![]() |
OpenStax is a non-profit organization committed to improving student access to quality learning materials. Our free textbooks are developed and peer-reviewed by educators to ensure they are readable, accurate, and meet the scope and sequence requirements of modern college courses. Unlike traditional textbooks, OpenStax resources live online and are owned by the community of educators using them. Through our partnerships with companies and foundations committed to reducing costs for students, OpenStax is working to improve access to higher education for all. OpenStax is an initiative of Rice University and is made possible through the generous support of several philanthropic foundations.
Welcome to Introduction to Sociology 2e , an OpenStax resource created with several goals in mind: accessibility, affordability, customization, and student engagement—all while encouraging learners toward high levels of learning. Instructors and students alike will find that this textbook offers a strong foundation in sociology. It is available for free online and in low-cost print and e-book editions.
To broaden access and encourage community curation, Introduction to Sociology 2e is “open source” licensed under a Creative Commons Attribution (CC-BY) license. Everyone is invited to submit examples, emerging research, and other feedback to enhance and strengthen the material and keep it current and relevant for today’s students. You can make suggestions by contacting us at info@openstaxcollege.org.
This book is written for you and is based on the teaching and research experience of numerous sociologists. In today’s global socially networked world, the topic of sociology is more relevant than ever before. We hope that through this book, you will learn how simple, everyday human actions and interactions can change the world. In this book, you will find applications of sociology concepts that are relevant, current, and balanced.
This text is intended for a one-semester introductory course. Since current events influence our social perspectives and the field of sociology in general, OpenStax encourages instructors to keep this book fresh by sending in your up-to-date examples to info@openstaxcollege.org so that students and instructors around the country can relate and engage in fruitful discussions.
Introduction to Sociology 2e adheres to the scope and sequence of a typical introductory sociology course. In addition to comprehensive coverage of core concepts, foundational scholars, and emerging theories we have incorporated section reviews with engaging questions, discussions that help students apply the sociological imagination, and features that draw learners into the discipline in meaningful ways. Although this text can be modified and reorganized to suit your needs, the standard version is organized so that topics are introduced conceptually, with relevant, everyday experiences.
Part of the mission of the second edition update was to ensure the research, examples and concepts used in this textbook are current and relevant to today’s student. To this end, we have rewritten the introduction of each chapter to reflect the latest developments in sociology, history and global culture. In addition to new graphs and images, the reader of the second edition will find new feature boxes on a diverse array of topics, which has been one of the goals of the update—bringing the world into greater focus through case studies on global culture.
Start Quiz | Download PDF | |
Start Quiz | Download PDF | |
Start Quiz | Download PDF |
This course provides students with a comprehensive introduction to computers. Students will explore a variety of topics in computing, such as the following: the components of a computer, common computer terminology, an introduction to the Internet, computer security and privacy, computer troubleshooting techniques, and steps to maintain the life of your computer. Through readings and videos, students will learn how to fully understand the basics of computer technology.
Question: In Zac Mutrux's "Keeping Older Computers Alive," an independent health check should be performed when?
Choices:
Once a month
Every six months
Once every 18 months
Every other month
Question: According to VIKO, scientific search engines are indexed from which of the following places?
Choices:
Science magazines
Universities, research institutes, and academic publishers
Encyclopedias
Scientific-based search engines
Question: One of the recommendations that John Gallaugher makes for being password savvy is which of the following?
Choices:
Change the default password on any new products that you install.
Have the computer remember all passwords to make it easier to access a website.
Create a password that includes a special character.
Create the same password for all websites.
Question: According to Dr. Dork, a processor works in which of the following ways?
Choices:
It works with the information received from the computer software.
It works in conjunction with other computer components as a series of transistors.
It works in conjunction with the motherboard to process information.
It works with the Intel processor to transmit information.
Question: What is one of VIKO's "How to search" tips?
Choices:
Utilize only one search engine
Use quotation marks
Be specific
Be broad
Question: In communicating with people through the Internet, organizations should do what with their corporate e-mail accounts?
Choices:
Create multiple e-mail accounts for the organization.
Create a general e-mail account for all users.
Create one specific e-mail account for inquiries only.
Create personal e-mail accounts for users to receive customer inquiries.
Question: According to Brian Satterfield, one of the initial steps users should take if Windows won't boot or crashes is which of the following?
Choices:
Hold the power button and restart the computer.
While in Safe Mode, run the antivirus and antispyware programs to remove any detected threats.
Unplug the computer for 30 seconds and then plug it in again.
Immediately contact technical support for instructions.
Question: Which is the first step in Zac Mutrux's "Keeping Older Computers Alive"?
Choices:
Verify your electronic setup.
Verify your physical setup.
Verify that all computer cords are not broken or frayed.
Verify that all of the correct software is installed.
Question: John Gallaugher describes "bad apples" as individuals who can be which of the following?
Choices:
Rogue employees who steal secrets
Internet hackers who cause havoc for more than one person
Individuals who violate the privacy of others
Individuals who use personal information for marketing purposes
Question: According to Karen Coyle's "Protecting Privacy," in personalizing information, users should do which of the following before signing up for a website's services?
Choices:
Trust the website and provide the information requested.
Save their user name and password for easy access.
Read the website's privacy policy for detailed information.
Request additional information in writing.
Question: In an effort to remain anonymous, Karen Coyle recommends which of the following?
Choices:
Provide information truthfully once you have verified the business is legitimate.
Utilize your personal e-mail address for all web-based services.
Create a fictitious e-mail account.
Provide businesses with a name other than your own.