Essentials of Management Information Systems 10th Edition Laudon Solutions Manual
Essentials of Management Information Systems 10th Edition Laudon Solutions Manual
Essentials of Management Information Systems 10th Edition Laudon Solutions Manual
Essentials of Management Information Systems 10th Edition Laudon Solutions Manual
1. Essentials of Management Information Systems 10th
Edition Laudon Solutions Manual download pdf
https://testbankdeal.com/product/essentials-of-management-information-
systems-10th-edition-laudon-solutions-manual/
Visit testbankdeal.com today to download the complete set of
test banks or solution manuals!
2. We have selected some products that you may be interested in
Click the link to download now or visit testbankdeal.com
for more options!.
Essentials of Management Information Systems 10th Edition
Laudon Test Bank
https://testbankdeal.com/product/essentials-of-management-information-
systems-10th-edition-laudon-test-bank/
Management Information Systems 12th Edition Laudon
Solutions Manual
https://testbankdeal.com/product/management-information-systems-12th-
edition-laudon-solutions-manual/
Management Information Systems 13th Edition Laudon
Solutions Manual
https://testbankdeal.com/product/management-information-systems-13th-
edition-laudon-solutions-manual/
Essentials of Federal Taxation 2017 8th Edition Spilker
Solutions Manual
https://testbankdeal.com/product/essentials-of-federal-
taxation-2017-8th-edition-spilker-solutions-manual/
3. Human Relations Strategies for Success 5th Edition
Lamberton Solutions Manual
https://testbankdeal.com/product/human-relations-strategies-for-
success-5th-edition-lamberton-solutions-manual/
Genetics From Genes to Genomes 5th Edition Hartwell
Solutions Manual
https://testbankdeal.com/product/genetics-from-genes-to-genomes-5th-
edition-hartwell-solutions-manual/
Focus on Personal Finance An Active Approach to Help You
Develop Successful Financial Skills 4th Edition Kapoor
Test Bank
https://testbankdeal.com/product/focus-on-personal-finance-an-active-
approach-to-help-you-develop-successful-financial-skills-4th-edition-
kapoor-test-bank/
Psychology 4th Edition Ciccarelli Solutions Manual
https://testbankdeal.com/product/psychology-4th-edition-ciccarelli-
solutions-manual/
Understanding Management 8th Edition Daft Solutions Manual
https://testbankdeal.com/product/understanding-management-8th-edition-
daft-solutions-manual/
4. Strategic Management Communication for Leaders 3rd Edition
Walker Solutions Manual
https://testbankdeal.com/product/strategic-management-communication-
for-leaders-3rd-edition-walker-solutions-manual/
5. 1
Chapter 6
Telecommunications, the Internet, and Wireless Technology
Student Learning Objectives
1. What are the principal components of telecommunications networks and key networking
technologies?
2. What are the main telecommunications transmission media and types of networks?
3. How do the Internet and Internet technology work, and how do they support communication
and e-business?
4. What are the principal technologies and standards for wireless networking, communication,
and Internet access?
5. Why are radio frequency identification (RFID) and wireless sensor networks valuable for
business?
Chapter Outline
6.1 Telecommunications and Networking in Today’s Business World
Networking and Communication Trends
What Is a Computer Network?
Key Digital Networking Technologies
6.2 Communications Networks
Signals: Digital vs. Analog
Types of Networks
Physical Transmission Media
6.3 The Global Internet
What Is the Internet?
Internet Addressing and Architecture
Internet Services and Communication Tools
The Web
6.4 The Wireless Revolution
Cellular Systems
Wireless Computer Networks and Internet Access
RFID and Wireless Sensor Networks
Key Terms
The following alphabetical list identifies the key terms discussed in this chapter. The page
number for each key term is provided.
6. 2
3G networks, 207 Peer-to-peer, 187
4G networks, 207 Personal-area networks (PANs), 207
Bandwidth, 190 Protocol, 185
Blog, 204 Radio frequency identification (RFID), 209
Blogosphere, 204 Ring topology, 188
Bluetooth, 207 Router, 183
Broadband, 182 RSS, 205
Bus topology, 187 Search engines, 201
Cable Internet connections, 190 Search engine marketing, 203
Cell phone, 190 Search engine optimization (SEO), 203
Chat, 196 Semantic Web, 206
Coaxial cable, 188 Shopping bots, 204
Digital subscriber line (DSL), 190 Smart phones, 206
Domain name, 191 Social networking, 205
Domain name systems (DNS), 191 Social search, 203
Email, 196 Star topology, 187
Fiber-optic cable, 189 Switch, 183
File transfer protocol (FTP), 195 T1 lines, 191
Hertz, 190 Telnet, 195
Hotspots, 208 Topology, 187
Hubs, 183 Transmission control protocol/Internet protocol
(TCP/IP), 185
Hypertext transfer protocol (HTTP), 200 Twisted wire, 188
Instant messaging, 196 Unified communications, 199
Internet protocol (IP) address, 191 Uniform resource locator (URL), 201
Internet service provider (ISP), 190 Virtual private network (VPN), 199
Internet2, 195 Voice over IP (VoIP), 198
IPv6, 195 Web 2.0, 204
Local-area network (LAN), 186 Web 3.0, 206
Metropolitan-area network (MAN), 188 Web site, 200
Microblogging, 204 Wide-area networks (WAN), 188
Microwave, 189 Wi-fi, 208
Modem, 186 Wiki, 205
Network operating system (NOS), 182 WiMax, 209
Packet switching, 184 Wireless sensor networks (WSNs), 211
7. 3
Teaching Suggestions
Chapter 6 presents crucial concepts and terminology since telecommunications, networks, and
the Internet are now introducing fundamental changes in businesses. The opening case, “Hyundai
Heavy Industries Creates a Wireless Shipyard,” illustrates some of the new capabilities and
opportunities provided by contemporary networking technology.
Perhaps the most important benefit of the company’s new telecommunication system is the
increased productivity resulting from faster, better, and more efficient communications between
employees. Previously, employees below ground or sea level had to climb all the way to a ship’s
topside in order to call someone to discuss a problem. Now the employees convey transmissions
across wireless transmitters regardless of their location. Internet phones, Web cams, and PCs all
use the wi-fi network in the immediate vicinity or up to a mile away. The new system is expected
to save Hyundai Heavy up to $40 million annually.
The opening vignette provides an example of how businesses are adapting to new technologies
based on the Internet. It shows how companies must continually evolve as technology improves.
This chapter can be a lot of fun since most students probably already use many of the
technologies discussed like smartphones, wi-fi networks, the Web, and of course, search engines.
Knowing how to use the technologies is far different from understanding how they work. The
material in this chapter will help students with the latter.
Section 6.1, “Telecommunications and Networking in Today’s Business World”
Telecommunications and networks are vital to the majority of businesses today, and this section
explains why. Because telecommunications technology serves as the foundation for electronic
commerce and the digital economy, the concepts and terminology in Chapter 6 are important for
both MIS and business majors. This section explains the basic configuration of networks,
regardless of their size.
A contemporary corporate network infrastructure relies on both public and private infrastructures
to support the movement of information across diverse technological platforms. It includes the
traditional telephone system, mobile cellular communications, wireless local-area networks,
videoconferencing systems, a corporate Web site, intranets, extranets, and an array of local- and
wide-area networks, including the Internet.
Contemporary networks have been shaped by the rise of client/server computing, the use of
packet switching, and the adoption of TCP/IP as a universal communications standard for linking
disparate networks and computers. Client/server networks have distributed much of the
organization’s computing power to the desktop and factory floor. Packet switching makes more
efficient use of network communications capacity by breaking messages into small packets that
are sent independently along different paths in a network and then reassembled at their
destination. Protocols provide a common set of rules that enable communication among diverse
components in a telecommunications network. TCP/IP is a suite of protocols that has become the
dominant model of achieving connectivity among different networks and computers. It is the
connectivity model used in the Internet.
8. 4
One exercise you may try to help show how much we rely on communications today is to ask
students to count the number of text messages, phone calls, emails, and IM messages they either
sent or received in the last 24 hours or the last week. You could even go so far as to ask them to
not send or receive any of these communications for a day—or even a class period—to prove
how reliant we’ve become on telecommunications.
Section 6.2, “Communications Networks” It may help for you to bring several props to show
the different transmission media explained in this section. For example, bring twisted wire,
coaxial cable, and fiber-optic cable to show to the class and discuss the advantages and
disadvantages of each type of media. Students should note the different ranges (frequencies) of
wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this is a
critical concept today. Table 6.1 compares the range of four different area networks.
This section describes the different network topologies and how they pass data across a network.
If you have students working in business, ask them to identify the network topologies used in
their organizations.
Section 6.3, “The Global Internet” Most students are familiar with the Internet and motivated
to discuss it. You might begin this section by asking students how they spend their time on the
Internet and how their online activities have changed since they started using the Internet. Also,
ask them to identify which client platforms they currently use or have used. Ask your students to
identify several of the many benefits that the Internet offers to organizations. Ask them to
provide specific examples that they have read about in the text or have personally observed.
The principal Internet services and communication tools are email, chatting, instant messaging,
newsgroups, telnet, file transfer protocol, and the Web. Most students will probably be familiar
with these services, having used them in their personal life. What they may not understand or
relate to quite yet, is how effective the tools are in a business setting. These tools reduce time and
cost when firms must manage organizational activities and communicate with many employees.
If you have students working in businesses, ask them to discuss the communications tools their
organization uses. This section introduces a fairly new concept of unified communications. It
also compares Web 2.0 with Web 3.0 that is now in the conceptual stage.
Make students aware that while the new information technology infrastructure provides many
benefits and capabilities, it does require careful management and planning. Challenges posed by
networking and the Internet include loss of management control over information systems; the
need for organizational change; and the difficulty of ensuring infrastructure scalability and
reliability.
Interactive Session: Organizations: The Battle Over Net Neutrality
Case Study Questions:
1. What is network neutrality? Why has the Internet operated under net neutrality up to
this point in time?
9. 5
Network neutrality is the idea that Internet service providers must allow customers equal
access to content and applications regardless of the source or nature of the content. Presently,
the Internet is indeed neutral; all Internet traffic is treated equally on a first-come, first-serve
basis by Internet backbone owners. The Internet is neutral because it was built on phone
lines, which are subject to “common carriage” laws. These laws require phone companies to
treat all calls and customers equally. They cannot offer extra benefits to customers willing to
pay higher premiums for faster or clearer calls, a model known as tiered service.
2. Who’s in favor of network neutrality? Who’s opposed? Why?
Those in favor of network neutrality include organizations like MoveOn.org, the Christian
Coalition, the American Library Association, every major consumer group, many bloggers
and small businesses, and some large Internet companies like Google and Amazon. Some
members of the U.S. Congress also support network neutrality. This group argues that the
risk of censorship increases when network operators can selectively block or slow access to
certain content. Others are concerned about the effect of slower transmission rates on their
business models if users can’t download or access content in a speedy fashion.
Those who oppose network neutrality include telecommunications and cable companies who
want to be able to charge differentiated prices based on the amount of bandwidth consumed
by content being delivered over the Internet. Some companies report that 5 percent of their
customers use about half the capacity on local lines without paying any more than low-usage
customers. They state that metered pricing is the “fairest way” to finance necessary
investments in its network infrastructure. Internet service providers point to the upsurge in
piracy of copyrighted materials over the Internet as a reason to oppose network neutrality.
Comcast reported that illegal file sharing of copyrighted material was consuming 50 percent
of its network capacity. The company posits that if network transmission rates were slower
for this type of content, users would be less likely to download or access it.
3. What would be the impact on individual users, businesses, and government if Internet
providers switched to a tiered service model?
Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate
without permission from the phone and cable companies or other authorities. A more level
playing field spawns countless new businesses. Allowing unrestricted information flow
becomes essential to free markets and democracy as commerce and society increasingly
move online. Heavy users of network bandwidth would pay higher prices without necessarily
experiencing better service. Even those who use less bandwidth could run into the same
situation.
Network owners believe regulation like the bills proposed by net neutrality advocates will
impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from
“discriminatory” network practices. U.S. Internet service already lags behind other nations in
overall speed, cost, and quality of service, adding credibility to the providers’ arguments.
10. 6
Obviously, by increasing the cost for heavy users of network bandwidth, telecommunication
and cable companies and Internet service providers stand to increase their profit margins.
4. Are you in favor of legislation enforcing network neutrality? Why or why not?
Student answers will vary. Some components and principles to consider in answering this
question include:
• Price differentials: How much more would heavy bandwidth users pay than those who
consume less bandwidth?
• Speed: How much faster would network transmissions be with a tiered service model?
• Stifle innovation: Would a tiered service model stifle innovation by charging more for
heavy bandwidth use or would it free up bandwidth thus allowing more innovation?
• Censorship: Would telecommunication and cable companies and Internet service
providers increase censorship of content transmitted over networks?
• Discrimination by carriers: Would the end of network neutrality be the beginning of more
discrimination?
Because the government is now actively exploring the net neutrality issue students should be
able to easily find the most current information about it on the Web. The FCC Web site
(www.fcc.gov) is probably the best one for the most information.
MIS In Action
1. Visit the Web site of the Open Internet Coalition and select five member organizations.
Then visit the Web site of each of these organizations or surf the Web to find out more
information about each. Write a short essay explaining why each organization is in
favor of network neutrality.
There are dozens of OIC member organizations ranging from search engines to Iceland
Health Inc. to the Association of Research Libraries. It’s apparent that companies like eBay,
iwon.com, Match.com, Skype, and Shopping.com rely on unfettered and unrestrained
network access for the success of their businesses.
2. Calculate how much bandwidth you consume when using the Internet every day. How
many emails do you send daily and what is the size of each? (Your email program may
have email file size information.) How many music and video clips do you download
daily and what is the size of each? If you view YouTube often, surf the Web to find out
the size of a typical YouTube file. Add up the number of email, audio, and video files
you transmit or receive on a typical day.
Obviously the answer to this question will vary among students. It can be an eye-opener for
some to realize just how much bandwidth they use.
11. 7
Interactive Session: People: Monitoring Employees on Networks: Unethical or Good
Business?
Case Study Questions
1. Should managers monitor employee email and Internet usage? Why or why not?
Answers will vary on this question. The case study statistics show that corporate misuse and
abuse of email for personal reasons is exploding. Simply stated, employees who use
company resources for work not related to the company are, in essence, engaged in “service
theft.” They are being paid to work for the company, and this does not include abusing
corporate resources for personal time. Companies are in business to generate profits for their
shareholders. Managers certainly should be concerned with the loss of time and employee
productivity, the additional traffic it creates on their networks that inhibits the efficiency for
real business purposes, lost revenue or missed opportunities, as well as overcharging clients
because of lost employee efficiencies. The company itself is responsible for the use of its
resources and what employees do while using them. Adverse publicity can seriously affect a
company and could even result in very expensive lawsuits. Companies also fear email
leakage of trade secrets. Other legal and regulatory problems involve the safekeeping of all
emails that are generated on corporate equipment. This information must be retained for
specific time periods and may be requested as evidence in a lawsuit.
2. Describe an effective email and Web use policy for a company.
Like all policies an effective email and Web use policy must be carefully designed and
clearly communicated to all persons who use these corporate resources. There are a number
of different policies in existence. Some companies do not allow any personal use of corporate
networks whereas others allow some degree of activity that is easily monitored. A good
policy will detail exactly what type of activity is acceptable and what is not allowed. The
policy should clearly articulate sanctions that will be followed for any and all offenses in
relation to the policy. Most of all, rules for Internet usage should be tailored to specific
business needs and organizational cultures.
As an instructor you might wish to show students an example of an Internet usage policy
stored on this Web site: http://articles.techrepublic.com.com/5100-10878_11-6146841.html.
IBM offers extensive social computing guidelines as mentioned in the article at this URL:
www.ibm.com/blogs/zz/en/guidelines.html.
3. Should managers inform employees that their Web behavior is being monitored? Or
should managers monitor secretly? Why or why not?
Opinions will vary according to personal values and workplace experiences. However, most
students will probably answer that managers should inform employees that their Web
behavior is being monitored as a way to foster open communications and trust between both
sides. Many consultants believe companies should write corporate policies on employee
12. 8
email and Internet use. The policies should include explicit ground rules that state, by
position or level, under what circumstances employees can use company facilities for email,
blogging, or Web surfing. The policies should also inform employees whether these activities
are monitored and explain why.
MIS In Action
Explore the Web site of online employee monitoring software such as Websense, Barracuda
Networks, Message Labs, or SpectorSoft and answer the following questions.
1. What employee activities does this software track? What can an employer learn about
an employee by using this software?
From SpectorSoft Web site: The Spector Pro keylogger will instantly inform you whenever
employees type, or even simply view, any “alert words” or phrases that you specify. Spector
Pro continuously looks for alert words in everything they type, every Web site they visit, all
chats/instant messages and in each email sent or received. Every time a keyword is detected,
Spector Pro will immediately email you a detailed report of when, where and how the
keyword was used.
2. How can businesses benefit from using this software?
A testimonial from the SpectorSoft Web site: “With Spector Pro, we were immediately able
to discover which employees were non-productive. Not only has Spector Pro helped us weed
out lazy workers, it also helped to uncover fraud in some of our departments. In addition, this
program has also allowed us to realize and resolve training issues we’ve experienced with
our internal software. Spector Pro is very stealthy, has no noticeable effect on system
performance and provides excellent return on investment.”
3. How would you feel if your employer used this software where you work to monitor
what you are doing on the job? Explain your answer.
Answers will vary based on student experiences and beliefs. Students should consider the
issue from a management standpoint and not just a personal point of view. Would they want
to know upfront if their Internet communications are monitored? How would they feel about
the issue if they had to carry the extra workload from an employee abusing company Internet
access?
Section 6.4, “The Wireless Revolution” Ask your students how many of them use cellular
phones, personal communication services (PCS), or personal digital assistants (PDA). If you
have the class time, you can ask the campus IT director to discuss the telecommunications
technology used on your campus, take a tour of the campus facilities, or invite an IT director
from a local company to discuss his company’s telecommunications technology. Ask your
students to find out what their university does in order to support mobile wireless
communications. Have them investigate applications where Bluetooth, wi-fi, or hotspot
13. 9
technology is used and how it benefits them. Are they able to use their own personal appliances
to connect and utilize these technologies on their campus? Most students are excited to
demonstrate their “latest devices,” and you may wish to ask one of them to discuss the
capabilities of theirs. Ask them to discuss what they like or dislike about the features found on
their appliance.
Review Questions
1. What are the principal components of telecommunications networks and key
networking technologies?
Describe the features of a simple network and the network infrastructure for a large
company.
A simple network consists of two or more connected computers. Basic network components
include computers, network interfaces, a connection medium, network operating system
software, and either a hub or a switch. The networking infrastructure for a large company
relies on both public and private infrastructures to support the movement of information
across diverse technological platforms. It includes the traditional telephone system, mobile
cellular communication, wireless local-area networks, videoconferencing systems, a
corporate Web site, intranets, extranets, and an array of local- and wide-area networks,
including the Internet. This collection of networks evolved from two fundamentally different
types of networks: telephone networks and computer networks.
Name and describe the principal technologies and trends that have shaped
contemporary telecommunications systems.
Client/server computing, the use of packet switching, and the development of widely used
communications standards such as TCP/IP are the three technologies that have shaped
contemporary telecommunications systems.
Client/server computing has extended to networking departments, workgroups, factory
floors, and other parts of the business that could not be served by a centralized architecture.
The Internet is based on client/server computing. Packet switching technology allows nearly
full use of almost all available lines and capacity. This was not possible with the traditional
dedicated circuit-switching techniques that were used in the past. Having a set of protocols
for connecting diverse hardware and software components has provided a universally agreed
upon method for data transmission. TCP/IP is a suite of protocols that has become the
dominant.
2. What are the main telecommunications transmission media and types of networks?
Name the different types of physical transmission media and compare them in terms of
speed and cost.
14. 10
Typical speeds and costs for several of the transmission media are provided below.
Medium Speed Cost
Twisted wire up to 1 Gbps Low
Microwave up to 10 Mbps
Satellite up to 10 Mbps
Coaxial cable up to 1 Gbps
Fiber-optic cable up to 6+ Tbps High
Define a LAN, and describe its components and the functions of each component?
A LAN is a telecommunications network that is designed to connect personal computers and
other digital devices within a half-mile or 500-meter radius. LANs typically connect a few
computers in a small office, all the computers in one building, or all the computers in several
buildings in close proximity. LANs require their own dedicated channels.
Components of a typical LAN consists of: computers (dedicated server and clients), a
network operating system (NOS) residing on a dedicated server computer, cable (wiring)
connecting the devices, network interface cards (NIC), switches or a hub, and a router.
• NIC each computer on the network contains a network interface device.
• Connection medium for linking network components; can be a telephone wire, coaxial
cable, or radio signal in the case of cell phone and wireless local-area networks (wi-fi
networks).
• NOS routes and manages communications on the network and coordinates network
resources.
• Dedicated server provides users with access to shared computing resources in the
network. The server determines who gets access to data and in what sequence.
• Client computers are connected to one another.
• Switches or hubs act as a connection point between the computers. Hubs are very simple
devices that connect network components and send data packets to other connected
devices. A switch has more intelligence than a hub and can filter and forward data to a
specified destination.
• Router a special communications processor used to route data packets through different
networks, ensuring messages are sent to the correct address.
Name and describe the principal network topologies.
The principal network topologies include:
• Star topology: All devices on the network connect to a single hub and all network traffic
flows through the hub.
• Bus topology: One station transmits signals, which travel in both directions along a
single transmission segment. All of the signals are broadcast in both directions to the
entire network, with special software to identify which components receive each
message.
• Ring topology: Connects network components in a closed loop. Messages pass from
15. 11
computer to computer in only one direction around the loop and only one station at a time
may transmit.
3. How do the Internet and Internet technology work and how do they support
communication and e-business?
Define the Internet, describe how it works, and explain how it provides business value.
The Internet is a vast network of computers that connects millions of people all over the
world. The Internet uses the client/server model of computing and the TCP/IP network
reference model. Every computer on the Internet is assigned a unique numeric IP address. No
one owns the Internet, and it has no formal management organization. However, worldwide
Internet policies are established by organizations and government bodies, such as the Internet
Architecture Board and the World Wide Web Consortium. The Internet must also conform to
the laws of the sovereign nation-states in which it operates, as well as the technical
infrastructure that exist within the nation-state.
The Internet enables employees to gain remote access to their company’s internal systems
through its Web site. They are able to better service customers and suppliers, improve
operational efficiency, increase productivity, lower operational costs, have a broader market
base, and reach more individual customers on a global scale by establishing a Web presence.
The cost of email and other Internet services tend to be far lower than equivalent voice,
postal, or over night delivery costs, making the Internet a very inexpensive communication
medium. It is also a very fast method of communication, with messages arriving anywhere in
the world in a matter of seconds or minutes.
Explain how the domain name and IP addressing system work.
A domain name is the English-like name that corresponds to the unique 32-bit numeric IP
address for each computer connected to the Internet. The Domain Name System (DNS)
converts IP addresses to domain names so that users only need to specify a domain name to
access a computer on the Internet instead of typing the numeric IP address. DNS servers
maintain a database containing IP addresses mapped to their corresponding domain names.
The Internet is based on the TCP/IP networking protocol suite. Every computer on the
Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit
number represented by four strings of numbers ranging from 0 to 255 separated by periods.
When a user sends a message to another user on the Internet, the message is first decomposed
into packets using the TCP protocol. Each packet contains its destination address. The
packets are then sent from the client to the network server and from there on to as many other
servers as necessary to arrive at a specific computer with a known address. At the destination
address, the packets are reassembled into the orginal message.
List and describe the principal Internet services.
16. 12
Table 6.2 lists and describes the major Internet services.
• Email: person-to-person messaging; document sharing
• Newsgroups: discussion groups on electronic bulletin boards
• Chatting and instant messaging: interactive conversations
• Telnet: logging on to one computer system and doing work on another
• File transfer protocol (FTP): transferring files from computer to computer
• The Web: retrieving, formatting, and displaying information (including text, audio,
graphics, and video) using hypertext links
Define and describe VoIP and virtual private networks and explain how they provide
value to businesses.
• Voice over Internet Protocol (VoIP) enables Internet technology to be used for
telephone voice transmission over the Internet or private networks. VoIP offers the
advantage of avoiding tolls charged by local and long-distance telephone networks. VoIP
provides businesses an opportunity to reduce costs because they no longer have to
maintain separate networks or provide support services and personnel for each different
type of network. It gives organizations flexibility because phones can be added or moved
to different offices without rewiring or reconfiguring networks.
• Virtual private networks are secure, encrypted, private networks that have been
configured within a public network to take advantage of the economies of scale and
management facilities of large networks, such as the Internet. VPNs are low-cost
alternatives to private WANs. VPNs give businesses a more efficient network
infrastructure for combining voice and data networks.
List and describe alternative ways of locating information on the Web.
• Search engines are a facility on the Web that helps you find sites with the information
and/or services you want. Examples: Google, Yahoo!, and MSN.
• Mobile Search is available on smartphones and tablet computers, providing users a way
to find what they want while on the go.
• Intelligent agent shopping bots use intelligent agent software for searching the Internet
for shopping information. Examples: MySimon and Froogle
• Web 2.0 provides second-generation interactive Internet-based services that enable
people to collaborate, share information, and create new services online. Web 2.0
software applications run on the Web itself instead of the desktop and bring the vision of
Web-based computing closer to realization.
• Blogs are informal yet structured Web sites where subscribing individuals can publish
stories, opinions, and links to other Web sites of interest.
• Microblogging is primarily a function of Twitter.com, using 140 character messages.
• Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to
have content they want pulled from Web sites and fed automatically to their computers,
where it can be stored for later viewing. It’s commonly used with blogs.
17. 13
• Wikis are collaborative Web sites where visitors can add, delete, or modify content on
the site, including the work of previous authors.
• Web 3.0 (semantic Web) reduces the amount of human involvement in searching for and
processing Web information. It’s still in its infancy but promises to establish specific
meanings for data on the Web, categories for classifying the data, and relationships
between classification categories.
Compare Web 2.0 and Web 3.0.
Web 2.0 refers to second-generation interactive Internet-based services that enable people to
collaborate, share information, and create new services online. Web 2.0 is distinguished by
technologies and services like cloud computing, software mashups and widgets, blogs, RSS,
and wikis. These software applications run on the Web itself instead of the desktop and bring
the vision of Web-based computing closer to realization. Web 2.0 tools and services have
fueled the creation of social networks and other online communities where people can
interact with one another in the manner of their choosing.
Web 3.0 focuses on developing techniques to make searching Web pages more productive
and meaningful for ordinary people. Web 3.0 is the promise of a future Web where all digital
information and all contacts can be woven together into a single meaningful experience.
Sometimes referred to as the semantic Web, Web 3.0 intends to add a layer of meaning atop
the existing Web to reduce the amount of human involvement in searching for and processing
Web information. It also focuses on ways to make the Web more “intelligent,” with machine-
facilitated understanding of information promoting a more intuitive and effective user
experience. Web 3.0 will use cloud computing, software-as-a-service, ubiquitous
connectivity among mobile platforms and Internet access devices, and transformation of the
Web into a more seamless and interoperable whole.
4. What are the principal technologies and standards for wireless networking,
communications, and Internet access?
Define Bluetooth, wi-fi, WiMax, 3G, and 4G networks.
Standards for wireless computer networks include Bluetooth (802.15) for small personal-area
networks (PANs), wi-fi (802.11) for local-area networks (LANs), and WiMax (802.16) for
metropolitan-area networks (MANs).
Bluetooth can link up to eight devices within a 10-meter area using low-power, radio-based
communication and can transmit up to 722 Kbps in the 2.4 GHz band. Wireless phones,
keyboards, computers, printers, and PDAs using Bluetooth can communicate with each other
and even operate each other without direct user intervention.
Wi-fi is useful for creating wireless LANs and for providing wireless Internet access. Its
access range is limited to anywhere between 300 feet and three miles. Hotspots are public
access points individuals use to obtain high speed Internet access.
18. 14
WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75
Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and
cable lines. The 802.16 specification also has robust security and quality-of-service features
to support voice and video.
3G is a short term for third-generation wireless technology, especially mobile
communications. Cellular networks have evolved from slow-speed (1G) analog networks to
high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with
speeds ranging from 144 Kbps to more than 2 Mbps for data transmission.
4G is short term for fourth-generation wireless technology. It is entirely packet switched and
capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal conditions),
with premium quality and high security. Voice, data, and high-quality streaming video will
be available to users anywhere, anytime.
Describe the capabilities of each and for which types of applications each is best suited.
• Bluetooth: access very limited; useful for creating small personal-area networks
• Wi-fi: access is limited to 10 to 30 meters; useful for creating small local-area networks
• WiMax: access is limited to a range up to 31 miles: useful for creating wide-area
networks
• 3G networks: access is available on major cellular telephone carriers that have
configured their networks for 3G services.
• 4G networks: provides premium quality for voice, data, and streaming video from
cellular telephone carriers
5. Why are RFID and wireless sensor networks (WSNs) valuable for business?
Define RFID, explain how it works and how it provides value to businesses.
Mobile wireless technology facilitates supply chain management by capturing data on the
movement of goods as these events take place and by providing detailed, immediate
information as goods move among supply chain partners. Radio frequency identification
(RFID) systems provide a microchip that contains data about an item and its location. The
tags transmit radio signals over a short distance to special RFID readers. The RFID readers
then pass the data over a network to a computer for processing.
RFID gives businesses an opportunity to further automate their supply chain networks. The
technology allows more data on an RFID chip than typical barcodes. RFID systems track
each pallet, lot, or unit item in a shipment. The technology helps companies improve
receiving and storage operations by improving their ability to “see” exactly what stock is
stored in warehouses or on retail store shelves.
Define WSNs, explain how they work and describe the kinds of applications that use
them.
19. 15
Wireless sensor networks (WSNs) are networks of interconnected wireless devices with
some processing and radio-transmitting capability that are embedded into the physical
environment to provide measurements of many points over large spaces.
Wireless sensor networks are valuable for monitoring environmental changes, traffic
patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
in the field for years without any maintenance or human intervention. That reduces costs to
businesses using them.
Discussion Questions
1. It has been said that within the next few years, smartphones will become the single most
important digital device we own. Discuss the implications of this statement.
Cell phones and smartphones are morphing into portable computing platforms that allow
users to perform some computing tasks that previously could only be accomplished on a
desktop computer. Smartphones enable digital capabilities like email, messaging, wireless
access to the Internet, voice communication, and digital cameras. They also allow users to
view short video clips, play music and games, surf the Web and transmit and receive
corporate data. New generations of mobile processors and faster mobile networks enable
these devices to function as digital computing platforms allowing users to perform many of
the tasks of today’s PCs on smartphones. Storage and processing power continue to increase
thereby rivaling those of the typical PC. That allows users to run key applications and access
digital content through smartphone technologies.
Managers and employees will be able to break the tether to the desk and desktop computer
because of smartphones. Users can more easily stay in touch with customers, suppliers,
employees, and business partners and provide more flexible arrangements for organizing
work.
On the downside, smartphones can potentially increase the amount of time workers spend
“on the job” by making communication and computing possible anytime, anywhere. That
may increase the amount of techno-stress employees and managers experience by not
allowing them any free time or claim to their own personal space.
2. Should all major retailing and manufacturing companies switch to RFID? Why or why
not?
RFID systems are complex and, in the past, expensive to implement. Now the cost of RFID
tags is approaching 10 cents per passive tag in the United States. As the price decreases,
RFID is starting to become cost-effective for some applications. Businesses that will most
likely benefit from RFID technology are those that frequently track the movement of goods
through supply chains. In inventory control and supply chain management, RFID systems
capture and manage more detailed information about items in warehouses or in production
than bar coding systems.
21. ALCMÈNE.
J’ai peine à comprendre sur quoi
Vous fondez les discours que je vous entends faire;
Et, si vous vous plaignez de moi,
Je ne sais pas, de bonne foi,
Ce qu’il faut pour vous satisfaire.
Hier au soir, ce me semble, à votre heureux retour,
On me vit témoigner une joie assez tendre,
Et rendre aux soins de votre amour
Tout ce que de mon cœur vous aviez lieu d’attendre.
AMPHITRYON.
Comment?
ALCMÈNE.
Ne fis-je pas éclater à vos yeux
Les soudains mouvemens d’une entière allégresse?
Et le transport d’un cœur peut-il s’expliquer mieux,
Au retour d’un époux qu’on aime avec tendresse?
AMPHITRYON.
Que me dites-vous là?
ALCMÈNE.
Que même votre amour
Montra de mon accueil une joie incroyable;
Et que, m’ayant quittée à la pointe du jour,
Je ne vois pas qu’à ce soudain retour
Ma surprise soit si coupable.
AMPHITRYON.
22. Est-ce que du retour que j’ai précipité
Un songe, cette nuit, Alcmène, dans votre âme,
A prévenu la vérité?
Et que, m’ayant peut-être en dormant bien traité,
Votre cœur se croit vers ma flamme
Assez amplement acquitté?
ALCMÈNE.
Est-ce qu’une vapeur, par sa malignité,
Amphitryon, a, dans votre âme,
Du retour d’hier au soir brouillé la vérité,
Et que du doux accueil duquel je m’acquittai
Votre cœur prétend à ma flamme
Ravir toute l’honnêteté?
AMPHITRYON.
Cette vapeur, dont vous me régalez,
Est un peu, ce me semble, étrange.
ALCMÈNE.
C’est ce qu’on peut donner pour change,
Au songe dont vous me parlez.
AMPHITRYON.
A moins d’un songe, on ne peut pas, sans doute,
Excuser ce qu’ici votre bouche me dit.
ALCMÈNE.
A moins d’une vapeur qui vous trouble l’esprit,
On ne peut pas sauver ce que de vous j’écoute.
AMPHITRYON.
23. Laissons un peu cette vapeur, Alcmène.
ALCMÈNE.
Laissons un peu ce songe, Amphitryon.
AMPHITRYON.
Sur le sujet dont il est question,
Il n’est guère de jeu que trop loin on ne mène.
ALCMÈNE.
Sans doute; et, pour marque certaine,
Je commence à sentir un peu d’émotion.
AMPHITRYON.
Est-ce donc que par là vous voulez essayer
A réparer l’accueil dont je vous ai fait plainte?
ALCMÈNE.
Est-ce donc que par cette feinte
Vous désirez vous égayer?
AMPHITRYON.
Ah! de grâce, cessons, Alcmène, je vous prie,
Et parlons sérieusement.
ALCMÈNE.
Amphitryon, c’est trop pousser l’amusement;
Finissons cette raillerie.
AMPHITRYON.
24. Quoi! vous osez me soutenir en face
Que plus tôt qu’à cette heure on m’ait ici pu voir?
ALCMÈNE.
Quoi! vous voulez nier avec audace
Que dès hier en ces lieux vous vîntes sur le soir?
AMPHITRYON.
Moi! je vins hier?
ALCMÈNE.
Sans doute; et dès devant l’aurore
Vous vous en êtes retourné.
AMPHITRYON, à part.
Ciel! un pareil débat s’est-il pu voir encore?
Et qui de tout ceci ne seroit étonné?
Sosie!
SOSIE.
Elle a besoin de six grains d’ellébore,
Monsieur; son esprit est tourné.
AMPHITRYON.
Alcmène, au nom de tous les dieux,
Ce discours a d’étranges suites!
Reprenez vos sens un peu mieux,
Et pensez à ce que vous dites.
ALCMÈNE.
25. J’y pense mûrement aussi;
Et tous ceux du logis ont vu votre arrivée.
J’ignore quel motif vous fait agir ainsi;
Mais, si la chose avoit besoin d’être prouvée,
S’il étoit vrai qu’on pût ne s’en souvenir pas,
De qui puis-je tenir, que de vous, la nouvelle
Du dernier de tous vos combats,
Et les cinq diamans que portoit Ptérélas,
Qu’a fait dans la nuit éternelle
Tomber l’effort de votre bras?
En pourroit-on vouloir un plus sûr témoignage?
AMPHITRYON.
Quoi! je vous ai déjà donné
Le nœud de diamans que j’eus pour mon partage,
Et que je vous ai destiné?
ALCMÈNE.
Assurément. Il n’est pas difficile
De vous en bien convaincre.
AMPHITRYON.
Et comment?
ALCMÈNE, montrant le nœud de diamans à sa ceinture.
Le voici.
AMPHITRYON.
Sosie!
SOSIE, tirant de sa poche un coffret.
26. Elle se moque, et je le tiens ici:
Monsieur, la feinte est inutile.
AMPHITRYON, regardant le coffret.
Le cachet est entier.
ALCMÈNE présentant à Amphitryon le nœud de diamans.
Est-ce une vision?
Tenez. Trouverez-vous cette preuve assez forte?
AMPHITRYON.
Ah! ciel! ô juste ciel!
ALCMÈNE.
Allez, Amphitryon,
Vous vous moquez d’en user de la sorte;
Et vous en devriez avoir confusion.
AMPHITRYON.
Romps vite ce cachet.
SOSIE, ayant ouvert le coffret.
Ma foi, la place est vide.
Il faut que, par magie, on ait su le tirer,
Ou bien que de lui-même il soit venu, sans guide,
Vers celle qu’il a su qu’on en vouloit parer.
AMPHITRYON, à part.
O dieux! dont le pouvoir sur les choses préside,
Quelle est cette aventure, et qu’en puis-je augurer
Dont mon amour ne s’intimide?
SOSIE, à Amphitryon.
27. Si sa bouche dit vrai, nous avons même sort,
Et, de même que moi, monsieur, vous êtes double.
AMPHITRYON.
Tais-toi!
ALCMÈNE.
Sur quoi vous étonner si fort;
Et d’où peut naître ce grand trouble?
AMPHITRYON, à part.
O ciel! quel étrange embarras!
Je vois des incidens qui passent la nature;
Et mon honneur redoute une aventure
Que mon esprit ne comprend pas.
ALCMÈNE.
Songez-vous, en tenant cette preuve sensible,
A me nier encor votre retour pressé?
AMPHITRYON.
Non; mais, à ce retour, daignez, s’il est possible,
Me conter ce qui s’est passé.
ALCMÈNE.
Puisque vous demandez un récit de la chose,
Vous voulez dire donc que ce n’étoit pas vous?
AMPHITRYON.
Pardonnez-moi; mais j’ai certaine cause
Qui me fait demander ce récit entre nous.
28. ALCMÈNE.
Les soucis importans qui vous peuvent saisir
Vous ont-ils fait si vite en perdre la mémoire?
AMPHITRYON.
Peut-être; mais enfin vous me ferez plaisir
De m’en dire toute l’histoire.
ALCMÈNE.
L’histoire n’est pas longue. A vous je m’avançai,
Pleine d’une aimable surprise,
Tendrement je vous embrassai,
Et témoignai ma joie à plus d’une reprise.
AMPHITRYON, à part.
Ah! d’un si doux accueil je me serois passé.
ALCMÈNE.
Vous me fîtes d’abord ce présent d’importance,
Que du butin conquis vous m’aviez destiné,
Votre cœur avec véhémence
M’étala de ses feux toute la violence,
Et les soins importuns qui l’avoient enchaîné,
L’aise de me revoir, les tourmens de l’absence,
Tout le souci que son impatience
Pour le retour s’étoit donné;
Et jamais votre amour, en pareille occurrence,
Ne me parut si tendre et si passionné.
AMPHITRYON, à part.
Peut-on plus vivement se voir assassiné!
29. ALCMÈNE.
Tous ces transports, toute cette tendresse,
Comme vous croyez bien, ne me déplaisoient pas;
Et, s’il faut que je le confesse,
Mon cœur, Amphitryon, y trouvoit mille appas.
AMPHITRYON.
Ensuite, s’il vous plaît?
ALCMÈNE.
Nous nous entrecoupâmes
De mille questions qui pouvoient nous toucher.
On servit. Tête à tête ensemble nous soupâmes;
Et, le souper fini, nous nous fûmes coucher.
AMPHITRYON.
Ensemble?
ALCMÈNE.
Assurément. Quelle est cette demande?
AMPHITRYON, à part.
Ah! c’est ici le coup le plus cruel de tous,
Et dont à s’assurer trembloit mon feu jaloux.
ALCMÈNE.
D’où vous vient, à ce mot, une rougeur si grande?
Ai-je fait quelque mal de coucher avec vous?
AMPHITRYON.
30. Non, ce n’étoit pas moi, pour ma douleur sensible;
Et qui dit qu’hier ici mes pas se sont portés
Dit, de toutes les faussetés,
La fausseté la plus horrible.
ALCMÈNE.
Amphitryon!
AMPHITRYON.
Perfide!
ALCMÈNE.
Ah! quel emportement!
AMPHITRYON.
Non, non, plus de douceur et plus de déférence;
Ce revers vient à bout de toute ma constance;
Et mon cœur ne respire, en ce fatal moment,
Et que fureur et que vengeance!
ALCMÈNE.
De qui donc vous venger? et quel manque de foi
Vous fait ici me traiter de coupable?
AMPHITRYON.
Je ne sais pas; mais ce n’étoit pas moi:
Et c’est un désespoir qui de tout rend capable.
ALCMÈNE.
Allez, indigne époux, le fait parle de soi,
Et l’imposture est effroyable.
31. C’est trop me pousser là-dessus,
Et d’infidélité me voir trop condamnée.
Si vous cherchez, dans ces transports confus,
Un prétexte à briser les nœuds d’un hyménée
Qui me tient à vous enchaînée,
Tous ces détours sont superflus;
Et me voilà déterminée
A souffrir qu’en ce jour nos liens soient rompus.
AMPHITRYON.
Après l’indigne affront que l’on me fait connoître,
C’est bien à quoi, sans doute, il faut vous préparer:
C’est le moins qu’on doit voir; et les choses peut-être
Pourront n’en pas là demeurer.
Le déshonneur est sûr, mon malheur m’est visible,
Et mon amour en vain voudroit me l’obscurcir;
Mais le détail encor ne m’en est pas sensible,
Et mon juste courroux prétend s’en éclaircir.
Votre frère déjà peut hautement répondre
Que, jusqu’à ce matin, je ne l’ai point quitté:
Je m’en vais le chercher, afin de vous confondre
Sur ce retour qui m’est faussement imputé.
Après, nous percerons jusqu’au fond d’un mystère
Jusques à présent inouï;
Et, dans les mouvemens d’une juste colère,
Malheur à qui m’aura trahi!
SOSIE.
Monsieur...
AMPHITRYON.
Ne m’accompagne pas,
Et demeure ici pour m’attendre.
32. CLÉANTHIS, à Alcmène.
Faut-il...
ALCMÈNE.
Je ne puis rien entendre:
Laisse-moi seule, et ne suis point mes pas.
SCÈNE III.—CLÉANTHIS, SOSIE.
CLÉANTHIS, à part.
Il faut que quelque chose ait brouillé sa cervelle;
Mais le frère sur-le-champ
Finira cette querelle.
SOSIE, à part.
C’est ici pour mon maître un coup assez touchant;
Et son aventure est cruelle.
Je crains fort pour mon fait quelque chose approchant,
Et je m’en veux, tout doux, éclaircir avec elle.
CLÉANTHIS, à part.
Voyez s’il me viendra seulement aborder!
Mais je veux m’empêcher de rien faire paroître.
SOSIE, à part.
La chose quelquefois est fâcheuse à connoître,
Et je tremble à la demander.
Ne vaudroit-il pas mieux, pour ne rien hasarder,
Ignorer ce qu’il en peut être?
33. Allons, tout coup vaille, il faut voir,
Et je ne m’en saurois défendre.
La foiblesse humaine est d’avoir
Des curiosités d’apprendre
Ce qu’on ne voudroit pas savoir.
Dieu te gard’, Cléanthis!
CLÉANTHIS.
Ah! ah! tu t’en avises,
Traître, de t’approcher de nous!
SOSIE.
Mon Dieu! qu’as-tu? Toujours on te voit en courroux,
Et sur rien tu te formalises!
CLÉANTHIS.
Qu’appelles-tu sur rien? dis.
SOSIE.
J’appelle sur rien
Ce qui sur rien s’appelle en vers ainsi qu’en prose;
Et rien, comme tu le sais bien,
Veut dire rien, ou peu de chose.
CLÉANTHIS.
Je ne sais qui me tient, infâme!
Que je ne t’arrache les yeux,
Et ne t’apprenne où va le courroux d’une femme.
SOSIE.
Holà! D’où te vient donc ce transport furieux?
34. CLÉANTHIS.
Tu n’appelles donc rien le procédé, peut-être,
Qu’avec moi ton cœur a tenu?
SOSIE.
Et quel?
CLÉANTHIS.
Quoi! tu fais l’ingénu?
Est-ce qu’à l’exemple du maître
Tu veux dire qu’ici tu n’es pas revenu?
SOSIE.
Non, je sais fort bien le contraire;
Mais je ne t’en fais pas le fin.
Nous avions bu de je ne sais quel vin,
Qui m’a fait oublier tout ce que j’ai pu faire.
CLÉANTHIS.
Tu crois peut-être excuser par ce trait...
SOSIE.
Non, tout de bon, tu m’en peux croire,
J’étois dans un état où je puis avoir fait
Des choses dont j’aurois regret,
Et dont je n’ai nulle mémoire.
CLÉANTHIS.
Tu ne te souviens point du tout de la manière
Dont tu m’as su traiter, étant venu du port?
35. SOSIE.
Non plus que rien. Tu peux m’en faire le rapport:
Je suis équitable et sincère,
Et me condamnerai moi-même, si j’ai tort.
CLÉANTHIS.
Comment! Amphitryon m’ayant su disposer[13],
Jusqu’à ce que tu vins j’avois poussé ma veille;
Mais je ne vis jamais une froideur pareille:
De ta femme il fallut moi-même t’aviser;
Et, lorsque je fus te baiser,
Tu détournas le nez et me donnas l’oreille.
SOSIE.
Bon!
CLÉANTHIS.
Comment! bon?
SOSIE.
Mon Dieu! tu ne sais pas
pourquoi,
Cléanthis, je tiens ce langage:
J’avois mangé de l’ail, et fis, en homme sage,
De détourner un peu mon haleine de toi.
CLÉANTHIS.
Je te sus exprimer des tendresses de cœur;
Mais à tous mes discours tu fus comme une souche,
Et jamais un mot de douceur
Ne te put sortir de la bouche.
36. SOSIE, à part.
Courage!
CLÉANTHIS.
Enfin ma flamme eut beau s’émanciper,
Sa chaste ardeur en toi ne trouva rien que glace;
Et, dans un tel retour, je te vis la tromper
Jusqu’à faire refus de prendre au lit la place
Que les lois de l’hymen t’obligent d’occuper.
SOSIE.
Quoi! je ne couchai point?
CLÉANTHIS.
Non, lâche!
SOSIE.
Est-il possible!
CLÉANTHIS.
Traître! il n’est que trop assuré.
C’est de tous les affronts l’affront le plus sensible;
Et, loin que ce matin ton cœur l’ait réparé,
Tu t’es d’avec moi séparé
Par des discours chargés d’un mépris tout visible.
SOSIE.
Vivat Sosie!
CLÉANTHIS.
37. Eh quoi! ma plainte a cet effet!
Tu ris après ce bel ouvrage!
SOSIE.
Que je suis de moi satisfait!
CLÉANTHIS.
Exprime-t-on ainsi le regret d’un outrage?
SOSIE.
Je n’aurois jamais cru que j’eusse été si sage.
CLÉANTHIS.
Loin de te condamner d’un si perfide trait,
Tu m’en fais éclater la joie en ton visage!
SOSIE.
Mon Dieu! tout doucement! Si je parois joyeux,
Crois que j’en ai dans l’âme une raison très-forte,
Et que, sans y penser, je ne fis jamais mieux
Que d’en user tantôt avec toi de la sorte.
CLÉANTHIS.
Traître! te moques-tu de moi?
SOSIE.
Non, je te parle avec franchise.
En l’état où j’étois, j’avois certain effroi
Dont, avec ton discours, mon âme s’est remise,
Je m’appréhendois fort, et craignois qu’avec toi
Je n’eusse fait quelque sottise.
38. CLÉANTHIS.
Quelle est cette frayeur? et sachons donc pourquoi.
SOSIE.
Les médecins disent, quand on est ivre,
Que de sa femme, on se doit abstenir,
Et que dans cet état il ne peut provenir
Que des enfans pesans et qui ne sauroient vivre.
Vois, si mon cœur n’eût su de froideur se munir,
Quels inconvéniens auroient pu s’en ensuivre!
CLÉANTHIS.
Je me moque des médecins,
Avec leurs raisonnemens fades:
Qu’ils règlent ceux qui sont malades,
Sans vouloir gouverner les gens qui sont bien sains.
Ils se mêlent de trop d’affaires,
De prétendre tenir nos chastes feux gênés;
Et sur les jours caniculaires
Ils nous donnent encore, avec leurs lois sévères,
De cent sots contes par le nez.
SOSIE.
Tout doux!
CLÉANTHIS.
Non, je soutiens que cela conclut mal;
Ces raisons sont raisons d’extravagantes têtes.
Il n’est ni vin ni temps qui puisse être fatal
A remplir le devoir de l’amour conjugal;
Et les médecins sont des bêtes.
39. SOSIE.
Contre eux, je t’en supplie, apaise ton courroux;
Ce sont d’honnêtes gens, quoi que le monde en dise.
CLÉANTHIS.
Tu n’es pas où tu crois; en vain tu files doux:
Ton excuse n’est point une excuse de mise;
Et je me veux venger tôt ou tard, entre nous,
De l’air dont chaque jour je vois qu’on me méprise.
Des discours de tantôt je garde tous les coups,
Et tâcherai d’user, lâche et perfide époux,
De cette liberté que ton cœur m’a permise.
SOSIE.
Quoi?
CLÉANTHIS.
Tu m’as dit tantôt que tu consentois fort,
Lâche, que j’en aimasse un autre!
SOSIE.
Ah! pour cet article, j’ai tort.
Je m’en dédis, il y va trop du nôtre.
Garde-toi bien de suivre ce transport.
CLÉANTHIS.
Si je puis une fois pourtant
Sur mon esprit gagner la chose...
SOSIE.
40. Fais à ce discours quelque pause.
Amphitryon revient, qui me paroît content.
SCÈNE IV.—JUPITER, CLÉANTHIS, SOSIE.
JUPITER, à part.
Je viens prendre le temps de rapaiser Alcmène,
De bannir les chagrins que son cœur veut garder,
Et donner à mes feux, dans ce soin qui m’amène,
Le doux plaisir de se raccommoder.
A Cléanthis.
Alcmène est là-haut, n’est-ce pas?
CLÉANTHIS.
Oui, pleine d’une inquiétude
Qui cherche de la solitude,
Et qui m’a défendu d’accompagner ses pas.
JUPITER.
Quelque défense qu’elle ait faite,
Elle ne sera pas pour moi.
SCÈNE V.—CLÉANTHIS, SOSIE.
CLÉANTHIS.
Son chagrin, à ce que je voi,
A fait une prompte retraite.
SOSIE.
41. Que dis-tu, Cléanthis, de ce joyeux maintien,
Après son fracas effroyable?
CLÉANTHIS.
Que, si toutes nous faisions bien,
Nous donnerions tous les hommes au diable,
Et que le meilleur n’en vaut rien.
SOSIE.
Cela se dit dans le courroux;
Mais aux hommes par trop vous êtes accrochées,
Et vous seriez ma foi, toutes bien empêchées,
Si le diable les prenait tous.
CLÉANTHIS.
Vraiment...
SOSIE.
Les voici. Taisons-nous.
SCÈNE VI.—JUPITER, ALCMÈNE,
CLÉANTHIS, SOSIE.
JUPITER.
Voulez-vous me désespérer?
Hélas! arrêtez, belle Alcmène.
ALCMÈNE.
42. Non, avec l’auteur de ma peine
Je ne puis du tout demeurer.
JUPITER.
De grâce!...
ALCMÈNE.
Laissez-moi!
JUPITER.
Quoi!...
ALCMÈNE.
Laissez-moi, vous
dis-je!
JUPITER, bas, à part.
Ses pleurs touchent mon âme, et sa douleur m’afflige.
Haut.
Souffrez que mon cœur...
ALCMÈNE.
Non, ne suivez point mes pas.
JUPITER.
Où voulez-vous aller?
ALCMÈNE.
Où vous ne serez pas.
43. JUPITER.
Ce vous est une attente vaine.
Je tiens à vos beautés par un nœud trop serré,
Pour pouvoir un moment en être séparé.
Je vous suivrai partout, Alcmène.
ALCMÈNE.
Et moi, partout je vous fuirai.
JUPITER.
Je suis donc bien épouvantable!
ALCMÈNE.
Plus qu’on ne peut dire, à mes yeux.
Oui, je vous vois comme un monstre effroyable,
Un monstre cruel, furieux,
Et dont l’approche est redoutable;
Comme un monstre à fuir en tous lieux.
Mon cœur souffre, à vous voir, une peine incroyable.
C’est un supplice qui m’accable;
Et je ne vois rien sous les cieux
D’affreux, d’horrible, d’odieux,
Qui ne me fût plus que vous supportable.
JUPITER.
En voilà bien, hélas! que votre bouche dit.
ALCMÈNE.
J’en ai dans le cœur davantage;
Et, pour s’exprimer tout, ce cœur a du dépit
De ne point trouver de langage.
44. Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
testbankdeal.com