Important Do not install a language pack after you install this update. If you do, the language-specific changes in the update will not be applied, and you will have to reinstall the update. For more information, see Add language packs to Windows. Get update rollup This update is available from Windows Update. Download the package now. For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:.
Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. The global version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time DST bias.
Additionally, the dates and the times may change when you perform certain operations on the files. For more information about TLS, go to the following Microsoft website:. General information about SHA2 For more information about how to deploy SHA certificates on client computers, go to the following Microsoft website:.
Privacy, Security, and Ethics What about people? Experts agree that we as a society must be careful about the potential of technology to negatively affect our lives. Specifically, we need to be aware of how technology can affect our personal privacy and our environment. These critical issues are integrated in every chapter of this book as well as extensively covered in Chapter 9.
Changing Times Are the times changing any faster now than they ever have? Whatever the answer, it is clear we live in a fast-paced age. The Evolution of the Computer Age section presented at the end of this book tracks the major developments since computers were first introduced. The purpose of information systems is to make people, or end users like you, more productive.
They are typically documented in manuals written by computer professionals. It is controlled by software and processes data to create information. Information is data that has been processed by the computer.
To efficiently and effectively use the computer, you need to understand information technology IT , including software, hardware, data, and connectivity. People are the most important part of an information system. This book contains several features to demonstrate how people just like you use computers. Topics include using online office suites and cloud storage. The impact of computers and other technologies is more critical today than ever before.
Information Technology, the Internet, and You 17 To efficiently and effectively use computers, you need to understand the basic parts of an information system: people, procedures, software, hardware, data, and connectivity. You also need to understand the Internet and the web and to recognize the role of technology in your professional and personal life.
System Software System software enables application software to interact with computer hardware. Application Software Application software includes general-purpose, specialized, and mobile applications. Types of Computers Supercomputer, mainframe, midrange server , and personal computers PCs are four types of computers. Personal computers can be desktop, laptop notebook computer , tablet, smartphone, and wearable. Random-access memory RAM holds the program and data currently being processed. Input devices include the keyboard and mouse.
The most common output device is the computer display monitor. Modems modify audio, video, and other types of data for transmission across the Internet. DATA Data is the raw unprocessed facts about something. Central to the concept of connectivity is the network or communication system connecting two or more computers.
The web provides a multimedia interface to resources available on the Internet. Wireless devices include tablets, smartphones, and watches. The keyboard, mouse, display, and system unit are: a. Programs that coordinate computer resources, provide an interface, and run applications are known as: a. A browser is an example of a: a. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.
RAM is a type of: a. Unlike memory, this type of storage holds data and programs even after electric power to the computer system has been turned off. ROM b. RAM d. The type of file created by word processors, for example, memos, term papers, and letters.
The largest network in the world is [the]: a. Facebook c. Write your answers in the spaces provided. Consists of the step-by-step instructions that tell the computer how to do its work. Another name for a program. Enables the application software to interact with the computer hardware. Type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry around.
A container that houses most of the electronic components that make up a computer system. Devices that translate the processed information from the computer into a form that humans can understand.
Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and requires less power. The most widely used communication device. A type of a file that might contain, for example, audience handouts, speaker notes, and electronic slides. A communications system connecting two or more computers. Explain the parts of an information system. What part do people play in this system? What is system software?
What kinds of programs are included in system software? Define and compare general-purpose applications, specialized applications, and apps. Describe some different types of general-purpose applications. Describe some types of specialized applications. Describe the different types of computers. What is the most common type? What are the types of personal computers? What is connectivity? What is a computer network? What are the Internet and the web?
What are cloud computing, the wireless revolution, and IoT? Numerous full-page spreads identified as Making IT Work for You are presented in the following chapters. They include online entertainment in Chapter 2, online office suites in Chapter 3, and cloud storage in Chapter 7. Select one that you find the most interesting and then respond to the following: a Why did you select this application?
Numerous Privacy boxes appear in the margins of the upcoming chapters presenting a variety of privacy issues. These issues include apps that constantly track your movements without your knowledge or consent in Chapter 3; public Wi-Fi connections that record all of your personal communications in Chapter 8; and protection of personal privacy while using social networking sites such as Facebook in Chapter 9.
Select one that you find the most interesting, and then respond to the following: a Why did you select this issue? Numerous Ethics boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These issues include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized monitoring or eavesdropping of Internet activity in Chapter 8.
Select one issue that you find the most interesting and then respond to the following: a Why did you select this issue? If not, do you consider the issue critical for individuals or organizations?
Numerous Environment boxes appear in the margins of the upcoming chapters. These boxes present a variety of environmental topics, including digital media benefits in Chapter 2, operating systems reducing energy consumption in Chapter 4, and recycling old inkjet cartridges in Chapter 6. Select one that you find the most interesting and then respond to the following: a Why did you select this topic?
What are the tools used to create and view content on the Internet? How can you make the most out of your digital communication and online presence? Where can you go to research answers or find the best places to shop online? By understanding what the Internet is and how it works, you can tap into its immense power.
The Internet is an interconnected mesh of computers and data lines that connects millions of people and organizations. It is the foundation of the digital revolution and allows people around the world to share words, images, and any digital file almost instantaneously.
The web provides an easy-to-use interface to Internet resources. It has become an everyday tool for all of us to use. To efficiently and effectively use computers, you need to be aware of the resources available on the Internet and the web.
Additionally, you need to know how to access these resources, to effectively communicate electronically, to efficiently locate information, to understand electronic commerce, and to use web utilities. The Internet is a large network that connects together smaller networks all over the globe. Prior to the web, the Internet was all text—no graphics, animations, sound, or video. The web made it possible to include these elements. It provided a multimedia interface to resources available on the Internet.
Today the web is a collection of machines and people sharing amazing content, but not long ago it was a far simpler experience. The web has matured through three generations, commonly called Web 1. Google Search and other search engines made it possible for users to search the web to locate web pages of interest. However, to create a web page required a background in computers and programming. Many users could view web content, but few users could create web content.
Facebook and other social media sites made it so that nontechnical people could be seen and heard on the web. These sites allow almost anyone to post videos, images, and text about their lives. However, the massive amount of social media posts made it difficult to find truly valuable information. Many users could view and create web content, but few could readily locate valuable, timely information on the web. Siri and Google Assistant are examples of Web 3.
As this web technology grows out of its infancy, we can expect to get more personalized, helpful information from our devices. It is easy to get the Internet and the web confused, but they are not the same thing. The Internet is the physical network. Being connected to this network is often described as being online. The Internet connects millions of computers and resources throughout the world.
The web is a multimedia interface to the resources available on the Internet. Every day over a billion users from nearly every country in the world use the Internet and the web.
What are they doing? You can exchange e-mail, photos, and videos with your family and friends from almost anywhere in the world. You can locate old friends and make new friends. You can join and listen to discussions and debates on a wide variety of special-interest topics. You can look for the latest fashions, search for bargains, and make purchases. You can take classes on almost any subject. There are courses just for fun, and there are courses for high school, college, and graduate school credit.
Some cost nothing to take and others cost a lot. Some people feel that Facebook has an ethical responsibility to monitor and remove offensive or inaccurate content. What do you think? Who should decide what information is shared on Facebook: the company or the users? The first step to using the Internet and the web is to get connected, or to gain access to the Internet.
Describe how the Internet and the web started. What are the three web generations? List and describe five of the most common uses of the Internet and the web. How about listening to the largest catalog of music the world has ever known? Or to carry a library in your backpack? Want to keep up to date on the news your friends and family are reading? Or to hear about the latest trends in tech news?
Online entertainment has got you covered, with entertainment options for TV, movies, music, books, social media, and news feeds. These services allow you to watch vast libraries of popular mainstream TV and movies as well as original content. Visit www. These sites offer live broadcasts of breaking news, sports, and popular TV show episodes.
Visit tv. Paid subscription services, like Netflix, offer popular film and TV shows, as well as original content. They offer free versions with commercials or for a small monthly fee, you can get all the music you want with limited commercial interruptions.
Go to www. Digital books can be purchased online and read on your digital devices. Digital books allow you to read several books at a time on different digital devices without having to carry around tons of books.
They also offer a way to automatically receive news from news organizations and to share news articles with your friends. The largest and most influential social media website is Facebook. Major news outlets, like CNN, have Facebook pages.
Now, major stories and posts from that source will appear on your Facebook page when you open the website. Major news outlets, like CNN, have Facebook pages that you can like to get their news in your Facebook news feed. A news feed application takes articles from news organizations and collects them according to your interest and presents them like a newspaper—grouped by topic and in chronological order.
One of the best news feed services is Feedly. Source: Feedly 29 Internet Access tips Are you getting the most out of your web browser? Here are a few suggestions to make you faster and more efficient. Add your top 5 or 10 most-often-visited websites here. These programs can perform a variety of tasks, from providing easy access to your cloud services to making it easier to capture information on a web page. For example, you can deny websites from automatically opening up another browser window, called pop-ups these annoying windows often contain advertisements.
However, it needs to be connected to the Internet to truly unleash its power. Once on the Internet, your computer becomes an extension of what seems like a giant computer—a computer that branches all over the world.
When provided with a connection to the Internet, you can use a browser program to search the web. The providers are already connected to the Internet and provide a path or connection for individuals to access the Internet.
As we will discuss in Chapter 8, users connect to ISPs using one of a variety of connection technologies including DSL, cable, and wireless modems. Browsers Browsers are programs that provide access to web resources. This software connects you to remote computers; opens and transfers files; displays text, images, and multimedia; and provides in one tool an uncomplicated interface to the Internet and web documents. For browsers to connect to resources, the location or address of the resources must be specified.
These addresses are called uniform resource locators URLs. All URLs have at least two basic parts. As we will discuss in Chapter 8, protocols are rules for exchanging data between computers. The protocol https is used for web traffic and is one of the most widely used Internet protocols. It indicates the specific address where the resource is located. In Figure the domain is identified as www. The last part of the domain name following the dot. Also known as the web suffix, it typically identifies the type of organization.
For example,. Once the browser has connected to the website, a document file is sent back to your computer. The browser interprets the HTML formatting instructions and displays the document as a web page. For example, when your browser first connects to the Internet, it opens up to a web page specified in the browser settings. Various technologies are used to provide highly interactive and animated websites.
CSS help ensure that related web pages have a consistent presentation or look. Netflix uses CSS to visually connect all its web pages. The Microsoft search engine Bing. Today it is common to access the Internet from a variety of mobile devices like smartphones and tablets. Special browsers called mobile browsers are designed to run on these portable devices. Unlike a traditional web browser that is typically displayed on a large screen, a mobile browser is displayed on a very small screen, and special navigational tools are required to conveniently view web content.
How are they different? Web utilities are specialized utility programs that make using the Internet and the web easier and safer. Some of these utilities are browser-related programs that either become part of your browser or are executed from your browser. Others are designed to protect children from dangerous and inappropriate website material.
File transfer utilities allow you to efficiently copy files to and from your computer across the Internet. Internet security suites enhance security and privacy. Filters Filters block access to selected sites.
The Internet is an interesting and multifaceted arena. But not all aspects of the Internet are appropriate for all audiences. Parents, in particular, are concerned about children roaming unrestricted across the Internet. Filter programs allow parents as well as organizations to block out selected sites and set time limits.
Additionally, these programs can monitor use and generate reports detailing the total time spent on the Internet and the time spent at individual websites.
For a list of some of the best-known filters, see Figure Filter Site Net Nanny www. This is called downloading. You also can use file transfer utility software to copy files from your computer to another computer on the Internet.
This is called uploading. This eliminates the need for any custom software to be installed. A popular web-based file transfer service is Dropbox. A single file might be located on dozens of individual computers.
When you download the file, each computer sends you a tiny piece of the larger file, making BitTorrent well suited for transferring very large files. Unfortunately, BitTorrent technology often has been used for distributing unauthorized copies of copyrighted music and video. For a summary of web utilities, see Figure FTP has been used for decades and still remains one of the most popular methods of file transfer.
Internet Security Suites An Internet security suite is a collection of utility programs designed to maintain your security and privacy while you are on the web. These programs control spam, protect against computer viruses, provide filters, and much more. You could buy each program separately; however, the cost of the suite is typically much less. What are filters used for? What are file transfer utilities? Define Internet security suites. The Internet, the Web, and Electronic Commerce 33 environment Communication Daily newspapers are an important part of the free press; however, the traditional printed newspaper comes at a cost of millions of trees.
Unless you are careful, you could be starring in one of those videos. Without privacy settings, images and videos posted to these sites can be viewed and potentially reposted for all to see. If a social networking friend were to post an embarrassing video of you to Facebook, would all your friends be able to see it?
What about parents, teachers, or potential employers? Social Networking Social networking is one of the fastest-growing and most significant Web 2.
Groups are typically organized around topics, events, or ideas. They are popular among clubs and organizations to coordinate activities or share information. The most common options include sharing with everyone, just your friends, or just a subset of your friends.
A social network often has an overall focus. For example, the largest social networking site, Facebook, tends to be more about connecting friends and family. By contrast, LinkedIn is a popular business-oriented social networking site. The profiles on LinkedIn share professional information, like resumes and job successes, and the corporate pages concentrate on sharing their corporate culture and promoting job openings.
There are many social networking sites, each with its own unique features and interactions. For a list of some of the most popular sites, see Figure Many individuals create personal websites, called blogs, to keep in touch with friends and family. Blog postings are time-stamped and arranged with the newest item first. Often, readers of these sites are allowed to comment.
Some blogs are like online diaries with personal information; others focus on information about a hobby or theme, such as knitting, electronic devices, or good books. Although most are written by individual bloggers, there are also group blogs with multiple contributors.
Some businesses and newspapers also have started blogging as a quick publishing method. Several sites provide tools to create blogs. Two of the most widely used are Blogger and WordPress. A microblog publishes short sentences that take only a few seconds to write, rather than long stories or posts like a traditional blog. Microblogs are designed to keep friends and other contacts up to date on your interests and activities. The most popular microblogging site, Twitter, enables you to add new content from your browser, instant messaging application, or even a mobile phone.
Over million active users send over million Twitter messages, also known as tweets, each day. Twitter is popular among celebrities and politicians to keep fans up to date on their moment-to-moment thoughts. After a webcast has been completed, there are no files remaining on your computer. Webcasts typically broadcast live events. For example, the popular website YouTube.
Podcasts do not use streaming technology. Before a podcast can be run, the media files have to be downloaded and saved to your computer. Once downloaded, the files can be run to listen to music or watch a movie as often as you would like. The media files can also be transferred from your computer to a media player such as an iPod.
Podcasts are widely used to download music, tutorials, and educational training. Perhaps the most famous example is Wikipedia, an online encyclopedia, written and edited by anyone who wants to contribute, that has millions of entries in over 20 languages. Creating blogs and wikis are examples of web authoring. We will discuss web authoring software in detail in Chapter 3. What are profiles, pages, groups, news feeds, and share settings? What are blogs? What is the difference between a webcast and a podcast?
What is a wiki? What is Wikipedia? A typical e-mail message has four basic elements: header, message, signature, and attachment. The server providing e-mail service for the recipient is usc. The top-level domain indicates that the provider is an educational institution. Subject lines typically are displayed when a person checks his or her mailbox.
The letter or message comes next. Following the message, the signature identifies the sender. Many e-mail programs allow you to include files such as documents and images as attachments.
If a message has an attachment, the file name typically appears at the end of the e-mail. There are two basic types of e-mail systems: client-based and web-based. Before you can begin e-mailing, you need to run the e-mail client from your computer, which communicates with the e-mail service provider. This is known as webmail. For individual use, webmail is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail.
With webmail, you can access your e-mail from any computer anywhere that has Internet access. E-mail can be a valuable asset in your personal and professional life. However, like many other valuable technologies, there are drawbacks too. Americans receive billions of unwanted and unsolicited e-mails every year. This unwelcome mail is called spam. Although spam is indeed a distraction and nuisance, it also can be dangerous. For example, computer viruses or destructive programs are often attached to unsolicited e-mail.
Computer viruses and ways to protect against them will be discussed in Chapter 4. In an attempt to control spam, antispam laws have been added to our Are you tired of sorting through an inbox full of spam? Here are legal system. Many spammers collect e-mail addresses from personal web e-mail provide an opt-out option. When pages, social networking sites, and message boards. Many companies collect and sell future mailing lists.
Failure to do so e-mail addresses to spammers. Be sure to read the privacy policy of a site results in heavy fines. This approach, before providing your address. Many are a trick to validate active e-mail over 50 percent of all spam originates addresses.
These addresses are worth more to spammers, who then sell the from servers outside the United States. A more effective approach to controlUse antispam and filter options. Most e-mail programs and web-based e-mail ling spam has been the development services have antispam and filter options that can be configured. Use them. Most e-mail programs provide spam-blocking capabilities. Two of the best known are text messaging and instant messaging. Today, billions of people send text messages every day.
It has become one of the most widely used ways to send very short messages from one individual to another. Although popular and convenient, there are downsides to using this technology in the wrong context. A great deal of attention has been directed toward texting while driving. A study by Car and Driver concluded that texting while driving had a greater negative impact on driver safety than being drunk.
Several states have passed laws prohibiting texting while driving. Whenever you connect to the Internet, your IM service is notified. It then notifies you of all your friends who are available to chat and notifies your friends who are online that you are available.
You can then send messages directly back and forth to one another. Most instant messaging programs also include video conferencing features, file sharing, and remote assistance. Many businesses routinely use these instant messaging features. What are the two basic types of e-mail systems? What is text messaging? Instant messaging?
Search Tools The web can be an incredible resource, providing information on nearly any topic imaginable. Are you interested in music? Writing a paper on the environment?
Looking for a movie review? Trying to locate a long-lost friend? Information sources related to these questions, and much, much more, are available on the web. With over 20 billion pages and more being added daily, the web is a massive collection of interrelated pages.
With so much available information, locating the precise information you need can be difficult. Fortunately, a number of organizations called search services operate websites that can help you locate the information you need.
Search services maintain huge databases relating to information provided on the web and the Internet. The information stored at these databases includes addresses, content descriptions or classifications, and keywords appearing on web pages and other Internet informational resources. Additionally, search services provide special programs called search engines that you can use to locate specific information on the web.
Search Engines Search Service Site Search engines are specialized programs that assist you in locating information Bing www. See Figure for a list of commonly used Duckduckgo www. Google www. The search engine compares your entry against its database and Yahoo! Many searches result in a large number of search results. For example, if you were to enter the keyword music, you would get billions of sites on that topic. Search engines order the search results according to those sites that most likely contain the information requested and present the list to you in that order, usually in groups of Because each search service maintains its own database, the search results returned by one search engine will not necessarily be the same results returned by another search engine.
Therefore, when researching a topic, it is best to use more than one search engine. Specialized Search Engines Specialized search engines focus on subject-specific websites. Specialized sites can potentially save you time by narrowing your search. Or you could go to a search engine that specializes specifically on the environment, such as www.
For a list of just a few selected specialized search engines, see Figure To locate other specialized search engines, use a search service and enter the topic area followed by specialized search engine. For example, entering sports specialized search engine will return several search engines dedicated specifically to sports information.
Content Evaluation Search engines are excellent tools to locate information on the web. Be careful, however, how you use the information you find. Unlike most published material found in newspapers, journals, and textbooks, not all the information you find on the web has been subjected to strict guidelines to ensure accuracy. In fact, anyone can publish content on the web.
Many sites, such as Wikipedia. Drawing on the latest research in the fields of environmental psychology and education, the authors show you how architecture and interior spaces can positively influence individuals with ne Today, nearly a century after the National Fascist Party came to power in Italy, questions about the built legacy of the regime provoke polemics among architects and scholars.
From hospitals, post offices and stadia to housing, summer camps, Fascist Party Headquarters, ceremonial spaces, roads, railways and bridges, the physical traces of the regime have a presence in nearly every Italian town. This book was edited by Prof. Prabhubhai K. It was written according to the syllabus of students studying in Architecture, Civil Engineering and Building Management. This book covers all ingredients needed for a student to pass the course of Building Components, Services and Materials in the curriculum of Bachelor of Architecture, B.
Tech Civil Engineerin BIM Building Information Modelling is transforming working practices across the built environment sector, as clients, professionals, contractors and manufacturers throughout the supply chain grasp the opportunities that BIM presents. The first book ever to focus on the implementation of BIM processes in landscape and external works, BIM for Landscape will help landscape professionals understand what BIM means for them.
This book is intended to equip landscape practitioners and practices to meet the challenges and reap the rewards of working in a BIM environment - and to help professionals in related fields to understand A visually engaging introduction to landscape architecturaldesign Landscape architectural design seeks to create environments thataccommodate users' varying lifestyles and needs, incorporatecultural heritage, promote sustainability, and integrate functionalrequirements for optimal enjoyment.
Foundations of LandscapeArchitecture introduces the foundational concepts needed toeffectively integrate space and form in landscape design. With over five hundred hand-rendered and digital drawings, aswell as photographs, Foundations of Landscape Architectureillustrates the importance of spatial language.
It introducesconcepts, typolo The importance of freehand drawing for educating architects is often underestimated. However, this craft is essential for any designer.
0コメント