Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
8
7.8k
source
stringlengths
33
71
Workplace Software and Skills SENIOR CONTRIBUTING AUTHORS TAMMIE BOLLING, PELLISSIPPI STATE COMMUNITY COLLEGE ANGELA MITCHELL, WILMINGTON COLLEGE TANYA SCOTT, SOUTHERN NEW HAMPSHIRE UNIVERSITY/UNIVERSITY OF ARIZONA GLOBAL CAMPUS NYROBI WHEELER, BELLEVUE UNIVERSITY
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=2&chunk=0
OpenStax Rice University 6100 Main Street MS-375 Houston, Texas 77005 To learn more about OpenStax, visit https://openstax.org. Individual print copies and bulk orders can be purchased through our website. ©2023 Rice University. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). Under this license, any user of this textbook or the textbook contents herein must provide proper attribution as follows: - If you redistribute this textbook in a digital format (including but not limited to PDF and HTML), then you must retain on every page the following attribution: “Access for free at openstax.org.” - If you redistribute this textbook in a print format, then you must include on every physical page the following attribution: “Access for free at openstax.org.” - If you redistribute part of this textbook, then you must retain in every digital format page view (including but not limited to PDF and HTML) and on every physical printed page the following attribution: “Access for free at openstax.org.” - If you use this textbook as a bibliographic reference, please include https://openstax.org/details/books/workplace-software-skills in your citation. For questions regarding this licensing, please contact support@openstax.org. Trademarks The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, OpenStax CNX logo, OpenStax Tutor name, Openstax Tutor logo, Connexions name, Connexions logo, Rice University name, and Rice University logo are not subject to the license and may not be reproduced without the prior and express written consent of Rice University. HARDCOVER BOOK ISBN-13 978-1-711470-81-8 DIGITAL VERSION ISBN-13 978-1-961584-31-0 ORIGINAL PUBLICATION YEAR 2023 1 2 3 4 5 6 7 8 9 10 CJP 23
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=3&chunk=1
OPENSTAX OpenStax provides free, peer-reviewed, openly licensed textbooks for introductory college and Advanced Placement® courses and low-cost, personalized courseware that helps students learn. A nonprofit ed tech initiative based at Rice University, we’re committed to helping students access the tools they need to complete their courses and meet their educational goals. RICE UNIVERSITY OpenStax is an initiative of Rice University. As a leading research university with a distinctive commitment to undergraduate education, Rice University aspires to path-breaking research, unsurpassed teaching, and contributions to the betterment of our world. It seeks to fulfill this mission by cultivating a diverse community of learning and discovery that produces leaders across the spectrum of human endeavor. PHILANTHROPIC SUPPORT OpenStax is grateful for the generous philanthropic partners who advance our mission to improve educational access and learning for everyone. To see the impact of our supporter community and our most updated list of partners, please visit http://openstax.org/foundation. Arnold Ventures Chan Zuckerberg Initiative Chegg, Inc. Arthur and Carlyse Ciocca Charitable Foundation Digital Promise Ann and John Doerr Bill & Melinda Gates Foundation Girard Foundation Google Inc. The William and Flora Hewlett Foundation The Hewlett-Packard Company Intel Inc. Rusty and John Jaggers The Calvin K. Kazanjian Economics Foundation Charles Koch Foundation Leon Lowenstein Foundation, Inc. The Maxfield Foundation Burt and Deedee McMurtry Michelson 20MM Foundation National Science Foundation The Open Society Foundations Jumee Yhu and David E. Park III Brian D. Patterson USA-International Foundation The Bill and Stephanie Sick Fund Steven L. Smith & Diana T. Go Stand Together Robin and Sandy Stuart Foundation The Stuart Family Foundation Tammy and Guillermo Treviño Valhalla Charitable Foundation White Star Education Foundation Schmidt Futures William Marsh Rice University
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=4&chunk=2
Begin your learning journey and succeed in your future workplace with OpenStax Kinetic! Learn with us today! openstax.org/kinetic Ready to enhance your Workplace Software and Skills learning experience? OpenStax Kinetic, OpenStax's free online learning research platform, empowers you to master crucial skills for success in today's job market. By participating in research, you will discover personalized insights, as well as your readiness to succeed in the modern workplace, including: • Career and vocational interests • Creating long-term objectives • Achieving your goals • Time management You can also earn the chance to win gift cards! OpenStax Kinetic - empowering learners, shaping careers! We take the privacy and security of our users' data seriously. Our full privacy notice is available at openstax.org/privacy.
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=5&chunk=3
CONTENTS Preface 1 Technology in Everyday Life and Business 71 Chapter Scenario 7 1.1Computing from Inception to Today 8 1.2Computer Hardware and Networks 28 1.3The Internet, Cloud Computing, and the Internet of Things 32 1.4Safety, Security, Privacy, and the Ethical Use of Technology 47 Chapter Review 52 Essentials of Software Applications for Business 612 Chapter Scenario 61 2.1Software Basics 62 2.2Files and Folders 66 2.3Communication and Calendar Applications 76 2.4Essentials of Microsoft 365 89 2.5Essentials of Google Workspace 109 2.6Collaboration 126 Chapter Review 134 Creating and Working in Documents 1433 Chapter Scenario 143 3.1Navigating Microsoft Word 144 3.2Formatting Document Layout in Microsoft Word 150 3.3Formatting Document Content in Microsoft Word 157 3.4Collaborative Editing and Reviewing in Microsoft Word 166 3.5Document Design 172 3.6Navigating Google Docs 177 3.7Formatting Layout and Content in Google Docs 183 3.8Collaborative Editing and Reviewing in Google Docs 196 3.9Versions and Version History 204 Chapter Review 217 Document Preparation 2254 Chapter Scenario 225 4.1Microsoft Word: Advanced Formatting Features 226 4.2Working with Graphics and Text Tools in Microsoft Word 242 4.3Managing Long Documents in Microsoft Word 264 4.4Google Docs: Enhanced Formatting Features 282
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=6&chunk=4
4.5Working with Graphics and Text Tools in Google Docs 292 4.6Managing Long Documents in Google Docs 311 Chapter Review 321 Advanced Document Preparation 3295 Chapter Scenario 329 5.1Creating Different Document Types in Microsoft Word 330 5.2Mail Merge in Microsoft Word 346 5.3Creating Forms in Microsoft Word 353 5.4Creating Different Document Types in Google Docs 364 5.5Creating Forms in Google Docs 373 5.6Advanced Collaboration in Google Docs 387 Chapter Review 397 Preparing Presentations 4056 Chapter Scenario 405 6.1Presentation and Design Essentials 406 6.2Designing a Presentation in Microsoft PowerPoint 411 6.3Formatting Microsoft PowerPoint Slides: Layout and Design Principles 426 6.4Adding Visuals and Features to Microsoft PowerPoint Slides 431 6.5Designing a Presentation in Google Slides 446 6.6Creating Google Slides: Layout and Text 449 6.7Adding Visuals and Features to Google Slides 454 Chapter Review 462 Advanced Presentation Skills 4717 Chapter Scenario 471 7.1Effective Presentation Skills 472 7.2Finalizing a Slide Collection 476 7.3Preparing a Microsoft PowerPoint Collection for Presentation 493 7.4Preparing a Google Slides Collection for Presentation 521 Chapter Review 532 Content Management Systems and Social Media in Business 5418 Chapter Scenario 541 8.1What Are Content Management Systems? 542 8.2Common Content Management Systems 552 8.3Creating Content with a Content Management System 559 8.4Search Engine Optimization 573 8.5Social Media in Business 579 Chapter Review 587 Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=7&chunk=5
Working with Spreadsheets 5959 Chapter Scenario 595 9.1Microsoft Excel Basics 596 9.2Text and Numbers in Microsoft Excel 604 9.3Calculations and Basic Formulas in Microsoft Excel 610 9.4Formatting and Templates in Microsoft Excel 615 9.5Google Sheets Basics 627 9.6Text and Numbers in Google Sheets 633 9.7Calculations and Basic Formulas in Google Sheets 641 9.8Formatting and Templates in Google Sheets 648 Chapter Review 658 Advanced Excel Formulas, Functions, and Techniques 66910 Chapter Scenario 669 10.1Data Tables and Ranges 670 10.2More About Formulas 679 10.3Using Arithmetic, Statistical, and Logical Functions 691 10.4PivotTables 697 10.5Auditing Formulas and Fixing Errors 705 10.6Advanced Formatting Techniques 721 Chapter Review 733 Advanced Excel Spreadsheets: Statistical and Data Analysis 74511 Chapter Scenario 745 11.1Understanding Data, Data Validation, and Data Tables 746 11.2Statistical Functions 769 11.3What-If Analysis 793 11.4PivotTables/Charts 799 11.5Data Analysis Charts 808 Chapter Review 825 Using Excel in Accounting and Financial Reporting 83312 Chapter Scenario 833 12.1Basic Accounting 834 12.2Financial Functions in Microsoft Excel 837 12.3Integrating Microsoft Excel and Accounting Programs 848 Chapter Review 852 Understanding and Using Databases 85713 Chapter Scenario 857 13.1What Is a Database? 858
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=8&chunk=6
13.2Microsoft Access: Main Features and Navigation 868 13.3Querying a Database 877 13.4Maintaining Records in a Database 895 13.5Creating Reports in Microsoft Access 903 13.6Creating Forms in Microsoft Access 911 Chapter Review 921 Advanced Database Use 93114 Chapter Scenario 931 14.1Advanced Queries in Microsoft Access 932 14.2Multiple Table Forms 947 14.3Customizing Forms 959 14.4Customizing Reports 970 14.5Using Macros 981 14.6Data Analysis and Integration 987 Chapter Review 994 Integrating Applications 100315 Chapter Scenario 1003 15.1Microsoft 365: Collaboration and Integration 1004 15.2Microsoft Word: Integration with Microsoft Excel and Microsoft Access 1013 15.3Microsoft Word and Microsoft PowerPoint Integration 1027 15.4Microsoft Excel and Microsoft PowerPoint Integration 1034 15.5Microsoft Excel and Microsoft Access Integration 1043 15.6Integrating Data from Other Programs into Google Workspace 1049 15.7New Developments: The Role of Artificial Intelligence 1071 15.8Mastering Workplace Software Skills: A Project 1073 Chapter Review 1075 Index 1083 Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=9&chunk=7
Preface About OpenStax OpenStax is part of Rice University, which is a 501(c)(3) nonprofit charitable corporation. As an educational initiative, it's our mission to improve educational access and learning for everyone. Through our partnerships with philanthropic organizations and our alliance with other educational resource companies, we're breaking down the most common barriers to learning. Because we believe that everyone should and can have access to knowledge. About OpenStax Resources Customization Workplace Software and Skills is licensed under a Creative Commons Attribution 4.0 International (CC BY) license, which means that you can distribute, remix, and build upon the content, as long as you provide attribution to OpenStax and its content contributors. Because our books are openly licensed, you are free to use the entire book or select only the sections that are most relevant to the needs of your course. Feel free to remix the content by assigning your students certain chapters and sections in your syllabus, in the order that you prefer. You can even provide a direct link in your syllabus to the sections in the web view of your book. Instructors also have the option of creating a customized version of their OpenStax book. Visit the Instructor Resources section of your book page on OpenStax.org for more information. Art attribution In Workplace Software and Skills, most art contains attribution to its title, creator or rights holder, host platform, and license within the caption. Because the art is openly licensed, anyone may reuse the art as long as they provide the same attribution to its original source. Screenshots from Microsoft and Google are credited with the figure. Please retain that attribution when reusing the images. To maximize readability and content flow, some art does not include attribution in the text. If you reuse art from this text that does not have attribution provided, use the following attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license. Errata All OpenStax textbooks undergo a rigorous review process. However, like any professional-grade textbook, errors sometimes occur. In addition, the wide range of topics, data, and technology in business software change frequently, and portions of the textbook may become out of date. Since our books are web-based, we can make updates periodically when deemed pedagogically necessary. If you have a correction to suggest, submit it through the link on your book page on OpenStax.org. Subject matter experts review all errata suggestions. OpenStax is committed to remaining transparent about all updates, so you will also find a list of past and pending errata changes on your book page on OpenStax.org. Format You can access this textbook for free in web view or PDF through OpenStax.org, and for a low cost in print. The web view is the recommended format because it is the most accessible—including being W CAG 2.0 AA compliant—and most curr ent. Print versions are available for individual purchase, or they may be ordered through your campus bookstore. AboutWorkplace Software & Skills Workplace Software and Skills covers applications from the Microsoft 365 (formerly Microsoft Office) suite and Google Workspace. Coverage of both suites aligns with contemporary business use and prepares students for workforce needs, especially introductory students who have had limited exposure to these software programs. Preface 1
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=10&chunk=8
By teaching their basic and advanced features, users of all levels can learn the skills necessary for success in their jobs. Applications covered in depth from Microsoft 365 include Word, PowerPoint, Excel, and Access, as well as overviews of integrations with Outlook, Calendar, and Teams. Applications covered in depth from Google Workspace include Docs, Sheets, and Slides, as well as overviews of integrations with Gmail, Calendar, and Meet. The text also provides overviews of additional collaboration and conference applications, as well as in- depth coverage of content management software such as WordPress. With this selection of applications, Workplace Software and Skills provides a holistic exposure to common tools of business practice and prepares students for additional focused training that may be required for specialized fields. In addition to technical skill development, the text covers conceptual topics related to ethics and security; and technology advancements, such as the Internet of Things and generative artificial intelligence. These topics are discussed as they relate to business and everyday life, reflecting their importance to contextualizing business computer application use within the modern business world. They emphasize responsible use and considerations for collaboration across a virtual network. Across each chapter, conceptual and technical skill is anchored in real-world examples and applications. This ensures that students are prepared for entry into the workforce with a portfolio of completed examples relevant to positions requiring these skills. Pedagogical Foundation Learning Objectives Every module begins with a set of clear and concise learning objectives, which are designed to be both measurable and closely aligned with current teaching practice. These objectives can help the instructor decide what content to include or assign and guide student expectations of learning. After completing the module and end-of-module exercises, students should be able to demonstrate mastery of the learning objectives. Key Features • Cross-chapter Scenario:Presents students with a mock business simulation that continues from Chapter 1 through Chapter 15. The scenario focuses on a multi-division business and provides a variety of work- related tasks, such as preparing a memo or creating a slideshow for an entry-level employee, as well as longer projects, such as a marketing report that a mid-level employee might need to create. Additional scenarios showcase green technology, non-profit organizations, and entrepreneurship. Students will be exposed to everyday business needs as related to the chapter topic. Integrated projects and capstones will also pull from this simulated business scenario. • Real-World Application:Discusses the practical applications of software and related technology in our everyday lives, whether in or out of the workplace. • Mac Tips:Calls out brief notes where commands or tools for macOS and Windows differ. • Spotlight on Ethics:Highlights an ethics issue related to the concept, skill, or activity being taught in the text. These features may discuss a real-world case, dig deeper into an ethical concept being discussed, or present an ethical dilemma for the student to think through. • Link to Learning:Includes a few sentences of introduction to a website with an interactive activity, animation, or video that helps improve student understanding. • Final Project: The last chapter includes a complex final project assignment. Students are given a dataset and asked to create a detailed business report that uses product integrations, tools, and skills learned across all fifteen chapters. Section Summaries Section summaries distill the information in each section for both students and instructors down to key, concise points addressed in the section. 2 Preface Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=11&chunk=9
Key Terms Key terms are bold and are followed by a definition in context. Definitions of key terms are also listed in the Glossary, which appears at the end of the chapter. Assessments A variety of assessments allow instructors to confirm core conceptual understanding, elicit brief explanations that demonstrate student understanding, and offer more in-depth assignments that enable learners to dive more deeply into a concept, tool, or topic. • Review Questionstest for conceptual apprehension of key concepts and tools. • Practice Exercisesask students to apply the program content they have learned so that they can both learn by repetition and extend the practice through critical thinking exercises. • Written Questionsrequire students to explain concepts in words, as well as asking students to explain when a concept should be applied in the workplace, and respond to non-technical concepts, such as ethics. • Case Exercisesask students to come up with creative solutions to a new problem; these exercises may draw from real-world examples or fictional scenarios. Answers to Questions in the Book The end-of-chapter Review Questions, Written Questions, Practice Exercises, and Case Exercises are intended for homework assignments or classroom discussion; thus, student-facing answers or solutions are not provided. Sample answers are provided in the Instructor Solution Manual, for instructors to share with students at their discretion, as is standard for such resources. About the Authors Senior Contributing Authors Figure1 Senior Contributing Authors (left to right): Tammie Bolling, Angela Mitchell, Tanya Scott, Nyrobi Wheeler. Tammie Bolling, Pellissippi State Community College Dr. Tammie Bolling holds the rank of tenured Professor at Pellissippi State Community College. She has obtained master’s degrees in business administration, healthcare management, and psychology, as well as postgraduate certificates in varying information technology areas and a doctorate in Leadership. In addition to teaching, she manages the Industry Recognized Credential and Major Field Test testing program for the Business and Computer Technology department. Dr. Bolling’s other areas of interest include the development of cultural competence and the internationalization of curricula in a wide range of disciplines, and is an avid mobile technology researcher. Dr. Bolling was named a Fulbright Scholar to Ireland in 2022-2023 in Computing, which was one of the highlights of her professional life. Angela Mitchell, Wilmington College Dr. Angela Mitchell is department chair and professor of business and economics at Wilmington College. She primarily teaches finance and statistics courses, and serves in various leadership roles at the institution. Her primary research interests are focused on nonprofit management and efficiencies and student intercultural Preface 3
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=12&chunk=10
development through travel opportunities. Dr. Mitchell holds a master's degree in Business Administration and a doctorate in Operations Research. Dr. Mitchell is involved in her local community by serving on several nonprofit boards and volunteering regularly for community events. Prior to Wilmington College, Dr. Mitchell spent five years in product development at Procter & Gamble, spending time in the manufacturing environment and leading trials to test new processes and product formulations. The combination of business experience and technical background provides a unique perspective that Dr. Mitchell brings to the classroom and to her research. Tanya Scott, Achieving the Dream Dr. Tanya Scott is the director of program innovation at Achieving the Dream, a national nonprofit organization that partners with community colleges to help achieve student success. Dr. Scott's experience spans teaching, program development, and leadership in middle school, high school, community college, and university settings in Canada and the United States. She holds a master's degree in Education and a doctorate in Business Administration-I/O Psychology. An active practitioner, she has extensive undergraduate and graduate teaching experience in teacher and curriculum development, instructional strategies, and integrating technology in the classroom, as well as business, change management, strategy, and leadership. She is also a fervent advocate for open educational resources and open pedagogy. Nyrobi Wheeler, Bellevue University Nyrobi Wheeler is a full time online adjunct professor of Business, Human Resources, and Diversity, Equity and Inclusion at Bellevue University, as well as an online instructor of Business at Jesuit Worldwide Learning in Geneva, Switzerland. Nyrobi holds a master's degree in Business Administration in Leadership and Finance, as well as a postgraduate certificate in Human Resources Management. Nyrobi is a self-publishing author of several e-books and articles on career advice, as well as the co-author of several anthologies on workplace and hair discrimination among Black Women. Contributing Authors Bridget Lepore, Lehman College Janine Walton, Louisiana State University Shreveport Timothy Burgoyne, Wilmington College Valeree Falduto, Broward College Reviewers Adam Gorski, New York University Alex Katrompas, Austin Community College Angela Heath, Baptist Health System Betty Fitte, Tidewater Community College Bill Nantz, Houston Community College Brian Pusateri, University of Scranton Bryan Broussard, Central Louisiana Technical Community College Caleb Williamson, Pellissippi State Community College Carmen Montanez-Rodriguez, Allan Hancock Community College David Collins, Bellarmine University Deanna Bartee, Grand Canyon University 4 Preface Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=13&chunk=11
Glenn McQueary, Houston Community College Heather Beatty, Ashworth College John Christie, Regis College Julie Goff Lindsey, Linn Benton Community College Laura Bantz, McHenry County College Lawrence Chui, University of St. Thomas Lisa Breaux, San Jacinto College Mariya Breyter, New York University Michael MacLeod, Austin Community College Reni Abraham, Houston Community College Saverio Iaconis, New York University Sue McCrory, Missouri State University Terri Lukshaitis, Ferris State University Additional Resources Student and Instructor Resources We’ve compiled additional resources for both students and instructors, including an instructor’s manual, test bank, and lecture presentation slides. Instructor resources require a verified instructor account, which you can apply for when you log in or create your account on OpenStax.org. Take advantage of these resources to supplement your OpenStax book. Instructor's answer guide.Each component of the instructor’s manual is designed to provide maximum guidance for delivering the content in an interesting and dynamic manner. Test bank.With nearly 2,000 true/false, multiple-choice, fill-in-the-blank, and short answer questions in our test bank, instructors can customize tests to support a variety of course objectives. The test bank is available in Word format. Authored by Amit Shah, Frostburg State University. PowerPoint lecture slides.The PowerPoint slides provide learning objectives, images and descriptions, and feature focuses as a starting place for instructors to build their lectures. Data files.Some chapters are accompanied by downloadable data files (typically in .xlsx, .docx, or .csv format) that provide students with the data needed to perform certain assessments, exercises, or in-text examples. Providing the data files to students reduces the amount of unnecessary typing and allows the student to jump right into manipulating the data. Academic Integrity Academic integrity builds trust, understanding, equity, and genuine learning. While students may encounter significant challenges in their courses and their lives, doing their own work and maintaining a high degree of authenticity will result in meaningful outcomes that will extend far beyond their college career. Faculty, administrators, resource providers, and students should work together to maintain a fair and positive experience. We realize that students benefit when academic integrity ground rules are established early in the course. To that end, OpenStax has created an interactive to aid with academic integrity discussions in your course. Preface 5
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=14&chunk=12
Figure2 Visit our academic integrity slider (https://www.openstax.org/r/academic-integrity-slider). Click and drag icons along the continuum to align these practices with your institution and course policies. You may then include the graphic on your syllabus, present it in your first course meeting, or create a handout for students. (attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license) At OpenStax we are also developing resources supporting authentic learning experiences and assessment. Please visit this book’s page for updates. For an in-depth review of academic integrity strategies, we highly recommend visiting the International Center of Academic Integrity (ICAI) website at https://academicintegrity.org/ (https://academicintegrity.org/). Community Hubs OpenStax partners with the Institute for the Study of Knowledge Management in Education (ISKME) to offer Community Hubs on OER Commons—a platform for instructors to shar e community-created resources that support OpenStax books, free of charge. Through our Community Hubs, instructors can upload their own materials or download resources to use in their own courses, including additional ancillaries, teaching material, multimedia, and relevant course content. We encourage instructors to join the hubs for the subjects most relevant to your teaching and research as an opportunity both to enrich your courses and to engage with other faculty. To reach the Community Hubs, visit www.oercommons.org/hubs/openstax. Technology partners As allies in making high-quality learning materials accessible, our technology partners offer optional low-cost tools that are integrated with OpenStax books. To access the technology options for your text, visit your book page on OpenStax.org. 6 Preface Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=15&chunk=13
Figure1.1 Today’s workspaces represent decades of advances in technology. Portable personal computers, cellular communications, tablets, and advances in artificial intelligence have changed the way people do their jobs. (credit: modification of "Home office, Computer, Desk" by Pexels/Pixabay, CC0) Chapter Outline 1.1Computing from Inception to Today 1.2Computer Hardware and Networks 1.3The Internet, Cloud Computing, and the Internet of Things 1.4Safety, Security, Privacy, and the Ethical Use of Technology Chapter Scenario WorldCorp welcomes you to your new position within the company, a multinational corporation where the jobs are plentiful, and the future is bright. To be successful at WorldCorp, you will need to know a little bit about the computing past and a lot about the computing present. You’ll also need to have a sense of the computing future, especially as it pertains to business. That’s what this chapter is about. You will also need to know how to perform basic functions at WorldCorp using two major computer programs you’ve probably heard of—Micr osoft 365, or more commonly known as Office, and Google Workspace. The next chapter in this textbook, Essentials of Software Applications for Business, covers the basics of these programs. WorldCorp activities presented in other chapters will lay out specific computing tasks, such as formatting documents, creating spreadsheets, designing online slide presentations, posting on social media, and conducting virtual meetings. Even though the online environment changes rapidly, these are fundamental computing skills that workers need regardless of their level of employment. As you move forward in the text, you will learn more about WorldCorp, its structure, products, customers, and strategies. Technology in Everyday Life and Business 1
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=16&chunk=14
1.1 Computing from Inception to Today Learning Objectives By the end of this section, you will be able to: • Explain the evolution of computing in the workplace • Explain the rise of computing for personal use • Discuss the use of technology in today’s workplace • Describe key technologies in mobile devices, digital imaging, and gaming • Discuss recent advances in technology and related career opportunities Today’s workplace looks very different from the workplace of even a decade ago. Much has changed in the field of computer science and computing in general, reshaping the use of technology at both individual and professional levels. From the early uses of massive, room-size computers to perform large, complex calculations to today’s much smaller, more advanced computers—e ven one so small it can fit in the palm of your hand like the Raspberry Pi 4 shown in Figure 1.2—computing has secur ed a solid foothold in our everyday lives. Figure1.2 The Raspberry Pi 4 contains the basic components and power of a computer. It can power a robot, smart products, and basic PCs. At 3.4 inches by 2.2 inches and only .6 inches high, it fits in the palm of your hand. (credit: “Raspberry pi” by kritsadaj/ Pixabay, CC0) Workers today need to know how to use computers to perform basic (and advanced) tasks that employers need. Those tasks could be preparing documents, creating spreadsheets for financial calculations, designing slide presentations for meetings, constructing databases, and even navigating social media and virtual meeting spaces that help companies communicate internally and externally. This text explores the basic software applications that perform these tasks, mostly through Microsoft Office and Google Workspace. But, first, this chapter looks at the evolution of computing to provide some context and appreciation for the field itself and to show its importance not just for today’s workplace, but also to give you a sense of where computing is heading. Computing in the Workplace The rise of computers for work came out of a need to manage a massive quantity of numbers. The early computers essentially were developed to be “data crunchers.” Their origins date back to the 1800s in France. Joseph Marie Jacquard, a textile merchant, developed a machine to automatically weave designs in fabric using a punch card system, as you can see in Figure 1.3. This punch card system laid the foundation for more advances in number calculations, including those developed by Herman Hollerith for the 1880 U.S. census. 8 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=17&chunk=15
Hollerith went on to improve the initial punch card system and eventually founded IBM, one of the first major computing companies. Figure1.3 (a) Jacquard’s loom, which performed calculations using a punch card system, was an early development in computing, as was (b) Herman Hollerith’s punch-card tabulating machine, for which he was awarded a patent in 1889. (c) Each hole in a punch card equals a piece of data (called a “bit” today) that the machines read. (credit a: modification of work “Jacquard.loom.cards” by George H. Williams/Wikimedia Commons, Public Domain; credit b: modification of work “Holerith395782Figures1-6” by Herman Hollerith/ Wikimedia Commons, Public Domain; credit c: modification of work “2punchCards” by José Antonio González Nieto/Wikimedia Commons, CC BY 3.0) The first computer (in the modern sense of the term) was the Z1, designed and built in the late 1930s by Konrad Zuse of Germany. This machine was motor-driven, programmable, and weighed over 2,000 pounds, about 400 times the average laptop today. The Z1 contained many of the internal components still used in today’s computers, paving the way for other inventors to evolve the technology. Bill Hewlett and David Packard, two Stanford University engineering students, began working out of a garage in California, initially developing equipment for engineers and major companies. They founded their company, Hewlett Packard (HP), in 1939, but it wasn’t until a few decades later that it would become a titan in the computer manufacturing industry. Meanwhile, the 1940s and 1950s saw major advances in computing technology. Most notable was the 1943 invention of the ENIAC (Electronic Numerical Integrator and Calculator). This massive unit, built by two professors at the University of Pennsylvania, is considered the forerunner of today’s digital computers because it was the first machine to run calculations electronically. Other innovations included solving equations simultaneously and the invention of the transistor, which allowed for much smaller computers to be built. The development of computer language is another major milestone in computing history. By using words rather than symbols, computer coding became easier to learn and write, especially for those in the business world who did not have mathematics or engineering degrees. It is thanks, in large part, to mathematician and U.S. Navy Admiral Grace Hopper (Figure 1.4). Hopper’s PhD in mathematics from Yale, along with her naval career working on technology to aid the war effort during World War II, positioned her to make some remarkable contributions, and in a male-dominated field. 1.1 • Computing from Inception to Today 9
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=18&chunk=16
Figure1.4 Grace Hopper, shown here in 1960 with a UNIVAC computer, earned her PhD in mathematics and went on to an illustrious career in computer science. (credit: “Grace Hopper and UNIVAC” by Public.Resource.Org/Flickr, CC BY 2.0) SPOTLIGHT ON ETHICS Grace Hopper: A Pioneer in Computer Science Historically, science, technology, engineering, and mathematics (known as the STEM fields) were seldom viewed as appropriate fields for females, and the same was true for careers in the military. Although women today make up half of the U.S. workforce, less than 30 percent of employees in STEM fields are women. As a reflection of this gender bias, in 1950, fewer than 5 percent of doctoral degrees awarded in chemistry, math, and physics were granted to females, and even today, that number has only risen to just under 20 percent. Grace Hopper was a pioneer in the computer science field and in the military as a woman working in STEM. She was also a member of the first group of women to be granted a PhD in mathematics from Yale University. Hopper’s work in computer science had a profound impact on the future of computer programming, especially through her creation of an English-language-based programming language, which eventually became COBOL (still in use today). There are many organizations centered on narrowing the gender gap in STEM fields. One of these is the American Association of University Women (AAUW). Founded in 1881, it has been tirelessly focused on investing in education, especially in STEM fields, and on promoting these fields to females through tech camps and other initiatives. Computers entered the workplace in the 1950s. Their use at that time was for scientific and engineering applications, mostly as calculating machines to facilitate data analysis. In 1964, the Programma 101, an Italian desktop-sized programmable calculator, was the first commercially viable workplace computer to hit the market. It was heavy and expensive—its $3,200 price tag in 1964 dollars was the equivalent of nearly $30,000 today. As a result, only large corporations and research institutions had the space and resources to use the computers that were commercially available. This remained the status quo into the 1970s, when the development of the microcomputerchanged the face of the industry. The first personal computer, the Kenbak-1, came on the market in 1971. Microcomputer is the technical name for the personal computers that operated with a single processing unit and were much smaller than the machines used in corporations or industrial institutions. Intel’s 1970 invention of the microchip(a group of small circuits that work together to make a computer operational) was quickly followed by the floppy disk (which allowed for data to be stored and moved easily), developed by IBM engineers, and ethernetconnection capability, developed by Xerox. Ethernet connects computers and devices such as printers through hard cables. With advances in technology, the market for computers expanded rapidly in the 1970s. That’s when Paul Allen and Bill Gates founded Microsoft 10 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=19&chunk=17
to focus on developing software and an operating system for the new computers. It is also when Steve Jobs and Steve Wozniak founded Apple, creating the Apple I computer with a single circuit board. Xerox’s revolutionary Alto computer, shown in Figure 1.5, introduced in 1973, included a screen resembling those we use today, plus a mouse and keyboard. The screen included, for the first time, elements such as folders, buttons, and icons controllable through the mouse. The Alto not only had the ability to act as a calculator but also could print documents and send electronic mail, anticipating the email we know today. Figure1.5 Xerox’s Alto computer has a similar look to today’s computers, even including the mouse. (credit: “Xerox Alto Computer) by Joho345/Wikimedia Commons, Public Domain) Early personal computers like the Programma and the Alto set the stage for the rapid expansion of computing in the workplace. By 1980, there were several microcomputers on the market that made computing more accessible to small businesses and even individuals. Computing capabilities had expanded to include color graphics, spreadsheets, and word processing programs. The market competition between Microsoft, HP, IBM, Apple, and others shaped the industry and our society. In fact, in 1983, Time magazine’s cover recognized the computer as “Machine of the Year,” replacing its traditional “Man of the Year.” These early computers have evolved into today’s laptops, cell phones, tablets, and wearables. These innovations in computing technology have had a profound impact on the workplace. Figure 1.6 shows just how different today’s “workplace” has become. From the automation of manual processes, to the ways we store and analyze information, to how and where we communicate with colleagues and customers—all have changed dramatically. Resulting improvements include improved efficiency and productivity, reduction of errors, improved database management and analytics, advanced communication capabilities, telecommuting, enhanced graphics and marketing, the need for new organizational structures and departments (such as information technology, or IT, departments), and the development of technology privacy policies and legal regulations. Computing machines, along with the emergence and subsequent explosion of the internet, have forever transformed both our work and our personal lives. 1.1 • Computing from Inception to Today 11
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=20&chunk=18
Figure1.6 Computing technology has transformed the modern workspace. People no longer have to be “in the office.” (credit: “left”: modification of work by Cory Zanker; credit “center”: modification of work by “@Saigon”/Flickr; credit “right”: modification of work by Daniel Lobo) Computing for Personal Use By the 1970s, new workplace technology filtered into homes in the form of entertainment devices. With technological improvements and more accessible prices, the value of a computer in the home—to help manage everything from household finances to children’s homework assignments—was becoming e vident. The advertisement for the Apple II computer shown in Figure 1.7 shows what this early technology looked like. Figure1.7 This December 1977 advertisement for the Apple II computer touts its uses around the home, such as organizing finances, storing recipes, and gaming. (credit: modification of “Apple II advertisement Dec 1977 page 2” by Apple Computer Inc./Wikimedia Commons, Public Domain) 12 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=21&chunk=19
In the early 1980s, personal computers were made available to the average consumer through retailers such as Sears and Radio Shack. In 1981, IBM introduced a personal computer—first kno wn by the code name “Acorn” and subsequently renamed the IBM PC—that included the Micr osoft operating system and Office software, as well as an Intel microchip. Soon to follow was Apple’s Macintosh computer, launched in January 1984, running Apple’s own operating system and officially establishing Apple as competitors to Microsoft and the PC. Many of these new designs were streamlined and user-friendly for the whole family. Moreover, the price point made them more attainable for the consumer, though still expensive for that time. Initially, home computers were focused on gaming and entertainment. Figure 1.8 shows what that primitive technology looked like in the 1980s. Classic games such as chess and solitaire were translated into the computer environment, a trend that quickly caught on even with rudimentary graphics and text-based games. These games allowed the user to experience the computer’s capabilities in settings far beyond the workplace and established the personal computer as a technology to support not only work, but pleasure and entertainment, too. Figure1.8 (a) The Apple II and (b) the Commodore PET offered video games that popularized the use of computers at home. (credit a: modification of “Living Computers – Apple” by Michael Dunn/Wikimedia Commons, CC BY 2.0; credit b: modification of “Commodore PET Exhibit at American Museum of Science and Energy Oak Ridge Tennessee” by Frank Hoffman/Wikimedia Commons, Public Domain) With developments such as disk storage and programming capabilities, the market for personal computers continued to grow. Manufacturing costs decreased with innovations in the industry and as many producers shifted manufacturing overseas. Although computers evolved into home workstations with capabilities beyond gaming, the home computing trend was slow to catch on. Many potential home users simply did not see the value in owning a personal computer; in the late 1980s, fewer than 20 percent of households owned one. This changed in the late 1990s and early 2000s, when the home computer industry exploded with the expansion of the internet, improved interfaces that were less technically challenging for the average user, and customizable products and features such as color schemes. Increasingly, home workstations became the place to maintain family finances, store recipes, and write school research reports. Email, followed quickly by instant messaging, offered a new way to connect and communicate. Then came a way to connect to the internet without wires, using high-frequency radio signals. Since 2000, the warp speed of innovation has brought to market lightweight laptops that can be easily carried from workplace to workplace. The computing power of the computers that first took astronauts to the moon was similar to that of a couple of today’s gaming consoles. Many modern home computing devices are laptops less than one inch thick, equipped with high-speed connectivity, high-quality graphics, and touchscreen capabilities. Computing power today has increased nearly 1 trillion percent since the 1960s. 1.1 • Computing from Inception to Today 13
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=22&chunk=20
Technology Today The rapid trajectory of innovations in computing has forever changed today’s workplace, where computing power is at our fingertips. It is difficult to imagine any industry that doesn’t depend on computing technology as an integral part of its business. Some of the more basic technologies that are present in businesses may include: • direct deposit of paychecks • key card building access • shared company computer drives for document storage • paperless documentation systems for recordkeeping • high-speed printers/copiers • automated inventory systems Industries that are traditionally considered nontechnical have also embraced improvements that depend on computing technology—for e xample, farmers can control irrigation and monitor field conditions. Computing technologies have also enabled individuals to embark on entrepreneurial ventures that once only seemed like a dream and have launched some of them into marketplace leadership. From manufacturing to health care to the service sector, we can see the impact of computing and how technological innovations continue to shape the future of many industries. For example, consider the auto industry, where advances in technology continue to pave the way for changes in how we drive, safety improvements, and new ways to purchase vehicles. Recent innovations include the introduction of self-driving vehicles (see Google’s self-driving car, Waymo in Figure 1.9) and of vehicle-to-vehicle communication—cr oss-communication that allows cars to wirelessly share information such as speed, spatial proximity to other cars or objects, and traffic status, with the potential to reduce vehicle crashes and congestion on roadways. Technology has also created a space for nontraditional car dealers, such as Carvana, that offer an online purchase experience and home delivery. The use of technology in the auto industry can be seen at all stages of the business cycle. Figure1.9 Google’s Waymo, a self-driving car, can navigate roads, maintain safe speeds, and see obstacles in time to apply the brakes. (credit: “Google Self-Driving Car” by R Boed/Flickr, CC BY 2.0) Computing technology has also brought substantial changes to the health-care industry. Most medical practices and hospitals utilize electronic medical records. These records and the ability to share them across providers have increased the efficiency and accuracy of record management and have also increased the transparency of information provided to patients and their families and care providers. Performance of surgical procedures has been advanced through the use of visualization technology and robotics. Figure 1.10a shows a robotic arm used in surgery. More recently, telehealth and virtual health-care options have grown. Figure 1.10b shows a virtual telehealth appointment. These options have reduced many barriers (including some financial barriers and transportation issues) for those seeking care for a variety of needs, including mental health issues, child illness, or support for 14 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=23&chunk=21
the elderly. This virtual option has not only added convenience, but has also improved communication between patient and provider, increased speed of care, and allowed patients to take a better informed and more active role in addressing their own health-care needs. And, of course, the use of virtual technology for health-care needs was a lifesaver during the COVID-19 pandemic, when in-person appointments were too risky. Figure1.10 (a) Robotic surgery and telehealth services are two health-care industry-changing technologies. (credit a: modification of “Laproscopic Surgery Robot” by GPA Photo Archive/Flickr, CC BY 2.0; credit b: modification of “People on a Video Call” by Anna Shvets/ Pexels, CC BY 2.0) With today’s available technologies, organizations and individuals alike are continuing to rethink the traditional business model. Many organizations have come to see the value of giving employees the freedom afforded by working from home, and even many industries that had resisted telecommuting learned to incorporate it as a necessary response to the COVID-19 pandemic. Some companies have found that organizational efficiencies can be realized in terms of cost savings, improved employee satisfaction, and enhanced productivity. Other businesses, such as smaller retailers, have shifted more resources to e-commerce. Banks have found innovative ways to connect with their customers using technology rather than through in-person transactions. Still others, such as restaurants, have used technology to deliver their products to consumers in new ways. In Figure 1.11, customers can order directly through the internet à la Uber Eats or even have their food delivered by robot. Figure1.11 (a) Uber Eats is a popular food delivery service that is becoming more widely available because of technological advances. (b) Autonomous delivery robots are becoming a more common sight on campuses. (credit a: modification of “Uber Eats bicycle” by Yuya Tamai/Flickr, CC BY 2.0; credit b: modification of “Starship food delivery robot” by bikesharedude/Flickr, Public Domain) 1.1 • Computing from Inception to Today 15
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=24&chunk=22
REAL-WORLD APPLICATION Technology and Food Trucks Food trucks have been growing in popularity in the early decades of the twenty-first century. In fact, the food truck industry has grown at a faster rate than traditional restaurants. The availability of technology has helped foster this growth, especially in two areas: point-of-sale (POS) systems and social media marketing. It used to be that food trucks could accept only cash because the registers that could take credit cards did not work on the road. A POS system does even more than exchange money. A food truck can use a POS product—for e xample, a product called Square—to tr ack inventory and sales, and can even use social media to post messages and to make sales. Our interactions with computing, both at home and in the workplace, rely on interfaces and communications like those you will likely use in this course. Tools for documenting information, analyzing and exporting data, and communicating with others form the foundation of business computer applications. Mobile Devices, Digital Imaging, and Gaming It might be hard to imagine a world without access to information at our fingertips—or , for that matter, a world without Xbox or PlayStation. Today, many households no longer have a traditional landline phone, instead relying on mobile devices. It is estimated that less than 10 percent of homes in the United States have a traditional landline phone. Think about how advances in digital imaging technology over the past half century have forever changed the way we capture and preserve life’s notable moments—our days ar e now routinely filled with screens and images. The rise of the computing industry has brought along changes in companion industries that have impacted most of our lives in one way or another. In this section, you will learn about the origins of the mobile phone industry and its evolution into today’s diverse handheld computing devices. The rise of the computing industry also led to a new industry, gaming. You will look at how the gaming industry not only changed the face of family entertainment but also created additional industries and shaped cultures across the world. Finally, you will explore the digital imaging industry, the impact on other fields, and recent technological developments in imaging. Mobile Devices The concept of a mobile phone has been around a lot longer than you might imagine—since the early 1900s, in fact. In 1908, a patent was issued for a wireless telephone in Kentucky, but the idea was considered so far- fetched that its inventors were accused of fraud. (The case was later dropped, and the invention was never produced.) Not long after, during World War I, Germany was testing radio-based wireless telephones (essentially two-way radios) on trains traveling from Berlin. By 1940, this technology had improved, and handheld receivers were widely available and used in World War II, prompting the private sector to use this emerging technology (Figure 1.12a). Bell Laboratories, founded in the late nineteenth century by Alexander Graham Bell, was a key player in bringing mobile phones to the public. In 1946, Bell Labs developed a system to offer a mobile phone service in cars. Because of the limited number of channels available, the system quickly reached capacity, and was mostly used by taxi drivers and emergency vehicles localized in urban areas. From the 1950s to the 1980s, the technology continued to develop, built mostly around radio frequencies. The first cellular technology using automated cellular networks, called 1G or first generation, was introduced in Tokyo in 1979. It was deployed to other countries soon after and, in 1981, reached North America, where it was known as the Advanced Mobile Phone System (AMPS). This led to the launch of the first truly mobile cell phone, Motorola’s DynaTAC, in 1983 (Figure 1.12b). With a price point of just under $4,000, the unit was not designed for the everyday consumer. Motorola believed the phone’s customers would include realtors and 16 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=25&chunk=23
large-company executives who could afford the purchase price as well as the $50-per-month plan to use the device. But they underestimated the appeal of the cell phone. Sales far exceeded projections, and the concept of the cell phone quickly replaced the unwieldy mobile car phones of the past. The overwhelming demand, along with advances in digital technology, prompted the migration of the old AMPS networks to a digital format, an effort that began in 1990 and was completed in the early 2000s. The popularity of the cell phone also prompted competition between European and American networks. 2G cellular networks emerged, providing basic short message service (SMS) text messaging capabilities. The first text message was sent in 1993 in Finland. The 2G network had better security than 1G and was also much faster. These changes in network capabilities influenced the development of phone technologies. Although smartphones are seen as a rather new technology, the first smartphone was actually introduced by IBM in 1993. The Simon Personal Communicator (Figure 1.12c) looked very different from modern smartphones. Its features included a calendar, address book, and email service. The phone even had a touchscreen. The price point, around $1,000, was high at the time, equivalent to about $2,000 in today’s dollars. The device was well received in the United States, where consumers viewed it primarily as a digital personal assistant that just happened to have phone capabilities. Though popular with business executives, the Simon stayed on the market for less than a year and sold only around 50,000 units, but it did pave the way for the smartphones of today. Other notable phone introductions soon to follow were the first flip phone (the Motorola StarTAC in 1997) and the first BlackBerry device in 1999. Figure1.12 (a) This two-way wireless communication device was used during World War II to communicate critical information among troops. (b) Motorola’s DynaTAC was the first mobile phone to use cellular technologies rather than radio frequencies. DynaTAC was marketed toward wealthy business professionals at a price point of nearly $4,000. (c) The first smartphone, a personal assistant device, was a precursor to today’s cell phones. (credit a: modification of “Bärbar radio” by Flygvapenmuseum, CC BY; credit b: modification of “MF013: Figure 2.8” by Rosenfeld Media/Flickr, CC BY 2.0; credit c: modification of “Simon FIRST Smart Phone” by Mike Mozart/Flickr, CC BY 2.0) As the technology rapidly advanced, 3G and then 4G networks soon followed. This allowed faster speeds as well as streaming services— 4G networks were nearly 10 times faster than their 3G counterparts. With this expanded network accessibility, phones rapidly came to be seen less as a luxury and more as a need. Apple’s introduction of the iPhone in 2008 had a major impact on the market. With this introduction came the iPhone operating system (iOS), exclusive to Apple. An operating systemis one of the most important components of a computing device. It runs the interactions between the device’s hardware and software components (more on these later in the chapter). The second most popular operating system to emerge during this time was the Android operating system, first developed in 2005 and later acquired by Google. These two operating systems, each of which has advantages and disadvantages, are engaged in an ongoing 1.1 • Computing from Inception to Today 17
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=26&chunk=24
battle for market share. At the end of 2022, the Android operating system had a majority share of the market worldwide (nearly 72 percent). Today, nearly 90 percent of Americans own a cell phone; of those, nearly 60 percent are smartphones. LINK TO LEARNING It seems that people are either iPhone users or Android device users, with an unwillingness to shift platforms. Although the two operating systems that run iPhones and Android devices (such as Samsung’s Galaxy phones), respectively, have similar performance capabilities, they vary dramatically in terms of the user experience. The proprietary software working behind the scenes also limits the apps, or programs, that are compatible with each device. Read this article on the differences between Android and iOS (https://openstax.org/r/78AndroidiOS) to learn more. Which operating system do you prefer? Why? The adoption of mobile phone technology has had a large economic impact in the United States and worldwide, giving rise to new products (cell phone cases, pop sockets, wireless earbuds, screen protectors) that did not exist before mobile phones hit the market. Other industries such as clothing and handbags have also been impacted: It’s now commonplace for a jacket to have a specific phone pocket, and many handbags and backpacks have slots designed to accommodate most cell phones. The creation of mobile phone apps has developed into an entirely new industry that has created many jobs worldwide. And beyond these tangible effects of the cell phone boom, there have been some significant changes in how we operate in our business and professional lives. About 40 percent of all business transactions are conducted on a mobile phone device. Companies rely on mobile technology to conduct essential correspondence with their employees and their customers. Gains in efficiency and collaboration across geographic boundaries are now easier than ever. Consumer product companies use mobile devices to advertise in new ways and to expand their market reach. We may use the technology to stay in contact with out-of-town family members, to connect to our bank or our health- care provider, and to make everyday purchases. Many children growing up today have never had a home landline phone ring or not even heard a dial tone. The dial tone is a sound that indicates that a landline is active. It can be difficult to imagine a world before cell phones, even though it was not all that long ago they first emerged on the market. LINK TO LEARNING Listen to this video on vintage telephone network sounds (https://openstax.org/r/78Telephone) to hear what a dial tone sounds like, as well as sounds from telephone technology through the ages. Digital Image, Video, and Audio Capture Devices Image, video, and audio capture are another area of technological growth that many people now use daily. Photography was invented in the mid-1800s, and it took a century and a half for digital imagery to emerge, in 1957. Using binary digits, Richard Kirsch was able to convert a photograph of his son into a digital image using the only programmable computer available in the United States at the time. The photograph was scanned electronically in small squares of the image, now called pixels, and reconfigured using white and black, as Figure 1.13 shows. The binary data for the image could then be stored on the computer. This development, along with the invention of the microchip, laid the foundation for future work in digital imaging. 18 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=27&chunk=25
Figure1.13 Kirsch took a photo of his son Walden and was able to capture the image digitally using binary digits. Part (a) shows the digital scan of Walden Kirsch from (b), the original photo. (credit a: modification of “NBSFirstScanImage” by Russell A. Kirsch/ Wikimedia Commons, Public Domain; credit b: modification of “Walden Kirsch” by Russell A. Kirsch/ Portland Art Museum, Public Domain) The scientific community, government, and the military soon took notice of the advantages of using the digital approach to capturing images. Beginning in the 1960s, NASA used the technology to transmit images back from space through television receivers. Tech companies created new storage methods, such as saving images to tape. RCA built the photo-dielectric tape camera for NASA, which was able to store about 120 images on tape—a huge impr ovement over the long processing times needed for previous digital images. This technology continued to grow over the decades, and soon combined with mobile phone technology. In 1997, the first image was taken using a camera phone. Cell phone manufacturers quickly launched new phone models that included cameras, and most of today’s devices include a digital camera. The 2004 emergence of Flickr, a popular photo-sharing site, as well as the launch of Facebook that same year, provided new ways for people to share and connect via digital photographs. The digital camera revolution transformed how we conduct business and stay in touch with family and friends. The use of webcams and videoconferencing technology has enabled many to conduct business across geographic boundaries and to telecommute from home to their job. This has changed the face of the traditional office environment for all industries and parts of the marketplace, such as government agencies, corporations, small businesses, and service organizations. And in many ways, digital cameras have changed our everyday lives. The use of digital cameras has revolutionized many medical procedures and how we interact with our health-care providers. Digital cameras have enabled us to see space beyond the earth and moon. Consumer products can be test marketed and brought into consumers lives’ virtually. Parents have the capability to monitor their babies sleeping in cribs. Doorbell cameras have increased our sense of security in our homes. The cameras we have at our fingertips today have far surpassed the imaginations of the early inventors of this technology. REAL-WORLD APPLICATION Virtual Reality and Marketing Virtual reality (VR) refers to a simulated environment that is computer-generated. Through the use of devices such as a helmet or glasses, the user sees a simulated world and is able to move about it visually. Instead of simply viewing the scene from an outsider’s point of view, the user is immersed in the actual scene. Companies such as Nike, Wendy’s, McDonald’s, and Gucci have used VR to creatively demonstrate 1.1 • Computing from Inception to Today 19
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=28&chunk=26
new products to consumers and to allow consumers to interact with a new product concept. Even small businesses have capitalized on the technology, which enables them to bring ideas in front of consumers quickly without the expense of creating an actual prototype of the product. This concept has application across a wide range of industries, from restaurants to real estate to consumer products. Games and Gaming Devices Computerized games for entertainment existed long before today’s gaming consoles. When computers were starting to gain a foothold in the American household, their primary use was for entertainment. The initial concept of computerized games was centered on taking existing, often traditional games, such as checkers and chess, and moving those to the computerized platform. The first video game was developed by an American physicist. William Higinbotham developed the game Tennis for Two in 1958 using an analog computer with an oscilloscope display. This simple invention laid the groundwork for one of the most profitable industries in the world. It is estimated that over 60 percent of U.S. households today have members who regularly play video games. Technology progressed to the first gaming console, 1967’s Brown Box, and then to 1972’s Atari, with its popular game, Pong. In 1978, Space Invaders hit the arcade market—a game venue marketed heavily to bo wling alleys and retail locations. The arcade craze became a huge commercial success for the game makers as well as the businesses that purchased the games (Figure 1.14). Motivated by getting to the top of the scoring list, players were readily putting their quarters into the machines. Over the next decade, nearly two dozen companies developed arcade games, including the well- known game Pac-Man, which was introduced to the U.S. market in 1981. Figure1.14 The arcade of the 1980s changed how teenagers spent their time and their money. (credit: “the Luna City Arcade” by Blake Patterson/Flickr, CC BY 2.0) The decades that followed saw the leap from Intellivision to the Nintendo Entertainment System (NES) and Nintendo’s handheld Game Boy device. At the end of the 1980s, Sega emerged as a major competitor to Nintendo. Their gaming system had better graphics and new creative energy, bringing on what would become some of the most popular games of our time, like Sonic the Hedgehog. As new game concepts emerged, controversy over violence in games and other questionable content prompted a government response and the creation of an industry rating system for games. SPOTLIGHT ON ETHICS Video Games and Violence Early video games were based on traditional board games such as chess and checkers. But over time, with increases in graphic capabilities and new companies coming into the market purely as game developers, 20 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=29&chunk=27
new game concepts were developed. At times, these new game concepts contained what some considered to be inappropriate language and situations. The American Psychological Association even considers the playing of violent video games as a risk factor for aggression. The violence in video games prompted a congressional hearing on the matter in 1993. The hearing focused on three controversial games: Doom, Night Trap, and Mortal Kombat, the first video game to include realistic depictions of violence. Despite this, the game was allowed to be sold, but a new rating board emerged from the hearings called the Entertainment Software Ratings Board (ESRB). It is a voluntary, self-regulated entity run by the Entertainment Software Association, which rates games according to their level of violence and recommends appropriate age levels for users. Some stores will not sell video games without an ESRB rating. As the trajectory of advances in games and consoles continues, today it seems that a new and improved system hits the market every year. Many people also have games downloaded on their phones. And the concept of e-sports has reached colleges and universities, both as an academic program and as an NCAA- recognized collegiate sport. The future of video games seems to be moving in the direction of artificial intelligence (AI) and virtual reality simulations, with both Apple and Google making company acquisitions in that arena. REAL-WORLD APPLICATION E-sports in Colleges and Universities The term e-sports refers to a sports competition using video games. Like professional football, baseball, and other sports, e-sports events have a large following, including both spectators at the actual events and others who join to watch the action virtually. E-sports became a large player in the gaming industry around 2010 and has since exploded worldwide to such an extent that colleges and universities are taking notice. The impact on the academic environment can be seen in three key areas: academic programs such as game developing, student groups focused on gaming, and collegiate sports. Some institutions are even offering scholarships for e-sports similar to traditional athletic scholarships. Mobile technology, digital imaging, and gaming capabilities today are inherently intertwined. Often, all three coexist on a single device. As just one example, consider how we use Google Photos on our phones to share family memories. Extending this capability, in a video game app on a mobile phone, a user can create a character using their photo and then have this virtual character interact with other players across the world. In the business world, many of us now use Zoom or other videoconferencing tools to connect with colleagues remotely. Outside of work, users of gaming consoles can chat with other players through their phones or through the console. Many games today are designed from the start to be played on multiple platforms. Microsoft is even offering mobile phone plans for customers. Each technology has changed our lives, but together their impact has been remarkable. Advances in Technology Technology is advancing faster than what was previously believed to be possible. In just a short period of time, we have gone from having no computers to today where nearly 90 percent of people in the United States have some access to a computing device. What’s also impressive is that 90 percent of data in the world today was generated in just the last two years. Today’s 5G technology is 100 times faster than 4G, and the rate of adoption of new technologies has diminished from years to mere months in some cases. As you can see in Figure 1.15, older technologies such as refrigerators and landlines took decades to reach widespread adoption with a majority of Americans buying them, while today’s smartphones and tablets achieve broad adoption as 1.1 • Computing from Inception to Today 21
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=30&chunk=28
soon as they enter the market. Figure1.15 (a) Historically, the rate of adoption for new technologies has taken decades. (b) Now, new products to the market reach more than a 50 percent adoption rate in just a few years. (credit a and b: modification of work by Our World in Data, CC BY 4.0) Computers today typically double their capabilities in less than two years. With this in mind, we can expect computing capabilities to continue to increase at a similar rate. The rate of change is increasing exponentially because companies are building on existing technologies. Researchers can take what has worked well to rapidly refine and enhance technologies for innovations and improvements. Additionally, resources from across the world—both financial r esources and human capital—ar e being pumped into supporting these technological advances. To put the popularity of computer technology into perspective, consider how long it 22 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=31&chunk=29
takes to get fifty million users for a product. Radio took thirty-eight years after its invention to become that popular, while the hit game Angry Birds needed only about thirty-eight days to reach that milestone. Figure 1.16 shows some common products and how long each of them took to reach the same milestone. Figure1.16 Products are being adopted at a faster rate than ever before. The advent of social media has exponentially increased the spread of some of these later innovations. (data source: Interactive Schools, https://blog.interactiveschools.com/blog/50-million- users-how-long-does-it-take-tech-to-reach-this-milestone) AR/VR Simulations Using digital objects in a real-life picture or scene is called augmented reality (AR). For example, think about the overlays or filters you can put on photos in some social media apps. A mostly simulated, 3-D environment in which the user can move about visually and interact is called virtual reality (VR). Both technologies have applications in many industries. For example, if you want to try a new style of glasses, you could use AR to see what those glasses might look like on your face. You might use a VR simulation to offer your insight on a yet- to-be-developed product concept. Other applications could be in manufacturing, real estate, medicine, and education. One recent example of the use of VR was seen when the NBA had to cancel games because of the COVID pandemic. To keep fans engaged, the league offered VR passes that enabled ticket holders to attend past games in a VR environment and nearly be courtside for the action. The only equipment they needed was the app and a VR headset. (VR headsets are widely available for purchase, typically for under $200.) This was a unique use of the technology to keep the audience’s attention during a difficult time. Robotics and Automation Robotics should be distinguished from automation, which refers to using computers or machines to do tasks that could be completed by a person. Automation can be quite technical, using computerized technology, or it can be a mechanical process using machines. For example, processing retail transactions, which was once handled by people using pen and paper, is now well automated through the use of a computer. On the other hand, roboticsis centered on robotic machines, which are now used in nearly every industry. These machines can automate some tasks that were previously performed by humans, but they can also be programmed to perform tasks that no human could perform. Consider some medical procedures that can now be carried out using robotic machines but that simply were not possible in the past, such as certain procedures 1.1 • Computing from Inception to Today 23
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=32&chunk=30
on the brain. The use of robots in the workplace can reduce errors, increase safety, enhance productivity, and reduce time spent on routine tasks for employees. Robotics has been a part of the manufacturing environment for some time. But today we see increasingly unique applications of robotics in the workplace. For example, the University of California is testing a robotic pharmacist, which will perform many of the functions of a traditional pharmacist, such as choosing the correct prescription and dosage. Robots are also being used to keep areas clean and sanitized; in some cases, robots can be used to clean up spills that might otherwise be hazardous to humans. Giant Food Stores is piloting a program that uses robot assistants throughout the store to monitor for spills and potential hazards in the aisle. Drones (a kind of robot) are used in some military applications, and the use of drones is being tested for package delivery. Finally, robots can be used to find and rescue victims in disaster situations where it might be too dangerous to send in typical emergency personnel. Nanotechnology Another advancement in technology is nanotechnology, which entails changing individual molecules to produce different properties or attributes. It can be applied to a wide variety of fields, including engineering and chemistry, as well as to medicine and consumer products. The U.S. National Nanotechnology Initiative was launched in 2000 to manage research and development in the field, and the first academic program centered on nanotechnology emerged by 2004. At that time, the technology was being heavily tested with consumer products. Nanotechnology has been used to make golf balls go straighter, make car bumpers more dent resistant, and give cosmetics and lotions deep skin-penetrating properties. With nanotechnology, drug delivery to patients can be better targeted and controlled. Filters made using nanotechnology have been used to filter drinking water sources in countries such as India. In agriculture, nanotechnology has improved yields with the use of soil analysis and targeted fertilizer applications. Nanotechnology can also be used to better combat air and water pollution through increased filtration efforts. Research into nanotechnology possibilities continues to expand. Wearables A wearableis a device that uses computing technology to collect and receive data via the internet. You may already be using a wearable technology device—for e xample, a smartwatch. Using similar technology to a smartwatch, Motiv has developed a ring that can track fitness goals and sleep cycles. As Figure 1.17 shows, you would never know it was a smart ring from its outward appearance. Other wearables include heart rate monitors and a medical alert device. These devices can be worn, incorporated into apparel, or even embedded into the skin. The military is even considering using embedded wearables to keep track of troops. Some cutting-edge wearables are centered in the medical industry; for example, a wearable has been developed that can detect early signs of breast cancer. Figure1.17 The fitness tracking ring is a new take on the fitness tracker. It can track activity and sleep cycles and send the information to your smartphone. (credit: “Left hand with Oura smart ring on finger, right hand shows phone with the Oura app´s 24 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=33&chunk=31
energy and activity statistics” by Marco Verch/Flickr, CC BY 2.0) Some professional athletes use wearables to improve performance and track incidences of concussions. Wearables for children are becoming more popular for location tracking. The possibilities are endless. It is estimated that there are nearly a billion wearable devices active globally, over 50 percent of which are smartwatches. And about a quarter of wearable users wear the device while sleeping. Revenues in the industry are nearly $10 billion in the United States. Wearables are now also being used for ticketing purposes at concerts and amusement parks. LINK TO LEARNING You may have a smartwatch or use a fitness tracker when working out. These are commonplace wearables in today’s society. But where is the industry headed? Wearables have been identified as an area of growth in the economy. Many tech companies are focusing on innovative ways to incorporate internet-connected devices in different settings, as illustrated in this article on the wearable tech of the future (https://openstax.org/r/78WearTech) in Time. You may be surprised to discover just how futuristic they are becoming. Smart Spaces An internet-connected space—office, home, car , or building that incorporates technologies that can be controlled from the internet—is called a smart space. In homes, we see products centered on convenience, security, and comfort. The goal is to improve your life without interfering and creating a nuisance. For example, you can have a thermostat that enables you to control the temperature in your home from your phone, even when you are not at home. You can have a device that switches on the lights or the TV when you verbally ask it to do so, or home security lights that come on for your safety as you approach the front door. With products such as Google Home Smart, shown in Figure 1.18—a virtual assistant that is connected to the internet—all members of the family can contr ol many devices. If you have your devices synced to one another, you can even have Google Home tell you your calendar appointments for the day or set reminders and alarms. Figure1.18 Devices such as Google Home Smart are creating "smart" spaces that are able to be managed from remote locations, such as the workplace. (credit: “Home Automation22” by mikemacmarketing/Wikimedia Commons, CC BY 2.0) Similar technologies can be employed in the workplace. Smart offices/buildings can be equipped with many of the same technologies—a good str ategy for managing utility costs and adding convenience for employees. Smart offices can make employees more productive by giving them more time to focus on creative and 1.1 • Computing from Inception to Today 25
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=34&chunk=32
strategic tasks as opposed to more routine and mundane responsibilities such as sending invoices or even turning on the office lights. Job satisfaction can be increased by giving employees more control over their workspaces. A unique application of the technology is its use in schools, which is being piloted in Texas with a partnership between two private companies and Microsoft. They are equipping schools with a variety of connected devices centered on security and communication in an emergency. These devices can communicate internally during an emergency, such as a fire, and can also communicate externally with first responders and police. There are some challenges in the smart space industry. Many concerns arise about the invasive nature of some of the connected devices, including concerns about recording personal information, governmental monitoring of the information, and the usage/security of the data collected. Another challenge is educating consumers on how to use the equipment and its capabilities. Finally, the price point is high for some of these devices because many are still rather new to the market. AI and Machine Learning Using computers, robots, and machines to mimic the human brain is called artificial intelligence (AI). From problem solving to perception to learning, the goal is to reduce errors and minimize human biases and emotions in the process. In machine learning, a subset of AI, an AI device learns on its own, gathering data and using that data to continuously refine and “learn” about the system and its usage. Speech and image recognition are two examples of AI. Another example is a robot vacuum cleaner, where the AI system uses a computer and the data it collects to know where to clean in the home. Figure 1.19 shows the popular Roomba vacuum. Still another example is seen when websites show recommended products for you based on your prior searches. The device learns your likes and dislikes based on your clicks and other related data. Figure1.19 AI in the home can take over inconvenient or repetitive tasks such as cleaning. (credit: “iRobot Roomba 870” by Kārlis Dambrāns/Flickr, CC BY 2.0) In a more large-scale use of AI, for quite some time airlines have made use of autopilot features, including robotics, image recognition, and GPS, to fly and navigate an aircraft. In the retail industry, the use of AI is expected to grow about 30 percent by 2028, a strong increase, to include applications centered on personalizing the customer experience as well as managing distribution and inventories. Today, AI technology has evolved to create stories in the style of famous writers or even write detailed research papers when prompted. Workplace and Career Implications Technology in the workplace has made processes faster and more reliable, increased collaboration, made it possible to work from anywhere, and, overall, changed the typical office culture. The adoption of new technologies in the workplace has some distinct career implications for individuals, while organizations need to figure out the best mix of humans and technology to allow the business to thrive. The idea that technology eliminates jobs is a myth: Technology introduced into the workplace is intended to help employees do their jobs better, not to replace jobs. But this does mean that employees may need to shift from more traditional tasks to tasks that are more technology-driven. For example, an employee in the human 26 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=35&chunk=33
resources field may have spent hours sifting through résumés for contact information to schedule interviews. With technology, this process can be automated, freeing up time for the employee to focus on more meaningful tasks such as interviewing candidates and decision making. In a manufacturing environment, technology can enable employees to focus on process improvements and problem solving rather than working with repetitive tasks on a production line. These changes affect our future educational and training needs. Some jobs that require a lower skill base have been replaced with technology. Additional training may be necessary in areas such as troubleshooting technology in the workplace. The shift for employees today is toward capitalizing on brain power, reserving human capital for the complex, multifaceted tasks that technological advances cannot tackle. Therefore, training and education in critical thinking, communication, problem solving, and teamwork skills are a necessity. These skills are of value at all levels within an organization. Jobs in the technological fields are expected to grow; however, an emphasis will be placed on the essential skills of communication, fostering cross-functional collaborations, and creative problem solving that cannot be replicated by technology. REAL-WORLD APPLICATION Changing Careers Facing a career change (whether voluntary or not) can be a scary proposition, especially if you have been in your current position for some time. With changes in technology, many people will face decisions regarding their career direction, either needing to change focus within their current industry or, in some cases, pivoting to an entirely different industry. Here are some tips to consider when you are facing a career change: • Identify areas where you can further develop your technological skills. • Use your network to find out about job opportunities. • Take a certification course for a particular computer program or a class on enhancing your public speaking skills. • Reach out to your network, either social media or sites such as LinkedIn, to make people aware that you are interested in a new opportunity. It is important to take the time to find the right opportunity and then to take small steps to get where you want to be. Think about your long-term goal. Do your research by interviewing those in the industry you want to be in or utilize a job coach/mentor to assist in your journey. Would you consider a career change? Why or why not? If so, what strategies will you use to make the transition easier? Importance of Lifelong Learning To protect your job security in the workplace of the future, you will want to demonstrate to your employer that you are committed to lifelong learning. With the rapid acceleration of technological change, some employers today are actively seeking employees with a lifelong learning mind-set. Lifelong learning requires continuous self-improvement and education—the motivation to be a continual student. It often occurs outside a traditional educational system and includes both informal channels and formal ones such as corporate training programs. Employee development is a core part of many human resources departments within organizations. Mandatory training or education may be required for your position, or voluntary opportunities may be offered to employees. Taking the initiative to learn and adopt new workplace technologies can be both professionally and personally fulfilling. There are some strategies you can use to help further a lifelong learning mind-set. First, understand your personal interests and set some goals that align with them. Lifelong learning does not always have to incorporate building skills or knowledge applicable to the workplace. It might be centered on something you 1.1 • Computing from Inception to Today 27
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=36&chunk=34
enjoy in your personal life. For example, suppose you really enjoy genealogy and local history. Perhaps you decide you want to learn more about the history of your hometown. For local history, you might visit the local historical society or find internet resources about the history of your hometown. Then, you can determine how you might incorporate this desire for learning into your life. Will you do something related to your personal learning goals once a week? Will you share your new knowledge with coworkers, friends, or family? Or maybe you can find a way to utilize the new information in the workplace or the community. There are many ways to incorporate a lifelong learning mind-set into your life. Regardless of your approach, the lifelong learning mind-set can be advantageous from both a personal and a professional standpoint. 1.2 Computer Hardware and Networks Learning Objectives By the end of this section, you will be able to: • Explain the components that make up a computer • Describe how computers process and store data • Discuss what networks are and how they function • Understand how to maintain and clean computer components You do not need to know how to build a computer from scratch to effectively use a mobile device or other computing technology. However, a basic understanding of how computers operate can help you troubleshoot problems, and with some knowledge of computer terminology, you will be a more informed consumer when you are making technology purchases. Although there are technological and programming differences between computers, tablets, gaming consoles, and mobile devices, all are built around the same basic technology. This technology has evolved through innovations in the field to offer users enhanced features, reduced costs, and increased operating speeds. This section will cover some basic aspects of computing. These concepts will give you a broader understanding of the technology you are using beyond simply operating the computer or tablet for personal or work tasks. What Is a Computer? Although today’s computers look and behave differently from early efforts, they include the same core features. A computeris simply a programmable machine that can execute predefined lists of instructions and respond to new instructions. A very large computers called a mainframeis capable of great processing speed and data storage. Mainframe computers today typically function as servers. Servers are powerful computers that act as a central hub of the technology needs for the organization. Servers support data storage, sharing of computer programs, and hosting websites. Another name for a computer program (language) or set of programs with the end goal of converting data into processes and actions is software. Software, such as Microsoft Word, allows the user to interface with the computer. Accessories such as a keyboard, mouse, printer, and monitor are called hardware. These input and output devices allow us to communicate with the computer and to extract information from it. There are many different types of computer systems, including workstations, microcomputers, and supercomputers. A workstationis a powerful single-user computer that is similar to a personal computer but more powerful. They are typically used to manage business operations such as invoicing customers, managing online sales, or ordering inventory for the company. A minicomputeris similar in power to mainframe computers but, as the name implies, is much smaller in size and can be used in midsize organizations that need more power than what a typical personal computer might provide. A supercomputeris extremely powerful and has the fastest processor available. These computers can be used to process highly complex scientific data at fast speeds. Computers are hard to get away from—the y’re in all kinds of everyday devices. Appliances, cars, watches, and 28 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=37&chunk=35
even the heating and cooling systems in our homes incorporate computer technology that enables us to send and receive information from these devices. Today’s smartphones are essentially minicomputers. How Computers Work Most computers consist of a few basic elements. The motherboardis the hardware that runs communications for the computer system (Figure 1.20a). It sits within the system unit, which is the container that houses most of the computer’s electronic components. The central processing unit (CPU)contains a single chip called a microprocessor(the “brains” of a computer system). A microprocessor (Figure 1.20b) consists of a control and what is known as an arithmetic-logic unit, which performs math and logical operations within the computer system. Figure1.20 Two essential components of a computer’s inner workings are (a) the motherboard and (b) the CPU’s microprocessor. (credit a: modification of “Green Motherboard” by Pixabay/Pexels, CC0; credit b: modification of “Intel Core 2 Duo E6750” by Nao Iizuka/Flickr, CC BY 2.0) Personal Computers and Devices Numerous types of computers and devices are available for business or personal use today. A personal computer (PC)is a microcomputer that is suitable for individual use, including a desktop computer, laptop, tablet, smartphone, and wearable device such as a smartwatch. Desktop computers are personal workstations that you set up at a fixed location, such as a desk. They are typically equipped with a tower (where components such as the motherboard are housed), a monitor, and other peripheral accessories, such as a keyboard, mouse, and printer. Laptops are portable and lightweight—small enough to fit into most briefcases. The computer and monitor are combined, and peripheral accessories are optional. Tablets, such as the Kindle, are smaller than laptops and have less functionality but are still very powerful, with many features that support everyday personal use. They are even more portable than laptops, and their touch screens, which don’t require a mouse, are their distinguishing feature. Operating Systems As stated earlier, a computer’s operating system is software that is essential to all functionality and use of the computer. It controls the computer’s activities, from memory to processes, and ensures that hardware and software components can “speak” to each other. It provides the interface necessary for humans to communicate with the computer and all its components. Here is where the big players enter the computing scene: Microsoft Windows, Apple macOS, and Google’s Android OS, to name a few. You will typically interact with Windows and Apple macOS on a laptop or tablet. The programs that we discuss in this text, such as Google Sheets and Microsoft Word, use their respective operating system. The Android and iOS operating systems are used for mobile devices. You are likely to see these operating systems in use daily, both in the workplace and in your personal life. Information Processing, Storage, and Memory Businesses take great care in procuring computers that can handle the work that needs to get done. Before 1.2 • Computer Hardware and Networks 29
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=38&chunk=36
selecting computers, they’ll investigate some basic functions that have to do with how fast the devices process information and how well they store data. The information processing cycleis the sequence of events involved in processing information—input, pr ocessing, storage, and output: • Input consists of entering the data and information into the computer system. • Processing involves a series of operations performed by the computer to organize, interpret, or otherwise make use of the information input into the computer. • Output entails viewing this processed information in a way that makes sense to the user, either through the monitor or as a printout. • Finally, storage is the process of saving information into the computer for future use. There are two types of storage, primary storage and secondary storage. Primary storage refers to temporary files that are available only when the computer is on. Primary storage is also known as short-term memory, or random access memory (RAM). This type of memory is not meant to save information for future use but allows the computer to operate and process information quickly as it is being used. Secondary storage is considered permanent storage on a computer system or removable device, such as the old floppy disks. You may also be familiar with another type of memory— cache. The computer’s cache holds data that can be retrieved quickly, often including downloads from websites or other information that can be used to load websites faster. The cache operates in the background to help the computer operate more quickly. A hard diskis considered secondary storage where users can save files and retrieve data and programs. There are two types of hard disks, internal and external. An internal disk driveis housed within the computer unit, and users update and produce copies of all files they need. Figure 1.21 shows a few types of external disk drive. These are portable, allowing the user to save information outside of the computer unit for use elsewhere. Before an operating system loads and is ready to use, the computer needs hardwired instructions, called read- only memory (ROM). Businesses should be sure to procure computers with sufficient RAM and to make sure that data storage solutions are in place to handle their needs. The amount of RAM impacts the speed at which programs run. Computers with less RAM are slower and can hinder work productivity in the workplace. Often businesses will begin with less RAM and eventually upgrade to higher levels as their business and needs expand. Figure1.21 Different types of storage devices used over the years include (a) floppy disks, which are no longer used, (b) CD-ROM disks, and (c) flash drives. (credit a: modification of “Floppy Disk Data” by OpenClipart-Vectors/Pixabay, CC0; credit b: modification of “Dvd Cd-Rom Compact Disk” by OpenClipart-Vectors/Pixabay, CC0; credit c: modification of “Usb Disk Disc” by Clker-Free-Vector- Images/Pixabay, CC0) Networks Talk about networks is common in the workplace. You will hear that the network “has gone down” or “is running slow.” What does this mean? What is a network, anyway? A networkis a connection of two or more computer systems, as well as devices, by either a cable or a wireless connection. Networks may be simple or 30 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=39&chunk=37
complex, self-contained within a small area like your home or dispersed over a large geographic area. These different types of networks are called personal area networks (PANs), local area networks (LANs), and wide area networks (WANs). Personal area networks typically connect personal computers and devices within a small area. Local area networks (LANs) are primarily used by colleges and universities as a way of linking computers and sharing printers and other resources. Wide area networks (WANs) allow access to regional service providers and span distances greater than 100 miles. The internet is a wide area network. Network Hardware In order to function properly, networks depend on a router. These devices perform two functions: they direct the data traffic, so to speak, from one network to another, and they allow multiple computers to use the same internet connection. Routers can vary in shape and size and also by performance. Switches coordinate direct flow of data between components. Gateways are devices that allow one local area network to be linked to other LANs or larger networks. The purpose of a hubis to send a received message to all connected devices rather than just the intended ones. Network Servers A clientis a device that requests and uses resources available from other devices on the same network. For example, if you use a computer at your local library or a computer located on your campus, you are using a client device. In the workplace, the computers that employees have at their workstations are often connected through the network and are clients to that network. A serverconnects devices and allows for resource sharing across the network. Servers may have different functions. Examples are application servers, communication servers, database servers, file servers, print servers, and web servers. Network adapter cards connect computers and devices to a network, enabling the sharing of hardware, software, and data across the network. The network adapter card connects the system unit to the network via a network cable. These cards used to be purchased separately in the early days of personal computers, but most computers today come with integrated cards embedded in their motherboard. The devices sending and receiving data are identified by transmission control protocol/internet protocol (TCP/IP), which organizes the information into small packets for transmission through the network and across the internet. One of the most widely used internet protocols, used for web traffic, is hypertext transfer protocol (HTTP). HTTPSis a more secure protocol than HTTP, for users and website owners alike, because users’ information is protected with a “pass” safety inspector embedded within the protocol. Before exchanging confidential information, such as credit card information, online, users should always verify if the website begins with https. And even with this safer and more secure connection, you should always be cautious when sharing information. Secure File Transfer Protocol (SFTP) is a secure version of file transfer protocol; it provides a secure connection for transferring files. User datagram protocol (UDP) is a communication protocol that works across the internet for time-sensitive transmissions such as video playback. Its main goal is to speed up communication by establishing connection before data is transferred. Another security protocol that uses encryption to help ensure privacy of information and communications across the internet is secure sockets layer (SSL). Cybersecurity is a major concern of computer users, both personally and professionally. As encryption technology has progressed, there have been several iterations of SSL protocols. Today, the encryption is referred to as TLS (transport layer security), but the intent is the same—pr oviding protection of data that is shared via the internet. SPOTLIGHT ON ETHICS Secure Information Transfers One of the most common types of cybercrimes is identity theft, which occurs when a hacker steals an 1.2 • Computer Hardware and Networks 31
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=40&chunk=38
individual’s identity for economic gain. The increase of hackers, individuals who gain unauthorized access to computer systems in an attempt to steal someone’s information, has become a major issue and has led to the development of such software programs as Norton Antivirus and LifeLock to protect consumers’ identities. Another major safety concern when using computers is the existence of malware and viruses—softwar e that can damage or slow down a computer system by opening an insecure portal into your computer. Malware can also damage files and allow hackers access to files and information stored on your computer. Depending on how these programs are written, they may only damage the computer that initiated the virus/malware, or the malware may flow throughout networks by attaching itself to other files that are exchanged across the network. Users should be very careful when opening files sent to them in email or when clicking links to unfamiliar websites. Phishing scams are very common. These are attempts by hackers to gain access to your personal information, such as the credentials you may use to access financial and other sensitive accounts. Phishing most often occurs through email that appears to come from a reputable source, or via social media. It is always best to avoid logging into accounts through links sent in email, clicking on links that are not secure or recognizable, or opening files unless you know who the sender is and what is being sent. 1.3 The Internet, Cloud Computing, and the Internet of Things Learning Objectives By the end of this section, you will be able to: • Explain how the internet has evolved and how it functions in today’s world • Describe how to conduct an effective internet search • Conduct business research on the internet • Explain the use of cloud computing for business • Define the Internet of Things The internet has dramatically transformed how we access and manage information, both at home and in the business world. For many people, it’s almost impossible to go about your day without needing access to the internet. It’s in your home—fr om smart doorbells to TVs, thermostats, and personal assistants. It’s on your wrist, in your car, and, of course, on your phone. It’s big business and it is integral to just about every business out there. Established businesses have taken advantage of the ability to reach new customers by selling their products online, while would-be entrepreneurs use the internet to open online storefronts. The internet also enables us to conduct both personal and professional transactions more efficiently—fr om accessing important health- care documents to filing our tax returns, transferring money between bank accounts, and making payments to individuals online. Many of us practically run our lives through our phones. LINK TO LEARNING Read this article on the invention of the internet (https://openstax.org/r/78InternetInv) to learn more. When was the internet first developed and for what purpose? How did it evolve into the internet we use today? The Internet: From Inception to Today The internet as we know it today originated in the 1960s with the idea of using a traditional telephone 32 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=41&chunk=39
switching circuit to wirelessly connect computers in a network. The telephone system would allow these computers to communicate with one another, exchange data, and run shared programs. Researchers and engineers from both the public and the private sector came together to form the Advanced Research Projects Agency (ARPA) to investigate ways the U.S. military could improve communications, with the goal of protecting the country from unexpected enemy attacks. In 1969, a new digital packet switchingtechnology was introduced to enable two computers to communicate with each other, replacing the telephone circuit technology. Packet switching happens when computers break down data or information into smaller groups (packets) and transmit several of those packets over the network. When the packets reach the destination computer, they are put back together in their original form. The communication occurred through the traditional phone line system but was transformed into digital data during transmission. The packet technology did not require a dedicated telephone line to network the computers together. This was the origin of the ARPA Network, or ARPANET, and is the same technology used today for the internet. The networked computers were also able to send simple messages to one another, setting the stage for email as we know it today. Figure 1.22 shows an early iteration of the ARPA network. Figure1.22 In the 1970s, ARPA’s network consisted of a series of nodes (connectors) and lines that stretched across the continental United States. (credit: modification of “Arpanet 1974” by Yngvar/Wikimedia Commons, Public Domain) In less than five years, the network expanded to include thirty different organizations and institutions across the world, and by 1975, ARPA determined that it needed to establish standards for consistency. These rules helped ensure that the interconnected network, or internet, was secure and efficient. The transmission control protocol/internet protocol (TCP/IP) was established to standardize the computer language used between the computers in the network. With these rules, a unique internet protocol address (IP address)allowed users to determine the geographic location of any computer on the network. The IP address was also used to direct the transmitted information to the appropriate destination. Because the IP address is a series of numbers and decimal points that can be hard to remember, the domain name system (DNS)was developed in 1983 to convert IP addresses into simple names. The DNS thus became the phone book for the internet, enabling users to send a message using their name, the symbol @, and the location of the computer as identified by its 1.3 • The Internet, Cloud Computing, and the Internet of Things 33
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=42&chunk=40
domain name. With the DNS, the foundation of the World Wide Web (WWW) was put into place. The term internet simply refers to the interconnected computers, a network that now extends across the world. The WWW is the content that has been collected over the internet and is available online. By 1981, the network had grown to over 200 hosts. The first domain name was registered in 1985 to a computer manufacturer. By the mid-1980s, scientists and researchers across the world were working on computer networking technology. With the success of the ARPANET, the ARPA group was charged with working on other, more cutting-edge projects. The ARPANET-connected organizations were predominantly government entities or educational research centers; the system was not available for commercial or personal use. Consequently, the project was moved to the U.S. Department of Defense, where the network continued to expand through various branches, including NASA and the National Science Foundation (NSF). In 1985, the NSF created the structure for a supercomputing center to connect colleges and universities, research centers, and regional networks. By the end of the 1980s, this network had grown to over 30,000 hosts. As a result, ARPANET was decommissioned in 1990. In 1989, the first dial-up internet service provider (ISP)was established, allowing commercial access to the internet. The term dial-up internet emerged to describe how users would use existing telephone technology to “dial up” internet access through a specific provider. Because the internet was established primarily for military use, access to the technology was highly restricted, limited to specific uses such as research. By 1992, Congress had allowed the NSF to grant some access to the network for uses beyond education and research. Then, in 1995, all restrictions on noncommercial uses of the internet were lifted. In these early days, a good deal of computer knowledge was needed in order to use the network, so the internet was not yet part of mainstream life. But that was about to change. In 1990, hypertext transfer protocol (HTTP), hypertext markup language (HTML), and the uniform resource locator (URL) were developed to give the average person access to the web of information. This really was the birth of the World Wide Web. HTML provides the structure on which web pages are based; it is a series of commands that describe attributes such as the font size and background colors of the displayed page. The uniform resource locator (URL) is an address—similar to a postal addr ess—that dir ects the user to a unique location or page on the World Wide Web. These two developments, along with the milestones shown in Figure 1.23 made the web less technically complex and easier for the average person to navigate. People soon began to see the ease with which web pages could be created. In 1993, the first user-friendly web browser, Mosaic, came on the scene. A web browser provides the interface that you can use to search for the information stored on the WWW. Marc Andreessen, a student at the University of Illinois, developed it. One key feature of Mosaic was the ability to include images as well as text on a web page. Other features included buttons to select for navigating the page, the ability to include video clips, and hyperlinks. A hyperlinkis a link that can take the user from one web page to another just by clicking the highlighted link. Initially available as a free download, Mosaic quickly caught on and evolved as more users came on board. Prior to Mosaic, fewer than 200 web pages were available, but in just a few short years by the late 1990s, that number grew to more than 100,000. After graduating, Andreessen formed Netscape Communications and would eventually launch Netscape Navigator, which would grow to over 10 million users globally in just two years. Microsoft was quick to respond with its browser, Internet Explorer, which was bundled with the Windows operating system. 34 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=43&chunk=41
Figure1.23 Major milestones in the creation of the internet came in layers. LINK TO LEARNING HTML is used to create web pages. The information is contained behind the scenes and is used to format text and the layout of the page. Read this article about HTML and the process used (https://openstax.org/r/ 78HTMLProcess) to learn more. Watch this video on how HTML is used to build websites (https://openstax.org/r/78HTMLBuild) to learn more. By 1998, some big tech names established themselves as internet-based businesses—Hotmail, Amazon, Google, eBay, and Yahoo!, to name a few. The rise of the internet led to what became known as the dot-com bubble, a period when investors poured money into many internet-based ventures that promised high returns. Of course, many of these ventures failed, and their investors lost a good deal of capital. But, despite this, new ideas continued to emerge, and the internet continued to grow. Here are a few internet ventures that came out of the dot-com bubble and are still around today: • Wikipedia—2001 • Facebook—2004 • YouTube—2005 • Twitter (now X)—2006 • Hulu—2007 SPOTLIGHT ON ETHICS Inequities in Internet Access Having access to the internet is almost essential to fully participate in society today. In some instances, 1.3 • The Internet, Cloud Computing, and the Internet of Things 35
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=44&chunk=42
without the internet, even routine tasks can seem impossible. For example, some companies can be contacted only via the internet, so you may need internet access to even apply for a job. Because of the global nature of the internet, it might be assumed that everyone has access in some way. But even in the United States, there are large disparities in access to reliable internet connections. In today’s electronic world, this is furthering the gap between economic, racial, and ethnic groups; age groups; and socioeconomic groups. It is estimated that on average, nearly 15 percent of households in the United States with school-age children lack access to the internet. But in rural or low-income areas, this percentage could be much higher. Governments are introducing initiatives to make the internet more accessible to all, often through partnerships with technology firms. For example, in a partnership with Google, the city of Austin, Texas, has been able to provide free internet services for nearly 2,000 lower-income residents. As early as 2006, India established internet access in its rural communities through the use of kiosks. These are just a couple of examples of the efforts worldwide to make the internet more accessible for all. Using the Internet Using the internet today is much simpler than it was even as recently as five years ago. It simply entails going to the web browser of our choice and clicking the mouse to launch it. Common browsers in use today include Google Chrome, Apple Safari, Microsoft Edge, and Firefox. The browser, once opened, will take you to where you want to go online. You can go directly to a web page by typing its URL in the navigation bar at the top of the browser. However, many browsers have a default search engine that will automatically launch when you open the browser and will allow you to search the internet for content you want to locate or research. Chrome, for example, will automatically navigate to the Google search engine when you open the Chrome program. Most browsers include a bookmark feature, and it may be helpful to bookmark/favorite pages that you visit frequently or want to remember for quick access later. With Chrome, you will see a star on the right-hand side of the URL to select to bookmark/favorite the page. Figure 1.24 shows these buttons. Figure1.24 To use a browser, type the website URL address into the navigation bar. Here, we’ve typed www.google.com to get to Google’s famous search page. You can also bookmark/favorite websites that you frequent for quick access by selecting the star button. (Google Search is a trademark of Google LLC.) 36 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=45&chunk=43
Conducting Effective Searches Conducting searches on the internet is straightforward, but there are some techniques that will make your searches more effective. Because of the vast amount of information available on the internet, incorporating some simple changes to your search strategies can make a huge difference. You might, for example, want to narrow the number of results that you get from a search to those that are most relevant. When you begin to type in a search term, most engines will display a list of suggested searches. This list of suggestions will give you similar, related searches using the terms that you have begun to type into the search bar. This is often helpful as you try to narrow your search to obtain the desired results, as Figure 1.25 shows. Figure1.25 When you begin typing into a search engine, not just Google’s, most will offer suggested searches based on what you typed, as you can see in the list under the “flower arrangements” entry. (Google Search is a trademark of Google LLC.) As you conduct your search, it is often helpful to keep a list of search terms that you have successfully used. It is easy to forget that you have already used a particular phrase or word, so a simple list will make it easier to avoid replicating something you have already searched. For example, suppose your boss at WorldCorp has asked you to search for a local nonprofit organization centered on children to support this year during the holidays. You might choose to search using the word or phrase children, kids, not for profit, nonprofit, or children in need, as just a few examples. Search engines also offer the capability to search with an image or with voice instead of text. Once you have entered a search term or phrase, you have some additional options. For example, you can restrict the search to a certain date range or a certain location, or you can change the search to focus only on shopping related to your search term. See Figure 1.26. Keep in mind that once you reach a website, you will often find a search bar within the website itself. This will enable you to search within that specific website instead of conducting a search of the entire internet. A little trick for searching on a page is to use the control (Ctrl) key and the F key at the same time (Ctrl+F). When you press these two keys at the same time, a search window will appear that allows you to search on that specific web page. 1.3 • The Internet, Cloud Computing, and the Internet of Things 37
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=46&chunk=44
MAC TIP To search within a web page on a Mac, type Command+F. Figure1.26 Using the advanced search features, you can restrict your search to a location or date range. You can also search using voice or search with an image. (Google Search is a trademark of Google LLC.) To conduct an internet search, it is best to use specific and unique terms whenever possible. For example, when searching for contact information for a nonprofit organization in your hometown, rather than simply using the term “food bank,” you should use the actual name of the food bank you are searching. Or, if you are unsure of the name of the organization, you might limit the search by combining “food bank” with the name of your town or city. You can add a phrase as well. Being more specific in your searches will lead to more refined results. In defining your search, avoid using common words such as “a” and “the,” as well as punctuation marks. Also note that most search engines are not case sensitive, so proper capitalization is unimportant. Finally, to get the most results, it may be helpful to focus on the base or root word. For example, instead of searching on “running gear for women,” you might get more results by using “run gear women,” leaving the search open to words such as “runner” in addition to “running.” Your internet searches can be further refined by adding “+” or “–” in front of a word to either add to the search term or exclude something from the term. If, for example, you are searching for theaters but do not want movie theaters, you can type “theater–movie” to get search results that do not include movie theaters. This same approach can be used with “+” to add more terms to your searches. (Note: Some search engines may use NOT or AND instead of the mathematical sign.) To search for an exact phrase or string of words, enclose the phrase in quotation marks. For example, if you are looking for information about historic theaters, you can search by typing “historic theaters” and then perhaps add a location (city or state) at the end, also in quotation marks, so your search would be “historic 38 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=47&chunk=45
theaters” “Atlanta.” Use the tilde (~) to search for synonyms for the word you type. For example, searching “~coat” might return search results including jackets and sweatshirts. The asterisk (*) can be used to search partial words. This can be very helpful if you want to search for a specific person or location but are not sure of the correct spelling or the complete term. If you are researching nonprofit organizations and want to capture information that might just say “nonprofits” instead of the complete phrase, you can search using “nonprofit*.” Finally, the “|” or OR operator can search on two terms at the same time, giving you results for either of the two terms. Searching “black shoes for sale” | “brown shoes for sale” will return results that satisfy both search phrases. These operators can be combined in various ways to make your searches much more directed. Be careful not to be too restrictive, however, as you might filter out some relevant results. Table 1.1 summarizes the key internet search operators. Operator Description + , AND Include a word in the search –, NOT Exclude a word from the search “ ” Search for the exact words contained between the quotation marks * Search partial words ~ Search for synonyms |, OR Search two words at the same time Table1.1 Internet Search Operators Using these operators can make your search more effective. Conducting Business Research Conducting business research via the internet enables you to access information quickly at little or no cost. The internet gives you access to a large body of data from a variety of sources across the world. There are both free and fee-based services available on the internet to gather data. In addition, you can access many academic, peer-reviewed research using specialized databases. The first step is to narrow your search by determining what information you need and making a list of the data needed. As you work through your search, be sure to record relevant search terms, the website URL, and other pertinent information for you to access later if needed. A good strategy might be to keep a notepad by the computer or keep an electronic record in Microsoft Word or Google Docs. Some common sources of information for business research can be readily accessed: • Google Scholar is a search engine for peer-reviewed academic research. Here, you will find journal articles (often full-text .pdf files) for nearly all disciplines. This source can be handy if you are looking for targeted information based on a specific academic discipline. • Microsoft has a similar search engine called Microsoft Academic. • Science.gov is a website that provides access to data from nearly twenty U.S. federal agencies. • Census.gov is an excellent source of demographic information. • If you are searching for financial information for companies, Yahoo! Finance or Google Finance is a great place to start. • More detailed information about specific industries and sectors is available at CSImarket.com. 1.3 • The Internet, Cloud Computing, and the Internet of Things 39
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=48&chunk=46
When conducting research on the internet, there always will be some question of the credibility of the information you find. Because virtually anyone can create a website or post information on the internet, you should read with a critical eye. There is a wealth of quality information available, but it is just as easy to stumble upon unreliable data. Wikipedia is a commonly searched source for information. Wikipedia is an online encyclopedia built organically by users (it isn’t owned by a person or organization). It was founded in 2001 as a nonprofit organization with the goal of giving free access to information for everyone. Wikipedia is the fifth most visited site on the internet. Users submit content to pages and check one another for accuracy. They are given guidelines to follow for fact checking and editorial changes. In most cases, however, using Wikipedia as the primary source for research is frowned upon because of the lack of authentic reliability checks for the information. With any research, it is good practice to use triangulation: To verify the credibility of a piece of research, you should find at least three sources that are in agreement. By using multiple sources, you are minimizing the risk of uncertainty of the information found. It is also good practice to follow additional guidelines when evaluating the credibility of information found on the internet. By looking a little deeper into the research, you may uncover some hidden biases or questionable conclusions that were not readily apparent. • Who is the author and what is their affiliation? • Who paid for the research? • What is the date of the information? • Has the website been updated recently, and do the hyperlinks work? • Are any clear biases or opinions expressed? • Is there a way to contact the author or request more information? By taking the time to dive a little deeper into the information retrieved, you can better ensure the data is credible and suitable for your needs. Globalization The internet has broken down many geographic barriers. Business transactions can easily happen from points across the globe, products can be ordered and efficiently shipped to destinations thousands of miles away, and individuals can readily access information related to current events in other countries. The global nature of the internet has opened up the world, but there is little consistency between countries in their management of this technology. There are distinct differences from country to country in the laws and regulations governing internet use. For example, Facebook and Google are banned in some countries, such as Iran and North Korea, because these sites are seen as contradictory to local traditions and customs. In China, the government plays a major role in monitoring what citizens can access and view on the internet. There are nearly 100 regulations specifically centered on the internet and its use in China. Internet regulations across the world generally fall into one of four categories: • Encouragement of self-regulation and voluntary use of filters for illegal material • Punitive actions for making material available online that is unsuitable for children • Required blocking of government-selected materials • Prohibition on public access to the internet Many countries have enacted some type of legislation, policy, or governmental oversight with the goal of managing internet content. This governmental involvement began as early as 1996 and continues to be amended today. As you enter the workplace, you should be aware of the specific legislation that might impact the industry that you are working in. This could include protecting user information through specific privacy controls to managing content on a social media site for appropriateness. You do not have to be a legal expert, but having a general awareness of governmental involvement in the information shared over the internet is important. 40 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=49&chunk=47
Communication, Collaboration, and Social Media Through the internet and the software programs available today, we can stay connected to colleagues and family across great distances. Email, the Google Workspace of programs, Microsoft 365, and social media sites have all had a significant impact on business and personal productivity. Email first became a reality with the ARPANET. Today, we have many options when it comes to our email service. Gmail from Google and Outlook by Microsoft led the email market. These programs are directly integrated into their other products to aid in communication and collaboration between users. The enhanced capabilities of email programs today allow easy sharing of photos, documents, video, and large files. Just the ability to connect to colleagues who are outside of your general geographic area on a regular basis greatly improves productivity and connectivity. We also now have several options for videoconferencing. Many people use these tools outside the workplace to spend time with out-of-town family and friends. The traditional telephone conference call where several people sit around a conference table while another colleague calls in on a speaker phone is a rare sight in today’s office. Now, we can gather around a virtual table and use a videoconferencing program to conduct an important business meeting (Figure 1.27). We can use the same program to have a virtual meal with a family member who lives miles away. Some of the leading videoconferencing tools today include Zoom, Microsoft Teams, Skype, WebEx, and Google Meet. All have basically the same functionality, with features such as recording the meeting and providing a transcript of the discussion. These features have been valuable as part of a widespread shift to remote working conditions for many companies. The shift to greater use of remote working environments occurs for various reasons, ranging from global issues such as a public health emergency to more localized reasons like increasing employee satisfaction by assisting in work/life balance. Figure1.27 Videoconferencing tools such as Zoom make telecommuting easier than ever before. Forbes credited Zoom’s quick rise in use to its ease in navigation. (credit: modification of “VFRÖ - Zoom Meeting 3/2020” by Radiofabrik/Flickr, CC BY 2.0) Another tool people use to connect and collaborate with others is social media. Social media is digital technology that allows users (individuals and organizations) to share information about themselves such as posts, photos, or videos. More than 40 percent of the global population use social media. Social media sites had their origin in connecting friends and families. However, as the number of users increased, businesses started to see the value in connecting with their customers via these social media sites. Many businesses have a distinct presence on social media as active users, not simply advertising through the site. Today, about 70 percent of businesses have a social media presence. The line between personal and business has blurred significantly. Very few people use social media solely for connecting and sharing with friends and family. Most will interact with businesses such as retail outlets and even banks on their social media sites. Many people follow a specific brand or company that they like. Personal and business social media sites are intertwined and connected across sites. This phenomenon has shifted how businesses manage relationships with their customers. Many banks, for 1.3 • The Internet, Cloud Computing, and the Internet of Things 41
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=50&chunk=48
example, have a social media site where they share financial tips and banking products/promotions available to their customers. Consumer products companies can use the sites to get feedback on product attributes or advertising strategies. Small businesses can use social media sites to offer promotions to bring more foot traffic into the store—whether online or brick-and-mortar . The leading social media sites vary by age to some extent, with older generations leaning more toward Facebook and LinkedIn while younger people tend to gravitate to platforms such as TikTok, Instagram, Snapchat, and X (Twitter). Other popular social media sites include Pinterest and Reddit. Privacy is a concern when dealing with any interaction on the internet, but especially with social media sites, where individuals often share personal information and pictures that could open them up to cyberattacks. You should regularly check and update the privacy settings on the social media sites you use. You might consider changing your password routinely to prevent hackers from accessing your information. Never share personal information through the site or through messages within the site. You should be wary of friend/follower requests from people who are unknown to you or your other connections. Avoid being controversial or posting overly personal content. Employers now are checking applicants’ social media profiles and, in some cases, monitoring employees’ activity. Finally, as a user, it is easy to get pulled into clicking on advertisements that either show up in the margins or in the social media feed. Clicking leaves a virtual footprint of your activity that both legitimate advertisers and spammers can use to target advertisements and compel you to visit their sites. Often, you can limit your exposure through the site privacy settings, but the risk of exposure of personal information probably cannot be totally mitigated unless you avoid using social media sites altogether. Personally identifiable information (PII) may include items that directly reveal your identity, such as your address or Social Security number. But other identifiable information can also be gathered, such as race, gender, or religion. You should be cautious when sharing information on the internet via social media and other websites. Useful precautions include regularly changing your passwords, not using the same passwords for multiple sites, providing limited personal information on social media sites or putting privacy settings at a high level, and, finally, being cautious about clicking links or advertisements from unknown sources. Libraries and Media The internet has changed the way that libraries operate and store/share information. Many libraries still house extensive collections of books, reference materials, magazines, and the like. In fact, you may be surprised to learn that reading print books still outpaces reading electronic books. Some college students have reaped the benefits of e-books by purchasing their textbooks in (often cheaper) electronic formats. Unlike a traditional print copy of the same material, these textbooks are interactive, enabling the publisher to include updated information and links to relevant extra materials that cannot be included in the print edition. With the availability of the internet and today’s technology, students can also rent electronic textbooks, which can save a good deal of money over time. Currently, electronic textbooks hold about 30 percent of the total market. Many libraries now have online services that allow users to place a hold on materials. When the item becomes available, the patron is notified via text or email. Libraries are also moving some of their resources to a digital format. For example, some of the historical archives housed in libraries have been cataloged digitally to provide broader access. Libraries will still have a good supply of DVDs or books on CD for patrons to check out, but many resources can now be accessed electronically by using your library card. Many states have library systems that allow patrons in one city to utilize materials owned by another library in a different city. With apps such as OneDrive and Hoopla, users can gain access to thousands of digital materials, including books and media. These apps are typically compatible with the leading e-reader apps, such as Kindle, Kobo, and Libby. Also, libraries have become a central access point and technology hub for those lacking these resources at home, as Figure 1.28 shows. Nearly 96 percent of all rural public libraries offer free access to the internet for their cardholders. In all these ways, the digital revolution has altered the way 42 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=51&chunk=49
libraries think about the services they provide. Figure1.28 Many libraries today have computer workstations where users can access the internet and conduct research. (credit: modification of “Vancouver Public Central Library” by GoToVan/Flickr, CC BY 2.0) Libraries can be a source of research that might otherwise be unavailable to you. For example, the popular genealogy site Ancestry.com has agreements with libraries to provide some of its exclusive material free of charge to users of the site’s library edition. Libraries also provide free access to other databases that are centered on business research, including LexisNexis, BizMiner, Business Source Complete, and IbisWorld. These databases provide a wealth of information that is not readily obtained with a simple internet search. Web Applications A web application is a software program that is not installed directly onto the user’s computer. Instead, the program and data associated with it are stored on the internet, and the application is accessed through a browser or app rather than through an installed program on the computer. In the past, users had to purchase a license key to install programs directly onto their computer. This takes up memory and storage space on the computer and presents limitations on updates to the program. The user would generally have to purchase the program on a regular basis to get the most updated version or purchase an upgrade. Web-based applications give users access to the most up-to-date version of the software while sometimes freeing up essential storage on the networks and allowing seamless collaboration between users in real time. Companies pay monthly or annual subscription fees for these programs, often based on the number of user licenses they want to purchase. Throughout this text, you will become familiar with the Google Workspace of products and Microsoft 365, so that you can develop basic computing skills for the work world. E-commerce Electronic commerce, or e-commerce, refers to conducting business transactions online—buying and selling goods or services in an online environment rather than in a traditional brick-and-mortar storefront. The first e- commerce transaction was in 1994, but it is helpful to think of e-commerce as a modern-day version of the catalog sales (Sears, JCPenney, Montgomery Ward) of times past, except that the ordering is done over a computer rather than over a telephone or by filling out a form and mailing it through the post office. E-commerce transactions can occur between all customers in the marketing mix. In a business-to-business transaction, one business might purchase office supplies from another business. In a business-to-customer transaction, an individual purchases a product from a retailer online and has it delivered to their home. Consumer-to-consumer purchases can also be made through e-commerce—for e xample, when an individual purchases a product directly from another individual through a resale website. E-commerce does not necessarily involve shipping the purchased items; for instance, you may purchase and download an electronic product, such as an e-book or music. E-commerce simply means that the purchase transaction occurs online rather than in person. Today, virtually all products or services can be purchased online. Some entrepreneurs have started exclusively online businesses with virtual storefronts and no physical 1.3 • The Internet, Cloud Computing, and the Internet of Things 43
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=52&chunk=50
inventory. Today, e-commerce makes up about 15 percent of all retail sales across the world, with over twenty million e-commerce sites worldwide, representing nearly $4 trillion in sales. E-commerce jobs are expected to reach nearly 500,000 by the end of the 2020s; it is predicted that by 2040, 95 percent of purchases will be through e-commerce. REAL-WORLD APPLICATION A New Kind of Entrepreneurship Crowdfunding is a concept wherein many people contribute to fund a particular product launch or cause. Kickstarter is one such online platform where entrepreneurs can post their business idea and ask for contributions to make it happen. Some products have raised millions of dollars to fund their ideas. Pebbletime Smartwatch and the Coolertime Cooler garnered $20 million, $13.3 million respectively from Kickstarter donations. The Cloud and Cloud Computing Technological advances have made working remotely, or telecommuting, a possibility for many employees. In fact, one recent survey estimated that nearly 90 percent of U.S. employees would like to work remotely. Today, there are almost five million workers in the United States (nearly 40 percent of the U.S. workforce) who telecommute. Since 2015, the number of businesses that have allowed telecommuting has increased over 40 percent. Even for those who do not telecommute full time, access to the internet and such technologies as cloud computing in the workplace enable many employees to work from home at least once per month, with nearly 50 percent doing so once a week. With cloud computingmany of the resources that were traditionally stored on individual computers, including software programs, data management and storage systems, and networking tools, are moved to internet servers. This technological advance was prompted by the need to store large amounts of information and data and to enable collaboration by individuals across the world. The resources and their associated data are stored in a data center that is managed by a cloud service provider (CSP). The benefits of cloud computing are that it can handle larger amounts of data than any physical storage device can, and it also allows users to access their data from any computer, no matter the location, and from any device, as Figure 1.29 illustrates. 44 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=53&chunk=51
Figure1.29 Cloud computing enables you to store much more data than can be kept on any physical computing device. (credit: “Cloud-Computing” by Learntek/Flickr, Public Domain) The cloudis the term used to describe servers that are located at different locations and that are accessed via the internet. These servers are housed in data centers to provide storage and computer processing operations. The term cloud was first used in 1996 by a researcher at Compaq, and the first cloud computing service was Amazon Web Services (AWS), which launched in 2002 as a public cloud system. The cloud offers some distinct cost advantages to businesses. Companies can save money by not having to constantly upgrade individual users’ storage capacity, and they can lower their IT costs because the subscription fee for use of the cloud service includes many troubleshooting and technical assistance functions. When we use the cloud for storage, we no longer need to store and maintain CDs with backups of the system or flash drives to transport documents from one computer to another. Cloud computing increases the speed of computing and gives all users real-time access to information stored in the cloud. Use of the cloud allows greater security for information storage as well as speedy distribution of new software and software upgrades. Finally, the cloud offers flexibility that enables businesses to operate more efficiently. The security of information stored in the cloud can be of concern, but due diligence by individual users and the company can mitigate these risks. Here are some basic steps for ensuring the security of information: 1. Select a CSP that encrypts its data. Computers use the process of encryptionto rewrite readable information into a code that can be deciphered only by using the key to the code, similar to solving a word puzzle that uses a secret code (see Figure 1.30). Encryption is an important step in ensuring the security of the information transmitted and stored in the cloud. Figure1.30 Each key has the code to the secret (encrypted) information, allowing messages to be sent safely. 2. Back up information regularly. Most CSPs will include this with the services they provide. 3. Use strong passwords and change the passwords regularly. Some businesses will set up a system that requires a password change at set time intervals. 1.3 • The Internet, Cloud Computing, and the Internet of Things 45
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=54&chunk=52
4. Use two-factor authentication. This means that to access the system, you will need two pieces of identification, typically your username and password as well as one additional means of identification, such as an email to verify your identity, a code sent to your cell phone, or an answer to a personal question. 5. Make sure your system is protected by antivirus/antimalware software. These programs prevent unauthorized attempts to gain access to the system. 6. Avoid using public Wi-Fi access points to conduct critical business or personal transactions. Using public Wi-Fi exposes users to the potential for personal information to be compromised. Cloud Computing in Business Some companies set up a cloud-based intranet—a private network for internal company use. Unlike the internet, it is not available to the public and typically requires authorized users to enter a username and password. Many companies also require employees to make use of a virtual private network (VPN) to gain access to the company’s intranet when they are off-site. LINK TO LEARNING The use of virtual private networks enables businesses to control who gains access to their computer network. Using cloud services can offer some of the same security advantages for business. Read this article on VPN and cloud computing (https://openstax.org/r/78VPNCloud) to learn how the two are related and some differences between the two. Many businesses today use cloud computing to manage their information technology needs. Through the cloud, businesses can more efficiently analyze, manage, and store data. They are able to deliver software to their employees on demand and make updates to programs more rapidly. Finally, cloud computing enables seamless collaboration between business units that may be located miles apart. Three types of clouds are involved in cloud computing: 1. The public cloud is managed by a CSP. All of their services are delivered via the internet, and they charge for their service. The resources are owned and maintained by the CSP. Microsoft Azure and IBM Cloud Services are examples of public cloud service providers. 2. A private cloud is used within a single business or organization. Its resources, which are owned by the business and maintained within the organization, are stored on a private network, or the company can pay a third party to host the private cloud. With a private cloud, there are often restrictions on who can use it and what permissions are given to the users. Businesses that use sensitive information, such as financial institutions or health-care providers, prefer private clouds because they offer more security than a public cloud system. 3. The final type of cloud system is a hybrid cloud—a blend of public and private. Some r esources are utilized through a public cloud and others are secured through a private cloud. Cloud Computing for Personal Use You are probably using the cloud already in your professional or personal life, even if you are unaware that you are doing so. For example, cloud computing is used behind the scenes for Google and Microsoft programs, so if you are using Gmail or Outlook, you are using the cloud. Likewise, if you use Google Photos to store family memories, you are using the cloud. And if your family members play video games, stream movies, or listen to music on the internet, they are more than likely using the cloud. The cloud is working behind the scenes with much of the work we do both personally and professionally. This is a natural outgrowth of advances in internet capabilities and computing power to enable us to manage information more efficiently, conveniently, and cost- effectively. 46 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=55&chunk=53
Internet of Things (IoT): Integration and Collaboration The Internet of Things (IoT)refers to the extension of internet connectivity beyond computers, to enable the transfer of information between machines and other objects, people, and animals by connecting them to the internet in some way. With the IoT, the physical connects to the virtual. Today, many consumers seek out products that connect to the internet, and some simple adjustments enable many nontechnical, inanimate objects, from light bulbs to dishwashers, to be part of the IoT. As businesses see the value of the additional data that is gathered through IoT, many companies are marketing these technologies to consumers to make their lives easier and to save money. Having a reminder to put the laundry in the dryer or having the house thermostat adjust automatically based on outside temperature is more than a novelty—these featur es can save time and money, allowing consumers to feel more secure, better equipped to handle life’s demands, and able to focus more on their pleasures in life. Businesses, too, can realize distinct improvements using real-time data and analytics, performance tracking, inventory/cost controls, and the automation of simple tasks. These capabilities can also allow businesses to adapt to challenging times. REAL-WORLD APPLICATION Pivoting during the Pandemic COVID-19 drastically affected in-person business and services, many of whose owners found themselves struggling just to keep their businesses afloat. Some businesses chose to start offering their products or services online while some began or greatly enhanced their delivery operations. Others decided to close their business in the short term. Some businesses, such as Spotify and Netflix, put more resources into creating original content (podcasts, movies, series shows) rather than relying primarily on the sale of ads as a major revenue stream. Small restaurants offered delivery services and meal subscription services to keep their business thriving even during the pandemic. And larger corporations found that remote work allowed their employees to stay healthy while still meeting the needs of the business. 1.4 Safety, Security, Privacy, and the Ethical Use of Technology Learning Objectives By the end of this section, you will be able to: • Describe the importance of practicing responsible computer safety and security • Identify common computer security issues • List measures to prevent computer security breaches • Describe the importance of privacy in a digital world At WorldCorp, you’ve realized how the evolution of computing has led to your present-day status as a new employee. You’re getting the hang of how computers are put together, how they have changed the business landscape, and how you need to understand their basic components to thrive in your industry. Another part of that understanding is learning how to safely navigate the computer world, both in the company’s internal systems and in external systems on the internet and the World Wide Web. The Importance of Computer Safety and Security The protection of computer systems and information that prevents unauthorized use is referred to as computer security. Computer ethics are guidelines for the morally acceptable use of computers in society. Any criminal offense that involves a computer and a network is referred to as cybercrime. One of the most common types of cybercrimes is identity theft, which occurs when an unauthorized user steals an individual’s 1.4 • Safety, Security, Privacy, and the Ethical Use of Technology 47
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=56&chunk=54
personal information, such as a Social Security number or credit card information for economic gain. An increase in the number of hackers—individuals who gain unauthorized access to computer systems in an attempt to steal someone’s information—has pr ompted the development of software programs designed to protect consumers’ identities, such as LifeLock. There are strategies you can employ that will keep your computer, and the information you have saved on it, safe and secure from theft and hacking. These include: • using security suites that can protect user privacy and security while on the internet • using a firewall, which is a barrier between a network that is secured and one that is not secured, to provide additional security • setting up password-protected network access • avoiding logging in to accounts on an open network (one that is not password protected) • using encryption to make it impossible for unauthorized individuals to gain access Data and Identity Theft In addition to hackers who target individual users, corporate espionage (also known as industrial, economic, or corporate spying) is conducted for commercial or financial gain by targeting businesses, government agencies, energy companies, and even schools. Corporate espionage can take the form of unethical or illegal acquisition of intellectual property (such as customer data, pricing, or research and development information) or trade secrets through theft, bribery, or blackmail. Examples of corporate espionage include: • trespassing on a competitor’s property and/or gaining unauthorized access to files • wiretapping—the secr et interception of electronic communications • domain hacking, which occurs when another entity steals the original party’s domain name • phishing to lure competitors’ employees to open emails, thereby exposing information Attempts to get users to interact with an email or website that appears to be legitimate but is actually fake is called phishing. Phishing lures users to provide their personal information and login credentials through these hoax sites and emails. This is usually through the use of spoofing. Spoofing is communication (usually an email) that on the surface looks to be legitimate from a trusted source. These emails have become much more sophisticated and are designed to look more and more like real correspondence from a company or even a government agency such as the IRS. Something that has grown increasingly common is ransomware, malicious software that encrypts computer data, rendering it useless and inaccessible, and forcing the owner to pay a ransom to regain access. Software that is designed with the purpose of damaging a user’s computer system once it has access to that system is called malware. Password Management and Biometrics For all of these threats to online security, there are protective steps you can take. A set of principles and best practices for storing and managing passwords in a manner that is likely to prevent unauthorized access is called password management. You may password protect your computer, as well as various accounts you may access through your computer and the internet. Having a strong password will ensure that hackers cannot figure out your password easily. Many organizations today use multifactor authentication to provide an additional layer of security. For example, when accessing your bank account on your phone or your laptop, you may be asked to enter a specific code that is sent via email or text. This now provides two layers of security—first, entering the corr ect password, then correctly entering the code that was sent to you. Multifactor authentication can also be used by businesses when accessing the company software or computer network. 48 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=57&chunk=55
REAL-WORLD APPLICATION Please Pass the Password Some tips for creating a strong password include: • Avoid using a real name (either your own or the company’s) as your password. • Use a combination of letters and numbers with at least eight characters. • Do not use a complete word such as “password.” • Do not reuse passwords. • Use a combination of uppercase and lowercase letters. • Incorporate special symbols instead of letters or numbers (such as an exclamation point or dollar sign instead of a numeral). In addition to passwords, you can also use biometrics to protect your computer and information. Unique physical markers of an individual that can be used to restrict access to only those who match these physical characteristics, such as retinal scans and fingerprints, are called biometrics. Biometrics are much harder to hack as they cannot be guessed or stolen. Internet and Web Privacy The internet is pervasive and omnipresent. It is part of all you do in business and in your everyday life. How people conduct themselves online, what they share, and what they visit—all this information is captur ed and saved in various places, from internet providers’ servers to browser companies such as Google to different social media sites. This information is captured and saved even if deleted from your computer or account. It is important to consider how to represent yourself and what to share to maintain your privacy. Cookies After you have searched for a product on the internet, do you notice that you suddenly start receiving advertisements for that product, or that a store website now displays that product on its front page? For that, you can thank cookies. Small data files that are deposited on user hard disks from websites you visit are called cookies. They keep track of your browsing and search history, collecting information about your potential interests to tailor advertisements and product placement on websites. These cookies can be either blocked or accepted, depending on a company’s privacy policy. The potential risk of cookies is that they can store information about the user, user preferences, and user browsing habits. That said, they can also save time by storing users’ login information and browsing preferences, allowing internet pages to load faster than if you had loaded them the first time. Regardless of convenience, it is a good idea to clear cookies from time to time and to restrict cookies on certain sites depending on your own preferences. Browsing History Your browsing history includes all websites you may have visited, as well as any actions you may have taken on those websites. It is typically saved locally on your computer within the browser application, as well as with the company that provides the browser. Your internet or data provider may also keep track of your browsing history. While this information is handy to have for future reference, consider clearing your browsing history from your personal computer on a regular basis. Be aware that your employer may also collect this information; while using a work computer, you should avoid visiting websites that do not support your work function. Both Google analytics and your company can theoretically store browsing data for a long time, even after you delete it. Temporary Files As the name implies, temporary files are created by a program to allow it to complete a task or tasks. These 1.4 • Safety, Security, Privacy, and the Ethical Use of Technology 49
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=58&chunk=56
files are handy to have in case of a sudden shutdown, as they may help to recover a file that might otherwise be lost. Many temporary files are automatically deleted once the task is complete or the file is saved permanently. But others may stick around; these files are saved in your temp folder. On a Windows computer, you can access your temp folder by typing %temp% in the Windows search bar at the bottom left of your screen. MAC TIP On a Mac, open the Finder and select Go ≫ Go to Folder. In the search bar, type ~/Library/Caches/ and then click Go to run the command. A window will open with a list of all the generated temp files saved on your Mac. You can easily select and delete these files. Posting on Social Media According to Pew Research, “seven-in-ten Americans use social media to connect with one another, engage with news content, share information and entertain themselves.” Some of the most popular platforms today are TikTok, Facebook, YouTube, Instagram, and WhatsApp. Figure 1.31 shows the sites adults in the United States use most. The United States and China have the most social media users of all countries worldwide. Social media has exploded in popularity and is used widely for both personal and business purposes. Businesses and individuals must be mindful of what they post on social media. Even the most private accounts can have data breaches, allowing others to save and/or share private content. It is important to consider what you post, as well as any potential unintended consequences that might arise from social media use. You must also be aware of spoof accounts that present as a reputable person, when in fact they are attempting to con or mislead an individual. Similarly, AI and bots may interact with users, posing as real people when in fact they are nothing more than a computer algorithm. Figure1.31 YouTube, Facebook, and Instagram were the top three social media sites among U.S. adults in 2021 for both personal and professional use. (data source: PEW Research Center, https://www.pewresearch.org/internet/2021/04/07/social-media-use- in-2021/) Ultimately, you should be sure to present a positive self-image on the internet, particularly on networking social media platforms such as LinkedIn. When considering how you want to represent yourself online, answer these questions: (1) Is this information accurate? (2) Will this post be potentially detrimental to my schooling 50 1 • Technology in Everyday Life and Business Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=59&chunk=57
and/or career? (3) Is the information hurtful or detrimental to someone else? Ensuring Privacy Privacy involves practices related to the collection and use of data about an individual. Many companies will have privacy policies when you sign up as a customer or purveyor of their content. It is important to read these policies to ensure you are not inadvertently providing permission to use your data and information in a way that you do not actually approve of. In addition, many companies will disclose they sell your information to other companies seeking similar customers. It is important to decline these permissions to avoid circulation of your contact information. Minimal Data Collection from Customers Collecting data from customers allows organizations to determine their needs and identify niche markets. Companies must ensure they are collecting the most minimal amount of data necessary from their customers to achieve these goals. Collecting too much data places both the company and the customer at risk. The company is responsible for ensuring that information is used responsibly and within the parameters of its privacy agreement; any data breach puts the company at risk of liability. Similarly, customers have the right to know how their information is used by the company and may request compensation if it is used inappropriately. Therefore, companies must ensure that they collect only the most minimal amount of data required to meet their business needs. Data Security Data security involves protecting digital information (data) from being accessed or used by parties who should not have access, or for purposes it should not be used for. Just as individuals must ensure they protect their information from hackers and malicious intent, companies are responsible for ensuring they use the most up- to-date data security measures to protect both customer information and proprietary company information and data. Companies must ensure both internal and external security. Internally, a company should establish policies and protocols to ensure employees are abiding by data security measures. A company should also limit employee access to certain information. Keeping technologies up to date, with the most current security software, is also important. Depending on the size of the company, it may be worthwhile to establish a cybersecurity branch that employs qualified professionals dedicated to data security. There are a number of strategies a company can use to keep data secure. Encrypting the data will render information unreadable to unauthorized users. Without the access key, encrypted information presents as nothing more than a meaningless string of characters. Companies, like individuals, can also take steps to delete files, software, and data that is no longer of use. And they can take it a step further by practicing data erasure, wherein the information is not only deleted but overwritten as well. In another approach, data masking, personally identifiable information is removed from the data, allowing the company to make decisions about its customers without associating the data with an individual’s personal information. By taking these steps, companies ensure they can recover from a data breach quickly, reinforcing their data resiliency. 1.4 • Safety, Security, Privacy, and the Ethical Use of Technology 51
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=60&chunk=58
Chapter Review Key Terms Android operating system Google software operating system used to run non-iPhone mobile phones such as Samsung’s Galaxy artificial intelligence (AI) use of computers, robots, and machines to behave “intelligently,” engaging in autonomous decision making and behaviors augmented reality (AR) use of digital objects or elements in a real-life picture or scene automation use of computers or machines to do tasks that could be completed by a person binary digits sequences of the numbers 0 and 1 used in computer programming biometrics authentication that uses a person’s physical characteristics as a form of digital security cache type of storage in a computer that operates in the background, holding data that can be quickly retrieved central processing unit (CPU) unit that contains the microprocessor, or “brains” of a computer system client device that requests and uses resources from other devices on the network cloud servers housed in data centers to facilitate remote storage and computer operations cloud computing delivering computer resources such as programs and data storage through the internet rather than storing resources directly on a computer computer programmable machine that can execute predetermined lists of instructions and respond to new instructions computer security protection of computer systems and information that prevents unauthorized use cookies small data files that are deposited on user hard disks and internet sites visited cybercrime criminal offense that involves a computer and a network data erasure process by which information is not only deleted but overwritten as well data masking process by which personally identifiable information is removed from data, allowing a company to make decisions without violating customer privacy data resiliency ability to recover quickly from a data breach domain name system (DNS) phone book for the internet, enabling a user to send a message using their name, the symbol @, and the location of the computer as identified by its domain name e-commerce conducting business transactions online encryption process of taking information transmitted through the internet and converting it into an unrecognizable code to prevent unauthorized access ethernet protocols used to connect computers in a local area network or LAN external disk drive hard disk for information storage such as USBs, CDs, DVDs, and flash memory cards firewall barrier between a network that is secured and one that is not secured hackers individuals who gain unauthorized access to a computer system to steal someone’s information hard disk secondary storage areas where users can save files and retrieve data and programs hardware computer accessories such as keyboard, mouse, printer, and computer monitor HTTPS communication protocol that is more secure than HTTP hub device that sends and receives messages to and from all network connections hyperlink link on a page or document that, when clicked, navigates the user to that location; a connection between two web pages or documents hypertext transfer protocol (HTTP) rules that allow users to access information on the internet and protect confidential data such as credit card numbers information processing cycle sequence of events involved in processing information internal disk drive storage space within the computer that updates and produces copies of files Internet of Things (IoT) extension of internet connectivity beyond computers, enabling the transfer of information between machines and other objects, people, and animals by connecting them to the internet in some way 52 1 • Chapter Review Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=61&chunk=59
internet protocol address (IP address) unique combination of characters used to identify the location of a host computer internet service provider (ISP) company that provides individuals or organizations with access to the internet intranet private network for internal company use; can be combined with cloud technology iPhone operating system (iOS) Apple’s software operating system, used to run iPhones, iPads, and other mobile devices machine learning use of software applications to make computations and decisions that can inform predictions without human intervention mainframe computer that is capable of great processing speed and data storage for large organizations malware software designed to damage the victim’s computer system once it gains access to it microchip small microprocessor unit used for programming and computer memory storage microcomputer personal computer that was much smaller than earlier computers and operated with microprocessors microprocessor consists of a control and an arithmetic-logic unit, which performs math and logical operations within a computer system minicomputer computer that is similar in power to a mainframe computer, but much smaller in size; used in mid-size organizations motherboard controls communications for an entire computer system nanotechnology technology that focuses on changing individual molecules to produce different properties or attributes network connection of two or more computer systems or devices, either by a cable or through a wireless connection operating system connection between a device’s hardware and its software packet switching technology that enabled the development of the internet; computer files are broken up into segments, which are transmitted over the network and reordered into a single file at their destination password management set of principles and best practices for storing and managing passwords to prevent unauthorized access to the computer personal computer (PC) microcomputer suitable for individual use phishing attempts to get users to interact with an email or website that appears to be legitimate but is fake random access memory (RAM) computer’s primary, short-term memory ransomware malicious software that encrypts computer data, rendering it useless and inaccessible, forcing the owner to exchange something of value to regain access read-only memory (ROM) memory not meant for storage but to process information as the computer is being used robotics use of robotic machines to perform tasks that no human could perform router device that directs data traffic and allows for multiple devices to run on a network secure sockets layer (SSL) security protocol that uses encryption to help ensure privacy of information and communications across the internet server connects devices and allows for resource sharing across networks short message service (SMS) technology for sending text messages through mobile phones smart space physical space that incorporates technologies that can be controlled through the internet social media digital technology that allows users (individuals and organizations) to share information about themselves such as posts, photos, and videos software computer program or set of programs with the end goal of converting data into processes or actions spoofing correspondence such as email that appears legitimate but instead is used to obtain your personal information supercomputer extremely powerful computer that has the fastest processors available transmission control protocol/internet protocol (TCP/IP) communication standard that allows data to be 1 • Chapter Review 53
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=62&chunk=60
sent and received over a network, most notably the internet triangulation research technique whereby information is verified and validated through multiple sources virtual reality (VR) simulated environment in which users can interact as if they were physically present wearable device that uses computing technology to collect and receive data via the internet web browser a program used to find content stored on the WWW workstation powerful single-user computer, similar to a personal computer but with more powerful microprocessors 54 1 • Chapter Review Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=63&chunk=61
Summary 1.1Computing from Inception to Today • Early computers were used predominantly by engineers and scientists to handle large amounts of data. Key companies in the evolution of computing include IBM, Hewlett Packard, Xerox, Apple, and Microsoft. • With the invention of the microprocessor, computers became available to the average consumer. • Computing technology has increased efficiencies, decreased errors, opened new opportunities, and enhanced business–customer relationships. • Key technologies in computing include mobile devices, digital imaging, and machine learning. • Advances in technology are applicable to nearly every industry. The rapid pace of technological change has distinct career implications. 1.2Computer Hardware and Networks • Hardware components that make up a computer are the motherboard, CPU, microprocessor, and memory, as well as the keyboard, mouse, and other peripheral devices. • Computers process and store data through the information processing cycle. • Networks are connections of two or more computer systems, such as LANs and WANs. Routers, switches, and firewalls are basic components of networks. 1.3The Internet, Cloud Computing, and the Internet of Things • The internet was initially rooted in government and military applications. • Advances in technology such as HTML, URL, and DNS made the internet more accessible to the average user. • Programs such as Zoom, Google Docs, and X (Twitter) foster new types of interactions between businesses and their customers. • Through sites such as eBay and Amazon, e-commerce has become an efficient way to purchase products and services, not just from companies but also from individuals. • Cloud computing refers to storing IT resources on a virtual server rather than on the actual computers where the resources are used. • The use of cloud computing in the workplace has increased productivity and saved money for many businesses. • Cloud computing enables individuals to access a wide variety of resources such as media files, documents, and photos without the need for computers with massive storage capacities. • The Internet of Things (IoT) connects the physical to the virtual; with simple changes to product designs, many products can be connected to the internet. 1.4Safety, Security, Privacy, and the Ethical Use of Technology • Computer safety and security are paramount considerations for a company’s effective operations. • Privacy in the digital world has become a major focus of corporate efforts to maintain the trust of employees, the public, and stakeholders. • Common security issues include data and identity theft, cybercrime, phishing, and hacking. • Measures that prevent computer security breaches include encryption, firewalls, password management, data erasure, and data masking. Review Questions 1. What nineteenth-century invention laid the foundation for future developments in computing? a. Jacquard’s loom b. Apple’s Macintosh computer c. Programma 101 d. TRS-80 1 • Chapter Review 55
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=64&chunk=62
2. What is the main operating system for iPhone mobile devices? a. Android b. Google c. iOS d. SMS 3. What are direct deposit, high-speed printers/copiers, and automated inventory systems all examples of? a. outdated technology b. future developments in technology c. early-stage developments in technology d. advances in technology 4. What is VR? a. a mostly live, real environment with some digital elements embedded b. a computerized game for trying out a new product c. a robot that can perform mundane tasks d. a mostly simulated environment that allows the user to interact in the space 5. The autopilot features on an airplane are an example of ________. a. VR b. AI c. AR d. machine learning 6. ________ is referred to as "the brains of the computer system." a. Printer b. Mainframe c. Microprocessor d. Router 7. ________ allows the computer to operate and process information quickly. a. ROM b. RAM c. HTTP d. WAN 8. What is a network adapter card that organizes information into small packets for movement in the network or over the internet? a. TCP (transmission control protocol) b. HTTP (hypertext transfer protocol) c. UDP (user datagram protocol) d. STP (standard transfer protocol) 9. Microsoft 365 is an example of ________. a. HTTP b. LAN c. a Web application d. an e-commerce site 10. ________ is the language used behind the scenes for website formatting. 56 1 • Chapter Review Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=65&chunk=63
a. HTTP b. HTML c. URL d. IP address 11. What is Wikipedia? a. an internet service provider b. a web browser on mobile phones c. a domain name d. a free source of information 12. ________ is the protocol used to connect computers together in a LAN. a. HTML b. Ethernet c. IP address d. Web application 13. Which operator is used to search partial words on the internet? a. * b. | c. + d. – 14. ________ refers to a private network meant for internal company use. a. Cloud b. Cloud computing c. Internet d. Intranet 15. Cloud computing was first introduced in what year? a. 1982 b. 2002 c. 1996 d. 2016 16. ________ is a set of principles and best practices designed to prevent unauthorized access to a system. a. Two-factor authentication b. Biometrics c. Data masking d. Password management 17. Corporate espionage refers to ________. a. trespassing on a competitor’s property b. wiretapping a competitor’s office c. domain hacking d. all of the above 18. Cookies are defined as ________. a. the practice of protecting digital information from unauthorized access, corruption, or theft b. small data files from websites that are deposited on a user’s hard disk 1 • Chapter Review 57
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=66&chunk=64
c. a list of web pages a user visits, stored on a computer’s browser d. ads that entice users to click on them 19. ________ encrypts information on your computer, making it inaccessible until you give the hacker something valuable. a. Phishing b. Data masking c. Spoofing d. Ransomware Practice Exercises 20. Conduct research to show how mobile, imaging, and gaming devices have contributed to the U.S. economy and the global economy. 21. Using some of the internet search strategies discussed earlier in the chapter, choose an industry and research some leading technologies in that industry. 22. Think about the concept of lifelong learning. Using the strategies outlined in the chapter, discuss how lifelong learning can be incorporated into your life. 23. A computer’s memory capacity and speed have an impact on its price. Perform a Google search to compare the prices of at least three laptops and three desktop computers with various speeds and memory capacities. Which is more expensive, and why? What factor has the greatest impact on the price of the computers? 24. Go to United States Census Bureau Data (https://openstax.org/r/78CensusData). Select the Explore Data section. Find your county and identify a variable of interest to you, such as education or poverty. List some key findings you discovered about your county from the data on the site. 25. You want to find out about music festivals happening this summer close to your home. First, follow your typical procedure for conducting an internet search. Then, conduct another internet search for the same information, this time using some of the techniques discussed in the chapter. What differences do you notice in the results? 26. Conduct an internet search for a topic that interests you. Then, navigate to a website devoted to that topic. Using the strategies discussed in this chapter, evaluate the credibility of the information contained on the site. 27. View your social media account (or someone else’s, if you don’t have one). From the perspective of an outsider, what do you see? Is everything that is viewable acceptable? Would you want your employer to view this social media account? 28. Discuss how you would protect your personal computer, including access restriction and prevention of data loss. Written Questions 29. Discuss how today’s technology has improved the workplace. 30. How was computing in the workplace instrumental in the development of computing for personal use? 31. How are mobile devices, imaging, and gaming interconnected? 32. Discuss the key differences between AR and VR. 33. What are some advantages to using VR in business? 58 1 • Chapter Review Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=67&chunk=65
34. What are some advantages of using smart spaces in business today? 35. What is the information processing cycle and why is it important? 36. Why is it important to understand the basic components of a computer? 37. Which network would you likely have in your home? At your place of business? 38. What capabilities must a device have to be called a computer? 39. If you were setting up a computer network in your small business, what security measures would you take to guard against cybercrime and security breaches? 40. Explain some criteria you should use in evaluating the credibility of sources for business research. 41. Outline some tips for conducting effective online searches. 42. Discuss some of the key advances with the internet that have increased business productivity. 43. Discuss some advantages and disadvantages of using cloud computing for business and for personal use. 44. Discuss some of the advantages of using the Internet of Things in business and for personal use. 45. Describe some ways that companies can protect their systems from cybercrime. 46. Define ransomware, malware, and phishing. 47. What are cookies? How are cookies used in business? Case Exercises 48. Suppose you want to set up a computer network for a small business you are launching. The business will provide bookkeeping services for other businesses. You will maintain an office for yourself and one other employee. Your employees will also sometimes work remotely, either at their homes or at the clients’ locations. Do some research on the process of setting up a computer network for a small business. What types of equipment might you need? What types of security precautions should you take to protect your clients’ financial information? 49. You are working with a local entrepreneur who wants to open an organic food store in your town and is asking you for help in finding relevant demographic information to help determine appropriate pricing for some of their products. A. What internet sources might be appropriate for this research? B. Where would you begin your search? C. How would you determine the key competitors for the business? 1 • Chapter Review 59
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=68&chunk=66
60 1 • Chapter Review Access for free at openstax.org
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=69&chunk=67
Figure2.1 Software applications are what allow us to interact with our computer’s hardware. It is essential to learn how to use programs like calendars, word processors, and email clients to communicate with others and create documents in the workplace. (credit: "wocintech (microsoft) - 241" by WOCinTech Chat/Flickr, CC BY 2.0) Chapter Outline 2.1Software Basics 2.2Files and Folders 2.3Communication and Calendar Applications 2.4Essentials of Microsoft 365 2.5Essentials of Google Workspace 2.6Collaboration Chapter Scenario WorldCorp is a multinational conglomerate that produces and works in consumer goods, health care, and technology. Its functional service areas include research and development, strategy, operations, production and distribution, human resources, information technology and equipment, marketing and sales, finance and accounting, and customer service. The corporation has a strong commitment to social responsibility and environmental protection. Employees are encouraged to participate in company-wide and individual charity initiatives, with paid time off to participate in each once a month. With employees located across the globe, WorldCorp understands a successful workplace is supported by a commitment to equity, diversity, and inclusion (EDI). It has a strong ethics policy that is enforced throughout the company hierarchy, with senior leaders and management expected to serve as models in all actions and interactions. You have just been hired as a management trainee at the company and will be exposed to all functional areas. In this chapter, you have just been hired and are tasked with learning the basics of the software programs WorldCorp uses to run its operations, most notably Microsoft 365—or mor e commonly known as its longtime former name, Microsoft Office—and Google W orkspace. Essentials of Software Applications for Business 2
Workplace_Software_and_Skills_-_WEB_IlfJtcP.pdf#page=70&chunk=68
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
15