Technology impacts every aspect of life and choices are endless. As a college student, you need to know how to evaluate devices, choose apps, maintain a compelling online reputation, and lock down digital security. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2018, COMPREHENSIVE goes beyond the intuitive "how-to" of apps and social media to delve into the broad concepts that are guiding current technologies such as self-driving cars, virtual reality, file sharing torrents, encrypted communications, photo forensics, and the Internet of Things. Numerous illustrations and interactive features in this complete book make mastering technical topics a breeze with a learning path that is structured with you, today's busy student, in mind. This edition offers an insightful overview of what every college student should know about using technology to complete your education, launch a successful career, and engage in issues that shape today's world.
Module 1
16 DIGITAL CONTENT
18 SECTION A: Digital Basics
19 Data Representation Basics
21 Representing Numbers
22 Representing Text
25 Bits and Bytes
26 Compression
29 SECTION B: Digital Sound
30 Digital Audio Basics
32 Digital Audio File Formats
34 MIDI
36 Digitized Speech
38 SECTION C: Bitmap Graphics
39 Bitmap Basics
42 Bitmap Data Representation
44 Image Compression
46 Modifying Bitmap Images
48 Panoramic and 360 Images
49 Stereoscopy
51 SECTION D: Vector Graphics
52 Vector Graphics Basics
55 Vector Tools
56 3D Graphics
58 Vectors and Virtual Reality
60 SECTION E: Digital Video
61 Digital Video Basics
65 Video Compression
66 Video File Formats
68 Digital Video Variations
70 ISSUE: what is Fair Use?
72 Information Tools: Photo Forensics
74 Technology IN CONTEXT: Film
76 Module ACTIVITIES
81 Lab: The DigitalWorld with Eyes Shut
Module 2
82 DIGITAL DEVICES
84 SECTION A: Device Basics
85 Computers
87 Circuits and Chips
89 Components
91 Maintenance
94 SECTION B: Device Options
95 Enterprise Computers
96 Personal Computers
98 Niche Devices
99 Choosing a Digital Device
104 SECTION C: Processors and Memory
105 Microprocessors
107 How Processors Work
110 Performance
113 Random Access Memory
114 Read-only Memory
116 SECTION D: Storage
117 Storage Basics
119 Magnetic Storage Technology
121 Optical Storage Technology
122 Solid State Storage Technology
123 Cloud Storage
125 Backup
129 SECTION E: Input and Output
130 Add-on Gadgets
131 Expansion Ports
134 Bluetooth
135 Device Drivers
136 Display Devices
140 Printers
142 Things
144 Autonomous Vehicles
146 ISSUE: Where does all the ewaste go?
148 Information tools: FINDING THE RIGHT
STUFF
150 Technology IN CONTEXT: Military
152 Module ACTIVITIES
157 Lab: What’s Going On in There?
Module 3
158 NETWORKS
160 SECTION A: Network Basics
161 Communication Systems
162 Communication Channels
166 Network Topology
168 Network Nodes
170 Communication Protocols
172 SECTION B: The Internet
173 Background
175 Internet Infrastructure
176 Packets
179 Internet Addresses
182 Domain Names
186 SECTION C: Internet Access
187 Connection Basics
192 Cable Internet Service
193 Telephone Network Internet Service
195 Satellite Internet Service
196 Mobile Broadband Service
198 Wi-Fi Hotspots
200 SECTION D: Local Area Networks
201 LAN Basics
203 Ethernet
205 Wi-Fi
207 Set Up Your Own Network
211 Network Monitoring
212 IoT Networks
214 SECTION E: File Sharing
215 File Sharing Basics
216 Accessing LAN Files
219 Sharing Your Files
222 Internet-based Sharing
224 Torrents
226 ISSUE: Who will Control the Internet?
228 Information Tools: Fact Checking
230 Technology IN CONTEXT: Education
232 Module ACTIVITIES
237 Lab: Hack Your Net
Module 4
240 THE WEB
242 SECTION A: Web Basics
243 Web Overview
244 Evolution
246 Web Sites
247 Hypertext Links
249 URLs
254 SECTION B: Browsers
255 Browser Basics
258 Customization
262 Browser Cache
266 SECTION C: HTML
267 HTML Basics
269 HTML Editing Tools
272 CSS
274 Dynamic Web Pages
276 Site Creation
278 SECTION D: HTTP
279 HTTP Basics
281 Cookies
284 HTTPS
286 SECTION E: Search Engines
287 Search Engine Basics
292 Formulating Searches
295 Search Privacy
296 Using Web-based Source Material
298 ISSUE: Who is Tracking You?
300 Information Tools: Citations
302 Technology IN CONTEXT: Fashion Industry
304 Module ACTIVITIES
309 Lab: Design Your Home Page
Module 5
310 SOCIAL MEDIA
312 SECTION A: Social Networking
313 The Social Media Mix
316 Social Networking Evolution
317 Social Networking Basics
319 Geosocial Networking
321 Social Network Analytics
324 SECTION B: Content Communities
325 Evolution
327 Media Content Communities
329 Intellectual Property
331 Creative Commons
334 SECTION C: Blogs AND More
335 Blogs
338 Microblogs
340 Wikis
344 SECTION D: Online Communication
345 Communication Matrix
346 Email
351 Online Chat
352 Voice and Video over IP
354 SECTION E: Social Media Values
355 Identity
357 Reputation
360 Privacy
364 ISSUE: when do online avatars die?
366 Information Tools: Media Attribution
368 Technology IN CONTEXT: Journalism
370 Module ACTIVITIES
375 Lab:���MY SOCIAL NETWORK
Module 6
376 SOFTWARE
378 SECTION A: Software Basics
379 Essentials
382 Distribution
384 Software Licenses
389 Fake and Pirated Software
390 SECTION B: Operating Systems
391 Operating System Basics
395 Microsoft Windows
398 macOS
400 iOS
401 Android
402 Chrome OS
403 Linux
404 Virtual Machines
405 SECTION C: Apps and Applications
406 Web Apps
408 Mobile Apps
409 Local Applications
413 Uninstalling Software
414 SECTION D: Productivity Software
415 Office Suite Basics
416 Word Processing
419 Spreadsheets
423 Databases
425 Presentations
426 SECTION E: File Management Utilities
427 File Basics
430 File Management Tools
435 Application-based File Management
436 Physical File Storage
438 ISSUE: How serious is software piracy?
440 Information Tools: Documentation
Literacy
442 Technology IN CONTEXT: Architecture
and Construction
444 Module ACTIVITIES
449 Lab: Put your File Ducks in a Row
Module 7
452 DIGITAL SECURITY
454 SECTION A: BASIC SECURITY
455 Encryption
456 Authentication
460 Passwords
464 Password Managers
466 SECTION B: Malware
467 Malware Threats
468 Computer Viruses
470 Computer Worms
471 Trojans
472 Antivirus Software
478 SECTION C: ONLINE INTRUSIONS
479 Intrusion Threats
483 Zero-day Attacks
484 Netstat
485 Firewalls
488 SECTION D: Interception
489 Interception Basics
490 Evil Twins
491 Address Spoofing
492 Digital Certificate Hacks
494 IMSI Catchers
496 SECTION E: Social Engineering
497 Social Engineering Basics
499 Spam
503 Phishing
504 Pharming
506 Rogue Antivirus
507 PUAs
508 ISSUE: HOW SECURE IS DEMOCRACY?
510 Information Tools: YOUR OWN WORDS
512 Technology IN CONTEXT: LAW Enforcement
514 Module ACTIVITIES
519 Lab: CHROME LOCKDOWN
Module 8
520 The ICT Industry
522 SECTION A: ICT Industry Basics
523 ICT Core Industries
526 ICT Goods and Services
529 Technology Life cycles
531 Disruptive Technology
532 ICT and Productivity
534 ICT and National Security
536 SECTION B: The Computer Industry
537 Manual Calculators
538 Mechanical Calculators
540 Computer Prototypes
543 Commercial Computers
547 Personal Computers
550 SECTION C: THE telecom Industry
551 Telegraph
554 Telephone
557 Radio
560 Cellular Phones
562 Television
565 SECTION D: Tech Careers
566 Jobs and Salaries
571 Education
573 Certification
576 Resumes
578 SECTION E: ICT Laws and Ethics
579 ICT Laws
581 ICT Ethics
586 Ethical Decision Making
588 Whistleblowing
590 ISSUE: patriots or traitors?
592 Information Tools: Provenance
594 Technology IN CONTEXT: Banking
596 Module ACTIVITIES
601 Lab: Perfect Your Profile
Module 9
604 Information Systems
606 SECTION A: Information System Basics
607 Enterprise Basics
611 Transaction Processing Systems
613 Management Information Systems
614 Decision Support Systems
616 Expert Systems
618 SECTION B: enterprise Applications
619 Ecommerce
622 Supply Chain Management
624 Customer Relationship Management
626 Enterprise Resource Planning
628 SECTION C: Systems Analysis
629 System Development Life Cycles
630 Planning Phase
635 Analysis Phase
636 Documentation Tools
640 SECTION D: Design and Implementation
641 Design Phase
644 Evaluation and Selection
645 Application Specifications
647 Implementation Phase
649 Documentation and Training
650 Conversion and Cutover
651 Maintenance Phase
654 SECTION E: System Security
655 Systems at Risk
656 Data Centers
658 Disaster Recovery Planning
659 Data Breaches
661 Security Measures
664 ISSUE: What Can go Wrong?
666 Information Tools: Recognizing
Viewpoint
668 Technology IN CONTEXT: Medicine
670 Module ACTIVITIES
675 Lab: decisions, decisions, decisions
Module 10
678 Databases
680 SECTION A: Database Basics
681 Operational and Analytical Databases
686 Database Models
694 SECTION B: Database Tools
695 Database Tool Basics
696 Dedicated Applications
698 Word Processor Data Tools
700 Spreadsheet data tools
701 Database Management Systems
706 SECTION C: Database Design
707 Defining Fields
711 Data Types
712 Normalization
714 Sorting and Indexing
716 Designing the interface
718 Designing report templates
720 SECTION D: SQL
721 SQL Basics
723 Adding Records
724 Searching for Information
727 Updating Fields
728 Joining Tables
730 SECTION E: Big Data
731 Big Data Basics
734 Big Data Analytics
736 NoSQL
742 ISSUE: Can Data Mining Catch Terrorists?
744 Information Tools: Vetting Anonymous
746 Technology IN CONTEXT: Politics
748 Module ACTIVITIES
753 Lab: SQL
Module 11
756 Programming
758 SECTION A: Program Development
759 Programming Basics
761 Program Planning
764 Writing Programs
768 Program Testing and Documentation
772 SECTION B: Programming Tools
773 Language Evolution
777 Compilers and Interpreters
779 Paradigms and Languages
782 Toolsets
784 SECTION C: Procedural Programming
785 Algorithms
788 Pseudocode and Flowcharts
791 Flow Control
797 Procedural Applications
798 SECTION D: Object-oriented PROGRAMS
799 Objects and Classes
801 Inheritance
802 Methods and Messages
806 OO Program Structure
808 OO applications
810 SECTION E: Declarative Programming
811 The Declarative Paradigm
812 Prolog Facts
816 Prolog Rules
819 Interactive Input
820 Declarative Logic
821 Declarative Applications
822 ISSUE: Can Computers Think?
824 Information Tools: making the cut
826 Technology IN CONTEXT: Computer Games
828 Module ACTIVITIES
833 Lab: Tunnels and Dragons
Module PY
836 CodinG WITH PYTHON
838 SECTION A: “HELLO WORLD!”—PYTHON STYLE
839 Coding Basics
839 Introduction to Python
840 Let’s Start Coding
843 Working With Strings
844 Using Python Keywords
845 Debugging
847 SECTION B: THE WACKY WORD GAME
848 Using Variables
852 Objects and Classes
854 Input
855 Wacky Word Game
856 Sharing Your Programs
857 SECTION C: BUILD YOUR OWN CALCULATOR
858 Calculations
862 Selection Structures
864 Comparison and Logical Operators
866 Comparing Strings
868 SECTION D: ASK THE FORTUNE TELLER
869 Repetition Control Structures
875 Lists
879 SECTION E: DOGS AND CATS
880 Functions
885 Methods
891 Module ACTIVITIES
895 LAB: ADVENTURE GAME
900 Glossary
928 Index
948 Answers
-
June Jamrich Parsons
June Jamrich Parsons is an educator, digital book pioneer, co-author of Texty and McGuffey award-winning textbooks and a TAA fellow. She co-developed the first commercially successful multimedia, interactive digital textbook that established the standard for platforms now being developed by numerous educational publishers. In addition to authoring textbooks for Course Technology and Cengage, Dr. Parsons' career includes extensive classroom teaching and product design for eCourseware. She also served as a creative strategist for MediaTechnics Corp. and director of content for Veative Virtual Reality Labs. A member of the Association for Computing Machinery, she holds a Ph.D. in instructional technology and Certified Computing Professional certification.
-
UPDATED SCREEN IMAGES THROUGHOUT REFLECT TODAY’S LATEST OPERATING SYSTEMS AND APPLICATIONS. New visuals incorporate the latest features of Microsoft® Windows 10, Office 2016, macOS Sierra, Android, and iOS to ensure that your students are prepared to work with the most current versions of these important tools.
-
NEW INTEGRATED THEME HIGHLIGHTS TODAY’S SHARING ECONOMY. Economists have dubbed it the "sharing economy" and it is now emerging as a significant application of Internet, cloud, and consumer-to-consumer technologies. This sharing economy theme appears in this edition’s introductory module with follow-through coverage in later chapters.
-
NEW MATERIAL HIGHLIGHTS CURRENT ADVANCEMENTS IN VIRTUAL REALITY. As one of the technologies driving widespread digital innovation, virtual reality offers fascinating glimpses of technology evolution built upon the foundational concepts of hardware components and graphics processing. Your students learn from timely coverage of Google Cardboard, Oculus Rift, Samsung Gear, Microsoft HoloLens, haptic gloves, and VR file formats in this edition’s Introduction, Module 1 and Module 2.
-
INTRIGUING NEW DISCUSSION EMPHASIZES TODAY’S USE OF AUGMENTED REALITY. This edition’s detailed presentation of Pokemon Go provides a fun illustration of current state-of-the-art developments augmented reality. "How does it work?" is a question that is sure to engage your students.
-
DETAILED NEW COVERAGE EXPLAINS THE USE OF AUTONOMOUS VEHICLES. Self-driving cars are on the road today, guided by artificial intelligence software that collects data from GPS, accelerometers, and gyroscopes. Your students learn how this "magic triangle" of technologies is instrumental in mobile phones, virtual reality, and other cutting-edge applications. This new edition explains this technology in detail and sparks meaningful discussion on safety issues.
-
UPDATED COVERAGE ADDRESSES SECURITY CONCERNS AND PROTECTION IN USE TODAY. Students review the latest threats, emerging attacks, and new defenses in technology today. This edition covers the most recent security events and their economic and political consequences.
-
UPDATES INTRODUCE THE LATEST DEVELOPMENTS IN TODAY’S NETWORKS. Students examine the impact of faster cable Internet connections, speedier LTE, new Wi-Fi specifications, hotspots in cars, MU-MIMO, and new Internet governance. This edition’s Module 3 features detailed insights into these advancements.
-
NEW COVERAGE AND UPDATES PRESENT TODAY’S MOST CURRENT OPPORTUNITIES IN THE TECHNOLOGY INDUSTRY. The Information Technology field is evolving and expanding at an amazing pace and now presents one of the most lucrative career paths for graduates. This edition details many of the professional opportunities available.
-
DETAILED COVERAGE PROVIDES A COMPLETE INTRODUCTION TO TODAY’S SPECTRUM OF OPERATING SYSTEMS. This edition presents thorough coverage and examples of the latest Microsoft® Windows, MacOS, iOS, Android, Linux, and Chrome OS throughout the book. Your student
-
QUICKCHECK EXERCISES HELP STUDENTS GAUGE COMPREHENSION. Located on almost every page, QuickCheck exercises ensure your students fully understand the concepts they have just read before they progress further.
-
QUICKQUIZZES TARGET KEY CONCEPTS. Found at the end of each section, QuickQuizzes help your students recognize and recall the book’s most important concepts.
-
END-OF-MODULE READINGS HIGHLIGHT CURRENT SOCIAL AND ETHICAL ISSUES IN THE TECHNOLOGY INDUSTRY TODAY. Issues and Computer in Context provide material for thought-provoking classroom discussions. Accompanying Try It! and What Do You Think? activities encour
-
PROVEN HANDS-ON ACTIVITIES REINFORCE CONCEPTS WITH MEANINGFUL PRACTICE. Interactive Summary Questions, Interactive Situation Questions, and Lab Projects enable students to practice the specific skills covered in each module with practical, hands-on applic
-
STUDENTS PRACTICE INFORMATION LITERACY SKILLS USING ONLINE TOOLS. A section in each module guides students in refining their skills in searching, selecting, organizing, evaluating, and citing source material. You can add Search Expert to your course to fu
-
MODULES OFFER FLIPPED CLASSROOM PROJECTS. To engage today's students, many instructors like you have now turned to active learning based on collaborative research and problem solving. Each module includes a set of flipped classroom activities that encompa
-
TRY IT! PROGRAMMING WITH PYTHON™ OFFERS HANDS-ON EXPERIENCE TO USERS. This unique module provides a hands-on introduction to programming. By following step-by-step instructions, your student learn to program successfully and immediately -- even if they ha
Cengage Testing, powered by Cognero® for Parsons' New Perspectives on Computer Concepts 2018, Comprehensive
9781305956360
Cengage Testing, powered by Cognero® for Parsons' New Perspectives on Computer Concepts 2018, Comprehensive, Instant Access
9781305956353
Instructor's Website for Parsons' New Perspectives on Computer Concepts 2018, Comprehensive, 20th
9781337288606
VitalSource eBook: New Perspectives on Computer Concepts 2018 12 Months
9788000011189
MindTap: New Perspectives on Computer Concepts 2018 12 Months
9781337363556