本书是国外著名大学采用的计算机基础课教材,适合偏文科和商科大学的计算机导论课或公共课使用。本书涉及了计算机科学的诸多方面,包含计算机相关知识,就像一部百科全书一样便于读者学习,增强读者对计算机科学的兴趣,为今后的课程学习打下坚实的基础。本书在内容安排上既体现了计算机科学的广度,又兼顾了相关主题的深度,同时紧跟当前的技术发展趋势,是一本不可多得的教学用书。
本书的编写风格非常清晰,章节的划分合理实用。书中包含的技术信息对于那些已经初步了解基本计算机概念的学生既轻松有趣又非常实用。
——Martha Lindberg,明尼苏达州立大学
本书以学生易于理解的方式将计算机系统的基本概念和技术娓娓道来,每章还辅以精选的示例和插图,是一本内容全面、易学易懂的计算机导论教材。
——Gerald Hensel,巴伦西亚社区学院
本书采用最先进的方法和技术讲述计算机基础知识,涉及面之广、内容之丰富、方法之独特,令人叹为观止,堪称计算机基础知识的百科全书。本书涵盖影响计算和日常生活的重要技术趋势,对数据安全、个人隐私、在线安全、数字版权管理、开源软件和便携式应用程序等进行了广泛讨论。全书层次合理、图文并茂,各章还配有测验,非常适合作为高校各专业的计算机导论教材和教师参考书,也可供广大计算机爱好者参考使用。
本版新增内容
更新内容涵盖最相关的技术趋势,这些趋势会影响到计算学科的发展和我们每天的生活,如数据安全、在线安全、数字版权保护、开源软件和iPad这样的新技术。
介绍多个新工具来帮助学生可视化概念、组织知识内容、批判性地思考技术问题、分类整理伴随学术研究和日常社会网络带来的海量信息。
计算机\基础
本书的编写风格非常清晰,章节的划分合理实用。书中包含的技术信息对于那些已经初步了解基本计算机概念的学生既轻松有趣又非常实用。
——Martha Lindberg,明尼苏达州立大学
本书以学生易于理解的方式将计算机系统的基本概念和技术娓娓道来,每章还辅以精选的示例和插图,是一本内容全面、易学易懂的计算机导论教材。
——Gerald Hensel,巴伦西亚社区学院
本书采用最先进的方法和技术讲述计算机基础知识,涉及面之广、内容之丰富、方法之独特,令人叹为观止,堪称计算机基础知识的百科全书。本书涵盖影响计算和日常生活的重要技术趋势,对数据安全、个人隐私、在线安全、数字版权管理、开源软件和便携式应用程序等进行了广泛讨论。全书层次合理、图文并茂,各章还配有测验,非常适合作为高校各专业的计算机导论教材和教师参考书,也可供广大计算机爱好者参考使用。
本版新增内容
更新内容涵盖最相关的技术趋势,这些趋势会影响到计算学科的发展和我们每天的生活,如数据安全、在线安全、数字版权保护、开源软件和iPad这样的新技术。
介绍多个新工具来帮助学生可视化概念、组织知识内容、批判性地思考技术问题、分类整理伴随学术研究和日常社会网络带来的海量信息。
Contents
CHAPTER 1
COMPUTERS AND DIGITAL BASICS
4 Section A: All Things Digital
4 The Digital Revolution
6 Data Processing
7 Personal Computing
8 Network Computing
9 Cloud Computing
10 Digital Society
13 QuickCheck A
14 Section B: Digital Devices
14 Computer Basics
16 Computer Types and Uses
20 Microcontrollers
21 QuickCheck B
22 Section C: Digital Data Representation
22 Data Representation Basics
23 Representing Numbers, Text, Images, and Sound
26 Quantifying Bits and Bytes
27 Circuits and Chips
28 QuickCheck C
29 Section D: Digital Processing
29 Programs and Instruction Sets
31 Processor Logic
33 QuickCheck D
34 Section E: Password Security
34 Authentication Protocols
36 Password Hacks
38 Secure Passwords
41 QuickCheck E
CHAPTER 2
COMPUTER HARDWARE
44 Section A: Personal Computer Basics
44 Personal Computer Systems
46 Desktop and Portable Computers
48 Home, Game, and Small Business Systems
50 Buying a Computer
53 Handheld Computers
54 QuickCheck A
55 Section B: Microprocessors and Memory
55 Microprocessor Basics
59 Today’s Microprocessors
60 Random Access Memory
62 Read-Only Memory
62 EEPROM
63 QuickCheck B
64 Section C: Storage Devices
64 Storage Basics
66 Magnetic Storage Technology
69 Optical Storage Technology
72 Solid State Storage Technology
74 Storage Wrap-up
75 QuickCheck C
76 Section D: Input and Output Devices
76 Basic Input Devices
78 Display Devices
80 Printers
82 Installing Peripheral Devices
85 QuickCheck D
86 Section E: Hardware Security
86 Anti-Theft Devices
87 Surge Protection and Battery Backup
89 Basic Maintenance
91 Troubleshooting and Repair
93 QuickCheck E
CHAPTER 3
SOFTWARE
96 Section A: Software Basics
96 Software Categories
97 Music Software
98 Video Software
99 Graphics Software
101 Mapping and Location-based Software
102 Business and “Number Crunching” Software
103 Desktop Publishing Software
104 Personal Finance Software
105 Utility Software
107 Device Drivers
107 QuickCheck A
108 Section B: Office Suites
108 Office Suite Basics
109 Word Processing
112 Spreadsheets
115 Databases
118 Presentations
118 QuickCheck B
119 Section C: Installing Software and Upgrades
119 Web Apps
121 Mobile Apps
122 Local Applications
127 Portable Software
128 Software Upgrades and Updates
129 Uninstalling Software
129 QuickCheck C
130 Section D: Buying Software
130 Consumer Basics
132 Software Copyrights and Licenses
137 QuickCheck D
138 Section E: Security Software
138 Security Software Basics
142 Security Suites
143 Antivirus Modules
145 QuickCheck E
CHAPTER 4
OPERATING SYSTEMS AND FILE MANAGEMENT
148 Section A: Operating System Basics
148 Operating System Activities
153 User Interfaces
156 The Boot Process
157 QuickCheck A
158 Section B: Today’s Operating Systems
158 Microsoft Windows
161 Mac OS
164 UNIX and Linux
165 DOS
166 Handheld and Tablet Operating Systems
167 QuickCheck B
168 Section C: File Basics
168 File Names and Extensions
169 File Directories and Folders
171 File Formats
175 QuickCheck C
176 Section D: File Management
176 Application-based File Management
178 File Management Utilities
179 File Management Metaphors
180 Windows Explorer
182 File Management Tips
182 Physical File Storage
185 QuickCheck D
186 Section E: Backup Security
186 Backup Basics
188 File Copies
189 Synchronization
190 Windows Backup
193 Disk Images and Bare-Metal Restore
194 Virtual Machines
195 Handheld Backup
195 QuickCheck E
227 Section D: Sharing Files
227 File Sharing Basics
228 Accessing Shared Files
229 Sharing Your Files
231 File Servers
232 Network Troubleshooting
233 QuickCheck D
234 Section E: Wireless Security
234 Wi-Fi Security
237 Encryption
239 QuickCheck E
CHAPTER 5
LOCAL AREA NETWORKS
198 Section A: Network Building Blocks
198 Network Classifications
200 LAN Advantages and Disadvantages
202 Network Devices
203 Network Links
204 Communications Protocols
207 QuickCheck A
208 Section B: Wired and Wireless Technologies
208 Wired Basics
209 Ethernet
211 Wireless Basics
213 Bluetooth
214 Wi-Fi
216 QuickCheck B
217 Section C: Network Setup
217 Setup Overview
218 Router Installation
220 Router Configuration
224 Internet Connection
225 Device connection
226 QuickCheck C
CHAPTER 6
THE INTERNET
242 Section A: Internet Technology
242 Background
243 Internet Infrastructure
245 Internet Protocols, Addresses, and Domains
249 Connection Speed
251 QuickCheck A
252 Section B: Fixed Internet Access
252 Dial-up Connections
254 DSL
256 Cable Internet Service
258 Satellite Internet Service
259 Fixed Wireless Service
260 Fixed Internet Connection Roundup
260 QuickCheck B
261 Section C: Portable and Mobile Internet Access
261 Internet to Go
262 Wi-Fi Hotspots
264 Portable and Mobile WiMAX
264 Portable Satellite Service
265 Cellular Data Service
268 QuickCheck C
269 Section D: Internet Services
269 Cloud Computing
271 Real-Time Messaging
271 Voice Over IP
272 Forums, Wikis, Blogs, and Tweets
274 Grid Computing
275 FTP
277 File Sharing Networks
278 QuickCheck D
279 Section E: Internet Security
279 Intrusion Attempts
281 Securing Ports
282 NAT
285 Virtual Private Networks
285 QuickCheck E
CHAPTER 7
THE WEB AND E-MAIL
288 Section A: Web Technology
288 Web Basics
290 HTML
292 HTTP
294 Web Browsers
296 Cookies
297 Web Page Authoring
299 HTML Scripts
301 QuickCheck A
302 Section B: Search Engines
302 Search Engine Basics
306 Formulating Searches
310 Using Web-based Source Material
311 QuickCheck B
312 Section C: E-commerce
312 E-commerce Basics
314 E-commerce Site Technology
317 Online Payment
319 QuickCheck C
320 Section D: E-mail
320 E-mail Overview
322 Local E-mail
324 Webmail
326 E-mail Attachments
327 Netiquette
327 QuickCheck D
328 Section E: Web and E-mail Security
328 Cookie Exploits
332 Spam
333 Phishing
334 Fake Sites
335 QuickCheck E
CHAPTER 8
DIGITAL MEDIA
338 Section A: Digital Sound
338 Digital Audio Basics
341 Digital Audio File Formats
343 MIDI Music
344 Speech Recognition and Synthesis
345 QuickCheck A
346 Section B: Bitmap Graphics
346 Bitmap Basics
348 Scanners and Cameras
350 Image Resolution
353 Color Depth and Palettes
356 Image Compression
359 QuickCheck B
360 Section C: Vector and 3-D Graphics
360 Vector Graphics Basics
363 Vector-to-Bitmap Conversion
364 Vector Graphics on the Web
365 3-D Graphics
367 QuickCheck C
368 Section D: Digital Video
368 Digital Video Basics
369 Producing Video Footage
371 Video Transfer
372 Video Editing
373 Video Output
375 Web Video
377 DVD-Video
379 QuickCheck D
380 Section E: Digital Rights Management
380 Content Basics
382 DRM Technologies
384 Music DRM
385 Movie DRM
386 eBook DRM
386 Enforcement
387 QuickCheck E
CHAPTER 9
THE COMPUTER INDUSTRY: HISTORY, CAREERS, AND ETHICS
390 Section A: Computer History
390 Manual Calculators
392 Mechanical Calculators
393 Computer Prototypes
395 Generations of Computers
399 Personal Computers
401 QuickCheck A
402 Section B: The Computer and IT Industries
402 Industry Overview
406 Economic Factors
407 Product Life Cycles
409 Market Share
410 Marketing Channels
412 Industry Regulation
413 QuickCheck B
414 Section C: Careers for Computer Professionals
414 Jobs and Salaries
418 Education and Certification
421 Job Hunting Basics
422 Resumes and Web Portfolios
424 Job Listings
426 QuickCheck C
427 Section D: Professional Ethics
427 Ethics Basics
429 IT Ethics
433 Ethical Decision Making
436 Whistleblowing
437 QuickCheck D
438 Section E: Work Area Safety and
Ergonomics
438 Radiation Risks
440 Repetitive Stress Injuries
442 Eye Strain
444 Back Pain
444 Sedentary Lifestyle
445 QuickCheck E
CHAPTER 10
INFORMATION SYSTEMS ANALYSIS AND DESIGN
448 Section A: Information Systems
448 Information Systems in Organizations
451 Transaction Processing Systems
453 Management Information Systems
454 Decision Support Systems
456 Expert Systems and Neural Networks
457 QuickCheck A
458 Section B: Systems Analysis
458 System Development Life Cycle
459 Planning Phase
463 Analysis Phase
464 Documentation Tools
467 QuickCheck B
468 Section C: System Design
468 Design Phase
471 Evaluation and Selection
473 Application Specifications
474 QuickCheck C
475 Section D: Implementation and Maintenance
475 Implementation Phase
475 Development and Testing
477 Documentation and Training
478 Conversion and Cutover
479 Maintenance Phase
481 QuickCheck D
482 Section E: Corporate Data Security
482 Information System Data Vulnerabilities
484 Information System Data Security
486 Corporate Identity Theft
487 QuickCheck E
CHAPTER 11
DATABASES
490 Section A: File and Database Concepts
490 Database Basics
494 Database Models
501 QuickCheck A
502 Section B: Data Management Tools
502 Data Management Software
505 Database Management Systems
507 Databases and the Web
510 XML
512 QuickCheck B
513 Section C: Database Design
513 Defining Fields
517 Normalization
519 Organizing Records
520 Designing the Interface
522 Designing Report Templates
524 Loading Data
524 QuickCheck C
525 Section D: SQL
525 SQL Basics
527 Adding Records
528 Searching for Information
530 Updating Fields
531 Joining Tables
532 QuickCheck D
533 Section E: Database Security
533 Database Vulnerabilities
535 Database Security Measures
537 Database Security Regulations
538 What Individuals Can Do
539 QuickCheck E
CHAPTER 12
COMPUTER PROGRAMMING
542 Section A: Programming Basics
542 Computer Programming and Software
Engineering
544 Programming Languages and Paradigms
548 Program Planning
550 Program Coding
553 Program Testing and Documentation
554 Programming Tools
556 QuickCheck A
557 Section B: Procedural Programming
557 Algorithms
560 Expressing an Algorithm
563 Sequence, Selection, and Repetition Controls
568 Procedural Languages and Applications
569 QuickCheck B
570 Section C: Object-oriented Programming
570 Objects and Classes
572 Inheritance
573 Methods and Messages
577 Object-oriented Program Structure
579 Object-oriented Languages and Applications
580 QuickCheck C
581 Section D: Declarative Programming
581 The Declarative Paradigm
582 Prolog Facts
586 Prolog Rules
589 Input Capabilities
590 Declarative Languages and Applications
590 QuickCheck D
591 Section E: Secure Programming
591 Black Hat Exploits
593 Secure Software Development
596 Mitigation
597 QuickCheck E
598 GLOSSARY