ࡱ> )+&'(#`  bjbj S% tXtXtXY Z [n\^\\\]ab$ hrr jd]]jdjd \\jjjjd0 \ \jjdjj& \[ {hNtXed{0bh ;c>yc,jc$c;c;c;c.jd;c;c;cjdjdjdjd KtX tX  Computer Concepts Chapter Four: Operating Systems and File Management A Guide to this Instructors Manual: We have designed this Instructors Manual to supplement and enhance your teaching experience through classroom activities and a cohesive chapter summary. This document is organized chronologically, using the same heading in blue that you see in the textbook. Under each heading you will find (in order): Lecture Notes that summarize the section, Figures and Boxes found in the section (if any), Teacher Tips, Classroom Activities, and Lab Activities. Pay special attention to teaching tips, and activities geared towards quizzing your students, enhancing their critical thinking skills, and encouraging experimentation within the software. In addition to this Instructors Manual, our Instructors Resources CD also contains PowerPoint Presentations, Test Banks, and other supplements to aid in your teaching experience. For your students: Our latest online feature, CourseCasts, is a library of weekly podcasts designed to keep your students up to date with the latest in technology news. Direct your students to HYPERLINK http://coursecasts.course.com http://coursecasts.course.com, where they can download the most recent CourseCast onto their mp3 player. Ken Baldauf, host of CourseCasts, is a faculty member of the Florida State University Computer Science Department where he is responsible for teaching technology classes to thousands of FSU students each year. Ken is an expert in the latest technology and sorts through and aggregates the most pertinent news and information for CourseCasts so your students can spend their time enjoying technology, rather than trying to figure it out. Open or close your lecture with a discussion based on the latest CourseCast. Table of Contents  HYPERLINK \l "Chapter_Objs" Chapter Objectives 2 HYPERLINK \l "SectionA" Section A: Operating System Basics2 HYPERLINK \l "SectionB" Section B: Todays Operating Systems4 HYPERLINK \l "SectionC" Section C: File Basics7 HYPERLINK \l "SectionD" Section D: File Management10 HYPERLINK \l "SectionE" Section E: Backup Security13 HYPERLINK \l "Key_Terms" Glossary of Key Terms17 Chapter Objectives Students will have mastered the material in Chapter Four when they can: Describe the way operating systems handle each computer resource Identify operating systems used on todays personal computers, PDAs, and servers; describe their strengths and weaknesses Explain the significance of multitasking, multithreading, and multiprocessing List six steps that occur during the PC boot process Explain the relationship between an operating system and a user interface Give examples of tasks that might benefit from dual booting or virtual machine capability Describe the significance of file formats; list at least 10 commonly used formats and their extensions Create valid names for files and folders, plus demonstrate that you can construct and trace file paths Demonstrate how to use file management features of application software and operating system utilities Describe how a computer physically stores data on disks, but represents this storage system with a logical model Demonstrate that you can implement a viable backup and restore plan Compare the advantages and disadvantages of using tapes, USB flash drives, a second hard disk, CDs, DVDs, networks, and Web sites for backups Explain the importance of a recovery disk Describe the importance of restore points when using Windows SECTION A: OPERATING SYSTEM BASICS Operating System Activities LECTURE NOTES Students have difficulty understanding operating systems and their functions. Explain that the computer purchased without an operating system is nothing more than a box with hardware components. The operating system software makes the connection with the hardware to display the Windows desktop. Stress that the operating system software does not have the capability to create a letter or a spreadsheet. It is the controller of the hardware and the application environment. Use Figure 4-6 to introduce the Control Panel. The Control Panel presents a good overview of the tasks of an operating system. FIGURES Figure 4-1, Figure 4-2, Figure 4-3, Figure 4-4, Figure 4-4, Figure 4-6 CLASSROOM ACTIVITIES Assign a Project: Have students perform an Internet search and see what information they can find about operating systems. What operating systems are available? Can they find good descriptions of how operating systems work? Quick Quiz: _________ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously. (Answer: Multitasking.) Within a single program, _____ allows multiple parts, or threads, to run simultaneously. (Answer: multithreading.) True/False: An operating systems multiprocessing capability supports a division of labor among all the processing units. (Answer: True.) User Interfaces LECTURE NOTES Show as many different operating systems as you can, focusing on the user interface. Show how to perform a typical task in a command-line OS and how to perform the same task in a GUI. Demonstrate how to display a list of files, start a program, or copy a file. Use the demonstration computer to show how Windows or Mac OS use the various desktop elements like icons, windows, and menu bars to facilitate the user experience. Discuss the ways in which the myriad options available to a user of a given application are presented via these mechanisms, and discuss how the user is, to a large degree, allowed to work the way he or she wants to, because of the many different ways that exist to perform a function. FIGURES Figure 4-7, Figure 4-8, Figure 4-9, Figure 4-10, Figure 4-11, Figure 4-12 CLASSROOM ACTIVITIES Class Discussion: After outlining the characteristics of each OS, ask students to debate the merits of two or more operating systems. Quick Quiz: A(n) _________ is the combination of hardware and software that helps people and computers communicate. (Answer: user interface.) A(n) ____________ user interface requires users to type commands. (Answer: command-line.) True/False: All of the popular operating systems use graphical user interfaces. (Answer: True.) The Boot Process LECTURE NOTES Review the six major events that occur during the boot process. Discuss why the operating system cannot simply be left in memory, even with the advent of EEPROM. FIGURES Figure 4-13 TEACHER TIP If possible, use a classroom computer to demonstrate the boot process. CLASSROOM ACTIVITIES 1. Assign a Project: Use Windows Task Manager to view a list of the processes that are being executed by the microprocessor on the computer in your classroom. 2. Quick Quiz: The _____ provides essential operating system services, such as memory management and file access. (Answer: kernel) True/False: A GUI provides a way to point and click a mouse to select menu options and manipulate graphical objects that are displayed on the screen. (Answer: True) ______________ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously. Multitasking Multithreading Networking Multiprocessing (Answer: a. Multitasking) SECTION B: TODAYS OPERATING SYSTEMS Microsoft Windows LECTURE NOTES Discuss Figure 4-15. Explain that Windows has a long history as a leading operating system. Review the changes that have occurred in operating systems over time and discuss the impact these changes have had on personal computing. FIGURES Figure 4-14, Figure 4-15, Figure 4-16 TEACHER TIP Discuss the prevalence of Windows with students. Note that more than 80% of all PCs are running Windows. Is this a good thing? Many computer viruses take advantages of weaknesses in the Windows operating system, which are not a threat to computers running UNIX or Linux. CLASSROOM ACTIVITIES Class Discussion: Ask students to discuss their experiences with Microsoft Windows. Why do they think Windows is so popular? What are the strengths and weaknesses of Windows in their opinions? Quick Quiz: Microsoft Windows is installed on more than __% of the worlds personal computer. (Answer: 80) True/False: The number and variety of programs that run on Windows are unmatched by any other operating system. (Answer: True.) True/False: Windows has been criticized for two major weaknesses: reliability and security. (Answer: True.) LAB ACTIVITY The New Perspectives Lab Working with Windows Explorer deals with issues that relate to this section of the textbook. You might want to go through the lab during class time if you have a computer with a projection device. Or, assign this lab for students to do outside of class. Mac OS LECTURE NOTES Compare Mac OS vs. Windows. Ask students whether they use the Mac or Windows OS. Discuss the differences from a user perspective. Introduce the dual boot. A major recent innovation has been the ability of the Mac OS X on an Intel Mac to run both software designed for the Macintosh and software designed for Windows. What are the implications of this development? Do you expect it to have a significant impact in this area? TEACHER TIP For emphasis, as an in-class demonstration, set up two computers side-by-side and run the Mac OS on one and Windows on the other. Let students explore each to determine their opinions of the operating systems. FIGURES Figure 4-17, Figure 4-18, Figure 4-19, Figure 4-20 CLASSROOM ACTIVITIES Class Discussion: Ask students to identify themselves as Mac or PC users. Divide students into groups according to their responses and ask them to debate the pros and cons of each system. Quick Quiz: ____________ refers to the ability to work with products designed for prior-generation hardware or software. (Answer: Backward compatibility.) True/False: Mac OS X has a reputation for being a difficult-to-use operating system. (Answer: False.) True/False: Mac OS X on an Intel Mac offers the ability to run Windows and Windows application software. (Answer: True.) LAB ACTIVITY Refer students to the New Perspectives Web site for the Student Edition Labs called Spreadsheets and Advanced Spreadsheets. UNIX and Linux LECTURE NOTES Explain that Linux is a free operating system. Visit a Linux Web site, or if you have access to a computer running Linux, show students how to do some tasks. Use it as a jumping-off point for a discussion of open source programming. FIGURES Figure 4-21 CLASSROOM ACTIVITIES Quick Quiz: True/False: UNIX and Linux are the same thing. (Answer: False.) True/False: Linux is designed for mainframes. (Answer: False.) True/False: UNIX developed a good reputation for dependability. (Answer: True.) DOS LECTURE NOTES While discussing operating systems, distinguish between desktop and server operating systems. The charts below emphasize the unique features of the different types of operating systems available: DESKTOP OS OUTSTANDING FEATURESDOSOne of the first operating systems; command-line user interfaceMac OSDesigned by Apple computers; graphical user interfaceWindows 95Features multitasking and networking capabilitiesWindows 98Similar to Windows 95, but with increased disk and memory management Windows MeSimilar to Windows 98, but with more features for the home user, including multimedia supportWindows 2000Increased security features; ability to support specialized applicationsWindows XPRedesigned structure and interface, improved safety and recovery tools, greater support for multimedia and networkingWindows VistaEnhanced security, more flexible file management, more powerful search capabilities, and live icons that show document thumbnails SERVER OS OUTSTANDING FEATURESLinuxVariation of UNIX; used as a server OS for microcomputers and minicomputers; available as freewareNovellDeveloped for microcomputer networks; typically used by network managersUNIXDesigned as a minicomputer OS, now popular for all sizes of network and Web servers; makes use of both command-line and graphical interfaces TEACHER TIP If possible, demonstrate DOS on a classroom computer. Ask students their thoughts about DOS. Does it seem like a foreign concept to them or are they familiar with it? FIGURES Figure 4-22 CLASSROOM ACTIVITIES Assign a Project: Have students search the Web for information about DOS and report their findings. Can they find good reasons to be familiar with DOS? Quick Quiz: DOS stands for __________. (Answer: Disk Operating System.) True/False: DOS is still a relevant, frequently used operating system. (Answer: False.) LAB ACTIVIY Refer students to the New Perspectives Web site for a Student Edition Lab called Databases. Handheld Operating Systems LECTURE NOTES Explain the physical limitations of PDAs that dictate the features of their operating systems. TEACHER TIP If you have a PDA, use it to demonstrate the operating system. What features are similar to those of Windows and Mac OS? Which features are different? FIGURES Figure 4-23 SECTION C: FILE BASICS File Names and Extensions LECTURE NOTES Demonstrate both Windows Explorer and My Computer to students, with file name extensions showing. Show the connection between the icon used for the file and the file type. Review the view options in My Computer and Windows Explorer to display files. Show the Open and Save As dialog boxes in applications such as Microsoft Word, Paint, WordPad, and PhotoShop. Click the Files of type list arrow to show the formats the application can open and which ones they can save. Some applications convert file formats when you use the Save As command and choose a different file type. TEACHER TIP File naming conventions differ by operating system. Have students start by learning the conventions only for the operating system they use in your school labs, then build on their knowledge for other operating systems. Trying to memorize rules for all the operating systems at one time may be difficult for a novice user. Finding files with specific names and specific folder locations is difficult for students. Have students save a file in Microsoft Word and then try to find the folder location. Most students do not look at the Save In drop down box when saving files. FIGURES Figure 4-24, Figure 4-25 CLASSROOM ACTIVITIES Group Activity: Divide the class into two groups and challenge the groups to list as many file extensions as they can think of or find on classroom computers. Which group can list the most? Quick Quiz: A(n) _________ is an optional file identifier that is separated from the main file name by a period. (Answer: file extension.) True/False: Each operating system has a unique set of file-naming conventions. (Answer: True.) True/False: Reserved words cannot be used as file names. (Answer: True.) File Directories and Folders LECTURE NOTES Directories and subdirectories are a troublesome concept for many students. Windows Explorer is a dramatic aid to help students visualize the structure of files on a disk. Use the cardboard box analogy: Each directory is a box. Each box has a name. Boxes can contain papers (files) or folders (subdirectories). Once students understand the idea of directories, explain that files are not physically stored in a structure that reflects the directory tree. Although some people like to use a directory analogy in which each directory is like a slice of a pie or disk, the files in a directory are not necessarily stored in a certain physical area of the disk. The directory structure is a logical model that helps us think about the organization of files on a disk. Show how Windows Explorer and My Computer provide file size and date information in Details view. TEACHER TIP File size becomes especially important when disk space is limited. The file date becomes important when you are tracking work and want to make sure you have the most recent copy of a file. Compare file sizes of Word documents to Paint files and explain why the sizes vary. FIGURES Figure 4-26 CLASSROOM ACTIVITIES Assign a Project: Have students research why the main hard disk drive is usually referred to as drive C. Quick Quiz: A(n) ________ is a section of a hard disk drive that is treated as a separate storage unit. (Answer: disk partition.) True/False: The main directory is called the base directory. (Answer: False.) ___________ is usually measured in bytes, kilobytes, or megabytes. (Answer: File size.) File Formats LECTURE NOTES Explain that most programs, such as Microsoft Office XP and 2003 automatically add the extension to the file name. Review the reasons given on page 209 for files failing to open as expected. This is a common source of frustration for new users of computers, especially those who receive an e-mail attachment, for example, for which they do not have an application that can open the file. Using an application such as Microsoft Excel or Access, show students how to convert a file using the Save As dialog box and using the Export command on the File menu. Compare these two methods and discuss when to use one or the other. TEACHER TIP Remind students to be careful when renaming files, and remind students of the implications in changing a file extension. Demonstrate this by having students use a file in one format, such as My File.bmp, and rename it so it has a different file extension, such as My File.doc. Ask them to try opening the renamed file in Paint and then in Word and discuss what happens and why. FIGURES Figure 4-27, Figure 4-28, Figure 4-29, Figure 4-30, Figure 4-31, Figure 4-32 CLASSROOM ACTIVITIES 1. Assign a Project: Have students find a specific folder and list three file names with different extensions. Students should note the folder name as well as the files. 2. Quick Quiz: A file is a named collection of _____ that exists on a storage medium, such as a disk, CD, DVD, or tape. (Answer: data) True/False: A file name extension is an optional file identifier that is separated from the main file name by a comma, as in Help,com. (Answer: False) The maximum length of a file name using current versions of Windows is _______. 8-character file name plus an extension of 3 characters or less 31 characters 255 characters 256 characters (Answer: c. 255 characters) SECTION D: FILE MANAGEMENT Application-based File Management LECTURE NOTES Demonstrate how to use the Open and Save dialog boxes in a typical Windows application. Take time to show all the information the Save dialog box provideslocation for the file, file name, and file typeor use Figures 4-33 and 4-35. Mention that many programs allow you to set a default folder location to save files. Give an example: a personal folder in Word will always be saved in C:\Personal\Yourname. Word allows you to set this folder as the default folder using Options from the Tools menu. Once this is established, all files will save to this location. If the need arises to save files to other locations, then you would locate the folder in the Save In drop-down box. FIGURES Figure 4-33, Figure 4-34, Figure 4-35 TEACHER TIP The best way to understand how to manage files using the Open, Save, and Save As commands in a Windows application is to have students perform these tasks themselves. If possible, let students work in the lab to create a short document about file basics, for example. Have them save the file on a CD or zip drive with a name such as File Basics.doc and close the document. Then ask them to open the File Basics document, add information about managing files, and use the Save As command to save the document as File Basics and Management.doc. CLASSROOM ACTIVITIES Assign a Project: Have students write a brief explanation of the difference between Save and Save As. Quick Quiz: A(n) __________ is a piece of information that describes a file. (Answer: file tag.) True/False: You can name a file and specify its storage location in the Save As dialog box. (Answer: True.) LAB ACTIVITY Refer students to the New Perspectives Web site for a Student Edition Lab called Managing Files and Folders. File Management Utilities LECTURE NOTES Explain that file management utilities help you manage files by providing a big picture of the files on your computer. Explain that although file management utilities vary from one operating system to another, they rely on the same basic principles. As students become familiar with the concepts of device letters and folders, they will be able to navigate through most computer systems. FIGURES Figure 4-36 CLASSROOM ACTIVITIES Quick Quiz: __________ utilities give you the big picture of the files you have stored on disks. (Answer: File management.) True/False: You can change the way the Windows file management utility shows files. (Answer: True.) File Management Metaphors LECTURE NOTES Use Figure 4-37 to show how drives, folders, and files fit the tree metaphor. Ask students if they have developed any metaphors for themselves to help them understand how to organize or find files. FIGURES Figure 4-37, Figure 4-38 CLASSROOM ACTIVITIES Assign a Project: Have students sketch the file structure they will use for their personal files. Quick Quiz: What are two metaphors typically used for storage on personal computers? (Answer: Filing cabinet, tree.) Windows Explorer LECTURE NOTES Discuss what Windows Explorer looks like as a program. On a demonstration computer, show the Windows Explorer window, pointing out the two panes and explaining what they show. The left pane shows the big picture view of the computers hierarchy of storage devices and folders. If you click a folder in the left pane, for example, the right pane shows the folders and files in the selected folder. Discuss moving, copying, and renaming files and folders in Windows Explorer. Make sure students understand that a files true name includes its path as well as the individual file name; demonstrate this in Windows Explorer by creating files with identical file names and extensions, but store them in folders with different names. FIGURES Figure 4-39, Figure 4-40 TEACHER TIP Point out the Details pane and explain how this can help identify and distinguish poorly named files, saving time that wouldve been spent opening and perusing the file to identify it. CLASSROOM ACTIVITIES Assign a Project: Have students open and explore Windows Explorer. Quick Quiz: True/False: You can rename files in Windows Explorer. (Answer: True.) True/False: You can copy files in Windows Explorer. (Answer: True.) True/False: You cannot delete files in Windows Explorer. (Answer: False.) File Management Tips LECTURE NOTES Review each tip with the class. Go around the room and ask students to explain why he or she thinks the item is important. Ask for examples of errors or file disasters that could be attributed to ignoring these tips. FIGURES Figure 4-41 CLASSROOM ACTIVITIES Assign a Project: Have students list the guidelines for file management. A complete list is provided on pages 217-218. Physical File Storage LECTURE NOTES Emphasize to students that even when a disk is defragmented, the physical organization is still not equivalent to the conceptual organization. Although a directory analogy in which each directory is like a slice of a pie or disk works as a logical model, all the files in a directory are not necessarily stored in the same physical area of the disk. A logical model is not meant to accurately reflect the physical organization of the disk itself. Explain that although a disk is physically laid out in tracks and sectors, a cluster is the smallest unit accessible by most microcomputer operating systems. In Windows, a cluster is composed of two sectors. Students may skip over Figure 4-44 without studying it thoroughly. Spend some time talking about it. The main point is that the index file tracks the location of files on disks. Help your students see how the file Jordan.wks is stored in different sectors. Use Figure 4-42 to show what an operating system does when it formats a disk. Demonstrate how to defragment a disk by using a floppy disk or other removable disk that needs to be defragmented. Start the Disk Defragmenter tool, use the Details view to explain what Windows is doing as it defragments, and then let it run for the length of the class. At the end of your class session, examine the progress or results of the defragmentation. Discuss what happens when a file is deleted. Is it really deleted, or can it be recovered? Show students how to use the Recycle Bin folder to find files that they have deleted. Show how to erase files from the Recycle Bin, and discuss file shredder software that truly eradicates data from your disk. TEACHER TIP Remind students that defragmenting disks might be done at the end of the business day or overnight to avoid use of the computer. The conceptual model of folders and files does not reflect the physical reality of the way in which files are stored on a disk. Students may confuse this statement with the explanation of fragmentation discussed later in the section. Remind students that random-access storage allows files to become physically divided up all over a disks surface. Although this does not mean that the file itself becomes unreadable, it does make it harder for a drive to read the file efficiently. The process of defragmentation helps to organize the disk by rearranging the files on the disk so that they are stored in contiguous clusters. FIGURES Figure 4-42, Figure 4-43, Figure 4-44, Figure 4-45 LAB ACTIVITY Refer students to the New Perspectives Web site for a Student Edition Lab called Maintaining a Hard Drive. CLASSROOM ACTIVITIES 1. Assign a Project: Have the students draw a diagram of the hierarchy of the folder structure of their own PC, if they have one. Students should compare their results with other students. 2. Quick Quiz: File management utilities often use some sort of storage _______ to help users visualize and mentally organize the files on disks and other storage devices. (Answer: metaphor) True/False: The pane on the left side of the Windows Explorer lists each of the storage devices connected to your computer, plus several important system objects, such as My Computer, My Documents, My Network Places, and the Desktop. (Answer: True) When working with Windows Explorer, you can select noncontiguous files by holding down the _______. Ctrl key and clicking each of them Alt key and clicking each of them (Answer: a) Shift key and clicking each of them mouse and pressing the down arrow key SECTION E: BACKUP SECURITY Security Backup Basics LECTURE NOTES Use Figure 4-48 to evaluate the strengths and weaknesses of each backup device. Review external hard disks and their advantages in the backup process. Why are these useful? Because they can be stored in a secure location, such as a safe, or a fireproof vault. Disaster can happen to anyone. Refer to the following table to show how easily data can be destroyed: Factor Unintentional data loss Inaccurate dataIntentional data loss or damageOperator errorXXPower failure, surge, or spikeXDamaged hardwareXNatural disastersXComputer virusXTrojan horsesXWormsX Emphasize the importance of a plan. Refer students to Figure 4-46 to help them formulate a backup plan for themselves. Suggest a schedule for backups, e.g., every other Friday, or just before lab. Explain that many users rely on network backup. Network backup can be as easy as copying a valuable file to a folder on a shared drive on your server. While this protects your important data against the failure of your own personal computer, it might not protect you against a network failure, or a disaster such as a fire in your building, for example. Review Internet backup sites. TEACHER TIP Another form of Internet backup is simply to e-mail a file to a friend, or to your own Internet e-mail account such as a Gmail account. Any form of backup is better than none! FIGURES Figure 4-46, Figure 4-47, Figure 4-48 CLASSROOM ACTIVITIES Class Discussion: Ask the class if anyone has ever been the victim of a data disaster, such as mistakenly copying an old version of a document over a new version, losing data on a hard drive, or having a virus wipe out files. What couldve been done to prevent the loss? Quick Quiz: A(n) _______ stores files needed to recover data thats been wiped out by operator error, viruses, or hardware failures. (Answer: backup.) True/False: Your backup schedule depends on how much data you can afford to lose. (Answer: True.) Data File Backup LECTURE NOTES Demonstrate a backup. In Windows, use the Copy Disk menu option (on the File menu of My Computer or Windows Explorer). If the Backup tool has been installed, you could use that instead. FIGURES Figure 4-49, Figure 4-50 CLASSROOM ACTIVITIES Class Discussion: Ask the class what types of files they currently back up and onto what medium. Using Figure 4-50 to aid the discussion, ask if their backups are as complete as they should be. Quick Quiz: True/False: You can simplify the backup process by storing important files in various separate locations. (Answer: False.) True/False: Restoring from a data file backup is very difficult. (Answer: False.) True/False: You should only be concerned with backing up data files you create. (Answer: False.) LAB ACTIVITY The New Perspectives Lab Backing up Your Computer deals with issues that relate to this section of the textbook. You might want to go through the lab during class time if you have a computer with a projection device. Or, assign this lab for students to do on their own. System Backup LECTURE NOTES Are these reasonable backup methods for a home computer? Who might be likely to use one of these types of systems? Explain that software developers often back up to a second hard disk. Go over the pros and cons of full backups vs. differential backups, where only those files that were added or changed since your last full backup session are backed up. Depending on a students computer configuration, it might be easier to rely on distribution disks to restore software, rather than going to the trouble to create a full system backup. FIGURES Figure 4-51, Figure 4-52, Figure 4-53 CLASSROOM ACTIVITIES Assign a Project: Have students write a paragraph comparing and contrasting full, differential, and incremental backups. Quick Quiz: A(n) ________ is a snapshot of your computer settings. (Answer: restore point.) True/False: Many experts recommend that you keep more than one set of backups. (Answer: True.) Boot and Recovery Disks LECTURE NOTES Talk the class through the process of making a boot disk. If possible, demonstrate the purpose of a boot disk. FIGURES Figure 4-54, Figure 4-55 CLASSROOM ACTIVITIES 1. Class Discussion: Ask students to share their disaster stories about lost files and no backups. If you have any disaster stories of your own, tell them. Do all students make backups, or do some prefer to live dangerously? 2. Quick Quiz: A(n) _______ is a removable storage medium containing the operating system files needed to boot your computer without accessing the hard disk. (Answer: boot disk) True/False: The backup device that you select depends on the value of your data, your current equipment, and your budget. (Answer: True) Glossary of Key Terms backward compatibility (198) backup (222) backup software (226) boot disk (229) boot process (192) bootstrap program (192) cluster (219) command-line interface (189) custom recovery CD (230) data fork (200) defragmentation utility (221) desktop (189) desktop operating system (188) differential backup (227) directory (206) disk mastering (219) disk partition (205) DOS (202) dual boot (199) FAT 32 (219) File Allocation Table (FAT) (219) file date (206) file extension (204) file format (207) file header (207) file management utilities (214) file-naming conventions (204) file shredder software (220) file size (206) file specification (206) file system (219) file tag (212) folder (206) formatting (218) fragmented files (221) full backup (227) graphical user interface (189) icon (189) incremental backup (227) iPhone OS X (203) Linux distribution (201) Mac OS (197) Master File Table (MFT) (219) memory leak (187) menu (190) menu bar (190) Microsoft Windows (194) multiprocessing (186) multitasking (186) multithreading (186) multiuser operating system (187) native file format (209) NTFS (New Technology File System) (219) operating system (184) packet writing (219) Palm OS (202) physical storage model (218) recovery disk (229) resource (185) resource fork (200) restore point (228) root directory (206) sectors (218) server operating system (187) single-user operating system (187) subdirectory (206) submenu (191) Symbian OS (203) toolbar (190) tracks (218) UNIX (201) user interface (189) virtual machine (VM) (199) window (189) Windows Explorer (216) Windows Mobile OS (203)  HYPERLINK \l "_Excel_2007" Top of Document     Page  PAGE 22 of  NUMPAGES 15 Project 1: Creating a Worksheet and an Embedded Chart New Perspectives on Computer Concepts (11th Edition) Instructors Manual  PAGE 2 of  NUMPAGES 18 PPT 1. PAGE 1 Fk    M Q R o p / 0 O P n^M?h)CJOJQJ^JaJ hh^CJOJQJ^JaJhh^5OJQJ\^J%hh^B*CJOJQJaJph+hh^5>*B*CJOJQJaJphhh^CJ OJQJaJ h)CJOJQJaJhh^CJOJQJaJ"hh^5;CJOJQJaJ+hh^5;B*CJ$OJQJaJ$ph+hh^5;B*CJ0OJQJaJ0phFk  IK $$Ifa$gd^ $Ifgd^^gd^lgd^h7$8$H$]h^gd^ h]h^gd^hd]h^gd^$d-DM a$gd^%P h i 234GHګp]Bp1p hh^0JCJOJQJaJ4jhh^B*CJOJQJUaJph%hh^B*CJOJQJaJph.jhh^B*CJOJQJUaJph'hh^5>*B*OJQJaJphhh^CJOJQJaJ,hh^>*B*CJOJQJ^JaJph/jhh^CJOJQJU^JaJ)jhh^CJOJQJU^JaJ hh^CJOJQJ^JaJHIJKLMghiw\w4jhh^B*CJOJQJUaJph hh^0JCJOJQJaJ4jhh^B*CJOJQJUaJph%hh^B*CJOJQJaJph.jhh^B*CJOJQJUaJph!hh^B*OJQJaJphhvB*OJQJaJph$hh^5B*OJQJaJphKLBSkd4$$Ifl0822\, t644 la $$Ifa$gd^ $Ifgd^Skd*$$Ifl0822\, t644 la  GJBSkdH$$Ifl0822\, t644 la $$Ifa$gd^ $Ifgd^Skd>$$Ifl0822\, t644 la     )*+EFGIJKLfghͼͩwͩ\ͼͩwͩAͼͩ4jhh^B*CJOJQJUaJph4jhh^B*CJOJQJUaJph$hh^5B*OJQJaJph!hh^B*OJQJaJphhZB*OJQJaJph%hh^B*CJOJQJaJph hh^0JCJOJQJaJ.jhh^B*CJOJQJUaJph4jhh^B*CJOJQJUaJphJKBSkd\$$Ifl0822\, t644 la $$Ifa$gd^ $Ifgd^SkdR$$Ifl0822\, t644 la ͵vhO@4h CJOJQJaJhh^CJOJQJaJ1hh^5;>*B*CJOJQJ\aJphhZB*OJQJaJph hh^0JCJOJQJaJ4jhh^B*CJOJQJUaJph%hh^B*CJOJQJaJph.jhh^B*CJOJQJUaJph$hh^5B*OJQJaJphhvB*OJQJaJph!hh^B*OJQJaJph`(]h6 & Fgd^gd^ dxgd^^gd^lSkdh$$Ifl0822\, t644 lan~_ c!d!e!f!q!ɵ╆╆nbSbChh^CJOJQJ]aJhhZCJOJQJaJh^CJOJQJaJ.hh^6B*CJ OJQJ\]aJ phh$#h^CJOJQJaJ$hh^CJOJQJaJmH sH hw.CJOJQJ]aJ&hh^56>*B*OJQJph0hh^56>*B*CJOJQJ\]phhh^CJOJQJaJhh CJOJQJaJ6y-Uq $ & Fgd^ $ & Fgd^ $^gd^gd^ & Fgd^ & Fgd^^gd^^gd^ & Fgd^n~F9VW_EQ-  & Fgd^ $^gd^gd^ & Fgd^Pgd^ & Fgd^^gd^^gd^ $ & Fgd^ O!P!X!d!e!f!r!!!!n"~""#$$ & FPgd^ & FPgd^$gd^ h^h`gd^ 0-DM ^`gd^gd^gdZ & Fgd^^gd^ $^gd^ & Fgd^q!!!!!n"~"""##$$U$V$p$$$$$$%%8%M%%%%%&&&&&öööësdWh]#8CJOJQJ]aJhTh^CJOJQJaJhkCJOJQJaJh^CJOJQJaJ&hh^56>*B*OJQJphhh^OJQJ\h^5OJQJ\h^CJOJQJ\aJhh^CJOJQJ\aJhh^CJOJQJaJhh^CJOJQJ]aJh^CJOJQJ]aJ!$+$:$E$U$V$p$$$$$%%%%%%%& 0-DM ^`gd^$gd^ & Fgd^gd^ & Fgd^^gd^^gd^^gd^ & FPgd^&&&'')(())#)<*C*Q*n**++,, 0-DM ^`gd^ & Fgd^^gd^^gd^gd^$gd^ $ & Fgd^ $ & Fgd^ $^gd^&'')))*:*<*C*n****+,,,,----....a/b/// 00÷ã÷Çwhh\PPhã÷h*tCJOJQJaJh)CJOJQJaJhh^CJOJQJaJh^B*CJOJQJaJphhh^CJOJQJ]aJhuxCJOJQJaJ&hh^56>*B*OJQJphh^CJOJQJaJhh^CJOJQJaJ%hh^B*CJOJQJaJphh!CJOJQJaJh$#h^CJOJQJaJ,,,-*---..a/b/o/// 0<0000 1 1 & Fgd^^gd^gd^ $ & Fgd^ $ & Fgd^ $ & F hgd^ & Fgd^^gd^ $^gd^00000 1 1 1112222255K7L7W77788888899:9ʶ񏀏pcpcWKh\WCJOJQJaJhT CJOJQJaJh^CJOJQJ]aJhh^CJOJQJ]aJhD_?h^CJOJQJaJhD_?h^5CJOJQJaJ-hh^6>*B*CJOJQJ\]ph&hh^56>*B*OJQJphh$#h^CJOJQJaJh^CJOJQJaJh CJOJQJaJhh^CJOJQJaJ 1!1-1m11122222 $Ifgd^ & F Pgd^^gd^^gd^ $ & Fgd^ $ & Fgd^ $^gd^ 22283 $Ifgd^ukd$$IfTl004 laT8393@3v3 $Ifgd^ukd$$IfTl004 laTv3w333 $Ifgd^ukdG $$IfTl004 laT3334 $Ifgd^ukd $$IfTl004 laT444p4 $Ifgd^ukd $$IfTl004 laTp4q4~44 $Ifgd^ukd3 $$IfTl004 laT444I5 $Ifgd^ukd $$IfTl004 laTI5J5X55 $Ifgd^ukd{ $$IfTl004 laT55555{{ $Ifgd^gd^ukd $$IfTl004 laT556f6 $Ifgd^ukd $$IfTl004 laTf6g6n66 $Ifgd^ukdg$$IfTl004 laT666J7 $Ifgd^ukd $$IfTl004 laTJ7K7L7X778888hh^UM & Fgd^^gd^ $^gd^ 0-DM ^`gd^gd^ukd$$IfTl004 laT8*888 9b9c9o9999V:W:c:::;;&; 0-DM ^`gd^ & Fgd^^gd^ & Fgd^^gd^gd^ $ & Fgd^ $ & Fgd^ $^gd^:9b9999:$:W::;@;;;;;==???B"BhClCEFFFlHyHHHJJJηp`h^B*CJOJQJaJphhigyh^CJOJQJaJhigyh^CJOJQJ]aJhCJOJQJaJhh^CJOJQJ]aJh^CJOJQJaJ-hh^6>*B*CJOJQJ\]ph&hh^56>*B*OJQJphhh^CJOJQJaJh$#h^CJOJQJaJ"&;@;N;;;K<===>>????@@@]A $ & Fgd^ $ & Fgd^ $^gd^ & Fgd^ 0-DM ^`gd^gd^ & Fgd^^gd^^gd^]AAB"B0BBhCC/EEEEFFFFFFDG $ & Fgd^ $^gd^ & Fgd^ 0-DM ^`gd^gd^ & Fgd^^gd^^gd^ $ & Fgd^DGPGGHlHyHHH JJJK~LLLLL $^gd^ & Fgd^ 0-DM ^`gd^gd^ & Fgd^^gd^^gd^ $ & Fgd^ $ & Fgd^JK5K6K}KKKKLLLL7M8MMM NN.N/NNNNNNNOOOOpOqOO๦|||pgh^OJQJ\h^56OJQJ\h^CJOJQJ\aJhCJOJQJ\aJhh^CJOJQJ\aJ$hh^CJOJQJaJmH sH hh^CJOJQJaJh^CJOJQJaJhF?ICJOJQJaJhOh^CJOJQJaJhOh^CJOJQJ]aJ LMMMNNOODOROaOpOqOOOOOPRR & Fgd^^gd^^gd^`gd^ & FPgd^ & FPgd^$h^`hgd^gd^ h^h`gd^OOOOOPPR-RuRvRRSSTT UU%VVVVVDWRWfXgXXX\Yɽɽɱɥɕymyɽɽ]yQyhrTCJOJQJaJh^B*CJOJQJaJphhyCJOJQJaJh$#h^CJOJQJaJhyCJOJQJ]aJhh^CJOJQJ]aJhCJOJQJaJhh/CJOJQJaJh^CJOJQJaJhh^CJOJQJaJ&hh^56>*B*OJQJph%hh^56CJOJQJ\aJRRRRRTTTXUdUU%V&V3VVVVDWW & Fgd^^gd^ $ & Fgd^ $ & Fgd^ $^gd^ 0-DM ^`gd^gd^ & Fgd^^gd^WQXRXZXfXgX|XXX\Y]YwYYYKZLZTZmZnZZZ $ & F#gd^^gd^ $ & Fgd^ $ & F!gd^ $^gd^ & Fgd^^gd^gd^ & Fgd^\Y]YwYYYYmZZ[k[y[[[[]]]] ^ ^s^t^u^:_s``aab)bcddd e egggghhwwghh^CJOJQJ]aJhCJOJQJaJ&hh^56>*B*OJQJphh$#h^CJOJQJaJh^CJOJQJaJhh^CJOJQJaJ$hO[h^CJOJQJaJmH sH .hO[h^56>*B*OJQJmH phsH %hh^B*CJOJQJaJph(ZZZ[k[y[]R^S^[^t^u^^:_;_P____ $ & F%gd^ $^gd^ 0-DM ^`gd^ & Fgd^gd^ & Fgd^^gd^^gd^ $ & Fgd^ $ & F#gd^_)`s```aqarazaaaab)b7bcdefghhgdZ $ & F'gd^ $^gd^ & Fgd^gd^ & Fgd^^gd^^gd^ $ & Fgd^hhh*B*OJQJphh:h^CJOJQJ\aJh_}CJOJQJ\aJh^CJOJQJ\aJhh^CJOJQJ\aJhptZCJOJQJaJh^CJOJQJ]aJhh^CJOJQJ]aJhh^CJOJQJaJhhZCJOJQJaJhhh=i>ikkkkkkglhl}l;mJmmnWoXo & F Pgd^ & F Pgd^ h^h`gd^ & Fgd^ $^gd^ 0-DM ^`gd^gd^Xo{oooop%p3pp7qqqqqqq$ h8$Ifa$gd^ h8gd^ & Fgd^^gd^^gd^ & F Pgd_} & F Pgd^qqrrrryddd$ h8$Ifa$gd^ h8$Ifgd^skdS$$Ifl4\:JfT4 la@f4qqrtttuuuvvwwwxxxx6y7yNyOyyyzؼذp]MAAh$cCJOJQJaJh^CJOJQJaJmH sH $hh^CJOJQJaJmH sH &hh^56>*B*OJQJph hZ56>*B*OJQJphh.xCJOJQJaJh$#h^CJOJQJaJh^CJOJQJaJhh^CJOJQJ]aJh ~CJOJQJaJhh^CJOJQJaJhh^OJQJhh^5OJQJ\rr&r(r)r*ryddd$ h8$Ifa$gd^ h8$Ifgd^skd$$Ifl4\:JfT4 la@f4*r+rr?r@ryddd$ h8$Ifa$gd^ h8$Ifgd^skd$$Ifl4\:JfT4 la@f4@rArSrUrVrWryddd$ h8$Ifa$gd^ h8$Ifgd^skd?$$Ifl4\:JfT4 la@f4WrXrgrhrirkryddd$ h8$Ifa$gd^ h8$Ifgd^skd$$Ifl4\:JfT4 la@f4krlrzr{r|r~ryddd$ h8$Ifa$gd^ h8$Ifgd^skd$$Ifl4\:JfT4 la@f4~rrrrrryddd$ h8$Ifa$gd^ h8$Ifgd^skd+$$Ifl4\:JfT4 la@f4rrrPsttttu~vvvqUU 0-DM ^`gd^gd^ & Fgd^ h8gd^skd$$Ifl4\:JfT4 la@f4uuuuuuvvzwwwwxxxxxxyy9z $ & F,gd^ & Fgd^^gd^ $ & F*gd^ $ & F)gd^ $^gd^gd^ & Fgd^^gd^9zzzzz ||&|||}C~D~L~r~s~~ ] $ & F.gd^ $^gd^ & Fgd^ & Fgd^^gd^^gd^gd^ $ & F*gd^zz{ { ||L~Y~q~r~s~~Q[hstl{ ޾ޫޫ}l``ޫޫPPhh^CJOJQJ\aJh^CJOJQJaJ hZ56>*B*OJQJphh$#h^CJOJQJaJh$h^CJOJQJaJh^B*CJOJQJaJph$hh^CJOJQJaJmH sH &hh^56>*B*OJQJphh$cCJOJQJaJhh^CJOJQJaJ$h=h^CJOJQJaJmH sH RS[tul{ۂ!9G  & F/gd:.gd:. & FPgd^gd^ h^h`gd^ $^gd^ & Fgd^ & Fgd^^gd^ ڂۂ  !89FGcd|}׃؃+,56EFRStu݄ބǷhZh:.6CJOJQJaJhZh^6CJOJQJaJh:.h:.56>*B*phh:.h^56>*B*phhh^5>*Xhh^CJOJQJ\aJh^CJOJQJ\aJ;Gd}؃,6FSuބ)BTcp  & F/gd:.ބ()ABSTbcopȅɅӅԅz#$%&()+,./16{{{{u hZ0Jh;njh;nU hh^0JCJOJQJaJ+jshh^CJOJQJUaJ%jhh^CJOJQJUaJhh^CJOJQJaJhZh^CJOJQJaJhZh:.6CJOJQJaJhZh^6CJOJQJaJ+Ʌԅ%CU`oņ'>Sa~ɇއ $ & F1$gd^  & F/gd:.އ -@N_mzˆو%'(*+-.01$1$gd^ $ & F1$gd^67=>@AEFPQST‰։׉݉މ߉ ɻӨuhh^CJOJQJaJh;n!hv0JCJOJQJmHnHuhuqhZ0JCJOJQJ%jhuqhZ0JCJOJQJUhXhZCJH*OJQJhZCJOJQJhuqhZCJOJQJhZhZ0JmHnHu hZ0JjhZ0JU*1 $1$gd^$a$ $ !$a$gd^ !$ 6&P1h:pw./ =!"#$% = 0&P1h:p^/ =!"#$% P 9 0&P1h:pZ/ =!"`#$`% 9 0&P1h:pZ/ =!"`#$`% 9 0&P1h:pZ/ =!"`#$`% 9 0&P1h:pZ/ =!"`#$`% 9 0&P1h:pZ/ =!"`#$`% 9 0&P1h:pZ/ =!"`#$`% 9 0&P1h:pZ/ =!"`#$`% = 0&P1h:p^/ =!"`#$`% P DyK yK >http://coursecasts.course.com/{DyK  Chapter_Objs$$If!vh55#v#v:Vl t065\5,asDyK  SectionA$$If!vh55#v#v:Vl t065\5,asDyK  SectionB$$If!vh55#v#v:Vl t065\5,asDyK  SectionC$$If!vh55#v#v:Vl t065\5,asDyK  SectionD$$If!vh55#v#v:Vl t065\5,asDyK  SectionE$$If!vh55#v#v:Vl t065\5,auDyK  Key_Terms$$If!vh55#v#v:Vl t065\5,a$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If!vh55#v#v:V l055/ 4T$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4$$If@!vh5f55T5#vf#v#vT#v:V l45f55T5/ 4a@f4yDyK  _Excel_2007#<@< $#NormalCJ_HmH sH tH F@F sQ. Heading 1$dh@&;CJL@L sQ. Heading 2$$dh@&a$;CJ V@V L Heading 3$<@&5CJOJQJ\^JaJ>@> sQ. Heading 7 <@&aJD@D sQ. Heading 8 <@& 6]aJN @N  Heading 9 <@&CJOJQJ^JaJDA@D Default Paragraph FontRi@R  Table Normal4 l4a (k(No List4@4 sQ.Header  !4 @4 sQ.Footer  !.)@. sQ. Page NumberFB@"F sQ. Body Text$$dhxa$CJ$NO2N i`Level 1>1$7$8$H$^`>CJaJB'AB wComment ReferenceCJaJ8R8 w Comment TextCJ@jQR@ wComment Subject5\HrH w Balloon TextCJOJQJ^JaJj@j Z Table Grid7:V0 Z Table Web 2h:V03j B*`Jph6U@6 n Hyperlink >*B*phRV@R {FollowedHyperlink>*B*CJOJQJph<O< !#Head B5CJOJQJO aUnitW$d!%d$&d!'d$-DM 3N!O$P!Q$56B*CJ(OJQJaJ(ph(O( !#Unit tDOD  t Char Char;CJ _HmH sH tH >P@> *_ Body Text 2 PCJaJdOd 33Head C!$xx5$7$8$9DH$56>*CJOJQJ\]^JO 4Tips"$ $d%d&d'd-D`5$7$8$9DH$M NOPQ^`CJOJQJ^J VGqGXgg 8w(cFkIKL  GJK  ` ( ]  h 6 y -Uqn~F9VW_EQ-OPXdefrn~+:EUVp) !!#!<"C"Q"n""##$$$$%*%%%&&a'b'o''' (<(((( ) )!)-)m)))*******8+9+@+v+w+++++,,,p,q,~,,,,I-J-X-------.f.g.n....J/K/L/X//0000*000 1b1c1o1111V2W2c22233&3@3N333K4555667777888]99:":0::h;;/====>>>>>>D?P??@l@y@@@ BBBC~DDDDDEEEFFGGDGRGaGpGqGGGGGHJJJJJJLLLXMdMM%N&N3NNNNDOOQPRPZPfPgP|PPP\Q]QwQQQKRLRTRmRnRRRRZSkSySURVSV[VtVuVV:W;WPWWWW)XsXXXYqYrYzYYYYZ)Z7Z[\]^_````=a>accccccgdhd}d;eJeefWgXg{ggggh%h3hh7iiiiiiiijjjjj&j(j)j*j+jj?j@jAjSjUjVjWjXjgjhjijkjljzj{j|j~jjjjjjjjPkllllmmmmmmnnzooooppppppqq9rrrrr tt&tttuCvDvLvrvsvvw w]wwwwxRxSx[xtxuxxly{yzzzzzz{!{9{G{d{}{{{{{{||,|6|F|S|u|||||||})}B}T}c}p}}}}}}}}~%~C~U~`~o~~~~~~~'>Sa~ -@N_mz€ـ%'(*+-.01 0000F0F0F0F0F0F0F0F0F0F0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F000 0 0 0 0 0 0 0 0 0 0  0  0  0 @0 x0x00 0 0 000 000 0 0 0 0 0x00n 0n 0n 0n 0n 0n0n0n 0n0n0n 0n 0n 0n 0n 0nx00 0 0 00 000000000 0 0 0`0 0 0 0 000x0x00 0  0  0 00 000000 0 0 0 0 0000x00<" 0 <" 0<" 0<"0<"0<"0<"0<"0<" 0<"0<" 0<" 0<" 0<" 0<" 0<"0<"0<"0<"x00' 0' 0'0'0' 0'0'0' 0' 0' 0' 0'x00) 0)0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0)0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0) 0)0)0)0)0) 0)0)0) 0) 0) 0) 0)0)0) 0)x001 010101010101 01x0x00&3 0&3 0&3 0&3 0&30&30&30&30&30&30&30&3 0 &30&3 0&3 0&3 0&3 0&3 0&3x00: 0: 0: 0: 0: 0:0:0:0:0:0: 0 :0:0: 0: 0: 0: 0: 0:x00l@ 0l@ 0l@ 0l@0l@0l@0l@0l@0l@ 0 l@0l@0l@0l@0l@ 0l@ 0l@ 0l@`0l@ 0l@ 0l@ 0l@ 0l@0l@0l@x0x00G 0G 0 G0G0G 0 G0G0G0G0G0G 0G 0G 0G 0G0G0G 0 Gx00N 0!N 0"N 0#N0N0N 0N0N0N! 0N 0N 0N0Nx00]Q 0$]Q 0%]Q0]Q0]Q 0]Q0]Q0]Q# 0]Q# 0]Q 0]Qx00ZS 0&ZS 0'ZS0ZS0ZS 0ZS0ZS0ZS0ZS0ZS0ZS% 0ZS% 0ZS 0ZS 0ZS 0 ZSx00sX 0(sX 0)sX0sX0sX 0sX0sX0sX' 0sXx00Z 0*Z 0+Z 0,Z 0-Z 0.Z 0/Z0Z0Z0Z0Z0Z0Z0Z0Z 0Z0Z0Z0Z0Z0Z0Z0Z 0Z 0Z 0Z `0Z 0fZ 0fZ 0fZ @0fZx0x00h 00h 01h 02h0h0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 0h 03h 04h 05h0h0h0h0h0h 0h0h0h) 0h) 0h* 0h* 0hx00o 06o0o0o 0o0o0o, 0o, 0o* 0o* 0o* 0o0o0o0ox00 t 07 t 08 t 09 t 0: t0 t0 t 0 t0 t0 t. 0 t. 0 t* 0 t* 0 tx00w 0;w 0<w0w0w 0w0w0w0w0w 0w 0wx0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0 x/ 0 x/ 0 x/ 0 x/ 0 x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0x/ 0 x/ 0!x/ 0"x/ 0#x/ 0$x/ 0x/ 0 0'7 0(7 0)7 0*7 0+7 0,7 0-7 0.7 0/7 007 017 027 037 047 057 067 077 087 097 0:7 0;7 0<7 0=7 0>7 0?7 0@7 0A7 0B7 0C7 0D7 0E7 0F7 0G7 0H7 0I7 0J7 0K70707070@000@000@000@000@0@0@0@0@0@0@0003 hP Hq!&0:9JO\Yhqz ބ6 FIJMOQUXZjnpsvzKJ6 $&, 1283v334p44I555f66J78&;]ADGLRWZ_hXoqr*r@rWrkr~rru9zGއ1 GKLNPRSTVWY[\]^_`abcdefghiklmoqrtuwxy{|}~Hh3GLh *EKg# XXXXXXXXX +.!!!8@0(  B S  ?TOC _Hlt153078762 _Hlt153080469 _Hlt153078848 Chapter_Objs_SECTION_A:_PERSONAL_SECTION_A:_SOFTWARE_SECTION_A:_OPERATINGSectionA$_EX_5:_Project_One  Worksheet with _SECTION_B:_MICROPROCESSORS_SECTION_B:_POPULAR_SECTION_B:_TODAY SSectionB_SECTION_C:_BUYING_SECTION_C:_FILESectionC_SECTION_D:_DIGITAL_SECTION_D:_INPUT_SECTION_D:_INSTALLING_SECTION_D:_FILESectionD_SECTION_E:_PASSWORD_SECTION_E:_HARDWARE_SECTION_E:_SECURITY_SECTION_E:_BACKUPSectionE Key_Terms _Hlt153078153 _Hlt153078617 _Hlt153600040>@ n~~~p333EEGGGJeggggz @@@ @@@?A n~~~33&3EEGGGJeggghz !  LC 䒗 β TT6rv?;a!h4D+R'<#'Hv{v:,XB,* r;.w$ ,0%D3x0[9Z)+R\^BpEHEX5EB% o]FTpyRJn\L Mf?]T2 Z\':ZXajIejcUgkIGhv~dhȳ|j/piJyWm튁+p3X#s`@-t'6xx>x ^'gyJf@|j=hX\""6h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h 88^8`o(hH. ^`hH.  L ^ `LhH.   ^ `hH. xx^x`hH. HLH^H`LhH. ^`hH. ^`hH. L^`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.hhh^h`OJQJo(hHh 88^8`o(hH.h^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hH0h^`0OJQJo(hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH. 88^8`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH. ^`o(hH. 88^8`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH. 88^8`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH0h^`0OJQJo(hHE^`E56CJo(hH.pp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.^`o(. 8^8`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH. h^`o(hH. hh8^h`ho(hH. pLp^p`Lo(hH. h^`o(hH. 8^`o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. PLP^P`Lo(hH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h ^`o(hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhhh^h`OJQJo(hHh88^8`OJQJo(hHh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH. ^`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h hh^h`o(hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH. 8^8`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH./%D3dhRcxq>x;a!2 ZTIGha#'R\^BX ,0pyRJIe#s MK ]T6x+p!0[9qZ>yWmࢣS<࢏;.ࢋAO3@o]FcUg3@-t/pi5EB,':ZEHE+R'v:,'gy)+<ࢄf@|LvrB//                                    h                          R~                                 R~                          h|                                            *                                                                                                                                             f|                 2        .-G^T &Z>'1,:.w.[6]#8F?IdYJT\W:ZptZ%[ce) jmnux_};n $kv)rTyh/:2 ~5.x *t!!F$cIKL  GJK-Sn#!"*%!))*****8+9+@+v+w+++++,,,p,q,~,,,,I-J-X-------.f.g.n....J/K/3&37iiiiiiiijjjjj&j(j)j*j+jj?j@jAjSjUjVjWjXjgjhjijkjljzj{j|j~jjjjjjj%'*-0 3QJUca0a0a0a0a0@i `@Unknowngz Times New RomanTimes New Roman5Symbol3& z Arial7 Sylfaen5& zaTahoma9Garamond;Wingdings?5 z Courier New"1h"#JFmAFmA4d} 2qHX ?sQ.2Microsoft Office 2003hhawkinsTL User/                           ! " # $ % & ' ( ) * + , - . Oh+'0  ( H T ` lxMicrosoft Office 2003 hhawkins Normal.dotTL User4Microsoft Office Word@G@a@@N@PNFm՜.+,D՜.+,P  hp   Course TechnologyA Microsoft Office 2003 Title  8@ _PID_HLINKSA6-h~ _Excel_20072~ Key_Terms~ SectionE~ SectionD ~ SectionC ~ SectionB~ SectionA3~ Chapter_Objs<&http://coursecasts.course.com/~  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%*Root Entry FT~hN,Data 1TableWordDocumentSSummaryInformation(DocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q