Atjaunināt sīkdatņu piekrišanu

E-grāmata: Tao of Computing

2.55/5 (12 ratings by Goodreads)
(Grinnell College, Iowa, USA)
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 106,44 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"This text presents a broad, practical introduction to computers and computer technology. It uses a question and answer format to provide thoughtful answers to the many practical questions that students have about computing. The text offers a down-to-earth overview of fundamental computer fluency topics, from the basics of how a computer is organized to an overview of operating systems to a description of how the Internet works. The second edition includes new technological advances, new applications, examples from popular culture, and new research exercises"--



Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao of Computing, Second Edition presents a comprehensive introduction to computers and computer technology. This edition updates its popular predecessor with new research exercises and expanded discussion questions.

It uses a question-and-answer format to provide thoughtful answers to the many practical questions that students have about computing. Among the questions answered, the book explains:

  • What capabilities computers have in helping people solve problems and what limitations need to be considered
  • Why machines act the way they do
  • What is involved in getting computers to interact with networks

The book offers a down-to-earth overview of fundamental computer fluency topics, from the basics of how a computer is organized and an overview of operating systems to a description of how the Internet works. The second edition describes new technological advances including social media applications and RSS feeds.

Preface xxiii
Acknowledgments xxix
Section I Underlying Building-Block Questions
Chapter 1 How Are Computers Organized?
3(30)
As an interested computer user, how will this book help address my curiosity about how computers work, what they can do, and what they cannot do?
3(1)
What is meant by "computer programs," "software," "data," "computer applications," and "processing," and how do they differ?
4(1)
How do computers work?
5(1)
What are the main components inside a machine?
6(1)
Sometimes I hear people talk about circuits and computer chips. How do circuits and chips relate to components, such as a CPU, main memory, and I/O devices?
7(1)
How are the components connected within a computer?
8(3)
Can we connect a CPU, main memory, and some I/O devices using a bus to obtain a good computer?
11(1)
Latency
12(2)
Busses
14(1)
Alternative mechanisms for CPU processing
15(1)
Sharing processing among multiple CPUs
15(1)
Moving work outside the CPU
15(1)
What does the "brain" of a traditional computer look like?
16(2)
Are modern computer "brains" different from traditional ones?
18(3)
How does this description of components relate to what I can actually see within a computer?
21(5)
Summary
26(1)
Terminology from this chapter
26(1)
Discussion questions
26(4)
Exercises
30(2)
Research exercises
32(1)
Chapter 2 How Are Numbers and Characters Represented in a Computer (and Who Cares)?
33(26)
Why should I care about the way data are represented inside computers?
34(1)
Why do computers work in binary?
35(2)
What other approaches can be used to store data, in addition to "digital" data?
37(1)
In 2009, all television broadcasters in the United States changed from analog to digital. How do the terms "analog" and "digital" apply to television, and why was it done?
38(1)
AM transmission
38(1)
FM transmission
39(1)
Digital transmission
40(1)
What approaches are commonly used to represent numbers inside computers, and what consequences follow from these approaches?
40(1)
Fixed-size storage approach
41(1)
Variable-size storage approach
42(1)
Why should I care about the way data are represented inside computers?
43(1)
Storage of real numbers
43(3)
Can a finite computer store real numbers with an infinite number of decimal places?
46(1)
Can storage of data affect the accuracy of results?
46(2)
How does a computer know to use a Latin alphabet for English, but other alphabets for Russian, Greek, or other languages?
48(2)
Summary
50(1)
Terminology from this chapter
50(1)
Discussion questions
50(4)
Exercises
54(1)
Research exercises
55(4)
Chapter 3 How Are Images Represented (and Does It Matter)?
59(26)
How are images created on a computer monitor or on paper with a printer?
59(2)
There are two main approaches for representing color: by adding colors and by masking colors. Why are two approaches used, and how do these approaches work?
61(1)
What are some of the approaches used to store images in a reasonably compressed way?
62(1)
Color tables
62(1)
Font tables
63(1)
Shape tables
63(1)
Shapes and colors
64(1)
Drawing commands or vector graphics
64(1)
Data averaging or sampling
64(1)
Voice sampling
65(1)
Image sampling and/or averaging
65(1)
Data compression
65(1)
I have encountered ".gif," ".png," ".ps," ".pdf," and ".jpg" image files when surfing the Web. How do these image files work?
66(2)
Do these differences among various file formats really matter?
68(1)
What are the tradeoffs in handling pictures and other graphical applications?
68(1)
Example: Text
69(1)
Example: Goreme Open-Air Museum
70(2)
Example: Street scene in Dornoch, Scotland
72(1)
Example: The harbor in Lybster, Scotland
73(1)
Does high definition television have anything to do with computers?
74(1)
Summary
75(1)
Terminology from this chapter
76(1)
Discussion questions
76(2)
Exercises
78(5)
Research exercises
83(2)
Chapter 4 Where Are Programs and Data Stored?
85(28)
What are the types of memory?
85(1)
Types of main memory
86(1)
Transitory versus permanent memory
87(1)
Files and their organization
88(3)
Virtual memory and its relationship to files and main memory
91(4)
When do data move from one type of memory to another?
95(2)
What does it mean to "defragment" a disk, and should I care?
97(1)
Why not simplify the construction of computers by replacing the main memory (RAM) and the cache memory by ROM?
98(2)
How much memory is enough?
100(2)
What are the differences among moving a file to the trash, deleting a file, and erasing it?
102(2)
I have heard that some computers contain "hidden files." What are they?
104(1)
Summary
105(1)
Terminology from this chapter
106(1)
Discussion questions
106(3)
Exercises
109(2)
Research exercises
111(2)
Chapter 5 What Is an Operating System, and What Does It Do?
113(26)
What is an "operating system"?
113(3)
I understand that desktop and laptop computers have operating systems, but what about other electronic devices, such as cell phones, iPods, microwave ovens, automobile engines, and light switches?
116(2)
Why are there different operating systems?
118(1)
What is "multitasking," and does this idea affect me?
119(2)
Why do operating systems worry about coordinating different programs or users? Can't they just work separately?
121(2)
What do you mean by "booting" the computer?
123(1)
What is a "reboot," and why might it be necessary?
124(1)
Why do so many people and companies use Windows?
125(1)
What is Linux, and where did the Linux operating system come from?
126(2)
Why can different operating systems read both CDs and DVDs?
128(1)
How do operating systems tell apart CDs and DVDs?
128(1)
Which operating system is the best?
129(1)
Summary
129(1)
Terminology from this chapter
130(1)
Discussion questions
130(2)
Exercises
132(3)
Research exercises
135(4)
Section II Software/Problem-Solving Questions
Chapter 6 What Can Computers Do for Me?
139(36)
What types of problems are computers good at?
139(1)
When would a computer's storage and retrieval skills help me?
140(1)
Word processing
140(1)
Databases
140(1)
Multimedia applications
141(1)
Networking and communication
141(1)
How does a computer's computational capabilities help me?
141(1)
Weather forecasting
141(2)
Organizing finances and personal information
143(1)
What else can a computer help me with?
143(1)
What do good applications have in common?
144(1)
Why can a computer guide astronauts into space but not predict the stock market?
145(1)
If computer programs that predict the stock market are unreliable, how can I tell when other computer programs give unreliable results?
146(2)
For problems that a computer can solve, what process should I use to get an answer?
148(2)
Can some computers solve problems that other computers can't solve?
150(1)
What are Turing machines, and what do they have to do with computers today?
151(2)
The lambda calculus
153(1)
If all computers are universal, how do they differ?
153(1)
How can I decide what machine I should buy?
154(2)
Summary
156(1)
Terminology from this chapter
157(1)
Discussion questions
157(3)
Exercises
160(2)
Research exercises
162(1)
Appendix 6A Turing machines
162(5)
Example 1
163(2)
Example 2
165(1)
Exercises for Appendix 6A
166(1)
Appendix 6B The Halting Problem
167(8)
Proof that the Halting Problem is unsolvable
169(1)
Observations on coding algorithms
170(1)
Using proposed Algorithm A to construct a new Program N
171(1)
Proof that the proposed Algorithm A is incorrect
172(1)
Conclusions about the Halting Problem
172(1)
Analog
172(1)
Heisenberg's principle of uncertainty
173(1)
Russell's paradox
173(1)
Exercises for Appendix 6R
174(1)
Chapter 7 What Should I Know about the Sizes and Speeds of Computers?
175(34)
How fast does technology really evolve?
176(4)
A table: A king meets the combinatorial explosion
180(1)
What made Paul's option 2 payments so huge?
181(1)
How does this fable relate to computers?
182(1)
When do solutions scale up?
183(1)
Linear search
183(1)
Exhaustive search
184(1)
The traveling salesperson problem
184(3)
What are some other problems that seem to require exhaustive search?
187(1)
Class scheduling
188(1)
Chess playing
189(1)
With such a huge number of possibilities to consider, how are class schedules actually developed, and how is it possible for computers to play chess?
190(1)
Moore's law suggests that computer hardware is getting larger and faster at a rapid rate. How does this impact what problems computers can solve?
191(2)
How does complexity affect problem solving?
193(1)
When does the cost of "more" outweigh the benefits?
194(1)
More features
195(2)
Greater speed
197(1)
More graphics
198(1)
Greater accuracy
199(1)
Summary
200(1)
Terminology from this chapter
200(1)
Discussion questions
200(3)
Exercises
203(3)
Research exercises
206(3)
Chapter 8 How Are Software Packages Developed?
209(34)
What are the main steps in software project development?
209(2)
Writing specifications
211(1)
Design or developing algorithms
212(1)
Coding algorithms
212(1)
Testing and running programs
213(1)
Maintaining programs
213(1)
For a typical software project, about how much time is devoted to each phase of development?
214(1)
Could you explain further what is meant by a "programming language" and identify some programming languages in common use?
215(1)
How do developers decide what capabilities to put in their software?
216(1)
How are users' needs determined?
216(1)
Word-processing example
217(1)
Focus groups
218(1)
Prototypes
218(1)
Why build prototypes that lack functionality, when you can build the real thing with full functionality?
219(1)
The software development process involves specifications, design, coding, testing, and maintenance. How do these pieces fit together in the actual development of software?
219(1)
If development is user-driven, why are there features I don't use or even want?
220(1)
Why are software packages and operating systems changed or updated so often?
221(2)
But why should software change at all?
223(1)
Why does most software contain errors (bugs)?
224(1)
What kinds of coding mistakes pass through testing?
224(1)
If the code for individual parts of the program seems correct, what can go wrong?
225(2)
What if all the interacting components of a program are error-free? What else can cause errors?
227(1)
What are some common careers in the software development field, what skills might these professionals need, and what working conditions might they encounter?
227(2)
In discussions about software, I hear the terms "proprietary software," "free software," "open source software," and "FOSS." What do these terms mean, and how are these concepts similar or different?
229(1)
How do I know whether it is wise to upgrade my software? Sometimes it seems helpful; sometimes things get worse
230(1)
Summary
231(1)
Terminology from this chapter
232(1)
Discussion questions
232(4)
Exercises
236(3)
Research exercises
239(4)
Section III Networking/Distributed System Questions
Chapter 9 How Are Computers Connected?
243(32)
How do you physically connect computers?
243(8)
Could you expand on how USB cables work?
251(1)
Are point-to-point connections used for networks or only for connecting two computers?
252(1)
How are computer networks usually connected?
253(1)
Star networks
253(2)
Ethernet networks
255(2)
Ethernet hubs connect local computers to form small networks
257(1)
Token-ring network
257(1)
Can star networks or Ethernet networks connect an arbitrarily large number of computers?
258(3)
How does wireless technology work?
261(5)
If all the wireless computers in an area are mobile and do not have Internet access, can they still connect?
266(1)
Summary
267(1)
Terminology from this chapter
268(1)
Discussion questions
268(3)
Exercises
271(2)
Research exercises
273(2)
Chapter 10 How Do Computers Share Information So That I Can Exchange Materials with Others Using a Computer Network?
275(28)
What were some common characteristics of the early days before computers were networked?
276(1)
What were some of the first aids that came when computers could communicate a bit?
277(2)
Beyond e-mail, how might people access and use files on a network?
279(1)
File Transfer Protocol (FTP)
279(2)
Remote file access
281(2)
What are some additional, general ways in which files can be shared?
283(1)
Sharing with FTP
284(1)
Sharing with remote file access
284(2)
How does Windows 7 file sharing work?
286(1)
How does file sharing work with the Macintosh OS X operating system?
287(1)
When someone wants a file from a server, how does the server know whether to use FTP, remote access, or other programs?
288(1)
What makes TCP/IP work?
289(2)
How do these concepts of file sharing apply to updates on the Web for weather and news?
291(2)
Are there other recent developments and trends in networking and file sharing?
293(1)
What is "cloud computing"?
294(1)
How does peer-to-peer (P2P) networking work?
295(1)
How do social networking sites work?
296(1)
Summary
296(1)
Terminology from this chapter
297(1)
Discussion questions
297(3)
Exercises
300(2)
Research exercises
302(1)
Chapter 11 When Can I Consider My Personal Data Secure?
303(38)
How can I be sure my files will be available when I need them?
305(3)
What can I do to prevent others from accessing my files without my permission?
308(1)
How well do password systems work?
308(2)
What are permission systems, and how do they differ from passwords?
310(2)
What do firewalls do, and how do they work?
312(1)
If, despite my best efforts, someone obtains my file, how can I prevent the file from being used?
313(1)
The Caesar cipher
313(2)
Approaches to improve the Caesar cipher
315(2)
What additional internal security threats do computers encounter?
317(1)
What additional external (networking) threats do computers encounter?
318(1)
Keyboard sniffers
318(1)
Wire tapping
318(1)
Coordinating processor security levels
318(1)
Trojan horses
319(1)
Viruses and worms
320(2)
Denial-of-service attacks
322(1)
Zombie computers
322(1)
How can a virus be detected?
323(1)
How can I protect myself against computer viruses?
323(3)
How reliable and secure are other networks, such as ATMs?
326(1)
Crashes or malfunctions before you try to make your ATM transfer
326(1)
Crashes or malfunctions after you make your ATM transfer
327(1)
Crashes or malfunctions while you are in the process of making your ATM transfer
327(1)
Summary
328(1)
Terminology from this chapter
328(1)
Discussion questions
329(4)
Exercises
333(3)
Research exercises
336(5)
Section IV Web/Internet Questions
Chapter 12 How Does the Internet Work?
341(32)
How is the Internet organized?
342(2)
How is the Internet organized at the global level?
344(1)
Who owns the Internet?
344(1)
How much control can a government yield over the Internet?
345(2)
Does it cost anything to connect to the Internet?
347(1)
Who pays for the Internet?
348(1)
Where does the money go?
348(1)
What is an Internet address?
349(1)
Domain name
349(1)
IP number
350(3)
Ethernet address
353(1)
How are domain names, IP numbers, and Ethernet addresses related?
354(2)
How do laptops connect to the Internet?
356(1)
How does e-mail work?
357(2)
Can I be certain who sent me an e-mail message?
359(1)
Why is e-mail susceptible to viruses and worms?
360(1)
Why is e-mail susceptible to spam?
361(1)
Scanning Web sites
361(1)
Utilization of information you supply
361(1)
Exchange of lists
362(1)
Random spamming
362(1)
How is spam controlled?
362(1)
Can laws help?
363(1)
Summary
364(1)
Terminology from this chapter
365(1)
Discussion questions
365(3)
Exercises
368(3)
Research exercises
371(2)
Chapter 13 How Do Web Applications Work?
373(32)
When I type characters into a browser, how does the browser know where to look?
374(1)
How do Web browsers display text and images?
374(2)
How does HTML work?
376(2)
What are style sheets, and what advantages do they have over inline instructions?
378(1)
What are XHTML and XML, and how do they differ from HTML?
379(1)
Why do browsers sometimes fail to display Web pages properly?
380(1)
What is JavaScript, and what can it do?
381(1)
Can you expand on Ajax and how it works?
382(1)
How do search engines work?
383(1)
How do search engines find out about materials on the Web?
383(1)
Why store so much information?
384(1)
How are the pages obtained for a search engine?
384(1)
Do search engines locate all written materials?
385(1)
How do searches locate information for my specific search requests?
386(2)
When using some search engines, possible terms appear as I am typing. How is this accomplished? Why does this seem to occur sometimes but not others?
388(1)
How are the results of searches ordered so that the most relevant sites appear first?
388(1)
Page Rank
389(1)
Review of title or keyword information
389(1)
Combinations of words in your search
390(1)
Click popularity
390(1)
Stickiness
390(1)
Real-time activity on social networking sites
390(1)
How do sites increase their visibility?
390(2)
To what extent can search engine results be manipulated, and does it really matter?
392(1)
How are pop-up boxes created?
392(3)
How can pop-up windows, ads, and other annoyances be controlled?
395(1)
How are topic-specific ads generated?
396(1)
Summary
397(1)
Terminology from this chapter
398(1)
Discussion questions
398(3)
Exercises
401(2)
Research exercises
403(2)
Chapter 14 How Private (or Public) Are Web Interactions?
405(32)
How is information transmitted from a browser to a server and back?
405(3)
What information about me is routinely transmitted when I use the Web?
408(1)
What information about me is routinely recorded when I use the Web?
409(1)
What are cookies?
410(1)
What defenses do I have against cookies?
411(2)
In what ways am I vulnerable when working online?
413(1)
How safe is it to give credit card information to companies online?
414(1)
How can online companies defraud me during a regular transaction?
415(1)
How can online companies abuse my credit card information after a regular transaction is complete?
416(1)
Beyond misuse of credit card data, how might online companies use my information obtained over the Internet?
416(1)
How secure is information transmitted through the Internet?
417(1)
Wire-based connections without encryption
418(1)
Wire-based connections with encryption
418(1)
Wireless communications without encryption
419(1)
Wireless communication with encryption
419(1)
Does leaving a computer (or laptop) connected to a network compromise its security?
419(1)
How can someone obtain my credit card number from my computer?
420(1)
What personal information might be vulnerable over the Internet, beyond credit card accounts?
421(1)
Provide information voluntarily
422(1)
Installation of software
422(1)
Security vulnerabilities
423(1)
Outside users
423(1)
What else can others learn from files I have stored on my personal computer?
424(1)
How can I secure my private computer files?
425(1)
Summary
426(1)
Terminology from this chapter
427(1)
Discussion questions
427(3)
Exercises
430(3)
Research exercises
433(4)
Section V Social and Ethical Questions
Chapter 15 How Universal Is Access to Computers and the Web?
437(28)
What are the different levels of access for computers and the Internet?
438(1)
No access, moving to some access using a commercial/group account
438(1)
Limited ongoing access with cost restraints
439(1)
Limited ongoing access with circumstantial restraints
440(1)
Limited ongoing access with logistical constraints
441(1)
Limiting ongoing access with convenience restraints
442(1)
Ongoing access with speed constraints
442(1)
Easy ongoing access with high-speed technology---almost
443(1)
What are some other dimensions of accessibility beyond basic hardware and Internet connectivity?
443(1)
Access for people with disabilities
444(1)
Long-term access
445(1)
What factors affect the ability of people to access the Web?
445(1)
How do software filters influence Web access?
446(1)
E-mail filtering
447(1)
Controls for children
448(1)
Filtering by employers
449(1)
Filtering by countries
449(3)
How effective are filters?
452(1)
Deciding what to block
452(2)
How can I evaluate the effectiveness of specific filtering software?
454(1)
Summary
455(1)
Terminology from this chapter
456(1)
Discussion questions
456(3)
Exercises
459(3)
Research exercises
462(3)
Chapter 16 A Can I Use Web-Based Materials in the Same Way as I Use Printed Sources?
465(28)
Is the content of Web materials as reliable as printed sources?
465(1)
Can Web materials be a source of unbiased information?
466(6)
To what extent do issues of reliability, bias, and the evaluation of sources apply to Wikipedia and other large Internet-based projects?
472(3)
Can all information found in printed sources also be found on the Web?
475(3)
How do the concepts of intellectual property and academic freedom apply to using materials from the Web?
478(1)
Ideas, academic exploration, and intellectual property
478(1)
Academic freedom
479(1)
How do copyrights affect the use of Web materials?
479(1)
What is copyright?
480(1)
When do copyrights apply?
480(1)
Copyright registration
480(1)
Copyright notices
480(1)
What options do I have in clarifying distribution rights for materials
I post on the Web?
481(1)
Do copyrights apply to Web-based and e-mail materials as well as to printed materials?
482(1)
What's wrong with downloading music or pictures from the Internet to my computer?
483(1)
When can I download an article or some music for personal use?
484(1)
Doesn't fair use give me the freedom to use any materials I wish on my Web pages and in e-mail?
484(1)
So, how do I know I have permission to distribute materials?
484(1)
Can I reference Web pages and images from my Web pages if I do not copy the materials to my account?
485(1)
Don't copyright violations arise only if I charge for the materials?
485(1)
Summary
486(1)
Terminology from this chapter
486(1)
Discussion questions
486(3)
Exercises
489(2)
Research exercises
491(2)
Chapter 17 Can Computers Think (Now or in the Future)?
493(22)
What is intelligence?
494(2)
What roles do consciousness and free will play in intelligence?
496(2)
Can machines learn?
498(3)
What are some ways that we could determine whether computers can think?
501(1)
Are there any objective ways to test for intelligence?
502(2)
How do current abilities of computers measure up against these tests for thought?
504(3)
Can we expect future computers might have true intelligence?
507(1)
Summary
508(1)
Terminology from this chapter
509(1)
Discussion questions
509(2)
Exercises
511(2)
Research exercises
513(2)
Index 515
Henry M. Walker has been an active member within the computing-education community for over two decades. Major activities include curricular development, innovative pedagogy, textbook writing, teaching, and service. Since 1974, he has been on the faculty at Grinnell College, currently as the Samuel R. and Marie-Louise Rosenthal Professor of Natural Science and Mathematics, and Professor of Computer Science. During some leaves and summers, he has taught 8 semesters at the University of Texas at Austin. Internationally, he has been a guest faculty member at Nanjing University in China and Unitec in New Zealand.Before this book, he wrote 8 undergraduate textbooks, published by Jones and Bartlett, Health Publishers, Little Brown, Scott Foresmann, and Winthrop Publishers (affiliated with Prentice Hall). He also has written several dozen articles on computing education, serves as co-editor for the SIGCSE Bulletin newsletter, writes columns on Classroom Vignettes and Curricular Syncopations for ACM Inroads, and serves as an Associate Editor for ACM Inroads.Over the years, Henry Walker has actively participated in the development of the Model Curricula for a Liberal Arts Degree in Computer Science, prepared by the Liberal Arts Computer Science Consortium, and he chaired Pedagogy Focus Group 2 on Supporting Courses for Computing Curricula 2001.