How Things Work: The Computer Science Edition
- Length: 272 pages
- Edition: 1
- Language: English
- Publisher: Chapman and Hall/CRC
- Publication Date: 2021-08-26
- ISBN-10: 0367568373
- ISBN-13: 9780367568375
- Sales Rank: #0 (See Top 100 Books)
It’s axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands.
How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask.
By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
Cover Half Title Series Page Title Page Copyright Page Dedication Contents Acknowledgments Author CHAPTER 1: Computers Are Everywhere INTRODUCTION MODERN TECHNOLOGY OBJECTIVES OF THIS BOOK ORGANIZATION FORMATTING CONVENTIONS CHAPTER 2: A Brief History of Computing OVERVIEW MAJOR ADVANCES IN COMPUTING Abacus—2700–2300 BCE Babbage’s Analytical Engine—1834–1871 The Advent of Software—1840s Turing Machines—1930s ABC: First Electrical Computer—1930s–1940s ENIAC: First Digital Computer—1940s The Advent of the Transistor—1940s–1950s The First Commercial Computer—1951 The First Home Computers—1977 SUMMARY CHAPTER 3: Digitization OVERVIEW WHAT IS DIGITIZATION? Keyboard Characters Digitized Images Digitized Music and Sound Other Examples of Digitization Data Loss ADVANCED TOPIC: OKAY, SO WHAT’S A “BIT”? SUMMARY CHAPTER 4: What Is a Computer? OVERVIEW CONCEPTUAL DESIGN Hardware Motherboard Components Peripheral Components Software System Software Application Software Networking ADVANCED TOPIC: LAYERING SUMMARY CHAPTER 5: Internal Hardware Components INTRODUCTION THE CPU The Control Unit Registers The Arithmetic/Logic Unit Arithmetic Operations Logic Operations Data Transfer Operations Other Operations Assembler Mnemonics and Opcodes MEMORY THE BUS Internal Bus External Bus DATA STORAGE Hard Drives Optical Drives Flash Drives Solid-state Drives Cloud Drives INSTRUCTION EXECUTION ADVANCED TOPIC: ARITHMETIC SHIFT INSTRUCTIONS SUMMARY CHAPTER 6: Hardware-External Components INTRODUCTION INPUT-ONLY DEVICES Keyboard Mouse Image Input Audio Input Barcode and Quick Response Readers Optical Character Recognition Speech Recognition Biometric Devices OUTPUT-ONLY DEVICES Screens, Monitors, and Projectors Casting Augmented Reality and Virtual Reality Printers 3D Printers Audio and Video Streaming Speech Synthesis INPUT AND OUTPUT DEVICES Touchscreens Smart Speakers MIDI Devices ADVANCED TOPIC: COMPUTER VISION SUMMARY CHAPTER 7: Networking: The Art of Communication INTRODUCTION NETWORK ATTRIBUTES Network Scale PANs LANs CANs MANs WANs Network Objectives SANs EPNs VPNs Network Access NETWORK ORGANIZATION AND INTERNETWORKING Intranet Extranets The Internet Darknets NETWORK TOPOLOGY Bus Network Star Network Ring Topology Mesh Network Hybrid Networks NETWORK COMPONENTS Network Interface Controllers Routers Hubs Switches Bridges Modems Firewalls NETWORK TECHNOLOGIES Physical Transmission Media CAT 5 Cable Coaxial Cable Fiber-Optic Cable Ethernet Wireless Networks Wi-Fi Bluetooth HOW DO NETWORKS WORK? The OSI Model The DARPA Network Model The TCP/IP Stack Data Link Layer The IP Layer The TCP Layer Application Layer THE INTERNET What’s DNS? What’s a URL? NETWORKING EXAMPLE ADVANCED TOPIC: IoT SUMMARY CHAPTER 8: Software: The Elusive Enigma INTRODUCTION WHAT IS SOFTWARE? SOFTWARE LAYERS Firmware and BIOS Operating System and Utilities Application Software ADVANCED TOPIC: MICROCODE SUMMARY CHAPTER 9: Software: Operating Systems INTRODUCTION WHAT DOES AN OPERATING SYSTEM DO? Process Lifecycle Management Invocation Execution Scheduling Context Switching Process Suspension Kernel Mode vs. User Mode Process Termination The Idle Process Resource and Hardware Management Operating System Architecture Application Interface The Kernel Device Drivers Software Resources Memory Management File System Management The Abstraction The Implementation User Interfaces User Security Process Security Data Security System Initialization (Booting) Security User Security Process Security Data Security Common Services and Utilities File Explorers Disk Administration Backup and Restore Clipboard Network Administration EXAMPLE: DISK READ SCENARIO ADVANCED TOPIC: TYPES OF OPERATING SYSTEMS Single-Tasking vs. Multitasking Single-User vs. Multi-User Real-Time Operating Systems SUMMARY CHAPTER 10: Software Architecture and Design INTRODUCTION WHAT IS A COMPUTER APPLICATION? WHERE ARE APPLICATIONS USED? Business Music Education Health Care Military THE DESIGN OF SOFTWARE APPLICATIONS SOFTWARE ARCHITECTURE MVC The View The Controller The Model MVC in Practice MVC: Single Program MVC: Distributed Components MVC: Advantages and Disadvantages ADVANCED TOPIC: SERVICE-ORIENTED ARCHITECTURE SUMMARY CHAPTER 11: Software: How It’s Built INTRODUCTION WHAT IS COMPUTER PROGRAMMING? WHAT IS A PROGRAMMING LANGUAGE? A Brief History of Programming Languages Classes of Computer Languages Machine Languages Assembly Languages Imperative vs. Declarative Structured Programming Languages Object-Oriented Programming Languages Miscellaneous Language Categories HOW DO PROGRAMS EXECUTE? Compilation Interpretation Comparison of Execution Techniques THE SOFTWARE DEVELOPMENT LIFECYCLE Requirements Specification Analysis Phase Design Phase System Architecture State Diagrams Transition Tables Data Architecture Diagrams View Adoption Buy vs. Build Program and Component Design System Development Phase A Day in the Life of a Programmer System Integration Phase Functional Testing Phase Debugging Performance Testing Phase Acceptance Testing and Deployment Maintenance Cycles ADVANCED TOPIC: DEVELOPMENT METHODOLOGIES Waterfall Model Prototyping Agile Methodology Software Development Challenges SUMMARY CHAPTER 12: Putting It All Together INTRODUCTION General Comments Roman Numerals: A Quick Overview PART 1—CONVERTING ROMAN NUMERALS TO INTEGER Requirements Design Code Program Listing Java Methods THe main() Method The convertRomanCharToIntegerValue() Method The convertRomanStringToInt() Method Compile and Execute PART 2—INTEGER TO ROMAN Requirements Analysis Design Code Program Listing The main() Method The convertIntegerToRomanNumeral() Method Compile and Execute ADVANCED TOPIC: COMBINED PROGRAM Modified Design Program Listing Compile and Execute Additional Program Improvements SUMMARY CHAPTER 13: Security and Privacy WHAT DO PEOPLE KNOW ABOUT YOU? WHY SHOULD YOU CARE? General Concerns Monetization of Data Data Breaches Identity Theft Malware HOW DO ORGANIZATIONS ACQUIRE DATA? Free Services Tracking Your Surfing Device Fingerprinting Social Media HOW CAN YOU PROTECT YOURSELF? Think Before You Share Protect Passwords Log Off Browsers and Search Engines Wi-Fi Networks Update Software Anti-Malware Software Use a VPN Verify Invoices and Bills Clean Up Remain Wary ADVANCED TOPIC: THE DARK SIDE SUMMARY GLOSSARY OF TERMS READING LIST INDEX
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.