22
Reading Advantage 7 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read the chapter, take notes in a presen- tation software program. Make one slide for each of the main headings. List three to four main points on each slide. Use the finished presentation to study for tests. identify aspects of computer technology that are most frequently used on the job. explain various computer applications being used today. analyze the advantages and disadvantages of using the Internet and e-mail at work. describe the role of technology in the workplace, school, and home. Key Terms hardware central processing unit (CPU) USB flash drive peripherals software World Wide Web copyright e-mail troubleshooting globalization lifelong learning computer literate E-learning multimedia

Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Reading Advantage

77 Technologyand You

138

Chapter ObjectivesAfter studying this chapter, you will be able to

As you read the chapter, take notes in a presen-tation software program. Make one slide for each of the main headings. List three to four main points on each slide. Use the fi nished presentation to study for tests.

• identify aspects of computer technology that are most frequently used on the job.

• explain various computer applications being used today.

• analyze the advantages and disadvantages of using the Internet and e-mail at work.

• describe the role of technology in the workplace, school, and home.

Key Termshardware

central processing unit (CPU)

USB fl ash drive

peripherals

software

World Wide Web

copyright

e-mail

troubleshooting

globalization

lifelong learning

computer literate

E-learning

multimedia

Ch07.indd 138Ch07.indd 138 5/13/2008 2:23:44 PM5/13/2008 2:23:44 PM

Page 2: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Key Concepts• Being familiar with computer technology is crucial for job success.

• Follow your employer’s guidelines when using technology on the job.

• Technology has infl uenced the way tasks are accomplished on the job, at school, and in the home.

Ch07.indd 139Ch07.indd 139 5/13/2008 2:23:55 PM5/13/2008 2:23:55 PM

Page 3: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

140 Part 2 Skills for Success

Technology TodayRapid advances in technology are continually causing your home,

school, and work environments to change. Computers are commonly used in many ways to transmit information and make tasks easier. Workers are expected to have basic computer skills. However, they must also be able to adjust quickly to new roles and responsibilities as tech-nology continues to change. Your ability and willingness to learn new technology will help you succeed in the workplace.

The computer and the Internet increasingly impact today’s lifestyles. It is assumed that most teens have a working knowledge of computers and basic operations, 7-1. Understanding how to use computers and the Internet is a necessity. Students preparing for the workplace must also learn how to use the tools and technology common to their chosen profession.

Computer HardwareSmall desk-size computers are called personal computers (PCs). One

popular type of personal computer is the laptop. This is a lightweight, portable computer about the size of a notebook. It is especially useful for college students, traveling salespeople, and other professionals who spend much of the workday away from an offi ce, 7-2. The physical equip-ment in computer systems is the hardware. The hardware includes the computer itself and all the items needed to use it except software.

A computer’s power depends on the speed of its processor and the amount of memory it has. The central processing unit (CPU), also called the processor, controls what is done with the data received.

7-1Most children today begin using computers at an early age.

What types of computers are sold at the stores in which you shop?

Thinking ItThinking ItThroughThrough

Ch07.indd 140Ch07.indd 140 5/13/2008 2:24:10 PM5/13/2008 2:24:10 PM

Page 4: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 141

This is the component that performs the computer’s functions. Processor speeds are measured in frequencies of megahertz (Mhz) and gigahertz (Ghz).

Random Access Memory (RAM) allows data to process quickly. Computers vary in the amount of RAM they have. The amount of memory is measured in megabytes (MB) and gigabytes (GB). The more RAM a computer has, the more programs it can run, and the faster the programs can run. The total RAM capacity of personal computers on the market will con-tinue to increase as buyers demand computers with more memory and speed. Generally, it is a good idea to buy a computer with as much memory and as fast a processor as you can afford. Even if you do not require much power when you purchase the computer, you may need it later for software upgrades.

Video cards can also help a computer run faster. A video card helps the computer process complex graphics, such as those found on the Internet or in games.

Methods of Storing DataData is either stored in the computer’s

memory or sent to a secondary storage device. The internal hard disk drive, or hard drive, stores the data to operate the computer as well as all information entered by the user. Secondary storage devices are also used to store information. These storage devices include writable CDs, DVDs, and USB fl ash drives.

Writable CDs (originally called CD-Recordable) are referred to as CD-Rs. They hold large amounts of data, but once data is saved to a CD-R, it can-not be erased. On the other hand, CD-Re-Writable discs (CD-RWs) can be erased and used to record repeatedly. As technology improves, the amount of data that may be stored on a CD will probably increase. See 7-3.

DVD-Recordable discs (DVD-Rs) are primarily used to record videos, although they can also be used to store data. DVD-Rs hold much more data than CD-Rs. Data can only be written to (or “burned to”) a DVD-R once.

A USB fl ash drive can also be used to store data for extended peri-ods of time. A USB fl ash drive is also known as a thumb drive, keychain drive, or jump drive. This tiny unit can be plugged into a computer’s USB port and recognized as a storage device. Once data has been saved to the device, it can be plugged into another computer to transfer the data. For this reason, it is a convenient method of backing up data.

Your workplace may connect its computers through a closed network. This means that multiple terminals can share information with one another. A local area network (LAN) is a network that covers a small area,

7-2A laptop is portable and takes up little space.

Ch07.indd 141Ch07.indd 141 5/13/2008 2:24:13 PM5/13/2008 2:24:13 PM

Page 5: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

142 Part 2 Skills for Success

such as an offi ce building. Through your network, you may be able to save information to a server. A server is a computer with extensive memory that is connected to other computers. The workers at individual workstations can save information to folders on the server, retrieve information from the server, and share fi les with coworkers. Most businesses regularly back up information saved to the server as a precaution.

No matter what method you use to save fi les, fi le manage-ment is necessary. This means keeping your fi les organized and easily retrievable in an appropriate structure. Your com-pany may dictate how fi les should be managed. Perhaps each employee must maintain fi les for each project. Keeping fi les in the appropriate folders will help prevent the server from becoming cluttered with unidentifi ed fi les and unneeded information.

PeripheralsPeripherals include output and input devices—anything that can be

plugged into your CPU. Output devices include monitors and printers. Input devices include keyboards, mice, scanners, digital cameras, and webcams.

A scanner is a device that passes an electron beam over an image, allowing the image to be stored in the computer’s memory. The stored data can then be retrieved as an image that may be viewed on the com-puter monitor and modifi ed electronically. Scanners can also be used to input large amounts of text and thereby save hours of keyboarding. To save space, you can buy a printer that includes a scanner.

Digital cameras have almost entirely replaced traditional fi lm cameras. With these cameras, photos are captured to memory cards (or compact fl ash cards) instead of fi lm. The cameras can be plugged into a computer’s USB port, and transferring photos to the computer’s hard drive. There the images can be modifi ed, stored, or sent to others. Most digital cameras feature a viewing screen on which the user can see the image as soon as the picture is taken. See 7-4.

Webcams are used to transmit videos to the Internet. They are usually plugged into computers and can provide a continuous feed. They are often used for videoconferences or video chatting. These cameras gener-ally provide lower-quality pictures than those of a camcorder.

Software ToolsComputers cannot operate without being told what to do. Hardware

is the equipment; software provides the instructions. A computer can be instructed to do a variety of tasks depending on the software used.

There are two types of computer software: operating system software and application program software. Operating system software directs the use of the computer’s hardware. In the case of PCs, either the

7-3Rewritable CDs are popular due to the amount of data that may be stored and reserved for future use.

What storage methods do you think are most reliable? Why?

Thinking ItThinking ItThroughThrough

What peripherals have you used or experienced?

Thinking ItThinking ItThroughThrough

Ch07.indd 142Ch07.indd 142 5/13/2008 2:24:15 PM5/13/2008 2:24:15 PM

Page 6: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 143

Windows® operating system or the Mac OS® operating system is used. Operating system software makes it possible for the computer to use compatible application programs.

Application program software gives the computer directions to do specifi c tasks, 7-5. Some tasks include word process-ing, data formatting, or Internet browsing. Many of these programs are already installed on new computers. These programs may be purchased at computer stores or purchased online for download.

Word ProcessingThe ability to quickly enter, edit, store, and print words

with a computer is word processing. The computer also makes it easy to add charts, pictures, and other graphics to documents. Adding formatting, such as margins and line spacing, is as simple as clicking your mouse. Most word processing programs have features for checking spelling and grammar. Files can be saved to the hard drive or other stor-age using the Save as option.

SpreadsheetsSpreadsheets are documents that organize text and/or numbers in

rows and columns, 7-6. The software is used to organize data into specifi c formats and perform mathematical computations. Formulas are applied to rows or columns so fi gures adjust automatically when new data is entered according to the user’s needs.

7-4Digital cameras are easy to use and allow you to immediately see the photo you have taken.

7-5This program helps the user make precise graphs based on the data that has been entered.

Have word processing programs entirely replaced typewriters? For what tasks might typewriters still be used?

Reflect Reflect FurtherFurther

Ch07.indd 143Ch07.indd 143 5/13/2008 2:24:17 PM5/13/2008 2:24:17 PM

Page 7: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

144 Part 2 Skills for Success

Spreadsheets are used extensively in all areas of financial accounting. They also provide an organized way to view numerous figures about business performance. For example, store managers may use spreadsheets to track the effect of various weekly promotions and marketing strategies on sales.

DatabasesDatabases are computer fi les that organize a large collection of related

information. A database is like a fi le folder in which groups of related records are stored and cross-referenced. Depending on the chosen reference category, or fi eld, one or more parts of the fi le can be retrieved. Information can be entered or sorted by fi eld. The information in a database can also be merged into documents in other programs, such as a word processing document.

Sometimes databases are used to track customer purchasing habits or the costs of materials from different suppliers. For example, suppose your sales force wants to keep track of the action to take with each customer after a sales call. By inputting data about the visits to a database, four separate lists can be printed to help the sales department know whom to visit again, phone, send more information, or simply leave alone.

Desktop PublishingPCs can be used to create, edit, and produce newsletters, reports, and

other documents. This ability is called desktop publishing. It requires the use of software that formats the copy, offers various type styles and sizes, and creates page layouts. The software allows the user to create graphics and add photos and other visuals.

Documents made with desktop publishing have the same high- quality look as those prepared professionally. One system is used for the entire publishing process from creation to printing.

Businesses, schools, organizations, and government offi ces use desk-top publishing. Newsletters, business reports, sales materials, and even books are prepared using this method. Rapid improvements in technol-ogy coupled with more affordable equipment has caused a revamping of the printing industry. The result is a dramatic rise in desktop publishing.

PresentationsPresentation software is a program that allows the user to create

electronic presentations similar to slide shows. Text and images can be inserted on each slide, as well as notes for the speaker. Then, as the speaker gives the presentation, he or she moves the slide show forward by clicking the mouse or a remote.

7-6Spreadsheets are used whenever a large quantity of numbers are analyzed.

Where can you learn how to operate com puter software programs for word processing, spreadsheets, databases, presentation software, and desktop publishing?

Thinking ItThinking ItThroughThrough

Do you agree with the following statement? “Computers are smart.”

Reflect Reflect FurtherFurther

Ch07.indd 144Ch07.indd 144 5/13/2008 2:24:22 PM5/13/2008 2:24:22 PM

Page 8: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 145

The presentation can incorporate video and sounds if desired. The speaker can also prepare informative handouts for the audience by print-ing the presentation in different formats.

The InternetThe Internet consists of thousands of computer networks around the

world joined together. It is the largest computer system in existence. This network allows connected computers to exchange information and access resources at speeds and volumes once considered impossible. See 7-7.

When you access the Internet, you are online. To get online, you fi rst need a computer with the appropriate software, a modem, and a connec-tion. That connection is usually provided by a phone line, cable line, or digital subscriber line (DSL). Wireless connections are also very popular.

In addition, you need an Internet service provider. This may be your local phone company, cable company, or a commercial service provider. Usually for a monthly fee, you receive the software and the ability to go online 24 hours a day. Various other fees may also apply.

The World Wide Web is the part of the Internet that carries messages having pictures, color, and/or sound. It contains huge collections of documents on sites called Web sites. These sites are maintained by various educational institutions, companies, organizations, government agencies, and individuals. Because Web sites contain colorful formats, many are entertaining as well as informative. To view material on the World Wide Web, you will need a browser. This is a type of program that allows you to access and view Web sites.

The program that searches for Internet information is called a search engine. You can fi nd information faster and more accurately by search-ing for signifi cant key words or an exact phrase. This will help limit the search results to most relevant Web site links.

7-7The Internet allows a person who works at home to instantly share information with those working in the office.

Ch07.indd 145Ch07.indd 145 5/13/2008 2:24:24 PM5/13/2008 2:24:24 PM

Page 9: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

146 Part 2 Skills for Success

Information OwnershipThe Internet itself is not owned or controlled by any single person,

organization, or country. Anyone can place any type of information on the Internet, whether accurate or not. Consequently, when using online references, you should focus on using reliable sources and check the accuracy of information provided by unfamiliar sources. Currently, there are no government regulations, and little information on the Internet is censored. This may change, however, in the future.

Who owns the information available on the Internet? Any individual who creates an original item and posts it on the Internet owns its copyright, or legal right. This is true whether the item has a copyright notice or not. Writings, art, and music are all protected under copyright law. Therefore, if you write a story and post it on the Internet, someone else cannot make copies of it and sell it. Doing so is considered plagiarism and is against the law. If you post a photo, it is illegal for someone to use it without your permission.

In a like manner, you cannot copy information, art, or music posted on the Internet for personal use or claim it as your own. You cannot copy material and pass it along to others without permission. Most text, music, and movie fi les must be purchased before they are downloaded. It is illegal to copy and distribute most music, software, photographs, and literature. If you want to use any of these items as a reference, you will fi rst need the owner’s permission. The owner will probably insist that you place a credit line next to the material to identify ownership.

Note that the law protects original works. Works based on characters or situations copyrighted fi rst by other parties are not protected and, techni-

cally, cannot be published without permission. An exception to this law is parody, which is considered “fair use” under United States law.

Responsible Use of the InternetIf you use the Internet at home, you

are largely responsible for self-censorship. When you go online at work and school, your employer and your school administration have the right and responsibility to limit the time you can spend and the sites you can search. It is important to follow the Internet usage guide-lines at both work and school. See 7-8.

If your employer gives you access to the Internet, there are responsibilities that go with that privilege. Company executives responsible

for Internet policies may monitor the following:

• Internet sites visited

• type and quantity of data downloaded

• amount of time spent on the Internet

To check the reliability of information obtained from an unfamiliar Internet source, what would you do?

Thinking ItThinking ItThroughThrough

Why do people post music, images, and writings on the Internet if they don’t want them to be accessible to others?

Reflect Reflect FurtherFurther

7-8If you have Internet access at work, remember that your employer may monitor your use.

Ch07.indd 146Ch07.indd 146 5/13/2008 2:24:26 PM5/13/2008 2:24:26 PM

Page 10: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Many employers will state in their employee handbook that “all communications are the property of the employer.” Employees should not expect personal privacy while working for that company. In the overwhelming majority of court cases in which employees claimed an invasion of privacy, the courts have sided with employers.

Internet ThreatsWhen you are online at work, it is important to be aware of issues

that can cause problems to your computer. Viruses are one type of com-puter threat. Viruses are programs created with the intent to harm others’ computers. Viruses can corrupt programs, take up memory, or delete fi les. They can be transmitted from an infected computer to others. This usually happens when fi les are shared through a network, transmitted via a storage device, or opened from an e-mail attachment.

Most businesses will protect their technology with anti-virus soft-ware. However, you must be careful about opening unknown fi les or clicking on suspicious Internet links. Remember that your computer and coworkers’ computers are the property of your employer. Accidentally installing a virus could damage your computer and others.

In the Real WorldBocheta’s Blunder

Bocheta was employed the summer before her senior year in high school at a store that ships packages worldwide. Her job was to greet customers and assist them with packaging and shipping their items. She had been working there for four weeks and was making a very good impression with her work habits.

Once in a while, Bocheta would have downtime between customers. There was a computer with Internet access that the employees used for a variety of job-related chores. The employees were occasionally allowed to use the computer for surfi ng and e-mailing friends.

One morning, after taking care of a dozen customers, Bocheta had some free time. She decided to e-mail her boyfriend and discuss the good times they’d had over the weekend. She had written several paragraphs when a customer came in the door. She stopped

to take care of the customer and quickly returned to the e-mail. As she was writing, another customer came in and looked at the various sizes of shipping boxes hanging on the wall.

Bocheta knew she had to quickly close her e-mail and send it so she could assist the customer. In her haste, Bocheta accidentally addressed the e-mail to a group mailing, which was a list of store managers as well as regional managers. They all received the e-mail she intended to send to her boyfriend.

147

1. How will this mistake affect Bocheta’s work reputation?

2. Was Bocheta wrong in sending such an e-mail?

3. What would you do if you were Bocheta’s boss? (Consider that the e-mail was also sent to the regional managers.)

Questions to Discuss

Have you ever accidentally introduced a virus to a computer? What did you learn from this experience?

Reflect Reflect FurtherFurther

Ch07.indd 147Ch07.indd 147 5/13/2008 2:24:29 PM5/13/2008 2:24:29 PM

Page 11: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

148 Part 2 Skills for Success

Hacking is accessing a computer or network system without being authorized to do so. A hacker breaks through the security on a computer or network to gain access to the data it contains. The purpose may be a prank, such as vandalizing a company’s Web site. It may be something more sinister, such as gaining electronic access to a company’s or individual’s fi nancial information. Usually, a company will have protec-tion to help prevent hacking. This may include a fi rewall, or encryption on their security system. It is also important for employees to keep their passwords or other confi dential technology information private.

Hacking and creating or purposely sending viruses are unethical practices. Participating in either of these Internet threats on the job would most likely result in your dismissal. These acts are also considered crimes that can have legal consequences.

E-MailE-mail is the shortened term for electronic mail, which is a message

delivered to your computer from another. E-mail is now a standard com-munications tool in business, government, and education. Much faster than old-fashioned mail, it can travel to people around the world in seconds.

EtiquetteE-mail is a less formal type of communication. E-mail messages tend

to resemble memos and are usually very brief. Like all other forms of business communication, however, e-mail has a set of basic guidelines for proper and accepted use. Any e-mail you send from work should follow correct grammar, spelling, and punctuation rules. Using e-mail effectively and professionally may be essential to your employment success. See 7-9.

7-9E-mail sent from work should be composed with the same thought and care as the letters and memos you write.

Using E-Mail at Work

• Check grammar, spelling, and punctuation. Your e-mail may be viewed as regular business correspondence, so appearance counts.

• Be positive. A positive tone to your messages will make them more understandable and will also get better responses from the receivers.

• Do not yell. Using all upper-case letters is considered YELLING. Use upper- and lowercase letters, just as you would in business reports or letters.

• Fill the e-mail window accurately. Be sure to completely and accurately fi ll in the information for To, From, and Subject.

• Make the subject line informative. A few carefully chosen words tell receivers what they need to know. Otherwise too much time may be wasted trying to understand the nature and importance of your message.

• Remember that e-mail is not private. Write messages that are appropriate for others in the company to read. Also remember that your e-mail may be considered a legal document.

Ch07.indd 148Ch07.indd 148 5/13/2008 2:24:30 PM5/13/2008 2:24:30 PM

Page 12: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

It is likely that your company will have an e-mail policy that restricts content and defi nes how it should be used in the workplace. E-mail can be an effi cient tool if it is used properly, but avoid substituting e-mails for personal conversations. Composing e-mails takes up more time than talking.

Do not use e-mail to spread gossip or rumors. Avoid opening chain mail or spam. (Spam is unsolicited e-mail that may contain viruses or unsafe links.) Never forward chain mail or spam to others. Never use work e-mail to forward jokes or any other inappropriate messages.

Wireless TechnologyWireless technology is becoming increasingly popular in the work-

place. Wireless technology uses radio waves to transmit over small areas. Tools such as a wireless mouse and keyboard can give workers more fl exibility on the job. Other tools allow for easier communication between coworkers or employees and customers.

What are the differences and similarities between writing a business letter that will be sent via regular mail and an e-mail letter?

Thinking ItThinking ItThroughThrough

In the Real World

149

E-Mail in the WorkplaceJodie was thrilled to have an internship

with a large bank as an offi ce assistant. The job required excellent computer skills, and she took great pride in meeting the bank’s high standards. She was especially happy to be working with a family friend, Mrs. Collins, who managed the bank’s offi ce.

Several times this week, she overhead Mrs. Collins say, “It’s such a pleasure to work with someone who is so capable.” Jodie wanted Mrs. Collins to think she could handle any assignment.

“Please e-mail Mr. Raja in the loans department and tell him his monthly report is ready,” Mrs. Collins told Jodie. Jodie often sent e-mail from home to friends, so she followed that pattern and sent this message:

Your monthly report is ready :-). Please pick it up. *S*

Jodie realized after sending the message that Mr. Raja had no way of knowing who she was or what report she meant, so she quickly sent another message.

BTW your monthly report from Mrs. Collins’ offi ce is ready to pick up :-D.

Jodie expected to see Mr. Raja step off the elevator within minutes. After several hours passed, she began to question if she sent the message to the correct e-mail address. She decided to send a message that would defi nitely get his attention:

FYI YOUR MONTHLY REPORT FROM MRS. COLLINS’ OFFICE HAS BEEN WAITING FOR YOU SINCE NOON :-(.

A few days later, Mrs. Collins asked Jodie to explain what she e-mailed to Mr. Raja. He had called to complain about “the confusing messages and rude behavior of someone named Jodie.”

1. Do you think Jodie sent confusing messages?

2. Was Jodie’s behavior to Mr. Raja rude? 3. How should business e-mail look compared

to e-mail sent to friends from home? 4. In business e-mail, do you recommend

using shorthand and emoticons, such as *S*, :-), BTW, :-D, FYI, :-(, and others? Do you know what they mean?

Questions to Discuss

Ch07.indd 149Ch07.indd 149 5/13/2008 2:24:30 PM5/13/2008 2:24:30 PM

Page 13: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

150 Part 2 Skills for Success

Information can be exchanged among a variety of wireless devices. This technology can allow team members to stay in contact with one another within or outside a work environ-ment. It can also allow workers to monitor other electronic devices. Wireless technology includes mobile phones, headsets, and personal digital assistants.

Personal digital assistants (PDAs) are handheld computers. PDAs have a touch screen and can be used as a calendar, address book, calculator, and clock. PDAs that use wireless technology can be used as mobile phones, for browsing the Internet, or to send and receive text messages. PDAs are available under a variety of brand names. See 7-10.

Laptop computers can also make use of wireless technology to connect to the Internet and access e-mail. Many public places, such as

stores and restaurants, are now hotspots. This means they provide wire-less Internet access to people with compatible devices. Many people fi nd this access convenient, 7-11. However, this service is not necessarily free, so check before using it to see if there is a charge. In addition, this access may not be secure from hackers or viruses. If you use a hotspot, make sure you have up-to-date anti-virus protection on your laptop.

TroubleshootingWhen you work with technology on a daily basis, you are bound to

run into glitches. Sometimes a problem may occur with your computer hardware. At other times, the problem may be with a specifi c software

7-11This man uses a hotspot at a café to access the Internet while stopping for a quick cup of coffee.

7-10Using a PDA helps busy people keep track of important details.

How would your life be different if wireless technology didn’t exist?

Reflect Reflect FurtherFurther

Ch07.indd 150Ch07.indd 150 5/13/2008 2:24:31 PM5/13/2008 2:24:31 PM

Page 14: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 151

program. Troubleshooting includes the basic steps you can take to solve a computer problem.

Before asking for technical support, take a few moments to see if you can solve the problem yourself. If the problem seems to be with hardware, check power and connection cables. Also try rebooting, or turning your computer off and on. This may help clear up some software problems as well. For individual software questions, try searching the help fi les for answers before consulting a supervisor or coworker.

If the problem appears to be more complicated, such as a lack of suffi cient memory to run a program, contact your employer’s technical support. Do not attempt to fi x problems by yourself. Your employer will probably have guidelines about issues such as downloading software upgrades. You will not want to do anything without permission that could result in harming your computer. Remember, the equipment you use on the job is your employer’s property.

The Impact of TechnologyWe have become a technological society. This means most infor-

mation is spread through the use of technology. Technology is

Why should you refrain from trying to fi x complicated computer problems at work even if you think you know what to do?

Thinking ItThinking ItThroughThrough

Extend Your Knowledge

Learn the LingoYou may use the following terms all the time, but do you really know

what they mean?cookies—data sent to your computer from Web sites that track and

record your activity on the sitehypertext—text that links to other information within a document or on

another Web pageIP address—four sets of numbers separated by dots; used to identify

every computer connected to the InternetLISTSERV®—a type of management program that sends messages

to many e-mail addresses on a mailing list; should not be used to describe generic lists

protocol—rules for the ways computers communicate with one anotherURL—uniform resource locator; the specifi c address for a Web page or

document

Ch07.indd 151Ch07.indd 151 5/13/2008 2:24:36 PM5/13/2008 2:24:36 PM

Page 15: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

152 Part 2 Skills for Success

everywhere. It plays a part in most of our actions and activities. The emergence of technology has had a huge impact on businesses and the economy.

Most people in the United States have access to computers. Those who cannot afford a home computer may use computers at school. Most libraries have computers available for limited use. Any student who does not have at least basic computer experience will be at a major disadvan-tage in the job market.

Technology on the JobWithin the past few decades, business and

industry have become entirely dependent on computers and computer software. Without computer capability, companies could not survive in today’s marketplace. Whether an organization produces goods or provides a service, computers are used extensively in successful organizations. See 7-12. Many of the computer applications used in the workplace are also used in schools and homes.

Internet UsesPractically every business now maintains a Web site to promote itself

in the same way it uses TV and magazine advertising. The Web site may advertise and sell company products and/or services. Customers are usually able to place orders directly by accessing the site, thus making the site a sales tool.

Employees also use computers and the Internet in the workplace to conduct online research and gather information they need for their work. The Internet allows employees in many locations to view real-time events. Real-time refers to something that is occurring now.

Many people are able to use the Internet to work out of the offi ce. This is convenient for salespeople or other employees who must spend signifi cant time at other locations. The Internet also allows people to work from their homes, yet stay connected to the offi ce.

GlobalizationOne of the effects of technology in the workplace is globalization.

Globalization means that interrelations among nations of the world are strengthening, with particular effects on the global economy. This is partially due to increased communication in the business world. Information can travel from one side of the globe to the other in the blink of an eye.

How do you think computer technology will affect your employment?

Reflect Reflect FurtherFurther

7-12Keeping track of ticket payments and passenger seating assignments are common computerized operations at a busy airline.

Ch07.indd 152Ch07.indd 152 5/13/2008 2:24:37 PM5/13/2008 2:24:37 PM

Page 16: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 153

The result is that nations are more likely to engage in trade, as well as share resources. These resources include labor, goods, and services.

Global PositioningThe global positioning system (GPS) is a highly accurate satellite-based

navigation system. It operates in all types of weather, providing continu-ous worldwide coverage. Signals from four or more satellites are used to display the user’s position anywhere in the world. This highly accurate data is collected and saved on memory cards.

GPS is a relatively new communication system that can be applied to many businesses. It is used for surveying, tracking people and objects, operating vehicles and robots, the precision approach and landing of aircraft, and many emergency services.

In the fi eld of agriculture, GPS has numerous applications. It is help-ful in controlling the application of agricultural chemicals and locating insect or weed problems. GPS is also used for fi eld preparation, control-ling planters, watershed mapping, controlling pesticide runoff, and mapping the proximity of agriculture to endangered species. GPS may now be used to direct vehicle drivers and fi shermen to their destinations.

Lifelong LearningComputers in the workplace are here to stay. They greatly increase

productivity and reduce labor costs. When employers add or upgrade technology systems, employees will need to adjust to the new systems and new procedures. See 7-13.

In what ways can computer technology reduce the price of consumer products?

Reflect Reflect FurtherFurther

7-13These firefighters use laptop computers to see maps showing the fastest routes to an address and the location of nearby hydrants.

Photo courtesy of Herald-Citizen, Dayna Bagby

Ch07.indd 153Ch07.indd 153 5/13/2008 2:24:39 PM5/13/2008 2:24:39 PM

Page 17: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

154 Part 2 Skills for Success

The adjustments may be diffi cult and may require new ways of working. More than ever, employers will expect workers to be fl exible and adjust to changes in the workplace. This process, called lifelong learning, will be ongoing over a worker’s entire career.

Employees may need to take classes to become acquainted with, and proficient at, using new technologies. Workers may also consider joining groups that would help them learn new skills. A worker who is open to keeping up with developing technologies will be highly valued in the workplace. On the other hand, workers who cannot adjust may find themselves left behind to handle the jobs requiring fewer skills.

Technology at SchoolThe vast majority of jobs involve a com-

puter, but are not focused on them. Most jobs, however, will require you to use a computer in some manner. School systems across the nation are responding to employer demands to teach students to become computer literate. This means knowing how to operate a computer and the basic software programs. Many states teach computer skills as a prerequisite for graduation. Students who gain these important skills will have a defi nite advantage when interviewing for most jobs.

Try to take advantage of every opportunity you have to gain experience in using comput-ers while you are still in school, 7-14. Take a keyboarding class. Become familiar with word processing and other software programs by taking classes in these subjects.

Expect to get advanced computer instruction at the postsecondary level. Technical schools, community colleges, and universities offer many courses in computer technology. Most schools offer evening classes so you can work full time

and still continue your education. If your place of employment uses computers, volunteer to learn how to operate them. School and workplace computers are sometimes different, so take advantage of any learning opportunities where you work.

E-Learning and Distance LearningE-learning, or electronic learning, is teaching through the use of

com puters or related technology. E-learning can take the form of virtual

What can you do to gain computer experience?

Reflect Reflect FurtherFurther

7-14Taking advantage of all the computer experiences offered in school will help you develop your computer skills.

Ch07.indd 154Ch07.indd 154 5/13/2008 2:24:42 PM5/13/2008 2:24:42 PM

Page 18: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 155

classrooms, online testing, and Web-based training. Blended learning occurs when these methods are used to supplement traditional class-room teaching methods.

E-learning can also be used as distance learning. Distance learn-ing is used to teach students who are not physically present in the same building as the teacher. In the past, distance learning was accomplished through correspondence courses. Now, students can take advantage of class Web sites, e-mail, and instant messaging to complete online courses. It is even possible to earn degrees through E-learning.

Specialized EducationThe type of technology you use on the job will depend on where

you work and what you do. Based on your career objective, you may take specialized courses that acquaint you with specifi c types of technology and applications. Computer technology has created many new career opportunities. If you enjoy working frequently with computers, you might consider a career described in 7-15.

7-15Careers in the computer field offer an ever-growing list of opportunities.

Computer Careers

• Computer operators—set the computer’s controls, load the software, and monitor operations and/or output devices

• Computer programmers or software developers—write the instructions for computer applications software

• Data entry keyers—use keyboards to enter data into computer systems

• Service technicians—repair computers, printers, and related hardware when they break down

• Support specialists—train users of new computer programs and networks; provide technical assistance to users

• Systems analysts—resolve computer user and computer program problems; analyze existing systems to make improvements

• Systems engineers—manage mainframes; develop and manage computer networks; plan ways to computerize business tasks

• Tool programmers—write coded instructions that operate machine tools (such as drill presses, lathes, and milling machines) used in manufacturing precision-machined metal parts

• Web programmers, Web managers, or Webmasters—create, maintain, and update organizations’ Web sites

What role will computer technology have in your continuing education?

Thinking ItThinking ItThroughThrough

Ch07.indd 155Ch07.indd 155 5/13/2008 2:24:45 PM5/13/2008 2:24:45 PM

Page 19: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

156 Part 2 Skills for Success

A programmer is a person who writes computer programs. Sometimes no application program software is available to perform a specifi c task that needs to be done. In such a case, a new program needs to be written. Programmers usually know several different computer languages that are used to write the new programs.

Demand is high for talented people who can design multimedia. Multimedia is the use of two or more communication methods, such as audio, video, images, and text. Web pages and instructive CDs are considered multimedia. As the shift toward greater use of technology continues, more multimedia designers will be needed.

Computer-aided drafting and computer-aided design (CAD) are two tasks that use computer graphics. CAD is the use of computers and graphics software to assist a drafter or designer in preparing a drawing. These tools increase productivity and accuracy. CAD is also used in archi-tectural drawings of buildings, including fl oor plans, electrical plans, elevations, and sectional views, 7-16.

7-16This screen of a CADD system shows how an architect might use the program to create housing designs.

Are there certain skilled occupations where a computer is unlikely to be used?

Thinking ItThinking ItThroughThrough

Ch07.indd 156Ch07.indd 156 5/13/2008 2:24:46 PM5/13/2008 2:24:46 PM

Page 20: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 157

Technology in the HomeIn the home, almost every room has some type of appliances.

Computers are used in audio systems, entertainment systems, major and portable appliances, heating and cooling equipment, and auto-mobiles. While an in-depth understanding of how these computers operate is not essential, it is important to understand their signifi cance to daily life.

Using computers to communicate can help family members stay con-nected. Through e-mail, family members may stay in touch with others in distant locations. With some Internet providers, chat services are free and, therefore, a considerable savings compared to phone calls.

Entertainment is another product of the computer age. Software manufacturers provide a wide variety of entertainment options. You can fi nd computer programs that simulate real-life experiences. You can play thousands of different games. Movies can be viewed on computers equipped with the appropriate software.

Many people use software and the Internet to balance checkbooks and make banking trans-actions such as paying bills and transferring funds. Common software programs also help families maintain household inventories, write wills, and keep records of monthly expenses. See 7-17.

Computers in the FutureFrom one year to the next, advances in computer technology are

impossible to predict. Computers become more powerful, and at the same time, more affordable. They play a major role in entertainment, informa-tion, communication, and research functions.

It is very important to accept the changes and the challenges they present. It is equally important to continue learning about computers after high school so your skills meet the computer literacy level expected by employers. It does not matter what career area you choose. Knowing how to use a computer will certainly improve your chances of fi nding a good job.

Consider this statement: Computers are taking jobs away from people.

Reflect Reflect FurtherFurther

7-17Money management programs simplify the task of household budgeting.

Ch07.indd 157Ch07.indd 157 5/13/2008 2:24:50 PM5/13/2008 2:24:50 PM

Page 21: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

158 Part 2 Skills for Success

Workers today are expected to be able to use personal computers. A computer’s power depends on the speed of its processor and the amount of memory it has. Secondary storage devices are necessary to back up and transfer data. Many different kinds of peripherals are available to enter and receive data. Software programs give computers directions for specifi c tasks. Uses of the computer in the workplace include word processing, spreadsheet creation, and desktop publishing.

When using the Internet and e-mail in the workplace, be sure to follow your employer’s guidelines. These tools can be effective if used properly. However, be aware of threats to your employer’s property due to misuse.

Computers are commonly used in schools and homes. They have brought about numerous changes in the workplace. Many new jobs have been created that involve the use of computers. Some require specialized training in a specifi c computer application, but most will need workers who are computer literate and willing to adapt to changes. It will be to your advantage to learn all you can about using computers in order to com-pete for the best jobs.

Summary 1. How are processor speeds measured?

2. List three secondary storage devices.

3. List four examples of peripherals.

4. Which device is used to automatically input images and text into the computer?

5. To write a term paper free of spelling and punctuation errors on a computer, what type of software is needed?

6. Explain the value of spreadsheets.

7. Who owns the copyright of an image posted on the Internet?

8. What aspects of an employee’s use of the Internet may be monitored in the workplace?

9. How are computer viruses spread?

10. List fi ve guidelines for using e-mail in the workplace.

11. Explain the concept of lifelong learning.

12. What is the difference between blended learning and distance learning?

13. What is multimedia?

14. Give two examples of how computer tech-nology is used in the home.

Facts in Review

Ch07.indd 158Ch07.indd 158 5/13/2008 2:24:52 PM5/13/2008 2:24:52 PM

Page 22: Technology and You - Alamance-Burlington School System · Reading Advantage 7 Technology and You 138 Chapter Objectives After studying this chapter, you will be able to As you read

Chapter 7 Technology and You 159

1. Social Studies. Research privacy laws. Then break into groups and debate if com-puter communications should be included in these laws.

2. Science. Research the technology that makes computer processors work. How has this technology changed over time? How have these changes affected the size, cost, and availability of computers?

Developing YourAcademic Skills

1. Research a job of your choice to discover what computer skills you would need for that job. List the necessary skills in a report. Indicate which skills you already possess. Describe where and how you might acquire skills they do not possess.

2. Using the Internet, research E-learning courses available. What schools offer them? What is the cost? What technology is used to conduct them? What credit does the student receive for taking the course? Summarize your fi ndings in a written report.

Information Technology Applications

1. Communications. Research and write a report on one of the newest computer appli-cations used in the workplace. What makes this technology cutting edge? How does it differ from earlier technology? What function will this technology fulfi ll in the work world? Present your fi ndings to the class.

2. Employability and Career Development. Ask the employed members of your family how computers are used where they work. Ask if they had to learn how to use differ-ent devices and programs, and how they accomplished this. How long did it take? Make a list of the responses and report them to your class.

3. Ethics and Legal Responsibilities. Research cases where individuals or companies took legal action against people writing “fanfi ction.” What laws govern this popular area of writing? How are these cases usually settled?

Applying Your Knowledge and Skills

Working with two classmates, determine all the ways you can access the Internet and the costs associated with each. Then determine which plan your group prefers, and present your choice to the class. Determine among yourselves how to divide the tasks.

Developing Workplace Skills

Ch07.indd 159Ch07.indd 159 5/13/2008 2:24:54 PM5/13/2008 2:24:54 PM