Technology In Action Complete
Home > Computing and Information Technology > Computer science > Technology In Action Complete: International Edition
Technology In Action Complete: International Edition

Technology In Action Complete: International Edition


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
About the Book

For introductory courses in computer concepts or computer literacy, often including instruction in Microsoft Office. A Computer Concepts Text Focused on Today’s Student! Technology in Action engages students by covering topics in a progressive approach and providing rich companion media.

Table of Contents:
Chapter 1: Using Technology to Change the World  More Than Just a Job Technology on the World Stage       Political Issues        Human Rights        The Environment        The Digital Divide        ETHICS IN IT: The Digital Divide and the Mobile Bridge  Technology and Our Society        Technology Impacts How We Think        How We Connect        How We Consume  Technology and Your Life        Boost Your Productivity        Be a Savvy Computer User       Prepare for Your Career        Dig Deeper: Making Reality Even More Real  Technology In focus: The History of the PC    Chapter 2: Looking at Computers: Understanding the Parts  Understanding Your Computer       Computers Are Data Processing Devices        Bits and Bytes: The Language of Computers        Types of Computers  Input Devices       Keyboards        Mice and Other Pointing Devices        Touch Screens        Image Input        Sound Input        ETHICS IN IT: What Is Ethical Computing?  Output Devices       Monitors        Printers        Dig Deeper: How Touch Screens Work        Sound Output  Processing and Memory on the Motherboard       Memory        Processing  Storing Data and Information       Hard Drives        Flash Storage        Optical Storage  Connecting Peripherals to the Computer       High-Speed and Data Transfer Ports        Connectivity and Multimedia Ports        Adding Ports: Expansion Cards and Hubs  Power Controls Setting It All Up       TRENDS IN IT: Innovations in Printing    Chapter 3: Using the Internet: Making the Most of the Web’s Resources  The Origin of the Internet The Internet and How It Works Communicating and Collaborating Through the Internet       Social Networking        E-Mail        Instant Messaging        Weblogs (Blogs) and Video Logs (Vlogs)        Wikis        Podcasts and Webcasts  Web Entertainment       TRENDS IN IT: The Internet Makes Business Startups Affordable  Conducting Business over the Internet: E-Commerce       E-Commerce Safeguards  Accessing the Web: Web Browsers Getting Around the Web: URLs, Hyperlinks, and Other Tools        URLs        Hyperlinks and Beyond        Favorites, Live Bookmarks, and Tagging  Searching the Web Effectively       Search Engines        Evaluating Web Sites        ETHICS IN IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?        Dig Deeper: Discovering the Semantic Web  Technology In focus: Information Technology Ethics    Chapter 4: Application Software: Programs That Let You Work and Play  The Nuts and Bolts of Software Web-Based Applications Productivity Software for Home and Office       Word Processing Software        Spreadsheet Software        Presentation Software        Database Software        Note Taking Software        Personal Information Manager (PIM) Software        Productivity Software Features        Software Suites        Personal Financial Software  Business Software for Home and Office       Home Business Software        Large Business Software        Specialized Business Software  Media Software for Home       Digital Image Editing Software        Digital Audio Software        Dig Deeper: How Cloud Computing Works        Digital Video Editing Software        Media Management Software  Software for Home       Gaming Software        Educational Software        Drawing Software       TRENDS IN IT: “There’s an App for That!”  Buying Software       Software Licenses        ETHICS IN IT: Can I Borrow Software That I Don’t Own?        Pre-Installed Software        Discounted Software        Freeware and Shareware        Software Versions and System Requirements  Installing, Uninstalling, and Starting Software Getting Help with Software Chapter 5: Using System Software: The Operating System, Utility Programs, and File Management System Software Basics Types of Operating Systems       Real-Time Operating Systems        Operating Systems for Networks, Servers, and Mainframes        Operating Systems for Mobile Devices        Operating Systems for Personal Computers  What the Operating System Does       The User Interface        TRENDS IN IT: Open Source Software: Why Isn’t Everyone Using Linux?        Processor Management        ETHICS IN IT: Sugar: The Sweet OS for Every Child        Memory and Storage Management        Hardware and Peripheral Device Management        Software Application Coordination  The Boot Process: Starting Your Computer       Step : Activating BIOS        Step : Performing the Power-On Self-Test        Step : Loading the Operating System        Step : Checking Further Configurations and Customizations        Handling Errors in the Boot Process  The Desktop and Window Features       Organizing Your Computer: File Management       Organizing Your Files        Viewing and Sorting Files and Folders        Naming Files        Working with Files  Utility Programs       Display Utilities        The Programs and Features Utility        File Compression Utilities        System Maintenance Utilities        System Restore and Backup Utilities        Dig Deeper: How Disk Defragmenter Utilities Work        The Task Scheduler Utility        Accessibility Utilities  Technology In focus: Computing Alternatives  Chapter 6: Understanding and Assessing Hardware: Evaluating Your System  Your Ideal Computer Evaluating the CPU Subsystem Evaluating the Memory Subsystem: RAM       Adding RAM  Evaluating the Storage Subsystem       Hard Drive        Optical Storage        Dig Deeper: How a Mechanical Hard Drive Works  Evaluating the Video Subsystem       Video Cards  Evaluating the Audio Subsystem       Sound Card  Evaluating System Reliability       ETHICS IN IT: Free (as in Speech, not Beer)  Making the Final Decision      TRENDS IN IT: Thunderbolt  Chapter 7: Networking: Connecting Computing Devices  Networking Fundamentals Network Architectures       Describing Networks Based on Network Administration        Describing Networks Based on Distance  Network Components       Transmission Media        Network Adapters        ETHICS IN IT: Sharing Your Internet Connection with Your Neighbors: Legal?       Ethical? Safe?        Network Navigation Devices        Networking Software  Connecting to the Internet       Broadband Connections        Dial-Up Connections        Choosing the Right Internet Connection Option  Home Networks       Ethernet Home Networks        Home Network Cabling        Wired and Wireless on One Network  Configuring Home Network Equipment       Routers and Switches: Moving Data Around Your Network        Connecting Devices to Routers  Securing Wireless Networks Connecting Devices to Networks       Connecting Computers        Network-Ready Devices        Digital Entertainment Devices on a Network        Specialized Home Networking Devices  Configuring Software for Your Home Network       Windows Configuration        TRENDS IN IT: Where Should You Stone Your Files? The Cloud is Calling        Wireless Node Configuration and Testing        Troubleshooting Network Problems  Technology In focus: Under the Hood  Chapter 8: Digital Lifestyle: Managing Digital Data and Devices A Digital Lifestyle Digital Telephony       Cell Phones and Smartphones        How Cellular Works        Cell Phone Components        Synchronizing        Text Messaging        Mobile Internet        Cell Phone/Smartphone Security        Voice over Internet Protocol  Digital Media and Information       Digital Publishing        Digital Music        Digital Photography        Digital Video        ETHICS IN IT: Managing Your Copyrights: Copyleft Might Simplify Your Life        Digital Navigation        Digital Convergence        TRENDS IN IT: Near Field Communication  Chapter 9: Securing Your System: Protecting Your Digital Data and Devices  Cybercrime Computer Threats: Computer Viruses       Types of Viruses        Virus Classifications  Computer Safeguard: Antivirus Software and Software Updates Computer Threats: Hackers Restricting Access to Your Digital Assets       Dig Deeper: Computer Forensics: How It Works  Managing Online Annoyances Protecting Yourself    from Yourself! Protecting Your Physical Computing Assets Technology In focus: Careers in IT  Chapter 10: Behind the Scenes: Software Programming  Understanding Software Programming The Life Cycle of an Information System       System Development Life Cycle        ETHICS IN IT: When Software Runs Amok  The Life Cycle of a Program       Describing the Problem: The Problem Statement        Making a Plan: Algorithm Development        Developing the Algorithm: Decision Making and Design        Top-Down Design        Object-Oriented Analysis        Writing Program Code        Coding: Speaking the Language of the Computer        What happens first when you write a program?        Dig Deeper: The Building Blocks of Programming Languages:       Syntax, Keywords, Data Types, and Operators        Compilation        Coding Tools: Integrated Development Environments        Debugging: Getting Rid of Errors        Finishing the Project: Testing and Documentation        Programming Languages: Many Languages for Many Projects       Selecting the Right Language        Building Applications        Visual Basic        C and C++        Java and C#        Objective C        Building Web Applications        Scripting Languages for the Web        ASP, JSP, and PHP        Flash and XML        Building Mobile Applications        The Next Great Language        TRENDS IN IT: Emerging Technologies: Unite All Your       Video Game Design Tools  Chapter 11: Behind the Scenes: Databases and Information Systems Life Without Databases Database Building Blocks       Advantages of Using Databases        Database Terminology        Fields        Records and Tables        Primary Keys  Database Types       Relational Databases        Object-Oriented Databases        Multidimensional Databases  Database Management Systems: Basic Operations       Creating Databases and Entering Data        Inputting Data        Data Validation        Viewing and Sorting Data        Dig Deeper: Structured Query Language (SQL)        Extracting or Querying Data        Outputting Data  Relational Database Operations       Normalization of Data        TRENDS IN IT: Computers in Society: User-Populated Databases  Data Storage       Data Warehouses        TRENDS IN IT: Emerging Technologies: Can Your Business Partner       Deliver the Goods? Enhanced Databases Can Help You Decide!        Populating Data Warehouses        Data Staging        Data Marts  Managing Data: Information and Business Intelligence Systems       Office Support Systems        Transaction-Processing Systems        Management Information Systems        Decision Support Systems        Internal and External Data Sources        Model Management Systems        Knowledge-Based Systems        Enterprise Resource Planning Systems  Data Mining       ETHICS IN IT: Data, Data Everywhere–But Is It Protected?  Chapter 12: Behind the Scenes: Networking and Security in the Business World Networking Advantages Client/Server Networks Classifications of Client/Server Networks: LANs, WANs, MANs, and PANs Servers       Print Servers        Application Servers        Database Servers        E-Mail Servers        Communications Servers        Web Servers and Cloud Servers        TRENDS IN IT: Virtualization: Making Servers Work Harder  Network Topologies       Bus Topology        Ring Topology        Star Topology        Comparing Topologies  Transmission Media       Wired Transmission Media        Twisted-Pair Cable        Coaxial Cable        Fiber-Optic Cable        Wireless Media Options        Comparing Transmission Media  Network Operating Systems Network Adapters Network Navigation Devices       MAC Addresses        Switches and Bridges        Routers  Network Security for Client/Server Networks       Authentication        Access Privileges        Physical Protection Measures        Firewalls   Chapter 13: Behind the Scenes: How the Internet Works The Management of the Internet Internet Networking Internet Networking       Connecting to the Internet       The Network Model of the Internet Data Transmission and Protocols       Packett Switching       TCP/IP Internet Identity       IP Addresses       DIG DEEPER: Making the Connection-Connection-Oriented Versus Connectionless Protocols       Domain Names HTTP, HTML, and Other Web Building Blocks       Web Browser Security Protocols       HTML/XHTML       XML       Common Gateway Interface       Dynamic HTML       Client-Side Applications Communications over the Internet       E-Mail       ETHICS IN IT: Web Browsing: Not as Private as You May Think       E-Mail Security: Encryption and Specialized Software       Instant Messaging       TRENDS IN IT: Crowdsourcing: Harnessinf the Power of Social Networks       Voice over Internet Protocol (VoIP) Glossary  Index

About the Author :
Three professors from Montgomery County Community College traveled with the Prentice Hall Information Technology team for over two years to uncover what students and professors today wanted and needed in an Intro to Computer Concepts text. After meeting with more than 1,000 students and instructors they developed Technology in Action. Due to overwhelming success, they recently published Technology in Action 9/e! Alan D. Evans, M.S., CPA Alan Evans is currently a faculty member at Moore College of Art and Design and Montgomery County Community College teaching a variety of computer science and business courses.  He holds a B.S. in Accounting from Rider University and an M.S. in Information Systems from Drexel University, and he is a certified public accountant.  After a successful career in business, Alan finally realized his true calling was education.  He has been teaching at the college level since 2000.  Alan enjoys giving presentations at technical conferences and meets regularly with computer science faculty and administrators from other colleges to discuss curriculum development and new methods of engaging students.                                                   Kendall E. Martin, Ph.D. Kendall has been teaching since 1988 at a number of institutions, including Villanova University, DeSales University, Arcadia University, Ursinus College, County College of Morris, and Montgomery County Community College, at both the undergraduate and master’s degree level. Kendall’s education includes a B.S. in Electrical Engineering from the University of Rochester and an M.S. and Ph.D. in Engineering from the University of Pennsylvania. She has industrial experience in research and development environments (AT&T Bell Laboratories) as well as experience from several start-up technology firms. At Ursinus College, Kendall developed a successful faculty training program for distance education instructors, and she makes conference presentations during the year. Mary Anne Poatsy, MBA, CFP Mary Anne is an adjunct faculty member at Montgomery County Community College, teaching various computer application and concepts courses in face-to-face and online environments. Mary Anne holds a B.A. in Psychology and Elementary Education from Mount Holyoke College and an MBA in Finance from Northwestern University’s Kellogg Graduate School of Management. Mary Anne has more than nine years of educational experience, ranging from elementary and secondary education to Montgomery County Community College, Muhlenberg College, and Bucks County Community College, as well as training in the professional environment. Prior to teaching, Mary Anne was a vice president at Shearson Lehman Hutton in the Municipal Bond Investment Banking department.


Best Sellers


Product Details
  • ISBN-13: 9780132928380
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Height: 211 mm
  • No of Pages: 736
  • Sub Title: International Edition
  • Width: 276 mm
  • ISBN-10: 0132928388
  • Publisher Date: 22 Feb 2012
  • Binding: Paperback
  • Language: English
  • Spine Width: 22 mm
  • Weight: 1324 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Technology In Action Complete: International Edition
Pearson Education (US) -
Technology In Action Complete: International Edition
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Technology In Action Complete: International Edition

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!