ix Digital Wellness . . . . . . . . . . . . . . . . . . . . . . . . .578 Using Search Engines . . . . . . . . . . . . . . . . . . . .579 Ethical Use of the Internet . . . . . . . . . . . . . . . .583 Section 14.2 Creating for the Web. . . . . . . . . 585 Designing for the Web. . . . . . . . . . . . . . . . . . . .586 HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .589 Programming Languages . . . . . . . . . . . . . . . . .598 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 602 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 602 Application and Extension of Knowledge. . . . 603 Chapter 15 Communication Networks . . . . . . . . . . .606 Section 15.1 Network Fundamentals . . . . . . . 608 Digital Versus Analog . . . . . . . . . . . . . . . . . . . .609 Network Connection Technologies. . . . . . . . .610 Section 15.2 Network Topologies . . . . . . . . . 618 Network Types. . . . . . . . . . . . . . . . . . . . . . . . . .619 Network Topologies . . . . . . . . . . . . . . . . . . . . .620 Section 15.3 Network Security. . . . . . . . . . . . 624 Basic Network Security. . . . . . . . . . . . . . . . . . .625 Wireless Network Security Types . . . . . . . . . .627 Vulnerability of a Network. . . . . . . . . . . . . . . .628 Network Troubleshooting . . . . . . . . . . . . . . . .631 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 634 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 634 Application and Extension of Knowledge. . . . 635 Chapter 16 Electronic Communication and Collaboration . . . .638 Section 16.1 Real-Time Communication . . . . . 640 Telephone Communication . . . . . . . . . . . . . . .641 Communication Tools . . . . . . . . . . . . . . . . . . . .644 Section 16.2 Good Communication Practices. . . 654 Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . .655 Online Communication . . . . . . . . . . . . . . . . . .659 Cell Phone Use . . . . . . . . . . . . . . . . . . . . . . . . . .662 Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . .664 Learning Management Systems . . . . . . . . . . .666 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 668 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 668 Application and Extension of Knowledge. . . . 669 Chapter 17 Security, Privacy, and Safety . . . . . . . . . .672 Section 17.1 Preventing Computer Threats . . 674 Computer Threats . . . . . . . . . . . . . . . . . . . . . . .675 Internet Security Protocols . . . . . . . . . . . . . . . .681 Protecting Stored Data . . . . . . . . . . . . . . . . . . .683 Section 17.2 Identity Protection and Ethical Behavior . . . . . . . . . . . . . . . . . . . . 686 Identity Protection on the Internet . . . . . . . . .687 Identity Protection in E-mail . . . . . . . . . . . . . .690 Ethical Behavior in Cyberspace . . . . . . . . . . . .695 Section 17.3 Restricting Access to Personal Information . . . . . . . . . . . . . . . . . 698 Firewalls and Gateways . . . . . . . . . . . . . . . . . .699 Password Protection . . . . . . . . . . . . . . . . . . . . .700 Safe Hardware and Software Practices. . . . . .704 Combating Viruses and Other Malware. . . . .705 Determining Reliable Websites . . . . . . . . . . . .708 Preventing Threats from Public Intrusion . . .710 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 714 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 715 Application and Extension of Knowledge. . . . 716 Chapter 18 Careers in IT. . . . . . . . .718 Section 18.1 Career Fields in Information Technology . . . . . . . . . . . . . . . 720 Areas of Growth. . . . . . . . . . . . . . . . . . . . . . . . .721 Employment Areas Affected by IT Innovations . . . . . . . . . . . . . . . . . . . .725 Careers Available in IT . . . . . . . . . . . . . . . . . . .728 Section 18.2 Starting a Career in IT . . . . . . . . 737 Personal-Success Skills . . . . . . . . . . . . . . . . . . .738 Researching a Career. . . . . . . . . . . . . . . . . . . . .744 Education, Certifi cation, Training, and Experience . . . . . . . . . . . . . .751 Résumé, Cover Message, and Portfolio . . . . .758 Applying for Employment. . . . . . . . . . . . . . . .764 After an Interview . . . . . . . . . . . . . . . . . . . . . . .765 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . 768 Chapter Test . . . . . . . . . . . . . . . . . . . . . . . . . . 768 Application and Extension of Knowledge. . . . 770 Glossary. . . . . . . . . . . . . . . . . . . . . . . 772 Index. . . . . . . . . . . . . . . . . . . . . . . . . 782
Previous Page Next Page