0% found this document useful (0 votes)
189 views55 pages

Ebooks File Technology in Action Complete Twelfth Global Edition Kendall E. Martin All Chapters

action

Uploaded by

ghodezuryn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views55 pages

Ebooks File Technology in Action Complete Twelfth Global Edition Kendall E. Martin All Chapters

action

Uploaded by

ghodezuryn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Experience Seamless Full Ebook Downloads for Every Genre at textbookfull.

com

Technology in action complete Twelfth Global


Edition Kendall E. Martin

https://textbookfull.com/product/technology-in-action-
complete-twelfth-global-edition-kendall-e-martin/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Systems Analysis and Design (9th Edition) Kenneth E.


Kendall

https://textbookfull.com/product/systems-analysis-and-design-9th-
edition-kenneth-e-kendall/

textboxfull.com

Technology in Action Introductory 13th Edition Alan Evans

https://textbookfull.com/product/technology-in-action-
introductory-13th-edition-alan-evans/

textboxfull.com

Technology In Action, Rental Edition, 17th Edition Alan


Evans

https://textbookfull.com/product/technology-in-action-rental-
edition-17th-edition-alan-evans/

textboxfull.com

Human Contradictions in Octavia E. Butler's Work Martin


Japtok

https://textbookfull.com/product/human-contradictions-in-octavia-e-
butlers-work-martin-japtok/

textboxfull.com
Metallica Updated Edition The Complete Illustrated History
Martin Popoff

https://textbookfull.com/product/metallica-updated-edition-the-
complete-illustrated-history-martin-popoff/

textboxfull.com

New Developments in Science and Technology Education 1st


Edition Martin Riopel

https://textbookfull.com/product/new-developments-in-science-and-
technology-education-1st-edition-martin-riopel/

textboxfull.com

Psychology in Modules Twelfth Edition David Myers

https://textbookfull.com/product/psychology-in-modules-twelfth-
edition-david-myers/

textboxfull.com

Visualizing technology Complete 5th Edition Geoghan

https://textbookfull.com/product/visualizing-technology-complete-5th-
edition-geoghan/

textboxfull.com

Foundations of finance global edition John D. Martin

https://textbookfull.com/product/foundations-of-finance-global-
edition-john-d-martin/

textboxfull.com
Technology
in Action
Complete

12th Edition

GLOBAL EDITION

Alan Evans | Kendall Martin | Mary Anne Poatsy

Boston Columbus Indianapolis New York San Francisco Hoboken


Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City Sâo Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
VP, Editorial Director: Andrew Gilfillan Marketing Assistant: Jeremiah Drozd
Executive Acquisitions Editor: Jenifer Niles Operations Specialist: Diane Peirano
Assistant Acquisitions Editor, Global Editions: Aditee Agarwal Senior Production Manufacturing Controller,
Production and Program Team Lead: Laura Burgess Global Editions: Trudy Kimber
Project Manager: Rhonda Aversa Director of Digital Studio, Worforce Readiness: Taylor Ragan
Program Manager: Emily Biberger Digital Strategy: Eric Hakanson
Editorial Assistant: Victoria Lasavath Media Project Manager, Production: John Cassar and Jose Carchi
Development Editor: Shannon LeMay-Finn Media Production Manager, Global Editions: Vikram Kumar
Project Editor, Global Editions: Donald Villamero Cover Art: © Maxx-Studio/Shutterstock
Director of Marketing: Maggie Waples Composition: Lumina Datamatics, Inc.
Marketing Coordinator: Susan Osterlitz

Pearson Education Limited


Edinburgh Gate
Harlow
Essex CM20 2JE
England
and Associated Companies throughout the world
Visit us on the World Wide Web at:
www.pearsonglobaleditions.com
© Pearson Education Limited 2016
The rights of Alan Evans, Kendall Martin, and Mary Anne Poatsy to be identified as the authors of this work have been asserted by them in
accordance with the Copyright, Designs and Patents Act 1988.
Authorized adaptation from the United States edition, entitled Technology in Action Complete, ISBN 978-0-13-394956-8, by Alan Evans,
Kendall Martin, and Mary Anne Poatsy, published by Pearson Education © 2016.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license
permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street,
London EC1N 8TS.
All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or
publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or
endorsement of this book by such owners.
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate
page within the text.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.

10 9 8 7 6 5 4 3 2 1

ISBN 10: 1-292-09967-4


ISBN 13: 978-1-292-09967-5

Typeset by Lumina Datamatics, Inc., in 9/11 Helvetica Neue LT Std


Printed and bound in Great Britain by Courier Kendallville
twelfth
twelfth

EDITION
12
Contents at a Glance
Chapter 1
Using Technology to Change the World.................................................................................... 32

Chapter 2
Looking at Computers: Understanding the Parts...................................................................... 58

Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................................. 104

Technology in Focus
The History of the Personal Computer.................................................................................... 142

Chapter 4
Application Software: Programs That Let You Work and Play.................................................. 152

Chapter 5
System Software: The Operating System, Utility Programs, and File Management.................. 188
Technology in Focus
Information Technology Ethics................................................................................................ 232

Chapter 6
Understanding and Assessing Hardware: Evaluating Your System.......................................... 252

Chapter 7
Networking: Connecting Computing Devices.......................................................................... 288

Technology in Focus
Under the Hood...................................................................................................................... 328

Chapter 8
Digital Devices and Media: Managing a Digital Lifestyle........................................................... 340

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices............................................ 376

Technology in Focus
Careers in IT........................................................................................................................... 424

Chapter 10
Behind the Scenes: Software Programming............................................................................ 436

Chapter 11
Behind the Scenes: Databases and Information Systems....................................................... 478

Chapter 12
Behind the Scenes: Networking and Security in the Business World....................................... 520

Chapter 13
Behind the Scenes: How the Internet Works........................................................................... 560

Glossary................................................................................................................................. 594
Index...................................................................................................................................... 613

Contents at a Glance 3
twelfth
twelfth
EDITION

12
Contents
Chapter 1
Using Technology to Change the World.............................. 32
How Will You Put Technology in Action?.....................................................................34
Technology on the World Stage.................................................................................... 34
Political Issues............................................................................................................... 34
Other Global Issues....................................................................................................... 35
ethics in it: The Digital Divide and the Mobile Bridge................................................ 37
Technology and Our Society.......................................................................................... 38
Technology Impacts How We Think............................................................................... 38
Technology Impacts How We Connect.......................................................................... 38
Technology Impacts How We Consume........................................................................ 39
Try this: Skyping Around the World........................................................................... 42
Make This: MAKE: A Virtual Assistant........................................................................ 43
How Will Technology Improve Your Life?....................................................................44
Technology at Home....................................................................................................... 44
Technology and Your Career......................................................................................... 46
Retail: Working in a Data Mine....................................................................................... 46
Arts: Ink, Paints, and a Laptop?.................................................................................... 46
Education: Teaching and Learning................................................................................. 47
Law Enforcement: Put Down That Mouse—You’re Under Arrest!................................... 49
Medicine: The Chip Within............................................................................................. 49
DIG DEEPER: Making Reality Even More Real.............................................................. 50
Science: Simulating Reality............................................................................................ 51
Psychology: Computerized Coach................................................................................. 51
Solve This: How Technology Is Used on the World Stage and
in My Personal Life........................................................................................................ 57

Chapter 2
Looking at Computers: Understanding the Parts................ 58
Understanding Digital Components............................................................................60
Understanding your Computer..................................................................................... 60
Computers Are Data Processing Devices...................................................................... 60
Bits and Bytes: The Language of Computers................................................................ 61
Types of Computers...................................................................................................... 61
Input Devices.................................................................................................................. 65
Keyboards..................................................................................................................... 65
Mice and Other Pointing Devices................................................................................... 67
Image Input................................................................................................................... 69
DIG DEEPER: How Touch Screens Work..................................................................... 70

4 Contents
twelfth
twelfth

EDITION
12
Sound Input.................................................................................................................. 70
Ethics in IT: What Is Ethical Computing?................................................................... 72
Output Devices............................................................................................................... 73
Monitors........................................................................................................................ 73
Printers.......................................................................................................................... 76
Sound Output............................................................................................................... 77
Try this: What’s Inside My Computer?....................................................................... 80
Make This: MAKE: A Mobile App............................................................................... 81
Processing, Storage, and Connectivity........................................................................82
Processing and Memory on the Motherboard............................................................. 82
Memory......................................................................................................................... 83
Processing.................................................................................................................... 83
Storing Data and Information........................................................................................ 84
Hard Drives................................................................................................................... 84
Cloud Storage............................................................................................................... 84
Portable Storage Options.............................................................................................. 84
Optical Storage............................................................................................................. 86
Connecting Peripherals to the Computer.................................................................... 87
High-Speed and Data Transfer Ports............................................................................. 87
Connectivity and Multimedia Ports................................................................................. 87
Adding Ports: Expansion Cards and Hubs..................................................................... 88
Power Controls............................................................................................................... 89
Setting it All Up............................................................................................................... 91
TRENDS in IT: Innovations in Printing.......................................................................... 94
Solve This: Technology Wish List............................................................................ 103

Chapter 3
Using the Internet: Making the Most of the
Web’s Resources.................................................................. 104
Working and Playing on the Web..............................................................................106
The internet and how It Works................................................................................... 106
The Origin of the Internet............................................................................................. 106
How the Internet Works............................................................................................... 107
Communicating and Collaborating on the Web......................................................... 109
Social Networking....................................................................................................... 109
E-Mail.......................................................................................................................... 109
Instant Messaging....................................................................................................... 111
Wikis........................................................................................................................... 111
Blogs........................................................................................................................... 113
Podcasts and Webcasts.............................................................................................. 113
Web Entertainment....................................................................................................... 115
Conducting Business Over the Internet: E-commerce............................................. 117

Contents 5
twelfth
twelfth
EDITION

12
E-Commerce Safeguards............................................................................................ 117
DIG DEEPER: Discovering the Semantic Web............................................................ 120
Try this: Create a OneDrive Account to Store and Share
   Your Files in the Cloud............................................................................................ 122
Make This: MAKE: A Web-Capable App.................................................................. 123
Using the Web Effectively...........................................................................................124
Accessing and Moving Around the Web.................................................................... 124
Web Browsers............................................................................................................. 124
URLs, Protocols, and Domain Names......................................................................... 125
Hyperlinks and Beyond................................................................................................ 127
Favorites, Live Bookmarks, and Tagging...................................................................... 128
TRENDS in IT: Doing Business on a Shoestring—Thanks to the Internet................... 129
Searching the Web Effectively..................................................................................... 130
Using Search Engines Effectively................................................................................. 130
Evaluating Websites.................................................................................................... 132
Ethics in IT: Plagiarism and Copyright Violation: What Can You
Borrow from the Internet?............................................................................................ 134
Solve This: Create a Report: Conducting Research on the Web.............................. 141

Technology in Focus
The History of the Personal Computer................................................142

Chapter 4
Application Software: Programs That Let You
Work and Play.................................................................... 152
Programs That Let You Work......................................................................................154
The Nuts and Bolts of Software.................................................................................. 154
TRENDS in IT: Mobile Commerce: What Have You Bought
with Your Phone Lately?.............................................................................................. 155
Productivity and Business Software........................................................................... 156
Bundled Productivity Software..................................................................................... 156
Word Processing Software.......................................................................................... 156
Spreadsheet Software................................................................................................. 158
Presentation Software................................................................................................. 159
Database Software...................................................................................................... 160
Note-Taking Software.................................................................................................. 161
Personal Information Manager Software...................................................................... 162
Microsoft Office Productivity Software Features........................................................... 163
Personal Financial Software......................................................................................... 163
Ethics in IT: Can I Borrow Software That I Don’t Own?........................................... 164
Small Business Software............................................................................................. 165
Software for Large and Specialized Businesses........................................................... 165
Try This: Citing Website Sources............................................................................. 168
Make This: MAKE: A More Powerful App................................................................. 169

6 Contents
twelfth
twelfth

EDITION
12
Programs That Let You Play.......................................................................................170
Multimedia and Entertainment Software.................................................................... 170
Digital Image- and Video-Editing Software................................................................... 170
DIG DEEPER: How Cloud Computing Works............................................................. 172
Digital Audio Software................................................................................................. 173
Gaming Software........................................................................................................ 174
Educational and Reference Software........................................................................... 174
Drawing Software........................................................................................................ 174
Managing Your Software............................................................................................. 176
Getting Software......................................................................................................... 176
Software Licenses....................................................................................................... 177
Getting the Right Software for Your System................................................................. 178
Installing and Uninstalling Software.............................................................................. 179
Solve This: Analyzing Benchmark Data................................................................... 187

Chapter 5
System Software: The Operating System,
Utility Programs, and File Management........................... 188
Understanding System Software................................................................................190
Operating System Fundamentals................................................................................ 190
Real-Time Operating Systems..................................................................................... 191
Operating Systems for Networks, Servers, and Mainframes........................................ 191
Operating Systems for Mobile Devices........................................................................ 192
Operating Systems for Personal Computers................................................................ 192
What the Operating System Does............................................................................... 196
The User Interface....................................................................................................... 196
Processor Management.............................................................................................. 196
Memory and Storage Management............................................................................. 197
Hardware and Peripheral Device Management............................................................ 199
Ethics in IT: The Great Debate: Is Mac OS X Safer than Windows?......................... 200
Software Application Coordination............................................................................... 201
The Boot Process: Starting Your Computer............................................................... 202
Step 1: Activating BIOS............................................................................................... 202
Step 2: Performing the Power-On Self-Test................................................................. 203
Step 3: Loading the OS............................................................................................... 203
Step 4: Checking Further Configurations and Customizations..................................... 203
Handling Errors in the Boot Process............................................................................ 203
Try this: Organizing Tiles on the Start Screen in Windows 8.1................................. 206
Make This: MAKE: A Notification Alert ..................................................................... 207
Using System Software...............................................................................................208
The Windows Interface................................................................................................ 208
TRENDS in IT: Open Source Software: Why Isn’t Everyone
Using Linux?................................................................................................................ 213
Organizing your Computer: File Management.......................................................... 214

Contents 7
twelfth
twelfth
EDITION

12
Organizing Your Files................................................................................................... 214
Viewing and Sorting Files and Folders......................................................................... 215
Naming Files............................................................................................................... 216
Working with Files....................................................................................................... 218
Utility Programs............................................................................................................ 219
Display Utilities............................................................................................................ 219
The Programs and Features Utility............................................................................... 219
File Compression Utilities............................................................................................. 220
System Maintenance Utilities....................................................................................... 221
System Restore and Backup Utilities........................................................................... 222
DIG DEEPER: How Disk Defragmenter Utilities Work.................................................. 223
Accessibility Utilities..................................................................................................... 224
Solve This: Mobile Operating Systems: Changing Market Share............................. 231

Technology in Focus
Information Technology Ethics...........................................................232

Chapter 6
Understanding and Assessing Hardware:
Evaluating Your System...................................................... 252
Evaluating Key Subsystems.......................................................................................254
Your Ideal Computing Device...................................................................................... 254
Evaluating the CPU Subsystem................................................................................... 256
How the CPU Works................................................................................................... 256
CPU Factors............................................................................................................... 257
Measuring the CPU..................................................................................................... 258
Evaluating the Memory Subsystem............................................................................ 260
The RAM in Your System............................................................................................. 260
Adding RAM................................................................................................................ 262
Evaluating the Storage Subsystem............................................................................. 263
Mechanical Hard Drives............................................................................................... 263
Solid-State Drives........................................................................................................ 263
DIG DEEPER: How Hard Drives Work........................................................................ 264
Optical Drives.............................................................................................................. 265
Your Storage Capacity and Needs............................................................................... 266
Try this: Measure Your System Performance........................................................... 270
Make This: MAKE: A Location-Aware App............................................................... 271
Evaluating Other Subsystems and Making a Decision.............................................272
Evaluating the Video Subsystem................................................................................. 272
Video Cards................................................................................................................ 272
TRENDS in IT: Thunderbolt: The New Standard for Data Transfer.............................. 275
Evaluating the Audio Subsystem................................................................................ 276
Evaluating System Reliability...................................................................................... 278

8 Contents
twelfth
twelfth

EDITION
12
Making a Final Decision............................................................................................... 280
Getting Rid of Your Old Computer............................................................................... 280
ETHICS in IT: Free Hardware for All........................................................................... 281
Solve This: Laptop Alternatives............................................................................... 287

Chapter 7
Networking: Connecting Computing Devices.................... 288
How Networks Function............................................................................................... 290
Networking Fundamentals............................................................................................. 290
Network Architectures.................................................................................................... 292
Network Architectures Defined by Distance................................................................... 292
Network Architectures Defined by Levels of Administration............................................ 293
Ethernet Protocols......................................................................................................... 294
Network Components..................................................................................................... 295
Transmission Media....................................................................................................... 295
Basic Network Hardware............................................................................................... 297
Network Software.......................................................................................................... 298
Connecting to the Internet............................................................................................. 299
Wired Broadband Internet Connections......................................................................... 299
Wireless Internet Access................................................................................................ 301
Dial-Up Connections...................................................................................................... 302
Try this: Testing Your Internet Connection Speed...................................................... 304
Make This: MAKE: Networked Devices...................................................................... 305
Your Home Network..................................................................................................... 306
Installing and Configuring Home Networks................................................................. 306
Planning Your Home Network........................................................................................ 306
Connecting Devices to a Router..................................................................................... 307
Network-Attached Storage Devices............................................................................... 309
TRENDS in IT: Where Should You Store Your Files? The Cloud Is Calling! ................... 310
Home Network Servers.................................................................................................. 311
Digital Entertainment Devices on a Network................................................................... 311
Specialized Home-Networking Devices.......................................................................... 313
Configuring Software for Your Home Network................................................................ 314
Troubleshooting Wireless Network Problems................................................................. 316
Ethics in IT: Sharing Your Internet Connection with Your Neighbors: Legal?
Ethical? Safe?................................................................................................................ 317
Securing Wireless Networks.......................................................................................... 318
Solve This: Home Networking Guide......................................................................... 327

Technology in Focus
Under the Hood......................................................................................328

Contents 9
twelfth
twelfth
EDITION

12
Chapter 8
Digital Devices and Media: Managing a Digital
Lifestyle................................................................................. 340
Mobile Devices............................................................................................................. 342
Digital Convergence....................................................................................................... 342
Telephony: Smartphones and Beyond.......................................................................... 343
Smartphone Basics........................................................................................................ 343
Smartphone Components.............................................................................................. 343
How Cell Phone Technology Works............................................................................... 345
Synchronizing................................................................................................................ 346
Text Messaging.............................................................................................................. 347
Mobile Internet............................................................................................................... 347
Smartphone Security..................................................................................................... 349
VoIP............................................................................................................................... 349
Smartphone GPS........................................................................................................... 350
Tablets, Netbooks, and Ultrabooks............................................................................... 351
Tablets........................................................................................................................... 351
Netbooks....................................................................................................................... 351
Ultrabooks..................................................................................................................... 351
Making a Choice............................................................................................................ 352
Try this: Creating and Publishing a Movie.................................................................. 354
Make This: MAKE: A Video-Playing App..................................................................... 355
The Digital Information Age........................................................................................ 356
Digital Defined................................................................................................................. 356
Trends in IT: NFC Chips: Do You Have a Digital Wallet?............................................ 358
Digital Media.................................................................................................................... 359
Digital Publishing............................................................................................................ 359
Digital Music.................................................................................................................. 361
Digital Photography........................................................................................................ 363
DIG DEEPER: The Shift to Digital Music: A Bumpy Ride............................................... 364
Digital Video................................................................................................................... 366
Ethics in IT: Managing Your Copyrights: Copyleft Might Simplify Your Life................. 368
Solve This: Estimating Cellular Data Usage................................................................ 375

Chapter 9
Securing Your System: Protecting Your Digital
Data and Devices............................................................... 376
Major Threats to Your Digital Assets..........................................................................378
Cybercrime and Identity Theft..................................................................................... 378
Computer Viruses......................................................................................................... 380
Catching a Virus.......................................................................................................... 380
Boot-Sector Viruses.................................................................................................... 380

10 Contents
twelfth
twelfth

EDITION
12
Logic Bombs and Time Bombs................................................................................... 380
Worms........................................................................................................................ 380
Script and Macro Viruses............................................................................................ 381
E-Mail Viruses............................................................................................................. 381
Encryption Viruses....................................................................................................... 381
Additional Virus Classifications..................................................................................... 381
Virus Symptoms.......................................................................................................... 382
Preventing Virus Infections.......................................................................................... 383
Antivirus Software........................................................................................................ 383
Software Updates....................................................................................................... 385
Understanding Hackers............................................................................................... 386
Problems Hackers Can Cause..................................................................................... 386
Trojan Horses and Rootkits.......................................................................................... 387
Denial-of-Service Attacks............................................................................................ 387
How Hackers Gain Computer Access......................................................................... 387
Restricting Access to Your Digital Assets.................................................................. 390
Firewalls...................................................................................................................... 390
Types of Firewalls........................................................................................................ 390
How Firewalls Work..................................................................................................... 391
Knowing Your Computer Is Secure.............................................................................. 391
Password Protection and Password Management....................................................... 392
Creating Passwords.................................................................................................... 392
Managing Your Passwords.......................................................................................... 393
Anonymous Web Surfing: Hiding from Prying Eyes...................................................... 394
Biometric Authentication Devices................................................................................ 396
Try this: Testing Your Network Security................................................................... 398
Make This: MAKE: A Password Generator............................................................... 399
Protecting Your Digital Property from Yourself..........................................................400
Managing Online Annoyances..................................................................................... 400
Malware: Adware and Spyware................................................................................... 400
Spam.......................................................................................................................... 401
DIG DEEPER: Computer Forensics: How It Works..................................................... 402
Cookies....................................................................................................................... 403
Ethics in IT: You’re Being Watched … But Are You Aware You’re
Being Watched?.......................................................................................................... 405
Keeping Your Data Safe............................................................................................... 406
Protecting Your Personal Information........................................................................... 406
Backing Up Your Data................................................................................................. 406
Social Engineering........................................................................................................ 411
Phishing and Pharming................................................................................................ 411
Scareware................................................................................................................... 412
TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches...... 413
Protecting Your Physical Computing Assets............................................................. 414
Environmental Factors................................................................................................. 414
Power Surges............................................................................................................. 414
Deterring Theft............................................................................................................ 415

Contents 11
twelfth
twelfth
EDITION

12
Keep Them Safe: Alarms............................................................................................. 415
Keeping Mobile Device Data Secure............................................................................ 415
Software Alerts and Data Wipes.................................................................................. 415
Solve This: Computer Security................................................................................ 423

Technology in Focus
Careers in IT.........................................................................................424

Chapter 10
Behind the Scenes: Software Programming....................... 436
Understanding Software Programming.....................................................................438
The Importance of Programming................................................................................ 438
The Life Cycle of an Information System................................................................... 439
The System Development Life Cycle............................................................................ 439
The Life Cycle of a Program........................................................................................ 441
Describing the Problem: The Problem Statement........................................................ 441
Making a Plan: Algorithm Development....................................................................... 443
Developing the Algorithm: Decision Making and Design............................................... 444
Top-Down Design........................................................................................................ 445
Object-Oriented Analysis............................................................................................. 446
DIG DEEPER: The Building Blocks of Programming Languages: Syntax,
Keywords, Data Types, and Operators......................................................................... 448
Coding: Speaking the Language of the Computer....................................................... 450
Compilation................................................................................................................. 453
Coding Tools: Integrated Development Environments.................................................. 454
Debugging: Getting Rid of Errors................................................................................. 455
Testing and Documentation: Finishing the Project........................................................ 456
Try this: Programming with Corona ........................................................................ 458
Make This: MAKE: A Notepad................................................................................. 459
Programming Languages..........................................................................................460
Many Languages for Many Projects........................................................................... 460
Selecting the Right Language...................................................................................... 461
Ethics in IT: When Software Runs Awry.................................................................. 462
Exploring Programming Languages........................................................................... 463
Visual Basic................................................................................................................. 463
C and C++.................................................................................................................. 463
Java and C#................................................................................................................ 464
Objective C and Swift.................................................................................................. 464
HTML.......................................................................................................................... 464
JavaScript and VBScript.............................................................................................. 465
ASP, JSP, and PHP..................................................................................................... 465
AJAX, XML, JSON....................................................................................................... 466
Mobile Applications..................................................................................................... 467

12 Contents
twelfth
twelfth

EDITION
12
TRENDS in IT: Emerging Technologies: Unite All Your Video
Game Design Tools...................................................................................................... 469
The Next Great Language........................................................................................... 470
Solve This: Time Sheets......................................................................................... 477

Chapter 11
Behind the Scenes: Databases and
Information Systems........................................................... 478
Database Basics.........................................................................................................480
Database Building Blocks............................................................................................ 480
Databases Versus Lists............................................................................................... 480
Advantages of Using Databases.................................................................................. 483
Database Management Systems................................................................................. 484
Database Terminology................................................................................................. 484
Planning and Creating the Database............................................................................ 485
Using Primary Keys..................................................................................................... 487
Database Types............................................................................................................ 488
Relational Databases................................................................................................... 488
Object-Oriented Databases......................................................................................... 489
Multidimensional Databases........................................................................................ 489
Database Functions..................................................................................................... 490
Inputting Data.............................................................................................................. 490
Data Validation............................................................................................................ 490
Viewing and Sorting Data............................................................................................ 492
Extracting or Querying Data......................................................................................... 493
DIG DEEPER: Structured Query Language (SQL)....................................................... 494
Outputting Data........................................................................................................... 496
Try this: Using Excel’s Database Functions............................................................. 498
Make This: MAKE: A Family Shopping List............................................................... 499
How Businesses Use Databases..................................................................................500
Data Warehousing and Storage.................................................................................. 500
Data Warehouses........................................................................................................ 500
TRENDS in IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!................................. 501
Populating Data Warehouses....................................................................................... 502
Data Staging............................................................................................................... 503
Data Marts.................................................................................................................. 503
Business Intelligence Systems.................................................................................... 504
Office Support Systems............................................................................................... 504
Transaction-Processing Systems................................................................................. 504
Management Information Systems.............................................................................. 505
Decision Support Systems.......................................................................................... 506
Enterprise Resource Planning Systems....................................................................... 508

Contents 13
twelfth
twelfth
EDITION

12
TRENDS in IT: Computers in Society: User-Populated Databases............................. 509
Data Mining................................................................................................................... 510
Ethics in IT: Data, Data Everywhere—But Is It Protected?....................................... 511
Solve This: College Database.................................................................................. 519

Chapter 12
Behind the Scenes: Networking and Security
in the Business World.......................................................... 520
Client/Server Networks and Topologies....................................................................522
Client/Server Network Basics..................................................................................... 522
Networking Advantages.............................................................................................. 522
Comparing Client/Server and Peer-to-Peer Networks.................................................. 522
Types of Client/Server Networks.................................................................................. 524
Servers........................................................................................................................... 527
Authentication and File Servers.................................................................................... 527
Print Servers................................................................................................................ 528
Application Servers...................................................................................................... 528
Database Servers........................................................................................................ 528
E-Mail Servers............................................................................................................. 528
Communications Servers............................................................................................. 528
Web Servers and Cloud Servers.................................................................................. 528
TRENDS in IT: Virtualization: Making Servers Work Harder........................................ 529
Network Topologies..................................................................................................... 530
Bus Topology.............................................................................................................. 530
Ring Topology............................................................................................................. 531
Star Topology.............................................................................................................. 532
Comparing Topologies................................................................................................. 534
Try this: Sharing Folders on a Home Network Using Windows................................ 536
Make This: MAKE: An App That Shares................................................................... 537
Setting Up Business Networks....................................................................................538
Transmission Media..................................................................................................... 538
Wired Transmission Media........................................................................................... 538
Twisted-Pair Cable...................................................................................................... 539
Coaxial Cable.............................................................................................................. 539
Fiber-Optic Cable........................................................................................................ 539
Wireless Media Options............................................................................................... 539
Comparing Transmission Media................................................................................... 539
Network Adapters........................................................................................................ 541
Network Navigation Devices....................................................................................... 543
MAC Addresses.......................................................................................................... 543
Switches and Bridges.................................................................................................. 544
Routers....................................................................................................................... 544

14 Contents
twelfth
twelfth

EDITION
12
Network Operating Systems....................................................................................... 545
DIG DEEPER: The OSI Model: Defining Protocol Standards....................................... 546
Client/Server Network Security................................................................................... 548
Authentication............................................................................................................. 548
Access Privileges........................................................................................................ 548
Physical Protection Measures...................................................................................... 549
Ethics in IT: How Should Companies Handle Data Breaches?................................ 550
Firewalls...................................................................................................................... 551
Solve This: Cyber Security Flyer and Mail Merge..................................................... 559

Chapter 13
Behind the Scenes: How the Internet Works...................... 560
Inner Workings of the Internet....................................................................................562
The Management of the Internet................................................................................ 562
Internet Networking..................................................................................................... 563
Internet Data Routes................................................................................................... 563
The Network Model of the Internet.............................................................................. 564
Data Transmission and Protocols............................................................................... 565
Circuit Switching......................................................................................................... 565
Packet Switching......................................................................................................... 565
TCP/IP........................................................................................................................ 566
Internet Identity: IP Addresses and Domain Names................................................. 567
IP Addresses............................................................................................................... 567
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols....................... 568
Domain Names........................................................................................................... 571
Try this: Ping Me..................................................................................................... 574
Make This: MAKE: An Earthquake Detector............................................................. 575
Coding and Communicating on the Internet............................................................576
HTML, XML, and other web Building Blocks............................................................ 576
HTML.......................................................................................................................... 576
XML and JSON........................................................................................................... 578
Web Browser Protocols............................................................................................... 578
Server-Side Applications.............................................................................................. 578
Client-Side Applications............................................................................................... 579
Communications Over the Internet............................................................................ 581
E-Mail.......................................................................................................................... 581
E-Mail Security: Encryption.......................................................................................... 582
Ethics in IT: Web Browsing: Not as Private as You May Think................................. 583
Instant Messaging....................................................................................................... 585
TRENDS in IT: Crowdsourcing: Harnessing the Power of Social Networks................ 586
Solve This: Creating an HTML Document................................................................ 593

Glossary................................................................................................................................. 436
Index...................................................................................................................................... 448

Contents 15
twelfth
twelfth
EDITION

12
What’s New
Technology in Action, 12th Edition

We are delighted for you to explore the Twelfth Edition of • Assessment questions after each Helpdesk provide
Technology in Action! instructors with a tool to gauge and track students’
progress. This edition includes three NEW or completely
Explore, discover, and experience technology with the
revised Helpdesks: “Evaluating Websites,” “Working with
immersive and adaptive Technology in Action—the book
Smartphones,” and “Keeping Your Data on Hand.”
that uses technology to teach technology!
• UPDATED Replay Videos: The Replay Videos provide an
Technology in Action is a learning system that pushes the
author-narrated video review of each chapter part in an
envelope of what is possible in technology, and what is helpful
easy-to-use format students can view on their phones,
in teaching. It is a system that fits the way students are
tablets, or computers.
learning today and uses rich companion media to engage
students in and out of the classroom while providing essential • With Tech Bytes Weekly, every week is new! This weekly
training on computer concepts. newsfeed provides two timely articles to save instructors
the prep time required for adding interesting and relevant
What’s New? news items to their weekly lectures. Tech Bytes Weekly also
• All content has been updated as needed to ensure features valuable links and other resources, including
coverage of the most current technology, and updated discussion questions and course activities.
end-of-chapter exercises are included throughout the book, • Jeopardy! Game and Crossword Puzzles: These
including a NEW end-of-chapter quiz and updated versions engaging games give students a fun way to challenge their
of the Check Your Understanding reviews. knowledge.
• NEW Make This projects address the hot area of mobile
In addition to these changes, all chapters have been
app creation! Mobile app creation skills are already highly
updated with new images, current topics, and state-of-
valued in the workplace. The Make This projects are a fun
the art technology coverage. Some of the chapter
way to engage your students while helping them develop
changes are listed here:
cutting-edge skills. Each chapter includes a Make This
mobile app project, most of which use App Inventor. By the Chapter 1: Using Technology to Change the World
end of the course, students will have completed 13 small
• Throughout the chapter, text, figures, and photos have
app projects that provide them with new skills they can use
been updated.
to create their own apps. And if they don’t have an Android
device, they can use the emulator and still learn the skills. • A new example of social networking tools used in political
context has been added.
• NEW Solve This projects put the concepts students are
learning into action through real-world problem solving using • The Ethics in IT, “The Digital Divide and the Mobile Bridge”
a Microsoft Office application or other technology tool! has been updated.

UPDATED AND ENHANCED media offerings including: • The Try This has been updated to reflect Skype site content
changes.
• Sound Bytes: These multimedia lessons help demystify
computer concepts with audio and video presentations. All • The concept of Big Data has been introduced in the section
Sound Bytes have been reviewed and updated as needed on data mining.
to provide timely and accurate information. This edition also • The end-of-chapter Ethics Project has been replaced with a
includes two NEW Sound Bytes: “Using the Arduino new project on big data, “Can Big Data Predict Your
Microcontroller” and “Programming with the Processing Grade?”
Language.”
• NEW Bits & Bytes “Compute Me a Picture” on generative
• Active Helpdesk: These highly interactive, engaging activities design using the free tool Processing has been added,
provide students with a realistic experience of how help is replacing the previous edition Bits & Bytes, “NASA Wants
delivered via live chat, FAQ searches, etc. at a helpdesk. You to Learn.”
Students play the role of a helpdesk staffer answering
technology questions using these various approaches. All Chapter 2: Looking at Computers: Understanding the
Helpdesks have been reviewed and updated as needed. Parts
• A virtual supervisor provides support to the student • Throughout the chapter, text, figures, and photos have
throughout the activity. been updated.

16 What’s New
twelfth
twelfth

EDITION
12
• Next generation gesture technology is now covered in the • UPDATED Sound Byte, “File Management,” to reflect
“How Cool Is This?” feature. Windows updates.
• NEW Bits & Bytes “Forget HDTV...Here Comes Ultra HD!” • UPDATED Sound Byte, “Customizing Windows,” to reflect
has been added, replacing the previous edition Bits & Bytes Windows updates.
“Testing and Calibrating Your PC Monitor.”
Technology in Focus: Information Technology Ethics
• NEW Bits & Bytes “Green Computing” has been added,
• This Tech in Focus has been updated throughout.
replacing the previous edition Bits & Bytes “Taking Care of
Flash Drives.” • A new section “Who Sets the Ethics for Robots?” has been
added, replacing the “Brain Technology: Creating Cyborgs”
• Throughout the chapter, text and figures have been
section.
updated to reflect Windows 8.1 changes.
Chapter 6: Understanding and Assessing Hardware:
• The end-of-chapter Team Time project has been replaced
Evaluating Your System
with a new project, “Data Storage Options.”
• Throughout the chapter, text has been updated to match
Chapter 3: Using the Internet: Making the Most of the
current hardware standards, and figures and photos have
Web’s Resources
been updated.
• Throughout the chapter, text, figures, and photos have
• All references to operating system utilities have been
been updated.
updated to reflect changes in Windows 8.1.
• Updated Bits & Bytes on HTML5 versus Flash.
• UPDATED Sound Byte, “Installing RAM,” to show RAM
• Revised Bits & Bytes “Making Safe Online Payments” to being added to a laptop computer.
include Apple Pay.
• NEW Sound Byte, “Installing an SSD Drive,” has been
• Try This has been updated to reflect Microsoft Office Online added, replacing the Sound Byte “Installing a Blu-Ray
changes. Drive.”
• NEW “Evaluating Websites” Helpdesk has been added,
Chapter 7: Networking: Connecting Computing Devices
replacing the “Using Subject Directories and Search
Engines” Helpdesk. • Throughout the chapter, text, figures, and photos have
been updated.
Technology in Focus: The History of the PC
• NEW Bits & Bytes “The Internet of Things” has been added,
• This Tech in Focus has been updated as needed. replacing “How Do You Find Your WiFi?”
Chapter 4: Application Software: Programs That Let You • NEW Bits & Bytes “Analyzing Network Problems” has been
Work and Play added, replacing “Want to Use Your Phone as a Remote
• Throughout the chapter, text, figures, and photos have Control?”
been updated. • The content on Network-Attached Storage Devices has been
• “How Cool Is This?” feature on eye-tracking software has updated to include Apple AirPort Time Capsule.
been updated. • The Trends in IT: “Where Should You Store Your Files: The
• “Trends in IT: Mobile Commerce: What Have You Bought Cloud Is Calling” has been updated.
with Your Phone Lately?” has been updated. Technology in Focus: Under the Hood
• New Alternative Note-Taking Applications have been added • This Tech in Focus has been updated throughout, with
to Figure 4.12. several new photos.
Chapter 5: System Software: The Operating System, Utility • Bits & Bytes “Forget CPUs: SoC Is the Future for Mobile
Programs, and File Management Devices!” has been updated to reflect current trends in
SoC.
• Throughout the chapter, text, figures, and photos have
been updated. Chapter 8: Digital Devices and Media: Managing a Digital
• Content throughout has been updated to include coverage Lifestyle
of Windows 8.1 update and OS X Yosemite. • Throughout the chapter, text, figures, and photos have
• NEW “How Cool Is This?” feature has been added on been updated.
smartwatches. • NEW Bits & Bytes “Bluetooth and LE Beacons” has been
• “The Windows Interface” section has been revised and added, replacing Bits & Bytes on mobile speech
updated to reflect changes in Windows 8.1 update. recognition.

What’s New 17
twelfth
twelfth
EDITION

12
• NEW “Working with Smartphones” Helpdesk has been • NEW Bits & Bytes “Hackathons” detailing collegiate and
added, replacing the “Using Portable Media Players” civic hackathons has been added, replacing Bits & Bytes
Helpdesk. This new Helpdesk uses much of the information “Competitive Coding.”
previously found in the “Keeping Data on Hand” Helpdesk. • NEW coverage of the Swift programming language for iOS
• REVISED “Keeping Your Data on Hand” Helpdesk to mobile development has been added.
include coverage of cloud computing. • NEW Sound Byte, “Programming with the Processing
• UPDATED Sound Byte, “Smartphones Are Really Smart” for Language,” has been added, replacing the “Looping
currency. Around the IDE” Sound Byte.
• UPDATED Sound Byte, “Connecting with Bluetooth,” to • NEW Sound Byte, “Using the Arduino Microcontroller,” has
include other uses of Bluetooth. been added, replacing the “3D Programming the Easy
Way” Sound Byte.
Chapter 9: Securing Your System: Protecting Your Digital
Data and Devices Chapter 11: Behind the Scenes: Databases and
Information Systems
• Throughout the chapter, text, figures, and photos have
been updated. • Throughout the chapter, text, figures, and photos have
been updated.
• Screenshots throughout have been updated to reflect
changes in the Windows 8.1 update. • NEW “How Cool Is This?” feature has been added on the
SHADOW app.
• NEW “How Cool is This?” on biometric authentication using
vein scanning technology has been added. • NEW Bits & Bytes “Google’s Knowledge Vault” replaces
“iTunes Smart Playlists—They’re Just Queries!”
• NEW Bits & Bytes “Multifactor Authentication: Don’t Rely
Solely on Passwords” has been added, replacing “Can’t Chapter 12: Behind the Scenes: Networking and Security
Remember Passwords? Try a Passphrase Instead!” in the Business World
• UPDATED Sound Byte, “Installing a Personal Firewall,” to • Throughout the chapter, text, figures, and photos have
cover wireless connections and Windows updates. been updated.
• Bits & Bytes “Go Green with Mobile Apps” has been
Technology in Focus: Careers in IT
updated to include more information on green apps.
• This Tech in Focus has been updated throughout.
Chapter 13: Behind the Scenes: How the Internet Works
• NEW Bits & Bytes “Cool New Jobs on the Horizon” has
• Throughout the chapter, text, figures, and photos have
been added, replacing Bits & Bytes “Matching a Career to
been updated.
Your Skills.”
• The Bits & Bytes “Gmail Features You Should Know About”
Chapter 10: Behind the Scenes: Software Programming has been updated.
• Throughout the chapter, text, figures, and photos have • NEW “How Cool Is This?” feature on the Ruby on Rails web
been updated. application development platform has been added.
• Updated “How Cool Is This” on open data initiative.

18 What’s New
twelfth
twelfth

EDITION
12
About the Authors
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer
science and business courses. He holds a BS in accounting from Rider
University and an MS in information systems from Drexel University, and
he is a certified public accountant. After a successful career in business,
Alan finally realized that his true calling is education. He has been teaching at the college
level since 2000. Alan enjoys attending technical conferences and meets regularly with
faculty and administrators from other colleges to discuss curriculum development and new
methods of engaging students.

Kendall Martin, PhD


[email protected]
Kendall is a professor of Computer Science at Montgomery County
Community College with teaching experience at both the undergraduate
and graduate levels at a number of institutions, including Villanova
University, DeSales University, Ursinus College, and Arcadia University.
Kendall’s education includes a BS in electrical engineering from the
University of Rochester and an MS and a PhD in engineering from the University of
Pennsylvania. She has industrial experience in research and development environments
(AT&T Bell Laboratories), as well as experience with several start-up technology firms.

Mary Anne Poatsy, MBA


[email protected]
Mary Anne is a senior faculty member at Montgomery County
Community College, teaching various computer application and
concepts courses in face-to-face and online environments. She enjoys
speaking at various professional conferences about innovative
classroom strategies. She holds a BA in psychology and education
from Mount Holyoke College and an MBA in finance from Northwestern University’s Kellogg
Graduate School of Management.
Mary Anne has been in teaching since 1997, ranging from elementary and secondary
education to Montgomery County Community College, Gwynedd-Mercy College,
Muhlenberg College, and Bucks County Community College, as well as training in the
professional environment. Before teaching, she was a vice president at Shearson Lehman
Hutton in the Municipal Bond Investment Banking Department.

About the Authors 19


twelfth
twelfth
EDITION

12
Dedication
For my wife, Patricia, whose patience, understanding, and support
continue to make this work possible . . . especially when I stay up past
midnight writing! And to my parents, Jackie and Dean, who taught me
the best way to achieve your goals is to constantly strive to improve
yourself through education. Alan Evans

For all the teachers, mentors, and gurus who have popped in and out
of my life. Kendall Martin

For my husband, Ted, who unselfishly continues to take on more


than his fair share to support me throughout this process, and for my
children, Laura, Carolyn, and Teddy, whose encouragement and love
have been inspiring. Mary Anne Poatsy

20 Dedication
twelfth
twelfth

EDITION
12
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching,
and they are a continual source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our
spouses and children made sacrifices (mostly in time not spent with us) to permit us to
make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience,
a few individuals deserve special mention. The constant support and encouragement we
receive from Jenifer Niles, Executive Acquisitions Editor, and Andrew Gilfillan, VP, Editorial
Director, continually make this book grow and change. Our heartfelt thanks go to Shannon
LeMay-Finn, our Developmental Editor. Her creativity, drive, and management skills helped
make this book a reality. We also would like to extend our appreciation to Rhonda Aversa,
our Editorial and Production Project Manager, who works tirelessly to ensure that our book
is published on time and looks fabulous. The timelines are always short, the art is complex,
and there are many people with whom she has to coordinate tasks. But she makes it look
easy! We’d like to extend our thanks to the media and myITlab team: Eric Hakanson, Taylor
Ragan, Jaimie Noy, and Jessica Brandi for all of their hard work and dedication.
There are many people whom we do not meet in person at Pearson and elsewhere who
make significant contributions by designing the book, illustrating, composing the pages,
producing multimedia, and securing permissions. We thank them all. We would also like to
thank the supplement authors for this edition: Wanda Gibson, Doug Courter, Lori Damanti,
Linda Pogue, Elizabeth Lockley, and Stacy Everly.
And finally, we would like to thank the reviewers and the many others who contribute their
time, ideas, and talents to this project. We appreciate their time and energy, as their
comments help us turn out a better product each edition.

Global Edition
The publishers would like to thank the following for their contribution to the Global Edition:

Contributor
S. H. Chung, Wawasan Open University

Reviewers
Arup Bhattacharjee, RCC Institute of Technology
Shaligram Prajapat, Devi Ahilya University
Soumen Mukherjee, RCC Institute of Technology

Acknowledgments 21
twelfth
twelfth
EDITION

12
12th Edition Reviewers
Pearson and the authors would like to thank the following people for their help and
time in making this book what it is. We couldn’t publish this book without their
contributions.

Neale Adams Iowa Central Community College Desmond Chun Chabot College
Paul Addison Ivy Tech Sherri Clark Ivy Tech
Afrand Agah West Chester Kevin Cleary SUNY at Buffalo
Jack Alanen CSU–Northridge Cynthia Collings Central AZ
Karen Allen Community College of Rhode Island Mark Connell SUNY at Cortland
Ted Allen Reasoner IUPUI Kae Cooper BCTC/KCTCS
Peggy Anderson SUNY at Cortland Dale Craig Fullerton College
Barry Andrews Mt. SAC Becky Curtain William Rainer Harper College
Lou Ann Stroup Ivy Tech Juliana Cypert Tarrant County College
Mary Ann Zlotow College of DuPage Paul Dadosky Ivy Tech
Sabum Anyangwe Harford Community College Enoch Damson Akron
Linda Arnold HACC James Dang Tarrant SE
Adnan Atshan Passaic County Community College Marvin Daugherty Ivy Tech
Adeleye Bamkole Passaic County Community College John Dawson IUPUI
Guarav Bansal Wisconsin–Green Bay Robert Deadman IUPUI
Susan Barkalow St. Cloud State Ed Delean NOVA Alexandria
Bill Barnes Catawba Valley Community College Mary Dermody Chabot College
Ricky Barnes Catawba Valley Community College Don Dershem Mt View
Carolyn Barren Macomb Community College Charles Dessasure Tarrant SE
Tony Basilico Community College of Rhode Island Jeanette Dix Ivy Tech
Steven Battilana West Chester Sally Dixon Skagit Valley Community College
Michelle Beets Iowa Central Community College Gretchen Douglas SUNY at Cortland
Kourosh Behzadnoori Tarrant SE Judy Duff Louisiana Delta College
Chris Belcher CCAC–South Stacia Dutton SUNY Canton
Elise Bell CCSF Donna Earhart Genesee Community College
Julie Bell Delgado Cmty Clg Ed Eill Delaware City Community College
Robert Benavides Collin Cty Pam Ellis PA College of Technology
Garland Berry Columbia College Sylvia Emerson Rock Valley College
Diane Bittle HACC John Enomoto East LA
Burton Borlongan Mesa Community College Ron Enz Chattahoochee Tech
Carolyn Borne Louisiana State University Nancy Evans Indiana University–Purdue University
Gina Bowers-Miller HACC–Wildwood Indianapolis
Jeff Bowker Montco James Fabrey West Chester
Vicki Brooks Columbia College Deb Fells Mesa Community College
Gerald Burgess Western New Mexico University Pat Fenton West Valley
Dave Burgett McLennan Marjorie Feroe Delaware City Community College
Ed Bushman Yavapai College Beverly Fite Amarillo
Marcus Butler West LA Carol Fletcher Louisiana Delta College
Eric Cameron Passaic County Community College Barbara Fogle, Stuhr Trident Tech
Jill Canine Ivy Tech Ann Ford Tyson Florida State University
Gene Carbonara Long Beach Community College coordinator)
Gene Carbonaro Long Beach City College Tom Foster Chandler Gilbert Community College
John Carlisle Nashua Community College Susan Fry Boise State University
Glenn Carter Sonoma State Barb Garrell Delaware City Community College
Steve Carver Ivy Tech Barbara Garrell Delaware County Community
Patricia Casey Trident Tech College
Joni Catanzaro Louisiana State University Rich Geglein Ivy Tech
Afi Chamlou NOVA Alexandria Janet Gelb Grossmont Community College
Robert Chirwa KCTCS–Bluegrass–Cooper–CIT 105 Kevin Gentry Ivy Tech
Debbie Christenberry Randolph Community College Ian Gibbons Hillsborough Community

22 12th Edition Reviewers


twelfth
twelfth

EDITION
12
College–Ybor Kay Johnson Community College of Rhode Island
Randy Gibson Indian River State College Mary Johnson Kingwood
Ernie Gines Tarrant SE Stacy Johnson Iowa Central Community College
Rebecca Giorcelli Fairmont State University Tiffany Johnson Tulsa Community College
Anita Girton PA College of Technology Tammy Jolley University of AR Community College
Ellen Glazer Broward Community College, South –Batesville
Cathy Glod Mohawk Valley Cmty College Sharon Karonias Northampton Cmty Coll
Valerie Golay Ivy Tech Kathy Kelly Montco
Jerry Gonnella Northern KY Mike Kelly Community College of Rhode Island
Holly Gould Ivy Tech Clarence Kennedy Louisiana Delta College
Deidre Grafel Chandler-Gilbert Community College David Kerven Georgia Gwinnett College
Diedre Grafel Chandler Gilbert Community College Annette Kerwin College of DuPage
Kemit Grafton Oklahoma State University– Ellen Kessler HACC–Wildwood
Oklahoma City Allyson Kinney Gateway Community College
Debra Grande Community College of Rhode Island REBECCA KIRK Augusta State University
Nancy Grant CCAC–South Ronald Kizior Loyola University Chicago
Wade Graves Grayson Meg Kletke Oklahoma State University
Natalia Grigoriants Pierce College Paul Koester Tarrant County College, Northwest
Glen Grimes Collin Cty Kam Kong Delaware State University
Toby Gustafson UCR Hon-Chung Kwok CCSF
Greg Hanson Ivy Tech Susan LaBrie Northampton Community College
A.C. Chapin Harford Community College Don Lafond SJRCC (St. John’s River)
Marie Hartlein Montco Rose LaMuraglia San Diego City
Meng Has Burlington County College David Lange Grand Valley
Lisa Hawkins Frederick Community College Earl Latiolas Delgado Cmty Clg
Joan Heise Ivy Tech Janet Laubenstein Northampton Cmty Coll
Sue Heistand Iowa Central Community College Lori Laudenbach St. Cloud State
Jessica Helberg Northern Virginia Community Krista Lawrence Delgado Cmty Clg
College Dr. Kate LeGrand Broward College
Terri Helfand Chaffey Community College Kate LeGrand Broward Community College, South
Jaime Hicks Ivy Tech Yi Li Zhuang Macomb Community College
Fred Hills McLennan Darrell Lindsey SJRCC (St. John’s River)
Timothy Hinz Genesee Community College Bob Lingvall Southwestern
Andrew Hobbs Delaware State University Duane Lintner Amarillo
Kristen Hockman Univ of Missouri–Columbia Thomas Liu New Jersey City Univ.
Susan Hoggard Tulsa Community College Wei Liu Georgia Gwinnett College
Don Holcomb KCTCS–Bluegrass–Cooper–CIT 105 Lynne Lyon Durham College
Terry Holleman Catawba Valley Community College Lydia Macaulay Tarrant SE
Debbie Holt KCTCS–Bluegrass–Cooper–CIT 105 Norma Marler Catawba Valley Community College
Barbara Hotta Leeward Community College Benjamin Marrero Ivy Tech
Bunny Howard SJRCC (St. John’s River) Ben Martz Northern KY
Virginia Huegel Western New Mexico University Lydia Mata Eastern AZ
Jim Hughes Northern KY Jenny Maurer PA College of Technology
Donald Humphrey Columbia Basin College John Mayhorne Harford Community College
Laura Hunt Tulsa Community College Glendora Mays SJRCC (St. John’s River)
Brent Hussin Wisconsin–Green Bay James McBride Eastern AZ
Steve Hustedde South Mountain Kari Meck HACC
Laurene Hutchinson Louisiana State University Doug Medin Western New Mexico University
Bobbie Hyndman Amarillo John Messer PA College of Technology
Rosie Inwang Olive Harvey Hillary Miller Kingwood
Hal Broxmeyer IUPUI Saeed Molki South TX College
Jennifer Ivey Central Carolina Community College Phil Moorhead Ivy Tech
Lisa Jackson Phoenix College Linda Moulton Montco
Christie Jahn Hovey Lincoln Land Community College Rob Murray Ivy Tech
Betsy Jenaway Macomb Community College Blankenstein Nashua Community College
Gina Jerry Santa Monica College Denise Nearing Indian River State College
Duane Johnson Ivy Tech Jean-Claude Ngatchou New Jersey City Univ.

12th Edition Reviewers 23


twelfth
twelfth
EDITION

12
Doreen Nicholls Mohawk Valley Cmty College Noah Singer Tulsa Community College
Brenda Nielsen Mesa Community College Steve Singer Kapiolani Community College
Keith Noe Ivy Tech Ann-Marie Smith Delaware City Community College
Kathy Olson Ivy Tech Will Smith Tulsa Community College
Helen Ortmann CCAC–South Michele Smolnik Columbia College
Meshack Osiro Ivy Tech Ali Soleymani NOVA Alexandria
Shelly Ota Leeward Community College Steve St. John Tulsa Community College
ChongWoo Park Georgia Gwinnett College Neal Stenlund Northern Virginia Community
Lucy Parker CSU–Northridge College
Rachel Pena South TX College Steve Stepanek CSU–Northridge
Wayne Phillips Chabot College Jo Stephens University of AR Community College
Jennifer Pickle Amarillo –Batesville
Blanca Polo Leeward Community College Dennis Stewart NOVA Alexandria
Jim Poole Honolulu Community College Ben Stonebraker Ivy Tech
Brian Powell West Virginia University Lynne Stuhr Trident Tech
Ernest Proctor LA Trade Alexis Stull Fairmont State University
Diane Puopolo Bunker Hill Community College Denise Sullivan Westchester Community College
Mike Puopolo Bunker Hill Community College Dottie Sunio Leeward Community College
James R. Anthos South University–Columbia Dave Surma IU South Bend
David R. Surma Indiana University South Bend Michael Swafford Tulsa Community College
Charles R. Whealton Delaware Technical and Community Cheryl Sypniewski Macomb Community College
College Ann Taff Tulsa Community College
Pat Rahmlow Montco James Taggart Atlantic Cape Community College
Michelle Reznick Oakton Community College Mel Tarnowski Macomb Community College
Leasa Richards Columbia College Juliana.P. Cypert Tarrant County College–NE
Kathie Richer Edmonds Community College Joyce Thompson Lehigh Carbon Community College
Darrell Riddell Ivy Tech Janine Tiffany Reading Area Comm College
Donald Riggs Schenectady County Community Faye Tippey Ivy Tech
College Matthew Trotter South TX College
Don Riggs Schenectady County Community Pam Uhlenkamp Iowa Central Community College
College Pat Vacca El Camino College
Terry Rigsby Hill College Nelmy Vasquez Broward Community College, South
Amy Roche Northampton Community College Pete Vetere Montco
Scott Rosen Santa Rosa Junior College Susie Viars-Thomas Grayson
Peter Ross Univ. of Albany Gabriel Viera South TX College
Scott Russell Eastern AZ Cynthia Wagner McLennan
Amy Rutledge Oakland University Rod Waller Indian River State College
Tom Ryan SJRCC (St. John’s River) Laurie Wallmark Raritan Valley Community College
Jessie Saldana Cypress Kari Walters Louisiana State University
Lorraine Sauchin Duquesne Stacy Ward Grafton High School
Judy Scheeren Duquesne Karen Weil McLennan
Lois Scheidt Ivy Tech Charles Whealton Del Tech & Community College–
Marcia Schlafmitz New Jersey City Univ. Dover
NAME SCHOOL Deena White Grayson
Ken Schroeder Ivy Tech Phil Whitney Bakersfield College
Todd Schultz Augusta State University Casey Wilhelm North Idaho College
Dick Schwartz Macomb Community College Billie Williams San Diego City
Francis Seidel Frederick Cmty College Melanie Williamson KCTCS–Bluegrass–Cooper–CIT 105
Lili Shashaani Duquesne Xin Xu Georgia Gwinnett College
Emily Shepard Central Carolina Community College Thomas Yip Passaic County Community College
Helen Sheran East LA Roger Young Ivy Tech
Cliff Sherrill Yavapai College Mary Zegarski Northampton Community College
Lisa Simpson-Kyle Yavapai College

24 12th Edition Reviewers


twelfth
twelfth

EDITION
12
Letter from the Authors
Our 12th Edition—A Letter from the Authors

Why We Wrote This Book


The pace of technological change is ever increasing. In
education, we have seen this impact us more than ever
in the past year—MOOCs, touch-screen mobile delivery,
and Hangouts are now fixed parts of our environment.
Even the most agile of learners and educators
need support in keeping up with this pace of
change. We have responded by integrating material
to help students develop skills for web application
and mobile programming. We see the incredible
value of these skills and their popularity with students, and have introduced Make This
exercises for each chapter. These exercises gently bring the concepts behind mobile app
development to life. In addition, we have added a Solve This exercise in each chapter that
reinforces chapter content while also reinforcing Microsoft Office skills. These projects help
to promote students’ critical thinking and problem-solving skills, which employers highly
value.
Our combined almost 50 years of teaching computer concepts have coincided with
sweeping innovations in computing technology that have affected every facet of society.
From iPads to Web 2.0, computers are more than ever a fixture of our daily lives—and the
lives of our students. But although today’s students have a much greater comfort level with
their digital environment than previous generations, their knowledge of the machines they
use every day is still limited.
Part of the student-centered focus of our book has to do with making the material truly
engaging to students. From the beginning, we have written Technology in Action to focus on
what matters most to today’s student. Instead of a history lesson on the microchip, we
focus on tasks students can accomplish with their computing devices and skills they can
apply immediately in the workplace, the classroom, and at home.
We strive to keep the text as current as publishing timelines allow, and we are constantly
looking for the next technology trend or gadget. We have augmented the text with weekly
technology updates to help you keep your classroom on top of the latest breaking
developments and continue to include a number of multimedia components to enrich the
classroom and student learning experience. The result is a learning system that sparks
student interest by focusing on the material they want to learn (such as how to integrate
computing devices into a home network) while teaching the material they need to learn
(such as how networks work). The sequence of topics is carefully set up to mirror the typical
student learning experience.
As they read through this text, your students will progress through stages of increasing
difficulty:
1. Thinking about how technology offers them the power to change their society and their
world
2. Examining why it’s important to be computer fluent
3. Understanding the basic components of computing devices

Letter from the Authors 25


twelfth
twelfth
EDITION

12
4. Connecting to and exploring the Internet
5. Exploring software
6. Learning the operating system and personalizing their computer
7. Evaluating and upgrading computing devices
8. Understanding home networking options and keeping computing devices safe from
hackers
9. Going mobile with smartphones, netbooks, tablets, and laptops
10. Going behind the scenes, looking at technology in greater detail
We continue to structure the book in a “spiraling” manner, intentionally introducing on a
basic level in the earlier chapters concepts that students traditionally have trouble with and
then later expanding on those concepts in more detail when students have become more
comfortable with them. Thus, the focus of the early chapters is on practical uses for the
computer, with real-world examples to help the students place computing in a familiar context.
For example, we introduce basic hardware components in Chapter 2, and then we go
into increasingly greater detail on some hardware components in Chapter 6 and in the
“Under the Hood” Technology in Focus feature. The Behind the Scenes chapters venture
deeper into the realm of computing through in-depth explanations of how programming,
networks, the Internet, and databases work. They are specifically designed to keep more
experienced students engaged and to challenge them with interesting research
assignments.
In addition to extensive review, practice, and assessment content, each chapter contains
several problem-solving, hands-on activities that can carried out in the classroom or as
homework:
• The Try This exercises lead students to explore a particular computing feature related to the
chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to
reinforce the material taught in the text and to support both classroom lectures and distance
learning:
• The Helpdesk training content, created specifically for Technology in Action, enables
students to take on the role of a helpdesk staffer fielding questions posed by computer users.
These have been updated to reflect the way in which users access help today.
• Exciting Sound Byte multimedia—fully updated and integrated with the text—expand
student mastery of complex topics.
• The Tech Bytes Weekly updates deliver the latest technology news stories to you for use in
your classroom. Each is accompanied by specific discussion topics and activities to expand
on what is within the textbook materials.
This book is designed to reach the students of the twenty-first century and prepare them
for the role they can take in their own community and the world. It has been an honor to
work with you over the past 12 years to present and explain new technologies to students,
and to show them the rapidly growing importance of technology in our world.

26 Letter from the Authors


twelfth
twelfth

EDITION
12
Visual Walk-Through
Topic Sequence
Concepts are covered in a progressive manner between chapters to mirror the typical student learning experience.

CHAPTER 2 CHAPTER 6

Technology Under
storing data and ACTIVE HELPDESK
fIGURe 6.12

in focus the hood


InfoRmATIon
Evaluating Your CPU and RAM Sample RAm Allocation
In this Active Helpdesk, you’ll play the role of a helpdesk
staffer, fielding questions about what the CPU does and RAM
how to evaluate its performance. You’ll also field APPLICATION RECOMMENDED
questions about how memory works and how to evaluate Windows 8.1 (64 bit) 2 GB
Because RAM is volatile storage, it can’t be used to store infor- smartphone, laptop, and a tablet, at different times during the how much memory a computer needs.
mation indefinitely. To save your data and information perma- day. Invariably, you’ll find you need access to a current version Microsoft Office Professional 2013 2 GB
nently, you need to save it to a nonvolatile storage device, such of a file that is stored on a device other than the one you’re Internet Explorer 11 2 GB
as a hard drive, cloud storage location, DVD, or flash drive. using. If your devices are connected to the Internet, cloud stor- iTunes 11 1 GB
age provides a convenient option.
Cloud storage refers to using a service that keeps your Adobe Photoshop Elements 12 2 GB
hard Drives files on the Internet (in the “cloud”) rather than storing your
SOUND BYTE Total RAM recommended to run 9 GB
Are there different kinds of hard drives? The files solely on a local device. Using a cloud storage service Installing RAM all programs simultaneously Some people are drawn to understanding things in detail; others are happy just to have things work.
hard disk drive (hdd, or hard drive) is your computer’s requires that you install software/an app on your device. A In this Sound Byte, you’ll learn how to select the appropri- If you use a computer, you may not have been tempted to “look under the hood.” However, if you can
primary device for permanent storage of software and docu- popular web-based application for storing files on the cloud ate type of memory to purchase, how to order memory on- understand the hardware inside a computer, you’ll have some real advantages:
ments. The hard drive is a nonvolatile storage device. An is Dropbox. Dropbox supports computers running Windows, line, and how to install it yourself. As you’ll discover, the
internal hard drive resides within the system unit and usually OS X, and Linux as well as many smartphones and tablets. procedure is a simple one and can add great performance Adding RAm • You won’t have to pay a technician to fix or upgrade your computer. You’ll be able to fine-tune it
holds all permanently stored programs and data. Today’s in- After installing the Dropbox software on your devices, any files benefits to your system.
Is there a limit to how much RAM I can add to my yourself, and you’ll be able to make your investment in your computer last longer.
ternal hard drives (see Figure 2.28) have capacities of as much you save in the Dropbox folder are accessible by all your other
devices via the Internet. You can also share folders in Dropbox
computer? The motherboard is designed with a specific • You’ll be able to evaluate new advances in technology. For example, what’s the impact of a new
as 8 TB or more. External hard drives offer similar storage number of slots into which the memory cards fit, and each slot
capacities but reside outside the system unit and connect to with other Dropbox users, making it ideal for group projects. type of memory or a new processor?
has a limit on the amount of RAM it can hold. To determine your
the computer via a port. For example, when you save a history term paper to How much RAM do I need? At a minimum, your system • If you’re a programmer, you’ll be able to write more efficient and faster programs.
specific system limits, check the system manufacturer’s website.
The most common type of hard drive has moveable parts— Dropbox on your laptop, the Dropbox software also copies needs enough RAM to run the OS. Running the 64-bit ver- In addition, the OS running on your machine imposes its
spinning platters and a moving arm with a read/write head—that the paper onto a computer attached to the web. Now when you sion of Windows 8.1 requires a minimum of 2 GB of RAM. And if you’re preparing for a career in information technology, understanding computer hardware is
own RAM limit. For example, the maximum amount of RAM
can fail and lead to devastating disk failure. However, the grab your smartphone and head off to class, you can access the However, because you run more applications at one time than critical for you. In this Technology in Focus feature,
for the 32-bit version of Windows 8.1 is 4 GB, whereas the
solid-state drive (SSd) has recently become a popular op- paper created on your laptop through the Internet connection on just the OS, you’ll want to have more RAM than just what’s maximum memory limit using the 64-bit version of Windows we’ll build on what you’ve learned about computer
tion for ultrabooks and laptop storage. SSDs have no moving your smartphone and make changes to it if necessary. needed for the OS. For example, Figure 6.12 shows how 8.1 Pro is 512 GB. hardware in other chapters and go “under the
parts, so they’re more efficient, run with no noise, emit little Dropbox storage capacity is limited to between 2 GB and much RAM is recommended for the OS, a web browser, and
heat, and require little power. In addition, they’re less likely to 18 GB for free accounts. Other cloud storage alternatives some software. Is it difficult or expensive to add RAM? Adding hood” to look at the components of your system
fail after being bumped or dropped. include Microsoft OneDrive and Google Drive, each of which It’s a good idea to have more than the minimum amount RAM is fairly easy (see Figure 6.13). Be sure that you purchase unit in more detail. Let’s begin by looking at the
Permanent storage devices are located in your desktop or provide 15 GB of free space, and Apple iCloud, which offers of RAM you need now so you can use more programs in the a memory module that’s compatible with your computer. Also
5 GB of free storage.
building blocks of computers: switches.
laptop computer in a space called a drive bay. There are two future. Remember, too, that “required” means these are the be sure to follow the installation instructions that come with
kinds of drive bays: minimum values recommended by manufacturers; having the RAM module. Typically, you simply line up the notches and
1. Internal drive bays cannot be seen or accessed from portable Storage options more RAM often helps programs run more efficiently. New gently push the memory module in place.
outside the system unit. Generally, internal drive bays are How can I take my files with me without relying
systems today ship with at least 4 GB of RAM, and high-end
systems can come with 24 GB. The rule of thumb: When
RAM is a relatively inexpensive system upgrade. The cost of
RAM does fluctuate in the marketplace as much as 400% over
Switches
reserved for internal hard drives.
on cloud storage? For large portable storage needs, there buying a new computer, buy as much RAM as you can time, though, so if you’re considering adding RAM, you should How does a computer process the data you input? A
2. External drive bays can be seen and accessed from outside
are portable external hard drives, which are small enough to fit afford. watch the prices of memory in online and print advertisements. ◾ computer system can be viewed as an enormous collection
the system unit. External drive bays house CD and DVD
into your pocket and have storage capacities of 4 TB (or larger). of on/off switches. These simple on/off switches are com-
drives, for example. On desktop computers, sometimes there
These devices are lightweight and enclosed in a protective case. bined in different ways to perform addition and subtraction
are empty external drive bays
They attach to your computer via a USB port (see Figure 2.29). and to move data around the system.
that can be used to install addi-
tional drives. These extra spaces
are covered by a faceplate on electrical Switches
the front panel. Laptop comput-
To process data into information, computers need to work
ers generally do not give you the
in a language they understand. Computers understand only
ability to add additional drives.

(George D. Lepp/Documentary Value/Corbis)


two states of existence: on and off. Inside a computer, these
Such expansion is done by at-
two possibilities, or states, are defined using the two num-
taching an external drive to the
bers 1 and 0; the language represented by these numbers
computer through a USB port.
is called binary language because just two numbers are
used. Everything a computer does, such as processing data
Cloud Storage or printing a report, is broken down into a series of 0s and
1s. Electrical switches are the devices inside the com-
How can I easily access puter that are flipped between the two states of 1 and 0,
fIGURe 2.28 Internal hard my files if I constantly signifying “on” and “off.”
drives are a computer’s switch between devices? fIGURe 2.29 Smaller, portable external hard drives enable you
fIGURe 6.13 Adding RAM to a computer is quite simple and relatively inexpensive. On a laptop, you often gain access
You use various forms of switches every day. The light
primary nonvolatile storage. You may find yourself using to take a significant amount of data and programs on the road switch in your kitchen either is ON, allowing current to flow
through a panel on the bottom. (Editorial Image, LLC/Alamy)
(Ragnarock/Shutterstock) multiple devices, such as a with you. (Inga Nielsen/Shutterstock) to the light bulb, or OFF. Another switch you use each day is

84 Chapter 2 Looking at Computers: Understanding the Parts 262 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System 328

Hardware Taught in More Depth in Additional Chapters Technology in Focus


Hardware First Introduced In later chapters, students read about hardware in greater Four special features that
Chapter 2 is the first time students read depth because they’re more experienced and comfortable teach key uses of technology
about introductory hardware. It’s covered working with their computers. today.
at the beginning level because this is
students’ experience level at this point of

1
the book. Using Technology
to Change the
world

Multimedia Cues how will You put


Technology in Action?
how will Technology
Improve Your life?
Visual integration of multimedia. Technology on the
world Stage
Technology at home
oBJeCTIVeS
oBJeCTIVe 3. What does it mean to be computer literate?
(pp. 44–45)
1. How can becoming proficient with technology
help you understand and participate in 4. How does being computer literate make
important issues in the world at large? (pp. 34–36) you a savvy computer user and consumer?
(pp. 44–45)
Sound Byte: Questions to Ask Before You Buy a Computer

Technology and our


Society Technology and
oBJeCTIVe
Your Career
2. How can knowledge of technology help you oBJeCTIVe
influence the direction our society takes? 5. How can becoming computer literate help

COOL IS ThIS?
(pp. 38–40) you in a career? (pp. 46–52)

HOW
Carlos Castilla/Shutterstock; Carlos Castilla/Shutterstock; Winui/Shutterstock;

make This: Explore an App Builder Skill on page 43

Want to make a difference with technology? The good news is that it has never

How Cool Is This?


been easier. Technology is allowing more and more of us to become agents of change
Scan here for more info

in our communities and in the world. For example, in London, over 20,000 school-age
children are joining Apps for Good, a program that links students, educators, and

Highlights the latest and greatest local experts to guide students in designing and building apps to help solve problems
they see around them. In the United States, the Verizon Innovative App Challenge
offered schools across the United States prize money for student teams to design apps

websites, gadgets, and multimedia.


Sergey Nivens/Shutterstock

to address the needs of their communities. In Philadelphia, people met for a weekend-
long civic hacking event called Random Hacks of Kindness. They created apps to
keep track of lobbyists in city government, to map the location of murals in the city, and
to help organize people to dig out fire hydrants after snowstorms. What kind of good
can you do with technology? (Bloomberg/Getty Images; www.rhok.org; Chris Ratcliffe/Bloomberg/Getty Images)
For all media in this chapter go to www.pearsonglobaleditions
.com/Evans.

32 33

Visual Walk-Through 27
twelfth
twelfth
EDITION

12
Student Textbook Even your smartphone is a computer. Today’s
smartphones offer many features you probably use
day to day, including a wide assortment of apps,
media players, high-quality cameras, and web con-
nectivity. And just like your laptop computer, your
Input

smartphone has a CPU, memory, and storage.


Examples of smartphones include the iPhone and the
Galaxy S5.
Each part of your computer has a specific
purpose that coordinates with one of the functions of
the computer—input, processing, output, or storage
(see Figure 2.5). Additional devices, such as modems
and routers, help a computer communicate with the
Internet and other computers to facilitate the sharing
of documents and other resources. Let’s begin our

DIG DeepeR
trends
making Reality even more Real exploration of hardware by looking at your computer’s

ethics in IT The Digital Divide and input devices. ◾

the Mobile Bridge Innovations in Printing


in IT Processing

We’re comfortable with carrying around digital data


in our pockets. But the advent of wearable comput-
ing is now allowing us to integrate digital informa- fIGURe 2.5 Each part of the
With the advent of the computer, many specu- with your computer. Usually
tion directly intothisourisreality,
not a prob-
both to add more detail computer serves a special function. Storage Output
lated that ours would become a paperless society. lem because atand home, at school,
at times to remove or inunwanted
the office,visual effects.
Instead of saving printed documents and other there is generally
Howone doesprinter, and all the PCs
this happen?
output as was done prior to the PC, information connected to it have the software
Augmented reality and cables or
combines our normal sense
would be saved in a digital state: hard drives wireless capabilities needed
of the world to use
around usit. Butan
with what
additional layer of
replacing filing cabinets, online photo buckets happens if youdigital
want to print something
information. The extra frominformation can be
replacing photo albums and scrapbooks, and your smartphone or tablet?
on aCommon
separate solutions
BITS&BYTeS
displayed device, such as in aug-
e-books replacing our favorite texts. Hard drive have been to e-mail
mented the document
reality apps for to smartphones.
yourself or Displays
capacities do enable us to save more content, and transfer the document
in stores tocan a even
web-based
augment storage
your image with the
online storage systems enable us to save pictures service such asclothing
Dropbox so that
you’re a printer-con-
interested in, creating a virtual fit-
and other files to the “cloud.” Additionally, e-book nected computer tingcould
roomaccess
(see Figureit. Another
1.16). solu- putting Your Computer to work . . . while You Sleep
readers have increased in popularity. But has this tion is Google Cloud Print, atoservice
But having carry andthatposition
lets you a separate de-
push toward digital content begun to make the configure your vice
printers
is clunky. Google Glass isthem
so you can access a project that aug- fIGURe 1.17 Google Glass is a tool that adds digital Complex scientific research, such as human genome
printer obsolete? Surprisingly, no. People still have from mobile devices.
ments reality using a “third eye,” a separate camera information directly into your view of the world. (Sean Gallup/Getty exploration, requires vast computing power. Soft-
Images)
a deep-rooted need to see, feel, mark, share, or use Google Cloud Print uses
mounted cloud-ready
to the printers
side of a lightweight headset (see ware has been developed to tie individual computing
their digital images or information in a physical (see Figure 2.45Figure
) that 1.17
are now
). Youavailable
can record from man-and videos
images devices (including tablets and smartphones) in a
form. New technologies that push the boundaries ufacturers suchby assimply
HP, Kodak,
saying, and Epson.
“Take These When you say
a picture.” is aligned so that the beam is sent directly to grid to enable them to work together. This effec-
of printing, such as printing from the cloud and 3-D printers connect directly
“Glass, howto long
the Internet and reg-
is the Brooklyn Bridge?,” Glass the retina of your eye, as shown in Figure 1.18. tively creates a cheap supercomputer that many
printing, are being developed and refined. ister themselves with Google wirelessly
communicates Cloud Print without
with your phone and is- (This is why Google Glass is not available for those not-for-profit research organizations use to research
needing to be connected
sues a requestto a to computer. OnceThe
the Internet. a returned infor- who wear glasses now. To adjust the prism so that problems that will benefit the greater good...and
printer is registered with Cloud Print, andprinting
Cloud printing mation is formatted then sent to a projector. the projector’s beam goes through the person’s your computer can help. Visit the World Community
jobs can be sent to it from
Instead of themobile devices
projector you’re(such
used to seeing Grid (worldcommunitygrid.org) and download
To print a document from a desktop or laptop as tablets and smartphones)
in your classroom, using the
this Internet.
projector is so small it fits its software. Once installed on your device, it allows
fIGURe 1.5 Can we bridge the digital divide through mobile devices? Should we? (xPacifica/Alamy) Prism
computer, you must have a printer associated Conventional printers
into thethat
armbandyou already own canThe output beam
of the glasses. your computer to work on research during the many
from the projector bounces off a glass prism that Projector times when your CPU is idle (or at least not working
to its full potential). Your computing device can par-
The digital divide, the gap between those with In addition, teen cell phone usage is often ticipate in exciting research projects on new drugs,
easy access to technology and those with little to focused on managing social networks, playing sustainable water, and cancer. So tell your computer fIGURe 2.6 Help solve complex problems by adding your
no access (see Figure 1.5), is a problem that leads games, or listening to music. Computer tasks and
to get to work! computer to the World Community Grid. (Adimas/Fotolia)
to complex social issues. For those who lack access skills that could lead to economic advancement,
to the Internet and computers, it is difficult to de- like creating formulas in spreadsheets or editing
velop computer skills, which are very often critical video are not as easy to do on mobile devices. So
to future success. Less familiarity with the Internet by not having free Internet access available, is our
can also lead to a lower level of active, engaged society placing those groups least able to afford
citizenship. How should we attack the problem of access at an unfair disadvantage?
the digital divide in the United States? Will the increasing penetration of smartphones
Recent studies from the University of Michigan and faster cellular Internet access eliminate the 2.4 cm 64 Chapter 2 Looking at Computers: Understanding the Parts
show that without Internet access at home, teens digital divide in the United States? Should our
from low-income households (family income un-
der $30,000 a year) are more likely to use their cell
phones to go online. So the widening penetration
government intervene and make sure there is
sufficient free Internet access for all? Would it be
an acceptable solution to have Internet service
Bits & Bytes
Help make the topics immediately
of cell phones might be the answer to ending the providers increase the price of high-speed con-
digital divide. Or is it? nectivity to allow them to drop the price of slower
Going online using a cell phone plan is the most connections? Is it ethical to deprive the poorer Retina
Fovea
expensive of all options, and data transfer speeds segment of our society of a needed commodity?

relevant to students’ lives.


(sharpest image)
are often slow. So teens with the least money are Answering challenging questions like these is
part of being an informed citizen. fIGURe 1.16 This high-tech fitting room uses augmented fIGURe 1.18 Google Glass eliminates the need for a separate
likely paying the most to get the slowest online
reality technology to allow shoppers to try on clothes hand-held device by projecting an image directly on the retina
experience.
virtually. (Yoshikazu Tsuno/AFP/Getty Images) of your eye. (Upper Saddle River, New Jersey)

fIGURe 2.45 Cloud-ready printers only need an Internet connection to be accessed from any mobile device.
Ethics in IT 37
94 Chapter 2 Looking at Computers: Understanding the Parts 50 Chapter 1 Using Technology to Change the World

Try This and Make This


Ethics in IT Trends in IT Dig Deeper
Hands-on activities found between
Boxes examine the ethical Boxes explore hot Boxes cover technical topics in depth to
Parts 1 and 2 of each chapter.
dilemmas involved with topics in computing. challenge advanced students.
technology.

TRY THIS
Step 3 You can gather
What’s Inside My Computer? quite a bit of information
from the System screen,
Windows version
such as:

End of Chapter Quiz


• Version of Windows
Clock speed
• Type of processor Processor info

Understanding what capabilities your current computer has is one of the first steps toward computer literacy. • Speed of the processor RAM info
In this exercise, you’ll learn how to explore the components of your Windows computer. • Amount of RAM in-

Multiple Choice, True/False, and Critical Step 1 To gather informa-


tion about the storage devices
stalled
• System type (32-bit or
64-bit)
System type

Thinking questions at the end of each


on your computer, on the Start Start Screen
screen, click File Explorer
(previously called Windows
Explorer) to switch to the

chapter help students assess their Desktop and display File


Explorer. In the navigation
pane, click This PC to

comprehension of chapter material.


display information about
your computer’s drives.

make This
File Explorer

Tool: App Inventor 2

Step 2 The File Ex- mAKe: A mobile App


plorer This PC screen
displays information Want to build your own Android app from scratch?
about internal storage Ribbon You can, with a simple tool called App inventor.
devices (such as inter- To get started, have ready:
chapter quiz // assessment nal hard drives), opti- 1. A computer connected to a WiFi network
cal storage devices
2. The Chrome browser
For a quick review to see what you’ve learned, answer the following questions. Submit the quiz as requested by your (such as DVD drives), Total device
instructor. and portable storage storage space 3. A Google account
devices (such as flash 4. The MIT AI2 Companion app
multiple choice drives and external
hard drives). The total Space available 5. [optional] An Android device connected to the
1. Social networking 4. Being computer literate includes being able to (unused or free) same WiFI network
amount of usable stor-
a. prevents two-way dialog between people. a. avoid spam, adware, and spyware. age space, as well as In this exercise, you’ll explore the App inventor
the amount of space tool and begin working with your first simple app.
b. is incorporated as part of political strategy by b. use the web effectively.
actually free (unused), As you’ll see, making your device work for you is
many politicians. as easy as drag and drop with App inventor.
c. diagnose and fix hardware and software problems. on the devices is
c. cannot be immediate enough to react to quickly shown. To display the
d. all of the above.
developing issues. System screen, click
5. Computer forensics the Computer tab on
d. only is useful for personal friendships.
the File Explorer rib-
a. tests computers for hardware malfunction.
2. Web 2.0 has led to a shift from just consuming content bon, and then the Sys-
toward b. analyzes computer systems to gather potential tem properties button.
legal evidence. App Inventor is a programming platform used to create apps for Android devices. Using App
a. spending all our time on leisure activities. Inventor, you can easily drag and drop components to design your App’s interface…and its
c. analyzes the design of a computer system. behavior.
b. less sharing of the work we produce.
d. is used to create three-dimensional art. For the instructions for this exercise, please go to www.pearsonglobaleditions.com/Evans.
c. new standards for HTML.
6. The Khan Academy is
d. producing content.
a. a free technology tool used for education.
3. Skype is a software tool
b. a program in Africa to encourage study of
a. to protect yourself from identity theft.
mathematics.
80 Chapter 2 Looking at Computers: Understanding the Parts Try This/Make This 81
b. to make free phone call over the Internet.
c. of use to students but not useful for instructors.
c. to diagnose and fix computer software.
d. a simulation package to teach users how to run a
d. to enable users to fabricate 3-D objects. business.

true/false
1. The move toward access instead of ownership is a sign of collaborative consumption.
2. Kickstarter is a profound platform that connects people to community projects seeking
for funding.
3. Internet users have been using social networking tools such as Twitter and Facebook to
communicate and distribute information. Solve This Solve This
4. Data mining is a process of searching and classifying huge amounts of data for pattern how Technology Is Used on the world Stage and
recognition.

critical thinking
Exercises that put the concepts in my personal life
In this activity, you’ll use Microsoft Word to reflect on how technology is affecting the world
1. What Occupies Your Mind?
What we think about is influenced by the information fed to our mind all day long. Web 2.0 has
students are learning into action using a as well as you, personally and professionally. Reflect on the content in Chapter 1 as you work
through this exercise.
You will use the following skills as you complete this activity:

Microsoft Office application


created numerous channels for people to offer their own work for free—open-source software,
free music, books, and artworks. How has this affected your thinking? Have you created things • Open and Modify a Document Template • Insert Text
to share freely with the online world? Has it changed the value you put on music, books, and art?
2. Working 9 to 5 • Apply Styles and Advanced Font Formats • Apply Themes
This chapter lists many ways in which becoming computer literate is beneficial. Think • Use Format Painter • Create a Header and Footer
about what your life will be like once you’re started in your career. What areas of computing
will be most important for you to understand? How would an understanding of computer
hardware and software help you in working from home, working with groups in other coun-
Instructions
tries, and contributing your talents? 1. Start Microsoft Word 2013 and open the Facet design (Blank) template. Save the document
as TIA_Ch1_LastFirst, using your own Last and First names.
Chapter Review 55
2. Double-click the Title placeholder and type Technology, then double-click the Heading
placeholder and type Introduction. Replace the remainder placeholder text with the fol-
lowing: Political and global issues are showing that technology is accelerating
change around the world and galvanizing groups of people in new ways. Tech-
nology allows us to refine how we connect with each other, and it also impacts
our daily personal and professional experiences. Press Enter.
3. Type How Technology Impacts Society and type a few sentences that describe how
technology is impacting global events such as political revolutions, health care, the environ-
ment, and the digital divide. In addition, address how businesses are using social media.
Press Enter.
4. Type How Technology Impacts Me Personally and Professionally and type a few

28 Student Textbook
sentences that describe how technology is impacting your personal life. You should address
the importance of being computer literate. You should also address the kinds of technology
being used in the industry of your current or desired career.
5. Click anywhere in the title Technology, then using Format Painter, apply the Heading 1
format to the paragraph headers: Select How Technology Impacts Society and How Technol-
ogy Impacts Me Personally and Professionally.
a. Hint: Format Painter is in the Clipboard group on the HOME tab.
6. Change the Document Theme style to the Slice Theme.
a. Hint: Document Themes are found on the DESIGN tab, in the Document Formatting
group.
7. Select the title Technology, then format the font as Small Caps. Center align the title.
Another Random Scribd Document
with Unrelated Content
The fundamental idea of Plato on which Milton built his doctrine of
chastity is the one taught in the “Phædo,” that every experience of the
soul gained through the medium of the senses tends to degrade the
soul’s pure essence into the grosser, corporeal form of the body. “And
were we not saying long ago,” says Socrates, “that the soul, when using
the body as an instrument of perception, that is to say, when using the
sense of sight or hearing or some other sense (for the meaning of
perceiving through the body is perceiving through the senses)—were we
not saying that the soul too is then dragged by the body into the region
of the changeable, and wanders and is confused; the world spins round
her, and she is like a drunkard, when she touches change?” (“Phædo,”
79.) This appears in the “Comus” in a modified form, and constitutes the
basis for Milton’s conception of sin in “Paradise Lost.” In the masque
the idea is plainly stated by the Elder Brother in his explanation of the
doctrine of chastity; and its workings are seen in the effect of the magic
potion of Comus upon all who drink it.
“But, when lust,
By unchaste looks, loose gestures, and foul talk,
But most by lewd and lavish act of sin,
Lets in defilement to the inward parts,
The soul grows clotted by contagion,
Imbodies, and imbrutes, till she quite lose
The divine property of her first being.
Such are those thick and gloomy shadows damp
Oft seen in charnel-vaults, and sepulchres,
Lingering and sitting by a new-made grave,
As loath to leave the body that it loved;
And linked itself by carnal sensualty
To a degenerate and degraded state.”[4]
(ll. 463–47
This idea, thus stated, is represented symbolically in the disfigurement
which the magic liquor of Comus works in the divine character of the
soul visible in the countenance.
“Soon as the potion works, their human count’nance,
The express resemblance of the gods, is changed
Into some brutish form of wolf or bear,
Or ounce or tiger, hog, or bearded goat,
All other parts remaining as they were.
And they, so perfect is their misery,
Not once perceive their foul disfigurement,
But boast themselves more comely than before,
And all their friends and native home forget,
To roll with pleasure in a sensual sty.”
(ll. 68–7
The opposition indicated in the Platonic doctrine between the senses
and the soul is carried over by Milton in his description of the trial
undergone by the spirit of him who strives to be chaste. In Plato the
fundamental idea is somewhat different from Milton’s; for Plato is
concerned with the problem of the attainment by the soul of pure
knowledge, and he means by sense knowledge not sensuality in the
restricted moral signification of that word, but in the broader
signification of all experience gained through all the senses. Milton,
however, places a narrow interpretation upon the doctrine of Plato. This
is evident in his description of the attempt made by Comus to allure The
Lady to sensual indulgence.
Comus endeavors twice to overpower The Lady. He tries to tempt her
to impurity of conduct, and also seeks to blind her judgment through
the power of sense illusion. In this second trial there may be seen the
influence of the Platonic notion of sense knowledge destroying the soul’s
purity; the first trial contains the more narrow application of the idea of
unchastity. Milton himself calls attention to the greater similarity of
Comus to his mother, Circe, the enchantress of men’s minds, than to
Bacchus, the god of wine. He is
“a son
Much like his father, but his mother more.”
(ll. 56, 5
In keeping with his character he tries to entice The Lady to drink his
magic potion. He reminds her that about him are all the pleasures that
fancy can beget; he praises the marvellous efficacy of his elixir in
stirring joy within; and pleads with her not to be cruel to the dainty
limbs that were given for gentle usage.
“See, here be all the pleasures
That fancy can beget on youthful thoughts,
When the fresh blood grows lively, and returns
Brisk as the April buds in primrose season.
And first behold this cordial julep here,
That flames and dances in his crystal bounds,
With spirits of balm and fragrant syrups mixed.
Not that Nepenthes which the wife of Thone
In Egypt gave to Jove-born Helena
Is of such power to stir up joy as this,
To life so friendly, or so cool to thirst.
Why should you be so cruel to yourself,
And to those dainty limbs, which Nature lent
For gentle usage, and soft delicacy?
But you invert the covenants of her trust,
And harshly deal, like an ill borrower,
With that which you received on other terms,
Scorning the unexempt condition
By which all mortal frailty must subsist,
Refreshment after toil, ease after pain,
That have been tired all day without repast,
And timely rest have wanted. But, fair virgin,
This will restore all soon.”
(ll. 668–68
To this argument The Lady replies simply that no real pleasure can
result from mere physical gratification, but only from the enjoyment of
the moral quality of goodness. Thus she says to Comus:
“I would not taste thy treasonous offer. None
But such as are good men can give good things;
And that which is not good is not delicious
To a well-governed and wise appetite.”
(ll. 702–70
But when Comus reveals the more subtle trait of his nature, the
response which The Lady makes rises to the height of the threatening
danger. The Circean strain in his character is his power of deceiving the
soul through sense illusion, and his insidious desire to win his way into
the hearts of men by courteous words and gay rhetoric. Thus, when he
first is conscious of the approach of The Lady, he says:
“Thus I hurl
My dazzling spells into the spongy air,
Of power to cheat the eye with blear illusion,
And give it false presentments.”
(ll. 153–15
The effect of this sense witchery is seen in the forebodings of The Lady’s
fancy and in the hallucinations that haunt her mind as she comes within
the range of its spells. She says:
“A thousand fantasies
Begin to throng into my memory,
Of calling shapes, and beckoning shadows dire,
And airy tongues that syllable men’s names
On sands and shores and desert wildernesses.”
(ll. 205–20
When Comus, then, begins to practise the more dangerous art of this
witchery, acting in accordance with his confession of his manner,—
“under fair pretence of friendly ends,
And well-placed words of glozing courtesy,
Baited with reasons not unplausible,”—
(ll. 160–16
she responds to the attack with an account of the great power of
chastity. Only because she sees that he is trying to deceive her judgment
does she deign to answer him.
“I had not thought to have unlocked my lips
In this unhallowed air, but that this juggler
Would think to charm my judgment, as mine eyes,
Obtruding false rules pranked in reason’s garb.”
(ll. 756–75
She then intimates the power which the doctrine of chastity has to
overcome Comus, and states that, should she attempt to unfold it, the
enthusiasm of her soul would be such as to overwhelm him and his
magic structures.
“Enjoy your dear wit, and gay rhetoric,
That hath so well been taught her dazzling fence;
Thou art not fit to hear thyself convinced.
Yet, should I try, the uncontrollèd worth
Of this pure cause would kindle my rapt spirits
To such a flame of sacred vehemence
That dumb things would be moved to sympathize,
And the brute Earth would lend her nerves, and shake,
Till all thy magic structures, reared so high,
Were shattered into heaps o’er thy false head.”
(ll. 790–79
This vehemence of moral enthusiasm in Milton is due to the
conception of chastity as an “abstracted sublimity.” He learned it, he
says, in his study of Platonic philosophy; but the teaching of it as a
positive doctrine applied to human conduct is his own contribution, and
strikes the characteristic note of his idealism. In Plato he found only the
suggestion of this teaching. It lay in that idea of the “Phædo,” already
explained, of the destruction of the soul’s purity through sense
knowledge. Milton’s imagination, working upon this idea, transformed
it in a way peculiar to himself alone. The pure soul, according to his
belief, has power in itself to change the body to its own pure essence.
The conversion of body to soul, however, is not a tenet of Platonic
philosophy in any phase. It was the working in Milton of that tendency,
visible throughout the poetry of the seventeenth century, to assert the
primacy of the soul in life—an attempt which was made by the
metaphysical poets especially in their treatment of love.
The statement of this theory of chastity is explained in “Comus,” and
its quickening influence is felt in the very manner in which Milton refers
to it. Before the Elder Brother recounts the effect of lust upon the soul
he explains the hidden power of chastity.
“So dear to Heaven is saintly chastity
That, when a soul is found sincerely so,
A thousand liveried angels lackey her,
Driving far off each thing of sin and guilt,
And in clear dream and solemn vision
Tell her of things that no gross ear can hear;
Till oft converse with heavenly habitants
Begin to cast a beam on the outward shape,
The unpolluted temple of the mind,
And turns it by degrees to the soul’s essence,
Till all be made immortal.”
(ll. 453–46
This is the “abstracted sublimity” which The Lady refers to when she
addresses Comus. It is a notion, a mystery, which he, standing for the
purely sensual instincts of man, cannot apprehend. She tells him:
“Thou hast nor ear, nor soul, to apprehend
The sublime notion and high mystery
That must be uttered to unfold the sage
And serious doctrine of Virginity;
And thou art worthy that thou shouldst not know
More happiness than this thy present lot.”
(ll. 784–78
So powerfully, indeed, has the vision of beauty described in the
“Phædrus” and the “Symposium” affected Milton’s own imagination
that he visualizes chastity much as Plato does an idea; it is an idea not
only known to the mind, but thrilling the imagination with its beauty.
When The Lady is at first conscious of the power of Comus’s magic to
disturb her mind with foreboding fancies, she invokes faith, hope, and
chastity. The first two are seen as personages, but chastity only as a
pure, unblemished form.
“O, welcome, pure-eyed Faith, white-handed Hope,
Thou hovering angel girt with golden wings,
And thou unblemished form of Chastity!
I see ye visibly.”
(ll. 213–2
The directness of this vision is like that of the soul in the “Phædrus”
when it sees the flashing beauty of the beloved, “which,” says Plato,
“when the charioteer [the soul] sees, his memory is carried to the true
beauty, whom he beholds in company with Modesty like an image
placed upon a holy pedestal.” (“Phædrus,” 254.)
It is in the vision of this holy beauty as a lost possession of the soul
that the deadly pang of sin lies. In Milton’s later work there is no
reference to the power of the chaste soul to change the body to its own
pure essence; but his mind still holds to the power of sin to dim the
soul’s lustre. This is strikingly exemplified in the character of Satan’s
reflection on his faded glory. The one keen regret that he feels, in spite
of his indomitable will, is occasioned by the thought that by reason of
sinning his form has lost the beauty of its original goodness.
Throughout “Paradise Lost” there is repeated emphasis upon the faded
lustre of Satan’s form. The very first words that fall from Satan’s lips, in
his speech to Beelzebub, as the two lay rolling in the fiery gulf, draw our
attention to the great change in their outward forms.
“To whom the Arch-Enemy,
And thence in Heaven called Satan, with bold words
Breaking the horrid silence, thus began:—
‘If thou beest he—but Oh how fallen! how changed
From him!—who, in the happy realms of light,
Clothed with transcendent brightness, didst outshine
Myriads, though bright.’”
(I. 81–8
And then, as Satan proceeds, his mind is directed to his own departed
glory.
“Yet not for those [i.e. the force of the Almighty’s arms]
Nor what the potent Victor in his rage
Can else inflict, do I repent, or change,
Though changed in outward lustre, that fixed mind,
And high disdain from sense of injured merit.”
(I. 94–9
In his address to the Sun Satan expresses his hatred of that bright light
because it brings to remembrance the more glorious state from which
he fell.
“O thou that, with surpassing glory crowned,
Look’st from thy sole dominion like the god
Of this new World—at whose sight all the stars
Hide their diminished heads—to thee I call,
But with no friendly voice, and add thy name,
O Sun, to tell thee how I hate thy beams,
That bring to my remembrance from what state
I fell, how glorious once above thy sphere.”
(IV. 32–3
When the moral significance of this change in his form flashes
through his mind, Satan then suffers the deepest regret that could come
to him. The episode in which he learns the true effect of his sin is his
encounter with the angels, Ithuriel and Zephon. These two have found
him “squat like a toad” at the ear of Eve, trying to work upon her mind
while she sleeps. At the touch of Ithuriel’s spear Satan springs up in his
real form. Ithuriel then asks which of the rebel angels he may be. The
lofty pride of Satan is touched to the quick.
“‘Know ye not, then,’ said Satan, filled with scorn,
‘Know ye not me? Ye knew me once no mate
For you, there sitting where ye durst not soar!
Not to know me argues yourselves unknown,
The lowest of your throng.’”
(IV. 827–8
Zephon, however, points out that Satan should not think that he may
still be known, as he was in heaven, by the brightness of his form; for his
glory departed when he rebelled, and now resembles his sin and place of
doom.
“Think not, revolted Spirit, thy shape the same,
Or undiminished brightness, to be known
As when thou stood’st in Heaven upright and pure.
That glory then, when thou no more wast good,
Departed from thee; and thou resemblest now
Thy sin and place of doom obscure and foul.”
(IV. 835–84
At this thought Satan stands abashed. Lover of the beautiful as he is, he
now experiences the pang of its loss in his own life.
“So spake the Cherub; and his grave rebuke,
Severe in youthful beauty, added grace
Invincible. Abashed the Devil stood,
And felt how awful goodness is, and saw
Virtue in her shape how lovely—saw, and pined
His loss; but chiefly to find here observed
His lustre visibly impaired; yet seemed
Undaunted.”
(IV. 844–8
In Milton, then, whether his mind dwells on chastity or on the
consciousness of sin’s effect on the soul, it is to the vision of a world of
moral beauty that at last it mounts.
The relation of these ideals of holiness, temperance, and chastity to
the Christian doctrine of grace, which finds a place in the works of these
English poets, can now be clearly seen. The ideals of conduct are
essentially moral ideals, and in the attainment of them the soul lives its
fullest life. “The being who possesses good always, everywhere, and in
all things,” says Socrates in the “Philebus” (60), “has the most perfect
sufficiency.” According to Plato the soul may realize perfect sufficiency
of itself, it is self-sufficient; but Christian theology taught the necessity
of a heavenly grace for man to work out his own salvation. The two
ideals are thus distinct; and though the English poets incorporate both
in their work, the line of cleavage is distinctly visible, and the doctrine of
grace plays no more than a formal part in their exposition of the soul’s
growth. In the “Faerie Queene” and in “Comus” Platonic idealism
triumphs over Christian theology.
In Spenser the adventures of Arthur, in whom heavenly grace is
commonly recognized, have no moral significance in the progress of the
Knight aided by him toward the realization of virtue. Arthur frees the
Red Cross Knight from Orgoglio and Duessa, but the Red Cross Knight
is, morally speaking, the same man after he is freed as before; the
adventure of Arthur answers to no change significant in the moral order
of his life as this is revealed in holiness. The realization of holiness as an
intimate experience of the soul is achieved only after the Knight’s
training on the Mount of Heavenly Contemplation, which follows all his
preceding discipline in the Christian graces; for this has left him a “man
of earth.” In the legend of temperance the efficacy of grace is no more
vital, and what is more, it is an intrusion upon the moral order; it makes
the soul untrue to itself and all that we know of her. The logic of Guyon’s
inner life did not require that Arthur should come to his rescue after he
had shown his ability to remain temperate under strong emotion and in
the presence of wantonness and covetousness. His swoon at the end of
the seventh canto has no more meaning than mere bodily fatigue after
toil; morally, Guyon should have been only the stronger for his past
victories over his passions. Arthur’s entrance at the eighth canto,
consequently, is not required: Spenser is only paralleling in his second
book Arthur’s advent in the eighth canto of his first.
Similarly in “Comus.” When the younger brother inquires what that
power which The Lady possesses to keep herself unspotted in the
presence of lust may be, if it is not the strength of heaven, his elder
companion replies:
“I mean that too, but yet a hidden strength,
Which, if Heaven gave it, may be termed her own.
’Tis chastity, my brother, chastity.”
(ll. 418–42
So The Lady herself witnesses, when in the great crisis of her life she
appeals to faith, hope, and chastity; if need were, she is confident that
heaven would send an angel to her defence.
“O, welcome, pure-eyed Faith, white-handed Hope,
Thou hovering angel, girt with golden wings,
And thou unblemished form of Chastity!
I see ye visibly, and now believe
That He, the Supreme Good, to whom all things ill
Are but as slavish officers of vengeance,
Would send a glistering guardian, if need were,
To keep my life and honour unassailed.”
(ll. 212–22
And the Guardian Spirit, in whose parting words is found the moral of
the poem, explains the same idea of the self-sufficiency of the virtuous
soul.
“Mortals, that would follow me,
Love Virtue; she alone is free.
She can teach ye how to climb
Higher than the sphery chime;
Or, if Virtue feeble were,
Heaven itself would stoop to her.”
(ll. 1018–102
The theological doctrine of grace, although maintained as a part of an
intellectual scheme of thought, did not enter into the inward life of
Spenser’s and Milton’s work. So sensitive were they to the power of
beauty that nothing could come between it and the soul. To Milton
beauty wore an invincible grace, before which all must give way. Satan
recognized this when he was confronted by the angel, Zephon.
“So spake the Cherub; and his grave rebuke,
Severe in youthful beauty, added grace
Invincible.”
(IV. 844–84
Nothing was more natural, then, than that such a mind feeding upon
Plato’s thought and learning its great lesson of wisdom, that it alone is
truly fair, should conceive virtue panoplied in all the might of beauty.
He thus could teach in his “Comus” “the sun-clad power of chastity”:
“She that has that is clad in complete steel,
And, like a quivered nymph with arrows keen,
May trace huge forests, and unharboured heaths,
Infamous hills, and sandy perilous wilds,
Where, through the sacred rays of chastity,
No savage fierce, bandite, or mountaineer,
Will dare to soil her virgin purity.”
(ll. 421–42
In Spenser beauty is not thus militant. When the Red Cross Knight,
eager to enter the Cave of Error (I. i. 12), says to Una, confident in his
power,
“Virtue gives her selfe light, through darkenesse for to wad
Una cautions him to stay his step while there yet is time. (I. i. 13.) But it
is just as true in Spenser as in Milton, that beauty is an unerring guide
in life. Spenser responded to it because he felt most deeply the power of
the soul’s affinity for it. Throughout his work the influence of beauty
upon man is constantly present. Even though at times he seems to be
drawn to it by the subtlety of its appeal to the sense alone, he makes it
very evident that true beauty can be found in the soul only in its habits
of virtuous life. Thus the witch Duessa, when stripped of her alluring
beauty, is revolting in her hideousness (I. ii. 40; II. i. 22), and Acrasia’s
beauty only poisons the souls of her lovers. (II. i. 54.) Beauty that is
nothing but a mere witchery of the sense disappears into thin air when
confronted by virtue in her beauty. This is the lesson taught in the
vanishing of the false Florimell when the true is placed beside her. (V.
iii. 25.) The power of this affinity of the soul for beauty, mysterious as it
is real, which Spenser’s work reveals, is conveyed in a question from
Sidney’s “Arcadia,” where the spirit of the “Phædrus” is all present. “Did
ever mans eye looke thorough love upon the majesty of vertue, shining
through beauty, but that he became (as it well became him) a
captive?”[5]
CHAPTER II
Theory of Love
I. HEAVENLY LOVE
Heavenly love, as conceived in the poetry of the sixteenth and
seventeenth centuries, refers to two distinct experiences. By this term
the poets meant either the love known in the soul for the realities of the
unseen world or the love which God had shown to man in his creation
and preservation, and which man could experience through the
indwelling of God’s spirit within him. In the explanation of the nature of
these two experiences the teaching of Platonism played a very important
part, directing the course of that love of man for heavenly things, and
accounting for the presence of love in the Godhead.
To the discussion of the latter of these subjects Platonism was able to
offer two conceptions, in which a rational explanation of God’s love as
revealed in the creation could be found; one presenting the highest
reality as beauty, the other as the good. The first conception was present
in its theory of love. In the “Symposium” Plato had taught that love was
a desire of birth in beauty, and that the highest love was a desire of birth
in beauty absolute, the ultimate principle of all beauty. (“Symposium,”
206, 211–212.) Christianity, on the other hand, had taught that God is
love. By identifying the absolute beauty of Plato with God, and by
applying the Platonic conception of the birth of love to this Christian
conception of God as love, God Himself was understood as enjoying his
own beauty, thus begetting beings like to it in fairness. In Spenser’s
“Hymne of Heavenly Love,” this idea forms the first division of the
poem which treats of the love of God. (ll. 25–122.) At first God is
conceived as living in Himself in love.
“Before this worlds great frame, in which al things
Are now containd, found any being place,
Ere flitting Time could wag his eyas wings
About that mightie bound, which doth embrace
The rolling Spheres, and parts their houres by space,
That high eternall powre, which now doth move
In all these things, mov’d in it selfe by love.”
(ll. 25–
Loving itself, this Power brought forth, first the Son.
“It lov’d it selfe, because it selfe was faire;
(For faire is lov’d;) and of it selfe begot
Like to it selfe his eldest sonne and heire,
Eternall, pure, and voide of sinfull blot.”
(ll. 32–3
After the creation of the Son God begets the angels in His beauty.
“Yet being pregnant still with powrefull grace,
And full of fruitfull love, that loves to get
Things like himselfe, and to enlarge his race,
His second brood though not in powre so great,
Yet full of beautie, next he did beget
An infinite increase of Angels bright,
All glistring glorious in their Makers light.”
(ll. 53–5
After the fall of the angels God finally creates man.
“Such he him made, that he resemble might
Himselfe, as mortall thing immortall could;
Him to be Lord of every living wight,
He made by love out of his owne like mould,
In whom he might his mightie selfe behould:
For love doth love the thing belov’d to see,
That like it selfe in lovely shape may bee.”
(ll. 116–12
The second conception of the highest reality as the good is used in a
more general way to explain the reason of creation. In the “Timæus” the
Maker of the universe is conceived as creating the world in goodness.
“Let me tell you,” says Timæus, “why the creator made this world of
generation. He was good, and the good can never have any jealousy of
anything. And being free from jealousy, he desired that all things should
be as like himself as they could be.” (“Timæus,” 29.) In Henry More the
idea is expressed in the closing canto of his “Psychathanasia,” where he
is accounting for the creation. (III. 4.) He has words of bitter
denunciation for those who teach that God created the world merely as
a manifestation of His power, His will. (III. iv. 22.) He maintains the
Platonic teaching.
“When nothing can to Gods own self accrew,
Who’s infinitely happy; sure the end
Of this creation simply was to shew
His flowing goodnesse, which he doth out send
Not for himself; for nought can him amend;
But to his creature doth his good impart,
This infinite Good through all the world doth wend
To fill with heavenly blisse each willing heart.
So the free Sunne doth ’light and ’liven every part.”
(III. iv.
So closely allied in the English poets are the teachings of Platonism
with the devotional spirit of Christian love that in the same man and
even in the same experience the thought can pass most naturally from a
conception of Christ’s love for God, as absolute beauty, to a subjective
treatment of it as a personal experience. Thus in George Herbert’s lyric,
“Love,” the invocation is to the love of Christ for God springing from His
imperishable beauty; but in the second division of the poem this love
has become a refining fire that can burn all lusts within the soul and
enable it to see Him.
“Immortall Love, author of this great frame,
Sprung from that beauty which can never fade,
How hath man parcel’d out Thy glorious name,
And thrown it in that dust which Thou hast made.

· · · · ·

“Immortall Heat, O let Thy greater flame


Attract the lesser to it; let those fires
Which shall consume the world first make it tame,
And kindle in our hearts such true desires
As may consume our lusts, and make Thee way:
Then shall our hearts pant Thee, then shall our brain
All her invention on Thine altar lay,
And there in hymnes send back Thy fire again.

“Our eies shall see Thee, which before saw dust—


Dust blown by Wit, till that they both were blinde:
Thou shalt recover all Thy goods in kinde,
Who wert disseizèd by usurping lust.”

The earlier conception of heavenly love, as related to absolute beauty,


is not, however, the more important of the two themes of this poetry.
From the very nature of the love itself, although it could be described in
accordance with certain Platonic conceptions, it could not be the subject
of a personal treatment; it gave no sufficient outlet for the passion of
love. This was afforded only by that heavenly love which is the love of
man for the unseen realities of the spiritual world. The full treatment
which this latter subject receives in English poetry testifies to the strong
hold which the teachings of Platonism had upon religious experience in
the sixteenth and seventeenth centuries. Platonism afforded not only
the philosophic basis for the object of this passion, but it also acted as a
corrective tendency in checking the influence of an alien idea, erotic
mysticism.
Heavenly love, understood as a love known in the soul for a spiritual,
or as it was then called, heavenly beauty, sprang out of the treatment to
which Plato had subjected love in the “Symposium.” In English it
appears in two separate forms, although in both it consists in gaining a
correct idea of the relation of the beauty known to the senses as
compared with that known by the soul. The only difference in the two
expressions is that the object of the passion is variously described.
In Spenser’s “Hymne of Heavenly Beautie” occurs the first form of
this love. The heavenly beauty celebrated in this “Hymne” is the
Platonic wisdom, Sapience, as Spenser calls it, the same high reality
with which he had identified Una. (l. 186.) The subject of the love in the
“Hymne” is formally presented as God, who is described as
“that Highest farre beyond all telling,
Fairer then all the rest which there appeare,
Though all their beauties joynd together were:
How then can mortall tongue hope to expresse,
The image of such endlesse perfectnesse?”
(ll. 104–10
Yet the real subject is the praise of Sapience, to which somewhat more
than one-third of the “Hymne” is devoted. A description of her
transcendent beauty and her power to fill the soul of the beholder with
true insight into the relative beauty of this world of sense and that of
spirit is the climax of the poem. Among all the attributes of God
mentioned, His truth, His love, His grace, His mercy, His might, His
judgment (ll. 113–115), the greatest is Sapience, who is described as
sitting in the very bosom of the Almighty. (l. 187.) The fairness of her
face, he says, none can tell; no painter or poet can adequately describe
her; his own powers are so weak that he can only admire, not presuming
to picture her. (ll. 207–241.) So completely, however, does she occupy
the field of spiritual vision in the happy mortals that behold her, that
“Ne from thenceforth doth any fleshly sense,
Or idle thought of earthly things remaine,
But all that earst seemd sweet, seemes now offense,
And all that pleased earst, now seemes to paine,
Their joy, their comfort, their desire, their gaine,
Is fixed all on that which now they see,
All other sights but fayned shadowes bee.
“And that faire lampe, which useth to enflame
The hearts of men with selfe consuming fyre,
Thenceforth seemes fowle, and full of sinfull blame;
And all that pompe, to which proud minds aspyre
By name of honor, and so much desyre,
Seemes to them basenesse, and all riches drosse,
And all mirth sadnesse, and all lucre losse.

“So full their eyes are of that glorious sight,


And senses fraught with such satietie,
That in nought else on earth they can delight,
But in th’ aspect of that felicitie,
Which they have written in their inward ey;
On which they feed, and in their fastened mynd
All happie joy and full contentment fynd.”
(ll. 270–29
According to Spenser, then, heavenly love is the love felt in the soul
when the sight of wisdom in her beauty dawns upon the inner vision. It
is a love gained through speculation; and though the object is conceived
of as yonder in heaven, it is still the beauty which is seen here in the
mind. (l. 17.) Instead of the poetical device of the Mount of Heavenly
Contemplation used in the “Faerie Queene” to signify the refinement of
the spiritual vision necessary to the sight of this heavenly wisdom,
Spenser has been able to explain in detail the way along which the soul
must travel to gain its goal. It is the dialectic of the “Symposium” (211),
the progress through ever ascending gradations of beauty up to the first
absolute beauty changed only in the externals as required by the
Christian conception of the heavenly hierarchy. But throughout the long
series of upward stages through which his mind passes, one may feel the
quickening of his spirit at the thought of the highest beauty, in which
lies the unity of the poem. In the contemplation of this heavenly beauty
the poem begins and ends.
“Rapt with the rage of mine own ravisht thought,
Through contemplation of those goodly sights,
And glorious images in heaven wrought,
Whose wondrous beauty breathing sweet delights,
Do kindle love in high conceipted sprights:
I faine to tell the things that I behold,
But feele my wits to faile, and tongue to fold.”

(ll. 4–10.)

“And looke at last up to that soveraine light,


From whose pure beams al perfect beauty springs,
That kindleth love in every godly spright,
Even the love of God, which loathing brings
Of this vile world, and these gay seeming things;
With whose sweete pleasures being so possest,
Thy straying thoughts henceforth for ever rest.”
(ll. 298–30
The second form which the doctrine of heavenly love assumed in
English is found in William Drummond’s “Song II—It autumn was, and
on our hemisphere.” The conception of heavenly beauty is not the
ethical notion of Spenser’s “Hymne,” but a less stimulating idea of the
beauty of an intelligible world of which this world is but a copy. The
attraction in this idea lay in its appeal to Drummond’s peculiar
imagination, delighting, as it did, in the sight of vastness. The poem is
an exhortation to the lover, who is Drummond himself, to cease his
mourning for his dead love, and to raise his mind to a love of heaven
and of the beauty of God there to be seen. The two ideas which
Platonism contributed are the notion of an intelligible world above this
world of sense, and of an absolute beauty of which all beauty on earth is
but a shadow.
The conception of a world above this world was suggested by Plato in
his “Phædo” and explained by Plotinus in his Enneads (VI. vii. 12) as a
pure intelligible world. “For since,” says Plotinus, “we say that this All
[the universe] is framed after the Yonder, as after a pattern, the All must
first exist yonder as a living entity, an animal; and since its idea is
complete, everything must exist yonder. Heaven, therefore, must exist
there as an animal, not without what here we call its stars, and this is
the idea of heaven. Yonder, too, of course, must be the Earth, not bare,
but far more richly furnished with life; in it are all creatures that move
on dry land and plants rooted in life. Sea, too, is yonder, and all water
ebbing and flowing in abiding life; and all creatures that inhabit the
water, and all the tribes of the air are part of the all yonder, and all
aerial beings, for the same reason as Air itself.” In the “Phædo” (110–
111), Plato lends color to his account by calling attention to the fairness
of the place and to the pleasantness of life there. Drummond has seized
upon this idea of an immaterial world where all is fair and happy, and
interprets it as the heaven whither the young woman who has died is
urging him to direct his love. Thus in her addresses to Drummond she
speaks of the character of the world where she lives.
“Above this vast and admirable frame,
This temple visible, which World we name,

· · · · ·

There is a world, a world of perfect bliss,


Pure, immaterial, bright, ...

· · · · ·

A world, where all is found, that here is found,


But further discrepant than heaven and ground.
It hath an earth, as hath this world of yours,
With creatures peopled, stor’d with trees and flow’rs;
It hath a sea, ...
It hath pure fire, it hath delicious air,
Moon, sun, and stars, heavens wonderfully fair:
But there flowr’s do not fade, trees grow not old,
The creatures do not die through heat nor cold.”
(ll. 111–13
It is to this world that she urges him to raise his mind, for all that earth
has to offer is a vain shadow.
“But thou who vulgar footsteps dost not trace,
Learn to raise up thy mind unto this place,
And what earth-creeping mortals most affect,
If not at all to scorn, yet to neglect:
O chase not shadows vain, which when obtain’d,
Were better lost, than with such travail gain’d.”
(ll. 181–18
These shadows are worldly honor and fame.
At this point the poem naturally passes on to develop the second
suggestion found in Platonism, that the beauty of earth is but a shadow
or reflexion of the absolute beauty. As was common in that time, this
absolute beauty is identified with God. Accordingly, the young woman
appeals to Drummond to trust in God’s beauty, which alone can fill the
soul with bliss. If the power of earthly beauty—the glance of an eye—can
make him leave all else, what, she asks, must be the love kindled by the
“only Fair”; for though the wonders of earth, of sea, and heaven are
beautiful, they are but shadows of Him.
“O leave that love which reachest but to dust,
And in that love eternal only trust,
And beauty, which, when once it is possest,
Can only fill the soul, and make it blest.
Pale envy, jealous emulations, fears,
Sighs, plaints, remorse, here have no place, nor tears;
False joys, vain hopes, here be not, hate nor wrath;
What ends all love, here most augments it, death.
If such force had the dim glance of an eye,
Which some few days thereafter was to die,
That it could make thee leave all other things,
And like the taper-fly there burn thy wings;

· · · · ·

If once thou on that only Fair couldst gaze,


What flames of love would he within thee raise!

· · · · ·

“Those golden letters which so brightly shine


In heaven’s great volume gorgeously divine;
The wonders all in sea, in earth, in air,
Be but dark pictures of that sovereign Fair;
Be tongues, which still thus cry unto your ear,
(Could ye amidst world’s cataracts them hear,)
From fading things, fond wights, lift your desire,
And in our beauty, his, us made, admire:
If we seem fair, O think how fair is he
Of whose fair fairness shadows, steps, we be.
No shadow can compare it with the face,
No step with that dear foot which did it trace.”
(ll. 197–23
This “Song,” then, though drawing on a different phase of Platonism—
its more philosophic and fanciful side,[6] not its deep ethical truth—
follows the same order of thought as Spenser’s “Hymne,” and like that
presents heavenly love as a love known in the soul and growing out of a
correct notion of the relative values of the visible beauty of the senses
and the invisible beauty of mind.
In Drummond heavenly love is a progression out of the romantic love
of woman. It is not explicitly so stated in the “Song,” but in a sonnet, the
subject of which refers to the young woman of the longer poem, he
writes:
“Sith it hath pleas’d that First and only Fair
To take that beauty to himself again,
Which in this world of sense not to remain,
But to amaze, was sent, and home repair;
The love which to that beauty I did bear
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like