SlideShare a Scribd company logo
Essentials of Management Information Systems
10th Edition Laudon Test Bank install download
https://testbankfan.com/product/essentials-of-management-
information-systems-10th-edition-laudon-test-bank/
Download more testbank from https://testbankfan.com
We believe these products will be a great fit for you. Click
the link to download now, or visit testbankfan.com
to discover even more!
Essentials of Management Information Systems 10th
Edition Laudon Solutions Manual
https://testbankfan.com/product/essentials-of-management-
information-systems-10th-edition-laudon-solutions-manual/
Management Information Systems 13th Edition Laudon Test
Bank
https://testbankfan.com/product/management-information-
systems-13th-edition-laudon-test-bank/
Management Information Systems 12th Edition Laudon Test
Bank
https://testbankfan.com/product/management-information-
systems-12th-edition-laudon-test-bank/
Management Information Systems Global 14th Edition
Laudon Test Bank
https://testbankfan.com/product/management-information-systems-
global-14th-edition-laudon-test-bank/
Management Information Systems 12th Edition Laudon
Solutions Manual
https://testbankfan.com/product/management-information-
systems-12th-edition-laudon-solutions-manual/
Management Information Systems 13th Edition Laudon
Solutions Manual
https://testbankfan.com/product/management-information-
systems-13th-edition-laudon-solutions-manual/
Essentials of MIS 10th Edition Laudon Test Bank
https://testbankfan.com/product/essentials-of-mis-10th-edition-
laudon-test-bank/
Management Information Systems Managing the Digital
Firm 14th Edition Laudon Test Bank
https://testbankfan.com/product/management-information-systems-
managing-the-digital-firm-14th-edition-laudon-test-bank/
Management Information Systems Managing the Digital
Firm 15th Edition Laudon Test Bank
https://testbankfan.com/product/management-information-systems-
managing-the-digital-firm-15th-edition-laudon-test-bank/
1
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
Essentials of MIS, 10e (Laudon/Laudon)
Chapter 6 Telecommunications, the Internet, and Wireless Technology
1) Telephone networks are fundamentally different from computer networks.
Answer: TRUE
Diff: 2 Page Ref: 181
AACSB: Use of IT
CASE: Comprehension
2) Increasingly, voice, video, and data communications are all based on Internet technology.
Answer: TRUE
Diff: 1 Page Ref: 181
AACSB: Use of IT
CASE: Comprehension
3) To create a computer network, you must have at least two computers.
Answer: TRUE
Diff: 2 Page Ref: 182
AACSB: Use of IT
CASE: Comprehension
4) An NOS must reside on a dedicated server computer in order to manage a network.
Answer: FALSE
Diff: 2 Page Ref: 182
AACSB: Use of IT
CASE: Comprehension
5) A hub is a networking device that connects network components and is used to filter and
forward data to specified destinations on the network.
Answer: FALSE
Diff: 2 Page Ref: 183
AACSB: Use of IT
CASE: Comprehension
6) In a client/server network, a network server provides every connected client with an address
so it can be found by others on the network.
Answer: TRUE
Diff: 2 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
7) Central large mainframe computing has largely replaced client/server computing.
Answer: FALSE
Diff: 2 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
2
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
8) Circuit switching makes much more efficient use of the communications capacity of a
network than does packet switching.
Answer: FALSE
Diff: 1 Page Ref: 8497
AACSB: Use of IT
CASE: Comprehension
9) Mobile search makes up 15% of all Internet searches.
Answer: TRUE
Diff: 1 Page Ref: 202
AACSB: Reflective Thinking
CASE: Comprehension
10) Two computers using TCP/IP can communicate even if they are based on different hardware
and software platforms.
Answer: TRUE
Diff: 1 Page Ref: 186
AACSB: Use of IT
CASE: Comprehension
11) In a ring topology, one station transmits signals, which travel in both directions along a
single transmission segment.
Answer: FALSE
Diff: 3 Page Ref: 188
AACSB: Use of IT
CASE: Comprehension
12) Coaxial cable is similar to that used for cable television and consists of thickly insulated
copper wire.
Answer: TRUE
Diff: 1 Page Ref: 188
AACSB: Use of IT
CASE: Comprehension
13) Fiber-optic cable is more expensive and harder to install than wire media.
Answer: TRUE
Diff: 2 Page Ref: 189
AACSB: Use of IT
CASE: Comprehension
14) The number of cycles per second that can be sent through any telecommunications medium
is measured in kilobytes.
Answer: FALSE
Diff: 2 Page Ref: 190
AACSB: Use of IT
CASE: Comprehension
3
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
15) The Domain Name System (DNS) converts IP addresses to domain names.
Answer: TRUE
Diff: 3 Page Ref: 191
AACSB: Use of IT
CASE: Comprehension
16) VoIP technology delivers video information in digital form using packet switching.
Answer: TRUE
Diff: 1 Page Ref: 198
AACSB: Use of IT
CASE: Comprehension
17) Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to
reduce the amount of human involvement in searching for and processing Web information.
Answer: TRUE
Diff: 2 Page Ref: 206
AACSB: Reflective Thinking
CASE: Comprehension
18) In a large company today, you will often find an infrastructure that includes hundreds of
small LANs linked to each other as well as to corporate-wide networks.
Answer: TRUE
Diff: 1 Page Ref: 193
AACSB: Use of IT
CASE: Comprehension
19) TCP/IP was developed in the 1960s to enable university scientists to transmit data from
computer to computer.
Answer: FALSE
Diff: 2 Page Ref: 185
AACSB: Reflective Thinking
CASE: Comprehension
20) RFID technology is being gradually replaced by less costly technologies such as WSNs.
Answer: FALSE
Diff: 2 Page Ref: 209-211
AACSB: Use of IT
CASE: Comprehension
4
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
21) The device that acts as a connection point between computers and can filter and forward data
to a specified destination is called a(n):
A) hub.
B) switch.
C) router.
D) NIC.
Answer: B
Diff: 1 Page Ref: 183
AACSB: Use of IT
CASE: Comprehension
22) The Internet is based on which three key technologies?
A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards
for linking networks and computers
D) Client/server computing, packet switching, and HTTP
Answer: C
Diff: 2 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
23) The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called:
A) multiplexing.
B) packet switching.
C) packet routing.
D) ATM.
Answer: B
Diff: 1 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
24) The telephone system is an example of a ________ network.
A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
Answer: D
Diff: 1 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
5
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
25) Which of the following is not a characteristic of packet switching?
A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
Answer: C
Diff: 2 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
26) In TCP/IP, IP is responsible for:
A) disassembling and reassembling of packets during transmission.
B) establishing an Internet connection between two computers.
C) moving packets over the network.
D) sequencing the transfer of packets.
Answer: A
Diff: 3 Page Ref: 185
AACSB: Use of IT
CASE: Comprehension
27) In a telecommunications network architecture, a protocol is:
A) a device that handles the switching of voice and data in a local area network.
B) a standard set of rules and procedures for control of communications in a network.
C) a communications service for microcomputer users.
D) the main computer in a telecommunications network.
Answer: B
Diff: 2 Page Ref: 185
AACSB: Use of IT
CASE: Comprehension
28) What are the four layers of the TCP/IP reference model?
A) Physical, application, transport, and network interface
B) Physical, application, Internet, and network interface
C) Application, transport, Internet, and network interface
D) Application, hardware, Internet, and network interface
Answer: C
Diff: 3 Page Ref: 185-186
AACSB: Use of IT
CASE: Comprehension
6
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
29) Which signal types are represented by a continuous waveform?
A) Laser
B) Optical
C) Digital
D) Analog
Answer: D
Diff: 2 Page Ref: 186
AACSB: Use of IT
CASE: Comprehension
30) To use the analog telephone system for sending digital data, you must also use:
A) a modem.
B) a router.
C) DSL.
D) twisted wire.
Answer: A
Diff: 1 Page Ref: 186
AACSB: Use of IT
CASE: Comprehension
31) Which type of network is used to connect digital devices within a half-mile or 500-meter
radius?
A) Microwave
B) LAN
C) WAN
D) MAN
Answer: B
Diff: 2 Page Ref: 186-187
AACSB: Use of IT
CASE: Comprehension
32) Which type of network treats all processors equally, and allows peripheral devices to be
shared without going to a separate server?
A) Peer-to-peer
B) Wireless
C) LAN
D) Ring
Answer: A
Diff: 2 Page Ref: 187
AACSB: Use of IT
CASE: Comprehension
7
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
33) Which type of network would be most appropriate for a business that comprised three
employees and a manager located in the same office space, whose primary need is to share
documents?
A) Wireless network in infrastructure mode
B) Domain-based LAN
C) Peer-to-peer network
D) Campus area network
Answer: C
Diff: 2 Page Ref: 187
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
34) In a bus network:
A) signals are broadcast to the next station.
B) signals are broadcast in both directions to the entire network.
C) multiple hubs are organized in a hierarchy.
D) messages pass from computer to computer in a loop.
Answer: B
Diff: 2 Page Ref: 187
AACSB: Use of IT
CASE: Comprehension
35) All network components connect to a single hub in a ________ topology.
A) star
B) bus
C) domain
D) peer-to-peer
Answer: A
Diff: 2 Page Ref: 187
AACSB: Use of IT
CASE: Comprehension
36) The most common Ethernet topology is:
A) bus.
B) star.
C) ring.
D) mesh.
Answer: A
Diff: 3 Page Ref: 187
AACSB: Use of IT
CASE: Comprehension
8
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
37) A network that spans a city, and sometimes its major suburbs as well, is called a:
A) CAN.
B) MAN.
C) LAN.
D) WAN.
Answer: B
Diff: 1 Page Ref: 188
AACSB: Use of IT
CASE: Comprehension
38) A network that covers entire geographical regions is most commonly referred to as a(n):
A) local area network.
B) intranet.
C) peer-to-peer network.
D) wide area network.
Answer: D
Diff: 1 Page Ref: 188
AACSB: Use of IT
CASE: Comprehension
39) ________ work(s) by using radio waves to communicate with radio antennas placed within
adjacent geographic areas.
A) Cell phones
B) Microwaves
C) Satellites
D) WANs
Answer: A
Diff: 1 Page Ref: 190
AACSB: Use of IT
CASE: Comprehension
40) Bandwidth is the:
A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single
channel.
D) total number of bytes that can be sent through a medium per second.
Answer: C
Diff: 2 Page Ref: 190
AACSB: Use of IT
CASE: Comprehension
9
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
41) The total amount of digital information that can be transmitted through any
telecommunications medium is measured in:
A) bps.
B) Hertz.
C) baud.
D) gigaflops.
Answer: A
Diff: 2 Page Ref: 190
AACSB: Use of IT
CASE: Comprehension
42) Digital subscriber lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
Answer: A
Diff: 2 Page Ref: 190
AACSB: Use of IT
CASE: Comprehension
43) T lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) are high-speed, leased data lines providing guaranteed service levels.
D) have up to twenty-four 64-Kbps channels.
Answer: C
Diff: 2 Page Ref: 190-191
AACSB: Use of IT
CASE: Comprehension
44) Which protocol is the Internet based on?
A) TCP/IP
B) FTP
C) packet-switching
D) HTTP
Answer: A
Diff: 1 Page Ref: 191
AACSB: Use of IT
CASE: Comprehension
10
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
45) What service converts IP addresses into more recognizable alphanumeric names?
A) HTML
B) DNS
C) IP
D) HTTP
Answer: B
Diff: 2 Page Ref: 191
AACSB: Use of IT
CASE: Comprehension
46) The child domain of the root is the:
A) top-level domain.
B) second-level domain.
C) host name.
D) domain extension.
Answer: A
Diff: 2 Page Ref: 191
AACSB: Use of IT
CASE: Comprehension
47) In the domain name "http://myspace.blogging.com", what are the root, top-level, second-
level, and third-level domains, respectively?
A) "http://", myspace, blogging, com
B) "http://", com, blogging, myspace
C) ".", com, blogging, myspace
D) ".", myspace, blogging, com
Answer: C
Diff: 2 Page Ref: 191-192
AACSB: Use of IT
CASE: Comprehension
48) Which organization helps define the overall structure of the Internet?
A) None (no one "owns" the Internet)
B) W3C
C) ICANN
D) IAB
Answer: D
Diff: 3 Page Ref: 194
AACSB: Use of IT
CASE: Comprehension
11
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
49) IPv6 is being developed in order to:
A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
Answer: B
Diff: 2 Page Ref: 195
AACSB: Use of IT
CASE: Comprehension
50) Which of the following services enables logging on to one computer system and working on
another?
A) FTP
B) LISTSERV
C) Telnet
D) World Wide Web
Answer: C
Diff: 3 Page Ref: 195
AACSB: Use of IT
CASE: Comprehension
51) Instant messaging is a type of ________ service.
A) chat
B) cellular
C) e-mail
D) wireless
Answer: A
Diff: 1 Page Ref: 196
AACSB: Use of IT
CASE: Comprehension
52) Which of the following statements about RFID is not true?
A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
Answer: D
Diff: 2 Page Ref: 209-210
AACSB: Reflective Thinking
CASE: Comprehension
12
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
53) ________ integrate(s) disparate channels for voice communications, data communications,
instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Unified communications
Answer: D
Diff: 1 Page Ref: 199
AACSB: Use of IT
CASE: Comprehension
54) A VPN:
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
Answer: A
Diff: 2 Page Ref: 199
AACSB: Use of IT
CASE: Comprehension
55) Web browser software requests Web pages from the Internet using which protocol?
A) URL
B) HTTP
C) DNS
D) HTML
Answer: B
Diff: 2 Page Ref: 200
AACSB: Use of IT
CASE: Comprehension
56) Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a(n):
A) uniform resource locator.
B) IP address.
C) third level domain.
D) root domain.
Answer: A
Diff: 2 Page Ref: 200-201
AACSB: Use of IT
CASE: Comprehension
13
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
57) The most common Web server today, controlling 59 percent of the market, is:
A) Microsoft IIS.
B) WebSTAR
C) Apache HTTP Server.
D) Netscape Server.
Answer: C
Diff: 2 Page Ref: 201
AACSB: Use of IT
CASE: Comprehension
58) What technology allows people to have content pulled from Web sites and fed automatically
to their computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
Answer: B
Diff: 2 Page Ref: 205
AACSB: Use of IT
CASE: Comprehension
59) The process of employing techniques to help a Web site achieve a higher ranking with the
major search engines is called:
A) VPN.
B) IAB.
C) SEM.
D) SEO.
Answer: D
Diff: 1 Page Ref: 203
AACSB: Use of IT
CASE: Comprehension
60) Which of the following statements is not true about search engines?
A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
Answer: D
Diff: 1 Page Ref: 201-203
AACSB: Use of IT
CASE: Comprehension
14
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
61) Which of the following is the first generation of cellular systems suitable for wireless
broadband Internet access?
A) 2G
B) 2.5G
C) 3G
D) 4G
Answer: C
Diff: 2 Page Ref: 207
AACSB: Use of IT
CASE: Comprehension
62) A LAN would be used to connect all of the following except:
A) all of the computers in a large building.
B) all of the devices within a 10-meter area.
C) all of the computers in a city.
D) all of the computers in a small office.
Answer: C
Diff: 2 Page Ref: 187
AACSB: Use of IT
CASE: Comprehension
63) The most appropriate wireless networking standard for creating PANs is:
A) I-mode.
B) IEEE 802.11b.
C) WiFi.
D) Bluetooth.
Answer: D
Diff: 2 Page Ref: 207
AACSB: Use of IT
CASE: Comprehension
64) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-
power, radio-based communication.
A) four
B) six
C) eight
D) ten
Answer: C
Diff: 3 Page Ref: 207
AACSB: Use of IT
CASE: Comprehension
15
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
65) Which process is used to protect transmitted data in a VPN?
A) Tunneling
B) PPP
C) VOIP
D) Packet switching
Answer: A
Diff: 3 Page Ref: 200
AACSB: Use of IT
CASE: Comprehension
66) One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as:
A) touch points.
B) hotspots.
C) hot points.
D) wireless hubs.
Answer: B
Diff: 2 Page Ref: 208
AACSB: Use of IT
CASE: Comprehension
67) The 802.11 set of standards is known as:
A) WLAN.
B) WSN.
C) Wi-Fi.
D) WiMax.
Answer: C
Diff: 2 Page Ref: 208
AACSB: Use of IT
CASE: Comprehension
68) The WiMax standard can transmit up to a distance of approximately:
A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
Answer: C
Diff: 3 Page Ref: 209
AACSB: Use of IT
CASE: Comprehension
16
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
69) Passive RFID tags:
A) have their own power source.
B) have a range of several feet.
C) enable data to be rewritten and modified.
D) are used in automated toll-collection systems.
Answer: B
Diff: 2 Page Ref: 210
AACSB: Use of IT
CASE: Comprehension
70) Based on your reading of the examples in the chapter, what would be the best use of RFID
for a business?
A) Logging transactions
B) Managing the supply chain
C) Lowering network costs
D) Enabling client communication
Answer: B
Diff: 2 Page Ref: 209-211
AACSB: Analytic Skills
CASE: Comprehension
71) A ________ is special software that routes and manages communications on the network and
coordinates networks resources.
A) switch
B) firewall
C) server
D) network operating system/NOS
Answer: D
Diff: 2 Page Ref: 182
AACSB: Use of IT
CASE: Comprehension
72) A router is a device that forwards packets of data through different networks, ensuring that
the data gets to the right address.
Answer: TRUE
Diff: 2 Page Ref: 183
AACSB: Use of IT
CASE: Comprehension
17
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
73) Prior to the development of ________, computer networks used leased, dedicated telephone
circuits to communicate with other computers in remote locations.
A) packet switching
B) routers
C) servers
D) coaxial cable
Answer: A
Diff: 2 Page Ref: 184
AACSB: Use of IT
CASE: Comprehension
74) An analog signal is a discrete, binary waveform that transmits data coded into two discrete
states such as 1-bits and 0-bits.
Answer: FALSE
Diff: 2 Page Ref: 186
AACSB: Use of IT
CASE: Comprehension
75) ________ is the manner in which the physical components of a LAN are connected together.
A) Network topology
B) Network architecture
C) Network infrastructure
D) A network's platform
Answer: A
Diff: 2 Page Ref: 187
AACSB: Use of IT
CASE: Comprehension
76) Today, most Americans connect to the Internet through broadband connections at speeds up
to 15 Mbps.
Answer: TRUE
Diff: 2 Page Ref: 181
AACSB: Use of IT
CASE: Comprehension
77) An ISP is a commercial organization that owns a region of transcontinental high-speed
backbone networks carrying the bulk of Internet traffic.
Answer: FALSE
Diff: 2 Page Ref: 190
AACSB: Use of IT
CASE: Comprehension
18
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
78) The trunklines of the Internet are typically owned by network service providers.
Answer: TRUE
Diff: 2 Page Ref: 192
AACSB: Use of IT
CASE: Comprehension
79) A Web server is a dedicated computer that delivers Web pagers to client computers.
Answer: FALSE
Diff: 2 Page Ref: 201
AACSB: Use of IT
CASE: Comprehension
80) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a
wired network, router, or hub.
A) hotspot
B) access point
C) server
D) wireless router
Answer: B
Diff: 2 Page Ref: 208
AACSB: Use of IT
CASE: Comprehension
81) How does packet switching work?
Answer: Packet switching is a method of slicing digital messages into parcels called packets,
sending the packets along different communication paths as they become available, and then
reassembling the packets once they arrive at their destinations. Packet switching makes much
more efficient use of the communications capacity of a network than did circuit-switching. In
packet-switched networks, messages are first broken down into small fixed bundles of data
called packets. The packets include information for directing the packet to the right address and
for checking transmission errors along with the data. The packets are transmitted over various
communications channels using routers, each packet traveling independently. Packets of data
originating at one source will be routed through many different paths and networks before being
reassembled into the original message when they reach their destinations.
Diff: 2 Page Ref: 184-185
AACSB: Analytic Skills
CASE: Analysis in terms of summarize
19
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
82) Identify the layers of the Department of Defense reference model for TCP/IP, and describe
how this model works.
Answer: The application layer enables client application programs to access the other layers and
defines the protocols that applications use to exchange data. One of these application protocols is
the Hypertext Transfer Protocol (HTTP), which is used to transfer Web page files. The transport
layer is responsible for providing the application layer with communication and packet services.
This layer includes TCP and other protocols. The Internet layer is responsible for addressing,
routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the
protocols used in this layer. At the bottom of the reference model, the network interface layer is
responsible for placing packets on and receiving them from the network medium, which could be
any networking technology. Data sent from one computer to the other passes downward through
all four layers, starting with the sending computer's application layer and passing through the
network interface layer. After the data reach the recipient host computer, they travel up the layers
and are reassembled into a format the receiving computer can use. If the receiving computer
finds a damaged packet, it asks the sending computer to retransmit it. This process is reversed
when the receiving computer responds.
Diff: 3 Page Ref: 185-186
AACSB: Analytic Skills
CASE: Analysis in terms of summarize
83) Describe and explain the idea of "network neutrality." Are you in favor of network
neutrality? Why or why not?
Answer: Network neutrality describes the current equal access by users to Internet bandwidth,
regardless of the services they are using on the Internet. Network neutrality is the idea that
Internet service providers must allow customers equal access to content and applications,
regardless of the source or nature of the content. Presently, the Internet is indeed neutral: all
Internet traffic is treated equally on a first-come, first-served basis by Internet backbone owners.
The Internet is neutral because it was built on phone lines, which are subject to "common
carriage" laws. These laws require phone companies to treat all calls and customers equally. For
example, someone using the Internet to download large movie files pays the same rate as
someone accessing their e-mail. Now telecommunications and cable companies want to be able
to charge differentiated prices based on the amount of bandwidth consumed by content being
delivered over the Internet. Student opinions will vary; one might be: I support network
neutrality because the risk of censorship increases when network operators can selectively block
or slow access to certain content.
Diff: 2 Page Ref: 193-194
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
20
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
84) You have been hired by a small new Web design firm to set up a network for its single office
location. The network is primarily needed for exchanging files, accessing and managing beta
Web sites on their Web server, and connecting to the Internet. The firm hires many freelancers
who come into the office on an ad hoc basis and it does not have a lot of money to spend on
infrastructure. What type of network will you recommend?
Answer: Student answers will vary. An example answer is: I would recommend a mixed
Ethernet and wireless network. The Ethernet LAN would connect the Web servers and primary
workstations and connect via cable service to the Internet. Freelancers could connect wirelessly
via access points.
Diff: 3 Page Ref: 186-190
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
85) What are the business advantages of using voice over IP (VoIP) technology?
Answer: Business can lower costs by using the Internet to deliver voice information, avoiding
the tolls charged by local and long-distance telephone networks. They can lower costs from not
having to create a separate telephone network. VOIP enables communication by supporting
Internet conference calls using video. VOIP also provides flexibility - phones can be added or
moved to different offices without rewiring or reconfiguring the network.
Diff: 2 Page Ref: 198-199
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
86) How are RFID systems used in inventory control and supply chain management?
Answer: In inventory control and supply chain management, RFID systems capture and manage
more detailed information about items in warehouses or in production than bar coding systems.
If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit
item in the shipment. This technology may help companies improve receiving and storage
operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on
retail store shelves.
Diff: 1 Page Ref: 210
AACSB: Analytic Skills
CASE: Analysis in terms of summarize
21
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
87) What are wireless sensor networks? How do they work and what are they used for?
Answer: Wireless sensor networks (WSNs) are networks of interconnected wireless devices that
are embedded into the physical environment to provide measurements of many points over large
spaces. These devices have built-in processing, storage, and radio frequency sensors and
antennas. They are linked into an interconnected network that routes the data they capture to a
computer for analysis. These networks range from hundreds to thousands of nodes. Because
wireless sensor devices are placed in the field for years at a time without any maintenance or
human intervention, they must have very low power requirements and batteries capable of lasting
for years. Wireless sensor networks are valuable in areas such as monitoring environmental
changes; monitoring traffic or military activity; protecting property; efficiently operating and
managing machinery and vehicles; establishing security perimeters; monitoring supply chain
management; or detecting chemical, biological, or radiological material.
Diff: 1 Page Ref: 211
AACSB: Analytic Skills
CASE: Analysis in terms of summarize
88) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?
Answer: Web 3.0 is the vision of the next generation of the Web in which all of the information
available on the Web is woven together into a single experience. The related movement called
the Semantic Web is a collaborative effort to add a layer of meaning to existing information to
reduce the amount of human time spent in searching and processing that information. Student
views on the impact on businesses would vary. An example answer is: This potentially could
have huge effects on businesses as simple analysis becomes mechanized, requiring fewer
humans to perform this basic task.
Diff: 2 Page Ref: 205-206
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
89) Blogs, wikis, and social networking sites were designed for individuals to communicate with
each other. What uses do businesses have for these tools? Give specific examples.
Answer: Businesses can use these tools to reach out and market to potential new customers. For
example, many businesses have Facebook sites to market their product to specific groups on
Facebook. They can use these tools to support and give added value to existing customers. For
example, a software company could have a blog that discusses in-depth use of a software
product. Businesses can also use these tools within their company to communicate between
departments and share knowledge. For example, a company wiki could be set up as a repository
of expert information.
Diff: 2 Page Ref: 204-205
AACSB: Analytic Skills
CASE: Synthesis in terms of build, model
22
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall
90) What has made the Google search engine so successful?
Answer: The Google search engine became so successful because it was one of the first search
engines to incorporate page ranking: Not only does it index the Web pages it finds according to
both keywords and combinations of keywords, it also ranks each page according to the number
of pages that link to it, and the number of pages it links to itself. This helped make search results
more relevant when compared to search engines relying solely on key words used on Web pages.
A user could be relatively certain that they would find relevant information within the top results
of a Google search. Improved search results for the user, along with continual improvements to
its search engine, the development and other Web applications, tools, and its Ad Sense product
where it sells keywords to the highest bidder has made Google so successful as a search engine
and marketing firm.
Diff: 2 Page Ref: 202-203
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
Exploring the Variety of Random
Documents with Different Content
52.
What others Know of us.—That which we know of ourselves and
have in our memory is not so decisive for the happiness of our life as
is generally believed. One day it flashes upon our mind what others
know of us (or think they know)—and then we acknowledge that it
is the more powerful. We get on with our bad conscience more
easily than with our bad reputation.
53.
Where Goodness Begins.—Where bad eyesight can no longer see
the evil impulse as such, on account of its refinement,—there man
sets up the kingdom of goodness; and the feeling of having now
gone over into the kingdom of goodness brings all those impulses
(such as the feelings of security, of comfortableness, of
benevolence) into simultaneous activity, which were threatened and
confined by the evil impulses. Consequently, the duller the eye so
much the further does goodness extend! Hence the eternal
cheerfulness of the populace and of children! Hence the gloominess
and grief (allied to the bad conscience) of great thinkers.
54.
The Consciousness of Appearance.—How wonderfully and novelly,
and at the same time how awfully and ironically, do I feel myself
situated with respect to collective existence, with my knowledge! I
have discovered for myself that the old humanity and animality, yea,
the collective primeval age, and the past of all sentient being,
continues to meditate, love, hate, and reason in me,—I have
suddenly awoke in the midst of this dream, but merely to the
consciousness that I just dream, and that I must dream on in order
not to perish; just as the sleep-walker must dream on in order not to
tumble down. What is it that is now "appearance" to me! Verily, not
the antithesis of any kind of essence,—what knowledge can I assert
of any kind of essence whatsoever, except merely the predicates of
its appearance! Verily not a dead mask which one could put upon an
unknown X, and which to be sure one could also remove!
Appearance is for me the operating and living thing itself; which
goes so far in its self-mockery as to make me feel that here there is
appearance, and Will o' the Wisp, and spirit-dance, and nothing
more,—that among all these dreamers, I also, the "thinker," dance
my dance, that the thinker is a means of prolonging further the
terrestrial dance, and in so far is one of the masters of ceremony of
existence, and that the sublime consistency and connectedness of all
branches of knowledge is perhaps, and will perhaps, be the best
means for maintaining the universality of the dreaming, the
complete, mutual understandability of all those dreamers, and
thereby the duration of the dream.
55.
The Ultimate Nobility of Character.—What then makes a person
"noble"? Certainly not that he makes sacrifices; even the frantic
libertine makes sacrifices. Certainly not that he generally follows his
passions; there are contemptible passions. Certainly not that he
does something for others and without selfishness; perhaps the
effect of selfishness is precisely at its greatest in the noblest
persons.—But that the passion which seizes the noble man is a
peculiarity, without his knowing that it is so: the use of a rare and
singular measuring-rod, almost a frenzy: the feeling of heat in things
which feel cold to all other persons: a divining of values for which
scales have not yet been invented: a sacrificing on altars which are
consecrated to an unknown God: a bravery without the desire for
honour: a self-sufficiency which has superabundance, and imparts to
men and things. Hitherto, therefore, it has been the rare in man,
and the unconsciousness of this rareness, that has made men noble.
Here, however, let us consider that everything ordinary, immediate,
and indispensable, in short, what has been most preservative of the
species, and generally the rule in mankind hitherto, has been judged
unreasonable and calumniated in its entirety by this standard, in
favour of the exceptions. To become the advocate of the rule—that
may perhaps be the ultimate form and refinement in which nobility
of character will reveal itself on earth.
56.
The Desire for Suffering.—When I think of the desire to do
something, how it continually tickles and stimulates millions of young
Europeans, who cannot endure themselves and all their ennui,—I
conceive that there must be a desire in them to suffer something, in
order to derive from their suffering a worthy motive for acting, for
doing something. Distress is necessary! Hence the cry of the
politicians, hence the many false, trumped-up, exaggerated "states
of distress" of all possible kinds, and the blind readiness to believe in
them. This young world desires that there should arrive or appear
from the outside—not happiness—but misfortune; and their
imagination is already busy beforehand to form a monster out of it,
so that they may afterwards be able to fight with a monster. If these
distress-seekers felt the power to benefit themselves, to do
something for themselves from internal sources, they would also
understand how to create a distress of their own, specially their
own, from internal sources. Their inventions might then be more
refined, and their gratifications might sound like good music: while
at present they fill the world with their cries of distress, and
consequently too often with the feeling of distress in the first place!
They do not know what to make of themselves—and so they paint
the misfortune of others on the wall; they always need others! And
always again other others!—Pardon me, my friends, I have ventured
to paint my happiness on the wall.
BOOK SECOND
57.
To the Realists.—Ye sober beings, who feel yourselves armed
against passion and fantasy, and would gladly make a pride and an
ornament out of your emptiness, ye call yourselves realists and give
to understand that the world is actually constituted as it appears to
you; before you alone reality stands unveiled, and ye yourselves
would perhaps be the best part of it,—oh, ye dear images of Sais!
But are not ye also in your unveiled condition still extremely
passionate and dusky beings compared with the fish, and still all too
like an enamoured artist?[8]
—and what is "reality" to an enamoured
artist! Ye still carry about with you the valuations of things which
had their origin in the passions and infatuations of earlier centuries!
There is still a secret and ineffaceable drunkenness embodied in
your sobriety! Your love of "reality," for example—oh, that is an old,
primitive "love"! In every feeling, in every sense-impression, there is
a portion of this old love: and similarly also some kind of fantasy,
prejudice, irrationality, ignorance, fear, and whatever else has
become mingled and woven into it. There is that mountain! There is
that cloud! What is "real" in them? Remove the phantasm and the
whole human element therefrom, ye sober ones! Yes, if ye could do
that! If ye could forget your origin, your past, your preparatory
schooling,—your whole history as man and beast! There is no
"reality" for us—nor for you either, ye sober ones,—we are far from
being so alien to one another as ye suppose, and perhaps our good-
will to get beyond drunkenness is just as respectable as your belief
that ye are altogether incapable of drunkenness.
58.
Only as Creators!—It has caused me the greatest trouble, and for
ever causes me the greatest trouble, to perceive that unspeakably
more depends upon what things are called, than on what they are.
The reputation, the name and appearance, the importance, the
usual measure and weight of things—each being in origin most
frequently an error and arbitrariness thrown over the things like a
garment, and quite alien to their essence and even to their exterior
—have gradually, by the belief therein and its continuous growth
from generation to generation, grown as it were on-and-into things
and become their very body; the appearance at the very beginning
becomes almost always the essence in the end, and operates as the
essence! What a fool he would be who would think it enough to
refer here to this origin and this nebulous veil of illusion, in order to
annihilate that which virtually passes for the world—namely, so-
called "reality"! It is only as creators that we can annihilate!—But let
us not forget this: it suffices to create new names and valuations
and probabilities, in order in the long run to create new "things."
59.
We Artists!—When we love a woman we have readily a hatred
against nature, on recollecting all the disagreeable natural functions
to which every woman is subject; we prefer not to think of them at
all, but if once our soul touches on these things it twitches
impatiently, and glances, as we have said, contemptuously at
nature:—we are hurt; nature seems to encroach upon our
possessions, and with the profanest hands. We then shut our ears
against all physiology, and we decree in secret that "we will hear
nothing of the fact that man is something else than soul and form!"
"The man under the skin" is an abomination and monstrosity, a
blasphemy of God and of love to all lovers.—Well, just as the lover
still feels with respect to nature and natural functions, so did every
worshipper of God and his "holy omnipotence" formerly feel: in all
that was said of nature by astronomers, geologists, physiologists,
and physicians, he saw an encroachment on his most precious
possession, and consequently an attack,—and moreover also an
impertinence of the assailant! The "law of nature" sounded to him as
blasphemy against God; in truth he would too willingly have seen
the whole of mechanics traced back to moral acts of volition and
arbitrariness:—but because nobody could render him this service, he
concealed nature and mechanism from himself as best he could, and
lived in a dream. Oh, those men of former times understood how to
dream, and did not need first to go to sleep!—and we men of the
present day also still understand it too well, with all our good-will for
wakefulness and daylight! It suffices to love, to hate, to desire, and
in general to feel,—immediately the spirit and the power of the
dream come over us, and we ascend, with open eyes and indifferent
to all danger, the most dangerous paths, to the roofs and towers of
fantasy, and without any giddiness, as persons born for climbing—
we the night-walkers by day! We artists! We concealers of
naturalness! We moon-struck and God-struck ones! We dead-silent,
untiring wanderers on heights which we do not see as heights, but
as our plains, as our places of safety!
60.
Women and their Effect in the Distance.—Have I still ears? Am I
only ear, and nothing else besides? Here I stand in the midst of the
surging of the breakers, whose white flames fork up to my feet;—
from all sides there is howling, threatening, crying, and screaming at
me, while in the lowest depths the old earth-shaker sings his aria,
hollow like a roaring bull; he beats such an earth-shaker's measure
thereto, that even the hearts of these weathered rock-monsters
tremble at the sound. Then, suddenly, as if born out of nothingness,
there appears before the portal of this hellish labyrinth, only a few
fathoms distant,—a great sailing-ship gliding silently along like a
ghost. Oh, this ghostly beauty! With what enchantment it seizes me!
What? Has all the repose and silence in the world embarked here?
Does my happiness itself sit in this quiet place, my happier ego, my
second immortalised self? Still not dead, yet also no longer living? As
a ghost-like, calm, gazing, gliding, sweeping, neutral being? Similar
to the ship, which, with its white sails, like an immense butterfly,
passes over the dark sea! Yes! Passing over existence! That is it!
That would be it!——It seems that the noise here has made me a
visionary? All great noise causes one to place happiness in the calm
and the distance. When a man is in the midst of his hubbub, in the
midst of the breakers of his plots and plans, he there sees perhaps
calm, enchanting beings glide past him, for whose happiness and
retirement he longs—they are women. He almost thinks that there
with the women dwells his better self; that in these calm places even
the loudest breakers become still as death, and life itself a dream of
life. But still! But still! My noble enthusiast, there is also in the most
beautiful sailing-ship so much noise and bustling, and alas, so much
petty, pitiable bustling! The enchantment and the most powerful
effect of women is, to use the language of philosophers, an effect at
a distance, an actio in distans; there belongs thereto, however,
primarily and above all,—distance!
Essentials of Management Information Systems 10th Edition Laudon Test Bank
61.
In Honour of Friendship.—That the sentiment of friendship was
regarded by antiquity as the highest sentiment, higher even than the
most vaunted pride of the self-sufficient and wise, yea as it were its
sole and still holier brotherhood, is very well expressed by the story
of the Macedonian king who made the present of a talent to a
cynical Athenian philosopher from whom he received it back again.
"What?" said the king, "has he then no friend?" He therewith meant
to say, "I honour this pride of the wise and independent man, but I
should have honoured his humanity still higher if the friend in him
had gained the victory over his pride. The philosopher has lowered
himself in my estimation, for he showed that he did not know one of
the two highest sentiments—and in fact the higher of them!"
62.
Love.—Love pardons even the passion of the beloved.
63.
Woman in Music.—How does it happen that warm and rainy winds
bring the musical mood and the inventive delight in melody with
them? Are they not the same winds that fill the churches and give
women amorous thoughts?
64.
Sceptics.—I fear women who have become old are more sceptical
in the secret recesses of their hearts than any of the men are; they
believe in the superficiality of existence as in its essence, and all
virtue and profundity is to them only the disguising of this "truth,"
the very desirable disguising of a pudendum,—an affair, therefore, of
decency and of modesty, and nothing more!
65.
Devotedness.—There are noble women with a certain poverty of
spirit, who, in order to express their profoundest devotedness, have
no other alternative but to offer their virtue and modesty: it is the
highest thing they have. And this present is often accepted without
putting the recipient under such deep obligation as the giver
supposed,—a very melancholy story!
66.
The Strength of the Weak.—Women are all skilful in exaggerating
their weaknesses, indeed they are inventive in weaknesses, so as to
seem quite fragile ornaments to which even a grain of dust does
harm; their existence is meant to bring home to man's mind his
coarseness, and to appeal to his conscience. They thus defend
themselves against the strong and all "rights of might."
67.
Self-dissembling.—She loves him now and has since been looking
forth with as quiet confidence as a cow; but alas! It was precisely his
delight that she seemed so fitful and absolutely incomprehensible!
He had rather too much steady weather in himself already! Would
she not do well to feign her old character? to feign indifference?
Does not—love itself advise her to do so? Vivat comœdia!
68.
Will and Willingness.—Some one brought a youth to a wise man
and said, "See, this is one who is being corrupted by women!" The
wise man shook his head and smiled. "It is men," he called out,
"who corrupt women; and everything that women lack should be
atoned for and improved in men,—for man creates for himself the
ideal of woman, and woman moulds herself according to this
ideal."—"You are too tender-hearted towards women," said one of
the bystanders, "you do not know them!" The wise man answered:
"Man's attribute is will, woman's attribute is willingness,—such is the
law of the sexes, verily! a hard law for woman! All human beings are
innocent of their existence, women, however, are doubly innocent;
who could have enough of salve and gentleness for them!"—"What
about salve! What about gentleness!" called out another person in
the crowd, "we must educate women better!"—"We must educate
men better," said the wise man, and made a sign to the youth to
follow him.—The youth, however, did not follow him.
69.
Capacity for Revenge.—That a person cannot and consequently
will not defend himself, does not yet cast disgrace upon him in our
eyes; but we despise the person who has neither the ability nor the
good-will for revenge—whether it be a man or a woman. Would a
woman be able to captivate us (or, as people say, to "fetter" us)
whom we did not credit with knowing how to employ the dagger
(any kind of dagger) skilfully against us under certain
circumstances? Or against herself; which in a certain case might be
the severest revenge (the Chinese revenge).
70.
The Mistresses of the Masters.—A powerful contralto voice, as we
occasionally hear it in the theatre, raises suddenly for us the curtain
on possibilities in which we usually do not believe; all at once we are
convinced that somewhere in the world there may be women with
high, heroic, royal souls, capable and prepared for magnificent
remonstrances, resolutions, and self-sacrifices, capable and prepared
for domination over men, because in them the best in man, superior
to sex, has become a corporeal ideal. To be sure, it is not the
intention of the theatre that such voices should give such a
conception of women; they are usually intended to represent the
ideal male lover, for example, a Romeo; but, to judge by my
experience, the theatre regularly miscalculates here, and the
musician also, who expects such effects from such a voice. People
do not believe in these lovers; these voices still contain a tinge of
the motherly and housewifely character, and most of all when love is
in their tone.
71.
On Female Chastity.—There is something quite astonishing and
extraordinary in the education of women of the higher class; indeed,
there is perhaps nothing more paradoxical. All the world is agreed to
educate them with as much ignorance as possible in eroticis, and to
inspire their soul with a profound shame of such things, and the
extremest impatience and horror at the suggestion of them. It is
really here only that all the "honour" of woman is at stake; what
would one not forgive them in other respects! But here they are
intended to remain ignorant to the very backbone:—they are
intended to have neither eyes, ears, words, nor thoughts for this,
their "wickedness"; indeed knowledge here is already evil. And then!
To be hurled as with an awful thunderbolt into reality and knowledge
with marriage—and indeed by him whom they most love and
esteem: to have to encounter love and shame in contradiction, yea,
to have to feel rapture, abandonment, duty, sympathy, and fright at
the unexpected proximity of God and animal, and whatever else
besides! all at once!—There, in fact, a psychic entanglement has
been effected which is quite unequalled! Even the sympathetic
curiosity of the wisest discerner of men does not suffice to divine
how this or that woman gets along with the solution of this enigma
and the enigma of this solution; what dreadful, far-reaching
suspicions must awaken thereby in the poor unhinged soul; and
forsooth, how the ultimate philosophy and scepticism of the woman
casts anchor at this point!—Afterwards the same profound silence as
before: and often even a silence to herself, a shutting of her eyes to
herself.—Young wives on that account make great efforts to appear
superficial and thoughtless; the most ingenious of them simulate a
kind of impudence.—Wives easily feel their husbands as a question-
mark to their honour, and their children as an apology or atonement,
—they require children, and wish for them in quite another spirit
than a husband wishes for them.—In short, one cannot be gentle
enough towards women!
72.
Mothers.—Animals think differently from men with respect to
females; with them the female is regarded as the productive being.
There is no paternal love among them, but there is such a thing as
love of the children of a beloved, and habituation to them. In the
young, the females find gratification for their lust of dominion; the
young are a property, an occupation, something quite
comprehensible to them, with which they can chatter: all this
conjointly is maternal love,—it is to be compared to the love of the
artist for his work. Pregnancy has made the females gentler, more
expectant, more timid, more submissively inclined; and similarly
intellectual pregnancy engenders the character of the contemplative,
who are allied to women in character:—they are the masculine
mothers.—Among animals the masculine sex is regarded as the
beautiful sex.
73.
Saintly Cruelty.—A man holding a newly born child in his hands
came to a saint. "What should I do with the child," he asked, "it is
wretched, deformed, and has not even enough of life to die." "Kill
it," cried the saint with a dreadful voice, "kill it, and then hold it in
thy arms for three days and three nights to brand it on thy memory:
—thus wilt thou never again beget a child when it is not the time for
thee to beget."—When the man had heard this he went away
disappointed; and many found fault with the saint because he had
advised cruelty, for he had advised to kill the child. "But is it not
more cruel to let it live?" asked the saint.
74.
The Unsuccessful.—Those poor women always fail of success who
become agitated and uncertain, and talk too much in presence of
him whom they love; for men are most successfully seduced by a
certain subtle and phlegmatic tenderness.
75.
The Third Sex.—"A small man is a paradox, but still a man,—but
the small woman seems to me to be of another sex in comparison
with well-grown ones"—said an old dancing-master. A small woman
is never beautiful—said old Aristotle.

More Related Content

PDF
Essentials of Management Information Systems 10th Edition Laudon Test Bank
PDF
Essentials of Management Information Systems 10th Edition Laudon Test Bank
PDF
Essentials of Management Information Systems 10th Edition Laudon Test Bank
PDF
Essentials of Management Information Systems 10th Edition Laudon Test Bank
PDF
Essentials of Management Information Systems 10th Edition Laudon Test Bank
PDF
All chapter download Essentials of Management Information Systems 10th Editio...
PDF
Essentials of Management Information Systems 10th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
Essentials of Management Information Systems 10th Edition Laudon Test Bank
Essentials of Management Information Systems 10th Edition Laudon Test Bank
Essentials of Management Information Systems 10th Edition Laudon Test Bank
Essentials of Management Information Systems 10th Edition Laudon Test Bank
Essentials of Management Information Systems 10th Edition Laudon Test Bank
All chapter download Essentials of Management Information Systems 10th Editio...
Essentials of Management Information Systems 10th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank

Similar to Essentials of Management Information Systems 10th Edition Laudon Test Bank (20)

PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank download pdf
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Management Information Systems 13th Edition Laudon Test Bank download pdf
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Full Download of Management Information Systems 13th Edition Laudon Test Bank...
PDF
Essentials of MIS 11th Edition Laudon Test Bank
PDF
Download Study Resources for Management Information Systems 13th Edition Laud...
PDF
Get Management Information Systems 13th Edition Laudon Test Bank free all cha...
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Essentials of MIS 11th Edition Laudon Test Bank
PDF
Essentials of MIS 11th Edition Laudon Test Bank all chapter instant download
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank download pdf
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank
Management Information Systems 13th Edition Laudon Test Bank download pdf
Management Information Systems 13th Edition Laudon Test Bank
Full Download of Management Information Systems 13th Edition Laudon Test Bank...
Essentials of MIS 11th Edition Laudon Test Bank
Download Study Resources for Management Information Systems 13th Edition Laud...
Get Management Information Systems 13th Edition Laudon Test Bank free all cha...
Management Information Systems 13th Edition Laudon Test Bank
Essentials of MIS 11th Edition Laudon Test Bank
Essentials of MIS 11th Edition Laudon Test Bank all chapter instant download
Ad

More from jedanwasimaj (9)

PDF
Processes Systems and Information An Introduction to MIS 2nd Edition McKinney...
PDF
Programming the World Wide Web 7th Edition Sebesta Solutions Manual
PDF
Programming Abstractions in Java 1st Edition Roberts Solutions Manual
PDF
Product Design For Engineers 1st Edition Shetty Solutions Manual
PDF
Project Management Achieving Competitive Advantage 3rd Edition Pinto Solution...
PDF
Product Design For Engineers 1st Edition Shetty Solutions Manual
PDF
Programming Abstractions in Java 1st Edition Roberts Solutions Manual
PDF
Processes Systems and Information An Introduction to MIS 2nd Edition McKinney...
PDF
Programming the World Wide Web 7th Edition Sebesta Solutions Manual
Processes Systems and Information An Introduction to MIS 2nd Edition McKinney...
Programming the World Wide Web 7th Edition Sebesta Solutions Manual
Programming Abstractions in Java 1st Edition Roberts Solutions Manual
Product Design For Engineers 1st Edition Shetty Solutions Manual
Project Management Achieving Competitive Advantage 3rd Edition Pinto Solution...
Product Design For Engineers 1st Edition Shetty Solutions Manual
Programming Abstractions in Java 1st Edition Roberts Solutions Manual
Processes Systems and Information An Introduction to MIS 2nd Edition McKinney...
Programming the World Wide Web 7th Edition Sebesta Solutions Manual
Ad

Recently uploaded (20)

PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
advance database management system book.pdf
PDF
Trump Administration's workforce development strategy
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
IGGE1 Understanding the Self1234567891011
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Computing-Curriculum for Schools in Ghana
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Computer Architecture Input Output Memory.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Introduction to pro and eukaryotes and differences.pptx
Indian roads congress 037 - 2012 Flexible pavement
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
advance database management system book.pdf
Trump Administration's workforce development strategy
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
What if we spent less time fighting change, and more time building what’s rig...
B.Sc. DS Unit 2 Software Engineering.pptx
IGGE1 Understanding the Self1234567891011
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
History, Philosophy and sociology of education (1).pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Computing-Curriculum for Schools in Ghana
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Paper A Mock Exam 9_ Attempt review.pdf.

Essentials of Management Information Systems 10th Edition Laudon Test Bank

  • 1. Essentials of Management Information Systems 10th Edition Laudon Test Bank install download https://testbankfan.com/product/essentials-of-management- information-systems-10th-edition-laudon-test-bank/ Download more testbank from https://testbankfan.com
  • 2. We believe these products will be a great fit for you. Click the link to download now, or visit testbankfan.com to discover even more! Essentials of Management Information Systems 10th Edition Laudon Solutions Manual https://testbankfan.com/product/essentials-of-management- information-systems-10th-edition-laudon-solutions-manual/ Management Information Systems 13th Edition Laudon Test Bank https://testbankfan.com/product/management-information- systems-13th-edition-laudon-test-bank/ Management Information Systems 12th Edition Laudon Test Bank https://testbankfan.com/product/management-information- systems-12th-edition-laudon-test-bank/ Management Information Systems Global 14th Edition Laudon Test Bank https://testbankfan.com/product/management-information-systems- global-14th-edition-laudon-test-bank/
  • 3. Management Information Systems 12th Edition Laudon Solutions Manual https://testbankfan.com/product/management-information- systems-12th-edition-laudon-solutions-manual/ Management Information Systems 13th Edition Laudon Solutions Manual https://testbankfan.com/product/management-information- systems-13th-edition-laudon-solutions-manual/ Essentials of MIS 10th Edition Laudon Test Bank https://testbankfan.com/product/essentials-of-mis-10th-edition- laudon-test-bank/ Management Information Systems Managing the Digital Firm 14th Edition Laudon Test Bank https://testbankfan.com/product/management-information-systems- managing-the-digital-firm-14th-edition-laudon-test-bank/ Management Information Systems Managing the Digital Firm 15th Edition Laudon Test Bank https://testbankfan.com/product/management-information-systems- managing-the-digital-firm-15th-edition-laudon-test-bank/
  • 4. 1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Essentials of MIS, 10e (Laudon/Laudon) Chapter 6 Telecommunications, the Internet, and Wireless Technology 1) Telephone networks are fundamentally different from computer networks. Answer: TRUE Diff: 2 Page Ref: 181 AACSB: Use of IT CASE: Comprehension 2) Increasingly, voice, video, and data communications are all based on Internet technology. Answer: TRUE Diff: 1 Page Ref: 181 AACSB: Use of IT CASE: Comprehension 3) To create a computer network, you must have at least two computers. Answer: TRUE Diff: 2 Page Ref: 182 AACSB: Use of IT CASE: Comprehension 4) An NOS must reside on a dedicated server computer in order to manage a network. Answer: FALSE Diff: 2 Page Ref: 182 AACSB: Use of IT CASE: Comprehension 5) A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network. Answer: FALSE Diff: 2 Page Ref: 183 AACSB: Use of IT CASE: Comprehension 6) In a client/server network, a network server provides every connected client with an address so it can be found by others on the network. Answer: TRUE Diff: 2 Page Ref: 184 AACSB: Use of IT CASE: Comprehension 7) Central large mainframe computing has largely replaced client/server computing. Answer: FALSE Diff: 2 Page Ref: 184 AACSB: Use of IT CASE: Comprehension
  • 5. 2 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 8) Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching. Answer: FALSE Diff: 1 Page Ref: 8497 AACSB: Use of IT CASE: Comprehension 9) Mobile search makes up 15% of all Internet searches. Answer: TRUE Diff: 1 Page Ref: 202 AACSB: Reflective Thinking CASE: Comprehension 10) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. Answer: TRUE Diff: 1 Page Ref: 186 AACSB: Use of IT CASE: Comprehension 11) In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment. Answer: FALSE Diff: 3 Page Ref: 188 AACSB: Use of IT CASE: Comprehension 12) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. Answer: TRUE Diff: 1 Page Ref: 188 AACSB: Use of IT CASE: Comprehension 13) Fiber-optic cable is more expensive and harder to install than wire media. Answer: TRUE Diff: 2 Page Ref: 189 AACSB: Use of IT CASE: Comprehension 14) The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. Answer: FALSE Diff: 2 Page Ref: 190 AACSB: Use of IT CASE: Comprehension
  • 6. 3 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 15) The Domain Name System (DNS) converts IP addresses to domain names. Answer: TRUE Diff: 3 Page Ref: 191 AACSB: Use of IT CASE: Comprehension 16) VoIP technology delivers video information in digital form using packet switching. Answer: TRUE Diff: 1 Page Ref: 198 AACSB: Use of IT CASE: Comprehension 17) Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information. Answer: TRUE Diff: 2 Page Ref: 206 AACSB: Reflective Thinking CASE: Comprehension 18) In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks. Answer: TRUE Diff: 1 Page Ref: 193 AACSB: Use of IT CASE: Comprehension 19) TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer. Answer: FALSE Diff: 2 Page Ref: 185 AACSB: Reflective Thinking CASE: Comprehension 20) RFID technology is being gradually replaced by less costly technologies such as WSNs. Answer: FALSE Diff: 2 Page Ref: 209-211 AACSB: Use of IT CASE: Comprehension
  • 7. 4 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC. Answer: B Diff: 1 Page Ref: 183 AACSB: Use of IT CASE: Comprehension 22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP Answer: C Diff: 2 Page Ref: 184 AACSB: Use of IT CASE: Comprehension 23) The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) multiplexing. B) packet switching. C) packet routing. D) ATM. Answer: B Diff: 1 Page Ref: 184 AACSB: Use of IT CASE: Comprehension 24) The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched Answer: D Diff: 1 Page Ref: 184 AACSB: Use of IT CASE: Comprehension
  • 8. 5 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 25) Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. Answer: C Diff: 2 Page Ref: 184 AACSB: Use of IT CASE: Comprehension 26) In TCP/IP, IP is responsible for: A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets. Answer: A Diff: 3 Page Ref: 185 AACSB: Use of IT CASE: Comprehension 27) In a telecommunications network architecture, a protocol is: A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network. Answer: B Diff: 2 Page Ref: 185 AACSB: Use of IT CASE: Comprehension 28) What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, application, Internet, and network interface C) Application, transport, Internet, and network interface D) Application, hardware, Internet, and network interface Answer: C Diff: 3 Page Ref: 185-186 AACSB: Use of IT CASE: Comprehension
  • 9. 6 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 29) Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) Analog Answer: D Diff: 2 Page Ref: 186 AACSB: Use of IT CASE: Comprehension 30) To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire. Answer: A Diff: 1 Page Ref: 186 AACSB: Use of IT CASE: Comprehension 31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN Answer: B Diff: 2 Page Ref: 186-187 AACSB: Use of IT CASE: Comprehension 32) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) Peer-to-peer B) Wireless C) LAN D) Ring Answer: A Diff: 2 Page Ref: 187 AACSB: Use of IT CASE: Comprehension
  • 10. 7 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 33) Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) Wireless network in infrastructure mode B) Domain-based LAN C) Peer-to-peer network D) Campus area network Answer: C Diff: 2 Page Ref: 187 AACSB: Analytic Skills CASE: Evaluation in terms of assess 34) In a bus network: A) signals are broadcast to the next station. B) signals are broadcast in both directions to the entire network. C) multiple hubs are organized in a hierarchy. D) messages pass from computer to computer in a loop. Answer: B Diff: 2 Page Ref: 187 AACSB: Use of IT CASE: Comprehension 35) All network components connect to a single hub in a ________ topology. A) star B) bus C) domain D) peer-to-peer Answer: A Diff: 2 Page Ref: 187 AACSB: Use of IT CASE: Comprehension 36) The most common Ethernet topology is: A) bus. B) star. C) ring. D) mesh. Answer: A Diff: 3 Page Ref: 187 AACSB: Use of IT CASE: Comprehension
  • 11. 8 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 37) A network that spans a city, and sometimes its major suburbs as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN. Answer: B Diff: 1 Page Ref: 188 AACSB: Use of IT CASE: Comprehension 38) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. Answer: D Diff: 1 Page Ref: 188 AACSB: Use of IT CASE: Comprehension 39) ________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas. A) Cell phones B) Microwaves C) Satellites D) WANs Answer: A Diff: 1 Page Ref: 190 AACSB: Use of IT CASE: Comprehension 40) Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. Answer: C Diff: 2 Page Ref: 190 AACSB: Use of IT CASE: Comprehension
  • 12. 9 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. Answer: A Diff: 2 Page Ref: 190 AACSB: Use of IT CASE: Comprehension 42) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels. Answer: A Diff: 2 Page Ref: 190 AACSB: Use of IT CASE: Comprehension 43) T lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels. Answer: C Diff: 2 Page Ref: 190-191 AACSB: Use of IT CASE: Comprehension 44) Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP Answer: A Diff: 1 Page Ref: 191 AACSB: Use of IT CASE: Comprehension
  • 13. 10 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 45) What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP Answer: B Diff: 2 Page Ref: 191 AACSB: Use of IT CASE: Comprehension 46) The child domain of the root is the: A) top-level domain. B) second-level domain. C) host name. D) domain extension. Answer: A Diff: 2 Page Ref: 191 AACSB: Use of IT CASE: Comprehension 47) In the domain name "http://myspace.blogging.com", what are the root, top-level, second- level, and third-level domains, respectively? A) "http://", myspace, blogging, com B) "http://", com, blogging, myspace C) ".", com, blogging, myspace D) ".", myspace, blogging, com Answer: C Diff: 2 Page Ref: 191-192 AACSB: Use of IT CASE: Comprehension 48) Which organization helps define the overall structure of the Internet? A) None (no one "owns" the Internet) B) W3C C) ICANN D) IAB Answer: D Diff: 3 Page Ref: 194 AACSB: Use of IT CASE: Comprehension
  • 14. 11 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 49) IPv6 is being developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. Answer: B Diff: 2 Page Ref: 195 AACSB: Use of IT CASE: Comprehension 50) Which of the following services enables logging on to one computer system and working on another? A) FTP B) LISTSERV C) Telnet D) World Wide Web Answer: C Diff: 3 Page Ref: 195 AACSB: Use of IT CASE: Comprehension 51) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless Answer: A Diff: 1 Page Ref: 196 AACSB: Use of IT CASE: Comprehension 52) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. Answer: D Diff: 2 Page Ref: 209-210 AACSB: Reflective Thinking CASE: Comprehension
  • 15. 12 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 53) ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications Answer: D Diff: 1 Page Ref: 199 AACSB: Use of IT CASE: Comprehension 54) A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. Answer: A Diff: 2 Page Ref: 199 AACSB: Use of IT CASE: Comprehension 55) Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML Answer: B Diff: 2 Page Ref: 200 AACSB: Use of IT CASE: Comprehension 56) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third level domain. D) root domain. Answer: A Diff: 2 Page Ref: 200-201 AACSB: Use of IT CASE: Comprehension
  • 16. 13 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 57) The most common Web server today, controlling 59 percent of the market, is: A) Microsoft IIS. B) WebSTAR C) Apache HTTP Server. D) Netscape Server. Answer: C Diff: 2 Page Ref: 201 AACSB: Use of IT CASE: Comprehension 58) What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth Answer: B Diff: 2 Page Ref: 205 AACSB: Use of IT CASE: Comprehension 59) The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called: A) VPN. B) IAB. C) SEM. D) SEO. Answer: D Diff: 1 Page Ref: 203 AACSB: Use of IT CASE: Comprehension 60) Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. Answer: D Diff: 1 Page Ref: 201-203 AACSB: Use of IT CASE: Comprehension
  • 17. 14 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 61) Which of the following is the first generation of cellular systems suitable for wireless broadband Internet access? A) 2G B) 2.5G C) 3G D) 4G Answer: C Diff: 2 Page Ref: 207 AACSB: Use of IT CASE: Comprehension 62) A LAN would be used to connect all of the following except: A) all of the computers in a large building. B) all of the devices within a 10-meter area. C) all of the computers in a city. D) all of the computers in a small office. Answer: C Diff: 2 Page Ref: 187 AACSB: Use of IT CASE: Comprehension 63) The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) WiFi. D) Bluetooth. Answer: D Diff: 2 Page Ref: 207 AACSB: Use of IT CASE: Comprehension 64) Bluetooth can be used to link up to ________ devices within a 10-meter area using low- power, radio-based communication. A) four B) six C) eight D) ten Answer: C Diff: 3 Page Ref: 207 AACSB: Use of IT CASE: Comprehension
  • 18. 15 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 65) Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet switching Answer: A Diff: 3 Page Ref: 200 AACSB: Use of IT CASE: Comprehension 66) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) hotspots. C) hot points. D) wireless hubs. Answer: B Diff: 2 Page Ref: 208 AACSB: Use of IT CASE: Comprehension 67) The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax. Answer: C Diff: 2 Page Ref: 208 AACSB: Use of IT CASE: Comprehension 68) The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. Answer: C Diff: 3 Page Ref: 209 AACSB: Use of IT CASE: Comprehension
  • 19. 16 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 69) Passive RFID tags: A) have their own power source. B) have a range of several feet. C) enable data to be rewritten and modified. D) are used in automated toll-collection systems. Answer: B Diff: 2 Page Ref: 210 AACSB: Use of IT CASE: Comprehension 70) Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication Answer: B Diff: 2 Page Ref: 209-211 AACSB: Analytic Skills CASE: Comprehension 71) A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS Answer: D Diff: 2 Page Ref: 182 AACSB: Use of IT CASE: Comprehension 72) A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. Answer: TRUE Diff: 2 Page Ref: 183 AACSB: Use of IT CASE: Comprehension
  • 20. 17 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 73) Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. A) packet switching B) routers C) servers D) coaxial cable Answer: A Diff: 2 Page Ref: 184 AACSB: Use of IT CASE: Comprehension 74) An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. Answer: FALSE Diff: 2 Page Ref: 186 AACSB: Use of IT CASE: Comprehension 75) ________ is the manner in which the physical components of a LAN are connected together. A) Network topology B) Network architecture C) Network infrastructure D) A network's platform Answer: A Diff: 2 Page Ref: 187 AACSB: Use of IT CASE: Comprehension 76) Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps. Answer: TRUE Diff: 2 Page Ref: 181 AACSB: Use of IT CASE: Comprehension 77) An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic. Answer: FALSE Diff: 2 Page Ref: 190 AACSB: Use of IT CASE: Comprehension
  • 21. 18 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 78) The trunklines of the Internet are typically owned by network service providers. Answer: TRUE Diff: 2 Page Ref: 192 AACSB: Use of IT CASE: Comprehension 79) A Web server is a dedicated computer that delivers Web pagers to client computers. Answer: FALSE Diff: 2 Page Ref: 201 AACSB: Use of IT CASE: Comprehension 80) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) hotspot B) access point C) server D) wireless router Answer: B Diff: 2 Page Ref: 208 AACSB: Use of IT CASE: Comprehension 81) How does packet switching work? Answer: Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destinations. Packet switching makes much more efficient use of the communications capacity of a network than did circuit-switching. In packet-switched networks, messages are first broken down into small fixed bundles of data called packets. The packets include information for directing the packet to the right address and for checking transmission errors along with the data. The packets are transmitted over various communications channels using routers, each packet traveling independently. Packets of data originating at one source will be routed through many different paths and networks before being reassembled into the original message when they reach their destinations. Diff: 2 Page Ref: 184-185 AACSB: Analytic Skills CASE: Analysis in terms of summarize
  • 22. 19 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 82) Identify the layers of the Department of Defense reference model for TCP/IP, and describe how this model works. Answer: The application layer enables client application programs to access the other layers and defines the protocols that applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP), which is used to transfer Web page files. The transport layer is responsible for providing the application layer with communication and packet services. This layer includes TCP and other protocols. The Internet layer is responsible for addressing, routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer. At the bottom of the reference model, the network interface layer is responsible for placing packets on and receiving them from the network medium, which could be any networking technology. Data sent from one computer to the other passes downward through all four layers, starting with the sending computer's application layer and passing through the network interface layer. After the data reach the recipient host computer, they travel up the layers and are reassembled into a format the receiving computer can use. If the receiving computer finds a damaged packet, it asks the sending computer to retransmit it. This process is reversed when the receiving computer responds. Diff: 3 Page Ref: 185-186 AACSB: Analytic Skills CASE: Analysis in terms of summarize 83) Describe and explain the idea of "network neutrality." Are you in favor of network neutrality? Why or why not? Answer: Network neutrality describes the current equal access by users to Internet bandwidth, regardless of the services they are using on the Internet. Network neutrality is the idea that Internet service providers must allow customers equal access to content and applications, regardless of the source or nature of the content. Presently, the Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-served basis by Internet backbone owners. The Internet is neutral because it was built on phone lines, which are subject to "common carriage" laws. These laws require phone companies to treat all calls and customers equally. For example, someone using the Internet to download large movie files pays the same rate as someone accessing their e-mail. Now telecommunications and cable companies want to be able to charge differentiated prices based on the amount of bandwidth consumed by content being delivered over the Internet. Student opinions will vary; one might be: I support network neutrality because the risk of censorship increases when network operators can selectively block or slow access to certain content. Diff: 2 Page Ref: 193-194 AACSB: Analytic Skills CASE: Evaluation in terms of assess
  • 23. 20 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 84) You have been hired by a small new Web design firm to set up a network for its single office location. The network is primarily needed for exchanging files, accessing and managing beta Web sites on their Web server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad hoc basis and it does not have a lot of money to spend on infrastructure. What type of network will you recommend? Answer: Student answers will vary. An example answer is: I would recommend a mixed Ethernet and wireless network. The Ethernet LAN would connect the Web servers and primary workstations and connect via cable service to the Internet. Freelancers could connect wirelessly via access points. Diff: 3 Page Ref: 186-190 AACSB: Analytic Skills CASE: Evaluation in terms of assess 85) What are the business advantages of using voice over IP (VoIP) technology? Answer: Business can lower costs by using the Internet to deliver voice information, avoiding the tolls charged by local and long-distance telephone networks. They can lower costs from not having to create a separate telephone network. VOIP enables communication by supporting Internet conference calls using video. VOIP also provides flexibility - phones can be added or moved to different offices without rewiring or reconfiguring the network. Diff: 2 Page Ref: 198-199 AACSB: Analytic Skills CASE: Evaluation in terms of assess 86) How are RFID systems used in inventory control and supply chain management? Answer: In inventory control and supply chain management, RFID systems capture and manage more detailed information about items in warehouses or in production than bar coding systems. If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit item in the shipment. This technology may help companies improve receiving and storage operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on retail store shelves. Diff: 1 Page Ref: 210 AACSB: Analytic Skills CASE: Analysis in terms of summarize
  • 24. 21 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 87) What are wireless sensor networks? How do they work and what are they used for? Answer: Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces. These devices have built-in processing, storage, and radio frequency sensors and antennas. They are linked into an interconnected network that routes the data they capture to a computer for analysis. These networks range from hundreds to thousands of nodes. Because wireless sensor devices are placed in the field for years at a time without any maintenance or human intervention, they must have very low power requirements and batteries capable of lasting for years. Wireless sensor networks are valuable in areas such as monitoring environmental changes; monitoring traffic or military activity; protecting property; efficiently operating and managing machinery and vehicles; establishing security perimeters; monitoring supply chain management; or detecting chemical, biological, or radiological material. Diff: 1 Page Ref: 211 AACSB: Analytic Skills CASE: Analysis in terms of summarize 88) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses? Answer: Web 3.0 is the vision of the next generation of the Web in which all of the information available on the Web is woven together into a single experience. The related movement called the Semantic Web is a collaborative effort to add a layer of meaning to existing information to reduce the amount of human time spent in searching and processing that information. Student views on the impact on businesses would vary. An example answer is: This potentially could have huge effects on businesses as simple analysis becomes mechanized, requiring fewer humans to perform this basic task. Diff: 2 Page Ref: 205-206 AACSB: Analytic Skills CASE: Evaluation in terms of assess 89) Blogs, wikis, and social networking sites were designed for individuals to communicate with each other. What uses do businesses have for these tools? Give specific examples. Answer: Businesses can use these tools to reach out and market to potential new customers. For example, many businesses have Facebook sites to market their product to specific groups on Facebook. They can use these tools to support and give added value to existing customers. For example, a software company could have a blog that discusses in-depth use of a software product. Businesses can also use these tools within their company to communicate between departments and share knowledge. For example, a company wiki could be set up as a repository of expert information. Diff: 2 Page Ref: 204-205 AACSB: Analytic Skills CASE: Synthesis in terms of build, model
  • 25. 22 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 90) What has made the Google search engine so successful? Answer: The Google search engine became so successful because it was one of the first search engines to incorporate page ranking: Not only does it index the Web pages it finds according to both keywords and combinations of keywords, it also ranks each page according to the number of pages that link to it, and the number of pages it links to itself. This helped make search results more relevant when compared to search engines relying solely on key words used on Web pages. A user could be relatively certain that they would find relevant information within the top results of a Google search. Improved search results for the user, along with continual improvements to its search engine, the development and other Web applications, tools, and its Ad Sense product where it sells keywords to the highest bidder has made Google so successful as a search engine and marketing firm. Diff: 2 Page Ref: 202-203 AACSB: Analytic Skills CASE: Evaluation in terms of assess
  • 26. Exploring the Variety of Random Documents with Different Content
  • 27. 52. What others Know of us.—That which we know of ourselves and have in our memory is not so decisive for the happiness of our life as is generally believed. One day it flashes upon our mind what others know of us (or think they know)—and then we acknowledge that it is the more powerful. We get on with our bad conscience more easily than with our bad reputation.
  • 28. 53. Where Goodness Begins.—Where bad eyesight can no longer see the evil impulse as such, on account of its refinement,—there man sets up the kingdom of goodness; and the feeling of having now gone over into the kingdom of goodness brings all those impulses (such as the feelings of security, of comfortableness, of benevolence) into simultaneous activity, which were threatened and confined by the evil impulses. Consequently, the duller the eye so much the further does goodness extend! Hence the eternal cheerfulness of the populace and of children! Hence the gloominess and grief (allied to the bad conscience) of great thinkers.
  • 29. 54. The Consciousness of Appearance.—How wonderfully and novelly, and at the same time how awfully and ironically, do I feel myself situated with respect to collective existence, with my knowledge! I have discovered for myself that the old humanity and animality, yea, the collective primeval age, and the past of all sentient being, continues to meditate, love, hate, and reason in me,—I have suddenly awoke in the midst of this dream, but merely to the consciousness that I just dream, and that I must dream on in order not to perish; just as the sleep-walker must dream on in order not to tumble down. What is it that is now "appearance" to me! Verily, not the antithesis of any kind of essence,—what knowledge can I assert of any kind of essence whatsoever, except merely the predicates of its appearance! Verily not a dead mask which one could put upon an unknown X, and which to be sure one could also remove! Appearance is for me the operating and living thing itself; which goes so far in its self-mockery as to make me feel that here there is appearance, and Will o' the Wisp, and spirit-dance, and nothing more,—that among all these dreamers, I also, the "thinker," dance my dance, that the thinker is a means of prolonging further the terrestrial dance, and in so far is one of the masters of ceremony of existence, and that the sublime consistency and connectedness of all branches of knowledge is perhaps, and will perhaps, be the best means for maintaining the universality of the dreaming, the complete, mutual understandability of all those dreamers, and thereby the duration of the dream.
  • 30. 55. The Ultimate Nobility of Character.—What then makes a person "noble"? Certainly not that he makes sacrifices; even the frantic libertine makes sacrifices. Certainly not that he generally follows his passions; there are contemptible passions. Certainly not that he does something for others and without selfishness; perhaps the effect of selfishness is precisely at its greatest in the noblest persons.—But that the passion which seizes the noble man is a peculiarity, without his knowing that it is so: the use of a rare and singular measuring-rod, almost a frenzy: the feeling of heat in things which feel cold to all other persons: a divining of values for which scales have not yet been invented: a sacrificing on altars which are consecrated to an unknown God: a bravery without the desire for honour: a self-sufficiency which has superabundance, and imparts to men and things. Hitherto, therefore, it has been the rare in man, and the unconsciousness of this rareness, that has made men noble. Here, however, let us consider that everything ordinary, immediate, and indispensable, in short, what has been most preservative of the species, and generally the rule in mankind hitherto, has been judged unreasonable and calumniated in its entirety by this standard, in favour of the exceptions. To become the advocate of the rule—that may perhaps be the ultimate form and refinement in which nobility of character will reveal itself on earth.
  • 31. 56. The Desire for Suffering.—When I think of the desire to do something, how it continually tickles and stimulates millions of young Europeans, who cannot endure themselves and all their ennui,—I conceive that there must be a desire in them to suffer something, in order to derive from their suffering a worthy motive for acting, for doing something. Distress is necessary! Hence the cry of the politicians, hence the many false, trumped-up, exaggerated "states of distress" of all possible kinds, and the blind readiness to believe in them. This young world desires that there should arrive or appear from the outside—not happiness—but misfortune; and their imagination is already busy beforehand to form a monster out of it, so that they may afterwards be able to fight with a monster. If these distress-seekers felt the power to benefit themselves, to do something for themselves from internal sources, they would also understand how to create a distress of their own, specially their own, from internal sources. Their inventions might then be more refined, and their gratifications might sound like good music: while at present they fill the world with their cries of distress, and consequently too often with the feeling of distress in the first place! They do not know what to make of themselves—and so they paint the misfortune of others on the wall; they always need others! And always again other others!—Pardon me, my friends, I have ventured to paint my happiness on the wall.
  • 33. 57. To the Realists.—Ye sober beings, who feel yourselves armed against passion and fantasy, and would gladly make a pride and an ornament out of your emptiness, ye call yourselves realists and give to understand that the world is actually constituted as it appears to you; before you alone reality stands unveiled, and ye yourselves would perhaps be the best part of it,—oh, ye dear images of Sais! But are not ye also in your unveiled condition still extremely passionate and dusky beings compared with the fish, and still all too like an enamoured artist?[8] —and what is "reality" to an enamoured artist! Ye still carry about with you the valuations of things which had their origin in the passions and infatuations of earlier centuries! There is still a secret and ineffaceable drunkenness embodied in your sobriety! Your love of "reality," for example—oh, that is an old, primitive "love"! In every feeling, in every sense-impression, there is a portion of this old love: and similarly also some kind of fantasy, prejudice, irrationality, ignorance, fear, and whatever else has become mingled and woven into it. There is that mountain! There is that cloud! What is "real" in them? Remove the phantasm and the whole human element therefrom, ye sober ones! Yes, if ye could do that! If ye could forget your origin, your past, your preparatory schooling,—your whole history as man and beast! There is no "reality" for us—nor for you either, ye sober ones,—we are far from being so alien to one another as ye suppose, and perhaps our good- will to get beyond drunkenness is just as respectable as your belief that ye are altogether incapable of drunkenness.
  • 34. 58. Only as Creators!—It has caused me the greatest trouble, and for ever causes me the greatest trouble, to perceive that unspeakably more depends upon what things are called, than on what they are. The reputation, the name and appearance, the importance, the usual measure and weight of things—each being in origin most frequently an error and arbitrariness thrown over the things like a garment, and quite alien to their essence and even to their exterior —have gradually, by the belief therein and its continuous growth from generation to generation, grown as it were on-and-into things and become their very body; the appearance at the very beginning becomes almost always the essence in the end, and operates as the essence! What a fool he would be who would think it enough to refer here to this origin and this nebulous veil of illusion, in order to annihilate that which virtually passes for the world—namely, so- called "reality"! It is only as creators that we can annihilate!—But let us not forget this: it suffices to create new names and valuations and probabilities, in order in the long run to create new "things."
  • 35. 59. We Artists!—When we love a woman we have readily a hatred against nature, on recollecting all the disagreeable natural functions to which every woman is subject; we prefer not to think of them at all, but if once our soul touches on these things it twitches impatiently, and glances, as we have said, contemptuously at nature:—we are hurt; nature seems to encroach upon our possessions, and with the profanest hands. We then shut our ears against all physiology, and we decree in secret that "we will hear nothing of the fact that man is something else than soul and form!" "The man under the skin" is an abomination and monstrosity, a blasphemy of God and of love to all lovers.—Well, just as the lover still feels with respect to nature and natural functions, so did every worshipper of God and his "holy omnipotence" formerly feel: in all that was said of nature by astronomers, geologists, physiologists, and physicians, he saw an encroachment on his most precious possession, and consequently an attack,—and moreover also an impertinence of the assailant! The "law of nature" sounded to him as blasphemy against God; in truth he would too willingly have seen the whole of mechanics traced back to moral acts of volition and arbitrariness:—but because nobody could render him this service, he concealed nature and mechanism from himself as best he could, and lived in a dream. Oh, those men of former times understood how to dream, and did not need first to go to sleep!—and we men of the present day also still understand it too well, with all our good-will for wakefulness and daylight! It suffices to love, to hate, to desire, and in general to feel,—immediately the spirit and the power of the dream come over us, and we ascend, with open eyes and indifferent to all danger, the most dangerous paths, to the roofs and towers of fantasy, and without any giddiness, as persons born for climbing— we the night-walkers by day! We artists! We concealers of naturalness! We moon-struck and God-struck ones! We dead-silent,
  • 36. untiring wanderers on heights which we do not see as heights, but as our plains, as our places of safety!
  • 37. 60. Women and their Effect in the Distance.—Have I still ears? Am I only ear, and nothing else besides? Here I stand in the midst of the surging of the breakers, whose white flames fork up to my feet;— from all sides there is howling, threatening, crying, and screaming at me, while in the lowest depths the old earth-shaker sings his aria, hollow like a roaring bull; he beats such an earth-shaker's measure thereto, that even the hearts of these weathered rock-monsters tremble at the sound. Then, suddenly, as if born out of nothingness, there appears before the portal of this hellish labyrinth, only a few fathoms distant,—a great sailing-ship gliding silently along like a ghost. Oh, this ghostly beauty! With what enchantment it seizes me! What? Has all the repose and silence in the world embarked here? Does my happiness itself sit in this quiet place, my happier ego, my second immortalised self? Still not dead, yet also no longer living? As a ghost-like, calm, gazing, gliding, sweeping, neutral being? Similar to the ship, which, with its white sails, like an immense butterfly, passes over the dark sea! Yes! Passing over existence! That is it! That would be it!——It seems that the noise here has made me a visionary? All great noise causes one to place happiness in the calm and the distance. When a man is in the midst of his hubbub, in the midst of the breakers of his plots and plans, he there sees perhaps calm, enchanting beings glide past him, for whose happiness and retirement he longs—they are women. He almost thinks that there with the women dwells his better self; that in these calm places even the loudest breakers become still as death, and life itself a dream of life. But still! But still! My noble enthusiast, there is also in the most beautiful sailing-ship so much noise and bustling, and alas, so much petty, pitiable bustling! The enchantment and the most powerful effect of women is, to use the language of philosophers, an effect at a distance, an actio in distans; there belongs thereto, however, primarily and above all,—distance!
  • 39. 61. In Honour of Friendship.—That the sentiment of friendship was regarded by antiquity as the highest sentiment, higher even than the most vaunted pride of the self-sufficient and wise, yea as it were its sole and still holier brotherhood, is very well expressed by the story of the Macedonian king who made the present of a talent to a cynical Athenian philosopher from whom he received it back again. "What?" said the king, "has he then no friend?" He therewith meant to say, "I honour this pride of the wise and independent man, but I should have honoured his humanity still higher if the friend in him had gained the victory over his pride. The philosopher has lowered himself in my estimation, for he showed that he did not know one of the two highest sentiments—and in fact the higher of them!"
  • 40. 62. Love.—Love pardons even the passion of the beloved.
  • 41. 63. Woman in Music.—How does it happen that warm and rainy winds bring the musical mood and the inventive delight in melody with them? Are they not the same winds that fill the churches and give women amorous thoughts?
  • 42. 64. Sceptics.—I fear women who have become old are more sceptical in the secret recesses of their hearts than any of the men are; they believe in the superficiality of existence as in its essence, and all virtue and profundity is to them only the disguising of this "truth," the very desirable disguising of a pudendum,—an affair, therefore, of decency and of modesty, and nothing more!
  • 43. 65. Devotedness.—There are noble women with a certain poverty of spirit, who, in order to express their profoundest devotedness, have no other alternative but to offer their virtue and modesty: it is the highest thing they have. And this present is often accepted without putting the recipient under such deep obligation as the giver supposed,—a very melancholy story!
  • 44. 66. The Strength of the Weak.—Women are all skilful in exaggerating their weaknesses, indeed they are inventive in weaknesses, so as to seem quite fragile ornaments to which even a grain of dust does harm; their existence is meant to bring home to man's mind his coarseness, and to appeal to his conscience. They thus defend themselves against the strong and all "rights of might."
  • 45. 67. Self-dissembling.—She loves him now and has since been looking forth with as quiet confidence as a cow; but alas! It was precisely his delight that she seemed so fitful and absolutely incomprehensible! He had rather too much steady weather in himself already! Would she not do well to feign her old character? to feign indifference? Does not—love itself advise her to do so? Vivat comœdia!
  • 46. 68. Will and Willingness.—Some one brought a youth to a wise man and said, "See, this is one who is being corrupted by women!" The wise man shook his head and smiled. "It is men," he called out, "who corrupt women; and everything that women lack should be atoned for and improved in men,—for man creates for himself the ideal of woman, and woman moulds herself according to this ideal."—"You are too tender-hearted towards women," said one of the bystanders, "you do not know them!" The wise man answered: "Man's attribute is will, woman's attribute is willingness,—such is the law of the sexes, verily! a hard law for woman! All human beings are innocent of their existence, women, however, are doubly innocent; who could have enough of salve and gentleness for them!"—"What about salve! What about gentleness!" called out another person in the crowd, "we must educate women better!"—"We must educate men better," said the wise man, and made a sign to the youth to follow him.—The youth, however, did not follow him.
  • 47. 69. Capacity for Revenge.—That a person cannot and consequently will not defend himself, does not yet cast disgrace upon him in our eyes; but we despise the person who has neither the ability nor the good-will for revenge—whether it be a man or a woman. Would a woman be able to captivate us (or, as people say, to "fetter" us) whom we did not credit with knowing how to employ the dagger (any kind of dagger) skilfully against us under certain circumstances? Or against herself; which in a certain case might be the severest revenge (the Chinese revenge).
  • 48. 70. The Mistresses of the Masters.—A powerful contralto voice, as we occasionally hear it in the theatre, raises suddenly for us the curtain on possibilities in which we usually do not believe; all at once we are convinced that somewhere in the world there may be women with high, heroic, royal souls, capable and prepared for magnificent remonstrances, resolutions, and self-sacrifices, capable and prepared for domination over men, because in them the best in man, superior to sex, has become a corporeal ideal. To be sure, it is not the intention of the theatre that such voices should give such a conception of women; they are usually intended to represent the ideal male lover, for example, a Romeo; but, to judge by my experience, the theatre regularly miscalculates here, and the musician also, who expects such effects from such a voice. People do not believe in these lovers; these voices still contain a tinge of the motherly and housewifely character, and most of all when love is in their tone.
  • 49. 71. On Female Chastity.—There is something quite astonishing and extraordinary in the education of women of the higher class; indeed, there is perhaps nothing more paradoxical. All the world is agreed to educate them with as much ignorance as possible in eroticis, and to inspire their soul with a profound shame of such things, and the extremest impatience and horror at the suggestion of them. It is really here only that all the "honour" of woman is at stake; what would one not forgive them in other respects! But here they are intended to remain ignorant to the very backbone:—they are intended to have neither eyes, ears, words, nor thoughts for this, their "wickedness"; indeed knowledge here is already evil. And then! To be hurled as with an awful thunderbolt into reality and knowledge with marriage—and indeed by him whom they most love and esteem: to have to encounter love and shame in contradiction, yea, to have to feel rapture, abandonment, duty, sympathy, and fright at the unexpected proximity of God and animal, and whatever else besides! all at once!—There, in fact, a psychic entanglement has been effected which is quite unequalled! Even the sympathetic curiosity of the wisest discerner of men does not suffice to divine how this or that woman gets along with the solution of this enigma and the enigma of this solution; what dreadful, far-reaching suspicions must awaken thereby in the poor unhinged soul; and forsooth, how the ultimate philosophy and scepticism of the woman casts anchor at this point!—Afterwards the same profound silence as before: and often even a silence to herself, a shutting of her eyes to herself.—Young wives on that account make great efforts to appear superficial and thoughtless; the most ingenious of them simulate a kind of impudence.—Wives easily feel their husbands as a question- mark to their honour, and their children as an apology or atonement, —they require children, and wish for them in quite another spirit
  • 50. than a husband wishes for them.—In short, one cannot be gentle enough towards women!
  • 51. 72. Mothers.—Animals think differently from men with respect to females; with them the female is regarded as the productive being. There is no paternal love among them, but there is such a thing as love of the children of a beloved, and habituation to them. In the young, the females find gratification for their lust of dominion; the young are a property, an occupation, something quite comprehensible to them, with which they can chatter: all this conjointly is maternal love,—it is to be compared to the love of the artist for his work. Pregnancy has made the females gentler, more expectant, more timid, more submissively inclined; and similarly intellectual pregnancy engenders the character of the contemplative, who are allied to women in character:—they are the masculine mothers.—Among animals the masculine sex is regarded as the beautiful sex.
  • 52. 73. Saintly Cruelty.—A man holding a newly born child in his hands came to a saint. "What should I do with the child," he asked, "it is wretched, deformed, and has not even enough of life to die." "Kill it," cried the saint with a dreadful voice, "kill it, and then hold it in thy arms for three days and three nights to brand it on thy memory: —thus wilt thou never again beget a child when it is not the time for thee to beget."—When the man had heard this he went away disappointed; and many found fault with the saint because he had advised cruelty, for he had advised to kill the child. "But is it not more cruel to let it live?" asked the saint.
  • 53. 74. The Unsuccessful.—Those poor women always fail of success who become agitated and uncertain, and talk too much in presence of him whom they love; for men are most successfully seduced by a certain subtle and phlegmatic tenderness.
  • 54. 75. The Third Sex.—"A small man is a paradox, but still a man,—but the small woman seems to me to be of another sex in comparison with well-grown ones"—said an old dancing-master. A small woman is never beautiful—said old Aristotle.