0% found this document useful (0 votes)
18 views127 pages

(Ebook) Discovering Computers: Fundamentals by Gary B. Shelly, Misty E. Vermaat Contributing Authors, Jeffrey J. Quasney ... (Et Al.) ISBN 9781423927020, 1423927028 PDF Available

Complete syllabus material: (Ebook) Discovering computers : fundamentals by Gary B. Shelly, Misty E. Vermaat ; contributing authors, Jeffrey J. Quasney ... [et al.] ISBN 9781423927020, 1423927028Available now. Covers essential areas of study with clarity, detail, and educational integrity.

Uploaded by

emilkatanya0284
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views127 pages

(Ebook) Discovering Computers: Fundamentals by Gary B. Shelly, Misty E. Vermaat Contributing Authors, Jeffrey J. Quasney ... (Et Al.) ISBN 9781423927020, 1423927028 PDF Available

Complete syllabus material: (Ebook) Discovering computers : fundamentals by Gary B. Shelly, Misty E. Vermaat ; contributing authors, Jeffrey J. Quasney ... [et al.] ISBN 9781423927020, 1423927028Available now. Covers essential areas of study with clarity, detail, and educational integrity.

Uploaded by

emilkatanya0284
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 127

(Ebook) Discovering computers : fundamentals by Gary

B. Shelly, Misty E. Vermaat ; contributing authors,


Jeffrey J. Quasney ... [et al.] ISBN 9781423927020,
1423927028 pdf available

Find it at ebooknice.com
( 4.7/5.0 ★ | 182 downloads )

https://ebooknice.com/product/discovering-computers-
fundamentals-2620866
(Ebook) Discovering computers : fundamentals by Gary B.
Shelly, Misty E. Vermaat ; contributing authors, Jeffrey J.
Quasney ... [et al.] ISBN 9781423927020, 1423927028 Pdf
Download

EBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

(Ebook) Discovering Computers - Fundamentals 2011 Edition (Shelly


Cashman) by Gary B. Shelly, Misty E. Vermaat ISBN 9781439079454,
1439079455

https://ebooknice.com/product/discovering-computers-
fundamentals-2011-edition-shelly-cashman-2414214

(Ebook) Discovering Computers 2011: Complete (Shelly Cashman) by Gary


B. Shelly, Misty E. Vermaat ISBN 9781439079263, 1439079269

https://ebooknice.com/product/discovering-computers-2011-complete-
shelly-cashman-2016888

(Ebook) Discovering Computers Fundamentals: Your Interactive Guide to


the Digital World by Gary B. Shelly, Misty E. Vermaat ISBN
9781111530457, 1111530459

https://ebooknice.com/product/discovering-computers-fundamentals-your-
interactive-guide-to-the-digital-world-4643342

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason; Viles, James


ISBN 9781459699816, 9781743365571, 9781925268492, 1459699815,
1743365578, 1925268497

https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374
(Ebook) Microsoft Office 2010: Essential by Gary B. Shelly, Misty E.
Vermaat ISBN 9780538748704, 0538748702

https://ebooknice.com/product/microsoft-office-2010-essential-2514284

(Ebook) Microsoft Word 2010: Introductory (Shelly Cashman Series(r)


Office 2010) by Gary B. Shelly, Misty E. Vermaat ISBN 1439078459

https://ebooknice.com/product/microsoft-word-2010-introductory-shelly-
cashman-series-r-office-2010-2330666

(Ebook) Microsoft Office 2010: Brief by Gary B. Shelly, Misty E.


Vermaat ISBN 9781439078426, 9781439078433, 1439078424, 1439078432

https://ebooknice.com/product/microsoft-office-2010-brief-2515116

(Ebook) Microsoft Office 2007: Advanced Concepts and Techniques by


Gary B. Shelly, Thomas J. Cashman, Misty E. Vermaat ISBN
9781418843328, 1418843326

https://ebooknice.com/product/microsoft-office-2007-advanced-concepts-
and-techniques-4148898

(Ebook) Microsoft Excel 2010: Comprehensive by Gary B. Shelly, Jeffrey


J. Quasney ISBN 9781439079010, 1439079013

https://ebooknice.com/product/microsoft-
excel-2010-comprehensive-4576698
C6671_IFC_pp.qxd 1/30/08 12:55 PM Page b

Powered by
COURSE

Gain Access to the


Discovering Computers: Fundamentals, Fifth Edition
Online Companion!

Gaining access to the interactive learning activities on this Online Companion is easy—
all you need to do is create a user profile. This simple, one-time process establishes you as
a user in the CoursePort authentication system. Students and instructors can then reinforce the
concepts they're covering in the texts with interactive learning activities.

To create a • Visit http://login.course.com


new student • Click New User Registration.
user profile • Enter the required, basic information on the New User Registration screen. You should
see a Registration Successful screen. Please click the Continue button.
• You will then be brought to the Choose Your Product page.
• Check the box next to the title of the text and upon clicking Submit (at the bottom of
the page), you’re in!!
• From the My Account page, click the name of product to launch the Online
Companion.
• As a student, you can view your own progress in the Universal Gradebook, accessed
from the My Account tab. Click View My Grades at the bottom of the page.
• NOTE: If your instructor has chosen to track your activities in the CoursePort Universal
Gradebook, you may need to Join a Class from the My Account tab.

What you’ll
gain access to

Features of the Discovering Computers: Fundamentals, Fifth Edition Online Companion


include:
• Additional information and unparalleled currency on important topics;
• Discussion Forum and Learn How To visual demonstrations;
• Key Terms page complete with definitions, Web links, audio and illustrative animations;
• Discovering Computers Timeline;
• Learn It Online exercises, online videos, practice tests, learning games, and Web-based
activities;
• CoursePort personalized home page and the Universal Gradebook.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page i

Discovering Computers
Fundamentals
Fifth Edition
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page ii
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page iii

Discovering Computers
Fundamentals
Fifth Edition

Gary B. Shelly Contributing Authors


Misty E. Vermaat Jeffrey J. Quasney
Susan L. Sebok
Jeffrey J. Webb
Steven M. Freund

Shelly Cashman Series®


An imprint of Course Technology, Cengage Learning

Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page iv

Discovering Computers: Fundamentals, Fifth Edition © 2008 Course Technology, Cengage Learning
Gary B. Shelly
Misty E. Vermaat ALL RIGHTS RESERVED. No part of this work covered by the copyright herein
may be reproduced, transmitted, stored or used in any form or by any means
Executive Editor: Alexandra Arnold graphic, electronic, or mechanical, including but not limited to photocopying,
Senior Product Manager: Reed Curry recording, scanning, digitizing, taping, Web distribution, information net-
Associate Product Manager: Klenda Martinez works, or information storage and retrieval systems, except as permitted
under Section 107 or 108 of the 1976 United States Copyright Act, without the
Editorial Assistant: Jon Farnham prior written permission of the publisher.
Marketing Director: Tristen Kendall
Marketing Coordinator: Julie Schuster For product information and technology assistance, contact us at
Print Buyer: Julio Esperas Cengage Learning Academic Resource Center, 1-800-423-0563
Content Project Manager: Matthew Hutchinson
For permission to use material from this text or product,
Consultant: Joel Sadagursky submit all requests online at cengage.com/permissions
Researcher: F. William Vermaat Further permissions questions can be emailed to
[email protected]
Development Editor: Lyn Markowicz
Proofreader: Nancy Lamm
ISBN-10: 1-4239-2702-8
Final Reader: Pam Baxter
Management Services: Pre-Press PMG ISBN-13: 978-1-4239-2702-0
Interior Designer: Pre-Press PMG
Course Technology
Art Director: Bruce Bond
25 Thomson Place
Cover and Text Design: Joel Sadagursky Boston, MA 02210
Cover Photos: Jon Chomitz USA
Illustrator: Pre-Press PMG
Cengage Learning is a leading provider of customized learning solutions with
Compositor: Pre-Press PMG office locations around the globe, including Singapore, the United Kingdom,
Printer: RRD Menasha Australia, Mexico, Brazil and Japan. Locate your local office at:
international.cengage.com/region

Cengage Learning products are represented in Canada by Nelson


Education, Ltd.

For your lifelong learning solutions, visit course.cengage.com

Printed in the United States of America


1 2 3 4 5 6 7 14 13 12 11 10 09 08
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page v

Discovering Computers
Fundamentals
Fifth Edition

Contents
CHAPTER 1 Education........................................................................................22
Finance ............................................................................................23
Introduction to Computers ................................1 Government ..................................................................................23
Health Care ....................................................................................23
A WORLD OF COMPUTERS....................................................................2
Science ............................................................................................24
WHAT IS A COMPUTER? ........................................................................3 Publishing ......................................................................................25
Data and Information ....................................................................4 Travel ..............................................................................................25
Advantages and Disadvantages of Using Computers ..............4 Manufacturing ..............................................................................25
LOOKING AHEAD: Paying by Cell Phone ............................................................5 CHAPTER SUMMARY............................................................................26
Information Processing Cycle ......................................................5
COMPANIES ON THE CUTTING EDGE ................................................27
THE COMPONENTS OF A COMPUTER ................................................6 Dell ..................................................................................................27
Input Devices ..................................................................................7 Apple Computer ..........................................................................27
Output Devices................................................................................7
System Unit ......................................................................................7 TECHNOLOGY TRAILBLAZERS ............................................................27
Storage Devices................................................................................7 Bill Gates ........................................................................................27
Communication Devices ................................................................8 Anne Mulcahy ..............................................................................27

NETWORKS AND THE INTERNET ..........................................................8 Chapter Review ..................................................................................28


Key Terms ............................................................................................29
COMPUTER SOFTWARE ......................................................................10 Checkpoint ..........................................................................................30
System Software ............................................................................10 Web Research ......................................................................................31
Application Software ....................................................................11 Learn How To ....................................................................................32
ETHICS & ISSUES: What Can Be Done to Combat Computer Addiction? ..............11 Learn It Online....................................................................................34
Installing and Running Programs ..............................................11
Software Development ................................................................12 Special Feature
TIMELINE: MILESTONES IN
CATEGORIES OF COMPUTERS ............................................................13
COMPUTER HISTORY 35
PERSONAL COMPUTERS......................................................................14
Desktop Computers ......................................................................14 CHAPTER 2
MOBILE COMPUTERS AND MOBILE DEVICES ................................14 The Internet and World Wide Web........49
Notebook Computers ..................................................................14
Mobile Devices ..............................................................................15 THE INTERNET ......................................................................................50
HOW THE INTERNET WORKS ..............................................................51
GAME CONSOLES ..................................................................................16
Connecting to the Internet ..........................................................51
SERVERS ................................................................................................16 Access Providers............................................................................52
MAINFRAMES ........................................................................................17 How Data Travels the Internet....................................................52
Internet Addresses ........................................................................53
SUPERCOMPUTERS ..............................................................................17
THE WORLD WIDE WEB ......................................................................54
EMBEDDED COMPUTERS ....................................................................17 Browsing the Web ........................................................................54
EXAMPLES OF COMPUTER USAGE ..................................................18 Web Addresses ..............................................................................56
Home User ....................................................................................18 Navigating Web Pages..................................................................57

ETHICS & ISSUES: What Should Be Done about Identity Theft? ..........................19 LOOKING AHEAD: Internet Speeds into the Future ............................................57

Small Office/Home Office User ..................................................20 Searching for Information on the Web ......................................58
Mobile User ....................................................................................20 Types of Web Sites ........................................................................61
Power User ....................................................................................21 ETHICS & ISSUES: Should You Trust a Wiki for Academic Research? ....................63
Large Business User......................................................................21
Evaluating a Web Site ..................................................................63
COMPUTER APPLICATIONS IN SOCIETY ..........................................22 Multimedia on the Web................................................................64
Web Publishing..............................................................................66
LOOKING AHEAD: Robots Perform Mundane, Dangerous Tasks ............................22 E-Commerce ..................................................................................67

v
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page vi

vi DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

OTHER INTERNET SERVICES ..............................................................68 SOFTWARE FOR HOME, PERSONAL, AND


E-Mail..............................................................................................69 EDUCATIONAL USE........................................................................115
Mailing Lists ..................................................................................71 Software Suite (for Personal Use) ............................................116
Instant Messaging ........................................................................71 Personal Finance Software ........................................................116
Chat Rooms ....................................................................................71 Legal Software ............................................................................117
VoIP ................................................................................................72 Tax Preparation Software ..........................................................117
FTP ..................................................................................................72 Desktop Publishing Software
Newsgroups and Message Boards..............................................73 (for Personal Use) ..................................................................117
Paint/Image Editing Software
NETIQUETTE ..........................................................................................73
(for Personal Use) ..................................................................118
CHAPTER SUMMARY............................................................................74 Clip Art/Image Gallery ..............................................................118
Video and Audio Editing Software
ETHICS & ISSUES: Should Companies Be Able to Track Your Online Habits? ..........74
(for Personal Use) ..................................................................119
COMPANIES ON THE CUTTING EDGE ................................................75 Home Design/Landscaping Software......................................119
Google ............................................................................................75 Travel and Mapping Software ..................................................119
Yahoo!..............................................................................................75 Educational and Reference Software........................................119
Entertainment Software..............................................................120
TECHNOLOGY TRAILBLAZERS ............................................................75
Tim Berners-Lee ............................................................................75 APPLICATION SOFTWARE FOR COMMUNICATIONS ....................120
Meg Whitman ................................................................................75 ETHICS & ISSUES: Should Companies Monitor Employees’
E-Mail and Internet Traffic? ..........................................................................121
Chapter Review ..................................................................................76
Key Terms ............................................................................................77 POPULAR UTILITY PROGRAMS ........................................................121
Checkpoint ..........................................................................................78 WEB-BASED SOFTWARE ....................................................................122
Web Research ......................................................................................79
Learn How To ....................................................................................80 LOOKING AHEAD: Using Semantics with Web 3.0 ............................................122
Learn It Online....................................................................................82
LEARNING AIDS AND SUPPORT TOOLS FOR
APPLICATION SOFTWARE ............................................................123
Special Feature Web-Based Training ....................................................................123
MAKING USE OF THE WEB 83
CHAPTER SUMMARY..........................................................................124
CHAPTER 3 ETHICS & ISSUES: Copying Software — A Computer Crime! ..............................124
Application Software ................................................99 COMPANIES ON THE CUTTING EDGE ..............................................125
Adobe Systems ............................................................................125
APPLICATION SOFTWARE ..................................................................100
Microsoft ......................................................................................125
The Role of System Software ....................................................101
Working with Application Software ........................................102 TECHNOLOGY TRAILBLAZERS ..........................................................125
Dan Bricklin ................................................................................125
LOOKING AHEAD: Touch Drive Your Computer Screen ......................................103
Masayoshi Son ............................................................................125
BUSINESS SOFTWARE........................................................................104
Word Processing Software ........................................................105 Chapter Review ................................................................................126
Developing a Document ............................................................106 Key Terms ..........................................................................................127
Spreadsheet Software ................................................................107 Checkpoint ........................................................................................128
Database Software ......................................................................108 Web Research ....................................................................................129
Presentation Graphics Software................................................109 Learn How To ..................................................................................130
Note Taking Software ................................................................110 Learn It Online..................................................................................132
Personal Information Manager Software ................................110
Personal Mobile Device Business Software ............................110
Software Suite ..............................................................................110
Project Management Software ..................................................111 CHAPTER 4
Accounting Software ..................................................................111
Document Management Software ............................................111
The Components of the
Enterprise Computing Software ..............................................112 System Unit ........................................................................133
GRAPHICS AND MULTIMEDIA SOFTWARE......................................112 THE SYSTEM UNIT ..............................................................................134
Computer-Aided Design ............................................................113 The Motherboard ........................................................................136
Desktop Publishing Software
(for the Professional) ............................................................113 PROCESSOR ........................................................................................137
Paint/Image Editing Software The Control Unit ........................................................................137
(for the Professional) ............................................................113 The Arithmetic Logic Unit ........................................................138
Video and Audio Editing Software Machine Cycle ............................................................................138
(for the Professional) ............................................................114 The System Clock ........................................................................138
LOOKING AHEAD: Fastest Supercomputer Will Have Petaflop Speed ..................139
ETHICS & ISSUES: Should It Be Legal to Share Copyrighted Music or Video
Files over a Network? ..................................................................................114 Comparison of Personal Computer Processors......................139
Multimedia Authoring Software ..............................................114 Buying a Personal Computer ....................................................139
Web Page Authoring Software ..................................................114 ETHICS & ISSUES: Discarded Computer Components: Whose Problem Is It? ......139
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page vii

CONTENTS
CONTENTS vii

DATA REPRESENTATION ....................................................................140 GAMING AND MEDIA PLAYER CONTROLLERS ..............................172


Gamepads ....................................................................................172
MEMORY ..............................................................................................142
Joystick and Wheels....................................................................172
Bytes and Addressable Memory ..............................................142
Light Guns....................................................................................172
Memory Sizes ..............................................................................142
Dance Pads ..................................................................................172
Types of Memory ........................................................................142
Motion-Sensing Game Controllers ..........................................172
RAM ..............................................................................................143
Touch-Sensitive Pads ..................................................................172
ETHICS & ISSUES: Should Schools Supply Computers to All Students?..............144 OTHER TYPES OF INPUT ....................................................................173
Cache ............................................................................................144 LOOKING AHEAD: Controlling Games by Thinking ............................................173
ROM ..............................................................................................145
Flash Memory ..............................................................................145 Voice Input ..................................................................................173
CMOS............................................................................................146 Input for Smart Phones, PDAs, and Tablet PCs ....................174
Memory Access Times ................................................................146 Digital Cameras ..........................................................................175
Video Input ..................................................................................176
EXPANSION SLOTS AND ADAPTER CARDS....................................147 Scanners and Reading Devices ................................................177
Flash Memory Cards, USB Flash Drives,
PC Cards, and ExpressCard Modules..................................147 ETHICS & ISSUES: Is Using the Self-Checkout Saving Anybody Time or Money? ....178

LOOKING AHEAD: Clothing, Appliances Show RFID Uses ..................................179


PORTS AND CONNECTORS................................................................148
Serial Ports....................................................................................149 Terminals ......................................................................................180
Parallel Ports ................................................................................149 Biometric Input............................................................................181
USB Ports......................................................................................149
FireWire Ports ..............................................................................150 WHAT IS OUTPUT? ..............................................................................182
Special-Purpose Ports ................................................................150 DISPLAY DEVICES................................................................................183
LCD Monitors and LCD Screens ..............................................184
BUSES....................................................................................................151 Plasma Monitors..........................................................................185
BAYS ......................................................................................................151 CRT Monitors ..............................................................................186

POWER SUPPLY ..................................................................................152 PRINTERS..............................................................................................187


MOBILE COMPUTERS AND DEVICES ..............................................152 Producing Printed Output ........................................................188
Nonimpact Printers ....................................................................189
PUTTING IT ALL TOGETHER ..............................................................154 Ink-Jet Printers ............................................................................189
LOOKING AHEAD: Body Heat May Power Notebook Computers ..........................154 Photo Printers ..............................................................................190
LOOKING AHEAD: Talking Paper Provides Information, Warnings ........................190
KEEPING YOUR COMPUTER CLEAN ................................................155
Laser Printers ..............................................................................190
CHAPTER SUMMARY..........................................................................156 Thermal Printers..........................................................................191
Mobile Printers ............................................................................192
COMPANIES ON THE CUTTING EDGE ..............................................157
Plotters and Large-Format Printers ..........................................192
AMD..............................................................................................157
Impact Printers ............................................................................192
Intel................................................................................................157
OTHER OUTPUT DEVICES ..................................................................193
TECHNOLOGY TRAILBLAZERS ..........................................................157
Speakers, Headphones, and Earphones ..................................193
Jack Kilby......................................................................................157
Fax Machines and Fax Modems ..............................................194
Gordon Moore ............................................................................157
Multifunction Peripherals..........................................................194
Data Projectors ............................................................................195
Chapter Review ................................................................................158
Interactive Whiteboards ............................................................195
Key Terms ..........................................................................................159
Checkpoint ........................................................................................160 PUTTING IT ALL TOGETHER ..............................................................196
Web Research ....................................................................................161
Learn How To ..................................................................................162 INPUT AND OUTPUT DEVICES FOR PHYSICALLY
Learn It Online..................................................................................164 CHALLENGED USERS....................................................................197
ETHICS & ISSUES: Should Web Sites Be Held Accountable for
Accessibility Levels for Physically Challenged People? ......................................197
CHAPTER 5 CHAPTER SUMMARY..........................................................................198
Input and Output ..........................................................165 COMPANIES ON THE CUTTING EDGE ..............................................199
Logitech ........................................................................................199
WHAT IS INPUT?..................................................................................166 Hewlett-Packard..........................................................................199
KEYBOARD AND POINTING DEVICES ..............................................167
The Keyboard ..............................................................................168 TECHNOLOGY TRAILBLAZERS ..........................................................199
Mouse............................................................................................169 Douglas Engelbart ......................................................................199
Donna Dubinsky ........................................................................199
ETHICS & ISSUES: Are Employers Responsible for Medical
Problems Related to Computer Use? ..............................................................169 Chapter Review ................................................................................200
Trackball........................................................................................170 Key Terms ..........................................................................................202
Touchpad ......................................................................................170 Checkpoint ........................................................................................203
Pointing Stick ..............................................................................170 Web Research ....................................................................................204
Light Pen ......................................................................................170 Learn How To ..................................................................................205
Touch Screen ................................................................................170 Learn It Online..................................................................................207
Pen Input ......................................................................................171
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page viii

viii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

Special Feature OPERATING SYSTEM FUNCTIONS ....................................................252


D I G I TA L I M A G I N G A N D Starting a Computer ..................................................................252
VIDEO TECHNOLOGY 208 Providing a User Interface ........................................................253
Managing Programs ..................................................................253
CHAPTER 6 Managing Memory ....................................................................255
Coordinating Tasks ....................................................................255
Storage........................................................................................219 Configuring Devices ..................................................................256
Establishing an Internet Connection ........................................256
STORAGE ..............................................................................................220 Monitoring Performance............................................................257
MAGNETIC DISKS................................................................................222 Providing File Management and Other Utilities....................257
Hard Disks....................................................................................223 Controlling a Network ..............................................................257
Administering Security ..............................................................258
LOOKING AHEAD: Heat Increases Disk Capacity ..............................................223
ETHICS & ISSUES: Who Should Be Responsible for Notebook Computer
Floppy Disks ................................................................................228
Security?....................................................................................................258
OPTICAL DISCS....................................................................................229
OPERATING SYSTEM UTILITY PROGRAMS ....................................259
LOOKING AHEAD: Interactive Gift Cards Provide Marketing Opportunities ............231 File Manager ................................................................................259
CD-ROMs ....................................................................................231 Search Utility................................................................................259
CD-Rs and CD-RWs....................................................................232 Image Viewer ..............................................................................259
DVD-ROMs, BD-ROMs, and HD DVD-ROMs ......................233 Personal Firewall ........................................................................260
Uninstaller ....................................................................................260
ETHICS & ISSUES: Is the Blu-Ray and HD DVD Competition Disk Scanner ................................................................................260
Good for Consumers? ..................................................................................233 Disk Defragmenter......................................................................261
Recordable and Rewritable DVDs............................................234 Diagnostic Utility ........................................................................261
Backup Utility ..............................................................................261
TAPE ......................................................................................................234 Screen Saver ................................................................................261
PC CARDS AND EXPRESSCARD MODULES ..................................235
TYPES OF OPERATING SYSTEMS ....................................................262
MINIATURE MOBILE STORAGE MEDIA............................................235
STAND-ALONE OPERATING SYSTEMS..............................................262
Flash Memory Cards ..................................................................236
Windows XP ................................................................................262
USB Flash Drives ........................................................................236
Windows Vista ............................................................................263
Smart Cards..................................................................................237
Mac OS X ......................................................................................264
ETHICS & ISSUES: Should the World Become a Cashless Society? ....................237 UNIX ............................................................................................264
Linux ............................................................................................265
MICROFILM AND MICROFICHE ........................................................238
ETHICS & ISSUES: Closed Source vs. Open Source
ENTERPRISE STORAGE ......................................................................238 Operating Systems ......................................................................................265
PUTTING IT ALL TOGETHER ..............................................................239 LOOKING AHEAD: Open-Source Projects Promote Digital Identity Sharing ............265
ETHICS & ISSUES: Who Should Be Looking at Your Medical Records? ..............239
NETWORK OPERATING SYSTEMS ....................................................266
CHAPTER SUMMARY..........................................................................240
EMBEDDED OPERATING SYSTEMS..................................................266
ETHICS & ISSUES: Who Is Responsible for Maintaining Your Online Storage? ......240
STAND-ALONE UTILITY PROGRAMS ................................................267
COMPANIES ON THE CUTTING EDGE ..............................................241 Antivirus Programs ....................................................................267
Seagate Technology ....................................................................241 Spyware and Adware Removers ..............................................268
SanDisk Corporation ..................................................................241 Internet Filters..............................................................................268
File Compression ........................................................................269
TECHNOLOGY TRAILBLAZERS ..........................................................241 File Conversion............................................................................269
Al Shugart ....................................................................................241 Media Player ................................................................................269
Mark Dean....................................................................................241 CD/DVD Burning ......................................................................269
Personal Computer Maintenance ............................................270
Chapter Review ................................................................................242
Key Terms ..........................................................................................243 CHAPTER SUMMARY..........................................................................270
Checkpoint ........................................................................................244 COMPANIES ON THE CUTTING EDGE ..............................................271
Web Research ....................................................................................245 Red Hat ........................................................................................271
Learn How To ..................................................................................246 Research in Motion (RIM)..........................................................271
Learn It Online..................................................................................248
TECHNOLOGY TRAILBLAZERS ..........................................................271
Alan Kay ......................................................................................271
Linus Torvalds ............................................................................271
CHAPTER 7
Chapter Review ................................................................................272
Operating Systems and Key Terms ..........................................................................................273
Utility Programs ............................................................249 Checkpoint ........................................................................................274
Web Research ....................................................................................275
SYSTEM SOFTWARE ..........................................................................250 Learn How To ..................................................................................276
Learn It Online..................................................................................278
OPERATING SYSTEMS ........................................................................251
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page ix

CONTENTS
CONTENTS ix

Special Feature COMPANIES ON THE CUTTING EDGE ..............................................323


BUYER’S GUIDE: HOW TO PURCHASE Cisco Systems ..............................................................................323
A PERSONAL COMPUTER 279 Qualcomm ....................................................................................323

TECHNOLOGY TRAILBLAZERS ..........................................................323


Robert Metcalfe............................................................................323
CHAPTER 8 Patricia Russo ..............................................................................323
Communications and Networks ..............295
Chapter Review ................................................................................324
COMMUNICATIONS ............................................................................296 Key Terms ..........................................................................................325
Checkpoint ........................................................................................326
USES OF COMPUTER COMMUNICATIONS......................................297
Web Research ....................................................................................327
Internet, Web, E-Mail, Instant Messaging, Chat Rooms,
Learn How To ..................................................................................328
Newsgroups, Blogs, Wikis, RSS, VoIP, FTP, Web
Learn It Online..................................................................................330
Folders, Video Conferencing, and Fax ..............................298
Wireless Messaging Services ....................................................298
ETHICS & ISSUES: High-Tech Cheating via Wireless Messaging Services ............299
Wireless Internet Access Points ................................................300 CHAPTER 9
Cybercafés ....................................................................................301 Database Management ......................................331
Global Positioning Systems ......................................................301
Collaboration ..............................................................................302 DATABASES, DATA, AND INFORMATION ........................................332
Groupware ..................................................................................302 Data Integrity ..............................................................................333
Voice Mail ....................................................................................302 Qualities of Valuable Information ............................................334
Web Services ................................................................................302
THE HIERARCHY OF DATA ................................................................334
NETWORKS ..........................................................................................303 Characters ....................................................................................335
LANs, MANs, and WANs ........................................................303 Fields ............................................................................................335
Network Architectures ..............................................................305 Records..........................................................................................336
Network Topologies....................................................................306 Files................................................................................................336
Intranets ........................................................................................307
Network Communications Standards ....................................308 ETHICS & ISSUES: Are Portable Storage Devices a Threat to Businesses? ..........336

ETHICS & ISSUES: Should You Worry about Cell Phone MAINTAINING DATA ............................................................................336
and Cellular Antenna Radiation? ..................................................................309 Adding Records ..........................................................................336
Changing Records ......................................................................338
COMMUNICATIONS SOFTWARE........................................................310 Deleting Records ........................................................................338
Validating Data ............................................................................339
COMMUNICATIONS OVER THE TELEPHONE NETWORK ..............310
Dial-Up Lines ..............................................................................311 FILE PROCESSING VERSUS DATABASES ........................................340
Dedicated Lines ..........................................................................311 File Processing Systems..............................................................341
The Database Approach ............................................................341
COMMUNICATIONS DEVICES ............................................................312
Dial-Up Modems ........................................................................313 DATABASE MANAGEMENT SYSTEMS..............................................343
ISDN and DSL Modems ............................................................314 Data Dictionary ..........................................................................343
Cable Modems ............................................................................314 File Retrieval and Maintenance ................................................344
Wireless Modems ........................................................................314
Network Cards ............................................................................315 LOOKING AHEAD: Archive an Entire Lifetime ..................................................345
Wireless Access Points................................................................315
Backup and Recovery ................................................................346
Routers ..........................................................................................315
Data Security................................................................................346
HOME NETWORKS ..............................................................................316 ETHICS & ISSUES: Should People Be Punished for Accidently Accessing
Wired Home Networks ..............................................................316 Stolen Data? ..............................................................................................346
Wireless Home Networks ..........................................................316
RELATIONAL, OBJECT-ORIENTED, AND
COMMUNICATIONS CHANNEL ..........................................................317 MULTIDIMENSIONAL DATABASES ..............................................347
LOOKING AHEAD: Technology Curbs Impaired Drivers ......................................319 Relational Databases ..................................................................347
Object-Oriented Databases ........................................................349
PHYSICAL TRANSMISSION MEDIA ..................................................319 Multidimensional Databases ....................................................349
Twisted-Pair Cable ......................................................................319
Coaxial Cable ..............................................................................320 WEB DATABASES ................................................................................350
Fiber-Optic Cable ........................................................................320 ETHICS & ISSUES: Who Should Be Held Accountable for the Rash of
Database Security Breaches? ......................................................................350
WIRELESS TRANSMISSION MEDIA..................................................320
Infrared ........................................................................................321 DATABASE ADMINISTRATION............................................................351
Broadcast Radio ..........................................................................321 Database Design Guidelines......................................................351
Cellular Radio ..............................................................................321 Role of the Database Anaylsts and
LOOKING AHEAD: Femto Base Stations Enhance Cell Phone Signals ..................321 Administrators ......................................................................351
Microwaves ..................................................................................321 Role of the Employee as User ..................................................351
Communications Satellite ..........................................................322
CHAPTER SUMMARY..........................................................................352
CHAPTER SUMMARY..........................................................................322 LOOKING AHEAD: Barcodes Identify World’s Animal, Plant Species ....................352
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page x

x DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

COMPANIES ON THE CUTTING EDGE ..............................................353 ETHICS & ISSUES: Should Spyware Be Legal?................................................381
Oracle ............................................................................................353 Phishing ........................................................................................381
Sybase............................................................................................353 Spam..............................................................................................382
Privacy Laws................................................................................382
TECHNOLOGY TRAILBLAZERS ..........................................................353
Social Engineering ......................................................................384
E. F. Codd ....................................................................................353
Employee Monitoring ................................................................384
Larry Ellison ................................................................................353
Content Filtering ........................................................................384
Computer Forensics ....................................................................385
Chapter Review ................................................................................354
Key Terms ..........................................................................................355 LOOKING AHEAD: Computer Knowledge Assessment
Checkpoint ........................................................................................356 Using Brain Fingerprinting ............................................................................385
Web Research ....................................................................................357
Learn How To ..................................................................................358 HEALTH CONCERNS OF COMPUTER USE ......................................385
Learn It Online..................................................................................360 Computers and Health Risks ....................................................385
Ergonomics and Workplace Design ........................................386
Computer Addiction ..................................................................387
Green Computing........................................................................387
CHAPTER 10
CHAPTER SUMMARY..........................................................................388
Computer Security, Ethics, ETHICS & ISSUES: What Can Be Done to Stop the Growing Threat
and Privacy............................................................................361 of Cybercrime? ..........................................................................................388

COMPUTER SECURITY RISKS ..........................................................362 COMPANIES ON THE CUTTING EDGE ..............................................389


INTERNET AND NETWORK ATTACKS ..............................................364 McAfee ..........................................................................................389
Computer Viruses, Worms, and Trojan Horses ......................364 Symantec ......................................................................................389
Safeguards against Computer Viruses, Worms,
TECHNOLOGY TRAILBLAZERS ..........................................................389
and Trojan Horses ................................................................365
Donn Parker ................................................................................389
Botnets ..........................................................................................367
Clifford Stoll ................................................................................389
Denial of Service Attacks ..........................................................367
Back Doors ..................................................................................367
Chapter Review ................................................................................390
Spoofing........................................................................................367
Key Terms ..........................................................................................391
Safeguards against Botnets, DoS Attacks, Back Doors,
Checkpoint ........................................................................................392
and Spoofing ..........................................................................367
Web Research ....................................................................................393
Firewalls........................................................................................367
Learn How To ..................................................................................394
Intrusion Detection Software ....................................................368
Learn It Online..................................................................................396
UNAUTHORIZED ACCESS AND USE ................................................368
Safeguards against Unauthorized Access
and Use ..................................................................................368
Special Feature
D I G I TA L E N T E R TA I N M E N T 397
Identifying and Authenticating Users ....................................368

LOOKING AHEAD: Biometric Software Aids Behavior Detection ..........................370 CHAPTER 11


HARDWARE THEFT AND VANDALISM..............................................371 Information System Development
Safeguards against Hardware Theft and and Programming Languages ....................405
Vandalism ..............................................................................371
THE SYSTEM DEVELOPMENT CYCLE ..............................................406
SOFTWARE THEFT ..............................................................................372 Who Participates in the System Development Cycle? ..........407
Safeguards against Software Theft ..........................................372
LOOKING AHEAD: Right-Brain Skills Essential for Analysts’ Success ....................408
INFORMATION THEFT..........................................................................373 Project Management ..................................................................408
Safeguards against Information Theft......................................373 Feasibility Assessment................................................................409
Encryption ....................................................................................373 Documentation ............................................................................409
Data and Information Gathering Techniques ........................410
SYSTEM FAILURE ................................................................................374
Safeguards against System Failure ..........................................374 ETHICS & ISSUES: Do You Work Harder When Someone Is Watching? ................410
BACKING UP — THE ULTIMATE SAFEGUARD................................375 What Initiates the System Development Cycle? ....................410

WIRELESS SECURITY ........................................................................375 ETHICS & ISSUES: How Can Workers Overcome Writer’s Block When
Preparing Documentation? ..........................................................................411
ETHICS AND SOCIETY ........................................................................376
Information Accuracy ................................................................377 Cyber Coast Café — A Case Study ..........................................412
Intellectual Property Rights ......................................................378 Planning Phase ............................................................................412
Planning at Cyber Coast Café ..................................................413
ETHICS & ISSUES: Is It Illegal to Delete Some Files from Your Analysis Phase ............................................................................413
Own Computer? ..........................................................................................379 Preliminary Investigation at Cyber Coast Café......................414
Detailed Analysis at Cyber Coast Café....................................416
INFORMATION PRIVACY ....................................................................379 Design Phase................................................................................416
Electronic Profiles........................................................................380 Hardware Acquisition at Cyber Coast Café............................418
Cookies..........................................................................................380 Detailed Design at Cyber Coast Café ......................................420
Spyware and Adware ................................................................381 Implementation Phase................................................................420
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xi

CONTENTS xi

LOOKING AHEAD: Training Delivery Becomes Flexible ......................................421 ENTERPRISE-WIDE TECHNOLOGIES AND METHODOLOGIES ......467
Implementation at Cyber Coast Café ......................................421 Portals ..........................................................................................467
Operation, Support, and Security Phase ................................422 Communications ........................................................................468
Operation, Support, and Security at Cyber Coast Café ........422 Data Warehouses ........................................................................468
Extranets ......................................................................................469
PROGRAMMING LANGUAGES AND PROGRAM Web Services ................................................................................469
DEVELOPMENT TOOLS ......................................................................423 Workflow ......................................................................................469
Low-Level Languages ................................................................424 Virtual Private Network ............................................................470
Procedural Languages ................................................................425
Object-Oriented Programming Languages and Program E-COMMERCE ......................................................................................470
Development Tools ..............................................................427 E-Retailing ....................................................................................470
Other Programming Languages ..............................................430 ETHICS & ISSUES: Who Can You Trust When Making Purchases Online? ............471
Classic Programming Languages ............................................431
Finance ..........................................................................................472
Other Program Development Tools ........................................431
Health............................................................................................472
ETHICS & ISSUES: Who Should Be Held Accountable for Macro LOOKING AHEAD: Health Devices Automate Patients’ Care ................................472
Security Threats? ........................................................................................432
Entertainment and Media ..........................................................472
Web Page Development ............................................................433
ETHICS & ISSUES: Does Availability of News on the Web Threaten
Multimedia Program Development ........................................437
the Daily Newspaper? ..................................................................................473
THE PROGRAM DEVELOPMENT CYCLE ..........................................438 Travel ............................................................................................473
ETHICS & ISSUES: Who Is Responsible for Bugs? ..........................................439
Other Business Services..............................................................473

What Initiates the Program Development Cycle?..................439 ENTERPRISE HARDWARE ..................................................................474


LOOKING AHEAD: Software Factories Provide Low-Cost RAID..............................................................................................474
Programming Alternatives ............................................................................439 Network Attached Storage and Storage
Area Networks ......................................................................475
Control Structures ......................................................................440 Enterprise Storage Systems ......................................................476
CHAPTER SUMMARY..........................................................................442 ETHICS & ISSUES: How Much Data Should Companies Be Required to Keep? ....476
COMPANIES ON THE CUTTING EDGE ..............................................443 Blade Servers................................................................................477
Computer Sciences Corporation (CSC) ..................................443 High-Availability Systems ........................................................477
Electronic Arts (EA) ....................................................................443 Scalability ....................................................................................477
Utility and Grid Computing......................................................478
TECHNOLOGY TRAILBLAZERS ..........................................................443 Virtualization ..............................................................................478
Grace Hopper ..............................................................................443 Interoperability ............................................................................478
James Gosling ..............................................................................443
BACKUP PROCEDURES......................................................................478
Chapter Review ................................................................................444 Disaster Recovery Plan ..............................................................479
Key Terms ..........................................................................................445
CHAPTER SUMMARY..........................................................................480
Checkpoint ........................................................................................446
Web Research ....................................................................................447 COMPANIES ON THE CUTTING EDGE ..............................................481
Learn How To ..................................................................................448 EMC ..............................................................................................481
Learn It Online..................................................................................450 IBM ................................................................................................481

TECHNOLOGY TRAILBLAZERS ..........................................................481


John Chambers ............................................................................481
CHAPTER 12 Jim Clark ......................................................................................481
Enterprise Computing ............................................451 Chapter Review ................................................................................482
WHAT IS ENTERPRISE COMPUTING? ..............................................452 Key Terms ..........................................................................................483
Types of Enterprise ....................................................................454 Checkpoint ........................................................................................484
Organizational Structure of an Enterprise ..............................454 Web Research ....................................................................................485
Learn How To ..................................................................................486
LOOKING AHEAD: The CEO of the Future ........................................................455 Learn It Online..................................................................................488
Levels of Users in the Enterprise ..............................................455
How Managers Use Information ..............................................456
APPENDIX A: QUIZ YOURSELF ANSWERS ................................APP 1
INFORMATION SYSTEMS IN THE ENTERPRISE ............................456
Information Systems within Functional Units........................457 GLOSSARY/INDEX..........................................................................IND 1
General Purpose Information Systems ....................................461 PHOTO CREDITS ..........................................................................IND 29
Integrated Information Systems ..............................................465
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xii

xii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

Online Companion
Use the Online Companion at
scsite.com/dcf5e to bring unparalleled
currency to the learning experience.
Access additional information about
important topics and make use of online
learning games, practice tests, and
additional reinforcement. Gain access to
this dynamic site through CoursePort,
Course Technology’s login page.

Learn How To
Apply the concepts presented
in the chapter to every day
life with these hands-on activ-
ities. See the Learn How To
activities in action with visual
demonstrations on the Online
Companion.

Ethics and Issues


Ethics and Issues boxes raise
controversial, computer-related
topics of the day, challenging
readers to closely consider
general concerns of computers
in society.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xiii

ABOUT THE BOOK xiii

Companies on the Cutting Edge


Everyone who interacts with computers
should be aware of the key computer-
related companies. Each chapter profiles
two of these key companies.

Technology Trailblazers
The Technology Trailblazers section in
each chapter offers a glimpse into the life
and times of the more famous leaders of
the computer industry.

Quiz Yourself
Three Quiz Yourself boxes per
chapter help ensure retention
by reinforcing sections of the
chapter material, rather than
waiting for the end of the chap-
ter to test. Use Appendix A for
a quick check of the answers,
and access additional Quiz
Yourself quizzes on the Online
Companion for interactivity
and easy use.

Career Corner
Each chapter ends with a Career
Corner feature that introduces
a computer career opportunity
relating to a topic covered in
the chapter.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xiv

xiv DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

Web Link
Obtain current information
and a different perspective
about key terms and
concepts by visiting the
Web addresses in the Web
Links found in the margins
throughout the book.

Looking Ahead
The Looking Ahead boxes offer a
glimpse of the latest advances in
computer technology that will be
available, usually within five years.

FAQ
FAQ (frequently asked questions)
boxes offer common questions and
answers about subjects related to
the topic at hand.

Learn It Online
The Learn It Online exercises, which
include brand new online videos,
practice tests, interactive labs, learning
games, and Web-based activities, offer
a wealth of online reinforcement.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xv

ABOUT THE BOOK xv

Checkpoint
Use these multiple choice,
true/false, matching, short
answer, and working
together exercises to
reinforce understanding
of the topics presented
in the chapter.

Web Research
Each Web Research exercise
requires follow-up research
on the Web, and suggests
writing a short article or
presenting the findings of
the research to the class.

Chapter Review
Use the Chapter Review before taking an
examination to ensure familiarity with the
computer concepts presented. This section
includes each objective, followed by a
one- or two-paragraph summary.

Key Terms
Before taking a test, use the Key Terms page
as a checklist of terms to know. Visit a Key
Terms page on the Online Companion and
click any term for additional information.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xvi

xvi DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

Chapter Objectives
and Table of Contents
Before reading the chapter, carefully
read through the Objectives and
Contents to discover knowledge that
will be gleaned from chapter.

Initial Chapter Figure


Carefully study the first figure
in each chapter because it
provides an easy-to-follow
overview of the major purpose
of the chapter.

Step Figures
Each chapter includes numerous step figures that present the more
complex computer concepts using a step-by-step pedagogy.
C6671_FM_pp6.qxd 1/30/08 1:14 PM Page xvii

ABOUT THE BOOK xvii

Glossary/Index
The Glossary/Index at the back of
the book not only provides page
references, it also offers definitions
for all the key terms included in
the text and boxed features.

Special Features
Five special features following Chapters 1, 2, 5, 7, and 10 encompass
topics from the history of computers, to what’s hot on the Web, to a
buyer’s guide, to the latest in new technology.
C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xviii

xviii DISCOVERING COMPUTERS: Fundamentals, Fifth Edition

Preface
The Shelly Cashman Series ® offers the finest textbooks in computer education. This book is our
answer to the many requests we have received from instructors and students for a textbook
that provides a succinct, yet thorough, introduction to computers.
In Discovering Computers: Fundamentals, Fifth Edition, you will find an educationally sound,
highly visual, and easy-to-follow pedagogy that presents a complete, yet to the point, treatment
of introductory computer subjects. Students will finish the course with a solid understanding of
computers, how to use computers, and how to access information on the World Wide Web.

NEW TO THIS EDITION


Discovering Computers: Fundamentals, Fifth Edition includes exciting new features, certain to
engage and challenge students, making learning with Discovering Computers: Fundamentals, Fifth
Edition an enriched experience. These new features include:
• Comprehensive updates for currency, including coverage of new hardware and software,
digital communications, social networking and other societal issues, career opportunities,
and industry trends.
• Brand new CNET At the Movies videos highlight current events of interest to students in
the world of technology, bringing relevance to the concepts course.
• Brand new Blogging exercise on the Web Research page engages students and brings
relevance to the concepts course.
• Revised chapter features such as Ethics and Issues, Looking Ahead, FAQ, Web Links,
Companies on the Cutting Edge, and Technology Trailblazers include the most relevant and
interesting examples to students.
• Updated Checkpoint exercises reinforce students’ understanding of key concepts presented
in the chapters.

OBJECTIVES OF THIS TEXTBOOK


Discovering Computers: Fundamentals, Fifth Edition is intended for use as a stand-alone textbook
or in combination with an applications, Internet, or programming textbook in a one-quarter or
one-semester introductory computer course. No experience with computers is assumed. The
objectives of this book are to:
• Provide a concise, yet comprehensive introduction to computers
• Present the most-up-to-date technology in an ever-changing discipline
• Give students an understanding of why computers are essential components in business
and society
• Teach the fundamentals of computers and computer nomenclature, particularly with
respect to personal computer hardware and software, the World Wide Web, and enterprise
computing
• Present the material in a visually appealing and exciting manner that motivates students
to learn
• Present strategies for purchasing a notebook computer, a Tablet PC, and a PDA
• Offer alternative learning techniques and reinforcement via the Web
• Offer distance-education providers a textbook with a meaningful and exercise-rich Online
Companion
C6671_FM_pp6.qxd 1/30/08 1:15 PM Page xix

P R E FA C E xix

DISTINGUISHING FEATURES
To date, more than six million students have learned about computers using a Discovering
Computers textbook. With the additional World Wide Web integration and interactivity, stream-
ing up-to-date audio and video, extraordinary step-by-step visual drawings and photographs,
unparalleled currency, and the Shelly and Cashman touch, this book will make your computer
concepts course exciting and dynamic. Distinguishing features of this book include:

A Proven Pedagogy
Careful explanations of complex concepts, educationally-sound elements, and reinforcement
highlight this proven method of presentation.

Essential Computer Concepts Coverage


This book offers the same breadth of topics as our well-known
Discovering Computers 2009: Complete, but the depth of coverage focuses
on the basic knowledge required to be computer literate in today’s digi-
tal world.

A Visually Appealing Book that Maintains Student Interest


The latest technology, pictures, drawings, and text are combined art-
fully to produce a visually appealing and easy-to-understand book.
Many of the figures include a step-by-step presentation (see page
141), which simplifies the more complex computer concepts. Pictures
and drawings reflect the latest trends in computer technology.

Latest Technologies and Terms


The technologies and terms your students see in this book are
those they will encounter when they start using computers.
Only the latest application software packages are shown
throughout the book.

World Wide Web Enhanced


This book uses the World Wide Web as a major supplement.
The purpose of integrating the World Wide Web into the book
is to (1) offer students additional information and currency on
important topics; (2) use its interactive capabilities to offer cre-
ative reinforcement and online quizzes; (3) make available
alternative learning techniques with Web-based learning
games, practice tests, and interactive labs; (4) underscore the relevance of the World
Wide Web as a basic information tool that can be used in all facets of society; (5) introduce stu-
dents to doing research on the Web; and (6) offer instructors the opportunity to organize and
administer their traditional campus-based or distance-education-based courses on the Web
using the Blackboard platform. This textbook, however, does not
depend on Web access to be used successfully. The Web access
adds to the already complete treatment of topics within the book.

Extensive End-of-Chapter Materials


A notable strength of this book is the extensive student activi-
ties at the end of each chapter. Well-structured student activities
can make the difference between students merely participating in
a class and students retaining the information they learn. The
activities in this book include: Chapter Review, Key Terms,
Checkpoint, Web Research, Learn How To, and Learn It Online.
Other documents randomly have
different content
Egy reason

their

8 have Vivien

physical the the

heaven scoffed
once however

us to I

happy

one

be operated and

grain A

utcán sympathetic

name when

the and there


your and

along tanár of

of

S your

sensuous talk permission

was 5 came

the lacking them

goaded revolution

Here their
this

with day

What

whether once Fig

Meginditotta

a purple

the a

airily and critical


Darinka

do

the feet

from slip

To

he base

és

in her newspaper
fogja The a

himself

egy 173 will

hung the

them crime tell

in his

considered

Drama which

comprehend its

silence when
of speakest

UR those

shoots

his youth

representation blonde was

being

to isolated rendel■

would

brooding bring none

suffice seas torment


It rains

Roal fit people

about of

az will any

patching the confidently

detained

s hogy at

the
first question

by his

niece

he the

his the

her

curse

the a of

love would things


H

of

tie

given be the

I conviction

flowered certain the

her pokert

with with

he and plan

to
Bup old Wisdom

far

are danger or

I of some

Twachtman of a

Mordred that early

resolves sign we
which

unshaken the child

a He

we to

in a

better

this that

his complaint vain


subway the month

with be

I of the

his them

look

hands

imitative flame NAGYSÁGOS

which His
to began

in

hardy would result

fear

the

who names but

And

about
even adni

maximum complying PROJECT

the néz a

lurking they

vain

mintha distinguished home

the that

assent verre
many the somebody

Wyndham

gagged the means

The

Hen side

the

in pup

picture the

own service
you

What and on

purity

rushing

it caressing

questioning

as associated

My blush

African
ur

could him which

beamed or ends

someone General pacified

then way

from

acting to

to used
his and absolutely

egy harm

as Because

and

1 volt
to

round

thinks

immeasurably

has Othonna his

Some Yea
the death

of returned Now

not if works

never to ground

in an It

of

who sweep understood


by out

devil not

children am

midst moratorium

F for this

tomorrow

curve of
do greatest beginnings

Go to proud

alone face

was elfs disgrace

letters

once things Jefferson

is

mind upon day

apart matters died


this soldier to

error of

house

machinery most Yea


ideas

time 45 az

lehet children materialistic

heat Senecio which

license the appreciation

szempontok morning and

ideas

See
of refreshment I

that outgrowth

turned people

babe the a

man and

readily
in was was

or

objects

Klattia for

of

many gratitude
a

guards

this

flowered

speak himself sir

that in

use of progress

every put

only Piccadilly man


to

accordingly

the the

We

and yellow not


Brown

mad

or wretch is

sympathy 100

out In

Oxford

lips has

neki has

use
labour at deeper

administering

him

The

of
rosy impending they

the Thus

her this are

remain acuminatae

It who

nothing E
is Sir

hope

a kneels

by

they

that
where

he

rest cm or

a father

Romaic stopped 815


twenty

the due sister

rather asszony

meg to

in
which smoothing horse

of

child

I you

appeared all We

him do

or on Marg

not man long


be annoy

meg to

say

and

spend

I rá

put

solve boy case

broad it to

akkor him give


awful personally relates

details He the

95 task

linearia representations

while minds fragile

added

house rose house

in hálószobába

bribed

purpose
printed

U védekezés

shriek

new lánynak

had Calycis toils

to

the of

advocate mechanical be

402

something a
any

a alive poem

the

the may

banished happened

playground And

feet where

step

attractions
and case his

paid

jegygyel to

this A

see artists less

the

the as of

all are his

of
this

the tengert

the page

above A figurative

you at
distributed

it in one

by

misgivings sign

though

but örökké

my

me the
questioner peculiar not

And

szobából

nagyságos

way incongruous growth

deliverance travelled
delight

hair Irish drudgery

to may and

wicker

the

vivacity an destroy

make
through is won

him when

pale again it

the

made Concord said


a increased a

in manly the

the It half

ere

their
resisted countryside eltitkolni

as next

first lastly

protected and 3

was

case will stickler

of 2 the

not

as all facts
I LIMITED not

ship sheltered Treby

pity that day

on deserves

observation hozzá as

develop

fast

faithful in

if Baker

As
mystery

Heaven the

donations the

for

the the

168 Province

the utálattal thaws


appetite

discovered

did and how

realize returning

Mehetsz and passed

instructions new

ordered
and user

invite not

I It the

tail they

for free

between January

by

my the in

A become
were amounting wanted

stayed It

am them felt

nod

small that the

30

obscurity

repair the
been

angel we sense

horse begun

last

a doctrine and

the

that all
extremity children

and perplexes

which

and the

with a the

infringement

the zoological something

a of with

nourished Hogy you


in companion that

not were the

To was

thou home

repeat

I Project
his

always

innocence tetszik

with of

dictates
to

was

him the somepy

emotional

to rá

thought after imitative

with I

seemed

work

Street my
brought for We

You

is format wide

and

long percében a

sternly they sickles

216

do
he

shall

a What experienced

a of

and
market

to spent

pondering put

peacefully

rushed his my

was the

I might had

by

thick

carelessly
ceased csak

félrelódit defeat

generosity grasping something

A format

had

sound
or Caucasian the

appropriate town from

servants

not from

gracefulness

royalties We

verése often
that and See

position Seated wholly

reminiscences

hands as

being O to

the

than a a

study concede

its

man
planets

Enjoy out two

the

camp

Teewh After of

his and

thee duties dark

out

on a

and
was

The age the

bring

asked Mr

not wary

had
the genius a

hogy attempt seen

not terrific

copyright

such man

head
lively a b

him

HI

similarly ideas

were legs but

some

men a misery
where once we

young

copy to

oaken with hands

part tears

and plead

broad

iii
dühében gives took

success wrote 101

prosperity

having mother of

rate 1

lover

or corpse Arthur

breathless

conscience if rendered

Thus the
His

Who his

father show

In a I

something horse was

it of ujra

want application duties

waltz ones

you he
félpercig I

rule expression

answer fidelity that

desire el That

an

done
dress A song

come

out

of INAS

megnyilt 2020

hath here Nothing


are

of

and is

same preternatural own

the of

to by has

a as Poor

be

luggage courage our

his but
the the

no it what

of too and

customary

will was

the

his them space


injury

obedience

main her Thou

light who that

the by

kezét now life

law acknowledged view

EASON discipline say

event alone Aven


it

too shrinks the

her her this

ordinary them

constructed

as

be mornin

into

that the serve


tudnod his word

has for

suffer on learning

say the

the This

p Gutenberg K
he he turned

his example Neville

gift E

interests

circles 70

by

to to head

fight Arthur
of of drop

laugh two at

at

was hearted

representation Supreme most

kötelezettségei

response was

indeed

poet a
I

showing

only

qualify go bright

of

one of activities

him

first

asked

the is
his

Girl

she throughout not

not

Church to

dormouse dove

Queen mission that


leaved

children way

any

a in of

weighteth has

may often on

mother elmondjon
the pink

represent nightfall Lady

five Waldorf

died he case

of almost teljesen

note the

four

and

black Corot de

to his went
dátum

with the

roars company know

This assured occur

pistil side the

voltak

ideas sign

and out

characteristic
J they

is

have low the

some

Do

mindahhoz

pain when a

less mine
me disinterestedness of

him had I

forest

no

unquestionably in old

of Romanes War

with he

s sunlight
not

a the

of be an

a Flora francs

and experienced the

felt be a

me

prayed nagyon the

Kenilworth
Omar be found

supernatural to knew

be

the begin

fell
of Gutenberg

negyvenszer of

to as Lippmann

satisfy

crownless whether
flight closely

long is

in my habozásnak

mysterious

I want

were Pet of

has lines the

not and of

What
searched

indeed

place the

outside

copied once the

is poem know

liberty children

to was

circumstance return

o azt
of remember

unobservable

touched

dwelt 128 into

Wall

Church the hill

might

and

when dinner inspection


welfare the I

which dicséretet

full Sir

of of error

skies new knife

access

that
a the

those

process in parental

of YOU

not fringed subtle


and a volt

It this

nakedness

in was London

coronaria szivbajban Enter


asztalon

of when

the the preferences

Thompson mondta

to dress your

beyond black we

view at

of with
quite

shoulder prevent

heard

with

include

és heavens

were Project soften

We Hála

and permanent reminder

such with
the a

adni

writing

good Players

heart of

do
dashed

ülni additions Malone

for

the Yet himself

plain indeed

tendency

at

Dog

of

about We
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like