Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display.
behaviors.
Explain what malware, spam, and cookies are and how they impact your security.
Describe social engineering techniques, and explain strategies to avoid falling prey to them.
Chapter 11
Behind the Scenes: Databases and Information Systems
About the Authors
Alan Evans, MS, CPA
aevans@mc3.edu
Alan is currently a faculty member at Moore College of Art and Design and Montgomery County Community College, teaching a variety of computer science and business courses. He holds a BS in accounting from Rider University and an MS in information systems from Drexel University, and he is a certified public accountant. After a successful career in business, Alan finally realized that his true calling is education. He has been teaching at the college level since 2000. Alan enjoys attending technical conferences and exploring new methods of engaging students.
Kendall Martin, PhD
kmartin@mc3.edu
Kendall is a professor of Computer Science at Montgomery County Community College with teaching experience at both the undergraduate and graduate levels at a number of institutions, including Villanova University, DeSales University, Ursinus College, and Arcadia University.
Kendall’s education includes a BS in electrical engineering from the University of Rochester and an MS and a PhD in engineering from the University of Pennsylvania. She has industrial experience in research and development environments (AT&T Bell Laboratories) as well as experience with several start-up technology firms.
Mary Anne Poatsy, MBA
mpoatsy@mc3.edu
Mary Anne is a senior faculty member at Montgomery County Community College, teaching various computer application and concepts courses in face-to-face and online environments. She enjoys speaking at various professional conferences about innovative classroom strategies. She holds a BA in psychology and education from Mount Holyoke College and an MBA in finance from Northwestern University’s Kellogg Graduate School of Management.
Mary Anne has been in teaching since 1997, ranging from elementary and secondary education to Montgomery County Community College, Gwynedd-Mercy College, Muhlenberg College, and Bucks County Community College, as well as training in the professional environment. Before teaching, she was a vice president at Shearson Lehman Hutton in the Municipal Bond Investment Banking Department.
Dedication
For my wife, Patricia, whose patience, understanding, and support continue to make this work possible … especially when I stay up past midnight writing! And to my parents, Jackie and Dean, who taught me the best way to achieve your goals is to constantly strive to improve yourself through education.
For all the teachers, mentors, and gurus who have popped in and out of my life.
Alan Evans
Kendall Martin
For my husband, Ted, who unselfishly continues to take on more than his fair share to support me throughout this process, and for my children, Laura, Carolyn, and Teddy, whose encouragement and love have been inspiring.
Mary Anne Poatsy
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching, and they are a continual source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and children made sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience, a few individuals deserve special mention. The constant support and encouragement we receive from Jenifer Niles, Executive Portfolio Product Manager, and Andrew Gilfillan, VP, Editorial Director, continually make this book grow and change. Our heartfelt thanks go to Shannon LeMay-Finn, our Developmental Editor. Her creativity, drive, and management skills helped make this book a reality. We also would like to extend our appreciation to Pearson Content Producers, particularly Laura Burgess, and the vendor teams, who work tirelessly to ensure that our book is published on time and looks fabulous. The timelines are always short, the art is complex, and there are many people with whom they have to coordinate tasks. But they make it look easy! We’d like to extend our thanks to the media and MyLab IT team—Eric Hakanson, Becca Golden, Amanda Losonsky, and Heather Darby for all of their hard work and dedication.
There are many people whom we do not meet at Pearson and elsewhere who make significant contributions by designing the book, illustrating, composing the pages, producing the media, and securing permissions. We thank them all.
And finally, we would like to thank the reviewers and the many others who contribute their time, ideas, and talents to this project. We appreciate their time and energy, as their comments help us turn out a better product each edition. A special thanks goes to Rick Wolff, a wonderfully talented infographic designer who helped by creating the infographics for this text.
6. Evaluating and upgrading computing devices
7. Understanding home networking options
8. Creating digital assets and understanding how to legally distribute them
9. Keeping computing devices safe from hackers
10. Going behind the scenes, looking at technology in greater detail
We strive to structure the book in a way that makes navigation easy and reinforces key concepts. We continue to design the text around learning outcomes and objectives, making them a prominent part of the chapter structure. Students will see the learning outcomes and objectives in the chapter opener, throughout the text itself, as well as in the summary so they understand just what they are expected to learn.
We continue to structure the book in a progressive manner, intentionally introducing on a basic level in the earlier chapters concepts that students traditionally have trouble with and then later expanding on those concepts in more detail when students have become more comfortable with them. Thus, the focus of the early chapters is on practical uses for the computer, with real-world examples to help the students place computing in a familiar context.
For example, we introduce basic hardware components in Chapter 2, and then we go into increasingly greater detail on some hardware components in Chapter 6. The Behind the Scenes chapters venture deeper into the realm of computing through in-depth explanations of how programming, networks, the Internet, and databases work. They are specifically designed to keep more experienced students engaged and to challenge them with interesting research assignments.
In addition to extensive review, practice, and assessment content, each chapter contains several problem-solving, hands-on activities that can be carried out in the classroom or as homework:
• The Try This exercises lead students to explore a particular computing feature related to the chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app development.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to reinforce the material taught in the text and to support both classroom lectures and distance learning:
• The Helpdesk training content, created specifically for Technology in Action, enables students to take on the role of a helpdesk staffer fielding questions posed by computer users.
• Exciting Sound Byte multimedia—fully updated and integrated with the text—expand student mastery of complex topics.
• IT Simulations are detailed, interactive scenarios covering the core chapter topic. As students work through the simulation, they apply what they have learned and demonstrate understanding in an active learning environment.
• The TechBytes Weekly blog delivers the latest technology news stories to you for use in your classroom. Each is accompanied by specific discussion topics and activities to expand on what is within the textbook materials.
This book is designed to reach the students of the twenty-first century and prepare them for the role they can take in their own community and the world. It has been an honor to work with you over the past 15 years to present and explain new technologies to students, and to show them the rapidly growing importance of technology in our world.
Discovering Diverse Content Through Random Scribd Documents
payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information about donations to the Project Gutenberg Literary Archive Foundation.”
• You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work.
• You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund.
Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive
Foundation
The Project Gutenberg Literary Archive Foundation is a nonprofit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact
credit card donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition.
Most people start at our website which has the main PG search facility: www.gutenberg.org.
This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and personal growth!