Share from cover. Share from page:. More magazines by this user. Close Flag as Inappropriate. You have already flagged this document. Thank you, for helping us keep this platform clean.
The editors will have a look at it as soon as possible. Delete template? Cancel Delete. Using the mindtap digital platform, students benefit from interactive feedback and new col laborative opportunities.
Short paragraphs and a clear narrative style help students grasp concepts and learn how to read technical material. What's the most effective study technique: Taking notes? According to researchers, students study most effectively by simply trying to recall the material they've read, seen, or heard.
That's why NP offers continuous assessment, Embedded QuickChecks on just about every page help students recall key concepts while reading and later while reviewing. QuickQuizzes and end-of-module reinforcement promote successful learning outcomes. NP contains plenty of practical information about how to use apps, manage files, create content, configure security software, and more. Try Itl activities throughout the book show students how to immediately apply concepts in real-world contexts.
Flipping a course is easy with NP, which includes flipped class projects for critical thinking, cyberclassroom exploration, collaborative group work, multimedia integration, career building, and globalization. End-of-module features, such as Issues and Information Tools, offer additional topics for hands-on in-class activities.
The Introduction module puts technology into context with in-depth coverage of the multi-phased digital revolution. For NP Sure, students use social media, but are they familiar with underlying concepts, such as the social media honeycomb, geolocation,and sociocrams? Are they up to speed with Creative Commons and intellectual properly concepts? Do they recognize fake news? Digital technology evolves at a fast pace. NP keeps stu dents up to bate with raspberry pi, 3D printers, smart appliances, lightning ports, USB-C, accelerometers, gyro sensors, magnetometers, macOS, windows io, virtual reality headsets, Microsoft Edge, hypervisors, two-factor authentication, Locky ransomware, and more!
Programming with Python provides highly inter active programming activities that introduce students to the world of programming without requiring any prior experience. Python is an easy-to-learn language that supports proce dural and object-oriented programs. Illustrations based on popular infographic visuals are carefully integrated into the learning path to provide visual scaffolding that is so important to understanding technical concepts.
Each module is divided into five sections, beginning with a CONCEPT MAP that provides a visual overview of topics, faqs answer commonly asked questions about technology and help you follow the flow of the presentation. As you read each page, watch for quickchecks. They'll help you gauge if you comprehend key concepts. And take some time to complete the try iti activities. They bring concepts to the real world and help you hone your digital skills, quickquizzes at the end of each section provide a chance to find out if you remember the most important concepts, end-of-module REVIEW activities such as Key Terms, Interactive Situation Questions, and Interactive Summary Questions are great for test prep.
In the technology in context section, you'll discover how technology plays a role in careers such as film-making, architecture, banking, and fashion design. The information tools section helps you sharpen your digital research techniques.
Check out the labs at the end of each module for some step-by-step exploration Into your digital devices. FAQs break down concepts Into manageable chunks of Information. When historians look back on the digitai revolution, they are certain to identify the Web as a major transformative infiuence. The Web short for World Wide Web is a coliection of iinked documents, graphics, and audio that can be accessed over the internet.
A key aspect of the Web is that it adds content and substance to the intemet. Without the Web, the internet wouid be iike a iibrary without any books or a raiiroad without any trains. Online storefronts, auction sites, news, sports, travei reservations, and music downioads made the Web a compeiiing digi tai technoiogy for just about everyone. The Internet is a communication network, but the Web consists of content that is distributed by the internet.
The internet consists of sites such as Twitter and Facebook, whereas the Web links devices such as iPods and Sophisticated software. The network computing phase may have been the peak for productivity software. Computer owners amassed large collec tions of software, purchased in boxes containing multiple distribution CDs.
Software such as Microsoft Office, Norton's Internet Security suite, and Corel Digitai Studio required local installation and provided more features than most people had any desire to use. This trend reverses during the next phase of the digital revolution, when applications become simpler and more focused on specific tasks.
Stationary Internet access. Even as laptop computers began to dis place desktop models, connecting to the internet required a cable that effectively tethered computers to a nearby phone jack or cable outlet, in the next phase of the digitai revolution, internet access breaks free from cables and goes mobile.
Online communication. Email was the first widespread technology used to communicate over the internet. Early forums and message boards were similar to Facebook timelines. A technology called Voice over IP allowed participants to bypass the telephone company to make phone calls over the internet.
That technoi ogy eventually developed into Skype and similar video chat services. Muitiplayer games. Sophisticated computer games reached a peak dur ing the network phase of the digitai revolution.
Audio and visual hardware components improved to support video-realistic game environments, arti ficial intelligence opponents, and multiple players logging in remotely and chatting with other players over headsets, in the next phase, mobile devices become popular gaming platforms, but hardware limitations restrict the feature set.
Music downloads. During the network computing phase, an online business called Napster pioneered the concept of sharing and down loading music. Subscribers exchanged millions of music files, which they played through the speakers of their computers.
The music was protected by copyright, however, making sharing and distribution illegal. This type of file sharing activity and rampant software piracy became one of the defining problems associated with the network phase of the digitai revolution. ITunes and other services for legally downloading music soon appeared, along with dedicated playback devices, such as the IPod. Video distribution over the internet lagged behind until con nection speeds increased in the next phase of the digitai revolution.
User interfaces evolved to include color, graphics, and mice. Before cloud computing, most computers ran software based locally. For example, to use a word processor, you might fire up the latest edition of Microsoft Word, which you'd installed on your computer's hard disk.
Prior to the cloud, you stored data locally, too. Email, documents, photos, and music all resided on your computer's hard disk or flash drive. With cloud computing, all that changed. In the cloud, you can use your browser to access word processing applications that run from the Internet instead of software that you have installed on your local hard disk.
You can use online applications to manage your email, create floor plans, produce presentations, and carry out a host of other activities. You can store your data in the cloud, too, making it available on any of your digital devices that connect to the Internet. The cloud gets its name from diagrams like the one in Figure 9, which shows Internet-based applications, storage, and other services outlined by a cloud-like shape designed to help you visualize the idea that cloud ser vices are "out there" somewhere on the Internet.
If cloud computing sounds a bit like cen tralized computing, you're paying attention. The concept of applications and data residing somewhere other than on a local device is common to both centralized and cloud computing. The cloud concept reawakens the idea of monolithic computing facilities, as opposed to distributed architectures of the network era. The fact that your cloud-based data is not stored on devices under your direct control is a potential privacy and security con cern, which is a topic for later modules.
Internet access b. Sophisticated software c. The migration of applications and data off of local devices d. The cloud itself is populated by commercial-grade high-speed computers and high-capacity storage devices.
The consumer side is dominated by smartphones Figure 10 and their dose cousins, tablet com puters. These handheld devices—a product of convergence—were the driving force for many cloud innovations. They access and share data from the cloud using apps.
The expansion of cloud computing Is due in part to convergence, a process by which several technologies with distinct functionalities evolve to form a single product. Convergence was important to the digital revolution because it created sophisticated mobile devices whose owners demanded access to the same services available from a full- size desktop computer.
Those services became available in the cloud. Your computer plays movies. Your ceil phone has a camera. Your dock has a radio. Your watch functions as a communications device. You can store data on your iPod Touch. Ail these are examples of technological conver gence. Convergence worked its magic on ceil phones, computers, portable media players, televisions, digital cameras, GPSs, watches, and ebook readers. Now you get features from ail of them by purchasing a single digital device, such as a smartphone or tablet computer Figure Smartphones are porta Which of the following instigated the move to cloud computing?
Compared to desktop and laptop computers, smartphones have small screens, lack a proper keyboard, and have limited space for storing apps and data. The cloud offers a convenient place to store data and applications. Social media Think of the cloud as a repository for streaming videos, music, photos, and c. Touchscreens apps. With that concept in mind, you will begin to understand the cloud's importance to today's consumers.
Music downloads b. The cloud consumed the Web but did not kill it. As a legacy technology from the networking era, the Web continues to be a global marketplace where Amazon, Alibaba, and other retailers sell directly to consumers.
Once a collection of storefronts run exclusively by businesses and corporations, the Web expanded into a global hub where content was cre ated by individuals, shared on social media sites, and uploaded to content sharing platforms. Twitter, and other social media turned the worry of social isolation on its head; instead of computers decreasing human interaction, social media encourage interpersonal communications and relationships.
Social media are digitally mediated applications designed for communication, social inter action, and consumer-generated content. Many factors influenced the popularity of these sites, but one important factor is their ease of use. Initially offered as Web sites, there was no soft ware to install and no updates to worry about. Getting started was as simple as registering your name and creating a password.
Now, access to social media is also available from mobile apps, which can be installed on a smartphone or tablet with a single touch. The connections that social media offer come at a price, and that price is not just monetary. Today's digital citizens surrender a substantial amount of privacy, exposing information that can be used by predators. Privacy, or the lack of it, may be the defining challenge of cloud computing. Another challenge is the growing pervasive ness of advertising.
I'fjSSf and Twitter stream. I Cloud-enabled apps? A key char acteristic of the cloud computing era is globe-spanning sharing services. These sharing services use the cloud to communicate and process data.
Ubiquitous computing is characterized by a focus on manipulating realworld objects instead of data. Earlier computing technologies used data to represent things in the real world. Photos represented people, fvlaps showed the location of places. Videos gave us a glimpse of events.
Screenbased fantasy worlds and characters entertained us. But all of this was conjured from data. None of it was tangible reality. Virtual reality, augmented reality, the Internet of Things, and automated vehicles are shaping a new digital era in which technologies bring comput ing beyond the screen and into the world of tangible objects.
Terminology Ubiguicous computing is sometimes referred to as pervasive computing. The idea Is not new. In the s, Mark Welser predicted that computers will "weave themselves into the fabric of everyday life until they are indistinguishable from it. It was actually an empty room, but fictional "hard light" projectors created touchable and temporar ily solid objects to replicate indoor and outdoor spaces.
The holodeck is a futuristic version of virtual reality, the use of technology to create a simu lated three-dimensional world. Today's virtual reality is far from a holodeck, but donning a virtual reality headset can give you the impression that you are in the middle of a three- dimensional environment. Instead of creating a simulated world, augmented reality superimposes data over the real world. Pok6mon GO popularized aug mented reality and provides a great example of how it works.
The reality of Pok6mon GO is the real world in r your vicinity. It can be shown on your smartphone screen as a map or as a pass-through image from the camera. Pokemon characters are superim posed on the landscape and can be seen through the camera lens.
The internet of Things loT con nects sensors embedded in machines, clothing, and other objects to the Internet, where they can report data and receive commands, it provides a clear example of digital technology controlling objects In the real world. On a basic level, an loT device can report to a smartphone. Nest Protect is a smoke and carbon monoxide alarm that not only contains sensors but also contains circuitry that connects to a home Wi-Fi network.
That WI-FI network can establish communication with a smartphone to report Its status and accept commands. For example. If Nest Protect senses smoke when you are away from home, it sends an alarm to your phone. The phone can be used to silence a false alarm—such as when your roommate burns a bagel In the toaster.
But the Internet of Things also connects multiple devices so that they can communicate with each other. The Nest Thermostat Is designed to control a home's heating and cooling systems. These systems, when faulty, may output dangerous carbon monoxide. Suppose the Nest Protect detects a high level of carbon monoxide. It can send a message to the thermostat to turn off the furnace Figure I What about autonomous vehicles?
Autonomous vehicles, for example, navigate without human Intervention using sensors to detect the surround ing environment, physical location, speed, and other parameters. They send data and receive commands from an onboard computer running sophisti cated artificial Intelligence software. Autonomous vehicles are clear examples of ubiquitous computing—the use of digital technology to manipulate objects In the real world.
Instead of abstract data. You'll delve Into some of these ubiquitous technologies In future chapters. For now, try to guess the year In which you take your first ride in a self-driving car Figure No hands! If we can learn one thing from the evolving information Age, it is this: Change is inevitable. Today, your favorite social media platform is Facebook; in the future, Facebook may go the way of CompuServe.
Figure 17 summarizes changes through each era of the digital revolution. Learning about digital technology is not just about circuits and electronics, nor is it only about digital gadgets, such as computers and portable music players.
Digital technology permeates the very core of modern life. On one level, you might be simply learning about how to use a computer and software in this course. On a more profound level, however, you are accumulating knowledge about how digital technology applies to broader cultural and legal issues that are certain to affect your life far into the future. Data processing Is based on an 4. Two major technologies that defined the network -processing-output cycle.
The idea that several technologies evolve into a single device is called 5. How can all this diverse "stuff" be accessed through one device, such as a laptop or an Phone? It's all about digitization. Apply what you learn. The answers are in the module. The amazing aspect of digital technol ogy is that it distills such diverse content into Os data data representation digital data and 1s and stores them as pulses of electricity.
Understanding the data representation concepts File file name extension file format presented in Section A will help you grasp the essence of the digital world and get a handle on all the jargon pertaining to bits, bytes, megahertz,and gigabytes.
I Write the numbers 1 through 10 in binary. I Demonstrate how to compress a file. Data refers to the symbols that represent people, events, things, and ideas. Data can be a name, a number, the colors In a photograph, or the notes in a musical composition. In everyday conversation, people use the terms data and information interchangeably. However, some technology professionals make a distinction between the two terms. They define data as the symbols that represent people, events, things, and ideas.
Data becomes information when it is presented in a format that people can understand and use. Terminology The word data can be correctly treated either as a plural noun or as an abstract mass noun, so the phrases "The data are being processed" and "The data is being processed" are both correct usage, in this textbook, I What is data representation? Data representation refers to the the word data Is paired with form in which data Is stored, processed, and transmitted.
Devices such as smartphones, IPods, and computers store data in digital formats that can be handled by electronic circuitry. Today, digital data representation has singular verbs and modifiers. Digital data is text, numbers, graphics, sound, and video that have been con verted into discrete digits such as Os and 1s.
In contrast, analog data is represented using an infinite scale of values. For a simple illustration of the difference between analog and digital, consider the way you can control the lights in a room using a traditional light switch or a dimmer switch.
A dimmer switch has a rotating dial that controls a continuous range of brightness, it is, therefore, analog. A traditional light switch, on the other hand, has two discrete states: on and off. There are no in-between states, so this type of light switch is digital.
A traditional light switch is also binary because there are only two possible slates. Technically, a digital device could represent data using more than two states. Some of the earliest computers represented numbers using the decimal system. Today, however, most digital devices represent numbers and other data using the binary system.
The television and the vinyl Television record c. All but the speedometer d. The process of converting informa tion, such as text, numbers, photos, or music, into digitai data that can be manipulated by eiectronic devices is called digitization. Your light switch offers two states: on and off. You can use sequences of ons and offs to represent various letters of the alphabet. To write down the representa tion for each letter, you can use Os and 1s. The Os represent the off slate of your light switch; the Is indicate the on state.
For example, the sequence on on off off would be written as , and you might decide that sequence represents the letter A. The Os and Is used to represent digital data are referred to as binary digits. A bit is a 0 or 1 used in the digital representation of data. Digital devices are electronic and so you can envision bits flowing within these devices as pulses of light.
But digitai signals can take many forms, as shown in Figure Digital data is typically stored in files. A digital file, usually referred to simply as a file, is a named coilection of data that exists on a storage medium, such as a hard disk. DVD, or flash drive. A file can contain data for a term paper. Web page, email message,or video, for example.
Every file has a unique name,such as Thriiler. Afile name extension, such as. This extension indicates the file format; the type of data in the file and the way it is encoded.
Let's take a look at how numbers, text, images, sound, and video are encoded into digital formats that become computer files. For example, your annual income is numeric data, as is your age. That concept seems obvious, but some data that looks numeric is represented differently.
Social Security numbers, telephone numbers, street numbers, and similar data are not represented by numeric data. These "numerals" are not considered numeric data because they are never used in mathemati cal calculations. This numeric quirk is a key concept in the digital world and turns up when you work with spreadsheets, databases, and computer pro gramming.
Passport number b. Telephone number The S Digital devices rep c. The binary number system has only two digits: 0 and 1. No numeral like 2 exists in this system, so the number "two" is represented in binary as 10 pronounced "one zero".
You'll understand why if you think about what happens when you're counting from 1 to 10 in the familiar decimal system. After reaching 9, you run out of digits. For ten, you have to use the digits 10—zero is a placeholder and the 1 indicates one group of tens. The address 22 E. Main Street In binary, you just run out of digits sooner—right after you count to 1. To get to the next number, you use 0 as a placeholder and 1 indicates one group of twos. In binary, then, you count 0 zero , 1 one , 10 one zero , instead of counting 0, 1, 2 in decimal.
If you need to brush up on binary numbers, refer to Figure Digital devices can then perform calculations using these numbers. The ability to perform rapid and accurate calculations was the key feature of the first computers, and it now provides the foundation for online banking, ecommerce, and many other number-crunching applications. What is the binary equivalent for the number 12? Examples of character data include your name, address, and hair color.
Character data is commonly referred to as "text. Digital devices employ Write out Hi! ASCII provides codes for characters, including uppercase letters, lowercase letters, punctuation symbols, and numerals. Unicode pronounced "YOU ni code" uses sixteen bits and provides codes for 65, characters—a real bonus for representing the alphabets of mul tiple languages. Notice there is a code for the space character in addition to codes for symbols, numerals, uppercase let ters, and lowercase letters.
While glancing al the table of ASCII codes in Figure , you might have wondered why the table contains codes for 0, 1, 2. Aren't these numbers represented by the binary number system? Yes, the binary number system is used for representing numeric data, but these ASCii codes are used for numerais, such as Sociai Security numbers and phone numbers that are not used for caiculations.
Digital text is everywhere. It is the foun dation for ail kinds of digital documents, Web sites, social media sites, games, and email.
OOllOOOl other ebook readers. Some kinds of documents stmpiy contain this piain text, whereas other documents contain formatting codes to produce boid fonts, columns, and other effects. On Appie devices, these flies are labeled "Plain Text. They are typically used for writing computer programs because executable program code cannot include formatting such as underlining and special fonts. They can also be used for creating Web pages.
Text files can usually be opened by any word processing software regard less of the type of device, in that sense, they are universal. Leap-the-Oips is the world's oldest '""Oiler coaster and, according to a spokesperson What ii tlie seventh byte in the OOlOO' Roller Coasters file?
Built a. Uppercase C b. Lowercase c c. ASCII text files contain no formatting. They have no bold, italics, underlining, or font colors. There are no margins, columns, bullets, headers, or page numbers. SuHt In There are many techniques for doing so, and each one produces a unique file format. These formats can be opened by the software that produced them. Opening those files with other kinds of soft ware requires conversion. A delimiter is a special character Formatting codes can be added to documents directly within the text used to separate commands or formatting characters from the stream, using some sort of delimiter to signal the beginning and end of the formatting command.
When the document is displayed, the formatting rest of the text in a file. Slashes codes are hidden. What do those hidden codes look like? DOCX title. Leap- the-Dlps is the world's oldest roller coaster and. Built in , Leap-the-Dips is "the sole survivor of a style and technology that was represented in more than parks in North America alone in the earty years of the amusement industry. When using a scanner to digitize a document, you may have a choice between graphics formats and OCR- Graphics formats, presented later in the module, essentially cap ture a photo of the document.
A document scanned into a graphics format cannot be edited using a word processor. OCR optical character recognition is a process that interprets individual characters during or after a scan. It assigns the appropriate ASCII code to each letter and outputs the document in a format that can be edited using word processing software. OCR software is available for most scanners and is handy when you have a printed copy of a document that you want to modify, but would prefer not to retype.
A two-page bibliography of award-winning books from that you would like to annotate b. An excerpt from a magazine article that you want to include in a term paper c. Terminology related to bits and bytes is extensively used to describe stor age capacity and network access speed.
As a digital-goods consumer, you'll want to have this terminology handy. Even though the word bit is an abbreviation for binary digit, it can be further abbreviated, usualiy as a lowercase b.
Transmission speeds are expressed in bits, whereas storage space is expressed in bytes. For example,a cable Internet connection might transfer data from the Internet to your computer at 50 megabits per second. In an iPad ad, you might notice that it can store up to 60 gigabytes of music and video. Scan a one-page document using a scanner or a multifunction printer.
Kilo, mega, giga, tera, and similar terms are used to quantify digital that can be edited using word processing software. They suggest the I Why such odd numbers? In common usage, kilo, abbreviated as K, following prefixes: means a thousand.
Why the difference? As a general rule, use bits for data rates, such as Internet connection speeds and movie download speeds. Use bytes for file sizes and storage capacities. Figure provides some examples. Gigabyte GB or GByte 3. Mbps, MB, G8 photos and videos. Whereas an "A" is simply one character in a printed document, it requires seven bits when represented as ASCII and sixteen bits when represented as Unicode.
That "1" in "1st place" seems like it could be represented by a simple 1 bit, but it requires multiple bits when encoded- Numeric data also requires lots of bits. The number 10 is in binary and requires four bits. To reduce file size and transmission times, digital data can be compressed. Data compression refers to any technique that recedes the data in a file so that it contains fewer bits. Compression is commonly referred to as "zip ping. They can be divided into two categories; lossless and iossy.
Lossless compression provides a way to compress data and reconsti tute it into its original state. Character data and numeric data in documents and spreadsheets are compressed using lossless techniques so that the uncompressed data is exactly the same as the original data. Lossy compression throws away some of the original data during the compression process. After the data is uncompressed, it is not exactly the same as the original.
This type of compression is lypicaliy used for music, images, and videos because the human ear or eye cannot discern minor changes. Later in the module, you'll learn more about the compression techniques used to shrink the size of music, image, and video files. A very large document that you intend to send as an email attachment b. A photo of your class reunion that you intend to post on your Facefaook page c.
The software for compressing data is sometimes referred to as a compression utility or a zip tool. Most computers include software for compressing data, but tablets and smartphones may require a third-party app for working with compressed data. On laptops and desktop computers, the compression utility is accessed from the same screen used to manage files.
You can compress the data in a single file or you can combine multiple fifes to create a single zipped file that is reconstituted to the original files when unzipped Figure TRY IT! Experiment with compressing files to see how much they shrink. Try compressing a document, then try a graphic. Select th ese options R«5ejrcn mc90 ''.
The process of reconstituting files is called extracting or unzipping. As with compression, most laptops and desktop computers include extraction and unzipping soft ware; tablets and smarlphones may require a third-party app.
Compressed files usually have. Compressed files may also end with. These files have to be extracted or unzipped before you can view the data they contain.
The process is easy. To extract a file on a Mac, simply double-click the zipped folder. Digital audio is stored in a variety of file formats. What are the default file format and sampling rate? There are several options for obtaining audio content,such as music, soundtracks, narrations, and sound effects. TRY iTl Live recording is an option for obtaining digitai sound fiies from concerts or lectures. For casual recording. Voice Memos and similar apps work well. Professional recordings require more sophisticated software and hardware tools.
A device called an audio interface accepts input from a standalone microphone and feeds it into a computer. Ripping CD tracks is handy for someone who inherits a stack of old CDs and wants to convert the music into a format that plays on a smartphone or other mobile device. Ripping is a siang term that refers to the process of importing tracks from a CD or DVD to your computer's hard disk.
The tech nical term for ripping music tracks is digital audio extraction. A down load copies a file from a private network or Internet server to a local device. The file is transferred as an unit and cannot be played until the entire file on your smartphone, but there is a pause before it begins.
Author : N. A Publisher: N. Find Full eBook.
0コメント