Professional Documents
Culture Documents
ebook download (eBook PDF) Technology In Action Complete, Global Edition 15th Edition all chapter
ebook download (eBook PDF) Technology In Action Complete, Global Edition 15th Edition all chapter
http://ebooksecure.com/product/technology-in-action-
complete-15th-edition-ebook-pdf/
http://ebooksecure.com/product/original-pdf-technology-in-action-
complete-15th-edition/
http://ebooksecure.com/product/ebook-pdf-technology-in-action-
complete-13th-edition/
http://ebooksecure.com/product/ebook-pdf-technology-in-action-
complete-14th-edition/
(eBook PDF) Technology In Action Complete 12th Edition
by Alan Evans
http://ebooksecure.com/product/ebook-pdf-technology-in-action-
complete-12th-edition-by-alan-evans/
http://ebooksecure.com/product/ebook-pdf-technology-in-action-
complete-16th-edition-by-alan-evans/
http://ebooksecure.com/product/ebook-pdf-technology-in-action-
introductory-15th-edition-by-alan-evans/
http://ebooksecure.com/product/ebook-pdf-business-in-action-
global-edition-9th-edition/
http://ebooksecure.com/product/ebook-pdf-business-in-action-8th-
global-edition-by-courtland/
GLOBAL
EDITION
Technology in Action
Complete
FIFTEENTH EDITION
Alan Evans
Kendall Martin
Mary Anne Poatsy
Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................... 116
Part 1: Collaborating and Working on the Web................................................................................................................ 118
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works.......................................................................................................................... 118
The Origin of the Internet.................................................................................................................................... 118
Objective 3.1 Describe how the Internet got its start.
How the Internet Works...................................................................................................................................... 120
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web................................................................................................ 121
Collaborating with Web Technologies................................................................................................................. 121
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps............................................................................................................. 123
SOUND BYTE: Blogging....................................................................................................................................................... 123
Communicating over the Web............................................................................................................................ 126
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web...................................................................................................................... 129
Conducting Business Online............................................................................................................................... 129
Objective 3.5 Describe how business is conducted using the Internet.
DIG DEEPER: How Cloud Computing Works.................................................................................................... 130
BITS&BYTES: Looking for Extra Money? Try a Side Hustle................................................................................ 131
E-Commerce Safeguards................................................................................................................................... 131
Objective 3.6 Summarize precautions you should take when doing business online.
HELPDESK: Doing Business Online...................................................................................................................................... 132
BITS&BYTES: Bitcoin: A Form of Virtual Currency............................................................................................. 133
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud................................................................. 135
MAKE THIS: MAKE: A Web-Capable App......................................................................................................... 136
Part 2: Using the Web Effectively....................................................................................................................................... 137
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web........................................................................................................... 137
Web Browsers.................................................................................................................................................... 137
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names................................................................................................................ 139
Objective 3.8 Explain what a URL is, and discuss its main parts.
Navigating the Web............................................................................................................................................ 140
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web.......................................................................... 141
Searching the Web Effectively............................................................................................................................ 142
Using Search Engines........................................................................................................................................ 142
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.
6 Contents
BITS&BYTES: Digital Assistants and Predictive Search...................................................................................... 143
Evaluating Websites........................................................................................................................................... 145
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
SOUND BYTE: Finding Information on the Web..................................................................................................................... 145
HELPDESK: Evaluating Websites.......................................................................................................................................... 145
TRENDS IN IT: Linked Data and the Semantic Web.......................................................................................... 146
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?........................................ 147
Using the Web Ethically...................................................................................................................................... 147
Digital Activism................................................................................................................................................... 147
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation........................................................................................................................................................ 148
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare?.................................................149
ETHICS IN IT: Cyber Harassment...................................................................................................................... 150
SOLVE THIS: Create a Report: Conducting Research on the Web..................................................................... 157
Chapter 4
Application Software: Programs That Let You Work and Play.............................. 158
Part 1: Accessing, Using, and Managing Software........................................................................................................... 160
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage
your software.
Software Basics................................................................................................................................................... 160
Application vs. System Software......................................................................................................................... 160
Objective 4.1 Compare application software and system software.
Distributing Software.......................................................................................................................................... 160
Objective 4.2 Explain the differences between commercial software and open source software, and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software........................................................................................................ 161
Managing Your Software.................................................................................................................................... 161
Purchasing Software.......................................................................................................................................... 161
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce.................................................................. 162
HELPDESK: Buying and Installing Software........................................................................................................................... 163
Installing and Uninstalling Software..................................................................................................................... 163
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of “Bloat”............................................................................................... 163
Upgrading Software........................................................................................................................................... 164
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work....................................................................................................... 164
SOUND BYTE: Where Does Binary Show Up?...................................................................................................................... 165
Software Licenses.............................................................................................................................................. 166
Objective 4.6 Explain how software licenses function.
ETHICS IN IT: Can I Borrow Software That I Don’t Own?.................................................................................. 167
TRY THIS: Citing Website Sources.................................................................................................................... 169
MAKE THIS: MAKE: A More Powerful App........................................................................................................ 170
Part 2: Application Software.............................................................................................................................................. 171
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software.................................................................................................................. 171
Productivity Software.......................................................................................................................................... 171
Objective 4.7 Categorize the types of application software used to enhance productivity, and describe their uses and features.
Contents 7
BITS&BYTES: Productivity Software Tips and Tricks.......................................................................................... 171
BITS&BYTES: How to Open Unknown File Types.............................................................................................. 172
BITS&BYTES: Going Beyond PowerPoint.......................................................................................................... 176
SOUND BYTE: Programming for End Users.......................................................................................................................... 178
Business Software.............................................................................................................................................. 180
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools............................................................ 182
Multimedia and Educational Software............................................................................................................... 182
Digital Multimedia Software................................................................................................................................ 182
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software........................................................................................................................................ 184
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software............................................................................................................................................ 185
App Creation Software....................................................................................................................................... 186
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror…........................................................................................................................... 187
Educational and Reference Software.................................................................................................................. 187
Objective 4.12 Categorize educational and reference software, and explain their features.
SOLVE THIS: Analyzing Benchmark Data.......................................................................................................... 195
Chapter 5
System Software: The Operating System, Utility Programs, and
File Management..................................................................................................... 196
Part 1: Understanding System Software........................................................................................................................... 198
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals....................................................................................................................... 198
Operating System Basics................................................................................................................................... 198
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use.................................................................................................................. 199
Objective 5.2 Explain the most common operating systems for personal use.
BITS&BYTES: Why Isn’t Everyone Using Linux?................................................................................................ 200
BITS&BYTES: Operating Systems for the Home................................................................................................ 201
Operating Systems for Machinery, Networks, and Business............................................................................... 201
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows?................................................................... 203
What the Operating System Does...................................................................................................................... 204
The User Interface.............................................................................................................................................. 204
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination...................................................................................................................................... 205
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage,
and peripheral devices.
SOUND BYTE: Using Windows Task Manager to Evaluate System Performance................................................................... 205
Software Application Coordination...................................................................................................................... 207
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human?................................................................... 208
Starting Your Computer...................................................................................................................................... 209
The Boot Process............................................................................................................................................... 209
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.
8 Contents
HELPDESK: Starting the Computer: The Boot Process......................................................................................................... 211
TRY THIS: Using Virtual Desktops in Windows 10............................................................................................. 214
MAKE THIS: MAKE: A Notification Alert............................................................................................................. 215
Part 2: Using System Software.......................................................................................................................................... 216
Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file
management capabilities, and utility programs.
The Windows Interface....................................................................................................................................... 216
Using Windows 10............................................................................................................................................. 216
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: The Snipping Tool....................................................................................................................... 217
File Management................................................................................................................................................. 219
Organizing Your Files.......................................................................................................................................... 219
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud............................................................................................................... 221
BITS&BYTES: Tips for Organizing Your Files...................................................................................................... 222
HELPDESK: Organizing Your Computer: File Management.................................................................................................... 223
Utility Programs................................................................................................................................................... 225
Windows Administrative Utilities.......................................................................................................................... 226
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work....................................................................................... 228
SOUND BYTE: Hard Disk Anatomy....................................................................................................................................... 228
SOLVE THIS: Mobile Operating Systems: Changing Market Share..................................................................... 237
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System..................... 238
Part 1: Evaluating Key Subsystems................................................................................................................................... 240
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the
CPU and memory subsystems.
Your Ideal Computing Device............................................................................................................................. 240
Moore’s Law...................................................................................................................................................... 240
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device............................................................................................................................ 241
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem.......................................................................................................................... 243
How the CPU Works.......................................................................................................................................... 243
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling............................................................................................................................ 247
Measuring CPU Performance............................................................................................................................. 247
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle..................................................................................................................... 249
Evaluating the Memory Subsystem................................................................................................................... 250
Random Access Memory................................................................................................................................... 250
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM....................................................................................................................................................... 252
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM.......................................................................................................................... 252
SOUND BYTE: Installing RAM............................................................................................................................................... 253
Contents 9
TRY THIS: Measure Your System Performance.................................................................................................. 255
MAKE THIS: MAKE: A Location-Aware App...................................................................................................... 256
Part 2: Evaluating Other Subsystems and Making a Decision........................................................................................ 257
Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem.................................................................................................................... 257
Types of Storage Drives...................................................................................................................................... 257
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 258
DIG DEEPER: How Storage Devices Work........................................................................................................ 259
Storage Needs................................................................................................................................................... 260
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Much Storage to Buy?........................................................................................................ 262
Evaluating the Media Subsystems..................................................................................................................... 263
Video Cards....................................................................................................................................................... 263
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Graphics Cards with SSD on Board............................................................................................ 265
TRENDS IN IT: USB 3.1 and USB-C................................................................................................................. 266
Sound Cards...................................................................................................................................................... 267
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components....................................................................................................... 267
Evaluating System Reliability and Moving On.................................................................................................. 269
Maintaining System Reliability............................................................................................................................. 269
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer...................................................................................................................... 271
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All.................................................................................................................. 272
SOLVE THIS: Laptop Alternatives...................................................................................................................... 279
Chapter 7
Networking: Connecting Computing Devices........................................................ 280
Part 1: How Networks Function......................................................................................................................................... 282
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals.................................................................................................................................. 282
Understanding Networks.................................................................................................................................... 282
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking................................................................................................................................ 283
Network Architectures........................................................................................................................................ 284
Network Designs................................................................................................................................................ 284
Objective 7.2 Explain the different ways networks are defined.
BITS&BYTES: The Rise of Wearable Technology............................................................................................... 286
Network Components......................................................................................................................................... 287
Transmission Media............................................................................................................................................ 287
Objective 7.3 Describe the types of transmission media used in networks.
SOUND BYTE: Installing a Home Computer Network............................................................................................................ 287
Basic Network Hardware.................................................................................................................................... 290
Objective 7.4 Describe the basic hardware devices necessary for networks.
Network Software............................................................................................................................................... 291
Objective 7.5 Describe the type of software necessary for networks.
10 Contents
TRENDS IN IT: How Smart Is Your Home?........................................................................................................ 292
Connecting to the Internet.................................................................................................................................. 292
Broadband Internet Connections........................................................................................................................ 292
Objective 7.6 Summarize the broadband options available to access the Internet.
Wireless Internet Access.................................................................................................................................... 294
Objective 7.7 Summarize how to access the Internet wirelessly.
BITS&BYTES: Net Neutrality.............................................................................................................................. 294
BITS&BYTES: 5G Is Coming—Is It Worth the Wait?.......................................................................................... 295
BITS&BYTES: Is Dial-Up Still an Option?........................................................................................................... 296
ETHICS IN IT: Ethical Challenges of the Internet of Things................................................................................. 296
TRY THIS: Testing Your Internet Connection Speed........................................................................................... 298
MAKE THIS: MAKE: Networked Devices........................................................................................................... 299
Part 2: Your Home Network................................................................................................................................................ 300
Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home network and
how to manage and secure a wireless network.
Installing and Configuring Home Networks...................................................................................................... 300
Planning Your Home Network............................................................................................................................. 300
Objective 7.8 Explain what should be considered before creating a home network.
Connecting Devices to a Network...................................................................................................................... 301
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative................................................................................... 302
BITS&BYTES: Analyzing Network Problems...................................................................................................... 305
Configuring Software for Your Home Network.................................................................................................... 305
Objective 7.10 Summarize how to configure home network software.
DIG DEEPER: P2P File Sharing......................................................................................................................... 307
Managing and Securing Wireless Networks..................................................................................................... 307
Troubleshooting Wireless Network Problems...................................................................................................... 307
Objective 7.11 Describe the potential problems with wireless networks and means to avoid them.
Securing Wireless Networks............................................................................................................................... 308
Objective 7.12 Describe how to secure wireless home network
SOUND BYTE: Securing Wireless Networks.......................................................................................................................... 310
HELPDESK: Managing and Securing Your Wireless Network...................................................................................... 310
SOLVE THIS: Home Networking Guide.............................................................................................................. 317
Chapter 8
Managing a Digital Lifestyle: Media and Ethics.................................................... 318
Part 1: The Impact of Digital Information......................................................................................................................... 320
Learning Outcome 8.1 You will be able to describe the nature of digital signals and how digital technology is used to
produce and distribute digital texts, music, and video.
Digital Basics....................................................................................................................................................... 320
Digital Convergence........................................................................................................................................... 320
Objective 8.1 Describe how digital convergence has evolved.
Digital vs. Analog................................................................................................................................................ 321
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing................................................................................................................................................. 323
E-Readers.......................................................................................................................................................... 323
Objective 8.3 Describe the different types of e-readers.
Using e-Texts...................................................................................................................................................... 324
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media..................................................................................................................................... 324
Contents 11
Digital Music........................................................................................................................................................ 325
Creating and Storing Digital Music...................................................................................................................... 325
Objective 8.5 Describe how digital music is created and stored.
BITS&BYTES: Digital Music Creation................................................................................................................. 327
Distributing Digital Music.................................................................................................................................... 327
Objective 8.6 Summarize how to listen to and publish digital music.
BITS&BYTES: Need Money for Your Band? Try Crowdfunding.......................................................................... 328
Digital Media........................................................................................................................................................ 328
Digital Photography............................................................................................................................................ 328
Objective 8.7 Explain how best to create, print, and share digital photos.
BITS&BYTES: Photo Edit on Your Phone........................................................................................................... 330
SOUND BYTE: Enhancing Photos with Image-Editing Software............................................................................................ 330
Digital Video....................................................................................................................................................... 331
Objective 8.8 Describe how to create, edit, and distribute digital video.
BITS&BYTES: Fly-By Drone Video..................................................................................................................... 332
TRENDS IN IT: Digital Asset Managers Needed!............................................................................................... 334
TRY THIS: Creating and Publishing a Movie....................................................................................................... 336
MAKE THIS: MAKE: A Video-Playing App......................................................................................................... 337
Part 2: Ethical Issues of Living in the Digital Age............................................................................................................ 338
Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain your
digital reputation.
Protection of Digital Property............................................................................................................................. 338
Intellectual Property............................................................................................................................................ 338
Objective 8.9 Describe the various types of intellectual property.
Copyright Basics................................................................................................................................................ 339
Objective 8.10 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright............................................................................................ 341
Copyright Infringement....................................................................................................................................... 342
Objective 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you
can legally use copyrighted material.
BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying................................................. 344
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission!........................................................... 346
Living Ethically in the Digital Era........................................................................................................................ 347
Plagiarism.......................................................................................................................................................... 347
Objective 8.12 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation......................................................................................................................... 349
Objective 8.13 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property............................................................................................................... 349
Protecting Your Online Reputation...................................................................................................................... 352
Objective 8.14 Describe what comprises your online reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights..................................................................................................... 354
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do................................................................ 355
SOLVE THIS: Intellectual Property and Copyright Basics.................................................................................. 363
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices........................ 364
Part 1: Threats to Your Digital Assets................................................................................................................................ 366
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers................................................................................................................................. 366
12 Contents
Identity Theft...................................................................................................................................................... 367
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
Hacking.............................................................................................................................................................. 367
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Hacking for Security................................................................................................................... 368
Computer Viruses................................................................................................................................................ 371
Virus Basics........................................................................................................................................................ 371
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus,
and the symptoms it may display.
SOUND BYTE: Protecting Your Computer............................................................................................................................. 372
Types of Viruses................................................................................................................................................. 373
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering..................................................................................................... 375
Online Annoyances............................................................................................................................................. 375
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering.............................................................................................................................................. 378
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter … Now What?.......................................................................... 378
Scareware.......................................................................................................................................................... 379
ETHICS IN IT: You’re Being Watched … But Are You Aware You’re Being Watched?...............................................380
HELPDESK: Threats to Your Digital Life................................................................................................................... 380
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches............................................................................. 381
TRY THIS: Testing Your Network Security.......................................................................................................... 383
MAKE THIS: MAKE: A Password Generator...................................................................................................... 384
Part 2: Protecting Your Digital Property............................................................................................................................. 385
Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Access to Your Digital Assets......................................................................................................... 385
Firewalls............................................................................................................................................................. 385
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
HELPDESK: Understanding Firewalls.................................................................................................................................... 387
Preventing Virus Infections.................................................................................................................................. 387
Objective 9.8 Explain how to protect your computer from virus infection.
Authentication: Passwords and Biometrics......................................................................................................... 390
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots............................................................................ 391
Anonymous Web Surfing: Hiding from Prying Eyes............................................................................................. 393
Objective 9.10 Describe ways to surf the web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords!..................................................... 395
Keeping Your Data Safe...................................................................................................................................... 395
Protecting Your Personal Information.................................................................................................................. 395
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools........................................................................................ 395
Backing Up Your Data........................................................................................................................................ 396
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places
you can store backup files.
Protecting Your Physical Computing Assets.................................................................................................... 400
Environmental Factors and Power Surges........................................................................................................... 400
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft............................................................................................................................ 400
Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems.
DIG DEEPER: Computer Forensics: How It Works............................................................................................ 402
SOLVE THIS: Computer Security....................................................................................................................... 411
Contents 13
Chapter 10
Behind the Scenes: Software Programming.......................................................... 412
Part 1: Understanding Programming................................................................................................................................ 414
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System.................................................................................................................. 414
Importance of Programming............................................................................................................................... 414
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle......................................................................................................................... 414
Objective 10.2 Summarize the stages of the system development life cycle (SDLC).
BITS&BYTES: Let Them See Your Work............................................................................................................ 416
Life Cycle of a Program....................................................................................................................................... 416
The Program Development Life Cycle................................................................................................................. 416
Objective 10.3 Define programming and list the steps in the program development life cycle (PDLC).
The Problem Statement...................................................................................................................................... 417
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 417
HELPDESK: Understanding Software Programming.............................................................................................................. 418
Algorithm Development...................................................................................................................................... 419
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Hackathons................................................................................................................................ 422
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and
Operators...................................................................................................................................................... 424
Coding............................................................................................................................................................... 424
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment (IDE) in coding.
Debugging......................................................................................................................................................... 431
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display....................................................................................................... 432
Testing and Documentation................................................................................................................................ 432
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona................................................................................................................ 434
MAKE THIS: MAKE: A Notepad........................................................................................................................ 435
Part 2: Programming Languages....................................................................................................................................... 436
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages......................................................................................................................... 436
Need for Diverse Languages.............................................................................................................................. 436
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language................................................................................................. 436
Selecting the Right Language............................................................................................................................. 437
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Coding for Zombies.................................................................................................................... 437
ETHICS IN IT: When Software Runs Awry......................................................................................................... 438
Exploring Programming Languages.................................................................................................................. 439
Tour of Modern Languages................................................................................................................................. 439
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Your Software Portfolio............................................................................................................... 443
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools.............................................. 447
Future of Programming Languages..................................................................................................................... 447
Objective 10.12 State key principles in the development of future programming languages.
14 Contents
HELPDESK: A Variety of Programming Languages................................................................................................................ 448
SOLVE THIS: Time Sheets................................................................................................................................. 455
Chapter 11
Behind the Scenes: Databases and Information Systems.................................... 456
Part 1: Database Fundamentals......................................................................................................................................... 458
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
Database Advantages......................................................................................................................................... 458
The Need for Databases..................................................................................................................................... 458
Objective 11.1 Explain what a database is and why databases are useful.
HELPDESK: Using Databases............................................................................................................................................... 460
Advantages of Using Databases......................................................................................................................... 461
Objective 11.2 Discuss the benefits of using a database.
Database Types................................................................................................................................................... 462
Relational Databases.......................................................................................................................................... 463
Objective 11.3 Describe features of relational databases.
Object-Oriented Databases................................................................................................................................ 464
Objective 11.4 Describe features of object-oriented databases.
Multidimensional Databases............................................................................................................................... 464
Objective 11.5 Describe features of multidimensional databases.
TRENDS IN IT: Emerging Technologies: Can Your Business Partner Deliver the Goods? Enhanced
Databases Can Help You Decide!.................................................................................................................. 465
Database Basics.................................................................................................................................................. 465
Database Components and Functions................................................................................................................ 465
Objective 11.6 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................ 469
BITS&BYTES: Music Streaming Services Use Databases.................................................................................. 469
Inputting and Managing Data.............................................................................................................................. 470
Objective 11.7 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL).............................................................................................. 475
BITS&BYTES: Data Dashboards: Useful Visualization Tools............................................................................... 477
TRY THIS: Using Excel’s Database Functions.................................................................................................... 479
MAKE THIS: MAKE: A Family Shopping List...................................................................................................... 480
Part 2: How Businesses Use Databases............................................................................................................................ 481
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data
mining to manage data and how business information systems and business intelligence are used to make business
decisions.
Data Warehousing and Storage......................................................................................................................... 481
Data Warehouses and Data Marts...................................................................................................................... 481
Objective 11.8 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases....................................................................................................................... 481
BITS&BYTES: Data Warehouses Are Going to the Cloud.................................................................................. 483
Data Mining........................................................................................................................................................ 483
Objective 11.9 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed................................................................................. 485
ETHICS IN IT: Data, Data Everywhere, but Is It Protected?................................................................................ 486
Using Databases to Make Business Decisions................................................................................................ 487
Business Information Systems............................................................................................................................ 487
Objective 11.10 Describe the main types of business information systems and how they are used by business managers.
Contents 15
BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web....................................................... 488
SOUND BYTE: Analyzing Data with Microsoft Power BI Suite................................................................................................ 492
TRENDS IN IT: Mobile Business Intelligence...................................................................................................... 493
SOLVE THIS: College Database......................................................................................................................... 501
Chapter 12
Behind the Scenes: Networking and Security in the Business World.........................502
Part 1: Client/Server Networks and Topologies................................................................................................................ 504
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on
them, and network topologies used to construct them.
Client/Server Network Basics............................................................................................................................ 504
Networking Advantages..................................................................................................................................... 504
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks......................................................................................... 505
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks......................................................................................................................... 506
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Your Car Network Can Be Hacked.............................................................................................. 509
Servers and Network Topologies....................................................................................................................... 510
Servers............................................................................................................................................................... 510
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers.................................................................................................................................................... 511
TRENDS IN IT: Virtualization: Making Servers Work Harder............................................................................... 512
Network Topologies............................................................................................................................................ 513
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
SOUND BYTE: Network Topology and Navigation Devices.................................................................................................... 515
TRY THIS: Sharing Folders on a Home Network Using Windows....................................................................... 520
MAKE THIS: MAKE: An App That Shares.......................................................................................................... 521
Part 2: Setting Up Business Networks.............................................................................................................................. 522
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and
network navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media............................................................................................................................................ 522
Wired and Wireless Transmission Media............................................................................................................. 522
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Go Green with Mobile Apps........................................................................................................ 524
Network Adapters and Navigation Devices...................................................................................................... 524
Network Adapters.............................................................................................................................................. 524
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses................................................................................................................................................. 526
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers......................................................................................................................... 527
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and Network Adapters....................................................................................................... 528
Network Operating Systems and Network Security........................................................................................ 528
Network Operating Systems............................................................................................................................... 529
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Smart Lighting for Smart Homes................................................................................................ 529
Client/Server Network Security........................................................................................................................... 530
Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards.............................................................................. 531
SOUND BYTE: A Day in the Life of a Network Technician...................................................................................................... 532
16 Contents
ETHICS IN IT: How Should Companies Handle Data Breaches?....................................................................... 534
BITS&BYTES: Are Your Photos Helping Criminals Target You?.......................................................................... 535
SOLVE THIS: Cyber Security Flyer and Mail Merge............................................................................................ 543
Chapter 13
Behind the Scenes: How the Internet Works......................................................... 544
Part 1: Inner Workings of the Internet.............................................................................................................................. 546
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking.............................................................................................................. 546
Management...................................................................................................................................................... 546
Objective 13.1 Describe the management of the Internet.
Networking Components.................................................................................................................................... 547
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission.............................................................................................................................................. 548
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You............................................................................................ 548
Internet Identity.................................................................................................................................................... 551
IP Addresses...................................................................................................................................................... 551
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols............................................................................ 551
BITS&BYTES: What’s Your IP Address?............................................................................................................ 552
BITS&BYTES: Internet of Things Goes Shopping............................................................................................... 552
SOUND BYTE: Creating Web Pages with Squarespace........................................................................................................ 553
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols............................................................... 554
Domain Names.................................................................................................................................................. 555
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
BITS&BYTES: Server in the Cloud..................................................................................................................... 556
TRY THIS: Ping Me............................................................................................................................................ 559
MAKE THIS: Make: An Earthquake Detector..................................................................................................... 560
Part 2: Coding and Communicating on the Internet........................................................................................................ 561
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies............................................................................................................................................... 561
Web Development.............................................................................................................................................. 561
Objective 13.6 Compare and contrast a variety of web development languages.
BITS&BYTES: CodePen: An Editing Community for Web Designers.................................................................. 562
SOUND BYTE: Client-Side Web Page Development.............................................................................................................. 565
Application Architecture...................................................................................................................................... 565
Objective 13.7 Compare and contrast server-side and client-side application software.
BITS&BYTES: Free Code Camp........................................................................................................................ 567
Communications over the Internet.................................................................................................................... 567
Types of Internet Communication....................................................................................................................... 567
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
BITS&BYTES: Google Inbox.............................................................................................................................. 569
Encryption.......................................................................................................................................................... 570
Objective 13.9 Explain how data encryption improves security.
BITS&BYTES: Numbers: We Wouldn’t Have Encryption Without Them!............................................................ 571
ETHICS IN IT: Do We Really Want Strong Encryption?...................................................................................... 572
HELPDESK: Keeping E-Mail Secure...................................................................................................................................... 572
Contents 17
TRENDS IN IT: Cognitive Computing................................................................................................................ 573
SOLVE THIS: Creating an HTML Document...................................................................................................... 581
Appendix A
The History of the Personal Computer................................................................... 583
Appendix B
Careers in IT............................................................................................................ 595
Glossary........................................................................................................................................................................ 609
Index............................................................................................................................................................................. 627
18 Contents
About the Authors
For my wife, Patricia, whose patience, understanding, and support continue to make this work possible …
especially when I stay up past midnight writing! And to my parents, Jackie and Dean, who taught me the
best way to achieve your goals is to constantly strive to improve yourself through education.
Alan Evans
For all the teachers, mentors, and gurus who have popped in and out of my life.
Kendall Martin
For my husband, Ted, who unselfishly continues to take on more than his fair share to support me
throughout this process, and for my children, Laura, Carolyn, and Teddy, whose encouragement and love
have been inspiring.
Mary Anne Poatsy
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching, and they are a continu-
al source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and children made
sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience, a few individuals
deserve special mention. The constant support and encouragement we receive from Jenifer Niles, Executive
Portfolio Product Manager, and Andrew Gilfillan, VP, Editorial Director, continually make this book grow and
change. Our heartfelt thanks go to Shannon LeMay-Finn, our Developmental Editor. Her creativity, drive, and
management skills helped make this book a reality. We also would like to extend our appreciation to Pearson
Content Producers, particularly Laura Burgess, and the vendor teams, who work tirelessly to ensure that our
book is published on time and looks fabulous. The timelines are always short, the art is complex, and there are
many people with whom they have to coordinate tasks. But they make it look easy! We’d like to extend our
thanks to the media and MyLab IT team—Eric Hakanson, Becca Golden, Amanda Losonsky, and Heather
Darby for all of their hard work and dedication.
There are many people whom we do not meet at Pearson and elsewhere who make significant contributions
by designing the book, illustrating, composing the pages, producing the media, and securing permissions. We
thank them all.
And finally, we would like to thank the reviewers and the many others who contribute their time, ideas, and
talents to this project. We appreciate their time and energy, as their comments help us turn out a better product
each edition. A special thanks goes to Rick Wolff, a wonderfully talented infographic designer who helped by
creating the infographics for this text.
20 Acknowledgments
Letter from the Authors
• TechBytes Weekly is a weekly blog that helps you keep • Helpdesks are interactive lessons based on chapter
your course current by providing interesting and relevant objectives. Students play the role of a helpdesk staffer
news items and ready-to-use discussion questions. assisting customers via a live chat, decision-based simulation.
• Make This! Projects provide activities where students build • Sound Bytes provide an audio/visual lesson on additional
programs that run on their mobile devices. Most of the topics related to the chapter, including a brief quiz at the end.
chapters use App Inventor to build Android apps that can • IT Simulations provide 13 individual scenarios that
be installed on any Android device or emulated for students students work through in an active learning environment.
using iOS devices. Each project includes instructions and a
REVIEW: Self-check resources keep learning
how-to video.
on track
Instructor Chapter Tabs provide teaching tips, homework
• Chapter Overview Videos for Parts 1 and 2 of the chapter
and assessment suggestions, brief overviews of each
provide an objective-based review of what students should
chapter’s Try This, Make This, and Solve This exercises, as
have learned. Videos have a short quiz and can be
well as select Sound Byte talking points and ethics debate
accessed from mobile devices for a quick review.
starters.
What’s New 23
Another random document with
no related content on Scribd:
“Go back,” he said. “Go back. Get away from here, now!”
It was all returning to me ... I knew why he looked so strange, why he
spoke so flatly, why that interest watched us from his eyes....
I didn’t know. The knowledge brushed the edges of my awareness
and withdrew. I stumbled forward, Fitzgerald beside me excited and
eager, calling out a question to the man.
He made no answer. He took one last look at us, blank, intent,
impersonal, his eyes as blue as the water in the lake. And then he
dropped straight downward, without stooping, without seeming to
move a muscle. He vanished behind the knee-high ledge of rock.
We reached it together, shouldering one another in our eagerness.
We bent over the ledge. The man had disappeared, leaving no sign
behind him. Nothing but a little hollow in the rock where he had
stood, a hollow no bigger than a saucer, in which blue water swayed.
We stood there half stunned, for the time it took the water to gurgle
downward and vanish in the hole and surge up again twice from
some action of subterranean waters.
Memory was battering at the closed doors of my mind.
I knew the answer. I knew it well—but the door stayed shut. The time
to remember was not yet.
They were watching us from the edge of the water by the time we
had come within hailing distance. One by one we saw them wade up
from the blue depths and take their stand in the edge of the water,
ankle deep, rivulets running from their hair and clothing—drowned
men and women, watching us.
They weren’t drowned, of course. They looked perfectly healthy and
there was more intelligence and animation in their faces than had
looked at us from the vanished man of the ledge.
These were real people. The other had not been. I thought that much
must be evident even to Fitzgerald, though it was a subterranean
knowledge running through my mind that told me so.
“Wait, Jim,” Fitzgerald said suddenly, catching my elbow. “I—don’t
like ’em. Stand back.” He was watching the silent people in the
water.
I let him stop me. Now that I was here I wasn’t certain what came
next. The terrible urgency still rang its alarm in the closed room of
my brain but until I could gain entry into that room I wouldn’t know
what was expected of me.
Fitzgerald waved to the people in the water, a beckoning gesture.
They stared at us.
Then they turned and talked briefly together, glancing at us over their
shoulders. Finally one of the women came up out of the lake and
picked her way toward us over the lava-like rock.
Finally one of the women came up out of the lake and picked her
way toward us
She had long fair hair sleeked back from her face by the water and
hanging like pale kelp across her shoulders. Her blue dress clung to
her over a beautiful, supple body, water spattering from the dripping
cloth and the dripping hair as she came.
Belatedly I remembered that crashed air-liner and its vanished
people. Were these the passengers and crew? I thought they were.
But what had induced them against all reason to come this far into
the deadly air of the Ring? The lake? Up to that point the thing was
possible, but it was sheer madness from the moment I imagined
them entering the water.
The lake, then? Was there something inexplicably strange and
compelling about the lake itself that had drawn them in and sent
them out again like this, alive, unharmed in the singing air that made
our counters clatter?
I looked out over the waters for an answer, and—
And I got my answer—or part of it.
For out there on the rippling blue surface a shadow moved. A long,
coiling shadow cast not from above but from below. Deep down in
the lake something was stirring.
I strained my eyes and in the sealed deeps of my mind terror and
exultation moved in answer to that coiling darkness. I knew it. I
recognized it. I ... The recognition passed.
The vast shadow moved lazily, monstrously, moved and coiled and
drew itself in under the cliffs.
Slowly it disappeared, coil by coil, shadow by shadow.
I turned. The fair-haired woman was standing before us; gazing into
our faces with a remote, impersonal curiosity. It was as if she had
never seen another human creature before and found us interesting
but—disassociated. No species that might share relationship with
her.
“You’re from the liner?” I asked, my voice reverberating in my own
ears inside the helmet. “We—we can take you back.” I let the words
die. They meant nothing to her. They meant no more than the clatter
of our belt-counters or the patter of drops around her on the rocks.
“Jim.” Fitzgerald’s voice buzzed in my earphones. “Jim, we’ve got to
take her back with us. She’s out of her head. They all are—don’t you
see? We’ve got to save them.”
“How?” I tried to sound practical. “We haven’t got room. There’s a full
liner load here.”
“We can take this one.” He reached out and took her arm gently. She
let him, her eyes turning that remote, impersonal gaze upon his face.
“It’s probably too late,” he said, looking at her with compassion, “but
we can’t leave her here, can we?”
I was watching his hand on her arm and a thought came to me out of
nowhere, a fact that seemed to slip through the closed doors in my
mind as they opened a tiny crack. This girl was flesh and blood. A
hand closed on her arm met firm resistance. But I knew that if I had
touched that first man my hand would have closed over the smooth
instability of water.
I looked at the girl’s face where a passing breeze brushed it, and a
shiver went down my back. For it was a warm breeze, drying her hair
and cheek where it blew—and I saw dark, wrinkled desiccation
wherever dryness touched her skin. The sleek fair hair lost its
silkiness and turned brown and brittle, the satiny cheek darkened,
furrowed....
I knew if she left the lake she would die. But it didn’t matter. I knew
there was no actual danger, either way. (Danger to what? From
what? No use asking myself that yet—the door would be open in its
own time.)
I took her other arm. Between us she went docilely toward the
waiting copters, saying nothing. I don’t think Fitzgerald noticed what
that drying breeze was doing to her until we were nearly at the edge
of the Ring.
By then it was too late to take her back even if he had understood
what the trouble was.
I heard Fitzgerald catch his breath but he said nothing and neither
did I.
We lifted her into his copter. I took off behind him and the visors were
silent between our ships as we flew back toward Base. What could
we have said to each other then?
CHAPTER III
Living Lake
Thirty minutes after we hit the Base the girl was in a jury-rigged
hydrating tank, wrapped in wet sheets, with a slow trickle of fresh
warm water soaking them. Even her face was loosely covered, and I
was glad of that. It was an old woman’s face by now, drawn tight and
furrowed over her skull. Only an arm was bare, shriveled flesh
beneath which the tendons stood sharply etched.
The arm was bare for the needle that fed sodium pentothol into a
vein, slowly, under the watchful eye of Sales, one of our best Base
medics. We knew that presently, when the drug began to cloud her
mind, Sale’s skillful questions would start drawing out the memories
of what had happened to her, reconstructing the basic scenes which
had led to—this.
Or—we hoped they would.
“It looks like aphasia,” Sales murmured. “No brain injury so far as we
know yet, but—”
“Chief!” It was Davidson, touching my arm. We all turned in the half-
darkness that was part of this narcosynthesis treatment. “Chief, the
Mobile Staff’s on its way down here. They vised after you left.”
“What for?” I asked sharply, a nervous dread knotting my stomach.
“I don’t know. They wouldn’t say. You’re the boss, after all.”
But I wasn’t the boss of Mobile Staff. They were bigger than I, the
bureau of specialists that controlled the administration of all the
Rings. They were the bosses. And if they came here now ...
I caught Davidson’s eye in the gloom. Very slightly he shook his
head. The secret of Williams’ death was still safe, then. But not for
long. And if the Staff talked to Fitzgerald about the lake ...
I made an enormous effort and fought down the rising panic.
Information first. Then action. I had to keep that order.
Sales grunted and I looked back, forcing my attention to the
business at hand.
“She must have the tolerance of an elephant,” Sales said, eyeing the
tube through which sodium pentothol still fed into the girl’s arm. “Or
else there’s some chemical metamorphosis—I don’t know. I’ve given
her enough to put a dozen men to sleep. But look at her.”
I didn’t like to look at her. It was obvious to me that she was dying.
Yet when Sales pushed the wet sheets back from her face the
impersonal, disinterested attention still dwelt upon the ceiling, fully
awake, uncaring, hearing nothing we said, feeling nothing we did.
Fitzgerald said, “How could she have breathed under water?”
“She couldn’t.” Sales scowled at him. “There’s no physiological
change at all. Her respiratory system’s normal.”
“She must have,” Fitzgerald said stubbornly. “I know what we saw.”
“Anything’s possible in a Ring,” Sales admitted, voicing an aphorism.
“But I don’t see how it could have worked.” He looked up at me.
“How important is this, chief?”
I told him.
“Give me an hour,” Sales said briefly when I had finished. “I’m going
to try something else. Several other things. Maybe one of ’em will
work.”
“One of ’em’s got to,” I told him, getting up.
In that hour a lot happened. Sales found what he wanted, for one
thing. For another, the Mobile Staff arrived. Williams’ body was
found. And as for me—it was the hour that marked the turning point
in my life.
Williams’ death was reported on my private visor as soon as I got
back to my office. I could feel Davidson’s silence like a tangible thing
as he listened to the exclamations and incredulity of the others.
All I could do was order the usual investigations got under way
immediately. At that moment I decided not to speak of my own
presence when he died. I couldn’t let myself be diverted by useless
questions on a subject only distantly related to my own terrible
problem.
Worse than ever that deathly fear was stirring restlessly behind the
closed doors of my unconscious. I knew the doors would swing open
soon. Little by little they had let facts escape the barrier, and the
barrier itself would be ready to fall.... Soon, I thought, soon.
Looking back now I lose my time-sense about that eventful hour. I
think we were still lost in dismayed wonder over Williams when the
visor flickered and then framed the grim, creased face of Mobile
Staff’s chief, Lewis.
There was a hunted, nightmare quality about this piling of crisis upon
crisis, I thought, as I went down to the reception hall to welcome my
superiors. If only I could find five minutes of peace to try again those
slowly opening doors!
Mobile Staff wears black uniforms. If all Bio employees are carefully
tested then Mobile men are screened with such stringent care that
there is reason to marvel how anyone ever passes their tests. All of
these men in their severe black looked taut, nervous, keen with an
edge almost ruthless in its steely temper.
“What about this lake development in Ring Seventy-Twelve?” was
the first thing Lewis said to me as we walked back toward my office.
It couldn’t have been worse, I told myself. If they had timed
themselves deliberately they couldn’t have chosen a worse time.
“Three of us have seen it closely,” was all I answered. “You’ll want to
discuss it with us in detail, I suppose.”
Lewis nodded crisply. We didn’t speak again until we were settled in
my office, Davidson and Fitzgerald ready for questions beside me.
We told what—overtly—we knew. It was Lewis, of course, who
spoke with decision.
“I think we’d better destroy the thing pronto.”
“Frankly, sir—” this was Davidson “—frankly, I’d think that over first.
The thing’s isolated, whatever it is. We’d run the risk of scattering it
abroad.”
“I incline that way myself,” I said quickly. “Isolation. Ring it off, reroute
air traffic. Leave it alone and study it ... study it?” I suspected that
was wrong. A warning bell had clanged in my brain.
Lewis sat there silently, shifting his keen glance from face to face.
Just as he drew his breath to speak my desk visor buzzed.
“Report ready on Williams’ death, sir,” an impersonal voice said.
“All right. Hold it awhile,” I began. But Lewis bent forward and gave
the face in the visor a narrowed glance.
“No, let’s have it right now,” he said. Despairingly I wondered how
much he knew and how much that abnormally keen brain had
guessed already of the undercurrents running swiftly beneath the
surface of events here.
The face in the visor glanced at me. I shrugged. Lewis was boss as
long as Mobile Staff remained here.
“Body of J. L. Williams, assistant to chief, was found in a locker in his
own office forty minutes ago,” the report began. “The shot was fired
from....” The voice went off into medical and ballistic details I ceased
to hear. I was turning over in my mind crazy questions about how I
could prevent an immediate close study of the lake at the very best,
and at the worst its destruction.
“. . . revolver of this caliber possessed only by Chief Owen himself,”
the visor declared. I woke with a start. “Last men seen with the
deceased were Robert Davidson and Chief Owen. Chief Owen
subsequently suppressed a report from Ring Station 27 and ordered
a copter for immediate departure. He then took off for—”
The visor buzzed suddenly and the monotoned report blanked out. It
was an emergency interruption. Very briefly Dr. Sales’ face flashed
upon the screen.
“This is urgent, Chief,” he said, looking into my eyes significantly.
“Could you spare me five minutes in my lab right now?”
It seemed like a heaven-sent relief. I glanced at Lewis for
permission. His gaze was cold and suspicious but he nodded after a
moment and I got up with a single look at Davidson’s deliberately
blank face and went out.
CHAPTER IV
Voice of the Lake
With stunning suddenness, out of my memory came the vision of a
great eye staring up at me through the pale fog as I maneuvered our
copter above the Ring when Davidson and I first visited it.
The Eye was the lake, a vast translucent lens that had caught us like
birds in a nest and drawn us down. The power of its compelling
summons pouring from the lens into our brains, like sunshine into a
darkened room.
“No,” I said thickly. “No, I saw nothing. Go on.”
“What its origin was I can’t even guess,” Sales said. “But originally
some molecule like a gene, out of a million other molecules in that
Ring area, suffered a liberation of energy when a secondary ionizing
particle shot past and it changed from a gene to—something else.
Something that grew and grew and grew.
“Most of the development must have taken place underground. I
think the organism was complete when that cave-in occurred that
exposed it to the light and to our attentions. It developed amazingly,
into forms so complex we may never understand them exactly.” He
smiled grimly.
“If we’re lucky we never will. I can tell you this much, though—it
recognized its danger. Perhaps electric impulses from our own
brains struck answering chords in the—the organism. And it knew it
had to defend itself, fast.
“Now the lake has one fatal weakness. By that I think we can destroy
it. I believe the organism is quite aware of this because of the way it
chose to combat us.” He paused, looking at me so strangely that I
almost acted, in that silent moment. But just as I was gathering my
muscles to rise, he began again.
“The girl told me what happened when that air-liner came down. It
must have been sheer accident, its making a forced landing at the
edge of the Ring. Radioactivity blanked out their communications
and of course the air itself was close to deadly. There didn’t seem
any hope at all for the people in the ship.
“The girl said many of them complained of feeling—well, call it
attention—focused on them. I know now it was the lake itself, that
gigantic organism, studying them, slowly working around to a
decision about its next move. Then it came to a conclusion that may
not yet have reached its final equation.
“The passengers saw a man stand up from behind a rock near them.
The girl said he looked familiar. He shouted and waved them away.
He warned them it would mean their death if they came closer. He
vanished. But the passengers were still trying to get a message out
and they stayed in the ship. The man appeared three times in all,
each time warning them away in stronger and stronger terms.
“Finally he rose from behind a rock very near them and this time he
invited them into the Ring. They were surprised to find that when
seen this close he was a mirror image of one of their crew members.
The image beckoned and ordered them in. They didn’t want to obey.
But they went.
“That image, as you may have deduced, was a water-figure created
by the lake itself, no one knows how completely. It may have been
ninety percent illusion, shaped in the minds of the watchers. But
you’ll notice the lake had to imitate one of the crew. It didn’t at that
time know enough about human bodies to improvise.
“It did know a lot, though, about human minds. In fact, its power over
them and its amazing selectivity make me suspect that the original
gene from which the organism developed might once have been
human or close to it.
“The water image was the lake’s first attempt to fight off mankind.
The attempt failed. In other words an imitation wouldn’t do. But the
real thing was close at hand for experimentation.
“What happened next no one will ever know. Logically the organism
must have moved forward another step in its defense against
invasion by mankind. In effect it created antibodies. It was
inoculating itself with the virus of humanity in an effort to immunize
itself against a later attack.
“But it had to effect a change in the humans before it could absorb
them. Physically they must be changed to live under the lake and
mentally they had to alter radically to stay there of their own will. It
was their will the lake attacked. You saw that.
“I said before that something had apparently been washed from the
mind of that girl we saw and some other basic drive substituted in
her. I believe now I was nearer the truth than I guessed.” He looked
at me keenly, almost speculatively.
“If I were in a spot like that,” he said, “with the problem of altering a
human being’s whole emotional outlook, I think I’d strike straight at
the root. It would be much simpler than trying to blanket his impulses
with anything like hypnotism, for instance.
“I think that for the instinct of self-preservation those people now
have another drive—instinct for the preservation of the Organism. It
would be so simple, and it would work so well.”