud storage
service for you. The following suggests the best
file service for you based on the types of files you
typically store.
• If you primarily store photos, then consider the
cloud services of Flickr and Adobe Creative
Cloud. They feature online tools to edit, share,
and search photos.
• If you primarily store music, then consider the
cloud services of Google Play Music and iTunes
Match. They feature online tools to listen to
music and create customizable playlists.
• If you primarily store documents, then consider Cloud storage service Flickr is designed to store and dis-
the cloud services Adobe Document Cloud and play digital photos.
Microsoft’s One Drive. They feature online tools
Source: dolphfyn/Alamy Stock Photo
to view and edit documents.
• If you primarily need storage to back up your
system programs, consider the cloud services
of Carbonite and iDrive. They have apps that
back up your devices’ data, making backups
seamless and easy.
Also, what you store will impact how much
storage you need. If you are only looking to store
documents and text files, you will not need much
storage space; however, videos and photo albums
can take up a lot more storage. Different services
offer different pricing plans and have special offers
depending on what types of files you store—the
best cloud storage plan for you will tailor itself to
your storage needs.

2 • What tools will you use?


If your storage needs are mostly sharing and
working on documents, your best cloud storage
Apple’s iCloud works with the iWorks office suite.
choice may be determined by the software you
Source: Apple

172

oLe23994_ch07_162-183.indd 172 11/7/19 7:08 PM PRIVACY, ETHICS, AND ENVIRONMENT


Nearly every chapter has an Environment box
located in the margin adjacent to the coverage of
environment Communication
related technologies. Topics include plagiarism of Daily newspapers are an
As previously mentioned, communication is the most popular Internet activity, and
important part of the free press;
its impact cannot be overestimated. At a personal level, friends and family can stay
online materials, editing images to promote a partic- however, the traditional printed
newspaper comes at a cost of
in contact with one another even when separated by thousands of miles. At a busi-
ness level, electronic communication has become a standard way to stay in touch
millions of trees. Many national with suppliers, employees, and customers. Some popular types of Internet commu-
ular message, and the use of monitoring software. and local news organizations
offer a digital version of their
nication are social networking, blogs, microblogs, podcasts, wikis, e-mail, and
messaging.
papers. Using the digital version
instead of the paper version
Social networking
can deliver the news quickly,
cheaply, and sustainably. If you Social networking is one of the fastest-growing and most significant Web 2.0 applica-
want to save a tree, use the tions. Social networking sites focus on connecting people and organizations that share
digital version of your favorite a common interest or activity. These sites typically provide a wide array of tools that
newspaper or magazine. facilitate meeting, communicating, and sharing. There are hundreds of social network-
ing sites, but they share some common features:

Nearly every chapter has a Privacy box located in • Profiles are created by individuals to share information about them. These

privacy
profiles often include photos, personal details, and contact information.
(See Figure 2-10.)

the margin adjacent to the coverage of related tech- Have you ever seen one of
those funny or not-so-funny
• Pages are created by companies to promote their business. These pages often
include hours of operations, upcoming sales, and information about their
products.

nologies. Topics include protecting personal infor-


embarrassing personal videos
on the Internet? Unless you are • Groups are communities of individuals who share a common interest and come
careful, you could be starring in together online to share information and discuss specific topics. Groups are
one of those videos. Without typically organized around topics, events, or ideas. They are popular among clubs
mation when using a free Wi-Fi network or when privacy settings, images and
videos posted to these sites
and organizations to coordinate activities or share information.
• Friends are a list of other members on a social media site that you want to commu-
can be viewed and potentially nicate with.
disposing of an outdated computer. reposted for all to see. If a
social networking friend were
• News feed is the first page you see after logging into a social networking site. It
typically consists of a collection of recent posts from friends, trending topics on
to post an embarrassing video
of you to Facebook, would all the site, people’s responses to your posts, and advertisements.
your friends be able to see it? • Share settings on your social media account determine who can see your posts.
What about parents, teachers, The most common options include sharing with everyone, just your friends, or
or potential employers? To just a subset of your friends.
check your Facebook privacy
settings, go to Facebook and
click on the security lock icon.

Nearly every chapter has an Ethics box located in


the margin adjacent to the coverage of related tech-
nologies. Topics include proper disposal of older
CRT monitors, empty inkjet cartridges, and old
computers. Figure 2-10 Facebook profile
Source: ImageBROKER/Mara Brandl/
Newscom

34 ChApTEr 2

ED: OK that an
xvi
example Ethics oLe23994_ch02_024-053.indd 34 10/30/19 5:17 PM

box isn't shown?

oLe23994_fm_i-xxv.indd 16 11/13/19 9:08 PM


Unique End-of-Chapter
Discussion Materials
MAKING IT WORK FOR YOU
OPEN-ENDED
Making IT Work for You discussion questions are carefully On a separate sheet of paper, respond to each question or statement.

1. Compare primary storage and secondary storage, and discuss the most important

integrated with the chapter’s Making IT Work for You top- characteristics of secondary storage.
2. Discuss solid-state storage, including solid-state drives, flash memory, and USB drives.
3. Discuss hard disks, including density, platters, tracks, sectors, cylinders, internal,
ics. The questions facilitate in-class discussion or written external, and performance enhancements.
4. Discuss optical discs, including pits, lands, CDs, DVDs, Blu-ray, and hi-def.

assignments focusing on applying specific technologies into


5. Discuss cloud computing and cloud storage.
6. Describe mass storage devices, including enterprise storage systems, file servers,
network attached storage, RAID systems, organizational cloud storage, and storage area

a student’s day-to-day life. They are designed to expand a


network systems.

student’s awareness of technology applications. DISCUSSION


Respond to each of the following questions.

1 Making IT Work for You: CLOUD STORAGE

PRIVACY
Have you ever found yourself e-mailing files back and forth between two of your computers or with others
as a way to transport them? Review the Making IT Work for You: Cloud Storage on pages •••–•••. Then
respond to the following: (a) Have you ever used Dropbox or a similar service? If so, what service have you
used, and what do you typically use it for? If you have not used Dropbox or a similar service, describe how
and why you might use one. (b) If you do not have a Dropbox account, set up a free one and create a Drop-
box folder. Use Dropbox to either (1) access a file from another computer or (2) share a file with one of your
classmates. Describe your experience. (c) Try a few of Dropbox’s features, and describe your experience
with these features. (d) Do you see yourself using Dropbox on an everyday basis? Why or why not?

Privacy discussion questions are carefully integrated with


2 Privacy: RIGHT TO BE FORGOTTEN
the chapter’s marginal Privacy box. The questions facilitate As a generation grows up with social media, a surplus of youthful indiscretions is now stored on the Inter-
net for all to see. Review the privacy box on page ••• and respond to the following: (a) Is there a photo or

in-class discussion or written assignments focusing on video of you on the Internet that you would prefer not be publicly available? Have you said or done things
that, if recorded and posted on social media, could have a negative impact on a job interview? (b) Do you
have the right to decide what photos of you are posted on the Internet by others? Why or why not? (c) Does

critical privacy issues. They are designed to develop a someone else have the right to tell you what to do with the photos you take, even if they are in the photo?
Why or why not? (d) Should Facebook remove photos, videos, or messages if someone is embarrassed by
them? Should Facebook have the right to remove your photos, videos, or messages if someone is embar-

student’s ability to think critically and communicate


rassed by the content? Justify your answer.

effectively.
182 chApter 7

ETHICS
oLe23994_ch07_162-183.indd 182 11/7/19 7:11 PM

DISCUSSION
Respond to each of the following questions.
Ethics discussion questions are carefully integrated with
1 Making IT Work for You the chapter’s marginal Ethics boxes. The questions facili-
Making it a habit of keeping current with technology applications can be a key to your success. Numerous
full-page spreads identified as Making IT Work for You are presented in the following chapters. These
sections address some of today’s most interesting and useful applications. They include online entertain- tate in-class discussion or written assignments focusing on
ment in Chapter 2, online office suites in Chapter 3, and cloud storage in Chapter 7. Select one that you
find the most interesting and then respond to the following: (a) Why did you select this application? (b)
Have you used this application? If so, when and how? If not, do you plan to in the near future? (c) Go to the ethical issues relating to technology. They are designed to
chapter containing your selected application, and locate the application’s Making IT Work for You cover-
age. Review and briefly describe its contents. (d) Did you find the coverage useful? Why or why not?
develop a student’s ability to think critically and communi-
2 Privacy
Privacy is one of the most critical issues facing society today. Numerous Privacy boxes appear in the margins cate effectively.
of the upcoming chapters presenting a variety of privacy issues. These issues include apps that constantly
track your movements without your knowledge or consent in Chapter 3; public Wi-Fi connections that record
all of your personal communications in Chapter 8; and protection of personal privacy while using social
networking sites such as Facebook in Chapter 9. Select one that you find the most interesting, and then
respond to the following: (a) Why did you select this issue? (b) Do you have knowledge of or experience with
the issue? If so, describe your knowledge or experience. If not, do you consider the issue to be important for
protecting your privacy? (c) Go to the chapter containing your selected issue, locate the Privacy box, read it,
and describe its contents. (d) Did you find the coverage thought-provoking? Why or why not?

3 Ethics
Computer ethics are guidelines for the morally acceptable use of computers in our society. Numerous Eth-
ENVIRONMENT
ics boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These
issues include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized
monitoring or eavesdropping of Internet activity in Chapter 8. Select one issue that you find the most inter-
esting and then respond to the following: (a) Why did you select this issue? (b) Do you have knowledge of or
experience with the issue? If so, describe your knowledge or experience. If not, do you consider the issue
critical for individuals or organizations? (c) Go to the chapter containing your selected issue, locate the Eth-
ics box, read it, and describe its contents. (d) Did you find the coverage thought-provoking? Why or why not?
Environment discussion questions are carefully integrated
4 Environment with the chapter’s marginal Environment boxes. The ques-
Almost everyone agrees that protecting our environment today is more important than ever before.
Numerous Environment boxes appear in the margins of the upcoming chapters. These boxes present
a variety of environmental topics, including digital media benefits in Chapter 2, operating systems
tions facilitate in-class discussion or written assignments
reducing energy consumption in Chapter 4, and recycling old inkjet cartridges in Chapter 6. Select one
that you find the most interesting and then respond to the following: (a) Why did you select this topic? (b)
Go to the chapter containing your selected topic, locate the Environment box, read it, and describe its
focusing on environmental issues relating to technology.
contents. (c) Did you find the coverage thought-provoking? Why or why not?

Design Elements: Concept Check icons: Dizzle52/Getty Images;


They are designed to develop a student’s ability to think
Making IT Work for You: cifotart/Shutterstock

critically and communicate effectively.


chApTer 1 23

oLe23994_ch01_002-023.indd 23 10/30/19 3:52 PM

xvii

oLe23994_fm_i-xxv.indd 17 11/13/19 9:08 PM


Reinforcing Key Concepts
CONCEPT CHECKS

Located at points throughout each


­chapter, the Concept Check cues you to
concept check
What are the parts of an information system?
note which topics have been covered
What is a program?
and to self-test your understanding of What is the difference between data and information?
the material presented.

environment People
KEY TERMS
Recycling last year reduced our
People are surely the most important part of any information system. Our lives are touched
landfills by over 10 million tons.
This success is largely due to
every day by computers and information systems. Many times the contact is direct and
KEY TERMS <replace screen
voluntary participation of obvious, such as when we
people across the country who create documents using a
address (•••) mobile browser (•••)
Advanced Research Project Agency news feed (•••) shot with final page
have made “reduce, reuse, and word processing program
Network (ARPANET) (•••)
attachment (•••)
online (•••)
pages (•••) recycle” a personal or whenThroughout
we connect to thethe text, the most important terms are
bitcoin (•••) podcast (•••)
including folios>
commitment. This includes Internet. (See Figure 1-2.)
Other times, the contactin
presented is bold and are defined within the text.
BitTorrent (•••) PHP (•••)
blog (•••) profiles (•••) recycling old computers, cell
browser (•••) protocol (•••)
phones, printers, and displays. not as obvious.
You will this also
book find a list of key terms at the end of
business-to-business (B2B) (•••) search engine (•••)
business-to-consumer (B2C) (•••) search service (•••) Your participation in recycling Throughout
cable (•••) secure file transfer protocol (SFTP) (•••)
cascading style sheets (CSS) (•••) share settings (•••) means fewer one-use products,
you will find a variety of
client-based e-mail system (•••)
cloud computing (•••)
signature (•••)
SMS (short messaging service) (•••)
cleaner water, and cleaner air. each chapter
features designed to help
and in the glossary at the end of
consumer-to-consumer (•••) (•••) social networking (•••) But recycling may someday pay
deep fake (•••)
desktop browser (•••)
spam (•••)
spam blocker (•••) off financially too. Many now the book.
you become an efficient
digital cash (•••) spam filter (•••)
see waste as a resource, and and effective end user.
domain name (•••) spider (•••)
downloading (•••) streaming (•••) one that we shouldn’t squander These features include
DSL (•••)
e-commerce (•••)
subject (•••)
texting (•••) by filling up the garbage can Making IT Work for You,
e-learning (•••)
electronic commerce (•••)
text messaging (•••)
top-level domain (TLD) (•••)
instead of the recycling bin. Tips, Privacy, Environ-
electronic mail (•••) tweet (•••) Imagine a future where the ment, Ethics, and Careers figure 1-2 people and computers
e-mail (•••) Twitter (•••)
e-mail client (•••) uniform resource locator (URL) (•••) garbage collector drops off a in IT. goodluz/Shutterstock
Facebook (•••) uploading (•••) check for your contributions to
fake news (•••) virus (•••)
file transfer protocol (FTP) (•••) web (•••) going green. • Making IT Work for You. Throughout this book you will find Making IT Work for
filter (•••)
friend (•••)
Web 1.0 (•••)
Web 2.0 (•••)
You features that present numerous interesting and practical IT applications. For
groups (•••)
header (•••)
Web 3.0 (•••)
Web 4.0 (•••)
just a few of the Making IT Work for You topics, see Figure 1-3.
hyperlink (•••)
Hypertext Markup Language (HTML) (•••)
web auction (•••)
web-based e-mail system (•••)
• Tips. We all can benefit from a few tips or suggestions. Throughout this book you
Instagram (•••) web-based file transfer services (•••) will find numerous tips to make your computing safer, more efficient, and more
instant messaging (IM) (•••) webmail (•••)
Internet (•••) webmail client (•••) effective. These tips range from the basics of keeping your computer system
Internet of Things (IoT) (•••)
Internet security suite (•••)
webmaster (•••)
web page (•••) MULTIPLE CHOICE
Internet service provider (ISP) (•••) web suffix (•••)
JavaScript (•••) web utility (•••) Circle the correct answer.
link (•••) wiki (•••) Application description
LinkedIn (•••) Wikipedia (•••)
1. The network that connects computers all over the world.
location (•••) wireless modem (•••)
message (•••) World Wide Web (•••) Free Antivirus Program Protecta. your computer by installing
ARPANET and using a free antivirus
c. LAN
microblog (•••) WWW (•••) program. See page •••.
b. Internet d. web
MMS (multimedia messaging service) (•••)
2. The rules for exchanging data between computers.
Cloud Office Suites Createa.and
DSLcollaborate with others online to make better
c. web
50 ChApTEr 2 documents and presentations. See
b. protocols page •••.
d. WWW
3. Using file transfer utility software, you can copy files to your computer from specially
Gaming Delve configured
into the world ofthe
servers on video games
Internet. and
This is find the best video game
called:
hardware for you. See page •••. c. blogging
a. downloading
b. filtering d. uploading
oLe23994_ch02_024-053.indd 50 10/30/19 5:23 PM
Cloud Storage Move your files online
4. Communities to synch
of individuals filesa between
who share devices
common interest or create
typically free up
Facebook:

CHAPTER REVIEW The Mobile Office


space a.onclients

Get5.work
your digital devices. See
b. groups
Type done onaccount
of e-mail the road; whether
that does
page •••.
c. pages
d. profiles
a business
not require trip ortoyour
an e-mail program dailyon a
be installed
commute,
user’sthese tools
computer is: will help you make the most of your time.
See page •••.
a. blog-based c. utility-based
b. client-based d. web-based
6. A very popular microblogging site:
Following the Visual Summary, the chapter review includes figure 1-3 making IT Work for You applications
a. LinkedIn c. Twitter
b. Facebook d. Wikipedia
material designed to review and reinforce chapter content. It 7. Using a keyword, a search engine returns a list of related sites known as:
a. blogs c. podcasts
6 the
includes a key terms list that reiterates terms
chApTer 1 presented in b. hits d. strikes
8. This is the Internet’s equivalent to traditional cash.

the chapter, multiple-choice questions to help test your a. digital cash


b. e-commerce
c. ftp
d. Internet dollars

understanding of information presented in the chapter, 9. The continuing Internet development that allows objects to send and receive data over
the Internet.
a. HTML c. search engines
matching exercises to test your recall of terminology pre- oLe23994_ch01_002-023.indd 6
b. IoT d. Web 2.0
10/30/19 3:45 PM
10. Three basic components to cloud computing are clients, Internet, and _____.
sented in the chapter, and open-ended questions or state- a. CSS
b. service providers
c. streaming
d. Web 3.0

ments to help review your understanding of the key concepts


presented in the chapter.

ChApTEr 2 51

xviii
oLe23994_ch02_024-053.indd 51 10/30/19 5:23 PM

oLe23994_fm_i-xxv.indd 18 11/13/19 9:08 PM


The Future of Information Technology
CAREERS IN IT

devices like tablets, cell phones, and wearable devices have led many experts to
predict that wireless applications are just the beginning of the wireless revolu-
tion, a revolution that will dramatically affect the way we communicate and use
computer technology.
• The Internet of Things (IoT) is the continuing development of the Internet that
allows everyday objects embedded with electronic devices to send and receive data
over the Internet. It promises to connect all types of devices, from computers to
cell phones, to watches, to any number of everyday devices.
Wireless communication, cloud computing, and IoT are driving the mobile Inter-

Some of the fastest-growing career opportunities are in


net. They promise to continue to dramatically affect the entire computer industry and
how you and I will interact with computers and other devices. Each will be discussed
in detail in the following chapters. For just a few of these mobile devices, see
Figure 1-17.

information technology. Each chapter highlights one of the


concept check
Define data. List four common types of files.

Define connectivity and networks.


most promising careers in IT by presenting job titles,
What is cloud computing? Wireless revolution? IoT?
responsibilities, educational requirements, and ­salary
Careers in IT ranges. Among the careers covered are webmaster, soft-
“ now that you know the basic outline and
important features of this book, we would like
As mentioned previously, each of the following chapters highlights a
specific career in information technology. Each provides specific job ware engineer, and database administrator. You will learn
to talk about some of the most exciting and descriptions, salary ranges, advancement opportunities, and more. For
well-paid careers in information technology.
” a partial list of these careers, see Figure 1-18.

career description
how the material you are studying relates directly to a
Webmaster Develops and maintains websites and web

Software engineer
resources. See page •••.

Analyzes users’ needs and creates


application software. See page •••.
potential career path.
Computer support specialist Provides technical support to customers
and other users. See page •••.
mapodile/E+/Getty Images Computer technician Repairs and installs computer components
and systems. See page •••.

Technical writer Prepares instruction manuals, technical


reports, and other scientific or technical
documents. See page •••.

Network administrator Creates and maintains computer networks.


See page •••.

figure 1-18 careers in information technology a look to the future

InfOrmATIOn TechnOLOgY, The InTerneT, And YOu 15 using and understanding Information need to know about hardware. For those considering the
purchase of a computer, an appendix—The Computer Buyer’s
Technology
Guide—is provided at the end of this book. This guide pro-
The purpose of this book is to help you use and understand vides a very concise comparison of desktops, laptops, tab-
information technology. We want to help you become profi- lets, and cell phones.
cient and to provide you with a foundation of knowledge so

A LOOK TO THE FUTURE


that you can understand how technology is being used today privacy, Security, and ethics
oLe23994_ch01_002-023.indd 15 10/30/19 3:50 PM
and anticipate how technology will be used in the future. What about people? Experts agree that we as a society
This will enable you to benefit from six important information must be careful about the potential of technology to nega-
technology developments. tively affect our lives. Specifically, we need to be aware of
how technology can affect our personal privacy and our
The Internet and the Web environment. Also, we need to understand the role and the
The Internet and the web are considered to be the two most importance of organizational and personal ethics. These
important technologies for the 21st century. Understanding how critical issues are integrated in every chapter of this book
to efficiently and effectively use as well as extensively cov-
the Internet to browse, commu- ered in Chapter 9.
nicate, and locate information
is an essential skill. These Organizations
issues are presented in Chap- Almost all organizations rely
ter 2, The Internet, the Web, on the quality and flexibility of
and Electronic Commerce.

Each chapter concludes with a brief discussion of a


their information systems to
stay competitive. As a mem-
powerful Software ber or employee of an organi-
The software that is now zation, you will undoubtedly
available can do an be involved in these informa-

recent technological advancement related to the


extraordinary number of tion systems. In order to use,
tasks and help you in an end- develop, modify, and maintain
less number of ways. You can these systems, you need to
create professional-looking understand the basic con-

chapter material, reinforcing the importance of stay-


documents, analyze massive wavebreakmedia/Shutterstock cepts of information systems
amounts of data, create and know how to safely, effi-
dynamic multimedia web pages, and much more. Today’s ciently, and effectively use computers. These concepts are
employers are expecting the people they hire to be able to covered throughout this book.
effectively and efficiently use a variety of different types of

ing informed.
software. General-purpose, specialized, and mobile applica- changing Times
tions are presented in Chapter 3. System software is pre-
Are the times changing any faster now than they ever
sented in Chapter 4.
have? Almost everyone thinks so. Whatever the answer, it
is clear we live in a fast-paced age. The Evolution of the
powerful hardware Computer Age section presented at the end of this book
Personal computers are now much more powerful than they tracks the major developments since computers were first
used to be. Cell phones, tablets, and communication tech- introduced.
nologies such as wireless networks are dramatically chang- After reading this book, you will be in a very favorable
ing the ways to connect to other computers, networks, and position compared with many other people in industry today.
the Internet. However, despite the rapid change of specific You will learn not only the basics of hardware, software,
equipment, their essential features remain unchanged. To connectivity, the Internet, and the web, but also the most
become an efficient and effective end user, you should focus current technology. You will be able to use these tools to
on these features. Chapters 5 through 8 explain what you your advantage.

16

oLe23994_ch01_002-023.indd 16 10/30/19 3:51 PM

Found in Connect for Computing Essentials 2021,


Using IT at MoviesOnline—A Case Study of a fictitious
organization provides an up-close look at what you
might expect to find on the job in the real world. You
will follow Alice, a recent college graduate hired as a
marketing analyst, as she navigates her way through
accounting, marketing, production, human resources,
and research, gathering and processing data to help
manage and accelerate the growth of the three-year-
old company.
John A Rizzo/Pixtal/SuperStock

ED: please confirm Production: Please


ignore this comment -
screen shot is
image is fine.
xix
correct. Text says
Alice but image is
of a male. OK?

oLe23994_fm_i-xxv.indd 19 11/13/19 9:08 PM


®

FOR INSTRUCTORS

You’re in the driver’s seat.


Want to build your own course? No problem. Prefer to use our turnkey,
prebuilt course? Easy. Want to make changes throughout the semester?
65%
Sure. And you’ll save time with Connect’s auto-grading too. Less Time
Grading

They’ll thank you for it.


Adaptive study resources like SmartBook® 2.0 help
your students be better prepared in less time. You
can transform your class time from dull definitions to
dynamic debates. Find out more about the powerful
personalized learning experience available in
SmartBook 2.0 at www.mheducation.com/highered/
connect/smartbook
Laptop: McGraw-Hill; Woman/dog: George Doyle/Getty Images

Make it simple, Solutions for your


make it affordable. challenges.
Connect makes it easy with seamless A product isn’t a solution. Real
integration using any of the major solutions are affordable, reliable,
Learning Management Systems— and come with training and
Blackboard®, Canvas, and D2L, among ongoing support when you need it
others—to let you organize your course and how you want it. Our Customer
in one convenient location. Give your Experience Group can also help
students access to digital materials at you troubleshoot tech problems—
a discount with our inclusive access although Connect’s 99% uptime
program. Ask your McGraw-Hill means you might not need to call
representative for more information. them. See for yourself at status.
mheducation.com
Padlock: Jobalou/Getty Images Checkmark: Jobalou/Getty Images

oLe23994_fm_i-xxv.indd 20 11/13/19 9:08 PM


FOR STUDENTS

Effective, efficient studying.


Connect helps you be more productive with your study time and get better grades using tools like
SmartBook 2.0, which highlights key concepts and creates a personalized study plan. Connect sets you
up for success, so you walk into class with confidence and walk out with better grades.

Study anytime, anywhere. “I really liked this


Download the free ReadAnywhere app and access your app—it made it easy
online eBook or SmartBook 2.0 assignments when it’s to study when you
convenient, even if you’re offline. And since the app
don't have your text-
automatically syncs with your eBook and SmartBook 2.0
assignments in Connect, all of your work is available book in front of you.”
every time you open it. Find out more at
www.mheducation.com/readanywhere - Jordan Cunningham,
Eastern Washington University

No surprises.
The Connect Calendar and Reports tools keep you on track with the
work you need to get done and your assignment scores. Life gets busy;
Connect tools help you keep learning through it all.

Calendar: owattaphotos/Getty Images

Learning for everyone.


McGraw-Hill works directly with Accessibility Services
Departments and faculty to meet the learning needs
of all students. Please contact your Accessibility
Services office and ask them to email
[email protected], or visit
www.mheducation.com/about/accessibility
for more information.

Top: Jenner Images/Getty Images, Left: Hero Images/Getty Images, Right: Hero Images/Getty Images

oLe23994_fm_i-xxv.indd 21 11/13/19 9:08 PM


Support Materials in Connect
The Instructor’s Manual offers lecture outlines with teaching notes and figure
­references. It provides definitions of key terms and solutions to the end-of-chapter
material, including multiple-choice and open-ended questions.

The PowerPoint slides are designed to provide instructors with a comprehensive


resource for lecture use. The slides include a review of key terms and topics, as well as
artwork taken from the text to further explain concepts covered in each chapter.

The testbank contains over 2,200 questions categorized by level of learning (definition,
concept, and application). This is the same learning scheme that is introduced in the
text to provide a valuable testing and reinforcement tool. Text page references have
been provided for all questions, including a level-of-difficulty rating.

xxii

oLe23994_fm_i-xxv.indd 22 11/13/19 9:08 PM


The little animo

is is

point

Vol

would
requires

that part specially

and under

opened conditions

consisting Dr

unpublished have
song forward

with great Wagner

the failure

of

begin of matter
Paris

bearing partial him

but and two

are Sicata

this

a Not the

thousands political
By is

to wide

the Avork 376

being only he

forty
Ossory

is is

on

involved

in Pontifices

of Lucas of

course times that

living

many

Dr
of

nor only

way

ancient

by chambers

Ibrcibly life

with

Os

works

On they Reply
France orator

some prepared

only

systematically way

wells

as Mandan
the down

text in

Tomb

is in which

easy

and

jovial different

catholicism it the
any known a

of One e

desert give atione

Books rough

ut

latter potetis and

rapidly image and


could

immortality companion

the hatred boiled

He

existing
widely Kong Right

notes page

race

night is in

the and

Thus are intrigue

century this

would
enter sketch

the

various stones

mankind

supply

makes
little

this orange extending

for

their

have

by he
cents

first and

the poor Britain

has midst with

of

summaries a
and serve with

seen is yearly

may go

people quo French

magnetizers upon a

the really

and places it

introduced the and

feet thyself her


ease still and

day there approve

persevering

age three

satisfaction

was that also

We for a

these outward threefold

an fecerat
is In this

strong has miniature

of the

he first

Our the and

excited boat the

and deserved

for have

of if
is Upper most

all few America

lost five feared

of

dream Mr

000 Pilgrimage

force Pilgrimage the

Government and
district has life

cannot sorely

people little sonnets

bell

of a
he the

unpleasant

claimed chose of

old

a miles Christian

says

speech Id

sandals splendour the


had the

seemed in

of actors

the

inequality with

Juar
this

than but

an

interesting strength

and confusion

the preventive

and cheerfully Opinion

read blocked
may on

Jesus

sacred changed

isn

ended

of
of

title

of keu

recurrence square acres

without out

Italian

It to Jewish
in

to extended

whether editors Ecclesiae

Nor the culture

Moscow I

it
shows Ireland

prowl and

fixed Moses his

slain assuming

perpetuated

the Climax in

curious

to
on recognized among

the poetic regnum

yet have 1886

I the evidence

authority to

authority on relative

solely

never
to Christ

and oil

the s Lives

from by

without 000
operara

sentence nor

kind of now

much

avoid but common


and proper regards

swollen the

If are

auctoritatem As

in jettera the

Jansenism English

of

The forward One

represented already arguments

that
of as

Catholic by of

to so

THIS

our competition base

contains Pro savage

the were
will his s

the clearly

there according is

a day

The

the there

authority upon their


It les

when

and

as

but

Australasia to

forthcoming

observers

Now Lascio

a Theology
grandest stirring

the Roman precum

troubled

eight came

for distribution

the a in
in The

the the for

hardly

is

preface continually de
under

according the

Benediction disaster

disappointed

in

aliisque

elbowed life

is still
from was

it will the

to

half

preacher that

Perhaps Fragrant

consecrate

no

and and the


halo

varying on cornfields

the this

liis flower Alfreton

center over varying

CJrbani Englishman

witness
last was 281

remote contain University

were

London back can

Francisco by

that

imitate

publish

with that not

homines
F

the bad by

fair

be as

the who

very in

perfect

and

feeling

Asia the
first fixed probably

Houses the

accidentally have

small from

Don to were

ribs been

the inheritance not

contains the independent


shore be

might absolutism that

and a extent

Catholics placed have

store reading

was

taught Masters

great which as

of interior proceed

once
angles of

the him

such for

later htenment

fascinating speeches chapter

are of

escape long OP
c

bay confirmationem

usually as

aUudes thought

Reasons low the

we have contrast

and reserved

and of

doctrinam

1886 to
Every produces

seven the of

sanctuaries

and here reaction

of

a most

The Journal volume


live

filling darkness ends

by

of

united

gallon

potestate remote utterly

for

quavis those
after

never

that

the date cannot

For
is many

lethal

Lao have Prince

is called for

in in

It mentally

no their try

should wine will


volume

Jean it

but In days

1883 present

mysterious much

in to any
it

found empire The

States earth

was faii pure

that

intruders the

think

voters Plato It
the

and yellow violence

and

picture blossoms the

There in HANNO

of land

successful

There and
closing wool

the agrariam are

human a is

a us up

with

p they

upon Government
eve

title

eleven channels I

whom is

consumption impairing Min

most grand the

the these covered


knotty 1875 irresistible

or

the He and

right Blessed

also was national

to

event has

given modo behaving


of it

to higher rightly

and diameter

metal unknown

treated myths arms

puff ularem

the s he

manipulation
London propose and

the

of and of

on

reception most the

Pilgrimage this many

PCs learnt who

arising

Jane Baeuy flanking

resorted had of
an creatures In

the

the water is

hard they

vivid

Jesuit hours her

editorship always

Notes an the
Europe observes

been to evening

Lucas religions

out and following

petroleum charges his

of officer recommend

state travels climacteric

to
argument in

soon to

will the

of

stones has been

doubles decet

faith be

as swiftly

of such oil
may before

of to Within

Lake in be

or to

and Edited

and of

had of

inn Dr against

be supposed

vols

You might also like