Home

New Perspectives on Computer Concepts 2012

image

Contents

1. 2 Q fa O Color i F The Close button closes the window and exits the program A menu bar displays the titles of menus you can click to select commands Help gt oo lp TETE EE TE TEE A toolbar displays a series of EEE EEE ae i tools for accomplishing various tasks A ribbon combines the options of a menu and toolbars into a single set of controls A scroll bar can be clicked or Workspace dragged to see any material Workspace window The workspace is the area in which your document or draw ing is displayed 47 Untitled Paint Wiis 513PM If you re unfamiliar with Windows controls take a few minutes to complete the steps in the TRY IT box below TRY IT Use the toolbar or ribbon Use the ribbon or menu bar Use the sizing buttons 1 As shown below click the Brushes 1 Click the arrow next to Rotate 1 Click the al Minimize button 2 The Paint window shrinks down to a button on the taskbar at the bottom of the screen button on the Paint toolbar or ribbon then click Flip vertical zh Rotate right 90 d Rotate eft 90 3 Click the taskbar button to kt Rotote 130 make the Paint window reappear 2 Move the pointer to the work b Flip horizontal 4 Click the i Close but space hold down the left mouse an a ton to close the Paint program button and drag the mouse to paint In old versions of Paint click and remove its window from a shape Image
2. David Woolley Getty Images Figure 3 49 Courtesy of ClamWin Free Antivirus Issue 3a Courtesy of Software amp Information Industry Association CinC 3a Erik S Lesser The New York Times Redux Pictures CinC 3b Ashley Gilbertson Aurora Photos Figure 4 23 Courtesy of Symbian Foundation Figure 4 23 Courtesy of Microsoft Corporation Figure 4 23 Courtesy of Research In Motion Figure 4 23 Courtesy of Google Inc Android is a trademark of Google Inc Figure 4 23 Courtesy of Palm Inc a subsidiary of Hewlett Packard Company Issue 4 Mikkel William Nielsen iStockphoto CinC 4a Courtesy of the Fond du Lac Police Department CinC 4b Courtesy of the Fond du Lac Police Department Figure 5 01 Courtesy of Bob Metcalfe Figure 5 02 Exactostock SuperStock Figure 5 07 Courtesy of Belkin International Figures 5 10 5 13 5 14 Creative Crop Getty Images Figure 5 12 AP Photo Eckehard Schulz Figure 5 17a Courtesy of SMC Corporation Figure 5 17b Courtesy of D Link Systems Figure 5 18 Courtesy of Cisco Systems Inc Figure 5 21 Courtesy of logear Figure 5 25 Courtesy of Belkin International Figure 5 27 Courtesy of Bluetooth SIG Figure 5 28a Courtesy of Nokia Figure 5 28b Courtesy of Vega Helmet CREDITS Figure 5 30 Courtesy of Belkin International Figure 5 33b Courtesy of NETGEAR Inc Figure 5 35 PRNewsFoto Novatel Wireless Inc Figure 5 37 Ocean Corbis Figure 5 39 Jon F
3. Save a Document 2 Print a Document Close It and Exit Your Word Processing Application t Internet and Web Basics Start Your Browser How to Use a Web Browser and Search Engine Use a Search Engine Check Out Wikipedia Working with E mail Get a Web based E mail Account Create and Send E mail InfoWebLinks Visit the InfoWebLinks site to access additional resources that accompany this chapter Orientation sEcTION Cc SECURITY AND PRIVACY Securing Your Computer and Data Check the Accounts on Your Computer Avoiding Viruses Get Familiar with Your Antivirus Software Preventing Intrusions Check Your Windows Computer s Firewall Check Your Mac Computer s Firewall Blocking Spyware and Pop up Ads Check Internet Security and Privacy Options Protecting E commerce Transactions Identify a Secure Connection Avoiding E mail Scams Arm Yourself Against E mail Scams Protecting Your Privacy Check Your Privacy Safe Social Networking Check Your Social Networking Sites Online Privacy and Safety Guidelines SECTION D BOOKONCD BookOnCD Basics Start the BookOnCD Start the MacBookOnCD Open a Chapter and Navigate the BookOnCD Multimedia and Computer scored Activities Explore Multimedia and Computer scored Activities New Perspectives Labs Open a New Perspectives Lab Tracking Your Scores Create a Tracking File Complete a Practice Test View the Contents of Your Tracking File
4. Which activities are computer scored Figure 30 lists the BookOnCbD activities that are computer scored You can use these activi ties to gauge how well you remember and understand the material you read in the textbook QuickChecks Practice Tests Concept Map Suppose you re reading Chapter 2 Work with the TRY IT below to see how Lab QuickChecks multimedia and computer scored activities work TRY IT Explore multimedia and computer scored activities CIMPUTER HAR DWART 1 Use the Go to Page control to jump to page To 2 On page 79 Figure 2 24 contains an A a er icon Click any line of the figure caption to ig eee a disk platiers and read A x r wii heeds are sealed inside launch the video A i the dowe case or cartndge io p a he og Se screen out duat and other tyn hee tamvnants Q The video tor thes 3 When you want to stop the video click any SS fot mn ae 2 SS Tata a MAr THe BACT blank area of the BookOnCD page To restart oh and what happens when a hard diak crashes the video click the O icon again 4 Now try a computer scored QuickCheck Use the Go to Page control to get to page 87 and scroll down the page until you can see the entire set of QuickCheck questions 5 Click the answer box for question 1 and then type your answer Most answers are a single word Upper and lowercase have no effect on the correctness of your answer n QuickCheck SECTION 6 Press the Tab key to
5. OpenOffice Writer or iWork Pages Click the name of your word pro cessing software to open it 3 Click the workspace to position the insertion point in the upper left corner 4 Type a paragraph Refer to Figure 12 for keys to use while typing and revising your work 5 When the first paragraph is complete press the Enter key to begin a new paragraph 6 Type a second paragraph of text near the top of the window 2 Make sure the Documents library or folder is selected If not click the gt button next to your user name at the top of the win dow and then click the Documents folder from the list Or use the button next to the Save In box to display a list of folders 3 In the File name box type a name for your document 4 Click the Save button 5 When the Save As dialog box closes your document is saved 1 Click the File tab File menu or Office button and then click Print 2 Make sure the page range is set to All 3 Make sure number of copies is set to 1 4 Click the Print or OK button and wait a few seconds for the printer to produce your document 5 Close the document by clicking the File tab File menu or Office button and then clicking Close The work space should become blank 6 Exit your word processing software by clicking the Close button Windows or clicking the program name on the menu bar then selecting Quit Mac Copyright 2011 Cengage Learning All Righ
6. o re O ia We i WS com miail st I Grail Inbox 1 cocothedo bial gt IM https mail google sip Suggested Sites Web Slice Gallery Gmail Calendar Web Documents Reader more Beta cocothedogcoco gmail com New Priority Inbox Show search options Create a filter Search Mail Search the Web Gmail i Free Desktop Themes www BestWallpaperWorld com Get Desktop Themes amp FAboutthese ads gt Contacts Tasks Inbox Cly Archive Reportspam Delete Move tow Labels More actions Refresh selected ae 4 Compose mail M 4of4 Chelsea Barton Delete Welcome Home Coco Glad to hear y ia a B25 Inbox 1 butt contents Buzz E utton fnport your contacts and old email Yolee BAS Starred vy E Customize Gmail with colors and themes T Bi 25s Sent Mail Aur show details 4 26 PM 1 minute ago 4 Reply Drafts Selected message Personal COCO Travel Glad to hear you got back home safely The situaticq Reply to have become more dangerous especially for stud button realy want to hear all about your trip so call me 6 moret Chat Search add or invite Reply Forward Q Invite Chelsea Barton to chat Forward button SECTION B 1 Documents that you send along with e mail mes sages are referred to as fs 2
7. p Mituri iu a pomas Porm tector The gt icons indi cate clickable links to sections labs and other activities on the CD comgeter riem I 0 Bm cn prii m comert spram bern thri and damiga JE Aa hie guidebrns for reubltiheating harden atl coh probes Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 35 MULTIMEDIA AND COMPUTER SCORED ACTIVITIES What kinds of multimedia are included in the BookOnCD FIGURE 30 Figures in your book marked with the icon morph into multimedia BookOnCD Computer scored screentours animations and videos A screentour takes you on a guided Activities software tour even if you don t have the software installed on your com puter Animations and videos visually expand on the concepts presented in Pre assessment Quiz the text Interactive Summary How do I access screentours and other multimedia To access Interactive Situation multimedia elements simply click the icon while using the BookOnCD Questions C e J go J o 1 O
8. scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 37 TRACKING YOUR SCORES Can I save scores from QuickChecks labs and other activities To save your scores you have to create a Tracking file The file can be located on a rewritable CD your computer s hard disk a USB flash drive or a network drive where you have permission to store files How do I make a Tracking file The Tracking Options dialog box lets you create a Tracking file and designate where you want to store it Work with the TRY IT below to create a Tracking file C e J go J YO O STRY IT Create a Tracking file 1 Make sure your BookOnCD is open 2 Click File on the BookOnCD menu bar then click Change Tracking Options 3 When the Tracking Options dialog box appears click the Create button 4 When the Create Tracking File dialog box appears enter the requested data 5E Gave As see illustration at right then click Continue The Save As Windows or Save Mac dia Name Date modif Type log box appears a If you want your Tracking
9. 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio e J go J o re Licensed to iChapters User 0 30 SECTION C SAFE SOCIAL NETWORKING What s the risk at sites like Twitter Facebook and Linkedin A prolific Twitter user with 650 friends had a nasty surprise one morn ing She discovered that private messages she d sent to specific friends were showing up on her public feed for everyone to see Although this is an extreme example of how things can go wrong on social networking sites embarrassing incidents are all too frequent The more information you reveal at social networking sites the more you increase your susceptibility to identity theft stalking and other embarrass ing moments such as when a prospective employer happens to see those not so flattering photos of you on your spring break How do stay safe and keep my stuff private when using social networking sites The first rule of social networking safety is never share your Social Security number phone number or home address Unfortunately everyone has access to Web based t
10. 452 KB Applicaton 17 5 ME Applicanon Falder 15 1 MB Applicaton ya 376 KB Application pard 176 4 ME Application 31 1 Me Agolication 2 When the Finder window simi lar to one at right appears click the Applications option I iChat 110 5 M Application o IDvo 119 7 ME Application l amp image Capure 15 ME lication 3 Double click the iCal option to start the iCal calendar program lt iMovie File Edt Calendar View Window Help 5 i E fho and display the iCal window shown G ise l T Tunes eae s Macintosh HD at right al dune 2010 Som im Tae Bed Tr Pri Eat 12 7 hs 7 8 9 1079 12 43 14 15 16 17 18 19 pz 21 22 23 24 25 m Use a menu and dialog box File Edit Calendar Wi About iCal b Hide iCal H Hide Others HH 1 Click iCal on the menu bar at the top of the screen Services 2 Click Preferences to display a dialog box 3 Click the button next to Start week on to change the day to Quit iCal 0 Days per week 7 Click here Monday Start week on Sunday to change n week view by Weeks the calendar 4 Click the Close button to This button closes ae 2a start day close the Preferences dialog box a window but does pay starts at 00 AM a not terminate the Dayendsat 6 00PM Ss application Show 12 i hours at a time Close a program M Show time in month view
11. All rights reserved Courtesy Everett Collection CinC 8b Corbis Sygma Figure 9 02a Courtesy of IBM Corporation Figure 9 03a Courtesy of IBM Corporation Figure 9 04 Courtesy of lowa State University Photo Service Figure 9 05 Courtesy of IBM Corporation Figure 9 06 Courtesy of Unisys Figure 9 08 Courtesy of Texas Instruments Figure 9 11 Courtesy of Steven Stengel http oldcomputers net Figure 9 12 Courtesy of IBM Corporation Figure 9 13 Courtesy of Steven Stengel http oldcomputers net Figure 9 14 REUTERS Cesar Ferrari Landov page 498 Courtesy of Dell Inc page 498 Courtesy of Intel Corporation page 498 Courtesy of Microsoft Corporation page 498 AP Photo LM Otero page 498 AP Photo Donna McWilliam Figure 9 15 Silicon Maps Inc Figure 9 16 AP Photo CHINATOPIX Figure 9 19 1 Masterfile Figure 9 19 2 Monkey Business Images Shutterstock com Figure 9 19 3 George Doyle Getty Images Figure 9 19 4 Jupiterimages Getty Images Figure 9 19 5 Baloncici Shutterstock com Figure 9 22a Bloomberg via Getty Images Figure 9 22b Mark Richards PhotoEdit Figure 9 22c Ed Kashi CORBIS Figure 9 23 Comstock Getty Images Figure 9 23 Ken Davies Masterfile Figure 9 23 Konstantin Chagin Shutterstock com Figure 9 23 Samuel Acosta Shutterstock com Figure 9 23 LWA Dan Tardif Jupiterimages Figure 9 23 Steve Rosset Shutterstock Figure 9 25a Courtesy of th
12. Courtesy of Intel Corporation Figure 2 16b Courtesy of Advanced Micro Devices Inc Figure 2 16c Courtesy of ARM Ltd Figure 2 32 Courtesy of BiTMICRO Networks Inc Figure 2 37b Courtesy of Kensington Technology Group Figure 2 37c Courtesy of Saitek USA Figure 2 39 Ozier Muhammad The New York Times Redux Figure 2 40 Courtesy of ViewSonic Corporation Figure 2 43 Courtesy of Advanced Micro Devices Inc Figure 2 47 Courtesy of Hewlett Packard Company Figure 2 56 Courtesy of Kensington Technology Group Figure 2 57 Courtesy of AnchorPad Figure 2 62 Courtesy of Targus Issue 2b Artshots Shutterstock com CinC 2a Bettmann CORBIS CinC 2b Photo Courtesy of U S Army Figure 3 03 Courtesy of Systweak Figure 3 04 Courtesy of Microsoft Corporation Figure 3 07a Courtesy of Microsoft Corporation Figure 3 07b Reprinted with permission of Quark Inc and its affiliates Figure 3 07c Courtesy of Adobe Systems Incorporated Figure 3 16a wrangle iStockphoto com Figure 3 16b Courtesy of Wolfram Research Figure 3 22b Ralf Juergen Kraft Shutterstock com Figure 3 26 Courtesy of Activision Publishing Inc Figure 3 28 Courtesy of Microsoft Corporation Figure 3 28 Courtesy of Check Point Software Technologies Inc Figure 3 28 Courtesy of Adobe Systems Incorporated Figure 3 28 Courtesy of CyberLink Corp Figure 3 33 Copyright 2006 by the Open Source Initiative Figure 3 44
13. Jones the BookOnCbD toolbar Student ID 123456789 Class Section eC 1014 2 The first question of a ten question Tracking file Documents iracking 123456729 tk3 Practice Test appears Answer the question then click the Next button Cees 5 Foints Possible 10 3 Answer the remaining questions then Suare a000 click the Check Answers button 4 When you see your score summary click _ gflgestion Er As Review Page the OK button You can then step through The conversion process allows photos sounds and other media to each of your answers or view a study guide aral arer tha Tabisase ar A SCTI teat e na 5 Click the Study Guide button A browser a eo window opens to display each Practice Test a ee oo j 3 ersonal computer systems typically mclude question your answers and corresponding an lowing paa page numbers in your textbook A oe 2 Oks the Study Guide by clicking the Personal computers are available as button on your browser window i T or clicking the browser name in the Mac menu bar and then selecting Quit Sunday August 24 7 Click the Close button on the Practice Test window to close it and save your scores Tracking Report Wew Ferspectives on Computer Concepts View the contents of your Tracking file 1 Click File on the BookOnCD menu bar Name Sam J 2 Click View Tracking Report Your com y TE puter opens your browser and displays a ee cme i Class Section CSC IOLA s
14. Labs 1 Make sure you re connected to the NP2012 CourseMate and use the Select Chapter button to access Chapter 1 2 Click the link for Student Edition Labs af Welcome Selecting Labs and Topics Working with Modes Training Modes Intra 3 Take a few minutes to walk through the section Guide to Student Edition Labs 4 Click Select a Lab and then click Understanding the Motherboard to start the lab Obsens Audio Settings Dene Buttons Training Modes Practice Review Resula Screen System Pequireruents 5 Complete the first section of the lab SELECT A LAB TOPICS including the Intro Observe Practice and Review activities 6 When you ve completed the review lt 2 Rae Reo activity a report containing your results is displayed Use the Print button to print your report or return to the NP2012 CourseMate 7 Exit the lab by clicking the Exit but ton in the upper right corner of the lab window GUIDE TO STURENT ESON LASG SAET A LAS Current Selection Training Modes Observe Overvien Training Modes Review Overndew GUIDE TO STUDENT EDITION LABS The first time you work with the Student Edition Labs you can find out how to use them effectively by stepping through the introduction Guide to Student Edition Labs th the awacana youl tow the component of a motherboard thm later topics nore about ther functions The matherbowc itaet is
15. Send Your Tracking Data and Send a Chirp SECTION E NP2012 COURSEMATE WEB SITE Web Site Resources Web Site Access Access the NP2012 CourseMate CourseMate Web Site Tour Explore the NP2012 CourseMate Student Edition Labs Work with Student Edition Labs Multimedia and Interactive Elements When using the BookOnCD or CourseMate eBook the icons are clickable to access multimedia resources Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Apply Your Knowledge The information in this chapter will give you the background to e Start your computer use the keyboard and operate the mouse e Work with Windows or Mac OS e Use word processing software e Carry out research on the Web using a search engine and other resources such as Wikipedia e Send e mail Try It WHAT DO I NEED TO GET STARTED e Take effective steps to guard your privacy and safety online e Use BookOnCD resources such as pre assess ments practice tests labs and interactive summaries e Access the NP2012 CourseMate Web site for labs concept quiz
16. Show Birthdays calendar 1 Click iCal on the menu bar _ Add a default alarm to all new events and invitations minutes before the start time 2 Click Quit iCal to close the win dow and terminate the application onize my calendars with other You have not set up your Mac account Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 13 HELP How can I get help using software If you ve had problems using software you re not alone Everyone has questions at one time or another Most software offers several sources of help such as the following e Message boxes When using software it is important to pay attention to any message boxes displayed on the screen Make sure you carefully read the options they present If the box doesn t seem to apply to what you want to do click its Cancel button to close it Otherwise set the options the way you want them and then click the OK button to continue 2 go Q TE O FIGURE 11 Clicking the eo Help button or th
17. Web Site SECTION THE INTERNET offers access to information that s useful to just about everyone and New Perspectives students are no exception When you purchase access to the New Perspectives NP2012 CourseMate Web site you ll find targeted learning materials to help you understand key con cepts and prepare for exams WEB SITE RESOURCES What s on CourseMate The New Perspectives NP2012 CourseMate Web site includes an eBook concept quizzes games and even audio files that you can download to your iPod or other portable device Figure 31 highlights the features you ll find on the NP2012 CourseMate FIGURE 31 NP2012 CourseMate Features Concects 2012 Windows Intemet Explorer Welcome to the NP2012 CourseMate E Access to yout online eBouk E Siudy tools By Online labs B And moie Browse NP2012 eBook Chapter Overview CourseCast Detailed Objectives Soncept Quiz O Student Edition Labs Glossary 6 Gaerne TechTenn Flashcards tenet Protected Made On eBook Chapter Overview CourseCasts Student Edition Labs The NP2012 eBook gives you access to your textbook from any computer connected to the Internet Detailed Objectives Access an expanded version of the Learning Objectives that are included at the beginning of each chapter TechTerm Flashcards Make sure you understand all of the technical terms presented in the chapter Listen to a five minute audio presen tation of
18. a i T Maps aeara of preserving Nal Geo WILD 3 Press the Enter key Your browser dis N sias ne natural sources ot Amera A Human B his B00R Graz Bea plays the Web page for the Google search w ess oe Animals National Genorapihic comyvl engine More Calitomia Colorato National Parks for all Ligh US Naliona Park Service Pas WHIEMESS Society helps Hen Burma S2CH OUT stones Of gieersity 4 Click the blank search box and then an sins seek out sones of type national parks i Advanced Search Preferences national parks 5 Press the Enter key Google displays a list of Web pages that relate to national parks 6 Click the underlined National Park Service link Your browser displays the p Park Service s home page Park smarts Why is Yosemite s greal gray owl capturing headlines 7 Leave your browser open for the next TRY IT n Find o Park Discover History Explore Nature Working with Canmuniteesd Get Involved Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 18 SECTION B What are the best sources of inf
19. a ribbon of commands Instead of using the on off switch to turn off whereas other programs present commands on a computer you should instead use the Shut ain sd bar Down option from the Start menu or Apple menu 5 The fs key can be used to True orfalse _ delete the last character you typed oO CHECK ANSWERS Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio 0 14 Documents Browsers and E mail SECTION B TO COMPLETE ASSIGNMENTS for your course you should be able to work with documents browsers and e mail Section B walks you through the basics CREATING DOCUMENTS How do I create and save a document To create a document sim ply type text in the workspace provided by word processing software such as Microsoft Word OpenOffice Writer Apple iWork Pages or NeoOffice Writer The flashing vertical insertion point Figure 12 indicates your place in the document Figure 13 explains how to save a document Documentl Microsoft Word Home Insert Page Layout References Mailings Review Wiews Acrobat Ay Orientation H Wate
20. and 6 850 943 and may be protected by other U S Patents foreign patents or pending applications Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
21. are concerned about their credit card data getting intercepted as it travels over the Internet As you wrap up an online purchase and sub mit your credit card information it is transmitted from your computer to the merchants computer Software called a packet sniffer designed for legiti mately monitoring network traffic is occasionally used by unscrupulous hackers to intercept credit card numbers and other data traveling over the Internet How can I keep my credit card number confidential When you submit credit card information make sure the merchant provides a secure connection for transporting data Typically a secure connection is activated when youre in the final phases of checking out as you enter your shipping and credit card information into a form and click a Submit button to send it A secure connection encrypts your data Even if your credit card number is intercepted it cannot be deciphered and used To make sure you have a secure connection look for the lock icon The Address box should also dis play a URL that begins with https Secure HTTP or contains ssl Secure Sockets Layer STRY IT Identify a secure connection 1 Start your browser and connect to the site www bestbuy com Secure https in URL Look for a lock icon in 2 Select any item and use the Add the address bar at the to Cart button to place it in your Billing Address top of the window or on Get it Faster the taskbar at the bottom Eish
22. as a microcomputer and sometimes referred to as a personal computer A computer runs software applications also called programs that help you accomplish a variety of tasks A typical computer system consists of several devices you must be able to identify these devices to use them What are the important components of my computer sys tem The system unit contains your computer s circuitry including the microprocessor that is the brain of your computer and memory chips that temporarily store data It also contains storage devices such as a hard disk drive Your computer system includes basic hardware devices that allow you to enter information and commands view work and store information for later retrieval Devices for entering information include a keyboard and mouse or touchpad A display device sometimes called a monitor allows you to view your work a printer produces hard copy on paper and speakers pro duce beeps and chimes that help you pay attention to what happens on the screen Where are the important components of a desktop computer system A desktop computer is designed for stationary use on a desk or table Figure 1 shows the key components of a desktop computer system System unit PC OR MAC Microcomputers are some times divided into two camps PCs and Macs PCs are man ufactured by companies such as Dell Lenovo Acer and Hewlett Packard Macs are manufactured by Apple Most P
23. at a few questions and then go back to the Chapter 1 page Online games provide a fun way to review chapter material 4 Click the Concept Quiz link Complete a quiz and then click the Done button 5 Check your answers and note your score You can click the magnifying glass icon to see more details for each question Your score is saved by the Engagement Tracker 6 Look for the link to the eBook and click it Use the Next page and Previous page buttons to navigate page by page 7 Jump to page 6 and scroll down the page if neces sary until you can see Figure 1 4 8 Click to start the software tour 9 When the tour ends make sure that you can see the CourseMate menu Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION STUDENT EDITION LABS 0 43 How do access Student Edition Labs Student Edition Labs help you review the material presented in the textbook and extend your knowl edge through demonstrations and step by step practice TRY IT Work with Student Edition
24. be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 6 WINDOWS BASICS What is Windows Microsoft Windows is an example of a type of soft ware called an operating system The operating system controls all the basic tasks your computer performs such as running application software manipulating files on storage devices and transferring data to and from printers digital cameras and other devices The operating system also controls the user interface the way software appears on the screen and the way you control what it does What is the Windows desktop The Windows desktop is the base of operations for using your computer It displays small pictures called icons that help you access software documents and the components of your computer system The design of the Windows desktop depends on the ver sion of Windows you re using Figure 4 shows the important elements of the three most recent versions Windows XP Windows Vista and Windows 7 Sara 2 Internet My Documents 2 Internet Explorer E eer gt My Pictures w Microsoft Outlook Set Program Access and Defaults gs PE eS x Desktop Itermet i 9 MEN Explorer te Control Panel Explor el Windows Media P
25. chapter highlights on your computer or download the files to your MP3 player to study on the go Audio Flashcards Interact with downloadable audio flashcards to review key concepts terms from the chapter Concept Quizzes Check your understanding and ability to apply concepts Get hands on practice with key top ics presented in a chapter Games Have some fun while refreshing your memory about key concepts that might appear on the exam Glossary Get a quick overview of all the key terms presented in each chapter Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 41 WEB SITE ACCESS How do I access the NP2012 CourseMate You can get to the site by opening your browser and typing www cengagebrain com Do I need a password The first time you connect to CengageBrain sign up for an account When you have completed the short registration process enter the ISBN for your book and if you have an access code enter it too Your materials are added to your dashboard for easy access
26. com puter contains a hard disk housed inside the system unit It is also likely to have a USB connector and some type of drive that works with CDs and DVDs Figure 3 can help you identify your computer s storage devices and their uses e ae CD drive DVD drive USB flash drive FIGURE 2 A notebook computer includes a flat panel screen keyboard speakers and touchpad in the same unit that contains the microprocessor memory and storage devices An external mouse is sometimes used instead of the touchpad FIGURE 3 You should use the hard disk to store most of your data but to transport or back up data you can use CDs DVDs or USB flash drives 2 go Q a O CD drives can play DVD drives read CD ROMs A USB flash drive is about CD ROMs but can t change and DVD ROMs but can t the size of a highlighter and the data they contain CD change the data on them plugs directly into the com drives can store data on Most of today s DVD drives puter system unit Capacities CD Rs CD Rs or CD RWs can write data on CD Rs range from 32 million to 64 CD RWs DVD Rs and billion characters DVD RWs HOW TO TURN YOUR COMPUTER ON AND OFF How do turn it on A notebook computer typically has one switch that turns on the entire system Look for the switch along the sides of the computer or above the keyboard When using a desktop computer turn on the monitor printer and speakers before you tu
27. fat f that Ats rade your comode S festem urit Select eah link in order to complete all the lab activities Use the audio control buttons to start pause or rewind the narration Okk the Play button to begn then use the Nent Previous and Play buttons to move to and play the screens you want To play screere without stopaing cick the Play Al button at ay time Gd the Pause button to suspend the pang of ary soser acd then tick the Pay button to resume When you are fished cick Practiog in the top night of the screen for hands on eqperience wth the QuickCheck 1 To access the NP2012 CourseMate you need 4 a user name and password True or false 2 The fs Tracker automatically 5 records your scores 3 When you re at the NP2012 CourseMate you can use the fs button to dis play the Welcome screen SECTION E The Chapter Overview fs is a five minute audio presentation of chapter highlights The Student Edition hep you review through demonstrations and step by step practice o CHECK ANSWERS Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subs
28. location to the next tab stop or the next text entry box The Caps Lock key capitalizes all the letters you type when it is engaged but does not pro duce the top symbol on keys that contain two symbols This key is a toggle key which means that each time you press it you switch between uppercase and lowercase modes The Shift key capitalizes let ters and produces the top symbol on keys that contain two symbols E You hold down the Ctrl key while pressing another key On a Mac the Command key marked with an Apple or symbol works the same way The result of Ctrl or Alt key combinations depends on the software you are using You hold down the Alt key while you press another key The Enter key is used to indi cate that you have completed a command or want to move your typing position down to the next line The Delete key deletes the character to the right of the insertion point beginning of a line or the begin ning of a document depending on the software you are using P The End key takes you to the end of a line or the end of a document depending on the software you are using a The right click key accom plishes the same task as right clicking a mouse button and usually opens a shortcut menu R The arrow keys move the insertion point The numeric keypad produces numbers or moves the insertion point depending on the status of the Num Lock key shown by indicator lights o
29. might look like A address this http www mediatechnicscorp com It is not necessary to type the http so to access the MediaTechnics Corporation page shown here you would type www mediatechnicscorp com When typing a Web address do not use any spaces and copy Click underlined upper and lowercase letters links to jump to the innovative digital exactly related Web pages pwers our products l Home Products Technology Affiliates Con Go to your home page MediaTechnics Corporation Innovative technology for education and publis Cc 2 Q O Products Try our products Affiliates Visit our partner Web sites httg nicscorp comy we mba Products_Computer Concepts html a al o HPM How do I find specific information on the Web If you re looking for information and don t know the Web site where it might be located you can use a search engine to find it Follow the steps in the TRY IT box to google it by using the Google search engine STRY IT Use a search engine _ 7 Gda S g hhee D Tj 2 nation fake Hoagie Search fi ty i ey A Suggected Sit g We 2 Cli ck th e Ad dress box an d type Web Images Videos Maps News Shopping Gma mores Web History Search setiings Signin Goog le national parks About 82 200 000 remiks 0 17 seconds 1 Make sure the browser window is open 1 Everything Natonal Fark cence Experience
30. numis 3 Click the Screen Saver tab How bo use the Windies Catculator to convert liiz ze The difference Selween formar mmi beck saahaa a How in work wath pras of wen LAA ASHIONMENTS 1 Sian the interactive part ol ihe bab Make gure you ve enabled Tracking I you wani bo tye Hoe io shul Gown Windows your Guickiheck meuts Paefcorrm aach bab Sap AH ASSIGNMENTS ms drecied and answer al the ind QuickCheck vestions When you ea the lab pour answers 1 Start the interactive part ofthe lab Make sure q P ore guicmaticely graded and pour resulls one you ve enabled Tracking if you want io save dapijad your Quick Gheck pesuils Perform mach lab shen zs we chewed and sarees ai ihe kb Chace heck 2 Using paper and parail manually conver the quewiiona When you ci the lib your areweri folowing decimal numbers into binary numbers ae auiomaieslly graced and pour FARUNA are four intiructor might ak you lo show the procesa dapiayed thal you weed for aech conversion a 100 b 7 000 g bb d ar a 4A E TIZ Use the lab navigation buttons for previous page next page and exit How io siai and eaii a program a Hew ia close a pogam haia mi resperding When to ues the pagel buhan Page 13 TOPIC 2 2 Make a note of he brand and location of the Sompuler you re uses to complete these lab oes 9 7 Copyright 2011 Cengage Learning All Rights Reserved May not be copied
31. or two throw away accounts for occasions when you have to give an e mail address but you don t want any continued correspondence from that SECTION B E MAIL PRIVACY E mail messages are not nec essarily private their contents might be seen during system maintenance or repair and commercial e mail archives are subject to search by gov ernment agencies Free Web based mail is typi source Later in the chapter you ll learn more about how e mail scams and online marketing contribute to all the junk e mail you receive Your throw away e mail address can become the recipient for lots of those messages and eventually you can simply delete the throw away account and all the junk it contains cally searched as you write it by digital bots that look for key words like vacation or pet to display related advertising If you want more privacy con sider private e mail providers and local e mail software How do I create and send an e mail message Many e mail sys tems are available and each uses slightly different software making it impossible to cover all options in this short orientation You might want to enlist the aid of an experienced computer user to help you get started The steps in the TRY IT box pertain to Gmail but other e mail packages work in a similar way TRY IT 7 When your message is complete click the Send button and Gmail sends the message Create and send e mail 1 If Gmail is not open open
32. raid your bank account A CALL FOR ASSISTANCE File Edit View Tools Message Help P Reply Reply All Forward is From ABEL MUZENDA lt abelmuzenda hotmailnot com ru gt Date November 1 2012 10 59 AM To YouMustBeASucker gmail net Subject A CALL FOR ASSISTANCE I am Mr ABEL MUZENDA the first son of DR CHITEPO MUZENDA who was murdered along with other oppositions by my government on 19th November 2009 I obtain your contact from the information desk of a very reliable source hence I have decided to contact you for assistance Before death of my father he has deposited the sum of nine millions three hundred and fifty thousand United States dollars 9 350 000 ina security and finance firm in Amsterdam I am now faced with the burden of how to secure the investment of this fund For this reason I seek the assistance of honest individual who could provide my family with a United States bank account where this fund could be deposited without the knowledge of my government For your assistance we would give you 20 and the remaining would be eZ FIGURE 25 Some e mail systems use spam filters to flag suspected spam by adding SPAM to the sub ject line Spam filters are not perfect however Some spam is not flagged and occasionally legitimate mail is mistaken for spam FIGURE 26 Many variations of this African money transfer fraud complete with deliberate grammatical errors have circulated on the Internet for
33. sports weather and much more Most Internet offerings are legitimate but some downloads contain viruses and shady characters called hackers control programs that lurk about waiting to snatch your personal data or infiltrate your computer The longer your computer remains connected to the Internet the more vul nerable it is to a hacker s infiltration attempts If a hacker gains access to your computer he or she can look through your files use your computer as a launching platform for viruses and network jamming attacks or turn your computer into a server for pornography and other unsavory material Hackers have even found ways to turn thousands of infiltrated computers into zombies link them together and carry out coordinated attacks to disrupt online access to Microsoft Bank of America and other Internet businesses How do hackers gain access to my computer Intruders gain access by exploiting security flaws in your computer s operating system browser and e mail software Software publishers are constantly creating updates to fix these flaws As part of your overall security plan you should download and install security updates as they become available How can I block hackers from infiltrating my computer Firewall software and Internet security suites such as those listed in Figure 21 provide a protective barrier between a computer and the Internet If your computer is directly connected to the Internet it should have
34. the QuickCheck that s on page 21 of your printed textbook for exam ple you can use the Go to Page option on the toolbar to jump right to it What are the other menu and navigation options The menu bar includes a Web Links menu with options that open your browser and con nect to InfoWebLinks the NP2012 Web site and the Course Technology Web site The menu bar also includes a Help menu where you can access instructions and troubleshooting FAQs The Glossary button provides access to definitions for key terms An Annotation button appears when your instructor has posted comments or lecture notes If your instructor has not posted annotations the button will not appear How do I exit the BookOnCD When you have completed a ses sion and want to close the BookOnCD you can click the button in the upper right corner of the title bar Windows On Mac OS X you can click MacBookOnCD on the menu bar and select Quit Figure 29 helps you locate the Close button and BookOnCD navigation tools The Contents menu takes you to the first page of any E Ne Espi chapter you select File Contents Web Links Help Glossar m Practoo Lost The Glossary but ton helps you look up key terms Comput Digital B Ch opter ontents o SECTION A TRY IT Open a chapter and navigate the BookOnCD 1 Click Contents on the menu bar The Contents menu appears 2 Click Chapter 2 3 When Chapter 2 appears click the Next button twice un
35. the information Use the TRY IT below to see how Wikipedia works TRY IT Check out Wikipedia 1 In the Address bar of your browser type www wikipedia org and then press the Enter key 2 When the Wikipedia window appears enter cyberspace in the search box and then press Enter Thul4sPM Q 3 Read a bit of the article to get an idea of its scope and detail Do you detect any bias in the article 4 Click the History tab Look at the last few updates Does this a O Google Leg ins create accourt edit thle page history From Wikipedia ihe tree encyclopedia For other uses see Cyberspace disambiguation article seem up to date 5 Click the Discussion tab What is the status of the article Does it contain controversial state ments Can you envision how you might use Google or other Web resources to explore specific controversies 6 Click the Article tab to return to the Cyberspace article The Free Encyelopedia navigation a Main page Conbents m Featured comia m Curren events a andom article Ge Search interaction About Whipedia a Community portal Accent changes 7 You can leave your browser open for the next TRY IT Cyberspace irom the Greek KuBepwitig kybem tas steersman governor pilot or rudder is the global domain of electromagnetics accessed through electronic technology and exploited through the modulation of electromagnetic energy to achieve a
36. usin atara online sho In cart lease use the address that appears on your cred oe resi in s deley ar cencelstion cf yourarcer Of the browser window Somme E Online Returns 3 Click the Checkout button E i os By mail or in store then at the next screen click the EPER oma Nood hap with Checkout as Guest button to ae inter a aia aE reach the screen where you enter anne Ciby State FIP Code S digit your billing information salt a Stata El Counbry lopertaot Mote for International Customers LEA Ti 4 At the Billing Address screen do Plense enter your biling phone number on file woth your credit card company you see any evidence that you re a using a secure connection _ Yes my BILLING and SHIPPING addresses are the same 5 Close your browser so that you don t complete the transaction Oe o a L Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION AVOIDING E MAIL SCAMS What are e mail scams From time to time you hear about con artists who have bilked inn
37. your first name last name and login name 4 Click the check availability button If the login name you want is already in use you ll have to try a different one again clicking the check availability button Get started with Gmail First name John Last name Adams Desired Login Name Timana 5 When you ve selected a valid login name continue down the page to create a password Try not Choose a password to use a name date or any dic tionary word as your password SSSR ESE Re enter password CEEE E S EEEE EJ 6 Continue down the page to complete the rest of the registra tion form JohnXAdams is available W Remember me on this computer FIGURE 17 E mail Addresses An e mail address consists of a user ID followed by an symbol and the name of a computer that handles e mail accounts Ask your instructor for his or her e mail address It is likely similar to the following instructor school edu When typing an e mail address use all lowercase letters and do not use any spaces gmail com Examples JSmith John Smith You might have to try several login names to find one that is available Password strength Strong Minimum of 8 characters in length Try to choose a strong password Creating a Google Account will enable Web History Web History is a feature that will provide you with a more personalized experience on 7 Before finalizing your registra tion review the inf
38. 2012 CourseMate Web site You ll learn how to access Student Edition Labs in Section E New Perspectives Labs give you hands on experience applying concepts and using software discussed in each chapter Labs on the BookOnCD are divided into topics and each topic ends with a QuickCheck so that you can make sure you understand key concepts In addition to lab QuickChecks each New Perspectives Lab also includes a set of assignments located in the Lab section of each chapter Your instruc tor might require you to complete these assignments You can submit them on paper on disc or aS an e mail message according to your instructor s directions How do I launch a lab First navigate to the lab page using the New Perspectives Labs option from the Chapter Contents list or type in the cor responding page number from the printed book Click the lab s gt icon to start it as explained in the TRY IT below TRY IT Open a New Perspectives Lab 6 After page 8 you will encounter the first QuickCheck question Click the correct answer and 1 Click Contents on the BookOnCD menu bar and then click the Check Answer button After you find Ae Cnapan out if your answer was correct click the T button to continue to the next question Complete all the 2 Scroll down to the Chapter Contents list and click i j i QuickCheck questions for Topic 1 gt New Perspectives Labs A EET an 7 For this TRY IT you don t have to complete the en th
39. Cal 91 1 MB ichat 110 5 MB iovo 119 9 MB SEARCH FOR ts Image Capture 15 MB 4 Today iMovie 119 4 MB B iPhoto 175 5 MB 36 9 MB Y 137 1 MB rr Macintosh HD T Yesterday 4 Past Week o iSync 2a All Images E 3 liss 2a All Movies e E All Documents 3 Macintosh HD Applications The dock _ a ar Cn SY Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User Oss MOUSE BASICS What is a mouse A mouse is a device used to manipulate items on the screen such as the buttons and icons displayed on the Windows desktop The mouse controls an on screen pointer The pointer is usually shaped like an arrow be but it can change to a different shape depending on the task you re doing For example when the computer is busy the arrow shape turns into an hourglass 4 or circle signifying that you should wait for the computer to finish its current task before attempting to start a new task PC compatible mice have at least two buttons typically located on top of the mouse M
40. Click the link for the NP2012 CourseMate From there you can click links to each chapter s activities and information C e J go J o O STRY IT First time users can _ click this link to setupa p lelejx CengageBrain account Access the NP2012 CourseMate a e ka a mtg cengagebrancom s 1 Start your browser SS O Discover CengageBrain Log In Sign Up My Cart 2 o SarahSmith school edu Find eeeeeeee Password RememiS Me log in Make sure to use all lowercase letters insert no spaces and use the slash not Once you have a the slash CengageBrain account sb tween you can enter your user 3 Press the Enter key The CengageBrain name and password to screen is displayed ew on access the site 4 If you are accessing CengageBrain for the first time click the Sign Up tab and fol low the instructions to create your account 5 Once you ve created a CengageBrain account you can log in by entering your user name and password then clicking the log in button 6 In the Add a title to your bookshelf box enter the ISBN for your book and follow the links to add it to your bookshelf 7 Once the title is added you can look for the link to the CourseMate on the right side of the dashboard The NP2012 CourseMate Welcome screen contains links to activities for each chapter of the od aan Welcome to the NP2012 textbook Use the Select Chapter
41. Cs and some Macs use an operating system called Microsoft Windows The BookOnCbD is designed for use with computers that run Microsoft Windows To determine whether your computer runs Windows look for screens similar to those shown in Figure 4 on page O 6 If you have a Mac that does not run Windows you can go to the NP2012 Web site and download a MacPac to convert your CD to a for mat that runs on your Mac You ll find full instructions on the site FIGURE 1 A desktop computer system includes several components usually connected by cables Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION Where are the important components of a notebook computer system Notebook computers sometimes called laptops are small lightweight computers designed to be carried from place to place The com ponents of a notebook computer system except the printer are housed in a single unit as shown in Figure 2 i i kea How do identify my computer s storage devices Your
42. DVD drive icon gresit o aew Thtrbirny Ble uae t the Cp BookOnCD exe ARS i pen t we Trechem sth Crete Oper e dtwar Suwcong te nen Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 33 What if I have a Mac If you have a Mac that runs Parallels or Boot Camp that means you have access to the Windows operating system on your Mac Boot up your Mac in Windows mode and then use the BookOnCD just as you would on a Windows computer If your Mac runs only OS X you can still access the digital textbook by per forming a simple conversion process It takes just a few minutes and when the process is complete you ll have all the BookOnCD files on your Mac s hard drive You can launch the book right from there or you can copy the files to a CD or USB flash drive if that is more convenient How do I convert the BookOnCD so it works on a Mac Make sure you have the BookOnCD supplied with your textbook then use your browser to connect to www mediatechnicscorp com pub samples NP2012MacPac h
43. Licensed to iChapters User NEW PERSPECTIVES Computer Concepts 2012 al f m Bo FOR A FUL ERACTIVE LEARNING EXPERIENCE Licensed to iChapters User ee COURSE TECHNOLOGY a CENGAGE Learning New Perspectives on Computer Concepts 2012 Comprehensive June Jamrich Parsons Dan Oja Executive Editor Marie Lee Senior Product Manager Kathy Finnegan Product Managers Katherine C Russillo Leigh Hefferon Associate Acquisitions Editor Amanda Lyons Developmental Editor Deb Kaufmann Associate Product Manager Julia Leroux Lindsey Editorial Assistant Jacqueline Lacaire Technology Project Manager John Horn Chris Conroy Senior Marketing Manager Ryan DeGrote Senior Content Project Manager Jennifer Goguen McGrail Photo Researcher Abby Reip Art Director GEX Publishing Services Cover Designer Roycroft Design BookOnCD Technician Keefe Crowley BookOnCD Development MediaTechnics Corp Prepress Production GEX Publishing Services 2012 Course Technology Cengage Learning ALL RIGHTS RESERVED No part of this work covered by the copyright herein may be reproduced transmitted stored or used in any form or by any means graphic electronic or mechanical including but not limited to photocopying recording scanning digitiz ing taping Web distribution information networks or information storage and retrieval systems except as permitted under Section 107 or 108 of the 1976 United States Copy
44. Popular fF software includes Internet Explorer Chrome and Firefox 3 When looking for information on the Web you can use a n engine to produce a list of links to Web pages that might contain the information you seek Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio 4 Ane mail fs looks something like student school edu 5 To access Webmail you use a browser but to access __ e mail you use e mail software such as Microsoft Outlook oO CHECK ANSWERS OR Security and Privacy Tagen AS WITH MOST OTHER facets of modern life computing has its share of troublemakers scam artists and identity thieves Section C offers some tips on navigating through the sometimes rough neighborhoods of cyberspace while keeping your data safe and your identity private SECURING YOUR COMPUTER AND DATA What s at risk if my computer is stolen The value of a stolen com puter is not so much in the hardware as in the data it contains With stolen data such as your bank account numbers and PINs a thief can wipe out your checking and s
45. Safety Options 1 Start your browser and connect to the site Options Safe Sanders Blocked Senders Intemational Phishing Securty www millersmiles co uk Browse through the list of a Wide ise Weak Gal cine nani S recent phishing attacks special Jurik E mail folder i ER Chooge the level of junk e mail protection you want 2 Open your e mail software and find out if it includes No Automatic Fikering Mall from blocked senders is stil moved to the spam filters You can usually find this information by click Pag ing Help on the menu bar and then typing spam filter in er ee ee ee the search box 6 High Most jurk e mail i caught but some regular mal may be caught es well Check your Junk E mail folder often 3 Explore your options for configuring spam filters If Safe Liet Oriy Only mad from papia or domaine on your Sale Senders List you use Windows Live Mail shown at right you can cach ada find these settings by clicking the Menus button and then clicking Safety options Check the settings for ae spam filters on the Options tab and then check the set TP Fost june aiio hin ahd i paina ocd tings on the Phishing tab Spam filters sometimes catch legitimate mail and group it with junk mail You might want to keep tabs on your spam filters when they are first activated to make sure they are set to a level that eliminates most unwanted spam without catching too mu
46. URE 7 Rest the palm of your right hand on the mouse Position your index finger over the left mouse button and your middle finger over the right mouse button TRY IT Use your mouse 1 With your computer on and the desktop showing on the screen move your mouse around on the desk and notice how mouse movements correspond to the movement of the arrow shaped pointer 2 Move the mouse to posi tion the pointer on the Start button or Apple icon 3 Click the left mouse button to open the Start menu or Apple menu 4 Click the Start button or Apple icon again to close the Start menu Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 9 KEYBOARD BASICS What are the important features of a computer keyboard You use the computer keyboard to input commands respond to prompts and type the text of documents An insertion point that looks like a flashing vertical bar indicates where the characters you type will appear You can change the location of the insertion point by using t
47. Verizon Wireless Figure 6 33 photo BenQ Mobile Figure 6 36 Courtesy of Visualware Figure 6 41 Courtesy of SETI home Figure 6 42a Courtesy of chessbrain net Figure 6 42b Courtesy of www climateprediction net Figure 6 42c Courtesy of distributed net Figure 6 42d Courtesy of Vijay Pande Folding Home and Stanford University http folding stanford edu Figure 6 42e Courtesy of PrimeGrid distributed computing project Figure 6 42f Courtesy of The Scripps Research Institute Figure 6 46 Paul Edmondson Getty Images Figure 6 47 Courtesy of Gibson Research Corporation Figure 6 51 6 52 6 53 Ocean Corbis Issue 6b Steve Allen Getty Images CinC 6a H F Davis Getty Images CinC 6b Royalty Free CORBIS Figure 7 01 Courtesy of Ted Nelson Project Xanadu Figure 7 18 Courtesy of Ben Samuels Figure 7 27a Eric Bean Getty Images Figure 7 27b Don Farrall Getty Images Figure 7 27c Ryan McVay Getty Images Figure 7 27d S T Yiap Alamy Figure 7 27e Comstock Images Alamy Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent ri
48. Windows computer follow the instructions in the TRY IT box below If you have an OS X Mac skip to the instructions on the next page QUESTIONS Additional FAQs about the BookOnCbD are posted at www infoweblinks com under the Technical Support link You ll find information on topics such as what to do if the CD doesn t start and how to use the BookOnCbD in a computer with out a CD player TRY IT Start the BookOnCD The BookOnCD allows you to save your scores for QuickChecks practice tests and other activities but 1 Insert the BookOnCD into your computer s CD for this session you do not need to track this data or DVD drive label side up 4 To disable tracking for now make sure the box page of Chapter 1 2 Wait a few seconds until the BookOnCD has loaded next to Save Tracking data is empty If the box con tains a check mark click the box to empty it 5 Click the OK button The Tracking Options dialog box closes and the BookOnCD displays the first To disable foe con sees the pend cf mary BoohOerlD tot m a e Trectorg fhe H pou oe we s4 ara bee i erst tee othe ierheg bos orema s chert eur wel tte ea 3 When the main Computer Concepts screen tracking for a Eter appears proceed to step 4 session make e sure this box is If an Autoplay box appears select Run amply e ifthe CD does not start automatically click the Start button click Computer and then double click the CD or
49. a Courtesy of Microsoft Corporation Figure 10 31b Courtesy of Sybase Inc Figure 10 31c Courtesy of Sage Figure 10 31d Chris Schmidt iStockphoto Figure 10 38 Rob Lewine CORBIS Figure 10 39 AP Photo Ric Francis Figure 10 44 Bloomberg via Getty Images Figure 10 45 AP Photo Daniel Hulshizer Figure 10 46 Courtesy of Bahnhof Figure 10 47 Courtesy of Disaster Recovery Journal Issue 10 David Paul Morris Getty Images CinC 10a Courtesy of MIDASoft Inc CinC 10b John Van Hasselt Corbis Figure 11 01 Photo by Michael Boettinger Deutsches Klimarechenzentrum Figure 11 02 David Ellis Getty Images Figure 11 04 Courtesy of CORDA Technologies Inc Figure 11 15a Ryan McVay Getty Images Figure 11 15b Digital Vision Getty Images Figure 11 49 Jim Craigmyle Corbis Figure 11 52 Fredrik Skold Getty Images Figure 11 54 Courtesy of SoftTree Technologies Inc 743 Issue 11a AP Photo Dave Martin Issue 11b Getty Images CinC 11a Central Press Hulton Archive Getty Images CinC 11b Gabe Palmer Corbis Figure 12 01 Nancy Nehring iStockphoto Figure 12 02 Thomas Barwick Getty Images Figure 12 05 Courtesy of IBM Corporate Archives Figure 12 15 Dex Images Corbis Figure 12 17 Patrik Giardino Corbis Figure 12 45a Wolfgang Kaehler Corbis Figure 12 45b Stockbyte Getty Images Figure 12 45c Keith Brofsky Getty Images Issue 12b John Turner Getty Ima
50. active firewall software If your computer connects to a local area network for Internet access the network should have a device called a router to block infiltration attempts P Windows Security Alert When a firewall is active it watches for potentially dis ruptive incoming data called probes When a probe is discovered your firewall displays a warning and asks what to do If the source looks legitimate you can let it through if not you should block it Figure 22 Where do get a firewall Mac OS X and Windows include built in firewalls Third party Internet security suites also include firewall modules STRY IT SECTION C FIGURE 21 Popular Firewall Software and Internet Security Suites Emsisoft Online Armor McAfee Internet Security ZoneAlarm Internet Security Norton Internet Security Mac OS X Firewall Agnitum Outpost Firewall Windows Firewall Comodo Firewall Pro Symantec Internet Security Kaspersky Internet Security Trend Micro Internet Security Pro FIGURE 22 When your firewall software encounters new or unusual activity it asks you what to do Windows Firewall has blocked some features of this program on al private networks If you unblock this program it wil be unblocked on all private networks that you connect to Lear more about the risks of unblodang a progr Microsoft Corporation Cr orogram files messenger msmegs exe Check your Windows computer s firewall 1 Click the Start b
51. aped mouse pointer over a link it changes to a hand shape SECTION B FIGURE 15 The Internet communications network stretches around the globe TRY IT Start your browser 1 Click the fl icon for your browser It is usu ally located near the Start but ton or on the dock 2 Your computer should soon display the browser window If your computer displays a Connect to box click the Dial button to establish a dial up connection over your telephone line You ll need to cancel the browser command and consult an experienced computer user if e Your computer displays a working off line message e Your computer displays an Internet Connection Wizard box Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION O 1 7 Although browsers offer many features you can get along quite well using the basic controls shown in Figure 16 FIGURE 16 Go back to the last page viewed Close the browser window Using a Browser Say pea wen T A full Web address
52. avings accounts With your credit card numbers a thief can go on a spending spree Even worse a criminal can use stolen data to assume your identity run up debts get into legal difficulties ruin your credit rating and cause you no end of trouble How can I protect my computer data from theft When you carry a notebook computer never leave it unattended To thwart a thief who FIGURE 19 breaks into your home or dorm room anchor your computer to your desk To create a secure password with a specially designed lock you can buy at most electronics stores e Use at least eight characters mixing numbers with letters as in 2by4lumber If a thief steals your computer you can make it difficult to access your data by setting up a password Until the password is entered your data is off limits A thief might be able to boot up the desktop but should not be able to easily look at the data in your folders e Do not use your name the Many new computers are shipped with a standard administrator password name of a family member or that everyone knows If you are the only person using your computer you Your pet s name can use the administrator account for your day to day computing but create a secure password Figure 19 for this account as soon as you can e Do not use a word that can be found in the dictionary Your computer might also include a preset guest account with a nonsecure password such as guest You should disable this guest a
53. button CourseMate to access Chapter 1 Your browser dis plays links to activities for the first chap ter in your textbook La Chag unag owbeLan Use the Select E ce i n Chapter button to access Chapter 1 8 You can always return to the Welcome screen by clicking the Home button on the Chapter toolbar Click the Home but ton now irtemet Protected Mote On Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 42 SECTION E COURSEMATE WEB SITE TOUR How do I use the resources at the NP2012 Web site The NP2012 CourseMate Web site is designed to help you review chapter mate rial prepare for tests and extend your understanding of various topics The Chapter eBook contains text and figures from the printed textbook vid eos guided software tours and InfoWebLinks The Chapter Overview presents a high level introduction to chapter high lights Use it as an orientation or as a quick refresher before an exam If you like a challenge use the online games as a review activity you ll get high scores if yo
54. button on the taskbar at the bottom of your screen and then select the Close option from the menu that appears Most browsers can be configured to block spyware and pop up ads Figure 24 Your antivirus software might offer similar options What other steps can I take to browse the Web safely Most browsers include security features You should take some time to become familiar with them For example Internet Explorer allows you to specify how you want it to deal sa with ActiveX components You can also specify how to deal with auam HTML scripts cookies security certificates and other Web based data If you don t want to be bothered by these details Notste however Internet Explorer offers several predefined configura tions for Low Medium and High security Most Internet Explorer users set security and privacy options to Medium STRY IT Check Internet security and privacy options Features pS J i a General Security Privacy 1 Start your browser and look for its security settings Internet Explorer Click Tools then select Internet Options Click the Security tab Typically your secu rity setting should be Medium Click the Privacy tab E Typically your privacy setting should be Medium If Medium FIGURE 24 Check your browser s settings to make sure it is blocking pop up ads amp Content Settings N Pop up Settings Allow all sites to show pop ups De not allow any
55. c and other activities but for this session pumuna vam bare cer marae apenas you do not need to track this data ne A SREE 5 To disable tracking for now make sure pesanan the box next to Save Tracking data is s E ALENS rara seve 5 operas eee e empty If the box contains a check mark E iow oc parsons computers after tom server an click the box to empty it _ A e a amp Why ae mecoortroters Ds mmputurs re one ses 2 Arar gaa ac mformafion the same ting 6 Click the OK button The Tracking 19 Whats the teem between sagai agp Options dialog box closes and the BookOnCD displays the first page of Chapter 1 Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 34 How do I navigate through the book The BookOnCD menu and toolbar near the top of the screen contain tools you can use for navigation The Next and Back buttons turn one page at a time To get to the first page of any chapter you can select it from the Contents menu The BookOnCD pages mirror the pages in the printed book So if you want to take
56. ccount or assign it a secure password TRY IT Check the accounts on your computer e Do not forget your password 1 To access accounts on Windows click the Start button then select Control Panel For Windows Vista and Windows 7 select remus Sareh Smith User Accounts and Family Safety select ERE User Accounts and then select Manage another account You might be required BE ii to enter an administrator password For Windows XP select User Accounts For security all active accounts should be On a Mac click the Apple icon select password protected System Preferences and Accounts Mahe a tite accout Whal is a user account 2 Check the password protection on all Additional things you can do accounts If you are working on a school ae ee lab computer do not make changes to the account settings If you are using your own computer click the Administrator account and make sure it has a secure password Go to the main User Account page foul WEA AM Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require
57. ce WORKING WITH WINDOWS SOFTWARE How do I start Windows programs When using Windows you can click the Start button to launch just about any software that s installed on your computer The Start menu includes a list of recently accessed pro grams Clicking the All Programs option displays a list of every program installed on your computer You can run a program from this list simply by clicking it Follow the instructions in the TRY IT box to start Microsoft Paint assuming it is installed on your computer TRY IT Start Microsoft Paint 1 Make sure your 4 Click Accessories and then click 5 Wait a few seconds for your computer to computer is on and Paint display the main screen for Microsoft Paint itis displaying the shown below in Windows XP and Vista Windows desktop pun top or Windows 7 bottom Leave Paint lar _ open for use with the next TRY IT eS Windows Live Messenger 2 Click the Start button to display the Start menu Lismimiey Pipe Bie p t We brape Colm Help oO See eee 7 oe eee Getting Started t Sarah A Windows Media Center giocoi Porctures Fo Calculator Games Magnifier j Notepad de Accessories Calculer EE Cornmaned Prompt a Cannie boa Metwork Projector EE Connect to a Pregecter i Getting Started w lath inpol Pasel E DE Rum T Snipping Tool 3 Click All l Saund Recorder Sneky hetes Programs
58. ch legitimate mail Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION PROTECTING YOUR PRIVACY How much information about me has been collected online Information about you is stored in many places and has the potential to be consolidated by government agencies private businesses and crimi nals Some databases are legitimate those maintained by credit bureaus and medical insurance companies for example By law you have the right to ask for a copy of these records and correct any errors you find Many other databases such as those maintained at e commerce sites and those illegally acquired by hackers are not accessible and you have no way of checking the data they contain What s the problem with having my personal information in a few databases The problem is that many companies share their data bases with third parties Your personal data might start in a single legitimate database but that data can be sold to a continuous chain of third parties who use it to generate mass mailings
59. click Flip Rotate click Flip the screen If you see a mes Vertical then click the OK button sage asking if you want to 3 Release the mouse button when save changes click the Don t the shape is complete Your shape is now upside down Save button Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User O 12 SECTION A WORKING WITH MAC SOFTWARE How do I start programs on the Mac When using Mac OS X you can click icons in the dock to easily start programs For programs that are not in the dock you can click the Finder icon and then click the Applications option If you are using a Mac and need to brush up on its controls follow the instructions in the TRY IT box below STRY IT Find out which programs are in the dock 1 Position the mouse pointer over each of the icons in the dock and wait for the program name to appear Use Finder to start a program 1 Click the w Finder icon on the left side of the dock Kind 5 3 Ma Application 164 KB Application 10A MB Application 42 8 MB Application
60. e Federal Communications Commission Figure 9 25b James Leynse CORBIS Figure 9 27 Ben Blankenburg iStockphoto Figure 9 30 DAJ Getty Images Figure 9 31 Gary Herrington Photography Figure 9 37 Helen King Corbis Figure 9 39 Jiang Jin SuperStock Figure 9 40 Comstock Images Alamy Figure 9 41 Stephen Simpson Getty Images Figure 9 42 David Ellis Getty Images Figure 9 43 Ryan McVay Getty Images Figure 9 44 John Foxx The Print Collector Figure 9 45 Javier Pierini Getty Images Figure 9 48 Ingram Publishing Alamy Figure 9 49 Courtesy of Body Composition Laboratory Baylor College of Medicine Figure 9 51 1999 Leslie Laurien Issue 9a Radu Razvan iStockphoto Issue 9b Sherwin Crasto Reuters Landov CinC 9a Getty Images Figure 10 01 Courtesy of www expedition360 com Figure 10 03a Reza Estakhrian Getty Images Figure 10 03b Photodisc Getty Images Figure 10 03c Photodisc Getty Images Figure 10 04a Paul Edmondson CORBIS Figure 10 04b Keith Brofsky Getty Images Figure 10 04c SteveCole Getty Images Figure 10 04d Stockbyte Getty Images Figure 10 04e Glow Images Getty Images Figure 10 04f acilo iStockphoto Figure 10 08a Hill Street Studios Getty Images Figure 10 08b Jupiterimages Getty Images Figure 10 12 Jeremy Horner CORBIS Figure 10 28 Courtesy of Tigris org Figure 10 30 Ronald Karpilo Alamy Figure 10 31
61. e Help menu produces a list of help options where you can enter search terms or browse through topics e User manual Whether you re a beginner or a power user the manual that comes with software can be an excellent resource User manuals can contain quick start guides tutorials detailed descriptions of menu options and tips for using features effectively Many manuals are offered online along with tools you can use to browse through them or look for the answer to a specific question e Help menu The Help menu provides access to on screen documentation which can con gt 0 fa di At amp tain detailed instructions tips and Search FAQs Answers to specific ques a tions can be found by entering search terms consulting the index or browsing through a table of con tents Figure 11 Word Help Word Help and How to Browse Word Help What s new Activating Word Getting help Creating specific documents Converting doquments Viewing and navigating Margins and page setup Headers and footers Page numbers Page breaks and section breaks Writing Formatting Tracking changes and comments Lists Tables Working with graphics and charts Tables of contents and other references Mail merge All Word SECTION A QuickCheck The case that holds a computer s cir 3 On the Mac desktop the cuitry and storage devices is called a n displays a row of program icons unit 4 Some programs include
62. e New Perspectives Labs page appears entire lab When you are ready to quit click the E click gt Operating a Personal Computer button 4 The lab window opens Click the button to view 8 Click the E button again Your Lab QuickCheck objectives for Topic 1 results are displayed 5 Click the button again to view page 1 of the lab 9 Click the OK button to return to the BookOnCD Read the information on the page and then continue through the lab making sure to follow any numbered instructions New Parapectives an Computer Concepts 2012 File Ceartents Web Lire Help iat rman La New Perspectives Labs You can select a screen Saver and you can specify when it should appear On the BookOncCD To aoc iha Mew Parpeeciives Late for Chapher 1 slart he BookOnCO or other BPS Been pridat idon nat bo the lab title basic and ihen cick fr worse WITH BINARY NUMBERS iH THIS LAB YOULL LEARN OFERATING A PERSONAL COMPUTER IN THIS LAS YOULL LEARN To select a screen saver Ow to start Windows compute The difference bebveen the binary number aysam 4 E Rig Ht clic k z ny H Pre on ond the decimal number wyalam the Windows desktop Hal te do aten i pampular ig bn isip mada ad r pensavar How im Gout im Binary Click to start pesene SE ee 2 Click the Properties the lab rider sme ea e How ba sanyveri binary numbers inte decimal option STE Mas
63. ed in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 26 SECTION C PROTECTING E COMMERCE TRANSACTIONS Is online shopping safe Online shopping is generally safe From time to time shoppers encounter fake storefronts designed to look like legitimate merchants but that are actually set up to steal credit card information You can avoid these fakes by making sure you enter correctly spelled URLs when connecting to your favorite shopping sites How safe is my credit card information when I m shopping online Online shopping is not much more dangerous than using your credit card for a telephone order or giving it to a server when you ve fin ished eating in a restaurant Anyone who handles your card can copy the card number jot down the expiration date and try to make unauthorized charges That s not to say that credit cards are risk free Credit cards are surpris ingly vulnerable both online and off Thieves can break into merchant computers that store order information Thieves might even pick up your credit card information from discarded order forms Despite these risks we continue to use credit cards Many people
64. eingersh Getty Images Figure 5 40a Courtesy of Sonos Inc Figure 5 40b Courtesy of D Link Systems Figure 5 40c Courtesy of Toshiba America Information Systems Figure 5 45a Courtesy of Dell Inc Figure 5 45b Courtesy of Intel Corporation Figure 5 48 AP Photo Matthias Rietschel Figure 5 54 Radius Images Alamy Figure 5 55_1 Peter Griffith Getty Images Figure 5 55 _ 2 Hemera Technologies Jupiterimages Figure 5 55 3 GLUE STOCK Shutterstock com Issue 5a David Kilpatrick Alamy Issue 5b Courtesy of Rob Flickenger http www oreillynet com pub wlg 448 CinC 5a Photography courtesy of the University of Illinois at Urbana Champaign Archives CinC 5b Jenkedco Shutterstock com Page 292 Courtesy of Belkin International Figure 6 01 Computer History Museum Figures 6 04 6 12 6 15 6 19 Ocean Corbis Figure 6 14 Courtesy of ZyXEL Figure 6 16a Courtesy of 2Wire com Figure 6 16b Courtesy of Zoom Technologies Figure 6 20 Siri Stafford Getty Images Figure 6 20 Bryce Kroll iStockphoto com Figure 6 20 Jonathan Ling iStockphoto com Figure 6 21 Courtesy of Hughes Network Systems LLC Figure 6 22 Courtesy of Intel Corporation Figure 6 25 Royalty Free CORBIS Figure 6 27 Carlos Cordero P rez La Nacion de Costa Rica Newsco Figure 6 28 Courtesy of Ground Control Figure 6 29 David Young Wolff PhotoEdit Figure 6 30 PRNewsFoto Verizon Wireless Figure 6 32 PRNewsFoto
65. equent rights restrictio 2 ra Cc Q 7a O Licensed to iChapters User Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User 742 CREDITS Page v myVector Shutterstock com Page vi Danilo Moura Shutterstock com Page vii Alexander Kalina Shutterstock com Page viii Jiri Vratislavsky Shutterstock com Page xi Alexander Kalina Shutterstock com Page xii Nataliia Natykach Shutterstock com Page xiv Coprid Shutterstock com Page xv Mostafa Fawzy Shutterstock com Page xvii Gladskikh Tatiana Shutterstock com Page xx Jaimie Duplass Shutterstock com Orientation 2 Courtesy of Sony Electronics Inc Orientation 6 Courtesy of Kensington Technology Group Orientation 7 Photodisc Getty Images Orientation 15 Courtesy of Stephen G Eick SSS Research Inc Orientation 27 AP Photo Darren Hauck Figure 1 06 Walt Disney Pictures courtesy Everett Collection Figure 1 08 Courtesy Everett Collection Figure 1 09 Courtesy of the Software amp Inf
66. erthreats are becoming more troubling Who would imagine that the webcam at the top of your notebook computer screen could be remotely controlled by hackers to capture video of you without your knowledge If you recognize that anything on the Web or in e mail messages is not nec FIGURE 28 essarily private you ve got the right outlook You can use the guidelines in Online Privacy and Safety Figure 28 to keep track of your personal data and stay safe online Guidelines C e J go J YO Te O e Use a password to protect your data in case your computer is stolen e gnore e mail offers that seem too good to be true e Establish a throw away e mail account and use it e Don t leave your computer unattended in public when you have to provide your e mail address to mar places keters and other entities whom you don t want to regu larl ith e Run antivirus software and keep it updated arly correspond wit e Make sure you control who has access to the data e Install software service packs and security patches i you post at social networking sites as they become available but make sure they are legitimate e Do not submit data to a social networking site until you ve read its privacy policy and have made sure that you can remove your data when you no longer want to participate e Install and activate firewall software especially if your computer is directly connected to the Internet by an ISDN DSL satellite or cable c
67. es designed to accompany this textbook To use the Web your com puter must have access to the Internet How do I access the Internet Most computers can be configured to connect to the Internet over telephone cell phone satellite or cable televi sion systems Internet access can be obtained from school computer labs local service providers such as your cable television company and national Internet service providers such as AOL AT amp T Comcast Verizon and EarthLink To expedite your orientation it is assumed that your computer has Internet access If it does not consult your instructor or ask an experienced com puter user to help you get set up How do know if my computer has Internet access The easi est way to find out if your computer can access the Internet is to try it You can quickly find out if you have Internet access by starting software called a browser that s designed to display Web pages Browser software called Internet Explorer is supplied with Microsoft Windows Mac OS X includes a browser called Safari Other browsers such as Firefox and Chrome are also available Follow the steps in the TRY IT box to start your browser HOW TO USE A WEB BROWSER AND SEARCH ENGINE How do I use a browser A browser lets you enter a unique Web page address called a URL such as www google com You can also jump from one Web page to another by using links Links are usually underlined and when you position the arrow sh
68. file located Recent Places somewhere other than the Documents folder click this button and then select a device and folder Write down the location so you don t forget it Enter the information requested In this box Jones enter a unique identi fication such as your Student ID 123456785 student ID number Class Section csc 1014 First name Sam Last name Cancel Save in E Documents 5 Use the dialog box to specify the location and name for your Tracking file See the illustra tion at right for Windows or the illustration below for Macs 6 After selecting a name and location for your Tracking file Enter a name for your click the Save button i Tracking file Your Click Save instructor might supply to create 7 Back at the Tracking Options guidelines for this step the file dialog box make sure there is a check mark in the box labeled Save Tracking data then click the OK button Now File name your Tracking file is ready to Save as type receive your scores Enter a name for your Tracking file Your instructor might supply guidelines for this step Click this button to specify the location for your Tracking file On the Mac Where ay Documents ES the Documents folder is a f good location Click Save to create the file Cancel Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in
69. ges CinC 12a Agricultural Research Service a division of the United States Department of Agriculture Photo supplied by GeoVantage Inc CinC 12b AP Photo Hays Daily News Steven Hausler Critical Thinking Icon Image Source Corbis Group Project Icon amanaimagesRF Getty Images Cyberclassroom Icon Masterfile Multimedia Project Icon Fuse Getty Images Resume Builder Icon Tetra Images Getty Images Globalization Icon lan McKinnell Getty Images Issue Icon Tetra Images Corbis Computers in Context Icon Creative Crop Getty Images All other figure images MediaTechnics Corp BlackBerry RIM Research In Motion and related trademarks names and logos are the property of Research In Motion Limited and are registered and or used in the U S and countries around the world AMD the AMD Arrow logo and combinations thereof are trademarks of Advanced Micro Devices Inc Check Point Software Technologies Ltd All rights reserved Check Point Check Point logo ZoneAlarm ZoneAlarm Anti Spyware are trademarks or registered trademarks of Check Point Software Technologies Ltd or its affiliates ZoneAlarm is a Check Point Software Technologies Inc Company All other product names mentioned herein are trademarks or registered trademarks of their respective owners The products described in this document are protected by U S Patent No 5 606 668 5 835 726 6 496 935 6 873 988
70. ghts restrictions require it CREDITS Figure 7 29 Nicholas DeVore Getty Images Figure 7 31 Richard Griffin Shutterstock com Figure 7 31 7 32 Jupiterimages Figure 7 37_1 Jack Z Young Shutterstock com Figures 7 37_2 7 37_3 Wallenrock Shutterstock com Figures 7 39 7 41 Creative Crop Getty Images Figures 7 39 7 41 Ocean Photography Veer Figure 7 48a Courtesy of Webroot Software Figure 7 48b Courtesy of Computer Associates Figure 7 48c 2010 Check Point Software Technologies Ltd All rights reserved Issue 7a Ron Chapple Getty Images Issue 7b Andersen Ross Getty Images CinC 7a Lifetime courtesy Everett Collection CinC 7b Courtesy of MIT Media Lab Photo by Lynn Barry Figure 8 04 Courtesy of Logitech Figure 8 10 Sandy Jones iStockphoto Figure 8 13 Courtesy of Learning Technology Services University of Wisconsin Stout Figures 8 14a d f Courtesy of SanDisk Corporation Figure 8 14e Courtesy of Hitachi Global Storage Technologies Figure 8 40 Rodolfo Arpia Alamy Figure 8 43 Courtesy of SANYO North America Figure 8 43 Courtesy of JVC America Figure 8 43 Friedrich Saurer Alamy Figure 8 43 Courtesy of RED Digital Camera Figure 8 44 Corbis Premium Collection Alamy Figure 8 55 Getty Images Figure 8 56 Courtesy of Sling Media Inc Issue 8a Daniele Mattioli Anzenberger Redux CinC 8a TM amp Copyright 20th Century Fox
71. he mouse or the arrow keys Study Figure 8 for an overview of important computer keys and their functions FIGURE 8 Computer keyboards typically include special function keys The Esc Escape key cancels D The Windows key on a PC The Home key takes you to the m Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio an operation Function keys activate com mands such as Save Help and Print The command asso ciated with each key depends on the software you are using The Print Screen key prints the contents of the screen or stores a copy of the screen in memory that you can print or manipulate with graphics software opens the Start menu The Page Up key displays the previous screen of information The Page Down key displays the next screen of information The Backspace key deletes one character to the left of the insertion point The Insert key switches between insert mode and typeover mode Fa ai wi a i a f Fe FIO Pn Fi2 a i amp A a ia 4 5 6 7 8 9 0 aj Hg 7 Ki L F iw The Tab key can move your current typing
72. hows the 7 gt Update engine and virus definitions main screen for avast antivirus software eo iy as 121005 0 Explore your antivirus software to make Release date 10 5 2012 6 49 34 AMI sure it is configured to do the following ee ee The actual nuenber of mahvare samales that ssa een detect ic much hohe ar definition can identify tens hundreds or ewen thousands of unique sarnples e Scan incoming e mail Last update attemat 20 minutes aga e Run continuously in the background a feature sometimes called Auto Protect gt Update Program Curent vecio 50 677 e Block malicious scripts 3 Check the date of your last full system scan If it was more than one week ago you should check the settings that sched ule antivirus scans Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 24 PREVENTING INTRUSIONS Is it risky to go online The Internet offers lots of cool stuff music downloads movie reviews and trailers online shopping and banking con sumer information blogs social networking sites news
73. it Licensed to iChapters User ORIENTATION 0 23 AVOIDING VIRUSES What s so bad about computer viruses The term virus has a technical meaning but many people use the term loosely when referring to malicious programs that circulate on disks in e mail attachments and on the Internet This malware as it is sometimes called can steal your data destroy files or create network traffic jams It might display an irritat ing message to announce its presence or it might work quietly behind the scenes to spread itself to various files on your computer or mail itself out to everyone in your e mail address book After a virus takes up residence in your computer it is often difficult to disin fect all your files Rather than wait for a virus attack you should take steps to keep your computer virus free e J go J YO re O How can keep viruses out of my computer It helps to avoid risky behaviors such as downloading pirated software opening e mail attach ments from unknown senders installing random social networking plug ins gambling online and participating in illegal file sharing Windows users FIGURE 20 should install antivirus software such as the packages listed in Figure 20 Popular Antivirus Software Because fewer viruses target Macs OS X users who don t engage in risky online activities sometimes opt to work without antivirus software Norton AntiVirus Plus a McAfee VirusScan If you use antivi
74. jump to question 2 and 1 accece ME is typicany re then type your answer Don t worry if you don t Err ane know the answer you haven t actually read access devices Chapter 2 yet Just make a guess for now 2 A magnetic storage device uses a re ned to magnetize part 7 When you have answered all the questions eee eee A hard disk drive that is rated at a speed of 7 click the CHECK ANSWERS icon The com EE eee puter indicates whether your answer is correct to your data than a drive rated at 54qlethdintabios or incorrect Click the OK button to check answers check each answer 8 Continue to click OK to check the rest of your answers 9 When you ve reviewed all your answers the computer presents a score summary Click OK to close the dialog box Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 36 SECTION D NEW PERSPECTIVES LABS What about labs Your textbook gives you access to two kinds of labs New Perspectives Labs are part of the BookOnCD Student Edition Labs are located at the NP
75. layer Q Help and Support e Tour Windows XP pe Search D E Windows Povie Maker Internet All Programs gt W ntemet Eplorer g E mail baat Windows Mail a Windows UWhtimate Etras Windows Medis Player Windows Phote Gallery GR windows Live Messenger Download Windows DVO Maker fial Windows Meeting Space Ean Windows Live Messenger ap Paint kint Search P k E Sy Magnifier a noema Default Programs ppor Taskbar icons Search programs and files Mahn down Gos iA i Start button All Pregrarns F an SECTION A FIGURE 4 Windows desktop components as they appear in Windows XP top Windows Vista middle and Windows 7 bottom Desktop icons can represent programs documents folders or other electronic tools The taskbar contains the Start button and Notification area Taskbar buttons help you keep track of programs that are in use The Start button displays the Start menu which lists programs installed on your computer The Start menu lists application and utility programs installed on your computer The Notification area displays the current time and the sta tus of programs devices and Internet connections Notification area J AM ee ll Ai aT Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in pa
76. log out from password protected sites Delete cookies and Internet history Reboot the computer at the end of your session e Regard e mail messages as postcards that can be read by anyone so be careful what you write e Cover the webcam on your computer with a piece of tape when it is not in use dependable way to reduce the amount of spam you receive True or false oO CHECK ANSWERS Ofer BookOnCD SECTION D ELECTRONIC VERSIONS of your textbook are designed to be portable interactive learning environments This section offers an interac tive overview of the popular BookOnCD BOOKONCD BASICS What is the BookOnCD The BookOnCbD is a multimedia version of your textbook with photos that come to life as videos diagrams that become animations screenshots that open to guided software tours and computer scored activities that can help improve your test scores What s the most effective way to use the BookOnCD If you re accustomed to reading documents and Web pages on your computer screen you can use the BookOnCD for most of your reading and study ing As you work through a chapter you ll be able to view the multimedia elements in context and take QuickChecks at the end of each section If you prefer to read from your printed textbook you can start the BookOnCD whenever you want to view a multimedia element or work with a computer scored activity How do I start the BookOnCD To start the BookOnCD on any
77. n Use a descriptive name for the file that holds your document S Folder a File folde File folde File folde File folde File folde File foldz File folde File folde File folde FIGURE 12 When typing text you can use the following keys to move within a document and make revisions e Backspace Delete the char acter to the left of the insertion point e Delete Delete the character to the right of the insertion point e Enter End a paragraph and begin a new line e Arrow keys Move the inser tion point up down right or left FIGURE 13 It is a good idea to save your document every few minutes even if it is not finished When you save a document use the lal Save icon at the top of the screen Your computer is probably configured to save documents on the hard disk in a library called Documents or a folder called My Documents There is no need to change that until you gain more experience File names can be several words long just do not use the symbols in the file name Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any
78. nd clinics Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION O 21 How do I get my e mail As with sending mail the way you get mail FIGURE 18 depends on your e mail system In general clicking the Send Receive but ton collects your mail from the network and stores it in your Inbox Your e mail software displays a list of your messages The new ones are usually shown highlighted or in bold type You can click any message to open it read it and reply to it as shown in Figure 18 When e mail software displays your Inbox you can e Open a message and read it e Reply to a message e Delete unwanted messages a good idea to minimize the size of your mailbox How do log off When working with a Webmail account it is important to use the Log out or Sign out link before you close your browser Taking this extra step makes your e mail less vulnerable to hackers e Forward a message to some one else a Sign out link Settings Help Sign out C e J go J
79. nstructor s WebTrack address If your instructor will be collecting your scores with WebTrack make sure you have your instructor s WebTrack address Write it here NEW PERSPECTIVES Computer Concepts 2012 Parsons Oja Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it 0 4 Getting Started SECTION A WHEN YOU USE the New Perspectives on Computer Concepts textbook you will not only learn about computers you ll also use computers as learning tools Therefore it is a good idea to have a basic understand ing of how to use your computer Section A is designed to get computer novices quickly up to speed with computing basics such as turning on com puter equipment working with Windows or Mac OS using a mouse and computer keyboard and accessing Help Read through this section while at a computer so that you can do the TRY IT activities COMPUTER EQUIPMENT What do I need to know about my computer Your computer the one you own the one you use in a school lab or the one provided to you at work is technically classified
80. ny suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User NEW PERSPECTIVES n a x m v gt oie amp CONTAINS A Parsons Oja BookOnCD FOR A FULLY INTERACTIVE LEARNING EXPERIENCE Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User Chapter Contents SECTION A GETTING STARTED Computer Equipment How to Turn Your Computer On and Off Turn Your Computer On Windows Basics Mac OS X Basics Mouse Basics Use Your Mouse Keyboard Basics Working with Windows Software Start Microsoft Paint Use the Toolbar or Ribbon Use the Ribbon or Menu Bar Use the Sizing Buttons Working with Mac Software Find Out Which Programs Are in the Dock Use Finder to Start a Program Use a Menu and Dialog Box Close a Program Help SECTION B DOCUMENTS BROWSERS AND E MAIL Creating Documents Create a Document G
81. o the sender s Web site and try to opt out from there If you are tempted to use an opt out link directly from an e mail message carefully examine the link s URL to make sure you ll connect to a legitimate Web site TRY IT Check your privacy 1 Start your browser and go googling by connecting to www google com Enter your name in the Search box What turns up 2 Connect to www peopledata com Enter your name and state of resi dence Click the Search button Notice all the information that s offered 3 Connect to www ciadata com and scroll down the page to view the kind of information anyone can obtain about you for less than 100 4 Read about your rights to view credit reports at the Federal Trade Commission site www ftc gov bcp menus consumer credit rights shtm Q 29 FIGURE 27 Using public computers poses security risks from people look ing over your shoulder spyware that collects your keystrokes and the footprint you leave behind in cookies and tempo rary Internet pages To minimize risks when using public computers e Be sure to log out from all sites and close all browser windows before quitting e Delete cookies and browser history e Avoid using public comput ers for financial transactions such as filing your taxes e Reboot the computer before you quit e f you re using your own por table apps from a USB drive make sure your computer is running antivirus software Copyright
82. ocent consumers out of their life savings The Internet has its share of con artists too who run e mail scams designed to col lect money and confidential information from unsuspecting victims E mail scams are usually distributed in mass mailings called spam What do need to know about spam The Internet makes it easy and cheap to send out millions of e mail solicitations In the United States the CAN SPAM Act requires mass mail messages to be labeled with a valid subject line Recipients are supposed to be provided with a way to opt out of receiving future messages Legitimate merchants and organizations comply with the law when sending product announcements newsletters and other messages Unscrupulous spammers ignore the law and try to disguise their solicitations as messages from your friends chat room participants or co workers Figure 25 Subject Welcome home Receive your Vlagrka It s new and successful Ils spam dangerous Some mass mailings contain legitimate informa tion including daily or weekly newsletters to which you ve subscribed Many mass mailings however advertise illegal products Others are outright scams to get you to download a virus divulge your bank account numbers or send in money for products you ll never receive Beware of e mail containing offers that seem just too good to be true Messages about winning the sweepstakes or pleas for help to transfer money out of Nigeria Figure 26 are scams to
83. od idea to back up your Tracking file using the Back Up Tracking File option on the File menu What are chirps A chirp is a short message similar to a Twitter style tweet You can use chirps to send queries to your instructor Your instructor might also use chirps as a classroom polling system Chirps work through C e J go J YO re O WebTrack TRY IT Send your Tracking data and send a a ti a chirp File Contant Web Links Heh 1 Click File on the BookOnCD menu a a a a a oaie Make sure your bar then click Submit Tracking Data the ALU The steps in thia cycla are summarized in Figure 1 38 instructor s WebTrack cans spe ID is entered here 2 Make sure your instructor s nstruction Ss struction i WebTrack address is correctly displayed in the Tracking Data i mpnstructar schooLedu Destination dialog box then click msrp es ns peenar inten bee ween ci Continue i aes Whal role does the control unit play The instructions That a com 3 Your computer opens a browser puter is supposed to process for a particular program are held in memory os iatmuctra querion ype inthe window makes an Internet connection qlecad nd pa GA PA AE E nal aain antes Mee a and contacts the WebTrack server fat mirena into ks intructonragiter From there the contol nit can smamederenioyeur questo puters a Face ino ks i rs einai aoe TOUT ERAGE 4 When the WebTrack screen casing an suton Fm pat sure Tundersand how the cnt a
84. onnection e Avoid using opt out links in mass mailings unless you e Do not publish or post personal information such l os are certain the sender is legitimate as your physical address passwords Social Security number phone number or account numbers on your Web site in your online resume in your blog or in other online documents e Be wary of contacts you make in public chat rooms and social networking sites e Don t click pop up ads e Install and activate antispyware and ad blocking software e Do not reply to spam QuickCheck ase 4 E mail scams are usually distributed in mass mailings called 2 fs software can block intru 5 Using opt out links is the most secure and 1 Internet security suites usually include antivirus and antispyware tools True or false sion attempts such as hacker probes 3 Most Web browsers include settings for blocking pop up ads True or false Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio e When using public computers avoid financial transactions if possible Make sure you
85. ools for finding addresses and phone numbers so withholding that information provides only a thin security blanket Most social networking sites depend on references and friends of friends links to establish a trusted circle of contacts Trusted is the key word here When using social networking sites make sure you understand what information is being shared with friends what information is available to strangers on the site and what data is available publicly to search engines Be careful about revealing personal information at social networking sites including blogs chat rooms and virtual worlds such as Second Life Many online participants are not who they appear to be Some people are just having fun with fantasy identities but others are trying to con people by telling hard luck stories and faking illnesses Resist the temptation to meet face to face with people you ve met online without taking precautions such as taking along a group of friends And what about the site itself Social networking sites like any online business are always looking for ways to make a profit Every partici pant is a valuable commodity in a database that can be used for marketing and research Before you become a member read the site s privacy policy to see how your personal data could be used Remember however that privacy policies can change especially if a site goes out of business and sells its assets You should also find out if you can remo
86. ormation Industry Association Figure 1 10 Courtesy of Nokia Figure 1 11 AP Photo Pavel Rahman Figure 1 14 Courtesy of Dell Inc Figure 1 14 Courtesy of Apple Figure 1 15 Courtesy of Silicon Graphics International Figure 1 17 Courtesy of Silicon Graphics International Figure 1 18 Courtesy of IBM Corporation Figure 1 19 Image courtesy of the National Center for Computational Sciences Oak Ridge National Laboratory Figure 1 20 Courtesy of Motorola Figure 1 20 BlackBerry Curve image courtesy of Research In Motion Figure 1 20c Courtesy of Nokia Figure 1 20d Courtesy of Apple Figure 1 21 Courtesy of Apple Figure 1 22 Dennis Rozie Shutterstock com Figure 1 30 Courtesy of Intel Corporation Figure 1 41 Brand X Pictures Alamy Figure 1 44 Courtesy of www rantsandraves co uk Issue 1a Warner Bros courtesy Everett Collection CinC 1a Image courtesy of The Advertising Archives CinC 1b Napster advertisement reprinted with permission of Napster LLC Figure 2 03b Courtesy of Shuttle Computer Group Inc http us shuttle com Figure 2 03c Courtesy of Hewlett Packard Company Figure 2 04a Courtesy of Hewlett Packard Company Figure 2 04c Courtesy of Fujitsu Technology Solutions Figure 2 05 Courtesy of Hewlett Packard Company Figure 2 06 Courtesy of Dell Inc Figure 2 07 Courtesy of Dell Inc Figure 2 11 Hugh Threfall Alamy Figure 2 12 Courtesy of Intel Corporation Figure 2 16a
87. ormation on the Web The best sources of information are easy to access dependable and pref erably free Sites such as Wikipedia Answers com Whatls com and HowStuffWorks are great sources for general information and research ing topics for computer courses When you re looking for information on the Web remember that virtually anyone can post anything Consequently some information you encounter might not be accurate To check the quality of information provided by a Web site you can cross check facts with other sites Be sure to check when the material was posted or updated to determine if it is current You might also consider the informa tion source Blogs and YouTube videos often express opinions rather than facts How does Wikipedia work Wikipedia is an encyclopedia that is writ ten and maintained by the people who use it More than ten million in depth articles on a vast range of topics have been submitted and updated by users many of them experts Wikipedia information tends to be accurate because users are continually reading the articles and correcting inaccu rate or biased information However some vandalism occurs and from time to time a few articles contain false or misleading information Most Wikipedia articles include a History tab that tracks changes Check the date of the last change to determine if the information is current Articles also include a Discussion tab that can help you spot controversial aspects of
88. ormation you ve entered and jot down your login Google that includes more relevant search results and recommendations Learn More O Enable Web History You can uncheck this 4 box for better privacy 2 Q fa O name and password By clicking on I accept below you are agreeing to the Terms of service above and both the Program Policy and the Privacy Policy 8 Read the Terms of Service and if you agree click the accept button That s it You now have a Gmail account 4 accept Create my account J Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User O 20 Is Webmail better than local e mail Both Web based and local e mail have their advantages and disadvantages Webmail accounts are definitely easier to set up and you can use them from any computer with an Internet connection Webmail accounts are also ideal for throw away accounts What is a throw away e mail account Whether you use local mail or Webmail for your regular correspondence you might consider creating one
89. ost mice also include a scroll wheel mounted between the left and right mouse buttons Other mice include additional buttons on the top or sides Figure 6 Scroll wheel How do I use a mouse Hold the mouse in your right hand as shown in Figure 7 When you drag the mouse from left to right over your mousepad or desk the arrow shaped pointer on the screen moves from left to right If you run out of room to move the mouse simply pick it up and reposition it The pointer does not move when the mouse is not in contact with a flat surface There are several ways you can manipulate on screen objects Although you might not be able to manipulate every object in all possible ways you ll soon learn which mouse actions are allowed for each type of control The following list describes your repertoire of mouse actions Action How to Result Press the left mouse button once Cue and then immediately release it Select an object Press the left mouse button twice Double click in rapid succession without moving Activate an object the body of the mouse Press the right mouse button once Ai and then immediately release it Display a shortcut menu Hold the left mouse button down Drag while you move the mouse Move an object Left mouse button Additional buttons SECTION A FIGURE 6 For basic mousing you only need to use the mouse but tons but the scroll wheel is also handy Right mouse button FIG
90. ppears make sure the information 5 STN displayedis correct then click the S pore Submit button s firms your data has been submitted Enter your i uestion here you can close the browser window ALU a5 5 When you see a message that con ae 6 To send a chirp click the Chirp but ton on the BookOnCD toolbar 7 When the Chirps panel appears enter your message in the box labeled Your Message 8 Click the Send button 9 Close your BookOnCD QuickCheck SECTION D 1 Figures in the book marked with an amp sign morph 3 To save your scores you have to create a n into multimedia screentours animations and Jfk videos True orfase ___ 4 New Perspectives Jare 2 When you use the NP2012 BookOnCD a n divided into topics and each topic ends with a oo button appears if your QuickCheck instructor has posted comments or lecture notes 5 WebTrack provides a way to submit scores to your instructor True or false Oooo gt CHECK ANSWERS Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio 0 40 NP2012 CourseMate
91. r a message on the screen 2 go Q TE O Licensed to iChapters User O 10 SECTION A What do Alt and Ctrl mean The Alt and Ctrl keys work with the letter EROE O NGTE keys If you see lt Ctrl X gt Ctrl X Ctrl X Ctrl X or Ctrl X on the screen or TERMINOLOGY NOTE in an instruction manual it means to hold down the Ctrl key while you press Most Mac software uses the X For example Ctrl X is a keyboard shortcut for clicking the Edit menu command key marked with a6 and then clicking the Cut option A keyboard shortcut allows you to use the _ instead of the Ctrl or Alt keys for keyboard rather than the mouse to select menu commands keyboard shortcuts What if make a mistake Everyone makes mistakes The first rule is don t panic Most mistakes are reversible The hints and tips in Figure 9 FIGURES should help you recover from mistakes Most mistakes are easy to fix What Happened What to Do Typed the wrong thing Use the Backspace key to delete the last characters you typed Selected the wrong menu Press the Esc key to close the menu Opened a window you didn t mean to Click the X button in the upper corner of the window Computer has hung up and no longer Hold down the Ctrl Shift and Esc keys and then follow instruc responds to mouse clicks or typed commands _ tions to close the program Pressed the Enter key in the middle of a Press the Backspace key to paste the sentence back together senten
92. rall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION BLOCKING SPYWARE AND POP UP ADS 2D FIGURE 23 Are some Web sites dangerous When you access Web sites data is transferred to your computer and displayed by your browser Most of this data is harmless but malicious HTML scripts rogue ActiveX compo nents and spyware have the potential to search your computer for passwords and credit card numbers monitor your Web browsing habits for marketing purposes block your access to legitimate Web sites or surreptitiously use your computer as a Some pop up ads contain fake warnings about viruses spy ware and intrusion attempts WARNING Your computer may be infected with spyware staging area for illicit activities If your computer has been running slower than usual it may be infected with adware or spyware To scan Spyware is the most insidious threat It often piggybacks on your comptuer for such infections click OK below pop up ads and activates if you click the ad window Some spyware can begin its dirty work when you try to click the Close button to get rid of an ad How can I block spyware The first line of defense is to never click pop up ads especially those with dire warnings about your computer being infected by a virus or spyware Figure 23 To close an ad right click its
93. ransmit messages from one computer to another Like regular mail e mail messages are sent to a mail box where they are kept until the recipient retrieves the message Messages might arrive at their destination within seconds or might not arrive for a few hours Once sent e mail messages cannot be retrieved What do I need to use e mail To send and receive e mail you need an Internet connection an e mail account and software that enables you to compose read and delete e mail messages An e mail account consists of an e mail address Figure 17 a password and a mailbox You can usually obtain an e mail account from your Internet service provider your school or a Webmail provider such as Hotmail Yahoo Mail or Gmail Webmail providers store your mail online To access your mail simply use your browser In contrast local mail such as Microsoft Outlook transfers mail to your computer and requires you to use special e mail software instead of a browser How do I get a Webmail account Registering for a Webmail account is easy and many online e mail providers offer free basic service Work with the TRY IT below to see how TRY IT Get a Web based e mail account 1 In the Address bar of your New to Gmail It s free and easy browser enter www gmail com Create an account 2 When the Gmail window __ E appears click the button labeled AG nak Nk feaiures Create an account 3 Follow the directions to enter
94. right Act without the prior written permission of the publisher For product information and technology assistance contact us at Cengage Learning Customer amp Sales Support 1 800 354 9706 For permission to use material from this text or product submit all requests online at www cengage com permissions Further permissions questions can be emailed to permissionrequest cengage com Library of Congress Control Number 2011920720 ISBN 13 976 1 111 5290 7 9 ISBN 10 1 111 52907 8 Course Technology 20 Channel Center Street Boston MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe including Singapore the United Kingdom Australia Mexico Brazil and Japan Locate your local office at international cengage com region Cengage Learning products are represented in Canada by Nelson Education Ltd To learn more about Course Technology visit www cengage com course technology To learn more about Cengage Learning visit www cengage com Purchase any of our products at your local college store or at our preferred online store www cengagebrain com Printed in the United States of America 123456715 14131211 Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that a
95. rmark Indent Spacing J0 Size ka SH Page colors EE o Se Opt Margins __ ay i sat 7 7 ES Columns oe Gi Page Borders 3 0 LO pt E Page Background Paragraph Type your document into the workspace Globalization Project Press the Enter key only at the end of titles Coca Colonization is ate and paragraphs but a Arrange The ribbon offers controls similar to those on menus and toolbar American culture through do not press Enter e Internet and other digital technologies when you reach the p hop music reality television and artif right margin ister and farther weaver and the same expose Americans to cal insertion point marks your place faa s 120 ia Save Ag JOE p Libraries Documents E r Organize kai New folder E mpana PLITS E Pro I UpdatedPDFs Name USE DRIVE F J microsoft Realluzion a Sy Libraries T junk Save your work 2 Documents aiii in the Documents Eier T Da WebCam Cent folder or library Documents library Includes 2 locations Yh an di My Weblog Posts for now H Videos bs SealedMedia A Visual Studie 2008 gt a Homearoup il Serelten i c Fires br GPG LAS Gunes Arrange byi Date modifi cd 11 2 2008 116 AM 11 2 2008 120 Ani 11 0 2009 3 13 PM 12 4 2008 147 aM 271072009 2 42 Ph 12 21 2009 4 45 PMI WeLA0L0 223 PM 3 23 2000 523 PM 3 2010 3 32 PM Click the Tage Add atag Save butto
96. rn on the system unit Most computers take a minute or two to power up and you might be required to log in by entering a user ID and password Your computer is ready to use when the Windows or Mac OS desktop Figure 4 and Figure 5 on the next two pages appears on the computer screen and you can move the arrow shaped pointer with your mouse How do I turn it off Your computer is designed to turn itself off after you initiate a shutdown sequence When using a Windows computer click the on screen Start button select Shut Down or Turn Off Computer and fol low the instructions on the screen When using a Mac click the Apple icon in the upper left corner of the screen and select Shut Down After the com puter shuts off you can turn off the monitor speakers and printer When using computers in a school lab ask about the shutdown procedure Your lab manager might ask that you log out but do not turn the computer off STRY IT Turn your computer on 1 Locate the power switch for any devices connected to your computer and turn them on 2 Locate the power switch for your computer and turn it on 3 If a message asks for your user ID and or password type them in and then press the Enter key on your com puter s keyboard 4 Wait for the desktop to appear Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may
97. rt Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION MAC OS X BASICS What is Mac OS Mac OS is the operating system used on many of today s Macintosh computers The most recent version of this operating system is Mac OS X featured in Figure 5 How similar are the Mac and Windows desktops The Mac and Windows desktops have many similarities such as the use of icons menus and rectangular on screen windows However there are notable differ ences in the two desktops such as the Mac desktop s dock Apple icon and fixed menu bar If you switch between computers running Windows and Mac OS X you should be aware of these differences What is the dock The dock is a collection of icons that represent pro grams files and other activities Usually the dock is located at the bottom of the screen but it can be configured to appear on the left side or right side of the screen if that better suits the way you work You can add icons to the dock for programs you use frequently so they are easily accessible What is the Apple icon The Apple icon is the first icon on the menu bar located at the top of the Mac desk
98. rus software configure it to run continuously whenever your computer is on You should make sure your antivirus software is set to scan Kaspersky Anti Virus for viruses in incoming files and e mail messages At least once a week F Secure Antivirus your antivirus software should run a full system check to make sure every Panda Antivirus file on your computer is virus free Trend Micro Antivirus As new viruses emerge your antivirus software needs to update its virus AVG Anti Virus definition file It gets this update as a Web download If you ve selected the avast auto update option your computer should automatically receive updates as they become available STRY IT Get familiar with your antivirus software 4 Check the date when your computer last received virus definitions If it was more than 1 In Windows click the Start button and then one week ago you should make sure your select All Programs On the Mac use Finder antivirus software is configured to receive auto to access the Applications folder Look for matic live updates antivirus software refer to Figure 20 for a list Open your antivirus software by clicking it Can t find any If you are using your own computer and it doesn t seem to have anti virus software you can connect to an antivi rus supplier s Web site and download it em UPDATE s a mete woes Kee if SEC 2 Each antivirus program has unique Say Wou features The figure on the right s
99. site to show pop ups recommended Exceptio Mses t Select a setting for the Internet zone your version of IE offers a Pop up Blocker make sure its box contains a check mark so that it is activated Firefox Click Tools select Options and then click Content Make sure there is a check mark in the box Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that save information that can be used to contact you without your explicit consent Restricts first party cookies that save information that can be used to contact you without your implicit consent C e J go J YO re O for Block pop up windows Safari Click Safari on the menu bar Make sure there is a check mark next to Block Pop Up Windows Pop up Blocker Prevent lt pop up windows frorn Chrome Click the Wrench Tools icon select Options and then click Under the Hood and click the Content settings button Under Pop ups make sure that the Do not allow option is selected RF Turn on Pop up Blocker 2 If your browser does not seem to offer antispyware and pop up blocking you can use the Start button to see if one of the security suites listed in Figure 21 has been installed If your computer seems to have no antispyware or ad blocking software you might want to download some and install it Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicat
100. t Save amp Send and then select Send as Attachment shown below e In Word 2007 click the lt 3 Office button point to Send and then select E mail e n Word 2003 OpenOffice Writer or NeoOffice Writer click File and then select Send or Send To Wi Globalaton Proyect docx done When you re ready to quit you can close the document by H soe r Save amp Send clicking the Close option from the l save as File tab File menu or Office button BF Open Clase When you want to close your word a eom processing software click the Ez info Close button Windows or click the en FA Save to SharePoint program name on the menu bar and i Mew Publish as Blog Post then select Quit Mac Prani File Types Fd Change File Type Help i Create POR APS Document 1al Add Ins d STRY IT Save a document 1 Click the m Save icon located Create a document 1 Click the Start button Fage Layout Feferences Mallings Microsoft Word lacme Review WEY Aeromat 7 Send Using E mail Attach a copy of ze this document to an e mall Send as Everyone Attachment receives separate copies of this document Changes and teedback need bo be Incorporated marvually Create an rnail that contains a Print a document close it and exit your word processing application Windows or click the Finder icon and select the Applications option Mac 2 Look for Microsoft Word
101. that clog up your Inbox with marketing ploys unwanted newsletters and promotions for useless products Can control who collects information about me To some extent you can limit your exposure to future data collection by supplying personal data only when absolutely necessary When filling out online forms con sider whether you want to or need to provide your real name and address Avoid providing merchants with your e mail address even if you re prom ised a 5 coupon or preferred customer status A small reward might not be worth the aggravation of an Inbox brimming with spam and e mail scams You should also be careful when using public computers Figure 27 Can I opt out Some mass e mailings give you a chance to opt out so that you don t receive future messages Opting out is a controversial prac tice On mailings from reputable businesses clicking an opt out link might very well discontinue unwanted e mail messages However opting out does not necessarily remove your name from the database which could be sold to a third party that disregards your opt out request Scammers use opt out links to look for live targets perhaps in a database that contains lots of fake or outdated e mail addresses By clicking one of these opt out links you ve played right into the hands of unscrupulous hackers this action lets them know that your e mail address is valid Most experts recommend that you never use opt out links but instead go t
102. til you see page 56 Vapi denies 4 Click the Back button twice to go back to the first page of Chapter 2 5 Click the white box on the right side of Go to Page Type 89 then click the Go to Page button 6 Click the Go to Page button Now you should be back at the first page of Chapter 2 7 Scroll down the page until you can see the Chapter Contents listing As shown at right you can use this list to quickly jump to Sections A B C D or E Issues Computers in Context labs and end of chapter activities 8 Click oO Section D to jump to Section D To jump to a spe cific page enter the page number in the box then click the button 11 Mihia tee basi wawy in mid deiren iaa SECTION D FLASH PLAYER The BookOnCD requires Adobe Flash Player for display ing labs The Flash Player is installed on most computers If the BookOnCD cannot find your Flash Player when it starts you ll be directed to go online to download and install it FIGURE 29 Key Features of the BookOnCD Menu Bar and Toolbar The Next but ton displays the next page Canes r Bock Next gt The Close button closes the BookOnCD on Windows computers The Back but ton displays the previous page Lrirtiig 1 Mla oti rs Aer esdig thi chapeer poe val be able ip suas the fni kanp parior by completieg the oetcomes baned Leeming Diaries hakai ari page 115 What are the compara ef a Grice period ci nyem
103. time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION How do print a document To print a document simply click the File tab File menu or Office button and then select Print Your computer displays a window containing a series of print options If you want to print a single copy of your document these settings should be correct so you can click the Print or OK button to send your document to the printer Can send a document to my instructor You can e mail a docu ment by using the Send option accessed from the File tab File menu or Office button Figure 14 To do so you must know your instructor s e mail address Documents that you send along with e mail messages are referred to as attachments You ll learn more about e mail later in the Orientation but keep this option in mind because it is a handy way to submit assign ments such as projects and term papers How dol find my documents again in the future If you want to revise a document sometime in the future simply start your word pro cessing software click the File tab File menu or Office button and then click Open Your computer should display a list of documents stored in the Documents folder Locate the one you want to revise and double click it What should I do when 1 m FIGURE 14 Most word processing pro grams offer an option for sending a document as an e mail attachment e n Word 2010 click the File tab selec
104. tm and follow the instructions When the MacPac page appears you might want to print out the instructions so that you can easily follow them C e J go J YO re O The MacPac file is about the size of two or three iTunes songs so it does not take long to download it Once the file is downloaded follow the rest of the instructions to get your MacBookOnCbD ready to go How do I start the MacBookOnCD The setup process puts a MacBookOnCbD folder icon on your desktop The TRY IT below guides you through the startup process STRY IT Start the MacBookOnCD THESE INSTRUCTIONS ARE FOR MAC OS X USERS ONLY yee geroer NP2012 BookOnCD 1 Make sure you have an NP2012 g BookOnCD exe oe Oo BookOnGbD folder icon on your Mac desk fie F bookoncd ini top If not refer to the material at the top of ren F BookOnCD key this page for instructions on how to convert j E oesi your BookOnCD to run on the Mac EA inie 2 Double click the NP2012 BookOnCD EE desktop icon 5 Today 3 When the Finder window appears look for the MacBookOnCD program NOTE You might also have a BookOnCD exe program but that is NOT the program that runs on the Mac This is the Windows version of the BookOnCD 4 Double click MacBookOnCD and your mg digital textbook should open and display Digital Basics the Tracking Options dialog box Computers and The BookOnCD allows you to save your scores for QuickChecks practice tests Saaana ih
105. to display ma cas Da Windows Leplecer Windoss Mobility Center E Woedhad kb Ease of Acess n Dyrham Teale 4 Eak a list of all software installed on your computer Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 11 How do tell the software what I want to do Word processing photo FIGURE 10 editing and other software designed for use on computers running the The title bar displays the title Windows operating system is referred to as Windows software Most Windows of the software the name of the software works in a fairly uniform way and uses a similar set of controls current data file and the win Each software application appears within a rectangular area called a 0W sizing buttons window which can include a title bar a menu bar a ribbon a work The Minimize button shrinks space and various controls shown in Figure 10 the window to a button at the bottom of the screen The Maximize button stretches seper neg J the window to fill the screen
106. top It is always visible regardless of the program you re using Clicking the Apple icon displays a menu that you can use to configure preferences for your computer display and devices The Apple icon menu also includes options for logging out and shutting down your computer How does the fixed menu bar work The Mac desktop contains a menu bar that remains at the top of the screen The options on this menu bar change according to the program you are using In contrast the menus for Windows programs are incorporated into individual program windows so if you have more than one window open each program window displays a menu FIGURE 5 The Mac OS X desktop includes icons a fixed menu bar anda dock Desktop icons can represent devices programs documents folders or other electronic tools The dock displays icons for frequently used programs and files The menu bar contains the Apple icon and menu options for the active program The Apple icon is used to display a menu of options for setting preferences moving the dock logging in and shutting down 2 Q fa O Y DEVICES Name _ H Macintosh HD Chess 5 3 MB l eesaaiy iDisk Desktop icon g E Dictionary 10 4 MB a aii a sa a E DVD Player 42 8 MB SHARED E Expos 452 KB dell9100 E EyeTV 137 5 MB D Flip4mac ez PLACES Font Book 18 1 MB PA Desktop Front Row f jason GarageBand 176 4 MB ft i
107. ts Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio 2 go Q a O Licensed to iChapters User 0 16 INTERNET AND WEB BASICS What is the Internet The Internet is the largest computer network in the world carrying information from one continent to another in the blink of an eye Figure 15 The computers connected to this network offer many types of resources such as e mail instant messaging social networking popular music downloads and online shopping What is the Web Although some people use the terms nternet and Web interchangeably the two are not the same The Internet refers to a communications network that connects computers all around the globe The Web short for World Wide Web is just one of the many resources available over this communica tions network The Web is a collection of linked and cross referenced information available for public access This informa tion is accessible from Web sites located on millions of computers The information is displayed as a series of screens called Web pages You ll use the Web for general research and for specific activiti
108. u understand the chapter material Concept quizzes are a great way to make sure that you understand and can apply key concepts presented in a chapter STUDY TIP For last minute review load up your iPod with the Audio Flashcards You Activites in the NP2012 eBook can listen to them for a quick refresher on your way to the test are for your own practice Can submit scores from CourseMate activities to my instruc They are computer scored but tor Your results from various CourseMate activities are automatically your scores are not sent to the recorded for your instructor using the Engagement Tracker You do not Engagement Tracker have to take any additional steps to send scores Follow the steps in the box below to explore the NP2012 CourseMate and find out how to view a summary of your scores TRY IT Explore the NP2012 CourseMate 1 Connect to the NP2012 CourseMate and use the Select Chapter button to access Chapter 1 2 To listen to a CourseCast on your computer click the Chapter Overview CourseCast link You might have to wait a bit for the overview to begin depending on the speed of your Internet connection If you want to store a CourseCast on your computer or portable music player right click the link click Download Audio and then select a location for the CourseCast file When you are ready to continue the tour close the audio window 3 Click the Games link and select the one of the games Try your hand
109. ummary score for the Practice Test you oa i Tracking file Macintosh completed The list of summary scores HD Users Sam Documents tracking 123 grows as you save additional Practice 456789 1k3 Tests QuickChecks Interactive Summaries Interactive Situation Questions and Lab gar Points QuickChecks Activity Date Time Possible Score 7 16 le 3 To close the Tracking Report close the NP2012 Chapter 01 emat lowe B 10 browser window Windows or the TextEdit window Mac Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 39 How do I submit scores from my Tracking file You can use the Submit Tracking Data option on the File menu to send your scores to your instructor The files are sent over an Internet service called WebTrack Are the scores erased from my Tracking file when they are sent No Your scores remain in your file a copy is sent to your instruc tor If your instructor s computer malfunctions and loses your data you can resubmit your Tracking file It is a go
110. update for Microsoft Windows Downloading the attachment infects your computer with a virus e A message that appears to come from PayPal complete with official looking logos that alerts you to a problem with your account When you click the Billing Center link and enter your account information it is transmit ted to a hacker s computer e A message that s obviously spam but contains a convenient opt out link If you click the link believing that it will prevent future spam from this source you ll actually be downloading a program that hackers can use to remotely control your computer for illegal activities How do I avoid e mail scams If your e mail software provides spam filters you can use them to block some unsolicited mail from your e mail box Spam filters are far from perfect however so don t assume everything that gets through is legitimate Use your judgment before opening any e mail message or attachment Never reply to a message that you suspect to be fraudulent If you have a question about its legitimacy check whether it s on a list of known scams Never click a link provided in an e mail message to manage any account information Instead use your browser to go directly to the company s Web site and access your account as usual Microsoft never sends updates as attachments To obtain Microsoft updates go to www microsoft com and click Security amp Updates STRY IT Arm yourself against e mail scams 4
111. utton then click Control Panel For Windows Vista click the Security link for Windows 7 click the System and Security link or for Windows XP double click the Security Center icon Click the Windows Firewall link 2 If the Windows firewall is not active you should check to see if a third party firewall is protecting your computer 3 Click the Start button click All Programs and then look through the program list for firewalls such as those in Figure 21 If you find a firewall listed start it and explore to see if it has been activated Firewall One A a Windows Firewall is actively protecting your computer Check your Mac computer s firewall 1 Click the Apple icon and then select System Preferences 2 Click the Security icon and then click the Firewall button 3 Click the third option Set access for specific ser vices and applications to turn on the firewall 4 Click the Advanced button and make sure both items are checked Click OK and then close the Security dialog box Allow all incoming connections O Allow only essential services Set access for specific services and applications Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the ove
112. ve your data from a site Although most sites allow you to deactivate your information some sites never actu ally remove your personal information from their databases leaving it open to misuse in the future TRY IT Check your social networking sites 1 Log in to any social networking site you use 2 Locate the site s privacy policy and read it Are you comfortable with the ways in which the site protects your personal information 3 If you are not familiar with the site s options for designating who can view your personal data find out how you can limit its public exposure 4 Find out if you can delete your data from the site Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION 0 31 ONLINE PRIVACY AND SAFETY GUIDELINES What should I do Online safety and privacy are becoming one of the most important aspects of computer use today The average consumer has to remain constantly vigilant to detect if his or her personal data has been misused or has fallen into the wrong hands Cyb
113. whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio Licensed to iChapters User 0 38 SECTION D How do I get scores into my Tracking file Whenever the Save Tracking data box is checked all scored activities are automatically saved in your Tracking file In the previous TRY IT you activated tracking so until you go back into Tracking Options and remove the check mark from Tracking Options your scores will be saved What happens if do an activity twice While tracking is active all your scores are saved If you do an activity twice both scores are saved Your scores are dated so you and your instructor can determine which scores are the most recent Can I review my scores You can see all your scores in a Tracking Report Can I delete or change my scores No Your Tracking data is encrypted and cannot be changed Work with the TRY IT below to see how easy it is to save scores and view your Tracking Report TRY IT Complete a Practice Test E Thursday February 15 8 11 13 AM To start tracking your scores you can com plete a Practice Test New Perspectives on Computer Concepts 1 Click the Practice Test button located on Name Sam
114. wide range of communication and comirol system capabilities The term ls rooted in the science of cybernetics and Norbert Weiner s pioneering work in lectranic communication and control science a forerunner to current information theory and computer science Cyberspace is closely Enter additional ura Searches here telecomimumcalions nel S COME sensors system contol naiworks and embedded processors and controllers The term was orginally coined in the cyber punk genre of science fiction author William Gibson The now ubiquitous tenm has i z re i Pe ga E b A AAAA Ps Part of iht Series o Cyborgs Cyborgalegy Bionics Gaemimcry Biomedical engineering Brain computer iniearfiace Gy bernetics Distributed cognition Genmric engineering Human ecosystem Human enhancement Intthipence amplification Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChapter s Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it Licensed to iChapters User ORIENTATION WORKING WITH E MAIL What is e mail E mail is a form of communication that relies on com puter networks such as the Internet to t
115. years Victims who respond to these preposterous e mails have found their bank accounts raided their credit ratings destroyed and their reputations ruined According to the FBI some victims have even been kidnapped Copyright 2011 Cengage Learning All Rights Reserved May not be copied scanned or duplicated in whole or in part Due to electronic rights some third party content may be suppressed from the eBook and or eChap Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictio C e go J YO pe O Licensed to iChapters User 0 28 SECTION C What s phishing Phishing pronounced fishing is a scam that arrives in your e mailbox looking like official correspondence from a major com pany such as Microsoft PayPal eBay MSN Yahoo or AOL The e mail message is actually from an illegitimate source and is designed to trick you into divulging confidential information or downloading a virus Links in the e mail message often lead to a Web site that looks official where you are asked to enter confidential information such as your credit card number Social Security number or bank account number The following are examples of phishing scams you should be aware of e A message from Microsoft with an attachment that supposedly contains a security
116. your browser and type www gmail com in the address box Log in to your Gmail account 8 You can continue to experiment with e mail When done use the Sign out link then close your browser Note With some local e mail configurations the Send button places the e mail in an Outbox and you have to click the Send Receive button on the toolbar to ship the message out from your computer 2 Click the Compose Mail link to display a form like the one below 3 Follow steps 4 through 6 as shown below Send nave Mow Discard 4 Click the To box and type your instructor s To jedwardsi mall msu edu e mail address Add le Add Bec subject Let me introduce myself Attach a file Bp 7z UF Th E 5 Click the Subject box and type Let me introduce myself Recheck v Done p Plain Text 6 Click the empty work Hello space and type a few lines My name is Ed Jones and am a sophomore from Dallas TX plan to bg about yourself You can use nurse because am fluent in English and Spanish hope to work inthe Sq the Backspace and arrow and march with the school band This summer l m planning a trip to Japar keys to edit if necessary traditional Taiko drumming That willbe a challenge have used computers for e mail and browsing the Web butli am not very familiar with computer terminology am required to take this course for my nursing major and hope to learn something about how computers are used in hospitals a
117. zes CourseCasts and online games To complete the activities in the Orientation you ll need access to a computer the BookOnCD packaged with your textbook or other digital versions of the textbook Internet access your e mail address and your instructor s e mail address To be sure you have what you need use the following checklist Check off the boxes for each item that you have E Access to a computer If you re using your own computer you might need a user ID and password to log in Don t write your password down but make sure you know what it is E Access to a school computer network You might need a user ID and password if you use a lab computer or access your school s network Check with your instructor or lab manager to learn how your school handles network access E The interactive digital version of the textbook such as the BookOnCD The BookOnCD requires a computer CD or DVD drive to run If your computer does not have this type of drive check with your instructor eBook versions of your textbook require a browser Your school network might provide access to the NP2012 BookOnCD or eBook from lab computers E Your e mail address Your instructor should explain how you can obtain an e mail address if you don t already have one Write your e mail address here E Your instructor s e mail address To correspond with your instructor you ll need your instructor s e mail address Write it here E Your i

Download Pdf Manuals

image

Related Search

Related Contents

Automatic No-bark Collar  Samsung VP-D381 Manual de Usuario  仕様書 - 京都市  OPEN-XCHANGE SERVER - Open-Xchange Software Directory  Weatherproof telephone Operating instructions  Epson EB-X9 [240v] with Educ Lamp Warranty  安全上の ごラ~ 意 この取扱説明書では、 お守り〟ゝただかないと  34-XY-25-08 - Honeywell Process Solutions  

Copyright © All rights reserved.
Failed to retrieve file