1  Chapter  13  Personal  Information  Management  Software  13.1.1  Adding  an  Account  to  Outlook.  .  .  .  .  .  .  .526  13.1.2  Create  a  New  Contact  Group  .  .  .  .  .  .  .  .  .532  13.1.3  Add  a  Signature  to  Outlook  Messages.  .535  13.2.1  Add  a  New  Calendar  to  Outlook  .  .  .  .  .  .550  13.2.2  Add  a  Task  to  Outlook  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .552  Chapter  14  Internet  and  the  World  Wide  Web  14.1.1  Finding  an  IP  Address  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .565  14.1.2  Setting  the  Browser  Home  Page  .  .  .  .  .  .  .575  14.1.3  Citing  Online  Sources.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .584  14.2.1  Identifying  Design  Principles  .  .  .  .  .  .  .  .  .588  14.2.2  Creating  a  Basic  Web  Page.  .  .  .  .  .  .  .  .  .  .  .592  14.2.3  Creating  a  Basic  External  Style  Sheet.  .  .597  14.2.4  Adding  JavaScript  to  a  Web  Page.  .  .  .  .  .600  Chapter  15  Communication  Networks  15.1.1  Connecting  to  a  Network.  .  .  .  .  .  .  .  .  .  .  .  .616  15.2.1  Examining  Network  Topology  .  .  .  .  .  .  .  .622  15.3.1  Determining  Wireless  Network  Security  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .628  15.3.2  Disabling  Autorun  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .630  15.3.3  Network  Troubleshooting  .  .  .  .  .  .  .  .  .  .  .  .632  Chapter  16  Electronic  Communication  and  Collaboration  16.1.1  Instant  Messaging  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .645  16.1.2  Videoconferencing  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .648  16.1.3  Subscribing  to  an  RSS  Feed  .  .  .  .  .  .  .  .  .  .  .652  16.2.1  Terms  of  Use  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .658  16.2.2  Cyberbullying  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .662  Chapter  17  Security,  Privacy,  and  Safety  17.1.1  Cybersecurity  Threats  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .680  17.1.2  Computer  Viruses  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .685  17.2.1  Identity  Theft  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .688  17.2.2  Social  Media  Security  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .697  17.3.1  Strong  Passwords  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .703  17.3.2  Antivirus  Software  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .707  Chapter  18  Careers  in  IT  18.1.1  Worldwide  Internet  Use.  .  .  .  .  .  .  .  .  .  .  .  .  .724  18.1.2  Exploring  IT  Careers.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .735  18.2.1  Identifying  Personal-Success  Skills  .  .  .  .744  18.2.2  Investigating  Professional  Certifi  cation.  .  .  .  .  .  .  .  .  .  .  .  .754  18.2.3  Submitting  a  Résumé  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .762