Professional Documents
Culture Documents
Instant Download PDF Using Information Technology 10th Edition Williams Solutions Manual Full Chapter
Instant Download PDF Using Information Technology 10th Edition Williams Solutions Manual Full Chapter
https://testbankfan.com/product/using-information-
technology-10th-edition-williams-test-bank/
https://testbankfan.com/product/using-information-
technology-11th-edition-williams-test-bank/
https://testbankfan.com/product/managing-information-
technology-7th-edition-brown-solutions-manual/
https://testbankfan.com/product/information-technology-
auditing-4th-edition-hall-solutions-manual/
Using Financial Accounting Information The Alternative
to Debits and Credits 10th Edition Porter Solutions
Manual
https://testbankfan.com/product/using-financial-accounting-
information-the-alternative-to-debits-and-credits-10th-edition-
porter-solutions-manual/
https://testbankfan.com/product/information-technology-project-
management-9th-edition-schwalbe-solutions-manual/
https://testbankfan.com/product/information-technology-project-
management-4th-edition-marchewka-solutions-manual/
https://testbankfan.com/product/ethics-in-information-
technology-5th-edition-reynolds-solutions-manual/
https://testbankfan.com/product/information-technology-for-
managers-2nd-edition-reynolds-solutions-manual/
Chapter 6
Communications, Networks,
& Safeguards
The Wired & Wireless World
Lecture Outline
Teaching Tip
www.whatis.com
www.pctechguide.com/
Key Question: How do digital and analog data differ, and what does a
modem do?
________________________________________________________________________
Digital convergence is the gradual merger of computing and communications into a new
information environment, in which the same information is exchanged among many
kinds of equipment, using the language of computers. There has also been a convergence
of several important industries—computers, telecommunications, consumer electronics,
entertainment, mass media—producing new electronic products that perform multiple
functions.
A. The Digital Basis of Computers: Electrical Signals as Discontinuous Bursts
All data that a computer processes must be encoded digitally, as a series of 0s and 1s.
Digital describes any system based on discontinuous data or events. In the case of
computers, it refers to communication signals or information represented in a two-state
(binary) way using electronic or electromagnetic signals. Each 0 and 1 signal represents
a bit.
Web Exercise
For a detailed overview of analog vs. digital signals, ask the students to try these
websites:
http://electronics.howstuffworks.com/question7.htm
http://telecom.hellodirect.com/docs/Tutorials/AnalogVsDigital.1.051501.asp
C. Purpose of the Modem: Converting Digital Signals to Analog Signals
& Back
Because telephone lines have traditionally been analog, you need to have a dial-up
modem if your computer is to send communications signals over a telephone line. The
modem translates the computer’s digital signals into the telephone line’s analog signals.
The receiving computer also needs a modem to translate the analog signals back into
digital signals.
How can the analog realities of the world—light, sounds, colors, temperatures, etc.—be
expressed in digital form?
2. The Digital Recording Process—The digital recording process is different. The way in
which music is captured for audio CDs does not provide a duplicate of a musical
performance. Rather, the digital process uses a device (an analog-to-digital converter)
to record representative selections (samples) of the sounds. It then converts the
analog waves into a stream of numbers that the computer uses to express the sounds.
Additional Information
http://electronics.howstuffworks.com/question487.htm
www.pcmag.com/encyclopedia_term/0,2542,t=sampling&i=50790,00.asp
6.2 NETWORKS
Key Question: What are the benefits of networks, and what are their types,
components, and variations?
_______________________________________________________________________
People and organizations use networks for the following reasons, the most important of
which is the sharing of resources.
1. Expense: The initial set up cost of a computer network can be high depending on the
number of computers to be connected and the number of connecting devices and NICs
4. Dependency on the Main File Server: If the main file server of a computer network
breaks down, the entire system can become useless. In case of big networks, the file
server is often a powerful computer, which often makes a failure expensive—not to
mention causing a service outage for many customers or system users.
Additional Information
• If a network file server develops a fault, then users may not be able to run
application programs.
• A fault on the network can cause users to lose data (if the files being worked on
have not been saved).
• If the network stops operating, then it may not be possible to access various
resources.
• Users’ work becomes dependent on network and the skill of the systems manager.
• It is difficult to make the system secure from hackers, novices, and industrial
espionage.
• Decisions on resource planning tend to become centralized—for example, what
word processor is used, what printers are bought, and so on.
• Networks that have grown with little thought put into them can be inefficient in
the long term.
• As traffic increases on a network, the performance degrades unless the network is
designed properly.
• Resources may be located too far away from some users.
• The larger the network becomes, the more difficult it is to manage.
(http://homepages.uel.ac.uk/u0313643/disadvantages_of_networks.htm; see also
www.buzzle.com/articles/advantages-and-disadvantages-of-computer-
networks.html)
Networks may be divided into several main categories, differing primarily in their
geographic range and purpose.
The networks types just discussed have to do mainly with coverage area. Two principal
ways in these networks are structured are client/server and peer to peer.
Almost every action taken by an ordinary Internet user requires one or more
interactions with one or more servers.
Additional Information
http://freepctech.com/pc/002/networks007.shtml
www.dewassoc.com/support/networking/serverpeer.htm
www.wifinotes.com/computer-networks/network-types.html
www.aquilatechnology.com/networks.htm
3. Virtual Private Networks (VPNs)—Because wide area networks use leased lines,
maintaining them can be expensive, especially as distances between offices increase.
To decrease communications costs, some companies have established their own
virtual private networks (VPNs), private networks that use a public network
(usually the Internet) to connect remote sites. Company intranets, extranets, and
LANS can all be parts of a VPN. In a VPN, the communication data is protected from
hackers. When the VPN connection is established between two parties (between a
VPN client and VPN gateway or between two VPN gateways), a secured virtual
tunnel is created with capability to encrypt the data (so no hacker can see the data
content), preserve data integrity (no data change during transmission), and ensure the
communication happens only between authenticated parties.
http://technet.microsoft.com/en-us/library/cc779919(WS.10).aspx
http://computer.howstuffworks.com/vpn.htm
www.alliancedatacom.com/how-vpn-works.asp
F. Components of Networks
Additional Information
http://compnetworking.about.com/od/networkprotocols/l/bldef_packet.htm
www.csupomona.edu/~ehelp/vpn/what_is_a_vpn.html
www.wisegeek.com/what-is-a-packet-sniffer.htm
6. Network Interface Cards—A network interface card (NIC) enables the computer to
send and receive messages over a cable network. New computers often come with
network cards already installed.
The logical layout, or shape, of a network is called a topology. The three basic network
topologies, or configurations, are bus, ring, and star.
Tip
Remind students that a topology is not a technology. Topology here refers to the
schematic description of the arrangement of a network. Technology is the application of
science, especially to industrial or commercial objectives. It is the scientific method and
material used to achieve a commercial or industrial objective, the application of
knowledge to meet the wants of people.
1. Bus Network—In this network, all nodes are connected to a single wire or cable, the
bus, which has two endpoints, or terminators, which stop the network signal. Each
communications device on the network transmits electronic messages to other
devices. Each communications device on the network transmits electronic messages
to other devices. If some of these messages collide, the sending device waits and tries
to transmit again.
a. Advantage—One advantage of a bus network is that it may be organized as a
client/server or peer-to-peer network; also, it is relatively inexpensive and easy to
use.
b. Disadvantages—A disadvantage is that extra circuitry and software are needed to
avoid collisions between data. Also, if a connection in the bus is broken—as when
someone moves a desk and knocks the connection out—the entire network may
stop working.
3. Star Network—A star network is one in which all microcomputers and other
communications devices are directly connected to a central switch. Electronic
messages are routed through the central switch to their destinations. The central
switch monitors the flow of traffic. A PBX system—a private telephone system, such
as that found on a college campus, that connects telephone extensions to each other—
is an example of a star network. Traditional star networks are designed to be easily
expandable because hubs can be connected to additional hubs of other networks.
a. Advantage—The switch prevents collisions between messages. Moreover, if a
connection is broken between any communications device and the switch, the rest
of the devices on the network will continue operating.
b. Disadvantage—If the switch goes down, the entire network will stop.
Additional Information
For more advantages and disadvantages of the bus, ring, and, star networks, go to:
http://kane18.wordpress.com/2007/01/11/advantages-and-disadvantages-of-a-bus-ring-
star-network/
http://fcit.usf.edu/network/chap5/chap5.htm
www.buzzle.com/articles/advantages-and-disadvantages-of-different-network-
topologies.html
www.basicsofcomputer.com/networking_network_topologies.htm
4. Mesh Network—In a mesh network topology, messages sent to the destination can
take any possible shortest, easiest route to reach its destination. There must be at least
two paths to any individual computer to create a mesh network. (Wireless networks
are often implemented as a mesh.)
The Internet employs the mesh topology, and the message, with the help of routers,
finds its route for its destination
More on Meshes
www.moskaluk.com/Mesh/wireless_mesh_topology.htm
www.freewimaxinfo.com/computer-network-topologies.html
H. Ethernet
Ethernet is a wired LAN technology (protocol) that can be used with almost any kind of
computer and that describes how data can be sent in packets in close physical proximity
between computers and other networked devices. When two nodes try to send data at the
same time and so might collide, Ethernet instructs the nodes to resend the data one at a
time. It is frequently used in a star topology.
Most new microcomputers come equipped with an Ethernet card and an Ethernet port.
An Ethernet port looks much like a regular phone jack, but it is slightly wider. This port
can be used to connect a computer to another computer, a local network, or an external
DSL or cable modem.
1. Twisted-Pair Wire—The telephone line that runs from your house to the pole
outside, or underground, is probably twisted-pair wire. Twisted-pair wire consists of
two strands of insulated copper wire, twisted around each other. This twisted-pair
configuration (compared to straight wire) somewhat reduces interference from
electrical fields.
Twisted-pair is relatively slow, carrying data at the rate of 1–128 megabits per
second. Moreover, it does not protect well against electrical interference. However,
because so much of the world is already served by twisted-pair wire, it will no doubt
be used for years.
Many households now have more than one computer, and many have taken steps to link
their equipment in a home network that also includes telephones, lights, audio, and alarm
systems.
2. HomePNA: Using the Home’s Existing Telephone Wiring—If your house has a
phone jack in every room in which you have a computer, then you might be interested
in HomePNA (HPNA) technology. The main advantage is you can use a home’s
existing telephone wiring for a home network, transmitting data at speeds of 320
megabits per second.
Often it’s inefficient or impossible to use wired media for data transmission, and wireless
transmission is better. To understand wireless communication, we need to understand
transmission signals and the electromagnetic spectrum.
Additional Information
Additional Information
www.broadbandinfo.com/cable/broadband/an-introduction-to-narrowband-a-broadband-
internet-connections.html
3. Cellular Radio—Widely used for cellphones and wireless modems and uses high-
frequency radio waves to transmit voice and digital messages.
There are essentially two ways to move information through the air long distance on
radio frequencies—one way and two way. One-way communications is typified by the
satellite navigation system known as the Global Positioning System and by most pagers.
Two-way communications is exemplified by cellphones.
Additional Information
www.gpsworld.com/gpsworld/
www.loc.gov/rr/scitech/mysteries/global.html
2. Pagers—Pagers are simple radio receivers that receive data sent from a special radio
transmitter.
a. How a pager works—The radio transmitter broadcasting to the pager sends
signals over a specific frequency. All of the pagers for that particular network have
a built-in receiver that is tuned to the same frequency broadcast from the
transmitter. The pagers listen to the signal from the transmitter constantly as long
as the pager is turned on. Often the pager has its own telephone number. When the
number is dialed from a phone, the call goes by way of the transmitter straight to
the designated pager.
b. The uses of pagers—Although generally obsolete, pagers are still used in areas
where cellphones are unreliable or prohibited, such as large hospital complexes.
D. Long-Distance Wireless: Two-Way Communication
Additional Information
What’s the ideal cellphone and service for your area? Keep in mind that cellphone
reception is incredibly touchy, depending heavily on landscape, carrier technology, phone
model, service provider, tower locations, etc. Go to:
http://reviews.cnet.com/cell-phone-buying-guide/
www.cellreception.com/
www.wikihow.com/Improve-Cell-Phone-Reception
GSM (Global System for Mobile Communications, originally from Groupe Spécial
Mobile) is the most popular standard for mobile telephony systems in the world. GSM
differs from its predecessor technologies in that both signaling and speech channels are
digital. This also facilitates the widespread implementation of data communication
applications into the system.
www.gsm.org/
Additional Information
Find local Wi-Fi access points (some are free, some are fee-based):
http://local.google.com/lochp?q=wifi%20access&promo=US-HA-wifi%20access
www.wififreespot.com/
Additional Information
http://en.wikipedia.org/wiki/Wardriving
There really could be serious safety issues involving in-flight cellphone and Wi-Fi use!
http://abcnews.go.com/Blotter/safe-cellphone-plane/story?id=13791569
www.securitynewsdaily.com/how-dangerous-are-cell-phones-on-a-plane-0499/
Additional Information
www.bluetooth.com/English/Pages/default.aspx
Additional Information
http://staff.washington.edu/dittrich/misc/ddos/
2. Viruses—A virus is a “deviant” program, stored on a computer disk that can cause
unexpected and often undesirable effects, such as destroying or corrupting data.
Viruses can infect files and email attachments; the files must be opened for the virus
to spread.
Additional Information
www.virusbtn.com/
Additional Information
The Conficker worm and the stuxnet worm are worrisome problems. No one is sure
where they come from and exactly what they are supposed to do.
www.microsoft.com/security/pc-security/conficker.aspx
www.mcafee.com/us/threat-center/conficker.aspx
www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=win32%2fco
nficker
www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_
www.stuxnet.net/
In June 2010 The Atlantic published an excellent article about conficker:
www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/8098/
Students should be aware of these worms and what to watch out for, because they could
be dealing with them for some time.
Group Exercise
Divide students into six groups. Ask each group to research one of the following worms
and viruses and report on the prevention measures that can be taken.
Boot-sector virus
File virus
Multipartite virus
Macro virus
Logic bomb
Trojan horse
5. Blended threats—A blended threat is a more sophisticated attack that bundles some
of the worst aspects of viruses, worms, Trojan horses, and other malware into one
single threat. Blended threats can use server and Internet vulnerabilities to initiate,
then transmit and also spread an attack.
To be considered a blended thread, the attack would normally serve to transport
multiple attacks simultaneously. For example, it wouldn’t just launch a DoS attack —
it would also, for instance, install a backdoor and maybe even damage a local system.
Additionally, blended threats are designed to use multiple modes of transport—email,
flash drives, USB thumb drives, networks, and so on.
6. Rootkits—In many computer operating systems (OSs), the “root” is an account for
system administration. A “kit” is the malware introduced into the computer. A rootkit
gives an attacker “super powers” over computers—for example, the ability to steal
sensitive personal information.
9. Spyware—Spyware is a broad term that sometimes is used to mean the same thing as
malware but more narrowly is thought of as a surveillance tool that spies on computer
users and steals their information.
A keystroke logger, referred to as a keylogger, may be the most common form of
spyware. A keylogger secretly “harvests” every keystroke that a computer user makes
and so steals sensitive data for profit. Keyloggers may be hardware or software.
10. Time, logic, & email bombs—A time bomb is malware programmed to “go off” at a
particular time or date. A logic bomb is “detonated” when a specific event occurs—
for example, all personnel records are erased when an electronic notation is made that
a particular person was fired. Email bombs overwhelm a person’s email account by
surreptitiously subscribing it to dozens or even hundreds of mailing lists.
11. How Malware Is Spread—Worms, viruses, and Trojan horses are passed in these
ways:
Additional Information
www.focus.com/briefs/secure-wireless-lan/#
www.securitynewsdaily.com/wi-fi-routers-hack-1455/
12. Cellphone Malware—A cellphone virus is basically the same thing as a computer
virus, although a cellphone virus or worm spreads via Internet downloads, MMS
attachments, and Bluetooth transfers. The most common method of infection occurs
when a cellphone downloads an infected file from a PC or the Internet. To avoid
cellphone infections:
a. Turn off Bluetooth discoverable mode
b. Check security updates to learn about filenames you should keep an eye out for
c. Install some type of security software on your phone
It helps to distinguish between hackers and crackers, although the term cracker has never
caught on with the general public.
Discussion Point
What do students think of hackers? Should they be prosecuted even if they do nothing
malicious?
2. As opposed to hackers, who do break-ins for more or less positive reasons, crackers
are malicious hackers, people who break into computers for malicious purposes.
These might be to obtain information for financial gain, shut down hardware, pirate
software, steal people’s credit information, or alter or destroy data.
There seem to be four classes of crackers:
a. Script kiddies—On the low end are script kiddies, mostly teenagers without much
technical expertise who use downloadable software or source code to perform
malicious break-ins.
b. Hacktivists —Hacktivists are “hacker activists,” people who break into a computer
system for a politically or socially motivated purpose. For example, they might
leave a highly visible message on the home page of a website that expresses a
point of view that they oppose.
c. Black-hat hackers—Black-hat hackers are those who break into computer systems
to steal or destroy information or to use it for illegal profit. They are often
professional criminals, the people behind the increase in cyberattacks on corporate
networks.
d. Cyberterrorists—Cyberterrorists are politically motivated persons who
attack computer systems so as to bring physical or financial harm to a lot of people
or destroy a lot of information. Particular targets are power plants, water systems,
traffic control centers, banks, and military installations.
C. Online Safety
Additional Information
www.symantec.com
www.mcafee.com
Additional Information
www.biometrics.org/
Additional Information
www.howstuffworks.com/encryption.htm
Self-Test Questions
1. modem 2. WAN; wide area network 3. fiber optic 4. analog; digital 5. VPN (virtual
private network) 6. file server 7. NOS (network operating system) 8. modulator/demodulator
9. Bluetooth 10. blocking 11. node 12. protocol 13. mesh
Multiple-Choice Questions
1. c 2. e 3. e 4. d 5. b 6. c 7. e 8. b
True/False Questions
1. T 2. T 3. T 4. T 5. T 6. T 7. F 8. T 9. F 10. F
Short-Answer Questions
1. An intranet is an organization’s internal private network that uses the infrastructure and
standards of the Internet and the World Wide Web. When an organization creates an intranet, it
enables employees to have quicker access to internal information and to share knowledge so that
they can do their jobs better. Information exchanged on intranets may include employee email
addresses and telephone numbers, product information, sales data, employee benefit information,
and lists of jobs available within the organization. An extranet is a private intranet that connects
not only internal personnel but also selected suppliers and other strategic parties. Extranets have
become popular for standard transactions such as purchasing.
2. A local area network (LAN) is a network that connects computers and devices in a limited
geographical area, such as one office, one building, or a group of buildings close together (for
instance, a college campus). A wide area network (WAN) is a communications network that
covers a wide geographical area, such as a country or the world. Most long-distance and regional
Bell telephone companies are WANs.
3. Bandwidth, or band, refers to a range of frequencies serving as a measure of the amount of
information that can be delivered within a given period of time. The bandwidth is the difference
between the lowest and the highest frequencies transmitted. For analog signals, bandwidth is
expressed in hertz (Hz), or cycles per second. For digital signals, bandwidth is expressed in bits
per second (bps). In the United States, certain bands are assigned by the Federal
Communications Commission (FCC) for certain purposes. The wider the bandwidth, the faster
data can be transmitted. The narrower the band, the greater the loss of transmission power. This
loss of power must be overcome by using relays or repeaters that rebroadcast the original signal.
4. A firewall is a system of hardware and software that blocks unauthorized users inside and
outside the organization from entering the intranet. Security is essential to an intranet. A firewall
consists of two parts, a choke and a gate. The choke forces all data packets flowing between the
Internet and the intranet to pass through a gate. The gate regulates the flow between the two
networks. It identifies authorized users, searches for viruses, and implements other security
measures. Thus, intranet users can gain access to the internet (including key sites connected by
hyperlinks), but outside Internet users cannot enter the intranet.
5. 2G = second generation; 3G = third generation; these terms refer to digital wireless services
developed more recently than first-generation analog services. 4G and 5G phones are now
becoming available.
6. The bus network works like a bus system at rush hour, with various buses pausing in different
bus zones to pick up passengers. In a bus network, all communications devices are connected to
a common channel; that is, all nodes are connected to a single wire or cable, the bus, which has
two endpoints. Each communications device on the network transmits electronic messages to
other devices. If some of those messages collide, the sending device waits and tries to transmit
again.
The advantage of a bus network is that it is relatively inexpensive and good for small networks.
A disadvantage is that if a connection in the bus is broken—as when someone moves a desk and
knocks the connection out—the entire network may stop working.
A ring network is one in which all microcomputers and other communications devices are
connected in a continuous loop. There are no endpoints. Electronic messages are passed around
the ring until they reach the right destination. There is no central server. An example of a ring
network is IBM’s Token Ring Network, in which a bit pattern (called a “token”) determines
which user on the network can send information.
The advantage of a ring network is that messages flow in only one direction. Thus, there is no
danger of collisions. The disadvantage is that, if a connection is broken, the entire network stops
working.
A star network is one in which all microcomputers and other communications devices are
directly connected to a central server. Electronic messages are routed through the central switch
to their destinations. The central switch monitors the flow of traffic. A PBX system is an
example of a star network. Traditional star networks are designed to be easily expandable
because switches can be connected to additional switches of other networks.
The advantage of a star network is that the switch prevents collisions between messages.
Moreover, if a connection is broken between any communications device and the switch, the rest
of the devices on the network will continue operating. However, if the switch goes down, the
entire network will stop.
7. Telephone signals, radar waves, microwaves, and the invisible commands from a garage-door
opener all represent different waves on what is called the electromagnetic spectrum of radiation,
which is the basis for all telecommunications signals, carried by both wired and wireless media.
Part of the electromagnetic spectrum is the radio-frequency (RF) spectrum, fields of electrical
energy and magnetic energy that carry most communications signals. Internationally, the RF
spectrum is allocated by the International Telecommunications Union (ITU) in Geneva,
Switzerland. Within the United States, the RF spectrum is further allocated to nongovernment
and government users. The Federal Communications Commission (FCC), acting under the
authority of Congress, allocates and assigns frequencies to nongovernment users. The National
Telecommunications and Information Administration (NTIA) is responsible for departments and
agencies of the U.S. government.
8. A protocol is the set of rules that enable computers and other devices on the Internet to
communicate.
9. [Any three of these.]
Rule 1: Don’t tell anyone your user name and password.
Rule 2: Don’t use passwords that can be easily guessed.
Rule 3: Avoid any word that appears in a dictionary.
Rule 4: Create long passwords, especially for sensitive sites.
Rule 5: Don’t use the same password for multiple sites.
Rule 6: Change passwords often.
Rule 7: Don’t write passwords on sticky notes, in a notebook, or in a handheld computer— or
tape them under your keyboard.
Rule 8: Don’t carry passwords in your wallet.
Rule 9: Create a system for remembering passwords without writing them down.
10. We need encryption to keep secret the content of messages and files sent over the Internet.
Responses to Knowledge in Action and Web exercises will vary throughout.
Another random document with
no related content on Scribd:
to say, would necessarily startle the reading public with some
explanation so extraordinary that his scientific views would cause a
real hegira to the unexplored fields of psychology. Well, he does
startle us, for to all this he quietly observes: “Recourse was had to
marriage to bring to a stop these disorders of the
Convulsionaires!”[607]
For once des Mousseaux had the best of his enemy: “Marriage, do
you understand this?” he remarks. “Marriage cures them of this
faculty of climbing dead-walls like so many flies, and of speaking
foreign languages. Oh! the curious properties of marriage in those
remarkable days!”
“It should be added,” continues Figuier, “that with the fanatics of
St. Medard, the blows were never administered except during the
convulsive crisis; and that, therefore, as Dr. Calmeil suggests,
meteorism of the abdomen, the state of spasm of the uterus of
women, of the alimentary canal in all cases, the state of contraction,
of erethism, of turgescence of the carneous envelopes of the
muscular coats which protect and cover the abdomen, chest, and
principal vascular masses and the osseous surfaces, may have
singularly contributed toward reducing, and even destroying, the
force of the blows!”
“The astounding resistance that the skin, the areolar tissue, the
surface of the bodies and limbs of the Convulsionaires offered to
things which seem as if they ought to have torn or crushed them, is
of a nature to excite more surprise. Nevertheless, it can be
explained. This resisting force, this insensibility, seems to partake of
the extreme changes in sensibility which can occur in the animal
economy during a time of great exaltation. Anger, fear, in a word,
every passion, provided that it be carried to a paroxysmal point, can
produce this insensibility.”[608]
“Let us remark, besides,” rejoins Dr. Calmeil, quoted by Figuier,
“that for striking upon the bodies of the Convulsionaires use was
made either of massive objects with flat or rounded surfaces, or of
cylindrical and blunt shapes.[609] The action of such physical agents
is not to be compared, in respect to the danger which attaches to it,
with that of cords, supple or flexible instruments, and those having a
sharp edge. In fine, the contact and the shock of the blows produced
upon the Convulsionaires the effect of a salutary shampooing, and
reduced the violence of the tortures of hysteria.”
The reader will please observe that this is not intended as a joke,
but is the sober theory of one of the most eminent of French
physicians, hoary with age and experience, the Director-in-Chief of
the Government Insane Asylum at Charenton. Really, the above
explanation might lead the reader to a strange suspicion. We might
imagine, perhaps, that Dr. Calmeil has kept company with the
patients under his care a few more years than was good for the
healthy action of his own brain.
Besides, when Figuier talks of massive objects, of cylindrical and
blunt shapes, he surely forgets the sharp swords, pointed iron pegs,
and the hatchets, of which he himself gave a graphic description on
page 409 of his first volume. The brother of Elie Marion is shown by
him striking his stomach and abdomen with the sharp point of a
knife, with tremendous force, “his body all the while resisting as if it
were made of iron.”
Arrived at this point, des Mousseaux loses all patience, and
indignantly exclaims:
“Was the learned physician quite awake when writing the above
sentences?... If, perchance, the Drs. Calmeil and Figuier should
seriously maintain their assertions and insist on their theory, we are
ready to answer them as follows: ‘We are perfectly willing to believe
you. But before such a superhuman effort of condescension, will you
not demonstrate to us the truth of your theory in a more practical
manner? Let us, for example, develop in you a violent and terrible
passion; anger—rage if you choose. You shall permit us for a single
moment to be in your sight irritating, rude, and insulting. Of course,
we will be so only at your request and in the interest of science and
your cause. Our duty under the contract will consist in humiliating
and provoking you to the last extremity. Before a public audience,
who shall know nothing of our agreement, but whom you must
satisfy as to your assertions, we will insult you; ... we will tell you that
your writings are an ambuscade to truth, an insult to common sense,
a disgrace which paper only can bear; but which the public should
chastise. We will add that you lie to science, you lie to the ears of the
ignorant and stupid fools gathered around you, open-mouthed, like
the crowd around a peddling quack.... And when, transported beyond
yourself, your face ablaze, and anger tumefying, you shall have
displaced your fluids; when your fury has reached the point of
bursting, we will cause your turgescent muscles to be struck with
powerful blows; your friends shall show us the most insensible
places; we will let a perfect shower, an avalanche of stones fall upon
them ... for so was treated the flesh of the convulsed women whose
appetite for such blows could never be satisfied. But, in order to
procure for you the gratification of a salutary shampooing—as you
deliciously express it—your limbs shall only be pounded with objects
having blunt surfaces and cylindrical shapes, with clubs and sticks
devoid of suppleness, and, if you prefer it, neatly turned in a lathe.”
So liberal is des Mousseaux, so determined to accommodate his
antagonists with every possible chance to prove their theory, that he
offers them the choice to substitute for themselves in the experiment
their wives, mothers, daughters, and sisters, “since,” he says, “you
have remarked that the weaker sex is the strong and resistant sex in
these disconcerting trials.”
Useless to remark that des Mousseaux’s challenge remained
unanswered.
CHAPTER XI.
“Strange condition of the human mind, which seems to require that it should long
exercise itself in Error, before it dare approach the Truth.”—Magendie.
“La verité que je defends est empreinte sur tous les monuments du passé. Pour
comprendre l’histoire, il faut etudier les symboles anciens, les signes sacrés du
sacerdoce, et l’art de guerir dans les temps primitifs, art oublié aujourd’hui.”—
Baron Du Potet.
“It is a truth perpetually, that accumulated facts, lying in disorder, begin to
assume some order if an hypothesis is thrown among them.”—Herbert Spencer.