ix  Digital  Wellness  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .578  Using  Search  Engines  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .579  Ethical  Use  of  the  Internet  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .583  Section  14.2  Creating  for  the  Web.  .  .  .  .  .  .  .  .  585  Designing  for  the  Web.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .586  HTML  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .589  Programming  Languages  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .598  Chapter  Summary  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  602  Chapter  Test  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  602  Application  and  Extension  of  Knowledge.  .  .  .  603  Chapter  15  Communication  Networks  .  .  .  .  .  .  .  .  .  .  .606  Section  15.1  Network  Fundamentals  .  .  .  .  .  .  .  608  Digital  Versus  Analog  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .609  Network  Connection  Technologies.  .  .  .  .  .  .  .  .610  Section  15.2  Network  Topologies  .  .  .  .  .  .  .  .  .  618  Network  Types.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .619  Network  Topologies  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .620  Section  15.3  Network  Security.  .  .  .  .  .  .  .  .  .  .  .  624  Basic  Network  Security.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .625  Wireless  Network  Security  Types  .  .  .  .  .  .  .  .  .  .627  Vulnerability  of  a  Network.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .628  Network  Troubleshooting  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .631  Chapter  Summary  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  634  Chapter  Test  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  634  Application  and  Extension  of  Knowledge.  .  .  .  635  Chapter  16  Electronic  Communication  and  Collaboration  .  .  .  .638  Section  16.1  Real-Time  Communication  .  .  .  .  .  640  Telephone  Communication  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .641  Communication  Tools  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .644  Section  16.2  Good  Communication  Practices.  .  .  654  Social  Media  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .655  Online  Communication  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .659  Cell  Phone  Use  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .662  Collaboration  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .664  Learning  Management  Systems  .  .  .  .  .  .  .  .  .  .  .666  Chapter  Summary  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  668  Chapter  Test  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  668  Application  and  Extension  of  Knowledge.  .  .  .  669  Chapter  17  Security,  Privacy,  and  Safety  .  .  .  .  .  .  .  .  .  .672  Section  17.1  Preventing  Computer  Threats  .  .  674  Computer  Threats  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .675  Internet  Security  Protocols  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .681  Protecting  Stored  Data  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .683  Section  17.2  Identity  Protection  and  Ethical  Behavior  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  686  Identity  Protection  on  the  Internet  .  .  .  .  .  .  .  .  .687  Identity  Protection  in  E-mail  .  .  .  .  .  .  .  .  .  .  .  .  .  .690  Ethical  Behavior  in  Cyberspace  .  .  .  .  .  .  .  .  .  .  .  .695  Section  17.3  Restricting  Access  to  Personal  Information  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  698  Firewalls  and  Gateways  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .699  Password  Protection  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .700  Safe  Hardware  and  Software  Practices.  .  .  .  .  .704  Combating  Viruses  and  Other  Malware.  .  .  .  .705  Determining  Reliable  Websites  .  .  .  .  .  .  .  .  .  .  .  .708  Preventing  Threats  from  Public  Intrusion  .  .  .710  Chapter  Summary  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  714  Chapter  Test  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  715  Application  and  Extension  of  Knowledge.  .  .  .  716  Chapter  18  Careers  in  IT.  .  .  .  .  .  .  .  .718  Section  18.1  Career  Fields  in  Information  Technology  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  720  Areas  of  Growth.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .721  Employment  Areas  Affected  by  IT  Innovations  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .725  Careers  Available  in  IT  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .728  Section  18.2  Starting  a  Career  in  IT  .  .  .  .  .  .  .  .  737  Personal-Success  Skills  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .738  Researching  a  Career.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .744  Education,  Certifi  cation,  Training,  and  Experience  .  .  .  .  .  .  .  .  .  .  .  .  .  .751  Résumé,  Cover  Message,  and  Portfolio  .  .  .  .  .758  Applying  for  Employment.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .764  After  an  Interview  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .765  Chapter  Summary  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  768  Chapter  Test  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  768  Application  and  Extension  of  Knowledge.  .  .  .  770  Glossary.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  772  Index.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  782