Monday, September 30, 2019

Cause and Effect of Cheating in School Essay

Every action has a consequence, whether it is good or bad. The choices you make can follow you the rest of your life. Cheating is an issue that affects many students at one time or another throughout their education. There are many different ways to cheat: copying homework, looking over at a peers test, plagiarizing, and so on. Nothing good comes from cheating your way through school, the only person you are cheating is yourself. There are serious consequences for cheating. Every teacher has different ways of punishing their students. Some teachers are hard on their students and give them the maximum punishment they can give them. However, as i’ve witnessed teachers are surprisingly lenient on their students. Many just give them a warning or make them retake the test. The problem with teachers doing this is that the students never really learn their lesson. It enables them to cheat more, if they know they won’t have serious consequences for their actions, they will be more willing to try to test their luck. Cheating is most likely to occur in students who lack effort in their studies. Students who do not attend class or do not study are not likely to get passed on their own. Therefore, they find cheating to be a good and easy way for them to pass. Nothing can be gained by cheating. Of course, a better grade may be given, but they are not learning anything by stealing somebody’s hard work. The cheater may be passing the class with a great grade, but where will the cheater be when the finals come around and they no longer have a way to cheat. Cheating can result in a tragic cycle. Once you start it is hard to stop. A person may believe that they are benefiting themselves by cheating to receive a better grade. They put off studying and never really learn the material. At the same time they are doing well in the class. Many people may not see what the problem would be, less work and good grades. What’s to complain about! However, this cannot continue forever. It will catch up to you and you will regret it. When it comes time for you to know the material, you will have to learn from the beginning or receive an unsatisfactory grade. Even if you manage to get a good grade, it cannot make you feel good knowing you did not earn it. There is going to come a time in your life when you are going to need to put what you learned in school to use in real life. If you did not do the work, you will not be able to do this. In college they are to prepare you for your career. If you plan on cheating your way through college you may want to rethink your game plan. Imagine a surgeon cheating his way through school and not really learning what was necessary to perform his job. Would you feel comfortable having this doctor operate on you? There are more things at stake than good grades. You have to think of your future and the person you want to be. Nothing in life comes easy, if you want to make it you are going to have to work at it. There is no reason you should be rewarded for cheating your way through school. It is always better in the long haul to be honest and do your own work. Once you make doing your own work a habit it will become easier. It will also build your self-esteem. Having that pride when you graduate will be one of the best feelings in your life. You can think to yourself that you did this, it wasn’t because of anyone else, it was all you. All those late nights of studying and group study sessions have paid off. You know that you are able to set a goal for yourself and find the strength within you to accomplish this goal. If you are able to do this, you are capable of so much more. Your future will be bright. When looking for a job when you are older, employers look for certain qualities. They look for a good work ethic, someone with good leadership qualities and, someone who isn’t lazy but who is willing to do what is needed to be done to finish the job. You will have more confidence going into an interview if you are well qualified for the job. Nothing good comes from cheating. It may trick you in the short hall but you need to have the strength to do the right thing. You need to be more concerned with your future, and less concerned with cheating your way through a class just so you have more free time. Today’s generation will never succeed if they do not learn to take responsibility. We are truly blessed to be given a proper education, many countries are not as fortunate as us. In a way Americans have become spoiled and have taken their education for granted. They do not view it as being important. We need to look at other nations, and realize what they would give up just to be able to learn like we do. We need to get back to a place where we are thirsting for knowledge and not just doing the bare minimum to get by. Over all, the consequences of cheating vary greatly, from being dealt with on a serious level or to just have to live with knowing deep down inside that what you have done is wrong. Some say cheating is not wrong unless the person gets caught, but cheating is no different than stealing, and stealing is wrong no matter what. I think everyone would admit that. As an individual you must take pride in yourself and do your own work. It is your life and you should want to be the best you can be. Cheating in the short run will only hurt you in the future.

Sunday, September 29, 2019

Rumor Paper

Finally, and most important of all, moors consist of information that is not validated, as actual news is (Diffusion 376). Rumors frequently begin with a hint of truth, but facts are not checked, sources are unreliable, and the truth gets lost as the rumor is spread. In this age of pop media, including television, radio, and internet, rumors spread at lightning speed and results are immediate. In 1969, a young writer named Fred Labor printed a rumor about Paul Ancestry's death. He became a bit famous because of the rumor and was asked to appear on a television show.His nerves got the best of him and he admitted to the television host that the Tory was completely fabricated. The host, F. Lee Bailey, replied, ‘†Well, we have an hour of television to do. You are going to have to go along with this† (Glenn 367). Pop media does not care if a rumor is valid, as long as it tells a good story and creates publicity. Gregory Rodriguez states in his article, â€Å"Truth is in the Ear of the Beholder' that â€Å"rumors and conspiracy theories can only thrive in the minds of people who are predisposed to believe them† (347).People tend to believe things that agree with a viewpoint, meet wants and needs, and follow particular beliefs and biases. Every rumor has a target audience and pop media has a way to reach each and every one of them. Robert Knapp says, in his article â€Å"A Psychology of Rumor,† there are three kinds of rumors. The â€Å"Wish Rumor† expresses the hopes of those who circulate it. The â€Å"Bogie Rumor† plays into a group's fears and anxieties. The â€Å"Wedge-driving Aggression Rumor† is motivated by hate and aggression and is usually successful at dividing a group.Knapp also lists characteristics of a good rumor, (1 ) most good rumors are short and simple, (2) in time a successful rumor becomes a good story, (3) the farther a rumor is removed room fact, the more twisted it becomes, (4) names, number s, and places cause instability in a rumor, (5) no matter where a rumor comes from, the rumor gains prestige when it is attributed to someone in authority, (6) rumors become an agreement to the culture of the groups circulating them, and (7) rumors must keep adapting themselves to current opinion and interest.Pop media can play a big role in helping to provide authority and prestige to a rumor, as well as keeping them in the public interest. The media, however, is less apt to cause distortion in a rumor than when it is passed from person to arson because more people hear the rumor in its original context at a given time. Sandra Salmons advises how extreme the results of a rumor can be in her article, â€Å"Fighting That Old Devil Rumor. † Proctor and Gamble, a very old and reputable company, was besieged by a rumor that their moon and stars logo was a mark of the devil and that the company condoned devil worship.The rumor received a great deal of publicity in papers and on te levision and became a major problem for Proctor and Gambler's consumer services department. The company set forth a massive public relations campaign, sing great financial resource, in order to dispel the rumor. Finally, after years of dealing with the rumor, Proctor and Gamble took legal recourse against those they had enough evidence against to take to court. To this day, the company still receives a few calls about the rumor.In this case though, the media was partially responsible for spreading the rumor, the company also sought media help in trying to dispel the rumor. Proctor and Gamble learned a difficult lesson that Gregory Rodriguez had mentioned in his article. Once a rumor has been established, it cannot always be destroyed by providing the Ruth. Another rumor that gained a great deal of notoriety in 1969 was the tale that Paul McCarty Was dead. McCarty Was a beloved icon of the time and a member of the legendary rock group the Beetles. Alan Glenn discusses the phenomena o f this rumor in his article, ‘†Paul is Dead! (said Fred). † He tells us that on October 12, 1969, a well-known Detroit disc jockey, named Russ Gibbs, got a phone call from a listener wanting to discuss the story that Paul McCarty had actually died three years earlier and had been replaced by a double. Supposedly, the Beetles had covered up Encasements death but revived clues on their albums. Thousands of listeners heard the discussion and one listener took the rumor to another level. Fred Labor, a writer for the Michigan Daily, printed an article with the news of Ancestry's death and clues that were evidence of the rumor.A second copy of the paper needed to be printed because so many people were drawn into the rumor that La Four is still credited with sending it out of control. He admitted, and still admits to this day, that he made up most of the clues. They were nothing more than fabrications spread, once again, by pop media of that time. This rumor was spread, l argely by the power of suggestion, to a young clue hungry audience who were part of the manic Beetles fantod. The McCarty rumor was discussed on television, in papers and magazines, and promoted on alternative radio.Like most rumors, this was short lived due to a complete debunking, however, it is still mentioned occasionally today. Another kind of rumor that is often spread by popular media is the political smear rumor. This kind of rumor generally falls into Nape's aforementioned â€Å"Wedge-driving Aggression Rumor. † According to Samuel G. Freedman, from his article, â€Å"In Untruths About Obama, Echoes of a Distant Time,† a political smear rumor is a crude attempt at fear mongering and character assassination† (369).This type of rumor has been used many times to misrepresent political candidates, especially during presidential elections. Anti-Catholic bigotry rumors were spread against Alfred E. Smith in 1 928, by mailing misleading pictures to thousands of influential people. Catholics were unable to win a presidential nomination, by any major party, until John F. Kennedy received the Democratic nomination in 1960. This political rumor achieved a great deal of success. More recently, there have been many hate rumors spread during both presidential campaigns of our current President, Barack Obama.The rumors have developed into hate campaigns that, to this day, attempt to portray the President as disloyal to his country and not a true American. Internet blobs, mass e-mails, Insight magazine, and Fox News have represented the President as Muslim and reputed his claim that he is a Christian. The media has also questioned Beam's citizenship by insisting that his birth certificate is not real and that he was not born to a U. S. Citizen. Though each of these claims have been contradicted by fact many times, the opposing campaigns remained diligent in using Town Hall Meetings and other media events to promote these rumors.It is not surprisin g that the first African American president would face the same kind of prejudice as those of the Catholic faith did years ago. It is surprising, however, how easy it is for unverified information to become accepted journalism fact with the help of pop media. Jeremy W. Peters discusses the dangers of an instantaneous news culture and the role popular media plays in the spreading of hearsay to an incredibly huge audience in his article, â€Å"A Lie Races Across Twitter Before the Truth Can Boot Up.He states that it only took two minutes for a young flogger, trying to make a name for himself, to release an unfounded rumor on Twitter that immediately became mainstream news. According to Peters, the flogger, Logan Smith, posted a report on Twitter stating that South Carolina Governor, Nikkei R. Haley, was facing indictment on tax fraud charges. There were reasons to doubt the charges and the flogger later admitted that he was not sure that his sources were correct. Neither did the flog ger bother to give the governors office a chance to comment. Instead, he posted the blob on Twitter as if it were fact.Smith later admitted, â€Å"l reported that credible sources said they believed the governor would be indicted – not that knew she would be indicted, or even whether or not I personally believed she would be indicted† (Peters 372). The post was immediately picked up by respected and widely read news sources. Ms. Halley office released a letter from the Internal Revenue Service proving the rumor to be false. The governor, however, felt her reputation had already been damaged. She also believed that this would not be the last time that unfounded rumors would be posted about her on line.It did not matter that the information was untrue ND unsubstantiated. In the media world of Twitter and Backbone, there is no need for validation because what the posters are seeking is notoriety. The rumor gains credibility when reputable news outlets mistakenly report it as fact. The rumor remains current because these internet media sites provide the opportunity to keep talking about it. It is ironic that social media, the fastest way to spread a rumor, established a means of debunking popular rumors, as well.In 1 995, Barbara and David Michelson, professional researchers and writers, established Snoops. Com, a website that has become one of the internet most valuable resources. Snoops. Com advertises as â€Å"the definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation. † One of the earliest rumors tackled by Snoops. Com was the story that Kentucky Fried Chicken had changed its name to KEF because they were no longer using real chicken, but instead had developed a genetically engineered bird that replaced the chicken.Supposedly this bird had no beak, no feathers, no feet, and fewer bones so that there is more meat. This rumor is declared to be one of the first to spread worldwide by e-mail. Snoops . Com, as well as Cuff's website, refuted his rumor using fact and finally, the rumor seemed to die down. Recently, however, the use of artificial hormones in animals and the growth of transgenic food crops has caused a resurgence of the rumor. Once again, as the rumor spreads through social media, Snoops. Com tries to dispel people's fears regarding the use of frankincense's by KEF by explaining the truth.Each of these articles discussing rumors is a reminder to be wary of what is heard and read in all types of pop media. They are reminders that much of the information reported on Twitter and Backbone is buzz-seeking unsubstantiated, and full of impropriety. They caution that because it is presented as breaking news in a magazine does not mean it is reputable journalism. These articles also show that one cannot always believe what is seen on television. Rumor can be full of misinformation and exaggeration, yet it is presented, in all forms of popular media, as fact. Pop media is mo re interested in gaining an audience than in providing the truth. People spread rumors everyday about things of interest to them. The newest and fastest way to spread rumors is by the use of popular media including television, radio, and the internet. Some rumors can be meant as a joke and provide entertainment. Others can be more dangerous, playing on fears and promoting hate and aggression. People process information according to their own needs, then accept it as fact or reject it.

Saturday, September 28, 2019

Comparing and contrasting the slave narratives of Frederick Douglass Essay

Comparing and contrasting the slave narratives of Frederick Douglass and Harriet Jacobs - Essay Example Douglas was born into slavery on the shore of Maryland in 1818 and successfully escaped in 1838 after which he settled in Bedford. While there, he got involved with Massachusetts Anti-Slavery society and lectured audiences about slavery. Later, he wrote his book and became an American abolition movement leader. Jacobs was also born into slavery in 1813 in North Carolina. She was taught to read and write by her master who later died and she was left under his relatives. Her new master attempted to sexually abuse her which led her to spend seven years in hiding. She later worked as a domestic servant in New York and eventually settled in Massachusetts in 1862. It is after this that she wrote her slave narrative. Both writers’ lives as slaves had great effects on their writings. Douglas life as a slave enabled him to bring out the necessary emotion and experiences of a slave and hence becoming a victorious abolitionist writer. Having grown up as a slave and experiencing the hards hips of slavery such as lack of meals and whipping, his desire for freedom led him to write successful stories about his miserable life (Douglas 97). In Jacob’s narrative, she condemns slavery by revealing the horrifying mistreatments of the slaves in her time. She advances the view that slavery is a curse both to the whites and the blacks. She says â€Å"I never would consent to give my past life to anyone, for I will do it without giving the whole truth, if I could help save another from fate, it would be selfish and unchristian of me to keep it back†. Slave narratives were then used to show why the abolition of slavery was justified and thus their success lied on how well they presented the abuses in the system. Today, the narratives are used as an instrument to study the slavery institution and to examine the narrator’s capability to define them in the world. This new focus has

Friday, September 27, 2019

The Organization Behavior of PIXAR Research Paper

The Organization Behavior of PIXAR - Research Paper Example Pixar animation studios is built upon a family style structure in which stakeholder interests are a priority and quality is the highest goal over financial concerns. The objective of their enterprise, according to their website is â€Å"to combine proprietary technology and world class creative talent to develop computer animated feature films with memorable characters and heartwarming stories that appeal to audiences of all ages†. In order to pursue this goal, the company has created a strategy-culture in which a strong culture has developed so that the employees are highly loyal. However, the insular corporate culture has created some issues in which communications in the organization are not up to the original standard expected by the mandates. The business is experiencing some of the effects of expansion as lower level employees are fighting to be heard. From its smaller beginnings of merely 44 employees when purchased by Steve Jobs, the company now has 850 employees with 19 executives. With a large work force all operating towards a limited number of projects, the experiences that first brought Lasseter to form his own business can eventually become seen as a threat to the company if the creativity of lower level employees is not allowed to flourish. However, according to Hoover’s, Inc. , the average amount of revenue per employee per year is at $300,000, making the business a capital-intensive industry. Investment and start-up costs make competition difficult, but also mean that competing creative types have a shot at finding financing even in the high-risk, but potentially high return nature of the business. Company History Pixar Studios did not start out on a successful tract. The company started as Pixar, Inc. in 1984, a company that sold computer hardware and turned to selling animation software as well as providing commercial animations for advertisers. John Lasseter and a handful of employees, shortly from the junior animation ranks at the Walt Disney Company, formed this company as a division of the company owned by George Lucas under the special effects branch (Pixar, 2011). The hope of the company was to create a success through animation, creating short length promotional films which were bringing in no financial return. The company ran reporting nothing but losses in the couple of years and was having trouble financing the one project they were determined to create (Price, 2009). The company was purchased by Steve Jobs in 1986 for ten million dollars when the division was formed into an independent company as Pixar, thus beginning the course towards a revolution in the animated film industry. The company was co-founded by Ed Catmull, who was also the vice-president of the special effects division at Lucas, Inc (Pixar, 2011). Through innovative techniques and building a reputation through short films, the company gained enough credibility to engage in their first efforts towards a full length, feature film project. With Lucas, Inc., Steve Jobs, and innovations that had the capacity to rock the animated film industry, the next logical step was to include the Walt Disney Company as a part of one of the most powerful innovative groupings ever developed. The project was Toy Story, a fully computer generated animation film that the Disney Studios came on board to finance in 1991. There was a murmur of disapproval in Hollywood, the belief that a fully computerized

Thursday, September 26, 2019

Article review Example | Topics and Well Written Essays - 500 words - 1

Review - Article Example ) â€Å"The goals of SOX were to enhance the transparency of financial information, reaffirm auditor independence, and define corporate governance – the responsibilities of corporate boards and audit committees†. The author has pointed out the advantages of Sarbanes act on the economy and young generation, as many of them are indulging in educating themselves on the aspects of this new law. However, one fact that distracts the reader is that, paragraphs are divided in to real small units. Moreover it can be realized that, the third paragraph is slightly complicated, which can turn the readers perplexed and confused. Many a times, readers can be of ordinary category and they can find theses sentences overwhelming or distracting. On the other hand, the best part is that, the third paragraph gives out statistical fact and figure by mentioning historical evidence on the financial security acts. In the third paragraph, there is also statement about the merits of the Sarbanes Act on the financial and investment sector Further, more proceeding into the later paragraph, it can be understood that the writer is projecting on the quality of PCAOB (Public Companies Accounting Oversight Board) in giving organizations an opportunity in securing their investment and financial transaction processes. It is stated in the article that, PCAOB will establish quality control in auditing, maintain ethical independence and standards in a registered public accounting firms. Moreover, the authenticating nature of PCAOB is revealed in the article, where in it shows how the accounting firms, media and press consider the above listed act. Another highlight of the PCAOB is detailed as its ability to give employment opportunity to people in information technology field. According to (Rosavich)â€Å" Documenting internal control involved a thorough review of systems and also meant additional employment opportunities for information technology professionals†. The writer had presented the

Wednesday, September 25, 2019

Portfolio Essay Example | Topics and Well Written Essays - 1250 words

Portfolio - Essay Example The graduate employers find it hard to fill up the vacancies in spite of receiving innumerable applicants because of the shortage of good quality graduates. It is now utmost important for the applicant to consider what constitute the good quality graduates. However, there has been a shift in the preferences and expectations of the employer when it comes to graduates and the skills that they suppose them to possess. The organisations prefer to have people with firm or industry specific knowledge (Scribd, n.d.). Preferred Job Area After completion of my graduation, I wish to work as a ‘Human Resource Officer’. The respective field has been chosen as I have always been interested in the Human Resource related activities. The task of the human resource officer is to provide advice and implement policies that relates to the effective use of the personnel within the organisation. The main aim of the human resource officer is to ensure that the organisation employs right balanc e of the staffs according to their knowledge and skills. They also need to check if the training and development opportunities are made available to the employees in order to enhance their performances. The human resource officer needs to have a clear understanding of what the objective of the employers business is and they must be able to make and implement the policies that helps to select, develop as well as retain the correct staff which is required to meet these objectives. There has been change in the character of the HR professionals. The nature of the work of the human resource profession varies according to the organisation. However, it is likely to include working in tandem with the departments, liaising with the wide range of people that is involved in the policy areas such as staff performance, their health and safety, negotiating with the staffs and their representatives on matters related to the pay and condition, administering the payroll and the maintenance of the em ployee record (Prospects, 2010). Various organisations offers HR Officers job in the UK. Few of them are United Response, Huntress Search Limited and Candidate Source Limited (Monster, 2010). United Response is a charity that works across England and Wales. It caters support to the people who have various disabilities (United Response, 2010). The recruitment process of the United Response is quite simple. The candidate needs to register online. The candidate will be required to answer few simple questions and then they can either qualify for an interview on the day of recruitment or on some other day (United Response, 2010). Huntress is one of the most creative, active and rapidly growing recruitment groups. It is a multi award wining company having 18 centres in the UK. It is soon going to expand its operation both internationally and domestically (Huntress Commercial, n.d.). The company requires that the candidate should have certain kind of generalist HR experience and must be ab le to deal with various kinds of HR issues (Monster, n.d.). Networx is another famous company based in the UK, Leicestershire. The company work together with the clients and the candidates and tries to deliver a qualitative professional service that not only focus upon the time and the cost efficiency, but also put stress upon the

Tuesday, September 24, 2019

Analyse and evaluate the impact of volunteer tourism on host Essay

Analyse and evaluate the impact of volunteer tourism on host communities - Essay Example Volunteer tourism is thus aimed at serving for the welfare of the community and at the same time facing the challenges in touring new places of diverse language and culture. Generally mass tourism is viewed as an activity of excursion or entertainment trip that is aimed at refreshment for the people undertaking the tour. The visit to new places is aimed at getting to know the language, culture and heritage of the places. The activities of mass tourism involve leisure with food and lodging, luxurious transport, etc. These activities impact the host community as it leads to environmental pollution and degradation and accumulation of garbage and waste. With the rise in globalization and increase in activities of the tourism industry, the issues of environmental degradation and conservation of wildlife and awareness of pollution have become sensitive issues all over the world. Volunteer tourism is an activity undertaken the volunteer tourists in undertaking tours to different places with an objective to serve for the welfare of the tourist spots (Benson, 2010, p.39). Discussion The activities of volunteer tourism has shifted the objective of tourism from the welfare of tourist industry to the welfare of host community or the places which host the tourist for a being popular destinations. The members of the community view the activities of volunteer tourism as restoration of nature and environmental balance of the host community. As a result of this, the members of the host community engage themselves directly in activities undertaken as a part of volunteer tourism. The members of the host community act in collaboration of the volunteers tourists and extend full co-operation and support to the volunteers in order to accomplish the goals of volunteer tourism. As a result of the volunteer tourism, the tourists are also exposed to the culture, language and social heritage of the area and thus there is a healthy exchange of culture between the local people and the volun teer tourists. The overall purpose of volunteer tourism being aimed at welfare of the host community, the local area is positively impacted by the honest efforts of the volunteer tourists. The volunteer tourists also have the objective of providing assistance to the community development projects that have been planned for execution. In order to be fully effective, the community development projects should be supported with necessary funds along with the knowledge and skill for efficient execution (Bricker,  Black and  Cottrell, 2012, p.49). The community development programmes may be aimed at development of children and women in the region, provision of food and nourishment for the under privileged, conservation of trees and forests, environmental balance, etc. The volunteer tourists play a vital role in collecting the necessary funding and also share the knowledge and skill required for execution of the community development projects. The volunteer tourism activities provide a means for the host community to increase their income levels and also accumulation of wealth. The volunteer tourist activities put up in the target destination for a period of time. Thus the basic and essential needs of the volunteer tourists need to be fulfilled by the economy of the host country. The supply from the host community is purchased by the volunteer tourists due to which the income levels of the host commu

Monday, September 23, 2019

Learning about plagiarism Essay Example | Topics and Well Written Essays - 250 words

Learning about plagiarism - Essay Example y too soon, not publishing negative results, publishing results too early, skimming over or ignoring drawbacks, and â€Å"buffing† the results by showing them in the best light (Crossen, 1994, p. 167), in his work which is very similar in meaning and words with the original passage. Secondly, the student has also plagiarized another line, â€Å"Biomedical researchers incorporate strict rules of science into their work, which is examined by peers (Crossen, 1994, p. 167)† in his main body paragraph which is similar in wordings, meanings and sentence with the original one. When quoting the similar sentences, it is important to write them within the quotation marks in Italics and also, to enclose them with proper in-text citation as required for avoiding plagiarism. It is important to understand the core message delivered in a sentence in order to reproduce it without plagiarizing the similar words and the sentences. Plagiarism can be recognized by comparing the work with the original one; same sentences, similar words or twisting the sequences of the words can label the work as plagiarized. However, there are number of ways through which a student or a writer can avoid the chances of plagiarism. These simple steps are: Check and compare your work with the original passage. If any similarities are found, try changing your sentence structure. Always use simple sentences instead of complicated ones. This would complicate the message of the writing and the reader will be unable to understand the

Sunday, September 22, 2019

Political Science Assignment Example | Topics and Well Written Essays - 250 words - 4

Political Science - Assignment Example The US foreign policy towards the Middle East was affected such that some of the countries involved in the Arab spring had their relation with the US tightened while others received the freezing of funds offered by the superpower (Ahmari, 2012). For instance, Libya received an arms embargo due to the continued fight by the Libyan air force against the protestants. On the other hand in the case of Egypt, the US praised the leaders for the transition from authoritarian to democratic government. According to Ahmari, the Arab spring brought about positive changes, thus building better relationships between the involved states and their neighbors. Ahmari defines the Arab Liberalism as the required change in the ruling system but is in crisis both culturally and morally. He views it as a threat to the freedom of future in Middle East (Ahmari, 2012). Ahmari feels that the Arab Liberalism is falling since it lacks an ideological plan like that present in Marshall Plan. I agree with Ahmari’s feeling that the Middle East requires a plan to follow in order to restore peace in the region. Lastly, it requires a role model in keeping up with democracy and maintaining peace with Israel as well as the whole of Western states. Arab Spring was meant to liberate citizens in the involved states from the oppressive leadership that dominated in the Middle East

Saturday, September 21, 2019

British Politics and Society Essay Example for Free

British Politics and Society Essay Between 1947-51, there was a considerable degree of economic recovery from the severe crisis of 1945-57. Nationalisation of key industries, and creation of the welfare state Ernest Bevins work as the Foreign Secretary ensured continuation of special relationship with USA and the formation of NATO After losing power in 1951, labour only had two terms until Tony Blairs landslide victory in 1997 History of British politics society between 1951 1997 was framed by Attlees govt and the beginning of Blairs administration. Trends Developments 1951 1973 sustained periods of employment relative popularity the long post-war boom 1973 1979 oil price crisis 1979 1990 Thatcherism, industrial unrest, and privatisation of nationalised concerns. Post-war years= extensive social cultural change, with emergence of a youth culture, the advance of women, vast developments in the mass media the growth of multiculturalism. Politics Govt 1951-64 was marked by dominance of moderate Tory govts under Churchill, Eden Macmillan Between 1964 79, it was a period of mainly Labour govts under Wilson Callaghan, interrupted by Tory govt, under Heath 1970 4. 1979 97 era of Thatcherite conservatism During those years Labour fell into decline due to internal divisions and the formation of SDP 1969 98 problems of security in N.Ireland Foreign Affairs Period marked by slow uneven retreat from empire, with further decolonisation. Continuance of cold war enhanced Britains special relationship with USA , whilst relationship with Europe grew more complex Britain joined EEC 1973 Section 1 Dilwyn Porter that of a post-war consensus that the sense of national unity, which developed during and because of Peoples War was continued and consolidated by Attlees government Legacy of war years Post-war consensus after WW2 Attlee, Churchill Eden worked together in war time coalition PMs until Wilson in 1964 fought in WW1 Tony Blairs background fitted in with Tory mould as well or even better than Heath Right-winged Tories argued that continuation of Attlee legacy was a tragic socialist mistake Left-winged Bevanites argued Atlee legacy not socialist enough Political Tensions labour was subjected to a series of intense internal divisions and personality clashes throughout post war history post war labour didnt move with the post war consensus west Germany 1959, key turning point when SPD reformed and dropped Marxist ideology for modernisation and democracy Thatchers successful rebellion against Heath in 1975 marked the conservative party s shift from the post war consensus Thatchers election success marked the degree of part divisions Politics Tories could hardly be called right winged in the 1950s Both Churchill and Eden made radical movements to alter the relationships between the government and the trade unions Steel industry was denationalised in 1953 No attempt to reverse what the labour government had done between 1945 51 Macmillan government did more to consolidate the post war consensus than to challenge it 1959 Macmillans government continued to follow centrist policies Economic Policy continuation of the post war consensus under the government was referred to as butskellism Butler was a key figure in the conservative party (chancellor of exchequer) and was a serious contender for leadership in 1957 Butler clashed with Bevan over the costs of the NHS 1963 Gaitskell became leader of the labour party Gaitskell had open feuds about with the left wingers in his own party especially over nuclear disarmament a key feature of butskellism was the ideas that Butler and Gaitskell had much more in common with each other than rival wings in their own parties Foreign Policy Foreign policy was a major element of the Attlee legacy and the post war consensus which was summed up as a commitment to maintain both the welfare state and national greatness An issue was the dissatisfaction of the alliance with the USA, and large scale commitments such as the independent nuclear war deterrent and anti soviet policies of the cold war Labour politicians were sensitive about the claims that the socialism was unpredictable and unreliable and they wanted to prove the opposite Bevan had battle with the left wing and communists during the thirties Bevan was a supporter of Churchill and was proud of his successes such as the formation of NATO and wanted to keep their special relationship in good repair Many left wingers werent happy with the policies but were never able to do over turn them Post war consensus was put under strain due to the Suez crisis Macmillan read the lessons of the affair and was quick to mend bridges with the US Macmillans wind of change speech led the way to rapid decolonisation across Africa Macmillan applied to get Britain in the EEC which got declined due to De Gaulle Under the government of Wilson is when Britain was accepted into the EEC The significance of the 1964 The labour campaign made much of the theme of modernisation Public mood of expectancy in 1964 , reflected the sense that 1960s Britain was going through fundamental social and cultural change There was no change in political direction, in 1964 the labour governments under Wilson Callaghan succeed in carrying on with their radical promises Labours policies werent that different from what the conservatives would have done and there was emphasis on the economic modernisation Why were the labour governments between 1964 and 1979 unable to achieve more success? When Harold Wilson came into power in 1964 optimism among the labour supporters was high, Wilson seemed to be a talented leader who had a wide support in the country

Friday, September 20, 2019

Intelligent Transmit Power Control

Intelligent Transmit Power Control The Intelligent Transmit Power Control In Expanding The Limitation Of Range For Bluetooth Communication For Indoor Navigation System Jamilah Binti Mohamed INTRODUCTION As time goes by, the technology is grown up very fast. The technology is created and invented according to the necessities of consumers. In addition, there have many scientist did researched and experiment to find the solutions for our problems in our life. Therefore, some of researcher had found the Bluetooth technology to settle several problems that come into our life. For instants, we need a cable to transfer any information and to have that cable, we need to spend our money to buy it. Thus the creation of Bluetooth can reduce our cost. Bluetooth is the one of the indoor navigator that play its own functions. In 1994, Bluetooth was initiated by the team of researchers at Ericsson Mobile Communications. According to the history of the creation of Bluetooth : â€Å"The name â€Å"Bluetooth† is taken from the 10th century Danish King Harald Blatand-or Harold Bluetooth in English. During the formative stage of the trade association a code name was needed to name the effort. King Blatand was instrumental in uniting warring factions in parts of what are now Norway, Sweden, and Denmark – just as Bluetooth technology is designed to allow collaboration between differing industries such as the computing mobile phone and automotive markets. The code name as stuck.† (Bluetooth SIG 2006) Nowadays, many of the gadgets like handphones, smartphones, printers, fax machines, computers and other device provide Bluetooth technology as one of the facilities and attraction to their customers. That why most of the people in the world know about the technology of Bluetooth. Bluetooth has their own characteristics. Firstly, Bluetooth is short range communication. There have three types of distance that Bluetooth can function which are the longest distance is 100 meters , intermediate distance is 10 meters , and the shortest distance is 10 cm. However, it is very effective at the short distance and in noisy frequency. Bluetooth is different with the Wi-Fi and WLANs technology, Wi-Fi and WLANs had long range communication but need to have networks. Secondly, Bluetooth supply cable-free environment which can replace the portable cable to connect between two devices and can use to build ad hoc network either at the same device or at different device. At that time, Bluetooth is the most suitable technology for consumers to use it even it have several weaknesses. In addition, to use Bluetooth, Third, among the technology system that appeared nowadays, Bluetooth is more cheap than other devices. Usually, a traditional testing technology show that most of the devices are expensive because of the use of cable, use an expensive measurement equipment, put many sensors to the measurement and so on. All of the action above will increase cost of the device. Different with Bluetooth, it is a simple process that only used radio waves and spread-spectrum frequency-hopping technique. The cost for adding Bluetooth in any device is not more than $5 to $10. Most of the people are afford to have it. Besides that, Bluetooth use two types of links for it process. First is Synchronous Connection Oriented (SCO) and second is Asynchronous Connectionless Link (ACL). The process of Bluetooth use the concept of master and slave. For Synchronous Connection Oriented (SCO), the process is between master and a single slave in the piconet which is symmetric point to point. SCO need a symmetric point to voice link point for sending and receiving voice packets from one device to another device at certain time intervals. SCO process is started from a master device. When the master device send any data via SCO link in a slot, the slave will send back to the following slot. There are several type of SCO. â€Å"HV1 carries 10 data bytes and is transmitted every 2 slots, HV2 carries 20 data bytes and is transmitted every 4 slots and HV3 carries 30 data bytes and is transmitted every 6 slots.†( For Asynchronous Connectionless Link (ACL), the system is different with SCO because it need to wait for acknowledgement from the receiver. This style of link is more safe than SCO. If the signal do not receive to the receiver, ACL will send it back until the receiver get it. After that, the recipient will check the packet and clarify the data transmission via cyclic redundancy code (CRC) to make sure the data is correct. ACL is point-to-multipoint link which is between master and slaves in the piconet. In the piconet, ACL can work only in a single link. The process of Bluetooth is started when there have piconet master link with slave devices. â€Å"One piconet can have a maximum of seven active slave devices and one master device. All communication within a piconet goes through the piconet master. Two or more piconets together form a scatternet, which can be used to eliminate Bluetooth range restrictions† (Haataja, 2006). After that, data will transfer between Bluetooth devices and physical channel. Transmission is occur in packets that is subdivided into time units known as slots. THESIS STATEMENT LITERATURE REVIEW Bluetooth is created for short range communication without using any cable or cable free environment. Most of the people nowadays use Bluetooth instead of transfer information via cable. Usually, Bluetooth can use at computers, mobile phones, cars, headphone earphone, camera and printer. It is easy and not expensive. However, there are lot of problem during using Bluetooth. 1. PROBLEM Bluetooth does not have licensed frequency band. The way it works may cause the security of the system easy to attack by other people. It will make harm to the devices. The intruders are easily interrupted the process and know the information transfers during the devices communicate to each other. Thus , Bluetooth need increase the quality of the system to be more safe for consumers to used the communication style. However, the most important problem that occurs in Bluetooth technology is range limitation or range constraint during the process of transferring data. It is possible for data transmission in a short range. There have three classification of distance that Bluetooth can function. First, data transmission at 100 meters , second is 10 meters and the shortest distance is 10 centimeter but the consumers must remember that the shortest distance, the fastest the data transmission process. In addition, the amount of data can affect the effectiveness of Bluetooth during the process of transferring the data. If the data is large or big in size, the rate of the transferring data is become slow. This is because the network is over loaded then the data transmission become slower than usual. Sometimes, somebody need to wait for a few minutes and unluckily, if the devices have problem with it, the process will stop without any notice. That why we need to confirm that the data is safely receive to the recipient device. If not, it is just waste your time for waiting the Bluetooth process to finished. Not only that, Bluetooth always can not reach the device properly even the device is on for Bluetooth, only for certain devices they can pair to each other. Sometimes, they can pair to each other but need an afford to pair them by doing it several times. It will takes time to pair the devices. After that, if the data transmission is large, a lot of time is needed. Therefore, time dilation is occur during using the Bluetooth technology either waiting the devices paring each other or the data safely transmitted to the receiver. Moreover, the battery of the devices will decrease not same as usual. Transmission of data will cause a little bits of battery. As we know, most of the technology devices are created with short durability of battery like smartphone and laptop. The causes of the decreasing of the battery in a short time for certain devices are there have lots of system installed at the devices with high intensity of light and many more factors. Therefore, the uses of Bluetooth will increasing the rate of battery of the devices getting low. Lastly, among the problems above, it is easily to say that the most affected is the range limitation in the Bluetooth. Because of the range limitation, the distance to connect the devices is limited, takes time if the data is quite large, security of the system is vulnerable and difficult to pair among the devices. Thus, a few research was occur to settle the problems. The researchers try to find a single way to expanse range. 2. LIMITATION Connection– Bluetooth can connect after transmitter and receiver getting pair to each other. Otherwise, those device can not connect to each other and the data transmission will not happen. Speed Bluetooth was created for low speed transmission of data. If the amount of  data is larger, the speed become slower. Therefore , we can conclude that transferring data will take time because the speed of Bluetooth process is slow. Range The range of the Bluetooth is limit only for 100 meters (the longest  distance that Bluetooth can function). If the distance between the devices far from that, Bluetooth system will does not work. 3. SIGNIFICANT Actually Bluetooth is important in replacement of wire or cable during communication between two or more than two devices. It is also important in GPS receivers and medical equipment. The development of Bluetooth is become fastest and the product of Bluetooth devices appeared into our life with many variation like Bluetooth home-network, Bluetooth earphone, and Bluetooth head phone. Typical Use of a Bluetooth enabled phone as a data modem for a PC In addition, Bluetooth is popular because it can share the data with different device. For example, data from laptop can be transfer via Bluetooth to the smartphone. Furthermore, Bluetooth can transfer data to the eight devices by using piconet. The application is easy and does not need a large provision. Besides, we can control the data transmission by accepting or rejecting it from any devices that we do not know. Bluetooth can our device more safe from any unneeded data. Indirectly, we can protect our devices from any virus via Bluetooth. Several common misperception about the function of Bluetooth such as Bluetooth and Wi-Fi competing to each other. In fact, Bluetooth and Wi-Fi were created with different function and ability. Bluetooth is created for wire replacement at short distance connection while Wi-Fi is used for getting data, video and voice at 300 meters. Therefore, Bluetooth and Wi-Fi not competing to each other but help to complete and settle the problem of consumers. This is one of the research do by connectBlue 2014. 4. RANGE EXPANSION First of all, we need to identify the power transmitted in the Bluetooth process. There have 3 classess of power range which are 1mW (1 meter), 2.5mW (10 meters) and 100 mW (100 meters). According to the range above, we can see the power restrictions. The highest transmitting power when access at the short distance or small size in data. But if the distance between the Bluetooth devices is far or have large size of data, the lowest transmitting power will access. Due to this problem, there have one way to increase the power during transmit the data or any information via Bluetooth. Therefore we can do a hypothesis that when the distance between two Bluetooth devices is lower, the power control transmit the data will increase. So, it will slow down the interference with other transmitter. As we know apart of problems come from Bluetooth can be settle if the range of connection is large. Therefore, the range is the most important parameter for any Bluetooth devices to increase the power control. So, there have one way to overcome the basic limitation of range in Bluetooth. Establish a network through enabled intermediary device. Due to the broadcast nature of wireless communication and omni-directional antennae among the most electronics devices nowadays, the transmission of data will sent to any hosts that on the Bluetooth. In addition, the host can on or off the wireless connection without notifying other hosts. Therefore , during the connection ,both two devices must know and on the Bluetooth system to transfer and receive the data. If both devices that want to connect each other are out of their transmission range, the other devices that around the sender of data will receive it and can forward to another devices. According to the increasing of mobility of wireless hosts, every host must have their own capability of an autonomous system, or centralized administration. Not only because end-hosts are transient the mobility and autonomy introduces a dynamic topology of the networks but also because intermediate hosts on a communication path are transient. That why both devices must have a network to allow the intermediary device function and Bluetooth process will occur. Moreover , to start the connection of Bluetooth device without any limitation of range, we must provide an ad-hoc network with available to all devices. For easy understanding, we can apply network at our devices spontaneously and available to who ever at that area. Not only that, the network can use for a specific applications and at temporary usage. However, every devices need to upgrade their accessible devices due to theis list. Thus, it is easy to all consumers to transfer data by using Bluetooth if that network can provide for any devices. A process to expand the range of Bluetooth or broke the limitation of range in Bluetooth are not complex and only need intermediate hosts. The process need two type of routing process which are static and dynamic. In static routing process, it is independent and maintained for every node for every requirement. While for dynamic routing process , it is work when it is needed in the process. If the sender and the receiver want to transfer the data, they need to send data and find the route by their own then create the routing table.

Thursday, September 19, 2019

Essay on Symbolism and Double Meaning in Hawthornes Young Goodman Brow

Young Goodman Brown: Symbolism and Double Meaning Young Goodman Brown is definitely a story with several meanings and images. As I was reading this story I was overwhelmed with the visual and technical images that Hawthorne projected. There was so much symbolism and double meanings in the story that I believe everyone in the class was confused at one point or another. Seemingly to the degree that they re-read the story a second time just to try and "fill" themselves with the actual vision of the reading. One question that always seems to plague classes about this story (both eng372 and other classes that I have attended in which YGB was read) is the actual meaning of Goodman Brown’s wife’s name: Faith. The double meaning really sends the reader into a whirlwind of symbolism in which if analyzed enough could probably fill an entire classroom hour. Most of the class seemed to believe that her name suggests a faith in religion or a faith in one’s self and not a name that is given. My interpretation is that "faith’, in relation to the wife’s name, represents YGB’s ...

Wednesday, September 18, 2019

Reality: Influenced by an Individual’s Perception and Interpretation E

Reality: Influenced by an Individual’s Perception and Interpretation When the term reality is mentioned, many questions arise regarding what reality is and what is real originate also. Unfortunately, many of these questions are yet to be answered since determining reality and what is real are left to each individual’s imagination - for one to determine reality as he or she sees fit. A dictionary may provide a definition for the word reality, but things that constitute reality may never be entirely defined because it is one of those things that is almost completely based on an individual’s perception and interpretation. A dictionary may also provide a definition for the word perception and the word interpretation, but many individuals perceive and interpret many things very differently. With the vast variation of people, thoughts, and beliefs in our world, how should society determine the boundaries of reality? On the other hand, is it even possible to set specific limits when considering reality? The movie chosen, as a springboard into the forthcoming philosophical discussion, was â€Å"Dark City†, A Mystery Clock Production by New Line Cinema directed by Alex Proyas. The movie raised many interesting questions and produced many engaging comments. At the very beginning of the movie, you hear the voice of Dr. Schreber, played by Kieffer Sutherland. He begins by saying, â€Å"They [the â€Å"Strangers†] had mastered the ultimate technology, the ability to alter physical reality by will alone.†i[1] If the â€Å"Strangers† are altering reality, the people of the city will never truly know what is real and what is artificial. Consequently, the city in which they live is all artificial and made up. We as viewers can see this, but ... ...ed and are likely to continue to remain unanswered for many years to come. It is highly doubtful the term reality will ever be entirely and unrestrictedly measurable. Notes: i[1] Dr. Daniel P. Schreber in â€Å"Dark City† – the movie. ii[2] Detective Walenski in â€Å"Dark City† – the movie. iii[3] Woolley, Benjamin. â€Å"Virtual Worlds†. P 5. iv[4] Woolley, Benjamin. â€Å"Virtual Worlds†. P 9. v[5] Ludlow, Peter. â€Å"High Noon on the Electronic Frontier†. P 24. vi[6] Collins Gem Dictionary and Thesaurus. P 450. vii[7] Collins Gem Dictionary and Thesaurus. P 335. viii[8] www.philosophypages.com/dy/ix3.htm#real – the definition of reality. ix[9] Woolley, Benjamin. â€Å"Virtual Worlds†. P 213. x[10] Woolley, Benjamin. â€Å"Virtual Worlds†. P 3. xi[11] Woolley, Benjamin. â€Å"Virtual Worlds†. P 5. xii[12] Woolley, Benjamin. â€Å"Virtual Worlds†. P 3.

Tuesday, September 17, 2019

Importance of a Warm Up Essay

A warm up helps to prepare the body for the physical exertion to come. It gently raises your pulse rate and therefore, your cardiac output increases and also your rate of ventilation. Your vasomotor centre makes sure that more blood is being distributed to the working muscles. This combined affect is to increase the amount of oxygen that is delivered to the muscle cells. This helps to reduce the oxygen deficit when you start carrying out the actual activity. A Warm up is very important as it helps to reduce the possible chances of injury. It raises your body temperature in your muscles as there is an increase in the blood flow which raises your body temperature in your muscles, making them more responsive. The elasticity of muscle tissue is increased and more oxygen can be carried to the working muscles. This will help to prepare the body for the activity to come. Throughout a warm up routine, it consists of stretching exercises and this increases your flexibility and so directly reduces the risk of injury. The reason for this is that; a muscle or tendon group with a greater range of motion will be less likely to experience tears when used actively. Stretching also helps to improve recovery and may enhance the participant’s performance. Additionally, increased flexibility of the neck, shoulders and upper back may improve respiratory function. The nervous system becomes stimulated which makes sure you more alert and aware and therefore it gets you psychologically prepared. This will help to increase your levels of motivation and determination to carry out your dance sessions. The benefit of a warm up is that the muscles torn most frequently from the neglect of a warm up are the antagonists (such as the hamstrings- Semimembranosus, Semitendinosus, biceps femoris) to the strong contracting muscles (such as the Quadriceps- Vastus medialis, Vastus lateralis, Vastus intermedius, rectus femoris). Cold antagonistic muscles relax slowly when the agonists contract, therefore free movement and accurate co-ordination is retarded. At the same time, the force of the contraction of the agonists and the momentum of the moving part exert a great strain on the unyielding antagonists. Without a warm up, this may lead to the tearing of the muscle fibers or the tendons. Stretching exercises I will stretch, moving a joint to just beyond its point of resistance. Flexibility is limited by the joint itself, ligaments and tendons acting upon it. I cannot change the bony structures or the type of joint, but I can stretch the soft tissue surrounding the joint. Neck (Sternocleidomastoid and scalenes) * Turn head to the left, then to the right. * Look up and then down. * 5 Neck rolls to the right and then 5 neck rolls to the left. * Shoulders, back and arms * I will Circle arms 10 times forward, 10 times backward and then rotate arms alternating. This will mobilise my shoulder joint. * I will Stretch my Trapezius by pulling one arm that is kept straight across the chest with your other arm supporting it in its position. This is a horizontal flexion movement. * I will stretch my triceps brachii by flexing my elbow and placing my hand behind my head on by back and my other hand puts pressure on the flexed elbow joint. Wrists and fingers * I will rotate my wrist joints, clap my hands together rapidly and then bend and mobilise my fingers. Hips * I will mobilise my hip joint by placing my hands on my hips and doing 5 hip rotations to the left and then 5 to right. Rotate my hips by raising my leg (with a bent knee so it is at 90 degrees to my body) then I will turn my leg outwards to the side of my body. Spine * I will stretch my vertebral column by crouching down onto my knees and placing my hands on the floor reaching as far as I can. Legs * I will Stretch the Vastus Lateralis, Vastus Intermedials, Vastus Medialis and Rectus Femoris by pulling the ankle with your hand on the same side of the body keeping the knees together while maintaining the correct spine alignment. My hips should be square (I will make sure they do not twist.) If I find it difficult to keep my balance I will hold onto my ear with my other hand and focus. * I will stretch the Semitendinosus, Biceps Femoris and Semi Membranosus by placing one foot in front of the other; bend your back knee while keeping my front leg straight. Raise the hips and lean your body slightly over. After holding this stretch for 10-15 seconds, I will slowly raise the toes of my front foot so that they point towards the ceiling (I will keep my heel firmly on the ground.) Doing this will produce a full stretch down the back of the leg, i.e. Semitendinosus, Biceps Femoris, Semi Membranosus and Gastrocnemius. * I will move my legs apart (wide stance), I will then bend forwards with my hands flat to floor. * Right foot behind left at 90 degrees right leg flexed, left leg straight, bend forward to left foot. Left foot behind left at 90 degrees left leg flexed, right leg straight, bend forward to right foot. * To stretch the Adductors Longus, Brevis and Magnus both feet will be flat on the floor and facing forward. I will lean over to one side keeping the other leg straight, bend the knee at the side you are leaning over to increase the intensity of the stretch. * To stretch my Gastrocnemius I will put one foot in front of the other and bend you’re your front knee. The back leg will be kept straight and the rear heel will be kept firmly on the floor throughout the stretch. This stretch is often carried out against a wall. The Gastrocnemius is stretched by flexing your elbows and moving your body weight forward. Stretch forward until you feel a gentle pull in the lower leg. * To stretch the Soleus, the front knee is bent and is pushed towards the ground, while staying over and just in front of the foot. A gentle pull should be felt in the lower one third of the leg. The knee can then be directed medially and laterally to stretch different areas. Ankles * To mobilise my ankle joint I will move the sole of the foot inwards (inversion) and then turn it outwards (eversion). * I will then move the foot downwards (away from the tibia) which is known as plantar flexion and then I will move it upwards (towards the tibia) and this is known as dorsi flexion. This mobilises the Tibialis Anterior, Gastrocnemius and Soleus.

Monday, September 16, 2019

How Economic Globalization Has Fostered Globalization of Critics and Criticism Essay

I. INTRODUCTION The concept of globalization is one of the most talked about terms over the past decades. In fact, it is a highly popular buzzword that admittedly lacks a standard or commonly agreed upon definition. (Trebilcock, 2000). The concept of economic globalization stemmed from the root concept of â€Å"globalization† and by definition, pertains to that specific attribute of globalization that refers to the process of integration between the economic front and the ‘developed’, ‘under-developed’ and ‘developing’ economies (Naik, 2011). Economic globalization essentially comes together through international trade, FDIs (foreign direct investments) and the like (Naik, 2011). As stated by Naik (2011), economic globalization is a process that is all about the citizens and their welfare. By standard definition, economic globalization refers to the so-called increased economic interdependence of various countries which may result from the rise in terms of the movement of the different goods, services, capital and technologies across the international borders (Trebilcock, 2000). Other authors and economic experts define the concept of economic globalization as the â€Å"globalization of the markets† which explains the phenomenon of the global marketplace or the ability of a specific manufacturer that is based from a specific part of the world to sell a product or good to the consumers in other parts of the world (Trebilcock, 2000; Naik, 2011). Economic globalization has also enabled the rise of other related concepts such as ‘transnational or multi-national companies/corporations’ which refer to the companies that are active in numerous countries at the same time (Trebilcock, 2000; Naik, 2011). Because of these characteristics of economic globalization, other notable concepts which include foreign direct investments (FDIs), alliance capitalism, international trade and the like have been attributed to the concept of economic globalization. In fact, more than mere concepts, these terms have exerted tremendous benefits for the different people around the world (Naik, 2011; Trebilcock, 2000). However, one cannot totally ignore the fact that some critics recognize the negative effects or consequences of economic globalization as even the very concept of globalization itself may have specific ‘pros’ and ‘cons’. As argued by Naik (2011), while there are a  number of advantages in economic globalization, there also exists a number of disadvantages in economic globalization as a phenomenon. Many critics point out that the countries’ interdependence with one another serves as one of the biggest issues in economic globalization. They assert that when an economic crisis is being experienced by one country, this can result into an economic crisis as well on the different countries with which a country shares its economic ties (Naik, 2011; Trebilcock, 2000; Harrison, 2007). Aside from this, there are also many critics who argue that different companies actually exploit labor by investing in production facilities within developing countries. Because huge multinational companies that come from already developed countries resort to developing countries in order to acquire cheaper labor, critics consider this as alarming because they are only coming to these countries in order to acquire natural resources and more affordable labor which will be at their own advantage (Naik, 2011; Trebilcock, 2000; Harrison, 2007). Aside from this, many critics also argue that economic globalization has already proven to have caused a number of ideological and political tensions in the different parts of the world and that these will continue to move on and grow further as the so-called economic superpower era comes closer (Naik, 2011; Trebilcock, 2000). Furthermore, the critics argued that the ‘interdependence’ brought about by economic globalization has not really done anything in order to improve the lives of poverty-stricken communities and individuals across Africa and Asia. Apparently, despite the considerably huge success of economic globalization, a large portion of the population in the world still remained to be in great poverty (Naik, 2011; Trebilcock, 2000). This is precisely the reason why the critics could not help but compare the unequal effects of economic globalization among the developing and developed countries. In this research paper, we will explore the process as to how the so-called â€Å"economic globalization† phenomenon has fostered a globalization of critics and criticism. In this research paper, we will tackle the definition of economic globalization and its implications and how it has allegedly brought about and triggered the rise of a number of critics. This research paper will also identify the specific criticisms that critics have previously cited and identified with regard to the economic  globalization phenomenon. The main objective of this research paper is to provide evidence as to how the emergence of globalization of critics and criticism was a direct by-product of economic globalization. Hence, in line with this main objective, this research paper will directly answer the research question: â€Å"How did economic globalization foster globalization of critics and criticism?† II. LITERATURE REVIEW A. Economic Globalization Defined. Economic globalization, by strict definition, refers to the phenomenon characterized with an increased interdependence of the different national economies in the economic context (Joshi, 2009). This process or phenomenon is also characterized with a swift and steady increase in the movement of various goods, services, technologies as well as capital across borders (Naik, 2011; Trebilcock, 2000). While globalization as a sole context is focused on the rapid developments in the areas of science and technology and economic division of labor, the concept of economic globalization is centered on the growth of information as well as the advancement of science and technology. Thus, economic globalization may be viewed in two different aspects: either as a positive or as a negative process or phenomenon (Naik, 2011; Trebilcock, 2000). The economic globalization phenomenon is comprised of a globalization process of various markets, corporations, technologies, industries, production and even competition. Interestingly, the economic globalization process is not at all a new phenomenon as for the past centuries or hundreds of years, this process has continuously and consistently occurred (Naik, 2011; Trebilcock, 2000). Nevertheless, it was only about two or three decades ago that the concept of economic globalization has been recognized and given importance by economic analysts and experts. It initially appeared as an important part of the General Agreement on Tariffs and Trade (GATT) and the World Trade Organization (WTO) frameworks; because of these new economic policies, many countries have managed to cut down their trade barriers as well as open up new capital and current accounts (Naik, 2011; Trebilcock, 2000). Indeed,   economic globalization phenomenon may be accounted for the increased integration and interd ependence of the different countries and their economies, particularly, the integration between developed and less developed economies. Clearly, this economic globalization phenomenon was achieved and was manifested through FDIs (foreign direct investment) as well as the reduction of the so-called ‘trade barriers’ and the emergence of cross-border migration cases (Naik, 2011; Trebilcock, 2000). The authors Hameed & Nazir (2012) on the other hand have a different view with regard to economic globalization. They saw this phenomenon as having occurred because of the improvements in technology as well as the decrease in transportation cost. Hameed & Nazir (2012) also cited the fact that numerous national governments have deliberately chosen to integrate themselves with the â€Å"global economy† which became the ultimate trigger point for economic globalization to emerge. Hameed & Nazir (2012) defined the concept of economic globalization also as the process of removing trade restrictions and barriers such as quotas and tariffs as well as the labor free movement and capital market liberalization. Because of the removal of all the possible barriers and restrictions, economic globalization has emerged (Hameed & Nazir, 2012). This phenomenon occurred in the past 1980s and 1990s decades wherein majority of the developing countries reduced and alleviated their so-called important controls by bringing tarriff rates down as well as eliminating restrictions on FDIs (foreign direct investment) (Hameed & Nazir, 2012). Furthermore, Hameed & Nazir (2012) had positive  views with regard to economic globalization citing that this has led towards the attainment of higher productivity and growth as well as a large reduction of poverty in many countries. This assertion is certainly contrary to what many critics deny with economic globalization being the key towards achieving higher productivity and growth. Trebilcock (2000) on the other hand emphasized that focusing too much on the positive sides of economic globalization may not be a good idea as there are different significant effects to economic globalization which are not only limited to the positive ones. Apparently, there is a statistical evidence which points out that economic globalization causes a significant imbalance of power between the  developed and the developing countries which are part of a greater global economy (Hameed & Nazir, 2012; Trebilcock, 2000). B. Criticisms against Economic Globalization According to Shangquan (2000), it is important to recognize the fact that the increased participation of the developing countries in the process of globalization may enable them to best utilize their so-called ‘comparative advantages’ and be introduced to more advanced methods of technologies, management experience as well as foreign capital. Economic globalization also has undeniably brought developing countries in a much favorable position in terms of eliminating or preventing any form of monopolistic behaviors and also, more importantly, in strengthening the market competition (Shangquan, 2000). However, apart from the immense opportunities for increased development that economic globalization has provided among developing countries, economic globalization also poses many significant risks (Shangquan, 2000). Interestingly, these significant economic globalization risks serve as the ultimate basis and evidence of the critics of economic globalization against this pheno menon. These risks serve as the critics’ proof and basis for their criticisms on economic globalization. One of the prominent criticisms against economic globalization is the widened gap between the â€Å"North† and the â€Å"South†. Based on the early reports published by the United Nations during the year 1999, this gap between these two parts of the world has widened further as a result of economic globalization (Shangquan, 2000; Trebilcock, 2000). The UN’s reports contained facts and evidences that the total number of the developing countries that gained the benefits of economic globalization was only a small percentage (Shangquan, 2000; Trebilcock, 2000). Apparently, this was reflected in the gap or the difference in terms of the income per capita of the poorest and the richest country which has greatly enlarged to about 70 times as a result of the economic globalization (Shangquan, 2000; Trebilcock, 2000). The second top criticism that critics often throw against economic globalization is the fact that many developing countries run the risk of being exposed to external factors in the environment that are unfavorable. Apparently, under  the economic conditions that are open to conflicts, there is an important realization which states that there are immense constraints with regard to the open macroeconomic regulations and policies among developing countries which continue to weaken their macroeconomic regulation and control capacities (Shangquan, 2000; Trebilcock, 2000). In addition to this, the constant  innovation of the different financial instruments also moves further the expansion of the various financial assets of companies in developing countries. Apparently, this has brought about enormous negative impacts on the financial stability and economic safety of majority of companies within developing nations (Shangquan, 2000; Trebilcock, 2000). Aside from the negative economic imp acts of ‘economic globalization’, other scholars and authors also argue that economic globalization may have vivid negative strong impacts on the surrounding different cultures of the world in general. According to Held (2004), through the advent of economic globalization, there is a greater chance that the different populations from various cultures will mimic or imitate the labor markets and the international capital flow through the merging of cultures. And certainly within this process, the native people’s exposure to economic measures and foreign measures may cause major assimilations on their lifestyles (Held, 2004). Specifically, based on the numerous researchers who have been studying the main effects of the economic globalization phenomenon among the youth, the different populations in the world will inevitably experience many changes as triggered by economic globalization (Held, 2004). Populations from South America, Arab, Africa, Caribbean and South East Asia will be exposed more on Western cultures including their language which is English, their music, their computers and technologies, their dating practices, even their gender roles as well as the other nitty-gr itty of the Western cultures (Held, 2004). All of these will certainly bring about negative effects especially in the process of preserving their own native cultures. Apparently, based on a recent study conducted, the  negative cultural impacts of economic globalization are inevitable and the  assimilation of the native cultures are unescapable in this day and age (Xintian, 2002). Hence, no matter how much a specific culture would protect and preserve its own, the challenges and the changes of today’s economic globalization phenomenon will continue to put pressure on the different populations’ cultures and would ultimately result to the emergence of a totally new assimilated culture which may not be as distinct and as original as the one that the populations originally had (Held, 2004; Xintian, 2002). An author named George Ritzer once wrote about another point of criticism against economic globalization and his emphasis was on the so-called â€Å"McDonaldization† of a specific society as brought about by the economic globalization process (Ritzer, 2010). Ritzer emphasized that the different fast food businesses that continue to spread all throughout America as well as in the rest of the world will inevitably be forced upon the various world populations. They will be forced to adopt the fast-food cultures which continue to expand its influence across the world and this was made possible by the economic globalization which served as an important and influential force in standardizing the Western culture (Ritzer, 2010). Even in the area or aspect of the media, economic globalization also has somewhat certain negative impacts. For example, according to Nakayma (2005), the global news media companies export their information and deliver them through the Internet, radio and the news. However, in the process, these information are being exposed to Western values and products given that the top North American companies such as Reuters, CNN and BBC are the ones that dominate the global media and news   industry. They are far more powerful and influential as compared to the likes of Al-Jazeera which may only cater to a smaller number of audiences and may only exert influence on a few people (Nakayma, 2005). This implies that indeed, the amount of influence of America in almost all aspects of living whether it be in culture, news, politics, economics, and the media, are undeniable. This means that in one way or another, the economic globalization may bring about negative effects on the developing countries since they are the ones on â€Å"receiving end† and not on the influencing side (The Economist, 2011; Bertucci & Alberti, 2010; Aisbett, 2007). III. DISCUSSION Given the immense number of literatures that point out the advantages, benefits and positive effects of economic globalization, it would be difficult to ascertain and even argue that economic globalization has a negative side to it (Bertucci & Alberti, 2010). Interestingly however, the increasing number of critics that point out the negative effects of economic globalization as a global phenomenon constantly increased in the past few years which mean that today, more than before; there are more evidences with regard to the not-so-advantageous impacts of economic globalization in the world. As previously stated by Naik (2011), one of the negative aspects of economic globalization is that of its ability to weaken a country’s economic situation while it remains to be dependent on other countries. This is such that when an economic crisis is being experienced by one country, this can result into an economic crisis as well on the different countries with which a country shares its economic ties (Naik, 2011; Trebilcock, 2000). Aside from being prone to economic crisis, another criticism against economic globalization is the fact that it causes a significant imbalance of power between the developed and the developing countries which are part of a greater global economy (Hameed & Nazir, 2012; Trebilcock, 2000). This means that the gap between the developed and the developing countries continue to increase and widen which in the end, would place the developing countries in a somewhat ‘abused’ and ‘disadvantaged’ position. The third important point of criticism of the critics of economic globalization is the fact that the present economic globalization phenomenon places to put on high levels of pressure on the different populations’ cultures which may ultimately result to the emergence of a totally new assimilated culture that may not be as distinct and as original as the ones they had before (Held, 2004; Xintian, 2002). To put it simply, economic globalization made it quite difficult if not impossible to preserve one’s cultural origins and distinct practices and languages as the pervasiveness of the Western influence is too strong which is a manifestation of the many changes that the economic globalization may bring about (Shangquan, 2000; Nakayma, 2005; Lerche III, 2002). Therefore, because of these highlighted points of criticism that are usually being  raised upon by various authors who are against the concept of economic globalization, one can contend that indeed economic globalization has fostered a globalization of critics and criticism because of its own negative aspects and influences among the developing countries. Not only does the concept of economic globalization bring about positive consequences in the global dimension, it also inevitably brings about a number of  consequential disadvantages not only in the economic aspect but also in social, cultural, political and even in t he media aspects (Bertucci & Alberti, 2010; Aisbett, 2007). IV. ANALYSIS/ IMPLICATIONS In answering the question, â€Å"How did economic globalization foster globalization of critics and criticism?† it may be asserted that economic globalization did foster globalization of critics and criticism in a number of ways. Apparently, in the recent years, there have been more evidences concerning the not-so-advantageous impacts of economic globalization in the world and among these include the capacity of economic globalization to purposely weaken a country’s economic situation as it remains to be dependent on other countries. Its manifestation is whenever a country experiences economic crisis, it inevitably results into an economic crisis as well on the different countries with which a country shares its economic ties. This means that the so-called ‘interdependence’ and partnership between developing and developed nations has a negative side to it as when the economic situation of a country fails to normalize, other nations will be affected in a negative way (Naik, 2011; Trebilcock, 2000). Because of this specific disadvantage, many critics consider economic globalization as a risky process and a negative phenomenon as opposed to what many proponents argue (The Economist, 2011; Aisbett, 2007). Aside from the issue on economic crisis, another direct criticism often thrown against economic globalization is the fact that it causes a significant imbalance of power  between the developed and the developing countries which are part of a greater global economy (Hameed & Nazir, 2012; Trebilcock, 2000). Apparently,  this is quite true as observed by many economic experts and analysts who have studied economic globalization as a phenomenon for many years. They have observed that one of the inevitable results of the economic globalization phenomenon is the widened or increased gap between the developed and the developing countries. Apparently, this places the developing countries in a somewhat ‘abused’ and ‘disadvantaged’ position as they are the ones on the losing end while the developed countries are on the side of gaining all the benefits to the phenomenon (Hameed & Nazir, 2012; Trebilcock, 2000). And lastly, it may be asserted that economic globalization did foster globalization of critics and criticism because of the fact that economic globalization phenomenon put on high levels of pressure on the different populations’ cultures ultimately resultd in the emergence of a totally new assimilated culture and the developing countries’ inability to preserve their culture (Held, 2004; Xintian, 2002). Many critics argue that economic globalization made it quite difficult if not impossible for the de veloping countries to preserve their cultural origins and distinct practices and languages (Shangquan, 2000; Nakayma, 2005; Lerche III, 2002). V. CONCLUSION In conclusion, all the three main highlighted points of criticism which always serve as the main entry of critics in going against the concept of economic globalization provide evidence as to why economic globalization did foster a globalization of critics  and criticism. The reality is that indeed economic globalization has fostered a globalization of critics and criticism because of its own negative consequences and influences especially on the part of the developing countries. There is the widened economic gap between the rich (developed) and the poor (developing) countries. Another is that economic globalization made it impossible for the developing countries to protect and preserve their cultures. And lastly, economic globalization brought about a number of consequential disadvantages not only in the economic aspect but also in social, cultural, political and even in the media aspects (Bertucci & Alberti, 2010; Aisbett, 2007; Lerche III, 2002; Hameed & Nazir, 2012). Nevertheless, despite the fact that economic globalization has fostered a  globalization of critics and criticism, it does not mean that economic globalization as a phenomenon should be permanently ceased. As in any other global phenomena and processes, economic globalization has its own set of advantages and disadvantages as well as positive and negative impacts to the countries and populations it would influence. For this reason, criticisms are only natural consequences of any other global phenomenon such as economic globalization. Critics are free to critique or display their disapproval for economic globalization as a concept; however, they must also recognize and acknowledge that this global phenomenon has contributed much to the developments of today’s present age (Harrison, 2007). REFERENCES ï‚ · Aisbett, E. (2007). Why are the Critics So Convinced that Globalization is Bad for the Poor? University of Chicago Press. ï‚ · Bertucci, G., & Alberti, A. (2010). Globalization and the Role of the State: Challenges and Perspectives. Retrieved from http://unpan1.un.org/intradoc/groups/public/documents/un/unpan006225.pdf ï‚ · Hameed, A., & Nazir, A. (2012). Economic Globalization and its Impact on Poverty and Inequality: Evidence From Pakistan. Retrieved from http://www.ecosecretariat.org/ftproot/Publications/Journal/1/Article_TDB.pdf ï‚ · Harrison, A. (2007). Globalization and Poverty. University of Chicago Press. ï‚ · Held, D. (2004). A Globalizing World?: Culture, Economics, Politics (2nd Ed.). London: Routledge. ï‚ · Joshi, R. M. (2009). International Business. New Delhi and New York: Oxford University Press. ï‚ · Lerche III, C. (2002). The Conflicts of Globalization. Retrieved from http://www.gmu.edu/programs/icar/ijps/vol3_1/learch.htm ï‚ · Naik, A. ( 2011). Economic Globalization. Retrieved from http://www.buzzle.com/articles/economic-globalization.html ï‚ · Nakayma, T. (2005). The Handbook of Critical Intercultural communication. . Blackwell Publishing. ï‚ · Nikiforuk, A. (2007). Pandemonium: How globalization and trade are putting the world at risk. Brisbane: University of Queensland Press. ï‚ · Ritzer, G. (2010). MacDonalization: The reader/ 3rd ed. . Thousand Oak, CA: Sage Publications. ï‚ · Shangquan, G. (2000). Economic Globalization: Trends, Risks and Risk Prevention. Retrieved from http://www.un.org/en/development/desa/policy/cdp/cdp_background_papers/bp2000_1.pdf ï‚ · The Economist. (2011). Globalisation and its critics. Retrieved from http://www.economist.com/node/795995 18 |B u s i n e s s a n d S o c i e t y ï‚ · Trebilcock, M. (2000). Critiquing the Critics of Economic Globalization. Journal of International Law & International Relations, 1 (1-2), 213-238. ï‚ · Xintian, Y. (2002). Cultural Impact on International Relations. Chinese Philosophical Studies, XX. The Council for Research in Values and Philosophy.

Sunday, September 15, 2019

Introduction to Computers by Peter Norton 6th Ed

Q e SPECIAL INDIAN EDITION [ J^ ^ S ix t l^ d it io n INTRODUCTION TO COMPUTERS PETER NORTON In te rn S n H T M l Office For Sale in India, Pakistan, Nepal, Bangladesh, Sri Lanka and Bhutan only Uploaded By : M. Kamran Hanif E-mail : mk. [email  protected] com Website : www. kamran. hk. ms Information contained in this work has been obtained by Tata McGraw-Hill, from sources believed to be reli ­ able.However, neither Tata McGraw-Hill nor its authors guarantee the accuracy or com pleteness of any infor ­ mation published herein, and neither Tata McGraw-Hill nor Its authors shall be responsible for any errors, omissions, or damages arising out of use of this Infor* mation. This work is published with the understanding that Tata McGraw-Hill and its authors are supplying in ­ formation but are not attempting to render engineering or other professional services. If such services are re ­ quired. the assistance of an appropriate professional should be sought m Tata McGraw-HillPE T ER NORTON’S * INTRODUCTION TO CO M PUTERS Indian Adaptation done by arrangement with the McGraw-Hill Companies Inc.. NewYbrk Sales territories: India. Pakistan, Nepal, Bangladesh, Sri Lanka and Bhutan. Ninth reprint 2008 RYXDCDRXRB8YA Copyright (D 2006 by The McGraw-Hill Companies, inc. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc.. including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning.Some andllaries, including electronic and print components, may not be available to customers outside the United States. ISBN-13:97S4M>7-0S9374*9 ISBN-10:0-07-059374-4 Published by the Tata McGraw-Hill Publishing Company Limited. 7 W est Patel Nagar, New Delhi 110 008. typeset m Tim es at Script Makers. 19, A1-B. DDA Market, Pashchim Vlhar, New D elhi 110 063 and printed at Pashupati Printers, 1/429/16, G ali No. 1, Friends Colony. G. T. Road, Shahdara, Delhi 110 095 Cover Printer: SD R Printers Cover Design: Kapil Gupta The M cG raw -H ill Contponies Ez& sscr PH M TPM TQ AT A Cl IWindows 7 Check Your UnderstandingChapter 1: Introducing Computer Systems Lesson 1A: Exploring Computers and Their Uses Lesson IB : Lookina Inside the Computer Svstem Chapter 2: Interaction with Your Computer Lesson 2A: Using the Kevboard and Mouse Lesson 2B: Inputting Data in Other Wavs Chapter 3: Secinq, Hearing, and Printin') Data l;ctnn 3A; Virfpo and Snunri Lesson 3B: Printinq Chanter 4: Processing Data Lesson 4A: Transfbrmina Data into Information Lesson 4B: Modem CPUs Chapter 5; Storina Data Lesson SA: Types of Storaqe Devices Lesson SB: Measurinq and Improving Drive Performance Chapter 6: Usina Ooeratinu Systems Lesson 6A: Oporatinq Svstem Basics lesson 6B: Survev of PC nd Network Operatino Systems Chanter 7: Networks Lesson 7A: Networkinq Basics 2 3 24 48 49 68 88 89 1 07 124 12S Ufi m m 107 Chapter 0: Working in the Online World Lesson 9A: Connectinq to the Internet Lesson 9B: Doinq Business in the Online World Chapter 10: Workinq with Application Software Lesson 10A: Productivity Software Lesson 10B: Graphics and Multimedia Chapter 11: Database Management Lesson 11A: Database Manaqement Systems Lesson 11B: Survey of Database Systems Chanter 12: Software Proaramminq and Development Lesson 12A: Creating Computer Proqrams Lesson 12B: Proaramminq Lanauaoes and the Proqramminq Process Chanter 13: Protectina Your Privacy. Your Computer, and Your Data 330 331 345 382 263 383 400 401 42Q 438 439 456 478 477 497 518 528 532 538 SS8Lesson 13A: Understanding the Need for Security Measures 204 Lesson 13B: Takina Protective Measures 205 Appendix A: Creating Your Own Web Paae 22k Appendix B: Buyinq Your First Computer 242 Appendix C: Computer Viruses Annendix D: History of Microcomputers 243 267 Appendix E: Self-Check Answers Ch apter ; Presenting the Internet Lesson 8A: The Internet and the World Lesson 8B: E-Mail and Other Internet Services 284 286 312 Urheberrechtlich geschutzies ^ aterial FEATURE ARTICLES At Issue Computerized Oisease Manaqement Computer Votinq—Is It a Good Thinq? 36 62 10? 134 192 228 252 316 336 372 414 450 490 Productivity Tig Choosinq the Riqht Tool for the Job Savinq Time with Keyboard Shortcuts The Care and Feedinq of Printers Do You Need M n RAM? ; Backino Up Your Data Do-It-Yourself Tech Support The Telecommuter's Checklist—————- — Evaluatino the Reliability of Search Results and Web Sites Sharinq an Internet Connection Automatinq Your Work with Macros 0atahaoard, mouse,and microphone are commonInputdevices. Microphone Keyboard Speakers Monitor Printer :: FIGURE 1B. 11 Themonitor, primer,and speakers are commonou? put devices. 30 Chapter 1 Some types of hardware can act as both input and output devices. A touch screen, for example , is a type of monitor that displays text or icons you can touch. When you touch the screen, special sensors detect the touch and the computer cal ­ culates the point on the screen where you placed your finger.Depending on the lo ­ cation of the touch, the computer determines what information to display or what action to take next. Communications devices are the most common types of devices that can per ­ form both input and output. These devices connect one computer 10 another—a process known as networking. The most common kinds of communications de ­ vices are modems, which enable computers to communicate through telephone lines or cable television systems, and network interface cards (NICs), which let users connect a group of computers to share data and devices. Storage Devices A computer can function with only processing, memory, input, and output de ­ vices.To be really useful, however; a computer also needs a place to keep program files and related data when t hey are not in use. The purpose of storage is to hold data permanently, even when the computer is turned off. You may think of storage as an electronic file cabinet and RAM as an elec ­ tronic worktable. When you need to work with a program or a set of data, the computer locates it in the file cabinet and puts a copy on the table. After you have finished working with the program or data, you put it back into the file cabinet. The changes you make to data while working on it replace the original data in the file cabinet (unless you store it in a different place). Novice computer users often confuse storage with memory.Although the func ­ tions of storage and memory arc similar; they work in different ways. There arc three major distinctions between storage and memory:  » There is more room in storage than in memory, just as there is more room in a file cabinet tlian there is on a tabletop.  » Contents are retained in storage when the computer is turned off, whereas programs o r the data in memory disappear when you shut down the computer.  » Storage devices operate much slower than memory chips, bur storage is much cheaper than memory. Nor Formore formation onsorage U V C 3 Visit 3S 8. http://www. mhhe. ccm/ petemorton There are two main types of computer storage: magnetic and optical. Both are covered in the following sections.Magnetic Storage There are many types of computer storage, but the most common is the magnetic disk. A disk is a round, flat object that spins around its center. (Magnetic disks are almost always housed inside a case of some kind, so you can’t see the disk itself unless you open the case. ) Read/write heads, which work in much the same way as the heads of a tape recorder or VCR, are used to read data from the disk or write data onto the disk. The device that holds a disk is called a disk drive. Some disks are built into die drive and are not meant to be removed; other kinds of drives enable you to remove and replace disks (see Figure IB. 12).Most personal computers have at least one nonremovable hard disk (or hard drive). In addition, there is also a diskette drive, which allows you to use removable diskettes (or floppy disks). The hard disk serves as the computer’s primary filing cabinet because it can store far more data than a diskette can contain. Diskettes are used to load data onto the hard disk, to trade data with other users, and to make backup copies of the data on the hard disk. Introducing Computer Systems sch :: FIGURE 1B. 12 Standard PCs haw a buB-in hart disk and a octette dim The hard dfck is bult into the computer's case. Diskettes can be inserted into and removed from the diskette drive. Optical StorageIn addition to magnetic storage, nearly every computer sold today includes at least one form of optical storage—devices that use lasers to read data from or w rite data to the reflective surface of an optical disc. The CD-ROM drive is the most common type of optical stor age device. Com ­ pact discs (CD s) arc a type of optical storage, identical to audio CDs. U ntil re ­ cently, a standard CD could store about 74 minutes of audio or 650 M B of data. A newer breed of CDs can hold 80 minutes of audio or 700 M B of data (see Fig ­ ure 1B. 13). The type used in computers is called Compact Disc Read-Only Mem ­ ory (CD -RO M ). As the name implies, you cannot change the inform ation on the disc, just as you cannot record over an audio CD.If you purchase a CD-Recordable (CD-R) drive, you have the option of creat* ing your own CDs. A CD-R drive can w rite data to and read data from a compact disc. To record data w ith a CD-R drive, you must use a special CD-R disc, which can be written on only once, or a CD-ReW ritable (CD-RW ) disc, which can be written to m ultiple times, like a floppy disk. An increasingly popular data storage technology is the Digital Video Disc (D V D ), which is revolutionizing home entertainment. Using sophisticated com ­ pression technologies, a single DVD (which is the same size as a standard compact disc) can store an entire full-length movie. DVDs can hold a minimum of 4. 7 G B of data and as much as 17 G B.Future D VD technologies promise much higher stor ­ age capacities on a single disc. DVD drives also can locate data on the disc much faster than standard CD-ROM drives. DVDs require a special player (see Figure IB . 14). M any DVD players, how ­ ever, can play audio, data, and DVD discs, freeing the user from purchasing dif ­ ferent players for each type of disc. D VD drives are now standard equipment on many new personal computers. Users not only can install programs and data from their standard CDs, but they also can watch movies on their personal computers by using a DVD. FIGURE 1B. 13 Software nakers commonly sel Oier productson CDbecauseof the dsc's high storage capaoty. Software Brings the Machine to LifeThe ingredient that enables a computer to perform a specific task is software , which consists of instructions. A set of instructions that drive a computer to per ­ form specific tasks is called a program. These instructions tell the machine’s phys ­ ical components what to do; without the instructions, a computer could not do anything at a ll. When a computer uses a particular program, it is said to be run ­ ning or executing that program. Although the array of available programs is vast and varied, most software falls into two major categories: system software and application software. ONLINE FormoreInformation on computersoftware, visit http://www. mhhe. com/ petemorton 32 Chapter 1 System SoftwareSystem software is any program (hat controls the computer’s hard ­ ware or that can be used to maintain the computer in some w ay so that it runs more efficiently. There are three basic types of system software:  » An operating system tells the computer how to use its own com* poncnts. Examples of operating systems include Windows, the Mac intosh Operating System, and Linux (see Figure IB . 15). An operating system is essential for any computet; because it acts as an interpreter between the hardware, application programs, and the usee When a program wants the hardware to do something, it communicates through the operating system. Sim ilarly, when you want the hardware to do something (such as copying or printing a file), your request is handled by the operating system. A network operating system allows omputers to communicate and share data across a network while controlling network op* erations and overseeing the network’s security. A u tility is a program that makes the computer system easier to use or performs highly specialized functions (see Figure IB . 16). U tilities arc used to manage disks, troubleshoot hard* ware problems, and perform other tasks that the operating sys ­ tem itself may not be able to do.  »  » FIG U RE 1B. 14 DVDplayersare now standardon many PCsand are foundin marryhome enterta inmentcentos. Application Software Application software tells the computer how to accomplish specific tasks, such as word processing or drawing, for the user.Thousands of applications are available for many purposes and for people o f all ages. Some of the major categories of these applications include  »  » Word processing software for creating text-based documents such as newsletters or brochures (see Figure IB . 17). Spreadsheets for creating numeric-based documents such as budgets or bal ­ ance sheets. FIG U RE 1B. 15 Windowsis Ihe mostpopular cf aS PC operatingsystems, runningonabout BagiEBEBBjBSi 90 percentof al personalcomputers. Introducing Computer Systems 33 Urheberrechtlich geschutzles M «  » Database management software for building and manipulating large sets of data, such as the names, addresses, and phone numbers in a telephone directory.Presentation programs for creating and presenting electronic slide shows (see Figure 1B. 18). Graphics programs for design ing illus ­ trations or manipulating photographs, movies, or animation. Multim edia authoring applications for building digital movies that incorporate sound, video, anim ation, and interactive features. Entertainment and education software, many of which are interactive multime ­ dia events.  »  »  »  » FIGURE 1B. 16  » Web design tools and Web browsers, and other Internet applications such as newsreaders and e-mail programs.  » Games, some o f which arc for a single player and many of which can be played by several people over a network or the Internet.Thereare hundreds of utility programs available forpersonal computers. This one. caled ParttlonMagic, helps you manage jour hard cfisKto getthe most from it Computer Data You have already seen that, to a computer, data is any piece of information or fact that, taken by itself, may not make sense to a person. For example, you might think of the letters of the alphabet as data. Taken individually, they do not mean a lo t. But when grouped into words and sentences, they make sense; that is, they become information (see Figure IB . 19). Sim ilarly, basic geometric shapes may not have much meaning by themselves, but when they arc grouped into a blueprint or a chart, they become useful information. n o * a  « ‘ – f o lflJJ e†¢ IS*H*M  »*a* n o t – * *†¢- t *-†¢* jlK  » z j* / u-*-ai-:. *— . ; – f t ir – V * ‘* – * n, i. 4r  »  ¦ ~ { _ k___ _ l l 1 I FIG U RE 1 B. 1 ? Word processing software s designed (or creating documentsthatconsistprimarily of text, but also lets youadd graphcs and sounds to your documents. It also provides layout features that letyou create brochures. newsletters,Web pages, and mom . 34 Chapter 1 M i 3 —  « I H w fcn  «h Haw*M**AH «a4 «M* M M ptflw W lM A to A M Ih m k B m V Dmm*mS. xa NvMrHtwMMk  ¦ M r itM m i l « h  » M ld  »  »  »  « * llh i » ^ f c n 1 ilfilw >  » à ¢â‚¬â€ n TW  « t iW * *  » lW fa m i w d p u l— n le y— d w t ‘t i i w l a Ml  ¦M l  ¦ ‘*  ¦ * -1________________________B lw f lja ! ______ ‘‘  ¦; ! .. C uitrom A K lM M T . U . ATTOOCTBATLAW 1002 AIMMBSB8ZT sunu;,iL4nw C i A Urheborrechtlich geschOtztes M FIGURE 1B. 18 :: T oil rtyt Sj ;fca f Presentation software is mostoften used torcreating sales presentations,aXtvxjgh I can be effectivetorany typeol electronicside show.  « H i n ^ X iM ; . i W h;i; :' V! J i 1 jwufinm :. ^  ¦ H o? drrnfi! ^Viis,-S* The Keyboard The Mouse Variants of the Mouse Ergonomics and Input Devices Lesson 2B: Inputting D ata In O ther W ays  »  »  » Devices for the Hand Optical Input Devices Audiovisual Input Devices LESSON v m Overview: T he K eyboard an d M ouseIf you think of the CPU as a computer’s brain, then you might think of the input devices as its sensory organs—the eyes, ears, and fingers. From the user’s point o f view, input devices are just as important as the CPU, perhaps even more important. After you buy and set up the com* putcr, you may take the CPU for granted because you interact directly with input devices and only indirectly with the CPU. But your ability to use input devices is critical to your overall success with the whole system. An input device docs exactly what its name suggests: it enables you to enter information and commands into the computer. The most com* monly used input devices arc the keyboard and the mouse.If you buy a new personal computer today, it w ill include a keyboard and mouse un ­ less you specify otherwise. Other types of input devices arc available as well, such as variations of the mouse and specialized †alternative† input devices such as microphones and scanners. This lesson introduces you to the keyboard and the mouse. You w ill learn the importance of these devices, the way the computer accepts input from them, and the many tasks they e nable you to perform on your PC. Using the Keyboard and Mouse OBJECTIVES :: > Identity the five key groups on a ; †¢ standard computer keyboard. > Name six special*purpose keys found on all standard computer keyboards.  » List the steps a computer follows when accepting input from a keyboard. Describe the purpose of a mouse and the rote it plays in computing.  » Identify the five essential techniques for using a mouse.  » Identify three common variants of the mouse.  » Describe five steps you can take to avoid repetitive stress injuries from computer use. Urheberrechtilch g eschutztes Material The Keyboard O N L IN E For mote information on computer-based keyboard tutooals, vs* http://wvrw. mhho. com/ petemortoa The keyboard was one of the first peripherals to be used with computers, and it is still the primary input device for entering text and numbers. A standard keyboard includes about 100 keys; each key sends a different signal to the CPU.If you have not used a comp uter keyboard or a typewriter, you w ill learn quickly that you can use a computer much more effectively if you know how to type. The skill of typing, or keyboarding, is the ability to enter text and numbers with skill and accuracy. Certainly, you can use a computer without having good typing skills. Some people claim that when computers can interpret handwriting and speech with 100 percent accuracy, typing w ill become unnecessary. But for now and the foreseeable future, keyboarding remains the most common way to enter text and other data into a computer: The Standard Keyboard Layout O N L IN E For more miormaiion on computer keyboards and keyboard manufacturers, visit http://www. mhhc. com/ petemortal Keyboards come in many styles.The various models differ in size, shape, and feel; except for a few special-purpose keys, most keyboards arc laid out almost identi ­ cally. Among IBM-compatible computers, the most common keyboard layout is the IBM Enhanced Keyboard. It has about 100 keys arranged in five groups, as shown in Figure 2A. 1. (The term IBM-compatible computer refers to any PC based on the first personal computers, which were made by IBM . Today, an IBMcompatible PC is any PC other than a Macintosh computer. ) The Alphanumeric Keys The alphanumeric keys—(he area of the keyboard that looks like a typewriter's keys—are arranged the same way on almost every keyboard.Sometimes this com ­ mon arrangement is called the Q W ERTY (pronounced KWER-tcc) layout be ­ cause the first six keys on the top row of letters are Q, W, E , R , T, and Y. Along with the keys that produce letters and numbers, the alphanumeric key group includes four keys having specific functions. The t a b , CAPS LOCK, ba c k  ­ spa c e , and e n t e r keys are described in Figure 2A. 2. FIGURE 2A . 1 Most BM com pattie PCs use a keyboard like M s one. Mar/ keyboards feature a number of specialized keys, am)keyboardscan vary in size and shape. But nearly e l standard P C keyboards include the keys shewn here. The Modifier Keys The SHIFT, ALT (Alternate), and CTRL (Control) keys are called modifier keys be ­ cause they modify the input of other keys.In other words, if you hold down a modifier key while pressing another key, then you are changing the second key's Alphanum keys eric 50 Chapter 2 Theto key m ovesyouto predefined tabstops In m applicationprogram any s (suchas wordprocessors). Thebackspace keyerases characters youhavejusttyped. Forexam ina ple, word processingprogramyoucan press baosmce to â€Å"backover† an Incorrect character anddelete it Thecaps lock keylets you†lock* the alphabetkeys sotheyproduceonly capital letters. The ehter key letsyou finalize dataentry inm typesof appBcatkmprogram any s. Ybualso can usewtw tocboosecom ands m andoptionsin m program and at any s various places in anoperatingsystem's Interface. FIGURE 2A . 2 nput in some way. For example, if you press the Jtkcy, you input a small letter/. ‘ B ut if you hold down the sh u t key while pressing the J key, you input a capital /. M odifier keys arc extremely useful bccausc they give all other keys multiple ca ­ pabilities. Figure 2A. 3 describes the modifier keys and their uses. Functionsofthe tab,catsloo. v o s ta , andtwin keys The Numeric Keypad The numeric keypad is usually located on the right side of the keyboard, as shown in Figure 2A. 1. The numeric keypad looks like a calculator's keypad, with its 10 digits and mathematical operators (+, -, *, and Whenpressedalong with analphanumerickey,smft forcesthe /).The numeric keypad also features a NUM computerto outputa capital letterorsymbol sun is also a LOCK key, which forces the numeric keys to in ­ m ocfifierkey in someprogram forexam youcan presssnft s; ple, put numbers. When NUM LOCK is deactivated, alongwtthcursor-m ovem keys toselect textforediting. ent the numeric keypad's keys perform cursormovement control and other functions. The Function Keys The function ke ys, which are labeled F l, f l, and so on (as shown in Figure 2A. 1), are usu ­ ally arranged in a row along the top of the key ­ board. They allow you to input commands without typing long strings of characters or navigating menus or dialog boxes. Each func ­ tion key's purpose depends on the program you are using. For example, in most programs, F l is the help key. When you press it, a special window appears to display information about = OnThecm (control) key producesdifferent results dependingonthe programyouare using. In m Windows-based program any s, cm-key combinationsprovideshortcuts for m com ands. Forexam the enu m ple, combinationcnuo enables youto open a newfile. n Them j (mjcmmu) keyoperates Skethectrl key,but producesa different set of results. In Windowsprogram Mi-key s. combinations enableyouto navigate m enus anddialog boxeswithoutusingthe m ouse. FIGURE 2A . 3 Fuvtionsoftheshft, emuanda lt keys. Interacting with Your Computer 51 the program you are using. Mos t IBM-compatible keyboards have 12 function keys. Many programs use function keys along with modifier keys to give the func ­ tion keys more capabilities. The Cursor-Movement KeysMost standard keyboards also include a set of cursor-movcmcnt keys, which let you move around the screen without using a mouse. In many programs and op* erating systems, a mark on the screen indicates where the characters you type w ill be entered. This mark, called the cursor or insertion point, appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line. Figure 2A. 4 describes the cursor-movcmcnt keys and Figure 2A. 5 shows an insertion point in a document window. Special-Purpose Keys In addition to the five groups of keys described earlier, all IBM*compatible key ­ boards feature six special-purpose keys, each of which performs a unique func ­ tion. Figure 2A. describes these spccial-purposc keys. Since 1996, nearly all IBM-c ompatible keyboards have included two additional special-purpose key’s designed to work with the Windows operating systems (see Figure 2A. 7):  » start . This key, which features the Windows logo (and is sometimes called the Windows logo key), opens the Windows Start menu on most computers. Pressing this key is the same as clicking the Start button on the Windows taskbar. s h o r t c u t . This key, which features an image o f a menu, opens an on-screen shortcut menu in Windows-based application programs.  » One of the latest trends in keyboard technology is the addition of Internet and multimedia controls.Microsoft's Internet Keyboard and MultiMedia Keyboard, for example, feature buttons that you can program to perform any number of tasks. For example, you can use the buttons to launch a Web browser, check e-mail. Depending onme program,you maybe able to press nomcto movethe cursorto the beginning ofa line and br>to moveto the endof a line. The mccu and hm o o w keys let you â€Å"flip† p * through a document, screen by screen, Hto turning the pages of a book. Press m et w to lump to the previous screen; press m gedonn to jump to the next ___ I The arrow keys move the insertion point up or down a single line, or left or right one character space. FIGURE 2A . 4 The airsor-movement keys. FIGURE 2A . Thecursor, orinsertionpoW, shews wherethenextletter typedwit appear. 52 Chapter 2 The cursor, o r insertion point, in a document eberrechtlich M The(softkey's functiondependsonyour programoroperatingenvironment Typically, the csckeyis usedtoâ€Å"backup†onelevel in a multilevel environm ent. ThenmT scREBtkey sRom the user10 s capture whatever b shownon thescreen as anim Thiskeydoes notwork with al age. program s. In som programs,scrou. lockcauses the e cursorto remainstationary onthescreen, andthe document'scontentsm aroundIt. ove Thiskeydoesn'tfuncttonatal in som program e s. In som programs,themuse key can b e e usedtostopa co m In progres s. m and 1 5 M i I I I | ? :. a . 5 is  ¦Bill r I I* J†TheM keyBatches som programsfrom SEm e Insert m ode† (in wtiich textis inserted into thedocum at the cursor) toâ€Å"overtypem ent ode (in whichnewtextis typodover existingtext), andvice vena. m —N A 4 f I 6 ‘ m n ?  » 6 a [? | 3 i* J removesonecharacterat a time at thecursor's location, cam erases characterstothe right otthecursor. FIGURE 2A . 6 SpecU jwpose keysonm standard ost keyboards FIGURE 2A . 7 ThosafiT keyandtheatofiran toy appear frequencyontherwwer keytnordsthat are sdldwAhWndcMiS' basedcom puters. 2Z and start your most frequently used programs. Multimedia buttons let you control the computer’s CD-ROM or DVD drive and adjust the speaker volume. Many key* board makers offer such features on newer models (see Figure 2A. 8). How the Computer Accepts Input from the KeyboardYou might think the keyboard simply sends the letter of a pressed key to the computer—after all, that is what appears to happen. Actually, the process of ac ­ cepting input from the keyboard is more complex, as shown in Figure 2A. 9. When you press a key, a tiny chip called the keyboard controller notes that a key has been presxd. The keyboard controller places a code into pan of its memory. Interacting with Your Computer 53 B i f a ‘S Q ill FIGURE 2A. 8 called the keyboard buffer, to indicate which key was pressed. (A buffer is a tem ­ porary storage area that holds data until it can be processed. ) The keyboard con ­ commonplace on newer keyboards. roller then sends a signal to the computer's system software, notifying it that something has happened at the keyboard. Q A key is pressed onthe keyboard When the system software receives the signal, it determines the appropriate response. When a keystroke has occurred, the system reads the Q Thesystemsoftwareresponds to memory location in the keyboard He Interruptby reading thescan code fromthe keyboardbuffer. buffer that cont ains the code of the key that was pressed. The sys ­ K EYBO RD A SYSTEM tem software then passes that BUFFER SOFTWARE code to the CPU. 0 The keyboard controler e The keyboardcontroller The keyboard buffer can store Q The system software sends an interrupt sendsDiescan code passes the scan code many keystrokes at one time.This request to the forthe key tothe tothe CPU capability is necessary because keyboardbuffet system software. some time elapses between the pressing of a key and the com ­ FIGURE 2A. 9 puter’s reading of that key from the keyboard buffer. W ith the key ­ How Input is recawd from the keyboard strokes stored in a buffer, the program can react to them when it is convenient. O f course, this all happens very quickly. Unless the computer is very busy handling multiple tasks, you notice no delay between pressing keys and seeing the letters on your screen. In some computers, the keyboard controller handles input from the computer's keyboard and mouse and stor es the settings for both devices.One keyboard set ­ ting, the repeat rate, determines how long you must hold down an alphanumeric key before the keyboard w ill repeat the character and how rapidly the character is retyped while you press the key. You can set the repeat rate to suit your typing speed. (You w ill learn how to check your keyboard’s repeat rate in the lab exer ­ cises at the end of this chapter. ) internet and muftmeda features are The Mouse A personal computer that was purchased in the early 1980s probably included a keyboard as the only input device. Today, every new PC includes a pointing dcvicc as standard equipment, as shown in Figure 2A. 10. Full-size PCs usually include a mouse as the pointing dcvicc.A mouse is an input dcvicc that you can move around on a flat surface (usually on a desk or keyboard tray) and controls the pointer. The pointer (also called the mouse pointer) is an on-screen object, usually an arrow, that is used to select text; access m enus; and interact with programs, files, or data that appear on the screen. Figure 2A. 11 shows an example of a pointer in a program window. FIGURE 2A. 10 Most modern personal computers are eqlipped w ti a mctse. 54 Chapter 2 The mechanical mouse is the most common type of pointing de ­ vice. A mechanical mouse contains a small rubber ball that proW trades through a hole in the bottom of the mouse's. case (see Figure 2A. 12). The ball rolls inside the case when you move the mouse around on a flat surface.Inside the mouse, rollers and sensors send signals to the computer, telling it the distance, direction, and speed of the ball's motions (see Figure 2A. 13). The computer uses this data to position the mouse pointer on the screen. Another popular type of mouse, the optical mouse, is nonmechanical. This type of mouse emits a beam of light from its underside; it uses the light's reflection to judge the distance, direction, and speed of its travel (see Figure 2A. 14). The mouse offers two main benefits. First, the mouse lets you position the cur ­ sor anywhere on the screen quickly without using the cursor-movement keys. You simply move the pointer to the on ­ Rdlers screen position you want and press the mouse button; the cursor appears at that location.Second, instead of forcing you to type or issue commands from the key ­ board, the mouse and mouse-based operating systems let you choose com ­ mands from easy-to-use menus and dialog boxes (see Figure 2A. 15). The result is a much more intuitive way to use computers. Instead of remembering obscure command names, users can figure out rather easily where com ­ mands and options arc located. FIG U R E 2A. 11 Anexam ola pointeras it m ple ight appearona com puterscreen. ^ o r ^ f f c iN E For m Inform ore ationonm ice andm ousemanufacturers,vsil http://www. mhhe. com/ petemoiton. FIGURE 2 A . 1 2 Thepartsofa mechanical m ouse,seen fro Vieb m m otto . NortO N L IN E Formoreformation onoptical mice, visit h ttp://wvrw. mhhe. com/ petemorion Q Whenthe mouse mom†¦ ^ †¦ he rolling mouse bail spins me rollers Q Thertormafa i from the spinning roMereIs sent to the system software,wNcti controls the pointer. FIGURE 2A. 13 H them ow ousecontrolsthepointer. Interacting with Your Computer 55 1 Urheberrechtlich geschi i: FIGURE 2A. 14 The underside ol anoptical mouse. If you use a drawing program, you can use the mouse to crcatc graphics such as lines, curves, and freehand shapes on the scrccn. The mouse has helped establish the com* purer as a versatile tool for graphic designers, starting w hat has since bccome a revolution in the graphic de* sign field. Using th e Mouse For more MormaUcn on mouse techniques, w sl http://www. mhhe. com/ petemortonYou use a mouse to move the pointer to a location on the screen, a process called pointing. Everything you do with a mouse is accomplished by com bining point ­ ing w ith these techniques:  » Clicking  » Double-clicking  » Dragging à ‚ » Right-clicking :: FIGURE 2A. 15 Using the mouse to choose a command Irom a menu. r*e Cdt ym ?e «xh ? o fcsownarks Ctrl+N ( New U*vn)4lCir SVQctow N&† *I Ofwn Web Location†¦ CtrHSMt+l Qpen Fie†¦ 0 SM CblfO Qrl+W OrM-S CdtPaga Send Page†¦ OrUâ‚ ¬ Q rffP Print P is WoifcCffine _  » fe t Q jW } 1 Pointing means pushing the mouse across your desk. O n the scrccn, the pointer moves in relation to the mouse (see Figure 2A. 16).Push the mouse forward, and the pointer moves up. Push the mouse to the left, and the pointer moves to the left. To point to an ob ­ ject or location on the scrccn, you simply use the mouse to place the pointer on top of the object or location. The mice that come w ith IBM-compatible computers usually have two buttons, but tech ­ niques such as clicking, double-clicking, and dragging arc usually carried out w ith the left mouse button (see Figure 2A. 17). In m ulti ­ button mice, one button must be designated :: FIGURE 2A. 16 Usi ng the mouse to control the on-screen pointer. The pointer moves in relation tothe mouse's movements. 56 Chapter 2 Urheberrechthch geschutztes Ma s the â€Å"primary† button, re ­ InWindows and m any The left mouse button Windows programs, the ferred to as the mouse button. is usualy the primary right mouse button Some mice can have three or button. can be used in more buttons. The buttons' manyways, too. uses arc determined by the computer's operating system, application software, and mouse-control software. To click an item w ith the mouse, you move the pointer to the item on the scrccn. When the pointer touches the object, quickly press and release the primary mouse button once â€Å"d c k † {see Figure 2A. 18). Clicking— or single-clicking, as it is also called— is the most important mouse action. To select any object on the screen, such as a menu, com mand, or button, you click it.Double-clicking an item means pointing to the item with the mouse po inter and then pressing and releasing the mouse button twice in rapid succession (see Figure 2A. 19). Double-clicking is prim arily used with desktop objects such as icons. For example, you can double-click a pro ­ †¢click click† gram's icon to launch the program. Dragging an item means positioning the mouse pointer over the item, pressing the primary mouse button, and holding it down as you move the mouse. As you move the pointer, the item is â€Å"dragged† along with it across the scrccn (see Figure 2A. 20). You can then drop the item in a new position on the screen. This technique is also called drag-and-drop editing, or just drag and drop. Dragging is a very handy tool.In a wordprocessing program, for exam ­ -and release the button ple, you can drag text from one Hold down the when you finish dragging. primary button 4 location to another in a docu ­ a s you move ment. In a file-managemcnr th e m o u se.. program, you can drag a docu ­ ment's icon and d rop it onto a printer's icon to print the docu ­ ment. W indows and many W in ­ dows programs support rightclicking, which means pointing to an item on the screen, then pressing and releasing the right mouse button (see Figure 2A. 21). Right-clicking usually opens a shortcut menu that contains commands and options that pertain to the item to which you arc pointing.A wheel mouse has a small wheel nestled among its but ­ tons (see Figure 2A. 22). You can use the wheel for various purposes, one o f which is scrolling through long docu ­ ments. N ot all applications and operating systems support the use o f the wheel. FIGURE 2A. 17 Standardbutton configuration ona tw obuttonmouse. FIGURE 2A. 18 Clicking a mouse. FIGURE 2A. 19 DoUbie-dlcWnga mouse. FIG URE 2A. 20 Bragging with a mouse. FIG URE 2A. 21 RiQht-dictonga mouse. Interacting with Your Computer 57 U rheberrechtlich g esch u tz tes al Nor Mouse Button Configurations m IN E For m tatorm ore atJononthecare andusageofrrtce. v isit http://www. mhhe. com/ pctemorton FIGURE 2A. 22 Avrfieel mouse.The mouse usually sits to the right of the keyboard (for right-handed people), and the user maneuvers the mouse with the right hand, pressing the left button with the right forefinger. For this reason, the left mouse button is sometimes called the primary mouse button. If you are left-handed, you can configure the right mouse button as the primary button (as shown in Figure 2A. 23). This configuration lets you place the mouse to the left of the keyboard, control the mouse with your left hand, and use your left fore* finger for most mouse actions. Newer mice enable you to configure buttons to perform different tasks than clicking. You might configure a button to delete selected text, for ex ­ ample, or to open a program that lets you search for files.Such settings may lim it the usefulness of the mouse but can be helpful if you need to perform a certain task many times. m 3 MW^waau^MOUl Variants of the Mouse Althou gh the mouse is a handy tool, some people do : MMbi not like using a mouse or have difficulty maneuvering 1(0* one. For others, a mouse W D i W tfW w : requires too much desktop jo* space—a real problem when you are not working at a deskl Uw aJi | tM For these reasons and others, hardware makers have developed devices that Cm * k 1 m * 1  « duplicate the mouse's func ­ tionality but interact with the user in different ways. The primary goals or these â€Å" mouse variants'* are to provide case of use while taking up less space than a mouse.They all remain sta ­ tionary and can even be built into the keyboard. Trackballs A trackball is a pointing device that works like an upside-down mouse. You rest your index finger or thumb on an exposed ball, then place your other fingers on the buttons. To move the pointer around the screen, you roll the ball with your in ­ dex finger or thumb. Because you do not move the whole device, a trackball re ­ quires less space than a m ouse. Trackballs gained popularity with the advent of laptop computers, which typically are used on laps or on small work surfaces that have no room for a mouse. Trackballs come in different models, as shown in Figure 2A. 24.Some track ­ balls are large and heavy with a ball about the same size as a cue balL Others are much smaller. Most trackballs feature two buttons, although three-button models http://www. mhhe. com/ pctemorton 58 Chapter 2 Urheberrechlllch geschOtztes Ma SELF-CHECK :: Circle the correct answer for each question. 1. Themost com onkeyboard layout hasabout this manykeys. m a. 10 a. s t/ h i k e y h. 100 b. sh o rtc u t k e y c. 110 c. a lte rn a je key IB il 2. Wfochspecial keyboardkey has a picture of theWindows logoonit? 3. Most full-si2e PCs feature oneof these as the pointingdevice. a. Keyboard b. Mouse c. Scanner † p w | are also available. Trackball units also are available in right- and left-handed models. TrackpadsThe trackpad (also called a touchpa d) is a stationary pointing device that many people find less tiring to use than a mouse or trackball. The movement of a finger across a small touch-sensitive surface is translated into pointer movement on the computer screen. The touch-scnsitivc surface may be only 1. 5 or 2 inches square, so the finger never has to move far. The trackpad's size also makes it suitable for a notebook computer. Some notebook models feature a built-in trackpad rather than a mouse or trackball (sec Figure 2A. 25). Like mice, trackpads usually are separate from the keyboard in desktop com ­ puters and are attached to the computer through a cord.Some special keyboards feature built-in trackpads. This feature keeps the pad handy and frees a port that would otherwise be used by the trackpad. Trackpads include two or three buttons that perform the same functions as mouse buttons. Some trackpads arc also â€Å" strike sensitive,† meaning you can tap the pad with your fingertip instead of using its b uttons. FIGURE 2A. 24 Trackballscomeinm shapes and any sires. Form infcxm on ore ailon tracl; ad andintegrated p s porting devces. vis* http://www. mhhe. com/ petemorton Pointers in the Keyboard Many portable computers now fea ­ ture a small joystick positioned near the middle of the keyboard, typically between the G and H keys.The joy ­ stick is controlled with either fore ­ finger, and it controls the movement of the pointer on screen. Because users do not have to take their hands off the keyboard to use this device, they can save a great deal of time and effort. Two buttons that per ­ form the same function as mouse buttons are just beneath the space ­ bar and are pressed with the thumb. Several generic terms have emerged for this device; many manu ­ facturers refer to it as an integrated FIGURE 2A. 2S Trackpad Soma notebookcomputersanddesktop keyboardsfeatire a buiK-intraefcpod Interacting with Your Computer 59 M , I Pmdunthvily Tip Saving Tim e With Keyboard Shortcu tsIn the 1980s, as programmers began packing more features into PC software, they also developed ways for users to is ­ sue an ever-increasing number of commands. Software packages came with long lists of commands, all of which had to be entered at the keyboard. (This was before the mouse came into common use. ) As a result, the computer keyboard rapidly became a valuable tool. Programmers began devising keyboard shortcuts that allow users to issue commands quickly by typing a short combination of keystrokes. Keyboard shortcuts involve using a modifier key (such as aut or cm. ) along with one or more alphanumeric or function keys. To print a document in many applications, for example the user can press ctri+p.Function keys also became important The Fl key, for ex ­ ample, became the universal way to access online help. IBMcompatible computer keyboards originally had 10 function keys; eventually the number of function keys was expanded to 12. Another common type of keyboard short cut involves pressing the a u key to access a program's menu system. When running any Windows program, you can press alt to activate the menu bar, and then press a highlighted letter in a menu's name to open that menu. Stilt a keyboard can hold only so many keys, and the lists of keyboard shortcuts became unmanageable. A single program could use dozens of â€Å"hotkeys,† as these shortcuts were called. If you used several programs, you had to learn different shortcuts for each program.Finally, the Common User Access (CUA) standard led to the standardization of many commonly used hotkeys across different programs and environments. With this standard for commonly used hotkeys, users have fewer hotkeys to remember. Despite such standards, pointing devices (such as the mouse) came along none too soon for hotkey-weary com ­ puter users. Microsoft Windows and the Macintosh operating system gained popularity because of their easy-to-use, mouse-oriented graphical interfaces. By ope rating the mouse, users could make selections visually from menus and dialog boxes. Emphasis rapidly began shifting away from the keyboard to the screen; today, many users do not know the purpose of their function keys! pointing dcvicc, while others call it a 3-D point stick.On the IBM ThinkPad line of notebook computers, the pointing device is called the TrackPoint (see Figure 2A. 26). Ergonomics and Input Devices Any officc worker w ill tell you tliat working at a desk all day can be extremely uncomfortable (see Figure 2A. 27). Sitting all day and us ­ ing a computer can be even worse. Not only docs the user's body ache from being in a chair too long, but hand and wrist injuries can result from using a keyboard and mouse for long periods. Eyes can become strained from staring at a monitor for hours. Such injuries can be extreme, threatening the user’s general health and ability to work. Much is being done to make computers easier^ safer, and more comfortable to use.Ergono mics, which is the study of the physical relationship between people and their tools—such as computers— addresses these issues. Now more than ever before, people recognize the impor ­ tance of having ergonomically correct computer furniture and using proper posture and techniques while working with computers. (The term ergonomically correct means that a tool or a workplace is designed to work properly with the human body, and thus reduces the risk of strain and injuries. ) TrackPoint : FIG U RE 2A. 26 IBM's ThinkPad computers feature the TrackPoint pointing device, and smtar donees are found in many otter portable PCs. 60 Chapter 2 Press cm+a To Toggle bold character formatting on or off for the selected or inserted ext; make letters bold or unbold Toggle italic character formatting on or off for the selected or inserted text; make letters italic Toggle underline character formatting on or off for the selected or inserted text; underline letters Oecrease font size fo r the selected or inserted text Increase font size for the selected or inserted text Remove paragraph formatting for the selected paragraph or paragraphs Remove character formatting for the selected text Copy the selected text or object Cut the selected text or object Paste text or an object Undo the last action Redo the last action c tilh Pointing, however, can slow you down. As menus and di ­ alog boxes become increasingly crowded, commands can be hard to find and their locations can be as difficult to re ­ member as keyboard shortcuts. Many computer users over ­ come these problems by using a combination of keyboard shortcuts and a pointing device. You use one hand to issue many basic shortcuts (such as cnti+f and ctrl+s) or to launch macros. A macro is a series of commands that a pro ­ gram memorizes for you. Macros enable you to issue an en ­ tire set o t commands in just a few keystrokes.Using these techniques minimizes keystrokes and leaves a hand free to use a poin ting device. The following table lists some of the shortcut keys avail ­ able in Microsoft Word. ctri-hi ctm >shift*< ct «l+shih+> CTRi+o ctri+smcebar cm -K ctri+x ctri+y ctri+z ctrl+ y Repetitive Stress Injuries The field of ergonomics did not rcccivc much attention until a ccrtain class o f in ­ juries began appearing among clerical workers who spend most o f their time en ­ tering data on computer keyboards. These ailments are called repetitive stress injuries (RSIs) or repetitive strain injuries and result from continuously using the body in ways it was not designed to work.One type of RSI that is especially well documented among computer users is carpal tunnel syndrome, a wrist or hand in ­ jury caused by using a keyboard for long periods of time. W C IW E For moreinformationon ergonomics andavok&ig computer-relatedinjuries, v a i http://www. mhhe. conj/ petemorton FIGURE 2A. 27 Experience showslhat office worftcan pose speofc healti risks. Interacting with Your Compu ter 61 Urheberrechtlich geschulzles M Transverse Cross Section of NormalW rit! FlexorTendons and Sheath . † :â„ ¢ . Inflamed Inflamedtendon sheath presses against median nerve carpal?. : : * Bones FIGURE 2A . 2 8 Carpel tunnel syndrom affectsthe e nervesrunningthroughthe carpal tunnel of thewrist. The carpal tunnel is a passageway in the wrist through which nerves pass (see Figure 2A. 28).In carpal tunnel syndrome, tendons in the tunnel bccome inflamed because the victim has held his or her wrists stiffly for long periods, as people tend to do at a keyboard. When the tendons become inflamed, they press against the nerves, causing tingling, numbness, pain, or the inability to use the hands. Carpal tunnel syndrome is the best-known repetitive stress injury. It can become so de ­ bilitating that victims can miss weeks or months of work. In extreme cases, surgery is required. Avoiding Keyboard-Related Injuries If you use a computer frequently, you can avoid RSIs by adopting a few good work habits, and by making sure that your hardware and workspace are set up in an ergonomically friendly way. At Jssue Com puter Voting— Is It a Good Thing?The dispute over electronic voting is as heated as a debate between presidential candidates. The risks versus the bene ­ fits are discussed, investigated, and argued. But what are the facts that lie beneath the fuss? The key function of an electronic voting system is to ob ­ tain voter preferences and report them—reliably and accu ­ rately. Some assert that electronic systems are safer than other methods of voting because they implement security checks and audit trails, and are tougher to tamper with than paper ballots. One of the most widely used electronic voting systems. Diebold Election Systems (http://www. diebold. com/ dieboldes/accuvote_ts. tm), boasts some 33,000 voting stations in locations across the United States. Dieboltfs AccuVote-TS system is a voter-activated interactive touch ­ scre en system using an intelligent Voter Card as the voter interface. The interface allows voters to view and cast their votes by touching target areas on an electronically gener ­ ated ballot pad. Each unit provides a direct-entry computerized voting station that automatically records and stores ballot infor ­ mation and results. While classified as a direct record entry (ORE) device, the AccuVote-TS system has additional capa ­ bilities. The tabulator is a multifunctional interface that counts and abulates the ballots at precincts on election day and communicates with the host computer at Election Central for accurate and timely jurisdictionwide results. However, electronic voting systems have generated con ­ cern because their work is not readily accessible for inspec ­ tion; what goes on behind the screen is a mystery to the general public and therefore causes uneasiness. With com ­ puter voting, voter records are intangibly stored on a hard drive, with voting results re corded in electronic memory. Indeed, a July 2003 analysis of the Diebold touch screen by computer researchers from Johns Hopkins and Rice uni ­ versities (found at http://www. newscientist. oin) showed that the software was riddled with errors and open to fraud. However, even with the possibility of fraud, electronic 62 Chapter 2 Urheberrechllich oesch When setting up your computing workspace, make it a prior ­ ity to choose a comfortable, ergonomically designed chair (sec Figure 2A. 29). Your office chair should  »  »  » Allow you to adjust its height. Provide good lower-back support. Have adjustable armrests. Your desk also should be well-suited to computer use, like the one shown in Figure 2A. 30. The desk should hold your key ­ board and mouse at the proper height, so that your hands are at the same height as your elbows (or a few inches lower) when you hold them over the keyboard.Here arc some other tips that can help you avoid RSIs while working with your keyboard and mouse:  » Use an Ergonomic Keyboard. Traditional, flat keyboards arc not well-suited to the shape of human hands. An ergonomic keyboard allows you to hold your hands in a more natural position (with wrists straight, rather than angled outward) while typing (see Figure 2A. 31).  » Use a Padded Wrist Support. If you type a lot, a wrist support can be helpful by allowing you to rest your hands comfortably when you are not actually typ ­ ing. Remember; however, that FIGURE 2A. 29 Anergonom ically designedcom puter chairanddesk. FIGURE 2A. 30 A propertydesignedcom puterdesk featuresa Udl-insfieB or traytohoWffw keyteard andm ouse. ystems may still be safer than prior methods of voting be ­ cause they implement redundant security checks and audits and may be more difficult to tamper with because of the size and nature of their tabulating components. Another argument in favor of paper ballots, or at least paper receipts, is that in order to verify an election, all you need to d o is gather up the ballots and tabulate them a sec ­ ond (or third, as the case may be) time. However, auditing paper ballot systems is not always as easy as it sounds. Bal ­ lots, particularly punch-cards, sometimes provide ambigu ­ ous results, as seen in a recent presidential election. They are easily forged and they must be physically handled and transported, which provides the opportunity for substitu ­ tion or loss.Whether computerized or traditional, no election system is infallible, and in truth, perhaps it doesn't need to be. As some have said, every safe has the capability to be cracked. The same is true for voting systems. The issue is not whether they are 100 percent secure, but whether they pre ­ sent adequate safeguards to give us faith in the integrity of our elections. n Interacting with Your Computer 63  »  »  »  » you should never rest your wrists on anything—even a comfortable wrist support—while you type. Use the support only when your fingers are not moving over the keyboard. Keep Your Wrists Straight. When typing, your hands should be in a straight line with your forearms, when viewed either from above or from the side (see Figure 2A. 32).Keeping the wrists bent in cither direction can cause mus de fatigue. Sit Up Straight. Avoid slouching as you type, and keep your feet flat on the floor in front of you. Avoid crossing your legs in front of you or under your chair for long periods. Learn to Type. You w ill use the keyboard more efficiently and naturally if you know how to type. If you M hunt and peek,† you are more likely to slouch and keep your head down while looking at rite keyboard. This tech ­ nique not only slows you down, but it leads to fatigue and stiffness. Take Frequent Breaks. Get up and move around for a few minutes each hour, and stretch occasionally throughout the day. FIGURE 2A. 31Anexam ol anergonom keyboard. ple ic FIGURE 2A. 32 Whent> in . your handsshouldbein pg & eWin yourforea rm al all tonesand n s whenviewedfromanyantfe. 64 Chapter 2 Urheberrechlllch geschutzte Review Summary ::  » A standard computer keyboard has about 100 keys.  » Most keyboards follow a similar layout, with their keys arranged in five groups. Those groups include the alphanumeric keys, numeric keypad, function keys, mod ­ ifier keys, and cursor-movement keys.  » When you press a key, the keyboard controller places a code in the keyboard buffer to indicate which key was pressed. The keyboard sends the computer a signal, which tells the CPU to accept the keystroke. The mouse is a pointing device that lets you control the position of a graphical pointer on the screen without using the keyboard.  » Using the mouse involves five techniques: pointing, clicking, double-clicking, drag ­ ging, and right-clicking.  » A trackball is like a mouse turned upside-down. It provides the functionality of a mouse but takes less space on the desktop.  » A trackpad is a touch-sensitive pa d that provides the same functionality as a mouse. To use a trackpad, you glide your finger across its surface.  » Many notebook computers provide a joystick-like pointing device built into the keyboard. You control the pointer by moving the joystick.On IBM systems, this de ­ vice is called a TrackPoint Generically, it is called an integrated pointing device.  » Continuous use of a keyboard and pointing device can lead to repetitive stress injuries.  » The field of ergonomics studies the way people use took. This study leads to bet ­ ter product designs and techniques that help people avoid injuries at work.  » Ergonomically designed keyboards are available to help users prevent repetitive stress injuries to the wrists and hands. Key Terms :: alphanumeric key, 60 buffer, 54 carpal tunnel syndrome, 61 click, 57 cursor, 52 cursor-movement key, 52 double-clicking, 57 drag and drop, 57 drag-and-drop editing, 57 dragging, 57 ergonomics, 60 function key. 51 insertion point 52 integrated pointing device. 9 keyboard buffer, 54 keyboard controller, 53 keyboarding, 50 mechanical mouse, 55 modifier key, 50 numeric keypad, 51 optical mouse, 55 pointer, 54 pointing, 56 pointing device. 54 repeat rate, 54 repetitive stress injury (RSI), 61 right-dicking, 57 trackpad, 59 TrackPoint 60 wheel mouse, 57 Interacting with Your Computer 65 Urheberrechtlich g esch u tztes M « | tLg §g @ 8 0 K ey Term Quiz :i Review Complete each statement by writing one of the terms listed under Key Terms in each blank. 1. In computer use, the skill of typing is often referred to as 2. IBM -com patible PCs have 10 or 1 2______________ keys. . 3. In many programs, an on-screen symbol called a(n )___________ or a(n )____________ shows you where you are in a document 4.A(n) is a temporary storage area that holds data until the CPU is ready for it. 5. In addition to pointing, the four primary mouse techniques are and___________ _ 6. You use a mouse (or one of its variants) to position a (n )_____ 7. In many Windows applications, you can open a shortcut menu by. on the screen. ______ the mouse. 8. Many laptop computers feature a small joystick between the c and k keys, which is called a(n) a(n )———-9. is the study of the way people work with tools. 10. _____ is a common type of repetitive stress injury among computer users. Multiple Choice is Circle the word or phrase that best completes each statement. 1.Some people claim that when computers can interpret handwriting and speech with 100 percent accuracy, this will become unnecessary. a. mice a. special-purpose keys b. typing b. function keys c. pointing device c. typing keys †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ – – layout. d. special-purpose keys d. alphanumeric keys d. QWERYT d. iadsmce 2. These keys make up the part of the keyboard that looks like a typewriter's keys, 3. The common keyboard arrangement is called the a. QWERTY b. QEWTYR 4. Which of the following is not a modifier key? a. shift b. cm c. ait 5. In most programs, you can press this key to get help, a. csc a. keyboard a. C C S b. r l b. keyboard buffer b. f1 c . alt c . keyboard controller C. SM CEBAR d . no d. keyboard CPU d.S O T U H RCT 6. When you press a key, this device notifies the system software, 7. In many Windows applications, you can use this key as an alternative to the right mouse button. c. QYWERT 66 Chapter 2 Urheberrechtlich geschutztes Material | 8. This type of mouse uses reflected light to measure its movements. c. mechanical a. optical b. laser 9. In a multi-button mouse, one button must be designated as the c. primary a. first b. left 10. You can__ a. point to a program's icon to launch the program. b. double-click C. right-click button. d. user d. drag Review d. wheel Review Questions :: In your own words, briefly answer the following questions. 1.Host standard keyboards include five major groups of keys. List them. 2. Why are most standard keyboards called â€Å"QWERTY† keyboard s? 3. What does the ctrl key do? 4. What is the purpose of the start key, which appears on many IBM-compatible keyboards? 5. What happens when you press a key on the computer's keyboard? 6. What is the purpose of the mouse pointer? 7. How does a mechanical mouse work? 8. Describe two benefits of using a mouse. 9. What does the term dragging mean and how do you do it? 10. Describe the cause and effect of carpal tunnel syndrome. Lesson Labs :: Complete the following exercises as directed by your instructor. 1. Test your typing skills in Notepad.Click the start button, point to All Programs, click Accessories, and then dick Notepad to open the Notepad text-editing program. Notepad opens in a window. Have a classmate time you as you type a paragraph of text. The paragraph should be at least five lines long and should make sense. (For example, you could type a paragraph of text from any page in this book. ) Do not stop to correct mistakes; keep typing until you are finished typing the se lection. 2. Inspect your system's mouse settings. (Do not change any settings without your instructor's permission. ) Use the following steps: a. Click the start button to open the Start menu; then click Control Panel.The Control Panel window opens. b. Double-dick the Mouse icon to open the Mouse Properties dialog box. Click the tabs in this dialog box and inspect your settings. c. Experiment with the Pointer Speed and Show Pointer Trails tools. How do they affect your mouse's performance. When you are finished, dick Cancel Interacting with Your Computer 67 M U R B Overview: O ptions for Every N eed a n d P referen c e Although the keyboard and the mouse arc the input dcviccs that people use most often, there are many other ways to input data into a com ­ puter. Sometimes the tool is simply a matter of choice. Some users jusr prefer the feel of a trackball over a mouse.In many cases, however, an ordinary input device may nor be the best choice. In a dusty factory or warehouse, for example, a standard keyboard or mouse can be dam* aged if it becomes clogged with dirt. Grocery checkout lines would slow down dramatically if cashiers had to manually input product codes and prices. In these environments, specialized input devices tolerate extreme conditions and reduce the risk of input errors. Alternative input devices are important parts of some specialpurpose computers. Tapping a handheld computer's scrccn with a pen is a much faster way to input commands than typing on a miniature key ­ board. On the other hand, a specialized device can give new purpose to a standard system.If you want to play action-packed games on your home PC, for example, you w ill have more fun if you use a joystick or game controller than a standard keyboard or mouse. This lesson examines several categories of alternative input devices and discusses the special uses of each. You may be surprised at how of ­ ten you see these devices, and yo