×







We sell 100% Genuine & New Books only!

Technology In Action Complete (4Th Edition) 2007 Edition at Meripustak

Technology In Action Complete (4Th Edition) 2007 Edition by Alan Evans, PRENTICE HALL

Books from same Author: Alan Evans

Books from same Publisher: PRENTICE HALL

Related Category: Author List / Publisher List


  • Price: ₹ 11564.00/- [ 11.00% off ]

    Seller Price: ₹ 10292.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Alan Evans
    PublisherPRENTICE HALL
    ISBN9780132253567
    Pages704
    BindingSoftbound
    LanguageEnglish
    Publish YearJanuary 2007

    Description

    PRENTICE HALL Technology In Action Complete (4Th Edition) 2007 Edition by Alan Evans

    For introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office. A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media. CHAPTER 1Why Computers Matter to You: Becoming Computer Fluent Becoming a Savvy Computer User and Consumer Being Prepared for Your CareerBeing Prepared for Your CareerComputers in Business: Working in a Data Mine? Computers in Retail: Let Me Look That Up for You Computers in Shipping: UPS Data on the Go Computers in Ranching and Farming: High Tech Down on the Farm Computers in the Arts: Shall We Dance? Computers in the Medical Field: Fact or Science Fiction? Computers in Law Enforcement: Put Down That Mouse-You're Under Arrest! Computers in the Legal Fields: Welcome to the Virtual Courtroom Computers in Education: And on the Left, You See the Mona LisaComputers and the Sciences: Programming the Perfect Storm Computers in Sports: Bend Your Elbow Another Two Degrees? Computer Gaming Careers: Now Bigger Than Hollywood! Computers at Home: Just Program It and Forget It Getting Ready for the Technology of Tomorrow Nanoscience: The Next "Big" Thing Biomedical Chip Implants: Combining Humans with Machines? Artificial Intelligence: Will Computers Become Human? Understanding the Challenges Facing a Digital Society TRENDS IN IT: Ehics: Knowledge Is Power: Bridging the Digital Divide Becoming Computer Fluent Computers Are Data Processing Devices Bits and Bytes: The Language of Computers Computer Hardware Computer Software Computer Platforms: PCs and MACs Specialty Computers DIG DEEPER: What Can You Do with a Digital Home? CHAPTER 2Looking at Computers: Understanding the Parts Your Computer's Hardware Input DevicesKeyboards Mice and Other Pointing Devices Sound Input Input Devices for Physically Challenged Individuals Output Devices Monitors Printers DIG DEEPER: How Inkjet and Laser Printers Work Sound Output The System Unit On the Front Panel On the Back Inside the System Unit Setting It All Up TRENDS IN IT: Emerging Technologies: Tomorrow's Display-You Can Take It with You! TECHNOLOGY IN FOCUS Careers in IT CHAPTER 3Using the Internet:Making the Most of the Web's ResourcesThe Internet Communicating Through the Internet: E-Mail and Other Technologies Instant Messaging Voice over Internet Protocol (VoIP) Weblogs (blogs) and Video Logs (vlogs) Podcasts Webcasts Wikis E-Mail Chat Rooms Newsgroups Listservs Web Entertainment: Multimedia and Beyond TRENDS IN IT: Social Networking Conducting Business over the Internet: E-Commerce E-Commerce Safeguards Managing Online Annoyances Spam Cookies Adware Spyware Malware Phishing and Internet Hoaxes Navigating the Web: Web Browsers Getting Around the Web: URLs, Hyperlinks, and Other ToolsURLs Hyperlinks and Beyond Favorites and Bookmarks Tabbed Browsing TRENDS IN IT: Ethics: What Can You Borrow from the Internet? Searching the Web: Search Engines and Subject Directories Search Engines DIG DEEPER: Refining Your Web Searches: Boolean Operators Subject Directories Evaluating Web Sites Internet BasicsThe Internet's Clients and Servers Connecting to the Internet Broadband Connections Dial-Up Connections Choosing the Right Internet Connection Option Finding an Internet Service Provider Choosing an ISP The Origin of the Internet The Web Versus the Internet The Future of the Internet CHAPTER 4Application Software:Programs That Let You Work and Play The Nuts and Bolts of Software More Productivity at Home Word-Processing Software Spreadsheet Software Presentation Software Database Software Personal Information Manager (PIM) Software Productivity Software Tools Integrated Software Applications Versus Software Suites DIG DEEPER: Speech-Recognition Software Personal Financial Software More Media at Home Digital Image-Editing Software Digital Audio Software Digital Video-Editing Software Media Management Software More Fun at Home Gaming Software Educational Software Reference Software Drawing Software Business SoftwareHome Business Software Large-Business Software TRENDS IN IT: Emerging Technologies: Is It Real or Is It Virtual? Specialized Business Software Getting Help with Software Buying Software Standard Software Web-Based Application Software Discounted Software Freeware and Shareware Software Versions and Systems Requirements Installing/Uninstalling and Opening Software TRENDS IN IT: Ethics: Can I Borrow Software That I Don't Own? TECHNOLOGY IN FOCUS Digital Entertainment CHAPTER 5Using System Software: The Operating System, UtilityPrograms, and File Management System Software Basics Operating System Categories Real-Time Operating Systems Single-User Operating Systems Multiuser Operating Systems Desktop Operating Systems Microsoft Windows Mac OS Unix Linux TRENDS IN IT: Emerging Technologies: Open-Source Software: Why Isn't Everyone Using Linux? What the Operating System Does The User Interface Processor Management Memory and Storage Management Hardware and Peripheral Device Management Software Application Coordination The Boot Process: Starting Your Computer Step 1 : Activating BIOS Step 2 : Performing the Power-On Self-Test Step 3 : Loading the Operating System Step 4 : Checking Further Configurations and Customizations Handling Errors in the Boot Process The Desktop and Windows Features Organizing Your Computer: File Management Organizing Your Files Viewing and Sorting Files and Folders Naming Files Working with Files Utility Programs Display Utilities The Add or Remove Programs Utility File Compression Utilities System Maintenance Utilities DIG DEEPER: How Disk Defragmenter Utilities Work System Restore and Backup Utilities The Task Scheduler Utility Accessibility Utilities CHAPTER 6Understanding and Assessing Hardware: Evaluating Your System Is It the Computer or Me?What Is Your Ideal Computer? Assessing Your Hardware: Evaluating Your System Evaluating the CPU SubsystemAnalyzing Your CPU Evaluating RAM: The Memory Subsystem Virtual Memory Adding RAM Evaluating the Storage SubsystemThe Hard Disk Drive DIG DEEPER: How a Hard Disk Drive Works Portable Storage Options: The Floppy and Beyond Upgrading Your Storage Subsystem Evaluating the Video Subsystem Video Cards TRENDS IN IT: Ethics: CD and DVD Technology: A Free Lunch-Or at Least a Free Copy Monitors Evaluating the Audio Subsystem Speakers Sound Cards Evaluating Port Connectivity Adding Ports: Expansion Cards and Hubs Evaluating System Reliability TRENDS IN IT: Computers in Society: How to Donate Your Old Computer Safely Making the Final Decision TECHNOLOGY IN FOCUS Computing Alternatives CHAPTER 7Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking FundamentalsNetwork Architectures Describing Networks Based on Network Control Describing Networks Based on Distance Network Components Transmission Media Network Adapters Network Navigation Devices Networking Software Types of Peer-to-Peer NetworksWired Ethernet Networks Ethernet Switches Ethernet Routers Wireless Ethernet Networks Power-Line Networks Phoneline Networks Choosing a Peer-to-Peer Network Configuring Software for Your Home NetworkTRENDS IN IT: Emerging Technologies: Grid Computing: Aiding Scientific Research with Your Computer Keeping Your Home Computer Safe Computer Threats: Hackers What Hackers Steal Trojan Horses Denial of Service Attacks How Hackers Gain Access TRENDS IN IT: Computers in Society: Identity Theft: Is There More Than One You Out There? Computer Safeguards: Firewalls Types of Firewalls Is Your Computer Secure? Securing Wireless Networks DIG DEEPER: How Firewalls Work Computer Threats: Computer Viruses Types of Viruses Virus Classifications Computer Safeguards: Antivirus Software Other Security Measures TRENDS IN IT: Careers: Cybercops on the Beat: Computer Security Careers CHAPTER 8Mobile Computing: Keeping Your Data on Hand Mobile Computing: Is It Right for You? Mobile Device Limitations Mobile Computing DevicesCellular PhonesCell Phone Hardware How Cell Phones Work Cell Phone Features: Text Messaging Cell Phone Internet Connectivity Portable Media Players PMP Hardware PMP Flash Memory and File Transfer PMP Ethical Issues: Napster and Beyond Personal Digital Assistants (PDAs) TRENDS IN IT: Emerging Technologies: Why Carry Your Data When You Can Wear It? PDA Hardware PDA Operating Systems PDA Memory and Storage PDA File Transfer and Synchronization PDA Internet Connectivity PDA Software and Accessories PDA or Cell Phone? Tablet PCs DIG DEEPER: The Power of GPS Tablet PC Hardware Tablet Software Tablet or PDA? Notebooks Notebook Hardware TRENDS IN IT: Ubiquitous Networking: Wherever You Go, There You Are Notebook Operating Systems and Ports Notebook Batteries and Accessories Notebook or Desktop? TRENDS IN IT: Emerging Technologies: Nanotubes: The Next Big Thing Is Pretty Darn Small! TECHNOLOGY IN FOCUS Protecting Your Computer and Backing Up Your Data CHAPTER 9Behind the Scenes: A Closer Look at System Hardware Digital Data: Switches and Bits Electrical Switches The Binary Number System DIG DEEPER: Advanced Binary and Hexadecimal Notations The CPU: Processing Digital Information The CPU Machine Cycle Stage 1 : The Fetch Stage Stage 2 : The Decode Stage Stage 3 : The Execute Stage Stage 4 : The Store Stage TRENDS IN IT: Emerging Technologies: Printable Processors: The Ultimate in Flexibility RAM: The Next Level of Temporary Storage Types of RAM Buses: The CPU's Data Highway Making Computers Even Faster: Advanced CPU Designs Pipelining Specialized Multimedia Instructions Multiple Processing Efforts TRENDS IN IT: Emerging Technologies: Computer Technology Changing the Face of Medicine CHAPTER 10Behind the Scenes: Software Programming The Life Cycle of an Information System System Development Life Cycle TRENDS IN IT: Careers: Considering a Career in Systems Development? The Life Cycle of a Program Describing the Problem: The Problem StatementMaking a Plan: Algorithm Development Developing an Algorithm: Decision Making and Design Top-Down Design Object-Oriented Analysis Coding: Speaking the Language of the Computer Categories of Programming Languages Creating Code: Writing the Program DIG DEEPER: The Building Blocks of Programming Languages: Syntax,Keywords, Data Types, and Operators Compilation Coding Tools: Integrated Development Environments Debugging: Getting Rid of ErrorsFinishing the Project: Testing and Documentation Programming Languages: Many Languages for Many Projects Selecting the Right Language Windows Applications Web Applications: HTML/XHTML and Beyond The Next Great Language TRENDS IN IT: Computers in Society: Alice: Making Programming Fun and Approachable CHAPTER 11Behind the Scenes:Databases and Information Systems Life Without Databases Database Building BlocksAdvantages of Using Databases Database Terminology Primary Keys Database Types Relational Databases Object-Oriented Databases Multidimensional Databases Database Management Systems: Basic Operations Creating Databases and Entering Data Input Forms Data Validation Viewing and Sorting Data DIG DEEPER: Structured Query Language (SQL) Extracting or Querying Data TRENDS IN IT: Computers in Society: Can a Database Catch a Criminal? Outputting Data Relational Database Operations Normalization of Data TRENDS IN IT: Computers in Society: Need Cash? Use Databases to Find Your Property Data StorageData Warehouses Populating Data Warehouses Data Staging Data Marts Managing Data: Information Systems Office Support Systems Transaction Processing Systems Management Information Systems Decision Support Systems Internal and External Data Sources Model Management Systems Knowledge-Based Systems Data Mining TRENDS IN IT: Emerging Technologies: Web Portal Enables Krispy Kreme to Manage Its Dough . . . Without Going Nuts! CHAPTER 12Behind the Scenes: Networking and Security Networking Advantages Client/Server Networks Classifications of Client/Server Networks: LANs, WANs, and MANs Constructing Client/Server Networks Servers Print Servers Application Servers Database Servers E-Mail Servers Communications Servers Web Servers Network Topologies Bus Topology Ring Topology Star Topology Comparing Topologies Transmission Media Wired Transmission Media Wireless Media Options Comparing Transmission Media Network Operating Systems TRENDS IN IT: Emerging Technologies: Virtual Network Computing Is Here and It's Free Network Adapters DIG DEEPER: The OSI Model: Defining Protocol Standards TRENDS IN IT: Ethics: RFID-Friend or Foe? Network Navigation Devices MAC Addresses Repeaters and Hubs Switches and Bridges Routers Network Security Authentication Access Privileges Physical Protection Measures TRENDS IN IT: Emerging Technologies: Wi-Fi Phones Keep Doctors and Nurses Connected Firewalls TRENDS IN IT: Computers in Society: What's Shakin'? California Maintains a Reliable Network to Respond to Earthquake Emergencies CHAPTER 13Behind the Scenes: The Internet: How It Works The Management of the Internet Internet Networking Connecting Internet Service Providers Network Access Points Points of Presence The Network Model of the Internet Data Transmission and Protocols Packet Switching TCP/IP IP Addresses and Domain NamesDomain Names DIG DEEPER: Making the Connection: Connection-Oriented Versus Connectionless Protocols DNS Servers Other Protocols: FTP and Telnet HTTP, HTML, and Other Web Jargon HTTP and SSL HTML/XHTML XML The Common Gateway Interface Client-Side Applications Communications over the Internet TRENDS IN IT: Careers: If You Build It, Will They Come? Web Development and Design Careers E-mail TRENDS IN IT: Computers in Society: Have You Ever Used an Extranet or a Virtual Private Network? E-Mail Security: Encryption and Specialized Software Instant Messaging TRENDS IN IT: Emerging Technologies: The Evolving Internet TECHNOLOGY IN FOCUS The History of the PCGlossary Index Credits



    Book Successfully Added To Your Cart