Download as pdf or txt
Download as pdf or txt
You are on page 1of 40

Technology Now Your Companion to

SAM Computer Concepts 1st Edition


Corinne Hoisington Solutions Manual
Go to download the full and correct content document:
https://testbankfan.com/product/technology-now-your-companion-to-sam-computer-c
oncepts-1st-edition-corinne-hoisington-solutions-manual/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Technology Now Your Companion to SAM Computer Concepts


1st Edition Corinne Hoisington Test Bank

https://testbankfan.com/product/technology-now-your-companion-to-
sam-computer-concepts-1st-edition-corinne-hoisington-test-bank/

Technology Now Your Companion to SAM Computer Concepts


2nd Edition Corinne Hoisington Solutions Manual

https://testbankfan.com/product/technology-now-your-companion-to-
sam-computer-concepts-2nd-edition-corinne-hoisington-solutions-
manual/

Technology Now Your Companion to SAM Computer Concepts


2nd Edition Corinne Hoisington Test Bank

https://testbankfan.com/product/technology-now-your-companion-to-
sam-computer-concepts-2nd-edition-corinne-hoisington-test-bank/

Introduction To Computer Security 1st Edition Goodrich


Solutions Manual

https://testbankfan.com/product/introduction-to-computer-
security-1st-edition-goodrich-solutions-manual/
Enhanced Computer Concepts and Microsoft Office 2013
Illustrated 1st Edition Parsons Solutions Manual

https://testbankfan.com/product/enhanced-computer-concepts-and-
microsoft-office-2013-illustrated-1st-edition-parsons-solutions-
manual/

Computer Concepts Illustrated Introductory 9th Edition


Parsons Solutions Manual

https://testbankfan.com/product/computer-concepts-illustrated-
introductory-9th-edition-parsons-solutions-manual/

Computer Math Problem Solving For Information


Technology 2nd Edition Charles Solutions Manual

https://testbankfan.com/product/computer-math-problem-solving-
for-information-technology-2nd-edition-charles-solutions-manual/

Illustrated Computer Concepts and Microsoft Office 365


and Office 2016 1st Edition Parsons Solutions Manual

https://testbankfan.com/product/illustrated-computer-concepts-
and-microsoft-office-365-and-office-2016-1st-edition-parsons-
solutions-manual/

Psychology Majors Companion 1st Edition Dunn Test Bank

https://testbankfan.com/product/psychology-majors-companion-1st-
edition-dunn-test-bank/
Technology Now End of Chapter Exercise Answers Page 1 of 16

Technology Now
Chapter 7: The Connected
Computer
Chapter Review
INTRODUCTION TO NETWORKS
1. What are the two main types of network architecture? Briefly describe each one.
Peer-to-peer and client/server. A peer-to-peer network is best suited for networks of 10 or fewer
computers, like those found in homes or small offices. Each computer maintains its own files and
software. All computers have the same capabilities and responsibilities, but share resources and
peripherals such as printers. In a client/server network, one central computer, called the server,
controls access to network resources.
2. What do you call a network that spans long distances? Give two examples of areas where such a
network would be appropriate.
A wide area network (WAN) covers a large geographic region. A WAN is appropriate for a state,
country, or other large area where data needs to be transmitted over long distances. Examples include
multinational company, governments, and national retail chain.
3. What type of network connects digital devices within about 30 feet of each other? Give one
example.
A personal area network (PAN) connects personal digital devices within a range of about 30 feet (9
meters). Bluetooth is the example in the chapter.
4. Give three examples of network standards, and state how each one might be used.
Network standards specify the way computers access a network, the type(s) of hardware used, data
transmission speeds, and the types of cable and wireless technology used. See Table 7-3 below for
examples.
Technology Now End of Chapter Exercise Answers Page 2 of 16

5. What piece of hardware lets your computer connect to networks?


To connect to a network, your computer might need a network interface card (NIC), which can be
wired or wireless.
6. What do you call a company that connects you to the Internet?
Once you have connected to your local network, you need a way to connect to the Internet, which you
do through an Internet service provider (ISP).

HOW NETWORKS WORK


7. What lets your laptop, tablet, or smartphone connect to the Internet in a coffee shop?
Wi-Fi hotspots let you connect your Wi-Fi-enabled laptop, tablet, or smartphone to the Internet in a
public space such as a coffee shop or library.
Technology Now End of Chapter Exercise Answers Page 3 of 16
8. What is a modem? Name three types of modems.
A modem is a communications device that connects a communications channel such as the Internet to
a sending or receiving device such as a computer. Examples include Cable modems, DSL modems,
Wireless modems.
9. Describe the purpose of a network protocol and give an example.
For network devices to communicate with each other, they must follow a common set of rules, or
protocols. TCP/IP is the protocol example in the chapter.

TYPES OF NETWORKS
10. Name three types of network topologies and briefly describe the layout of each one.
Network topologies include star, bus, ring, and mesh networks, as well as combination topologies.

11. Describe why one might need a combination topology, and give an example.
Technology Now End of Chapter Exercise Answers Page 4 of 16
Some networks combine topologies to connect smaller networks and form one larger network.
Examples include tree topology, full mesh topology and partial mesh topology.
12. How does a client/server network differ from a peer-to-peer network?
On a client/server network, one or more computers acts as a server, a computer on a network that
controls access to hardware, software, and other resources. The other computers on the network
request services from the server. Some servers provide centralized storage for programs, data, and
information. The clients are other computers and mobile devices on the network that rely on the
server for their resources.
Peer-to-peer (P2P) networks are networks of equals (peers), and typically have fewer than 10
computers. They are less expensive and easier to set up than client/server networks because they have
no dedicated servers (servers that only serve the network, and are not shared). P2P networks do not
use a central network server. Each peer maintains its own operating system, application software, and
data files. Peers can share files and peripheral devices such as printers with peers.

THE INTERNET
13. Name three services available over the Internet. How might you use each service in your daily
life? Which of the services do you use most often and why?
People use the Internet every day for tasks such as visiting Web sites to listen to music, do their
banking, and stay in touch with family and friends. Student answers will vary.
14. Describe three Internet services you can use to communicate with colleagues or friends. What
are the key benefits of each service? How are the three services different from each other?
VoIP, Email, Text messaging, Chatting, Multimedia messaging are possible services. Possible answers
include those listed in Table 7-6.
Technology Now End of Chapter Exercise Answers Page 5 of 16

THE NETWORKED WORLD


15. Why would you use the following types of communication? Give a brief example of a good use of
each: email, Web conference, VoIP, text messaging, chatting, and multimedia messaging.
Answers and examples will vary, however, three answers are in Figure 7-19.

16. Briefly define social networking. How might a recent college graduate use social networking after
taking a job 100 miles from her school? How might a family with grown children living 100 miles
apart might use social networking to keep in touch?
Social-networking Web sites have changed the way people interact, form and maintain relationships,
find jobs, promote careers, and communicate with each other. Through Facebook, Twitter, LinkedIn,
Google+, and other sites, people communicate by sharing ideas, photos, videos, and links to other Web
sites.
17. What is the difference between hackers and crackers? How do hackers and crackers gain
unauthorized access to a computer?
A hacker uses computers to access data without authorization, often illegally. Crackers use computers
to destroy data, steal information, and commit other malicious crimes.
If hackers gain unauthorized access to networked computers, they can take over the computers and
turn them into zombies, which are computers controlled by outsiders without the owners’ knowledge.
After creating a zombie, a hacker can install a bot, a program that performs a repetitive task such as
sending phishing email messages. The hacker can also group these zombies together to form a botnet,
which would send out massive amounts of phishing messages, for example.
18. What are the common forms of malware and how does it infect a computer?
Common forms of malware are shown below in Table 7-9 with a description of each.
Technology Now End of Chapter Exercise Answers Page 6 of 16

NETWORK SECURITY BASICS


19. What are three common-sense strategies for securing a home network?
Create strong passwords for your home network. Include at least eight characters, numbers, letters, or
symbols that are not easy to figure out.
Set permissions to determine who can access which resources. Limit access as much as you can.
Do not write usernames and passwords in places where they can be found by others.
Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change
the router’s default administrator password.
20. How do encryption and firewalls protect network data?
Encryption scrambles or codes data as it is transmitted over a network. If intruders intercept a file in transit,
they cannot make sense of the data they find.

Firewalls are designed to block intruders from accessing corporate or personal networks. If you have an always-
on connection to the Internet, you can be vulnerable to intrusions. Personal firewalls constantly monitor all
network traffic to keep your network secure.

Test Your Knowledge Now


1. A circuit board with special electronic circuits that connects a computer to a network is called a:
a. router
b. hub
c. network interface card (NIC)
d. switch
2. A network architecture in which all computers are equal in capability and responsibility is called a:
a. peer-to-peer network
b. client/server network
c. wireless access point
d. wide area network
3. A company that offers Internet access to individuals and businesses is a(n):
a. network service provider
b. Internet backbone
c. Internet service provider
d. wide area network
Technology Now End of Chapter Exercise Answers Page 7 of 16
4. The most common networking standard for wired networks is:
a. Wi-Fi
b. Ethernet
c. Bluetooth
d. 4G
5. The hardware that sends and receives data and information to and from a digital line is a(n):
a. digital modem
b. network interface card
c. Internet service provider
d. Wi-Fi hotspot
6. Which network standard lets devices communicate wirelessly over short distances?
a. Ethernet
b. Bluetooth
c. Phoneline
d. 4G
7. Which of the following network types uses radio signals to connect computers and devices?
a. Wi-Fi
b. Ethernet
c. modem
d. DSL modem
8. RJ-11, RJ-45, and USB are all examples of:
a. connectors
b. cables
c. domain controllers
d. ports
9. What type of network has all devices attached in a line to a central cable:
a. ring
b. star
c. bus
d. mesh
10. A networked computer that controls access to hardware, software, and other network resources is called a:
a. client
b. server
c. router
d. modem
11. You click a(n) _____ to go from one Web page to another.
a. link
b. URL
c. window
d. app
12. You use ____ when your telephone calls travel over the Internet instead of using traditional phone systems.
a. cell towers
Technology Now End of Chapter Exercise Answers Page 8 of 16
b. VoIP
c. Wi-Fi
d. cloud computing
13. With _____ computing, you can access files and applications over the Internet.
a. cellular
b. VoIP
c. Wi-Fi
d. cloud
14. Chat groups, Web conferencing, and VoIP are examples of _________ communication.
a. asynchronous
b. synchronous
c. VoIP
d. Web 2.0
15. Text messaging is based on _________ technology.
a. URL
b. SMS
c. NAS
d. ISP
16. A(n) ________________ is a type of cybercrime in which hackers steal your personal information, such as
bank account numbers.
a. botnet
b. identity theft
c. Trojan horse
d. denial of service attack
17. The type of malware that copies itself repeatedly, using up computer and network resources, is called a(n)
______________.
a. virus
b. cookie
c. Trojan horse
d. worm
18. Which one of the following is not a network authentication method?
a. password
b. CAPTCHA system
c. fingerprint reader
d. firewall
19. You use a(n) _____________ to scramble and unscramble the data being transmitted between wireless
devices.
a. wireless network key
b. biometric device
c. ID card with a barcode
d. wireless router
20. _____________ constantly monitor all network traffic to keep your network secure.
Technology Now End of Chapter Exercise Answers Page 9 of 16
a. Modems
b. Firewalls
c. Biometric scanners
d. Spyware programs
21. In the space next to each image below, write the letter of the phrase that describes it:
a. A central point for cables in a network
b. Directs the flow of information along a network
c. Connects a device to an Ethernet network
d. A device that sends and receives data to and from a digital line
e. A card that connects a computer to a network
[Comp: Use EOC Figures 1-5 for these images—see the art manuscript]

__e__ [EOC Fig1.jpg]


__b__ [EOC Fig4.jpg]

__a__ [EOC Fig2.jpg]

__d__ [EOC Fig5.jpg]

__c__ [EOC Fig3.jpg]

Try This Now


1: Test Your Home and School Network’s Performance
Your local Internet service provider offers different connection options. You should test your network
connection to confirm it uses the speed you purchased. Test the speed of your wireless or wired network at
your home, workplace, or local coffee shop and compare it to the speed of your school’s network.

Open your browser on any computer and then visit the speedtest.net Web site. Tap or click the Begin Test
button to test the performance of each network. The test may take up to a minute to complete.

a. How did the speed of your home, workplace, or local coffee shop compare with the speed of your school’s
network? Share the download and upload speeds of each location.
Technology Now End of Chapter Exercise Answers Page 10 of 16
Answers will vary at the time of completion, but a sample solution includes similar data from speedtest.net:

b. Describe three Internet activities that would be best on the faster network speed.

Answers will vary, but a sample solution includes:


Gaming, streaming video, skype, video conferencing, file downloads

2: Locate Local Free Wi-Fi Hotspots


Knowing the location of a free Wi-Fi connection in your local area can assist you if you ever lose Internet
connectivity in your home or dorm. Open your browser on any computer and then visit the
openwifispots.com Web site. Enter the name of your closest populated town or city to locate free Wi-Fi
hotspots. Try another city if you do not find a listing of hotspots.

Sample Solution:

a. What is the name of the town or city that you researched?


Arlington

b. How many free Wi-Fi hotspots did you find?


4

c. Copy and paste the listing of free Wi-Fi hotspots from the Web site into a word-processing document.
Technology Now End of Chapter Exercise Answers Page 11 of 16

3: Create a Free Video Email


Note: This assignment requires a mobile device with a camera or a computer with a Web cam.

Connecting through a video email message adds a personal and professional touch within the business
environment. Eyejot is an easy way to send and receive video email from your computer (PC or Mac) or
mobile device, such as an Apple iPhone, iPod Touch, or Android smartphone. Open the browser on any
computer and visit the eyejot.com Web site or install the free Eyejot app on your smartphone. Create a free
Eyejot account. Record a one-minute video to your instructor using Eyejot about the interesting facts you
learned about the connected computer. Send the video email to your instructor.

a. Write a paragraph describing an example of how you could use video email in a business setting.

Answers can include any of the following:

Internal emails can function as an effective communication for sharing basic information, such as new cafeteria
prices, paper use guidelines or security precautions, for example. Sending simple messages to an entire
workforce with just the click of a mouse is fast, easy, convenient and can save the company money. If saved, the
email can function as proof of a message sent or received, and is easily accessible to remind the recipient of
pertinent information. Many businesses use email as part of its marketing efforts to share information with
prospects, customers, vendors. (http://smallbusiness.chron.com/use-email-business-communication-118.html)

b. Which device did you use to create your video email? What was your experience?

Answers will vary, including: computer web cams, smartphone cameras, and stand-alone digital video cameras.

Critical Thinking Now


1: Thinking Through Your Home Network
After moving to a new apartment complex, you are faced with setting up a wireless home network for your
iPad, Windows ultrabook, and your Android phone. Your local neighborhood has DSL available. You are on an
Technology Now End of Chapter Exercise Answers Page 12 of 16
electronics retailer’s Web site looking for the equipment that you will need to set up your home wireless
network. Create a shopping list with the items necessary to create your wireless home network, the retail
price, and the steps that you would follow to connect your devices to the wireless network.
Answers will vary depending on what the student selects. Possible solutions include:
Router $50
NIC $25
Modem $50
Firewall $100
Cables $10
Components should be connected similar to Figure 7-8.

2: Protecting Your Wireless Home Network


After reading this chapter, you realize that the wireless network in your home is not secure. Unauthorized
users could sit outside your home and perform illegal activities on your home network in your name. In
addition, they may be able to view your personal files and slow down your network speed considerably. Write
a paragraph including at least four steps that will secure your home wireless network.

Create strong passwords for your home network. Include at least eight characters, numbers, letters, or
symbols that are not easy to figure out.
Set permissions to determine who can access which resources. Limit access as much as you can.
Do not write usernames and passwords in places where they can be found by others.
Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change
the router’s default administrator password.

3: World Cup Biometric Security


The FIFA World Cup Football Tournament is investigating ways to confirm the identity of the ticket holders.
FIFA is warning soccer fans to beware of fraudulent online ticket sales for the next World Cup as it works with
international agencies to use biometric security to address the problem. Write a three-paragraph proposal,
with each paragraph describing one of three biometric security technologies that could be used to determine
ticket holder authentication. Research the pros and cons of each of these biometric technologies.
Admissions

Answers will vary, but should touch on the following:

In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint (barring the
most gruesome of developments), you can't forget it like you could a password, and it's unique to you.

In practice, though, there are so many things that, for now, limit a more widespread use of this technology.

One of the problems has been pointed out by Guy Churchward, CEO of LogLogic. He says that it is its uniqueness
the thing that makes using biometric data an inherently flawed choice for a primary method of authentication.

"Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly
something you can change," he says. "Imagine having an option of only one password 'ever'. One loss and you
are screwed."
Technology Now End of Chapter Exercise Answers Page 13 of 16
Another problem is that current scanners still can't recognize if the fingerprint is on a real finger or an artificial
one. Andrew Clarke, of e-DMZ Security, says that in theory, one could get a hold of the user's fingerprint using
techniques used in crime detection and transfer it on an artificial finger. This will likely change as the technology
evolves, but for now the system is still fallible, and not suitable to be a primary solution to the authentication
problem.

“As with all authentication, multiple factors increases the effectiveness of the solution. Something you have
(fingerprint) combined with something you know (passcode) provides a stronger solution,” he says.

According to SC Magazine, David Ting, CTO of Imprivata, sees the good side of this kind of authentication. Saying
that the contents of any computer should be encrypted, and the access to its content secured by a password
AND by biometrics. According to him, a biometric password is infinitely more difficult to recover using a brute
force attack than a "normal" password.

He is in favor of using a complex passwords initially to thwart cracking, and as regards the secure access to the
Windows logon, biometric, one-time password tokens or smartcards should be used because of the
aforementioned reason. (http://www.net-security.org/secworld.php?id=8922)

Ethical Issues Now


Today is the day you move into your new apartment. As soon as you find your tablet among your moving
boxes, you power it up to check the available balance at your online bank before you accidentally overdraw
your account. You realize that you have not contacted a local Internet service provider to set up service. Out
of curiosity, you check to see if any unsecure wireless networks are available in your apartment building. The
very strongest wireless network is named ThirdFloorBen and it is not secure.

a. How should you handle this ethical dilemma?


Answers will vary, however, the student can decide to: 1. Not use the network, 2. Visit Ben on the 3rd floor and
ask for permission to use temporarily, 3. Use the network without asking.

b. What might happen if you use the unsecured network?


Answers will vary depending on what the student decides to do. If they choose to use the network, data is
unsecured and data theft and/or identity theft could occur.

c. If your neighbor Ben introduces himself later in the day in the third floor hallway, how would you handle the
issue of his open wireless network?
Answers vary depending on previous decision.

Team Up Now – Identity Rip Off


Zoe Chambers, a college freshman, is a victim of identity theft. No one ever plans to have their identity stolen,
but ignorance can unfortunately lead to years of credit score recovery and legal tape. Cassidy Collins, a friend
of Zoe’s roommate, stayed for the weekend last month in their dorm. Cassidy used Zoe’s tablet several times
over the weekend with Zoe’s permission. Days later, Zoe realized that her online bank balance was much
lower than expected. In addition, Zoe received three separate email messages from different credit card
companies saying that she had been approved and the new credit cards had been mailed to an unknown
address. (Later, she discovered this was Cassidy’s home address.)
Technology Now End of Chapter Exercise Answers Page 14 of 16

a. Each member of the team should develop a hypothesis of how it was possible for Cassidy to steal Zoe’s
identity. Create a combined document of the individual hypotheses.
Answers will vary, however they should all point to Cassidy using Zoe’s tablet without permission and accessing
web sites that Zoe had saved log-in information for on the tablet.

b. Research what Zoe should do now. Name at least four steps that Zoe should take to investigate this crime.
Answers will vary, below are steps to take from the FBI Web site (http://www.fbi.gov/about-
us/investigate/cyber/identity_theft):
Step One: Contact the fraud department of the three major credit bureaus
•Experian (TRW) 888-397-3742
•TransUnion 800-680-7289
•Equifax 800-525-6285

Step Two: Contact the account issuer in question


•Ask for the fraud/security department of the compromised or fraudulent account issuer.
•Notify them by phone and in writing.
•Close all tampered or fraudulent accounts.
•Ask about secondary cards.

Step Three: Contact your local police department


•Notify the police department in the community where the identity theft occurred.
•Obtain copies of all police reports made.

Keep a detailed log of all contacts:


•Location called.
•Name of person(s) you spoke to.
•Title and call back number with extension.
•Ask and write down what the procedures are for that entity.

c. What are several action items that Zoe should do each month to monitor her credit?
1. Safeguard Your Social Security Number (SSN)
Social Security Numbers are the entry point for identity theft. They are the key to your personal and financial
information. For this reason, it is not recommended that SSNs be carried in wallets or purses. You should also
not write on a piece of paper your SSN to later place it in your wallet or purse. Question anyone who asks to
know your SSN. Other personal identifying information to safeguard includes passport, birth certificate, driver
license, voter registration card, alien registration card, and other forms of identification.

2. Protect Your Other Personal Information


The first step in protecting your information is to properly secure personal information such as SSN, credit card
numbers, bank and brokerage accounts, retirement accounts, birth certificate, voter registration card, alien
registration card, and others. The following are other steps to take to protect your personal information.

3. Review Your Credit Reports


The best way to learn if you are a victim of identity theft is by carefully reviewing your consumer credit report on
an ongoing basis. This minimizes potential damage because identity theft is detected earlier. The Fair Credit
Reporting Act allows consumers to obtain a free copy of their credit report once a year per credit reporting
bureau. To continuously self-monitor your credit from the three major credit bureaus, Equifax
(www.equifax.com), Experian (www.experian.com), and TransUnion (www.transunion.com) order one report in
Technology Now End of Chapter Exercise Answers Page 15 of 16
January, a second one in May, and the third one in September. You should also review the credit reports of your
under age children just in case their personal information has been compromised by identity thieves.

4. Buy a Good Shredder and Use It


The shredder is the easiest, relatively inexpensive, and best method to protect yourself from dumpster diving.
By shredding items such as preapproved credit card offers, convenience checks, bank statements, canceled
checks, deposit slips, receipt for prescriptions, and correspondence that mentions confidential information such
as SSNs and other information, you are preventing someone from obtaining, from your trash, your personal
information.

5. Reduce Your Exposure to Mail Theft


Mail theft is a significant threat to your identity. To protect your mail from theft, it is recommended that you use
a locking mailbox. If this cannot be obtained, consider using a Post Office box or a box at a private mail receiving
agency, such as The UPS Store. Other measures to protect yourself from becoming a victim of mail theft include:

6. Practice Computer and Internet Safety


The internet is your entrance to the marketplace for the world from the comfort of your home or office. When it
comes to identity theft and fraud, there are safety concerns to address because organized identity theft groups
constantly try to remotely load spyware, malware, Trojan horses, and botnets on victim computers. These
programs transmit your keystrokes and other stored computer files to suspects.

7. Be Cautious at ATMs
Identity thieves have been known to place skimming devices over ATM slots to steal card account information.
To protect your PIN number and other information, do the following: •Look for suspicious devices on the front
of the ATM. Check for exposed wires, tape, or loose connections. Look for hidden cameras on the sides of the
ATM that criminals use to records ATM passwords.

8. Opt Out of Sharing Your Information


In this information age, information about you is frequently shared with multiple business partners for product
offerings, services, and promotions. You have the choice regarding how much information you want to share
with marketing firms, companies, and certain government agencies. To help you “opt out” of information
sharing related to credit bureaus, various state departments of motor vehicles, and direct marketers, the FTC
created a one-page information site that provides detailed information and links. The URL address is
www.ftc.gov/privacy/protect.shtm.

d. Research and summarize five signs that you may be a victim of identity theft.
Refer to http://www.privacymatters.com/identity-theft-information/identity-theft-victim-5-warning-signs.aspx
1. Your bills and other financial statements don't arrive. If your regular credit card, utility and other financially
oriented bills and statements don't arrive on their usual schedule(s), someone might have changed the address.
2. There are checks missing from your checkbook. Identity theft fraud is not limited to the computer. Plenty of
opportunistic identity thieves may also be skilled pickpockets. If you keep a very well-organized checkbook and
you find any checks missing or unaccounted for, look things over again. If there are still checks missing, your
identity may have been stolen.
3. You have a debt collection agency after you. The top identity thieves are experts at "pinning the blame on
someone else." Could that someone be you? If you have a collection agency hounding you for debts you know
aren't yours, your identity may well be in danger.
4. You apply for credit and are turned down. If you apply for credit and are flatly denied, something might be
wrong.
Technology Now End of Chapter Exercise Answers Page 16 of 16
5. You receive a credit or charge card you know you never applied for. Identity theft is an invasion of your
privacy in many ways. If someone out there has your personal information, they might as well be you. Keep that
in mind if you receive a welcome letter and credit card from a company you don't recall contacting.

e. Identify a YouTube video that would be best to share at Zoe’s dorm for others not to fall victim to the same
risk.
At the time of writing, this video is available on YouTube.

How to Prevent Identity Theft For College Students


http://youtu.be/GNQ843up4_M
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of Note for a time
capsule
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.

Title: Note for a time capsule

Author: Edward Wellen

Illustrator: Richard Kluga

Release date: October 13, 2023 [eBook #71869]

Language: English

Original publication: New York, NY: Royal Publications, Inc, 1957

Credits: Greg Weeks, Mary Meehan and the Online Distributed


Proofreading Team at http://www.pgdp.net

*** START OF THE PROJECT GUTENBERG EBOOK NOTE FOR A


TIME CAPSULE ***
NOTE FOR A TIME CAPSULE

By EDWARD WELLEN

Illustrated by RICHARD KLUGA

Yes, I know, the rating services probably never call


you up. But they call me up twenty times a week!

[Transcriber's Note: This etext was produced from


Infinity March 1958.
Extensive research did not uncover any evidence that
the U.S. copyright on this publication was renewed.]
I take it you sociologists living in what to me is the future (I take it
there's a future, a future with a place for sociologists) will note the
unlikely revolution in taste now going on. For your information, then,
here's why the rating services are reflecting a sudden upping from
the pelvis to the cortex—just in case this will have become a cause
for wild surmise.
You probably know what the rating services are ("were," to you; but I
don't want to tense this document up). Most people nowadays don't
know about the rating services; they know of them.
Every so often I hear someone say darkly, "I don't know about those
polls. I've never had a call from them and no one I know has ever
had a call from them."
I keep quiet or mumble something noncommittal. I could say,
truthfully, "I do know about those polls. They ring me up more than
twenty times a week." I could say that but I don't.
Not so much because I don't want to seem a crackpot or a liar as
because I don't want to spoil a good thing. Or at least what I think is
a good thing—and for the time being what I think is a good thing is
what the world thinks is a good thing.
Now, in order for you to get the picture you must understand that the
New York metropolitan area fashions the literary and musical fads of
the United States and the United States by example and by
infiltration via writings and movies and recordings fashions the fads
of the world. And the New York metropolitan area goes by the
opinions I frame.
It probably seems strange to you that I, in any amassing of statistics
merely one digit in the neighborhood of the decimal point, can claim
to exert such far-reaching influence.
But I've seen much the same sort of thing in my work as a CPA.
Someone possessing relatively few shares in a holding company
may exercise an inordinate amount of power over the national
economy.
An analogous set of operations makes it possible for me to be an
esthetic shot of digitalis in the body politic. That's why Bartok's
Mikrokosmos is at this writing the top tune and why archaeology
professor Dr. Loob is high man on the polls with his TV show Dig
This! and why the world has taken such a turn that you may very
likely be calling this the Day of the Egghead.
But you're most likely asking at this point, "Why, in the name of
statistical probability, did this character get so many calls when so
many people got none?" And your next thought is, "Or did he? Was
he a paranoiac?"
Here's my answer to your second question. I'm certainly not
imagining any of this. You're bound to come upon some signs of
these times and know what I've said about the revolution in taste is
true. Otherwise there'd be no point in my setting this down or in your
reading it.
The hard part is to convince you that the rest of it—about my role—is
true. The trouble is there's nothing about me personally that would
help me convince you. There's nothing uncommon about me except
that my tastes were previously uncommon.
As I mentioned, I'm a CPA. I live in a suburb of New York City. I have
an office in the city. I'm really semi-retired and take care of only a few
old business friends, so my listing in the Manhattan phone directory
doesn't include the terms CPA or ofc. I have a commutation book
and the usual gripes against the NYNH&H. As a matter of fact I'm
writing this while commuting and you'll have to blame not me but the
roadbed and the rolling stock for any of this you may find difficult to
decipher, for really I have a very neat handwriting. Although there's
no noticeable pressure of work I stay on at my office after the girl's
quitting time. (She still chews gum, but all day yesterday she was
humming Bartok's Mikrokosmos.) I balance books until the line at the
bottom of the column becomes a bongo board on a decimal point
and then I squeeze my eyes and shake my head and go home.
I live alone. I'm a widower. I have one daughter. Thank goodness
she's grown, married, and living in a place of her own, so there's no
one to tie up the phone. I've given up frequenting the haunts of my
old cronies. Though I miss their argumentative companionship I take
comfort in the fact that I'm furthering our common interests. I don't
give a hang that my lawn needs mowing; let the wind violin through
the grass—I'm staying near the phone.
It's between six and seven in the evening at the office and between
eight and midnight at home that I receive the calls.
That brings me to your first question—about why I consistently get
so many calls when so many people get none.
Let me make it clear at once that even if the polls were buyable or
fixable, and I'm not suggesting they are, I haven't the means to buy
or the electronic knowledge to fix supposedly random calls. Besides,
I'm fairly ethical.
Then what's the answer?
Naturally I've given this phenomenon more than a bit of thought, and
I've formulated a theory to explain—at least to my satisfaction—why
what's happening's happening. I believe the drawing power of my
phone numbers inheres in the nature of number.
Now don't go getting hot under the collar—if you're still wearing
collars—before you hear me out.
I'm not talking about numerology or any such mystical hocus-pocus.
I'm talking about the psychopathology of everyday life. That's what's
skewing and skewering the law of probabilities.
I know this demands explaining, so I'll be specific.
Apart from these calls from the rating services, I keep receiving calls
on my home phone from people who set out to dial a certain
undertaker—I beg his pardon, funeral director. We have the same
exchange, in fact his number differs from mine only in that the first of
his last four digits is a zero while my corresponding one is a nine.
Of course by now you've put your finger on it. These people are
dialing the under—funeral director because, in the current
colloquialism, someone's number's up. They misdial because they're
unconsciously saying nein to the zero of death.
I've analyzed both my home phone number and my office phone
number in this fashion, figuring out what their components connote
singly and as gestalts. And I can see why these fortuitous
combinings command attention, why these numbers leap out of the
directory pages right at you. Privately I call such a number a
common denominator with a way of accreting its numerator.
I hope you're not laughing at me.
After all, when you remember what number is, what's happening
follows naturally. Number's a language we use to blaze our way
through the wood of reality. Without number we couldn't say what is
more or less probable, we couldn't signpost our path. But using
number is like trying to detect the emission of a photon without
having to receive that photon. The difficulty lies in trying to get
number at least one remove from the font of all language—the
human mind. Possibly we'll come closest to order, be at one with
reality, when we can order number—at the level of statistical
probability—to be truly random, at one with chaos.
At any rate, there you have it. I'd like to go into greater detail but I'm
afraid to.
Before my phone numbers up and atted 'em I was content merely to
tune out the noisome and the fulsome and sigh to myself, "That's life.
You ask for beer and get water."
That is, I thought I was content.
It's only now that I'm getting beer with an egg in it that I realize how
passionately I hated the way things were and how passionately I'd
hate to have to go back to that way.
I don't know how long this phenomenon will go on but while it lasts I
mean to make the most of it.
I unashamedly enjoy watching the expression of bewildered
enthusiasm on everyone's face. That expression is there because
everyone listens to and looks at what the polls tell him is popular and
because everyone tells himself he likes it because "everyone" likes
it.
But in some respects my feelings are more uncertain. I'm glad and at
the same time sorry for the longhair musicians. It seems more
embarrassing than pleasing to them to find themselves suddenly the
idols of bobby-soxers. I try not to think of Stravinsky barricading
himself against the adulating adolescents souveniring him to his
underwear.
As you can see, I've had to harden my heart. (It's tempting to say I've
had to become number.) And I intend to be even more ruthless.
I'm planning, for example, to place on the Hit Parade Dhaly's
Concerto in Alpha Wave for Oscillograph and Woodwinds.
That's why I'm being exceedingly careful to leave nothing to chance.
Though this document is sort of a hostage to fortune, I'm taking into
account the possibility that I might lose it while commuting and that it
might fall into the hands of some unsympathetic contemporary. So
I'm not writing down my phone numbers or my name. I want to keep
the lines clear for the pollsters.
*** END OF THE PROJECT GUTENBERG EBOOK NOTE FOR A
TIME CAPSULE ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation

You might also like