Preface |
|
xxiii | |
Acknowledgments |
|
xxix | |
|
Section I Underlying Building-Block Questions |
|
|
|
Chapter 1 How Are Computers Organized? |
|
|
3 | (30) |
|
As an interested computer user, how will this book help address my curiosity about how computers work, what they can do, and what they cannot do? |
|
|
3 | (1) |
|
What is meant by "computer programs," "software," "data," "computer applications," and "processing," and how do they differ? |
|
|
4 | (1) |
|
|
5 | (1) |
|
What are the main components inside a machine? |
|
|
6 | (1) |
|
Sometimes I hear people talk about circuits and computer chips. How do circuits and chips relate to components, such as a CPU, main memory, and I/O devices? |
|
|
7 | (1) |
|
How are the components connected within a computer? |
|
|
8 | (3) |
|
Can we connect a CPU, main memory, and some I/O devices using a bus to obtain a good computer? |
|
|
11 | (1) |
|
|
12 | (2) |
|
|
14 | (1) |
|
Alternative mechanisms for CPU processing |
|
|
15 | (1) |
|
Sharing processing among multiple CPUs |
|
|
15 | (1) |
|
Moving work outside the CPU |
|
|
15 | (1) |
|
What does the "brain" of a traditional computer look like? |
|
|
16 | (2) |
|
Are modern computer "brains" different from traditional ones? |
|
|
18 | (3) |
|
How does this description of components relate to what I can actually see within a computer? |
|
|
21 | (5) |
|
|
26 | (1) |
|
Terminology from this chapter |
|
|
26 | (1) |
|
|
26 | (4) |
|
|
30 | (2) |
|
|
32 | (1) |
|
Chapter 2 How Are Numbers and Characters Represented in a Computer (and Who Cares)? |
|
|
33 | (26) |
|
Why should I care about the way data are represented inside computers? |
|
|
34 | (1) |
|
Why do computers work in binary? |
|
|
35 | (2) |
|
What other approaches can be used to store data, in addition to "digital" data? |
|
|
37 | (1) |
|
In 2009, all television broadcasters in the United States changed from analog to digital. How do the terms "analog" and "digital" apply to television, and why was it done? |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
What approaches are commonly used to represent numbers inside computers, and what consequences follow from these approaches? |
|
|
40 | (1) |
|
Fixed-size storage approach |
|
|
41 | (1) |
|
Variable-size storage approach |
|
|
42 | (1) |
|
Why should I care about the way data are represented inside computers? |
|
|
43 | (1) |
|
|
43 | (3) |
|
Can a finite computer store real numbers with an infinite number of decimal places? |
|
|
46 | (1) |
|
Can storage of data affect the accuracy of results? |
|
|
46 | (2) |
|
How does a computer know to use a Latin alphabet for English, but other alphabets for Russian, Greek, or other languages? |
|
|
48 | (2) |
|
|
50 | (1) |
|
Terminology from this chapter |
|
|
50 | (1) |
|
|
50 | (4) |
|
|
54 | (1) |
|
|
55 | (4) |
|
Chapter 3 How Are Images Represented (and Does It Matter)? |
|
|
59 | (26) |
|
How are images created on a computer monitor or on paper with a printer? |
|
|
59 | (2) |
|
There are two main approaches for representing color: by adding colors and by masking colors. Why are two approaches used, and how do these approaches work? |
|
|
61 | (1) |
|
What are some of the approaches used to store images in a reasonably compressed way? |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Drawing commands or vector graphics |
|
|
64 | (1) |
|
Data averaging or sampling |
|
|
64 | (1) |
|
|
65 | (1) |
|
Image sampling and/or averaging |
|
|
65 | (1) |
|
|
65 | (1) |
|
I have encountered ".gif," ".png," ".ps," ".pdf," and ".jpg" image files when surfing the Web. How do these image files work? |
|
|
66 | (2) |
|
Do these differences among various file formats really matter? |
|
|
68 | (1) |
|
What are the tradeoffs in handling pictures and other graphical applications? |
|
|
68 | (1) |
|
|
69 | (1) |
|
Example: Goreme Open-Air Museum |
|
|
70 | (2) |
|
Example: Street scene in Dornoch, Scotland |
|
|
72 | (1) |
|
Example: The harbor in Lybster, Scotland |
|
|
73 | (1) |
|
Does high definition television have anything to do with computers? |
|
|
74 | (1) |
|
|
75 | (1) |
|
Terminology from this chapter |
|
|
76 | (1) |
|
|
76 | (2) |
|
|
78 | (5) |
|
|
83 | (2) |
|
Chapter 4 Where Are Programs and Data Stored? |
|
|
85 | (28) |
|
What are the types of memory? |
|
|
85 | (1) |
|
|
86 | (1) |
|
Transitory versus permanent memory |
|
|
87 | (1) |
|
Files and their organization |
|
|
88 | (3) |
|
Virtual memory and its relationship to files and main memory |
|
|
91 | (4) |
|
When do data move from one type of memory to another? |
|
|
95 | (2) |
|
What does it mean to "defragment" a disk, and should I care? |
|
|
97 | (1) |
|
Why not simplify the construction of computers by replacing the main memory (RAM) and the cache memory by ROM? |
|
|
98 | (2) |
|
How much memory is enough? |
|
|
100 | (2) |
|
What are the differences among moving a file to the trash, deleting a file, and erasing it? |
|
|
102 | (2) |
|
I have heard that some computers contain "hidden files." What are they? |
|
|
104 | (1) |
|
|
105 | (1) |
|
Terminology from this chapter |
|
|
106 | (1) |
|
|
106 | (3) |
|
|
109 | (2) |
|
|
111 | (2) |
|
Chapter 5 What Is an Operating System, and What Does It Do? |
|
|
113 | (26) |
|
What is an "operating system"? |
|
|
113 | (3) |
|
I understand that desktop and laptop computers have operating systems, but what about other electronic devices, such as cell phones, iPods, microwave ovens, automobile engines, and light switches? |
|
|
116 | (2) |
|
Why are there different operating systems? |
|
|
118 | (1) |
|
What is "multitasking," and does this idea affect me? |
|
|
119 | (2) |
|
Why do operating systems worry about coordinating different programs or users? Can't they just work separately? |
|
|
121 | (2) |
|
What do you mean by "booting" the computer? |
|
|
123 | (1) |
|
What is a "reboot," and why might it be necessary? |
|
|
124 | (1) |
|
Why do so many people and companies use Windows? |
|
|
125 | (1) |
|
What is Linux, and where did the Linux operating system come from? |
|
|
126 | (2) |
|
Why can different operating systems read both CDs and DVDs? |
|
|
128 | (1) |
|
How do operating systems tell apart CDs and DVDs? |
|
|
128 | (1) |
|
Which operating system is the best? |
|
|
129 | (1) |
|
|
129 | (1) |
|
Terminology from this chapter |
|
|
130 | (1) |
|
|
130 | (2) |
|
|
132 | (3) |
|
|
135 | (4) |
|
Section II Software/Problem-Solving Questions |
|
|
|
Chapter 6 What Can Computers Do for Me? |
|
|
139 | (36) |
|
What types of problems are computers good at? |
|
|
139 | (1) |
|
When would a computer's storage and retrieval skills help me? |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
Networking and communication |
|
|
141 | (1) |
|
How does a computer's computational capabilities help me? |
|
|
141 | (1) |
|
|
141 | (2) |
|
Organizing finances and personal information |
|
|
143 | (1) |
|
What else can a computer help me with? |
|
|
143 | (1) |
|
What do good applications have in common? |
|
|
144 | (1) |
|
Why can a computer guide astronauts into space but not predict the stock market? |
|
|
145 | (1) |
|
If computer programs that predict the stock market are unreliable, how can I tell when other computer programs give unreliable results? |
|
|
146 | (2) |
|
For problems that a computer can solve, what process should I use to get an answer? |
|
|
148 | (2) |
|
Can some computers solve problems that other computers can't solve? |
|
|
150 | (1) |
|
What are Turing machines, and what do they have to do with computers today? |
|
|
151 | (2) |
|
|
153 | (1) |
|
If all computers are universal, how do they differ? |
|
|
153 | (1) |
|
How can I decide what machine I should buy? |
|
|
154 | (2) |
|
|
156 | (1) |
|
Terminology from this chapter |
|
|
157 | (1) |
|
|
157 | (3) |
|
|
160 | (2) |
|
|
162 | (1) |
|
Appendix 6A Turing machines |
|
|
162 | (5) |
|
|
163 | (2) |
|
|
165 | (1) |
|
Exercises for Appendix 6A |
|
|
166 | (1) |
|
Appendix 6B The Halting Problem |
|
|
167 | (8) |
|
Proof that the Halting Problem is unsolvable |
|
|
169 | (1) |
|
Observations on coding algorithms |
|
|
170 | (1) |
|
Using proposed Algorithm A to construct a new Program N |
|
|
171 | (1) |
|
Proof that the proposed Algorithm A is incorrect |
|
|
172 | (1) |
|
Conclusions about the Halting Problem |
|
|
172 | (1) |
|
|
172 | (1) |
|
Heisenberg's principle of uncertainty |
|
|
173 | (1) |
|
|
173 | (1) |
|
Exercises for Appendix 6R |
|
|
174 | (1) |
|
Chapter 7 What Should I Know about the Sizes and Speeds of Computers? |
|
|
175 | (34) |
|
How fast does technology really evolve? |
|
|
176 | (4) |
|
A table: A king meets the combinatorial explosion |
|
|
180 | (1) |
|
What made Paul's option 2 payments so huge? |
|
|
181 | (1) |
|
How does this fable relate to computers? |
|
|
182 | (1) |
|
When do solutions scale up? |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
The traveling salesperson problem |
|
|
184 | (3) |
|
What are some other problems that seem to require exhaustive search? |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
With such a huge number of possibilities to consider, how are class schedules actually developed, and how is it possible for computers to play chess? |
|
|
190 | (1) |
|
Moore's law suggests that computer hardware is getting larger and faster at a rapid rate. How does this impact what problems computers can solve? |
|
|
191 | (2) |
|
How does complexity affect problem solving? |
|
|
193 | (1) |
|
When does the cost of "more" outweigh the benefits? |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Terminology from this chapter |
|
|
200 | (1) |
|
|
200 | (3) |
|
|
203 | (3) |
|
|
206 | (3) |
|
Chapter 8 How Are Software Packages Developed? |
|
|
209 | (34) |
|
What are the main steps in software project development? |
|
|
209 | (2) |
|
|
211 | (1) |
|
Design or developing algorithms |
|
|
212 | (1) |
|
|
212 | (1) |
|
Testing and running programs |
|
|
213 | (1) |
|
|
213 | (1) |
|
For a typical software project, about how much time is devoted to each phase of development? |
|
|
214 | (1) |
|
Could you explain further what is meant by a "programming language" and identify some programming languages in common use? |
|
|
215 | (1) |
|
How do developers decide what capabilities to put in their software? |
|
|
216 | (1) |
|
How are users' needs determined? |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Why build prototypes that lack functionality, when you can build the real thing with full functionality? |
|
|
219 | (1) |
|
The software development process involves specifications, design, coding, testing, and maintenance. How do these pieces fit together in the actual development of software? |
|
|
219 | (1) |
|
If development is user-driven, why are there features I don't use or even want? |
|
|
220 | (1) |
|
Why are software packages and operating systems changed or updated so often? |
|
|
221 | (2) |
|
But why should software change at all? |
|
|
223 | (1) |
|
Why does most software contain errors (bugs)? |
|
|
224 | (1) |
|
What kinds of coding mistakes pass through testing? |
|
|
224 | (1) |
|
If the code for individual parts of the program seems correct, what can go wrong? |
|
|
225 | (2) |
|
What if all the interacting components of a program are error-free? What else can cause errors? |
|
|
227 | (1) |
|
What are some common careers in the software development field, what skills might these professionals need, and what working conditions might they encounter? |
|
|
227 | (2) |
|
In discussions about software, I hear the terms "proprietary software," "free software," "open source software," and "FOSS." What do these terms mean, and how are these concepts similar or different? |
|
|
229 | (1) |
|
How do I know whether it is wise to upgrade my software? Sometimes it seems helpful; sometimes things get worse |
|
|
230 | (1) |
|
|
231 | (1) |
|
Terminology from this chapter |
|
|
232 | (1) |
|
|
232 | (4) |
|
|
236 | (3) |
|
|
239 | (4) |
|
Section III Networking/Distributed System Questions |
|
|
|
Chapter 9 How Are Computers Connected? |
|
|
243 | (32) |
|
How do you physically connect computers? |
|
|
243 | (8) |
|
Could you expand on how USB cables work? |
|
|
251 | (1) |
|
Are point-to-point connections used for networks or only for connecting two computers? |
|
|
252 | (1) |
|
How are computer networks usually connected? |
|
|
253 | (1) |
|
|
253 | (2) |
|
|
255 | (2) |
|
Ethernet hubs connect local computers to form small networks |
|
|
257 | (1) |
|
|
257 | (1) |
|
Can star networks or Ethernet networks connect an arbitrarily large number of computers? |
|
|
258 | (3) |
|
How does wireless technology work? |
|
|
261 | (5) |
|
If all the wireless computers in an area are mobile and do not have Internet access, can they still connect? |
|
|
266 | (1) |
|
|
267 | (1) |
|
Terminology from this chapter |
|
|
268 | (1) |
|
|
268 | (3) |
|
|
271 | (2) |
|
|
273 | (2) |
|
Chapter 10 How Do Computers Share Information So That I Can Exchange Materials with Others Using a Computer Network? |
|
|
275 | (28) |
|
What were some common characteristics of the early days before computers were networked? |
|
|
276 | (1) |
|
What were some of the first aids that came when computers could communicate a bit? |
|
|
277 | (2) |
|
Beyond e-mail, how might people access and use files on a network? |
|
|
279 | (1) |
|
File Transfer Protocol (FTP) |
|
|
279 | (2) |
|
|
281 | (2) |
|
What are some additional, general ways in which files can be shared? |
|
|
283 | (1) |
|
|
284 | (1) |
|
Sharing with remote file access |
|
|
284 | (2) |
|
How does Windows 7 file sharing work? |
|
|
286 | (1) |
|
How does file sharing work with the Macintosh OS X operating system? |
|
|
287 | (1) |
|
When someone wants a file from a server, how does the server know whether to use FTP, remote access, or other programs? |
|
|
288 | (1) |
|
|
289 | (2) |
|
How do these concepts of file sharing apply to updates on the Web for weather and news? |
|
|
291 | (2) |
|
Are there other recent developments and trends in networking and file sharing? |
|
|
293 | (1) |
|
What is "cloud computing"? |
|
|
294 | (1) |
|
How does peer-to-peer (P2P) networking work? |
|
|
295 | (1) |
|
How do social networking sites work? |
|
|
296 | (1) |
|
|
296 | (1) |
|
Terminology from this chapter |
|
|
297 | (1) |
|
|
297 | (3) |
|
|
300 | (2) |
|
|
302 | (1) |
|
Chapter 11 When Can I Consider My Personal Data Secure? |
|
|
303 | (38) |
|
How can I be sure my files will be available when I need them? |
|
|
305 | (3) |
|
What can I do to prevent others from accessing my files without my permission? |
|
|
308 | (1) |
|
How well do password systems work? |
|
|
308 | (2) |
|
What are permission systems, and how do they differ from passwords? |
|
|
310 | (2) |
|
What do firewalls do, and how do they work? |
|
|
312 | (1) |
|
If, despite my best efforts, someone obtains my file, how can I prevent the file from being used? |
|
|
313 | (1) |
|
|
313 | (2) |
|
Approaches to improve the Caesar cipher |
|
|
315 | (2) |
|
What additional internal security threats do computers encounter? |
|
|
317 | (1) |
|
What additional external (networking) threats do computers encounter? |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
Coordinating processor security levels |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (2) |
|
Denial-of-service attacks |
|
|
322 | (1) |
|
|
322 | (1) |
|
How can a virus be detected? |
|
|
323 | (1) |
|
How can I protect myself against computer viruses? |
|
|
323 | (3) |
|
How reliable and secure are other networks, such as ATMs? |
|
|
326 | (1) |
|
Crashes or malfunctions before you try to make your ATM transfer |
|
|
326 | (1) |
|
Crashes or malfunctions after you make your ATM transfer |
|
|
327 | (1) |
|
Crashes or malfunctions while you are in the process of making your ATM transfer |
|
|
327 | (1) |
|
|
328 | (1) |
|
Terminology from this chapter |
|
|
328 | (1) |
|
|
329 | (4) |
|
|
333 | (3) |
|
|
336 | (5) |
|
Section IV Web/Internet Questions |
|
|
|
Chapter 12 How Does the Internet Work? |
|
|
341 | (32) |
|
How is the Internet organized? |
|
|
342 | (2) |
|
How is the Internet organized at the global level? |
|
|
344 | (1) |
|
|
344 | (1) |
|
How much control can a government yield over the Internet? |
|
|
345 | (2) |
|
Does it cost anything to connect to the Internet? |
|
|
347 | (1) |
|
Who pays for the Internet? |
|
|
348 | (1) |
|
|
348 | (1) |
|
What is an Internet address? |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (3) |
|
|
353 | (1) |
|
How are domain names, IP numbers, and Ethernet addresses related? |
|
|
354 | (2) |
|
How do laptops connect to the Internet? |
|
|
356 | (1) |
|
|
357 | (2) |
|
Can I be certain who sent me an e-mail message? |
|
|
359 | (1) |
|
Why is e-mail susceptible to viruses and worms? |
|
|
360 | (1) |
|
Why is e-mail susceptible to spam? |
|
|
361 | (1) |
|
|
361 | (1) |
|
Utilization of information you supply |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
Terminology from this chapter |
|
|
365 | (1) |
|
|
365 | (3) |
|
|
368 | (3) |
|
|
371 | (2) |
|
Chapter 13 How Do Web Applications Work? |
|
|
373 | (32) |
|
When I type characters into a browser, how does the browser know where to look? |
|
|
374 | (1) |
|
How do Web browsers display text and images? |
|
|
374 | (2) |
|
|
376 | (2) |
|
What are style sheets, and what advantages do they have over inline instructions? |
|
|
378 | (1) |
|
What are XHTML and XML, and how do they differ from HTML? |
|
|
379 | (1) |
|
Why do browsers sometimes fail to display Web pages properly? |
|
|
380 | (1) |
|
What is JavaScript, and what can it do? |
|
|
381 | (1) |
|
Can you expand on Ajax and how it works? |
|
|
382 | (1) |
|
How do search engines work? |
|
|
383 | (1) |
|
How do search engines find out about materials on the Web? |
|
|
383 | (1) |
|
Why store so much information? |
|
|
384 | (1) |
|
How are the pages obtained for a search engine? |
|
|
384 | (1) |
|
Do search engines locate all written materials? |
|
|
385 | (1) |
|
How do searches locate information for my specific search requests? |
|
|
386 | (2) |
|
When using some search engines, possible terms appear as I am typing. How is this accomplished? Why does this seem to occur sometimes but not others? |
|
|
388 | (1) |
|
How are the results of searches ordered so that the most relevant sites appear first? |
|
|
388 | (1) |
|
|
389 | (1) |
|
Review of title or keyword information |
|
|
389 | (1) |
|
Combinations of words in your search |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
Real-time activity on social networking sites |
|
|
390 | (1) |
|
How do sites increase their visibility? |
|
|
390 | (2) |
|
To what extent can search engine results be manipulated, and does it really matter? |
|
|
392 | (1) |
|
How are pop-up boxes created? |
|
|
392 | (3) |
|
How can pop-up windows, ads, and other annoyances be controlled? |
|
|
395 | (1) |
|
How are topic-specific ads generated? |
|
|
396 | (1) |
|
|
397 | (1) |
|
Terminology from this chapter |
|
|
398 | (1) |
|
|
398 | (3) |
|
|
401 | (2) |
|
|
403 | (2) |
|
Chapter 14 How Private (or Public) Are Web Interactions? |
|
|
405 | (32) |
|
How is information transmitted from a browser to a server and back? |
|
|
405 | (3) |
|
What information about me is routinely transmitted when I use the Web? |
|
|
408 | (1) |
|
What information about me is routinely recorded when I use the Web? |
|
|
409 | (1) |
|
|
410 | (1) |
|
What defenses do I have against cookies? |
|
|
411 | (2) |
|
In what ways am I vulnerable when working online? |
|
|
413 | (1) |
|
How safe is it to give credit card information to companies online? |
|
|
414 | (1) |
|
How can online companies defraud me during a regular transaction? |
|
|
415 | (1) |
|
How can online companies abuse my credit card information after a regular transaction is complete? |
|
|
416 | (1) |
|
Beyond misuse of credit card data, how might online companies use my information obtained over the Internet? |
|
|
416 | (1) |
|
How secure is information transmitted through the Internet? |
|
|
417 | (1) |
|
Wire-based connections without encryption |
|
|
418 | (1) |
|
Wire-based connections with encryption |
|
|
418 | (1) |
|
Wireless communications without encryption |
|
|
419 | (1) |
|
Wireless communication with encryption |
|
|
419 | (1) |
|
Does leaving a computer (or laptop) connected to a network compromise its security? |
|
|
419 | (1) |
|
How can someone obtain my credit card number from my computer? |
|
|
420 | (1) |
|
What personal information might be vulnerable over the Internet, beyond credit card accounts? |
|
|
421 | (1) |
|
Provide information voluntarily |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
423 | (1) |
|
What else can others learn from files I have stored on my personal computer? |
|
|
424 | (1) |
|
How can I secure my private computer files? |
|
|
425 | (1) |
|
|
426 | (1) |
|
Terminology from this chapter |
|
|
427 | (1) |
|
|
427 | (3) |
|
|
430 | (3) |
|
|
433 | (4) |
|
Section V Social and Ethical Questions |
|
|
|
Chapter 15 How Universal Is Access to Computers and the Web? |
|
|
437 | (28) |
|
What are the different levels of access for computers and the Internet? |
|
|
438 | (1) |
|
No access, moving to some access using a commercial/group account |
|
|
438 | (1) |
|
Limited ongoing access with cost restraints |
|
|
439 | (1) |
|
Limited ongoing access with circumstantial restraints |
|
|
440 | (1) |
|
Limited ongoing access with logistical constraints |
|
|
441 | (1) |
|
Limiting ongoing access with convenience restraints |
|
|
442 | (1) |
|
Ongoing access with speed constraints |
|
|
442 | (1) |
|
Easy ongoing access with high-speed technology---almost |
|
|
443 | (1) |
|
What are some other dimensions of accessibility beyond basic hardware and Internet connectivity? |
|
|
443 | (1) |
|
Access for people with disabilities |
|
|
444 | (1) |
|
|
445 | (1) |
|
What factors affect the ability of people to access the Web? |
|
|
445 | (1) |
|
How do software filters influence Web access? |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
449 | (3) |
|
How effective are filters? |
|
|
452 | (1) |
|
|
452 | (2) |
|
How can I evaluate the effectiveness of specific filtering software? |
|
|
454 | (1) |
|
|
455 | (1) |
|
Terminology from this chapter |
|
|
456 | (1) |
|
|
456 | (3) |
|
|
459 | (3) |
|
|
462 | (3) |
|
Chapter 16 A Can I Use Web-Based Materials in the Same Way as I Use Printed Sources? |
|
|
465 | (28) |
|
Is the content of Web materials as reliable as printed sources? |
|
|
465 | (1) |
|
Can Web materials be a source of unbiased information? |
|
|
466 | (6) |
|
To what extent do issues of reliability, bias, and the evaluation of sources apply to Wikipedia and other large Internet-based projects? |
|
|
472 | (3) |
|
Can all information found in printed sources also be found on the Web? |
|
|
475 | (3) |
|
How do the concepts of intellectual property and academic freedom apply to using materials from the Web? |
|
|
478 | (1) |
|
Ideas, academic exploration, and intellectual property |
|
|
478 | (1) |
|
|
479 | (1) |
|
How do copyrights affect the use of Web materials? |
|
|
479 | (1) |
|
|
480 | (1) |
|
When do copyrights apply? |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
What options do I have in clarifying distribution rights for materials |
|
|
|
|
481 | (1) |
|
Do copyrights apply to Web-based and e-mail materials as well as to printed materials? |
|
|
482 | (1) |
|
What's wrong with downloading music or pictures from the Internet to my computer? |
|
|
483 | (1) |
|
When can I download an article or some music for personal use? |
|
|
484 | (1) |
|
Doesn't fair use give me the freedom to use any materials I wish on my Web pages and in e-mail? |
|
|
484 | (1) |
|
So, how do I know I have permission to distribute materials? |
|
|
484 | (1) |
|
Can I reference Web pages and images from my Web pages if I do not copy the materials to my account? |
|
|
485 | (1) |
|
Don't copyright violations arise only if I charge for the materials? |
|
|
485 | (1) |
|
|
486 | (1) |
|
Terminology from this chapter |
|
|
486 | (1) |
|
|
486 | (3) |
|
|
489 | (2) |
|
|
491 | (2) |
|
Chapter 17 Can Computers Think (Now or in the Future)? |
|
|
493 | (22) |
|
|
494 | (2) |
|
What roles do consciousness and free will play in intelligence? |
|
|
496 | (2) |
|
|
498 | (3) |
|
What are some ways that we could determine whether computers can think? |
|
|
501 | (1) |
|
Are there any objective ways to test for intelligence? |
|
|
502 | (2) |
|
How do current abilities of computers measure up against these tests for thought? |
|
|
504 | (3) |
|
Can we expect future computers might have true intelligence? |
|
|
507 | (1) |
|
|
508 | (1) |
|
Terminology from this chapter |
|
|
509 | (1) |
|
|
509 | (2) |
|
|
511 | (2) |
|
|
513 | (2) |
Index |
|
515 | |