Principles of Information Technology ix Copyright Goodheart-Willcox Co., Inc. Chapter 14 Communication Networks . . . . . . . . . . .554 Section 14.1 Network Fundamentals . . . . . . . 556 Digital Versus Analog . . . . . . . . . . . . . . . . . . . .557 Network Connection Technologies. . . . . . . . .558 Section 14.2 Network Topologies . . . . . . . . . 566 Network Types. . . . . . . . . . . . . . . . . . . . . . . . . .567 Network Topologies . . . . . . . . . . . . . . . . . . . . .568 Section 14.3 Network Security. . . . . . . . . . . . 572 Basic Network Security. . . . . . . . . . . . . . . . . . .573 Wireless Network Security Types . . . . . . . . . .575 Vulnerability of a Network. . . . . . . . . . . . . . . .577 Network Troubleshooting . . . . . . . . . . . . . . . .579 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 582 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 582 Application and Extension of Knowledge . . . . . 583 Chapter 15 Electronic Communication and Collaboration. . . . .586 Section 15.1 Electronic Mail . . . . . . . . . . . . . . 588 E-mail Technologies. . . . . . . . . . . . . . . . . . . . . .589 E-mail Account Settings . . . . . . . . . . . . . . . . . .590 Appropriate E-mail Use . . . . . . . . . . . . . . . . . .593 Managing E-mail Communication . . . . . . . . .599 Section 15.2 Real-Time Communication . . . . . 605 Telephone Communication . . . . . . . . . . . . . . .606 Communication Tools . . . . . . . . . . . . . . . . . . . .609 Section 15.3 Good Communication Practices . . . . . . . . . . . . . . . . 618 Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . .619 Online Communication . . . . . . . . . . . . . . . . . .623 Cell Phone Use . . . . . . . . . . . . . . . . . . . . . . . . . .626 Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . .628 Learning Management Systems . . . . . . . . . . .630 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 632 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 633 Application and Extension of Knowledge . . . . . 633 Chapter 16 Security, Privacy, and Safety . . . .636 Section 16.1 Preventing Computer Threats . . 638 Computer Threats . . . . . . . . . . . . . . . . . . . . . . .639 Internet Security Protocols . . . . . . . . . . . . . . . .644 Protecting Stored Data . . . . . . . . . . . . . . . . . . .647 Section 16.2 Identity Protection and Ethical Behavior . . . . . . . . . . . . . . . . . . . . 650 Identity Protection on the Internet . . . . . . . . .651 Identity Protection in E-mail . . . . . . . . . . . . . .654 Ethical Behavior in Cyberspace . . . . . . . . . . . .659 Section 16.3 Restricting Access to Personal Information . . . . . . . . . . . . . . . . . 662 Firewalls and Gateways . . . . . . . . . . . . . . . . . .663 Password Protection . . . . . . . . . . . . . . . . . . . . .664 Safe Hardware and Software Practices. . . . . .668 Combating Viruses and Other Malware. . . . .669 Determining Reliable Websites . . . . . . . . . . . .672 Preventing Threats from Public Intrusion . . .674 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 678 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 679 Application and Extension of Knowledge . . . . . 680 Chapter 17 Careers in IT . . . . . . . . .682 Section 17.1 Career Fields in Information Technology . . . . . . . . . . . . . . . 684 Areas of Growth. . . . . . . . . . . . . . . . . . . . . . . . .685 Employment Areas Affected by IT Innovations . . . . . . . . . . . .689 Careers Available in IT . . . . . . . . . . . . . . . . . . .692 Section 17.2 Starting a Career in IT . . . . . . . . 701 Personal-Success Skills . . . . . . . . . . . . . . . . . . .702 Researching a Career. . . . . . . . . . . . . . . . . . . . .708 Education, Certifi cation, Training, and Experience . . . . . . . . . . . . . .715 Résumé and Portfolio . . . . . . . . . . . . . . . . . . . .722 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 728 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 728 Application and Extension of Knowledge . . . . . 729 Glossary . . . . . . . . . . . . . . . . . . . . .732 Index. . . . . . . . . . . . . . . . . . . . . . . .742
Previous Page Next Page