SlideShare a Scribd company logo
Essentials of MIS 12th Edition Laudon Solutions
Manual download
https://testbankfan.com/product/essentials-of-mis-12th-edition-
laudon-solutions-manual/
Explore and download more test bank or solution manual
at testbankfan.com
We have selected some products that you may be interested in
Click the link to download now or visit testbankfan.com
for more options!.
Essentials of MIS 12th Edition Laudon Test Bank
https://testbankfan.com/product/essentials-of-mis-12th-edition-laudon-
test-bank/
Essentials of MIS 10th Edition Laudon Solutions Manual
https://testbankfan.com/product/essentials-of-mis-10th-edition-laudon-
solutions-manual/
Essentials of MIS 13th Edition laudon Solutions Manual
https://testbankfan.com/product/essentials-of-mis-13th-edition-laudon-
solutions-manual/
Managerial Accounting for Managers 3rd Edition Noreen
Solutions Manual
https://testbankfan.com/product/managerial-accounting-for-
managers-3rd-edition-noreen-solutions-manual/
Employment Relations An Integrated Approach 1st Edition
mcphail Solutions Manual
https://testbankfan.com/product/employment-relations-an-integrated-
approach-1st-edition-mcphail-solutions-manual/
Statistics for Business Decision Making and Analysis 2nd
Edition Stine Test Bank
https://testbankfan.com/product/statistics-for-business-decision-
making-and-analysis-2nd-edition-stine-test-bank/
Radiographic Imaging and Exposure 5th Edition Fauber Test
Bank
https://testbankfan.com/product/radiographic-imaging-and-exposure-5th-
edition-fauber-test-bank/
International Business Competing in the Global Marketplace
10th Edition Hill Test Bank
https://testbankfan.com/product/international-business-competing-in-
the-global-marketplace-10th-edition-hill-test-bank/
Fundamentals of Financial Accounting 4th Edition Phillips
Test Bank
https://testbankfan.com/product/fundamentals-of-financial-
accounting-4th-edition-phillips-test-bank/
Information Technology Project Management Revised 6th
Edition Schwalbe Test Bank
https://testbankfan.com/product/information-technology-project-
management-revised-6th-edition-schwalbe-test-bank/
Copyright © 2017 Pearson Education, Inc.
1
Chapter 7
Telecommunications, the Internet, and Wireless Technology
Learning Objectives
7-1 What are the principal components of telecommunications networks and key networking
technologies?
7-2 What are the different types of networks?
7-3 How do the Internet and Internet technology work and how do they support communication
and e-business?
7-4 What are the principal technologies and standards for wireless networking, communication,
and Internet access?
Learning Catalytics is a “bring your own device” student engagement, assessment, and
classroom intelligence system. It allows instructors to engage students in class with real-time
diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to
access it. For more information on using Learning Catalytics in your course, contact your
Pearson Representative.
Chapter Outline
7-1 What are the principal components of telecommunications networks and key networking
technologies?
Networking and Communication Trends
What is a Computer Network?
Key Digital Networking Technologies
7-2 What are the different types of networks?
Signals: Digital vs. Analog
Types of Networks
Transmission Media and Transmission Speed
7-3 How do the Internet and Internet technology work and how do they support
communication and e-business?
What is the Internet?
Internet Addressing and Architecture
Internet Services and Communication Tools
The Web
7-4 What are the principal technologies and standards for wireless networking,
communication, and Internet access?
Cellular Systems
Wireless Computer Networks and Internet Access
RFID and Wireless Sensor Networks
Copyright © 2017 Pearson Education, Inc.
2
Key Terms
The following alphabetical list identifies the key terms discussed in this chapter. The page
number for each key term is provided.
3G networks, 254 Personal-area networks (PANs), 254
4G networks, 254 Predictive search, 249
Bandwidth, 236 Protocol, 233
Blog, 251 Radio frequency identification (RFID), 256
Blogosphere, 252 Router, 231
Bluetooth, 254 RSS, 252
Broadband, 230 Search engines, 247
Cable Internet connections, 237 Search engine marketing, 250
Chat, 242 Semantic search, 248
Digital subscriber line (DSL), 237 Shopping bots, 250
Domain name, 238 Smart phones, 253
Domain name systems (DNS), 238 Social networking, 252
E-mail, 242 Social search, 249
File Transfer Protocol (FTP), 242 Software-defined networking, 231
Hertz, 236 Switch, 231
Hotspots, 256 T1 lines, 237
Hubs, 231 Telnet, 242
Hypertext Transfer Protocol (HTTP), 247 Search engine optimization (SEO), 251
Instant messaging, 242 Transmission Control Protocol/Internet Protocol
(TCP/IP), 233
Internet of Things, 253 Unified communications, 245
Internet Protocol (IP) address, 237 Uniform resource locator (URL), 247
Internet service provider (ISP), 236 Virtual private network (VPN), 246
Internet2, 241 Visual Web, 250
IPv6, 241 Voice over IP (VoIP), 243
Local-area network (LAN), 235 Web 2.0, 251
Metropolitan-area network (MAN), 236 Web 3.0, 253
Microblogging, 252 Web site, 2246
Modem, 234 Wide-area networks (WAN), 236
Network operating system (NOS), 230 Wi-Fi, 255
Packet switching, 232 Wiki, 252
Peer-to-peer, 235 WiMax, 256
Wireless sensor networks (WSNs), 258
Copyright © 2017 Pearson Education, Inc.
3
Teaching Suggestions
Chapter 7 presents crucial concepts and terminology since telecommunications, networks, and
the Internet are now introducing fundamental changes in businesses. The opening case,
“Wireless Technology makes Dundee Precious Metals Good as Gold,” illustrates some of the
new capabilities and opportunities provided by contemporary networking technology.
Dundee implemented an underground wireless Wi-Fi network that allows electronic devices to
exchange data wirelessly to monitor the location of equipment, people, and ore throughout the
mine’s tunnels and facilities. The company also uses Wi-Fi radio frequency identification
(RFID) technology to track workers, equipment, and vehicles in underground gold mines.
Dundee has decreased equipment downtime and utilizes its resources more efficiently. It uses
data from the underground wireless network in its mine management software and mobile
planning software. Now the company can more closely account for its mine workers, making
them more safe and the workers can communicate more closely with the mine’s control room.
Control room staff can actually see the location of machinery and direct traffic more effectively,
quickly identify problems and respond more rapidly to emergencies.
The opening vignette provides an example of how businesses are adapting to new technologies
based on the Internet. It shows how companies must continually evolve as technology improves.
Section 7-1, “What are the principal components of telecommunications networks and key
networking technologies?” Telecommunications and networks are vital to the majority of
businesses today, and this section explains why. Because telecommunications technology serves
as the foundation for electronic commerce and the digital economy, the concepts and
terminology in Chapter 7 are important for both MIS and business majors. This section explains
the basic configuration of networks, regardless of their size.
You may want to contrast the origin and history of telephone networks and computer networks.
Then diagram how the two are converging into one pipeline for all types of communication
transmissions. Convergence is leading to more efficient transmission traffic and ubiquitous
communications thanks to the Internet.
A contemporary corporate network infrastructure relies on both public and private infrastructures
to support the movement of information across diverse technological platforms. It includes the
traditional telephone system, mobile cellular communications, wireless local area networks,
videoconferencing systems, a corporate website, intranets, extranets, and an array of local and
wide area networks, including the Internet.
Contemporary networks have been shaped by the rise of client/server computing, the use of
packet switching, and the adoption of TCP/IP as a universal communications standard for linking
disparate networks and computers. Client/server networks have distributed much of the
organization’s computing power to the desktop and factory floor. Packet switching makes more
Copyright © 2017 Pearson Education, Inc.
4
efficient use of network communications capacity by breaking messages into small packets that
are sent independently along different paths in a network and then reassembled at their
destination. Protocols provide a common set of rules that enable communication among diverse
components in a telecommunications network. TCP/IP is a suite of protocols that has become
the dominant model of achieving connectivity among different networks and computers. It is the
connectivity model used in the Internet.
One exercise you may try to help show how much we rely on communications today is to ask
students to count the number of text messages, phone calls, e-mails, and IM messages they either
sent or received in the last 24 hours or the last week. You could even go so far as to ask them to
not send or receive any of these communications for a day to prove how reliant we’ve become on
telecommunications.
Section 7-2, “What are the different types of networks?” It may help for you to bring several
props to show the different transmission media explained in this section. For example, bring
twisted wire, coaxial cable, and fiber-optic cable to show to the class and discuss the advantages
and disadvantages of each type of media. Students should note the different ranges (frequencies)
of wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this
is a critical concept today. Table 7.1 compares the range of four different area networks.
This section describes the different network topologies and how they pass data across a network.
If you have students working in business, ask them to identify the network topologies used in
their organizations.
Section 7-3, “How do the Internet and Internet technology work and how do they support
communication and e-business?” Most students are familiar with the Internet and motivated to
discuss it. You might begin this section by asking students how they spend their time on the
Internet and how their online activities have changed since they started using the Internet. Also,
ask them to identify which client platforms they currently use or have used. Ask your students to
identify several of the many benefits that the Internet offers to organizations. Ask them to
provide specific examples that they have read about in the text or have personally observed.
The principal Internet services and communication tools are e-mail, chatting, instant messaging,
newsgroups, telnet, file transfer protocol, and the web. Most students will probably be familiar
with these services, having used them in their personal life. What they may not understand or
relate to quite yet is how effective the tools are in a business setting. These tools reduce time and
cost when firms must manage organizational activities and communicate with many employees.
If you have students working in businesses, ask them to discuss the communications tools their
organization uses. This section introduces a fairly new concept of unified communications. It
also compares Web 2.0 with Web 3.0 that is now in the conceptual stage.
Make students aware that while the new information technology infrastructure provides many
benefits and capabilities, it does require careful management and planning. Challenges posed by
networking and the Internet include loss of management control over information systems; the
need for organizational change; and the difficulty of ensuring infrastructure scalability and
reliability.
Copyright © 2017 Pearson Education, Inc.
5
Interactive Session: Organizations: The Battle over Net Neutrality
Case Study Questions
1. What is network neutrality? Why has the Internet operated under net neutrality up to
this point in time?
Network neutrality is the idea that Internet service providers must allow customers equal access
to content and applications, regardless of the source or nature of the content. Presently the
Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by
Internet backbone owners. The Internet is neutral because it was built on phone lines, which are
subject to ‘common carriage’ laws. These laws require phone companies to treat all calls and
customers equally. They cannot offer extra benefits to customers willing to pay higher premiums
for faster or clearer calls, a model known as tiered service.
2. Who’s in favor of network neutrality? Who’s opposed? Why?
Those in favor of network neutrality include organizations like MoveOn.org, the Christian
Coalition, the American Library Association, every major consumer group, many bloggers and
small businesses, and some large Internet companies like Google and Amazon. Verizon and
Google proposed a split proposition – enforce net neutrality on wired connections, but not on
wireless networks. Some members of the U.S. Congress also support network neutrality. This
group argues that the risk of censorship increases when network operators can selectively block
or slow access to certain content. Others are concerned about the effect of slower transmission
rates on their business models if users can’t download or access content in a speedy fashion.
Those who oppose network neutrality include telecommunications and cable companies who
want to be able to charge differentiated prices based on the amount of bandwidth consumed by
content being delivered over the Internet. Some companies report that five percent of their
customers use about half the capacity on local lines without paying any more than low-usage
customers. They state that metered pricing is “the fairest way” to finance necessary investments
in its network infrastructure. Internet service providers point to the upsurge in piracy of
copyrighted materials over the Internet as a reason to oppose network neutrality. Comcast
reported that illegal file sharing of copyrighted material was consuming 50 percent of its network
capacity. The company posits that if network transmission rates were slower for this type of
content, users would be less likely to download or access it. Those who oppose network
neutrality argue that it removes the incentive for network providers to innovate, provide new
capabilities, and upgrade to new technology.
3. What would be the impact on individual users, businesses, and government if Internet
providers switched to a tiered service model for transmission over landlines as well as
wireless?
Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate
without permission from the phone and cable companies or other authorities. A more level
Copyright © 2017 Pearson Education, Inc.
6
playing field spawns countless new businesses. Allowing unrestricted information flow becomes
essential to free markets and democracy as commerce and society increasingly move online.
Heavy users of network bandwidth would pay higher prices without necessarily experiencing
better service. Even those who use less bandwidth could run into the same situation.
Network owners believe regulation like the bills proposed by net neutrality advocates will
impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from
‘discriminatory’ network practices. U.S. Internet service already lags behind other nations in
overall speed, cost, and quality of service, adding credibility to the providers’ arguments.
Obviously, by increasing the cost of heavy users of network bandwidth, telecommunication and
cable companies and Internet service providers stand to increase their profit margins.
4. It has been said that net neutrality is the most important issue facing the Internet since
the advent of the Internet. Discuss the implications of this statement.
Under current conditions, the Internet is neutral; all Internet traffic is treated equally on a first-
come, first-served basis by Internet backbone owners. Proponents of net neutrality say that
changing anything would disrupt normal service for users and begin a trend of discrimination
based on the types of Internet usage.
Network owners believe regulation to enforce net neutrality will impede U.S. competitiveness by
discouraging capital expenditure for new networks and curbing their networks’ ability to cope
with the exploding demand for Internet and wireless traffic.
Internet service providers (ISPs) assert that network congestion is a serious problem and that
expanding their networks would require passing on burdensome costs to consumers. These
companies believe differential pricing methods, which include data caps and metered use—
charging based on the amount of bandwidth consumed—are the fairest way to finance necessary
investments in their network infrastructures.
5. Are you in favor of legislation enforcing network neutrality? Why or why not?
Student answers will vary. Some components and principles to consider in answering this
question include:
• Price differentials: how much more would heavy bandwidth users pay than those who
consume less bandwidth?
• Speed: how much faster would network transmissions be with a tiered service model?
• Stifle innovation: would a tiered service model stifle innovation by charging more for
heavy bandwidth use or would it free up bandwidth thus allowing more innovation?
• Censorship: would telecommunication and cable companies and Internet service
providers increase censorship of content transmitted over networks?
• Discrimination by carriers: would the end of network neutrality be the beginning of more
discrimination?
Interactive Session: People: Monitoring Employees on Networks: Unethical or Good
Business?
Copyright © 2017 Pearson Education, Inc.
7
Case Study Questions
1. Should managers monitor employee e-mail and Internet usage? Why or why not?
Student answers will vary on this question. The case study statistics show that corporate misuse
and abuse of e-mail for personal reasons is exploding. Simply stated, employees who use
company resources for work not related to the company are, in essence, engaged in “service
theft.” They are being paid to work for the company, and this does not include abusing corporate
resources for personal time. Companies are in business to generate profits for their shareholders.
Managers certainly should be concerned with the loss of time and employee productivity, the
additional traffic it creates on their networks that inhibits the efficiency for real business
purposes, lost revenue or missed opportunities, as well as overcharging clients because of lost
employee efficiencies. The company itself is responsible for the use of its resources and what
employees do while using them. Adverse publicity can seriously affect a company and could
even result in expensive lawsuits. Companies also fear e-mail leakage of trade secrets. Other
legal and regulatory problems involve the safe keeping of all e-mails that are generated on
corporate equipment. This information must be retained for specific time periods and may be
requested as evidence in a lawsuit.
2. Describe an effective e-mail and web use policy for a company.
Like all policies, an effective e-mail and web use policy must be carefully designed and clearly
communicated to all persons who use these corporate resources. There are a number of different
policies in existence. Some companies allow absolutely no personal use of corporate networks,
whereas others allow some degree of activity that is easily monitored. A good policy will detail
exactly what type of activity is acceptable and what is not allowed. The policy should clearly
articulate sanctions that will be followed for any and all offenses in relation to the policy. Most
of all, rules for Internet usage should be tailored to specific business needs and organizational
cultures.
As an instructor you might wish to show students an example of the University of South
Australia’s policy at http://www.unisa.edu.au/policies/policies/corporate/C22.asp
3. Should managers inform employees that their web behavior is being monitored? Or
should managers monitor secretly? Why or why not?
Opinions will vary according to personal values and workplace experiences. However, most
students will probably answer that managers should inform employees that their web behavior is
being monitored as a way to foster open communications and trust between both sides. Many
consultants believe companies should write corporate policies on employee e-mail and Internet
use. The policies should include explicit ground rules that state, by position or level, under what
circumstances employees can use company facilities for e-mail, blogging, or web surfing. The
policies should also inform employees whether these activities are monitored and explain why.
Section 7-4, “What are the principal technologies and standards for wireless networking,
communication, and Internet access?” Ask your students how many of them use cellular
Copyright © 2017 Pearson Education, Inc.
8
phones, smartphones, wireless laptops, tablet computers, or wireless e-book readers. Most
students are excited to demonstrate their “latest devices,” and you may wish to ask one of them
to discuss the capabilities of theirs. Ask them to discuss what they like or dislike about the
features found on their appliance.
If you have the class time, you can ask the campus IT director to discuss the telecommunications
technology used on your campus, take a tour of the campus facilities, or invite an IT director
from a local company to discuss his company’s telecommunications technology. Ask your
students to find out what their university does in order to support mobile wireless
communications. Have them investigate applications where Bluetooth, Wi-FI, or hotspot
technology is used and how it benefits them. Are they able to use their own personal appliances
to connect and utilize these technologies on their campus?
Review Questions
7-1 What are the principal components of telecommunications networks and key
networking technologies?
Describe the features of a simple network and the network infrastructure for a large
company.
A simple network consists of two or more connected computers. Basic network components
include computers, network interfaces, a connection medium, network operating system
software, and either a hub or a switch. The networking infrastructure for a large company
relies on both public and private infrastructures to support the movement of information
across diverse technological platforms. It includes the traditional telephone system, mobile
cellular communication, wireless local-area networks, videoconferencing systems, a
corporate website, intranets, extranets, and an array of local and wide-area networks,
including the Internet. This collection of networks evolved from two fundamentally different
types of networks: telephone networks and computer networks. (Learning Objective 1: What
are the principal components of telecommunications networks and key networking
technologies?, AACSB: Application of knowledge.)
Name and describe the principal technologies and trends that have shaped
contemporary telecommunications systems.
Client/server computing, the use of packet switching, and the development of widely used
communications standards such as TCP/IP are the three technologies that have shaped
contemporary telecommunications systems.
Client/server computing has extended to networking departments, workgroups, factory
floors, and other parts of the business that could not be served by a centralized architecture.
The Internet is based on client/server computing. Packet switching technology allows nearly
full use of almost all available lines and capacity. This was not possible with the traditional
dedicated circuit-switching techniques that were used in the past. TCP/IP is a suite of
protocols that has become the dominant standard of network communications. Having a set
Copyright © 2017 Pearson Education, Inc.
9
of protocols for connecting diverse hardware and software components has provided a
universally agreed upon method for data transmission. (Learning Objective 1: What are the
principal components of telecommunications networks and key networking technologies?,
AACSB: Application of knowledge.)
7-2 What are the different types of networks?
Define an analog and a digital signal.
Analog: a continuous waveform that passes through a communications medium and has been
used for voice communication. Traditionally used by telephone handsets, computer speakers,
or earphones.
Digital: a discrete, binary waveform, rather than a continuous waveform, represented by
strings of two states: one bit and zero bits, which are represented as on-off electrical pulses.
Computers use digital signals and require a modem to convert these digital signals into
analog signals that are transmitted across telephone lines, cable lines, or wireless media.
(Learning Objective 2: What are the different types of networks?, AACSB: Application of
knowledge.)
Distinguish between a LAN, MAN, and WAN.
LAN (Local Area Network): a telecommunications network that is designed to connect
personal computers and other digital devices within a half-mile or 500-meter radius. LANs
typically connect a few computers in a small office, all the computers in one building, or all
the computers in several buildings in close proximity. LANs require their own dedicated
channels.
MAN (Metropolitan Area Network): a network that spans a metropolitan area, usually a
city and its major suburbs. Its geographic scope falls between a WAN and a LAN.
WAN (Wide Area Network): spans broad geographical distances – entire regions, states,
continents, or the entire globe. The most universal and powerful WAN is the Internet.
Computers connect to a WAN through public networks, such as the telephone system or
private cable systems, or through leased lines or satellites. (Learning Objective 2: What are
the different types of networks?, AACSB: Application of knowledge.)
7-3 How do the Internet and Internet technology work and how do they support
communication and e-business?
Define the Internet, describe how it works, and explain how it provides business value.
The Internet is a vast network of computers that connects millions of people all over the
world. The Internet uses the client/server model of computing and the TCP/IP network
reference model. Every computer on the Internet is assigned a unique numeric IP address. No
one owns the Internet, and it has no formal management organization. However, worldwide
Internet policies are established by organizations and government bodies, such as the Internet
Copyright © 2017 Pearson Education, Inc.
10
Architecture Board and the World Wide Web Consortium. The Internet must also conform to
the laws of the sovereign nation-states in which it operates, as well as the technical
infrastructure that exists within the nation-state.
The Internet enables employees to gain remote access to the company’s internal systems
through its website. They are able to better service customers and suppliers, improve
operational efficiency, increase productivity, lower operational costs, have a broader market
base, and reach more individual customers on a global scale by establishing a web presence.
The cost of email and other Internet services tend to be far lower than equivalent voice,
postal, or over night delivery costs, making the Internet a very inexpensive communication
medium. It is also a very fast method of communication, with messages arriving anywhere in
the world in a matter of seconds or minutes. (Learning Objective 3: How do the Internet and
Internet technology work and how do they support communication and e-business?, AACSB:
Application of knowledge.)
Explain how the Domain Name System (DNS) and IP addressing system work.
The Internet is based on the TCP/IP networking protocol suite. Every computer on the
Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit
number represented by four strings of numbers ranging from 0 to 255 separated by periods.
A domain name is the English-like name that corresponds to the unique 32-bit numeric IP
address for each computer connected to the Internet. The Domain Name System (DNS)
converts IP addresses to domain names so that users only need to specify a domain name to
access a computer on the Internet, instead of typing the numeric IP address. DNS servers
maintain a database containing IP addresses mapped to their corresponding domain names.
When a user sends a message to another user on the Internet, the message is first decomposed
into packets using the TCP protocol. Each packet contains its destination address. The
packets are then sent from the client to the network server and from there on to as many other
servers as necessary to arrive at a specific computer with a known address. At the destination
address, the packets are reassembled into the original message. (Learning Objective 3: How
do the Internet and Internet technology work and how do they support communication and e-
business?, AACSB: Analytical thinking.)
List and describe the principal Internet services.
Table 7-2 lists and describes the major Internet services:
• Email—person-to-person messaging; document sharing.
• Newsgroups—discussion groups on electronic bulletin boards.
• Chatting and instant messaging—interactive conversations.
• Telnet—logging on to one computer system and doing work on another.
• File Transfer Protocol (FTP)—transferring files from computer to computer.
• World Wide Web—retrieving, formatting, and displaying information (including text,
audio, graphics, and video) using hypertext links.
Visit https://testbankbell.com
now to explore a rich
collection of testbank,
solution manual and enjoy
exciting offers!
Copyright © 2017 Pearson Education, Inc.
11
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
Define and describe VoIP and virtual private networks and explain how they provide
value to businesses.
• Voice over Internet Protocol (VoIP) enables Internet technology to be used for
telephone voice transmission over the Internet or private networks. VoIP offers the
advantage of avoiding tolls charged by local and long-distance telephone networks.
VoIP provides businesses an opportunity to reduce costs because they no longer have
to maintain separate networks or provide support services and personnel for each
different type of network. It gives organizations flexibility because phones can be
added or moved to different offices without rewiring or reconfiguring networks.
• Virtual private networks are secure, encrypted, private networks that have been
configured within a public network to take advantage of the economies of scale and
management facilities of large networks, such as the Internet. VPNs are low-cost
alternatives to private WANs. VPNs give businesses a more efficient network
infrastructure for combining voice and data networks.
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
List and describe alternative ways of locating information on the web.
• Search engines are a facility on the web that helps you find sites with the information
and/or services you want. Examples: Google, Yahoo!, and MSN.
• Intelligent agent shopping bots use intelligent agent software for searching the
Internet for shopping information. Examples: MySimon and Froogle.
• Blogs are informal yet structured websites where subscribing individuals can publish
stories, opinions, and links to other websites of interest.
• Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to
have content they want pulled from websites and fed automatically to their
computers, where it can be stored for later viewing. It’s commonly used with blogs.
• Wikis are collaborative websites where visitors can add, delete, or modify content on
the site, including the work of previous authors.
• Web 2.0 provides second-generation interactive Internet-based services that enable
people to collaborate, share information, and create new services online. Web 2.0
software applications run on the web itself instead of the desktop and bring the vision
of web-based computing closer to realization.
• Web 3.0 (Semantic Web) reduces the amount of human involvement in searching for
and processing web information. It’s still in its infancy but promises to establish
specific meanings for data on the web, categories for classifying the data, and
relationships between classification categories.
Copyright © 2017 Pearson Education, Inc.
12
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
Describe how online search technologies are used for marketing.
Search engine marketing monetizes the value of the search process. Searching is one of the
web’s most popular activities with billions of queries performed each month. Search engines
are the foundation for the most lucrative form of online marketing and advertising. When
users enter a search term in a search engine, they receive two types of listings: sponsored
links, for which advertisers have paid to be listed, and unsponsored organic search results.
Advertisers can also purchase small text boxes on the side of search results pages. Paid,
sponsored advertisements are the fastest growing form of Internet advertising and are
powerful new marketing tools that precisely match consumer interests with advertising
messages at the right moment. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, AACSB:
Application of knowledge.)
7-4 What are the principal technologies and standards for wireless networking,
communications, and Internet access?
Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks.
Standards for wireless computer networks include Bluetooth (802.15) for small personal-area
networks (PANs), Wi-Fi (802.11) for local-area networks (LANs), and WiMax (802.16) for
metropolitan-area networks (MANs). Bluetooth can link up to eight devices within a 10-
meter area using low-power, radio-based communication and can transmit up to 722 Kbps in
the 2.4 GHz band. Wireless phones, keyboards, computers, printers, and PDAs using
Bluetooth can communicate with each other and even operate each other without direct user
intervention.
Wi-Fi is useful for creating wireless LANs and for providing wireless Internet access. Its
access range is limited to anywhere between 300 feet and three miles. Hotspots are public
access points individuals use to obtain high speed Internet access.
WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75
Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and
cable lines. The 802.16 specification also has robust security and quality-of-service features
to support voice and video.
3G is a short term for third-generation wireless technology, especially mobile
communications. Cellular networks have evolved from slow-speed (1G) analog networks to
high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with
speeds ranging from 144 Kbps to more than 2 Mbps for data transmission.
4G is a short term for fourth-generation wireless technology. It is entirely packet-switched
and capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal
Copyright © 2017 Pearson Education, Inc.
13
conditions), with premium quality and high security. Voice, data, and high-quality streaming
video are available to users anywhere, anytime. (Learning Objective 4: What are the
principal technologies and standards for wireless networking, communications, and Internet
access?, AACSB: Application of knowledge.)
Describe the capabilities of each and for which types of applications each is best suited.
• Bluetooth: Access very limited; useful for creating small personal-area networks.
• Wi-Fi: Access is limited to 30–50 meters; useful for creating small local area
networks.
• WiMax: Access is limited to a range up to 31 miles: useful for creating wide area
networks.
• 3G networks: Access is available on major cellular telephone carriers that have
configured their networks for 3G services.
• 4G networks: Provides premium quality for voice, data, and streaming video from
cellular telephone carriers.
(Learning Objective 4: What are the principal technologies and standards for wireless
networking, communications, and Internet access?, AACSB: Application of knowledge.)
Define RFID, explain how it works, and describe how it provides value to businesses.
Mobile wireless technology facilitates supply chain management by capturing data on the
movement of goods as these events take place and by providing detailed, immediate
information as goods move among supply chain partners. Radio frequency identification
(RFID) systems provide a microchip that contains data about an item and its location. The
tags transmit radio signals over a short distance to special RFID readers. The RFID readers
then pass the data over a network to a computer for processing.
RFID gives businesses an opportunity to further automate their supply chain networks. The
technology allows more data on an RFID chip than typical barcodes. RFID systems track
each pallet, lot, or unit item in a shipment. The technology helps companies improve
receiving and storage operations by improving their ability to “see” exactly what stock is
stored in warehouses or on retail store shelves. (Learning Objective 4: What are the principal
technologies and standards for wireless networking, communications, and Internet access?,
AACSB: Application of knowledge.)
Define WSNs, explain how they work, and describe the kinds of applications that use
them.
Wireless sensor networks (WSNs) are networks of interconnected wireless devices with
some processing and radio-transmitting capability that are embedded into the physical
environment to provide measurements of many points over large spaces.
Wireless sensor networks are valuable for monitoring environmental changes, traffic
patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
Copyright © 2017 Pearson Education, Inc.
14
in the field for years without any maintenance or human intervention. That reduces costs to
businesses using them. (Learning Objective 4: What are the principal technologies and
standards for wireless networking, communications, and Internet access?, AACSB:
Application of knowledge.)
Discussion Questions
7-5 It has been said that within the next few years, smartphones will become the single most
important digital device we own. Discuss the implications of this statement.
Student answers to this question will vary.
7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why
not?
Student answers to this question will vary.
7-7 What are some of the issues to consider in determining whether the Internet would
provide your business with a competitive advantage?
Student answers to this question will vary.
Hands-On MIS Projects
Management Decision Problems
7-8 Floor tile company: Asked by major retailing customers to begin using RFID to improve
management of products. Use the web to identify the cost of hardware, software, and
networking components for an RFID system for your company. What factors should be
considered? What are the key decisions that have to be made in determining whether your
firm should adopt this technology?
(The following information was copied from www.zebra.com, Nov 2010)
What is the estimated incremental cost for adopting RFID?
If one is discussing incremental costs over and above what was invested in your bar code
infrastructure, then you can say that you will be making an investment in tags,
printer/encoders, readers, middleware, and professional services to integrate these
components into your bar code legacy environment. If you are not working with bar codes
already, obviously you will need to make an investment in back-office, manufacturing, or
WMS systems to use RFID data.
What is a ballpark figure for implementing RFID in a warehouse and distribution process?
According to Forrester Research, a typical supplier that attempts to comply with a mandate
Copyright © 2017 Pearson Education, Inc.
15
can expect to spend as much as $9 million on RFID—depending on the size of its
distribution network and Walmart volume. According to this research, the largest
expenditures are tag costs and additional warehouse labor. Again, it is stressed that this
figure is derived from studying one company seeking compliance with the Walmart mandate.
However, this study provides a good perspective on the areas from which costs will derive.
How do smart label costs compare to conventional thermal/thermal-transfer printed labels?
A smart label runs in the vicinity of about $0.50 per label vs. about $0.01 for a conventional
label. This is mainly due to the addition of the tag. This cost is also variable based on the
total volume printed and the economies of scale associated with large quantities.
What companies are currently developing RFID software? Is it all customized or are there
off-the-shelf solutions?
Numerous start-up and established software providers—including those who provide ERP
software—have developed applications to deal with RFID reader and printer/encoder
management, plus “tag data capture event” management. As with most business applications
software, packages are typically customized to meet customers’ requirements rather than
being ready to go “off the shelf.”
How will RFID integrate with EDI software?
EDI messages contain data about business transactions. While the format of an EDI message
may change to accommodate “new data” (such as an EPC by comparison with a GTIN),
fundamentally EDI message processors are unaware of the source of the data contained in
messages. So there should be no reason that RFID cannot integrate with EDI software,
provided the data structures are fundamentally the same. However, one area of difference is
that many EDI systems typically deliver data in periodic batch mode; in contrast, the strength
of RFID is its ability to deliver real-time data, so systems are up-to-the-minute.
Key decisions that a company needs to make when considering adopting RFID include:
• Hardware and software costs
• Implementation costs
• Return on investments
• How technology fits into overall business strategy
(Learning Objective 4: What are the principal technologies and standards for wireless
networking, communications, and Internet access?, AACSB: Analytical thinking,
Application of knowledge.)
7-9 BestMed Medical Supplies Corporation: Sells products and equipment from over 700
different manufacturers to hospitals, health clinics, and medical offices. The company
employs 500 people at seven different locations. Management is considering adopting a
unified communications system. What factors should be considered? What are the key
Other documents randomly have
different content
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
The Project Gutenberg eBook of Flagg's The
Far West, 1836-1837, part 2; and De Smet's
Letters and Sketches, 1841-1842
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Title: Flagg's The Far West, 1836-1837, part 2; and De Smet's
Letters and Sketches, 1841-1842
Author: Edmund Flagg
Pierre-Jean de Smet
Editor: Reuben Gold Thwaites
Release date: February 13, 2013 [eBook #42090]
Most recently updated: October 23, 2024
Language: English
Credits: Produced by Douglas L. Alley, III, Greg Bergquist and the
Online Distributed Proofreading Team at
http://www.pgdp.net
(This file was produced from images generously made
available by The Internet Archive/American Libraries.)
*** START OF THE PROJECT GUTENBERG EBOOK FLAGG'S THE FAR
WEST, 1836-1837, PART 2; AND DE SMET'S LETTERS AND
SKETCHES, 1841-1842 ***
Early Western Travels
1748-1846
Volume XXVII
A View of the Rocky Mountains
Early Western Travels
1748-1846
A Series of Annotated Reprints of some of the best and
rarest contemporary volumes of travel, descriptive of the
Aborigines and Social and Economic Conditions in the Middle
and Far West, during the Period of Early American
Settlement
Edited with Notes, Introductions, Index, etc., by
Reuben Gold Thwaites, LL.D.
Editor of "The Jesuit Relations and Allied Documents," "Original Journals of the Lewis and Clark
Expedition," "Hennepin's New Discovery," etc.
Volume XXVII
Part II of Flagg's The Far West, 1836-1837; and De Smet's Letters and
Sketches, 1841-1842
Cleveland, Ohio
The Arthur H. Clark Company
1906
Copyright 1906, by
THE ARTHUR H. CLARK COMPANY
ALL RIGHTS RESERVED
The Lakeside Press
R. R. DONNELLEY & SONS COMPANY
CHICAGO
Essentials of MIS 12th Edition Laudon Solutions Manual
CONTENTS OF VOLUME XXVII
I
The Far West; or, A Tour beyond the Mountains.
Embracing Outlines of Western Life and Scenery;
Sketches of the Prairies, Rivers, Ancient Mounds,
Early Settlements of the French, etc., etc.
(Chapters xxxiii-xli of Vol. II, completing the
publication). Edmund Flagg
Author's Table of Contents 15
Text 19
II
Letters and Sketches: with a Narrative of a Year's
Residence among the Indian Tribes of the Rocky
Mountains. Pierre Jean de Smet, S. J.
Author's Preface 129
Text:
BOOK I: Letters I-XII, February
4-December 30, 1841 133
BOOK II: Narrative of a Year's
Residence among the Indian
Tribes of the Rocky
Mountains (comprised in
Letters XIII-XVI, August 15-
November 1, 1842) 321
Explanation of the Indian
Symbolical Catechism 405
ILLUSTRATIONS TO VOLUME XXVII
"A View of the Rocky Mountains." From De
Smet's Letters and Sketches Frontispiece
Allegorical sketch 126
Facsimile of title-page, De Smet's Letters
and Sketches 127
"Worship in the Desert" 139
"Kanza Village" 195
"Interior of a Kanza Lodge" 203
"Chimney" 217
"Devil's Gate" 239
"Soda Springs" 245
"Fording the River Platte" 271
"Sheyenne Warriors" 275
"Indian Mode of Travelling" 325
"Apparition" 345
"Indian Symbolical Catechism"—folding
plate 403
Part II of Flagg's The Far West, 1836-1837
Reprint of chapters xxxiii-xli of Volume II of original edition: New
York, 1838
CONTENTS
XXXIII
Blackness of Darkness—Fall of a Forest-tree—A
sublime Incident—Musings—A Moral—A Wolf—
A Meal—A Mistake—A broiling Sun—The
"Heights of Chester"—A noble View—An Island
—A "Bend"—A Steamer—Chester—Site and
Anticipations—A romantic Pathway—The
Sycamores—The Undergrowth—The Bluffs—
Forest Quietude—The wild-grape Vines—Size,
Tortuosity, and Tenacity—A Juliet-bower—A
Prediction—Kaskaskia Bottom—An elegant
Farm and Mansion—The Outhouses—The
Harvest-fields and Grounds—The Bluffs—The
Village 19
XXXIV
Antiqueness—A Proposition and Corollary—"All is
New"—Freshness of Natural Scenery—The
immigrant Inhabitants—An Exception—A
serious Duty—A laudable Resolution—A gay
Bevy—A Hawser-ferry—A Scene on the
Kaskaskia—"Old Kaskaskia"—Structure of
Dwellings—Aspect of Antiquity—A Contrast
—"City of the Pilgrims"—The Scenes of a
Century—Lane-like Streets—Old Customs
—"The Parallel ceases"—The same Fact with
the Spaniards—The Cause—The French
Villagers—The Inn-gallery—A civil Landlord—
26
The Table d'Hôte—A Moonlight Ramble—The
old Church—The Courthouse—The fresh Laugh
—The Piano—The Brunettes
XXXV
The Explorers of the West—The French Jesuits—
Cause of the Undertaking—The Tale of the
Hunters—Marquette and Joliet viii—Their
Exploration—The Natives—The Illini—A Village
—Manito of the Missouri—The Illinois—Amazed
Delight—Joliet's Narrative—Marquette—Name
to the River—Joliet's Reward—Lapse of Years—
M. Robert, Cavalier de la Salle—His Talent,
Ambition, and Enterprise—Visit to Canada—
Success at Paris—Tonti and Hennepin—
Exploration—The Illinois—An Indian Village—
The Hoard of Corn—Peoria Lake—Treatment by
the Natives—Loss of the Supply-boat—Fort
"Creve Cœur"—Its Site—"Spring Bay"—The
Indian War—Danger of La Salle—The Mutiny—
The Poison—Exploration of the Mississippi—
The Falls—Captivity—Hennepin's Travels—
Character of these early Writers—"Fort St.
Louis"—Second Expedition of La Salle—The
Osage—A Village of Natives—The Oubachi—
Fort Prudhomme—Formal Possession—
Louisiana—Ceremonies at the Gulf—River "St.
Louis"—Villages founded—Fate of La Salle—
Retributive Justice—Fate of Marquette—
Decease and Burial—Canadian Colonies—Their
Design—Mining Expeditions—M. de Seur—
Disappointment—Couriers du bois—Petits
Paysans—Merry Mortals—Origin of Kaskaskia—
Name—Depôt of Fur-trade—De Soto and the
Tradition—His Death and Burial—Original
34
Extent of Kaskaskia—The "Common Field"—
The Grant—Policy of French and Spanish
Governments—"Common Fields" and
"Commons"—Regulations—Congress-grants—
Harmony with the Savages—The Cause—
Exaggeration—Early Peace and Prosperity—
Jesuit College—Law's Scheme—The Design—
Les Illinois—The Failure—The "South Sea
Bubble"—Prosperity of Kaskaskia—Luxuriance
of Agriculture—A chimerical Design—Cession
and Recession—An unwelcome Change—
Removal and the Causes
XXXVI
Portraiture of Character—The Difficulty—The French
Villager of the Mississippi—His ordinary
Deportment—Hospitality—Laws and Courts—
Scholastic Proficiency—Affairs of the Nation
—"A Burden!"—Their Virtues—The Helpmate—
Religious Faith—Festivals—Their Property—The
Change—Their Avocations—Their Idiom—A
Contrast—The Peculiarities—Costume—
Amusements—Slaves—Early Government—An
unwelcome Change—"Improvement!"—A
hateful ix Term—The Steam-engine—The old
Edifices—The Streets—Advantages of the
Change—The Contrast—The poorer Class—
Evils of the Change—Superior Enterprise 52
XXXVII
Delay on an interesting Subject—Peculiarities of
French and Spanish Villages similar—Social
Intercourse—Old Legends—Dreamy Seclusion
—Commercial Advantages of Kaskaskia—The
59
Trade—The River—The Land-office—Population
—Fort Gage—Clarke's Expedition—The Catholic
Church—Erection—Its Exterior—The Interior—
The Altar-lamp—Structure of the Roof—
Surprise of the Villagers—Interdict on the
Architect—The Belfry—The Bell—View from the
Tower—The Churchyard—The first Record—Old
Chronicles—The Nunnery—The Seminary—
Departure from Kaskaskia—Farms of the
French—A Reminiscence—"Indian Old Point"—
Extermination of the Norridgewocks—Details—
The Obelisk to Father Rasle—Route to Prairie
du Rocher—Aubuchon—Profusion of wild Fruit
—Nuts—Grapes—A Wine Story—Mode of
Manufacture—The Cliffs of Prairie du Rocher
—"Common Field"—Productions—The Bayou—
A Scene of Blood—A Century Slumber—
Peculiarities—View from the Cliffs—
Petrifactions—Simplicity and Ignorance—
Characteristics of the French Villager—The
Catholic Church—Unhealthy Site—Cause of a
Phenomenon
XXXVIII
The Western Valley—Early Conception of its Extent
inadequate—The French Cordon of Fortification
—Origin of the Policy—Stations of Posts
erected—Fort Chartres—Groves of wild Fruit—
The Dark-browed Villager—His direction to the
Ruins—Desertion and Dreariness of the Spot—
Solemn Effect of the old Pile in the Forest—
Coup d'œil—The Mississippi Slough—Erection
of Fort Chartres—The Design—Expense—
Material—Rebuilding—Village Cession,
Recession, and the Results—Seat of Power—
73
Form and Extent—Preservation of the Masonry
—French Engineering—Original Structure of
the Fortress—The Pride of its Prime—Its
Scenes—The "Golden Age"—The "old
Residenters"—The Pomp of War—A Shelter for
the Night
x XXXIX
Fort Chartres—A romantic Scene—Legendary Lore
—Erection of Fort Chartres—Enormous
Expenditure—Needless Strength—The
Engineer—His Fate—The "Buried Treasure"—
The Money-diggers—Their Success—The
"Western Hannibal"—Expedition against
Vincennes—Capture of the French Villages—
Siege of Fort Chartres—A successful Ruse du
Guerre—A Scrap of History—The Capture of
Fort Vincent—The Stratagem—Fort Du Quesne
—Erection and History—Useless Strength—A
Morning Scene—Philippe Francis Renault—His
Mining Operations—The Village St. Philippe—
The Cottonwood Forest—The Mississippi!—A
Mistake—A weary Plod—An Atmosphere of
Pestilence—Causes of Disease—Salubrious Site
for a Cabin—Precautions for the Emigrant—
Diseases of the West—Fevers—Sickly Months
—"Milk Sickness"—Its Cause and Effects—
Fever and Ague—An Escape—A sick Family—
The Consumptive—Refreshment—An early
Settler 85
XL
The "Squatter"—His Character and Person—A View
from the Bluffs—The ancient Indian Village—
97
Reliques—The Squatter's Reflections—His
Wanderings—A Discovery—The Grave of a
Chief—The Ancient Burial-grounds—Human
Remains—A Coffin of Stone—The "Pigmy
Race"—An Investigation—Ancient Pottery—The
Turtle—The Sink-holes—Waterloo—Its Windmill
and Courthouse—Bellefontaine—An evening
Ride—"Hail Columbia!"—An immortal Name—A
very poor Pun—A miserable Night—A pleasant
Dawn—The American Bottom—Its Name—
Extent—Boundaries—Bluffs—Lakes, their
Cause and Consequence—Disease an Obstacle
to Settlement—The Remedy—The Grand
Marais—The Soil—Its Fertility—The appropriate
Production
XLI
The American Bottom—Its alluvial Character—An
interesting Query—The Ancient Lake—The
Southern Limit—The Parapet of Stone—Alluvial
Action on the Cliffs—A similar Expansion—The
Eastern Limit and the Western—The "Mamelle
xi Prairie"—Elevation of Country North—Cause
of the Draining—The Rocks at "Grand Tower"—
Abrasion of Waters—Volcanic Action—A Tide-
spring—The "Blockhouse"—Geology of the
Region—Volcanic Convulsions—Impress of
Omnipotence—Reflections suggested—
Ignorance and Indifference on the Subject—
Remarks of Dr. Buckland and Cuvier—A very
ancient Revolution—Huge Remains—Theory of
Cuvier—Productions of the American Bottom—
The Farms—Prairie-flowers—Mounds—Prairie
du Pont—Refreshment—A novel Churn—A
disagreeable Village—Cahokia—The Indian
108
Tribe—The Settlement—The Mississippi—The
Creek—Harmonious Intercourse—A Contrast—
Early Inhabitants of Cahokia—Peculiarities of
the Village—The "Common Field"—Grant of
Congress—Cahokia at the present Time—
Route to St. Louis—Sunset on the Water—View
of the City—Moonlight—Arrival at St. Louis—A
Farewell!
THE FAR WEST
[PART II]
XXXIII[1]
"Stranger, if thou hast learn'd a truth which needs
Experience more than reason, that the world
Is full of guilt and misery, and hast known
Enough of all its sorrows, crimes, and cares
To tire thee of it; enter this wild wood,
And view the haunts of Nature."
Bryant.
The moon had gone down; the last star had burned out in the
firmament; and that deep darkness which precedes the dawn was
brooding over the earth as the traveller turned away from the little
inn at the village of Pinkneyville. Fortunately he had, the previous
evening, while surveying the face of the region from the door of the
hostelrie, gained some general idea of the route to 127 Kaskaskia;
and now, dropping the reins upon his horse's neck, he began
floundering along through a blackness of darkness perfectly
Cimmerian. It was, indeed, a gloomy night. The early mists were
rising, damp and chill, from the soil saturated with the showers of
the preceding day; and the darkness had become of a density
almost palpable to the sense. Crossing a narrow arm of the prairie in
the direction presumed to be correct, my horse carried me into a
dense wood, and, if possible, the darkness increased. I had
penetrated some miles into the heart of the forest, and was
advancing slowly upon my way, when my attention was suddenly
arrested by a low, whispering, rustling sound in the depths of the
wood at my right; this gradually increasing, was almost immediately
succeeded by a crashing, thundering, rushing report, till every echo
far and wide in that dark old wood was wakened, and the whole
forest for miles around resounded with the roar. My horse, terrified
at the noise, leaped and plunged like a mad creature. An enormous
forest-tree had fallen within a dozen rods of the spot on which I
stood. As I left the noble ruin and resumed my lonely way, my mind
brooded over the event, and I thought I could perceive in the
occurrence a powerful feature of the sublime. The fall of an aged
tree in the noiseless lapse of time is ever an event not unworthy of
notice; but, at a moment like this, it was surely so in an eminent
degree. Ages since—long ere the first white man had pressed the
soil of this Western world, and while the untamed denizens of the
wilderness 128 roamed in the freedom of primitive creation—ages
since had seen the germe of that mighty tree lifting up its young,
green leaf from the sod, beneath the genial warmth of the sunlight
and the summer wind. An age passed away. The tender stem had
reared itself into a gigantic pillar, and proudly tossed its green head
amid the upper skies: that young leaf, expanded and developed, had
spread itself abroad, until, at length, the beasts of the earth had
sought out its shade, and the tree stood up the monarch of the
forest. Another age is gone, and the hoary moss of time is flaunting
to the winds from its venerable branches. Long ago the thunderbolt
had consecrated its lofty top with the baptismal of fire, and, sere
and rifted, the storm-cloud now sings through its naked limbs. Like
an aged man, its head is bleached with years, while the strength and
verdure of ripened maturity yet girdle its trunk. But the worm is at
the root: rottenness at the heart is doing its work. Its day and its
hour are appointed, and their bounds it may not pass. That hour,
that moment is come! and in the deep, pulseless stillness of the
night-time, when slumber falleth upon man and Nature pauses in
her working, the offspring of centuries is laid low, and bows himself
along the earth. Yet another age is gone; but the traveller comes not
to muse over the relics of the once-glorious ruin. Long ago has each
been mouldering away, and their dust has mingled with the common
mother of us all. Ah! there is a moral in the falling of an aged tree!
129 I was dwelling with rather melancholy reflections upon this
casual occurrence, when a quick panting close at my side attracted
my attention; a large, gaunt-looking prairie-wolf had just turned on
his heel and was trotting off into the shade. The gray dawn had now
begun to flicker along the sky, and, crossing a beautiful prairie and
grove, I found myself at the pleasant farmhouse of a settler of some
twenty or thirty years' standing; and dismounting, after a ride of
eighteen miles, I partook, with little reluctance or ceremony, of an
early breakfast. Thus much for the night adventures of a traveller in
the woods and wilds of Illinois! My host, the old gentleman to whom
I have referred, very sagely mistook his guest for a physician, owing
to a peculiarly convenient structure of those indispensables ycleped
saddle-bags; and was just about consulting his fancied man of
medicines respecting the ailings of his "woman," who was reclining
on a bed, when, to his admiration, he was undeceived.
Passing through an inconsiderable village on the north side of the
Little Vermillion called Georgetown, my route lay through an
extended range of hills and barrens.[2] Among the former were
some most intolerably tedious, especially to a horseman beneath a
broiling sun, who had passed a sleepless night: but the sweep of
scenery from their summits was beautiful and extensive. At length
the traveller stood upon the "heights of Chester," and the broad
Mississippi was rolling on its turbid floods a hundred yards beneath.
The view is here a noble 130 one, not unlike that from the Alton or
Grafton bluffs at the other extremity of the "American Bottom,"
though less extensive. Directly at the feet of the spectator, scattered
along a low, narrow interval, lies the village of Chester. Upon the
opposite bank the forest rolls away to the horizon in unbroken
magnificence, excepting that here and there along the bottom the
hand of cultivation is betrayed by the dark luxuriance of waving
maize-fields. A beautiful island, with lofty trees and green smiling
meadows, stretches itself along in the middle of the stream before
the town, adding not a little to the picturesqueness of the scene,
and, in all probability, destined to add something more to the future
importance of the place. To the right, at a short distance, come in
the soft-flowing waters of the Kaskaskia through deeply-wooded
banks; and nearly in the same direction winds away the mirror-
surface of the Mississippi for twenty miles, to accomplish a direct
passage of but four, an occurrence by no means unusual in its
course. As I stood gazing upon the scene, a steamer appeared
sweeping around the bend, and, puffing lazily along with the current
past the town, soon disappeared in the distance. From the heights
an exceedingly precipitous pathway leads down to the village.
Chester is one of the new places of Illinois, and, of course, can boast
but little to interest the stranger apart from the highly scenic beauty
of its situation.[3] It has been mostly erected within the few years
past; and, for its extent, is a flourishing business place. Its landing is
excellent, location healthy, 131 adjacent region fertile, and, for aught
I know to the contrary, may, in course of years, rival even the far-
famed Alton. Its landing, I was informed, is the only one for many
miles upon the river, above or below, suitable for a place of
extensive commerce.
From Chester, in a direction not far from north, a narrow pathway
winds along beneath the bluffs, among the tall cane-brakes of the
bottom. Leaving the Mississippi at the mouth of the Kaskaskia, it
runs along the low banks of the latter stream, and begins to assume
an aspect truly delightful. Upon either side rise the shafts of
enormous sycamores to the altitude of an hundred feet, and then,
flinging abroad and interlacing their long branches, form a living arch
of exquisite beauty, stretching away in unbroken luxuriance for
miles. Beneath springs from the rich loam a dense undergrowth of
canes; a profusion of wild vines and bushes clustering with fruit
serving effectually to exclude the sunbeams, except a few checkered
spots here and there playing upon the foliage, while at intervals
through the dark verdure is caught the flashing sheen of the moving
waters. Upon the right, at the distance of only a few yards, go up
the bluffs to the sheer height of some hundred feet, densely clothed
with woods. The path, though exceedingly narrow and serpentine, is
for the most part a hard-trodden, smooth, and excellent one when
dry. The coolness and fragrance of these deep, old, shadowy
woodlands has always for me a resistless charm. There is so much
of quiet seclusion from the feverish turmoil of ordinary life within 132
their peaceful avenues, that, to one not wedded to the world, they
are ever inexpressibly grateful.
"The calm shade
Shall bring a kindred calm, and the sweet breeze,
That makes the green leaves dance, shall waft a balm
To thy sick heart. Thou wilt find nothing here
Of all that pain'd thee in the haunts of men,
And made thee loathe thy life."
In the wild, fierce glaring of a summer noontide, when amid "the
haunts of men" all is parched up, and dusty, and scathed, how
refreshingly cool are the still depths of the forest! The clear crystal
streamlet gushes forth with perennial laughter from the rock,
seeming to exult in its happy existence; the bright enamelled mosses
of a century creep along the gnarled old roots, and life in all its fairy
forms trips forth to greet the eremite heart and charm it from the
world. But there was one feature of the scene through which I was
passing that struck me as peculiarly imposing, and to which I have
not yet referred. I allude to the enormous, almost preternatural
magnitude of the wild-grape vine, and its tortuosity. I have more
than once, in the course of my wanderings, remarked the
peculiarities of these vast parasites; but such is the unrivalled
fertility, and the depth of soil of the Kaskaskia bottom, that
vegetation of every kind there attains a size and proportion
elsewhere almost unknown. Six or seven of these vast vegetable
serpents are usually beheld leaping forth with a broad whirl from the
mould at the root of a tree, and then, writhing, and twining, and
twisting 133 among themselves into all imaginable forms, at length
away they start, all at once and together, in different directions for
the summit, around which they immediately clasp their bodies, one
over the other, and swing depending in festoons on every side.
Some of these vines, when old and dried up by the elements, are
amazingly strong; more so, perhaps, than a hempen hawser of the
same diameter.
Having but a short ride before me the evening I left Chester, I
alighted from my horse, and leisurely strolled along through this
beautiful bower I have been attempting to describe. What a
charming spot, thought I, for a Romeo and Juliet!—pardon my
roving fancy, sober reader—but really, with all my own sobriety, I
could not but imagine this a delightful scene for a "Meet me by
moonlight alone," or any other improper thing of the kind, whether
or not a trip to Gretna Green subsequently ensued. And if, in coming
years, when the little city of Chester shall have become all that it
now seems to promise, and the venerable Kaskaskia, having cast her
slough, having rejuvenated her withered energies, and recalled the
days of her pristine traditionary glory; if then, I say, the young men
and maidens make not this the consecrated spot of the long
summer-evening ramble and the trysting-place of the heart, reader,
believe us not; in the dignified parlance of the corps editorial,
believe us not.
Some portions of the Kaskaskia bottom have formerly, at different
times, been cleared and cultivated; but nothing now remains but the
ruins of 134 tenements to acquaint one with the circumstance. The
spot must have been exceedingly unhealthy in its wild state. There
is, however, one beautiful and extensive farm under high cultivation
nearly opposite Kaskaskia, which no traveller can fail to observe and
admire. It is the residence of Colonel M——, a French gentleman of
wealth, who has done everything a cultivated taste could dictate to
render it a delightful spot.[4] A fine, airy farmhouse stands beneath
the bluffs, built after the French style, with heavy roof, broad
balconies, and with a rare luxury in this region—green Venetian
blinds. The outhouses, most of them substantially constructed of
stone, are surpassed in beauty and extent only by the residence
itself. Fields yellow with golden harvest, orchards loaded with fruit,
and groves, and parks, and pastures sprinkled with grazing cattle,
spread out themselves on every side. In the back-ground rise the
wooded bluffs, gracefully rounded to their summits, while in front
roams the gentle Kaskaskia, beyond which, peacefully reposing in
the sunlight, lay the place of my destination.
Kaskaskia, Ill.
Essentials of MIS 12th Edition Laudon Solutions Manual
XXXIV
"Protected by the divinity they adored, supported by the earth
which they cultivated, and at peace with themselves, they
enjoyed the sweets of life without dreading or desiring
dissolution."—Numa Pompilius.
"A pleasing land of drowsy head it was,
Of dreams that wave before the half-shut eye."
Castle of Indolence.
In a country like our own, where everything is fresh and recent, and
where nothing has yet been swept by the mellowing touch of
departed time, any object which can lay but the most indifferent
claim to antiquity fails not to be hailed with delighted attention. "You
have," say they of the other hemisphere, "no ivy-mantled towers; no
moss-grown, castellated ruins; no donjon-keeps rearing in dark
sublimity their massive walls and age-bleached battlements; nothing
to span the mighty chasm of bygone years, and to lead down the
fancy into the shadowy realms of the past; and, therefore, your
country is steril in moral interest." Now, though this corollary is
undoubtedly false, I yet believe the proposition in the main to be
true: especially is this the case with regard to that region which lies
west of the Alleghany range. Little as there may be in the elder
sections of our Atlantic states to demand veneration for the past, no
sooner does the traveller find himself gliding along the silvery wave
136 of the "beautiful river," than at the same moment he finds
himself forsaking all that the fairy creations of genius have ever
consecrated, or the roll of the historian chronicled for coming time.
All is NEW. The very soil on which he treads, fertile beyond
comparison, and festering beneath the undisturbed vegetation of
centuries; the rolling forests, bright, luxuriant, gorgeous as on the
dawn of creation; the endless streams pouring onward in their fresh
magnificence to the ocean, all seem new. The inhabitants are
emigrants late from other lands, and every operation of human skill
on which the eye may rest betrays a recent origin. There is but a
single exception to these remarks—those mysterious monuments of
a race whom we know not of!
In consideration, therefore, of the circumstance that antiquities in
this blessed land of ours are, indeed, very few and far between, I
deem it the serious duty of every traveller, be he virtuoso or be he
not, whenever once so happy as to lay his grasp upon an antique "in
any form, in any shape," just to hold fast to the best of his ability!
Such, reader, be it known, was my own praiseworthy determination
when drawing nigh to the eastern shore of the stream opposite the
ancient French village Kaskaskia. The sun was going down, and as I
approached the sandy edge of the sea-green water, a gay bevy of
young folks were whirling the long, narrow, skiff-like ferry-boat like a
bird across the stream, by means of a hawser to which it was
attached, and which extended from shore to shore. In my own turn I
stepped into the boat, and in a few moments the old French 137
negro had forced it half across the river, at this spot about three or
four hundred yards in width. For one who has ever visited Kaskaskia
in the last beautiful days of summer, a pen like my own need hardly
be employed to delineate the loveliness of the scene which now
opened upon the view. For miles the gleamy surface of the gentle
Kaskaskia might be seen retreating from the eye, till lost at length in
its windings through the forests of its banks, resting their deep
shadows on the stream in all the calm magnificence of inanimate
nature. The shore I was leaving swelled gracefully up from the
water's edge, clothed in forests until it reached the bluffs, which
towered abrupt and loftily; while here and there along the landscape
the low roof of a log cabin could be caught peeping forth from the
dark shrubbery. The bank of the stream I was approaching
presented an aspect entirely the reverse; less lovely, but more
picturesque. A low sandy beach stretched itself more than a mile
along the river, destitute of trees, and rounding itself gently away
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
testbankfan.com

More Related Content

PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
PDF
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual
Essentials of MIS 12th Edition Laudon Solutions Manual

Similar to Essentials of MIS 12th Edition Laudon Solutions Manual (20)

PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems 12th Edition Laudon Solutions Manual
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
PDF
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems 12th Edition Laudon Solutions Manual
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Management Information Systems Managing the Digital Firm 14th Edition Laudon ...
Ad

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Trump Administration's workforce development strategy
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
advance database management system book.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
1_English_Language_Set_2.pdf probationary
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Classroom Observation Tools for Teachers
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
What if we spent less time fighting change, and more time building what’s rig...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Trump Administration's workforce development strategy
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
advance database management system book.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Unit 4 Skeletal System.ppt.pptxopresentatiom
1_English_Language_Set_2.pdf probationary
Hazard Identification & Risk Assessment .pdf
Indian roads congress 037 - 2012 Flexible pavement
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Digestion and Absorption of Carbohydrates, Proteina and Fats
Final Presentation General Medicine 03-08-2024.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Classroom Observation Tools for Teachers
Ad

Essentials of MIS 12th Edition Laudon Solutions Manual

  • 1. Essentials of MIS 12th Edition Laudon Solutions Manual download https://testbankfan.com/product/essentials-of-mis-12th-edition- laudon-solutions-manual/ Explore and download more test bank or solution manual at testbankfan.com
  • 2. We have selected some products that you may be interested in Click the link to download now or visit testbankfan.com for more options!. Essentials of MIS 12th Edition Laudon Test Bank https://testbankfan.com/product/essentials-of-mis-12th-edition-laudon- test-bank/ Essentials of MIS 10th Edition Laudon Solutions Manual https://testbankfan.com/product/essentials-of-mis-10th-edition-laudon- solutions-manual/ Essentials of MIS 13th Edition laudon Solutions Manual https://testbankfan.com/product/essentials-of-mis-13th-edition-laudon- solutions-manual/ Managerial Accounting for Managers 3rd Edition Noreen Solutions Manual https://testbankfan.com/product/managerial-accounting-for- managers-3rd-edition-noreen-solutions-manual/
  • 3. Employment Relations An Integrated Approach 1st Edition mcphail Solutions Manual https://testbankfan.com/product/employment-relations-an-integrated- approach-1st-edition-mcphail-solutions-manual/ Statistics for Business Decision Making and Analysis 2nd Edition Stine Test Bank https://testbankfan.com/product/statistics-for-business-decision- making-and-analysis-2nd-edition-stine-test-bank/ Radiographic Imaging and Exposure 5th Edition Fauber Test Bank https://testbankfan.com/product/radiographic-imaging-and-exposure-5th- edition-fauber-test-bank/ International Business Competing in the Global Marketplace 10th Edition Hill Test Bank https://testbankfan.com/product/international-business-competing-in- the-global-marketplace-10th-edition-hill-test-bank/ Fundamentals of Financial Accounting 4th Edition Phillips Test Bank https://testbankfan.com/product/fundamentals-of-financial- accounting-4th-edition-phillips-test-bank/
  • 4. Information Technology Project Management Revised 6th Edition Schwalbe Test Bank https://testbankfan.com/product/information-technology-project- management-revised-6th-edition-schwalbe-test-bank/
  • 5. Copyright © 2017 Pearson Education, Inc. 1 Chapter 7 Telecommunications, the Internet, and Wireless Technology Learning Objectives 7-1 What are the principal components of telecommunications networks and key networking technologies? 7-2 What are the different types of networks? 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? Learning Catalytics is a “bring your own device” student engagement, assessment, and classroom intelligence system. It allows instructors to engage students in class with real-time diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to access it. For more information on using Learning Catalytics in your course, contact your Pearson Representative. Chapter Outline 7-1 What are the principal components of telecommunications networks and key networking technologies? Networking and Communication Trends What is a Computer Network? Key Digital Networking Technologies 7-2 What are the different types of networks? Signals: Digital vs. Analog Types of Networks Transmission Media and Transmission Speed 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? What is the Internet? Internet Addressing and Architecture Internet Services and Communication Tools The Web 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? Cellular Systems Wireless Computer Networks and Internet Access RFID and Wireless Sensor Networks
  • 6. Copyright © 2017 Pearson Education, Inc. 2 Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. 3G networks, 254 Personal-area networks (PANs), 254 4G networks, 254 Predictive search, 249 Bandwidth, 236 Protocol, 233 Blog, 251 Radio frequency identification (RFID), 256 Blogosphere, 252 Router, 231 Bluetooth, 254 RSS, 252 Broadband, 230 Search engines, 247 Cable Internet connections, 237 Search engine marketing, 250 Chat, 242 Semantic search, 248 Digital subscriber line (DSL), 237 Shopping bots, 250 Domain name, 238 Smart phones, 253 Domain name systems (DNS), 238 Social networking, 252 E-mail, 242 Social search, 249 File Transfer Protocol (FTP), 242 Software-defined networking, 231 Hertz, 236 Switch, 231 Hotspots, 256 T1 lines, 237 Hubs, 231 Telnet, 242 Hypertext Transfer Protocol (HTTP), 247 Search engine optimization (SEO), 251 Instant messaging, 242 Transmission Control Protocol/Internet Protocol (TCP/IP), 233 Internet of Things, 253 Unified communications, 245 Internet Protocol (IP) address, 237 Uniform resource locator (URL), 247 Internet service provider (ISP), 236 Virtual private network (VPN), 246 Internet2, 241 Visual Web, 250 IPv6, 241 Voice over IP (VoIP), 243 Local-area network (LAN), 235 Web 2.0, 251 Metropolitan-area network (MAN), 236 Web 3.0, 253 Microblogging, 252 Web site, 2246 Modem, 234 Wide-area networks (WAN), 236 Network operating system (NOS), 230 Wi-Fi, 255 Packet switching, 232 Wiki, 252 Peer-to-peer, 235 WiMax, 256 Wireless sensor networks (WSNs), 258
  • 7. Copyright © 2017 Pearson Education, Inc. 3 Teaching Suggestions Chapter 7 presents crucial concepts and terminology since telecommunications, networks, and the Internet are now introducing fundamental changes in businesses. The opening case, “Wireless Technology makes Dundee Precious Metals Good as Gold,” illustrates some of the new capabilities and opportunities provided by contemporary networking technology. Dundee implemented an underground wireless Wi-Fi network that allows electronic devices to exchange data wirelessly to monitor the location of equipment, people, and ore throughout the mine’s tunnels and facilities. The company also uses Wi-Fi radio frequency identification (RFID) technology to track workers, equipment, and vehicles in underground gold mines. Dundee has decreased equipment downtime and utilizes its resources more efficiently. It uses data from the underground wireless network in its mine management software and mobile planning software. Now the company can more closely account for its mine workers, making them more safe and the workers can communicate more closely with the mine’s control room. Control room staff can actually see the location of machinery and direct traffic more effectively, quickly identify problems and respond more rapidly to emergencies. The opening vignette provides an example of how businesses are adapting to new technologies based on the Internet. It shows how companies must continually evolve as technology improves. Section 7-1, “What are the principal components of telecommunications networks and key networking technologies?” Telecommunications and networks are vital to the majority of businesses today, and this section explains why. Because telecommunications technology serves as the foundation for electronic commerce and the digital economy, the concepts and terminology in Chapter 7 are important for both MIS and business majors. This section explains the basic configuration of networks, regardless of their size. You may want to contrast the origin and history of telephone networks and computer networks. Then diagram how the two are converging into one pipeline for all types of communication transmissions. Convergence is leading to more efficient transmission traffic and ubiquitous communications thanks to the Internet. A contemporary corporate network infrastructure relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communications, wireless local area networks, videoconferencing systems, a corporate website, intranets, extranets, and an array of local and wide area networks, including the Internet. Contemporary networks have been shaped by the rise of client/server computing, the use of packet switching, and the adoption of TCP/IP as a universal communications standard for linking disparate networks and computers. Client/server networks have distributed much of the organization’s computing power to the desktop and factory floor. Packet switching makes more
  • 8. Copyright © 2017 Pearson Education, Inc. 4 efficient use of network communications capacity by breaking messages into small packets that are sent independently along different paths in a network and then reassembled at their destination. Protocols provide a common set of rules that enable communication among diverse components in a telecommunications network. TCP/IP is a suite of protocols that has become the dominant model of achieving connectivity among different networks and computers. It is the connectivity model used in the Internet. One exercise you may try to help show how much we rely on communications today is to ask students to count the number of text messages, phone calls, e-mails, and IM messages they either sent or received in the last 24 hours or the last week. You could even go so far as to ask them to not send or receive any of these communications for a day to prove how reliant we’ve become on telecommunications. Section 7-2, “What are the different types of networks?” It may help for you to bring several props to show the different transmission media explained in this section. For example, bring twisted wire, coaxial cable, and fiber-optic cable to show to the class and discuss the advantages and disadvantages of each type of media. Students should note the different ranges (frequencies) of wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this is a critical concept today. Table 7.1 compares the range of four different area networks. This section describes the different network topologies and how they pass data across a network. If you have students working in business, ask them to identify the network topologies used in their organizations. Section 7-3, “How do the Internet and Internet technology work and how do they support communication and e-business?” Most students are familiar with the Internet and motivated to discuss it. You might begin this section by asking students how they spend their time on the Internet and how their online activities have changed since they started using the Internet. Also, ask them to identify which client platforms they currently use or have used. Ask your students to identify several of the many benefits that the Internet offers to organizations. Ask them to provide specific examples that they have read about in the text or have personally observed. The principal Internet services and communication tools are e-mail, chatting, instant messaging, newsgroups, telnet, file transfer protocol, and the web. Most students will probably be familiar with these services, having used them in their personal life. What they may not understand or relate to quite yet is how effective the tools are in a business setting. These tools reduce time and cost when firms must manage organizational activities and communicate with many employees. If you have students working in businesses, ask them to discuss the communications tools their organization uses. This section introduces a fairly new concept of unified communications. It also compares Web 2.0 with Web 3.0 that is now in the conceptual stage. Make students aware that while the new information technology infrastructure provides many benefits and capabilities, it does require careful management and planning. Challenges posed by networking and the Internet include loss of management control over information systems; the need for organizational change; and the difficulty of ensuring infrastructure scalability and reliability.
  • 9. Copyright © 2017 Pearson Education, Inc. 5 Interactive Session: Organizations: The Battle over Net Neutrality Case Study Questions 1. What is network neutrality? Why has the Internet operated under net neutrality up to this point in time? Network neutrality is the idea that Internet service providers must allow customers equal access to content and applications, regardless of the source or nature of the content. Presently the Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by Internet backbone owners. The Internet is neutral because it was built on phone lines, which are subject to ‘common carriage’ laws. These laws require phone companies to treat all calls and customers equally. They cannot offer extra benefits to customers willing to pay higher premiums for faster or clearer calls, a model known as tiered service. 2. Who’s in favor of network neutrality? Who’s opposed? Why? Those in favor of network neutrality include organizations like MoveOn.org, the Christian Coalition, the American Library Association, every major consumer group, many bloggers and small businesses, and some large Internet companies like Google and Amazon. Verizon and Google proposed a split proposition – enforce net neutrality on wired connections, but not on wireless networks. Some members of the U.S. Congress also support network neutrality. This group argues that the risk of censorship increases when network operators can selectively block or slow access to certain content. Others are concerned about the effect of slower transmission rates on their business models if users can’t download or access content in a speedy fashion. Those who oppose network neutrality include telecommunications and cable companies who want to be able to charge differentiated prices based on the amount of bandwidth consumed by content being delivered over the Internet. Some companies report that five percent of their customers use about half the capacity on local lines without paying any more than low-usage customers. They state that metered pricing is “the fairest way” to finance necessary investments in its network infrastructure. Internet service providers point to the upsurge in piracy of copyrighted materials over the Internet as a reason to oppose network neutrality. Comcast reported that illegal file sharing of copyrighted material was consuming 50 percent of its network capacity. The company posits that if network transmission rates were slower for this type of content, users would be less likely to download or access it. Those who oppose network neutrality argue that it removes the incentive for network providers to innovate, provide new capabilities, and upgrade to new technology. 3. What would be the impact on individual users, businesses, and government if Internet providers switched to a tiered service model for transmission over landlines as well as wireless? Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate without permission from the phone and cable companies or other authorities. A more level
  • 10. Copyright © 2017 Pearson Education, Inc. 6 playing field spawns countless new businesses. Allowing unrestricted information flow becomes essential to free markets and democracy as commerce and society increasingly move online. Heavy users of network bandwidth would pay higher prices without necessarily experiencing better service. Even those who use less bandwidth could run into the same situation. Network owners believe regulation like the bills proposed by net neutrality advocates will impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from ‘discriminatory’ network practices. U.S. Internet service already lags behind other nations in overall speed, cost, and quality of service, adding credibility to the providers’ arguments. Obviously, by increasing the cost of heavy users of network bandwidth, telecommunication and cable companies and Internet service providers stand to increase their profit margins. 4. It has been said that net neutrality is the most important issue facing the Internet since the advent of the Internet. Discuss the implications of this statement. Under current conditions, the Internet is neutral; all Internet traffic is treated equally on a first- come, first-served basis by Internet backbone owners. Proponents of net neutrality say that changing anything would disrupt normal service for users and begin a trend of discrimination based on the types of Internet usage. Network owners believe regulation to enforce net neutrality will impede U.S. competitiveness by discouraging capital expenditure for new networks and curbing their networks’ ability to cope with the exploding demand for Internet and wireless traffic. Internet service providers (ISPs) assert that network congestion is a serious problem and that expanding their networks would require passing on burdensome costs to consumers. These companies believe differential pricing methods, which include data caps and metered use— charging based on the amount of bandwidth consumed—are the fairest way to finance necessary investments in their network infrastructures. 5. Are you in favor of legislation enforcing network neutrality? Why or why not? Student answers will vary. Some components and principles to consider in answering this question include: • Price differentials: how much more would heavy bandwidth users pay than those who consume less bandwidth? • Speed: how much faster would network transmissions be with a tiered service model? • Stifle innovation: would a tiered service model stifle innovation by charging more for heavy bandwidth use or would it free up bandwidth thus allowing more innovation? • Censorship: would telecommunication and cable companies and Internet service providers increase censorship of content transmitted over networks? • Discrimination by carriers: would the end of network neutrality be the beginning of more discrimination? Interactive Session: People: Monitoring Employees on Networks: Unethical or Good Business?
  • 11. Copyright © 2017 Pearson Education, Inc. 7 Case Study Questions 1. Should managers monitor employee e-mail and Internet usage? Why or why not? Student answers will vary on this question. The case study statistics show that corporate misuse and abuse of e-mail for personal reasons is exploding. Simply stated, employees who use company resources for work not related to the company are, in essence, engaged in “service theft.” They are being paid to work for the company, and this does not include abusing corporate resources for personal time. Companies are in business to generate profits for their shareholders. Managers certainly should be concerned with the loss of time and employee productivity, the additional traffic it creates on their networks that inhibits the efficiency for real business purposes, lost revenue or missed opportunities, as well as overcharging clients because of lost employee efficiencies. The company itself is responsible for the use of its resources and what employees do while using them. Adverse publicity can seriously affect a company and could even result in expensive lawsuits. Companies also fear e-mail leakage of trade secrets. Other legal and regulatory problems involve the safe keeping of all e-mails that are generated on corporate equipment. This information must be retained for specific time periods and may be requested as evidence in a lawsuit. 2. Describe an effective e-mail and web use policy for a company. Like all policies, an effective e-mail and web use policy must be carefully designed and clearly communicated to all persons who use these corporate resources. There are a number of different policies in existence. Some companies allow absolutely no personal use of corporate networks, whereas others allow some degree of activity that is easily monitored. A good policy will detail exactly what type of activity is acceptable and what is not allowed. The policy should clearly articulate sanctions that will be followed for any and all offenses in relation to the policy. Most of all, rules for Internet usage should be tailored to specific business needs and organizational cultures. As an instructor you might wish to show students an example of the University of South Australia’s policy at http://www.unisa.edu.au/policies/policies/corporate/C22.asp 3. Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not? Opinions will vary according to personal values and workplace experiences. However, most students will probably answer that managers should inform employees that their web behavior is being monitored as a way to foster open communications and trust between both sides. Many consultants believe companies should write corporate policies on employee e-mail and Internet use. The policies should include explicit ground rules that state, by position or level, under what circumstances employees can use company facilities for e-mail, blogging, or web surfing. The policies should also inform employees whether these activities are monitored and explain why. Section 7-4, “What are the principal technologies and standards for wireless networking, communication, and Internet access?” Ask your students how many of them use cellular
  • 12. Copyright © 2017 Pearson Education, Inc. 8 phones, smartphones, wireless laptops, tablet computers, or wireless e-book readers. Most students are excited to demonstrate their “latest devices,” and you may wish to ask one of them to discuss the capabilities of theirs. Ask them to discuss what they like or dislike about the features found on their appliance. If you have the class time, you can ask the campus IT director to discuss the telecommunications technology used on your campus, take a tour of the campus facilities, or invite an IT director from a local company to discuss his company’s telecommunications technology. Ask your students to find out what their university does in order to support mobile wireless communications. Have them investigate applications where Bluetooth, Wi-FI, or hotspot technology is used and how it benefits them. Are they able to use their own personal appliances to connect and utilize these technologies on their campus? Review Questions 7-1 What are the principal components of telecommunications networks and key networking technologies? Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large company relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communication, wireless local-area networks, videoconferencing systems, a corporate website, intranets, extranets, and an array of local and wide-area networks, including the Internet. This collection of networks evolved from two fundamentally different types of networks: telephone networks and computer networks. (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, AACSB: Application of knowledge.) Name and describe the principal technologies and trends that have shaped contemporary telecommunications systems. Client/server computing, the use of packet switching, and the development of widely used communications standards such as TCP/IP are the three technologies that have shaped contemporary telecommunications systems. Client/server computing has extended to networking departments, workgroups, factory floors, and other parts of the business that could not be served by a centralized architecture. The Internet is based on client/server computing. Packet switching technology allows nearly full use of almost all available lines and capacity. This was not possible with the traditional dedicated circuit-switching techniques that were used in the past. TCP/IP is a suite of protocols that has become the dominant standard of network communications. Having a set
  • 13. Copyright © 2017 Pearson Education, Inc. 9 of protocols for connecting diverse hardware and software components has provided a universally agreed upon method for data transmission. (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, AACSB: Application of knowledge.) 7-2 What are the different types of networks? Define an analog and a digital signal. Analog: a continuous waveform that passes through a communications medium and has been used for voice communication. Traditionally used by telephone handsets, computer speakers, or earphones. Digital: a discrete, binary waveform, rather than a continuous waveform, represented by strings of two states: one bit and zero bits, which are represented as on-off electrical pulses. Computers use digital signals and require a modem to convert these digital signals into analog signals that are transmitted across telephone lines, cable lines, or wireless media. (Learning Objective 2: What are the different types of networks?, AACSB: Application of knowledge.) Distinguish between a LAN, MAN, and WAN. LAN (Local Area Network): a telecommunications network that is designed to connect personal computers and other digital devices within a half-mile or 500-meter radius. LANs typically connect a few computers in a small office, all the computers in one building, or all the computers in several buildings in close proximity. LANs require their own dedicated channels. MAN (Metropolitan Area Network): a network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN. WAN (Wide Area Network): spans broad geographical distances – entire regions, states, continents, or the entire globe. The most universal and powerful WAN is the Internet. Computers connect to a WAN through public networks, such as the telephone system or private cable systems, or through leased lines or satellites. (Learning Objective 2: What are the different types of networks?, AACSB: Application of knowledge.) 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? Define the Internet, describe how it works, and explain how it provides business value. The Internet is a vast network of computers that connects millions of people all over the world. The Internet uses the client/server model of computing and the TCP/IP network reference model. Every computer on the Internet is assigned a unique numeric IP address. No one owns the Internet, and it has no formal management organization. However, worldwide Internet policies are established by organizations and government bodies, such as the Internet
  • 14. Copyright © 2017 Pearson Education, Inc. 10 Architecture Board and the World Wide Web Consortium. The Internet must also conform to the laws of the sovereign nation-states in which it operates, as well as the technical infrastructure that exists within the nation-state. The Internet enables employees to gain remote access to the company’s internal systems through its website. They are able to better service customers and suppliers, improve operational efficiency, increase productivity, lower operational costs, have a broader market base, and reach more individual customers on a global scale by establishing a web presence. The cost of email and other Internet services tend to be far lower than equivalent voice, postal, or over night delivery costs, making the Internet a very inexpensive communication medium. It is also a very fast method of communication, with messages arriving anywhere in the world in a matter of seconds or minutes. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Explain how the Domain Name System (DNS) and IP addressing system work. The Internet is based on the TCP/IP networking protocol suite. Every computer on the Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods. A domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet. The Domain Name System (DNS) converts IP addresses to domain names so that users only need to specify a domain name to access a computer on the Internet, instead of typing the numeric IP address. DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. When a user sends a message to another user on the Internet, the message is first decomposed into packets using the TCP protocol. Each packet contains its destination address. The packets are then sent from the client to the network server and from there on to as many other servers as necessary to arrive at a specific computer with a known address. At the destination address, the packets are reassembled into the original message. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e- business?, AACSB: Analytical thinking.) List and describe the principal Internet services. Table 7-2 lists and describes the major Internet services: • Email—person-to-person messaging; document sharing. • Newsgroups—discussion groups on electronic bulletin boards. • Chatting and instant messaging—interactive conversations. • Telnet—logging on to one computer system and doing work on another. • File Transfer Protocol (FTP)—transferring files from computer to computer. • World Wide Web—retrieving, formatting, and displaying information (including text, audio, graphics, and video) using hypertext links.
  • 15. Visit https://testbankbell.com now to explore a rich collection of testbank, solution manual and enjoy exciting offers!
  • 16. Copyright © 2017 Pearson Education, Inc. 11 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Define and describe VoIP and virtual private networks and explain how they provide value to businesses. • Voice over Internet Protocol (VoIP) enables Internet technology to be used for telephone voice transmission over the Internet or private networks. VoIP offers the advantage of avoiding tolls charged by local and long-distance telephone networks. VoIP provides businesses an opportunity to reduce costs because they no longer have to maintain separate networks or provide support services and personnel for each different type of network. It gives organizations flexibility because phones can be added or moved to different offices without rewiring or reconfiguring networks. • Virtual private networks are secure, encrypted, private networks that have been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet. VPNs are low-cost alternatives to private WANs. VPNs give businesses a more efficient network infrastructure for combining voice and data networks. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) List and describe alternative ways of locating information on the web. • Search engines are a facility on the web that helps you find sites with the information and/or services you want. Examples: Google, Yahoo!, and MSN. • Intelligent agent shopping bots use intelligent agent software for searching the Internet for shopping information. Examples: MySimon and Froogle. • Blogs are informal yet structured websites where subscribing individuals can publish stories, opinions, and links to other websites of interest. • Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to have content they want pulled from websites and fed automatically to their computers, where it can be stored for later viewing. It’s commonly used with blogs. • Wikis are collaborative websites where visitors can add, delete, or modify content on the site, including the work of previous authors. • Web 2.0 provides second-generation interactive Internet-based services that enable people to collaborate, share information, and create new services online. Web 2.0 software applications run on the web itself instead of the desktop and bring the vision of web-based computing closer to realization. • Web 3.0 (Semantic Web) reduces the amount of human involvement in searching for and processing web information. It’s still in its infancy but promises to establish specific meanings for data on the web, categories for classifying the data, and relationships between classification categories.
  • 17. Copyright © 2017 Pearson Education, Inc. 12 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Describe how online search technologies are used for marketing. Search engine marketing monetizes the value of the search process. Searching is one of the web’s most popular activities with billions of queries performed each month. Search engines are the foundation for the most lucrative form of online marketing and advertising. When users enter a search term in a search engine, they receive two types of listings: sponsored links, for which advertisers have paid to be listed, and unsponsored organic search results. Advertisers can also purchase small text boxes on the side of search results pages. Paid, sponsored advertisements are the fastest growing form of Internet advertising and are powerful new marketing tools that precisely match consumer interests with advertising messages at the right moment. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) 7-4 What are the principal technologies and standards for wireless networking, communications, and Internet access? Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks. Standards for wireless computer networks include Bluetooth (802.15) for small personal-area networks (PANs), Wi-Fi (802.11) for local-area networks (LANs), and WiMax (802.16) for metropolitan-area networks (MANs). Bluetooth can link up to eight devices within a 10- meter area using low-power, radio-based communication and can transmit up to 722 Kbps in the 2.4 GHz band. Wireless phones, keyboards, computers, printers, and PDAs using Bluetooth can communicate with each other and even operate each other without direct user intervention. Wi-Fi is useful for creating wireless LANs and for providing wireless Internet access. Its access range is limited to anywhere between 300 feet and three miles. Hotspots are public access points individuals use to obtain high speed Internet access. WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75 Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and cable lines. The 802.16 specification also has robust security and quality-of-service features to support voice and video. 3G is a short term for third-generation wireless technology, especially mobile communications. Cellular networks have evolved from slow-speed (1G) analog networks to high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with speeds ranging from 144 Kbps to more than 2 Mbps for data transmission. 4G is a short term for fourth-generation wireless technology. It is entirely packet-switched and capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal
  • 18. Copyright © 2017 Pearson Education, Inc. 13 conditions), with premium quality and high security. Voice, data, and high-quality streaming video are available to users anywhere, anytime. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Describe the capabilities of each and for which types of applications each is best suited. • Bluetooth: Access very limited; useful for creating small personal-area networks. • Wi-Fi: Access is limited to 30–50 meters; useful for creating small local area networks. • WiMax: Access is limited to a range up to 31 miles: useful for creating wide area networks. • 3G networks: Access is available on major cellular telephone carriers that have configured their networks for 3G services. • 4G networks: Provides premium quality for voice, data, and streaming video from cellular telephone carriers. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Define RFID, explain how it works, and describe how it provides value to businesses. Mobile wireless technology facilitates supply chain management by capturing data on the movement of goods as these events take place and by providing detailed, immediate information as goods move among supply chain partners. Radio frequency identification (RFID) systems provide a microchip that contains data about an item and its location. The tags transmit radio signals over a short distance to special RFID readers. The RFID readers then pass the data over a network to a computer for processing. RFID gives businesses an opportunity to further automate their supply chain networks. The technology allows more data on an RFID chip than typical barcodes. RFID systems track each pallet, lot, or unit item in a shipment. The technology helps companies improve receiving and storage operations by improving their ability to “see” exactly what stock is stored in warehouses or on retail store shelves. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Define WSNs, explain how they work, and describe the kinds of applications that use them. Wireless sensor networks (WSNs) are networks of interconnected wireless devices with some processing and radio-transmitting capability that are embedded into the physical environment to provide measurements of many points over large spaces. Wireless sensor networks are valuable for monitoring environmental changes, traffic patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
  • 19. Copyright © 2017 Pearson Education, Inc. 14 in the field for years without any maintenance or human intervention. That reduces costs to businesses using them. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Discussion Questions 7-5 It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement. Student answers to this question will vary. 7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why not? Student answers to this question will vary. 7-7 What are some of the issues to consider in determining whether the Internet would provide your business with a competitive advantage? Student answers to this question will vary. Hands-On MIS Projects Management Decision Problems 7-8 Floor tile company: Asked by major retailing customers to begin using RFID to improve management of products. Use the web to identify the cost of hardware, software, and networking components for an RFID system for your company. What factors should be considered? What are the key decisions that have to be made in determining whether your firm should adopt this technology? (The following information was copied from www.zebra.com, Nov 2010) What is the estimated incremental cost for adopting RFID? If one is discussing incremental costs over and above what was invested in your bar code infrastructure, then you can say that you will be making an investment in tags, printer/encoders, readers, middleware, and professional services to integrate these components into your bar code legacy environment. If you are not working with bar codes already, obviously you will need to make an investment in back-office, manufacturing, or WMS systems to use RFID data. What is a ballpark figure for implementing RFID in a warehouse and distribution process? According to Forrester Research, a typical supplier that attempts to comply with a mandate
  • 20. Copyright © 2017 Pearson Education, Inc. 15 can expect to spend as much as $9 million on RFID—depending on the size of its distribution network and Walmart volume. According to this research, the largest expenditures are tag costs and additional warehouse labor. Again, it is stressed that this figure is derived from studying one company seeking compliance with the Walmart mandate. However, this study provides a good perspective on the areas from which costs will derive. How do smart label costs compare to conventional thermal/thermal-transfer printed labels? A smart label runs in the vicinity of about $0.50 per label vs. about $0.01 for a conventional label. This is mainly due to the addition of the tag. This cost is also variable based on the total volume printed and the economies of scale associated with large quantities. What companies are currently developing RFID software? Is it all customized or are there off-the-shelf solutions? Numerous start-up and established software providers—including those who provide ERP software—have developed applications to deal with RFID reader and printer/encoder management, plus “tag data capture event” management. As with most business applications software, packages are typically customized to meet customers’ requirements rather than being ready to go “off the shelf.” How will RFID integrate with EDI software? EDI messages contain data about business transactions. While the format of an EDI message may change to accommodate “new data” (such as an EPC by comparison with a GTIN), fundamentally EDI message processors are unaware of the source of the data contained in messages. So there should be no reason that RFID cannot integrate with EDI software, provided the data structures are fundamentally the same. However, one area of difference is that many EDI systems typically deliver data in periodic batch mode; in contrast, the strength of RFID is its ability to deliver real-time data, so systems are up-to-the-minute. Key decisions that a company needs to make when considering adopting RFID include: • Hardware and software costs • Implementation costs • Return on investments • How technology fits into overall business strategy (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Analytical thinking, Application of knowledge.) 7-9 BestMed Medical Supplies Corporation: Sells products and equipment from over 700 different manufacturers to hospitals, health clinics, and medical offices. The company employs 500 people at seven different locations. Management is considering adopting a unified communications system. What factors should be considered? What are the key
  • 21. Other documents randomly have different content
  • 25. The Project Gutenberg eBook of Flagg's The Far West, 1836-1837, part 2; and De Smet's Letters and Sketches, 1841-1842
  • 26. This ebook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this ebook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. Title: Flagg's The Far West, 1836-1837, part 2; and De Smet's Letters and Sketches, 1841-1842 Author: Edmund Flagg Pierre-Jean de Smet Editor: Reuben Gold Thwaites Release date: February 13, 2013 [eBook #42090] Most recently updated: October 23, 2024 Language: English Credits: Produced by Douglas L. Alley, III, Greg Bergquist and the Online Distributed Proofreading Team at http://www.pgdp.net (This file was produced from images generously made available by The Internet Archive/American Libraries.) *** START OF THE PROJECT GUTENBERG EBOOK FLAGG'S THE FAR WEST, 1836-1837, PART 2; AND DE SMET'S LETTERS AND SKETCHES, 1841-1842 ***
  • 28. A View of the Rocky Mountains Early Western Travels 1748-1846 A Series of Annotated Reprints of some of the best and rarest contemporary volumes of travel, descriptive of the Aborigines and Social and Economic Conditions in the Middle and Far West, during the Period of Early American Settlement Edited with Notes, Introductions, Index, etc., by Reuben Gold Thwaites, LL.D.
  • 29. Editor of "The Jesuit Relations and Allied Documents," "Original Journals of the Lewis and Clark Expedition," "Hennepin's New Discovery," etc. Volume XXVII Part II of Flagg's The Far West, 1836-1837; and De Smet's Letters and Sketches, 1841-1842 Cleveland, Ohio The Arthur H. Clark Company 1906 Copyright 1906, by THE ARTHUR H. CLARK COMPANY ALL RIGHTS RESERVED The Lakeside Press R. R. DONNELLEY & SONS COMPANY CHICAGO
  • 31. CONTENTS OF VOLUME XXVII I The Far West; or, A Tour beyond the Mountains. Embracing Outlines of Western Life and Scenery; Sketches of the Prairies, Rivers, Ancient Mounds, Early Settlements of the French, etc., etc. (Chapters xxxiii-xli of Vol. II, completing the publication). Edmund Flagg Author's Table of Contents 15 Text 19 II Letters and Sketches: with a Narrative of a Year's Residence among the Indian Tribes of the Rocky Mountains. Pierre Jean de Smet, S. J. Author's Preface 129 Text: BOOK I: Letters I-XII, February 4-December 30, 1841 133 BOOK II: Narrative of a Year's Residence among the Indian Tribes of the Rocky Mountains (comprised in Letters XIII-XVI, August 15- November 1, 1842) 321
  • 32. Explanation of the Indian Symbolical Catechism 405
  • 33. ILLUSTRATIONS TO VOLUME XXVII "A View of the Rocky Mountains." From De Smet's Letters and Sketches Frontispiece Allegorical sketch 126 Facsimile of title-page, De Smet's Letters and Sketches 127 "Worship in the Desert" 139 "Kanza Village" 195 "Interior of a Kanza Lodge" 203 "Chimney" 217 "Devil's Gate" 239 "Soda Springs" 245 "Fording the River Platte" 271 "Sheyenne Warriors" 275 "Indian Mode of Travelling" 325 "Apparition" 345 "Indian Symbolical Catechism"—folding plate 403
  • 34. Part II of Flagg's The Far West, 1836-1837 Reprint of chapters xxxiii-xli of Volume II of original edition: New York, 1838
  • 35. CONTENTS XXXIII Blackness of Darkness—Fall of a Forest-tree—A sublime Incident—Musings—A Moral—A Wolf— A Meal—A Mistake—A broiling Sun—The "Heights of Chester"—A noble View—An Island —A "Bend"—A Steamer—Chester—Site and Anticipations—A romantic Pathway—The Sycamores—The Undergrowth—The Bluffs— Forest Quietude—The wild-grape Vines—Size, Tortuosity, and Tenacity—A Juliet-bower—A Prediction—Kaskaskia Bottom—An elegant Farm and Mansion—The Outhouses—The Harvest-fields and Grounds—The Bluffs—The Village 19 XXXIV Antiqueness—A Proposition and Corollary—"All is New"—Freshness of Natural Scenery—The immigrant Inhabitants—An Exception—A serious Duty—A laudable Resolution—A gay Bevy—A Hawser-ferry—A Scene on the Kaskaskia—"Old Kaskaskia"—Structure of Dwellings—Aspect of Antiquity—A Contrast —"City of the Pilgrims"—The Scenes of a Century—Lane-like Streets—Old Customs —"The Parallel ceases"—The same Fact with the Spaniards—The Cause—The French Villagers—The Inn-gallery—A civil Landlord— 26
  • 36. The Table d'Hôte—A Moonlight Ramble—The old Church—The Courthouse—The fresh Laugh —The Piano—The Brunettes XXXV The Explorers of the West—The French Jesuits— Cause of the Undertaking—The Tale of the Hunters—Marquette and Joliet viii—Their Exploration—The Natives—The Illini—A Village —Manito of the Missouri—The Illinois—Amazed Delight—Joliet's Narrative—Marquette—Name to the River—Joliet's Reward—Lapse of Years— M. Robert, Cavalier de la Salle—His Talent, Ambition, and Enterprise—Visit to Canada— Success at Paris—Tonti and Hennepin— Exploration—The Illinois—An Indian Village— The Hoard of Corn—Peoria Lake—Treatment by the Natives—Loss of the Supply-boat—Fort "Creve Cœur"—Its Site—"Spring Bay"—The Indian War—Danger of La Salle—The Mutiny— The Poison—Exploration of the Mississippi— The Falls—Captivity—Hennepin's Travels— Character of these early Writers—"Fort St. Louis"—Second Expedition of La Salle—The Osage—A Village of Natives—The Oubachi— Fort Prudhomme—Formal Possession— Louisiana—Ceremonies at the Gulf—River "St. Louis"—Villages founded—Fate of La Salle— Retributive Justice—Fate of Marquette— Decease and Burial—Canadian Colonies—Their Design—Mining Expeditions—M. de Seur— Disappointment—Couriers du bois—Petits Paysans—Merry Mortals—Origin of Kaskaskia— Name—Depôt of Fur-trade—De Soto and the Tradition—His Death and Burial—Original 34
  • 37. Extent of Kaskaskia—The "Common Field"— The Grant—Policy of French and Spanish Governments—"Common Fields" and "Commons"—Regulations—Congress-grants— Harmony with the Savages—The Cause— Exaggeration—Early Peace and Prosperity— Jesuit College—Law's Scheme—The Design— Les Illinois—The Failure—The "South Sea Bubble"—Prosperity of Kaskaskia—Luxuriance of Agriculture—A chimerical Design—Cession and Recession—An unwelcome Change— Removal and the Causes XXXVI Portraiture of Character—The Difficulty—The French Villager of the Mississippi—His ordinary Deportment—Hospitality—Laws and Courts— Scholastic Proficiency—Affairs of the Nation —"A Burden!"—Their Virtues—The Helpmate— Religious Faith—Festivals—Their Property—The Change—Their Avocations—Their Idiom—A Contrast—The Peculiarities—Costume— Amusements—Slaves—Early Government—An unwelcome Change—"Improvement!"—A hateful ix Term—The Steam-engine—The old Edifices—The Streets—Advantages of the Change—The Contrast—The poorer Class— Evils of the Change—Superior Enterprise 52 XXXVII Delay on an interesting Subject—Peculiarities of French and Spanish Villages similar—Social Intercourse—Old Legends—Dreamy Seclusion —Commercial Advantages of Kaskaskia—The 59
  • 38. Trade—The River—The Land-office—Population —Fort Gage—Clarke's Expedition—The Catholic Church—Erection—Its Exterior—The Interior— The Altar-lamp—Structure of the Roof— Surprise of the Villagers—Interdict on the Architect—The Belfry—The Bell—View from the Tower—The Churchyard—The first Record—Old Chronicles—The Nunnery—The Seminary— Departure from Kaskaskia—Farms of the French—A Reminiscence—"Indian Old Point"— Extermination of the Norridgewocks—Details— The Obelisk to Father Rasle—Route to Prairie du Rocher—Aubuchon—Profusion of wild Fruit —Nuts—Grapes—A Wine Story—Mode of Manufacture—The Cliffs of Prairie du Rocher —"Common Field"—Productions—The Bayou— A Scene of Blood—A Century Slumber— Peculiarities—View from the Cliffs— Petrifactions—Simplicity and Ignorance— Characteristics of the French Villager—The Catholic Church—Unhealthy Site—Cause of a Phenomenon XXXVIII The Western Valley—Early Conception of its Extent inadequate—The French Cordon of Fortification —Origin of the Policy—Stations of Posts erected—Fort Chartres—Groves of wild Fruit— The Dark-browed Villager—His direction to the Ruins—Desertion and Dreariness of the Spot— Solemn Effect of the old Pile in the Forest— Coup d'œil—The Mississippi Slough—Erection of Fort Chartres—The Design—Expense— Material—Rebuilding—Village Cession, Recession, and the Results—Seat of Power— 73
  • 39. Form and Extent—Preservation of the Masonry —French Engineering—Original Structure of the Fortress—The Pride of its Prime—Its Scenes—The "Golden Age"—The "old Residenters"—The Pomp of War—A Shelter for the Night x XXXIX Fort Chartres—A romantic Scene—Legendary Lore —Erection of Fort Chartres—Enormous Expenditure—Needless Strength—The Engineer—His Fate—The "Buried Treasure"— The Money-diggers—Their Success—The "Western Hannibal"—Expedition against Vincennes—Capture of the French Villages— Siege of Fort Chartres—A successful Ruse du Guerre—A Scrap of History—The Capture of Fort Vincent—The Stratagem—Fort Du Quesne —Erection and History—Useless Strength—A Morning Scene—Philippe Francis Renault—His Mining Operations—The Village St. Philippe— The Cottonwood Forest—The Mississippi!—A Mistake—A weary Plod—An Atmosphere of Pestilence—Causes of Disease—Salubrious Site for a Cabin—Precautions for the Emigrant— Diseases of the West—Fevers—Sickly Months —"Milk Sickness"—Its Cause and Effects— Fever and Ague—An Escape—A sick Family— The Consumptive—Refreshment—An early Settler 85 XL The "Squatter"—His Character and Person—A View from the Bluffs—The ancient Indian Village— 97
  • 40. Reliques—The Squatter's Reflections—His Wanderings—A Discovery—The Grave of a Chief—The Ancient Burial-grounds—Human Remains—A Coffin of Stone—The "Pigmy Race"—An Investigation—Ancient Pottery—The Turtle—The Sink-holes—Waterloo—Its Windmill and Courthouse—Bellefontaine—An evening Ride—"Hail Columbia!"—An immortal Name—A very poor Pun—A miserable Night—A pleasant Dawn—The American Bottom—Its Name— Extent—Boundaries—Bluffs—Lakes, their Cause and Consequence—Disease an Obstacle to Settlement—The Remedy—The Grand Marais—The Soil—Its Fertility—The appropriate Production XLI The American Bottom—Its alluvial Character—An interesting Query—The Ancient Lake—The Southern Limit—The Parapet of Stone—Alluvial Action on the Cliffs—A similar Expansion—The Eastern Limit and the Western—The "Mamelle xi Prairie"—Elevation of Country North—Cause of the Draining—The Rocks at "Grand Tower"— Abrasion of Waters—Volcanic Action—A Tide- spring—The "Blockhouse"—Geology of the Region—Volcanic Convulsions—Impress of Omnipotence—Reflections suggested— Ignorance and Indifference on the Subject— Remarks of Dr. Buckland and Cuvier—A very ancient Revolution—Huge Remains—Theory of Cuvier—Productions of the American Bottom— The Farms—Prairie-flowers—Mounds—Prairie du Pont—Refreshment—A novel Churn—A disagreeable Village—Cahokia—The Indian 108
  • 41. Tribe—The Settlement—The Mississippi—The Creek—Harmonious Intercourse—A Contrast— Early Inhabitants of Cahokia—Peculiarities of the Village—The "Common Field"—Grant of Congress—Cahokia at the present Time— Route to St. Louis—Sunset on the Water—View of the City—Moonlight—Arrival at St. Louis—A Farewell!
  • 44. XXXIII[1] "Stranger, if thou hast learn'd a truth which needs Experience more than reason, that the world Is full of guilt and misery, and hast known Enough of all its sorrows, crimes, and cares To tire thee of it; enter this wild wood, And view the haunts of Nature." Bryant. The moon had gone down; the last star had burned out in the firmament; and that deep darkness which precedes the dawn was brooding over the earth as the traveller turned away from the little inn at the village of Pinkneyville. Fortunately he had, the previous evening, while surveying the face of the region from the door of the hostelrie, gained some general idea of the route to 127 Kaskaskia; and now, dropping the reins upon his horse's neck, he began floundering along through a blackness of darkness perfectly Cimmerian. It was, indeed, a gloomy night. The early mists were rising, damp and chill, from the soil saturated with the showers of the preceding day; and the darkness had become of a density almost palpable to the sense. Crossing a narrow arm of the prairie in the direction presumed to be correct, my horse carried me into a dense wood, and, if possible, the darkness increased. I had penetrated some miles into the heart of the forest, and was advancing slowly upon my way, when my attention was suddenly arrested by a low, whispering, rustling sound in the depths of the wood at my right; this gradually increasing, was almost immediately succeeded by a crashing, thundering, rushing report, till every echo far and wide in that dark old wood was wakened, and the whole forest for miles around resounded with the roar. My horse, terrified at the noise, leaped and plunged like a mad creature. An enormous
  • 45. forest-tree had fallen within a dozen rods of the spot on which I stood. As I left the noble ruin and resumed my lonely way, my mind brooded over the event, and I thought I could perceive in the occurrence a powerful feature of the sublime. The fall of an aged tree in the noiseless lapse of time is ever an event not unworthy of notice; but, at a moment like this, it was surely so in an eminent degree. Ages since—long ere the first white man had pressed the soil of this Western world, and while the untamed denizens of the wilderness 128 roamed in the freedom of primitive creation—ages since had seen the germe of that mighty tree lifting up its young, green leaf from the sod, beneath the genial warmth of the sunlight and the summer wind. An age passed away. The tender stem had reared itself into a gigantic pillar, and proudly tossed its green head amid the upper skies: that young leaf, expanded and developed, had spread itself abroad, until, at length, the beasts of the earth had sought out its shade, and the tree stood up the monarch of the forest. Another age is gone, and the hoary moss of time is flaunting to the winds from its venerable branches. Long ago the thunderbolt had consecrated its lofty top with the baptismal of fire, and, sere and rifted, the storm-cloud now sings through its naked limbs. Like an aged man, its head is bleached with years, while the strength and verdure of ripened maturity yet girdle its trunk. But the worm is at the root: rottenness at the heart is doing its work. Its day and its hour are appointed, and their bounds it may not pass. That hour, that moment is come! and in the deep, pulseless stillness of the night-time, when slumber falleth upon man and Nature pauses in her working, the offspring of centuries is laid low, and bows himself along the earth. Yet another age is gone; but the traveller comes not to muse over the relics of the once-glorious ruin. Long ago has each been mouldering away, and their dust has mingled with the common mother of us all. Ah! there is a moral in the falling of an aged tree! 129 I was dwelling with rather melancholy reflections upon this casual occurrence, when a quick panting close at my side attracted my attention; a large, gaunt-looking prairie-wolf had just turned on his heel and was trotting off into the shade. The gray dawn had now
  • 46. begun to flicker along the sky, and, crossing a beautiful prairie and grove, I found myself at the pleasant farmhouse of a settler of some twenty or thirty years' standing; and dismounting, after a ride of eighteen miles, I partook, with little reluctance or ceremony, of an early breakfast. Thus much for the night adventures of a traveller in the woods and wilds of Illinois! My host, the old gentleman to whom I have referred, very sagely mistook his guest for a physician, owing to a peculiarly convenient structure of those indispensables ycleped saddle-bags; and was just about consulting his fancied man of medicines respecting the ailings of his "woman," who was reclining on a bed, when, to his admiration, he was undeceived. Passing through an inconsiderable village on the north side of the Little Vermillion called Georgetown, my route lay through an extended range of hills and barrens.[2] Among the former were some most intolerably tedious, especially to a horseman beneath a broiling sun, who had passed a sleepless night: but the sweep of scenery from their summits was beautiful and extensive. At length the traveller stood upon the "heights of Chester," and the broad Mississippi was rolling on its turbid floods a hundred yards beneath. The view is here a noble 130 one, not unlike that from the Alton or Grafton bluffs at the other extremity of the "American Bottom," though less extensive. Directly at the feet of the spectator, scattered along a low, narrow interval, lies the village of Chester. Upon the opposite bank the forest rolls away to the horizon in unbroken magnificence, excepting that here and there along the bottom the hand of cultivation is betrayed by the dark luxuriance of waving maize-fields. A beautiful island, with lofty trees and green smiling meadows, stretches itself along in the middle of the stream before the town, adding not a little to the picturesqueness of the scene, and, in all probability, destined to add something more to the future importance of the place. To the right, at a short distance, come in the soft-flowing waters of the Kaskaskia through deeply-wooded banks; and nearly in the same direction winds away the mirror- surface of the Mississippi for twenty miles, to accomplish a direct passage of but four, an occurrence by no means unusual in its
  • 47. course. As I stood gazing upon the scene, a steamer appeared sweeping around the bend, and, puffing lazily along with the current past the town, soon disappeared in the distance. From the heights an exceedingly precipitous pathway leads down to the village. Chester is one of the new places of Illinois, and, of course, can boast but little to interest the stranger apart from the highly scenic beauty of its situation.[3] It has been mostly erected within the few years past; and, for its extent, is a flourishing business place. Its landing is excellent, location healthy, 131 adjacent region fertile, and, for aught I know to the contrary, may, in course of years, rival even the far- famed Alton. Its landing, I was informed, is the only one for many miles upon the river, above or below, suitable for a place of extensive commerce. From Chester, in a direction not far from north, a narrow pathway winds along beneath the bluffs, among the tall cane-brakes of the bottom. Leaving the Mississippi at the mouth of the Kaskaskia, it runs along the low banks of the latter stream, and begins to assume an aspect truly delightful. Upon either side rise the shafts of enormous sycamores to the altitude of an hundred feet, and then, flinging abroad and interlacing their long branches, form a living arch of exquisite beauty, stretching away in unbroken luxuriance for miles. Beneath springs from the rich loam a dense undergrowth of canes; a profusion of wild vines and bushes clustering with fruit serving effectually to exclude the sunbeams, except a few checkered spots here and there playing upon the foliage, while at intervals through the dark verdure is caught the flashing sheen of the moving waters. Upon the right, at the distance of only a few yards, go up the bluffs to the sheer height of some hundred feet, densely clothed with woods. The path, though exceedingly narrow and serpentine, is for the most part a hard-trodden, smooth, and excellent one when dry. The coolness and fragrance of these deep, old, shadowy woodlands has always for me a resistless charm. There is so much of quiet seclusion from the feverish turmoil of ordinary life within 132 their peaceful avenues, that, to one not wedded to the world, they are ever inexpressibly grateful.
  • 48. "The calm shade Shall bring a kindred calm, and the sweet breeze, That makes the green leaves dance, shall waft a balm To thy sick heart. Thou wilt find nothing here Of all that pain'd thee in the haunts of men, And made thee loathe thy life." In the wild, fierce glaring of a summer noontide, when amid "the haunts of men" all is parched up, and dusty, and scathed, how refreshingly cool are the still depths of the forest! The clear crystal streamlet gushes forth with perennial laughter from the rock, seeming to exult in its happy existence; the bright enamelled mosses of a century creep along the gnarled old roots, and life in all its fairy forms trips forth to greet the eremite heart and charm it from the world. But there was one feature of the scene through which I was passing that struck me as peculiarly imposing, and to which I have not yet referred. I allude to the enormous, almost preternatural magnitude of the wild-grape vine, and its tortuosity. I have more than once, in the course of my wanderings, remarked the peculiarities of these vast parasites; but such is the unrivalled fertility, and the depth of soil of the Kaskaskia bottom, that vegetation of every kind there attains a size and proportion elsewhere almost unknown. Six or seven of these vast vegetable serpents are usually beheld leaping forth with a broad whirl from the mould at the root of a tree, and then, writhing, and twining, and twisting 133 among themselves into all imaginable forms, at length away they start, all at once and together, in different directions for the summit, around which they immediately clasp their bodies, one over the other, and swing depending in festoons on every side. Some of these vines, when old and dried up by the elements, are amazingly strong; more so, perhaps, than a hempen hawser of the same diameter. Having but a short ride before me the evening I left Chester, I alighted from my horse, and leisurely strolled along through this beautiful bower I have been attempting to describe. What a
  • 49. charming spot, thought I, for a Romeo and Juliet!—pardon my roving fancy, sober reader—but really, with all my own sobriety, I could not but imagine this a delightful scene for a "Meet me by moonlight alone," or any other improper thing of the kind, whether or not a trip to Gretna Green subsequently ensued. And if, in coming years, when the little city of Chester shall have become all that it now seems to promise, and the venerable Kaskaskia, having cast her slough, having rejuvenated her withered energies, and recalled the days of her pristine traditionary glory; if then, I say, the young men and maidens make not this the consecrated spot of the long summer-evening ramble and the trysting-place of the heart, reader, believe us not; in the dignified parlance of the corps editorial, believe us not. Some portions of the Kaskaskia bottom have formerly, at different times, been cleared and cultivated; but nothing now remains but the ruins of 134 tenements to acquaint one with the circumstance. The spot must have been exceedingly unhealthy in its wild state. There is, however, one beautiful and extensive farm under high cultivation nearly opposite Kaskaskia, which no traveller can fail to observe and admire. It is the residence of Colonel M——, a French gentleman of wealth, who has done everything a cultivated taste could dictate to render it a delightful spot.[4] A fine, airy farmhouse stands beneath the bluffs, built after the French style, with heavy roof, broad balconies, and with a rare luxury in this region—green Venetian blinds. The outhouses, most of them substantially constructed of stone, are surpassed in beauty and extent only by the residence itself. Fields yellow with golden harvest, orchards loaded with fruit, and groves, and parks, and pastures sprinkled with grazing cattle, spread out themselves on every side. In the back-ground rise the wooded bluffs, gracefully rounded to their summits, while in front roams the gentle Kaskaskia, beyond which, peacefully reposing in the sunlight, lay the place of my destination. Kaskaskia, Ill.
  • 51. XXXIV "Protected by the divinity they adored, supported by the earth which they cultivated, and at peace with themselves, they enjoyed the sweets of life without dreading or desiring dissolution."—Numa Pompilius. "A pleasing land of drowsy head it was, Of dreams that wave before the half-shut eye." Castle of Indolence. In a country like our own, where everything is fresh and recent, and where nothing has yet been swept by the mellowing touch of departed time, any object which can lay but the most indifferent claim to antiquity fails not to be hailed with delighted attention. "You have," say they of the other hemisphere, "no ivy-mantled towers; no moss-grown, castellated ruins; no donjon-keeps rearing in dark sublimity their massive walls and age-bleached battlements; nothing to span the mighty chasm of bygone years, and to lead down the fancy into the shadowy realms of the past; and, therefore, your country is steril in moral interest." Now, though this corollary is undoubtedly false, I yet believe the proposition in the main to be true: especially is this the case with regard to that region which lies west of the Alleghany range. Little as there may be in the elder sections of our Atlantic states to demand veneration for the past, no sooner does the traveller find himself gliding along the silvery wave 136 of the "beautiful river," than at the same moment he finds himself forsaking all that the fairy creations of genius have ever consecrated, or the roll of the historian chronicled for coming time. All is NEW. The very soil on which he treads, fertile beyond comparison, and festering beneath the undisturbed vegetation of centuries; the rolling forests, bright, luxuriant, gorgeous as on the
  • 52. dawn of creation; the endless streams pouring onward in their fresh magnificence to the ocean, all seem new. The inhabitants are emigrants late from other lands, and every operation of human skill on which the eye may rest betrays a recent origin. There is but a single exception to these remarks—those mysterious monuments of a race whom we know not of! In consideration, therefore, of the circumstance that antiquities in this blessed land of ours are, indeed, very few and far between, I deem it the serious duty of every traveller, be he virtuoso or be he not, whenever once so happy as to lay his grasp upon an antique "in any form, in any shape," just to hold fast to the best of his ability! Such, reader, be it known, was my own praiseworthy determination when drawing nigh to the eastern shore of the stream opposite the ancient French village Kaskaskia. The sun was going down, and as I approached the sandy edge of the sea-green water, a gay bevy of young folks were whirling the long, narrow, skiff-like ferry-boat like a bird across the stream, by means of a hawser to which it was attached, and which extended from shore to shore. In my own turn I stepped into the boat, and in a few moments the old French 137 negro had forced it half across the river, at this spot about three or four hundred yards in width. For one who has ever visited Kaskaskia in the last beautiful days of summer, a pen like my own need hardly be employed to delineate the loveliness of the scene which now opened upon the view. For miles the gleamy surface of the gentle Kaskaskia might be seen retreating from the eye, till lost at length in its windings through the forests of its banks, resting their deep shadows on the stream in all the calm magnificence of inanimate nature. The shore I was leaving swelled gracefully up from the water's edge, clothed in forests until it reached the bluffs, which towered abrupt and loftily; while here and there along the landscape the low roof of a log cabin could be caught peeping forth from the dark shrubbery. The bank of the stream I was approaching presented an aspect entirely the reverse; less lovely, but more picturesque. A low sandy beach stretched itself more than a mile along the river, destitute of trees, and rounding itself gently away
  • 53. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! testbankfan.com