PINARD / ROMER
W H A T ' S INSIDE: A Student-Tested, Faculty-Approved Approach to Teaching and Learning
Computer Applications and Concepts Innovative, Combined Coverage of Microsoft® Office 2010 Applications and Computer Concepts Course Mate: Interactive eBook, Flashcards, Quizzing, Interactive Games, Videos, and Interactive Infographics!
* PLUS * A FULL SUITE OF INSTRUCTOR SUPPLEMENTS
T U D E N T
T E S T E D ,
F A C U L T Y
A P P R O V E D
STATS
"I like how it is presented and I like the concept. Just looking at it makes me want
to read it.
- Chas Smith,
Student James Madison University
150
Number of faculty and students who have helped We worked with students and instructors to create the right mix of study tools. Find out more at w w w . c e n g a g e . c o m / 4 l t r p r e s s .
65% Average percent CMPTR
provides students with essential concepts and application information in easy-to-read chapters, 30 pages in length on average.
On the C M P T R CourseMate site at c e n g a g e . c o m / 4 l t r p r e s s , students will find multiple study tools including printable flash cards, interactive quizzes, graphing tutorials, podcasts, and audio/visual downloads.
>
+ 5
S T U D E N T
T E S T E D ,
F A C U L T Y
A P P R O V E D
THE© PROCESS MEET
SHOW
ARE WE
LISTENING?
Reach out to students to understand their learning preferences and motivations for taking a course. Talk with 50 students from 5 campuses about how they use their textbook and what they expect to get from it.
D I D W E DO IT? Develop learning solutions based on today's students and validate through iterative process to ensure the ideal product mix. C M P T R includes hundreds of photos and screenshots, providing visual examples of the concepts and steps shown in the text.
DO Y O U L I K E
IT?
Gain faculty approval to finalize the product and content mix specific to each discipline. C M P T R combines a visually interesting approach with the traditional presentation of computer concepts and applications to create a unique and accessible product.
WORK
ARE YOU
IN?
Publish the student-tested, faculty-approved teaching and learning solution.
ARE YOU
KIDDINC
Our research never ends! Continual feedback from students ensures that we keep up with their changing needs.
IN THE BOOK
Y
CMPTR Are you in? ^
A
TEACHING AND LEARNING SOLUTION*
AN INNOVATIVE CONCE
DESIGNED TO BEST REACH TODAY'S STUDENTS
IX)4-I
tijiMoluiKfWortu*
Imiw h«toliH-fli«ii««(«««w»tKmnii
1 O4.4
iKftwotc o .juiiui i,(_iil«iiinutWi
(ktetthttepnctoa^BpRpw teles. K»t lonwv Bwteyfcfwfailmdl Iwdte, piwtitlfd
1X34-5 H^fnt^md . . . I • '• |.(> .A [ ^ n V n ^ * * , ! ^ 4
i^n^n^tn^eCkdmiUtmorfKq^r-r^ 1MMt:«MdiHgirliS«RIotlutdjliontjUa«yolMwr4puibl
I
I
Chapter Review Cards at the back of the Student Edition provide students with a portable study tool containing all of the pertinent information for class preparation
%
m
CourseMate
Engaging. Trackable.
CourseMate brings course concepts to life with interactive learning, study, and exam preparation tools that support CMPTR. INCLUDES: Integrated eBook interactive teaching and learning tools, a n d Engagement Tracker, a first-of-its-kind t o o l t h a t m o n i t o r s s t u d e n t e n g a g e m e n t in t h e c o u r s e .
ON THE n WEB
'CMPTR ] [Are jouin'H
ONLINE RESOURCES NCLUDED! FOR INSTRUCTORS: • First D a y C l a s s I n s t r u c t i o n s • C u s t o m O p t i o n s through 4LTR+ P r o g r a m • A n n o t a t e d S o l u t i o n Files • Instructor's Manual • Test B a n k • PowerPoint® Slides • Instructor P r e p C a r d s • E n g a g e m e n t Tracker • E a s y A c c e s s to S A M C e n t r a l
FOR STUDENTS: • Interactive e B o o k • Auto-Graded Quizzes • Printable and Audio Flashcards • G a m e s : Memory & Beat the Clock • Additional Assignments • Videos • Interactive Infographics
Students sign in at login.cengagebrain.com
CMPTR
*
C O U R S E
t %
CENGAGE
T E C H N O L O G Y Learnings
CMPTR
© 2012 Course Technology, Cengage Learning
Vice President, Publisher: Nicole Jones Pinard
ALL RIGHTS RESERVED. No part of this work covered by the copyright herein
Executive Editor: Marie L. Lee Acquisitions Editor: Brandi Shailer Senior Product Manager: Kathy Finnegan Product Manager: Leigh Hefferon
may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher.
Associate Product Manager: Julia Leroux-Lindsey
For product information and technology assistance, contact us at
Editorial Assistant: Jacqueline Lacaire
Cengage Learning Customer & Sales Support, 1-800-354-9706.
Vice President, Marketing: Cheryl Costantini
For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions.
Senior Marketing Manager: Ryan DeGrote
Further permissions questions can be e-mailed to
Marketing Coordinator: Kristen Panciocco Developmental Editors: KatherineT. Pinard and Robin M. Romer Senior Content Project Manager: Jennifer Goguen McGrail
[email protected] Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers. Microsoft and the Office logo are either registered trademarks or trademarks
Composition: MPS Content Services
of Microsoft Corporation in the United States and/or other countries. Course
Art Director: Marissa Falco
Technology, Cengage Learning is an independent entity from the Microsoft
Cover Designer: Studio Montage
Corporation, and not affiliated with Microsoft in any manner. Disclaimer: Any fictional data related to persons or companies or URLs used
Cover Art: © Image Source/Getty Images
throughout this book is intended for instructional purposes only. At the time
Proofreader: Suzanne Huizenga
this book was printed, any such data was fictional and not belonging to any real
Indexer: Rich Carlson
persons or companies. Library of Congress Control Number: 2011920507 ISBN-13: 978-1-111-52799-0 ISBN-10:1-111-52799-7 Course Technology 20 Channel Center Street Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: international.cengage.com/global Cengage Learning products are represented in Canada by Nelson Education, Ltd. To learn more about Course Technology, visit www.cengage.com/coursetechnology To learn more about Cengage Learning, visit www.cengage.com Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com
Printed in the U n i t e d States o f A m e r i c a 2 3 4 5 6 7 8 9 15 14 13 12 11
Brief Contents Concepts Introduction to Computers and the Internet 2 Computer Hardware 30 Computer Software 76 absolute-india/shutterstock.com
N e t w o r k s
a n d t h e
W "
I n t e r n e t
4
Computer Networks 108
5
Introducing the Internet and Email 140
6
Network and Internet Security and Privacy 188
• -
Windows 7 7
Exploring Microsoft Windows 7 226
8
Managing Your Files 250
Leigh Prather/shutterstock.com
O e e i c e
9
2 0 1 0
m
Introducing Microsoft Office 2010 268
Harper/shutterstock.com
W o r d
N
2 0 1 0
1 0 Creating a Document 298 11
Formatting a Long Document 344
12
Enhancing a Document 382 Carlos Caetano/shutterstock.com
Brief
Contents
jjj
Excel 2010 13
Creating a Workbook 424
14
Formatting a Workbook 458
15
Working with Formulas and Functions 498
16
Inserting and Formatting Charts 530
JIHHIM"!!!
Jill newyear2008/shutterstock.com I
A c c e s s 2010 17
Creating a Database 566
18
Maintaining and Querying a Database 602
19
Creating Forms and Reports 634
PowerPoint 2010 20
Creating a Presentation 662
21
Enhancing a Presentation 700
New Image/shutterstock.co
22 Integrating Word, Excel, Access, and PowerPoint 738
Sychugina/shutterstock.co
Index
IV
Brief
Contents
772
Table of Contents
Concepts
How the CPU Works
Introduction to Computers and the Internet 2 ^ | ^ Introduction
41
Typical CPU Components The System Clock and the Machine Cycle Storage Systems
Network Storage and Online/Cloud Storage Systems Smart Cards Storage Systems for Large Computer Systems
2
W h a t Is a C o m p u t e r ?
Input Devices
2
Data vs. Information StockLite/shutterstock.com Hardware and Software Computer Users and Professionals Types of C o m p u t e r s
43
Hard Drives Optical Discs Flash Memory
6
Output Devices
Embedded Computers Mobile Devices Personal Computers (PCs) Midrange Servers Mainframe Computers Supercomputers
65
Display Devices Data and Multimedia Projectors Printers Audio Output
Computer Networks and the Internet
14
The Internet and the World Wide W e b Accessing a Network or the Internet Surfing the W e b Email Computers a n d Society
55
Keyboards Pointing Devices Touch Devices Scanners and Readers Audio Input
21
Benefits and Risks of a Computer-Oriented Society Understanding Intellectual Property Rights Computers and Health Environmental Concerns
Computer Software 7 6 Introduction
76
Introduction to System Software a n d Operating Systems
76
Functions of an Operating System Processing Techniques for Increased Efficiency Differences Among Operating Systems O p e r a t i n g S y s t e m s for D e s k t o p P C s
Computer Hardware 3 0 Introduction
30
Digital Data Representation Inside t h e System Unit
30
32
The Motherboard The Power Supply The CPU Memory Expansion Slots, Expansion Cards, and ExpressCard Modules Buses Ports and Connectors
84
DOS Windows
Windows Server and Windows Home Server Mac OS and Mac OS X Server UNIX Linux
O p e r a t i n g S y s t e m s for H a n d h e l d P C s a n d Larger Computers
88
Mobile and Embedded Versions of Windows Mobile Phone Operating Systems Operating Systems for Larger Computers Introduction to Application Software
—
\
91
Software Categories Desktop vs. Mobile Software Installed vs. Web-Based Software
Table
of
Contents
v
Application S o f t w a r e for Business
Switches, Routers, and Other Hardware for Connecting Devices and Networks Other Networking Hardware
96
Word Processing Concepts S p r e a d s h e e t Concepts Database Concepts Presentation Graphics Concepts
5 Introducing the Internet and Email 1 4 0 1
Application S o f t w a r e for W o r k i n g w i t h Multimedia
99
(
Graphics Software Audio Capture and Editing Software Video Editing and DVD Authoring Software Media Players Graphics, Multimedia, and the Web O t h e r T y p e s of A p p l i c a t i o n S o f t w a r e
Introduction
140
Evolution of t h e Internet
140
From ARPANET to Internet2 The World Wide W e b Internet2 The Internet Community Today
102
Desktop and Personal Publishing Software Educational, Entertainment, and Reference Software Note Taking Software and Web Notebooks CAD and Other Types of Design Software Accounting and Personal Finance Software Project Management, Collaboration, and Remote Access Software
Beyond Browsing and Email
145
Other Types of Online Communications Blogs, Wikis, and Other Types of Online Writing Cookies Getting Set U p to Use t h e Internet
N
e
t
w
o
r
k
s
a
n
d
t
h
e
I n t e r n e t
Using Microsoft Internet Explorer
4 Computer Networks 1 0 8 Introduction
108
W h a t Is a N e t w o r k ?
108
Network Characteristics Wired vs. Wireless N e t w o r k Network Topologies ^ K J Network Architectures' ^ Network Size and Coverage Data Transmission
A
116
119
Communications Protocols and N e t w o r k i n g Standards
\24S|
her Communications Protocols TCP/IP and Ethernet e, G.hn, and Broadband over Phoneline, Powerli Wi-Fi (802.11) WiMAX and Mo Cellular Standards Bluetooth, Ultra and Other Short-Range Wirele^ Networking Hardware
111^"iijjjr_?T
Network Adapters and Modems ^ . S ^ ^ f e
Table
of
Contents
Using W i n d o w s Mail 172 | I P
Wired Networking Media ' Jetworking Media
Email Works Under!a%din(&fc)wj E Downloadinflgtf^tows Live Mail Sending and Receiving Email Using Windows Live Mail "Replying to a n l S H H ^ i i n g Email Messages Deleting Email Messages Adding Contacts to the Contacts Folder Working with Attachments
Network and id IIi n t e r n e t Security and Privacy 1 8 8 Introduction
188
Understanding Security Concerns
188
Unauthorized Access a f Unauthorized Use Hacking W War Driving and Wi-Fi r : Interception of Cojprnunications Online Threats
192
Botnets Comj^^PPiruses and Other Types of Malware Denial ^ Service (DoS) Attacks r
1
159
Starting Internet Explorer Entering a URL in the Address Bar and Using Links Visiting Previously Viewed Web Pages Using Tabs Using Search Sites Using Favorites Using the History List Imprinting a Web Page Exi^ngInternet Explorer ^ j * ^ ^ q ^ l r n e m e t Exploi \
Bandwidth J K Analog vs. Digital Signals^ Transmissioifiype andTiming Delivery M e B o d Networking Media
153
Selecting the Type of Device Choosing the Type of Connection and Internet Access Selecting an ISP Setting Up Your Computer
Data, Program, or Web Site Alteration Online Theft, Online Fraud, and Other Dot Cons Theft of Data, Information, and Other Resources Identity Theft, Phishing,and Pharming Protecting Against Identity Theft Online Auction Fraud and Other Internet Scams
8 Managing Your Files 2 5 0 Introduction
O r g a n i z i n g Files a n d F o l d e r s
201
Cyberbullying and Cyberstalking Online Pornography Protecting Against Personal Safety Concerns Personal Computer Security
M a n a g i n g F o l d e r s a n d Files
203
Hardware Loss and Damage System Failure and Other Disasters Protecting Against Hardware Loss, Hardware Damage, and System Failure Firewalls, Encryption, and Virtual Private Networks (VPNs) U n d e r s t a n d i n g Privacy Concerns
N e t w o r k a n d Internet Security Legislation
W o r k i n g w i t h C o m p r e s s e d Files
Office 2010 221
225
MS NDOWS 7 7 Exploring Microsoft Windows 7 2 2 6 226
Exploring the Windows 7 Desktop
226
Starting Windows and Examining the Desktop Using the Mouse Exploring the Start Menu Using C o m m o n Windows Elements Resizing and Moving Windows Switching Between Open Windows Navigating Windows
238
Using Windows Explorer Windows Changing the View of Windows Using the Navigation Pane
9 Introducing Microsoft Office 2 0 1 0 2 6 8
Getting Help
Starting Office Programs a n d Exploring C o m m o n Elements
271
Starting Office Programs Examining Common Elements Switching Between Open Programs and Files Zooming Scrolling Using the Ribbon
277
Switching Tabs Using Buttons Using Galleries and Live Preview Using Dialog Boxes Using Task Panes Displaying Contextual Tabs Using the Mini Toolbar W o r k i n g w i t h Files 2 8 6 Saving a File Closing a File Opening a File
Getting Help
290
291
Viewing ScreenTips Using the Help Window Exiting Office Programs
243
Capstone
244
293
" W i n d o w s 7" a n d " O f f i c e 2 0 1 0 " 2 9 5
W e b Applications: S a v i n g a File t o W i n d o w s Live
Using the Contents List Using the Search Help Box Shutting Down Windows
233
•
•
268
Using the Clipboard
Working with the Recycle Bin
262
Creating a Compressed Folder Extracting a Compressed Folder
Introduction
Introduction
256
Creating a Folder or Subfolder Moving or Copying Files and Folders Naming and Renaming Files Deleting Files and Folders
212
Databases, Electronic Profiling, Spam, and Other Marketing Activities Protecting the Privacy of Personal Information Electronic Surveillance and Monitoring Protecting Personal and Workplace Privacy
Capstone-Computer Concepts
250
The Windows 7 File System Developing an Organizational Strategy Navigating to Files
Cyberstalking and Other Personal Safety Concerns
250
SkyDrive
296
247
Table
of
Contents
vii
W o r d 2010
Working with Themes
10 Creating a Document 298 Introduction
298
Entering Text
Changing the Style Set
298
Undoing and Redoing Actions
Working with t h e D o c u m e n t Outline
Changing the Margins
307
C r e a t i n g C i t a t i o n s a n d a List of W o r k s C i t e d Creating a New Source and Inserting a Citation Inserting a Citation to an Existing Source Editing a Citation or a Source Modifying an Existing Source Generating a List of Works Cited Using the Source Manager Updating the List of Works Cited
309
311
Replacing Selected Text Using Drag and Drop
Creating Footnotes a n d Endnotes
313
Changing the Font and Font Size Changing Font Styles Changing Text Color Formatting Paragraphs
317
Adjusting Paragraph Spacing Adjusting Line Spacing Aligning Paragraphs Using Tabs Creating Bulleted and Numbered Lists Adding a Paragraph Border Adding Paragraph Shading Indenting a Paragraph Copying Formats
Introduction
332
Checking Spelling a n d G r a m m a r
334
Previewing and Printing Documei^s
1 1 Formatting tihctyg Document 344 344
Working with Styles
344
Applying a Quick Style Modifying a Quick Style Creating a New Quick Style
382
Creating a Table Entering Data in a Table Selecting Parts of a Table Inserting a Row or Column Deleting a Row, Column, or Table Changing Column Widths Formatting Tables with Table Styles Aligning Tables and Text in Tables Changing the Page Orientation
Checking Flagged Words Individually Checking the Spelling in the Entire Docu
Introduction
382
O r g a n i z i n g I n f o r m a t i o n in T a b l e s
329
Finding Text Replacing Specific Text
377
1 2 Enhancing a Document 382
Using the Format Painter Using Paste Options F i n d i n g a n d R e p l a c i n g Text
365
Inserting Page Numbers Adding a Header and Footer
Using the New from Existing Command
F o r m a t t i n g Text
364
Adding Page Numbers, Headers, and Footers
306
Using the Save As Command
Editing Text
356
362
Inserting a M a n u a l P a g e Break
Creating D o c u m e n t s B a s e d o n Existing
S e l e c t i n g Text
355
Using the Navigation Pane Using Outline View
Entering Text Inserting a Date with AutoComplete Correcting Errors as You Type Inserting Symbols
Documents
351
Applying a New Theme Modifying a Theme
392
W o r k i n g w i t h D o c u m e n t S e c t i o n s 392 ^ W S e t t f n g a Section Break ^ [ F o r m a t t i n g a Sggten Differently from the Rest of X the Document^ s
Adding Qifferent Headers and Footers in Sections Inserting a q d Modifying Graphics L
398
Inserting Clip A r r ^ ^ p f Examining . .ected Object esizing a G p f f t i c opping a Pnoto/' fmatting a Picture /
A d d i n g WorcUVrt 4 0 3
\
Inserting M ) r d Art # Formatting Word Art/ W r a p p i n g Text A r o u n d G r a p h i c s •Changing Texf Wrap Properties Moving Graphics
406
369
Working with Columns
409
1 4 Formatting a Workbook 458
Creating Columns Balancing Columns W o r k i n g w i t h Building Blocks
413
Creating Quick Parts Inserting Quick Parts Managing Building Blocks
Introduction
F o r m a t t i n g D a t a in
C a p s t o n e - W o r d : Create a Flyer
421
Cells
W e b Applications: Using t h e W o r d W e b A p p
Formatting Text Formatting Numbers Formatting Dates and Times Ranges
424
U n d e r s t a n d i n g S p r e a d s h e e t s a n d Excel
424
Parts of the Excel Window Moving the Active Cell Switching Between Sheets Inserting and Deleting a Sheet Renaming a Sheet Moving and Copying a Sheet
C r e a t i n g a n Excel Table
476
Using Banded Rows Selecting Table Style Options Adding Formulas to an Excel Table H i g h l i g h t i n g Cells w i t h C o n d i t i o n a l Formatting
483
Highlighting a Cell Based on Its Value Clearing a Conditional Formatting Rule
E n t e r i n g D a t a in Cells 4 3 0 Entering Text Entering Dates and Times Entering Numbers
Hiding W o r k s h e e t Data
486
F o r m a t t i n g a W o r k s h e e t for P r i n t i n g
434
Working with Columns and Rows
434
Selecting Columns and Rows Changing Column Widths and Row Heights Inserting a Column or Row Clearing and Deleting a Row or Column W o r k i n g w i t h Cells a n d R a n g e s
467
Applying Cell Styles Aligning Cell Content Indenting Cell Content Merging Cells Adding Cell Borders Changing Cell Background Color Using the Format Cells Dialog Box
1 3 Creating a Workbook 424
E d i t i n g Cell C o n t e n t
422
458
F o r m a t t i n g Cells a n d
E x c e l 2010
Introduction
458
1 5 Working with Formulas and Functions 498
438
Selecting a Range Moving and Copying a Range Inserting and Deleting a Range Wrapping Text Within a Cell Entering Formulas and Functions
Introduction
442
Changing Worksheet Views Changing the Orientation Previewing and Printing a Workbook Viewing Worksheet Formulas Scaling a Printout
498
U s i n g Relative, A b s o l u t e , a n d M i x e d Cell
Entering a Formula Viewing Formula Results and Formulas Copying and Pasting Formulas Entering a Function Using AutoSum Previewing a n d Printing a W o r k b o o k
487
Setting the Print Area Inserting and Removing Page Breaks Adding Print Titles Creating Headers and Footers Setting the Page Margins Centering Content on a Page
R e f e r e n c e s in F o r m u l a s
498
Using Relative References Using Absolute References Using Mixed References 448
Entering Functions
505
Inserting a Function Using the Insert Function Dialog Box Typing a Function in a Cell Using AutoFill
512
Using the Fill Handle Creating a Series
W o r k i n g w i t h t h e IF L o g i c a l F u n c t i o n Working with Date Functions
517
Creating a Line Chart 548
520
Working w i t h t h e P M T Financial Function
521
Editing the Axis Scale and Labels in a Line Chart Adding an Axis Title Adding Gridlines Editing Chart Data
552
Changing a Data Value or Label Adding a Data Series to an Existing Chart Modifying Lines and Data Markers
1 6 Inserting and Formatting Charts 530
Inserting and Formatting Sparklines
Introduction
Inserting a n d M o d i f y i n g Data Bars
530
Creating a Chart
Capstone - Excel: Create a B u d g e t
530
Selecting a Data Source Selecting a Chart Type
563
t h e Excel W e b A p p
564
534
Selecting Chart Elements Moving a Chart to a Different Sheet Repositioning and Resizing a Chart
A c c e s s 2010
537
Changing the Chart Style Changing a Chart Layout Positioning and Formatting a Chart Title Positioning the Chart Legend Working with Data Labels Changing the Color of a Data Series Creating an Exploded Pie Chart Creating a C o l u m n Chart
557
W e b Applications: Working with
Working with Chart Elements
Modifying a Chart
555
542
543
Formatting a Column Chart Changing the Axis Scale for a Column Chart
1 7 Creating a Database 566 Introduction
566
Understanding Database Concepts Creating a Database
566
570
W o r k i n g in D a t a s h e e t V i e w
572
Creating a Table in Datasheet View Saving a Table Entering Records W o r k i n g w i t h F i e l d s a n d P r o p e r t i e s in D e s i g n View
577
Changing Field Properties in Design View Creating a Table and Setting Properties in Design View Specifying the Primary Key Saving the Table Design and Entering Records M o d i f y i n g a Table's S t r u c t u r e
586
Moving a Field Adding a Field Deleting a Field Closing a n d O p e n i n g Objects and Databases Closing a Table Closing a Database Opening a Database Opening a Table Moving Around a Datasheet Creating Simple Queries, Forms, and Reports
591
Creating a Simple Query Creating and Using a Simple Form Creating a Simple Report Compacting and Repairing a Database
X
Table
of
Contents
598
588
1 8 Maintaining and Querying a Database 602 Introduction
642
Searching for a Partial Value Searching with Wildcards Maintaining Table Data Using a Form Creating a Form Based on Related Tables
602
Maintaining Database Records
644
Creating a Form with a Main Form and a Subform Modifying a Main Form and Subform in Layout View Displaying Records in a Main Form and a Subform
602
Editing Field Values Finding and Replacing Data Deleting a Record
Previewing a n d Printing Selected F o r m Records
W o r k i n g w i t h Q u e r i e s in D e s i g n V i e w
605
Designing a Select Query Modifying a Query S o r t i n g a n d Filtering Data
Finding Data Using a Form
609
M o d i f y i n g a R e p o r t ' s D e s i g n in L a y o u t V i e w
613
617
A d d i n g a Condition to a Q u e r y
A d d i n g Multiple Conditions to Queries
622
Using the And Logical Operator Using the Or Logical Operator 624
U s i n g F u n c t i o n s in a Q u e r y
626
652
C a p s t o n e - Access: Create a D a t a b a s e
661
P o w e r P o i n t 2010
619
Specifying an Exact Match Using a Comparison Operator to Match a Range of Values
Creating a Calculated Field
648
Changing a Report's Appearance Resizing Fields and Field Values in a Report Using Conditional Formatting in a Report Printing a Report
Defining a One-to-Many Relationship Between Tables Working with Related Data in a Subdatasheet Creating a Multitable Query
Creating a Report Using t h e Report W i z a r d Creating a Report Previewing a Report
Sorting Data Using AutoFilter to Sort Data Sorting Multiple Fields in Design View Filtering Data Defining Table Relationships
647
Using the Total Row Creating Queries That Use Functions Creating Calculations for Groups of Records
19 Creating Forms and Reports 634
20 Creating a Presentation 662 Introduction
662
Creating a Presentation
662
Creating a Title Slide Adding a New Slide and Choosing a Layout Moving Between Slides in Normal View Working with Bulleted Lists Using AutoFit Changing Themes Modifying Text and Changing Bullet Levels in the Outline Tab R e a r r a n g i n g Text a n d S l i d e s , a n d Deleting Slides
675
Moving Bulleted Items Rearranging Slides Deleting Slides Running a Slide S h o w
Bpising Slide Show View
678
Using Mini Slide Show View Using Reading View
Adding Animations
680
Animating Slide Titles Using the Animation Painter Animating Bulleted Lists Removing an Animation Modifying the Start Timing of an Animation Modifying the Order of Animations
Table
of
Contents
XI
Inserting Graphics
709
Inserting a Picture from a File Drawing a Shape Adding Text to a Shape Formatting Graphics Creating SmartArt Diagrams
713
Creating a SmartArt Diagram Modifying a SmartArt Diagram Formatting a SmartArt Diagram Changing Animation Options
717
Changing the Effect Options Changing the Speed of Animations Adding Video A d d i n g Transitions
687
Adding Speaker Notes
688
Adding Footers a n d Headers
689
Inserting Footers, Slide Numbers, and the Date on Slides Inserting Headers and Footers on Notes Pages and Handouts Reviewing, Previewing, a n d Printing a Presentation
691
Checking and Reviewing a Presentation Opening the Print Tab Printing Full Page Slides Printing Handouts Printing Notes Pages Printing the Presentation as an Outline
700
k h
of
±
700
Contents
Broadcasting a Presentation
726
Starting a Broadcast Inviting People to a Broadcast Broadcasting a Slide Show 735
736
Integration
22 Integrating Word, Excel, Access, and PowerPoint 738 Introduction
738
Object Linking a n d E m b e d d i n g
738
Creating an Embedded Excel Chart in Word or PowerPoint Embedding a Chart Created in an Excel Worksheet in Word or PowerPoint Editing an Embedded Excel Chart in Word or PowerPoint Linking an Excel Chart to a Word or PowerPoint Presentation Linking Excel Worksheet Data to Word or PowerPoint Updating Linked Objects W h e n the Destination File Is Open Updating Linked Objects W h e n the Destination File Is Closed
Elisanth/Shutterstock.com
Table
Changing Playback Options for a Sound
W e b Applications: Working with the PowerPoint
Working in Slide Master View Modifying Elements in the Slide Master Modifying Text Placeholders in the Slide Master Deleting a Graphic from the Slide Master Inserting Clip Art in the Slide Master Closing Slide Master View Modifying the Slide Background
xii
724
Inserting a Sound Clip
Web App
Working with Slide Masters
Adding Sound
Capstone - PowerPoint: Prepare a Presentation
2 1 Enhancing a Presentation 700 Introduction
720
Inserting a Video on a Slide Formatting a Video Changing Video Playback Options Trimming a Video Setting a Poster Frame
i
Importing a n d Exporting Data
753
Importing an Excel List into an Access Table Exporting Access Data to a Word File U s i n g t h e O b j e c t C o m m a n d in W o r d , E x c e l , a n d PowerPoint
756
C o p y i n g a n d Pasting A m o n g Office Programs
757
Creating PowerPoint Slides from a W o r d Outline
759
C r e a t i n g F o r m Letters w i t h M a i l M e r g e
760
Selecting a Main Document and Data Source Inserting the Merge Fields Previewing the Mail Merge and Checking for Errors Finishing the Mail Merge
Index 772
Table
of
Contents
Concepts
Introduction t o C o m p u t e r s and the Internet I .earni ng Objecti ves Introduction
After studying the material in this chapter, you will be able to:
C o m p u t e r s a n d o t h e r f o r m s o f t e c h n o l o g y i m p a c t y o u r daily life in m a n y w a y s . Y o u e n c o u n t e r c o m p u t e r s in s t o r e s , r e s t a u r a n t s , a n d o t h e r retail e s t a b l i s h m e n t s . Y o u p r o b a b l y use c o m p u t e r s a n d the I n t e r n e t r e g u l a r l y t o o b t a i n i n f o r m a t i o n , find e n t e r t a i n m e n t , b u y p r o d u c t s a n d s e r v i c e s , a n d c o m m u n i c a t e with o t h e r s . Y o u m i g h t c a r r y a m o b i l e p h o n e o r o t h e r m o b i l e device at all times so y o u c a n r e m a i n in t o u c h w i t h o t h e r s a n d a c c e s s I n t e r n e t i n f o r m a t i o n as y o u need i t . Y o u m i g h t even use these p o r t a b l e devices t o p a y f o r pur-
.1
Explain w h a t computers do
L O 1 . 2
Identify types of computers
LOi
Describe computer networks and the Internet Understand h o w computers impact society
c h a s e s , play o n l i n e g a m e s w i t h o t h e r s , w a t c h T V a n d m o v i e s , a n d m u c h , much m o r e . Businesses a l s o use c o m p u t e r s extensively, such as t o m a i n t a i n e m p l o y e e a n d c u s t o m e r r e c o r d s , m a n a g e i n v e n t o r i e s , m a i n t a i n online stores a n d o t h e r W e b sites, p r o c e s s sales, c o n t r o l r o b o t s a n d o t h e r m a c h i n e s in f a c t o r i e s , a n d provide e x e c u t i v e s with t h e u p - t o - d a t e i n f o r m a t i o n t h e y need t o m a k e decisions. T h e g o v e r n m e n t uses c o m p u t e r s t o s u p p o r t the n a t i o n ' s defense s y s t e m s , f o r space e x p l o r a t i o n , f o r storing a n d o r g a n i z i n g vital i n f o r m a t i o n a b o u t c i t i z e n s , f o r l a w e n f o r c e m e n t a n d military p u r p o s e s , a n d o t h e r i m p o r t a n t t a s k s . In s h o r t , c o m p u t e r s a n d c o m p u t i n g t e c h n o l o g y a r e used in an endless number of ways.
l o i . i
A
What Is a Computer? c o m p u t e r is a p r o g r a m m a b l e , e l e c t r o n i c device t h a t a c c e p t s d a t a , p e r f o r m s o p e r a t i o n s o n t h a t d a t a , presents t h e results, a n d stores the data o r results as n e e d e d .
T h e f a c t t h a t a c o m p u t e r is p r o g r a m m a b l e m e a n s t h a t a c o m p u t e r will d o w h a t e v e r the i n s t r u c t i o n s tell it t o d o . T h e p r o g r a m s used with a
c o m p u t e r A programmable, electronic
c o m p u t e r d e t e r m i n e t h e t a s k s the c o m p u t e r is a b l e
device that accepts data input, performs
t o per f o r m.
processing operations on that data, and outputs
T h e primary four o p e r a t i o n s o f a c o m p u t e r are
and stores the results.
referred t o as input, processing, output, and storage. These operations can be defined as follows:
Chapter
I : Introduction
to
Computers
and
the
Internet
C H A P T E R
People use computers in virtually every aspect of their lives—at home, at school, on the job, and while on the go as they work, learn, and play
^
I n p u t — e n t e r i n g data into the computer
^
P r o c e s s i n g — p e r f o r m i n g o p e r a t i o n s on the data
^ ^
i n p u t The process of entering data into a computer; can also refer to the data itself. p r o c e s s i n g Performing operations on data that has been input into a computer to convert that input to output. o u t p u t The process of presenting the results of processing; can also refer
O u t p u t — p r e s e n t i n g the results
to the results themselves.
S t o r a g e — s a v i n g data, programs, or
s t o r a g e The operation of saving data, programs, or output for future use.
o u t p u t f o r future use
Chapter
1 : Introduction
to
Computers
and
the
Internet
E x h i b i t 1 - 1 Information processing cycle
•
INPUT User types in the numbers 2 and 5.
PROCESSING Computer adds 2 and 5.
OUTPUT Computer displays the results (output).
STORAGE Computer saves data (in this case, the output) for future use.
J
to
put or output operation, depending on which direction
add two n u m b e r s , as s h o w n in E x h i b i t 1 - 1 , input o c -
the information is going—is increasingly considered the
curs when data (in this e x a m p l e , the numbers 2 and
fifth primary computer o p e r a t i o n .
F o r a c o m p u t e r that has been programmed
5) is entered into the computer, processing takes place when the c o m p u t e r p r o g r a m adds those t w o numbers, and output happens when the sum of 7 is displayed on
Data vs. Information
the computer screen. T h e storage operation occurs any
A user inputs d a t a into a computer, and then the c o m -
time the data, a change to a p r o g r a m , or some output is
puter processes it. W h e n data is modified, or p r o c e s s e d ,
saved for future use.
into a meaningful form, it b e c o m e s i n f o r m a t i o n . Infor-
Another example o f a computer is a supermarket
mation is frequently generated to answer some type of
barcode reader. First, the grocery item being purchased
question, such as h o w m a n y o f a restaurant's employees
is passed over the barcode reader—input. N e x t , the de-
w o r k fewer than 2 0 hours per w e e k , h o w many seats
scription and price of the item are looked up—processing.
are available on a particular flight from Los Angeles to
T h e n , the item description and price are displayed on the
San Francisco, or w h a t is H a n k Aaron's lifetime h o m e
cash register and printed on the receipt—output. Finally,
run total. O f course, you don't need a computer system to
the inventory, ordering, and sales records are u p d a t e d —
process data into i n f o r m a t i o n . F o r example, anyone
storage. Today's computers
also typically perform
can go through time cards o r employee files and make a
com-
m u n i c a t i o n s functions, such as sending or retrieving
list o f people w h o w o r k a certain n u m b e r of hours. T h i s
data via the Internet, accessing information located in
w o r k could take a lot o f time w h e n done by hand, espe-
a shared company d a t a b a s e , or exchanging email mes-
cially for a c o m p a n y with m a n y employees. Computers,
sages. Therefore, c o m m u n i c a t i o n s — t e c h n i c a l l y an in-
however, can perform such tasks almost instantly, with
c o m m u n i c a t i o n s The transmission of data from one
The progression of input, processing, output, and storage is sometimes called the I P O S cycle or the information processing cycle.
device to another. d a t a Raw, unorganized facts. p r o c e s s To modify data. i n f o r m a t i o n Data that has been processed into a meaningful form.
Chapter
1 : Introduction
to
Computers
and
the
Internet
T h e term s o f t w a r e refers t o t h e p r o g r a m s o r instructions used t o tell the c o m p u t e r h a r d w a r e w h a t
Data
t o do and t o a l l o w people t o use a c o m p u t e r t o per-
A n y f a c t o r set o f facts c a n b e c o m e
computer
f o r m specific t a s k s , such as c r e a t i n g letters, p r e p a r i n g
d a t a , such as t h e w o r d s in a l e t t e r t o a f r i e n d , the a
numbers
monthly
get,
the
budgets, m a n a g i n g inventory a n d c u s t o m e r d a t a b a s e s ,
in
playing g a m e s , watching videos, listening t o m u s i c ,
bud-
scheduling a p p o i n t m e n t s , editing digital p h o t o g r a p h s ,
images
designing h o m e s , viewing W e b p a g e s , b u r n i n g D V D s ,
in a p h o t o g r a p h ,
and e x c h a n g i n g email. In E x h i b i t 1-2, t h e s o f t w a r e
the
being used a l l o w s you to l o o k at i n f o r m a t i o n o n the
notes
in
a
s o n g , or t h e facts
Internet.
s t o r e d in a n e m ployee record.
Computer Users and Professionals C o m p u t e r users, often called e n d u s e r s , are t h e p e o p l e w h o use c o m p u t e r s to perform t a s k s o r o b t a i n inform a t i o n . T h i s includes an a c c o u n t a n t
electronically
preparing a client's t a x e s , an office w o r k e r using a accurate results. Information processing (the conver-
w o r d processing program to c r e a t e a letter, a super-
sion o f data into information) is a vital activity today
visor using a c o m p u t e r to c h e c k a n d see w h e t h e r o r
for all c o m p u t e r users, as well as for businesses and
n o t m a n u f a c t u r i n g w o r k e r s have m e t the day's q u o t a s ,
other o r g a n i z a t i o n s .
a parent emailing his or her child's teacher, a c o l l e g e student analyzing science lab d a t a , a child p l a y i n g a c o m p u t e r g a m e , and a person bidding at an o n l i n e
Hardware and Software
a u c t i o n over the Internet.
T h e physical parts o f a computer (the parts you can
P r o g r a m m e r s , on the o t h e r h a n d , a r e c o m p u t e r
t o u c h ) are called h a r d w a r e . H a r d w a r e c o m p o n e n t s can
p r o f e s s i o n a l s w h o write the p r o g r a m s t h a t c o m p u t -
be internal (located inside the computer) or external (lo-
ers use. O t h e r c o m p u t e r p r o f e s s i o n a l s i n c l u d e systems
cated outside the computer and connected to the c o m -
a n a l y s t s , w h o design c o m p u t e r s y s t e m s t o be used
1-2
within their c o m p a n i e s , c o m p u t e r o p e r a t i o n s p e r s o n -
puter via a wired or wireless c o n n e c t i o n ) . E x h i b i t illustrates typical computer hardware.
nel, w h o are r e s p o n s i b l e f o r t h e d a y - t o - d a y c o m p u t e r o p e r a t i o n s at a c o m p a n y , such as m a i n t a i n i n g systems o r t r o u b l e s h o o t i n g user-related p r o b l e m s , a n d security specialists, w h o are r e s p o n s i b l e f o r securing t h e c o m p a n y c o m -
Exhibit 1-2 Typical computer hardware and software
puters
and
against
networks
hackers
and
other intruders.
h a r d w a r e The physical parts of a computer. s o f t w a r e Programs or instructions used to tell the computer what to do to accomplish tasks. e n d u s e r A person who uses a computer to perform tasks or obtain information. Clockwise from top left: 2009 Logitech. All rights reserved. Images/materials on page 5 used with permission from Logitech.; Courtesy of Gateway, Inc.; Courtesy, Hewlett-Packard Company; Courtesy D-Link Systems, Inc.; Courtesy Kingston Technology Company, Inc.
Chapter
I :
Introduction
to
Computers
and
the
Internet
Cloud Computing In g e n e r a l ,
cloud computing
refers t o d a t a , a p p l i c a -
tions, a n d e v e n resources s t o r e d o n c o m p u t e r s accessed
THE INTERNET
over t h e Internet—in a " c l o u d " of computers—rather t h a n o n users' c o m p u t e r s , a n d y o u access o n l y w h a t y o u n e e d w h e n y o u n e e d it. This t y p e of n e t w o r k has b e e n used f o r several y e a r s t o c r e a t e t h e supercomputer-level p o w e r n e e d e d f o r research a n d o t h e r p o w e r - h u n g r y a p plications, b u t it w a s m o r e typically r e f e r r e d t o as g r i d in this c o n t e x t . Today, cloud c o m p u t i n g t y p i -
computing
cally refers t o accessing W e b - b a s e d a p p l i c a t i o n s a n d d a t a using a p e r s o n a l c o m p u t e r , m o b i l e p h o n e , o r a n y o t h e r I n t e r n e t - e n a b l e d d e v i c e (see t h e a c c o m p a n y i n g illustrat i o n ) . A l t h o u g h m a n y o f t o d a y ' s c l o u d a p p l i c a t i o n s (such as G o o g l e A p p s , W i n d o w s Live, F a c e b o o k , a n d Y o u T u b e )
CLOUD PROVIDERS
END USERS
a r e c o n s u m e r - o r i e n t e d , business applications a r e also a v a i l a b l e a n d a r e e x p e c t e d t o g r o w in t h e n e a r f u t u r e .
t h e c l o u d t h a n t h e y w o u l d r u n if installed locally, a n d
C o n s e q u e n t l y , t h e t e r m is also used t o refer t o businesses
t h e potentially high expense related t o data transfer
purchasing c o m p u t i n g c a p a b i l i t i e s as t h e y n e e d t h e m
f o r c o m p a n i e s w i t h h i g h b a n d w i d t h a p p l i c a t i o n s . In a d -
from companies t h a t provide Web-based applications,
d i t i o n , n u m e r o u s security c o n c e r n s exist, such as h o w
c o m p u t i n g p o w e r , s t o r a g e , a n d o t h e r services.
t h e d a t a is p r o t e c t e d a g a i n s t u n a u t h o r i z e d access a n d
A d v a n t a g e s o f c l o u d c o m p u t i n g i n c l u d e easy scal-
d a t a loss.
ability, l o w e r c a p i t a l e x p e n d i t u r e , a n d access t o d a t a
D e s p i t e t h e p o t e n t i a l risks, m a n y b e l i e v e t h a t c l o u d
f r o m a n y w h e r e . It is also b e n e f i c i a l t o business t r a v e l e r s
c o m p u t i n g is t h e w a v e o f t h e f u t u r e a n d w i l l consist o f
and other individuals w h o s e computers, mobile phones,
millions o f c o m p u t e r s l o c a t e d in d a t a centers a r o u n d
or o t h e r devices m a y b e lost o r o t h e r w i s e c o m p r o m i s e d
t h e w o r l d t h a t a r e c o n n e c t e d t o g e t h e r via t h e I n t e r n e t .
w h i l e t h e individual is o n t h e g o — i f n o p e r s o n a l o r busi-
T h e y also v i e w c l o u d c o m p u t i n g as a w a y t o e n a b l e all
ness d a t a is s t o r e d o n t h e d e v i c e , n o n e c a n b e c o m p r o -
of a n individual's devices t o stay s y n c h r o n i z e d , a l l o w i n g
m i s e d . D i s a d v a n t a g e s i n c l u d e a possible r e d u c t i o n in
a n i n d i v i d u a l t o w o r k w i t h his o r h e r d a t a a n d a p p l i c a -
p e r f o r m a n c e o f a p p l i c a t i o n s if t h e y r u n m o r e slowly via
t i o n s o n a c o n t i n u a l basis.
loi.2
Types of Computers
powerful c o m p u t e r s used t o c o n t r o l the country's defense systems. C o m p u t e r s
are generally classified
by
category, based on size, capability, a n d price. he A
types
of
computers
available
today
vary
w i d e l y — f r o m the tiny c o m p u t e r s embedded in
Embedded Computers
c o n s u m e r devices and a p p l i a n c e s , t o the pocket-sized
An e m b e d d e d c o m p u t e r
c o m p u t e r s and mobile p h o n e s t h a t do a limited num-
is a tiny
computer
embed-
ded into a product designed t o p e r f o r m specific tasks
ber o f c o m p u t i n g t a s k s , t o the powerful and versatile
or functions for that product. F o r e x a m p l e , c o m p u t e r s
c o m p u t e r s f o u n d in h o m e s and businesses, to the super-
are often embedded into household appliances, such as
c l o u d c o m p u t i n g To use data, applications, and
dishwashers, m i c r o w a v e s , ovens, and coffee m a k e r s , as
resources stored on computers accessed over the Internet
well as into other everyday o b j e c t s , such as t h e r m o s t a t s ,
rather than on users'computers.
answering m a c h i n e s , treadmills, sewing m a c h i n e s , D V D
e m b e d d e d c o m p u t e r A tiny computer embedded in a product and
players, and televisions, t o help those appliances and o b -
designed to perform specific tasks or functions for that product.
jects perform their designated t a s k s . C a r s also use m a n y embedded c o m p u t e r s t o assist with diagnostics, to notify
Chapter
1 : Introduction
to
Computers
and
the
Inter
the user of i m p o r t a n t conditions (such as an underin-
Exhibit 1-4 Smartphone
flated tire or an oil filter that needs changing), to facilitate the car's navigational or entertainment systems, to help the driver perform tasks, and to control the use o f the airbag and other safety devices, such as cameras that alert a driver that a vehicle is in his or her blind spot as shown in E x h i b i t 1-3. Because embedded computers are designed for specific tasks and specific products, they c a n n o t be used as general-purpose computers.
Exhibit 1-3 Embedded computer in a car
phones. H a n d h e l d gaming devices, such as the Sony PSP and the N i n t e n d o DSi, and p o r t a b l e digital media players, such as the iPod touch a n d Z u n e , that include A light indicates that a moving vehicle is in the driver's blind spot.
Internet capabilities can also be referred t o as m o b i l e
A camera located under the mirror detects moving vehicles in the driver's blind spot.
devices, though they have fewer overall
capabilities
than conventional mobile devices. T o d a y ' s m o b i l e devices tend t o h a v e s m a l l s c r e e n s a n d k e y b o a r d s . B e c a u s e o f t h i s , m o b i l e devices a r e m o r e a p p r o p r i a t e for individuals w a n t i n g c o n t i n u a l
Mobile Devices
a c c e s s t o e m a i l ; timely W e b c o n t e n t s u c h as b r e a k -
A m o b i l e d e v i c e is loosely defined as a very small c o m -
ing n e w s , w e a t h e r f o r e c a s t s , d r i v i n g d i r e c t i o n s , a n d
m u n i c a t i o n s device, such as a mobile p h o n e , that has
updates f r o m W e b sites like F a c e b o o k ; a n d
built-in c o m p u t i n g or Internet capability. M o b i l e de-
c o l l e c t i o n s t h a n f o r t h o s e i n d i v i d u a l s w a n t i n g gen-
music
vices are c o m m o n l y used to m a k e telephone calls, send
eral W e b b r o w s i n g a n d c o m p u t i n g c a p a b i l i t i e s . T h i s
text messages, view Web pages, take digital p h o t o s , play
is b e g i n n i n g t o c h a n g e , h o w e v e r , as m o b i l e devices
games, d o w n l o a d and play music, w a t c h T V s h o w s , and
c o n t i n u e t o g r o w in c a p a b i l i t i e s , as w i r e l e s s c o m m u -
access calendars and other personal productivity fea-
n i c a t i o n s c o n t i n u e t o b e c o m e faster, a n d as m o b i l e
tures. M o s t (but not all) mobile phones today include
input o p t i o n s , such as voice i n p u t , c o n t i n u e t o i m -
c o m p u t i n g and Internet capabilities; these phones, such
p r o v e . F o r i n s t a n c e , s o m e m o b i l e devices c a n
as the one in E x h i b i t 1-4, are sometimes called smart-
f o r m I n t e r n e t s e a r c h e s a n d o t h e r t a s k s via v o i c e c o m -
per-
m a n d s , s o m e c a n be used t o pay f o r p u r c h a s e s w h i l e y o u are o n the g o , a n d m a n y c a n view a n d edit d o c u m e n t s s t o r e d in a c o m m o n f o r m a t , such as M i c r o s o f t Office documents.
All older term for a smartphone is P D A (personal digital assistant), though PDAs may not include telephone capabilities.
m o b i l e d e v i c e A very small communications device with built-in computing or Internet capability.
Chapter
1 : Introduction
to
Computers
and
the
Internet
C o m p u t e r s Then and N o w T h e history of c o m p u t e r s is o f t e n r e f e r r e d t o in t e r m s o f
g r a m s a n d d a t a w e r e input o n p u n c h cards a n d m a g n e t i c
generations, w i t h each n e w generation characterized
t a p e , o u t p u t w a s o n punch cards a n d paper printouts,
by a major t e c h n o l o g i c a l d e v e l o p m e n t .
a n d m a g n e t i c t a p e w a s used f o r s t o r a g e . M a g n e t i c h a r d drives a n d p r o g r a m m i n g l a n g u a g e s , such as F O R T R A N a n d C O B O L , w e r e d e v e l o p e d a n d i m p l e m e n t e d during
P r e c o m p i l e r s and Early Computers (before approximately 1 9 4 6 ) Early c o m p u t i n g d e v i c e s i n -
this g e n e r a t i o n .
••H«N0061 ••••eeoeee! M»te««oeo' ##oe«oeooo
c l u d e t h e a b a c u s , t h e slide
Third-Generation Computers (approximately 1 9 6 4 - 1 9 7 0 )
rule, t h e m e c h a n i c a l c a l c u l a tor, a n d Dr. H e r m a n H o l l e r -
Integrated
circuits
ith's P u n c h C a r d T a b u l a t i n g
marked
beginning
Machine and Sorter (shown
(ICs) of
t h e t h i r d g e n e r a t i o n o f com-
h e r e ) . This w a s t h e first electromechanical machine t h a t
the
* C o u r t e s y l B M C o r p o r a t e
puters, such as t h e I B M Sys-
c o u l d r e a d p u n c h cards. It w a s used t o process t h e 1890
h e r e ) . I n t e g r a t e d circuits in-
U.S. Census d a t a . H o l l e r i t h ' s c o m p a n y e v e n t u a l l y
corporate
be-
c a m e I n t e r n a t i o n a l Business M a c h i n e s ( I B M ) .
first
computers
The invention of t h e micro-
First-genera-
processor the
in 1971
fourth
ushered
only one problem at a t i m e
in
because they n e e d e d t o be
of c o m p u t e r s . In essence, a
generation
microprocessor c o n t a i n s t h e
caC o u r t e s y U S
core processing capabilities
A r m y
P a p e r p u n c h cards a n d t a p e w e r e used f o r i n p u t , a n d
of a n e n t i r e c o m p u t e r
o u t p u t w a s p r i n t e d o n p a p e r . C o m p l e t e d in 1946, E N I A C
o n e single chip. T h e o r i g i n a l
( s h o w n here) w a s t h e w o r l d ' s first large-scale, g e n e r a l p u r p o s e c o m p u t e r . U N I V A C , r e l e a s e d in 1 9 5 1 , w a s i n i tially built f o r t h e U.S. Census B u r e a u a n d w a s used t o a n a l y z e votes in t h e
^
Courtesy IBM Corporate Archives
Fourth-Generation Computers (approximately 1 9 7 1 - p r e s e n t )
t i o n computers could solve
bles t o b e r e p r o g r a m m e d .
^ ^ ^ ^ , |
a n d more reliable t h a n t h e earlier computers.
were
physically r e w i r e d w i t h
!* ^^fe
single t i n y silicon chip, m a k i n g c o m p u t e r s e v e n smaller
enormous, often taking up e n t i r e rooms.
m a n y transistors
a n d e l e c t r o n i c circuits o n a
First-Generation Computers (approximately 1 9 4 6 - 1 9 5 7 ] The
W ^
tem/360 m a i n f r a m e ( s h o w n
A r c h i v e s
1952 U.S. p r e s i d e n t i a l e l e c t i o n .
U N I V A C b e c a m e t h e first c o m p u t e r t o b e mass p r o d u c e d f o r g e n e r a l c o m m e r c i a l use.
IBM
PC ( s h o w n
here)
BipIWiBBB^^Bjj
on
and
Courtesy IBM Corporate Archives
A p p l e M a c i n t o s h c o m p u t e r s , a n d m o s t of t o d a y ' s m o d e r n c o m p u t e r s , fall into this c a t e g o r y .
Fifth-Generation Computers (Now and the Future) F i f t h - g e n e r a t i o n c o m p u t e r s h a v e n o precise classifica-
Second-Generation Computers (approximately 1 9 5 8 - 1 9 6 3 )
t i o n b e c a u s e experts d i s a g r e e a b o u t its d e f i n i t i o n . O n e
The
of
w i l l b e b a s e d o n artificial i n t e l l i g e n c e , a l l o w i n g t h e m t o
c o m p u t e r s , such as t h e I B M
think, reason, a n d learn. Voice a n d touch are expected
1401
(shown
t o be a primary means of input, a n d computers may
here) w e r e physically smaller,
b e c o n s t r u c t e d in t h e f o r m of o p t i c a l c o m p u t e r s t h a t
less expensive, m o r e p o w e r -
process d a t a using light i n s t e a d o f e l e c t r o n s , t i n y c o m -
ful,
puters t h a t utilize n a n o t e c h n o l o g y , or as e n t i r e g e n e r a l -
second
generation
mainframe
more
common
energy-efficient,
a n d m o r e reliable t h a n firstg e n e r a t i o n c o m p u t e r s . Pro-
Chapter
1 : Introduction
Courtesy IBM Corporate Archives
to
Computers
and
the
opinion
is t h a t f i f t h - g e n e r a t i o n
computers
p u r p o s e c o m p u t e r s built i n t o desks, h o m e a p p l i a n c e s , a n d o t h e r e v e r y d a y devices.
Internet
Personal Computers (PCs)
The term P C usually refers to p e r s ^ ^ ^ ^ r a ^ & r s that use Microsoft Windows. Person nputers sold only b c. are referred to as hort for Macintosh)
A p e r s o n a l c o m p u t e r (PC) is a small c o m p u t e r designed to be used by one person at a time. Personal computers are widely used by individuals and businesses today. C o n v e n t i o n a l personal computers that are designed to fit on o r n e x t to a desk, as shown in E x h i b i t 1 - 5 , are often referred to as d e s k t o p c o m p u t e r s . T h e most c o m m o n style o f desktop c o m p u t e r today uses a tower case, w h i c h is a system unit designed to sit vertically, typically on the floor. Desktop computers can also have
///////////////////////
a d e s k t o p case, which is designed to be placed horizontally on a desk's surface, or an all-in-one case, which i n c o r p o r a t e s the m o n i t o r and system unit into a single
puters, such as t h o s e m a d e by D e l l , H e w l e t t - P a c k a r d ,
piece o f h a r d w a r e .
N E C , Acer, L e n o v o , Fujitsu, a n d G a t e w a y . T h e s e c o m puters typically run the M i c r o s o f t W i n d o w s o p e r a t i n g system. M a c i n t o s h c o m p u t e r s are m a d e by A p p l e ,
Exhibit 1-5 Desktop computers
use the M a c O S o p e r a t ing s y s t e m ,
and
use d i f f e r e n t
often
hardware
and software than PCcompatible
computers.
Macintosh
computers
are
traditionally
the
computer of choice for artists,
designers,
and
others w h o require advanced
graphics
capa-
bilities. Portable
TOWER CASE
computers
are c o m p u t e r s that are designed t o be
carried
a r o u n d easily, such as in D e s k t o p c o m p u t e r s usually c o n f o r m t o o n e o f
a briefcase o r p o c k e t , depending o n their size. P o r t a b l e
two standards or platforms: PC-compatible or M a -
c o m p u t e r s n o w outsell desktop c o m p u t e r s and are often
c i n t o s h . P C - c o m p a t i b l e c o m p u t e r s evolved f r o m the
the c o m p u t e r o f choice for students a n d h o m e users, as
original I B M P C — t h e first p e r s o n a l c o m p u t e r t h a t
well as for m a n y businesses. In f a c t , p o r t a b l e c o m p u t -
w a s widely a c c e p t e d for business u s e — a n d are the
ers are essential for many w o r k e r s , such as salespeople
m o s t c o m m o n type o f personal c o m p u t e r used today.
w h o m a k e presentations or take orders f r o m clients off-
In g e n e r a l , P C - c o m p a t i b l e h a r d w a r e and s o f t w a r e are
site, agents w h o collect data at r e m o t e l o c a t i o n s , and
c o m p a t i b l e w i t h all brands o f P C - c o m p a t i b l e
managers w h o need computing a n d c o m m u n i c a t i o n s
com-
p e r s o n a l c o m p u t e r (PC) A type of computer based
Extra powerful desktop computers designed for high-end graphics, music, film, architecture, science, and other powerful applications are sometimes called workstations.
on a microprocessor and designed to be used by one person at a time. d e s k t o p c o m p u t e r A personal computer designed to fit on or next to a desk. p o r t a b l e c o m p u t e r A small personal computer designed to be carried around easily.
Chapter
1 : Introduction
to
Computers
and
the
Internet
as the one shown in Exhibit 1-6) or convertible tablets, which use the same clamshell design as notebook computers but whose top half can be rotated and folded shut so it can also be used as a slate tablet. ^
N e t b o o k s — a l s o called minin o t e b o o k s , mini-laptops, and ultraportable computers; notebook computers that are smaller (a 10-inch-wide screen is c o m m o n ) , lighter (typically less than three pounds), and less expensive than conventional n o t e b o o k s , so they are especially appropriate for students and business travelers. They typically don't include a C D or DVD drive and they have a smaller keyboard than a n o t e b o o k computer. The market for n e t b o o k s is growing rapidly and it is expected to reach 5 0 million by 2 0 1 2 , according to the research firm Gartner.
^
resources as they travel. P o r t a b l e computers (see E x hibit 1-6) are available in the following configurations: ^
enough to fit in one h a n d . U M P C s are smaller
Notebook computers (laptop computers)—
(screen size is often seven inches or smaller) and
computers that are a b o u t the size o f a paper
lighter (usually less than t w o pounds) than net-
n o t e b o o k and open t o reveal a screen on the top
b o o k s . T h e y can support k e y b o a r d , touch, and/
half o f the c o m p u t e r and a k e y b o a r d on the bot-
or pen input, depending on the particular design
t o m . They are c o m p a r a b l e t o desktop computers
being used.
in features and capabilities. ^
U l t r a - m o b i l e P C s ( U M P C s ) — s o m e t i m e s called handheld c o m p u t e r s ; c o m p u t e r s that are small
M o s t personal c o m p u t e r s t o d a y are sold as stand-
T a b l e t c o m p u t e r — n o t e b o o k - s i z e d computers that
alone, self-sufficient units t h a t are equipped with all
are designed to be used with a digital pen or stylus.
the hardware and software needed t o operate indepen-
They can be either slate tablets (one-piece comput-
dently. In other w o r d s , they can perform input, process-
ers with a screen on top and no keyboard, such
ing, output, and storage w i t h o u t being connected to a n e t w o r k , although they can be n e t w o r k e d if desired. In
notebook computer (laptop computer) A
c o n t r a s t , a device that must be c o n n e c t e d to a network
small personal computer designed to be carried around easily.
to perform processing or storage tasks is referred to as
t a b l e t c o m p u t e r A portable computer about the size of a notebook
a d u m b t e r m i n a l . T w o types o f personal computers that may be able to perform a limited a m o u n t of indepen-
that is designed to be used with an electronic pen. netbook
dent processing (like a desktop or n o t e b o o k computer)
A very small notebook computer.
but are designed to be used with a n e t w o r k (like a d u m b
ultra-mobile P C ( U M P C ) A portable personal computer that is
terminal) are thin clients and Internet appliances.
small enough to fit in one hand.
A thin client—also
d u m b t e r m i n a l A computer that must be connected to a network to
called
a network
computer
( N C ) — i s a device that is designed t o be used in c o n -
perform processing or storage tasks.
junction with a c o m p a n y n e t w o r k . Instead o f using lo-
t h i n c l i e n t A personal computer designed to access a network for
cal hard drives for storage, p r o g r a m s are accessed from
processing and data storage instead of performing those tasks locally.
and data is stored on a n e t w o r k server. T h e main advantage o f thin clients over desktop c o m p u t e r s is lower
Chapter
1:
Introduction
to
Computers
and
the
Internet
\\\\\\\\\\
Thin clients are a good choice for companies that manipulate highly secure data that needs to be prevented from leaving the facility.
Exhibit 1-8 Nintendo Wii gaming console
cost (such as f o r overall hardware and software, c o m puter m a i n t e n a n c e , and power a n d cooling c o s t s ) , increased security because data is n o t stored locally, and easier m a i n t e n a n c e because all software is located on a central server. Disadvantages include having limited or n o local storage and not being able t o function as a stand-alone c o m p u t e r when the n e t w o r k is n o t w o r k ing. T h i n clients are used by businesses t o provide e m ployees with access t o network applications; they are also sometimes used t o provide Internet access t o the public. F o r instance, a thin client might be installed in a hotel l o b b y t o provide guests with Internet access, hotel
news, sports scores, weather, a n d o t h e r personalized
and c o n f e r e n c e information, r o o m - t o - r o o m calling, and
W e b - b a s e d information. G a m i n g c o n s o l e s , such as the
free p h o n e calls via the Internet.
N i n t e n d o W i i shown in E x h i b i t 1-8 a n d the S o n y Play-
Network
computers
or other
devices
designed
Station 3 , that c a n be used t o view Internet c o n t e n t , in
primarily f o r accessing W e b pages and/or exchanging
addition t o their gaming abilities, c a n be classified as
email are called I n t e r n e t a p p l i a n c e s (sometimes referred
Internet appliances when they are used t o access the
to as Internet devices). Internet appliances are designed
Internet. Internet capabilities are also beginning t o be
to be located in the home and c a n be built into another
built into television sets, which m a k e t h e m Internet a p -
product, such as a refrigerator or telephone c o n s o l e , o r
pliances, as well.
can be stand-alone Internet devices, such as the c h u m b y device s h o w n in E x h i b i t 1-7, that is designed t o deliver
Midrange Servers A m i d r a n g e s e r v e r (sometimes called a m i n i c o m p u t e r )
is a medium-sized computer used t o host p r o g r a m s a n d
Exhibit 1-7 The chumby stand-alone Internet device
data for a small n e t w o r k . Typically larger, m o r e powerful, a n d m o r e expensive than a d e s k t o p c o m p u t e r , a midrange server is usually located in a closet o r other out-of-the-way place and c a n serve m a n y users at o n e time. Users c o n n e c t t o the server t h r o u g h a n e t w o r k , using their desktop computer, p o r t a b l e c o m p u t e r , thin client, o r a d u m b terminal consisting o f just a m o n i t o r and k e y b o a r d (see E x h i b i t 1 - 9 ) . M i d r a n g e servers are often used in small- t o medium-sized businesses such as medical o r dental offices, as well as in school c o m p u t e r l a b s . T h e r e are also special h o m e servers designed f o r h o m e
I n t e r n e t a p p l i a n c e A specialized network computer designed primarily for Internet access and/or email exchange. m i d r a n g e s e r v e r ( m i n i c o m p u t e r ) A medium-sized computer used to host programs and data for a small network.
Chapter
I : Introduction
to
Computers
and
the
Internet
irtualtzation concepts are ginning to be applied to other computing areas, su as networking and storage
Exhibit 1-9 Midrange server , Users connect to the server using computers, thin clients, or dumb terminals.
The server is typically stored in a nearby closet or other out-of-the-way place.
Mainframe Computers A m a i n f r a m e c o m p u t e r is a powerful computer used in m a n y
large
organizations
that
need
to manage large a m o u n t s o f centralized data. Larger, m o r e
expensive,
and more
powerful
than midrange servers, m a i n f r a m e s can serve thousands o f users c o n n e c t e d t o the mainframe via personal c o m p u t e r s , thin clients, or dumb terminals in a m a n n e r similar t o the way users c o n n e c t t o midrange servers. M a i n f r a m e c o m puters, such as the o n e s h o w n in Exhibit 1 - 1 0 , are typically located in climate-controlled data use, which are often used t o b a c k up (make duplicate
centers and c o n n e c t t o the rest o f the company c o m -
copies of) the c o n t e n t located o n all the computers in
puters via a c o m p u t e r n e t w o r k . D u r i n g regular business
the h o m e a n d t o host m u s i c , p h o t o s , movies, and other
hours, a m a i n f r a m e typically runs the programs needed
media t o be shared via a h o m e n e t w o r k .
to meet the different needs o f its wide variety o f users. At night, it c o m m o n l y p e r f o r m s large processing tasks,
O n e trend involving midrange servers as well as creation
such as payroll and billing. Today's mainframes are
of virtual (rather than a c t u a l ) versions o f a c o m p u t -
sometimes referred t o as high-end servers o r enterprise-
ing resource; in this c a s e , separate server environments
class servers.
mainframe c o m p u t e r s
is v i r t u a l i z a t i o n — t h e
that are physically located o n the same computer, but function as separate servers a n d do n o t interact with
Exhibit 1-10 Mainframe computer
each other. F o r i n s t a n c e , all applications for an organization can be installed in virtual environments on a single physical server instead o f using a separate server for each application. Using a separate server f o r each application wastes resources because the servers are often n o t used t o full c a p a c i t y — o n e estimate is that a b o u t only 1 0 percent o f server capability is frequently utilized. W i t h virtualization, c o m p a n i e s c a n fulfill their computing needs with fewer servers, which translates into reduced costs f o r h a r d w a r e and server management, as well as lower p o w e r a n d cooling costs. C o n sequently, one o f the m o s t significant appeals o f server virtualization
today is increased efficiency.
v i r t u a l i z a t i o n The creation of virtual versions of a computing resource. m a i n f r a m e c o m p u t e r A computer used in large organizations that manage large amounts of centralized data and run multiple programs simultaneously.
Chapter
I : Introduction
to
Computers
and
the
Internet
mi1
Exhibit 1-11 Supercomputer
Business Concerns about Energy Efficiency O n e issue f a c i n g businesses t o d a y is t h e h i g h cost of e l e c t r i c i t y t o p o w e r a n d c o o l t h e m a i n f r a m e s , servers, a n d p e r s o n a l c o m p u t e r s used in a n o r g a -
m1
C'
nization. Consequently, making t h e computers loc a t e d in a b u s i n e s s — p a r t i c u l a r l y m a i n f r a m e s a n d
• •
1 ':
* "
s e r v e r s — m o r e e n e r g y e f f i c i e n t is a h i g h priority today. For example, I B M recently consolidated a p p r o x i m a t e l y 4,000 servers l o c a t e d in its d a t a c e n ters i n t o just 30 m a i n f r a m e s (like t h e o n e s h o w n
:
in E x h i b i t 1-10). This n e w e n v i r o n m e n t is e x p e c t e d t o c o n sume
approximately
80%
less e n e r g y a n d result in s i g n i f i c a n t savings in e n -
Converging Technologies
ergy, s o f t w a r e , a n d system s u p p o r t costs.
In p r a c t i c e , classifying a c o m p u t e r i n t o o n e o f t h e six c a t e g o r i e s described in t h i s s e c t i o n is n o t a l w a y s easy o r s t r a i g h t f o r w a r d . F o r e x a m p l e , s o m e h i g h - e n d p e r s o n a l c o m p u t e r s a r e as p o w e r f u l as
Supercomputers S o m e a p p l i c a t i o n s require e x t r a o r d i n a r y speed,
m i d r a n g e servers, a n d s o m e p e r s o n a l c o m p u t e r s
accu-
a r e n e a r l y as small as a m o b i l e p h o n e . In a d d i t i o n ,
racy, and processing c a p a b i l i t i e s — f o r e x a m p l e , sending
t e c h n o l o g y c h a n g e s t o o fast t o h a v e precisely d e -
a s t r o n a u t s i n t o space, controlling missile guidance sys-
fined categories. The computer of t h e f u t u r e may
tems and satellites, forecasting the weather, exploring
n o t l o o k a n y t h i n g like t o d a y ' s c o m p u t e r s . In f a c t ,
for oil, and assisting with some kinds o f scientific re-
future
search. S u p e r c o m p u t e r s — t h e m o s t powerful and m o s t
o l d e r p e r s o n , eyeglasses f o r a t e c h n i c a l w o r k e r ,
applications include hosting extremely c o m p l e x W e b
a n d a f l e x i b l e m o b i l e d e v i c e t h a t c a n physically
sites and decision support systems for c o r p o r a t e execu-
c h a n g e its s h a p e as n e e d e d f o r g e n e r a l c o n s u m e r
such
use. F u t u r e devices a r e also e x p e c t e d t o use v o i c e ,
as 3 D medical imaging, 3 D image projections, and 3 D architectural modeling. Unlike m a i n f r a m e
computers, simultane-
computers
person's lifestyle, such as a r i n g o r w a t c h f o r a n
to fill this need. S o m e relatively new supercomputing
which typically run multiple applications
personal
b u i l t i n t o a v a r i e t y of useful o b j e c t s t o best f i t a
expensive type o f c o m p u t e r a v a i l a b l e — w e r e developed
tives, as well as three-dimensional applications,
predictions envision
t o u c h , or g e s t u r e i n p u t i n s t e a d o f a k e y b o a r d a n d m o u s e , a n d t o project o u t p u t o n a n y a p p r o p r i a t e s u r f a c e i n s t e a d of using a m o n i t o r . N e v e r t h e l e s s ,
ously to serve a wide variety o f users, supercomputers
t h e s e six c a t e g o r i e s a r e c o m m o n l y u s e d t o d a y t o
generally run one p r o g r a m at a time as fast as possible.
r e f e r t o g r o u p s of c o m p u t e r s d e s i g n e d f o r similar
C o n v e n t i o n a l supercomputers can cost several mil-
purposes.
lion dollars each. T o reduce the cost, supercomputers are often built by connecting hundreds o f smaller and less expensive computers (increasingly midrange servs u p e r c o m p u t e r The fastest, most expensive, and most
ers) i n t o a s u p e r c o m p u t i n g cluster t h a t acts as a single
powerful type of computer.
supercomputer. T h e c o m p u t e r s in the cluster usually c o n t a i n multiple CPUs each and are dedicated to pro-
s u p e r c o m p u t i n g cluster A supercomputer composed of numerous
cessing cluster applications. F o r e x a m p l e , I B M ' s R o a d -
smaller computers connected together to act as a single computer.
runner supercomputer, which is shown in E x h i b i t 1 - 1 1 ,
Chapter
I : Introduction
to
Computers
and
the
Internet
c o n t a i n s approximately 1 9 , 0 0 0 C P U s and is one o f the
l o i Computer Networks and the Internet
fastest computers in the w o r l d . T h i s supercomputing
3
cluster, built for the U.S. D e p a r t m e n t o f Energy, is installed at Los Alamos N a t i o n a l L a b in California, and is used primarily to ensure the safety and reliability o f
5 , 2 0 0 square feet, is the first supercomputer to reach
A
petaflop (quadrillions o f floating point operations per
electronically. Computer networks exist in many sizes
second) speeds. T h i s supercomputer is also one o f the
and types. For instance, home networks are commonly
the nation's nuclear w e a p o n s stockpile. Roadrunner, which
cost a b o u t $ 1 0 0 million and occupies
n e t w o r k is a collection o f computers and other de-
about
vices that are connected to enable users to share
hardware, software, and data, as well as to communicate
most energy-efficient c o m p u t e r s in the T O P 5 0 0 list o f
used to allow home computers to share a single printer
the 5 0 0 fastest c o m p u t e r s in the world. A new I B M
and Internet connection, as well as to exchange
supercomputer n a m e d Sequoia that is currently under
Small office networks enable workers to access company
development for the L a w r e n c e
records stored on a network server, communicate with
Livermore
National
files.
L a b o r a t o r y is expected to use approximately 1.6 mil-
other employees, share a high-speed printer, and access
lion CPUs and perform at 2 0 petaflops.
the Internet, as shown in Exhibit 1 - 1 2 . School networks
Exhibit 1-12 Example of a computer network
BETTY'S PC
Chapter
1:
Introduction
to
Computers
and
the
Internet
allow students and teachers t o access the Internet and
(see E x h i b i t 1 - 1 3 ) . W e b pages are viewed using a W e b
school resources, and large corporate networks often
b r o w s e r , such as Internet E x p l o r e r ( I E ) , C h r o m e , Safari,
connect all o f the offices or retail stores in the c o r p o -
O p e r a , or F i r e f o x .
ration, creating a network that spans several cities or states. Public wireless networks, such as those available at some coffeehouses, restaurants, public libraries, and
Accessing a Network or the Internet
parks, provide Internet access to individuals via their
T o access a local computer n e t w o r k , you need t o use a n e t w o r k adapter, either built into y o u r c o m p u t e r o r at-
portable computers and mobile devices.
tached t o it, t o c o n n e c t your c o m p u t e r t o the n e t w o r k . W i t h s o m e c o m p u t e r n e t w o r k s you need t o
The Internet and the World Wide Web
i n f o r m a t i o n , such as a username and a p a s s w o r d , t o c o n n e c t t o the n e t w o r k . After you are c o n n e c t e d t o the
T h e I n t e r n e t is the largest and m o s t w e l l - k n o w n c o m -
n e t w o r k , you c a n access n e t w o r k r e s o u r c e s , including
puter n e t w o r k in the world. It is technically a n e t w o r k o f
the n e t w o r k ' s Internet c o n n e c t i o n . If y o u are c o n n e c t -
n e t w o r k s , because it consists o f thousands o f n e t w o r k s
ing to the Internet without going t h r o u g h a c o m p u t e r
that c a n all access each other via the main b a c k b o n e
n e t w o r k , y o u r c o m p u t e r needs t o use a m o d e m t o c o n -
infrastructure o f the Internet. Individual users c o n n e c t
nect to the c o m m u n i c a t i o n s m e d i a , such as a t e l e p h o n e
to the Internet by connecting their c o m p u t e r s t o servers b e l o n g i n g t o an I n t e r n e t s e r v i c e p r o v i d e r
supply
line o r cable c o n n e c t i o n , used by y o u r ISP.
(ISP)—a
T o request a W e b page or o t h e r r e s o u r c e l o c a t e d on
c o m p a n y t h a t provides Internet access, usually for a
the Internet, its I n t e r n e t a d d r e s s — a unique n u m e r i c o r
fee. I S P s — w h i c h include conventional and mobile tele-
t e x t - b a s e d address—is used. T h e m o s t c o m m o n types o f
phone c o m p a n i e s like A T & T , Verizon, and Sprint; cable
Internet addresses are IP addresses a n d d o m a i n n a m e s
providers like C o m c a s t and T i m e W a r n e r ; and stand-
(to identify c o m p u t e r s ) , U R L s (to identify W e b p a g e s ) ,
alone ISPs like N e t Z e r o and E a r t h L i n k — f u n c t i o n as
and email addresses (to identify p e o p l e ) .
gateways o r o n r a m p s to the Internet, providing Internet
IP a d d r e s s e s
access t o their subscribers. ISP servers are continually
and
their
corresponding
domain
n a m e s are used t o identify c o m p u t e r s a v a i l a b l e t h r o u g h
c o n n e c t e d t o a larger n e t w o r k , called a regional netw o r k , w h i c h , in turn, is connected t o one o f the m a j o r high-speed n e t w o r k s within a country, called a b a c k -
n e t w o r k Computers and other devices that are connected to
b o n e n e t w o r k . B a c k b o n e networks within a c o u n t r y are
share hardware, software, and data.
c o n n e c t e d t o each other and to b a c k b o n e n e t w o r k s in other c o u n t r i e s . Together they f o r m o n e e n o r m o u s net-
I n t e r n e t The largest and most well-known computer network, linking
w o r k o f n e t w o r k s — t h e Internet.
millions of computers all over the world.
W h i l e the term Internet refers t o the physical struc-
I n t e r n e t s e r v i c e p r o v i d e r (ISP) A business or other organization
ture o f t h a t n e t w o r k , the W o r l d W i d e W e b ( W e b or W W W )
that provides Internet access to others, typically for a fee.
refers t o o n e r e s o u r c e — a collection o f d o c u m e n t s called
W o r l d W i d e W e b ( W e b or W W W ) The collection of Web pages
W e b p a g e s — a v a i l a b l e through the Internet. A group o f
available through the Internet.
W e b pages belonging to one individual or c o m p a n y is
W e b p a g e A document located on a Web server.
called a W e b site. W e b pages are stored on c o m p u t e r s called W e b s e r v e r s that are continually c o n n e c t e d t o the
W e b site A collection of related Web pages.
Internet; they c a n be accessed at any time by anyone
W e b s e r v e r A computer continually connected to the Internet that
with a c o m p u t e r or other W e b - e n a b l e d device and an
stores Web pages accessible through the Internet.
Internet c o n n e c t i o n . A wide variety o f i n f o r m a t i o n is
W e b b r o w s e r A program used to view Web pages.
available via W e b pages, such as c o m p a n y and prod-
I n t e r n e t a d d r e s s An address that identifies a computer, person, or
uct i n f o r m a t i o n , government forms and publications,
Web page on the Internet, such as an IP address, domain name, or email
m a p s , telephone directories, news, weather, sports re-
address.
sults, airline schedules, and m u c h , much m o r e . Y o u can
I P a d d r e s s A numeric Internet address used to uniquely identify a
also use W e b pages to shop, b a n k , trade s t o c k , and perf o r m other types o f online
financial
computer on the Internet.
t r a n s a c t i o n s ; ac-
cess social n e t w o r k s like F a c e b o o k and M y S p a c e ; and
d o m a i n n a m e A text-based Internet address used to uniquely identify
listen t o m u s i c , play games, w a t c h television s h o w s ,
a computer on the Internet.
and
perform
other
entertainment-oriented
activities
Chapter
1:
Introduction
to
Computers
and
the
Internet
Exhibit 1-13 Examples of common Web activities
lZ5771»»lJ73JfMi3 • Google Se.reh - Wr. » '1 Wr.v~.9009tt.com/. U Fwofitef QB
.'| 1Z577140U733IMH • (
Wob Imaass Videos Macs News Shooanp Gmad ami *
Google
Tip S m timt by trtting I ho rotum koy nctoad of clicking 00 "»o»rch"
Track UPS oackaoe 1Z6771401273388683 No standard web pages containing al your search terms were found Your search 1Z6771401273388683 did not match any documents 9 Internet | Protected Mode: Off
ACCESSING PRODUCT INFORMATION LOOKING U P REFERENCE INFORMATION
READING N E W S
1 Los Angeles High School
" I I
W«lcom« to Los Angeles Htjh
c2LT*x»
School!
Af)
L
W
'
SHOPPING ACCESSING SOCIAL NETWORKS WATCHING TV S H O W S A N D M O V I E S
the Internet. IP (short f o r Internet Protocol) addresses
registered, the IP address o f the c o m p u t e r that will be
are numeric, such as 2 0 7 . 4 6 . 1 9 7 . 3 2 , and are c o m -
hosting the W e b site associated with that domain name
monly used by computers t o refer t o other computers.
is also registered. T h e W e b site c a n be accessed using
A computer that hosts i n f o r m a t i o n available through
either its domain n a m e o r corresponding IP address.
the Internet, such as a W e b server hosting W e b pages,
W h e n a W e b site is requested by its domain name, the
usually has a unique text-based d o m a i n n a m e , such as
corresponding IP address is l o o k e d up using one o f the
m i c r o s o f t . c o m , that c o r r e s p o n d s t o that
Internet's domain n a m e system ( D N S ) servers, and then
computer's
the appropriate W e b page is displayed.
IP address t o make it easier f o r people t o request W e b pages located on that computer. IP addresses and d o -
D o m a i n names typically reflect the n a m e of the in-
main names are unique; that is, n o t w o computers on
dividual or organization associated with that W e b site.
the Internet use the e x a c t same IP address or the e x a c t
T h e different parts o f a domain n a m e are separated by
same d o m a i n n a m e . T o ensure this, specific IP addresses
a period. T h e far right part o f the d o m a i n n a m e (begin-
are allocated t o each n e t w o r k , such as a c o m p a n y net-
ning with the rightmost period) is called the top-level
w o r k o r an ISP, t o be used with the computers on that
domain ( T L D ) and traditionally identifies the type o f
n e t w o r k . T h e r e is a w o r l d w i d e registration system for
organization or its location, such as . c o m f o r businesses,
domain n a m e registration. W h e n a domain name is
. e d u for educational institutions, . j p f o r W e b sites lo-
Chapter
1: I n t r o d u c t i o n
to
Computers
and
the
Internet
cated in J a p a n , o r . f r f o r W e b sites located in F r a n c e . T h e r e were seven original T L D s used in the United
Custom TLDs
States; additional T L D s and numerous two-letter country code T L D s have since been created. See E x h i b i t 1 - 1 4
A n e w proposal allows for t h e creation of n e w
for some e x a m p l e s .
T L D s t h a t c a n b e virtually a n y c o m b i n a t i o n o f u p t o 64 c h a r a c t e r s a n d t h a t c a n use n o n - L a t i n c h a r acters. A l t h o u g h c u s t o m TLDs a r e possible (such as
E x h i b i t 1-14
t o better represent a company n a m e or personal
Sample top-level domains (TLDs)
n a m e ) , t h e y a r e also e x p e c t e d t o b e e x p e n s i v e t o register ( o n e e s t i m a t e is a b o u t $100,000 e a c h ) .
Intended use
Original TLDs
C o n s e q u e n t l y , t h e initial i n t e r e s t in c u s t o m T L D s is b y c o u n t r i e s such as Russia w h o s e n a t i v e
.com
Commercial businesses
.edu
Educational institutions
.gov
Government organizations
.int
International treaty organizations
.mil
Military organizations
.net
Network providers and ISPs
org
Noncommercial organizations
lan-
g u a g e s use non-Latin c h a r a c t e r s , g r o u p s o f b u s i nesses a n d o r g a n i z a t i o n s t h a t a r e i n t e r e s t e d n e w a c t i v i t y - o r i e n t e d TLDs like
.sports
and
in
. s h o p ,
a n d c o m m u n i t y o r g a n i z a t i o n s i n t e r e s t e d in cityb a s e d T L D s like
.nyc
and
f o r N e w Y o r k City
.paris
a n d Paris businesses, respectively.
Intended use
N e w e r TLDs
(ftp://) is sometimes used to upload a n d d o w n l o a d files.
.aero
Aviation industry
.biz
Businesses
.html or .htm, indicates the type o f W e b page t h a t will
.fr
French businesses
be displayed. F o r example, looking at the U R L f o r the
.info
Resource sites
.jobs
Employment sites
.mobi
Sites optimized for mobile devices
the
.name
Individuals
W e b page because the standard
T h e file extension used for the W e b page file, such as
W e b page shown in Exhibit 1 - 1 5 f r o m right t o left, y o u can see that the W e b page called a folder called t w i t t e r . c o m
j o b s
i n d e x . h t m l
is stored in
on the W e b server associated with
d o m a i n , and is a regular (nonsecure) http://
p r o t o c o l is b e -
ing used.
.pro
Licensed professionals
.uk
United Kingdom businesses
T o c o n t a c t people using the Internet, y o u m o s t often use their e m a i l a d d r e s s e s . An email address c o n s i s t s
o f a u s e r n a m e (an identifying n a m e ) , f o l l o w e d by the @ s y m b o l , followed by the d o m a i n n a m e f o r the c o m p u t e r Similar t o the w a y an IP address or domain n a m e
that will be handling that person's email (called a mail
uniquely identifies a computer on the Internet, a u n i f o r m
server). F o r e x a m p l e ,
resource l o c a t o r ( U R L ) uniquely identifies a specific W e b
page by specifying the p r o t o c o l — o r
[email protected] standard—being
used t o display the W e b page, the W e b server host-
[email protected] ing the W e b page, the name o f any folders on the W e b
[email protected] server in which the W e b page file is stored, and finally, the W e b page's filename if needed. i. The
most
common
Web
page p r o t o c o l s are H y p e r t e x t Transfer P r o t o c o l (http://) for
u n i f o r m r e s o u r c e l o c a t o r ( U R L ) An Internet address that uniquely identifies a Web page.
//WW'
regular W e b pages or Hyper-
e m a i l a d d r e s s An Internet address consisting of a username and
t e x t Transfer Protocol
computer domain name that uniquely identifies a person on the Internet.
Secure
(https://) for secure W e b pages
u s e r n a m e A name that uniquely identifies a user on a specific computer
that c a n safely be used t o transmit sensitive informa-
network.
tion, such as credit card numbers. File Transfer P r o t o c o l
Chapter
1 : Introduction
to
Computers
and
the
Internet
blank spaces
Pronouncing Internet Addresses
[email protected] B e c a u s e I n t e r n e t addresses a r e f r e q u e n t l y g i v e n verbally, it is i m p o r t a n t t o k n o w h o w
ford
t o p r o n o u n c e t h e m . K e e p in m i n d t h e f o l l o w i n g tips w h e n y o u say a n I n t e r n e t address: • If a p o r t i o n o f t h e a d d r e s s f o r m s a r e c o g n i z a b l e w o r d o r n a m e , it is s p o k e n ; o t h e r w i s e , it is s p e l l e d o u t .
and a jsmith
at Stan-
University
ing the email
us-
address
[email protected], the t w o email addresses are unique. It is up to
• T h e @ sign is p r o n o u n c e d at.
each organization with
• T h e p e r i o d (.) is p r o n o u n c e d d o t • T h e f o r w a r d slash (/) is p r o n o u n c e d
a
slash.
registered
name
Type of a d d r e s s
Sample address
Pronunciation
Domain name
berkeley.edu
berkeley dot e d u
URL
microsoft.com/windows/ie/default.asp
microsoft dot com slash windows
Email address
[email protected] to
one—and
domain
ensure only
that one—
e x a c t same username is assigned to its domain.
slash i e slash default dot a s p president at white house dot gov
Surfing the Web O n c e you have an Internet connection, you
are
the
email
addresses
assigned
jsmith (John S m i t h ) , m a r i a _ s
to
are ready to begin surfing t h e W e b — t h a t is, using a W e b
Sanchez), and
browser to view W e b pages. T h e first page that your
respectively
(Maria
sam.peterson (Sam P e t e r s o n ) , three hypothetical em-
Web browser displays when it is opened is your brows-
ployees at Cengage L e a r n i n g , the publisher o f this text-
er's starting page or h o m e page. F r o m your browser's
b o o k . T o ensure a unique email address for everyone
home page, you can move t o o t h e r W e b pages.
in the w o r l d , usernames must be unique within each domain n a m e . S o , even though there could be a
To navigate to a new Web page for which you
jsmith
k n o w the U R L , type t h a t U R L in the a p p r o p r i a t e l o -
at Cengage Learning w h o is using the email address
c a t i o n f o r y o u r W e b b r o w s e r (such as I n t e r n e t E x plorer's Address bar, as s h o w n in E x h i b i t 1 - 1 6 ) and press the E n t e r key. A f t e r t h a t p a g e is d i s p l a y e d , y o u
surf t h e W e b To use a Web browser to view
c a n use the h y p e r l i n k s — g r a p h i c s o r t e x t linked t o
Web pages.
o t h e r W e b p a g e s — o n t h a t p a g e t o display o t h e r W e b pages.
Chapter
I : Introduction
to
Computers
and
the
Internet
Exhibit 1-16 IE8 Web browser displaying a Web page
TOOLBARS Include Back, Home, and Print buttons, and the Favorites bar.
U S I N G URLS Type a URL in the Address bar and press Enter to display the corresponding Web page.
USING H Y P E R L I N K S Point to a hyperlink to see the corresponding URL on the status bar; click the hyperlink to display that page.
STATUS BAR Includes zoom options and security indicators.
T h e m o s t c o m m o n l y used W e b b r o w s e r s i n c l u d e
ing (so y o u c a n o p e n m u l t i p l e W e b p a g e s a t
I n t e r n e t E x p l o r e r ( s h o w n in E x h i b i t 1 - 1 6 ) , C h r o m e
the
same time), improved crash recovery and security,
( s h o w n in E x h i b i t 1 - 1 7 ) , a n d F i r e f o x . T h e
newest
and improved ability to search for and
versions of these browsers include tabbed
brows-
Web pages.
bookmark
All W e b browsers have a feature (usually called F a vorites or B o o k m a r k s that is accessed via a F a v o r -
Exhibit 1-17 Web page open in the Chrome Web browser
ites or B o o k m a r k s menu or b u t t o n ) t h a t you c a n use t o save W e b page URLs.
Once
a
Web
page is saved as a favorite o r a b o o k m a r k , you c a n redisplay that page its
without
typing
URL—you
simply
select its link f r o m the Favorites
or
Book-
m a r k s list. W e b b r o w s ers
also
maintain
a
H i s t o r y list, w h i c h is a record o f all W e b pages visited during a period o f time specified in the browser
settings;
you
c a n revisit a W e b page located on the H i s t o r y
KEYWORD SEARCHES Since t h e W e b option is selected, t y p e keywords here a n d press Enter to see a list of W e b pages m a t c h i n g your search criteria.
list by displaying
the
H i s t o r y list a n d selecting t h a t p a g e .
Chapter
I : Introduction
to
Computers
and
the
Internet
9
in Exhibit 1 - 1 8 , email messages travel from the sender's
Searching the Web
computer to his or her ISP's mail server, and then through
Y o u , like m a n y p e o p l e , p r o b a b l y t u r n t o t h e W e b
ISP. When the recipient logs on to the Internet and re-
t o f i n d specific i n f o r m a t i o n . S p e c i a l W e b p a g e s ,
quests his or her email, it is displayed on the computer he
the Internet to the mail server being used by the recipient's
c a l l e d search sites, a r e a v a i l a b l e t o h e l p y o u l o c a t e
or she is using. In addition to text, email messages can in-
w h a t y o u a r e l o o k i n g f o r o n t h e I n t e r n e t . O n e of
clude attached files, such as photos and other documents.
t h e m o s t p o p u l a r search s i t e s — G o o g l e — i s s h o w n
Email can be sent and received via an email pro-
in Exhibit 1-17. To c o n d u c t a s e a r c h , y o u t y p e o n e
gram, such as M i c r o s o f t O u t l o o k , installed on the c o m -
or m o r e k e y w o r d s i n t o t h e s e a r c h box o n a search
puter being used or via a W e b mail service, which is a
site, a n d a list o f links t o W e b
Web page belonging to a W e b mail provider such as
pages matching browsers
Gmail or W i n d o w s Live M a i l . Using an installed email
also p e r f o r m a n I n t e r n e t s e a r c h o n search t e r m s
program is convenient for individuals w h o use email
y o u t y p e in t h e A d d r e s s b a r i n s t e a d of a U R L . A l s o ,
often and w a n t to have copies o f sent and received mes-
n u m e r o u s r e f e r e n c e sites a r e a v a i l a b l e o n t h e W e b
sages stored on their computer. W e b - b a s e d email allows
y o u r s e a r c h criteria is d i s p l a y e d . M a n y
t o look u p addresses, p h o n e n u m b e r s , ZIP codes,
users to access their messages f r o m any computer with
m a p s , a n d o t h e r i n f o r m a t i o n . To f i n d a r e f e r e n c e
an Internet connection by just displaying the appropri-
site, t y p e t h e i n f o r m a t i o n y o u a r e l o o k i n g f o r (such
ate W e b mail page and logging o n .
as " Z I P c o d e l o o k u p " or " t o p o g r a p h i c a l m a p s " ) in
Web-based email is typically free, and virtually
a search site's s e a r c h box t o see links t o sites w i t h
all ISPs used with personal c o m p u t e r s include email
that information.
service in their monthly fee. S o m e plans from mobile phone providers that provide Internet service for m o -
Email
ibit 1-18 How email works Exhib
Email is the process o f
ex-
changing messages between computers over a n e t w o r k — SENDER'S COMPUTER
usually the Internet. Email is one of the most widely
The sender composes a message and sends it to the recipient via his or her email address.
|
used Internet a p p l i c a t i o n s — Americans alone send billions
of
email
messages
The email message is sent over the Internet through the sender's mail server to the recipient's mail server.
daily and worldwide email traffic is expected to exceed one-half
trillion
messages
per day by 2 0 1 3 , according to the Radicati G r o u p . You can send an email message from
any
Internet-enabled
device, such as a computer,
desktop
portable
com-
puter, or mobile device, to
SENDER'S MAIL SERVER
anyone who has an Internet
The recipient requests his or her messages from the mail server and the message is displayed.
emai/ address. As illustrated
email
i ft
Messages sent from one user to another over the Internet or other network.
Chapter
RECIPIENT'S COMPUTER
I : Introduction
to
Computers
and
the
Internet
RECIPIENT'S MAIL SERVER
bile phones include a limit on the number and/or size
Technology has also m a d e a huge n u m b e r o f tasks
o f email messages that can be sent o r received during
in our lives go much faster. Instead o f experiencing a
a billing period; messages after that point result in ad-
long delay for a credit check, an a p p l i c a n t c a n get a p -
ditional fees. O t h e r types o f mobile c o m m u n i c a t i o n s ,
proved for a purchase, loan, or credit card a l m o s t im-
such as t e x t messages, may also incur a fee.
mediately. D o c u m e n t s and p h o t o g r a p h s c a n be emailed or faxed in m o m e n t s , instead of taking at least a day to be mailed physically. Viewers can w a t c h favorite T V shows online and access up-to-the-minute n e w s at their
LOI 4 Computers and Society
convenience. And we can d o w n l o a d i n f o r m a t i o n , p r o g r a m s , music files, movies, and m o r e on d e m a n d w h e n
T
he vast improvements in technology over the past
we w a n t or need them, instead o f having t o o r d e r them
decade have had a distinct impact on daily life.
and then wait for delivery or go to a physical store t o
Computers have become indispensable tools at home and w o r k . Related technological advancements
purchase the items.
have
Although there are a great n u m b e r o f benefits f r o m
microwaves,
having a computer-oriented society, there are risks as
coffee pots, toys, exercise bikes, telephones, televisions,
well. A variety o f problems have emerged f r o m o u r e x -
and m o r e — l o o k and function. As computers and every-
tensive c o m p u t e r use, ranging f r o m stress a n d health
day devices become smarter, they w o r k faster, better,
c o n c e r n s , to the proliferation o f unsolicited emails a n d
changed the w a y everyday items—cars,
and m o r e reliably than before, as well as take on ad-
harmful p r o g r a m s that can be installed o n o u r c o m p u t -
ditional capabilities. Computerization and technological
ers w i t h o u t o u r knowledge, t o security a n d privacy is-
advances have also changed society as a whole. W i t h o u t
sues, to legal and ethical dilemmas. M a n y security and
computers, b a n k s would be overwhelmed by the j o b of
privacy c o n c e r n s stem from the fact that so m u c h per-
tracking all the transactions they process, m o o n explora-
sonal business takes place o n l i n e — o r at least ends up
tion and the space shuttle would still belong to science
as data in a c o m p u t e r database s o m e w h e r e — a n d the
fiction, and scientific advances such as D N A analysis and
potential for misuse of this data is e n o r m o u s .
gene mapping would be nonexistent. Everyday activities,
A n o t h e r c o n c e r n is the repercussions o f collecting
such as shopping and banking, are increasingly auto-
such vast a m o u n t s o f information electronically. S o m e
mated, and fast and easy access to information via the
people w o r r y a b o u t creating a " B i g B r o t h e r " situation,
Internet and communications via email and instant mes-
in which the government or a n o t h e r o r g a n i z a t i o n is
saging is expected. In fact, the Internet and its resources
watching everything that we d o . A n d s o m e Internet be-
have quickly become an integral part of our society.
havior, such as downloading music o r m o v i e s f r o m an
Benefits and Risks of a Computer-Oriented Society
fice computer, can get you arrested o r fired.
T h e benefits o f having such a computer-oriented soci-
more and more data about our everyday activities is col-
ety are n u m e r o u s . T h e capability to virtually design,
lected and stored on computers accessible via the Inter-
unauthorized source or viewing p o r n o g r a p h y on an ofSome people view the potential risk to personal privacy as one o f the most important societal issues. As
build, and test n e w buildings, cars, and airplanes before
net, our privacy is at risk because the potential for pri-
the actual c o n s t r u c t i o n begins helps professionals cre-
vacy violations increases. Today, data is collected a b o u t
ate safer p r o d u c t s . Technological advances in medicine
practically anything we buy online o r offline, although
allow for earlier diagnosis and m o r e effective treatment
offline purchases may not be associated with our identity
of diseases than ever before. T h e ability to s h o p , pay
unless we use a credit card or a membership or loyalty
bills, research products, participate in online courses,
card. T h e issue is not that data is collected—with virtu-
and l o o k up vast amounts o f information 2 4 hours a
ally all organizations using computers for recordkeeping,
day, 7 days a week, 3 6 5 days a year via the Internet is
that is unavoidable—but h o w the collected data is used
a huge convenience. In addition, a computer-oriented
and h o w secure it is. D a t a collected by businesses m a y be
society
generates
new
opportunities.
For
example,
used only by that company or shared with others. D a t a
technologies, such as speech recognition software and
shared with others often results in spam—unsolicited
Braille input and output devices, enable physically- or
emails. Spam is an enormous problem for individuals
visually-challenged individuals to perform
and businesses today, and it is considered by many to be
necessary
j o b tasks and to c o m m u n i c a t e with others m o r e easily.
a violation of personal privacy.
a p te r
I :
Introduction
to
Computers
and
the
Internet
works; symbols, names, and designs used in conjunction with a business; architectural drawings; and inventions.
Protecting Your Computer To h e l p protect y o u r c o m p u t e r , n e v e r o p e n
T h e three main types of intellectual property rights are copyrights, trademarks, and patents. an
email attachment f r o m someone you do not k n o w or t h a t has a n e x e c u t a b l e f i l e e x t e n s i o n ( t h e last t h r e e letters in t h e f i l e n a m e p r e c e d e d by a p e r i o d ) , such as .exe, . c o m , or . v b s , w i t h o u t c h e c k i n g w i t h t h e s e n d e r first t o m a k e s u r e t h e a t t a c h m e n t is l e g i t i m a t e . Y o u s h o u l d n e v e r click a link in a n e m a i l message.
You
should
also
be
c a r e f u l a b o u t w h a t files y o u download from the Int e r n e t . In a d d i t i o n , it y f f ^ ^ is crucial t o install security
software
on your computer and to
set
up
the
program to monitor your •lock c o m p u t e r o n a c o n t i n u a l basis, a n d d e t e c t or block any harmful programs.
Understanding Intellectual Property Rights All computer users should be aware of intellectual p r o p e r t y rights, which are the legal rights to which the creators of intellectual property—original creative w o r k s — a r e entitled. Examples o f intellectual property include music and movies; paintings, c o m p u t e r graphics, and other works of art; poetry, b o o k s , and other types of written
intellectual property rights The legal rights to which creators of original creative works are entitled. c o p y r i g h t The legal right to sell, publish, or distribute an
A copyright is a form of protection available to the creator of an original artistic, musical, or literary w o r k , such as a b o o k , movie, software program, musical composition, or painting. It gives the copyright holder the exclusive right to publish, reproduce, distribute, perform, or display the w o r k . Immediately after creating a work, the creator automatically o w n s the copyright of that w o r k . Copyrights apply to both published and unpublished works and remain in effect until 7 0 years after the creator's death. Copyrights for w o r k s registered by an organization or as anonymous w o r k s last 9 5 years from the date of publication or 1 2 0 years from the date of creation, whichever is shorter. Although works created in the United States after M a r c h 1 , 1 9 8 9 are not required to display a copyright notice to retain their copyright protection, displaying a copyright statement on a published w o r k , such as the ones shown in Exhibit 1-19, reminds others that the w o r k is protected by copyright law and that any use must comply with copyright law.
Exhibit 1-19 Copyright statements © 2012 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein maybe reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storageand retrieval systems, except as permitted underSection 107 or 108 of the 1976 United States Copyright Act, withoutthe prior written permission of the publisher.
BOOK COPYRIGHT NOTICE
© R e d Lobster. All rights reserved.
original artistic or literary work; it is held by the creator of a work as soon as it exists in physical form.
W E B SITE COPYRIGHT NOTICE
f a i r u s e Permits limited duplication and use of a portion of copyrighted material for specific purposes, such as criticism, commentary, news reporting, teaching, and research. d i g i t a l
watermark A subtle alteration of digital content that
identifies the copyright holder. d i g i t a l r i g h t s m a n a g e m e n t ( D R M ) s o f t w a r e Software used to protect and manage the rights of creators of digital content.
Anyone wishing to use copyrighted materials must first obtain permission from the copyright holder and pay any required fee. O n e exception is the legal concept of fair use, which permits limited duplication and use of a portion of copyrighted material for specific purposes, such as criticism, commentary, news reporting, teaching,
t r a d e m a r k A word, phrase, symbol, or design that identifies goods or
and research. For example, a teacher may legally read a
services.
copyrighted poem for discussion in a poetry class, and a
p l a g i a r i s m Presenting someone else's work as your own.
news crew may videotape a small portion o f a song at a concert to include in a news report of that concert.
Protecting Digital Content To p r o t e c t t h e i r rights, s o m e creators o f digital c o n t e n t
Another
rights-protection t o o l
used w i t h
digital
(such as a r t , music, p h o t o g r a p h s , a n d movies) use digital
c o n t e n t is d i g i t a l r i g h t s m a n a g e m e n t ( D R M ) s o f t w a r e ,
w a t e r m a r k s — a subtle a l t e r a t i o n o f digital c o n t e n t t h a t
w h i c h is used t o c o n t r o l t h e use o f a w o r k . F o r i n s t a n c e ,
is n o t n o t i c e a b l e w h e n t h e w o r k is v i e w e d o r p l a y e d b u t
DRM
t h a t i d e n t i f i e s t h e c o p y r i g h t holder. F o r instance, t h e
(called e n t e r p r i s e rights m a n a g e m e n t )
used
in c o n j u n c t i o n
with
business
documents
can protect a
d i g i t a l w a t e r m a r k f o r a n i m a g e m i g h t consist o f slight
sensitive business d o c u m e n t b y c o n t r o l l i n g
c h a n g e s t o t h e brightness o f a specific p a t t e r n o f pixels
t h a t d o c u m e n t , such as by limiting w h o c a n v i e w , p r i n t ,
t h a t a r e i m p e r c e p t i b l e t o p e o p l e b u t a r e easily r e a d by
o r c o p y it. D R M used w i t h d i g i t a l c o n t e n t , s u c h a s m o v -
usage of
s o f t w a r e . Digital w a t e r m a r k s c a n b e a d d e d t o images,
ies a n d music, d o w n l o a d e d via t h e I n t e r n e t c a n c o n t r o l
music, v i d e o , T V shows, a n d o t h e r digital c o n t e n t . T h e
w h e t h e r t h e d o w n l o a d e d file c a n b e c o p i e d t o a n o t h e r
p u r p o s e o f digital w a t e r m a r k i n g is t o g i v e digital c o n t e n t
d e v i c e , as w e l l as m a k e a v i d e o - o n - d e m a n d m o v i e u n -
a u n i q u e i d e n t i t y t h a t remains intact e v e n if t h e w o r k is
v i e w a b l e a f t e r t h e r e n t a l p e r i o d expires.
c o p i e d , e d i t e d , compressed, o r o t h e r w i s e m a n i p u l a t e d . 7
"~
'
•
A t r a d e m a r k is a word, phrase, symbol, or design (or a c o m b i n a t i o n o f w o r d s , phrases, symbols, o r designs) that identifies o n e product o r service f r o m another. T r a d e m a r k s that arc claimed but nor registered with the
A**"*
»
^^J-nT
U. S. Patent a n d T r a d e m a r k Office ( U S P T O ) can use the m a r k ™ . T h e symbol ® is reserved
material t o ensure that the m a t e r i a l is used in b o t h a legal a n d a n ethical manner. S t u d e n t s , r e s e a r c h e r s , a u t h o r s , a n d o t h e r writers need t o b e especially
careful
w h e n using literary material as a r e s o u r c e f o r p a p e r s , articles, b o o k s , a n d so f o r t h , t o e n s u r e t h e m a t e r i a l is
al
used a p p r o p r i a t e l y a n d is properly c r e d i t e d t o t h e original author. T o present s o m e o n e else's w o r k as y o u r o w n
for registered trademarks. Trademarked words
is p l a g i a r i s m , w h i c h is a violation o f c o p y r i g h t l a w a n d
and p h r a s e s — s u c h as iPod®, Chicken M c N u g -
a n unethical a c t . It c a n also get y o u fired, as s o m e r e -
gets®, a n d W i n d o w s V i s t a ™ — a r e widely used
porters have f o u n d o u t after f a k i n g q u o t e s o r plagiariz-
today. T r a d e m a r k e d logos are also c o m m o n .
ing c o n t e n t f r o m o t h e r n e w s p a p e r s . E x a m p l e s o f a c t s
Businesses a n d individuals should be very careful
t h a t w o u l d n o r m a l l y be c o n s i d e r e d o r n o t c o n s i d e r e d
w h e n c o p y i n g , sharing, o r o t h e r w i s e using copyrighted
plagiaristic are s h o w n in E x h i b i t 1 - 2 0 .
E x h i b i t 1-20 Examples of what is and what is not plagiarism
Not plagiarism
Plagiarism A student including a few sentences or a few paragraphs
A student including a few sentences or a few paragraphs
written by another author in his term paper without crediting
written by another author in his term paper, either indenting
the original author.
the quotation or placing it inside quotation marks, and crediting the original author with a citation in the text or with a footnote or endnote.
A newspaper reporter changing a few words in a sentence or
A newspaper reporter paraphrasing a few sentences or para-
paragraph written by another author and including the revised
graphs written by another author without changing the meaning
text in an article without crediting the original author.
of the text, including the revised text in an article, and crediting the original author with a proper citation.
A student copying and pasting information from various online
A student copying and pasting information from various online
documents to create her research paper without crediting the
documents and using those quotes in her research paper either indented or enclosed in quotation marks with the proper
original authors.
P ^ is
citations for each author.
A teacher sharing a poem with a class, leading the class to
A teacher sharing a poem with a class, clearly identifying the poet.
believe the poem was his original work.
Chapter
I : Introduction
to
Computers
and
the
Internet
Ethics T h e t e r m ethics refers t o s t a n d a r d s o f m o r a l c o n d u c t .
w h e t h e r t o u p l o a d a p h o t o of y o u r f r i e n d t o Facebook
For e x a m p l e , t e l l i n g t h e t r u t h is a m a t t e r o f ethics. A n
w i t h o u t asking permission, or w h e t h e r t o post a rumor o n
u n e t h i c a l act is n o t a l w a y s i l l e g a l , b u t a n illegal a c t is
a campus gossip site. E m p l o y e e s m a y n e e d t o d e c i d e w h e t h e r t o print
usually v i e w e d as u n e t h i c a l by m o s t p e o p l e . For e x a m lying t o a f r i e n d is u n e t h i c a l b u t usually
t h e i r b i r t h d a y party invitations o n t h e o f f i c e color printer,
n o t i l l e g a l ; w h e r e a s p e r j u r i n g o n e s e l f in a c o u r t r o o m as
w h e t h e r t o correct t h e boss f o r g i v i n g t h e m credit f o r
a w i t n e s s is b o t h illegal a n d u n e t h i c a l .
a n o t h e r e m p l o y e e ' s idea, or w h e t h e r t o sneak a look a t
ple, purposely
Ethical beliefs c a n v a r y w i d e l y f r o m o n e i n d i v i d u a l
i n f o r m a t i o n t h a t t h e y c a n access b u t h a v e n o legitimate
t o a n o t h e r . E t h i c a l b e l i e f s m a y also v a r y b a s e d o n r e -
reason t o v i e w . IT e m p l o y e e s , in particular,
ligion, country, race, o r c u l t u r e . In a d d i t i o n , d i f f e r e n t
o f t e n f a c e this latter ethical d i l e m m a b e -
ethical standards can apply t o different areas of one's
cause t h e y typically h a v e b o t h access a n d
life. For e x a m p l e , p e r s o n a l ethics g u i d e a n individual's
t h e technical ability t o retrieve a w i d e
personal b e h a v i o r a n d business ethics g u i d e a n i n d i v i d -
variety o f personal a n d professional i n -
ual's w o r k p l a c e b e h a v i o r .
f o r m a t i o n a b o u t o t h e r e m p l o y e e s , such
Ethics w i t h respect t o t h e use of c o m p u t e r s a r e r e f e r r e d t o as c o m p u t e r ethics. C o m p u t e r ethics h a v e t a k e n
as t h e i r salary i n f o r m a t i o n , W e b s u r f i n g history, a n d personal e m a i l . Businesses also d e a l w i t h a v a r i e t y
o n m o r e significance in r e c e n t years because t h e prolife r a t i o n o f c o m p u t e r s in t h e h o m e a n d t h e w o r k p l a c e p r o -
of
vides m o r e o p p o r t u n i t i e s f o r unethical acts t h a n in t h e
normal
past. T h e I n t e r n e t also m a k e s it easy t o distribute infor-
determining
m a t i o n such as c o m p u t e r viruses, s p a m , a n d s p y w a r e t h a t
ers o n w h i c h a p a r t i c u l a r s o f t w a r e
m a n y p e o p l e w o u l d v i e w as u n e t h i c a l , as w e l l as t o dis-
program should be installed, t o
t r i b u t e copies of s o f t w a r e , movies, music, a n d o t h e r d i g i -
identifying
t a l c o n t e n t in a n illegal a n d , t h e r e f o r e , unethical manner.
employee
W h e t h e r a t h o m e , a t w o r k , o r a t school, ethical is-
ethical
issues in t h e c o u r s e o f
business how
activities—from many
comput-
h o w customer a n d information
be used, t o deciding
should business
sues crop up every day. For e x a m p l e , y o u m a y n e e d t o
practices. B u s i n e s s e t h i c s a r e
m a k e ethical decisions such as w h e t h e r t o accept a rela-
t h e standards of conduct that
tive's offer of a f r e e copy o f a d o w n l o a d e d song or movie,
g u i d e a business's policies, d e c i -
w h e t h e r t o h a v e a f r i e n d h e l p y o u t a k e a n online e x a m ,
sions, a n d a c t i o n s .
W i t h the widespread availability o f online articles
c a n usually tell when a p a p e r is c r e a t e d in this manner.
and fee-based online term p a p e r services, s o m e students
T h e r e are also online sources i n s t r u c t o r s can use to test
might be tempted t o create their papers by copying and
the originality o f student p a p e r s . M o s t colleges and uni-
pasting excerpts o f online c o n t e n t into their d o c u m e n t s
versities have strict c o n s e q u e n c e s f o r plagiarism, such
t o pass o f f as their original w o r k . B u t these students
as a u t o m a t i c a l l y failing the a s s i g n m e n t or course, or be-
should realize that this is p l a g i a r i s m , and
ing expelled f r o m the institution. As Internet-based pla-
instructors
giarism c o n t i n u e s t o e x p a n d t o y o u n g e r and younger students, m a n y middle s c h o o l s a n d high schools are de-
e t h i c s Overall standards of moral conduct.
veloping strict plagiarism policies as well.
c o m p u t e r e t h i c s Standards of moral conduct as they relate to computer use. b u s i n e s s e t h i c s Standards of moral conduct that guide a business's
Computers and Health
policies, decisions, and actions.
C o m m o n physical c o n d i t i o n s caused by c o m p u t e r use
r e p e t i t i v e stress i n j u r y (RSI) A type of injury, such as carpal
include eyestrain, blurred vision, fatigue,
tunnel syndrome, that is caused by performing the same physical
b a c k a c h e s , and wrist and finger pain. S o m e c o n d i t i o n s
movements over and over again.
are classified as r e p e t i t i v e stress i n j u r i e s ( R S I s ) , in which
headaches,
h a n d , wrist, shoulder, o r neck pain is c a u s e d by per-
Chapter
I : Introduction
to
Computers
and
the
Internet
Repetitive stress as well as other injuries related to the work environment are estimated to account for one-third of all serious workplace injuries.
gram. H a r d w a r e that is E N E R G Y
exceeds the m i n i m u m federal s t a n d a r d s for reduced energy c o n s u m p t i o n and can display the STAR
label. Eco-labels—environmental
The
high
cost
in
data
usage
center
has
made
puters key c o n c e r n s
mouse
businesses and
use has been associated with R S I s , although RSIs can
ENERGY STAR
• •
UNITED STATES EUROPEAN UNION
for
individu-
als. A recent EPA study
be caused by non-computer-related activities as well.
showed that servers and
movements
m a d e w h e n using a keyboard is c a r p a l t u n n e l s y n d r o m e ( C T S ) — a painful and crippling condition affecting the
data
centers
than
1.5
use
percent
more of
KOREA
BRAZIL
all
electricity generated in the U.S.,
hands and wrists. C T S occurs when the nerve in the tunnel
and
heat generation by c o m -
f o r m i n g the same physical m o v e m e n t s over and over
carpal
of
electricity and the recent
power consumption
finger
• * •
other countries as well.
increase
O n e R S I related to the repetitive
ENERGY
performance
c e r t i f i c a t i o n s — a r e used in
energy
again. F o r instance, extensive k e y b o a r d and
STAR-compliant
and that n u m b e r is expected t o
located on the underside o f the wrist is
GERMANY
double in the n e x t five years. T h e
c o m p r e s s e d . An R S I associated with typing on the tiny
average U.S. household spends
k e y b o a r d s and thumbpads c o m m o n l y found on mobile
an estimated $ 1 0 0 per year powering devices t h a t are
phones a n d m o b i l e devices is D e Q u e r v a i n ' s t e n d o n i t i s —
turned o f f o r in standby m o d e . Devices like c o m p u t -
a c o n d i t i o n in which the tendons on the t h u m b side o f
ers, h o m e electronics, and appliances t h a t d r a w p o w e r
the wrists are swollen and irritated. C o m p u t e r vision
when they are turned off are s o m e t i m e s called energy
s y n d r o m e ( C V S ) is a collection o f eye and vision p r o b -
vampires. Although computers have b e c o m e m o r e en-
lems, including eyestrain or eye fatigue, dry eyes, burn-
ergy efficient, they can still d r a w quite a bit o f p o w e r in
ing eyes, light sensitivity, and blurred vision. Extensive
standby and sleep m o d e s — p a r t i c u l a r l y w i t h
c o m p u t e r use c a n also lead to headaches and pain in the
a screen saver enabled.
shoulders, n e c k , o r b a c k . S o m e recent physical health c o n c e r n s center on heat. F o r i n s t a n c e , one study measured the peak temper-
b save on vampire power costs, unplug your devices whenenv* are not using them
ature on the underside of a typical n o t e b o o k c o m p u t e r at over 1 3 9 ° Fahrenheit. Consequently, m a n y portable c o m p u t e r m a n u f a c t u r e r s n o w w a r n against letting any part o f the c o m p u t e r touch your body, and a variety o f n o t e b o o k c o o l i n g stands are available t o place between the c o m p u t e r and your lap for those o c c a s i o n s when a better w o r k surface is not available.
c a r p a l t u n n e l s y n d r o m e (CTS) A painful and crippling
Environmental Concerns
condition affecting the hands and wrists that can be caused by computer use.
T h e increasing use o f c o m p u t e r s in our society has cre-
D e Q u e r v a i n ' s t e n d o n i t i s A condition in which the tendons on the
ated a variety o f environmental c o n c e r n s . T h e term
thumb side of the wrist are swollen and irritated.
g r e e n c o m p u t i n g refers to the use o f c o m p u t e r s in an environmentally
friendly
manner.
Minimizing
the
g r e e n c o m p u t i n g The use of computers in an environmentally friendly manner.
use o f natural resources, such as energy and paper, is o n e aspect o f green computing. T o encourage the de-
eco-label A certification, usually issued by a government agency,
velopment o f energy-saving devices, the U.S. D e p a r t ment
o f Energy
Agency
and the E n v i r o n m e n t a l
(EPA) developed the E N E R G Y
that identifies a device as meeting minimal environmental performance
Protection STAR
specifications.
pro-
Chapter
I : Introduction
to
Computers
and
the
Internet
O N THE JOB
Workspace Design E r g o n o m i c s is t h e science of f i t t i n g a w o r k e n v i r o n m e n t
chair h e i g h t has b e e n set. T h e m o n i t o r settings should b e
t o t h e p e o p l e w h o w o r k t h e r e . W i t h respect t o c o m p u t e r
a d j u s t e d t o m a k e t h e screen brightness m a t c h t h e bright-
use, it involves d e s i g n i n g a s a f e a n d e f f e c t i v e w o r k s p a c e ,
ness of t h e r o o m a n d t o h a v e a h i g h a m o u n t of contrast;
w h i c h includes p r o p e r l y a d j u s t i n g f u r n i t u r e a n d h a r d w a r e
t h e screen should also b e periodically w i p e d clean of dust.
a n d using e r g o n o m i c h a r d w a r e w h e n n e e d e d . A p r o p e r
S o m e setups a l l o w t h e user t o raise t h e w o r k s p a c e in o r -
w o r k e n v i r o n m e n t — u s e d in c o n j u n c t i o n w i t h g o o d user
der to w o r k while standing, w h e n desired.
habits a n d p r o c e d u r e s — c a n p r e v e n t m a n y physical p r o b -
A n o t e b o o k s t a n d c a n also b e u s e d t o c o n n e c t p e -
lems c a u s e d by c o m p u t e r use. P r o p e r p l a c e m e n t a n d a d -
r i p h e r a l devices t o a p o r t a b l e c o m p u t e r , b u t is d e s i g n e d
j u s t m e n t of f u r n i t u r e is a g o o d p l a c e t o start w h e n e v a l u -
p r i m a r i l y t o e l e v a t e t h e display s c r e e n o f a n o t e b o o k or
a t i n g a w o r k s p a c e f r o m a n e r g o n o m i c perspective.
tablet computer to t h e proper height.
T h e desk s h o u l d b e p l a c e d w h e r e t h e sun a n d o t h e r
In a d d i t i o n t o w o r k s p a c e d e v i c e s , a v a r i e t y of e r g o -
sources of light c a n n o t shine directly o n t o t h e screen or
n o m i c h a r d w a r e c a n b e used t o h e l p users a v o i d or a l -
into t h e user's eyes. T h e m o n i t o r s h o u l d b e placed directly
l e v i a t e physical p r o b l e m s associated w i t h c o m p u t e r use.
in f r o n t of t h e user a b o u t a n arm's l e n g t h a w a y , a n d t h e
These include:
t o p of t h e screen s h o u l d b e n o m o r e t h a n 3 inches a b o v e t h e user's eyes o n c e t h e user's chair is a d j u s t e d . T h e desk chair should b e a d j u s t e d so t h a t t h e k e y b o a r d is a t , or slightly b e l o w , t h e h e i g h t a t w h i c h t h e user's f o r e a r m s a r e
• E r g o n o m i c k e y b o a r d s d e s i g n e d t o lessen t h e strain o n t h e hands a n d wrist. • Trackballs t h a t a r e essentially u p s i d e - d o w n mice t h a t c a n b e m o r e c o m f o r t a b l e t o use t h a n a m o u s e .
horizontal t o t h e f l o o r ( t h e r e a r e also special e r g o n o m i c chairs t h a t c a n b e used). A f o o t r e s t should b e used, if n e e d e d , t o k e e p t h e user's f e e t f l a t o n t h e f l o o r a f t e r t h e
• D o c u m e n t holders t o a l l o w t h e user t o see b o t h t h e d o c u m e n t a n d t h e m o n i t o r w i t h o u t t u r n i n g his or her h e a d . • A n t i g l a r e screens t h a t c o v e r t h e m o n i t o r
TILT-AND-SWIVEL MONITOR Adjusts for a comfortable viewing angle; top of screen should be no higher than 3 inches above the Y^-—I user's eyes.
DOCUMENT HOLDER Keeps documents close to the monitor so the user does not have to turn his or her head.
PROPER USER POSITION Sit straight with shoulders back, about 24 inches away from the monitor; keep forearms, wrists, and hands straight; keep forearms and / thighs parallel to the floor.
a n d lessen g l a r e a n d r e s u l t i n g eyestrain. • Keyboard drawers that
lower the
key-
b o a r d a n d e n a b l e t h e user t o k e e p his or her f o r e a r m s p a r a l l e l t o t h e floor. • Wrist
supports t o
keep
wrists
straight
w h i l e using t h e m o u s e or k e y b o a r d a n d t o support t h e wrists a n d forearms w h e n n o t using t h o s e d e v i c e s .
ADJUSTABLE TABLE/DESK Optimal height is between 25 and 29 inches tall. Keyboard and mouse should be at or just below elbow heightuse a keyboard drawer if needed.
'
ADJUSTABLE CHAIR .Height is adjustable and has support for the lower back.
gloves
designed
to
prevent
a n d relieve RSIs by s u p p o r t i n g t h e w r i s t a n d t h u m b w h i l e a l l o w i n g t h e full use of hands. T h e s e devices c a n h e l p users t o a v o i d a n d reduce discomfort w h i l e w o r k i n g on a computer. In a d d i t i o n , c o m p u t e r users should t a k e f r e q u e n t b r e a k s in t y p i n g , use g o o d p o s t u r e , stretch f r o m t i m e t o t i m e , a n d p e riodically refocus t h e i r e y e s o n a d i s t a n t o b ject f o r a m i n u t e or so.
e r g o n o m i c s The science of fitting a work environment to the people who work there.
Chapter
• Computer
1:
Introduction
to
Computers
and
the
Internet
T h e estimated number of pages generated by computer printers worldwide is almost one-half billion a year—an amount that would stack more than 2 5 , 0 0 0 miles high, 'fflflwffi1//
In addition t o m o r e energy-efficient h a r d w a r e , alternate p o w e r sources are being developed for greener c o m p u t i n g . F o r instance, solar p o w e r is a growing alternative for powering electronic devices, including c o m p u t e r s and mobile phones. W i t h solar power, solar panels converts sunlight into electricity, which is then stored in a battery. Improvements in solar technology are m a k i n g its use increasingly m o r e feasible and economical. A n o t h e r environmental c o n c e r n is the a m o u n t o f
' / / / / / / / / / / / /
t r a s h — a n d sometimes t o x i c t r a s h — g e n e r a t e d by c o m puter use. M o s t obvious is the extensive use of paper
up in landfills and in countries such as C h i n a , India,
for printing. In addition to paper-based trash, c o m -
and Nigeria that have lower recycling c o s t s , c h e a p e r
puting refuse includes used toner cartridges, obsolete
labor, and m o r e l a x environmental s t a n d a r d s t h a n the
or b r o k e n h a r d w a r e , and discarded C D s , D V D s , and
United States. M u c h of
other storage media. M u c h o f this e-trash (also called
the e-trash exported to
e-waste) ends up in landfills. Compounding
the
problem
of
the
amount
these countries is simply
of
dumped into fields and
e-trash generated is that computers, mobile phones, and
other informal dumping
related h a r d w a r e contain a variety o f t o x i c and hazard-
areas. U n a w a r e
ous materials. F o r instance, the average C R T m o n i t o r
of
the
potential danger o f these
alone c o n t a i n s a b o u t eight pounds o f lead, and a desk-
components,
top c o m p u t e r m a y contain up to 7 0 0 different chemi-
rural
vil-
lagers often sort through
cal elements and c o m p o u n d s , m a n y o f which (such as
and dismantle discarded
arsenic, lead, mercury, and c a d m i u m ) are hazardous
electronics
and expensive t o dispose of properly.
parts
look-
ing for precious metals
A g l o b a l c o n c e r n regarding e-trash is where it all
and
eventually ends up. According to m o s t estimates, at
other
sources
of
revenue—potentially en-
least 7 0 % o f all discarded c o m p u t e r equipment ends
dangering their health as well as polluting nearby rivers, p o n d s , and other water
Going Green
sources.
pounding
the
Com-
problem,
In a d d i t i o n t o b e i n g m o r e e n e r g y e f f i c i e n t , c o m -
the remaining waste is
p u t e r s t o d a y a r e b e i n g built t o r u n q u i e t e r a n d
often burned, generating huge c l o u d s o f potentially
cooler, a n d t h e y a r e using m o r e r e c y c l a b l e h a r d -
toxic smoke.
w a r e and packaging. Many computer turers of
are
also
reducing
toxic chemicals such mercury,
and
lead,
manufac-
Recycling computer equipment is difficult because
amount
of the materials being used. However, proper disposal
as c a d m i u m ,
is essential to avoid pollution and health hazards. Some
the
being
used
in
recycling centers will accept c o m p u t e r equipment, but
United
many charge a fee for this service. M a n y c o m p u t e r m a n -
manufacturers
ufacturers have recycling programs that will accept o b -
are beginning to produce more
solete or broken computer equipment from consumers.
environmentally friendly c o m -
Expired toner cartridges and ink cartridges can some-
p o n e n t s , such as system units
times be returned to the manufacturer or exchanged
m a d e f r o m r e c y c l a b l e plastic, n o n -
when ordering new cartridges; the cartridges are then
toxic f l a m e - r e t a r d a n t c o a t i n g s , a n d lead-
refilled and resold. Cartridges that c a n n o t be refilled can
p e r s o n a l c o m p u t e r s . In t h e States,
free
solder
on
the
computer
motherboard.
Recycling
p r o g r a m s t o reuse a n d s a l v a g e c o m p o n e n t s a r e
e-trash Electronic trash or waste, such as discarded computer
becoming more available.
components.
Chapter
1 : Introduction
to
Computers
and
the
Internet
ompletely remove data stored on computing equipment before disposal so someone else cannot recover it from that devi
1 3 . Describe the three most c o m m o n types of Internet addresses. 1 4 . W h a t are the three parts o f an email address? 1 5 . W h a t are intellectual property rights? 1 6 . Define computer
ethics.
1 7 . W h y are repetitive stress injuries associated with computer use? be sent to a recycling facility. In addition to helping to re-
1 8 . H o w does ergonomics relate to c o m p u t e r use?
duce e-trash in landfills, using refilled or recycled printer cartridges saves the consumer money because they are less expensive than new cartridges. Other
computer
components—such as C D s , D V D s , U S B flash drives, and |
Practice It
hard drives—can also be recycled through some organizations, such as GreenDisk, that reuse salvageable items
Practice It 1-1
and recycle the rest.
A c o m p u t e r along with the Internet and World Wide
In lieu o f recycling, older equipment that is still functioning can be used for alternate purposes, such as
W e b are handy tools that you c a n use t o research topics
for a child's computer, a personal W e b server, or a D V R .
covered in this b o o k , complete projects, and perform
O r it can be donated to schools and nonprofit groups.
the online activities available at the book's Web site
Some organizations accept and repair donated equip-
that are designed to enhance y o u r learning and under-
ment and then distribute it to disadvantaged groups or
standing of the content covered in this b o o k . Use an
other individuals in need o f the hardware.
Internet-enabled c o m p u t e r t o access the C M P T R W e b site located at login.cengagebrain.com. 1.
W h a t types o f information and activities are available on the C M P T R W e b site?
Quiz Yourself
2.
Select an activity and use y o u r mouse to click its link, and then explore the activity. Repeat the
1.
Define
2.
W h a t are the four primary operations o f a
computer.
process to explore at least t w o m o r e activities. 3.
computer? 3.
in enhancing your learning experience.
Describe the difference between data and
4.
information. 4.
Evaluate your experience using the C M P T R Web site.
W h a t is the difference between hardware and
5.
software?
Prepare a one-page s u m m a r y that answers these questions, and then submit it to your instructor.
5.
Explain cloud
6.
List the six general types o f computers.
7.
W h a t is the difference between a desktop c o m -
computing.
Practice It 1-2 A great deal of obsolete c o m p u t e r equipment eventually ends up in a landfill, even though there may be
puter and a portable c o m p u t e r ? 8.
Describe
9.
W h a t are supercomputers?
alternative actions that could be taken instead.
virtualization.
1.
a. a 10-year-old c o m p u t e r that is n o longer functioning
1 1 . W h a t is the largest and m o s t well-known c o m puter n e t w o r k in the world?
b. a four-year-old c o m p u t e r that still w o r k s , but is t o o slow to meet your needs
1 2 . Explain the difference between the Internet and the World W i d e W e b .
1 : Introduction
Research w h a t options are available to discard the following:
1 0 . W h a t is a n e t w o r k ?
'.hapter
Evaluate the usefulness o f the available resources
c. a used-up toner cartridge for a laser printer
to
Computers
and
the
Internet
2.
3.
W h i c h local schools and charitable organizations,
right from the beginning. O t h e r s , such as using an ergo-
if any, w o u l d accept any of these items?
n o m i c k e y b o a r d or a wrist rest, m a y t a k e a little getting used t o .
C h e c k with at least one c o m p u t e r manufacturer and one recycling c o m p a n y to see if they would
4.
1.
e q u i p m e n t — s u c h as adjustable office c h a i r s , desks
dure a n d c o s t be?
with k e y b o a r d drawers, e r g o n o m i c k e y b o a r d s , o r
C h e c k with at least one vendor selling refilled toner
n o t e b o o k s t a n d s — o n display t h a t y o u c a n try o u t .
cartridges t o see if it buys old cartridges or requires
2.
a trade-in with an order. If the vendor purchases
Test each piece, adjusting it as needed, a n d evaluate h o w c o m f o r t a b l e it seems.
old cartridges, h o w much will it pay per cartridge? 5.
G o to a local store that has s o m e e r g o n o m i c
accept the computers. If so, w h a t would the proce-
3.
Evaluate your usual c o m p u t e r w o r k s p a c e . Are
Prepare a one-page summary that describes your
there any adjustments you should m a k e ? Is there
findings,
any new equipment you w o u l d need t o acquire t o
answers these questions, and presents
your r e c o m m e n d a t i o n s , and then submit it to your
m a k e your w o r k s p a c e setup m o r e c o m f o r t a b l e ?
instructor.
Create a list o f any changes you c o u l d m a k e for free, as well as a list of items you w o u l d need to purchase and the estimated c o s t . W h i c h changes and items do you think w o u l d m o s t increase your
On Your Own
comfort? Prepare a one-page s u m m a r y t h a t describes your
On Your Own 1-1
findings and answers these q u e s t i o n s , a n d then
Some aspects o f an ergonomic w o r k s p a c e , such as a
submit it to your instructor.
c o m f o r t a b l e chair and nonglaring light, may feel good
ADDITIONAL STUDYTOOLS
Chapter 7 IN THE BOOK
ONLINE
^
Complete end-of-chapter exercises
^
Complete additional end-of-chapter exercises
^
Study tear-out Chapter Review Card
^
Take practice quiz to prepare for tests
^
Review key term flash cards (online, printable, and audio)
}• Play "Beat the Clock" and "Memory" to quiz yourself ^
Watch the videos "Searching the Web on Your iPhone" and "Climate Savers Computing Initiative"
Chapter
1 : Introduction
to
Computers
and
the
Internet
Rfl
Computer Hardware
Learning Objectives
Introduction
After studying the material in this chapter, you will be able to:
W h e n most people think o f c o m p u t e r s , images o f h a r d w a r e usually
L O 2 .1 Understand how data is represented to a computer
fill their minds. H a r d w a r e includes the system unit, k e y b o a r d , m o u s e , monitor, and all the o t h e r pieces o f equipment that m a k e up a c o m puter system. T h i s c h a p t e r describes the hardware located inside the system unit, which is the m a i n b o x o f the c o m p u t e r and where m o s t o f the w o r k o f a c o m p u t e r is p e r f o r m e d . It discusses the different types o f devices t h a t c a n be used for data storage. It also covers the wide variety o f h a r d w a r e t h a t can be used for input and output. Keep in mind that h a r d w a r e needs instructions from software in order to function. H a r d w a r e w i t h o u t s o f t w a r e is like a car w i t h o u t a driver o r a canvas and p a i n t b r u s h w i t h o u t an artist. S o f t w a r e is discussed in
L O 2 . 2 Identify the parts inside the system unit LO2.3
Explain how the CPU works
L 0 2 . Z L Describe different types of storage systems Identify and describe common input devices
L O 2 . 6 Identify and describe common output devices
the n e x t chapter.
i .02., Digital Data Representation
V:
irtually all c o m p u t e r s t o d a y are digital c o m p u t e r s . M o s t digital c o m p u t e r s are binary
computers, which c a n understand only two states, represented by the digits 0 and 1 , and usually thought o f as off and on. C o n s e -
Exhibit 2-1 Ways of representing 0 and 1
quently, all data processed by a binary c o m puter must be in binary f o r m . T h e Os and I s used t o represent data can be represented
Open = 0 (off)
in a variety of ways, such as with an open o r closed circuit, the absence or presence of
Closed = 1 (on)
electronic
current,
different types o f
two
magnetic
alignment on a storage m e -
CIRCUIT
dium, and so on, as shown in Exhibit 2 - 1 .
Chapter
2:
Computer
Hardware
/
Hardware surrounds us in all areas of our lives— from computers and cellphones to cameras, digital music/media players, and gaming devices to barcode readers, ATMs, and toll booths.
R e g a r d l e s s o f their physical r e p r e s e n t a t i o n s , these Os a n d I s are c o m m o n l y referred t o as bits, a c o m p u t i n g term derived f r o m the phrase digits.
binary
A b i t is the smallest unit o f data that a binary c o m p u t e r c a n recognize.
T h e input y o u enter via a k e y b o a r d , the s o f t w a r e p r o g r a m y o u use t o play y o u r m u s i c c o l l e c t i o n , the term paper stored o n y o u r computer, and t h e digital p h o t o s located on your m o b i l e p h o n e are all just g r o u p s o f bits. A bit by itself typically represents only a f r a c t i o n o f a piece o f d a t a . Eight bits g r o u p e d t o g e t h e r
bit The smallest unit of data that a binary computer can recognize.
are collectively referred t o as a b y t e . A n a m e d c o l l e c t i o n
b y t e Eight bits grouped together.
o f bytes t h a t represent s o m e t h i n g such as a written d o c u -
file A named collection of bytes that represent
m e n t , a c o m p u t e r p r o g r a m , a digital p h o t o , a s o n g , o r virtually a n y o t h e r type o f data is called a file. Because
virtually any type of data.
Chapter
2:
Computer
Hardware
The computer translates ata into binary os and [s, rocesses it, and then transl it back to output the results ii form we can understand
LO22
Inside the System Unit
T
he s y s t e m unit is the m a i n case o f a computer. It
houses the processing h a r d w a r e for that c o m -
puter, as well as a few other devices, such as storage devices, the power supply, and cooling fans. T h e system unit for a desktop c o m p u t e r is often a rectangular b o x , although other shapes and sizes are available. T h e
the numbers o f bytes needed t o represent a file c a n
inside o f a system unit for a typical desktop computer
be in the thousands o r millions o f bytes, prefixes are
system is shown in E x h i b i t 2 - 2 .
c o m m o n l y used with the t e r m byte
to represent larger
a m o u n t s of data.
The Motherboard A circuit b o a r d is a thin b o a r d c o n t a i n i n g c o m p u t e r chips
A Bit about Bytes
and
other
electronic
components.
Computer
c h i p s are very small pieces o f silicon o r other semicon-
T h e f o l l o w i n g t e r m s s h o w h o w prefixes a r e c o m -
ducting material that c o n t a i n integrated circuits ( I C s ) ,
b i n e d w i t h t h e t e r m byte
which are collections o f e l e c t r o n i c circuits containing
t o describe d a t a t h a t is
m i c r o s c o p i c p a t h w a y s a l o n g w h i c h electrical current
large t h a n a byte: ^
1 k i l o b y t e ( K B ) is e q u a l t o 1,024 bytes, b u t is usually t h o u g h t o f as a p p r o x i m a t e l y
1,000
bytes. 1 m e g a b y t e ( M B ) is a b o u t 1 million bytes.
^
1 g i g a b y t e ( G B ) is a b o u t 1 billion bytes.
^
1 t e r a b y t e ( T B ) is a b o u t 1 trillion bytes.
^
1 p e t a b y t e ( P B ) is a b o u t 1,000
^
7 0
bytes).
(2
All devices used with a c o m p u t e r need to be c o n nected via a wired or wireless c o n n e c t i o n to the m o t h e r b o a r d . Typically, e x t e r n a l devices such as m o n i t o r s , k e y b o a r d s , m i c e , and printers c o n n e c t to the motherb o a r d by plugging into a p o r t . A p o r t is a special c o n n e c t o r accessible through the e x t e r i o r o f the system device. T h e port is either built i n t o the m o t h e r b o a r d or created with an e x p a n s i o n c a r d inserted into an
exabytes
bytes).
1 y o t t a b y t e ( Y B ) is a b o u t 1,000 8 0
main circuit b o a r d inside the system unit is called the
unit case that is used to c o n n e c t an external h a r d w a r e petabytes
1 z e t t a b y t e ( Z B ) is a b o u t 1,000 (2
^
6 0
terabytes
bytes).
1 e x a b y t e ( E B ) is a b o u t 1,000 (2
^
5 0
trolling the flow o f electrons a l o n g the pathways. T h e motherboard.
^
(2
c a n travel, and transistors, w h i c h are switches c o n -
zettabytes
bytes).
e x p a n s i o n slot on the m o t h e r b o a r d . Wireless external devices typically use a transceiver that plugs into a p o r t on the c o m p u t e r t o t r a n s m i t data between the wireless device and the m o t h e r b o a r d or they use wireless n e t w o r k i n g technology, such as Bluetooth, built into the m o t h e r b o a r d .
s y s t e m u n i t The main case of a computer. circuit b o a r d A thin board containing computer chips and other electronic components. c o m p u t e r c h i p A very small piece of silicon or other semiconducting material that contains integrated circuits (ICs) and transistors. m o t h e r b o a r d The main circuit board inside the system unit. p o r t A connector on the exterior of the system unit case that is used to connect an external hardware device.
Chapter
2:
Computer
The system unit for portable computers and mobile devices is usually combined with the screen to form a single piece of hardware.
Hardware
A\\\\\\\\\\
E x h i b i t 2-2
Inside a typical system unit CPU Performs the calculations and does the comparisons needed for processing, as well as controls the other parts of the computer system.
EXPANSION CARD
Connects peripheral devices or adds new capabilities to a computer.
POWER SUPPLY Converts standard electrical power into a form the computer can use.
FAN Cools the CPU.
HARD DRIVE Stores data and programs; the principal storage device for most computers. DRIVE B A Y S Hold storage devices, such as the DVD and hard drives shown here.
EXPANSION SLOTS Connect expansion cards to the mother board to add addi tional capabilities.
DVD DRIVE Accesses data stored on CDs or DVDs.
MOTHERBOARD Connects all compo nents of the computer system; the computer's main circuit board. M E M O R Y (RAM) MODULES Store data temporarily while you are working with it.
FLASH MEMORY CARD READER Accesses data stored on flash memory cards. U S B PORTS Connect USB devices to the computer.
M E M O R Y SLOTS Connect memory modules to the motherboard.
The Power Supply T h e p o w e r supply inside a d e s k t o p c o m p u t e r c o n n e c t s t o the m o t h e r b o a r d t o deliver electricity t o the c o m puter. P o r t a b l e c o m p u t e r s a l m o s t always c o n t a i n a rec h a r g e a b l e b a t t e r y p a c k to p o w e r the c o m p u t e r w h e n it is n o t c o n n e c t e d t o a p o w e r outlet, as well as an exter-
being generated worldwide from discarded mobile phones and other electronics.
nal p o w e r supply adapter t h a t c o n n e c t s the c o m p u t e r t o a p o w e r o u t l e t t o recharge the battery w h e n needed.
Nonremovable Batteries O n e issue w i t h n e w e r portable computers a n d m o -
The CPU T h e c e n t r a l p r o c e s s i n g u n i t ( C P U o r p r o c e s s o r ) is a c o m puter chip t h a t p e r f o r m s the c a l c u l a t i o n s a n d c o m p a r i sons needed for processing; it a l s o c o n t r o l s the c o m p u t er's o p e r a t i o n s . T h e C P U is the m a i n p r o c e s s i n g device
bile devices is t h e g r o w i n g use of n o n r e m o v a b l e b a t -
f o r a c o m p u t e r and is often c o n s i d e r e d the " b r a i n " o f
teries. These batteries m a k e t h e devices lighter a n d
the c o m p u t e r . T h e C P U consists o f a variety o f c i r c u i t r y
a r e supposed t o last f o r t h e typical life of t h e device.
and c o m p o n e n t s t h a t are p a c k a g e d t o g e t h e r a n d
are
However, t h e y a r e m o r e difficult a n d expensive t o r e place if t h e y fail. A n d , o f t e n it is not w o r t h t h e t r o u b l e a n d expense t o replace t h e m in mobile devices such as mobile
phones a n d
portable digital media players.
c e n t r a l p r o c e s s i n g u n i t ( C P U or p r o c e s s o r ) The chip located on the motherboard of a computer that performs the processing for a computer.
Chapter
2:
Computer
Hardware
connected directly to the m o t h e r b o a r d . M o s t personal computers today use C P U s m a n u f a c t u r e d by Intel or Advanced M i c r o Devices ( A M D ) . S o m e examples o f their processors are s h o w n in E x h i b i t 2 - 3 .
E x h i b i t 2-3
Examples of CPUs
1% O 5
M a n y CPUs today are
IS €
multi-core
E
9 3
CPUs;
that
is,
C P U s that contain the processing c o m p o n e n t s or cores of
multiple
independent
processors in a single C P U . For
Shared Level 3 cache memory
example,
C P U s c o n t a i n two cores and quad-core
DESKTOP PROCESSORS Typically have 2 to 4 cores and are designed for performance.
dual-core
SERVER AND WORKSTATION PROCESSORS Typically have at least 4 cores and are designed for very high performance.
CPUs
contain
four c o r e s . Multi-core CPUs a l l o w computers to w o r k simultaneously on more than one task at a time, such as burning a D V D while surfing the W e b , as well as t o w o r k faster within a single application if the software is
§ <S
© "I C
designed to take advantage o f multiple cores.
!/)
O
II
1«l
Projects
^
OB
0
6 8MB
09-04-01 22 47
•Ml for Portland
0
368 KB
0943-31 1006
0
23MB
0943-260649
t ,
174MB
0943-23 20 20
•
6 9 MB
09-03-24 11 97
W 5 KB
09-03-301441
121KB
0943-301906
1
a Broadway TIC
»
• immm. 344 USa** M m Abu Rati EstJU 94412 Cornp*
0
Bfj
CMy Board MbwIM
0
349KB
0944461100
iH
932 Cortland Ava C23 Proposal
1
96 KB
0943-30 14 97
0*
11*^*^ ?«* 1
a Quattiun' A*k « hara.
livered on demand via the W e b t o wherever the user is at the m o m e n t , provided he or she has an Internet connection (and has paid t o use the software if a payment is required). Also referred t o as Software as a Service (SaaS) and c l o u d w a r e , the use o f W e b - b a s e d software is growing rapidly. In fact, research firm G a r t n e r predicts that 2 5 percent o f n e w business software will be delivered via the W e b by 2 0 1 1 , up from 5 percent o f new software purchases in 2 0 0 6 . Typically, documents using W e b - b a s e d software are stored online.
D a * . i . W K»
^
See E x h i b i t 3 - 1 6 . A W e b - b a s e d software program is de-
created
«*
09-03-3014 30
0 2212 Kannady Court
Opart Houm print MtMWto
An ..... s,
£ 5J* •AFT* mfJGm
nm
.^
»v.
W E B DATABASE APPLICATIONS This application allows you to retrieve property information, such as home values and homes for sale.
LO35 Application Software for Business
S
o m e t i m e s , related s o f t w a r e p r o g r a m s (such as a g r o u p o f g r a p h i c s p r o g r a m s , utility p r o g r a m s , o r
office-related s o f t w a r e ) are sold bundled together as a s o f t w a r e s u i t e . Businesses a n d individuals often use office suites, s o m e t i m e s called p r o d u c t i v i t y s o f t w a r e suites, t o p r o d u c e written d o c u m e n t s . Typically, office suites c o n t a i n the f o l l o w i n g p r o g r a m s , and m a n y also c o n t a i n a d d i t i o n a l productivity t o o l s — s u c h as a c a l -
s o f t w a r e s u i t e Related software programs (such as a group of graphics programs, utility programs, or office-related
endar, a messaging p r o g r a m , o r c o l l a b o r a t i o n t o o l s : ^
W o r d p r o c e s s i n g s o f t w a r e — a l l o w s users t o create and edit c o m p l e x t e x t - b a s e d d o c u m e n t s t h a t
software) that are sold bundled together.
can also include images and o t h e r c o n t e n t .
Chapter
3: Computer
Software
Using software instead of paper and pencil to create a document means that you do not have to recreate the entire document w you want
terial, and reports. At its most basic level, w o r d processing is used to do what was done on a typewriter before computers were commonplace. M a n y documents created with word processing software also include c o n t e n t that was not possible to create using a typewriter, such as photos, drawn objects, clip art images, hyperlinks, video clips, and text in a variety of sizes and appearances. Like any document created with software instead o f paper and pencil, word processing documents can be retrieved, modified, and printed as many times as needed. T h e m o s t
^
S p r e a d s h e e t s o f t w a r e — p r o v i d e s users with a c o n v e n i e n t means of creating d o c u m e n t s c o n t a i n ing c o m p l e x mathematical c a l c u l a t i o n s .
^
D a t a b a s e s o f t w a r e — a l l o w s users t o store and organize vast amounts o f data and retrieve specific i n f o r m a t i o n when needed.
^
frequently used word processing programs are M i c r o s o f t W o r d , Corel WordPerfect, and Apple Pages. W o r d processing programs typically include
im-
proved c o l l a b o r a t i o n , security, and r i g h t s - m a n a g e m e n t tools (tools used t o protect original c o n t e n t f r o m misuse by o t h e r s ) . W o r d processing p r o g r a m s also typically include a variety o f Web-related t o o l s , as well as s u p p o r t
P r e s e n t a t i o n g r a p h i c s s o f t w a r e — a l l o w s users
for speech and pen input. Web-related features include
t o c r e a t e visual presentations t o convey i n f o r m a -
the ability t o send a document as an email message via
tion m o r e easily to others.
the w o r d processing p r o g r a m , the inclusion o f hyperlinks in d o c u m e n t s , and the ability t o c r e a t e o r m o d i f y
O n e o f the m o s t widely used office software
suites is M i c r o s o f t
W e b pages or blogs. T h e latest versions o f O f f i c e also
Office.
include the ability to c o l l a b o r a t e with o t h e r s o n l i n e .
T h e latest version is M i c r o s o f t Office 2010.
Similar
from
Corel
suites
are
available
(WordPerfect
Spreadsheet Concepts
Office)
and Apple ( i W o r k ) ; a free alterna-
A n o t h e r widely used application p r o g r a m is spread-
tive office suite is O p e n O f f i c e . o r g .
sheet s o f t w a r e . S p r e a d s h e e t s o f t w a r e is the type o f a p -
M a n y office suites are available in
plication software used to create c o m p u t e r i z e d spread-
a variety o f versions, such as a home
or
contains
student fewer
version
that
programs
than
sheets. A s p r e a d s h e e t is a group o f values a n d o t h e r data organized into rows and c o l u m n s , similar t o the ruled paper worksheets traditionally used by
a professional version. N o t all
keepers and a c c o u n t a n t s . M o s t spreadsheets
s o f t w a r e suites are available for
formulas that are used to c o m p u t e c a l c u l a t i o n s based
all o p e r a t i n g systems, however.
on data entered into the spreadsheet.
F o r e x a m p l e , M i c r o s o f t Office is
In spreadsheets created with spreadsheet s o f t w a r e ,
available for b o t h W i n d o w s and Mac
OS
computers;
iWork
is
available only for M a c O S c o m p u t ers; and O p e n O f f i c e . o r g is available for W i n d o w s , L i n u x , and M a c computers.
OpenOffice.org
available in m o r e than 3 0
is
bookinclude
OS also
v V
different
languages.
all formula results are updated a u t o m a t i c a l l y
when-
ever any changes are made to the d a t a . Consequently, n o manual computations are required, which increases accuracy. In addition, the a u t o m a t i c recalculation o f formulas allows individuals to modify spreadsheet data as
w o r d p r o c e s s i n g The use of a computer and word processing software to create, edit, save, and print written documents.
Word Processing Concepts
s p r e a d s h e e t s o f t w a r e The type of application software used to
Virtually all formal writing today is performed using a
create computerized spreadsheets.
word processing program. W o r d processing refers to using
s p r e a d s h e e t A group of values and other data organized into rows
a computer and word processing software to create, edit, save, and print written documents, such as letters, con-
and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.
tracts, manuscripts, newsletters, invoices, marketing ma-
Chapter
3: Computer
Software
often as necessary either t o create n e w spreadsheets o r t o
o f program used t o create, maintain, and organize data
experiment with various possible scenarios (called what-
in a database, as well as to retrieve information from the
if analysis) to help make business decisions. Spreadsheet
database. T h e most c o m m o n l y used relational database
software typically includes a variety o f data analysis
management systems include M i c r o s o f t Access, Oracle
tools, as well as the ability t o generate charts. T h e most
D a t a b a s e , and I B M D B 2 .
widely used spreadsheet programs today are M i c r o s o f t
Databases are often used o n the W e b . For instance,
Excel, Corel Q u a t t r o P r o , and Apple N u m b e r s — a g a i n ,
many W e b sites use one or more databases to keep track
all are part o f their respective software suites. Spread-
of inventory; to allow searching for people, documents,
sheet software is c o m m o n l y used by a variety o f busi-
or other information; and t o place real-time orders. In
nesses and employees, including C E O s , managers, assis-
fact, any time you type keywords in a search b o x on a
tants, analysts, and sales representatives.
search site or hunt for a product o n a retail store's W e b
M o s t spreadsheet p r o g r a m s have built-in W e b c a -
site using its search feature, you are using a Web database.
pabilities. Although they are used less c o m m o n l y t o create W e b pages, m a n y spreadsheet programs include the option t o save the current w o r k s h e e t as a W e b page,
Presentation Graphics Concepts
and insert hyperlinks into w o r k s h e e t cells. M i c r o s o f t
If you try t o explain t o others w h a t you look like, it may
Excel includes the ability t o c o l l a b o r a t e online, as well
take several minutes. S h o w t h e m a c o l o r photograph,
as t o copy ranges o f cells t o a W e b publishing o r word
on the other h a n d , and you c a n c o n v e y the same infor-
processing p r o g r a m t o insert spreadsheet data into a
mation within seconds. T h e saying " a picture is worth a thousand w o r d s " is the c o r n e r s t o n e o f presentation
document as a t a b l e .
graphics. A p r e s e n t a t i o n g r a p h i c (see Exhibit 3 - 1 7 ) is an image designed t o visually e n h a n c e a presentation
Database Concepts
(such as an electronic slide s h o w o r a printed report),
People often need to retrieve specific data rapidly while
typically t o convey i n f o r m a t i o n m o r e easily to people.
on the j o b . F o r example, a customer service representa-
A variety o f software (including spreadsheet programs,
tive may need to locate a customer's order status quickly
image
while the customer is on the telephone. T h e type o f soft-
software) c a n be used t o create presentation graphics.
editing p r o g r a m s , a n d presentation
ware used for such tasks is a database management system. A d a t a b a s e is a collection o f related data that is stored on a computer and organized in a manner that enables information to be retrieved as needed. A database management system
(DBMS)—also
called d a t a b a s e s o f t w a r e — i s the type
d a t a b a s e A collection of related data that is stored on a tow>pv.\tf w\d orcjowzed in a manner that enables information to be retrieved as needed. d a t a b a s e s o f t w a r e The type of program used to create, maintain, and organize data in a database, as well as to retrieve information from it; also called a database management system (DBMS). p r e s e n t a t i o n g r a p h i c An image designed to visually enhance a presentation (such as an electronic slide show or a printed report).
E x h i b i t 3-17 Examples of presentation graphics
graphics
E x h i b i t 3-18
Graphics software
I
PAINTING P R O G R A M S Typically create images pixel by pixel so images cannot be layered or resized. DRAWING P R O G R A M S Typically create images using mathematical formulas so images can consist of multiple objects that can be layered, and the images can be resized without distortion.
mm PHOTO EDITING PROGRAMS Allow users to edit digital photos.
Presentation graphics often take the f o r m o f electronic
designed t o help individuals create o r m o d i f y g r a p h i c s ,
slides c o n t a i n i n g images, text, video, and m o r e that are
edit digital audio or video files, play m e d i a files, burn
displayed o n e after the other in an electronic slide show.
C D s and D V D s , and so forth, as discussed n e x t . S o m e
presentation
p r o g r a m s focus on just one task; o t h e r s are designed t o
g r a p h i c s s o f t w a r e and can be run on individual c o m p u t -
perform multiple tasks, such as t o i m p o r t a n d edit im-
ers or presented t o a large group using a c o m p u t e r pro-
ages, a u d i o , and video, and then create a finished D V D .
E l e c t r o n i c slide shows are created with
j e c t o r ; for instance, they are frequently used for business and educational presentations. S o m e o f the m o s t c o m m o n presentation graphics p r o g r a m s are M i c r o s o f t
Graphics Software
P o w e r P o i n t , C o r e l Presentations, and Apple K e y n o t e —
G r a p h i c s s o f t w a r e — a l s o called
again, all part o f their respective software suites.
w a r e — i s used t o create or m o d i f y i m a g e s . G r a p h i c s
Presentation graphics programs can be used to gen-
software
programs
digital
are c o m m o n l y
imaging
soft-
distinguished
by
erate W e b pages or W e b page c o n t e n t , and slides can
whether they are primarily oriented t o w a r d painting,
include hyperlinks.
drawing, or image editing, although these are general categories, not strict classifications. See E x h i b i t 3 - 1 8 .
Application Software for Working with Multimedia LO3.6
G
r a p h i c s are images, such as digital p h o t o g r a p h s ,
clip art, scanned drawings, and original images cre-
p r e s e n t a t i o n g r a p h i c s s o f t w a r e The type of program used to create electronic slide shows that can be run on individual computers or presented to a large group using a computer projector. g r a p h i c An image, such as a digital photograph, clip art, a scanned drawing, or an original image created using a software program. m u l t i m e d i a Any application that contains more than one type of
ated using a software p r o g r a m . M u l t i m e d i a technically
media; often used to refer to audio and video content.
refers t o any application that contains m o r e than one
g r a p h i c s s o f t w a r e A program used to create or modify images; also
type o f media, but is often used to refer t o audio and
called digital imaging software.
video c o n t e n t . T h e r e are a variety o f software p r o g r a m s
Chapter
3: Computer
Software
bitmap
Adobe P h o t o s h o p Elements, Ulead Photo Express, Ap-
i m a g e s , which are created by coloring the individual
ple iPhoto, Corel Paint Shop P r o P h o t o X 2 , M i c r o s o f t
pixels in an image. O n e o f the m o s t c o m m o n painting
Office Picture Manager, and the free Picasa 3 program.
p r o g r a m s is Microsoft Paint. Painting programs are of-
F o r professional image editing, A d o b e Photoshop is the
ten used to create and modify simple images, but, unless
leading program.
Painting
programs
traditionally
create
the painting program supports layers and other tools discussed shortly, use for these programs is relatively limited. This is because when something is drawn or
Audio Capture and Editing Software
placed on top o f a bitmap image, the pixels in the image
F o r creating and editing audio files, audio capture and
are recolored to reflect the n e w content, and whatever
audio editing software is used. T o capture sound from
was beneath the new c o n t e n t is lost. In addition, bit-
a m i c r o p h o n e , sound recorder software is used; to
mapped images c a n n o t be enlarged and still maintain
capture sound from a C D , ripping software is used. In
their quality, because the pixels in the images just get
either case, after the audio is captured, it can then be
larger, which m a k e s the edges o f the images look jag-
modified, as needed. For instance, background noise or
ged. Some painting p r o g r a m s (such as Corel Painter)
pauses can be removed, portions o f the selection can be
do support layers and so are m o r e versatile. Painting
edited out, multiple segments c a n be spliced together,
tools are also increasingly included in other types o f
and special effects such as fade-ins and fade-outs can be
software, such as in office suites and drawing programs.
applied. See Exhibit 3 - 1 9 . Also available are specialized
Drawing programs (also referred to as illustration programs) typically create v e c t o r g r a p h i c s , which use m a t h ematical formulas to represent image
^ ^ ^ ^ ^ ^ E x h i b i t 3-19
Audio editing software
content instead o f pixels. Unlike bitmap images, vector images c a n be resized and otherwise manipulated without loss o f quality. O b j e c t s in drawing programs can also typically be layered. So, if you place one object on top of another, you can later separate the t w o images if desired. D r a w i n g p r o g r a m s are often used by individuals and small business owners to create original art, logos, business cards, and m o r e . T h e y are also used by professionals t o create corporate images, W e b site graphics, and so forth. Popular drawing programs include Adobe Illustrator and CorelDRAW. Image
editing
or
photo
editing
programs are drawing or painting programs that are specifically designed for
I
touching up or modifying images, such as original digi-
audio capture and editing p r o g r a m s designed for spe-
tal images and digital p h o t o s . Some widely used con-
cific applications, such as creating podcasts or musical
sumer image editing and p h o t o editing programs are
compositions. Professional audio capture and editing software (such as Sony Creative Software Sound Forge 9 and Adobe Audition 3) is used to create professional
b i t m a p i m a g e A graphic created by coloring the
audio for end products, W e b pages, c o m m e r c i a l pod-
individual pixels in an image.
casts, presentations, and so forth. C o m m o n c o n s u m e r
v e c t o r g r a p h i c A graphic that uses mathematical formulas
audio capture and editing programs include W i n d o w s
to represent image content instead of pixels.
Sound Recorder, Apple G a r a g e B a n d , and Sony Creative Software Sound Forge Audio Studio s o f t w a r e .
m
Chapter
3: Computer
Software
E x h i b i t 3-20
Video creation software VIDEO EDITING
ALLOWS USERS TO IMPORT AND EDIT V I D E O ; THE FINISHED V I D E O CAN B E STORED IN A FILE OR INCLUDED IN A D V D PRESENTATION.
•' T I N •»»— 'OA/ft
A CLICK TO BURN THE FINISHED PRESENTATION TO A D V D .
A.
*—
flniHd
AH RIA AAA* A
AAA: I D % A I A U . A AAA" «4 A ,.AA, An A A 1 A AJ F A\ A A LV A A A 0 A
*A
T H E D V D INCLUDES THE V I D E O CLIPS
A*
ML A a AJ
AND U S E S THE TITLES AND A P P E A R A N C E DESIGNATED B Y THE USER.
A A
A
V I D E O CLIPS CAN B E EDITED AS N E E D E D ; THE T I M E L I N E IS U S E D TO CROP OUT S E C TIONS OF THE CURRENT V I D E O CLIP.
DVD AUTHORING ALLOWS USERS TO IMPORT AND ORGANIZE PHOTOS, V I D E O , AND M U S I C INTO A FINISHED D V D PRESENTATION.
Uideo Editing and DUD Authoring Software
D V D to control the playback o f those videos. D V D
Digital video can be imported directly into a video editing program by connecting the camera to the computer or by inserting the storage media containing the video (such as a D V D ) into the computer. After the video has been imported, video editing (such as deleting or rearranging scenes, adding voice-overs, and adding other special effects) can be performed, as shown in Exhibit 3 - 2 0 . Some video editing software today can edit video in high definition f o r m a t . D V D authoring refers to organizing c o n t e n t
to
be transferred to D V D , such as importing video clips and then creating the desired menu structure for the
burning refers to recording data (such as a c o l l e c t i o n of songs or a finished video) on a r e c o r d a b l e o r rewritable D V D . D V D authoring and burning
capabilities
are c o m m o n l y included with video editing capabilities in video creation software; there are also s t a n d - a l o n e D V D authoring programs, and D V D b u r n i n g capabilities are preinstalled on c o m p u t e r s c o n t a i n i n g a recordable o r rewritable optical drive. M a n y file m a n a g e m e n t programs (such as W i n d o w s E x p l o r e r ) include C D and D V D burning capabilities, as well.
Media Players M e d i a p l a y e r s are programs designed to play audio a n d video files available via your c o m p u t e r — s u c h as music
Individuals use video editing software to edit home videos or to create videos to upload to YouTube.
m e d i a p l a y e r A program designed to play audio and video files available via your computer.
Chapter
3: Computer
Software
Exhibit 3-21 Typical media player program
M Y LIBRARY IS SELECTED; U S E THE OTHER OPTIONS TO LISTEN TO THE RADIO, PURCHASE M U S I C , AND SO ON.
U S E THESE OPTIONS
—
B
TO V I E W T H E M E D I A FILES
Downtoadj » Recordngs
•
STORED ON YOUR
a
COMPUTER.
CD/DVD
CLICK TO PLAY A DISC IN YOUR C O M P U T E R ' S
t>
PtaySttocted
ft
Ed* d p Wo
C D OR D V D DRIVE.
B
Copy ToPtoy**
U S E THESE OPTIONS TO BURN A C D OR D V D ."
H
I
B " ^ LANDTORD.LV 9 NATIONAL GEOGRAPHIC VTDEO2.LV P"THE PROPOSATIV [ PMAROON 5 - MAKES ME WONDER.LV BROAOONAL GEOGRAPHIC VIDEO.LV B JONATHAN COJTON - Baby GOT B.. BBEATLES TODOWNLOAD BOOMTO... B GCCLA CAGE HIDDEN CAM VIDEO B AMAMG BREAK DANCE MOVES VIDEO J BFHXTIYFREESTYTEI VIDEO B Amazng LIGHTER TRXKHH VIDEO B FUNNY FREESTYLE' VIDEO2.LV B BEST GOAL CETEBRAOONS VIDEO BFOOTBALTYICKSVIDEO.LV BSTRANGEANMALS VIDEO BTNE WATER THWF VKJEO4 B9OW MOTION MENTDS GEYSER w ± . BATTEN COMPOSE VIDEO • BGPOLBCS.LV 0 2006 WHITE HOUSE CORRESPOND... BCOMH)YTWE TVE OFFICIAL SI... •ARVITIORWL GEOGRAPHIC VTDEO.FTV
***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** ***** *****
2:24 3:40 2:35 3:49 2:47 3:52 9:58
1:25 3:17 1:10 1:33 11:24 10:11 2:47
RASH VIDEO BS3 FIT; FLASH VIDEO 512 KBPS RASH VIDEO 334 KBPS RASH VIDEO 392KBPS RASH VIDEO 512 KBPS RASH VIDEO 400 KBPS RASH VIDEO 351KBPS RASH VIDEO RASH VIDEO RASH VIDEO RASH VIDEO RASH VIDEO 341KBPS RASH VIDEO RASH VIDEO 292 KBPS RASH VIDEO RASH VIDEO RASH VIDEO 344 KBPS RASH VIDEO RASH VIDEO 533KBPS RASH VIDEO 495 KBPS RASH VIDEO 496KBPS FLASH VW... 512 KBPS
8 *
4
1
± -a 2
~
i k with cts.
HTTP (Hypertext Transfer Protocol)—used to display Web pages
^
H T T P S (Secure H y p e r t e x t Transfer Protocol)—used to display W e b pages
^
F T P (File Transfer P r o t o c o l ) — u s e d to transfer files over the Internet
p r o t o c o l A set of rules to be followed in a specific situation. TCP/IP A networking protocol that uses packet switching to facilitate the transmission of messages; the protocol used with the Internet.
^
S M T P (Simple M a i l Transfer P r o t o c o l ) — u s e d t o deliver e-mail over the Internet
^
P O P 3 (Post Office P r o t o c o l ) — u s e d to deliver email over the Internet
Chapter
4 : Computer
Networks
E x h i b i t 4-12
How TCP/IP works
1. Each message is split into packets.
2 . The packets are addressed to the same destination. From:
[email protected] ftTTlj
To:
[email protected] From:
[email protected] j
j
To:
[email protected] From:
[email protected] SUE'S PC
4. The packets are reassembled into the message at the destination.
J I M ' S PC
Ethernet (802.3) E t h e r n e t (802.3) is the most widely used standard for wired n e t w o r k s . It is typically used with L A N s that have a star topology, though it can also be used with
|q^|
To:
[email protected] 3. The packets may travel the same or different routes to the destination.
University of Southern California (USC)
W A N s and M A N s , and can be used in c o n j u n c t i o n with twisted-pair, c o a x i a l , or fiber-optic c a b l i n g . A b o u t every three years, the n e w approved a m e n d ments are incorporated into the existing I E E E
802.3
Ethernet standard to keep it up t o date. E x h i b i t 4 - 1 3 summarizes the various Ethernet standards. O f these, the m o s t c o m m o n are Fast Ethernet, G i g a b i t E t h e r n e t ,
Experts suggest that busniesses perform a network audti to determnie what hardware and software changes wil be needed to swtich to IPv6.
and 1 0 Gigabit Ethernet. T h e even faster standards listed in E x h i b i t 4 - 1 3 are currently under development and are expected to be used for c o n n e c t i o n s between
E t h e r n e t The most widely used standard for wired networks.
E x h i b i t 4-13
avoid multiple messages f r o m being sent at one
Ethernet standards
time and to detect any collisions of messages as they occur. Beginning in 1 9 9 7 , Ethernet became
Standard
Maximum Speed
full-duplex, so collisions n o longer occur. A recent E t h e r n e t d e v e l o p m e n t is Power over
10BASE-T
10 Mbps
Fast Ethernet (100BASE-T or 100BASE-TX)
100 Mbps
be sent along the c a b l e s in an Ethernet n e t w o r k
Gigabit Ethernet (1000BASE-T)
1,000 Mbps (1 Gbps)
along with d a t a . T h e s e c a b l e s are often referred
10 Gigabit Ethernet (10GBASE-T)
10 Gbps
40 Gigabit Ethernet*
40 Gbps
100 Gigabit Ethernet*
100 Gbps
Terabit Ethernet**
1,000 Gbps (1 Tbps)
E t h e r n e t ( P o E ) , which a l l o w s electrical power to
t o as E t h e r n e t c a b l e s . C o n s e q u e n t l y , in addition to sending d a t a , the E t h e r n e t c a b l e can be used to supply p o w e r to the devices on the n e t w o r k . P o E is m o s t often used in business
networks
with r e m o t e wired devices, such as o u t d o o r netw o r k i n g h a r d w a r e , security c a m e r a s , and o t h e r
* Expected by 2010
devices, that are n o t l o c a t e d n e a r a p o w e r outlet.
** Expected by 2015
It c a n also be used t o p l a c e n e t w o r k e d devices near ceilings o r o t h e r l o c a t i o n s where a nearby p o w e r outlet m a y n o t be a v a i l a b l e . Using P o E re-
servers, as well as for delivering video, digital X - r a y s
quires special h a r d w a r e a n d devices designed for P o E
and other digital medical images, and other high-speed,
but it eliminates the need f o r a c c e s s t o power outlets
bandwidth-intensive, n e t w o r k i n g applications.
for that p o r t i o n o f the n e t w o r k . R e g u l a r Ethernetand
enabled devices c a n be p o w e r e d via P o E if a special
used a set o f procedures collectively called CSMA/CD
P o E adapter, such as the o n e s h o w n in E x h i b i t 4 - 1 4 ,
(Carrier Sense Multiple Access/Collision Detection) to
is used.
Early
Ethernet
E x h i b i t 4-14
Chapter
networks
were
half-duplex
Ethernet-enabled devices powered via PoE
4 : Computer
Networks
Wi-Fi (802.11)
lernet has continued t o
O n e o f the m o s t c o m m o n networking s t a n d a r d s used
olve since it w a s i m e n t o
with wireless L A N s is Wi-Fi (802.11), w h i c h is a f a m -
in t h e mid-1970s.
ily o f wireless networking standards that use the I E E E 8 0 2 . 1 1 standard. Wi-Fi is the current standard f o r wireless n e t w o r k s in the home or office, as well as f o r public W i - F i h o t s p o t s . It is sometimes called wireless E t h e r n e t because it is designed to easily c o n n e c t to a wired Eth-
Phoneline, Powerline, G.hn, and Broadband over Powerline (BPL)
ernet n e t w o r k . W i - F i hardware is built into virtually all
T w o alternatives t o the Ethernet standard for wired
when the user is within range of a W i - F i n e t w o r k . In a d -
h o m e n e t w o r k s are the Phoneline and Powerline stan-
dition to portable computers and m o b i l e p h o n e s , W i - F i
dards. P h o n e l i n e (also called the H o m e P N A Alliance
capabilities are becoming increasingly integrated into
o r H o m e P N A standard) allows c o m p u t e r s t o be net-
everyday products, such as printers, digital c a m e r a s ,
portable c o m p u t e r s sold today. It is also built i n t o m a n y mobile phones to allow faster W e b b r o w s i n g via W i - F i
w o r k e d t h r o u g h ordinary telephone wiring and tele-
portable digital media players, handheld g a m i n g de-
p h o n e j a c k s w i t h o u t interfering with voice telephone
vices, and gaming consoles (see E x h i b i t 4 - 1 5 ) , t o a l l o w
calls, as well as over existing h o m e c o a x i a l c a b l e wir-
those devices to wirelessly n e t w o r k with o t h e r devices
ing. T h e n e w e s t version o f this s t a n d a r d — H o m e P N A
or to access the Internet.
3 . 0 — s u p p o r t s speeds up to 3 2 0 M b p s and is designed t o n e t w o r k b o t h the c o m p u t e r s and the h o m e entert a i n m e n t devices within a h o m e . T h e Powerline (also called H o m e P l u g ) standard allows c o m p u t e r s t o be
E x h i b i t 4-15
Wi-Fi enabled products
n e t w o r k e d over existing p o w e r lines using c o n v e n tional
electrical
outlets. Similar
to
Phoneline
net-
w o r k s , P o w e r l i n e n e t w o r k s are quick and easy to set up a n d a r e relatively fast (up t o 2 0 0 M b p s ) . In addit i o n , they have the advantage that houses usually have m a n y m o r e p o w e r outlets than p h o n e outlets. Similar t o the n e w e s t Phoneline s t a n d a r d , the newest Powerline s t a n d a r d — n a m e d H o m e P l u g A V — c a n be used to n e t w o r k h o m e entertainment devices in addition to computers. T h e G . h n standard is an emerging standard designed as a unified worldwide standard for creating h o m e n e t w o r k s over phone lines, power lines, and c o a x i a l c a b l e . It is being promoted by the H o m e G r i d F o r u m and is supported by the H o m e P N A Alliance. O n c e the standard is finalized, products that support all three types o f h o m e networking c o n n e c t i o n s discussed in this section can be developed. An emerging technology based on the Powerline standard that is under development and that is designed to deliver b r o a d b a n d Internet to homes via the existing o u t d o o r p o w e r lines (with the addition o f some new
PORTABLE DIGITAL MEDIA P L A Y E R S
G A M I N G CONSOLES
h a r d w a r e at the power poles) is b r o a d b a n d over Powerline ( B P L ) . Currently, B P L service is available only in limited areas through the area's power company, but B P L has great potential for delivering b r o a d b a n d Internet access to virtually any h o m e or business that has
Wi-Fi (802.11) A widely used networking standard for medium-range wireless networks.
access to electricity.
C h a p t e r
4 :
C o m p u t e r
N e t w o r k s
27
T h e speed o f a Wi-Fi network and the area it can cover depend on a variety o f factors, including the Wi-Fi
802.1 ig and 802.1m products can
standard and hardware being used, the number of solid
b e used o n the s a m e network, b u t
objects, such as walls, trees, or buildings, between the ac-
c o m p u t e r s using older 802.1 ig
cess point and the computer or other device being used, and the amount o f interference from cordless phones, baby monitors, microwave ovens, and other devices that also operate on the same radio frequency as Wi-Fi (usually 2 . 4 G H z ) . In general, Wi-Fi is designed for medium-
hardware t o c o n n e c t t o 802. nn networks will only c o n n e 802.1 ig speed:
range data transfers—typically between 1 0 0 and 3 0 0 feet indoors and 3 0 0 to 9 0 0 feet outdoors. Usually both speed and distance degrade with interference. T h e distance of a Wi-Fi network can be extended using additional anten-
and about twice the range. To ensure
nas and other hardware designed for that purpose.
that hardware from various vendors
A s u m m a r y o f the different W i - F i standards in use
will work together, consumers can
and under development is s h o w n in Exhibit 4 - 1 6 . T h e
look for products that are certified
most widely used o f these are 8 0 2 . 1 l g and 8 0 2 . 1 I n .
by the Wi-Fi Alliance.
Fi CERTIFIED'
Courtesy Wi-Fi Alliance. The Wi-Fi CERTIFIED logo is a registered trademark of the Wi-Fi Alliance
While Wi-Fi is very widely used E x h i b i t 4-16
today, it does have some l i m i t a t i o n s —
Wi-Fi standards
particularly its relatively limited range. F o r instance, an individual using a W i -
Wi-Fi S t a n d a r d
Description
802.11b
An early Wi-Fi standard; supports data transfer rates of 11 Mbps,
802.11a
Supports data transfer rates of 54 Mbps, but uses a different
Fi hotspot inside a coffeehouse will
radio frequency (5 GHz) than 802.11 g/b (2.4 GHz), making the standards incompatible. A current Wi-Fi standard; supports data transfer rates of 54
802.11g
Mbps and uses the same 2.4 GHz frequency as 802.11 b, so their products are compatible. The newest Wi-Fi standard; supports speeds up to about 300
802.11n
Mbps and has twice the range of 802.11 g. It can use either the 2.4 GHz or 5 GHz frequency. Designed for Wi-Fi mesh networks.
802.11u*
Includes additional security features.
802.11Z*
Designed for direct (ad hoc) networking between devices.
802.11ac and
Designed to increase throughput.
802.11ad**
lose that Internet connection when he or she moves out o f range of that netw o r k and will need to locate another hotspot at his o r her next location. In addition, many businesses may be physically t o o large for a Wi-Fi netw o r k to span the entire organization. While hardware can be used to extend a Wi-Fi n e t w o r k , an emerging possibility for creating larger wireless networks is W i M A X .
802.11s*
WiMAX and Mobile WiMAX WiMAX
(Worldwide
Interoperability
for M i c r o w a v e Access) is a series o f
* Expected by 2010
standards designed for longer range
** Expected no earlier than 2012
wireless Similar
networking to
Wi-Fi,
connections.
WiMAX
(also
k n o w n as 802.16a) is designed to p r o T h e 8 0 2 . 1 I n standard is currently the fastest Wi-Fi
vide Internet access to fixed l o c a t i o n s , sometimes called
standard today. Its use of M I M O (multiple in, multiple
hotzones. However, W i M A X hotzones can provide ser-
out) antennas to transfer multiple streams of data at one
vice to anyone in the h o t z o n e , including mobile users,
time, in addition to other improvements, allows for data
while the range o f Wi-Fi hotspots is fairly limited. T h e
transmissions typically about five times as fast as 8 0 2 . 1 l g
coverage o f a hotzone is significantly larger; a typical
W i M A X (802.16a) An emerging wireless networking
transmit data as far as 6 miles o r so w i t h o u t line of
standard that is faster and has a greater range than Wi-Fi.
sight. W i t h W i M A X , it is feasible t o provide coverage
hotzone radius is close to 2 miles, t h o u g h W i M A X can
to an entire city or other geographical area by using
Chapter
4: Computer
Networks
I
Wi-Fi SD Cards O n e i n t e r e s t i n g n e w Wi-Fi p r o d u c t t h a t b e c a m e a v a i l a b l e r e c e n t l y is t h e Wi-Fi S D c a r d . T h e s e cards a r e d e s i g n e d t o u p l o a d p h o t o s wirelessly a n d a u t o m a t i c a l l y
Wi-Fi
Wi-Fi
2GB
f r o m y o u r c a m e r a t o y o u r c o m p u t e r via a Wi-Fi n e t w o r k .
Wi-Fi
2GB
4GB
S o m e cards c a n also t a g y o u r p h o t o s w i t h l o c a t i o n i n f o r m a t i o n b a s e d o n g e o g r a p h i c c o o r d i n a t e s as y o u t a k e
Courtesy Eye-Fi
t h e m (called geotags); others can automatically upload y o u r p h o t o s t o p h o t o sharing W e b sites like Flickr, Face-
directly t o y o u r computer w h i l e o n t h e g o w h e n e v e r
b o o k , o r Picasa.
t h e c a m e r a is in r a n g e o f y o u r c o m p u t e r .
F o r i n s t a n c e , a l l t h r e e Eye-Fi c a r d s in t h e a c c o m panying
p h o t o wirelessly transfer t h e p h o t o s
from
In a d d i t i o n t o a l l o w i n g y o u t o s h a r e y o u r
photos
i m m e d i a t e l y w i t h others, using a Wi-Fi S D c a r d f o r y o u r
y o u r digital camera t o y o u r h o m e c o m p u t e r as soon
digital p h o t o s c a n also give y o u t h e p e a c e o f m i n d t h a t
as t h e c a m e r a is w i t h i n r a n g e o f y o u r h o m e W i - F i n e t -
your photos are backed up on your h o m e computer and/
w o r k . T h e Eye-Fi S h a r e a n d t h e Eye-Fi P r o c a r d s c a n
o r o n l i n e . This is especially beneficial if y o u r c a m e r a is
w/relessly u p l o a d p h o t o s t o y o u r f a v o r i t e p h o t o
stolen o r t h e c a r d b e c o m e s d a m a g e d . In f a c t , using a n
a l s o
s h a r i n g W e b site, a n d t h e Eye-Fi P r o c a r d a u t o m a t i -
Eye-Fi c a r d e n a b l e d o n e w o m a n t o c a t c h t h e i n d i v i d u a l
cally g e o t a g s y o u r p h o t o s . In a d d i t i o n , t h e Eye-Fi P r o
w h o stole h e r c a m e r a g e a r w h i l e s h e w a s o n v a c a t i o n —
c a r d c a n u p l o a d v i d e o s a n d u n c o m p r e s s e d R A W files in
her p h o t o s , a l o n g w i t h images o f t h e t h i e f w i t h t h e c a m -
a d d i t i o n t o photos, send images t o p h o t o sharing W e b
era gear, w e r e u p l o a d e d t o h e r h o m e c o m p u t e r a n d t h e
sites a n d y o u r h o m e c o m p u t e r v i a a w i r e l e s s h o t s p o t
police w e r e a b l e t o a p p r e h e n d t h e t h i e f a n d r e c o v e r t h e
w h e n y o u are away from home, a n d upload
stolen gear.
photos
multiple W i M A X t o w e r s , similar t o the w a y cell p h o n e
t o deliver b r o a d b a n d wireless n e t w o r k i n g t o
cells o v e r l a p t o provide c o n t i n u o u s cell p h o n e service.
users via a m o b i l e p h o n e , p o r t a b l e c o m p u t e r , o r o t h e r
See E x h i b i t 4 - 1 7 . W i M A X c a n use licensed r a d i o fre-
W i M A X - e n a b l e d device. W i M A X c a p a b i l i t i e s a r e b e -
q u e n c i e s , in a d d i t i o n t o unlicensed frequencies like W i -
ginning t o be built into p o r t a b l e c o m p u t e r s a n d o t h e r
Fi, t o a v o i d interference issues.
devices, a n d W i M A X is currently being used t o provide
mobile
M o b i l e W i M A X (802.16e) is the m o b i l e version o f the
Internet access t o selected g e o g r a p h i c a l a r e a s by a n u m -
W i M A X wireless n e t w o r k i n g s t a n d a r d . It is designed
ber o f c o m p a n i e s in over 1 3 5 c o u n t r i e s . In t h e United S t a t e s , f o r i n s t a n c e , Sprint N e x t e l ' s W i M A X
E x h i b i t 4-17
WiMAX vs. Wi-Fi
division
and W i M A X leader C l e a r w i r e h a v e m e r g e d a n d are in ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
t h e p r o c e s s o f building a
new WiMAX-based
nationwide network
high-speed
designed
to
deliver b o t h fixed a n d mobile
WiMAX-based
I n t e r n e t service t o businesses a n d individuals.
mobile WiMAX
WiMAX hotzone
(802.16e) Aversion of WiMAX designed to be used
Wi-Fi hotspot
with mobile phones.
C h a p t e r
4:
C o m p u t e r
N e t w o r k s
29
Cellular Standards
up to about 1.7 M b p s at the present time, with speeds
Cellular standards have evolved over the years
to
better fulfill the demand for m o b i l e Internet, m o b i l e multimedia delivery, and o t h e r relatively recent m o bile trends. T h e original
first-generation
phones were
a n a l o g and designed for voice only. N e w e r cell p h o n e s , starting with s e c o n d - g e n e r a t i o n ( 2 G ) p h o n e s , are digital, support both data and v o i c e , and are faster. C o m -
expected to reach 3 M b p s in the near future. T h e s e speeds are equivalent to the speeds many home b r o a d band Internet users experience. Consequently, Internet access via a 3 G network is often referred to as mobile b r o a d b a n d . In addition to m o b i l e phones, computers can access the Internet via a 3 G n e t w o r k with appropriate hardware.
mon 2 G wireless standards include G S M ( G l o b a l System for M o b i l e c o m m u n i c a t i o n s ) and C D M A (Code Division M u l t i p l e A c c e s s ) . B o t h o f these standards are
veloped t e c h n o l o g i e s such as E D G E (Enhanced D a t a
Locked vs. Unlocked Phones
Rates for G S M
A l t h o u g h many mobile phones a r e locked t o a
designed for voice traffic and b o t h support speeds up to 1 4 . 4 K b p s , t h o u g h s o m e wireless providers have deE v o l u t i o n ) t h a t can be used with
2 G n e t w o r k s to provide faster service; for instance,
particular cellular provider, b u y i n g a n
E D G E supports speeds up t o 1 3 5 K b p s . T h e s e interim
mobile p h o n e allows y o u t o switch providers and
unlocked
developments are s o m e t i m e s referred to as 2 . 5 G cel-
k e e p y o u r s a m e p h o n e , as w e l l as carry y o u r c o n -
lular s t a n d a r d s . B o t h G S M a n d C D M A are used in
tacts a n d o t h e r d a t a w i t h y o u t o a n e w u n l o c k e d
the United States, a l t h o u g h they are n o t c o m p a t i b l e
p h o n e just by m o v i n g t h e S I M c a r d c o n t a i n i n g
with each other. ( S o m e p h o n e s t h a t can be used with
data to t h e n e w phone.
that
both standards are available.) G S M is also widely used overseas, though with different frequencies so international travelers will need t o ensure their 2 G phone supports the frequencies used in their destination loca-
Virtually all mobile phone providers today have, or
t i o n — s o m e 2 G p h o n e s s u p p o r t multiple frequencies
are in the process o f building, a 3 G network. T h e 3 G
to permit i n t e r n a t i o n a l r o a m i n g . T h e current standard for cellular networks today in
standard used with a n e t w o r k depends on the type of cellular network. F o r instance, G S M mobile networks,
the United States and m a n y other countries is 3 G (third
such as A T & T Wireless and T - M o b i l e , typically use the
generation). 3 G cellular standards use packet switching
H S D P A (High Speed D o w n l i n k P a c k e t Access)/UMTS
instead of circuit switching and are designed to support
(Universal
Mobile Telecommunications
System)
3G
both data and voice. Users o f 3 G mobile phones and
standards for their 3 G n e t w o r k s ; C D M A
other 3 G mobile devices c a n access b r o a d b a n d Internet
such as Verizon Wireless and C r i c k e t Wireless, typically
networks,
content (such as online m a p s , music, games, TV, videos,
use the E V - D O (Evolution D a t a Optimized) 3 G stan-
and more—see Exhibit 4 - 1 8 ) at relatively fast s p e e d s —
dard instead. T o get 3 G speeds, m o b i l e users need to be in range of their providers' 3 G n e t w o r k ; typically, users outside the coverage area can still get service, but only at 2 G speeds. T h e n e x t generation for m o b i l e
networks—4G
(fourth g e n e r a t i o n ) — i s under development and t w o standards have emerged so far: the mobile W i M A X standard already discussed and L o n g Term Evolution ( L T E ) . L T E , which is supported by A T & T Wireless, Verizon Wireless, and T - M o b i l e , is a cellular standard and is based on U M T S . L T E n e t w o r k s are expected t o arrive in the United States, by 2 0 1 1 . W h i l e m o b i l e W i M A X is not a cellular s t a n d a r d , the new n a t i o n a l W i M A X n e t w o r k being built in the U n i t e d States by Sprint N e x t e l and Clearwire will be used to provide 4 G mobile phone service t o s u b s c r i b e r s , in addition to Internet service.
Uuetooth can automatically
Personal Mobile Hotspots
synchronize a portable c o m p u t e r o r mobile phone w i t h a desktop
Y o u k n o w y o u c a n access W i - F i h o t s p o t s in m a n y l o c a t i o n s , b u t h o w a b o u t c r e a t i n g y o u r o w n hots p o t w h e n e v e r y o u n e e d it? T h a t ' s n o w possible w i t h several emerging products designed t o crea t e p e r s o n a l m o b i l e hotspots t h a t c a n b e
used
c o m p u t e r , or c o n n e c t a wireless keyboard as soon as t h e c o m p u t e r is p o w e r ^ ^ ^
w i t h a n y W i - F i d e v i c e , such as n o t e b o o k c o m p u t ers, m o b i l e p h o n e s , a n d p o r t a b l e g a m i n g d e v i c e s . One
such
Wireless's
product
MiFi
is
Verizon
Intelligent
Mobile
or less) c o n n e c t i o n s . It is designed to replace c a b l e s be-
H o t s p o t , s h o w n in t h e a c c o m p a n y -
tween devices, such as to c o n n e c t a wireless k e y b o a r d
ing illustration. T h e M i F i is a b o u t t h e
o r mouse to a desktop computer, to send print j o b s
size of s e v e r a l s t a c k e d c r e d i t
wirelessly f r o m a portable c o m p u t e r t o a printer, o r t o
cards.
its
c o n n e c t a mobile phone to a wireless headset. B l u e t o o t h
initial s e t u p , it
devices automatically recognize and n e t w o r k with each
After
creates a m o -
other when they get within transmission r a n g e . Blue-
by
t o o t h signals can transmit through clothing a n d o t h e r
the
nonmetallic o b j e c t s , so a mobile p h o n e o r o t h e r device
device. T h e MiFi device c o n -
in a p o c k e t or briefcase can c o n n e c t with B l u e t o o t h
bile h o t s p o t just
powering
up
nects t o V e r i z o n W i r e l e s s ' s 3G m o -
h a r d w a r e , such as a headset, w i t h o u t having t o be re-
bile n e t w o r k a n d p r o v i d e s access t o t h a t n e t w o r k
moved from the pocket or briefcase. In a d d i t i o n , s o m e
f o r u p t o f i v e Wi-Fi devices. To t h o s e devices, t h e
industry experts predict that m a j o r h o u s e h o l d appli-
M i F i h o t s p o t a p p e a r s as a n y o t h e r W i - F i h o t s p o t ,
ances will be Bluetooth-enabled in the f u t u r e , resulting
so users c o n n e c t as t h e y n o r m a l l y w o u l d . W h i l e
in an a u t o m a t i c , always connected, s m a r t h o m e .
t h e cost p e r M B is relatively e x p e n s i v e a n d t h e r e
Bluetooth works using radio signals in the frequency
is c u r r e n t l y n o u n l i m i t e d d a t a p l a n , this d e v i c e is
band of 2 . 4 G H z , the same as W i - F i . It traditionally sup-
useful f o r m a n y s i t u a t i o n s — s u c h as i P h o n e users
ports data transfer rates up to 3 M b p s , though the new-
w h o n e e d t o quickly d o w n l o a d files l a r g e r t h a n
est Bluetooth 3 . 0 standard incorporates 8 0 2 . 1 1
t h e limit a l l o w e d via a cellular c o n n e c t i o n a n d so
nology to support transfers up to 2 4 M b p s . W h e n t w o
n e e d t o use a Wi-Fi c o n n e c t i o n i n s t e a d , a n d f a m i -
Bluetooth-enabled devices c o m e within range of each
lies w h o w a n t t o all access t h e I n t e r n e t w h i l e t r a v -
other, their software identifies each other using their
j
tech-
e l i n g in a car. W i t h a r e c e n t poll i n d i c a t i n g t h a t
unique identification numbers and establishes a link. Be-
9 0 % o f c o n s u m e r s s u r v e y e d p r e f e r I n t e r n e t access
cause there may be many Bluetooth devices within range,
t o D V D v i d e o players in t h e i r cars, it a p p e a r s t h a t
up to 1 0 individual Bluetooth n e t w o r k s (called piconets)
m o b i l e p e r s o n a l hotspots a r e h o t .
can be in place within the same physical area at one time. Each piconet can connect up to eight devices, for a m a x i m u m of 8 0 devices within any 1 0 - m e t e r radius. See
Bluetooth, Ultra Wideband (1MB), and Other Short-Range Wireless Standards
Exhibit 4 - 1 9 . T o facilitate this, Bluetooth divides its al-
Several wireless networking standards are in existence
frequencies, jumping randomly (in unison with the other
or being developed that are designed for short-range
devices in that piconet) on a regular basis to minimize
located radio spectrum into multiple channels o f 1 M H z each. Each Bluetooth device can use the entire range o f
wireless networking connections. M o s t o f these are used to facilitate PANs or very small, special-purpose h o m e n e t w o r k s , such as connecting h o m e entertainment devices or appliances within a h o m e . Bluetooth is a wireless standard that is designed for
B l u e t o o t h A networking standard for very shortrange wireless connections. p i c o n e t A Bluetooth network.
very short-range ( 1 0 m e t e r s — a p p r o x i m a t e l y 3 3 f e e t —
C h a p t e r
4:
C o m p u t e r
N e t w o r k s
Exhibit
ECAUSE BLUETOOTH
4-19Piconets
The desktop computer, keyboard, printer, and mouse form a piconet to communicate with each other. The headset and cell phone (not shown in this photo) belong to another piconet.
The headset and cell phone form a piconet when they are within range to communicate with each other.
ANSMITTERS CHANGE FREQUENCIES 1 , 6 0 0 TI EVERY SECOND, TW< TRANSMITTING DEV ARE UNLIKELY TO B E SAME FREQUENCY AT SAME TIME.
A n e w s t a n d a r d t h a t is designed t o c o n n e c t peripheral devices, similar t o B l u e t o o t h , but t h a t transfers data more
quickly
is
wireless USB. The
speed o f wireless U S B depends on the distance
between
the
devices
being
used, but is a p p r o x i m a t e l y 1 0 0 M b p s interference between piconets, as well as from other de-
at 1 0 meters ( a b o u t 3 3 feet) o r 4 8 0 M b p s at 2 meters
vices, such as garage-door openers, Wi-Fi networks, and
(about 6 . 5 feet).
some cordless phones and baby monitors, that use the same frequencies. As the use o f Bluetooth g r o w s , the standard is evolving to meet new needs. F o r instance, Bluetooth 2 . 1 includes support for N e a r Field C o m m u n i c a t i o n s ( N F C ) , a standard for m a k i n g payments via mobile p h o n e , and the newest B l u e t o o t h 3 . 0 standard is fast enough to support multimedia applications, such as transferring music, p h o t o s , and videos between computers, mobile phones, and other devices. O n e interesting emerging Bluetooth application is intended to protect teenagers from texting or talking on their mobile phones while driving—a special Bluetooth-enabled car key prevents the driver's mobile phone from being used
Bluetooth and Wireless USB A l t h o u g h B l u e t o o t h a n d w i r e l e s s U S B can be used f o r similar a p p l i c a t i o n s , it is possible t h e y m i g h t coexist. For e x a m p l e , w i r e l e s s U S B m i g h t be used t o c o n n e c t c o m p u t e r h a r d w a r e in m o r e p e r m a n e n t setups, w h e r e a s B l u e t o o t h m i g h t be used in short-range m o b i l e s i t u a t i o n s w i t h p o r t a b l e c o m puters a n d m o b i l e devices.
while the car is on. T h e r e are several wireless technologies being dew i r e l e s s U S B A wireless version of USB designed to
cornea peripheral devices.
U l t r a W i d e b a n d ( U W B ) A networking standard for very shortrange wireless connections among multimedia devices. W i r e l e s s H D ( W i H D ) An emerging wireless networking specification designed for connecting home consumer devices.
veloped to transfer multimedia c o n t e n t quickly between nearby devices. O n e e x a m p l e is Ultra W i d e b a n d ( U W B ) . Similar to wireless U S B (because wireless U S B is based on U W B ) , U W B speeds vary f r o m 1 0 0 M b p s at 1 0 meters (about 3 3 feet) to 4 8 0 M b p s at 2 meters (about 6 . 5 feet). A n o t h e r possibility is W i r e l e s s H D ( W i H D ) . Similar
T r a n s f e r J e t A networking standard for wireless connections between
t o U W B , W i H D is designed for fast transfers o f high-
devices that are touching.
definition video between h o m e c o n s u m e r
electronic
devices, such as high-definition T V s , s e t - t o p b o x e s ,
C h a p t e r
4 :
C o m p u t e r
N e t w o r k s
g a m i n g c o n s o l e s , and D V D players, but it is B a c k e d by seven m a j o r electronics c o m p a n i e s , W i H D is designed t o transfer full-quality u n c o m p r e s s e d highdefinition a u d i o , video, and data within a single r o o m at speeds up t o 2 5 G b p s , t h o u g h t h o s e speeds have
,VB is especially a p p r o p r i a t e for applications that require high-speed transfers over short
n o t been o b t a i n e d yet. W i H D o p e r a t e s at 6 0 G H z and
distances, such as wirelessly
i n c o r p o r a t e s a smart antenna system t h a t allows the
delivering multimedia c o n t e n t . \\\\\\\\w
system t o steer the transmission, allowing for n o n line-of-sight c o m m u n i c a t i o n s . W i H D aims t o help users c r e a t e an e a s y - t o - m a n a g e wireless video n e t w o r k . Devices t h a t include W i H D capabilities began t o bec o m e a v a i l a b l e in 2 0 0 9 . A new wireless standard designed for very fast
Bee can be used for home and c o m m e r c i a l a u t o m a t i o n
transfers between devices that are extremely close t o -
systems to c o n n e c t a wide variety o f devices (such as
gether (essentially touching each other) is TransferJet.
appliances and lighting, heating, c o o l i n g , water,
Developed by Sony, TransferJet is designed to quickly
tion, and security systems), and allows for their c o n -
transfer large files, such as digital p h o t o s , music, and
trol from anywhere in the w o r l d . Z i g B e e is also used in
video, between devices as soon as they c o m e in c o n t a c t
industrial plant manufacturing, personal h o m e health-
with each other. F o r example, you can use TransferJet
c a r e , device tracking, t e l e c o m m u n i c a t i o n s , a n d wireless
to transfer data between mobile phones or between dig-
sensor n e t w o r k s .
ital c a m e r a s , to download music or video from a c o n -
ZigBee is designed to a c c o m m o d a t e m o r e
filtra-
than
sumer k i o s k or digital signage system to a mobile phone
6 5 , 0 0 0 devices on a single network and supports speeds
or other m o b i l e device, or to transfer images or video
from 2 0 K b p s to 2 5 0 Kbps, depending o n the frequency
from a digital c a m e r a to a T V set or printer. At a m a x i -
being used (several different frequencies are available
m u m speed o f 5 6 0 M b p s , TransferJet is fast enough to
for Z i g B e e n e t w o r k s ) . ZigBee has a range o f 1 0 t o 1 0 0
support the transfer of video files.
meters (about 3 3 to 3 2 8 feet) between devices, depend-
An emerging networking standard designed
for
ing on p o w e r output and environmental c h a r a c t e r i s t i c s .
inexpensive and simple short-range networking (par-
A wireless mesh configuration c a n be used t o greatly
ticularly sensor networks) is ZigBee ( 8 0 2 . 1 5 ) . ZigBee is
extend the range o f the network.
intended f o r applications that require low data transfer rates and several years of battery life. F o r instance, Zig-
E x h i b i t 4-20
F o r a s u m m a r y of the wireless n e t w o r k i n g standards just discussed, see E x h i b i t 4 - 2 0 .
Summary of common wireless networking standards
Category
Examples
Intended Purpose
Approximate Range
Short range
Bluetooth Wireless USB
To connect peripheral devices to a mobile phone
33 feet
or computer. Ultra Wideband (UWB)
To connect and transfer multimedia content
TransferJet
(computers, TVs, DVD players, etc.).
WirelessHD (WiHD) ZigBee
1 inch-33 feet
between home consumer electronic devices
To connect a variety of home, personal, and
33 feet-328 feet
commercial automation devices. Medium range Long range
Wi-Fi (802.11)
To connect computers and other devices to a local
100-300 feet indoors;
area network.
300-900 feet outdoors
WiMAX
To provide Internet access to a large geographic
Mobile W i M A X
area for fixed and/or mobile users.
6 miles non-line of sight;
Cellular standards (2G and 3G)
To connect mobile phones and mobile devices to a
30 miles line of sight
cellular network for telephone and Internet service.
C h a p t e r
4:
10 miles
C o m p u t e r
N e t w o r k s
describing devices used t o obtain Internet access via certain n e t w o r k s , such as cellular o r W i M A X networks. W h e n selecting a network adapter or modem, the \
/ arious types o f h a r d w a r e are necessary t o create a •
computer n e t w o r k , t o c o n n e c t multiple networks
together, or to c o n n e c t a c o m p u t e r or network t o the Internet. T h e following sections discuss the most c o m mon types o f networking h a r d w a r e used in h o m e and small office n e t w o r k s .
type o f device being used and the expansion slots and ports available on that device need t o be considered as well. F o r e x a m p l e , network adapters and modems for desktop computers typically c o m e in P C I , PCI Express (PCIe), o r U S B format, and n e t w o r k adapters and m o dems for portable computers usually connect via USB or an ExpressCard slot. In addition, the network adapter or m o d e m needs t o support the type o f networking m e -
Network Adapters and Modems
dia (such as twisted-pair cabling, c o a x i a l cabling, or
A n e t w o r k a d a p t e r , also called a n e t w o r k i n t e r f a c e c a r d
(NIC) when it is in the f o r m o f an expansion card, is used t o c o n n e c t a c o m p u t e r t o a network (such as a home or business n e t w o r k ) . A m o d e m (derived from the terms modulate
a n d demodulate)
is used t o c o n n e c t
a c o m p u t e r t o a n e t w o r k over telephone lines. Technically, t o be called a m o d e m , a device must convert digital signals (such as those used by a computer) t o modulated analog signals (such as those used by conventional telephone lines) a n d vice versa. However, in everyday use, the term modem
is also used t o refer t o
any device that c o n n e c t s a c o m p u t e r t o a broadband Internet c o n n e c t i o n , such as a cable m o d e m used for cable Internet service. In addition, the term modem often used interchangeably with network
adapter
is
when
• H I nternet
wireless signal) being used. S o m e examples o f network adapters and m o d e m s are s h o w n in Exhibit 4 - 2 1 .
Switches, Routers, and Other Hardware for Connecting Devices and Networks A variety o f networking h a r d w a r e is used to c o n n e c t the devices o n a n e t w o r k , as well as t o connect multiple n e t w o r k s together. F o r i n s t a n c e , as mentioned earlier in this chapter, n e t w o r k s using the star topology need a central device t o c o n n e c t all o f the devices on the n e t w o r k . In a wired n e t w o r k , this device w a s originally a h u b . A h u b transmits all data received t o all network devices c o n n e c t e d t o the h u b , regardless of which device the data is being sent t o , so the bandwidth o f the network is shared a n d the network is n o t extremely efficient. Today, the central device in a wired network is usually a s w i t c h . A switch contains ports to which the devices on the n e t w o r k c o n n e c t (typically via networking cables) and facilitates c o m m u n i c a t i o n s between the devices, similar t o a h u b . B u t , unlike hubs, switches identify which device c o n n e c t e d to the switch
odem a n d r 3 0 seconds, then plug in your m o d e m and wait 3 0 seconds
is the o n e the data is intended f o r a n d send the data only t o that device, rather than sending data out to all connected devices. Consequently, switches are more efficient than hubs.
then plug in your router.
Updating Firmware n e t w o r k a d a p t e r A device used to connect a computer to a network. n e t w o r k i n t e r f a c e c a r d (NIC) A network adapter in the form of an expansion card.
You can often update t h e firmware—embedded instructions—for a router a n d o t h e r
networking
hardware t o improve performance or obtain n e w capabilities. F i r m w a r e u p d a t e s a r e usually d o w n -
m o d e m A device that is used to connect a computer to a network over
l o a d e d f r o m t h e m a n u f a c t u r e r ' s site; o f t e n r o u t -
telephone lines.
er u p d a t e s n e e d t o b e installed w i t h a c o m p u t e r
s w i t c h A device that connects multiple devices on a wired network and
connected t o t h e device via a w i r e d , n o t wireless,
forwards data only to the intended recipient.
connection.
Exhibit 4-21 Network adapters and modems
T o c o n n e c t multiple networks (such as t w o L A N s , t w o W A N s , or a L A N and the Internet), a r o u t e r is
used. R o u t e r s pass data on to the intended recipient only and can plan a path t h r o u g h the network to ensure the data reaches its destination in the m o s t efficient manner possible, and are used t o route traffic over the Internet. A w i r e l e s s access p o i n t is a
de-
vice used t o grant network access to wireless client devices. In home and small business n e t w o r k s , typically the capabilities o f a switch, router, and wireless access point are integrated into a single w i r e l e s s r o u t e r
device. A wireless router (such as the one shown in E x h i b i t 4-22) is
r o u t e r A device that connects multiple networks together and passes data to the intended recipient using the most efficient route.
M o s t computers and mobile devices c o m e with a network
w i r e l e s s access p o i n t A device on a wireless network that connects wireless devices to that network. w i r e l e s s r o u t e r A router with a built-in wireless access point.
adapter and/or a m o d e m built in.
Chapter
4 : Computer
Networks
c o m m o n l y used to connect both wireless (via Wi-Fi)
A n o t h e r alternative for increasing the range o f
and wired (via Ethernet cables) devices to a network
a Wi-Fi
network
is using a higher-gain
(stronger)
and to connect that n e t w o r k to an Internet c o n n e c t i o n .
a n t e n n a . T h e M I M O a n t e n n a s used by many 8 0 2 . 1 I n
S o m e broadband modems today include wireless router
routers a l l o w for faster c o n n e c t i o n s and a greater
capabilities to create a wireless n e t w o r k and to provide
range than typically experienced by 8 0 2 . 1 l g wireless
Internet access using a single piece o f hardware. T o con-
n e t w o r k s , but sometimes this still isn't enough. Us-
nect just two L A N s together, a b r i d g e can be used. T h e
ing a n e t w o r k adapter designed f o r the router being
most c o m m o n use for a bridge in a h o m e network is to
used typically helps the n e t w o r k range to some e x t e n t ;
wirelessly c o n n e c t a wired device (such as a home au-
so does replacing the a n t e n n a on the router with a
dio/video system, D V R , or gaming console) to a home
higher-gain a n t e n n a or adding an external antenna to
network via a wireless c o n n e c t i o n .
a n e t w o r k i n g adapter, if the a d a p t e r contains an an-
Also, routers and other devices are used to connect
tenna c o n n e c t o r .
multiple devices t o a cellular n e t w o r k . F o r instance, 3 G mobile b r o a d b a n d routers are used to share a 3 G mobile wireless Internet c o n n e c t i o n with multiple devices (such as your cell p h o n e , personal computer, and handheld gaming device)—essentially creating a Wi-Fi hotspot that connects t o your 3 G Internet connection. Other devices can be used t o route cell phone calls over a b r o a d b a n d n e t w o r k in order to provide better cellular coverage while indoors.
Antennas W h e n b u y i n g a n e x t e r n a l a n t e n n a f o r a device, b e sure t h e y a r e c o m p a t i b l e . For instance, 802.11n MIMO
routers w i t h t h r e e a n t e n n a s cannot
use
a single a n t e n n a d e s i g n e d f o r 802.11g devices. T h e r e a r e also r a n g e e x t e n d e r s a n d
antennas
designed t o extend t h e r a n g e of a cellular netw o r k , such as t o b o o s t r e c e p t i o n i n s i d e a h o m e
Other Networking Hardware Additional networking h a r d w a r e is often needed to e x tend the range o f a n e t w o r k and to share networking
in o r d e r t o use a cell p h o n e as a p r i m a r y h o m e telephone.
media. R e p e a t e r s are devices t h a t amplify signals along a n e t w o r k . T h e y are necessary whenever signals have
A n t e n n a s c o m e in a variety o f f o r m a t s and are
possible
classified as either directional a n t e n n a s (antennas that
over the n e t w o r k i n g m e d i u m being used. Repeaters
c o n c e n t r a t e the signal in a p a r t i c u l a r area) or o m n i -
are available for b o t h wired a n d wireless n e t w o r k s ;
directional a n t e n n a s ( a n t e n n a s t h a t are equally effec-
repeaters for a wireless n e t w o r k are often called r a n g e
tive in all d i r e c t i o n s ) . D i r e c t i o n a l a n t e n n a s have a far-
e x t e n d e r s . R a n g e e x t e n d e r s usually c o n n e c t wirelessly
ther range than o m n i d i r e c t i o n a l a n t e n n a s , but a m o r e
to travel farther t h a n w o u l d be otherwise
t o the network and repeat the wireless signal to extend
limited delivery a r e a . T h e strength o f an antenna is
coverage of that n e t w o r k outside or to an additional
measured in decibels ( d B ) . F o r a p p l i c a t i o n s where a
floor o f a building, o r t o eliminate dead s p o t s — a r e a s
large W i - F i c o v e r a g e area is needed (such as in a large
within the n o r m a l n e t w o r k range that d o n ' t have cov-
business o r a h o t e l ) , high-gain o u t d o o r antennas c a n
erage. S o m e W D S (Wireless D i s t r i b u t i o n System) wire-
be used (in c o n j u n c t i o n with o u t d o o r range extenders
less access points can be used as range extenders by
and access p o i n t s , if needed) t o e n a b l e the n e t w o r k to
extending the n e t w o r k c o v e r a g e f r o m one access point
span a larger area than the h a r d w a r e would n o r m a l l y
to another.
allow. H i g h - s p e e d c o m m u n i c a t i o n s lines are expensive and a l m o s t a l w a y s have far g r e a t e r c a p a c i t y t h a n a
b r i d g e A device used to connect two LANs. r e p e a t e r A device on a network that amplifies signals. r a n g e e x t e n d e r A repeater for a wireless network. a n t e n n a A device used for receiving or sending radio signals and often used to increase the range of a network.
single device c a n use. B e c a u s e o f t h i s , signals f r o m multiple devices are o f t e n c o m b i n e d a n d sent t o gether to share a single c o m m u n i c a t i o n s m e d i u m . A m u l t i p l e x e r c o m b i n e s the t r a n s m i s s i o n s f r o m several different devices and sends t h e m as o n e m e s s a g e . R e gardless o f h o w the signals are s e n t , w h e n the c o m bined signal r e a c h e s its d e s t i n a t i o n , t h e
Chapter
4 : Computer
Networks
individual
Devices in a Network This is a n e x a m p l e of h o w t h e d e v i c e s discussed in this c h a p t e r m i g h t b e used in a n e t w o r k . A s s h o w n , m a n y d i f f e r e n t t y p e s o f h a r d w a r e a r e used t o c o n n e c t n e t w o r k i n g d e v i c e s .
DIAL-UP CUSTOMER
DIAL-UP CUSTOMER
DIAL-UP CUSTOMER
J )
SCHOOLS OR B U S I N E S S E S W I T H MULTIPLE LANS
m e s s a g e s are s e p a r a t e d f r o m o n e a n o t h e r . M u l t i p l e x -
Multiple analog signals can be sent at one time by using multiple frequencies, and multiple optical signals can be sent at one time by using multiple wavelengths.
ing is f r e q u e n t l y used w i t h
fiber-optic
cables
and
other high-capacity media to increase data throughp u t . F o r i n s t a n c e , if eight signals a r e m u l t i p l e x e d a n d sent t o g e t h e r o v e r e a c h fiber in o n e
fiber-optic
cable,
then the t h r o u g h p u t o f t h a t c a b l e is i n c r e a s e d by a f a c t o r o f eight. A c o n c e n t r a t o r is a type o f multiplexer t h a t c o m bines multiple messages a n d sends them via a single transmission medium in such a w a y that all the
Chapter
4 : Computer
N e tv
individual messages are simultaneously active, instead of being sent as a single c o m b i n e d message. F o r exam-1 pie, ISPs often use c o n c e n t r a t o r s t o c o m b i n e the signals from their conventional dial-up m o d e m customers to be sent over faster c o m m u n i c a t i o n s connections to their Internet destinations.
Practice It Practice It 4-1 H o m e networks—particularly wireless home n e t w o r k s — are becoming very c o m m o n . Suppose that you have a desktop computer and a n o t e b o o k computer, and you want to network the two computers wirelessly. You also want to use a printer with both computers. 1.
Quiz Yourself
Determine the hardware you will need to wirelessly network the t w o c o m p u t e r s and the printer.
1.
Define computer
network.
2.
Create a labeled sketch o f the n e t w o r k .
2.
H o w do GPS receivers determine the receiver's
3.
Create a list o f the hardware you need to acquire.
geographical location?
4.
Describe telecommuting.
4.
W h a t are the three m o s t c o m m o n network
network (excluding the cost o f the computers and the printer). R e c o r d the sources where you found
topologies? 5.
the prices.
W h a t is the difference between a client-server network and a peer-to-peer n e t w o r k ?
6.
Research the a p p r o x i m a t e c o s t o f the hardware to determine the overall cost o f creating the wireless
3.
5.
Prepare a one-page summary o f your
findings
that includes your sketch, and submit it to your
W h a t is a small n e t w o r k designed to c o n n e c t the
instructor.
personal devices for an individual (such as via Bluetooth) called?
Practice It 4-2
7.
W h a t is the world's largest W A N ?
As computers get smaller and devices such as cell phones
8.
W h a t is a virtual private n e t w o r k (VPN)?
have more capabilities, the differences between the vari-
9.
Describe the difference between digital and analog signals.
ous types o f computers are blurring. F o r example, most cell phones are capable o f surfing the W e b , sending and receiving email, as well as m a k i n g and receiving phone
1 0 . W h a t are the three m o s t c o m m o n types o f cables used to create wired n e t w o r k s ?
calls and text messages. 1.
Research W i - F i , W i M A X , and 3 G and 4 G net-
1 1 . W h a t is TCP/IP?
w o r k s . W h i c h type o f n e t w o r k s are used most
1 2 . W h a t is the most widely used standard for wired
often by cell phone users? W h y ?
networks?
2.
1 3 . W h a t is the current standard for wireless networks?
W h i c h type o f network do m o s t laptops use? W h a t a b o u t n e t b o o k s and slate computers?
3.
R e s e a r c h the c o s t o f 3 G d a t a p l a n s with at least t h r e e cell p h o n e c o m p a n i e s . W h a t is the
1 4 . W h a t is an emerging wireless n e t w o r k i n g stan-
a v e r a g e c o s t ? F i n d at l e a s t o n e c o m p a n y t h a t
dard t h a t is faster a n d h a s a g r e a t e r range t h a n
o f f e r s a 4 G d a t a p l a n . H o w d o e s the a v e r a g e
Wi-Fi?
c o s t o f the 3 G d a t a p l a n s c o m p a r e to the c o s t
1 5 . W h a t is Bluetooth?
o f the 4 G d a t a p l a n ?
1 6 . W h a t is a switch?
4.
If you need to transfer a large file from your cell phone or slate computer to a n o t h e r computer,
1 7 . W h a t does a router do?
which type o f network would be the fastest? H o w
1 8 . W h a t is a repeater?
much faster? W h a t conditions might affect download time? 5.
Prepare a one-page summary that answers these questions, and submit it to your instructor.
Chapter
4 : Computer
Networks
2.
On Your Own
for illegal purposes, should the o r g a n i z a t i o n o r person w h o set up the P2P n e t w o r k be respon-
On Your Own 4-1 Internet peer-to-peer (P2P) networking involves sharing files a n d other resources directly with other c o m -
sible? E x p l a i n your answer. 3.
e x c h a n g e d via an Internet P2P n e t w o r k , some content
W o u l d you w a n t to use an Internet P 2 P n e t w o r k ? W h y or w h y not?
puters via the Internet. While some c o n t e n t is legally 4.
(such as movies and music) is exchanged illegally. 1.
If a P 2 P n e t w o r k set up for legitimate use is used
Use the W e b to research m o r e a b o u t B i t T o r r e n t and Gnutella's LimeWire. D o y o u t h i n k these are legitimate P 2 P networks? W h y o r w h y n o t ?
Should Internet P2P networks be regulated to ensure they are used for only legal activities? W h y
5.
Prepare a one-page summary t h a t a n s w e r s these questions, and submit it t o y o u r instructor.
o r w h y not?
ADDITIONAL STUDYTOOLS
Chapter 4 IN THE BOOK
ONLINE
^
Complete end-of-chapter exercises
^
Complete additional end-of-chapter exercises
^
Study tear-out Chapter Review Card
^
Take practice quiz to prepare for tests
^
Review key term flash cards (online, printable, and audio)
^
Play "Beat the Clock" and "Memory" to quiz yourself
^
Watch the videos "How to Select a Wireless Router," "How to Set Up a Wireless Network," "How to Share a Printer over a Network," and "WiMAX vs. Wi-Fi"
Chapter
4:
Computer
Networks
1001010101
Networks and the Internet -
Introducing the Internet and Email Learning Objectives After studying the material in this chapter,
Introduction
you will be able to:
With the prominence o f the Internet in our personal and professional lives today, it is hard to believe that there was a time not t o o long ago when few people had even heard o f the Internet, let alone used it. But technology is continually evolving. In fact, it is only relatively recently that technology has evolved enough to allow the use of multimedia applications—such as downloading music and movies, watching T V and videos, and playing multimedia interactive g a m e s — o v e r the Internet to become everyday activities. Today, Internet
and World
Wide
Web are household w o r d s , a n d , in many ways, they have redefined h o w people think a b o u t c o m p u t e r s , c o m m u n i c a t i o n s , and the availability o f
LO5.I
Understand h o w the Internet
evolved
LO5.2
Describe c o m m o n Internet
LO5.3
Set up your computer to use
LO5.4
Use Microsoft Internet Explorer
communication methods and activities
the Internet
LO5.5
U
s
e
W i n d o w s Mail
news and information. Despite the popularity o f the Internet, however, many users c a n n o t answer some important basic questions a b o u t it. W h a t makes up the Internet? Is it the same thing as the World Wide Web? H o w did the Internet begin, and where is it heading? H o w can the Internet be used to find specific information? This chapter addresses these types of questions and m o r e .
LO5.1
Evolution of the Internet
T
he Internet is a worldwide collection o f separate, but interconnected, networks accessed
daily by millions o f people using a variety of devices to obtain information, dissemi-
nate information, access entertainment, or c o m m u n i c a t e with others. Although Internet
become
has
a household w o r d only during the past t w o decades or so, it has actually operated in
one form o r a n o t h e r for much longer than that. A R P A N E T The predecessor of the
From ARPANET to Internet2
Internet, named after the Advanced
T h e U.S. Department o f Defense Advanced R e -
Research Projects Agency (ARPA), which
search Projects Agency (ARPA) created A R P A N E T
sponsored its development.
in 1 9 6 9 . O n e objective of the A R P A N E T project
Chapter
5: Introducing
the Internet
and
Email
CHAPTER
In only 20years, Internet and World Wide Web have become household words and ubiquitous tools in our personal, social, and business lives and activities.
was t o create a computer network that would allow researchers located in different places t o c o m m u n i c a t e with each other. A n o t h e r objective w a s t o build a c o m p u t e r network capable o f sending o r receiving data over a variety o f paths to ensure that network c o m m u n i c a t i o n s could c o n t i n u e even if part o f the network w a s destroyed, such as in a nuclear attack or by a natural disaster. Initially, A R P A N E T connected four supercomputers and enabled researchers at a f e w dozen a c a d e m i c institutions t o c o m m u n i c a t e with each other and with government agencies. E x h i b i t 5 - 1 is a sketch o f A R P A N E T that w a s drawn in 1 9 6 9 . As the project grew during the next decade, students were granted access t o A R P A N E T as hundreds o f college and university n e t w o r k s were connected t o it. These networks consisted o f a mixture o f different c o m puters s o , over the years, protocols were developed f o r tying this m i x o f computers and netw o r k s together, for transferring data over the n e t w o r k , and f o r ensuring that data was transferred intact. Additional
net-
w o r k s soon connected t o A R P A N E T , and
began with an experimental
this i n t e r n e t — o r network o f n e t w o r k s —
project called A R P A N E
Internet.
r
eventually evolved into the present-day
Chapter
5: Introducing
the Internet
and
Email
E x h i b i t 5-1
met
Hand-drawn sketch of ARPANET
today is t h e result of the evolution o f ^ ^ ^ ^ ^ reation of the ^ W i d e M (WWW).
1
decades because (1) it required a c o m p u t e r and (2) it was hard to use (see the left image in E x h i b i t 5 - 2 ) . As always, however, c o m p u t e r and networking technology improved and new applications quickly followed. Then,
in
1989,
named T i m T
H
e
AtfA
a
researcher
Berners-Lee
pro-
posed the idea o f the World
******
W i d e W e b ( W W W ) . He envisioned the W o r l d Wide Web as
PEC
2
a way to organize information
Wdir 100 port cofwand successful 300 opening ASCII mode data connection for file list EH15 readie.txt Hon Apr 10 1:S2:04 1110 322S1 pkzip.exe Tues Sept L 0
dustry, g o v e r n m e n t , a n d the
ITCRC;
•
mSb?l iis-zip Sun Jan 17 ID:]
rfc M2D transfer complete ftp>cd rfc SDD cud command successful ftp>get rfc-contents-txt co itents.txt
international
community
that is dedicated t o the development o f r e v o l u t i o n a r y Internet t e c h n o l o g i e s . Internet2 uses h i g h - p e r f o r m a n c e n e t w o r k s linking over 2 0 0 m e m b e r institutions t o deploy and test n e w n e t w o r k applications
and
capabili-
ties. H o w e v e r , the I n t e r n e t 2 EARLY 1990S
n e t w o r k is n o t a n e w net-
TODAY
w o r k designed t o
eventu-
ally replace the I n t e r n e t — i t is simply
a
research
and
Although there is no precise definition, Web 2 . 0 generally
development tool t o help create t e c h n o l o g i e s t h a t en-
refers to applications and services that use the Web as a
sure the Internet in the future can handle t o m o r r o w ' s
platform t o deliver rich applications that enable people to
applications. M u c h o f I n t e r n e t ! research is f o c u s e d on
collaborate, socialize, and share information online. Some
speed. F o r instance, the Internet2 L a n d Speed R e c o r d is
Web 2 . 0 applications include cloud computing, social net-
an ongoing contest for the highest-bandwidth e n d - t o -
working sites, podcasts, blogs, and wikis.
end n e t w o r k . T h e current record is an average speed o f
T h e W e b is only part o f the Internet, but it is by far the m o s t widely used part. Today, m o s t c o m p a n i e s
9 . 0 8 G b p s while transferring 2 0 . 4 2 T B o f d a t a a c r o s s a b o u t 3 0 , 0 0 0 miles o f n e t w o r k .
regard their use o f the Internet and their World Wide W e b presence as indispensable competitive
business
tools, and m a n y individuals view the I n t e r n e t — a n d es-
The Internet Community Today
pecially the W e b — a s a vital research, c o m m u n i c a t i o n s ,
T h e Internet c o m m u n i t y today consists o f individuals, businesses, and a variety o f o r g a n i z a t i o n s located
and e n t e r t a i n m e n t medium.
t h r o u g h o u t the w o r l d . Virtually a n y o n e with a c o m puter o r other W e b - e n a b l e d device c a n be p a r t o f the Internet, either as a user or as a supplier o f i n f o r m a t i o n
The Internet Is Not the World Wide Web E v e n t h o u g h m a n y p e o p l e use t h e t e r m s a n d Web
Internet
interchangeably, they are not t h e same
o r services. M o s t members o f the Internet c o m m u n i t y fall into one or m o r e of the following g r o u p s : ^
U s e r s — P e o p l e w h o use the Internet t o retrieve c o n t e n t or perform online activities, such as t o l o o k up a telephone number, read the day's news
t h i n g . Technically, t h e I n t e r n e t is t h e physical n e t w o r k , a n d t h e W e b is t h e c o l l e c t i o n of W e b p a g e s accessible o v e r t h a t n e t w o r k . A m a j o r i t y o f I n t e r n e t a c t i v i t i e s t o d a y t a k e p l a c e via W e b p a g e s , b u t I n t e r n e t resources o t h e r t h a n t h e W e b a r e n o t accessed via a W e b b r o w s e r . For instance, files c a n b e u p l o a d e d a n d d o w n l o a d e d using a n FTP (File Transfer P r o t o c o l ) p r o g r a m a n d c o n v e n t i o n a l e m a i l c a n b e accessed using a n e m a i l p r o g r a m .
e Internet, a c c o r d i n g t o t h e P e w Internet & A m e r i c a n Life Project, is used by approximately 75 percent o f the U . S . population.
/
headlines or top stories, b r o w s e through an online c a t a l o g , make an online p u r c h a s e , d o w n l o a d a
^
^
Application service providers (ASPs)—The c o m p a n i e s that manage and distribute Web-based
music file, watch an online video, m a k e a p h o n e
software services to customers over the Internet.
call, or send an email message.
Instead o f providing access t o the Internet like ISPs d o , ASPs provide access t o software applica-
I n t e r n e t service p r o v i d e r s (ISPs)—Businesses or other organizations, including telephone, cable,
tions via the Internet. C o m m o n ASP applications
and satellite c o m p a n i e s , that provide Internet ac-
for businesses include office suites, collaboration
cess to others, typically for a fee. Exhibit 5 - 3 shows
and c o m m u n i c a t i o n s s o f t w a r e , accounting pro-
the logos o f some o f these c o m p a n i e s . Regardless
grams, and e-commerce s o f t w a r e .
o f their delivery m e t h o d and geographical coverage, ISPs are the o n r a m p t o the Internet, providing
^
I n f r a s t r u c t u r e c o m p a n i e s — T h e enterprises that own or operate the paths or " r o a d w a y s " along
their subscribers with access t o the World Wide
which Internet data travels, such as the Internet
Web, email, and other Internet resources. Some
backbone and the c o m m u n i c a t i o n s networks con-
ISPs also provide proprietary online services avail-
nected to it. Examples o f infrastructure companies
able only t o their subscribers.
include conventional and mobile phone companies, cable companies, and satellite Internet providers.
E x h i b i t 5-3 ISP logos
^
H a r d w a r e a n d s o f t w a r e c o m p a n i e s — T h e organizations that m a k e and distribute the products
^at&t
used with the Internet and Internet activities. For e x a m p l e , companies that create o r sell the software used in c o n j u n c t i o n with the Internet, such
verizon
as W e b browsers, email p r o g r a m s , e-commerce and multimedia software, and W e b development
(comcast.
tools, fall into this category. S o , t o o , do the com-
HUGHES
panies that m a k e the h a r d w a r e , such as network adapters, m o d e m s , cables, routers, servers, com-
Connect to the future:
puters, and mobile p h o n e s , for instance, that is
clearwre
0
E a r t h Link'
used with the Internet. ^
G o v e r n m e n t s — T h e ruling bodies of countries that can pass laws limiting both the information made
wireless broadband
available via Web servers located in a particular country and the access individuals residing in that country have to the Internet. F o r example, in France,
Use of the AT&T logo is granted under permission by AT&T Intellectual Property.; Courtesy of Verizon
Communications; Comcast; Hughes Network Systems, LLC; EarthLink, Inc.; and Clearwire
it is illegal to sell items or post online content related to racist groups or activities. In China, tight controls are imposed on what information is published on
I n t e r n e t c o n t e n t p r o v i d e r s — T h e suppliers o f the i n f o r m a t i o n t h a t is available through the
Web servers located in China, as well as on the in-
Internet. Internet c o n t e n t providers can be c o m -
formation available to its citizens. And in the United
mercial businesses, nonprofit organizations,
States, anything illegal offline is illegal online.
educational institutions, individuals, and m o r e .
^
K e y I n t e r n e t o r g a n i z a t i o n s — O t h e r organizations that are responsible for m a n y aspects o f the
I n t e r n e t service p r o v i d e r (ISP) A business or other organization that provides Internet access to others, typically for a fee.
Internet. F o r e x a m p l e , the Internet Society ( I S O C ) provides leadership in addressing issues that may impact the future o f the Internet. It also oversees
I n t e r n e t c o n t e n t p r o v i d e r A person or an organization that
the groups responsible for Internet infrastructure
a p p l i c a t i o n s e r v i c e p r o v i d e r (ASP) A company that manages
that can be used and h o w Internet addresses
provides Internet content.
standards, such as determining the p r o t o c o l s
and distributes software-based services over the Internet.
are constructed. I C A N N (Internet C o r p o r a t i o n for Assigned N a m e s and N u m b e r s ) c o o r d i n a t e s
Chapter
5: Introducing
the Internet
and
Email
Who's in Charge of the Internet and the World Wide Web? O n e r e m a r k a b l e characteristic of b o t h t h e I n t e r n e t a n d
and coordinating communications a m o n g
W o r l d W i d e W e b is t h a t t h e y a r e n o t o w n e d by a n y
networks connected t o the Internet. G o v e r n -
p e r s o n o r business, a n d n o s i n g l e p e r s o n , business, or
m e n t s in e a c h c o u n t r y
o r g a n i z a t i o n is in c h a r g e . E a c h n e t w o r k c o n n e c t e d t o
r e g u l a t e t h e c o n t e n t a n d use of t h e I n t e r n e t
t h e I n t e r n e t is privately o w n e d a n d m a n a g e d i n d i v i d u -
w i t h i n t h e i r b o r d e r s , as a l l o w e d by t h e i r l a w s .
have the p o w e r
th to
ally by t h a t n e t w o r k ' s a d m i n i s t r a t o r , a n d t h e p r i m a r y
However,
i n f r a s t r u c t u r e t h a t m a k e s u p t h e I n t e r n e t b a c k b o n e is
stacles g e t t i n g l e g i s l a t i o n passed i n t o l a w — l e t
legislators o f t e n f a c e serious o b -
t y p i c a l l y o w n e d by c o m m u n i c a t i o n s c o m p a n i e s , such as
a l o n e g e t t i n g it e n f o r c e d . M a k i n g g o v e r n m e n t a l
t e l e p h o n e a n d c a b l e c o m p a n i e s . T h e closest t h e I n t e r -
t r o l e v e n h a r d e r is t h e " b o m b p r o o f " d e s i g n o f t h e I n -
n e t c o m e s t o h a v i n g a g o v e r n i n g b o d y is a g r o u p o f o r -
t e r n e t itself. If a g o v e r n m e n t tries t o block access t o o r
g a n i z a t i o n s , i n c l u d i n g t h e ISOC, I C A N N , a n d W 3 C , t h a t
f r o m a specific c o u n t r y or W e b site, f o r e x a m p l e , users
a r e i n v o l v e d w i t h issues such as e s t a b l i s h i n g t h e p r o -
c a n use a t h i r d party, such as a n i n d i v i d u a l l o c a t e d in
con-
tocols used o n t h e Internet, making recommendations
a n o t h e r c o u n t r y or a d i f f e r e n t W e b site, t o c i r c u m v e n t
for changes, and encouraging cooperation
t h e block.
between
activities related to the Internet's naming system,
G o o g l e T a l k ; Web-based messaging services such as
such as IP address allocation and domain n a m e
M e e b o . c o m or W e b versions o f A I M , Y a h o o ! M e s s e n -
m a n a g e m e n t . T h e World W i d e W e b C o n s o r t i u m
ger, or G o o g l e T a l k ; or other online c o m m u n i c a t i o n s
( W 3 C ) is a group of over 4 5 0 organizations dedi-
programs that support instant messaging. O r i g i n a l l y a
c a t e d t o developing new p r o t o c o l s and specifica-
popular c o m m u n i c a t i o n s method a m o n g friends, I M
tions t o p r o m o t e the evolution o f the W e b and
has also b e c o m e a valuable business t o o l . I n s t a n t mes-
t o ensure its interoperability. In addition, many
saging capabilities are also sometimes integrated into
colleges and universities support Internet research
W e b pages, such as to ask questions o f a c u s t o m e r ser-
and m a n a g e blocks of the Internet's resources.
vice representative or to start a c o n v e r s a t i o n with o n e o f your friends via a social networking site; this type o f messaging is sometimes referred to as c h a t .
LO5.2
I
Beyond Browsing and Email
Text m e s s a g i n g is a f o r m o f messaging frequently
used by mobile phone users. Also called S h o r t M e s s a g e Service o r S M S , text messaging is used t o send short
n addition to basic browsing and email, m a n y other activities c a n take place via the Internet. Although
originally the programs that supported these various types o f online c o m m u n i c a t i o n s were dedicated to a single t a s k , today's programs often can be used for a variety o f types o f online c o m m u n i c a t i o n s .
^
^ ^ ^ ^ ^ ^ ^ ^ Instant messaging ( I M ) uses presence technology, w h i c h allows one c o m p u t i n g device t o
Other Types of Online Communications
identify the status o f another.
I n s t a n t m e s s a g i n g ( I M ) allows you to e x c h a n g e real-
time typed messages with people on your buddy l i s t — i n s t a n t m e s s a g i n g (IM) A way of exchanging real-time
a list of individuals such as family, friends, and business associates w h o m you specify. Instant
( I M s ) can be sent via computers and mobile phones using
installed
Windows
Live
messaging Messenger,
programs Yahoo!
such
typed messages with other individuals.
messages as
AIM,
Messenger,
t e x t m e s s a g i n g A way of exchanging real-time typed messages with other individuals via a cellular network and, typically, cell phones.
or
Chapter
5 : Introducing
the
(less than 1 6 0 characters) text-based messages via a cel-
from c o m p u t e r t o computer, such as by starting a voice
lular network. T h e messages are typically sent t o the
conversation with an online buddy using an I M pro-
recipient via his or her m o b i l e p h o n e number.
gram and a headset or m i c r o p h o n e connected to the
T w e e t i n g , sometimes referred t o as microblogging,
computer. C o m p u t e r - t o - c o m p u t e r calls, such as via the
is a free service that allows members (both individu-
popular Skype service, as well as via messaging pro-
als and businesses) to post short (up to 1 4 0 characters)
grams that support voice calls, are generally free. Often
updates—called t w e e t s — a b o u t what they are doing at
calls c a n be received from o r m a d e t o conventional o r
any moment. T h e updates can be sent via text message,
mobile phones f o r a small fee, such as t w o cents per
I M , email, or even X b o x (see Exhibit 5 - 4 ) , and are posted
minute for domestic calls.
to the member's Twitter.com page. Tweet updates can
M o r e p e r m a n e n t VoIP s e t u p s — s o m e t i m e s referred
also be sent t o your friends' mobile phones if they have
to as digital voice, b r o a d b a n d p h o n e , o r Internet phone
set up their accounts t o follow you via text. Members can
service—are designed to replace c o n v e n t i o n a l landline
also search the Twitter W e b site to find tweets o f interest.
phones
in h o m e s
and businesses. VoIP
is offered
through some ISPs, such as c a b l e , telephone, and E x h i b i t 5-4
mobile
Twitter
phone
companies;
it
is
also
through
offered dedicated
VoIP providers, such as
Vonage.
Perma-
nent VoIP setups require
a
broadband
Internet
connection
and
a VoIP
phone
adapter, also
called
an
phone
Internet
adapter,
that
between
a
goes
conven-
tional phone and a b r o a d b a n d router, as shown in Exhibit 5 - 5 . Once
your
phone
calls
are
routed
through your phone adapter
and router
t o the Internet, they travel t o the recipient's
phone,
which
c a n be another VoIP Internet telephony is the original industry term for
phone, a mobile p h o n e , o r a landline phone. VoIP
the process o f placing telephone calls over the Internet.
phone adapters are typically designed for a specific
Today, the standard term f o r placing telephone calls
VoIP provider. W i t h these m o r e permanent VoIP set-
over the Internet o r any other type o f data network is
ups, most users switching f r o m landline phone service
V o i c e o v e r I n t e r n e t P r o t o c o l ( V o I P ) and it can t a k e m a n y
can keep their existing telephone number.
forms. At its simplest level, VoIP calls c a n take place
T h e biggest advantage o f VoIP is cost savings, such as unlimited local and long-distance calls for as little as $ 2 5 per m o n t h , or cable and VoIP services bundled
t w e e t i n g Sending short status updates about your
together for a b o u t $ 5 0 per m o n t h . O n e o f the biggest
current activities via the Twitter service.
disadvantages o f VoIP at the present time is that it does
V o i c e o v e r I n t e r n e t P r o t o c o l (VoIP) The process of
not function during a power outage o r if your Internet
placing telephone calls via the Internet.
connection goes down.
W e b c o n f e r e n c e A face-to-face meeting taking place via the Web.
W e b conferences typically take place via a personal computer or mobile phone and are used by businesses
Chapter
5: Introducing
the Internet
and
Email
E x h i b i t 5-5
How VoIP works
your Face-book p a g e t o the individuals you
identift.
W///MWMMM/
THE INTERNET.
locations, as well as for e m p l o y e e training, sales presentations, c u s t o m e r s u p p o r t , a n d
1. A conventional phone is plugged into a VoIP adapter, which is connected to a broadband modem.
3HB j
other business applications. W e b i n a r s (Web seminars) are similar to W e b conferences, but typically have a designated presenter and an audience. A l t h o u g h interaction with the audience is usually included, a Webinar is typically m o r e o n e - w a y c o m m u n i c a t i o n than a W e b c o n f e r e n c e . A social n e t w o r k i n g s i t e c a n
. Calls coming from the VoIP phone travel over the Internet to the recipient's phone.
be l o o s e l y
defined as any site that creates a c o m m u nity o f individuals w h o c a n c o m m u n i c a t e with and/or share i n f o r m a t i o n another.
Some
examples
are
with
one
MySpace
and F a c e b o o k , which a l l o w users t o p o s t
and individuals. Basic Web conferences, such as a video
information
call between individuals as in E x h i b i t 5 - 6 , can be per-
M e e t u p . c o m , which connects people with
f o r m e d via any online c o m m u n i c a t i o n s p r o g r a m , such
hobbies and interests; video sharing sites like Y o u T u b e ;
as an instant messaging program, that supports video
and p h o t o sharing sites like Flickr and F o t k i . Social
p h o n e calls. Business Web conferences that require mul-
networking can be performed via personal c o m p u t e r s ,
tiple participants or other c o m m u n i c a t i o n tools, such
though the use o f mobile social n e t w o r k i n g — s o c i a l net-
as a shared w h i t e b o a r d or the ability for attendees to
w o r k s accessed with a mobile phone or o t h e r m o b i l e
share the c o n t e n t on their c o m p u t e r screens, may need
device—is growing rapidly. In fact, J u p i t e r
to use W e b conferencing software or services instead.
predicts the n u m b e r of active m o b i l e social n e t w o r k -
Business W e b conferencing is often used for meetings
ing users will rise from 5 4 million t o d a y to 7 3 0 mil-
between individuals located in different geographical
about
themselves
for
others
to
read;
common
Research
lion in five years, and M y S p a c e expects half o f its traffic to c o m e from mobile devices within a few years. S o m e reasons for this include that m o s t individuals c a r r y a
E x h i b i t 5-6
Web conferencing
mobile p h o n e with them all the t i m e , m a n y individuals like to c o m m u n i c a t e with others via the W e b while they are on the g o , and the use o f a m o b i l e p h o n e enables location applications to be integrated into the social networking experience. Social networking sites are used m o s t often t o c o m municate with existing friends. F a c e b o o k , for instance (shown in E x h i b i t 5 - 7 ) , allows you to post p h o t o s , videos, music, and other content. Y o u c a n also c h a t with
W e b i n a r A seminar presented via the Web. social n e t w o r k i n g site A site that enables a community of individuals to communicate and share information.
Chapter
5: Introducing
the Internet
and
Email
E x h i b i t 5-7
Social networking sites
MARK ZUCKCRBCRG • Press t h e E n t e r key.
Internet E x p l o r e r adds http://
to the
U R L , and then displays the page in the b r o w s e r window.
and then click
dress b a r changes t o the address for t h a t page. ^
T
j
p
.
Y
q
uc
a
n a
|
s
Q
c
|
j
c
k
t h e G o t o b u t t o n «•> on t h e Address bar
Visiting Preuiously Viewed Web Pages
to display t h e p a g e
After you visit a W e b page during a b r o w s e r session,
indicated by the URL.
you can use the B a c k and F o r w a r d b u t t o n s t o the left o f the Address b a r t o move t o the m o s t recently viewed
T h e h o m e page for
W e b pages. Y o u c a n also quickly g o t o t h e start page
the N A S A W e b site appears, and the n a m e o f the
for your b r o w s e r by clicking the H o m e b u t t o n o n t h e
W e b page appears on the t a b and in the title bar.
C o m m a n d bar. O n c e y o u have visited a W e b page by typing its U R L in the Address bar, you can start typing the U R L ,
The Dynamic Web
and a list o f W e b sites you previously visited t h a t c o n -
The
d r o p - d o w n list b e l o w the Address bar.
Web
is a d y n a m i c m e d i u m , so t h e screen-
tain the string o f characters you are typing appears in a
shots o f W e b p a g e s s h o w n in t h i s b o o k w i l l m o s t likely d i f f e r f r o m t h e p a g e s y o u s e e w h e n t h e Web
p a g e s a p p e a r in y o u r b r o w s e r w i n d o w . Y o u
l o a d To copy a Web page from a server to a computer,
s h o u l d still b e a b l e t o i d e n t i f y t h e e l e m e n t s c a l l e d o u t in t h e f i g u r e s .
h o m e p a g e The main page on a Web site.
C h a p t e r
5:
I n t r o d u c i n g
t h e
I n t e r n e t
a n d
E m a i l
Y o u
c a n c l i c k t h e
b u t t o n
Go to previously viewed Web pages.
t o v i e w
Q u i c k
t h u m b n a i l s o f all
ft
THE left of the A D D R E S S BAR, click the B a c k b u t t o n @ . T h e previously viewed Web p a g e — the NASA Web site h o m e p a g e — a p p e a r s in the browser window. N o w the F o r w a r d button is
a N e w T a b . W h e n you open a n e w t a b by right-clicking a
available.
link, the current tab and the new t a b create a t a b g r o u p ,
f W ) T o the left o f the Address bar, click the F o r w a r d button Q
. T h e A b o u t N A S A page loads again.
T h e F o r w a r d button is again unavailable (dimmed) because there are n o m o r e pages after the current page in the history list. I O n the C o m m a n d bar, click the H o m e b u t t o n [||
which is a collection o f related t a b s . W h e n multiple tabs are open, the tab that appears t o be on t o p is the active t a b . T o m a k e another tab the active t a b and display the Web page on that tab in the b r o w s e r window, click the tab. Finally, you can close a t a b for a W e b page that n o longer interests you.
Your browser's start page appears in the browser
ACTIVITY
window. ) C l i c k in the A d d r e s s b a r , and then type n. A list o f U R L s beginning w i t h n t h a t were visited using
Use tabs. \% T o the right o f the N A S A - H o m e t a b , point to the
the b r o w s e r a p p e a r s b e l o w the Address bar. See
N e w Tab b u t t o n . T h e N e w T a b b u t t o n
Exhibit 5 - 1 9 .
on it.
| In the list, click http://www.nasa.gov/. T h e N A S A
I Click the N e w T a b b u t t o n
appears
A new tab appears in
the browser window. In the Address bar, the text
W e b site home page appears again.
" a b o u t : T a b s " appears. T h i s t e x t appears in the
Exhibit 5-19 List of previously visited Web pages
U
Address bar whenever a new, blank t a b is created.
[http://www.nasa. gov/ i Favorites w < "1 ^ http://nascar.corr com/
previously visited W e b pages beginning with n (your list might differ)
P
Love what Bing can bring'' Take it with you everywhere you go on the web
Using Tabs
T h e text in the Address b a r is selected. See
T a b s allow you to display multiple W e b pages in the same browser window. W i t h t a b b e d browsing, you can
Exhibit 5 - 2 0 . | Type w w w . u s a . g o v and then press the Enter key.
create a tab for each W e b page you visit that you might
T h e h o m e page for the USA.gov W e b site appears
want to return to quickly. T o open a new t a b , you click
in the new t a b .
the N e w T a b button t o the right o f the current tabs, or right-click a link on a W e b page, and then click O p e n in
I Scroll down to the bottom of the page. Right-click the
t a b g r o u p A collection of related tabs,
Contact Us link, and
a c t i v e t a b The tab that appears to be on top in a browser window.
then on the shortcut
C h a p t e r
5:
I n t r o d u c i n g
the
I n t e r n e t
and
menu, click O p e n in
Email
^k, T i p : Y o u c a n also press a n d h o l d t h e Ctrl k e y w h i l e y o u c l i c k a link to o p e n t h e linked p a g e in a n e w t a b .
E x h i b i t 5-20
New, blank tab in Internet Explorer window
NewTab Favorites -
fT
^
Suggested Sites •
button
G e t More Add-ons *
^ ! New Tab
© NASA - Home
Page
Safety
Tools •
QuickTabs button Browsls with InPrivate
REOPEN CLOSED TABS View tabs that you've closed £ince starting Internet Explorer.
n e w t a b in
Browse the\web without storing data about your browsing session. Open an InPrivat\ Browsing window
front of N A S A • H o m e tab
USE AN ACCELERATE
C
|
Open a web service with 1 .
O
S
E
T
A
B
fed
from a webpaqe.
button
Show copied text FP Blog with Windows Live Map with Bing T=> Search with Bing •fe Translate with Bing
|
Learn more about tabs and tab shortcuts. Accelerators, and InPrivate Browsing
* . Internet | Protected Mode: On
N e w T a b . A new tab opens to the right of the current tab displaying Contact Us: USA.gov as the Web
[]P
LlOOtt -
Right-click the NASA - H o m e t a b , and then on the shortcut menu, click Close O t h e r Tabs. T h e USA.gov
page title on the tab. The USA.gov tab and the Con-
tab closes, and the N A S A - H o m e t a b b e c o m e s the
tact Us: USA.gov tabs are the same color to indicate
current t a b .
they are in the same tab group. I Click the C o n t a c t Us: U S A . g o v t a b . The
C o n t a c t Us page b e c o m e s the active tab in the window.
^ K , T i p : Y o u c a n click t h e
Using Search Sites
Q u i c k T a b s b u t t o n |OO|
Finding
t o t h e left o f t h e first
through the p o w e r o f search engines, a v a i l a b l e
tab to see thumbnail
search sites. S e a r c h sites are W e b sites designed
i m a g e s of o p e n tabs,
information
on the I n t e r n e t
is m a d e
p o p u l a r search engines are G o o g l e , Bing (the
USA.gov t a b , point
a thumbnail to switch
search engine f o r Internet E x p l o r e r
to the C l o s e T a b
to that tab.
w h i c h is n o w p o w e r e d by M i c r o s o f t Bing
button [ X L The
specifi-
cally t o help you find i n f o r m a t i o n o n the W e b .
a n d t h e n y o u c a n click
I O n the C o n t a c t U s :
easier
through
8 ) , and
Some default
Yahoo!,
technology.
but-
ton changes to [ X I C l i c k the Close Tab b u t t o n
T h e C o n t a c t Us:
s e a r c h site A Web site designed to help users search
USA.gov tab closes. Because there is only one t a b
for Web pages that match specified keywords or selected categories.
left in the tab group that had been colored green, the JJSA.gov
tab is n o longer colored.
Chapter
5:
Introducing
the
Internet
and
Email
search sites use a s e a r c h
Most
engine—a
software
E x h i b i t 5-21
program—
Using a search site
in c o n j u n c t i o n with a huge d a t a base o f i n f o r m a t i o n a b o u t W e b
v ga
' *Go g.,-W,ndow, Internet fepiore, 0
|
pages t o help visitors find W e b
•
google.com
ft - B '
pages that c o n t a i n t h e i n f o r m a -
• I- '
P»gei^
tion they are seeking. Search
site
databases
Type appropriate keywords in the search box to display the search results.
are
updated o n a regular basis; f o r example, G o o g l e
estimates
that
its entire index is updated a b o u t once per m o n t h . Typically, this o c curs using small, a u t o m a t e d p r o grams (often called spiders o r w e bcrawlers) that use the hyperlinks located o n W e b pages t o j u m p continually At
each
from
page t o page.
W e b page, t h e spider
program records i m p o r t a n t data about the page into t h e search site's d a t a b a s e , such as t h e page's U R L , its title, the k e y w o r d s that appear
frequently o n t h e page,
and the keywords a n d descriptive information added t o t h e page's code
by the W e b page
author
when the page was created. In ad-
Type In the name of your favorite artist, song or composer and well create a radio station featuring that mustc and more like it.
dition t o spider p r o g r a m s , search
lartist o
site databases also o b t a i n information from W e b page
authors
w h o submit W e b page U R L s a n d keywords
associated
Click the hyperlink for a Web page in the search results to display that page.
with
»> i Internet | Protected Mode: Off
their
W e b sites to the search site. T o conduct a search, type a p propriate k e y w o r d s — o n e o r m o r e words describing w h a t you are looking f o r — i n t o a search b o x on a search site. Multiple keywords are sometimes called a search p h r a s e . T h e site's search engine then uses those keywords t o return a list o f links t o W e b pages (called hits) that match your search criteria (see Exhibit 5 - 2 1 ) . Search sites differ in determining h o w close a
Evaluating Web Sites W h e n y o u g a t h e r i n f o r m a t i o n f r o m W e b pages, y o u n e e d t o d e t e r m i n e if t h e i n f o r m a t i o n c a n be trusted. Y o u should e v a l u a t e b o t h t h e author a n d t h e source t o d e c i d e if t h e i n f o r m a t i o n c a n b e c o n s i d e r e d r e l i a b l e a n d w h e t h e r it is biased. B e
s e a r c h e n g i n e A software program used by a search
sure t o also check f o r a d a t e t o see h o w u p t o d a t e
site to retrieve matching Web pages from a search database. k e y w o r d A word typed in a search box on a search site or other Web page to locate information related to that keyword.
is i m p o r t a n t , t r y t o v e r i f y t h e i n f o r m a t i o n w i t h a s e c o n d source.
hit A link that matches search criteria in a search site.
5:
I n t r o d u c i n g
o l d . If y o u w i l l b e using t h e i n f o r m a t i o n in a r e port, paper, o r o t h e r d o c u m e n t in w h i c h accuracy
s e a r c h p h r a s e Multiple keywords.
C h a p t e r
t h e i n f o r m a t i o n i s — m a n y o n l i n e articles a r e y e a r s
the
I n t e r n e t
a n d
E m a i l
Setting a Search Engine in Internet Explorer
^ T I P : IF T H E SEARCH
Search the Internet
P H R A S E Y O U W A N T TO
using a search engine.
USE APPEARS IN THE
I T o the right o f the
Y o u c a n c h a n g e t h e search e n g i n e used w i t h t h e S e a r c h b o x in I n t e r n e t Explorer. To d o this, click t h e S e a r c h box a r r o w , a n d t h e n click F i n d M o r e P r o v i d e r s . T h e I n t e r n e t Explorer A d d - o n s G a l l e r y W e b p a g e a p p e a r s listing search e n g i n e s y o u c a n
S E L E C T IT A N D E X E C U T E
the S e a r c h b o x , and
THE SEARCH.
then type live g r e e n .
A list o f suggestions for completing the search phrase appears. See E x h i b i t 5 - 2 2 .
a d d . Click t h e search e n g i n e y o u w a n t t o use, a n d t h e n click A d d t o I n t e r n e t Explorer. This o p e n s
LIST, Y O U C A N CLICK IT TO
Address bar, click in
E x h i b i t 5-22
Using the Search box
t h e A d d S e a r c h P r o v i d e r d i a l o g box. If y o u w a n t t h e s e a r c h e n g i n e y o u selected t o b e t h e d e f a u l t s e a r c h e n g i n e , click t h e M a k e this m y
X
default
s e a r c h p r o v i d e r check box t o select it. Click A d d t o
Bing Suggestions
close t h e d i a l o g box a n d a d d t h e search e n g i n e t o
•
t h e S e a r c h box.
I I
m a t c h m u s t be between the specified search criteria and a W e b page before a link to that page is displayed, so the n u m b e r o f hits from one search site t o a n o t h e r may vary. You
can
also
use the
Search
box
in
Internet
E x p l o r e r t o access a search site. T h e Search b o x is lo-
live green live green expo live green go yellow live green live smart live green in piano live green landscape associates live green twin cities
suggestions for completing the
live greenery
search phrase
Update
121 See how Live Search has evolved
cated to the right o f the Address bar. T o c o n d u c t a search using the S e a r c h b o x , you type keywords in the Search b o x , and then click the Search button [pj or press the
I T o the right o f the Search b o x , click the S e a r c h
Enter key t o begin the search. T h e hits are displayed on
b u t t o n [pj. A list o f hits for the search p h r a s e live
the search site you used.
green
O f t e n , a search phrase returns millions o f hits. T o
appears in your default search site in the
current t a b . Usually, the first 1 0 hits a p p e a r on the
n a r r o w the search, you can add w o r d s to the search
page and links to additional pages o f results are
phrase. F o r e x a m p l e , if you type cooking
listed at the b o t t o m o f the p a g e .
as the search
phrase, the list o f results will include recipe sites, sites with definitions o f c o o k i n g , links t o b o o k s a b o u t c o o k -
| Scroll d o w n the page to e x a m i n e the t o p 1 0 hits.
ing, and so o n . T o restrict the list o f results t o only W e b
| Scroll b a c k up t o the top o f the p a g e , click in the
sites that c o n t a i n recipes for c o o k i n g in the fusion style
S e a r c h box at the top o f the search site page after
with fish, you c a n add fusion,
the k e y w o r d green.
fish,
and recipes
search phrase.
to the
Press the S p a c e b a r , type o n a
b u d g e t and then press the E n t e r k e y . T h e list o f results changes to include only W e b sites t h a t discuss living green on a budget. | Scroll d o w n the list on the first page o f results a n d click one t h a t interests you. T h e W e b page you
Spider p r o g r a m s c a n b e tremendously fast, visiting millions o f pages per day.
clicked loads in the current t a b , replacing the list o f results. E x a m i n e the W e b page you selected. ) T o the left o f the Address bar, click the B a c k b u t t o n Q . T h e list of results appears in the t a b again.
C h a p t e r
5 :
I n t r o d u c i n g
t h e
I n t e r n e t
a n d
E m a i l
After you close your b r o
Favorites tab in the Favorites Center E x h i b i t 5-23
t h e pages you visited are n available via t h e tabs o r B
O
N o t i c e that in the list o f results, the
^
link you clicked has changed from blue to purple t o indicate that you
Favorites tab
have visited that W e b page.
bar
wnasa^gjErt^
S
A d d to Favorites...
eHow
0_
Suggested Sites *
•
A
History
Pin t h e
|, Favorites Bar
Favorites
Microsoft Websites
| To the left of the Address bar, click the
favorite added to
®
Favorites Center
| | Government Sites
NASA - Home ©
Using Favorites Web addresses can be very long and, as a result, difficult
button
W i n d o w s Live
^^^^^
browser window again.
Center
M S N Websites
twice. T h e h o m e page on the
N A S A Web site appears in the
a d d e d to
NASA - Home - W i n d o w s Internet E x p l o r e - ^
and F
SPYWARE ADWARE 4 SPYWARE 4 BACKDOOR 0 TROJAN 1 DIALER • SPYWARE £ TROJAN £ TROJAN
• °'* Tf
n
w o r m A malicious program
j ROGUE % ROGUE A TROJAN
designed to spread rapidly to a large
of computers by sending copies of
itself to other computers. Trojan h o r s e A malicious program that masquerades as something else.
SCARING: |||||| LLLLLLLLLLLLLLLLLLLL [SCAN NOW] GET FULL REAL-TIME PROTECTION WITH ANTIVIRUS 2009
Remove
Path: Infections found:
40
Q SAVE REPORT
E x h i b i t 6-4
How a DoS attack might work
The hacker's computer sends several simultaneous requests; each request asks to establish a connection to the server but supplies false return information. In a distributed DoS attack, multiple computers send multiple requests at one time.
Hello? I'd like some info...
Hello? I'd like some info... 2. The server tries to respond to each request but can't locate the computer because false return information was provided. The server waits for a short period of time before closing the connection, which ties up the server and keeps others from connecting.
'm busy, I can't help you right
I can't find y o u , Til wait and try again...
HACKER'S COMPUTER
LEGITIMATE COMPUTER
.The hacker's computer continues to send new requests, so as a connection is closed by the server, a new request is waiting.This cycle continues, which ties up the server indefinitely.
4. The server becomes so overwhelmed that legitimate requests cannot get through and, eventually, the server usually crashes.
Hello? I'd like some info... W E B SERVER
it, n o t realizing the program is a T r o j a n horse. Some
a r e s p o n d i n g ping b a c k t o a false r e t u r n a d d r e s s , o r
T r o j a n horses today act as spyware and are designed to
to
find private information located on infected computers
e n o u g h useless traffic is g e n e r a t e d , t h e server h a s n o
and then send that information t o the m a l w a r e creator
r e s o u r c e s left t o deal with legitimate r e q u e s t s (see
to be used in illegal activities. A n o t h e r type o f T r o j a n
E x h i b i t 6 - 4 ) . An emerging trend is D o S a t t a c k s a i m e d
horse records every keystroke made on the infected
at m o b i l e wireless n e t w o r k s . T h e s e a t t a c k s t y p i c a l l y
request
nonexistent
information
continually.
If
computer, a n d then sends the sensitive information it
involve repeatedly establishing a n d r e l e a s i n g c o n n e c -
recorded t o criminals.
tions with the g o a l o f o v e r l o a d i n g t h e n e t w o r k t o disrupt service.
Denial of Service (DoS) Attacks A d e n i a l o f s e r v i c e ( D o S ) a t t a c k is an a c t o f s a b o t a g e
t h a t a t t e m p t s t o flood a n e t w o r k server or W e b server
DoS
attacks
today
are o f t e n
directed
toward
p o p u l a r sites a n d typically are c a r r i e d o u t via multiple c o m p u t e r s . T h i s is k n o w n as a d i s t r i b u t e d d e n i a l of s e r v i c e ( D D o S ) a t t a c k . D D o S a t t a c k s are typically
with so m a n y requests for a c t i o n t h a t it shuts d o w n or
p e r f o r m e d by b o t n e t s created by h a c k e r s ; the c o m p u t -
simply c a n n o t handle legitimate requests a n y longer,
ers in the b o t n e t participate in t h e a t t a c k s w i t h o u t the
c a u s i n g legitimate users t o be denied service. F o r e x -
o w n e r s ' k n o w l e d g e . Because h o m e c o m p u t e r s are in-
a m p l e , a h a c k e r might set up o n e or m o r e c o m p u t e r s
creasingly using direct Internet c o n n e c t i o n s but tend
t o c o n t a c t a server c o n t i n u a l l y with a request t o send
to be less p r o t e c t e d than s c h o o l a n d business c o m p u t ers, h a c k e r s are increasingly targeting h o m e c o m p u t ers f o r b o t n e t s used in D D o S a t t a c k s a n d o t h e r f o r m s of computer sabotage.
is c o m m o n ror an types o f d e n i a l of s e r v i c e (DoS) a t t a c k An act of
malware to be referred t o as
sabotage that attempts to flood a network server or a Web
"viruses," even though s o m e
server with so much activity that it is unable to function. d i s t r i b u t e d d e n i a l of s e r v i c e ( D D o S ) a t t a c k A DoS attack
m i g h t not technically
carried out by multiple computers.
c o m p u t e r vi ruses.
ter
6:
Network
and
Internet
Security
and
Privacy
T h e best protection against m a n y d o t cons is pro-
Security c o m p a n y W e b s e n s e
tecting your identity—that is, protecting any identifying
reports that over half o f the W e b
information a b o u t you that could be used in fraudu-
sites classified as malicious are
lent activities. W i t h any dot c o n , it is important t o a c t
actually legitimate W e b sites that
stance, you should w o r k with your local law enforce-
quickly if you think you have been a victim. F o r inment agency, credit card c o m p a n i e s , and the three
have been c o m p r o m i s e d .
m a j o r consumer credit b u r e a u s — E q u i f a x ,
Experian,
and T r a n s l l n i o n — t o close any accessed or fraudulent
\\\\\\\\\\\\\\\\\\\\\
accounts, place fraud alerts o n your credit report, and take other actions t o prevent additional fraudulent a c tivity while the fraud is being investigated.
Data, Program, or Web Site Alteration Another type o f c o m p u t e r sabotage occurs when a
Theft of Data, Information, and Other Resources
hacker breaches a c o m p u t e r system t o delete data, change data, modify p r o g r a m s , o r otherwise alter the data and programs located there. F o r e x a m p l e , a stu-
D a t a t h e f t or i n f o r m a t i o n t h e f t is the theft o f data or
dent might try t o h a c k into the school database t o
information located on o r being sent from a computer.
change his o r her grade, o r a hacker might change a
It can be committed by stealing an actual computer, or
program located o n a c o m p a n y server t o steal money
it can take place over the Internet o r a network by an
or information.
individual gaining unauthorized access t o that data by
D a t a on W e b sites c a n also be altered by hackers.
hacking into the computer o r by intercepting the data
For instance, individuals sometimes hack into and alter
in transit.
other people's social n e t w o r k i n g a c c o u n t s . In early
M o n e y is another resource that c a n be stolen via a
2 0 0 9 , for instance, the Twitter accounts o f over 3 0
computer. C o m p a n y insiders sometimes steal money by
high-profile individuals, including then President-elect
altering c o m p a n y programs t o transfer small amounts
O b a m a , were accessed by an unauthorized individual
of m o n e y — f o r e x a m p l e , a few c e n t s ' w o r t h o f bank a c -
who sent o u t fake and sometimes embarrassing tweets
count interest—from a very large n u m b e r o f transac-
posing as those individuals. It is also becoming more
tions t o an a c c o u n t controlled by the thieves. Added
c o m m o n for hackers t o c o m p r o m i s e legitimate Web sites
together, the amounts
and then use those sites t o perform malware attacks.
can be substantial.
Another
example o f monetary theft performed via computers
Typically, a hacker alters a legitimate site t o display an
involves hackers electronically transferring money il-
official-looking message that informs the user that a
legally from online bank a c c o u n t s , traditional
particular software p r o g r a m must be downloaded, or
bank
accounts, credit card a c c o u n t s , o r accounts at online
the hacker posts a rogue b a n n e r ad on a legitimate site
payment services such as PayPal.
that redirects the user t o a m a l w a r e site instead o f the
Y o u should be vigilant a b o u t p r o t e c t i n g private
site for the product featured in the banner a d .
i n f o r m a t i o n by sending sensitive i n f o r m a t i o n via secure W e b servers only a n d n o t disclosing personal
Online Theft, Online Fraud, and Other Dot Cons
y o u r m o t h e r ' s maiden n a m e — u n l e s s it is absolutely
A booming area of computer crime involves online fraud,
be used a n d t h a t it will n o t be s h a r e d with o t h e r s . In
i n f o r m a t i o n — e s p e c i a l l y a S o c i a l Security n u m b e r o r necessary a n d y o u k n o w h o w t h e i n f o r m a t i o n will
theft, scams, and related activities designed to steal money
a d d i t i o n , never give o u t sensitive p e r s o n a l i n f o r m a -
or other resources from individuals or businesses—these
tion t o a n y o n e w h o requests it over the p h o n e o r by
are collectively referred t o as dot cons.
e m a i l ; businesses t h a t legitimately need b a n k a c c o u n t i n f o r m a t i o n , p a s s w o r d s , o r credit c a r d n u m b e r s will n o t request t h a t i n f o r m a t i o n via p h o n e o r e m a i l . E n -
d o t c o n A fraud or scam carried out through the Internet.
crypting c o m p u t e r s a n d o t h e r h a r d w a r e c o n t a i n i n g
d a t a t h e f t ( i n f o r m a t i o n t h e f t ) The theft of data or
sensitive i n f o r m a t i o n so it will n o t b e r e a d a b l e if the
information located on or being sent from a computer.
h a r d w a r e is lost o r stolen is a n o t h e r i m p o r t a n t prec a u t i o n discussed later in this c h a p t e r .
Chapter
6:
Network
and
Internet
Security
and
Privacy
E x h i b i t 6-5
How identity theft works
1. The thief obtains information about an individual from discarded mail, employee records, credit card transactions, Web server files, or some other method.
2. The thief uses the information to make purchases, open new credit card accounts, and more in the victim's name. Often, the thief changes the address on the account to delay the victim's discovery of the theft.
3. The victim usually finds out by being denied credit or by being contacted about overdue bills generated by the thief. Clearing one's name after identity theft is time-consuming and can be very difficult and frustrating for the victim.
Identity Theft, Phishing, and Pharming A l t h o u g h information u s e d
A growing dot c o n trend is obtaining enough inform a t i o n a b o u t an individual to perform fraudulent financial t r a n s a c t i o n s . Often, this is carried out in c o n -
identity theft is often g a t h e r
junction with identity theft. I d e n t i t y t h e f t occurs when
via c o m p u t e r , it can also b e
s o m e o n e o b t a i n s enough information a b o u t a person to
obtained from mailboxes, tras
be able t o masquerade as that person—usually to buy products o r services in that person's n a m e , as illustrated
dumpsters, and o t h e r locatio
in E x h i b i t 6 - 5 . Typically, identity theft begins with o b taining a person's name, address, and Social Security number, often from a discarded or stolen d o c u m e n t , such as a preapproved credit card application that was
credit card or debit card numbers by using an illegal de-
sent in the mail; from information obtained via the In-
vice attached to an A T M or credit card reader that reads
ternet, such as a resume posted online; from informa-
and stores the card numbers t o be retrieved by the thief
tion located on a computer, such as on a stolen c o m -
at a later time. Social engineering involves p r e t e n d i n g —
puter or h a c k e d server; or from information sent from
typically via phone or email—to be a b a n k officer, poten-
a c o m p u t e r via a computer virus or spyware program
tial employer, or other trusted individual in order to get
installed on that computer. T h e thief may then order a
the potential victim to supply personal information.
copy o f the individual's birth certificate, obtain a " r e -
P h i s h i n g (pronounced " f i s h i n g " ) is the use o f a
p l a c e m e n t " driver's license, m a k e purchases and charge them to the victim, and/or
spoofed email m e s s a g e — a n email that appears to c o m e
open
from a legitimate organization such as eBay, PayPal, o r
credit or bank accounts in the vic-
a b a n k , but is actually sent from a p h i s h e r — t o trick
tim's n a m e . Identity theft is illegal and,
in 1 9 9 8 , the federal govern-
ment passed the Identity T h e f t and
i d e n t i t y t h e f t Using someone else's identity to
Assumption Deterrence Act, which
purchase goods or services, obtain new credit cards or bank
made identity theft a federal crime. Other
commonly
used
loans, or otherwise illegally masquerade as that individual.
tech-
p h i s h i n g The use of spoofed email messages to gam credit card
niques are skimming and social engi-
numbers and other personal data to be used for fraudulent purposes.
neering. Skimming involves stealing
Chapter
6:
Network
and
Internet
Security
and
Privacy
S p e a r p h i s h i n g s c h e m e s m i g h t
i n c l u d e p e r s o n a l i z e d
i n f o r m a t i o n . t h e
m a
D o n ' t b e f o o l e d
e m a i l i s .
usually include an urgent message stating that the individual's credit card or a c c o u n t information needs t o be updated and instructing the recipient o f the email t o click the link provided in the email in order to keep the account active, as shown in E x h i b i t 6 - 6 . If the victim
I d e n t i t y t h e f t c a n b e e x t r e m e l y distressing f o r vic-
clicks the link and supplies the requested information
tims, c a n t a k e y e a r s t o s t r a i g h t e n o u t , a n d c a n b e
via the spoofed site, the criminal gains access to all in-
v e r y e x p e n s i v e . F o r e x a m p l e , f o r a y e a r a n d a half,
formation provided by the victim. Phishing attempts
a t h i e f used t h e i d e n t i t y o f v i c t i m M i c h e l l e B r o w n
can also occur via instant messages, text messages, fake
t o o b t a i n o v e r $50,000 in g o o d s a n d services, t o
messages sent via eBay or M y S p a c e , Twitter tweets, and
r e n t p r o p e r t i e s — e v e n t o e n g a g e in d r u g t r a f f i c k -
pop-up security alert w i n d o w s . Phishers also frequently
ing. A l t h o u g h t h e c u l p r i t w a s e v e n t u a l l y a r r e s t e d
utilize spyware; typically, clicking the link in the phish-
a n d c o n v i c t e d f o r o t h e r c r i m i n a l acts, she c o n t i n -
ing email installs the spyware o n the victim's computer,
u e d t o use B r o w n ' s i d e n t i t y a n d w a s e v e n b o o k e d
and it will remain there, transmitting passwords and
i n t o jail using B r o w n ' s s t o l e n identity. A s a f i n a l
other sensitive data t o the phisher, until it is detected
insult a f t e r t h e c u l p r i t w a s in prison, U.S. C u s t o m s
and removed.
agents detained t h e real Michelle B r o w n w h e n
Another recent trend is the use o f more targeted,
she w a s r e t u r n i n g f r o m a t r i p t o M e x i c o b e c a u s e
personalized phishing schemes, k n o w n as spear phishing.
of t h e criminal r e c o r d o f t h e i d e n t i t y t h i e f . B r o w n
Spear phishing emails are directly targeted to a specific
states t h a t s h e h a s n o t t r a v e l e d o u t o f t h e c o u n -
individual and typically appear t o c o m e from an organi-
try since, f e a r i n g a n a r r e s t o r s o m e o t h e r serious
zation or person that the targeted individual has an asso-
p r o b l e m r e s u l t i n g f r o m t h e t h e f t o f h e r identity,
ciation with. T h e y also often include personalized infor-
a n d estimates s h e h a s s p e n t o v e r 500 h o u r s t r y i n g
mation, such as the potential victim's name, to make the
t o correct all t h e p r o b l e m s r e l a t e d t o t h e i d e n t i t y theft.
spear phishing emails seem even m o r e legitimate. Spear phishers also target employees o f selected organizations
T^^^iP^B^p^pjgl^F
by posing as someone within the company, such as a human resources or technical support employee. These
the recipient into revealing sensitive personal informa-
spear phishing emails often request confidential informa-
tion, such as W e b site logon i n f o r m a t i o n or credit card
tion or direct the employee t o click a link to supposedly
numbers. O n c e o b t a i n e d , this i n f o r m a t i o n is used in
reset his or her password. T h e goal o f corporate spear
identity theft and other fraudulent activities. A phish-
phishing attacks is usually t o steal intellectual property,
ing email typically looks legitimate and it contains links
such as software source code, design documents, or
in the email that appear t o g o t o the W e b site o f the
schematics.
legitimate business, but these links go t o the phisher's W e b site that is set up t o l o o k like the legitimate site in-
P h a r m i n g is another type o f scam that uses spoofed
s r e a d — a n a c t called W e b site s p o o f i n g . P h i s h i n g e m a i l s
domain names t o obtain personal information for use in fraudulent activities. W i t h pharming, the criminal re-
are typically sent t o a wide group o f individuals and
routes traffic intended for a c o m m o n l y used W e b site t o a spoofed W e b site set up by the pharmer. Sometimes s p e a r p h i s h i n g A personalized phishing scheme
pharming takes place via malicious code sent to a c o m -
targeted at an individual.
puter via an email message or other distribution m e t h o d .
p h a r m i n g The use of spoofed domain names to obtain personal
M o r e often, it takes place via changes m a d e t o a D N S
information to be used in fraudulent activities.
server—a c o m p u t e r that translates U R L s into the appropriate IP addresses needed t o display the W e b page
Chapter
6:
Network
and
Internet
Security
and
Privacy
E x h i b i t 6-6
Phishing email
• A* jjj —S
%^ Q Reply
From: To:
»
Bank of America Security Measures
Message (HTML)
a
Message
Reply Forward to All Respond
x '®>
X
Move to Folder -
ft
-
c
M
i
j $ Create Rule
Delete
s
B l o c k
Other Actions -
Sender
Actions
- J Not Junk
Junk E-mail
G
T*
Categorize Follow Mark as U p ' Unread Options 5
^
Find Related *
onbrebanking@atert. bankof america. com Deborah Morley
Find Sent
l i
a*)
Link to E-mail Record Auto-link
^ Select-
Business Contact... j W e d 9/3/2008 1:50 A M
Cc Subject
Bank of America Security Measures
The link is for an insecure Web page and does not use the bofa.com domain.
Y o u r Online B a n k i n g is B l o c k e d
http://www.htss.com.gr/www/ BankOfAmerica/.com/update/ informabon/update&restore=suspended/ index.htm
Because of unusual number of invalid login attempts on to believe that, their might be some security problem or „ ^ have decided to put an extra verification process to e n s " , P!*?y_^your account security. Please click on siqrwi to Online Banking the verification process and ensure your «Oount security. It is all about your security. Thank you, and visit the customer service section. 1
This email looks legitimate, but the link goes to a spoofed W e b page.
f
B a n k of America, M e m b e r FDIC. © 2009 B a n k of America Corporation. All Rights Reserved.
1 corresponding t o a U R L . After hacking into a c o m p a n y
your c o m p u t e r o r a b o u t your activities t o a c r i m i n a l . In
D N S server, t h e pharmer changes the IP addresses used
addition, shred the preapproved credit c a r d offers a n d
in c o n j u n c t i o n with a particular c o m p a n y U R L (called
other documents containing personal i n f o r m a t i o n that
D N S poisoning) so any Web page requests made via the
frequently arrive in the mail before recycling t h e m . T o
legitimate c o m p a n y U R L are routed via the company's
prevent the theft o f outgoing mail c o n t a i n i n g sensitive
poisoned D N S server t o a phony spoofed W e b page
i n f o r m a t i o n , don't place it in y o u r m a i l b o x — m a i l it at
located o n the pharmer's W e b server. S o , even though
the post office o r in a USPS drop b o x .
a user types t h e proper U R L t o display the legitimate
T o avoid phishing schemes, never click a link in an
c o m p a n y W e b page in his o r her browser, the spoofed
email message t o g o t o a secure W e b s i t e — a l w a y s type
page is displayed instead. Because spoofed sites are set
the U R L f o r that site in your b r o w s e r ( n o t necessarily
up t o look like the legitimate sites, the user typically
the U R L shown in the email message) instead. I f y o u
does n o t notice a n y difference, a n d any information
think an unsolicited email message requesting i n f o r m a -
sent via that site is captured by the pharmer.
tion from y o u m a y be legitimate, type the U R L f o r t h a t site in your browser t o load the legitimate site a n d then update your a c c o u n t information.
Protecting Against Identity Theft In addition t o disclosing personal information
T o prevent identity theft, protect your Social Secuonly
rity n u m b e r a n d give it out only w h e n necessary. K e e p
w h e n it is necessary and only via secure W e b pages,
a close eye o n your credit card bills a n d credit history
you should use security software and keep it up t o date
to m a k e sure y o u catch any fraudulent charges o r a c -
to guard against computer viruses, spyware, a n d other
counts opened by an identity thief as s o o n as possible.
m a l w a r e that c a n be used to send information from
M a k e sure your bills arrive every m o n t h — s o m e thieves
Chapter
6:
Network
and
Internet
Security
and
Privacy
Online Auction Fraud and Other Internet Scams
will change your mailing address t o delay d e t e c t i o n — and read credit card statements carefully to look for unauthorized charges. Be sure t o follow up on any calls
Online auction fraud
you get from creditors, instead o f assuming it is just a
( s o m e t i m e s called I n t e r n e t a u c -
t i o n f r a u d ) occurs when an o n l i n e auction buyer pays
mistake. M o s t security experts also r e c o m m e n d order-
for merchandise that is never delivered, or that is de-
ing a full credit history o n yourself a few times a year to
livered but it is n o t as represented. A wide range o f
check for accounts listed in your n a m e that you did not
other scams c a n o c c u r via W e b sites o r unsolicited
open and any other p r o b l e m s .
emails. C o m m o n types
You can also use browser-based antiphishing tools
o f scams include
and digital certificates t o help guard against identity
scams,
theft and the phishing and pharming schemes used in
loan
work-at-home
c o n s , pyramid schemes,
conjunction with identity theft. Antiphishing tools are
bogus credit card offers
built into many email p r o g r a m s and W e b browsers to
and prize
help notify users o f possible phishing W e b sites. For in-
and
stance, some email p r o g r a m s will disable links in email
promotions,
fraudulent
busi-
ness opportunities and
messages identified as questionable, unless the user
franchises. T h e s e offers typically try t o sell potential
overrides it; many browsers warn users when a W e b
victims n o n e x i s t e n t services o r worthless i n f o r m a t i o n ,
page associated with a possible phishing U R L is re-
or they try t o convince potential victims t o volun-
quested (see E x h i b i t 6 - 7 ) ; and antiphishing capabilities
tarily supply their credit c a r d details and other per-
are included in many recent security suites.
sonal i n f o r m a t i o n , which are then used for fraudulent purposes.
E x h i b i t 6-7
One
Unsafe Web site alert
ongoing
Internet
scam is the Nigerian letter fraud scheme. This scheme involves an email message that appears t o come from the
Nigerian
government
and that promises the p o tential a
victim
substantial
a share o f amount
of
m o n e y in exchange for the use
o f the victim's
account.
Supposedly
bank the
victim's bank account inf o r m a t i o n is needed t o facilitate a wire transfer but the victim's account is emptied
instead,
or
up-front
cash is needed to pay for nonexistent fees, which the c o n artist keeps while giving nothing in return. See E x h i b i t 6 - 8 . T h e theme o f these scams often changes to fit current events. T h e best protection against m a n y dot cons is c o m -
online auction fraud (Internet auction
mon sense. Be extremely cautious o f any unsolicited
f r a u d ) When an item purchased through an online auction is never delivered after payment, or the item is not as specified by
email messages you receive a n d realize that if an offer
the seller.
sounds t o o good t o be true, it p r o b a b l y is. Before bidding on an auction item, check o u t the feedback rating
Chapter
6:
Network
and
Internet
Security
and
Privacy
Digital Certificates and Digital Signatures T h e p u r p o s e o f a d i g i t a l c e r t i f i c a t e is t o a u t h e n t i c a t e
ing a n e m a i l m e s s a g e o r o t h e r d o c u m e n t v i a a d i g i t a l
t h e identity of a n individual or organization. Digital
s i g n a t u r e . To d i g i t a l l y sign a n e m a i l m e s s a g e o r o t h e r
c e r t i f i c a t e s a r e g r a n t e d by C e r t i f i c a t e A u t h o r i t i e s a n d
d o c u m e n t t h e sender's p r i v a t e k e y is u s e d a n d t h a t key,
typically contain t h e name of t h e person, organization,
a l o n g w i t h t h e c o n t e n t s of t h e d o c u m e n t ,
o r W e b site b e i n g c e r t i f i e d a l o n g w i t h a c e r t i f i c a t e s e -
a unique digital signature; consequently, a digital sig-
generates
rial n u m b e r a n d a n e x p i r a t i o n d a t e . D i g i t a l c e r t i f i c a t e s
n a t u r e is d i f f e r e n t w i t h e a c h s i g n e d d o c u m e n t . W h e n
a l s o i n c l u d e a public/private k e y pair. In a d d i t i o n t o b e -
a d i g i t a l l y s i g n e d d o c u m e n t is r e c e i v e d , t h e r e c i p i e n t ' s
i n g u s e d by t h e c e r t i f i c a t e h o l d e r t o e n c r y p t files a n d
c o m p u t e r uses t h e sender's public k e y t o v e r i f y t h e d i g i -
e m a i l m e s s a g e s , t h e s e keys a n d t h e d i g i t a l c e r t i f i c a t e
t a l s i g n a t u r e . B e c a u s e t h e d o c u m e n t is s i g n e d w i t h t h e
a r e u s e d w i t h secure W e b p a g e s t o g u a r a n t e e t h e W e b
sender's p r i v a t e k e y a n d t h e d i g i t a l s i g n a t u r e w i l l b e
p a g e s a r e secure a n d actually b e l o n g t o t h e stated
d e e m e d i n v a l i d if e v e n o n e c h a r a c t e r o f t h e d o c u m e n t
organization.
is c h a n g e d a f t e r it is s i g n e d , d i g i t a l s i g n a t u r e s g u a r a n -
T h e keys i n c l u d e d in a d i g i t a l c e r t i f i c a t e c a n also
t e e t h a t t h e d o c u m e n t w a s sent by a specific i n d i v i d u a l
be used t o authenticate t h e identity of a person send-
a n d t h a t it w a s n o t t a m p e r e d w i t h a f t e r it w a s s i g n e d .
o f the seller t o see c o m m e n t s written by o t h e r a u c t i o n
Cyberstalking and Other Personal Safety Concerns
LO6
sellers a n d buyers. Always pay for a u c t i o n s and o t h e r online p u r c h a s e s using a credit c a r d o r an online paym e n t service such as PayPal t h a t accepts credit card p a y m e n t s so you can dispute the t r a n s a c t i o n y o u r c r e d i t c a r d c o m p a n y , if needed. F o r
I
through
expensive
items, c o n s i d e r using an e s c r o w service, w h i c h allows
3
n addition t o being expensive a n d i n c o n v e n i e n t , c y b e r c r i m e c a n also be physically d a n g e r o u s . A l t h o u g h
m o s t o f us m a y n o t ordinarily view using t h e Internet
y o u t o ensure t h a t the merchandise is as specified b e f o r e
as a potentially dangerous activity, c a s e s o f
your p a y m e n t is released t o the seller.
physical
h a r m due t o Internet activity d o h a p p e n . F o r e x a m p l e , children E x h i b i t 6-8
y )
Reply
From: To; Cc
3
and
teenagers
;
become
pedophiles
Nigerian letter fraud email
u • •
have
victims
who
of
arranged
f a c e - t o - f a c e m e e t i n g s by using
YOUR NOTIFICATION OF PAYMENT VIA. ATM ... M
information
gathered
via e m a i l , m e s s a g e
THIS I S TO OFFICIALY INFORM YOU THAT WE HAVE OPEN YOUR PAYMENT F I L E Fo WHICH WORTH ABOUT EIGHT HUNDERED THOUSAND DOLLARS (US$800.QQQ.OQ).WE ALSO FOUND OUT THAT YOU HAVE NOT RECEIVED ANY PAYMENT.
boards,
social n e t w o r k i n g sites, o r
Reply to Ail Respond
CENTRAL BANK OF NIGERIA <
[email protected]: Deborah Mortey
the
digital certificate
Sent Sun 6/7/2009 7:18
Electronic data that can be used to verify the identity
Subject YOUR NOTIFICATION OF PAYMENT VIA ATM CARD AND NOTICE ON RECENT HAPPENINGS OFFICE OF THE PRESIDENCY
of a person or an organization; includes a key pair that
INCONJUNCTION WITH THE OFFICE OF THE CENTRAL BANK OF NIGERIA ALHA3I UMARU YARADUA (GCFR) ASO- ROCK, GARKI ABUDA NIGERIA.
can be
used for encryption and digital signatures.
Our ref: ATM/13479/IDR Your ref: Date: 91/ 29 / 2999
d i g i t a l s i g n a t u r e A unique digital code that can be attached
YOUR NOTIFICATION OF PAYM HAPPENINGS ATTENTION: BENEFICIARY THIS IS TO OFFICIALY INFORM YOU THAT WE HAVE OPEN YOUR PAYMENT FILE WHICH WORTH ABOUT EIGHT HUNDERED THOUSAND DOLLARS (US$899.999.99).WE ALSO FOUND OUT THAT YOU HAVE NOT RECEIVED ANY PAYMENT. SINCE THE BRITISH GOVERNMENT HAS SET ASIDE ONLY EIGHT HUNDERED MILLION UNITED STATE DOLLARS, (US$899,999,999.99) FROM THE ONE
Chapter
to a file or an email message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed.
6:
Network
and
Internet
Security
and
Privacy
Cyberstalking typically begins with online harass-
T h e m o s t c o m m o n security risks
ment, such as sending harassing o r threatening email
and c o m p u t e r crimes that take place
messages to the victim, posing as the victim in order to
via networks and the I nternet are
sign the victim up for p o r n o g r a p h i c or otherwise of-
hacking, c o m p u t e r viruses, identity
address and telephone number, o r hacking into the
fensive email newsletters, publicizing the victim's h o m e victim's social networking pages to alter the content. Cyberstalking can also lead to offline stalking and possibly physical h a r m — i n at least o n e case, it led to the death of the victim.
other online sources. Also, a growing number of inci-
Although there are as yet n o specific federal laws
dents have occurred in which children are threatened
against cyberstalking, all states have m a d e it illegal, and
by classmates via email, W e b site posts, or text mes-
some federal laws do apply if the online actions include
sages. Adults may fall victim t o unscrupulous or dan-
computer fraud or another type o f computer crime,
gerous individuals w h o misrepresent themselves online,
suggest a threat o f personal injury, o r involve sending
and the availability o f personal information online has
obscene email messages.
made it m o r e difficult for individuals to hide from people w h o may w a n t t o do them h a r m , such as abused
Online Pornography
women trying to hide f r o m their abusive husbands.
A variety o f controversial and potentially objectionable material is available on the Internet. Although there
Cyberbullying and Cyberstalking
have been attempts to ban this type o f material from the
T w o o f the most c o m m o n ways individuals are harassed
Internet, they have not been successful. Like its printed
online are cyberbullying and cyberstalking. Children
counterpart, online pornography involving minors is
and teenagers bullying other children or teenagers via
illegal. Because of the strong link experts believe ex-
the Internet, such as through email, text messaging, a
ists between child pornography and child molestation,
social networking site, o r other online c o m m u n i c a t i o n s
many experts are very concerned a b o u t the amount of
m e t h o d , is referred to as c y b e r b u l l y i n g . Unfortunately,
child pornography that can be found and distributed
cyberbullying is c o m m o n today. By some estimates, it
via the Internet. T h e y also believe that the Internet
affects as many as o n e - h a l f o f all U.S. teenagers. M a n y
makes it easier for sexual predators to act out, such as
states and schools have reviewed their harassment stat-
by striking up " f r i e n d s h i p s " with children online and
utes and bullying policies a n d , as a result, implemented
convincing these children to meet them in real life.
new laws or amended existing harassment laws to address cyberbullying. Repeated threats or other harassment carried out on-
Protecting Against Personal Safety Concerns
line between adults is referred to as cyberstalking. Cyber-
T h e increasing a m o u n t o f attention paid to cyberbul-
stalkers sometimes find their victims online; for instance,
lying and cyberstalking is leading to more efforts to
someone in a discussion group w h o makes a comment or
improve safeguards for children. F o r instance, social
has a screen name that the cyberstalker does not like, or
networking sites have privacy features that can be used
bloggers who are harassed and threatened with violence
to protect the private i n f o r m a t i o n o f their members. In
or murder because of their blogging activities. Other
addition, numerous states in the U.S. have implemented
times, the attack is more personal, such as employers
cyberbullying and cyberstalking laws. Although there is
w h o are stalked online by ex-employees w h o were fired
no surefire way to protect against cyberbullying, cyber-
left their position under adverse conditions,
stalking, and other online dangers completely, some
or otherwise
and celebrities w h o are stalked online by fans.
common-sense precautions can reduce the chance o f a serious personal safety problem occurring due to online activities. T o protect yourself against cyberstalking and
c y b e r b u l l y i n g Children or teenagers bullying other
other types o f online harassment:
children or teenagers via the Internet.
• Use gender-neutral, n o n p r o v o c a t i v e identifying
cyberstalking Repeated threats or harassing behavior between
names, such as jsmith,
adults carried out via email or another Internet communications method.
iamcute.
Chapter
6:
Network
and
Internet
Security
and
Privacy
instead o f janesmith
or
Be careful a b o u t the types o f p h o t o s you post o f
O N E
yourself online and do not reveal personal in-
S T U D Y R E V E A L E D
THAT
» P E R C E N T O F U S E R S
f o r m a t i o n , such as your real n a m e , address, or telephone number, to people you meet online.
B R M A T I O N
O N
T H E I R
yf^^m^
D o n o t respond to any insults or other harassing c o m m e n t s you may receive online.
;D
C o n s i d e r requesting that your personal i n f o r m a -
STORE
THAT
FOR IDENTITY
C O U L D
THEFT.
tion be removed from online directories, especially t h o s e associated with your email address or other g o v e r n m e n t employees may be targeted by c o m p u t e r
online identifiers.
thieves for the i n f o r m a t i o n contained on their c o m p u t ers. A n d even if the data on a device is n o t the p r i m a r y reason for a theft, any unencrypted sensitive data stored
Personal Computer Security
L O 6 . 4
on the stolen device is at risk o f being e x p o s e d o r used for fraudulent purposes, which is h a p p e n i n g at u n p r e c edented levels today.
T
here are a n u m b e r o f security c o n c e r n s surround-
ing c o m p u t e r s and related technology that all in-
dividuals should be concerned a b o u t , including having your c o m p u t e r stolen, losing a term paper because the storage m e d i u m your paper was stored on b e c o m e s unr e a d a b l e , losing your mobile phone containing your entire c o n t a c t list and calendar, or buying pirated or digitally counterfeited products. Although c o n c e r n s a b o u t h a c k i n g , c o m p u t e r viruses, identity theft, and cyberbullying are valid, there are additional c o m p u t e r security issues t h a t are n o t related specifically t o n e t w o r k s and the Internet.
H a r d w a r e loss also occurs when h a r d w a r e is being transported in luggage or in a p a c k a g e t h a t is lost by an airline or shipping company, or w h e n an individual misplaces or otherwise loses a piece o f h a r d w a r e . If any sensitive data was contained on the lost h a r d w a r e , individuals risk identity theft. Businesses h o s t i n g sensitive data that is breached have t o deal with the n u m e r o u s issues and potential consequences o f t h a t loss, such as notifying c u s t o m e r s that their personal
information
w a s e x p o s e d , responding to potential lawsuits, a n d trying t o repair d a m a g e to the c o m p a n y ' s r e p u t a t i o n . Computer
hardware often consists o f
relatively
delicate c o m p o n e n t s that can be d a m a g e d easily by p o w e r fluctuations, heat, dust, static electricity, water,
Hardware Loss and Damage
and abuse. F o r instance, fans clogged by dust c a n cause
H a r d w a r e loss c a n occur when a personal computer, U S B flash drive, mobile device, or other piece o f hardware is stolen or is lost by the owner. H a r d w a r e loss, as well as o t h e r security issues, can also result from hardware d a m a g e — b o t h intentional and
accidental—and
system failure. O n e o f the m o s t obvious types o f h a r d w a r e loss is h a r d w a r e t h e f t , which occurs when h a r d w a r e is stolen from an individual or from a business, s c h o o l , or other organization. A l t h o u g h security experts stress t h a t the vast m a j o r i t y o f h a r d w a r e theft is stolen t o o b t a i n the value o f the h a r d w a r e itself, c o r p o r a t e executives and
a c o m p u t e r t o overheat; dropping a c o m p u t e r will often break it; and spilling a drink on a k e y b o a r d o r leaving a m o b i l e p h o n e in the p o c k e t o f y o u r j e a n s while they go through the wash will likely c a u s e s o m e d a m a g e . In addition t o accidental d a m a g e , b u r g l a r s , vandals, disgruntled employees, and other individuals s o m e t i m e s intentionally damage the c o m p u t e r s a n d o t h e r h a r d ware they have access t o .
System Failure and Other Disasters Although m a n y o f us m a y prefer n o t t o t h i n k a b o u t it, s y s t e m f a i l u r e — t h e complete m a l f u n c t i o n o f a c o m puter
system—and
other types o f
computer-related
h a r d w a r e t h e f t The theft of computer hardware,
T H E
RECOVERY RATE O F A LOST O R
C O M P U T E I ' I S A B O U T
2 O R
s y s t e m f a i l u r e The complete malfunction of a computer
STOLEN
system.
3
t e r 6:
Network
and
Internet
Security
and
Privacy
Exhibit 6-9 Cable locks secure computers and other hardware
NOTEBOOK COMPUTERS This combination cable lock connects via a security slot built into the notebook computer.
permutations.
DESKTOP COMPUTERS AND MONITORS This keyed cable lock connects via a cable anchor attached to the back of the monitor.
disasters do happen. F r o m accidentally deleting a file
Encryption can be used to prevent a file from being
to having your c o m p u t e r just stop working, computer
readable if it is intercepted or viewed by an unauthor-
problems can be a huge inconvenience, as well as cost
ized individual. Full disk e n c r y p t i o n ( F D E ) provides an
a great deal of time and money. W h e n the system con-
easy way to protect the data on an entire computer in
tains your personal d o c u m e n t s and data, it is a prob-
case it is lost or stolen. F D E systems encrypt everything
lem; when it contains the only copy o f your c o m p a n y
stored on the drive (the operating system, application
records or controls a vital system—such as a nuclear
programs, data, temporary files, and so forth) automati-
power plant—it can be a disaster. System failure can
cally, so users don't have to remember to encrypt sensi-
occur because o f a h a r d w a r e problem, software prob-
tive documents and the encryption is always enabled. A
lem, or c o m p u t e r virus. It can also occur because o f a
hard drive that uses F D E , which is often referred to as
natural disaster, s a b o t a g e , o r a terrorist attack.
a self-encrypting hard d r i v e , typically needs a username
Protecting Against Hardware Loss, Hardware Damage, and System Failure
computer containing the drive will b o o t .
Locked doors and equipment can be simple deterrents
word
to computer theft. T o secure c o m p u t e r s and other hard-
feature (such as a built-
ware to a table or other o b j e c t that is difficult to move,
in
you can use cable locks, such as the ones shown in E x -
as in the U S B drive in
and password or biometric characteristic before the Encryption can also be used to protect the data stored on removable storage media; either a strong passor
a
fingerprint 6-10)
biometric reader,
hibit 6 - 9 . As an additional precaution with portable
Exhibit
computers, you can use laptop alarm software that
to provide access to the
emits a very loud alarm noise if the computer is un-
data on the drive. Some
plugged, if USB devices are removed, or if the computer
is
used
software
tools are designed
is shut down w i t h o u t the owner's permission.
to
aid in hardware recovfull disk e n c r y p t i o n (FDE) A technology
ery. O n e software tool
that encrypts
that can be used to help
everything stored on a storage medium
automatically, without any user interaction.
increase the chances o f
s e l f - e n c r y p t i n g h a r d d r i v e A hard drive that uses full disk
a stolen o r lost c o m -
encryption (FDE).
puter being is
Chapter
6:
Network
and
Internet
Security
and
Privacy
computer
recovered tracking
Exhibit 6-10 Encrypted USB flash drive
I
Safeguarding Passwords P a s s w o r d s a r e secret w o r d s o r c h a r a c t e r c o m b i n a t i o n s associa t e d w i t h a n individual. They a r e t y p i c a l l y used in c o n j u n c tion
with
a
username.
name/password
User-
I'M A CURRENT ONLINE CUSTOMER Email Address Password:
#
a r e o f t e n used t o restrict access t o networks, computers,
used
to
remember
word "Msji5yotMd@". Or you can
#
(Password is case sensitive.)
combinations
be
t h e c o r r e s p o n d i n g s t r o n g pass-
[email protected] *
older t h a n my d a u g h t e r A b b y " could
choose
an
abbreviation
or u n u s u a l w o r d s y o u w i l l r e member, a n d t h e n a d d a mix
log in
of n u m b e r s a n d s p e c i a l
Web
char-
acters. D o n o t use y o u r n a m e ,
sites, r o u t e r s , a n d o t h e r c o m p u t i n g r e s o u r c e s — t h e user is g r a n t e d access t o t h e r e -
y o u r kids' o r p e t s ' n a m e s , y o u r address, y o u r b i r t h d a t e ,
q u e s t e d resource only after supplying t h e correct infor-
or a n y o t h e r p u b l i c i n f o r m a t i o n as y o u r p a s s w o r d .
m a t i o n . P a s s w o r d s typically a p p e a r as asterisks or d o t s as t h e y a r e b e i n g e n t e r e d so t h e y c a n n o t b e v i e w e d .
To k e e p y o u r p a s s w o r d s safe, d o n o t k e e p a w r i t t e n c o p y o f t h e p a s s w o r d in y o u r desk or t a p e d t o y o u r m o n -
C r e a t e s t r o n g passwords t h a t a r e a t least e i g h t c h a r -
itor. If y o u n e e d t o k e e p a record o f y o u r p a s s w o r d s , c r e -
a c t e r s l o n g ; use a c o m b i n a t i o n o f u p p e r a n d l o w e r c a s e
a t e a p a s s w o r d - p r o t e c t e d file o n y o u r c o m p u t e r . A l s o ,
letters, n u m b e r s , a n d symbols; a n d d o n o t f o r m w o r d s
use a d i f f e r e n t p a s s w o r d f o r y o u r h i g h l y s e n s i t i v e a c t i v i -
f o u n d in t h e d i c t i o n a r y or t h a t m a t c h t h e
username
ties, such as o n l i n e b a n k i n g or stock t r a d i n g , t h a n f o r
t h a t t h e p a s s w o r d is associated w i t h . O n e w a y t o c r e a t e
W e b sites t h a t r e m e m b e r y o u r settings o r p r o f i l e , such
a s t r o n g p a s s w o r d is t o c r e a t e a passphrase t h a t y o u c a n
as o n l i n e n e w s , a u c t i o n , or s h o p p i n g sites. If a h a c k e r
r e m e m b e r a n d use c o r r e s p o n d i n g letters a n d symbols,
d e t e r m i n e s y o u r p a s s w o r d o n a low-security site, h e o r
such as t h e first letter of e a c h w o r d , f o r y o u r p a s s w o r d .
she c a n use it o n a n a c c o u n t c o n t a i n i n g s e n s i t i v e d a t a if
For i n s t a n c e , t h e passphrase " M y son J o h n is f i v e y e a r s
y o u use t h e s a m e p a s s w o r d o n b o t h a c c o u n t s .
s o f t w a r e . C o m p u t e r tracking software can be used to
computer's video camera of the person using the stolen
help increase the chances of a stolen or lost c o m p u t e r
c o m p u t e r to help identify and prosecute the thief.
being recovered by sending identifying
information,
O f t e n any sign that computer tracking
software
such as o w n e r s h i p information and location informa-
is running on the computer or is sending i n f o r m a t i o n
tion determined from nearby W i - F i n e t w o r k s , to the
via the Internet is hidden from the user, so the thief is
c o m p u t e r tracking c o m p a n y on a regular basis. W h e n
usually not aware that a c o m p u t e r tracking system is
the c o m p u t e r is in the owner's possession, this informa-
installed on the computer. An alternative is tracking
tion is sent infrequently—maybe once a day. W h e n the
software that displays a message on the screen when
c o m p u t e r is reported lost or stolen, however, the c o m -
the c o m p u t e r is lost or stolen, such as a plea t o return
puter t r a c k i n g software typically increases its c o n t a c t
the device for a reward or a simple statement o f " T H I S
with the c o m p u t e r tracking software company, such
C O M P U T E R IS S T O L E N " in a big bright banner on the
as sending new information every 1 5 minutes, so cur-
desktop. Messages typically reappear every 3 0 seconds,
rent l o c a t i o n information can be provided to law en-
no matter h o w many times they are closed by the thief.
forcement agencies to help them recover the computer.
A n o t h e r antitheft tool is the use o f asset tags on
Some software can even take video or p h o t o s with the
hardware and other expensive assets. T h e s e labels usually identify the o w n e r o f the asset and are designed to be permanently attached to the asset. S o m e tags are designed to be indestructible; others are t a m p e r evident
IS; DON'T YOUR PASSWORDS DOWN ON STICK\ NOTES THAT YOU LEAVE ATTACHED TO YOUR MONITOR
labels that change their appearance if s o m e o n e tries t o remove them. p a s s w o r d A secret word or character combination associated with an individual.
Self-Destructing Devices W h e n y o u are less c o n c e r n e d a b o u t r e c o v e r i n g a stolen device t h a n a b o u t e n s u r i n g t h e d a t a located o n t h e c o m p u t e r is n o t c o m p r o m i s e d , devices t h a t self-destruct u p o n c o m m a n d a r e a v i a b l e o p t i o n . A v a i l a b l e as part o f s o m e c o m p u t e r t r a c k i n g s o f t w a r e programs, such as t h e o n e s h o w n in t h e a c c o m p a n y i n g illustration, as w e l l as stand-alone utilities, kill s w i t c h capabilities destroy t h e d a t a o n a d e v i c e , typically by o v e r w r i t i n g
preselected
files m u l t i p l e t i m e s , r e n d e r i n g t h e m u n r e a d a b l e , w h e n instructed. Kill switches a r e a c t i v a t e d u p o n customer r e quest w h e n t h e d e v i c e is d e t e r m i n e d t o b e lost or stolen. O n c e t h e kill s w i t c h is a c t i v a t e d , all d a t a o n t h e c o m p u t e r is erased w h e n e v e r it next c o n n e c t s t o t h e I n t e r n e t or
Courtesy Absolute Software Corporation
w h e n a n o t h e r p r e d e s i g n a t e d r e m o t e t r i g g e r is a c t i v a t e d , such as a certain n u m b e r o f unsuccessful l o g o n a t t e m p t s .
Keep in mind the following precautions when using
Proper care o f hardware c a n help prevent serious damage to a computer system. An obvious precaution
portable computers a n d other mobile devices:
is to not harm your hardware physically, such as by
• Install and use encryption, antivirus, antispyware,
dropping a portable computer. T o help protect portable
anci firewall s o f t w a r e .
•
devices against minor abuse, use protective cases, as
Secure computers with b o o t passwords; set your
shown in E x h i b i t 6 - 1 1 . T h e s e cases are typically pad-
mobile phone t o a u t o l o c k after a short period o f
ded or made from protective material; they also often
time and require a passcode t o unlock it.
have a thin protective layer over the device's display t o protect against scratches.
• Use only secure W i - F i c o n n e c t i o n s , and disable
If you need more protection than a protective
Wi-Fi and Bluetooth w h e n they are not needed.
case can provide, r u g g e d i z e d d e v i c e s are designed t o
D o n ' t store usernames or passwords attached to a c o m p u t e r o r inside its case. E x h i b i t 6-11
Use a plain case t o m a k e a portable
Protective cases
computer less c o n s p i c u o u s . Keep an eye on your devices at all
l•oOQ 111 y
times, especially when traveling. Use a cable lock to secure devices to a desk or other o b j e c t whenever you must leave them unattended. Regularly back up your data. Consider using tracking or kill switch
software.
•
r u g g e d i z e d d e v i c e A device that is designed to withstand much more physical
MOBILE PHONE CASE
abuse than a conventional device.
Chapter
6:
Network
and
Internet
Security
and
Privacy
NOTEBOOK CASE
prevents electrical power spikes f r o m h a r m i n g your sys-
o protect a portable c o m p u t e r
tem. F o r desktop computers, surge suppressors should
rom scratches and other d a m a g e ,
be used with all o f the powered c o m p o n e n t s in the c o m -
use a neoprcne laptop sleeve
puter system. Surge suppressors designed for p o r t a b l e
w h e n carrying it in a conventional
nect only one device.
c o m p u t e r s are typically smaller a n d designed to c o n Users w h o w a n t their desktop c o m p u t e r s to remain
brie:^^^^^^
powered up when the electricity goes o f f should use an u n i n t e r r u p t i b l e p o w e r s u p p l y ( U P S ) , s u c h as the
one
shown in E x h i b i t 6 - 1 2 , which c o n t a i n s a built-in battery. T h e length o f time that a UPS c a n p o w e r a system w i t h s t a n d much more physical abuse than conventional
depends on the type and number o f devices c o n n e c t e d
devices and range from semirugged to
ultrarugged.
to the UPS, the power capacity o f the UPS device, and
Ruggedized devices are used m o s t often by individu-
the age o f the battery. M o s t UPS devices also p r o t e c t
als w h o w o r k outside o f an office, such as field w o r k -
against p o w e r
ers, c o n s t r u c t i o n w o r k e r s , o u t d o o r technicians, military
individuals usually provide power for a few minutes t o
personnel, police officers, and
keep the system powered up during short p o w e r blips,
firefighters.
fluctuations.
UPSs designed for use by
T o protect hardware from damage due to power
as well as to allow the user to save open d o c u m e n t s and
everyone should use a s u r g e suppressor
shut d o w n the c o m p u t e r properly in case the electric-
with a c o m p u t e r whenever it is plugged into a power
ity remains off. Industrial-level UPSs typically run for a
outlet, as s h o w n in Exhibit 6 - 1 2 . T h e surge suppressor
significantly longer a m o u n t of time (up t o a few h o u r s ) ,
fluctuations,
but n o t long enough to p o w e r a facility during an e x tended p o w e r outage. E x h i b i t 6-12
Dust, heat, static electricity, a n d moisture
Surge protectors and UPSs
can also be dangerous to a c o m p u t e r , so be sure n o t to place your c o m p u t e r e q u i p m e n t in direct sunlight or in a dusty a r e a . Y o u c a n use a small handheld vacuum made for electrical equipment periodically to r e m o v e the dust from the k e y b o a r d and from inside the system unit, but be very careful when v a c u u m i n g
inside the
system unit. Also, be sure the system unit has plenty of ventilation, especially a r o u n d the fan vents. T o help reduce the a m o u n t o f dust that
SURGE S U P P R E S S O R FOR NOTEBOOK COMPUTERS
is drawn into the fan vents, raise your desktop c o m p u t e r several inches o f f the floor. Y o u should also avoid placing a p o r t a b l e c o m p u t e r on a soft surface, such as a c o u c h or b l a n k e t , to help prevent overheating. Unless your c o m puter is ruggedized, like the o n e s h o w n in E x -
S U R G E S U P P R E S S O R FOR DESKTOP COMPUTERS
hibit 6 - 1 3 , do not get it wet o r otherwise e x pose it to adverse c o n d i t i o n s .
s u r g e s u p p r e s s o r A device that protects a computer system from damage due to electrical fluctuations. u n i n t e r r u p t i b l e p o w e r s u p p l y ( U P S ) A device containing a built-in battery that provides continuous power UPS FOR HOME COMPUTERS
to a computer and other connected components when the
U P S FOR SERVERS
Chapter
electricity goes out.
6:
Network
and
Internet
Security
and
Privacy
To protect against becoming infected with a c o m -
jnt o f the phones
puter virus or other type of m a l w a r e , all computers
received by o n e d a t a recove
and other devices used to access the Internet or a c o m -
firm are w a t e r d a m a g e d
pany network should have security software installed. Security s o f t w a r e typically includes a variety of security features, including a
firewall,
protection against spy-
ware and bots, and protection against some types o f E x h i b i t 6-13
online fraud. O n e o f the m o s t i m p o r t a n t components
A ruggedized computer
is antivirus s o f t w a r e , which protects against computer viruses and other types of m a l w a r e . Antivirus
software
typically
runs
continuously
whenever the computer is on t o perform
real-time
monitoring of the c o m p u t e r and incoming email messages, instant messages, W e b page content, and downloaded files to prevent malicious software from executing. M a n y antivirus programs also automatically scan any devices as soon as they are c o n n e c t e d to a USB port in order to guard against infections from a USB flash drive, a portable digital media player, o r other USB device. Antivirus software helps prevent malware from being installed on your c o m p u t e r because it deletes or quarantines any suspicious c o n t e n t as it arrives. Regular full system scans can detect and remove any viruses or w o r m s that find their way onto your computer. See E x h i b i t 6 - 1 4 . E x h i b i t 6-14
security
Security software
s o f t w a r e Software, typically a suite of programs,
ANTIVIRUS SOFTWARE
used to protect your computer against a variety of threats. antivirus software Software used to detect and eliminate computer viruses and other types of malware. disaster r e c o v e r y p l a n (business c o n t i n u i t y p l a n ) A written plan that describes the steps a company will take following the occurrence of a disaster. h o t site An alternate location equipped with the computers and other equipment necessary to keep a business's operations going. f i r e w a l l A collection of hardware and/or software that protects a computer or computer network from unauthorized access.
Chapter
6:
Network
and
Internet
Security
and
Privacy
Disaster Recovery Plan To
and
e m e r g e n c y c o m m u n i c a t i o n s m e t h o d s , a n d so f o r t h . If a
o t h e r organizations should have a disaster recovery
supplement
backup
procedures,
businesses
h o t s i t e — a n a l t e r n a t e location e q u i p p e d w i t h t h e c o m -
p l a n (also c a l l e d a business c o n t i n u i t y p l a n ) — a
plan
puters, c a b l i n g , desks, a n d o t h e r e q u i p m e n t n e c e s s a r y
t h a t spells o u t w h a t t h e o r g a n i z a t i o n w i l l d o t o p r e -
t o k e e p a business's o p e r a t i o n s g o i n g — i s t o b e u s e d
p a r e f o r a n d r e c o v e r f r o m a d i s r u p t i v e e v e n t , such as
f o l l o w i n g a m a j o r disaster, it s h o u l d b e s e t u p a h e a d
a f i r e , n a t u r a l disaster, terrorist a t t a c k , p o w e r o u t a g e ,
o f t i m e , a n d i n f o r m a t i o n a b o u t t h e h o t site s h o u l d b e
o r c o m p u t e r f a i l u r e . Disaster r e c o v e r y plans s h o u l d i n -
i n c l u d e d in t h e disaster recovery p l a n . Businesses t h a t
c l u d e i n f o r m a t i o n a b o u t w h o w i l l b e in c h a r g e i m m e -
c a n n o t a f f o r d t o b e w i t h o u t e m a i l service s h o u l d also
d i a t e l y a f t e r t h e disaster has o c c u r r e d , w h a t a l t e r n a t e
consider m a k i n g arrangements w i t h a n e m e r g e n c y mail
facilities a n d e q u i p m e n t can b e used, w h e r e
backup
system p r o v i d e r t o a c t as a t e m p o r a r y m a i l s e r v e r if t h e
m e d i a is l o c a t e d , t h e priority o f g e t t i n g e a c h o p e r a t i o n
c o m p a n y m a i l server is n o t f u n c t i o n i n g . C o p i e s o f t h e
b a c k o n l i n e , disaster insurance c o v e r a g e i n f o r m a t i o n .
disaster r e c o v e r y p l a n s h o u l d b e l o c a t e d off-site.
Individuals and businesses c a n p r o t e c t against s o m e
installed on a c o m p u t e r w i t h o u t the user's p e r m i s s i o n .
types o f c o m p u t e r s a b o t a g e by c o n t r o l l i n g access t o their
F o r e x a m p l e , the user can be p r o m p t e d f o r p e r m i s s i o n
c o m p u t e r s a n d n e t w o r k s . Intrusion p r o t e c t i o n systems
w h e n e v e r a d o w n l o a d is initiated.
c a n help businesses detect and p r o t e c t against denial o f service ( D o S ) a t t a c k s . F o r e x t r a p r o t e c t i o n against spym a l w a r e , specialized security p r o g r a m s (such as the an-
Firewalls, Encryption, and Virtual Private Networks (VPNs)
t i s p y w a r e p r o g r a m shown in E x h i b i t 6 - 1 4 ) c a n be used.
A f i r e w a l l is a security system t h a t e s s e n t i a l l y c r e a t e s
In a d d i t i o n , m o s t W e b browsers have security settings
a b a r r i e r b e t w e e n a c o m p u t e r o r n e t w o r k a n d the In-
t h a t c a n be used t o help prevent p r o g r a m s f r o m being
ternet in o r d e r t o p r o t e c t against u n a u t h o r i z e d a c c e s s .
w a r e , r o g u e antivirus p r o g r a m s , and o t h e r specialized
Securing a Router A h o m e wireless n e t w o r k should b e secured p r o p -
Use the router's IP address to display the router's configuration screen.
Use this tab to enable MAC address filtering.
erly so it c a n n o t b e used by u n a u t h o r i z e d individuals. Security settings a r e specified in t h e router's c o n f i g u ration screen, such as t h e o n e s h o w n in t h e a c c o m p a -
Use this tab to change the administrator password used to access this configuration screen.
nying illustration. To o p e n y o u r router's c o n f i g u r a t i o n Type your desired SSID here.
screen t o check or modify t h e settings, t y p e t h e IP address assigned t o t h a t device (such as 192.168.0.1— check f o r a sticker o n t h e b o t t o m of y o u r router or y o u r router's d o c u m e n t a t i o n f o r its d e f a u l t IP address
Enable SSID broadcast here.
a n d u s e r n a m e ) in y o u r browser's Address bar. Use t h e d e f a u l t password listed in y o u r router d o c u m e n t a t i o n t o log o n t h e first t i m e , a n d t h e n c h a n g e t h e password
Select the desired security mode here.
using t h e c o n f i g u r a t i o n screen t o p r e v e n t u n a u t h o r ized individuals f r o m c h a n g i n g y o u r router settings. To secure t h e router, enter t h e n e t w o r k n a m e (SSID) y o u w a n t t o h a v e associated w i t h t h e router, select
Type your desired network key here.
t h e a p p r o p r i a t e security m o d e , such as W E P , W P A , o r W P A 2 , t o b e used, a n d t h e n t y p e a secure passphrase t o b e used in order t o log o n t o t h e n e t w o r k .
Chapter
6:
Network
and
Internet
Security
and
Privacy
Exhibit 6-15 Online security scans can check your system for vulnerabilities Firewalls are
typically
two-way, so they check all incoming and out-
"^p Symantec.
going traffic and a l l o w only authorized traffic
Symantec'
to pass through the firewall. Personal
Security Check
firewalls
Secunty Check testyour ci tool that hefts deten t your ne
are typically s o f t w a r e -
•
based systems or they can be built into m a n y
Security Scan
operating systems, and they
are
geared
ward protecting computers f r o m ers cess
attempting those
through net
to-
IS YOUW COMPUTE* SA« MOM OMJtC THREATS*'
home
their
Internet
connections
Symantec Security Check
Virus Detection B YCX* COMPUTER RB
1. Click to run the security scan.
All
with
^Symantec.
C 19#V2«* SrmwlK Corporation. M notes r.«d. L«o, Mtpv/fcunty 5ym»fit« conrx/iCv«/)sc. 1
Inter-
computers
•
> LEARN MORE
ac-
computers
connections.
Click here to download
& Sym**« S«uc*y C*«» - Wmdow, Internet bpk«-
•
hackto
1 Norton S e c u r i t y S c a n 1 ^^^H
9 Internet | Protected Mod«: Of
direct 2. No threats were found.
( D S L , c a b l e , satellite, o r fixed
wireless
Internet
access) should use a firewall; c o m p u t e r s using dial-up
w o r k s use encryption to secure data t h a t is transferred
Internet access only are relatively safe from hackers.
over the n e t w o r k . S e c u r e W e b p a g e s use encryption so
M a n y routers, m o d e m s , and other pieces o f network-
that sensitive data sent via the W e b page is protected
ing hardware also include built-in firewall capabilities
as it travels over the Internet. T h e m o s t c o m m o n secu-
to help secure the n e t w o r k s these devices are used with.
rity protocols used with secure W e b pages are Secure
Firewalls designed t o p r o t e c t business networks may
Sockets Layer (SSL) and E x t e n d e d Validation Secure
be software-based, h a r d w a r e - b a s e d , or a c o m b i n a t i o n
Sockets Layer ( E V S S L ) . T h e U R L for W e b pages using
o f the t w o . T h e y can typically be used both to prevent
either form o f SSL begins with https:
network access by h a c k e r s and other outsiders, and to
instead of
http:.
Some Internet services, such as Skype VoIP calls
control employee Internet access.
and Hushmail Web-based emails, use built-in encryption. Encryption can also be added manually to a file
After installing and setting up a firewall, individuals and businesses should test their systems to determine
or an email message before it is sent over the Internet
if vulnerabilities still exist. Individuals can use online
to ensure that the content is unreadable if the file or
security tests—such as the Symantec Security Check
message is intercepted during transit. In addition to se-
shown in Exhibit 6 - 1 5 o r the tests at Gibson Research's
curing files during transit, encryption can be used to
ShieldsUP! site—to check their computers; businesses
protect the files stored on a hard drive so they will be
may wish to hire an outside consultant to perform a
unreadable if opened by an unauthorized person, such
comprehensive security assessment.
as if a hacker accesses a file c o n t a i n i n g sensitive data o r
E n c r y p t i o n is a w a y o f t e m p o r a r i l y converting data
if a computer containing sensitive files is lost or stolen.
into a form, known as a cipher, that is unreadable until
Increasingly, computers and hard drives, particularly
it is decrypted in order t o p r o t e c t that data from being
those used with portable c o m p u t e r s , are self-encrypt-
v i e w e d by unauthorized individuals. Secure Wi-Fi net-
ing; that is, encrypting all data automatically and invis-
e n c r y p t i o n A method of scrambling the contents
lould
of an email message or a file to make it unreadable if an
entered only on secure W e b
unauthorized user intercepts it. s e c u r e W e b p a g e A Web page that uses encryption to protect
pages so that a criminal cannot
information transmitted via that Web page.
Chapter
6:
Network
and
intercept t h a t '
Internet
Security
and
Privacy
E x h i b i t 6-16
Using public key encryption to secure an email message 1 . The email message (including any attached les) is created by the sender, who then uses the recipient's public key to encrypt the email (including any attached les) using the Message Options dialog box.
ibly to the user. W i n d o w s , M a c O S , and other current
files securely t o o t h e r s , provided b o t h the sender a n d
operating systems support encryption, and businesses
recipient agree on the private key t h a t will be used t o
are increasingly turning to encryption to prevent data
access the file. Public k e y e n c r y p t i o n , also called a s y m m e t r i c key
loss if a d a t a breach should occur. T h e t w o m o s t c o m m o n types o f encryption in use
encryption, utilizes t w o encryption keys t o encrypt and
t o d a y are private key encryption and public key en-
decrypt d o c u m e n t s . Specifically, public key encryption
c r y p t i o n . P r i v a t e k e y e n c r y p t i o n , also called s y m m e t r i c
uses a private key and a public key that are related
key e n c r y p t i o n , uses a single secret private key (es-
mathematically to each other a n d have been assigned
sentially a p a s s w o r d ) to b o t h encrypt and decrypt a
to a particular individual. An individual's public key is
file o r m e s s a g e being sent over the Internet. It is often
n o t secret and is available for a n y o n e t o use, but the
used t o e n c r y p t files stored on an individual's c o m -
corresponding private key is used only by the indi-
puter b e c a u s e the individual w h o selects the private
vidual to w h o m it was assigned. D o c u m e n t s o r mes-
key is likely the only o n e w h o will need t o access those
sages encrypted with a public key can only be decrypted
files. Private key e n c r y p t i o n c a n also be used t o send
with the matching private key. E x h i b i t 6 - 1 6 illustrates
O
CI
p r i v a t e k e y e n c r y p t i o n A type of encryption J
x
that uses a single key to encrypt and decrypt the file or
aiiuurd that may eventually
message. p u b l i c k e y e n c r y p t i o n A type of encryption that uses key pairs
p l a c e S S L is T r a n s p o r t L a y e r
to encrypt and decrypt the file or message.
Chapter
6:
Network
and
Internet
Security
and
Privacy
Additional Public Hotspot Precautions • Turn o f f file s h a r i n g so
Using f i r e w a l l s o f t w a r e , s e c u r e W e b p a g e s , V P N s , a n d e n c r y p t i o n is a g o o d start f o r p r o t e c t i n g a g a i n s t u n a u -
others
t h o r i z e d access a n d u n a u t h o r i z e d use a t a public Wi-Fi
files o n y o u r h a r d d r i v e .
h o t s p o t . H o w e v e r , y o u c a n use t h e a d d i t i o n a l p r e c a u -
can't
access t h e
• Turn o f f B l u e t o o t h a n d
tions listed b e l o w t o a v o i d d a t a o n y o u r c o m p u t e r s o r
Wi-Fi w h e n y o u a r e n o t
data sent over t h e Internet f r o m being compromised.
using t h e m .
• Turn o f f a u t o m a t i c c o n n e c t i o n s a n d p a y a t t e n t i o n t o
• Disable
t h e list o f a v a i l a b l e h o t s p o t s t o t r y t o m a k e sure y o u
bilities
c o n n e c t t o a l e g i t i m a t e access p o i n t .
another
• Only enter passwords, credit card numbers, a n d other
from
capa-
ad
hoc
to
prevent computer
connecting
to
Mike Flippo/Shutterstock.com
your computer direct-
d a t a o n secure W e b p a g e s using a V P N .
ly w i t h o u t using a n access p o i n t .
• If y o u ' r e n o t using a V P N , e n c r y p t all sensitive files
• U s e antivirus s o f t w a r e a n d m a k e s u r e y o u r o p e r a t i n g
before transferring or emailing t h e m .
system is u p t o d a t e .
• If y o u ' r e n o t using a V P N , a v o i d o n l i n e s h o p p i n g , b a n k i n g , a n d o t h e r sensitive t r a n s a c t i o n s .
h o w public key encryption is used t o secure an email
Understanding Privacy Concerns
LO6.5
message. W h i l e email and file encryption c a n be used t o transfer individual messages and files securely over the Internet, a v i r t u a l p r i v a t e n e t w o r k ( V P N ) is designed t o
!
be used when a c o n t i n u o u s secure channel over the Internet is needed. A V P N provides a secure private tun-
P
rivacy is usually defined as the state o f being concealed o r free from unauthorized intrusion. T h e
term i n f o r m a t i o n p r i v a c y refers t o the rights o f indi-
nel from the user's c o m p u t e r through the Internet t o
viduals and companies t o c o n t r o l h o w information
another destination a n d is m o s t often used t o provide
about them is collected and used. T h e problem o f h o w
remote employees with secure access t o a c o m p a n y net-
to protect personal p r i v a c y — t h a t is, h o w to keep per-
w o r k . V P N s use encryption a n d other security mecha-
sonal information private—existed long before c o m -
nisms to ensure that only authorized users can access the
puters entered the picture. F o r e x a m p l e , sealing w a x
remote network and that the data c a n n o t be intercepted
and unique signet rings were used centuries ago to seal
during transit. Because it uses the Internet instead o f an
letters, wills, and other personal documents to guard
expensive private physical n e t w o r k , a V P N can provide
against their content being revealed t o unauthorized in-
a secure environment over a large geographical area at
dividuals, as well as to alert the recipient if such an in-
a manageable cost.
trusion occurred while the d o c u m e n t was in transit. But computers, with their ability t o store, duplicate, and
virtual
private
n e t w o r k ( V P N ) A private, secure
path over the Internet that provides authorized users a secure means of accessing a private network via the Internet p p r i v a c y The state of being concealed or free from unauthorized
'
PROVIDED
intrusion. mt i n f o r m a t i o n p r i v a c y The rights of individuals and companies in control how information about them is collected and used. to
THE DANGER THAT THE INFORMATION WILL B E MISUSED
• Chapter
6:
Network
and
Internet
Security
and
Privacy
manipulate large quantities o f data, c o m b i n e d with the
M a r k e t i n g databases are also used in c o n j u n c t i o n
fact that d a t a b a s e s containing our personal informa-
with W e b activities, such as social n e t w o r k
tion c a n be accessed and shared via the Internet, have
and searches performed via s o m e personalized search
added a n e w twist to the issue of personal privacy.
services. F o r instance, the data stored o n F a c e b o o k ,
activity
M a n y people are concerned a b o u t the privacy o f
M y S p a c e , and other social n e t w o r k i n g sites c a n be gath-
their W e b site activities and email messages. Recently,
ered and used for advertising purposes by m a r k e t i n g
an unprecedented number of high-profile data breaches
c o m p a n i e s , and the activities o f users o f personalized
have o c c u r r e d — s o m e via hacking and other network
search services (where users log in t o use the service)
intrusions; others due to lost or stolen h a r d w a r e , or
can be tracked and that data can be used f o r m a r k e t i n g
carelessness with papers or storage media containing
purposes.
Social Security numbers or other sensitive d a t a . Because
I n f o r m a t i o n a b o u t individuals is also available in
every data breach is a risk to information privacy, pro-
g o v e r n m e n t d a t a b a s e s . Some i n f o r m a t i o n , such as S o -
tecting the data stored in databases today is an impor-
cial Security earnings and i n c o m e t a x returns, is c o n -
tant c o n c e r n for everyone. O t h e r privacy concerns are
fidential
spam and o t h e r marketing activities, electronic surveil-
individuals. O t h e r information, such as birth records,
lance, and electronic monitoring.
marriage certificates, and divorce i n f o r m a t i o n , as well
and can legally be seen only by authorized
as property purchases, assessments, liens, a n d t a x values, is available to the public, including to the m a r k e t -
Databases, Electronic Profiling, Spam, and Other Marketing Activities
ing c o m p a n i e s that specialize in creating m a r k e t i n g databases. In the past, the data a b o u t any o n e individual was
I n f o r m a t i o n a b o u t individuals can be located in many
stored in a variety o f separate l o c a t i o n s , such as at dif-
different d a t a b a s e s . F o r e x a m p l e , educational institu-
ferent government agencies, individual retail stores, the
tions have databases containing student information, organizations
use a database to hold employee
person's b a n k and credit card c o m p a n i e s , a n d so forth.
in-
Because it w o u l d be extremely time c o n s u m i n g to lo-
f o r m a t i o n , and most physicians and health insurance
cate all the information a b o u t one person f r o m all these
providers maintain databases containing individuals'
different places, there was a fairly high level o f i n f o r m a -
medical i n f o r m a t i o n . If these databases are adequately
tion privacy. Today, however, m o s t o f an individual's
protected f r o m hackers and other unauthorized indi-
data is stored on computers that c a n c o m m u n i c a t e with
viduals, and if the data is not transported on a portable
each other via the Internet, which m e a n s accessing per-
c o m p u t e r o r other device that may be vulnerable to loss
sonal i n f o r m a t i o n a b o u t s o m e o n e is m u c h easier than
or theft, these databases do not pose a significant pri-
it used t o be. F o r example, a variety o f public infor-
vacy c o n c e r n t o consumers because the information can
m a t i o n a b o u t individuals is available free t h r o u g h the
rarely be shared without the individuals' permission.
Internet, as demonstrated in E x h i b i t 6 - 1 7 ; there are also
However, the data stored in these types o f databases is
paid services that can perform online d a t a b a s e searches
n o t always sufficiently protected and has been breached
for you.
quite often in the past. Consequently, these databases,
Collecting in-depth i n f o r m a t i o n a b o u t an individual
along with m a r k e t i n g databases and government data-
is k n o w n as electronic profiling. E l e c t r o n i c profiles are
bases that are typically associated with a higher risk of
generally designed to provide specific i n f o r m a t i o n and
personal privacy violations, are of growing c o n c e r n to
can include an individual's n a m e , c u r r e n t and previous
privacy a d v o c a t e s . M a r k e t i n g d a t a b a s e s contain marketing and demographic data a b o u t people, such as where they live and
m a r k e t i n g d a t a b a s e A collection of data about
what products they buy. This information is used for
people that is stored in a large database and used for
marketing purposes, such as sending advertisements that
marketing purposes.
fit each individual's interests via regular mail or email, or trying t o sign people up over the phone for some type of
g o v e r n m e n t d a t a b a s e A collection of data about people that is
service. Almost any time you provide information about
collected and maintained by the government.
yourself online or offline—when you subscribe to a mag-
e l e c t r o n i c p r o f i l i n g Using electronic means to collect a variety
azine, fill out a product registration card, or buy some-
of in-depth information about an individual, such as name, address,
thing using a credit card—there is a good chance that the information
income, and buying habits.
will find its way into a marketing database.
ch
a p t e r 6 : Network
and
Internet
Security
and
Privacy
E x h i b i t 6-17
Searchable databases available via the Internet PROPERTY VALUE SEARCH Some states permit searches for property located in that state, such as displaying the owner's name, address, and a link to additional information including property value for the supplied owner name.
& APPNITAL VISION ASTESIOR I' D«UB*)E
D A ME & V , I HIS PROPERTY SMITH A
34 BEVERLY ST
W THIS PROPERLY SMITH ALICE E TRUSTEE
GS HYACINTH PR
W THIS PROPERTY SMITH BARBARA PEASE
20 SLADES CORNER RD
W MHS PROPERTY |8MFTH BRIAN J & vi T H T S PROPERTY SMITH CECIL 111 ETAL
559 HIXVILLE RD
W T H T T PROPERTY SMITH DAVID R S WILLIAM J & W THIS PROPERTY SMITH DAVID R & WILLIAM J &
44 ALDEN AVE
M LINS PROPERLY SMITH DEBORAH R &
619 HORSENECK RD
M THIS PROPERTY SMITH DEBORAH R &
HORSENECK RD
M THIS PROPERTY SMITH EARLEW*
143 CLARENOON ST
SQPI^-J) * W
WT H T S PROPERTY SMITH ELVIRA J
4 3 OLD WESTPORT RD
W T H R S PROPERTY SMITH ELVIRA J
OLD WESTPORT RD
H T T P W /: W W R .E A L E R T » T E C .O U N T Y < L E R I D « L L » J C O U N T Y ORG I /MCH «:P> C '«
; 10 OFFICUL PUBLIC R E C O R D I S E « R C HC N T E N AE N T R Y FORM.
Official
"FLBMOHBRDOELN
WT H R S PROPERTY SMITH FRANCESCA M W THIS PROPERTY SMITH GENE S TRUSTEE
280 ELM ST
m T H R S PROPERTY SMITH GERALD S & SARAH A L
1 2 MIDDLE ST
ft « B • • # •
j |
VITAL RECORDS SEARCH Some counties and states allow searches for documents related to marriages, divorces, births, legal judgments, deeds, liens, powers of attorney, and so forth.
i
Public Records - Search
(MM/DD/YYYY)
MAINTENANCE CONTRACT MARRIAGE LICENSE MARSHAL DEED MATERIAL LIEN MECHANICS LIEN
I CROSS REFERENCE INSTRUMENT NUMBER
Your Digital Directory NLDWECLTOM
WORCH BY P H O N O
AREA 4 lift CODE*
WEB WAICH
M O R E BUSINESS S E A R C H OPTIONS
Find a Business BUSINESS NAME O RC A T E G O R Y S. L A W Y E R ! "J
| ENIER L O C A T O I N (E 9 ADDRESS, CITY, STALE, 01 ZIP CODE)
|
9
ADDRESS NUMBER AND PHONE N U M B E R SEARCH Any information listed in a U.S. telephone book can be found using this site. You can search either by name or telephone number to view the available information.
I N T E R N E T|P R O T E C T E D MODE: ON
addresses, telephone number, marital status, number
individuals in a particular state w h o s e street addresses
and age o f children, spending habits, and product pref-
are considered t o be in an affluent area and w h o buy
erences. T h e information retrieved from electronic pro-
baby products. Another c o m p a n y might request a list
files is then sold t o c o m p a n i e s upon request t o be used
o f all S U V owners in a particular city w h o have n o t
for marketing purposes, as illustrated in E x h i b i t 6 - 1 8 .
purchased a c a r in five years.
F o r e x a m p l e , o n e c o m p a n y might request a list o f all
M o s t businesses and W e b sites that collect personal information have a p r i v a c y p o l i c y that discloses h o w the
personal information you provide will be used (see E x p r i v a c y p o l i c y A policy, commonly posted on a
hibit 6 - 1 9 ) . As long as their actions d o not violate their
company's Web site, that explains how personal information
privacy policy, it is legal f o r businesses t o sell the per-
provided to that company will be used.
sonal data that they collect. T h e r e a r e s o m e problems with privacy policies, however, including that they a r e
s p a m Unsolicited, bulk email sent over the Internet.
sometimes difficult t o decipher and that m o s t people do
Chapter
6:
Network
and
Internet
Security
and
Privacy
E x h i b i t 6-18
How electronic profiling might work
W h e n you make an electronic transaction, information about who you are and what you buy is recorded, usually in a database.
Databases containing the identities of people and what they buy are sold to marketing companies.
The marketing companies add The marketing companies create the new data to their marketing lists of individuals matching the databases; they can then reorgspecific needs of companies; the anize the data in ways that might companies buy the lists for their be valuable to other companies. own marketing purposes.
n o t t a k e t h e t i m e t o read t h e m b e f o r e using a site. In
used t o sell p r o d u c t s o r services t o i n d i v i d u a l s . S p a m is
a d d i t i o n , m a n y businesses p e r i o d i c a l l y c h a n g e t h e i r pri-
a l s o used in p h i s h i n g s c h e m e s a n d o t h e r d o t c o n s a n d
vacy policies without warning, requiring consumers to
is
r e r e a d p r i v a c y policies f r e q u e n t l y o r risk t h e i r p e r s o n a l
nets. T h e text message spam
i n f o r m a t i o n b e i n g used in a m a n n e r t h a t t h e y did n o t
s h o w n in E x h i b i t 6 - 2 0
is a n
a g r e e t o w h e n t h e i n f o r m a t i o n w a s initially p r o v i d e d .
e x a m p l e o f a phishing
spam
Spam
refers
to
unsolicited
email
sent t o
a
large
sent
frequently
message.
A
via
great
bot-
deal
of
g r o u p o f individuals a t o n e t i m e . T h e e l e c t r o n i c e q u i v a -
s p a m involves
lent o f j u n k m a i l (see E x h i b i t 6 - 2 0 ) , s p a m is m o s t o f t e n
p r o d u c t s , such as medicine o r
health-related
w e i g h t loss s y s t e m s , c o u n t e r f e i t p r o d u c t s , p o r n o g r a E x h i b i t 6-19
phy,
Web site privacy policy
as well as n e w a n d o f t e n f r a u d u l e n t
This indicates that your
& LANDS' END | CUSTOMER SERVICE | PRIVACY - WINDOWS INTERNET EXPLORER J^^L^y • ntact it directly o r use a W e b
nesses is protecting the i n f o r m a t i o n l o c a t e d on paper
itc t h a t provides opt-out tools for
documents and hardware that are t o be disposed of. Papers, C D s , D V D s , and other media c o n t a i n i n g sensitive data should be shredded, and the hard drives o f c o m puters to be disposed of should be w i p e d — o v e r w r i t t e n several times using special disk-wiping o r disk-
marketing
activity before c o m p a n i e s can collect
erasing
or
software—before
share any personal data. This is already the case in the
drive
E u r o p e a n U n i o n . In fact, W a l - M a r t recently changed its
that
still
in the U.S. business community is to use your informa-
personal
merely
be
been refor-
(which
can
recovered),
wiped drive is very
specifically opt out. stores
sold
data on a properly
tion as allowed for by each privacy policy unless you that
has
matted
only if c u s t o m e r s opt in. However, the general practice
business
are
erased o r even
privacy policy to share information with third parties
Any
they
or recycled. Unlike the d a t a on a
difficult
information
or
impossi-
ble to recover.
a b o u t employees, customers, or other individuals must
Wiping is typically viewed as an a c c e p t a b l e pre-
take adequate security measures to protect the privacy
caution for deleting sensitive data like W e b site pass-
o f that i n f o r m a t i o n . Secure servers and encryption can
words and t a x returns from hard drives a n d o t h e r stor-
protect the data stored on a server; firewalls and access
age media. However, before disposing o f storage media
c o n t r o l systems can protect against unauthorized ac-
containing sensitive data, businesses should consider
cess. T o prevent personal information from being sent
physically destroying the media, such as by shredding
intentionally or inadvertently via email, organizations
or melting the hardware. T o help with this p r o c e s s , data
can use email encryption systems that automatically en-
destruction services can be used.
crypt email messages containing certain keywords. F o r instance, s o m e hospitals use encryption systems that
Electronic Surveillance and Monitoring
scan all outgoing email messages and a t t a c h m e n t s , and then a u t o m a t i c a l l y encrypt all messages that appear to
T h e r e are m a n y ways electronic t o o l s c a n be used to
c o n t a i n patient-identifiable i n f o r m a t i o n . T h e recipient
w a t c h individuals, listen in on their c o n v e r s a t i o n s , o r
o f an encrypted email message typically receives a link
m o n i t o r their activities. Some o f these t o o l s , such as devices used by individuals to eavesdrop on wireless telep h o n e conversations, are not legal. O t h e r products and technologies, such as the GPS devices t h a t are built into
Chief Privacy Officer
some cars so they can be located if they are stolen o r the monitoring ankle bracelets used for offenders sentenced
E n s u r i n g t h a t t h e p r i v a t e d a t a s t o r e d by a business is a d e q u a t e l y p r o t e c t e d is increasingly responsibility o f a chief privacy o f f i c e r rapidly
growing
position
to house arrest, are used solely f o r law e n f o r c e m e n t
the
purposes. Still other electronic t o o l s , such as c o m p u t e r
(CPO)—a
in business. Typically,
C P O s a r e r e s p o n s i b l e f o r e n s u r i n g privacy l a w s a r e c o m p l i e d w i t h , i d e n t i f y i n g t h e d a t a in a c o m p a n y t h a t n e e d s t o b e p r o t e c t e d , d e v e l o p i n g policies t o protect t h a t data, and responding t o any incidents
original factory settings before
t h a t occur. A n o t h e r issue t h a t m u s t b e d e a l t w i t h
recycling o r disposing o f it t o
by C P O s is t h e c h a n g i n g d e f i n i t i o n o f w h a t i n f o r m a t i o n is r e g a r d e d as p e r s o n a l a n d , t h e r e f o r e ,
clear all o f your personal di
needs to be safeguarded.
from the ph(
mm
Chapter
6:
Network
and
In
monitoring
software, video
surveillance
equipment,
and presence technology, c a n often be used legally by individuals, by businesses in c o n j u n c t i o n with employee monitoring, and by law e n f o r c e m e n t agencies. Computer monitoring s o f t w a r e records keystrokes,
logs the programs o r W e b sites accessed, o r otherwise monitors
someone's
computer
activity. T h e s e
pro-
grams are typically m a r k e t e d t o w a r d parents, spouses, law enforcement agencies, o r employers. Although it is legal to use c o m p u t e r m o n i t o r i n g software on your o w n computer or o n the c o m p u t e r s o f your employees, installing it on other c o m p u t e r s w i t h o u t the o w n e r s ' knowledge to m o n i t o r their c o m p u t e r activity is usually illegal. V i d e o s u r v e i l l a n c e is closed circuit security cameras
Privacy Expectations in Public Places Legally s p e a k i n g , p e o p l e t y p i c a l l y h a v e f e w rights t o privacy in public places, b u t m a n y believe t h a t new
technology—such
as c a m e r a
phones—will
require t h e l a w t o reconsider a n d redefine w h a t is c o n s i d e r e d t o b e a p u b l i c p l a c e . In fact, some places h a v e b a n n e d
mobile
p h o n e s entirely t o
protect
privacy,
such
individuals'
as in
locker
rooms, restrooms, a n d c o u r t h o u s e s , a n d by m a n y research a n d p r o d u c t i o n facilities t o p r e v e n t corporate espionage.
used t o m o n i t o r activities taking place at facilities for security purposes. It is routinely used at retail stores, b a n k s , office buildings,
and other
privately owned facilities that are open
t o the pub-
lic, as well as public locations such as streets, parks, airports, sporting arenas, and subway systems for law enforcement purposes. Public video surveillance systems are often used in c o n j u n c t i o n with face recognition technology t o try t o identify k n o w n terrorists and other criminals, t o identify criminals when their crimes are caught o n tape, and t o prevent crimes
Employee monitoring
is t h e a c t o f recording
or
observing the actions o f employees while on the j o b .
from occurring. M a n y privacy advocates object t o the
Common
use o f video surveillance a n d face recognition technol-
screening telephone calls, reviewing email, and track-
employee
monitoring
activities
include
ogy in public locations; their concerns are primarily
ing c o m p u t e r and Internet usage. A l t h o u g h many em-
based on h o w the video captured by these systems will
ployees feel that being w a t c h e d at w o r k is an invasion
be used.
o f their personal privacy, it is legal a n d very c o m m o n in the United States.
c o m p u t e r m o n i t o r i n g s o f t w a r e Software that
P r e s e n c e t e c h n o l o g y is the ability o f one computing
can be used to record an individual's computer usage, such
device on a network t o identify a n o t h e r device on the
as recording the actual keystrokes used or creating a summary of
same network and determine its status. It can be used
Web sites and programs accessed. v i d e o s u r v e i l l a n c e The use of video cameras to monitor attmtiesof individuals for work-related or crime-prevention purposes. e m p l o y e e m o n i t o r i n g Observing or reviewing employees' actions while they are on the job. p r e s e n c e t e c h n o l o g y Technology that enables one computing device to locate and identify the current status of another device on the same network.
ie American M a n a g e m e n t isociation ( A M A ) reports that the majority o f all U . S . companies use s o m e type o f electronic surveillance with their employ*
to tell when s o m e o n e o n the n e t w o r k is using his or her c o m p u t e r o r m o b i l e phone, as well as the individual's
MONITOR AT-WORK ACTIVITIES
availability for c o m m u n i c a t i o n s ; that is, whether or not the individual is able and willing to take a call or re-
IT IS WISE—FROM A PRIVACY
spond t o an I M at the present time.
STANDPOINT—TO AVOID ACTIVITIES AT WO
Protecting Personal and Workplace Privacy T h e r e are not many options for protecting yourself a g a i n s t c o m p u t e r m o n i t o r i n g by y o u r e m p l o y e r o r the g o v e r n m e n t , o r against video surveillance
systems.
be m o n i t o r e d when initially hired. T h e y should review
H o w e v e r , businesses should t a k e t h e neces-
it periodically t o ensure that they understand the policy
sary security m e a s u r e s t o ensure t h a t
and do n o t violate any c o m p a n y rules while w o r k i n g
e m p l o y e e activities a r e n o t b e -
for that organization.
ing m o n i t o r e d by a h a c k e r o r other
AntiSpy
unauthorized
ual. Individuals
individ-
should
also
Network and Internet Security Legislation
LO66
secure their h o m e c o m p u t e r s to p r o t e c t a g a i n s t
keystroke
logging
computer
or
other
monitoring software that may
A
be i n a d v e r t e n t l y installed via P
an
electronic
game,
or
greeting
other
lthough new legislation is passed periodically t o
card,
address new types o f c o m p u t e r c r i m e s , it is dif-
downloaded
ficult for the legal system to keep p a c e with the rate at
file, a n d t h a t is designed t o p r o a h a c k e r with a c c o u n t
which technology changes. In addition, there are both
numbers,
domestic and international jurisdictional issues because
p a s s w o r d s , a n d o t h e r sensitive data t h a t c o u l d
m a n y c o m p u t e r crimes affect businesses a n d individu-
be used in identity theft o r o t h e r f r a u d u l e n t activities.
als located in geographic areas o t h e r t h a n the one in
A n t i s p y w a r e s o f t w a r e c a n be used t o detect a n d re-
which the c o m p u t e r criminal is l o c a t e d , a n d hackers
m o v e s o m e types o f illegal c o m p u t e r m o n i t o r i n g and
c a n m a k e it appear that activity is c o m i n g f r o m a dif-
spyware software.
ferent location than it really is. Nevertheless, c o m p u t e r
T o p r o t e c t the personal privacy o f their employees
crime legislation continues t o be p r o p o s e d a n d c o m -
and c u s t o m e r s , businesses and organizations have a re-
puter crimes are being prosecuted. A list o f selected fed-
sponsibility t o keep private information a b o u t their em-
eral laws concerning n e t w o r k a n d Internet security is
ployees, the company, and their customers safe. Strong
shown in E x h i b i t 6 - 2 2 .
security measures can help to protect against unauthor-
T h e high level o f c o n c e r n regarding c o m p u t e r se-
ized access by hackers. Businesses and organizations
curity and personal privacy has led state a n d federal
should t a k e precautions against both intentional and
legislators t o pass a variety o f laws since the 1 9 7 0 s .
accidental breaches o f privacy by employees. Finally,
Internet privacy is viewed as o n e o f the t o p policy
businesses and organizations have the responsibility t o
issues facing Congress today, a n d n u m e r o u s bills have
m o n i t o r their employees' activities t o ensure workers
been p r o p o s e d in the last several years regarding s p a m ,
are productive. In general, businesses must maintain a
telemarketing, spyware, online profiling, a n d
safe and productive w o r k p l a c e environment and pro-
very i m p o r t a n t privacy issues. H o w e v e r , C o n g r e s s has
tect the privacy o f their customers and employees, while
had difficulty passing new legislation. In a d d i t i o n t o
at the same time ensure the c o m p a n y is n o t vulnerable
the reasons stated a b o v e , including the rate at w h i c h
t o lawsuits.
technology changes and the jurisdictional issues w h e n
other
Employees have the responsibility to read a c o m p a -
c o m p u t e r crimes affect businesses a n d individuals in
ny's employee policy that specifies w h a t personal activi-
geographic areas other than the o n e in w h i c h the c o m -
ties are allowed during c o m p a n y time o r on c o m p a n y
puter criminal is located, privacy is difficult t o define
e q u i p m e n t , as well as w h a t activities, such as W e b surf-
and there is a struggle t o b a l a n c e f r e e d o m of speech
ing, email, telephone calls, and downloading files, may
with the right t o privacy.
Chapter
6:
Network
and
Internet
Security
and
Privacy
E x h i b i t 6-22
Computer network and Internet security legislation
Law a n d Description
Date 2004
Identity Theft Penalty Enhancement Act Adds extra years to prison sentences for criminals who use identity theft (including the use of stolen credit card numbers) to commit other crimes, including credit card fraud and terrorism.
2003
CAN-SPAM Act Implements regulations for unsolicited email messages. Fair and Accurate Credit Transactions Act (FACTA)
2003
Amends the Fair Credit Reporting Act (FCRA) to require, among other things, that the three nationwide consumer reporting agencies (Equifax, Experian, and Transllnion) provide to consumers, upon request, a free copy of their credit report once every 12 months. 2003
PROTECT Act Includes provisions to prohibit virtual child pornography. Health Insurance Portability and Accountability Act (HIPAA)
2003
Includes a Security Rule that sets minimum security standards to protect health information stored electronically. 2002
Homeland Security Act Includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
2002
Sarbanes-OxleyAct Requires archiving a variety of electronic records and protecting the integrity of corporate financial data.
2001
USA PATRIOT Act Grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening the ability of federal agents to obtain the real identity of Internet users, intercept email and other types of Internet communications, follow online activity of suspects, expand their wiretapping authority, and more.
1998
Identity Theft and Assumption Deterrence Act of 1998 Makes it a federal crime to knowingly use someone else's means of identification, such as name, Social Security number, or credit card, to commit any unlawful activity.
1997
No Electronic Theft (NET) Act Expands computer piracy laws to include distribution of copyrighted materials over the Internet.
1996
National Information Infrastructure Protection Act Amends the Computer Fraud and Abuse Act of 1984 to punish information theft crossing state lines and to crack down on network trespassing.
1994
Computer Abuse Amendments Act Amends the Computer Fraud and Abuse Act of 1984 to include computer viruses and other harmful code.
1986
Computer Fraud and Abuse Act of 1986 Amends the 1984 law to include federally regulated financial institutions.
1984
Computer Fraud and Abuse Act of 1984 Makes it a crime to break into computers owned by the federal government. This act has been regularly amended over the years as technology has changed.
A n o t h e r issue is weighing the need t o implement
the Internet and carried a $ 5 0 , 0 0 0 fine. T h i s law w a s
legislation versus the use o f voluntary m e t h o d s t o p r o -
b l o c k e d by the U . S . Supreme C o u r t several times, based
tect c o m p u t e r security and personal privacy. F o r in-
on the likelihood t h a t it violates the First A m e n d m e n t
s t a n c e , the Child O n l i n e P r o t e c t i o n A c t ( C O P A )
has
and the possibility t h a t less restrictive alternatives such
been highly c o n t r o v e r s i a l since it w a s passed in 1 9 9 8 ,
as Internet filtering can be used instead t o prevent the
and, in fact, it has never been i m p l e m e n t e d . T h i s legisla-
access o f inappropriate materials by m i n o r s . A list o f
tion p r o h i b i t e d m a k i n g p o r n o g r a p h y or any o t h e r c o n -
selected federal laws related t o c o m p u t e r security and
tent deemed h a r m f u l t o m i n o r s available t o m i n o r s via
privacy are shown in E x h i b i t 6 - 2 3 .
Chapter
6:
Network
and
Internet
Security
and
Privacy
E x h i b i t 6-23
Date 2006
Federal legislation related to computer security and privacy
L a w and Description U.S. SAFE W E B Act of 2006 Grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
2005
Real ID Act Establishes national standards for state-issued driver's licenses and identification cards; will be modified if the proposed Pass ID Act of 2009 is passed.
2005
Junk Fax Prevention Act Requires unsolicited faxes to have a highly-visible opt-out notice.
2003
CAN-SPAM Act Implements regulations for unsolicited email messages and lays the groundwork for a federal Do Not E-Mail Registry.
2003
Do Not Call Implementation Act Amends the Telephone Consumer Protection Act to implement the National Do Not Call Registry.
2003
Health Insurance Portability and Accountability Act (HIPAA)
2002
Sarbanes-OxleyAct
Includes a Security Rule that sets minimum security standards to protect health information stored electronically. Requires archiving a variety of electronic records and protecting the integrity of corporate financial data.
2001
USA PATRIOT Act Grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening the ability of federal agents to obtain the real identity of Internet users and intercept email and other types of Internet communications.
1999
Financial Modernization (Gramm-Leach-Bliley) Act Extends the ability of banks, securities firms, and insurance companies to share consumers' non-public personal information, but requires them to notify consumers and give them the opportunity to opt out before disclosing any information.
1998
Child Online Protection Act (COPA)
1998
Children's Online Privacy Protection Act (COPPA)
1998
Telephone Anti-Spamming Amendments Act
1992
Cable Act
1991
Telephone Consumer Protection Act
1988
Computer Matching and Privacy Protection Act
1988
Video Privacy Protection Act
1986
Electronic Communications Privacy Act
Prohibits online pornography and other content deemed harmful to minors; has been blocked by the Supreme Court. Regulates how Web sites can collect information from minors and communicate with them. Applies restrictions to unsolicited, bulk commercial email. Extends the Cable Communications Policy Act to include companies that sell wireless services. Requires telemarketing companies to respect the rights of people who do not want to be called. Limits the use of government data in determining federal-benefit recipients. Limits disclosure of customer information by video-rental companies. Extends traditional privacy protections governing postal delivery and telephone services to include email, cellular phones, and voice mail. 1984 1974
Cable Communications Policy Act Limits disclosure of customer records by cable TV companies. Education Privacy Act
Stipulates that, in both public and private schools that receive any federal funding, individuals have the right to keep the schools from releasing such information as grades and evaluations of behavior.
1974 1970 1970
Privacy Act Stipulates that the collection of data by federal agencies must have a legitimate purpose. Fair Credit Reporting Act Prevents private organizations from unfairly denying credit and provides individuals the right to inspect their credit records. Freedom of Information Act Gives individuals the right to inspect data concerning them that is stored by the federal government.
Chapter
6:
Network
and
Internet
Security
and
Privacy
1.
Quiz Yourself 1.
At one university, precautions for containing code created during this course include only allowing fourth year students to take the course, not hav-
H o w do many organizations and educational
ing a network connection in the classroom, and
institutions explain acceptable computer use to
prohibiting the removal o f storage media from
their employees, students, or other users?
the classroom. D o you think these precautions are
2.
W h a t is the typical m o t i v a t i o n for hacking?
3.
W h y might hackers be moving away from target-
sufficient? 2.
ing data stored on c o m p a n y servers and focusing
Should writing virus code be allowed as part of a computer degree curriculum?
on stealing data in real time during credit card and
3.
debit card transactions?
Is it ethical for colleges to teach computer virus writing? Is it ethical for students t o take such a
4.
Define
5.
W h a t is malware?
6.
H o w does a D o S a t t a c k disable a server?
7.
Define
8.
W h a t is online auction fraud?
9.
W h a t is the purpose o f a digital certificate?
botnet.
course? 3.
Does teaching illegal and unethical acts (such as writing virus code) in college classes help to legitimize the behavior in society?
phishing.
4.
Would you feel c o m f o r t a b l e taking such a course? W h y or why not?
5.
Prepare a one- or two-page summary that answers these questions, and submit it t o your instructor.
1 0 . W h y are many states and schools reviewing their harassment statutes and bullying policies?
Practice It 6-2
1 1 . W h a t is a hard drive that uses full-disk encryption
Some people view using live surveillance cameras as a
often called?
valid crime prevention t o o l ; other people think it is an
1 2 . W h a t does antivirus software do?
invasion o f privacy.
1 3 . H o w does a firewall help protect a computer?
1.
1 4 . W h a t is a marketing database?
Is it ethical for businesses to use video cameras to record customers' activities? If so, for what purposes?
1 5 . W h a t is a t h r o w - a w a y email address? 1 6 . W h a t is the difference between opt-out
2. and
Does the government have the responsibility to use every means possible to protect the country
opt-in}
and its citizens, or do citizens have the right not to
1 7 . W h a t does c o m p u t e r monitoring software do?
be watched in public?
1 8 . Is it legal for c o m p a n i e s to review the email of
3.
their employees?
O n e objection stated a b o u t these systems is "It's not the same as a c o p on the corner. This is a c o p on every corner." W h a t if it were a live police officer at each public video c a m e r a location instead of a camera? Would that be m o r e acceptable from
Practice It
a privacy standpoint? 4.
Practice It 6-1
public, should they be c o n c e r n e d that law enforce-
Some college c o m p u t e r classes include instruction on
ment personnel may see them?
writing c o m p u t e r viruses. S o m e believe that students
5.
need to k n o w h o w viruses w o r k in order to be able to dustry disagrees, and m o s t antivirus professionals were
6.
never virus writers.
6:
Network
Does the risk of being recorded deter some illegal or unethical acts?
develop antivirus s o f t w a r e ; however, the antivirus in-
Chapter
If people do not plan to c o m m i t criminal acts in
Prepare a one- or two-page summary that answers these questions, and submit it t o your instructor.
and
Internet
Security
and
Privacy
D o the organizations reserve the right to change
3.
On Your Own
t h e i r p o l i c i e s a t a later t i m e w i t h o u t n o t i c e ? I f s o , w i l l they try to notify consumers?
On Your Own 6-1 A l t h o u g h a company's privacy policy m a y look accept-
4.
d a t a w i t h t h i r d - p a r t y o r g a n i z a t i o n s ? I f s o , is t h e
a b l e w h e n y o u r e a d it b e f o r e s u b m i t t i n g p e r s o n a l i n f o r -
data personally identifiable, a n d c a n customers
m a t i o n t o t h a t c o m p a n y , t h e r e is n o g u a r a n t e e t h a t the
opt out?
policy w i l l n o t be c h a n g e d . 5.
L o c a t e three different p r i v a c y policies o n W e b
1.
W h a t type of impact do y o u think a change in a company's privacy policy w o u l d h a v e o n customer
sites, a n a l y z e t h e m , a n d c o m p a r e t h e m . 2.
D o a n y of the policies a l l o w for a n y sharing of
loyalty?
D o t h e p o l i c i e s specify w h a t p e r s o n a l i n f o r m a t i o n
6.
m i g h t be shared a n d w i t h w h o m ?
P r e p a r e a one- or two-page s u m m a r y t h a t a n s w e r s these q u e s t i o n s , a n d s u b m i t it t o y o u r i n s t r u c t o r .
CAPSTONE
Computer Concepts T e c h n o l o g y is c h a n g i n g o u r w o r l d a t a n explosive p a c e . Older technology
b e c o m e s o b s o l e t e v e r y quickly,
3 . W h a t risks a r e i n v o l v e d or r e l a t e d t o n e w t e c h n o l -
and
o g y ? W h o is a f f e c t e d by t h e s e risks? C a n t h e s e risks b e m i n i m i z e d ? If so, h o w ? If n o t , w h y n o t ?
n e w t e c h n o l o g y is b e i n g i n t r o d u c e d all t h e t i m e . T h i n k a b o u t s o m e of t h e technological advances y o u have seen in t h e last s e v e r a l m o n t h s as w e l l as r e c e n t t e c h n o l o g i e s that h a v e b e c o m e obsolete.
4.
D o t h e benefits of n e w t e c h n o l o g y o u t w e i g h t h e risks? W h o s h o u l d h a v e t h e u l t i m a t e d e c i s i o n a b o u t t h i s — c o n s u m e r s ? g o v e r n m e n t ? businesses? E x p l a i n your answer.
1.
Discuss t h e i m p a c t of n e w t e c h n o l o g y r e g u l a r l y a n d q u i c k l y r e p l a c i n g existing t e c h n o l o g y . B e sure t o c o n s i d e r t h e p e r s o n a l , business, s o c i e t a l , e c o n o m i c , global, a n d environmental impacts of t h e n e w technology.
2. W h a t benefits does n e w t e c h n o l o g y provide? B e s u r e t o c o n s i d e r individuals, businesses, local c o m m u n i t i e s , t h e country, a n d t h e w o r l d .
5. W h a t e t h i c a l c o n c e r n s a r e r e l a t e d t o t h e i n t r o d u c t i o n of n e w t e c h n o l o g y ? 6. P r e p a r e a t w o - or t h r e e -page s u m m a r y t h a t a n s w e r s t h e s e q u e s t i o n s , a n d t h e n s u b m i t it t o y o u r instructor.
Windows
7
Exploring Microsoft Windows 7 I .earning Objectives After studying the material in this chapter,
Introduction
you will be able to:
M a n y personal c o m p u t e r s
use the Microsoft W i n d o w s 7 operating
s y s t e m — W i n d o w s 7 f o r short. Windows
is the name o f the operating
system, and 7 indicates the version you are using. Recall that the operating system is s o f t w a r e that manages and coordinates activities on the computer and helps the c o m p u t e r perform essential tasks, such as displaying information on the c o m p u t e r screen and saving data on disks. M u c h of the software created for the W i n d o w s 7 operating system looks and w o r k s similarly. T h i s similarity in design means that after you learn h o w to use o n e W i n d o w s 7 program, you are well on your way to understanding h o w t o use others. W i t h W i n d o w s 7, you can use
l o
7
.I
Identify the parts of the
W i n d o w s 7 desktop
LO7.2
Use c o m m o n W i n d o w s elements
LO7.3
Navigate W i n d o w s
LO7.4
W o r k with the Recycle Bin
LO7.5
Get Help
LO7.6
Shut d o w n W i n d o w s
more than one p r o g r a m at a time, making it easy to switch between your w o r d processing p r o g r a m and your appointment b o o k program, for e x a m p l e . It also m a k e s it easy to access the Internet. In this chapter, you learn the basics o f working with W i n d o w s 7. This provides the foundation you need t o use M i c r o s o f t Office applications and other programs to accomplish b o t h personal and business tasks.
LO7.1 Exploring the Windows 7 Desktop
I
n W i n d o w s terminology, the d e s k t o p is a workspace for projects and the tools that you need to manipulate your projects. Essentially, the desktop is the screen you see when you
first start W i n d o w s . T o learn a b o u t the features of the desktop, you'll start W i n d o w s and explore the various elements. M i c r o s o f t W i n d o w s 7 An operating system
Starting Windows and Examining the Desktop
from Microsoft used by many personal computers. d e s k t o p The first screen you see when you start Windows; used as a workspace for projects and the tools that you need to
T o start W i n d o w s , you simply turn your
manipulate your projects.
computer on. After completing the b o o t process, a W e l c o m e screen appears listing
Chapter
7:
Exploring
Microsoft
Windows
7
C H A P T E R
Microsoft Windows is the most common
operating
system for both desktop and portable PCs, whether for business or personal use.
all the users f o r the computer. Before you start w o r k i n g with W i n d o w s 7, y o u might need t o click y o u r user n a m e and type a p a s s w o r d . After you provide this i n f o r m a t i o n , the W i n d o w s 7 desktop appears.
S t a r t W i n d o w s 7.
A
Turn o n your computer. After a m o m e n t , W i n d o w s 7 starts a n d the W e l c o m e screen appears. On the Welcome screen, click your a c c o u n t name. If a password b o x appears, type your password in the b o x , and then click the G o b u t t o n
T h e W i n d o w s 7 desktop
a p p e a r s . See Exhibit 7 - 1 . (Your desktop might have a different b a c k g r o u n d a n d icons.)
P r o b l e m ? If a n account name button does not appear, t h e W e l c o m e screen disappears, and t h e W i n d o w s desktop s h o w n in E x h i b i t 7-1 a p p e a r s . S k i p S t e p 2.
Chapter
7:
Exploring
Microsoft
Windows
7
taskbar
Start button
buttons
I L
f
*
fm
«
S h o w desktop
P U S C IS C IM TU R E 1 MP3 F O R M A TS O U N D •V D IEOS | 4.61 MBF~ H O M E G R O U P
Search Sample Music
sort order.
]i) a m
fi
Sort a file list in a Windows Explorer window.
Musci library
I
C O M P U T E R &L O C A LD S IK (C)
thumbnails
%N E T W O R K
U P In the Windows Hxplorer window, click
More options button
the Contributing artists column heading. T h e list is resorted in a l p h a b e t i c a l order by the artist's n a m e , as indicated by t h e small up a r r o w in the C o n t r i b u t i n g artists c o l u m n heading. Click the
file type and size
Contributing artists column head-
ing again. T h e sort o r d e r is reversed, and the list is in descending a l p h a b e t i c ( Z - A ) order, as indicated by the d o w n a r r o w in
3T IEMS STATE: 2i S H A R E D
the column heading. I O n the toolbar, click
the More options button 0 , and then click
Large icons.
T h e folder n o w shows the file list as large icons with
^ Tip: Click the Change your view button [iT|to cycle among the Large Icons, List, Details, Tiles, and Content views.
only the file n a m e b e l o w each icon
Right-click a blank area o f the right p a n e , and then o n the shortcut m e n u , point to
Sort by. A submenu
o f options by w h i c h you
can sort the files opens. See E x h i b i t 7 - 1 4 . T h e s e categories correspond t o the c o l u m n headings t h a t are displayed in Details view. | O n the submenu, click Name. T h e list is resorted in alphabetical order by file n a m e .
Chapter
7: Exploring
Microsoft
Windows
7
Exhibit 7-14 Sort by options in a Windows Explorer window
arrow indicates the list is sorted by this column; the direction of the arrow indicates the sort order Arrange by B| Maid with
B /
Richard Stortzman...
Fine Music,
View
•
Mr. Scruff
Ninja Tuna
Sort by
•
Name
Group by
•
4>4LConb rtiun itg Album
Refresh Paste Homegroup
Sort by command on the shortcut menu
dots indicate the current sort conditions
Title
Paste shortcut Share with
artists
9 Ascending^^
•
^4rT5escending
New
More...
Properties
r
ACTIVITY Use the Navigation pane. QP
M o v e the pointer into the Navigation pane. Collapse arrows appear n e x t t o Favorites, Libraries, and Computer, and e x p a n d arrows appear next t o the items listed under these elements. See Exhibit 7 - 1 5 . |Next to M u s i c , click the
expand icon [>].The
folders in the M u s i c library appear below the list,
Using the Navigation Pane
and the icon next t o M u s i c changes t o the collapse
As you have seen, you c a n click a folder in the Navigation pane t o navigate directly t o that folder and display its contents in the right pane. Y o u c a n also use the Navigation pane t o navigate t o other locations o n
icon \^\. T h i s folder list includes the M y M u s i c and the Public M u s i c folders. | In the Navigation pane, e x p a n d the
Public Music
folder. T h e Sample M u s i c folder is listed under
your c o m p u t e r and t o subfolders. W h e n you move the
Public M u s i c , and it is selected because the c o n -
pointer into the N a v i g a t i o n pane, triangles appear next
tents o f this folder are displayed in the right pane.
to some i c o n s . Right-pointing, white triangles \V]— called e x p a n d i c o n s — i n d i c a t e that a folder contains other folders that a r e n o t currently displayed in the Navigation p a n e . D o w n w a r d - p o i n t i n g black triangles [ * } — c o l l a p s e i c o n s — i n d i c a t e t h e folder is expanded, and its subfolders are listed below the folder name.
Chapter
7: Exploring
Microsoft
Windows
7
| In the Navigation pane, e x p a n d the
Documents
folder. T h e folder list in the D o c u m e n t s folder includes the M y D o c u m e n t s and the Public D o c u ments folders.
I Close
the
Sample Music window.
Bin holds deleted items until you
remove
them
perma-
nently. Y o u c a n double-click the Recycle Bin t o open the Recycle Bin w i n d o w and see the files that are ready to be permanently deleted. If y o u w a n t t o keep a file t h a t is in the R e c y c l e Bin instead o f p e r m a n e n t l y de-
ix)- Working with the Recycle Bin 4
leting it, y o u c a n return the file to its previous location. T o do s o , right-click a file in the Recycle Bin w i n d o w and then click R e s t o r e on the shortcut m e n u , or click the file t o select it a n d then click the R e s t o r e this item button on the t o o l b a r . Deleting a
you delete a file from a hard drive, it is
file f r o m removable media, such as a U S B o r n e t w o r k
n o t removed from your computer. Instead, it is
drive, doesn't move the file to the R e c y c l e Bin, but de-
\\/hen •
•
moved to the Recycle Bin. See Exhibit 7 - 1 6 . T h e Recycle
letes it instantly. W h e n you n o longer need t h e files in the R e c y c l e
Exhibit 7-16 Recycle Bin and Recycle Bin window
Bin, y o u c a n
permanently
delete
To
them.
do
this,
right-click t h e R e c y c l e Bin and t h e n c l i c k E m p t y R e cycle B i n o n the
shortcut
m e n u , o r c l i c k the E m p t y the R e c y c l e Bin b u t t o n on the t o o l b a r in the R e c y c l e Bin w i n d o w . K e e p in m i n d that
you
cannot
retrieve
files t h a t have been e m p t i e d f r o m the R e c y c l e B i n .
Recycle Bin A folder on your computer that holds deleted items until you remove them permanently.
Chapter
7: Exploring
Microsoft
Windows
7
command on a menu or a button that is gray (sometimes lied grayed out) is unavailable and elk no el
LO75
Getting Help
A
s you w o r k , you might need m o r e information
a b o u t W i n d o w s 7 or one o f its programs. Windows
Help and Support
provides access to Help files stored on
your computer
as
^\\as
Help
well
information
stored on the M i c r o soft W e b site. If you are
not
connected
Empty the Recycle Bin
to the W e b , you will
Make it a practice to regularly empty the Recycle Bin. Storing many files in the Recycle Bin can slow down your computer's start up time. The unneeded files also take up space on your computer. Files you want to keep should be stored in other folders, not in the Recycle Bin. Remember, permanently deleted files can no longer be retrieved from the Recycle Bin.
computer.
have access to only the Help files stored on your T h e home page in W i n dows
Help
and
Support
provides tools for
finding
answers and other information a b o u t W i n d o w s 7. In the W i n d o w s Help and Support window, you can click a link in the N o t sure where to start? section to display a list o f topics. E a c h t o p i c link opens an article providing detailed information a b o u t that topic or instructions for performing a task. You can use the t o o l b a r t o navigate W i n d o w s Help and Support. F o r e x a m p l e , the Help and Support home button returns you t o the h o m e page. T h e Back and Forward buttons move you between the pages you have viewed.
Work with the Recycle Bin. Right-click t h e
Recycle Bin. T h e
Recycle Bin s h o r t -
cut menu opens. If n o files are currently in the Recycle Bin, the E m p t y Recycle Bin c o m m a n d will be gray (and unavailable). Press the Esc key to close the shortcut menu. Double-click t h e
Recycle Bin. T h e
Recycle Bin
w i n d o w opens. Any files or folders currently in the Recycle Bin are listed in this window.
ACTIVITY Use Windows Help and Support. I O n the taskbar,
click the Start
button A . I In the right pane o f
Close the Recycle Bin window.
the Start menu, click
Help and Support.
^ T i p : You can also start Windows Help and Support from a folder window by clicking the Get help button i®| on the toolbar.
T h e home page of
Windows Help and Support Help files stored
W i n d o w s Help and Support opens, as shown in
on your computer as well as Help information stored on the Microsoft Web site.
the contents you see on the h o m e page on y o u r
Exhibit 7 - 1 7 . If you are n o t connected to the W e b , screen might differ.
Chapter
7: Exploring
Microsoft
Windows
7
Getting help with dialog boxes and windows link.
Click the
Exhibit 7-17 Windows Help and Support window
T h e W i n d o w s Help and
Q WINDOWS HELP AND SUPPORT fib
H
&
°P
P
to that heading in the
TIONS
article.
| Search Help
Back and Forward buttons
Support w i n d o w scrolls
toolbar
I O n the t o o l b a r , click the
Find an answer quickly
ENTER A FEW WORDS IN THE SEARCH BOX ABOVE.
Back button @ . T h e previous
Search Help box
page you visited, w h i c h is the W i n d o w s B a s i c s : all topics page, is redisplayed.
Not sure where to start?
link to find more information on the Microsoft Web site
• HOW TO GET STARTED WITH YOUR COMPUTER! • LEARN ABOUT WN I DOWS BASICS BROWSE HELP TOPICS
Using the Contents List T h e C o n t e n t s list l o g i c a l l y o r g a n i z e s all o f the t o p i c s in W i n d o w s and
CHECK OUT THE WN I DOWS WEBSITE, WHICH HAS INFORMATION, DOWNLOADS, AND IDEAS FOR DOING MORE WTIH YOUR PC.
Support
and categories
links to basic Help information
a table
into
Help topics
similar
of contents
to
in
a
b o o k . In t h e C o n t e n t s list, you c a n c l i c k a c a t e g o r y t o
display the titles o f r e l a t e d t o p i c s . T h e n , you click a t o p i c t o get help
FEATURED THIS MONTH: • WHAT' 5 NEW IN WN I DOWS 7 • GETTING STARTED WTIH WN I DOWS 7
about a particular task or feature. F o r e x a m p l e , y o u c a n use the C o n tents list to learn m o r e a b o u t
files
and folders.
OIJ MORE SUPPORT OPTIONS i ONLINE HELP
ACTIVITY Find a Help topic using the Contents list.
button to switch between online and offline Help
I In the N o t sure where t o start?
the h o m e page for W i n d o w s H e l p and Support.
section, click the
Learn about Windows Basics link. A
list o f topics related to us-
ing W i n d o w s 7 appears in the W i n d o w s Help and Support window. I S c r o l l d o w n t o the H e l p a n d s u p p o r t h e a d i n g , and t h e n c l i c k the
Help and Support home button [fS t o return t o
I O n the toolbar, click the
Getting help link.
An a r t i c l e
e x p l a i n i n g h o w t o get help is displayed in the W i n d o w s H e l p a n d S u p p o r t w i n d o w . T h e " I n this a r t i c l e " s e c t i o n o n t h e right side o f
I On
the toolbar, click the
Browse Help button
[W
A list of categories appears in the W i n d o w s H e l p and Support window. I In the Contents list, click the
libraries category. A
Files, folders, and
list of topics and o t h e r c a t e -
gories related to files, folders, and libraries appears in the window.
I Click
the
Working with files and folders topic.
the w i n d o w p r o v i d e s links t o the h e a d i n g s in
W i n d o w s Help and Support w i n d o w displays
the a r t i c l e .
information about that t o p i c .
Chapter
7: Exploring
Microsoft
Windows
7
The
T o quickly op Windows Help Support window press the Fi key the desktop is acti\
Click a blank area of the W i n d o w s Help and Support w i n d o w t o close the ScreenTip.
Using the Search Help Bom If you can't find the topic you need by clicking a link or using the toolbar, or if y o u w a n t t o quickly find Help pages related to a particular topic, you can use the Search Help b o x . Y o u enter a w o r d or phrase about the topic you w a n t to find t o see a list o f Help pages
I In the first paragraph b e l o w the Working with files and folders heading, click the word
icons,
which is green by default. A ScreenTip shows the definition o f icons.
See
Exhibit 7 - 1 8 .
Browse Help button
containing those words. If n o n e o f the articles answer your question, you could click the Ask button on the t o o l b a r t o open a page listing o t h e r ways t o get Help information.
links to headings in the article Use the Search Help box.
Exhibit 7-18 ScreenTip with definition
U P O n the toolbar, click in
the Search Help box.
Windows Help and Suj
Type shutdown and then click the Search
ASK OPTIONS •
Help button [P
A list
o f Help pages contain-
Search Help
ing the words shut down
Working with files and folders
W i n d o w s Help and
A FILE IS AN ITEM THAT CONTAINS INFOF R M - this article In -C RATION EXAMPLE, TEXT O R IMAGES O R MUSIC. WHEN USING LIBRARIES TO ACCESS OPENED, A FILE CAN LOOK VERY MUCH LIKE A YOUR FILES AND FOLDERS TEXT DOCUMENT O R A PICTURE THAT YOU UNDERSTANDING THE PARTS MIGHT FIND ON SOMEONES ' DESK O R IN A OF A WN IDOW FILING CABINET. ON YOUR COMPUTER, FILES VIEWING AND ARRANGN IG ARE REPRESENTED WT IH ICONS; THIS MAKES IT FILES ANDOLDERS LESOBJECT O A SMALL PICTURE THAT REPRESENTS A FILE, FOLDER, PROGRAM, O R OTHER R AND MOVING FILES FUNCTION. X
Support window. See E x h i b i t 7 - 1 9 (your search results might differ).
) Click the Turning off
your computer properly topic. T h e article appears in the Windows
• CREATING AND DELETING FILES • OPENING AN EXISTING FILE
ScreenTip with definition
Help and Support window.
A
i f *
Mi
V
MOLLY CLARK
PENGUINS
TEXT DOCUMENT
appears in the
Problem? If a Topic not found message appears in the Help window, click the Back button @ on the toolbar, and then click a different topic link.
MORE SUPPORT OPTIONS 9 ONLINE HELP -
Chapter
7: Exploring
Microsoft
Windows
7
Windows Help and Support window.
I Close the
Exhibit 7-19 Results of a search in the Help window
p
search text
itt
A
s
k
°p
t
i
o
n
s
shut down
Ask button 1 'IIB Search Help button
28 results for shut down 1.
Shutting Down Windows
LO76
I
you
turn
Doing
so
always
Windows off
your
saves
shut before
computer.
energy,
pre-
serves y o u r d a t a a n d settings, and m a k e s sure y o u r c o m p u t e r
Change what happens when you press the power button on your computer
2.
should
down
m
Turning off your computer properly
Y
ou
starts quickly the n e x t time you use
3.
Troubleshoot problems with installing updates
4.
Change what happens when you close your laptop
the Shut d o w n b u t t o n at the b o t t o m
5.
Turn off a computer: frequently asked questions
o f the Start m e n u . W h e n you click the
6.
Optimize Windows 7 for better performance
7.
Sleep and hibernation: frequently asked questions
8.
Turn off your computer using Windows Media Center
9.
W h y won't my computer turn on or off quickly?
it. You can turn o f f W i n d o w s 7 using
Shut down b u t t o n , y o u r
W i n d o w s itself, a n d then c o m -
Corrupted files: frequently asked questions
11.
Resolving stop (blue screen) errors in Windows 7
12.
Turn the guest account on or off
13.
Fixing game performance problem:-
14.
User accounts: frequently asked questions
15.
Change, create, or delete a power plan (scheme)
M o r e support options
pletely turns o f f y o u r computer.
topics related to the search text (your search results might differ)
i 10.
computer
closes all open p r o g r a m s , including
F o r greater flexibility, you can click the a r r o w on the Shut down b u t t o n t o display shut d o w n
options,
more
including
Log off and Sleep. T h e Sleep o p tion saves your w o r k a n d then turns down the p o w e r t o y o u r
monitor
and computer. A light on the outside of the c o m p u t e r case blinks or turns yellow t o indicate t h a t the c o m 9
Online Help •
puter is sleeping. B e c a u s e your w o r k is saved, you do n o t need t o close
I Log Off, Sleep, or Shut Down When you're finished working on the computer, you need to decide whether to log off the computer, put the computer to sleep, or shut down. If you are using a computer that belongs to someone else, follow that person's policy. Otherwise, the best approach depends on who uses the computer and how long it will be idle. Keep the following guidelines in mind as you make your decision: ^
Log off—This command closes all programs and logs you off of Windows 7 but leaves the computer turned on. If another person might use the computer shortly, log off Windows to protect your data and prepare the computer for someone else to use.
^
Sleep—By default, Windows 7 is set to sleep after 15 to 30 minutes of idle time, depending on whether you are using a notebook or desktop computer. If
you will be away from the computer for more than 15 minutes but less than a day, you can generally let the computer go to sleep on its own. Shut down—If your computer is plugged in to a power outlet and you don't plan to use the computer for more than a day, you save wear and tear on your electronic components and conserve energy by shutting down, which ends your Windows 7 session and turns off your computer. You should also turn off the computer when it is susceptible to electrical damage, such as during a lightning storm, and when you need to install new hardware or disconnect the computer from a power source. If your notebook computer is running on battery power only and you don't plan to use it for more than a few hours, you should also turn it off to save your battery charge.
Chapter
7: Exploring
Microsoft
Windows
7
your programs or files before putting your c o m p u t e r
9.
In the Navigation pane, h o w do you display the
t o sleep. To wake a desktop computer, you press any
list of subfolders in a folder w i t h o u t displaying
key or move the mouse. T o w a k e a n o t e b o o k computer,
them in the right pane of the w i n d o w ?
you might need to press the hardware power button
1 0 . H o w do you permanently delete files in the
on your computer case instead. After you w a k e a c o m puter, the screen looks exactly as it did when you turned off your computer.
Recycle Bin from a drive? 1 1 . H o w do you access W i n d o w s Help and Support? 1 2 . W h y should you shut down W i n d o w s before turning off your computer?
ACTIVITY Turn off Windows 7. | P Click the Start
button @ on the taskbar.
I Do
one of the
following: •
Shut down button. Click the
^ T i p : Shutting down does not automatically save your work, so be sure to save your files before clicking the Shut down button.
W i n d o w s 7 displays a message that it is
click
Log off, and
1.
Start W i n d o w s 7 and log o n , if necessary.
2.
Use ScreenTips to identify each o f the icons on the
3.
computer.
Options button Q ,
Practice It 7-1
Write the steps you take as you complete this exercise.
taskbar.
shutting d o w n , and then turns off your
• N e x t to the Shut d o w n button, click the
Practice It
Paint (in the Accessories folder). T h i s program
More
then fol-
low your school's logoff procedure.
Use the Start menu to open the program named allows you to create simple drawings.
4.
Use the Start menu to open the M u s i c folder, and then use the Start menu to open the Documents folder.
5.
Quiz Yourself 1.
Minimize the D o c u m e n t s window. Click the Paint window to m a k e the Paint w i n d o w active, and then minimize the Paint window. M a x i m i z e the M u s i c window, and then restore it to its previous
W h a t happens when you point to the Start
size.
button? W h a t happens w h e n you click the Start 6.
button?
Use Flip 3 D to switch to the D o c u m e n t s window, and then resize the D o c u m e n t s window by making
2.
W h a t happens when you right-click an item?
3.
W h a t is a library?
4.
W h a t is the left pane in a W i n d o w s Explorer win-
and then close that window. Use the taskbar to
dow called?
close the M u s i c window.
5.
it approximately one inch taller. 7.
H o w do you change the view in a W i n d o w s E x -
8.
plorer window? 6. 7.
8.
Resize the D o c u m e n t s w i n d o w b a c k to its original size (approximately one inch shorter).
H o w do you manually resize a w i n d o w to a spe-
cific size
Use W i n d o w s Flip to switch t o the Paint window,
that you w a n t ?
9.
In the open window, use the Navigation pane to display the contents o f the Videos Jibrary. Display
W h e n m o r e than one w i n d o w is open, h o w many
the contents o f the Sample Videos folder in the
w i n d o w s can be active at the same time?
right pane.
In a W i n d o w s E x p l o r e r window, h o w do you display the c o n t e n t s o f a folder in the window?
1 0 . In the Navigation pane, e x p a n d the D o c u m e n t s library, and then e x p a n d the M y D o c u m e n t s folder.
Chapter
7: Exploring
Microsoft
Windows
7
1 1 . C h a n g e the view o f the Sample Videos w i n d o w to
6.
Large I c o n s .
Point to a file to display the S c r e e n T i p , and note the date the p h o t o was t a k e n .
1 2 . In the N a v i g a t i o n pane, collapse the D o c u m e n t s
7.
library.
Use the S t a r t m e n u t o d i s p l a y t h e c o n t e n t s o f t h e A c c e s s o r i e s folder in t h e All P r o g r a m s list, a n d t h e n c l i c k G e t t i n g S t a r t e d . In t h e list o f
1 3 . C h a n g e the view of the Sample Videos w i n d o w
t o p i c s , c l i c k P e r s o n a l i z e W i n d o w s , a n d t h e n in
b a c k to Details.
t h e t o p p a n e , click the P e r s o n a l i z e W i n d o w s
1 4 . O p e n the R e c y c l e Bin w i n d o w . If there is a file o r folder in the Recycle Bin, select it, and then e x a m i n e the details a b o u t the file in the Details
button. 8.
could use with D V D s .
pane. 1 5 . C l o s e the Recycle Bin window.
9.
started in a previous step. R e a d the i n f o r m a t i o n in
click Properties. Examine the w i n d o w that opens,
1 7 . O p e n the W i n d o w s Help and Support window,
O p e n W i n d o w s Help and S u p p o r t , a n d then find a topic that explains h o w to use the p r o g r a m you
1 6 . O p e n the Recycle Bin shortcut m e n u , and then and then click the Cancel b u t t o n .
Use the Start menu to open a p r o g r a m t h a t you
the window. 1 0 . Close all open windows.
and then display the Contents list. Click the C u s t o m i z i n g your computer category, and then click the W h a t is a theme? topic. L o c a t e the green w o r d window,
and then display its definition in a
ScreenTip. 1 8 . Use the Search Help b o x to display a list o f results for the w o r d
libraries.
Click the W o r k i n g with
libraries t o p i c , and then read the information in
On Your Own
On Your Own 7-1
Write the steps you take as you c o m p l e t e this project. 1.
plays digital media. Start this p r o g r a m .
1 9 . C l o s e the W i n d o w s Help and Support window. 2 0 . Turn o f f W i n d o w s 7 by using the Sleep c o m m a n d ,
2.
Display the Accessories folder in the Start m e n u , and then locate the program t h a t a l l o w s you to
shutting d o w n , or logging off.
Practice It 7-2
O p e n the All Programs list in the Start m e n u , and then use ScreenTips to locate the p r o g r a m that
the w i n d o w .
create short notes. Start this p r o g r a m . 3.
Use W i n d o w s Help and Support t o research the p r o g r a m you started in the previous step.
Write the steps you take as you complete this exercise. 4.
Use the Search Help b o x in W i n d o w s Help and
1.
Start W i n d o w s 7 and log on, if necessary.
2.
O p e n a W i n d o w s Explorer w i n d o w using your
p r o g r a m you researched in the previous step. N o t e
log on n a m e in the Start menu.
whether all the results seem relevant.
3.
O p e n the C o m p u t e r window. Identify the names
Support to list all the Help topics related to the
5.
4.
p r o g r a m in Step 2 .
In the N a v i g a t i o n pane, e x p a n d the C o m p u t e r folder, and then e x p a n d the hard disk, such as
6.
M u s i c folder. Display the contents o f the Sample M u s i c folder in the window. 5.
Use the Start menu to open the Pictures folder in a new window. Display the contents o f the Sample Pictures folder in the window, and then change the
Use Flip 3 D to m a k e the p r o g r a m you started in Step 1 the active window.
Local Disk ( C : ) . E x p a n d the Users folder, e x p a n d the Public folder, and then e x p a n d the Public
Use ScreenTips to identify the t w o b u t t o n s on the note created on the desktop w h e n you started the
of the drives on the computer.
7.
Use W i n d o w s Flip to m a k e the note created w h e n you started the program in Step 2 active.
8.
Use the t a s k b a r to close the w i n d o w associated with the p r o g r a m you started in Step 2 .
9.
Close all o f the other open w i n d o w s .
view to E x t r a Large Icons.
Chapter
7: Exploring
Microsoft
Windows
7
M
A
N
A
G
I
N
G
Y
O
U
R
F
I
L
E
S
Learning Objectives
Introduction
After studying the material in this chapter, you will be able to:
Knowing h o w t o save, l o c a t e , and organize computer files makes you
L08.I
Organize files and folders
L08.2
Manage files and folders
LO8.3
Work with compressed files
more productive when you are w o r k i n g with a computer. A file, often referred to as a d o c u m e n t , is a collection of data that has a name and is stored on a computer. Y o u can open any file, edit its contents, print it, and save it again—usually with the same program used to create it. You organize files by storing them in folders. Having well organized files makes it easier and faster to find the files you want and to w o r k efficiently.
In this chapter, you will learn strategies for organizing your files and folders, and then practice navigating the files and folders on your computer. You'll learn h o w to create, n a m e , copy, move, and delete folders as well as n a m e , copy, m o v e , and delete files. You'll also w o r k with compressed files.
LO8.1
A
Organizing Files and Folders computer can store folders and files on different types of disks, ranging from r e m o v able media—such as U S B drives, C D s , and D V D s — t o hard disks, which are p e r m a -
nently stored on a computer. A computer distinguishes one drive from another by assigning each a drive letter. T h e
hard disk is usually assigned to drive C. T h e remaining drives can have any other letters, but are usually assigned in the order that the drives were installed on the computer. S o , your U S B drive might be drive D o r drive G .
The Windows 7 File System W i n d o w s 7 stores thousands of files in many folders on the hard disk o f your computer. T h e s e are system files that W i n d o w s 7 needs to display the desktop, use drives, and perform ^^^^^^^^^^^^^^^^^^^
other operating system tasks. T o ensure system stability and
file system The hierarchy of how files and folders are organized.
to find files quickly, W i n d o w s 7 organizes the folders and files in a hierarchy, or
file system.
At the top o f
the hierarchy, W i n d o w s 7 stores folders and files that
Chapter
8: File
Management
9 Knowing computer
how to save, locate,
files will make
this effectively,
you more
it is important
for managing
it needs w h e n you turn on the computer. T h i s location is called the usually drive C (the hard disk). T h e term root
root directory,
and
organize
productive. to devise
To do
a
files on your
strategy computer.
and is
refers t o a popular m e t a p h o r for visualizing
a file s y s t e m — a n upside-down tree, which reflects the file hierarchy that W i n d o w s 7 uses. In E x h i b i t 8 - 1 , the tree trunk corresponds t o the r o o t directory, the branches t o the folders, and the leaves t o the files. Some folders contain other folders. An effectively organized c o m puter contains a few folders in the root directory, and those folders contain other folders, also called
subfolders.
root directory The top of the file system
for system files and folders. Y o u should n o t store your o w n
where Windows 7 stores folders and files that it needs when you turn on the computer.
w o r k here because it could interfere with W i n d o w s o r a
subfolder A folder contained within another folder.
T h e r o o t directory, o r t o p level, o f the hard disk is only
program.
Exhibit 8-1 Windows file hierarchy drive C root directory 4-
some folders are also reserved for Windows and programs
Jan bills Jan I
system file system
taxe^
My Documents Financials
Windows
7
System system file
top level of the hard disk is for system files and folders only
system file
program
program am file
FILE subfolder in Windows folder
destinations
Feb bills
Creative
novel ^ chapter 1 4~ novel chapter 2
Developing an Organizational Strategy
Don't Delete or Move System Files Do not delete or move any files or folders from the root directory of the hard disk—doing so could disrupt the system so that you can't run or start the computer. In fact, you should not reorganize or change any folder that contains installed software because Windows expects to find the files for specific programs within certain folders. If you reorganize or change these folders, Windows cannot locate and start the programs stored in that folder. Likewise, you should not make changes to the folder (usually named Windows) that contains the Windows operating system.
Chapter
8:
File
Management
It is important to develop a strategy for organizing your folders and files. Exhibit 8-2 shows h o w you could organize your files on a hard disk if you were taking a full semester of distance-learning classes. T o duplicate this organization, you would open the main folder for your documents, create four f o l d e r s — o n e each for the Basic Accounting, Computer C o n c e p t s , M a n a g e m e n t Skills II, and Professional Writing c o u r s e s — a n d then store the writing assignments you complete in the Professional Writing folder. If you store your files on removable media, such as a U S B drive or rewritable C D , you can use a simpler organization because you do not have to account for system files. In general, the larger the medium, the more
If you are working in a computer lab or on a public computer, you might not be allowed to aceess
Syncing a Desktop and Laptop Computer If you work on two computers, such as one com puter at an office or school and another computer at home, or on a desktop and a laptop, you can copy the most recent version of your files from one computer to the other using a network connection or a portable storage device, such as a USB drive. Or, you can use a synchronization program to do this automatically to ensure that you are always working with the most recent version. Synchronizing—or syncing— folders and files between two computers means to copy
the most updated version from one computer to the other. To do this, you can use the Sync Center, which is available in Windows 7 and Windows Vista, or programs specifically designed to do this, such as SyncToy, a free program available from Microsoft, or GoodSync from Siber Systems. You can also sync to the "cloud" by using Windows Live SkyDrive or a service such as Box.net or Dropbox. For more information about syncing, check the help information available from each program's manufacturer.
levels o f folders you should use because large media can
s t o r e — o n e each for Courses, Creative, F i n a n c i a l s , and
store m o r e files, and, therefore, need better organiza-
V a c a t i o n . T h e Courses folder c o u l d then include one
tion. F o r e x a m p l e , if you are organizing files on a U S B
folder for each course, and each o f t h o s e folders could
drive, you c o u l d create folders in the top level o f the
contain the appropriate files.
U S B drive for each general category o f documents you
W h e n you open Windows Explorer, it shows the contents of the four Windows built-in libraries by default. R e m e m b e r that a
Exhibit 8-2 Folders and files organized on a hard disk
library is a central place to
view
and
organize
similar types o f files and folders stored anywhere that your c o m p u t e r can access,
Top level of file system
Hard disk (CO
I Level 2
such
hard
i Windows
I
as
disk,
your
removable
drives, and a network.
_
T h e four default libraries are the D o c u m e n t s ,
I Program Files
Music,
Documents and other data
Pictures,
and
Videos libraries. In contrast, a folder stores files in
a
specific
location,
such as in the Professional Writing subfolder
My Documents
o f the M y
Documents
folder on the L o c a l Disk (C:) drive. T o open the Report Basic Accounting
Management Skills II
Computer Concepts
Professional Writing
file
stored
in
the
Professional
Writ-
ing
folder,
must
you
Folders created for each course 1^
T
Level 5 Memo
Policy
Proposal
Files for the Professional Writing course
1
J Report
synchronize (sync) To copy the most updated version from one computer to another.
4 k
Exhibit 8-3 Folders and files organized on a hard disk
navigate to the Local Disk (C:) drive, then the M y D o c uments folder, and finally the
Professional
Writing
folder. A library makes it easier to access similar types o f files. For example, you
might
store
some music files in the M y Music folder and others in a folder named
Libraries folder selected Navigation pane
Albums on your hard disk. You might also store music files in a Tunes folder on a U S B drive. If the
expanded Documents folder in Navigation pane
U S B drive
is connected to your c o m puter, the Music library c a n display all the music files in the M y Music, Albums, and Tunes folders. You can then arrange the files to quickly find the ones you want to open and play.
Navigating to Files To navigate t o the files you w a n t , it helps to know the file path. T h e path shows the location o f a file on a c o m -
Navigate to a library and a folder. O n the taskbar, click the Windows Explorer button 2- T h e Windows E x p l o r e r w i n d o w opens, displaying the contents o f the four default l i b r a r i e s —
puter and leads you through the file and folder organization t o the file. For e x a m p l e , the Customer List file is stored in the Chapter subfolder o f the Chapter 8 folder included with your data files. If you are working o n a U S B drive, the path t o this file might be:
D o c u m e n t s , M u s i c , Pictures, and Videos.
G:\Chapter 8\Chapter\Customer List.accdb
If the Windows E x p l o r e r w i n d o w is maximized, click the Restore Down button
I
I In the Navigation pane, under Libraries, point to the
Documents folder to display the Expand icon Click the Expand icon [j>J t o e x p a n d the D o c u ments folder. T h e folders in the D o c u m e n t s library appear in the Navigation pane. See Exhibit 8 - 3 . ^
In the Navigation pane, click the My Documents
This path has four parts, and each part is separated by a backslash (\): ^
G — T h e drive n a m e ; f o r e x a m p l e , drive G might be the name f o r the U S B drive
^
Chapter 8—A top-level folder on drive G
^
Chapter—A subfolder in the Chapter 8 folder
folder. T h e contents o f this folder appear in the right pane.
path A notation that indicates a file's location on your computer.
Chapter
8: File
Using the Navigation pane helps you explore your computer and orients you to your current location.
Management
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
^\\\\
^
I D o u b l e - c l i c k t h e Chapter 8 folder. T h e c o n t e n t s
C u s t o m e r L i s t . a c c d b — T h e full file n a m e , including the file extension
of the Chapter 8 folder—the Chapter, O n Your O w n , a n d P r a c t i c e It s u b f o l d e r s — a p p e a r in t h e
If s o m e o n e tells you t o find the file G:\Chapter 8\
w i n d o w . T h e Address b a r s h o w s t h e p a t h t o t h e
Chapter\Customer List.accdb, y o u must navigate t o
C h a p t e r 8 folder.
drive G , open the Chapter 8 folder, a n d then open the C h a p t e r folder t o find the C u s t o m e r List file.
I In the Address bar, t o the right o f C h a p t e r 8 , click
Y o u c a n use a n y folder w i n d o w t o navigate t o the
the
right-pointing arrow \Y\. T h e
list o f subfolders
in the C h a p t e r 8 folder appears.
data files y o u need for the rest o f these chapters.
I In the list, click
Chapter. T h e
files in t h e C h a p t e r
folder appear in the E x p l o r e r w i n d o w . T h e icon
ACTIVITY
next t o each file name indicates t h e type o f file.
Navigate to a file.
More options arrow next t o the Change your view button \m »|. A menu appears.
I O n the toolbar, click the
In the Navigation pane, if the C o m p u t e r folder is n o t e x p a n d e d , click the Computer folder
Expand
I O n the m e n u , click List. T h e files a p p e a r in List
icon [ > ] . T h e drives on your computer are listed b e l o w the Computer folder in the Navigation pane.
J
T h e drives o n your computer are n o w displayed in
More options arrow n e x t to the Change your view button |£ i »|, and then click Large Icons. T h e files a p p e a r in Large Icons
the right p a n e .
view. N o t e that in any o f the I c o n s views, y o u c a n
In the Navigation pane, click the
^
view in the folder window. See E x h i b i t 8 - 4 .
Computer folder.
In the Computer window, double-click the drive con-
O n the toolbar, click the
see the contents o f graphics
^ ^ ^ ^
taining your data files. For example, if your data files are on the hard drive, double-click
Local Disk (C:). If your Data Files
path on your screen might differ
are o n a USB drive, double-click
Removable Disk letter:),
(drive
where drive
letter is whatever letter your removable drive is, such as E , F, or G . If your data files are on a network drive, in the Navigation pane, click
the Network folder, and then in the window, double-click the drive containing your data files. ) In the folder window, double-click folders as needed until you see the Chapter 8 folder included with your data files.
Chapter
8: File
Management
L08.2
A
Managing Folders and Files
Guidelines for Creating Folders
fter you devise a plan f o r storing your files, you
As you organize your files by creating folders, keep in mind the following guidelines to ensure that you and others who might later work with your files can quickly and easily find the files you need:
are ready t o get organized by creating folders
and subfolders that will hold your files and then moving the files into the appropriate folders.
^
Creating a Folder or Subfolder First, determine which files seem t o belong together. Then, develop an appropriate file structure. When you are work-
^
ing on your own computer, you usually create folders within the M y Documents folder and other standard folders, such as M y Music and M y Pictures. When you create a folder, you give it a name, preferably one that describes its contents. A folder name can have up to 2 5 5 characters, but cannot include the / \: * ? " < > or I characters. F o r e x a m p l e , l o o k again at the files in Exhibit 8 - 4 .
^
All o f these files are related t o a business named Cathy's Candy Shoppe.
^
Candy and Web Page Screenshot are graphics
Keep folder names short and familiar. Long names can be cut off in a folder window, so use names that are short but meaningful, such as project names or categories. Develop standards for naming folders. Use a consistent naming scheme that is logical to you and others. For example, you could use a project name as the name of the main folder, and include step numbers in each subfolder name, such as 01 Plan, 02Approvals, 03Prelim, and so on. Create subfolders to organize files. If a file listing in a folder window is so long that you must scroll the window, consider organizing those files into subfolders.
files. Candy is a photograph o f candy, and Web Page Screenshot is a graphic file in the file format P N G .
^
Business Plan is a P o w e r P o i n t presentation that contains the beginning o f a presentation t o explain the store's business plan.
^ ^
Customer List is an Access file listing potential
Create folders. QP
Expenses is an E x c e l file that lists projected e x -
the window. T h e folder n a m e is highlighted, and a
with the placeholder label New folder
^
appears in
b o x appears around it. T e x t y o u type will replace
Flyer is a Word d o c u m e n t that contains a flyer t o announce the grand opening o f the store.
^
New folder button. A folder icon
customer names a n d addresses.
penses for the store. ^
O n the t o o l b a r in the C h a p t e r 8\Chapter folder window, click the
the highlighted text. See E x h i b i t 8 - 5 .
Hfc Type Graphics and then press the Enter key. replaces the placeholder name and the
Letterhead is a W o r d d o c u m e n t o f (as the name
Graphics
implies) letterhead f o r the store.
new Graphics folder is selected in the window.
Web Page Draft is a W o r d document saved as an
Right-click a b l a n k a r e a o f t h e w i n d o w . A s h o r t c u t
H T M L document that c a n be published t o a W e b
menu opens. See E x h i b i t 8 - 6 .
server and accessed as a W e b page.
TmW O n t h e s h o r t c u t m e n u , p o i n t t o New, a n d t h e n click
O n e w a y t o organize these files is t o create the fol-
Folder. A n e w f o l d e r
is c r e a t e d .
lowing three f o l d e r s — o n e f o r graphics, o n e for the finances, a n d o n e f o r marketing:
^
Graphics folder—Candy and W e b Page Screenshot
^
Finances folder—Business Plan and Expenses
^
Marketing folder—Customer List, Flyer, Letterhead, and W e b Page D r a f t
Chapter
8: File
Management
A
Problem? If the New command is not on your shortcut menu or if the New command does not have an arrow next to it, click a blank area of the window to close that menu, and then repeat Step 3, being sure to click a blank area of the window.
New folder button on toolbar I Type Finances and then press the Enter key. T h e n e w folder is r e n a m e d . ) C r e a t e a n e w folder
Marketing.
named
The
C h a p t e r 8\Chapter folder n o w c o n t a i n s three s u b f o l d e r s .
Moving or Copying Files and Folders If you w a n t t o place a file into a folder f r o m a n o t h e r l o c a t i o n , you c a n m o v e the file or c o p y it. M o v i n g a file removes it f r o m its c u r r e n t location and places it in a new l o c a t i o n Copying
you
also
specify.
places
the
file in a n e w l o c a t i o n that you specify, but does
not
remove it f r o m its current l o c a t i o n . Y o u c a n m o v e and
Exhibit 8-6 Shortcut menu in a folder window
copy
folders
way
that
copy
in the
you
files.
same
move
When
and
you
do,
you m o v e o r c o p y all the files c o n t a i n e d in the folder. « Removable Disk (E:) • CMPTR • Chapter 8 • Chapter
OrgF an eoe i • Bun r New fod ler aziv tris• ,- Open Share wth r • Desko tp £ Down olads .^ Recent Palces m Lb irare is Bus niess Paln f§ Documenst 1 My Documenst ^ Pubcil Documenst mf* Musci t Pciu tres Fyler H Vd ieos Homego rup Compuetr & Local Dsik (C:) Removab el Dsik (F)j Graphcis N e foed lrer Fe liwfD od la e t mode fid: 111/72/014 52 :7 PM 4
—
New command on shortcut menu
The move
easiest
files
or
way
to
folders
is
t o drag t h e m , just as you dragged w i n d o w s in C h a p ter 7. W h e n you drag a file or
folder
from
one
loca-
tion t o a n o t h e r on the same drive, the file o r folder is moved f r o m its original location t o the n e w l o c a t i o n . When
you drag a
file
or
folder f r o m o n e drive to another drive, the file
arrow indicates a submenu will open when you point to this command
or folder is copied instead o f m o v e d . You
can
override
this default behavior by dragging a file using the right
mouse button. When
you
drag a file o r folder using
I Double-click the
the right mouse button, a shortcut menu appears, and
Finances folder. T h e
window
you c a n choose the M o v e here or the C o p y here c o m -
changes t o display the contents o f the Finances
m a n d , depending on w h a t y o u w a n t t o d o .
folder, which n o w contains the Business Plan presentation file.
T o move or copy m o r e t h a n one file at the same time, you select all the files you w a n t t o copy, and then
I O n the title bar, t o the right o f the Address bar,
drag them as a group. T o select files that are adjacent in
click the
a window, click the first file in the list, hold down the
Back button @
. T h e contents o f the
Chapter folder appear in the window. T h e fold-
Shift key, click the last file in the list, and then release
ers n o w appear first in the w i n d o w because the
the Shift key. To select files that are n o t adjacent, click
window automatically resorts when you redisplay
one file, hold down the Ctrl key, click the other files,
its contents, and folders appear first by default.
and then release the Ctrl key.
Expenses file, but do n o t release the mouse button. Drag the Expenses file to the Finances folder, and then release the mouse button.
( Right-click the
ACTIVITY Move files or folders.
Q|
A shortcut menu opens on the Finances folder.
Drag the BUSINESS PLAN FILE on t o p of t h e FINANCES FOLDER, but do n o t release t h e m o u s e b u t t o n .
| O n the shortcut menu, click
A ScreenTip a p p e a r s identifying the a c t i o n
Customer List file, and then press and Ctrl key. Click the Flyer file, the Letterhead file, and the Web Page Draft file, and then release the Ctrl key. T h e four files you clicked are selected. hold the
Exhibit 8-7.
Exhibit 8-7 Moving a file into a folder selected file
Removable Disk (E:) C•MPTR • Chapter 8 • Chapter Print Burn New folder
Libraries [j] Documents B My Documents ± Public Documents mP Music fr- Pictures H Videos Finances folder
1
Humeyruup lomputer Local Disk (C:) Removable Disk (E:)
Search Chapter
u
19 Business Plan
Candy
Customer List
Expenses
4
Graphics
Pi
D r a g the four selected
Marketing
folder.
Web Page Draft
>
^k, Tip: Because the files are listed sequentially, you could also press the Shift key, click the first file in the list, click the last file in the list, and then release the Shift key to select all the files.
files into the
J Flyer
file is
| Click the
as moving t h e file t o t h e F i n a n c e s folder. See
Favorites • Desktop & Downloads „ Recent Places
Move here. The
moved from the current folder t o the Finances folder.
I
Web Page Screenshot
ScreenTip
r
F.nan*W I
alio]-
Orientation * IJ
Margins
University of Chicago t h r o u g h Concentration: Marketing. O n the R i b b o n , click
the Page Layout tab. In the P a r a g r a p h g r o u p ,
»
|9 Line N u m b e r s » b?" H y p h e n a t i o n *
age Setup 11 C o l u m n s "
t h e t h r e e lines f r o m
Hfc
Size'
•p=?{ Breaks
Mailings ^
lesumeTlnar^Microsoft Wot Review
Watermark *
v*| P a g e C o l o r • J] P a g e B o r d e r s
Spacing section in the Paragraph group
View
Indent
Spacing
%W Left
0-
S i R i g h t : 0'
'
C
JS
Before: (
C
;J
After:
EducationH
University-of Chicago- •Chicago,-IL*!
selected paragraphs have 10 points of space after them
BA-CL/m/at/c/e,-Business,Oune,-2013^1 Concentration: Marketing^ Minor: Spanish^
in the Spacing section, 1 0 pt a p p e a r s in the After b o x , indicating that there is 1 0 points o f space after each of the selected p a r a g r a p h s . See
paragraph spacing The space above and below a paragraph.
Exhibit 1 0 - 1 6 .
Chapter
10:
Creating
a
Document
7
Exhibit 10-17 LINE AND PARAGRAPH SPACING BUTTON MENU Line and Paragraph Spacing button
so that th of the letti prints the letterhe& Hfc Select the Education heading. J) In the Paragraph g r o u p , in the Spacing section, click the
Before
box up arrow twice. T h e space above the selected p a r a g r a p h increases to 1 2 points.
points o f space are removed after each o f the
Switch to the Cover Letter document, and then
selected paragraphs.
scroll the document so that 1107 Park St. appears at the top o f the d o c u m e n t window. VM Select the first three lines in the inside address (from
Mabel Wong
through
I O n the H o m e t a b , in t h e P a r a g r a p h g r o u p , c l i c k the
Line and Paragraph Spacing button A m e n u o f line spacing options a p p e a r s , with t w o paragraph spacing c o m m a n d s a t t h e b o t t o m . See
132 South Canal St.).
^k,Tip: When entering text, you can press the Shift+Enter keys to move the insertion point to a new line without starting a new paragraph and therefore create new lines without the paragraph spacing.
Adjusting Line Spacing Line spacing
is the a m o u n t o f s p a c e that
appears
b e t w e e n lines o f t e x t w i t h i n a p a r a g r a p h . W o r d offers a n u m b e r o f preset line s p a c i n g o p t i o n s . P a r a graphs
formatted
single spaced.
with
t h e 1 . 0 setting are called
Single s p a c i n g a l l o w s the least a m o u n t
o f space b e t w e e n l i n e s — e s s e n t i a l l y n o e x t r a s p a c e . P a r a g r a p h s f o r m a t t e d with t h e 2 . 0 setting are called
double spaced a n d have
a b l a n k line o f space b e t w e e n
each line o f t e x t in t h e p a r a g r a p h . T h e default line spacing setting is 1 . 1 5 , w h i c h a l l o w s a little m o r e space b e t w e e n lines t h a n 1 . 0 s p a c i n g . T h e 1 . 1 5 line spacing setting is designed t o m a k e it easier t o read t e x t on a c o m p u t e r s c r e e n .
Exhibit 10-17. | At the b o t t o m o f the m e n u , click
After Paragraph. T h e
Remove Space
menu closes, and the 1 0
ACTIVITY Adjust line spacing. I Select all the text in the d o c u m e n t .
line spacing The amount of space between lines of text within a paragraph. single spaced Line spacing that has no extra space between lines of text in a paragraph. double spaced Line spacing that has a blank line of text between each line of text in a paragraph.
I O n the H o m e t a b , in the Paragraph group, click
the Line and Paragraph Spacing button |+=-[. T h e default line spacing setting for the selected text ( 1 . 1 5 ) is indicated by a check m a r k . I O n the m e n u , c l i c k 1.0. T h e s p a c i n g b e t w e e n lines in each p a r a g r a p h is c h a n g e d t o single spaced.
Chapter
10: Creating
a
Document
Aligning Paragraphs Normal
are
Exhibit 10-18 Varieties of text alignment
paragraphs
left-aligned—they
are flush with the left
margin a n d ragged, or uneven, along the right
margin.
Right-aligned
paragraphs are aligned along the right margin and
ragged
along the
left m a r g i n . Paragraphs
that
left alignment When you go to an interview, don't forget about your appearance. First impressions count, and you want to be able to spend the bulk of the interview discussing your abilities and accomplishments, not trying to overcome a negative first impression.
right alignment When you go to an interview, don't forget about your appearance. First impressions count, and you want to be able to spend the bulk of the interview discussing your abilities and accomplishments, not trying to overcome a negative first impression.
are centered are
positioned m i d w a y between the left a n d right margins along
and both
ragged margins.
Justified paragraphs are flush with b o t h the left and right m a r g i n s . T e x t in newspaper is
often
columns
justified.
See
Exhibit 1 0 - 1 8 . The
Paragraph
group o n the H o m e t a b includes
a
button
for
each o f the four types o f alignment described in E x h i b i t 1 0 - 1 8 . T o align a single p a r a g r a p h , click
center alignment When you go to an interview, don't forget about your appearance. First impressions count, and you want to be able to spend the bulk of the interview discussing your abilities and accomplishments, not trying to overcome a negative first impression.
justified alignment When you go to an interview, don't forget about your appearance. First impressions count, and you want to be able to spend the bulk of the interview discussing your abilities and accomplishments, not trying to overcome a negative first impression.
J
anywhere in that paragraph a n d then click the appropriate
alignment
Education heading. In the Align Text Right button
b u t t o n . T o align multiple paragraphs, select the para-
Click anywhere in the
graphs, a n d then click an alignment button.
Paragraph group, click the
y. T h e Align Text Right b u t t o n toggles o n , and the selected paragraph is right-aligned. See
ACTIVITY
Exhibit 1 0 - 1 9 .
Change the alignment of paragraphs. Switch t o the Resume Final document. ^
At the t o p o f the document, select the first t w o lines o f text (Stephen Konoski's n a m e and address). On the R i b b o n , click the Home tab. Note that in the Paragraph group, the Align T e x t Left button [ g ] is selected.
Q ) O n the H o m e t a b , in the Paragraph group, click the
Center button
[W]. T h e selected paragraphs are
left-align To align paragraph text along the left margin with ragged edges along the right margin. ragged Uneven, such as text with an uneven appearance along a margin. right-align To align paragraph text along the right margin with ragged edges along the left margin. center To center paragraph text between the left and right margins with ragged edges along both margins. justify To align paragraph text along both the left and right margins.
centered horizontally on the page.
Chapter
10: Creating
a
Document
Exhibit 10-19 Paragraphs with different alignments
Home
Paste
Insert
*
Verdana
^
B
/
Page Layout
References
Mailings
Review
View AA
U
- ak
X,
x'
- V a
- _A -
^
M
^
M
[=
P3r.3gi.pn
Clipboard
—1 alignment buttons
r-
AaBbCcDc AaBbCcDc AaBbG AaBbCc ; V\ U N o Spaci...
Heading 1
Heading 2
I Normal
-
r Styles
|ft Find • JjeReplace
Change
Styles *
* Select Editing
centered paragraphs
Stephen-Konoski^
Ctrl,? Paste Options:
you might see - another button on this menu
T*1 (a!
Set D e f a u l t Paste..
Enclosures-(2)11
selected option
Chapter
10:
Creating
a
Document
ix). „ Finding and Replacing Text \-
Find text.
\
\ •
l hen working with a longer d o c u m e n t , you can
Q|
• waste a lot of time reading through the t e x t t o
In the Cover L e t t e r d o c u m e n t , on the H o m e tab, in the Editing group, click the
locate a particular w o r d o r phrase. It's m o r e efficient to
Find button.
The
Navigation Pane opens on the left side of the
use the Navigation Pane t o locate the word or phrase.
document window.
If you want to replace t e x t t h r o u g h o u t a document, you Q)
can use the Find and R e p l a c e dialog b o x .
At the top of the Navigation P a n e , c l i c k in the
Search Document box,
F n id n ig Text
and then type
c. Every
letter
c in the document is highlighted with yellow. Continue typing
To find specific t e x t in a d o c u m e n t , first open the Navi-
convention.
gation Pane by clicking the Find button in the Editing
onvention
to complete the w o r d
As you c o n t i n u e typing, the highlight-
ing is removed from w o r d s t h a t do not match the
group on the H o m e t a b . T h e n , in the Search D o c u m e n t
search text. All seven instances o f the word con-
b o x in the N a v i g a t i o n Pane, type the text for which you
vention
are searching. As you type, W o r d highlights every in-
are n o w highlighted in the document.
stance o f the search t e x t in the d o c u m e n t , and a list o f
In the Navigation Pane, if it is not the current tab,
text snippets containing each instance o f the search text
click the
appears in the Navigation P a n e . Y o u can click a snippet
tab jl.
t o go immediately to that l o c a t i o n in the document.
of the word convention appear on the tab. See __________
Exhiibit 10-33 Navigation Pane with search results for convention Copy button
| Navigation Pane
Browse the results from your current search
Snippets o f text surrounding each instance Exhibit 1 0 - 3 3 .
I
imng^^^Reviev Find button Search Document box
in o r g a n i z i n g n a t i o n a l sales meetings and a convention for our customers. For t h e convention, I
Browse the results from your current search tab
p r i m a r y contact f o r e t h o s e v e n d o r s at t h e c o n v e n t i o n . Based o n convention evaluations, attendees
j u l d be a valuable-asset to y o u r - t e a m . f
A t S a n f o r d I n d u s t r i e s ! assists t h e m a r k e t i n g c o o r d i n a t o r in o r g a n i z i n g n a t i o n a l sales m e e t i n g s - a n d a c o n v e n t i o n for our-customers For the c o n v e n t i o n , I established relationships w i t h - v e n d o r s a n d - w a s - t h e primary contact
and a convention for our customers. For the c o n v e n t i o n , I established relationships with vendors
a r e l o o k i n g f o r - a n e w assistant. I w o u l d l i k e t o a p p l y f o r t h e p o s i t i o n . - W i t h r - S a n f o r d - l n d u s t r i e s , I h a v e - d e v e l o p e d - s t r o n g - s k i l l s in rjryjcj; r e s e a r c h a n d
fac&thosevendorsat t h e
c o n v e n t i o n Based on c o n v e n t i o n ^ v a l u a t i o n s , a t t e n d e e s
scoredthis convention 20% higher t J ^ t h e p r e v i o u s - y e j N L S - l
highlighted words
In-addition t o - w o r k i n g o n -thesales m e e t i n g and the c o n v e n t i o n , I we.realso r e s p o n s i b l e f o r t h e following: 1
snippet and corresponding word in document
requency-overweekendsl u t i n g - t h e m e e t i n g mi n u t e 5 f o r t h e t e a m i ustomer-database.f r
e s u m e , - w h i c h detail:
nrammar errnr
styles. Styles w i t h o u t t h e p a r a g r a p h s y m b o l n e x t t o their n a m e s a r e either c h a r a c t e r o r linked styles. In the Styles gallery, t h e N o r m a l , N o S p a c i n g , and List P a r a g r a p h styles a r e p a r a g r a p h styles; t h e H e a d i n g ,
ACTIVITY
T i t l e a n d S u b t i t l e , a n d t w o Q u o t e styles a r e linked
Apply Quick Styles.
styles; a n d t h e rest o f the styles (the S t r o n g style, t h e
Proposal located
t h r e e E m p h a s i s styles, and t h e t w o R e f e r e n c e styles)
Open the data file
are c h a r a c t e r styles.
C h a p t e r folder. Save the d o c u m e n t as
in the Chapter 11\
Biking
Proposal. Select the first paragraph in the d o c u m e n t (the title
Heading Styles You can choose from different levels of heading styles. The highest level. Heading 1, is used for the major headings in a document and applies the most noticeable formatting, with a larger font than all the other heading styles. (In heading styles, the highest level has the lowest number.) The Heading 2 style is used for headings that are subordinate to the highest level headings; it applies slightly less prominent formatting than the Heading 1 style. There are nine built-in heading styles. When you apply a heading style, the font labeled (Headings) in the Font list is applied to the text.
H e a d n ig 1
Heading 2 Heading 3
line). O n the H o m e t a b , in the Styles g r o u p , click the
More button
T h e Styles gallery o p e n s . R e f e r
back to Exhibit 1 1 - 1 . Point to several of the styles in the gallery to see the Live Preview o n the selected p a r a g r a p h , and then click the
Title style. T h e
gallery closes and
the Title style is applied t o the selected p a r a g r a p h . T h e r o w o f styles visible in the Styles g r o u p o n the H o m e t a b is scrolled t o display the style you just applied—the Title style. T h e Title style is a linked style and changes the t e x t t o blue, 2 6 - p o i n t C a m b r i a , adds a blue b o r d e r b e l o w the text, and changes the space after the p a r a g r a p h f r o m 1 0 points t o 1 5 points. C a m b r i a is the font labeled (Headings)
at the t o p o f the f o n t list. See
Exhibit 11-2. Select the nonadjacent heading paragraphs Over-
Applying a Quick Style To apply a Q u i c k Style, select the text o r paragraph t o which y o u w a n t t o apply the style, and then click the Q u i c k Style n a m e in the Styles gallery. W h e n you apply a style, that style is selected in the Styles gallery. W h e n you c r e a t e a new d o c u m e n t , only t w o heading styles, H e a d i n g 1 a n d H e a d i n g 2 , a p p e a r in t h e Styles gallery. I f y o u apply the H e a d i n g 2 style t o t e x t ,
view and Program Development. In the Styles group, click the up arrow [*] t o scroll the gallery up one row, and then click the Head-
ing 1 style. T h e
Heading 1 style is a linked style
that formats the selected paragraphs in b o l d , blue, 1 4 - p o i n t C a m b r i a , removes all the space after each paragraph, and changes the space before each selected paragraph t o 2 4 points.
the H e a d i n g 3 style is added t o t h e Styles gallery. As
Quick Style A style that appears in a gallery.
you apply e a c h m o r e subordinate heading style, t h e n e x t level o f heading style is added t o the gallery.
Chapter
11: Formatting
a Long
Document
Exhibit 11-2 Title style applied to selected text
*^*^ ^^^^"^^**^^Biiring i r
Home
Insert
—B,B
> W W
Page Layout
References
Mailings
Proposal - Microsoft W o r d
Review
Cambria (Headi
View
Developer
l ®Aabl Title
I
4af?feCc.
4 fibCcD(
Subtitle
Subtle Em...
0
4oBbCcf0t j, ^ ^ x
Emphasis
J
-
Rep|a£e
Change
I' I Styles" R \
Styles
M
H
S E L E C T
Editing
Proposal-for-Mountain-Biking-at-North Lake-CampU '
•
Budget heading click the More
O p e n t h e Styles gallery, a n d t h e n click t h e
I Scroll down, and then select the
paragraph. In the Styles g r o u p , button Q . Notice that only t w o Heading
Emphasis style. T h e
E m p h a s i s style is a c h a r a c -
ter style. T h e selected t e x t is f o r m a t t e d w i t h t h e
styles are
E m p h a s i s style, w h i c h a p p l i e s i t a l i c f o r m a t t i n g
in the gallery. I In the Styles gallery, click the
to text.
Heading 2 style. T h e
selected text is formatted with the Heading 2 style, which is similar t o the Heading 1 style but the color is a little lighter shade o f blue, the size o f the text is 1 3 points, and the space before the paragraph is 1 0 points. I In the Styles group, click the More button
0.
N o t i c e that the Heading 3 style has been added t o
Modifying a Quick Style If you w a n t t o change some parts o f the definition o f a Q u i c k Style, you can modify it. T o modify a Quick Style, first apply the Q u i c k Style t o t e x t o r a paragraph, and then modify the formatting o f the text o r paragraph using direct formatting. N e x t , right-click the Quick Style name in the Styles gallery, a n d then on the shortcut
the gallery. Use the list below t o apply Heading Q u i c k Styles to the following paragraphs:
menu, click Update
to M a t c h Se-
is replaced by the
name o f the style).
Minimum Funding—$200 Moderate Funding—$3,200
Heading 3
Questions Opportunity
Heading 2 Heading 1
Description of Program Issues to Consider Potential Trip Routes East
Heading 1
Heading 3
Heading 3
Heading 2 Heading 2
North
Heading 3
West
Heading 3
South
Heading 3
ACTIVITY Modify a Quick Style. Q)
Scroll down, and then select the
Budget heading
paragraph. Q | Reduce the font size o f the selected text to
12 points. On the H o m e rah, in the Font group, click the
At the t o p o f the d o c u m e n t , under the Program
Bold button [5] t o deselect it, and then click the Underline button U . T h e bold formatting
Development heading, in the first line, select key.
removed and the selected text is underlined.
Chapter
11:
Formatting
a
Long
D o c u m er
is
Exhibit 11-3 Redefined Heading 2 style
Home
Clipboard
Page L a y o u t
•
Cambria (Headii ' 1 2
J
B
J Paste
Insert
r
A
I
References
- A' A'
1 TJ |*|afc
X,
Mailings
Review
Aa•
X
1
Font
View
Developer
AaBbCd zl (5 AaBbCcDc AaBbCcDc A B a b G Paragrap="h
^ " B B"
11
Normal
H N o Spaci...
Heading 1 J Heading 2
Find •
A 4 '
Change Styles -
^
Replace
^ Select -
Styles
Heading 2 style redefined
B u d g n e i t g c o u d le g o w t o b a c d s iy r e i o c ^ i t n ls .s m o d e r a y e u t l f n d d a n d b e v e r s u c l c i e u f .l I O n the H o m e t a b , in the Styles group, right-click
then create the style based on the f o r m a t t e d t e x t . T o d o
Heading 2 style. O n the shortcut menu, click Update Heading 2 to Match Selection. T h e style is
this, select the formatted text, click the M o r e b u t t o n in
the
the Styles g r o u p , and then click Save Selection as a N e w
redefined to m a t c h the formatting changes you
Q u i c k Style to open the Create N e w Style f r o m F o r m a t -
m a d e t o the Budget heading, and all the headings
ting dialog b o x . You can n a m e and save the style from
with the H e a d i n g 2 style applied n o w m a t c h this
this dialog b o x . N e w Quick Styles are created as linked styles. To
style. See E x h i b i t 1 1 - 3 .
| Select the Minimum Funding—$200 heading paragraph. R e m o v e the bold formatting. Heading 3 style. Update Heading 3 to
) In the Styles group, right-click the O n the shortcut menu, click
Match Selection. Notice
that the formatting o f the
change this, in the Create N e w Style from Formatting dialog box, click Modify to open a larger version of the Create N e w Style from Formatting dialog b o x , click the Style type arrow, and then select the style type from the list. R e m e m b e r that part of a style definition is the style on which the style is based. So when you create a new
M o d e r a t e F u n d i n g — $ 3 , 2 0 0 heading changed to
style based upon the formatting o f selected t e x t , the new
m a t c h the new style definition.
style retains a connection to the original style. If you modify the original style, these changes will also be applied to the new style. For example, suppose you need to
Saving a Style to the Template The modified style is saved only with the current document. If you want to make the modified style available to all documents created based on the current template (even if it is the Normal template), right-click the Quick Style name, and then click Modify on the shortcut menu to open the Modify Style dialog box. In the Modify Style dialog box, click the New documents based on this template option button at the bottom of the dialog box, and then click OK.
create a new style that will be used exclusively for formatting the heading Budget
in all upcoming reports. You
could start by selecting text formatted with the H e a d ing 1 style, change the font c o l o r o f the selected text to purple, and then save the formatting o f the selected text as a new style named Budget.
If you then modify the
Heading 1 style—perhaps by adding italics—the text in the document that is formatted with the Budget style will also have italics, because it is based on the Heading 1 style. This connection between a new style and the style on which it is based enforces a consistent l o o k a m o n g styles, helping to create a document with a coherent design. T o take full advantage of this feature, you need to think carefully about what style you w a n t to use as the basis for a new style. For example, if you are creating a
Creating a New Quick Style
new style that will be used as a heading, you should base that new style on a heading style.
Y o u might find that you need to create a new style for
Finally, when you create a new p a r a g r a p h o r linked
your d o c u m e n t . T h e easiest way to create a new Q u i c k
style, the style for the next p a r a g r a p h created w h e n
Style is t o f o r m a t text in the way that you w a n t , and
you press the Enter key is the new style. T o c h a n g e this,
Chapter
11:
Formatting
a Long
Document
open the larger version o f the Create N e w Style from F o r m a t t i n g dialog b o x , as described a b o v e , click the Style for following paragraph arrow, and
Exhibit 11-5 Large Create New Style from Formatting dialog box
then select the style you w a n t .
style name
Create New Style from Formatting Properties
ACTIVITY Create a new Quick Style. £
click to change — t h e style type
At the top o f the d o c u m e n t , under the Overview heading, in the first line, select North
Lake Camp. In documents
Name:
NLC N a m e *
Style t y p e :
Linked (paragraph a n d character)
Style based o n :
IT Normal
Style for following p a r a g r a p h :
IT NLC Name
3 L Ft]
Formatting
produced at c a m p ,
the c a m p n a m e is in a different font and a
Q
Candara
11 0
I
B
U
dark green color.
formatting applied to the text before the dialog box was opened
I Change the font o f the selected text t o
Candara. Change the
Olive Green, Accent 3, Darker 50%.
color t o
click the More
Mourtarb idung at North Lake Carnp(NLC)s the next k>f)ai step in NLC s' s— : .. . . . ir ••• - click to change the style tor pressing the Enter key after tto«s«Kio.doorct^. the paragraph created HPaFrao grialpo hwn obPiragapt Folio* :ZI Panfaph Foo lwn ig Parayapn Foo lw ins Pm?aph iFg tr
B
Font: C a n d a r a , F o n t color: Accent 3, Style: Quick Style Based o n : Normal
) In the Styles group,
keep selected to save the style only with the current document
button
0 . Below the gallery,
Save Selection as a New Quick Style.
click
V A d d to Quick Style list o Only in this document
J Automatically update N e w documents based o n this template
Format -
A small Create N e w Style from Formatting dialog b o x opens with the temporary style n a m e selected in the N a m e b o x . See Exhibit 1 1 - 4 .
Exhibit 11-4 Small Create New Style from Formatting dialog box
click to save style as part of this template
I In the Styles group, if you d o n ' t see the N L C N a m e style, click the up scroll arrow [*]. T h e new N L C N a m e style is the second style in the gallery and is selected.
Create New Style from Formatting
I Under the Overview heading, in the parentheses
Name:
Style!
- ^\
Review
| := - |= •
WL W. M
Yes in t h e dialog b o x
* m
*= '
t h a t asks if you w a n t tW >
tl • _
®
AAaaBBbbCCccDDcc
AaBbCcD
-
Tl r Normal
NLC N a m e
AaBbCcDc Tl N o Spaci...
ft
AaBbG
Change
Heading 1
Styles »
iragraph
Find Replace
t o c o n t i n u e searching f r o m t h e beginning o f
* Select -
the d o c u m e n t .
Editing
Click OK in t h e dialog
il-for'Mountain-Biking- at-North implf
b o x that tells y o u t h a t 13 r e p l a c e m e n t s were m a d e . All instances o f N L C f o r m a t t e d with the N o r m a l style are
i-North-Lake-Camp-(NLcyis-the^exH^ ouldbeafun-newprogramforour^ampers/anditfits-withthe-camp's-mission-of-
replaced with N L C formatted with t h e N L C N a m e style. Click Close t o close the dialog b o x .
Using the Styles Pane
Save the document.
The Styles pane displays the complete list of styles available to a document, as well as indicates the style type of each style. To open the Styles pane click the Dialog Box Launcher in the Styles group on the Home tab. The list of styles displayed when you open the Styles pane is the list of recommended styles. For new documents, this means it lists the styles that appear in the Styles Styles gallery. To see the comClear All Normal plete list of styles available, click NLC Name the Options link at the bottom No Spacing of the Styles pane, and then in Heading 1 Heading 2 the Style Pane Options dialog Heading 3 box that opens, click the Select Heading-4 styles to show arrow, and then Title Subtitle click All styles. If you want to Subtle Emphasis add a style to the Styles gallery, Emphasis I n t e n s e Emphasis point to the style name in the Strong Styles pane, click the arrow that Quote appears, and then click Add to Intense Quote Subtle R e f e r e n c e Quick Style Gallery. Intense Reference The symbols to the right of Book Title each style name in the Styles H Show Preview pane indicate the style type: • Disable U n k e d Styles Paragraph styles are labeled with U character styles with a, and linked styles with . At the bottom of the Styles pane, you can select the Show Preview check box to see the format of each style, and select the Disable Linked Styles check box to change all linked styles to paragraph styles. #
M
loh.2
A
Working with Themes
fter you format a document with a variety o f styles, you can alter the look o f the d o c u m e n t by chang-
ing the document's theme. A theme is a coordinated set
of colors, fonts, and effects. Created by professional designers, themes ensure that a document has a polished, coherent look. Forty-four themes are included in Office. T h e default theme for new documents is the Office theme. Every theme assigns a font t o headings and t o body text. These t w o theme fonts are always listed at the t o p of the Fonts menu with the labels (Headings)
and (Body)
on the right. You have already seen this when you opened the Fonts menu t o apply a different font. Some themes use one font for headings and another f o r body text; other themes use the same font f o r both elements. In the Office theme, the heading font is C a m b r i a , and the body font is Calibri. If you change the theme, the theme fonts in the Font list change to match the fonts for the new theme.
This is the Office theme's heading font Cambria.
This is the Office theme's body font, Calibri.
This is the Newsprint theme's heading font, Impact. This is the Newsprint theme's body font. Times New Roman. W h e n y o u type text in a n e w d o c u m e n t , the t e x t is formatted with the body text font. If you c h a n g e the theme, text formatted with the theme fonts c h a n g e s t o
theme A coordinated set of colors, fonts, and effects.
Chapter
11:
Formatting
a
Long
Document
the f o r m a t o f the new theme's fonts. If you change the font o f text to a non-theme font, when you change the
I Click the
Themes button. T h e
T h e m e s gallery
opens. See E x h i b i t 1 1 - 8 .
theme, the font will not c h a n g e . You have also already seen the colors associated with a theme. When you displayed the c o l o r palette to
Exhibit 11-8 Themes gallery
change the font color or a paragraph border color, the colors under T h e m e C o l o r s are the coordinated colors
fere
me
o f the current theme. T h i s set o f colors changes when
1
you change the theme. So if you apply one o f these theme colors using direct formatting, or if you apply
rest of themes in alphabetical order (scroll to see entire list)
a style, such as a heading style, that formats text with color, when you apply a different theme, the c o l o r will change to m a t c h the equivalent c o l o r in the new theme. T h e T h e m e C o l o r s are c o o r d i n a t e d to look good together, so if you are going t o use multiple colors in a document (perhaps for paragraph shading and font c o l o r ) , it's a good idea to stick with the T h e m e C o l o r s . Clarity
Composite
Concourse
A a j Aa^| A^JAai S3 Aa
Applying a New Theme T o change the theme, click the T h e m e s button in the
Equity
Themes group on the Page L a y o u t t a b , and then select
Aa
the theme you w a n t in the gallery. T h e new theme is ap-
Executive
plied to the entire d o c u m e n t and all the elements within
Flow
Foundry
Reset t o T h e m e f r o m T e m p l a t e
it, with the colors and fonts changing to match the col-
Qj)
ors and fonts of the new t h e m e .
A
B r o w s e for Themes... Save C u r r e n t T h e m e . . .
ACTIVITY
I
Change the document's theme.
Q|
In the gallery, point to the
Austin theme
to see a
Scroll the document so you can see the title at the
Live Preview in the d o c u m e n t . T h e fonts in the
t o p of the window and the Budget heading near
document change, and the c o l o r o f the text for-
the bottom of the window.
matted with the Title style and with the Heading
Page Layout tab. In the the Themes button. T h e
O n the R i b b o n , click the T h e m e s group, point t o
name of the current t h e m e , the Office T h e m e , appears in a ScreenTip. See E x h i b i t 1 1 - 7 .
styles changes. N o t i c e that the changes you made to the Heading 2 style definition are retained. I Point to several other themes, and then scroll down and click the
Urban theme. T h e
fonts and
colors in the document change to those used in the Urban theme.
I Insert
| A?" ,—.
T h e mM es W ^ \OJ
W
U __
Page Layout
s,ze
'
>:J Line
Margins W =1 Columns •
2 2
I T Themes
References
Orientation' ^ B r e a k s "
be
Numbers
Mailinc _]
.\aterr Page Color •
Hyphenation
opens. N o t i c e that at the t o p , the Headings font is Trebuchet M S and the Body
font
is Georgia.
I Click a blank area o f the d o c u m e n t to close the
Page Setup
title, and then in the F o n t Font Color button arrow |A >
Font list, select the
I Theme Current: Office Theme. C h a n g e t h e o v e r a l l desigrV entire document, i n c l u d i n g ^ l o r s , f o n t s , a n d effects.
& Press Fl for more help.
posal-for-Mou] [e-Camplf name of current theme
Chapter
Home tab. In the Font Font box arrow. T h e Font gallery
O n the R i b b o n , click the
group, click the
11:
Formatting
a Long
Document
group, click the
The
color palette opens. T h e T h e m e C o l o r s in the palette are the Urban theme c o l o r s . T h e T h e m e Colors you saw previously were the Office theme colors. See E x h i b i t 1 1 - 9 .
Exhibit 11-9 Color palette for the Urban theme
Exhibit 11-10 Colors dialog box with the Standard tab selected Colors
Insert
1
—
*A
Page Layout
T r e b u c h e t M S (I- - 26
References
- A A
Mailings
select this green color
•"•SB
Clipboard
H
C
style headings colored with Urban theme colors
Standard i Custom Colors:
Proposal
color will preview here
"ake-Car-IHlm i l Standard Colors
N Overview!]
'3>
M o r e Colors... 1
j
Gradient
•
Mountaintildng«t-North^ake
Modifying a Theme
lected, displaying a h e x a g o n c o m p o s e d o f small
O n c e you have chosen a theme, you c a n c h a n g e a n y o f
colored h e x a g o n s . See E x h i b i t 1 1 - 1 0 .
the three elements that m a k e up the t h e m e : the f o n t s ,
O n the left, in the r o w above the center row, click the
leftmost green hexagon. T h e N e w portion
of
the preview b o x changes t o the dark green c o l o r you selected.
the c o l o r s , a n d the effects. T o d o this, click the F o n t s , C o l o r s , o r Effects button in the T h e m e s g r o u p o n the Page L a y o u t t a b , a n d then select the f o n t s , c o l o r s , o r effects from another theme. Y o u c a n also c h a n g e the fonts a n d colors by clicking the a p p r o p r i a t e c o m m a n d
Click OK. T h e dialog b o x closes and the selected
on the C h a n g e Styles button m e n u in t h e Styles group
text is reformatted with the dark green color.
on the H o m e t a b .
Chapter
11:
Formatting
a Long
Document
Creating New Theme Fonts and Colors If none of the theme font sets suits your needs, you can click the Create New Theme Fonts command on the Fonts button menu in the Themes group on the Page Layout tab, or on the Fonts submenu on the Change Styles button menu in the Styles group on the Home tab. In the Create New Theme Fonts dialog box, select a heading and a body text font, and type a name for the new theme font set in the Name box.
1 9 Uad)
Create New Theme Font; Heading font:
Calibri
Sample
lext/Background - Dark 1 \W§ '
Text
Text
Text/Background - Light 1 [ f ~ | < Text/Background - Cark 2 j'l
'
Hyperlink Hyperlink
Accent 2
[fiL
Accent 2
B o d y text b o d y text b o d y text. B o d y text b o d y text.
Name:
Theme colors
Accent 1
3H e a n d g i
Body font:
Create New Theme Colors
Text/Background • Light 2 |
Sample
Cambria
listed, and type a name for the new color set in the Name box. In both cases, the new, custom font set and theme color set will be listed at the top of their respective menus.
m
Accent 4 Save
Cancel
You can customize theme colors by clicking the Create New Theme Colors command on the Colors button menu in the Themes group on the Page Layout tab, or on the Colors submenu on the Change Styles button menu in the Styles group on the Home tab. In the Create New Theme Colors dialog box, select a color for each theme element
Accent 5.
Ml
Accent £
M
Hyperlink Followed Hyperlink Name: 0
Save
Cancel
Exhibit 11-11 Theme Fonts menu
ACTIVITY Modify the theme fonts and colors.
Q) O n the R i b b o n , click the Page Layout tab. In the T h e m e s group, click the Theme
Fonts button [5H
T h e T h e m e Fonts menu opens.
Page Layout
Theme Fonts button
I Themes
—I
, rtc.
J
G i l l Sans M T Gill Sans MT
selected. See Exhibit 1 1 - 1 1 .
Live Preview, scroll up the list, and then click the
Module fonts. T h e
Technic
Aa
Tw Cen MT
Aa
T w Can M T
document. In t h e T h e m e s g r o u p , c l i c k t h e
ors BUTTON
B > Scroll
Theme Col-
d o w n t h e list t o see
t h a t t h e U r b a n c o l o r p a l e t t e is selected. See
Aa
F r a n k l i n Gothic M... Franklin Gothic Book
Aa
Trebuchet MS Georgia^ Veive
P o i n t to several of the t h e m e s l i s t e d to s e e the Live
Preview, and then click the Grid theme colors. T h e elements in the d o c u m e n t formatted with theme colors change t o the corresponding theme colors o f the Grid t h e m e .
11
Trek
Urban
Exhibit 11-12.
Chapter
Franklin G o t h i c Bo... Arial Thatch
M o d u l e theme fonts (Corbel for
both headings and body text) are applied t o the
\J Line N i
T r e b u c h e t MS Solstice
S c r o l l to the b o t t o m of the list to s e c that U r b a n is
Point to s e v e r a l of the t h e m e s l i s t e d to s e e the
O r i e n t a t i o n » >f^{ Breaks J j Size •
Formatting
a Long
Document
Aa
C e n u t r yG o h c ti Century G o t h i c
Waveform
Candara
C/eate CNaenwd aTrhae m e F o n t s . .
it is still 1 4 - p o i n t C a m b r i a , but t h e c o l o r is R e d , Accent
Exhibit 11-12 Theme Colors menu
2 , D a r k e r 5 0 % ; the paragraph is c e n t e r e d ; there is 2 0 points o f space before the p a r a g r a p h a n d 1 0 points o f space after the paragraph; and there is a R e d , A c c e n t 2 , D a r k e r 2 5 % double-line border under t h e p a r a g r a p h . You c a n select f r o m a total o f 1 4 style sets t o change the look o f all the text in a document. Y o u c a n change the style set b e f o r e o r after y o u apply styles. Be aware that if y o u redefine Q u i c k Styles before you apply a different style set, the c h a n g e s might not all be retained if you change the style set after y o u change the style definitions.
ACTIVITY Change the Style Set. QP
O n the H o m e t a b , in the Styles group, click the
Change Styles button. O n the menu that opens,
Waveform
•
selected theme color palette
Create N e w T h e m e Colors...
notice the Colors and Fonts c o m m a n d s . Pointing to these c o m m a n d s opens the same menus you s a w when used the T h e m e Colors a n d T h e m e Fonts buttons in the Themes group on the Page L a y o u t t a b . O n t h e m e n u , p o i n t t o Style S e t . A m e n u o f style
sets opens. See Exhibit 1 1 - 1 3 . | At t h e t o p o f the document, under the Overview
North Lake Camp. O n the R i b b o n , Home tab. Notice in the F o n t b o x that
heading, select click the
Exhibit 11-13 Style Set menu
the f o n t o f the text formatted with the N L C N a m e
Change Styles button
style is still C a n d a r a . Also notice that all o f the
•veloper
text f o r m a t t e d with the N L C N a m e style is still
0
the s a m e dark green you selected. T h i s is because
AaBbCcD
AaBbCcD
Tl N o r m a l
NLC Name
the dark green color was n o t a theme color, so it is
loii Changing the Style Set
k in i
list of style sets
A
available t o each d o c u m e n t . T h e default style
Fonts
Fancy
jj
Paragraph Spacing Set as D e f a u l t
Manuscript Modern Newsprint
calstepii ers, and
Perspective Simple Thatch
you change the style set, the Q u i c k Style definitions
W o r d 2003
ready seen, is formatted as 1 4 - p o i n t C a m b r i a with the
WJ C o l o r s
Formal
z
W o r d 2010 >ry,tradr
Reset t o Q u i c k Styles f r o m T e m p l a t e
perswill-
Reset D o c u m e n t Q u i c k Styles
iat-helph
Save as Q u i c k Style Set...
Blue, Accent 1 , D a r k e r 2 5 % c o l o r ; the paragraph is left-aligned, a n d there are 2 4 points o f space before the
style set A group of Quick Styles.
paragraph. If y o u change the style set t o the F o r m a l style set, the H e a d i n g 1 Q u i c k Style definition changes;
Chapter
11:
Formatting
a
Long
w
Style Set
A
Traditional
style set selected, the Heading 1 style, as you have al-
A
Find '
iac R e p l a c e M£ Select
Elegant
set f o r n e w d o c u m e n t s is the W o r d 2 0 1 0 style set. If are c h a n g e d . F o r e x a m p l e , with the default W o r d 2 0 1 0
Change Styles*
Heading 1
Distinctive
3
style set is a coordinated group o f Q u i c k Styles
1 N o Spaci...
ft
AaBbC.
D e f a u l t (Black a n d W h i t e )
unaffected by changing the theme c o l o r s . I Save the d o c u m e n t .
AaBbCcD
Document
• •
ment headings. Paragraphs f o r m a t t e d with the H e a d ing 1 style are the highest level headings. Paragraphs
Customizing the Normal Template
formatted with the Heading 2 style are subordinate t o Heading 1 paragraphs. In an outline, subordinate head-
The combination of themes and style sets provides an almost dizzying number of choices. You can select a theme; change the theme fonts, colors, or effects; and change the style set to create a document quickly formatted with a distinctive look. Change Styles * As you have seen, if you reA Style Set define Quick Styles and then Colors apply a different style set, Fonts your changes might not carry through. If you come up with Paragraph Spacing a combination you want to Set as Default save as the default when you create new documents—in other words, if you want to save changes to the Normal template— make all the changes you want using theme fonts and colors and the Style Set command, click the Change Styles button in the Styles group on the Home tab, and then click Set as Default.
ings—or subheadings—are indented below the H e a d ing 1 paragraphs. Each successive level o f heading styles (Heading 3 , Heading 4 , and s o o n ) is indented further to the right. W h e n y o u w o r k w i t h a n o u t l i n e , you c a n m o v e t o p i c s t o o t h e r l o c a t i o n s in t h e o u t l i n e , o r y o u c a n p r o m o t e o r d e m o t e h e a d i n g s . M o v i n g a heading t o a h i g h e r level in t h e o u t l i n e — f o r e x a m p l e , c h a n g i n g a Heading 2 paragraph into a Heading 1 p a r a g r a p h — is c a l l e d promoting t h e h e a d i n g . M o v i n g an item l o w e r in t h e o u t l i n e is c a l l e d
demoting
the h e a d i n g .
If y o u used t h e b u i l t - i n h e a d i n g styles t o f o r m a t t h e h e a d i n g s in y o u r d o c u m e n t , w h e n y o u p r o m o t e o r d e m o t e a h e a d i n g , t h e n e x t h i g h e r o r l o w e r level o f h e a d i n g style is a p p l i e d t o t h e h e a d i n g p a r a g r a p h . W h e n y o u w o r k with multiple-page d o c u m e n t s , there are several ways t o m o v e a m o n g the pages in t h e d o c u m e n t . T o see the c u r r e n t p a g e n u m b e r and the t o tal n u m b e r o f pages, l o o k a t the page c o u n t i n d i c a t o r at the left end o f the status bar, w h i c h lists the c u r r e n t page n u m b e r a n d t h e t o t a l n u m b e r o f pages in t h e
(Point to Modern. Live Preview shows a preview o f the M o d e r n style set in the document. N o t i c e that the changes t o the H e a d i n g 2 definition are not retained with this style set.
d o c u m e n t . Y o u c a n drag t h e scroll b o x in the vertical scroll b a r t o m o v e b e t w e e n t h e pages in the d o c u m e n t . As y o u drag, a S c r e e n T i p a p p e a r s identifying the current page number. I f p a r a g r a p h s are formatted with t h e built-in heading styles, t h e first heading o n
( O n the submenu, click Formal. T h e style set is
the page also appears in t h e S c r e e n T i p . ( R e m e m b e r
changed t o the F o r m a l style set. T h e changes t o
that pressing the Page Up a n d Page D o w n keys scrolls
the Heading 2 style are retained with this style set.
the d o c u m e n t one screen a t a t i m e , n o t necessarily one
And note that the t e x t f o r m a t t e d with the N L C
page at a t i m e , unless t h e d o c u m e n t was displayed a t
N a m e style is unaffected because it was created
O n e Page z o o m . ) Y o u c a n also click the page c o u n t in-
using a non-theme font and color.
d i c a t o r t o open the G o T o t a b in the Find and Replace dialog b o x , and then type t h e page n u m b e r you w a n t
| Save the document.
to go t o .
Working with the Document Outline
loii.4
R
eviewing a document's outline c a n help you keep track o f a document's overall organization.
It lets y o u see, a t a glance, the hierarchy o f the docu-
View different pages in a multiple-page document. £
In the v e r t i c a l scroll bar, p o i n t t o the
t o n . A S c r e e n T i p a p p e a r s identifying t h e page
promote To move an item to a higher level in an outline,
as page 1 . T h e first h e a d i n g o n t h e p a g e ,
demote To move an item to a lower level in an outline.
O v e r v i e w , a l s o a p p e a r s in t h e S c r e e n T i p . See Exhibit 1 1 - 1 4 .
Chapter
11
Formatting
a Long
scroll
box, and then press a n d h o l d t h e m o u s e but-
Document
Exhibit 11-14 ScreenTip identifying the current page number
iking Proposal - Microsoft/ ' .ord Home
Insert
Page L a y o u t
llcandm
References
Mailings
Review
View
Developer
^Tii - A~ A' Aa' | % j := - |= - '-"JE* zl AaBbCcD ("if 11 N o r m a l a,- mm mm > - _•
AaBbCcD
AABBC
AABBCC
No Spacing
Heading 1
Heading 2
Font
- cnange Styles«
PROPO
Replace *
SelectEditing
SAL-FOR-MOUNTAIN-BIKING-AT NORTH-LAKE-CAMPfl OVERVIEW^ current page number and first heading on page in ScreenTip
Mountainbikingat NorthlakeW» >** Level 1
( Click anywhere in the
Page Layout
Budget
heading to deselect all the text and
•
S h o w Text Formatting
•
S h o w First Line O n l y
Outline Tools
Show Document
Collapse
Master D o c u m e n t
select only that paragraph. N o t i c e in the Styles gallery
pointer
that the Budget heading is n o w formatted with the Heading 1 style.
N o t i c e that it is n o w
0„ OVERVIEW^ ROGRAM-DEVELOPMENTFL O n DESCRIPTION OF PROGRAM^] O ISSUESTO-CONSIDER^] O POTENTIALTRIPROUTESFL O EASTFL
O NortjhJ
) Click anywhere in
the Minimum Funding—$200 heading.
-*
heading being moved
f o r m a t t e d with the Heading 2 style.
O WESTFL O SOUTHJ]
BUDGET^ O MINIMUM
FUNDING—$20o^| O MODERATE-FUNDING—$3,200^
QUESTIONS^ OPPORTUNITY^]
| O n the status bar, click the Outline
button
[5] t o switch t o Outline
Chapter
11:
Formatting
a
Long
Document
Word
N e x t to the Questions heading, double-click
left, a n d right sides o f t h e p a g e b e t w e e n t h e t e x t
the
a n d t h e edge o f t h e p a g e . B y d e f a u l t , W o r d d o c u -
plus sign symbol Q.
T h e heading expands
t o display all the b o d y t e x t u n d e r i t . S e e
m e n t s have o n e - i n c h m a r g i n s o n all sides o f t h e
Exhibit 11-22.
d o c u m e n t . See E x h i b i t 1 1 - 2 3 . T h i s is fine f o r m o s t documents. Sometimes you might want to change
Exhibit 11-22 Body text in Outline view O BUDGETFL O
double-click to display body text and any subheadings GRATE-FUNDING—$3,20OFL
ple,
y o u might w a n t t o space
in t h e m a r g i n s t o a l l o w readers t o take notes. T o
indicates this paragraph is body text
change the margins, click the
Margins
button
in
t h e P a g e Setup g r o u p o n the Page Layout t a b . Y o u can c h o o s e from a number o f predefined margin o p t i o n s , o r you can click the
Custom
Margins
c o m m a n d t o select y o u r own
position insertion point here I W o r d s : 109/B76
margins. For exam-
provide additional
LUESTIONSFL 1. -» THISPROPOSALDPE^NOTADDRESSALLCONCERNS-AND LEADS THATWOULD-NEED^WRFNER-STUDY AND-REVIEW. HERE IS A PARTIAL-LIST-OFPOTENTIAL-QUESTIONS:fl 2. -• DP^ERIEEDTO OBTAIN-PERMISSION-ORPERMITSFROMNORTH-LAKELAND^EMENTCONSORTIUMORNORTHMEADOWS STATE PARK?fl ^3. -» WHATWILLTHEPOLICY BEIF A CAMPER'SBIKE ISRUINED?fl • 4. -» DOESTHECAMP'SLIABILITYINSURANCE COVER EXCURSIONSOFFCAMPPROPERTY?fl • YCAMPING'ATNLC-HASALWAYSBEENASIGNIFICANTEXPERIENCE.MOUNTAINBIKINGAT-NLC / IS-UNTAPPED, UNLIMITED, ANDTHEREFORTHETAKING. MOUNTAINBIKINGCOULDEASILYAND/ ECONOMICALLYBEA NEXT-PROGRAM FEATUREFORCAMP.2,40OACRESAWAJT.fl
Page: 4 of 4
the
s e t t i n g s . After y o u
c r e a t e c u s t o m margin set-
ID
t i n g s , t h e m o s t recent set a p p e a r s as an o p t i o n a t t h e t o p o f the m e n u .
In the last paragraph o f body text, click before the word
Camping, type Conclusion, press
the Enter
key, and then press the Up Arrow key t o position the insertion point in the
Conclusion is formatted
Conclusion line.
as body text.
ACTIVITY Change the page margins. £
g r o u p , click
In the Outline Tools g r o u p , click the Promote
button [•]. Conclusion
View tab. In the Z o o m the One Page button. T h e current
O n t h e R i b b o n , click t h e
page o f the d o c u m e n t , p a g e 3 , appears c o m -
is p r o m o t e d t o a Level 1
pletely in the W o r d w i n d o w a n d you can easily
heading. O n the status bar, click the
Print Layout button \M
Outline view closes a n d y o u see that the H e a d -
Q)
see t h e m a r g i n s . O n the R i b b o n , click the
Page Layout tab.
In the
ing 1 style has been applied t o the Conclusion
Page Setup group, click the Margins button. T h e
heading.
Margins menu opens, as shown in Exhibit 1 1 - 2 4 .
Save the document.
Click Wide. T h e menu closes a n d the margins in the document are changed t o the W i d e setting, which keeps the one-inch margin a t the t o p and
LO11.5 Changing
A
the Margins
n o t h e r a s p e c t o f d o c u m e n t f o r m a t t i n g is h o w
t h e d o c u m e n t fits o n t h e p r i n t e d p a g e . T h e
margins a r e t h e b l a n k a r e a s a t t h e t o p , b o t t o m ,
b o t t o m , but changes both the left and right margins t o t w o inches.
Q ) IN the Page Setup g r o u p , click t h e Margins button. A t t h e b o t t o m o f t h e m e n u , c l i c k Custom Margins. T h e Page Setup dialog b o x o p e n s with the M a r g i n s t a b selected. See E x h i b i t 1 1 - 2 5 . T h e c u r r e n t m a r g i n settings a r e displayed in
margin The blank area above or below text, or to the left or right of text between the text and the edge of the page.
the b o x e s in t h e M a r g i n s s e c t i o n a t t h e t o p o f the M a r g i n s t a b . T h e value in t h e T o p b o x is selected.
\GE^^
Chapter
11
Formatting
a Long
Document
Exhibit 11-23 One-inch margins in a document
Insert ^ T h
?
«
Margins
Page L a y o u t
References
Orientation - ^
Breaks ~
Mailings ^
Review
Watermark •
View
Developer
Indent
Spacing
v * ] Page C o l o r •
s IJ
Size '
):J|
Line N u m b e r s »
I I
C o lPage u m n s S• e t u p be H y p h e n a t i o n » ri
PZa} g eP aBg ea c kBgorrodue nr sd
I Bring Forward 0 pt
1^
Left:
0-
3*
Right:
0'
-i
C
J2
B e f o r e : 10 p t
C
{2
After:
m
Align •
S e n d B a c k w a r d ' tgj
Group • ^ Rotate
T
e-r
_nj
SAe rl er ac nt igoen P a n e
r j
Paragraph
M
' P R O P O S A L FOR M O U N T A I N B I K I N G AT NORTH LAKE CAMP
top margin
title starts lower than one inch on the page because the Title style includes 25 points of space before the paragraph
QP3QBTUNITY|
i;i ; iKE'te -•»:•--j tea •C v , ur-e -esi % |M r i d * ' , o
bottom margin
Page: 1 of A
Exhibit 11-24 Margins menu
Home
might not appear on your screen or might be different
Insert
j
VJL
Exhibit 11-25 Page Setup dialog box with the Margins tab selected
^
Page Layout
Orientation » ^
References
Breaks »
Margins tab
Page Setup Margins
Paper
LAYOUT
Margins [Al" Themes,—.
^—^
MJ
Margins
III
Size ' £J Line N u m b e r s " LAST CUSTOM SETTING B o t t o m : 1" Right: 1.5' Columns -
be
Hyphenation • B o t t o m : 1" Right: I"
B o t t o m : 0.5" Right: 0.5'
selected margin
g
lop: LEFT: GUTTER:
•
life
0'
GUTTER POSITION:
LEFT
Orientation
i s section PORTRAIT
LANDSCAPE
PAGES B o t t o m : 1" Right: 0.75"
MULTIPLE PAGES:
NORMAL
B o t t o m : 1" Right: 2"
click to open the Margins tab in the Page Setup dialog box
MIRRORED Top: I n s i d e : 1.25"
B o t t o m : 1" Outside:!"
OFFICE 2003 DEFAULT Top: 1" B o t t o m : 1' Left: 1.25' Right: 1.25" Custom Margins..
APPLY, TO:
WHOLE DOCUMENT
[•]
! SET AS DEFAULT
Chapter
I
11:
Formatting
a Long
column right border t o the right
until the M o v e Table C o l u m n m a r k e r o n the ruler
Table^RicrosoftWorcF
References
Insert B e l o w
Move Table Column markers
Mailings
I
^ V i e w Gridlines £
Properties Table
m September3/2014H
Left Indent marker indicates the left indent in the current cell
DearHelenJ This-isto^onfirmthatvou-haveregisteredforttififollowing-classes.ll Classn
Daya
Balletn
Tuesdayn
Tapa
Tuesdayn
6-7u
Lyricn
Thursday**
7:45-9a
Modernn
Wednesday!*
6-8o
1
l
|Timea 5-6H
Chapter
12: Enhancing
a
Document
Day right column border to the 2-inch mark on the ruler. See E x h i b i t
I D r a g the the
right to 12-7.
Understanding AutoFit in Tables
Exhibit 12-7 Table with columns one-inch wide Class T a b l e ~ M i c r c s o f t W o i Page Layout S Insert
Above
References
Mailings
Review
Viev
apl Insert B e l o w
J9
M e r g e Cells
£[] 0J.7'
C
dj
• i l I n s e r t Left
^ SI
Split Cells
r-r} 1.06'
*
jj
- ^ j Split T a b l e Jr
Insert Right
tSa A u t o F i t •
Merge
Cell Size
R o w s fit C o l u m n s
September-3-,20141
Dear-Helen,! Thisisto-confirm-thatYOu-have-registeredforthefol Calssn Dayn Tim en Baletn Tuesdayn 5-6n Tapn Tuesdayn 6-7n Lyricn Thursdayn 7:45-9n Modernn Wednesdayn 6-8n Formatting Tables with Table Styles You have already used styles to format text and paragraphs. Word also includes a variety of built-in styles that you can
The default setting for tables in Word is for the table width to be the same width as the page, for text to wrap within cells, and for the columns to automatically resize as you enter text. This means that if you enter text in a cell with a natural breaking point, such as between words, the text will wrap within the cell. But if there is no natural breaking point, the column will widen to accommodate the long entry and the other columns will become narrower to keep the total width of the table the same. You can control this behavior using the commands on the AutoFit button menu in the Cell Size group on the Table Tools Layout tab. The first command, AutoFit Contents, changes the column width to just fit the contents of each cell, including shrinking the width of empty columns. The second command, AutoFit Window, returns the table to the default behavior. The third command. Fixed Column Width, causes the column widths to stay the same no matter how wide an entry is.
use to add borders, shading, and color to tables. You select a table style from the Table Styles group on the Table Tools Design tab, which displays a selection of table styles. W h e n you apply a style t o a table, you can select or deselect the check b o x e s in the Table Style Options group on the Table Tools Design tab to format the rows
group, the Header R o w , First C o l u m n , and Banded R o w s check b o x e s are selected. | In the Table Styles group, click the 0.
More button
T h e Table Styles gallery opens. N o w the plain
and columns either before or after you apply a style. For
black-and-white grid style appears at the top of
example, you can specify that the first and last rows—the
the gallery, in the Plain Tables section. T h e rest o f
header and total r o w s — a n d the first and last columns
the Table Styles appear in the Built-in section. See
be formatted differently from the rest o f the rows and
Exhibit 1 2 - 8 .
columns in the table. Some styles format the rows in al-
banded rows, while others format in alternating colors, called banded columns.
ternating colors, called the columns
| In the Built-in section, in the fifth row, click the
ACTIVITY Apply a table style. On the R i b b o n , click the Table Tools Design tab. In the Table Styles g r o u p , the plain black-and-white grid style is highlighted, indicating that it is the ta-
banded rows (banded columns) Formatting that displays alternate rows (or columns) in a table with different fill colors.
i k e other styles, ir you change the theme after applying a table style, the colors in the table change to match the colors of the theme^^
xhibit 12-8 Table Styles gallery Exh
IM'LI^I
Home
Insert
\7\ H e a d e r R o w
[7]
First C o l u m n
O Total R o w
•
Last C o l u m n
Page Layout
References
Mailings
Review
Medium Shading 2 - Accent 4 style
(the purple style).
T h e Table Styles gallery closes and the table is formatted with the style you selected.
Developer
Aligning Tables and Text in Tables You c a n change the alignment o f text in cells and y o u can change the alignment o f the entire table. T o change
| In the T a b l e Style Options group, click the First
Column
View
[ Plain Tables
c h e c k b o x t o deselect it. T h e bold format-
the alignment o f text in cells, use the alignment buttons in the Alignment group on the Table T o o l s Layout t a b .
ting and dark purple shading are removed from
T o change the alignment o f the table, align it the same
the first c o l u m n in the table.
way you align a paragraph by using the paragraph alignment buttons in the Paragraph group o n the H o m e t a b .
Fine-tuning Table Styles After you apply a table style to a table, you might like the look of the table, but find that it no longer effectively CONVEYS the information or is not quite as easy to read. To solve this problem, you can, of course, apply a different style to the table. You can also customize the table formatting by using the Shading and Borders buttons in the Table Styles group on the Table Tools Design tab. Remember that built-in styles and shading and border colors that you choose from the Theme Colors in the color palette will change if you change the theme.
J
Align a table and the text in a table.
QP Click the table move handle \^\ t o select the entire table.
Q ^ O n the R i b b o n , click the Home tab. In the Paragraph group, click the
Center button
T h e table
is centered horizontally on the page. Select the Time column.
Q|
O n the R i b b o n , click the
Table Tools Layout tab. Align Top Center
In the Alignment group, click the
button [ 3 . All the text in the T i m e c o l u m n is centered in the cells. See E x h i b i t 1 2 - 9 . I Save the document.
Chapter
12:
Enhancing
a
Document
Exhibit 12-9 Center-aligned table and column text
Home Select -
sert
ferences Page Layout
Ret
\M V i e w Gridlines Bf
Properties
^ rl
Table
E
•
e
i rfrf]
ajJ
Mailings
M e r g e Cells Split Cells Split T a b l e
Insert B e l o w
^™ -il I n s e r t Left Insert A b o v e i l r Insert R i g h t Rows & Columns Q
Merge
Review
Si £3
017-
rt, - u t o1-06' Fit ' Cell Size
Dev/loper
: dj
Design
z
=J -I ^ ' sd
I
i i :sd H
A
Cell Direction Margins T e x t
September-3,2 -01411
|
3= C Q R eo pn ev ea rt t Ht eoa Tdeexrt R o w s
FT IF o r m u l a • rf?= Sort Data
text centered in cells
Dear-Heeln,U This-isto-confirm that-you-haveTegisteredforthefolowing-classes.il 1 Calssn Dayn Timen Baletn Tuesdayn 5-6n Tapn Tuesdayn Lyricn Thursdayn 7:45-9n Modernn Wednesdayn 6-7n 6-8n
LO12.2 Changing the Page Orientation
Change the page orientation. Q)
O p e n the d a t a file
Flyer
l o c a t e d in the C h a p t e r 12\
Dance Flyer.
V/
ou can set the orientation—the w a y a page is
Chapter folder. Save the d o c u m e n t as
A
t u r n e d — f o r the pages in a d o c u m e n t . A page set
T h e document opens in O n e Page view.
to
portrait orientation is t a l l e r t h a n it is w i d e . T h i s
o r i e n t a t i o n , m o s t c o m m o n l y used f o r letters, r e p o r t s , and o t h e r formal d o c u m e n t s , is the usual o r i e n t a t i o n for most Word documents.
Landscape orientation is
a page that is wider t h a n it is tall. Y o u c a n easily
£P O n the R i b b o n , click the Page Layout tab. Page Setup group, click the
In the
Orientation button. T h e
Orientation menu opens with Portrait selected. O n the m e n u , click
Landscape.
The document
c h a n g e the o r i e n t a t i o n o f a d o c u m e n t using the O r i -
changes t o landscape orientation, with the page
e n t a t i o n button in the Page Setup g r o u p on the Page
wider than it is tall. See E x h i b i t 1 2 - 1 0 .
Layout tab.
LO12.3 Working with Document Sections
orientation The way a page is turned. portrait orientation The layout of a page taller than it is wide. landscape orientation The layout of a page wider than it is tall. section A part of a document that can have its own pagelevel formatting and properties.
Chapter
12: Enhancing
a
Document
A
section is a part o f a d o c u m e n t that can have its
own page-level formatting and properties. F o r e x -
ample, you can format one section in a document with
one-inch margins and portrait orientation, and the next section with two-inch margins and landscape orientation. Different sections in a document could also have
Exhibit 12-10 Document in landscape orientation
different headers and footers, o r a n e w section c a n re-
section b r e a k . T h e formatting i n f o r m a t i o n f o r the last
start the page numbering.
section in a d o c u m e n t , o r in a d o c u m e n t w i t h n o sec-
Every d o c u m e n t has at least o n e section. T o divide a d o c u m e n t into multiple sections, you insert a section
break, which appears as a dotted line with the words Section Break. T h e four types o f section breaks are: ^
Next Page—inserts a section break and forces a new page t o start after the section break
^
^
the d o c u m e n t .
Inserting a Section Break T o insert a section break, use the B r e a k s button in the Page Setup group on the Page L a y o u t t a b t o select the
Continuous—inserts a section break without
type o f section break you w a n t t o insert. W h e n non-
starting a n e w page
printing characters are displayed, a section break is in-
Even Page—inserts a section break and forces a new page t o start o n the next even-numbered page
^
tion b r e a k s , is c o n t a i n e d in the last p a r a g r a p h m a r k in
Section Break in the center o f it, followed by the type o f section
dicated by a double dotted line with the w o r d s
break. If the section break appears at the end o f a line,
Odd Page—inserts a section break a n d forces
you c a n see only the first part o f the dotted line. T o
a n e w page t o start on the n e x t o d d - n u m b e r e d
see the type o f section break inserted, y o u c a n switch
page
to D r a f t view, which displays the t e x t o f the d o c u m e n t
T h e i n f o r m a t i o n f o r the f o r m a t t i n g o f a section
without showing its layout.
is c o n t a i n e d in the section b r e a k that follows the sect i o n . T h i s m e a n s that if y o u delete a section b r e a k , the f o r m a t t i n g f r o m the section b e l o w the deleted sec-
section break A formatting mark in a document that indicates the start of a new section.
tion b r e a k is applied t o the section a b o v e the deleted
Chapter
12: Enhancing
a
Document
Creating Odd and Even Pages Most professionally produced books and reports are even-numbered pages, they appear on the left side of printed on both sides of the paper and then bound. the footer. You can set up the pages in a multiple-page When you open a bound book or report, odd-numbered pages appear on the right, and even-numbered pages document with odd and even pages. After you insert a header or footer, on the appear on the left. The marHeader & Footer Tools Design gin on the inside of each page, even page gutter odd page tab, select the Different Odd where the pages are bound & Even Pages check box in the together, is called the gutter. Options group. To increase Often, the headers and footers the width of the gutter to alfor odd-numbered pages are low for binding, click the Mardifferent from the headers or gins button in the Page Setup footers for the even-numbered group on the Page Layout tab, pages. For instance, the page and then click Custom Margins numbers might appear on the to open the Page Setup dialog outside edge of the footer. box with the Margins tab seSo on odd-numbered pages, odd page even page lected. Change the measurepage numbers appear on the number number ment in the Gutter box. right side of the footer; and on
break appears all the way across the screen. See
ACTIVITY
Exhibit 1 2 - 1 3 .
Insert a section break.
I Switch back to Print Layout view.
View tab. In Page Width button.
O n the R i b b o n , click the group, click the
the Z o o m
Exhibit 12-11 Breaks menu
Q | Scroll down to the b o t t o m o f page 3 , and then position the insertion point in front o f the Faculty heading.
UH^^KW
| On the Ribbon, click the Page Layout tab. In the Page Setup group, click the
Breaks button. The Breaks menu opens,
^ T i p : To delete a section break, click the line representing the break, and then press the Delete key.
B
v
Themes . — . [Oj»
Home
Insert ]
^
Orientation-(^
M a r g i n s __ „ I I Columns ' Page S e t u p
._v
Registration-Fee:
"
{v =1
1 2 - 1 1 . The Page Breaks section of the menu includes to page. The first option, Page, inserts a page break (just like the Page Break button on the Insert tab that you used earlier). T h e Section Breaks section of the
Next Page. A
faculty!
tion break is inserted, and the insertion point moves to the top o f the new page 4 . See Exhibit 1 2 - 1 2 . I O n the status bar, click the
Draft button [S]. T h e
document switches to Draft view, and the section
Chapter
12: Enhancing
a
Document
Next Page * I n s e r t a s e c t i o n break a n d start t h e n e w — s e c t i o n o n t h e next p a g e .
AlUnstructorsat R with a positive a t :
sec-
lext Wrapping S e p a r a t e t e x t a r o u n d objects o n w e b p a g e s , s u c h as c a p t i o n text f r o m b o d y text.
Section Breaks
menu includes four types o f section breaks. I In the Section Breaks section, click
Column I n d i c a t e t h a t t h e text f o l l o w i n g t h e c o l u m n b r e a k w i l l b e g i n in t h e next c o l u m n .
= =l
options for controlling h o w the text flows from page
Indent
Page M a r k t h e p o i n t at w h i c h o n e p a g e e n d s a n d t h e next page begins.
*
3=
as shown in Exhibit
Watermark -
Page Breaks
types of section breaks
Tv >—-\ ^ = | = =4a^|
I 1
Continuous Insert a s e c t i o n break a n d start t h e n e w s e c t i o n o n t h e same p a g e . Even Page Insert a s e c t i o n b r e a k a n d start t h e n e w s e c t i o n o n t h e next e v e n - n u m b e r e d p a g e . O d d Page Insert a s e c t i o n break a n d start t h e n e w s e c t i o n o n t h e next o d d - n u m b e r e d p a g e .
Regsitratoin-fee: ThereHsaone-tm i eoer^amyli regsitThe ratoin•fDance eeof $25•Works formew-s^|tudentsf. 1600N-Oosrthgo-Aondd-Sotreveer.t. M OAsgoo0d1L-8a4n5d1nig* (n9t7a8c)t6 8e39.3da9n0c1e v» or ks. us E m a : l i c o s t h Web-stie: .The DanceU or ks. «:.>.»S:eCtO in Berak (NeXt Page):,:::::;:,:::,: c
us\.,,, .
WITH
Mmm
Next Page section break
IT
insertion point
^acultyH All-instructorsat T h e O a n c e W o r k s a r e f u l l y certifiedijrofessionalswhotakeiaride-in-sharing their-loveof-dance-by combining-superiortraining w i t h a p o s i t i v e a t t i t u d e . T h e y h a v e - s t u d i e d - e x t e n s i v e l y w i t h t h e finest t e a c h e r s , t j o t h - n a t i o n a l l y a n d a b r o a d . I n s t r u c t o r s maintain their-skills b y attending speciaklasses.conventions, a n d s e m i n a r s t h r o u g h o u t the year. O u r m s t r u c t o r s o f f e r a v a r i e t y o f specialtiesto e n s u r e t h a t our students get a w e l l - r o u n d e d - d a n c e - e d u c a t i o n a s t h e y p r o g r e s s l A l l i n s t r u c t o r s at t h e D a n c e W o r k s a r e m e m b e r s - o f D a n c e T e a c h e r s - C l u b o f B o s t o n a n d D a n c e M a s t e r s o f A m e r i c a !
P a g e ; 4 of 5
W o r d s : 1,448
|
Q- I ..]
LJ
L3 3
Exhibit 12-13 Next Page section break in Draft view )ance Flyer - 'Microsoft W o r e
I
Insert ^
Sh
Themes —
Page L a y o u t
O r i e n t a t i o n • iQ Breaks •
J J Size * 11 Columns ' Margins
References
£ J Line N u m b e r s ' be" H y p h e n a t i o n ~
Mailings
Review
$ Watermark» ^ Page C o l o r ' []| Page Borders
View
Developer
Indent iS. Left:
Spacing 0*
i f * R i g h t : 0'
B e f o r e : 0 pt
* \% A f t e r .
Page B a c k g r o u n d
Page Setup
C
Opt
* >< ' Position
Paragraph
Wrap _ Text • 5*
Send Backward
Selection Pane Arrange
^|&GroAuplign%X R o t a t e
becauseof-a-holidayor-ilness/she-orhe-can-m RegistrationFee:ThGrGis-a-one-timeper-family-registration-fee-of$25-fornew-students.11
The • Dance - Works^ 1600NorthAi 0sgooiddoxci Stiee,t,O sAgoo01d8L4a5id«1ingH M (9t7o8ita)6c8t3e-l9h3e9d0a1ic1euorks.is*] E m a i l : • Web-stie:*www.TteiDanceWorks.us1| ,Section Break ( N e x t P a g e ) , ,
^acultyH AII-instructors-atThe-Dance-Works-a
^^^^
S
section break in ^ ^ ^ ^ ^
j'^'''k'^''*^^ p r
en s
a r n g t
e r
Q
Chapter
12:
Enhancing
a
Document
Formatting a Section Differently from the Rest of the Document
and then click
Portrait.
Section 2 , which consists
of pages 4 and 5 , changes t o portrait orientation. Section 1 , which consists o f pages 1 - 3 , remains in
O n c e you have inserted a section break, you c a n for-
landscape orientation.
m a t each section separately. W h e n you change the page-
In the Page S e t u p group, click the Margins button.
level formatting of a section, the other sections in the
and then click Narrow. T h e margin settings for Sec-
document remain unchanged.
tion 2 change to the N a r r o w setting, and the text in Section 2 n o w fits all on page 4 . See Exhibit 1 2 - 1 4 .
Adding Different Headers and Footers in Sections
Format a section. m
M a k e sure the i n s e r t i o n p o i n t is p o s i t i o n e d
before
O n e o f the advantages o f dividing a document into sec-
the Faculty heading on page 4 .
Q| O n the R i b b o n , click the View tab. In the Z o o m
tions is that the headers and footers in each section can differ. F o r example, if the d o c u m e n t includes a cover
group, click the Two Pages button. Pages 3 and 4 o f
page, and you w a n t the page numbering to begin o n
the document appear side by side in the window. O n the R i b b o n , click the
the first page after the cover page, you can insert a sec-
Page Layout tab. In the button,
tion break after the cover page, a n d then have the page
Page Setup group, click the Orientation
numbers start and appear only in Section 2 .
Exhibit 12-14 Page 4 formatted in portrait orientation with narrow margins
^aTceTrye^^icrosoft Woer?" J
M£ Themes . — ,
2 | O r i e n t a t i o n • l£j B r e a k s •
Margins
Themes
II
^
Watermark »
v*J Page C o l o r »
%W Left:
be" H y p h e n a t i o n •
Q Page B o r d e r s
| £ R i g h t 0"
Page B a c k g r o u n d
C o lPuamgnes S•e t u p
|£ A l i g n •
Spacing
Indent
): J Line N u m b e r s •
0*
t
1% B e f o r e : 0 p t
P a rC a g r a p;fh
After
:|
Posrtic
- j Send Backward Text
t^J G r o u p Rotate •
5^ S e l e c t i o n Pane Arrange
0 pt
Section 1 in landscape orientation Page 4 of 4
i m UP 5 s
W o r d s 1,446
Li
Chapter
12: Enhancing
a
Document
44%
-
ige Dutton in the
I Press the Tab key, and then type your name. Your name is aligned with the Center T a b stop in the footer.
Pages group on the Insert tab automatically inserts a section break after the cover page.
I Scroll up to see the b o t t o m o f page 3 . T h e footer area on this page is labeled F o o t e r -Section 1 - , and your n a m e appears here as well. | Scroll b a c k down, and m a k e sure the insertion point is still in the footer area for Section 2 .
ACTIVITY
) O n the H e a d e r & Footer Tools Design t a b , in the N a v i g a t i o n group, click the
Add different headers and footers in sections.
fP C h a n g e the
z o o m back to
Page Width,
and m a k e
Same as Previous tag on the f o o t e r disappears.
sure the insertion point is still before the Faculty
| Scroll up so you can see the b o t t o m o f page 3 .
heading on page 4 .
pP On the
N o t i c e that the Section 2 header area on page 4
Inserttab. In the I l e a d e r cv Footer group, click the Footer button, and then below the gallery, click Edit Footer. T h e insertion point moves R i b b o n , click the
still c o n t a i n s the Same as Previous tag. ) O n page 3 , in the footer area, delete the t a b character before your name so it is left-aligned, and
to the footer area on page 4 . T h e Footer area is la-
then position the insertion point after y o u r n a m e .
beled Footer -Section 2-, and on the right, a tag labels this footer the Same as Previous. See Exhibit 1 2 - 1 5 .
j
Header Footer
Page Number'
Date i-Time
Q u i c k Picture Parts Insert
Header & Footer
BUI JU Clip Art
DRAFT.
and then type
Link to Previous button
ance"Flye^^icrosoft Wor References
Tab key twice,
) Press the
Exhibit 12-15 Footer area for Section 2
Page L a y o u t
Link to Previous
button. T h e button is no longer selected, a n d the
Mailings
Header Footei
1
Header & Footer Toosl I Design
Review
Link t o P r e v i o u s
•
D i f f e r e n t First P a g e
Qi
Header from Top:
0.5'
•
D i f f e r e n t O d d & E v e n Pages
Q«
Footer from Bottom:
0.5"
[7]
S h o w D o c u m e n t Text
0
Insert A l i g n m e n t T a b
Navigation
Options
Close Header and Footer
Position
Heather
- i
you can edit the colors o f WordArt text in t w o ways: by changing the fill and outline color.
YJordT
Dance Flyer~^Microsoft
Review —
-
Viev\ Bf
- S
•
You can also change the style o f the outline,
Develo
Picture B o r d e r '
by, for example, making it thicker, or breaking
Picture Effects -
it into dashes.
Picture L a y o u t -
/ /
WordArt is actually a t e x t b o x . A
text
box is an object that c o n t a i n s t e x t . Y o u c a n f o r m a t the text in the o b j e c t just as y o u would format any t e x t in a d o c u m e n t . Y o u
Dance* Works 1
can also format the entire o b j e c t . W h e n the selection border around W o r d A r t is a dashed line, the insertion point is positioned in the t e x t , and you can treat the t e x t as y o u w o u l d ordinary text. Y o u c a n edit it o r select it a n d then apply formatting. W h e n t h e selection border around W o r d A r t is a solid line, the entire WordArt o b j e c t is selected. W h e n the W o r d A r t object is selected, y o u c a n apply
Welcome
formatting t o the W o r d A r t t e x t even though it is n o t specifically selected, a n d y o u c a n a p ply formatting t o the t e x t b o x itself, such as changing the fill or outline color.
Removing a Photo's Background One specialized technique for editing photos allows you to remove the background of a photo, leaving only the foreground image. For example, you can edit a photo of a bird in the sky to remove the sky, leaving only the image of the bird. To edit a photo to remove the background, use the Remove Background button in the Adjust group on the Picture Tools Format tab. Removing a photo's background can be tricky, especially if you are working on a photo with a background that is not clearly differentiated from the foreground image. For example, you might find it difficult to remove a white, snowy background from a photo of an equally white snowman.
Inserting WordArt Y o u c a n create WordArt out o f existing t e x t in a d o c u ment by selecting the text, clicking the W o r d A r t b u t t o n in the T e x t group o n the Insert t a b , a n d then selecting a W o r d A r t style from the gallery that o p e n s . Y o u c a n also click the W o r d A r t button in the T e x t group o n the Insert tab, and then click the style y o u w a n t in the W o r d A r t gallery t o open a W o r d A r t text b o x c o n t a i n i n g placeholder text. Y o u c a n then replace t h e placeholder with the text y o u w a n t t o format as W o r d A r t .
Insert WordArt. At the top o f the document, select Dance Works w i t h o u t selecting the p a r a g r a p h m a r k at the end o f the line.
LO125 A d d i n g
W
ordArt
WordArt
O n the R i b b o n , click the
Insert tab.
In the T e x t
group, click the WordArt button. T h e W o r d A r t galis formatted, decorative text that is treated
lery opens. See E x h i b i t 1 2 - 2 2 .
as an object. In addition to the formatting that you
can use with ordinary text, you can add beveled edges to the individual letters, format the text in 3 D , and transform the text into waves, circles, and other shapes. You can also rotate WordArt text so it stretches vertically on the page.
WordArt Formatted, decorative text that is treated as a graphic object. text box An object that contains text.
Another advantage o f WordArt over regular text is that
Chapter
12: Enhancing
a
Document
) In the W o r d A r t object, click be-
Exhibit 12-22 WordArt gallery e Fryer •
fore the w o r d
Mailings
T h e W o r d A r t text is modified.
Developer Hyperlink
Chart
and then press the
i—ri——i,
WordArt button
:rosoft Word""*
^J
Bookmark
Screenshot
H F oe oa tdeerr *•
A
Text Box'
Page N u m b e r J^J C r o sLinks s-reference
I
Header & Footer
j
Qui^Pa'n^^
J
\A
Equation '
Q
Symbol •
Formatting WordArt
A
T h e W o r d A r t Styles group on the D r a w i n g T o o l s F o r m a t tab includes
A A A A A A A A A A A A A ^A A A
A
A
Fill - Purple, Accent 4, Outer Shadow Accent 4, Soft Edge Bevel style
7t
Date & T i m e
A
A
Dance. Works 1]
S i g n a t u r e Line
The Spacebar. Type
DANCE.
four tools that allow you to alter the color, shape, and overall look o f W o r d A r t . If you don't like the style you selected w h e n you originally created your W o r d A r t , you can select a new style using the Quick Styles button in the W o r d A r t Styles group. T o change the fill color, use the T e x t Fill button, or, to change the outline color, use the T e x t Outline button. Finally, the T e x t Effects button gives
Welcome-to-The-Dance-Works!1|
you access to a variety of special effects, including shadows, beveling, and 3 D r o t a t i o n , and transforming
p In the bottom row, click the Fill - Purple, Accent 4,
the shape o f the WordArt. If your WordArt already includes some o f these features, you
Outer Shadow - Accent 4, Soft Edge Bevel style. The gal-
can use the Text Effects button t o fine tune the effects,
lery closes, the selected text is changed to a WordArt
perhaps by making a shadow or bevel m o r e noticeable,
object, and the Drawing Tools Format tab appears on
or by removing an effect entirely. In addition, you can
the Ribbon and is the active tab. See Exhibit 1 2 - 2 3 .
Exhibit 12-23 WordArt inserted in document
[WfT,d
'
">
~^^^WIWBBM^^^^aTcTFIyer^Microsoft
Home \ D O D
Insert
El W O O D
A ~L" E LX ~L
O
Page Layout . s v
| {
O
-
S
References . >
{
(
t-
'V I
-v }
I Abe I
Abe
WorcH
Mailings Review ^ Shape F i l l , - & Shape F i l l -
Abe
,
LV
Shape Outline -
I
I*
*
j
I
J
I
J
9
View
Az» A '
Developer
^ * Styles
&
-
Format
Ufl Text D i r e c t i o n -|4 \ A l i g n Text » Create Link
. V o r d A r t Styles
S h a p e Styles
* IT
*
N
Insert Shapes
~
Drawing Tools Format tab
W
Quick S h a p e Effects -
Text
1*1 1
Position
» B ™ 1
Wrap Text-
™
g
f
o ™ , , , d -
Send Backward ' S e l e c t i o n Pane
, -M
stv)es
Dance-Works
r
WordArt object WelcometoTheDanceWorkslH
Chapter
12:
Enhancing
a
Document
ft* [\ .j^-
S«e
just as you w o u l d for ordinary t e x t , by selecting it and
Text Boxes
then c h o o s i n g a n e w font size. If y o u c h o o s e an espe-
You can insert text boxes containing ordinary text— that is, text that is not WordArt. To do this, click the Text Box button in the Text group on the Insert tab. Click one of the styles in the gallery to insert a formatted text box containing placeholder text, or click Draw Text Box to insert an empty text box. You can format the text in a text box just as you would any text. You can also format the text box itself by adding or changing the fill color or the color or weight of the border. Text boxes are inserted as floating objects.
resize the t e x t b o x to ensure t h a t t h e resized t e x t a p -
cially large f o n t f o r a headline, y o u m i g h t also need t o pears o n a single line.
Format WordArt. Q)
WORDART DOTTED LINE SELECTION BORDER.
Click the
It
b e c o m e s a solid line. On the D r a w i n g Tools F o r m a t t a b , in t h e W o r d A r t Styles g r o u p , click the Text Outline
button arrow
T h e c o l o r palette opens. c h a n g e t h e shape o f the W o r d A r t o b j e c t by using the
I In the c o l o r palette, under T h e m e C o l o r s , click the
T r a n s f o r m c o m m a n d on the T e x t Effects b u t t o n .
Purple, Accent 4, Lighter 80% color.
Y o u c a n also change the size o f W o r d A r t . W h e n re-
Text Effects Transform. A gallery
sizing W o r d A r t , you need t o consider both the font size
In the W o r d A r t Styles g r o u p , click the
o f the t e x t a n d the size o f the t e x t b o x that c o n t a i n s the
button |.-\
W o r d A r t . Y o u change the font size f o r W o r d A r t text
o f t r a n s f o r m effects appears. See E x h i b i t 1 2 - 2 4 .
\ and then
point t o
Exhibit 12-24 Transform submenu on the Text Effects menu LWY" .-*F H o m e I n s e r t QWDOCD A L L O ^ G - EL Insert Shapes
0
Page L a y o u t
References
Mailings
Review
View
JFC S h a p e F i l l t l -
^
Shape Outline „ •» S h a p e Effects -
S h a p e Styles
Developer -
M Text D i r e c t i o n -
* FEF Q u i c k R-R-M
_*J A l i g n T e x t »
Styles-
w
*'
I Position
Create Link
•
Wrap T e x t
-
• * WordArt S J 7T
/J^
JJ B r i n g F o r w a r d * ^ Send Backward - W ^_ ' %
Selection Pane
Size
^I-
A R R A N G E
Shadow
A
. J_\^ LEVEL
•
ITD :E Follow Path
3-D Rotation • Transform
Warp
ABCDE ABCDE ABCDE BCD • Q
E
Dance-Works!^ At-TheOance-WORK5,we-5TRIVETO-developwell-traineddancersthro or^erfull-potentaMn a
5UPPORTIVE«nvrionnr>ENTHNVVHICHOUR