Ebooks File Technology in Action Complete Twelfth Global Edition Kendall E. Martin All Chapters
Ebooks File Technology in Action Complete Twelfth Global Edition Kendall E. Martin All Chapters
com
https://textbookfull.com/product/technology-in-action-
complete-twelfth-global-edition-kendall-e-martin/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/systems-analysis-and-design-9th-
edition-kenneth-e-kendall/
textboxfull.com
https://textbookfull.com/product/technology-in-action-
introductory-13th-edition-alan-evans/
textboxfull.com
https://textbookfull.com/product/technology-in-action-rental-
edition-17th-edition-alan-evans/
textboxfull.com
https://textbookfull.com/product/human-contradictions-in-octavia-e-
butlers-work-martin-japtok/
textboxfull.com
Metallica Updated Edition The Complete Illustrated History
Martin Popoff
https://textbookfull.com/product/metallica-updated-edition-the-
complete-illustrated-history-martin-popoff/
textboxfull.com
https://textbookfull.com/product/new-developments-in-science-and-
technology-education-1st-edition-martin-riopel/
textboxfull.com
https://textbookfull.com/product/psychology-in-modules-twelfth-
edition-david-myers/
textboxfull.com
https://textbookfull.com/product/visualizing-technology-complete-5th-
edition-geoghan/
textboxfull.com
https://textbookfull.com/product/foundations-of-finance-global-
edition-john-d-martin/
textboxfull.com
Technology
in Action
Complete
12th Edition
GLOBAL EDITION
10 9 8 7 6 5 4 3 2 1
EDITION
12
Contents at a Glance
Chapter 1
Using Technology to Change the World.................................................................................... 32
Chapter 2
Looking at Computers: Understanding the Parts...................................................................... 58
Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................................. 104
Technology in Focus
The History of the Personal Computer.................................................................................... 142
Chapter 4
Application Software: Programs That Let You Work and Play.................................................. 152
Chapter 5
System Software: The Operating System, Utility Programs, and File Management.................. 188
Technology in Focus
Information Technology Ethics................................................................................................ 232
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System.......................................... 252
Chapter 7
Networking: Connecting Computing Devices.......................................................................... 288
Technology in Focus
Under the Hood...................................................................................................................... 328
Chapter 8
Digital Devices and Media: Managing a Digital Lifestyle........................................................... 340
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices............................................ 376
Technology in Focus
Careers in IT........................................................................................................................... 424
Chapter 10
Behind the Scenes: Software Programming............................................................................ 436
Chapter 11
Behind the Scenes: Databases and Information Systems....................................................... 478
Chapter 12
Behind the Scenes: Networking and Security in the Business World....................................... 520
Chapter 13
Behind the Scenes: How the Internet Works........................................................................... 560
Glossary................................................................................................................................. 594
Index...................................................................................................................................... 613
Contents at a Glance 3
twelfth
twelfth
EDITION
12
Contents
Chapter 1
Using Technology to Change the World.............................. 32
How Will You Put Technology in Action?.....................................................................34
Technology on the World Stage.................................................................................... 34
Political Issues............................................................................................................... 34
Other Global Issues....................................................................................................... 35
ethics in it: The Digital Divide and the Mobile Bridge................................................ 37
Technology and Our Society.......................................................................................... 38
Technology Impacts How We Think............................................................................... 38
Technology Impacts How We Connect.......................................................................... 38
Technology Impacts How We Consume........................................................................ 39
Try this: Skyping Around the World........................................................................... 42
Make This: MAKE: A Virtual Assistant........................................................................ 43
How Will Technology Improve Your Life?....................................................................44
Technology at Home....................................................................................................... 44
Technology and Your Career......................................................................................... 46
Retail: Working in a Data Mine....................................................................................... 46
Arts: Ink, Paints, and a Laptop?.................................................................................... 46
Education: Teaching and Learning................................................................................. 47
Law Enforcement: Put Down That Mouse—You’re Under Arrest!................................... 49
Medicine: The Chip Within............................................................................................. 49
DIG DEEPER: Making Reality Even More Real.............................................................. 50
Science: Simulating Reality............................................................................................ 51
Psychology: Computerized Coach................................................................................. 51
Solve This: How Technology Is Used on the World Stage and
in My Personal Life........................................................................................................ 57
Chapter 2
Looking at Computers: Understanding the Parts................ 58
Understanding Digital Components............................................................................60
Understanding your Computer..................................................................................... 60
Computers Are Data Processing Devices...................................................................... 60
Bits and Bytes: The Language of Computers................................................................ 61
Types of Computers...................................................................................................... 61
Input Devices.................................................................................................................. 65
Keyboards..................................................................................................................... 65
Mice and Other Pointing Devices................................................................................... 67
Image Input................................................................................................................... 69
DIG DEEPER: How Touch Screens Work..................................................................... 70
4 Contents
twelfth
twelfth
EDITION
12
Sound Input.................................................................................................................. 70
Ethics in IT: What Is Ethical Computing?................................................................... 72
Output Devices............................................................................................................... 73
Monitors........................................................................................................................ 73
Printers.......................................................................................................................... 76
Sound Output............................................................................................................... 77
Try this: What’s Inside My Computer?....................................................................... 80
Make This: MAKE: A Mobile App............................................................................... 81
Processing, Storage, and Connectivity........................................................................82
Processing and Memory on the Motherboard............................................................. 82
Memory......................................................................................................................... 83
Processing.................................................................................................................... 83
Storing Data and Information........................................................................................ 84
Hard Drives................................................................................................................... 84
Cloud Storage............................................................................................................... 84
Portable Storage Options.............................................................................................. 84
Optical Storage............................................................................................................. 86
Connecting Peripherals to the Computer.................................................................... 87
High-Speed and Data Transfer Ports............................................................................. 87
Connectivity and Multimedia Ports................................................................................. 87
Adding Ports: Expansion Cards and Hubs..................................................................... 88
Power Controls............................................................................................................... 89
Setting it All Up............................................................................................................... 91
TRENDS in IT: Innovations in Printing.......................................................................... 94
Solve This: Technology Wish List............................................................................ 103
Chapter 3
Using the Internet: Making the Most of the
Web’s Resources.................................................................. 104
Working and Playing on the Web..............................................................................106
The internet and how It Works................................................................................... 106
The Origin of the Internet............................................................................................. 106
How the Internet Works............................................................................................... 107
Communicating and Collaborating on the Web......................................................... 109
Social Networking....................................................................................................... 109
E-Mail.......................................................................................................................... 109
Instant Messaging....................................................................................................... 111
Wikis........................................................................................................................... 111
Blogs........................................................................................................................... 113
Podcasts and Webcasts.............................................................................................. 113
Web Entertainment....................................................................................................... 115
Conducting Business Over the Internet: E-commerce............................................. 117
Contents 5
twelfth
twelfth
EDITION
12
E-Commerce Safeguards............................................................................................ 117
DIG DEEPER: Discovering the Semantic Web............................................................ 120
Try this: Create a OneDrive Account to Store and Share
Your Files in the Cloud............................................................................................ 122
Make This: MAKE: A Web-Capable App.................................................................. 123
Using the Web Effectively...........................................................................................124
Accessing and Moving Around the Web.................................................................... 124
Web Browsers............................................................................................................. 124
URLs, Protocols, and Domain Names......................................................................... 125
Hyperlinks and Beyond................................................................................................ 127
Favorites, Live Bookmarks, and Tagging...................................................................... 128
TRENDS in IT: Doing Business on a Shoestring—Thanks to the Internet................... 129
Searching the Web Effectively..................................................................................... 130
Using Search Engines Effectively................................................................................. 130
Evaluating Websites.................................................................................................... 132
Ethics in IT: Plagiarism and Copyright Violation: What Can You
Borrow from the Internet?............................................................................................ 134
Solve This: Create a Report: Conducting Research on the Web.............................. 141
Technology in Focus
The History of the Personal Computer................................................142
Chapter 4
Application Software: Programs That Let You
Work and Play.................................................................... 152
Programs That Let You Work......................................................................................154
The Nuts and Bolts of Software.................................................................................. 154
TRENDS in IT: Mobile Commerce: What Have You Bought
with Your Phone Lately?.............................................................................................. 155
Productivity and Business Software........................................................................... 156
Bundled Productivity Software..................................................................................... 156
Word Processing Software.......................................................................................... 156
Spreadsheet Software................................................................................................. 158
Presentation Software................................................................................................. 159
Database Software...................................................................................................... 160
Note-Taking Software.................................................................................................. 161
Personal Information Manager Software...................................................................... 162
Microsoft Office Productivity Software Features........................................................... 163
Personal Financial Software......................................................................................... 163
Ethics in IT: Can I Borrow Software That I Don’t Own?........................................... 164
Small Business Software............................................................................................. 165
Software for Large and Specialized Businesses........................................................... 165
Try This: Citing Website Sources............................................................................. 168
Make This: MAKE: A More Powerful App................................................................. 169
6 Contents
twelfth
twelfth
EDITION
12
Programs That Let You Play.......................................................................................170
Multimedia and Entertainment Software.................................................................... 170
Digital Image- and Video-Editing Software................................................................... 170
DIG DEEPER: How Cloud Computing Works............................................................. 172
Digital Audio Software................................................................................................. 173
Gaming Software........................................................................................................ 174
Educational and Reference Software........................................................................... 174
Drawing Software........................................................................................................ 174
Managing Your Software............................................................................................. 176
Getting Software......................................................................................................... 176
Software Licenses....................................................................................................... 177
Getting the Right Software for Your System................................................................. 178
Installing and Uninstalling Software.............................................................................. 179
Solve This: Analyzing Benchmark Data................................................................... 187
Chapter 5
System Software: The Operating System,
Utility Programs, and File Management........................... 188
Understanding System Software................................................................................190
Operating System Fundamentals................................................................................ 190
Real-Time Operating Systems..................................................................................... 191
Operating Systems for Networks, Servers, and Mainframes........................................ 191
Operating Systems for Mobile Devices........................................................................ 192
Operating Systems for Personal Computers................................................................ 192
What the Operating System Does............................................................................... 196
The User Interface....................................................................................................... 196
Processor Management.............................................................................................. 196
Memory and Storage Management............................................................................. 197
Hardware and Peripheral Device Management............................................................ 199
Ethics in IT: The Great Debate: Is Mac OS X Safer than Windows?......................... 200
Software Application Coordination............................................................................... 201
The Boot Process: Starting Your Computer............................................................... 202
Step 1: Activating BIOS............................................................................................... 202
Step 2: Performing the Power-On Self-Test................................................................. 203
Step 3: Loading the OS............................................................................................... 203
Step 4: Checking Further Configurations and Customizations..................................... 203
Handling Errors in the Boot Process............................................................................ 203
Try this: Organizing Tiles on the Start Screen in Windows 8.1................................. 206
Make This: MAKE: A Notification Alert ..................................................................... 207
Using System Software...............................................................................................208
The Windows Interface................................................................................................ 208
TRENDS in IT: Open Source Software: Why Isn’t Everyone
Using Linux?................................................................................................................ 213
Organizing your Computer: File Management.......................................................... 214
Contents 7
twelfth
twelfth
EDITION
12
Organizing Your Files................................................................................................... 214
Viewing and Sorting Files and Folders......................................................................... 215
Naming Files............................................................................................................... 216
Working with Files....................................................................................................... 218
Utility Programs............................................................................................................ 219
Display Utilities............................................................................................................ 219
The Programs and Features Utility............................................................................... 219
File Compression Utilities............................................................................................. 220
System Maintenance Utilities....................................................................................... 221
System Restore and Backup Utilities........................................................................... 222
DIG DEEPER: How Disk Defragmenter Utilities Work.................................................. 223
Accessibility Utilities..................................................................................................... 224
Solve This: Mobile Operating Systems: Changing Market Share............................. 231
Technology in Focus
Information Technology Ethics...........................................................232
Chapter 6
Understanding and Assessing Hardware:
Evaluating Your System...................................................... 252
Evaluating Key Subsystems.......................................................................................254
Your Ideal Computing Device...................................................................................... 254
Evaluating the CPU Subsystem................................................................................... 256
How the CPU Works................................................................................................... 256
CPU Factors............................................................................................................... 257
Measuring the CPU..................................................................................................... 258
Evaluating the Memory Subsystem............................................................................ 260
The RAM in Your System............................................................................................. 260
Adding RAM................................................................................................................ 262
Evaluating the Storage Subsystem............................................................................. 263
Mechanical Hard Drives............................................................................................... 263
Solid-State Drives........................................................................................................ 263
DIG DEEPER: How Hard Drives Work........................................................................ 264
Optical Drives.............................................................................................................. 265
Your Storage Capacity and Needs............................................................................... 266
Try this: Measure Your System Performance........................................................... 270
Make This: MAKE: A Location-Aware App............................................................... 271
Evaluating Other Subsystems and Making a Decision.............................................272
Evaluating the Video Subsystem................................................................................. 272
Video Cards................................................................................................................ 272
TRENDS in IT: Thunderbolt: The New Standard for Data Transfer.............................. 275
Evaluating the Audio Subsystem................................................................................ 276
Evaluating System Reliability...................................................................................... 278
8 Contents
twelfth
twelfth
EDITION
12
Making a Final Decision............................................................................................... 280
Getting Rid of Your Old Computer............................................................................... 280
ETHICS in IT: Free Hardware for All........................................................................... 281
Solve This: Laptop Alternatives............................................................................... 287
Chapter 7
Networking: Connecting Computing Devices.................... 288
How Networks Function............................................................................................... 290
Networking Fundamentals............................................................................................. 290
Network Architectures.................................................................................................... 292
Network Architectures Defined by Distance................................................................... 292
Network Architectures Defined by Levels of Administration............................................ 293
Ethernet Protocols......................................................................................................... 294
Network Components..................................................................................................... 295
Transmission Media....................................................................................................... 295
Basic Network Hardware............................................................................................... 297
Network Software.......................................................................................................... 298
Connecting to the Internet............................................................................................. 299
Wired Broadband Internet Connections......................................................................... 299
Wireless Internet Access................................................................................................ 301
Dial-Up Connections...................................................................................................... 302
Try this: Testing Your Internet Connection Speed...................................................... 304
Make This: MAKE: Networked Devices...................................................................... 305
Your Home Network..................................................................................................... 306
Installing and Configuring Home Networks................................................................. 306
Planning Your Home Network........................................................................................ 306
Connecting Devices to a Router..................................................................................... 307
Network-Attached Storage Devices............................................................................... 309
TRENDS in IT: Where Should You Store Your Files? The Cloud Is Calling! ................... 310
Home Network Servers.................................................................................................. 311
Digital Entertainment Devices on a Network................................................................... 311
Specialized Home-Networking Devices.......................................................................... 313
Configuring Software for Your Home Network................................................................ 314
Troubleshooting Wireless Network Problems................................................................. 316
Ethics in IT: Sharing Your Internet Connection with Your Neighbors: Legal?
Ethical? Safe?................................................................................................................ 317
Securing Wireless Networks.......................................................................................... 318
Solve This: Home Networking Guide......................................................................... 327
Technology in Focus
Under the Hood......................................................................................328
Contents 9
twelfth
twelfth
EDITION
12
Chapter 8
Digital Devices and Media: Managing a Digital
Lifestyle................................................................................. 340
Mobile Devices............................................................................................................. 342
Digital Convergence....................................................................................................... 342
Telephony: Smartphones and Beyond.......................................................................... 343
Smartphone Basics........................................................................................................ 343
Smartphone Components.............................................................................................. 343
How Cell Phone Technology Works............................................................................... 345
Synchronizing................................................................................................................ 346
Text Messaging.............................................................................................................. 347
Mobile Internet............................................................................................................... 347
Smartphone Security..................................................................................................... 349
VoIP............................................................................................................................... 349
Smartphone GPS........................................................................................................... 350
Tablets, Netbooks, and Ultrabooks............................................................................... 351
Tablets........................................................................................................................... 351
Netbooks....................................................................................................................... 351
Ultrabooks..................................................................................................................... 351
Making a Choice............................................................................................................ 352
Try this: Creating and Publishing a Movie.................................................................. 354
Make This: MAKE: A Video-Playing App..................................................................... 355
The Digital Information Age........................................................................................ 356
Digital Defined................................................................................................................. 356
Trends in IT: NFC Chips: Do You Have a Digital Wallet?............................................ 358
Digital Media.................................................................................................................... 359
Digital Publishing............................................................................................................ 359
Digital Music.................................................................................................................. 361
Digital Photography........................................................................................................ 363
DIG DEEPER: The Shift to Digital Music: A Bumpy Ride............................................... 364
Digital Video................................................................................................................... 366
Ethics in IT: Managing Your Copyrights: Copyleft Might Simplify Your Life................. 368
Solve This: Estimating Cellular Data Usage................................................................ 375
Chapter 9
Securing Your System: Protecting Your Digital
Data and Devices............................................................... 376
Major Threats to Your Digital Assets..........................................................................378
Cybercrime and Identity Theft..................................................................................... 378
Computer Viruses......................................................................................................... 380
Catching a Virus.......................................................................................................... 380
Boot-Sector Viruses.................................................................................................... 380
10 Contents
twelfth
twelfth
EDITION
12
Logic Bombs and Time Bombs................................................................................... 380
Worms........................................................................................................................ 380
Script and Macro Viruses............................................................................................ 381
E-Mail Viruses............................................................................................................. 381
Encryption Viruses....................................................................................................... 381
Additional Virus Classifications..................................................................................... 381
Virus Symptoms.......................................................................................................... 382
Preventing Virus Infections.......................................................................................... 383
Antivirus Software........................................................................................................ 383
Software Updates....................................................................................................... 385
Understanding Hackers............................................................................................... 386
Problems Hackers Can Cause..................................................................................... 386
Trojan Horses and Rootkits.......................................................................................... 387
Denial-of-Service Attacks............................................................................................ 387
How Hackers Gain Computer Access......................................................................... 387
Restricting Access to Your Digital Assets.................................................................. 390
Firewalls...................................................................................................................... 390
Types of Firewalls........................................................................................................ 390
How Firewalls Work..................................................................................................... 391
Knowing Your Computer Is Secure.............................................................................. 391
Password Protection and Password Management....................................................... 392
Creating Passwords.................................................................................................... 392
Managing Your Passwords.......................................................................................... 393
Anonymous Web Surfing: Hiding from Prying Eyes...................................................... 394
Biometric Authentication Devices................................................................................ 396
Try this: Testing Your Network Security................................................................... 398
Make This: MAKE: A Password Generator............................................................... 399
Protecting Your Digital Property from Yourself..........................................................400
Managing Online Annoyances..................................................................................... 400
Malware: Adware and Spyware................................................................................... 400
Spam.......................................................................................................................... 401
DIG DEEPER: Computer Forensics: How It Works..................................................... 402
Cookies....................................................................................................................... 403
Ethics in IT: You’re Being Watched … But Are You Aware You’re
Being Watched?.......................................................................................................... 405
Keeping Your Data Safe............................................................................................... 406
Protecting Your Personal Information........................................................................... 406
Backing Up Your Data................................................................................................. 406
Social Engineering........................................................................................................ 411
Phishing and Pharming................................................................................................ 411
Scareware................................................................................................................... 412
TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches...... 413
Protecting Your Physical Computing Assets............................................................. 414
Environmental Factors................................................................................................. 414
Power Surges............................................................................................................. 414
Deterring Theft............................................................................................................ 415
Contents 11
twelfth
twelfth
EDITION
12
Keep Them Safe: Alarms............................................................................................. 415
Keeping Mobile Device Data Secure............................................................................ 415
Software Alerts and Data Wipes.................................................................................. 415
Solve This: Computer Security................................................................................ 423
Technology in Focus
Careers in IT.........................................................................................424
Chapter 10
Behind the Scenes: Software Programming....................... 436
Understanding Software Programming.....................................................................438
The Importance of Programming................................................................................ 438
The Life Cycle of an Information System................................................................... 439
The System Development Life Cycle............................................................................ 439
The Life Cycle of a Program........................................................................................ 441
Describing the Problem: The Problem Statement........................................................ 441
Making a Plan: Algorithm Development....................................................................... 443
Developing the Algorithm: Decision Making and Design............................................... 444
Top-Down Design........................................................................................................ 445
Object-Oriented Analysis............................................................................................. 446
DIG DEEPER: The Building Blocks of Programming Languages: Syntax,
Keywords, Data Types, and Operators......................................................................... 448
Coding: Speaking the Language of the Computer....................................................... 450
Compilation................................................................................................................. 453
Coding Tools: Integrated Development Environments.................................................. 454
Debugging: Getting Rid of Errors................................................................................. 455
Testing and Documentation: Finishing the Project........................................................ 456
Try this: Programming with Corona ........................................................................ 458
Make This: MAKE: A Notepad................................................................................. 459
Programming Languages..........................................................................................460
Many Languages for Many Projects........................................................................... 460
Selecting the Right Language...................................................................................... 461
Ethics in IT: When Software Runs Awry.................................................................. 462
Exploring Programming Languages........................................................................... 463
Visual Basic................................................................................................................. 463
C and C++.................................................................................................................. 463
Java and C#................................................................................................................ 464
Objective C and Swift.................................................................................................. 464
HTML.......................................................................................................................... 464
JavaScript and VBScript.............................................................................................. 465
ASP, JSP, and PHP..................................................................................................... 465
AJAX, XML, JSON....................................................................................................... 466
Mobile Applications..................................................................................................... 467
12 Contents
twelfth
twelfth
EDITION
12
TRENDS in IT: Emerging Technologies: Unite All Your Video
Game Design Tools...................................................................................................... 469
The Next Great Language........................................................................................... 470
Solve This: Time Sheets......................................................................................... 477
Chapter 11
Behind the Scenes: Databases and
Information Systems........................................................... 478
Database Basics.........................................................................................................480
Database Building Blocks............................................................................................ 480
Databases Versus Lists............................................................................................... 480
Advantages of Using Databases.................................................................................. 483
Database Management Systems................................................................................. 484
Database Terminology................................................................................................. 484
Planning and Creating the Database............................................................................ 485
Using Primary Keys..................................................................................................... 487
Database Types............................................................................................................ 488
Relational Databases................................................................................................... 488
Object-Oriented Databases......................................................................................... 489
Multidimensional Databases........................................................................................ 489
Database Functions..................................................................................................... 490
Inputting Data.............................................................................................................. 490
Data Validation............................................................................................................ 490
Viewing and Sorting Data............................................................................................ 492
Extracting or Querying Data......................................................................................... 493
DIG DEEPER: Structured Query Language (SQL)....................................................... 494
Outputting Data........................................................................................................... 496
Try this: Using Excel’s Database Functions............................................................. 498
Make This: MAKE: A Family Shopping List............................................................... 499
How Businesses Use Databases..................................................................................500
Data Warehousing and Storage.................................................................................. 500
Data Warehouses........................................................................................................ 500
TRENDS in IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!................................. 501
Populating Data Warehouses....................................................................................... 502
Data Staging............................................................................................................... 503
Data Marts.................................................................................................................. 503
Business Intelligence Systems.................................................................................... 504
Office Support Systems............................................................................................... 504
Transaction-Processing Systems................................................................................. 504
Management Information Systems.............................................................................. 505
Decision Support Systems.......................................................................................... 506
Enterprise Resource Planning Systems....................................................................... 508
Contents 13
twelfth
twelfth
EDITION
12
TRENDS in IT: Computers in Society: User-Populated Databases............................. 509
Data Mining................................................................................................................... 510
Ethics in IT: Data, Data Everywhere—But Is It Protected?....................................... 511
Solve This: College Database.................................................................................. 519
Chapter 12
Behind the Scenes: Networking and Security
in the Business World.......................................................... 520
Client/Server Networks and Topologies....................................................................522
Client/Server Network Basics..................................................................................... 522
Networking Advantages.............................................................................................. 522
Comparing Client/Server and Peer-to-Peer Networks.................................................. 522
Types of Client/Server Networks.................................................................................. 524
Servers........................................................................................................................... 527
Authentication and File Servers.................................................................................... 527
Print Servers................................................................................................................ 528
Application Servers...................................................................................................... 528
Database Servers........................................................................................................ 528
E-Mail Servers............................................................................................................. 528
Communications Servers............................................................................................. 528
Web Servers and Cloud Servers.................................................................................. 528
TRENDS in IT: Virtualization: Making Servers Work Harder........................................ 529
Network Topologies..................................................................................................... 530
Bus Topology.............................................................................................................. 530
Ring Topology............................................................................................................. 531
Star Topology.............................................................................................................. 532
Comparing Topologies................................................................................................. 534
Try this: Sharing Folders on a Home Network Using Windows................................ 536
Make This: MAKE: An App That Shares................................................................... 537
Setting Up Business Networks....................................................................................538
Transmission Media..................................................................................................... 538
Wired Transmission Media........................................................................................... 538
Twisted-Pair Cable...................................................................................................... 539
Coaxial Cable.............................................................................................................. 539
Fiber-Optic Cable........................................................................................................ 539
Wireless Media Options............................................................................................... 539
Comparing Transmission Media................................................................................... 539
Network Adapters........................................................................................................ 541
Network Navigation Devices....................................................................................... 543
MAC Addresses.......................................................................................................... 543
Switches and Bridges.................................................................................................. 544
Routers....................................................................................................................... 544
14 Contents
twelfth
twelfth
EDITION
12
Network Operating Systems....................................................................................... 545
DIG DEEPER: The OSI Model: Defining Protocol Standards....................................... 546
Client/Server Network Security................................................................................... 548
Authentication............................................................................................................. 548
Access Privileges........................................................................................................ 548
Physical Protection Measures...................................................................................... 549
Ethics in IT: How Should Companies Handle Data Breaches?................................ 550
Firewalls...................................................................................................................... 551
Solve This: Cyber Security Flyer and Mail Merge..................................................... 559
Chapter 13
Behind the Scenes: How the Internet Works...................... 560
Inner Workings of the Internet....................................................................................562
The Management of the Internet................................................................................ 562
Internet Networking..................................................................................................... 563
Internet Data Routes................................................................................................... 563
The Network Model of the Internet.............................................................................. 564
Data Transmission and Protocols............................................................................... 565
Circuit Switching......................................................................................................... 565
Packet Switching......................................................................................................... 565
TCP/IP........................................................................................................................ 566
Internet Identity: IP Addresses and Domain Names................................................. 567
IP Addresses............................................................................................................... 567
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols....................... 568
Domain Names........................................................................................................... 571
Try this: Ping Me..................................................................................................... 574
Make This: MAKE: An Earthquake Detector............................................................. 575
Coding and Communicating on the Internet............................................................576
HTML, XML, and other web Building Blocks............................................................ 576
HTML.......................................................................................................................... 576
XML and JSON........................................................................................................... 578
Web Browser Protocols............................................................................................... 578
Server-Side Applications.............................................................................................. 578
Client-Side Applications............................................................................................... 579
Communications Over the Internet............................................................................ 581
E-Mail.......................................................................................................................... 581
E-Mail Security: Encryption.......................................................................................... 582
Ethics in IT: Web Browsing: Not as Private as You May Think................................. 583
Instant Messaging....................................................................................................... 585
TRENDS in IT: Crowdsourcing: Harnessing the Power of Social Networks................ 586
Solve This: Creating an HTML Document................................................................ 593
Glossary................................................................................................................................. 436
Index...................................................................................................................................... 448
Contents 15
twelfth
twelfth
EDITION
12
What’s New
Technology in Action, 12th Edition
We are delighted for you to explore the Twelfth Edition of • Assessment questions after each Helpdesk provide
Technology in Action! instructors with a tool to gauge and track students’
progress. This edition includes three NEW or completely
Explore, discover, and experience technology with the
revised Helpdesks: “Evaluating Websites,” “Working with
immersive and adaptive Technology in Action—the book
Smartphones,” and “Keeping Your Data on Hand.”
that uses technology to teach technology!
• UPDATED Replay Videos: The Replay Videos provide an
Technology in Action is a learning system that pushes the
author-narrated video review of each chapter part in an
envelope of what is possible in technology, and what is helpful
easy-to-use format students can view on their phones,
in teaching. It is a system that fits the way students are
tablets, or computers.
learning today and uses rich companion media to engage
students in and out of the classroom while providing essential • With Tech Bytes Weekly, every week is new! This weekly
training on computer concepts. newsfeed provides two timely articles to save instructors
the prep time required for adding interesting and relevant
What’s New? news items to their weekly lectures. Tech Bytes Weekly also
• All content has been updated as needed to ensure features valuable links and other resources, including
coverage of the most current technology, and updated discussion questions and course activities.
end-of-chapter exercises are included throughout the book, • Jeopardy! Game and Crossword Puzzles: These
including a NEW end-of-chapter quiz and updated versions engaging games give students a fun way to challenge their
of the Check Your Understanding reviews. knowledge.
• NEW Make This projects address the hot area of mobile
In addition to these changes, all chapters have been
app creation! Mobile app creation skills are already highly
updated with new images, current topics, and state-of-
valued in the workplace. The Make This projects are a fun
the art technology coverage. Some of the chapter
way to engage your students while helping them develop
changes are listed here:
cutting-edge skills. Each chapter includes a Make This
mobile app project, most of which use App Inventor. By the Chapter 1: Using Technology to Change the World
end of the course, students will have completed 13 small
• Throughout the chapter, text, figures, and photos have
app projects that provide them with new skills they can use
been updated.
to create their own apps. And if they don’t have an Android
device, they can use the emulator and still learn the skills. • A new example of social networking tools used in political
context has been added.
• NEW Solve This projects put the concepts students are
learning into action through real-world problem solving using • The Ethics in IT, “The Digital Divide and the Mobile Bridge”
a Microsoft Office application or other technology tool! has been updated.
UPDATED AND ENHANCED media offerings including: • The Try This has been updated to reflect Skype site content
changes.
• Sound Bytes: These multimedia lessons help demystify
computer concepts with audio and video presentations. All • The concept of Big Data has been introduced in the section
Sound Bytes have been reviewed and updated as needed on data mining.
to provide timely and accurate information. This edition also • The end-of-chapter Ethics Project has been replaced with a
includes two NEW Sound Bytes: “Using the Arduino new project on big data, “Can Big Data Predict Your
Microcontroller” and “Programming with the Processing Grade?”
Language.”
• NEW Bits & Bytes “Compute Me a Picture” on generative
• Active Helpdesk: These highly interactive, engaging activities design using the free tool Processing has been added,
provide students with a realistic experience of how help is replacing the previous edition Bits & Bytes, “NASA Wants
delivered via live chat, FAQ searches, etc. at a helpdesk. You to Learn.”
Students play the role of a helpdesk staffer answering
technology questions using these various approaches. All Chapter 2: Looking at Computers: Understanding the
Helpdesks have been reviewed and updated as needed. Parts
• A virtual supervisor provides support to the student • Throughout the chapter, text, figures, and photos have
throughout the activity. been updated.
16 What’s New
twelfth
twelfth
EDITION
12
• Next generation gesture technology is now covered in the • UPDATED Sound Byte, “File Management,” to reflect
“How Cool Is This?” feature. Windows updates.
• NEW Bits & Bytes “Forget HDTV...Here Comes Ultra HD!” • UPDATED Sound Byte, “Customizing Windows,” to reflect
has been added, replacing the previous edition Bits & Bytes Windows updates.
“Testing and Calibrating Your PC Monitor.”
Technology in Focus: Information Technology Ethics
• NEW Bits & Bytes “Green Computing” has been added,
• This Tech in Focus has been updated throughout.
replacing the previous edition Bits & Bytes “Taking Care of
Flash Drives.” • A new section “Who Sets the Ethics for Robots?” has been
added, replacing the “Brain Technology: Creating Cyborgs”
• Throughout the chapter, text and figures have been
section.
updated to reflect Windows 8.1 changes.
Chapter 6: Understanding and Assessing Hardware:
• The end-of-chapter Team Time project has been replaced
Evaluating Your System
with a new project, “Data Storage Options.”
• Throughout the chapter, text has been updated to match
Chapter 3: Using the Internet: Making the Most of the
current hardware standards, and figures and photos have
Web’s Resources
been updated.
• Throughout the chapter, text, figures, and photos have
• All references to operating system utilities have been
been updated.
updated to reflect changes in Windows 8.1.
• Updated Bits & Bytes on HTML5 versus Flash.
• UPDATED Sound Byte, “Installing RAM,” to show RAM
• Revised Bits & Bytes “Making Safe Online Payments” to being added to a laptop computer.
include Apple Pay.
• NEW Sound Byte, “Installing an SSD Drive,” has been
• Try This has been updated to reflect Microsoft Office Online added, replacing the Sound Byte “Installing a Blu-Ray
changes. Drive.”
• NEW “Evaluating Websites” Helpdesk has been added,
Chapter 7: Networking: Connecting Computing Devices
replacing the “Using Subject Directories and Search
Engines” Helpdesk. • Throughout the chapter, text, figures, and photos have
been updated.
Technology in Focus: The History of the PC
• NEW Bits & Bytes “The Internet of Things” has been added,
• This Tech in Focus has been updated as needed. replacing “How Do You Find Your WiFi?”
Chapter 4: Application Software: Programs That Let You • NEW Bits & Bytes “Analyzing Network Problems” has been
Work and Play added, replacing “Want to Use Your Phone as a Remote
• Throughout the chapter, text, figures, and photos have Control?”
been updated. • The content on Network-Attached Storage Devices has been
• “How Cool Is This?” feature on eye-tracking software has updated to include Apple AirPort Time Capsule.
been updated. • The Trends in IT: “Where Should You Store Your Files: The
• “Trends in IT: Mobile Commerce: What Have You Bought Cloud Is Calling” has been updated.
with Your Phone Lately?” has been updated. Technology in Focus: Under the Hood
• New Alternative Note-Taking Applications have been added • This Tech in Focus has been updated throughout, with
to Figure 4.12. several new photos.
Chapter 5: System Software: The Operating System, Utility • Bits & Bytes “Forget CPUs: SoC Is the Future for Mobile
Programs, and File Management Devices!” has been updated to reflect current trends in
SoC.
• Throughout the chapter, text, figures, and photos have
been updated. Chapter 8: Digital Devices and Media: Managing a Digital
• Content throughout has been updated to include coverage Lifestyle
of Windows 8.1 update and OS X Yosemite. • Throughout the chapter, text, figures, and photos have
• NEW “How Cool Is This?” feature has been added on been updated.
smartwatches. • NEW Bits & Bytes “Bluetooth and LE Beacons” has been
• “The Windows Interface” section has been revised and added, replacing Bits & Bytes on mobile speech
updated to reflect changes in Windows 8.1 update. recognition.
What’s New 17
twelfth
twelfth
EDITION
12
• NEW “Working with Smartphones” Helpdesk has been • NEW Bits & Bytes “Hackathons” detailing collegiate and
added, replacing the “Using Portable Media Players” civic hackathons has been added, replacing Bits & Bytes
Helpdesk. This new Helpdesk uses much of the information “Competitive Coding.”
previously found in the “Keeping Data on Hand” Helpdesk. • NEW coverage of the Swift programming language for iOS
• REVISED “Keeping Your Data on Hand” Helpdesk to mobile development has been added.
include coverage of cloud computing. • NEW Sound Byte, “Programming with the Processing
• UPDATED Sound Byte, “Smartphones Are Really Smart” for Language,” has been added, replacing the “Looping
currency. Around the IDE” Sound Byte.
• UPDATED Sound Byte, “Connecting with Bluetooth,” to • NEW Sound Byte, “Using the Arduino Microcontroller,” has
include other uses of Bluetooth. been added, replacing the “3D Programming the Easy
Way” Sound Byte.
Chapter 9: Securing Your System: Protecting Your Digital
Data and Devices Chapter 11: Behind the Scenes: Databases and
Information Systems
• Throughout the chapter, text, figures, and photos have
been updated. • Throughout the chapter, text, figures, and photos have
been updated.
• Screenshots throughout have been updated to reflect
changes in the Windows 8.1 update. • NEW “How Cool Is This?” feature has been added on the
SHADOW app.
• NEW “How Cool is This?” on biometric authentication using
vein scanning technology has been added. • NEW Bits & Bytes “Google’s Knowledge Vault” replaces
“iTunes Smart Playlists—They’re Just Queries!”
• NEW Bits & Bytes “Multifactor Authentication: Don’t Rely
Solely on Passwords” has been added, replacing “Can’t Chapter 12: Behind the Scenes: Networking and Security
Remember Passwords? Try a Passphrase Instead!” in the Business World
• UPDATED Sound Byte, “Installing a Personal Firewall,” to • Throughout the chapter, text, figures, and photos have
cover wireless connections and Windows updates. been updated.
• Bits & Bytes “Go Green with Mobile Apps” has been
Technology in Focus: Careers in IT
updated to include more information on green apps.
• This Tech in Focus has been updated throughout.
Chapter 13: Behind the Scenes: How the Internet Works
• NEW Bits & Bytes “Cool New Jobs on the Horizon” has
• Throughout the chapter, text, figures, and photos have
been added, replacing Bits & Bytes “Matching a Career to
been updated.
Your Skills.”
• The Bits & Bytes “Gmail Features You Should Know About”
Chapter 10: Behind the Scenes: Software Programming has been updated.
• Throughout the chapter, text, figures, and photos have • NEW “How Cool Is This?” feature on the Ruby on Rails web
been updated. application development platform has been added.
• Updated “How Cool Is This” on open data initiative.
18 What’s New
twelfth
twelfth
EDITION
12
About the Authors
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer
science and business courses. He holds a BS in accounting from Rider
University and an MS in information systems from Drexel University, and
he is a certified public accountant. After a successful career in business,
Alan finally realized that his true calling is education. He has been teaching at the college
level since 2000. Alan enjoys attending technical conferences and meets regularly with
faculty and administrators from other colleges to discuss curriculum development and new
methods of engaging students.
12
Dedication
For my wife, Patricia, whose patience, understanding, and support
continue to make this work possible . . . especially when I stay up past
midnight writing! And to my parents, Jackie and Dean, who taught me
the best way to achieve your goals is to constantly strive to improve
yourself through education. Alan Evans
For all the teachers, mentors, and gurus who have popped in and out
of my life. Kendall Martin
20 Dedication
twelfth
twelfth
EDITION
12
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching,
and they are a continual source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our
spouses and children made sacrifices (mostly in time not spent with us) to permit us to
make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience,
a few individuals deserve special mention. The constant support and encouragement we
receive from Jenifer Niles, Executive Acquisitions Editor, and Andrew Gilfillan, VP, Editorial
Director, continually make this book grow and change. Our heartfelt thanks go to Shannon
LeMay-Finn, our Developmental Editor. Her creativity, drive, and management skills helped
make this book a reality. We also would like to extend our appreciation to Rhonda Aversa,
our Editorial and Production Project Manager, who works tirelessly to ensure that our book
is published on time and looks fabulous. The timelines are always short, the art is complex,
and there are many people with whom she has to coordinate tasks. But she makes it look
easy! We’d like to extend our thanks to the media and myITlab team: Eric Hakanson, Taylor
Ragan, Jaimie Noy, and Jessica Brandi for all of their hard work and dedication.
There are many people whom we do not meet in person at Pearson and elsewhere who
make significant contributions by designing the book, illustrating, composing the pages,
producing multimedia, and securing permissions. We thank them all. We would also like to
thank the supplement authors for this edition: Wanda Gibson, Doug Courter, Lori Damanti,
Linda Pogue, Elizabeth Lockley, and Stacy Everly.
And finally, we would like to thank the reviewers and the many others who contribute their
time, ideas, and talents to this project. We appreciate their time and energy, as their
comments help us turn out a better product each edition.
Global Edition
The publishers would like to thank the following for their contribution to the Global Edition:
Contributor
S. H. Chung, Wawasan Open University
Reviewers
Arup Bhattacharjee, RCC Institute of Technology
Shaligram Prajapat, Devi Ahilya University
Soumen Mukherjee, RCC Institute of Technology
Acknowledgments 21
twelfth
twelfth
EDITION
12
12th Edition Reviewers
Pearson and the authors would like to thank the following people for their help and
time in making this book what it is. We couldn’t publish this book without their
contributions.
Neale Adams Iowa Central Community College Desmond Chun Chabot College
Paul Addison Ivy Tech Sherri Clark Ivy Tech
Afrand Agah West Chester Kevin Cleary SUNY at Buffalo
Jack Alanen CSU–Northridge Cynthia Collings Central AZ
Karen Allen Community College of Rhode Island Mark Connell SUNY at Cortland
Ted Allen Reasoner IUPUI Kae Cooper BCTC/KCTCS
Peggy Anderson SUNY at Cortland Dale Craig Fullerton College
Barry Andrews Mt. SAC Becky Curtain William Rainer Harper College
Lou Ann Stroup Ivy Tech Juliana Cypert Tarrant County College
Mary Ann Zlotow College of DuPage Paul Dadosky Ivy Tech
Sabum Anyangwe Harford Community College Enoch Damson Akron
Linda Arnold HACC James Dang Tarrant SE
Adnan Atshan Passaic County Community College Marvin Daugherty Ivy Tech
Adeleye Bamkole Passaic County Community College John Dawson IUPUI
Guarav Bansal Wisconsin–Green Bay Robert Deadman IUPUI
Susan Barkalow St. Cloud State Ed Delean NOVA Alexandria
Bill Barnes Catawba Valley Community College Mary Dermody Chabot College
Ricky Barnes Catawba Valley Community College Don Dershem Mt View
Carolyn Barren Macomb Community College Charles Dessasure Tarrant SE
Tony Basilico Community College of Rhode Island Jeanette Dix Ivy Tech
Steven Battilana West Chester Sally Dixon Skagit Valley Community College
Michelle Beets Iowa Central Community College Gretchen Douglas SUNY at Cortland
Kourosh Behzadnoori Tarrant SE Judy Duff Louisiana Delta College
Chris Belcher CCAC–South Stacia Dutton SUNY Canton
Elise Bell CCSF Donna Earhart Genesee Community College
Julie Bell Delgado Cmty Clg Ed Eill Delaware City Community College
Robert Benavides Collin Cty Pam Ellis PA College of Technology
Garland Berry Columbia College Sylvia Emerson Rock Valley College
Diane Bittle HACC John Enomoto East LA
Burton Borlongan Mesa Community College Ron Enz Chattahoochee Tech
Carolyn Borne Louisiana State University Nancy Evans Indiana University–Purdue University
Gina Bowers-Miller HACC–Wildwood Indianapolis
Jeff Bowker Montco James Fabrey West Chester
Vicki Brooks Columbia College Deb Fells Mesa Community College
Gerald Burgess Western New Mexico University Pat Fenton West Valley
Dave Burgett McLennan Marjorie Feroe Delaware City Community College
Ed Bushman Yavapai College Beverly Fite Amarillo
Marcus Butler West LA Carol Fletcher Louisiana Delta College
Eric Cameron Passaic County Community College Barbara Fogle, Stuhr Trident Tech
Jill Canine Ivy Tech Ann Ford Tyson Florida State University
Gene Carbonara Long Beach Community College coordinator)
Gene Carbonaro Long Beach City College Tom Foster Chandler Gilbert Community College
John Carlisle Nashua Community College Susan Fry Boise State University
Glenn Carter Sonoma State Barb Garrell Delaware City Community College
Steve Carver Ivy Tech Barbara Garrell Delaware County Community
Patricia Casey Trident Tech College
Joni Catanzaro Louisiana State University Rich Geglein Ivy Tech
Afi Chamlou NOVA Alexandria Janet Gelb Grossmont Community College
Robert Chirwa KCTCS–Bluegrass–Cooper–CIT 105 Kevin Gentry Ivy Tech
Debbie Christenberry Randolph Community College Ian Gibbons Hillsborough Community
EDITION
12
College–Ybor Kay Johnson Community College of Rhode Island
Randy Gibson Indian River State College Mary Johnson Kingwood
Ernie Gines Tarrant SE Stacy Johnson Iowa Central Community College
Rebecca Giorcelli Fairmont State University Tiffany Johnson Tulsa Community College
Anita Girton PA College of Technology Tammy Jolley University of AR Community College
Ellen Glazer Broward Community College, South –Batesville
Cathy Glod Mohawk Valley Cmty College Sharon Karonias Northampton Cmty Coll
Valerie Golay Ivy Tech Kathy Kelly Montco
Jerry Gonnella Northern KY Mike Kelly Community College of Rhode Island
Holly Gould Ivy Tech Clarence Kennedy Louisiana Delta College
Deidre Grafel Chandler-Gilbert Community College David Kerven Georgia Gwinnett College
Diedre Grafel Chandler Gilbert Community College Annette Kerwin College of DuPage
Kemit Grafton Oklahoma State University– Ellen Kessler HACC–Wildwood
Oklahoma City Allyson Kinney Gateway Community College
Debra Grande Community College of Rhode Island REBECCA KIRK Augusta State University
Nancy Grant CCAC–South Ronald Kizior Loyola University Chicago
Wade Graves Grayson Meg Kletke Oklahoma State University
Natalia Grigoriants Pierce College Paul Koester Tarrant County College, Northwest
Glen Grimes Collin Cty Kam Kong Delaware State University
Toby Gustafson UCR Hon-Chung Kwok CCSF
Greg Hanson Ivy Tech Susan LaBrie Northampton Community College
A.C. Chapin Harford Community College Don Lafond SJRCC (St. John’s River)
Marie Hartlein Montco Rose LaMuraglia San Diego City
Meng Has Burlington County College David Lange Grand Valley
Lisa Hawkins Frederick Community College Earl Latiolas Delgado Cmty Clg
Joan Heise Ivy Tech Janet Laubenstein Northampton Cmty Coll
Sue Heistand Iowa Central Community College Lori Laudenbach St. Cloud State
Jessica Helberg Northern Virginia Community Krista Lawrence Delgado Cmty Clg
College Dr. Kate LeGrand Broward College
Terri Helfand Chaffey Community College Kate LeGrand Broward Community College, South
Jaime Hicks Ivy Tech Yi Li Zhuang Macomb Community College
Fred Hills McLennan Darrell Lindsey SJRCC (St. John’s River)
Timothy Hinz Genesee Community College Bob Lingvall Southwestern
Andrew Hobbs Delaware State University Duane Lintner Amarillo
Kristen Hockman Univ of Missouri–Columbia Thomas Liu New Jersey City Univ.
Susan Hoggard Tulsa Community College Wei Liu Georgia Gwinnett College
Don Holcomb KCTCS–Bluegrass–Cooper–CIT 105 Lynne Lyon Durham College
Terry Holleman Catawba Valley Community College Lydia Macaulay Tarrant SE
Debbie Holt KCTCS–Bluegrass–Cooper–CIT 105 Norma Marler Catawba Valley Community College
Barbara Hotta Leeward Community College Benjamin Marrero Ivy Tech
Bunny Howard SJRCC (St. John’s River) Ben Martz Northern KY
Virginia Huegel Western New Mexico University Lydia Mata Eastern AZ
Jim Hughes Northern KY Jenny Maurer PA College of Technology
Donald Humphrey Columbia Basin College John Mayhorne Harford Community College
Laura Hunt Tulsa Community College Glendora Mays SJRCC (St. John’s River)
Brent Hussin Wisconsin–Green Bay James McBride Eastern AZ
Steve Hustedde South Mountain Kari Meck HACC
Laurene Hutchinson Louisiana State University Doug Medin Western New Mexico University
Bobbie Hyndman Amarillo John Messer PA College of Technology
Rosie Inwang Olive Harvey Hillary Miller Kingwood
Hal Broxmeyer IUPUI Saeed Molki South TX College
Jennifer Ivey Central Carolina Community College Phil Moorhead Ivy Tech
Lisa Jackson Phoenix College Linda Moulton Montco
Christie Jahn Hovey Lincoln Land Community College Rob Murray Ivy Tech
Betsy Jenaway Macomb Community College Blankenstein Nashua Community College
Gina Jerry Santa Monica College Denise Nearing Indian River State College
Duane Johnson Ivy Tech Jean-Claude Ngatchou New Jersey City Univ.
12
Doreen Nicholls Mohawk Valley Cmty College Noah Singer Tulsa Community College
Brenda Nielsen Mesa Community College Steve Singer Kapiolani Community College
Keith Noe Ivy Tech Ann-Marie Smith Delaware City Community College
Kathy Olson Ivy Tech Will Smith Tulsa Community College
Helen Ortmann CCAC–South Michele Smolnik Columbia College
Meshack Osiro Ivy Tech Ali Soleymani NOVA Alexandria
Shelly Ota Leeward Community College Steve St. John Tulsa Community College
ChongWoo Park Georgia Gwinnett College Neal Stenlund Northern Virginia Community
Lucy Parker CSU–Northridge College
Rachel Pena South TX College Steve Stepanek CSU–Northridge
Wayne Phillips Chabot College Jo Stephens University of AR Community College
Jennifer Pickle Amarillo –Batesville
Blanca Polo Leeward Community College Dennis Stewart NOVA Alexandria
Jim Poole Honolulu Community College Ben Stonebraker Ivy Tech
Brian Powell West Virginia University Lynne Stuhr Trident Tech
Ernest Proctor LA Trade Alexis Stull Fairmont State University
Diane Puopolo Bunker Hill Community College Denise Sullivan Westchester Community College
Mike Puopolo Bunker Hill Community College Dottie Sunio Leeward Community College
James R. Anthos South University–Columbia Dave Surma IU South Bend
David R. Surma Indiana University South Bend Michael Swafford Tulsa Community College
Charles R. Whealton Delaware Technical and Community Cheryl Sypniewski Macomb Community College
College Ann Taff Tulsa Community College
Pat Rahmlow Montco James Taggart Atlantic Cape Community College
Michelle Reznick Oakton Community College Mel Tarnowski Macomb Community College
Leasa Richards Columbia College Juliana.P. Cypert Tarrant County College–NE
Kathie Richer Edmonds Community College Joyce Thompson Lehigh Carbon Community College
Darrell Riddell Ivy Tech Janine Tiffany Reading Area Comm College
Donald Riggs Schenectady County Community Faye Tippey Ivy Tech
College Matthew Trotter South TX College
Don Riggs Schenectady County Community Pam Uhlenkamp Iowa Central Community College
College Pat Vacca El Camino College
Terry Rigsby Hill College Nelmy Vasquez Broward Community College, South
Amy Roche Northampton Community College Pete Vetere Montco
Scott Rosen Santa Rosa Junior College Susie Viars-Thomas Grayson
Peter Ross Univ. of Albany Gabriel Viera South TX College
Scott Russell Eastern AZ Cynthia Wagner McLennan
Amy Rutledge Oakland University Rod Waller Indian River State College
Tom Ryan SJRCC (St. John’s River) Laurie Wallmark Raritan Valley Community College
Jessie Saldana Cypress Kari Walters Louisiana State University
Lorraine Sauchin Duquesne Stacy Ward Grafton High School
Judy Scheeren Duquesne Karen Weil McLennan
Lois Scheidt Ivy Tech Charles Whealton Del Tech & Community College–
Marcia Schlafmitz New Jersey City Univ. Dover
NAME SCHOOL Deena White Grayson
Ken Schroeder Ivy Tech Phil Whitney Bakersfield College
Todd Schultz Augusta State University Casey Wilhelm North Idaho College
Dick Schwartz Macomb Community College Billie Williams San Diego City
Francis Seidel Frederick Cmty College Melanie Williamson KCTCS–Bluegrass–Cooper–CIT 105
Lili Shashaani Duquesne Xin Xu Georgia Gwinnett College
Emily Shepard Central Carolina Community College Thomas Yip Passaic County Community College
Helen Sheran East LA Roger Young Ivy Tech
Cliff Sherrill Yavapai College Mary Zegarski Northampton Community College
Lisa Simpson-Kyle Yavapai College
EDITION
12
Letter from the Authors
Our 12th Edition—A Letter from the Authors
12
4. Connecting to and exploring the Internet
5. Exploring software
6. Learning the operating system and personalizing their computer
7. Evaluating and upgrading computing devices
8. Understanding home networking options and keeping computing devices safe from
hackers
9. Going mobile with smartphones, netbooks, tablets, and laptops
10. Going behind the scenes, looking at technology in greater detail
We continue to structure the book in a “spiraling” manner, intentionally introducing on a
basic level in the earlier chapters concepts that students traditionally have trouble with and
then later expanding on those concepts in more detail when students have become more
comfortable with them. Thus, the focus of the early chapters is on practical uses for the
computer, with real-world examples to help the students place computing in a familiar context.
For example, we introduce basic hardware components in Chapter 2, and then we go
into increasingly greater detail on some hardware components in Chapter 6 and in the
“Under the Hood” Technology in Focus feature. The Behind the Scenes chapters venture
deeper into the realm of computing through in-depth explanations of how programming,
networks, the Internet, and databases work. They are specifically designed to keep more
experienced students engaged and to challenge them with interesting research
assignments.
In addition to extensive review, practice, and assessment content, each chapter contains
several problem-solving, hands-on activities that can carried out in the classroom or as
homework:
• The Try This exercises lead students to explore a particular computing feature related to the
chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to
reinforce the material taught in the text and to support both classroom lectures and distance
learning:
• The Helpdesk training content, created specifically for Technology in Action, enables
students to take on the role of a helpdesk staffer fielding questions posed by computer users.
These have been updated to reflect the way in which users access help today.
• Exciting Sound Byte multimedia—fully updated and integrated with the text—expand
student mastery of complex topics.
• The Tech Bytes Weekly updates deliver the latest technology news stories to you for use in
your classroom. Each is accompanied by specific discussion topics and activities to expand
on what is within the textbook materials.
This book is designed to reach the students of the twenty-first century and prepare them
for the role they can take in their own community and the world. It has been an honor to
work with you over the past 12 years to present and explain new technologies to students,
and to show them the rapidly growing importance of technology in our world.
EDITION
12
Visual Walk-Through
Topic Sequence
Concepts are covered in a progressive manner between chapters to mirror the typical student learning experience.
CHAPTER 2 CHAPTER 6
Technology Under
storing data and ACTIVE HELPDESK
fIGURe 6.12
84 Chapter 2 Looking at Computers: Understanding the Parts 262 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System 328
1
the book. Using Technology
to Change the
world
COOL IS ThIS?
(pp. 38–40) you in a career? (pp. 46–52)
HOW
Carlos Castilla/Shutterstock; Carlos Castilla/Shutterstock; Winui/Shutterstock;
Want to make a difference with technology? The good news is that it has never
in our communities and in the world. For example, in London, over 20,000 school-age
children are joining Apps for Good, a program that links students, educators, and
Highlights the latest and greatest local experts to guide students in designing and building apps to help solve problems
they see around them. In the United States, the Verizon Innovative App Challenge
offered schools across the United States prize money for student teams to design apps
to address the needs of their communities. In Philadelphia, people met for a weekend-
long civic hacking event called Random Hacks of Kindness. They created apps to
keep track of lobbyists in city government, to map the location of murals in the city, and
to help organize people to dig out fire hydrants after snowstorms. What kind of good
can you do with technology? (Bloomberg/Getty Images; www.rhok.org; Chris Ratcliffe/Bloomberg/Getty Images)
For all media in this chapter go to www.pearsonglobaleditions
.com/Evans.
32 33
Visual Walk-Through 27
twelfth
twelfth
EDITION
12
Student Textbook Even your smartphone is a computer. Today’s
smartphones offer many features you probably use
day to day, including a wide assortment of apps,
media players, high-quality cameras, and web con-
nectivity. And just like your laptop computer, your
Input
DIG DeepeR
trends
making Reality even more Real exploration of hardware by looking at your computer’s
fIGURe 2.45 Cloud-ready printers only need an Internet connection to be accessed from any mobile device.
Ethics in IT 37
94 Chapter 2 Looking at Computers: Understanding the Parts 50 Chapter 1 Using Technology to Change the World
TRY THIS
Step 3 You can gather
What’s Inside My Computer? quite a bit of information
from the System screen,
Windows version
such as:
Understanding what capabilities your current computer has is one of the first steps toward computer literacy. • Speed of the processor RAM info
In this exercise, you’ll learn how to explore the components of your Windows computer. • Amount of RAM in-
make This
File Explorer
true/false
1. The move toward access instead of ownership is a sign of collaborative consumption.
2. Kickstarter is a profound platform that connects people to community projects seeking
for funding.
3. Internet users have been using social networking tools such as Twitter and Facebook to
communicate and distribute information. Solve This Solve This
4. Data mining is a process of searching and classifying huge amounts of data for pattern how Technology Is Used on the world Stage and
recognition.
critical thinking
Exercises that put the concepts in my personal life
In this activity, you’ll use Microsoft Word to reflect on how technology is affecting the world
1. What Occupies Your Mind?
What we think about is influenced by the information fed to our mind all day long. Web 2.0 has
students are learning into action using a as well as you, personally and professionally. Reflect on the content in Chapter 1 as you work
through this exercise.
You will use the following skills as you complete this activity:
28 Student Textbook
sentences that describe how technology is impacting your personal life. You should address
the importance of being computer literate. You should also address the kinds of technology
being used in the industry of your current or desired career.
5. Click anywhere in the title Technology, then using Format Painter, apply the Heading 1
format to the paragraph headers: Select How Technology Impacts Society and How Technol-
ogy Impacts Me Personally and Professionally.
a. Hint: Format Painter is in the Clipboard group on the HOME tab.
6. Change the Document Theme style to the Slice Theme.
a. Hint: Document Themes are found on the DESIGN tab, in the Document Formatting
group.
7. Select the title Technology, then format the font as Small Caps. Center align the title.
Another Random Scribd Document
with Unrelated Content
The fundamental idea of Plato on which Milton built his doctrine of
chastity is the one taught in the “Phædo,” that every experience of the
soul gained through the medium of the senses tends to degrade the
soul’s pure essence into the grosser, corporeal form of the body. “And
were we not saying long ago,” says Socrates, “that the soul, when using
the body as an instrument of perception, that is to say, when using the
sense of sight or hearing or some other sense (for the meaning of
perceiving through the body is perceiving through the senses)—were we
not saying that the soul too is then dragged by the body into the region
of the changeable, and wanders and is confused; the world spins round
her, and she is like a drunkard, when she touches change?” (“Phædo,”
79.) This appears in the “Comus” in a modified form, and constitutes the
basis for Milton’s conception of sin in “Paradise Lost.” In the masque
the idea is plainly stated by the Elder Brother in his explanation of the
doctrine of chastity; and its workings are seen in the effect of the magic
potion of Comus upon all who drink it.
“But, when lust,
By unchaste looks, loose gestures, and foul talk,
But most by lewd and lavish act of sin,
Lets in defilement to the inward parts,
The soul grows clotted by contagion,
Imbodies, and imbrutes, till she quite lose
The divine property of her first being.
Such are those thick and gloomy shadows damp
Oft seen in charnel-vaults, and sepulchres,
Lingering and sitting by a new-made grave,
As loath to leave the body that it loved;
And linked itself by carnal sensualty
To a degenerate and degraded state.”[4]
(ll. 463–47
This idea, thus stated, is represented symbolically in the disfigurement
which the magic liquor of Comus works in the divine character of the
soul visible in the countenance.
“Soon as the potion works, their human count’nance,
The express resemblance of the gods, is changed
Into some brutish form of wolf or bear,
Or ounce or tiger, hog, or bearded goat,
All other parts remaining as they were.
And they, so perfect is their misery,
Not once perceive their foul disfigurement,
But boast themselves more comely than before,
And all their friends and native home forget,
To roll with pleasure in a sensual sty.”
(ll. 68–7
The opposition indicated in the Platonic doctrine between the senses
and the soul is carried over by Milton in his description of the trial
undergone by the spirit of him who strives to be chaste. In Plato the
fundamental idea is somewhat different from Milton’s; for Plato is
concerned with the problem of the attainment by the soul of pure
knowledge, and he means by sense knowledge not sensuality in the
restricted moral signification of that word, but in the broader
signification of all experience gained through all the senses. Milton,
however, places a narrow interpretation upon the doctrine of Plato. This
is evident in his description of the attempt made by Comus to allure The
Lady to sensual indulgence.
Comus endeavors twice to overpower The Lady. He tries to tempt her
to impurity of conduct, and also seeks to blind her judgment through
the power of sense illusion. In this second trial there may be seen the
influence of the Platonic notion of sense knowledge destroying the soul’s
purity; the first trial contains the more narrow application of the idea of
unchastity. Milton himself calls attention to the greater similarity of
Comus to his mother, Circe, the enchantress of men’s minds, than to
Bacchus, the god of wine. He is
“a son
Much like his father, but his mother more.”
(ll. 56, 5
In keeping with his character he tries to entice The Lady to drink his
magic potion. He reminds her that about him are all the pleasures that
fancy can beget; he praises the marvellous efficacy of his elixir in
stirring joy within; and pleads with her not to be cruel to the dainty
limbs that were given for gentle usage.
“See, here be all the pleasures
That fancy can beget on youthful thoughts,
When the fresh blood grows lively, and returns
Brisk as the April buds in primrose season.
And first behold this cordial julep here,
That flames and dances in his crystal bounds,
With spirits of balm and fragrant syrups mixed.
Not that Nepenthes which the wife of Thone
In Egypt gave to Jove-born Helena
Is of such power to stir up joy as this,
To life so friendly, or so cool to thirst.
Why should you be so cruel to yourself,
And to those dainty limbs, which Nature lent
For gentle usage, and soft delicacy?
But you invert the covenants of her trust,
And harshly deal, like an ill borrower,
With that which you received on other terms,
Scorning the unexempt condition
By which all mortal frailty must subsist,
Refreshment after toil, ease after pain,
That have been tired all day without repast,
And timely rest have wanted. But, fair virgin,
This will restore all soon.”
(ll. 668–68
To this argument The Lady replies simply that no real pleasure can
result from mere physical gratification, but only from the enjoyment of
the moral quality of goodness. Thus she says to Comus:
“I would not taste thy treasonous offer. None
But such as are good men can give good things;
And that which is not good is not delicious
To a well-governed and wise appetite.”
(ll. 702–70
But when Comus reveals the more subtle trait of his nature, the
response which The Lady makes rises to the height of the threatening
danger. The Circean strain in his character is his power of deceiving the
soul through sense illusion, and his insidious desire to win his way into
the hearts of men by courteous words and gay rhetoric. Thus, when he
first is conscious of the approach of The Lady, he says:
“Thus I hurl
My dazzling spells into the spongy air,
Of power to cheat the eye with blear illusion,
And give it false presentments.”
(ll. 153–15
The effect of this sense witchery is seen in the forebodings of The Lady’s
fancy and in the hallucinations that haunt her mind as she comes within
the range of its spells. She says:
“A thousand fantasies
Begin to throng into my memory,
Of calling shapes, and beckoning shadows dire,
And airy tongues that syllable men’s names
On sands and shores and desert wildernesses.”
(ll. 205–20
When Comus, then, begins to practise the more dangerous art of this
witchery, acting in accordance with his confession of his manner,—
“under fair pretence of friendly ends,
And well-placed words of glozing courtesy,
Baited with reasons not unplausible,”—
(ll. 160–16
she responds to the attack with an account of the great power of
chastity. Only because she sees that he is trying to deceive her judgment
does she deign to answer him.
“I had not thought to have unlocked my lips
In this unhallowed air, but that this juggler
Would think to charm my judgment, as mine eyes,
Obtruding false rules pranked in reason’s garb.”
(ll. 756–75
She then intimates the power which the doctrine of chastity has to
overcome Comus, and states that, should she attempt to unfold it, the
enthusiasm of her soul would be such as to overwhelm him and his
magic structures.
“Enjoy your dear wit, and gay rhetoric,
That hath so well been taught her dazzling fence;
Thou art not fit to hear thyself convinced.
Yet, should I try, the uncontrollèd worth
Of this pure cause would kindle my rapt spirits
To such a flame of sacred vehemence
That dumb things would be moved to sympathize,
And the brute Earth would lend her nerves, and shake,
Till all thy magic structures, reared so high,
Were shattered into heaps o’er thy false head.”
(ll. 790–79
This vehemence of moral enthusiasm in Milton is due to the
conception of chastity as an “abstracted sublimity.” He learned it, he
says, in his study of Platonic philosophy; but the teaching of it as a
positive doctrine applied to human conduct is his own contribution, and
strikes the characteristic note of his idealism. In Plato he found only the
suggestion of this teaching. It lay in that idea of the “Phædo,” already
explained, of the destruction of the soul’s purity through sense
knowledge. Milton’s imagination, working upon this idea, transformed
it in a way peculiar to himself alone. The pure soul, according to his
belief, has power in itself to change the body to its own pure essence.
The conversion of body to soul, however, is not a tenet of Platonic
philosophy in any phase. It was the working in Milton of that tendency,
visible throughout the poetry of the seventeenth century, to assert the
primacy of the soul in life—an attempt which was made by the
metaphysical poets especially in their treatment of love.
The statement of this theory of chastity is explained in “Comus,” and
its quickening influence is felt in the very manner in which Milton refers
to it. Before the Elder Brother recounts the effect of lust upon the soul
he explains the hidden power of chastity.
“So dear to Heaven is saintly chastity
That, when a soul is found sincerely so,
A thousand liveried angels lackey her,
Driving far off each thing of sin and guilt,
And in clear dream and solemn vision
Tell her of things that no gross ear can hear;
Till oft converse with heavenly habitants
Begin to cast a beam on the outward shape,
The unpolluted temple of the mind,
And turns it by degrees to the soul’s essence,
Till all be made immortal.”
(ll. 453–46
This is the “abstracted sublimity” which The Lady refers to when she
addresses Comus. It is a notion, a mystery, which he, standing for the
purely sensual instincts of man, cannot apprehend. She tells him:
“Thou hast nor ear, nor soul, to apprehend
The sublime notion and high mystery
That must be uttered to unfold the sage
And serious doctrine of Virginity;
And thou art worthy that thou shouldst not know
More happiness than this thy present lot.”
(ll. 784–78
So powerfully, indeed, has the vision of beauty described in the
“Phædrus” and the “Symposium” affected Milton’s own imagination
that he visualizes chastity much as Plato does an idea; it is an idea not
only known to the mind, but thrilling the imagination with its beauty.
When The Lady is at first conscious of the power of Comus’s magic to
disturb her mind with foreboding fancies, she invokes faith, hope, and
chastity. The first two are seen as personages, but chastity only as a
pure, unblemished form.
“O, welcome, pure-eyed Faith, white-handed Hope,
Thou hovering angel girt with golden wings,
And thou unblemished form of Chastity!
I see ye visibly.”
(ll. 213–2
The directness of this vision is like that of the soul in the “Phædrus”
when it sees the flashing beauty of the beloved, “which,” says Plato,
“when the charioteer [the soul] sees, his memory is carried to the true
beauty, whom he beholds in company with Modesty like an image
placed upon a holy pedestal.” (“Phædrus,” 254.)
It is in the vision of this holy beauty as a lost possession of the soul
that the deadly pang of sin lies. In Milton’s later work there is no
reference to the power of the chaste soul to change the body to its own
pure essence; but his mind still holds to the power of sin to dim the
soul’s lustre. This is strikingly exemplified in the character of Satan’s
reflection on his faded glory. The one keen regret that he feels, in spite
of his indomitable will, is occasioned by the thought that by reason of
sinning his form has lost the beauty of its original goodness.
Throughout “Paradise Lost” there is repeated emphasis upon the faded
lustre of Satan’s form. The very first words that fall from Satan’s lips, in
his speech to Beelzebub, as the two lay rolling in the fiery gulf, draw our
attention to the great change in their outward forms.
“To whom the Arch-Enemy,
And thence in Heaven called Satan, with bold words
Breaking the horrid silence, thus began:—
‘If thou beest he—but Oh how fallen! how changed
From him!—who, in the happy realms of light,
Clothed with transcendent brightness, didst outshine
Myriads, though bright.’”
(I. 81–8
And then, as Satan proceeds, his mind is directed to his own departed
glory.
“Yet not for those [i.e. the force of the Almighty’s arms]
Nor what the potent Victor in his rage
Can else inflict, do I repent, or change,
Though changed in outward lustre, that fixed mind,
And high disdain from sense of injured merit.”
(I. 94–9
In his address to the Sun Satan expresses his hatred of that bright light
because it brings to remembrance the more glorious state from which
he fell.
“O thou that, with surpassing glory crowned,
Look’st from thy sole dominion like the god
Of this new World—at whose sight all the stars
Hide their diminished heads—to thee I call,
But with no friendly voice, and add thy name,
O Sun, to tell thee how I hate thy beams,
That bring to my remembrance from what state
I fell, how glorious once above thy sphere.”
(IV. 32–3
When the moral significance of this change in his form flashes
through his mind, Satan then suffers the deepest regret that could come
to him. The episode in which he learns the true effect of his sin is his
encounter with the angels, Ithuriel and Zephon. These two have found
him “squat like a toad” at the ear of Eve, trying to work upon her mind
while she sleeps. At the touch of Ithuriel’s spear Satan springs up in his
real form. Ithuriel then asks which of the rebel angels he may be. The
lofty pride of Satan is touched to the quick.
“‘Know ye not, then,’ said Satan, filled with scorn,
‘Know ye not me? Ye knew me once no mate
For you, there sitting where ye durst not soar!
Not to know me argues yourselves unknown,
The lowest of your throng.’”
(IV. 827–8
Zephon, however, points out that Satan should not think that he may
still be known, as he was in heaven, by the brightness of his form; for his
glory departed when he rebelled, and now resembles his sin and place of
doom.
“Think not, revolted Spirit, thy shape the same,
Or undiminished brightness, to be known
As when thou stood’st in Heaven upright and pure.
That glory then, when thou no more wast good,
Departed from thee; and thou resemblest now
Thy sin and place of doom obscure and foul.”
(IV. 835–84
At this thought Satan stands abashed. Lover of the beautiful as he is, he
now experiences the pang of its loss in his own life.
“So spake the Cherub; and his grave rebuke,
Severe in youthful beauty, added grace
Invincible. Abashed the Devil stood,
And felt how awful goodness is, and saw
Virtue in her shape how lovely—saw, and pined
His loss; but chiefly to find here observed
His lustre visibly impaired; yet seemed
Undaunted.”
(IV. 844–8
In Milton, then, whether his mind dwells on chastity or on the
consciousness of sin’s effect on the soul, it is to the vision of a world of
moral beauty that at last it mounts.
The relation of these ideals of holiness, temperance, and chastity to
the Christian doctrine of grace, which finds a place in the works of these
English poets, can now be clearly seen. The ideals of conduct are
essentially moral ideals, and in the attainment of them the soul lives its
fullest life. “The being who possesses good always, everywhere, and in
all things,” says Socrates in the “Philebus” (60), “has the most perfect
sufficiency.” According to Plato the soul may realize perfect sufficiency
of itself, it is self-sufficient; but Christian theology taught the necessity
of a heavenly grace for man to work out his own salvation. The two
ideals are thus distinct; and though the English poets incorporate both
in their work, the line of cleavage is distinctly visible, and the doctrine of
grace plays no more than a formal part in their exposition of the soul’s
growth. In the “Faerie Queene” and in “Comus” Platonic idealism
triumphs over Christian theology.
In Spenser the adventures of Arthur, in whom heavenly grace is
commonly recognized, have no moral significance in the progress of the
Knight aided by him toward the realization of virtue. Arthur frees the
Red Cross Knight from Orgoglio and Duessa, but the Red Cross Knight
is, morally speaking, the same man after he is freed as before; the
adventure of Arthur answers to no change significant in the moral order
of his life as this is revealed in holiness. The realization of holiness as an
intimate experience of the soul is achieved only after the Knight’s
training on the Mount of Heavenly Contemplation, which follows all his
preceding discipline in the Christian graces; for this has left him a “man
of earth.” In the legend of temperance the efficacy of grace is no more
vital, and what is more, it is an intrusion upon the moral order; it makes
the soul untrue to itself and all that we know of her. The logic of Guyon’s
inner life did not require that Arthur should come to his rescue after he
had shown his ability to remain temperate under strong emotion and in
the presence of wantonness and covetousness. His swoon at the end of
the seventh canto has no more meaning than mere bodily fatigue after
toil; morally, Guyon should have been only the stronger for his past
victories over his passions. Arthur’s entrance at the eighth canto,
consequently, is not required: Spenser is only paralleling in his second
book Arthur’s advent in the eighth canto of his first.
Similarly in “Comus.” When the younger brother inquires what that
power which The Lady possesses to keep herself unspotted in the
presence of lust may be, if it is not the strength of heaven, his elder
companion replies:
“I mean that too, but yet a hidden strength,
Which, if Heaven gave it, may be termed her own.
’Tis chastity, my brother, chastity.”
(ll. 418–42
So The Lady herself witnesses, when in the great crisis of her life she
appeals to faith, hope, and chastity; if need were, she is confident that
heaven would send an angel to her defence.
“O, welcome, pure-eyed Faith, white-handed Hope,
Thou hovering angel, girt with golden wings,
And thou unblemished form of Chastity!
I see ye visibly, and now believe
That He, the Supreme Good, to whom all things ill
Are but as slavish officers of vengeance,
Would send a glistering guardian, if need were,
To keep my life and honour unassailed.”
(ll. 212–22
And the Guardian Spirit, in whose parting words is found the moral of
the poem, explains the same idea of the self-sufficiency of the virtuous
soul.
“Mortals, that would follow me,
Love Virtue; she alone is free.
She can teach ye how to climb
Higher than the sphery chime;
Or, if Virtue feeble were,
Heaven itself would stoop to her.”
(ll. 1018–102
The theological doctrine of grace, although maintained as a part of an
intellectual scheme of thought, did not enter into the inward life of
Spenser’s and Milton’s work. So sensitive were they to the power of
beauty that nothing could come between it and the soul. To Milton
beauty wore an invincible grace, before which all must give way. Satan
recognized this when he was confronted by the angel, Zephon.
“So spake the Cherub; and his grave rebuke,
Severe in youthful beauty, added grace
Invincible.”
(IV. 844–84
Nothing was more natural, then, than that such a mind feeding upon
Plato’s thought and learning its great lesson of wisdom, that it alone is
truly fair, should conceive virtue panoplied in all the might of beauty.
He thus could teach in his “Comus” “the sun-clad power of chastity”:
“She that has that is clad in complete steel,
And, like a quivered nymph with arrows keen,
May trace huge forests, and unharboured heaths,
Infamous hills, and sandy perilous wilds,
Where, through the sacred rays of chastity,
No savage fierce, bandite, or mountaineer,
Will dare to soil her virgin purity.”
(ll. 421–42
In Spenser beauty is not thus militant. When the Red Cross Knight,
eager to enter the Cave of Error (I. i. 12), says to Una, confident in his
power,
“Virtue gives her selfe light, through darkenesse for to wad
Una cautions him to stay his step while there yet is time. (I. i. 13.) But it
is just as true in Spenser as in Milton, that beauty is an unerring guide
in life. Spenser responded to it because he felt most deeply the power of
the soul’s affinity for it. Throughout his work the influence of beauty
upon man is constantly present. Even though at times he seems to be
drawn to it by the subtlety of its appeal to the sense alone, he makes it
very evident that true beauty can be found in the soul only in its habits
of virtuous life. Thus the witch Duessa, when stripped of her alluring
beauty, is revolting in her hideousness (I. ii. 40; II. i. 22), and Acrasia’s
beauty only poisons the souls of her lovers. (II. i. 54.) Beauty that is
nothing but a mere witchery of the sense disappears into thin air when
confronted by virtue in her beauty. This is the lesson taught in the
vanishing of the false Florimell when the true is placed beside her. (V.
iii. 25.) The power of this affinity of the soul for beauty, mysterious as it
is real, which Spenser’s work reveals, is conveyed in a question from
Sidney’s “Arcadia,” where the spirit of the “Phædrus” is all present. “Did
ever mans eye looke thorough love upon the majesty of vertue, shining
through beauty, but that he became (as it well became him) a
captive?”[5]
CHAPTER II
Theory of Love
I. HEAVENLY LOVE
Heavenly love, as conceived in the poetry of the sixteenth and
seventeenth centuries, refers to two distinct experiences. By this term
the poets meant either the love known in the soul for the realities of the
unseen world or the love which God had shown to man in his creation
and preservation, and which man could experience through the
indwelling of God’s spirit within him. In the explanation of the nature of
these two experiences the teaching of Platonism played a very important
part, directing the course of that love of man for heavenly things, and
accounting for the presence of love in the Godhead.
To the discussion of the latter of these subjects Platonism was able to
offer two conceptions, in which a rational explanation of God’s love as
revealed in the creation could be found; one presenting the highest
reality as beauty, the other as the good. The first conception was present
in its theory of love. In the “Symposium” Plato had taught that love was
a desire of birth in beauty, and that the highest love was a desire of birth
in beauty absolute, the ultimate principle of all beauty. (“Symposium,”
206, 211–212.) Christianity, on the other hand, had taught that God is
love. By identifying the absolute beauty of Plato with God, and by
applying the Platonic conception of the birth of love to this Christian
conception of God as love, God Himself was understood as enjoying his
own beauty, thus begetting beings like to it in fairness. In Spenser’s
“Hymne of Heavenly Love,” this idea forms the first division of the
poem which treats of the love of God. (ll. 25–122.) At first God is
conceived as living in Himself in love.
“Before this worlds great frame, in which al things
Are now containd, found any being place,
Ere flitting Time could wag his eyas wings
About that mightie bound, which doth embrace
The rolling Spheres, and parts their houres by space,
That high eternall powre, which now doth move
In all these things, mov’d in it selfe by love.”
(ll. 25–
Loving itself, this Power brought forth, first the Son.
“It lov’d it selfe, because it selfe was faire;
(For faire is lov’d;) and of it selfe begot
Like to it selfe his eldest sonne and heire,
Eternall, pure, and voide of sinfull blot.”
(ll. 32–3
After the creation of the Son God begets the angels in His beauty.
“Yet being pregnant still with powrefull grace,
And full of fruitfull love, that loves to get
Things like himselfe, and to enlarge his race,
His second brood though not in powre so great,
Yet full of beautie, next he did beget
An infinite increase of Angels bright,
All glistring glorious in their Makers light.”
(ll. 53–5
After the fall of the angels God finally creates man.
“Such he him made, that he resemble might
Himselfe, as mortall thing immortall could;
Him to be Lord of every living wight,
He made by love out of his owne like mould,
In whom he might his mightie selfe behould:
For love doth love the thing belov’d to see,
That like it selfe in lovely shape may bee.”
(ll. 116–12
The second conception of the highest reality as the good is used in a
more general way to explain the reason of creation. In the “Timæus” the
Maker of the universe is conceived as creating the world in goodness.
“Let me tell you,” says Timæus, “why the creator made this world of
generation. He was good, and the good can never have any jealousy of
anything. And being free from jealousy, he desired that all things should
be as like himself as they could be.” (“Timæus,” 29.) In Henry More the
idea is expressed in the closing canto of his “Psychathanasia,” where he
is accounting for the creation. (III. 4.) He has words of bitter
denunciation for those who teach that God created the world merely as
a manifestation of His power, His will. (III. iv. 22.) He maintains the
Platonic teaching.
“When nothing can to Gods own self accrew,
Who’s infinitely happy; sure the end
Of this creation simply was to shew
His flowing goodnesse, which he doth out send
Not for himself; for nought can him amend;
But to his creature doth his good impart,
This infinite Good through all the world doth wend
To fill with heavenly blisse each willing heart.
So the free Sunne doth ’light and ’liven every part.”
(III. iv.
So closely allied in the English poets are the teachings of Platonism
with the devotional spirit of Christian love that in the same man and
even in the same experience the thought can pass most naturally from a
conception of Christ’s love for God, as absolute beauty, to a subjective
treatment of it as a personal experience. Thus in George Herbert’s lyric,
“Love,” the invocation is to the love of Christ for God springing from His
imperishable beauty; but in the second division of the poem this love
has become a refining fire that can burn all lusts within the soul and
enable it to see Him.
“Immortall Love, author of this great frame,
Sprung from that beauty which can never fade,
How hath man parcel’d out Thy glorious name,
And thrown it in that dust which Thou hast made.
· · · · ·
(ll. 4–10.)
· · · · ·
· · · · ·
· · · · ·
· · · · ·
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com