Download as pdf or txt
Download as pdf or txt
You are on page 1of 117

Using Information Technology 11th

Edition Williams Test Bank


Go to download the full and correct content document:
https://testbankdeal.com/product/using-information-technology-11th-edition-williams-t
est-bank/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Using Information Technology 10th Edition Williams Test


Bank

https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-test-bank/

Using Information Technology 10th Edition Williams


Solutions Manual

https://testbankdeal.com/product/using-information-
technology-10th-edition-williams-solutions-manual/

Information Technology for Management 11th Edition


Turban Test Bank

https://testbankdeal.com/product/information-technology-for-
management-11th-edition-turban-test-bank/

MGMT 11th Edition Williams Test Bank

https://testbankdeal.com/product/mgmt-11th-edition-williams-test-
bank/
Information Technology Auditing 3rd Edition Hall Test
Bank

https://testbankdeal.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/

Information Technology Auditing 4th Edition Hall Test


Bank

https://testbankdeal.com/product/information-technology-
auditing-4th-edition-hall-test-bank/

Managing Information Technology 7th Edition Brown Test


Bank

https://testbankdeal.com/product/managing-information-
technology-7th-edition-brown-test-bank/

Information Technology Project Management 9th Edition


Schwalbe Test Bank

https://testbankdeal.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/

Information Technology for Managers 1st Edition


Reynolds Test Bank

https://testbankdeal.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Chapter 06

Communications, Networks, and Cyberthreats: The Wired and


Wireless World

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.

A. continuous
B. digital
C. sequential
D. analog

2. Each zero and one signal represents a ________.

A. bit
B. byte
C. kilobyte
D. megabyte

3. Which of the following is NOT an analog device?

A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone

6-1
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be _________.

A. spontaneous
B. digital
C. sequential
D. analog

5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.

A. printer
B. scanner
C. modem
D. digitizer

6. A person sending a document over a phone line by converting a computer's digital signals to
analog signals uses a ________.

A. printer
B. scanner
C. digitizer
D. modem

7. A ________ is a system of interconnected computers, telephones, or communications devices


that can communicate and share resources.

A. terminal
B. router
C. network
D. server

6-2
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8. A network that covers a wide geographical area is called a ________.

A. LAN
B. WAN
C. MAN
D. HAN

9. A network that covers a city or a suburb is called a ________.

A. WAN
B. LAN
C. MAN
D. Internet

10. Networks are structured in two principle ways: client/server and ________.

A. intranet
B. host computer
C. extranet
D. peer to peer

11. A network that operates without relying on a server is the ________ network.

A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

6-3
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. A computer that acts like a disk drive, storing the programs and data files shared by users on
a LAN, is the ________ server.

A. file
B. web
C. host
D. mail

13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.

A. extranet
B. intranet
C. LAN
D. MAN

14. A virtual private network may include ________.

A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

15. A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.

A. VPN
B. intranet
C. firewall
D. protocol

6-4
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
16. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.

A. host
B. protocol
C. database
D. packet

17. A mainframe computer that controls a large network is called the ________ computer.

A. slave
B. host
C. client
D. node

18. Any device that is attached to a network is referred to as a ________.

A. server
B. host
C. node
D. router

19. A ________ is a fixed-length block of data for transmission.

A. node
B. protocol
C. packet
D. backbone

6-5
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. A common connection device that connects computers to a network and that sends
messages (checks packets) between sender and receiver nodes is called a ________.

A. router
B. gateway
C. switch
D. bridge

21. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.

A. router
B. gateway
C. hub
D. host

22. A device that joins multiple wired and/or wireless networks in a home office is a ________.

A. node
B. router
C. bridge
D. firewall

23. In an organization, all computer networks are connected to the Internet by a "main highway"
called a ________.

A. skeleton
B. backbone
C. gateway
D. router

6-6
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?

A. ring
B. bus
C. hub
D. star

25. In the ________ network topology, communications devices are connected to a single cable
with two endpoints.

A. ring
B. bus
C. star
D. peer-to-peer

26. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?

A. ring
B. bus
C. star
D. peer-to-peer

27. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?

A. ring
B. bus
C. star
D. peer-to-peer

6-7
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
28. ________ is the most common and most widely used LAN technology, with networked devices
in close proximity; it can be used with almost any kind of computer. Most microcomputers
come with a port for this type of network connection, which uses cable.

A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet

29. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition
telephone systems, is known as ________.

A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?

A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

31. A type of wired communications technology used to connect equipment in a home network is
the following:

A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

6-8
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. What wired communications medium consists of dozens or hundreds of thin strands of glass
or plastic?

A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

33. The ________ is the basis for ALL telecommunications signals.

A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

34. The ________ is the range of frequencies that a transmission medium (channel) can carry in a
particular period of time.

A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
wireless network and content providers?

A. LAN
B. WAN
C. WAP
D. HAN

6-9
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. Which of the following is NOT a type of wireless communications media?

A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

37. What form of wireless transmission sends data to an AM or FM receiver?

A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio

38. Which of these types of wireless transmission is limited to line-of-sight communications?

A. broadcast radio
B. broadband
C. microwave
D. WAP

39. Transmitting a signal from a ground station to a satellite is called ________.

A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

6-10
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. The highest level that a satellite can occupy in space is known as ________.

A. geostationary earth orbit (GEO)


B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (LEO)

41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used to
identify earth locations.

A. GEO
B. MEO
C. LEO
D. HEO

42. Broadband technology (wireless digital services) is also referred to as ________-generation


wireless services.

A. first
B. second
C. third
D. fourth

43. Which of the following is NOT a type of long-distance wireless two-way communications
device?

A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

6-11
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?

A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

45. What short-distance wireless standard is used to link cell phones, computers, and
peripherals at distances of up to about 33 feet?

A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

46. A ________ attack disables a computer system or network by making so many requests of it
that it overloads it and keeps other users from accessing it.

A. worm
B. virus
C. denial-of-service
D. Trojan horse

47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk/flash drive.

A. worm
B. rootkit
C. Trojan horse
D. patch

6-12
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?

A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

49. A botmaster uses malware to hijack hundreds or thousands of computers and controls them
remotely; the controlled computers are called ________.

A. robots
B. zombies
C. worms
D. logic bombs

50. Which of the following is NOT a way to spread a virus?

A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
one?

A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

6-13
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. What is the science, often used in computer security systems, of measuring individual body
characteristics?

A. encryption
B. decryption
C. rootkit
D. biometrics

53. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?

A. encryption
B. decryption
C. password
D. biometrics

True / False Questions

54. Analog refers to communications signals represented in a binary format.

True False

55. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be digital.

True False

56. A thermometer and a speedometer are examples of analog devices.

True False

6-14
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Telephones have always been digital devices.

True False

58. A modem converts digital signals into analog signals so they can be sent over a telephone
line.

True False

59. "Modem" is short for modulate/demodulate.

True False

60. Capturing music digitally means that one has an exact duplicate of the music.

True False

61. A network is a system of interconnected computers and communications devices that can
communicate and share resources.

True False

62. The Internet is a WAN.

True False

63. A LAN is a type of network that covers a wide geographical area.

True False

64. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.

True False

6-15
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is called a file server.

True False

66. "File server" and "database server" are different names for the same type of server.

True False

67. Peer-to-peer networks are less stable than client-server networks because in the former
certain shared resources reside on each user's machine.

True False

68. Virtual private networks (VPNs) are private networks that use a public network (usually the
Internet) instead of private, leased (expensive) lines to connect remote sites.

True False

69. If you have one computer, you need firewall hardware; if you have more than one (networked)
computer, then a software firewall should be used.

True False

70. In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.

True False

71. Routers join multiple wired and/or wireless networks commonly in offices and home offices.

True False

72. A gateway is an interface device permitting communication between similar networks.

True False

6-16
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. An interface device used to connect the same types of networks is called a node.

True False

74. The backbone is the main communications route in a bus network topology.

True False

75. In a bus network, all computers and communications devices are connected in a continuous
loop.

True False

76. Traditional landline telephone systems use twisted-pair wire as their communications
medium.

True False

77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.

True False

78. Ethernet is a long-distance wireless communications connection.

True False

79. One wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.

True False

80. All wired and wireless communications media use the electromagnetic spectrum of radiation.

True False

6-17
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.

True False

82. The two general classes of bandwidth are long and short.

True False

83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.

True False

84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.

True False

85. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.

True False

86. Infrared transmission is a type of low-frequency wireless transmission that is short-range


and line-of-sight.

True False

87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.

True False

88. Communications satellites are microwave relay stations in orbit around the earth.

True False

6-18
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
89. Satellite orbits are at three levels: GEO, MEO, and LEO.

True False

90. A larger number of geostationary earth orbit (GEO) satellites are required for global coverage
than mid-earth orbit (MEO) satellites.

True False

91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify earth
locations.

True False

92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.

True False

93. GPS satellites use Medium-Earth-Orbits.

True False

94. Cellphones are cellular radios.

True False

95. Analog cellphones were 1G phones.

True False

96. Analog cellphones are 2G (second-generation) phones.

True False

97. Cellphones are basically two-way radios.

True False

6-19
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.

True False

99. Wi-Fi is a short-range wireless connection for LANs.

True False

100.The short-range, wireless communications method aimed at linking hand-held devices at


high speeds and at distances of 100-228 feet is called Wi-Fi.

True False

101.A Wi-Fi enabled laptop computer accesses the available network (say, at an airport) through
an access point, which is connected to a land-based Internet connection.

True False

102.The latest version of Wi-Fi (IEEE 802.11 standard) is version a.

True False

103.Wi-Fi connections are always secure; no one can steal your data when you are online.

True False

104.Bluetooth is a short-range, wireless communications method for linking cellphones,


computers, and some other peripherals up to distances of 33 feet.

True False

105.Malware consists of safeguards for protecting information technology against unauthorized


access, system failures, and disaster that can result in damage or loss.

True False

6-20
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
106.A denial-of-service attack uses a virus to crash your computer.

True False

107.Worms, viruses, and Trojan horse are all malware.

True False

108.A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.

True False

109.A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.

True False

110.A virus is capable of destroying or corrupting data.

True False

111.Cellphones do not get infected by malware.

True False

112.Encryption is the process of altering—via software—readable data into unreadable form to


prevent unauthorized access.

True False

Fill in the Blank Questions

6-21
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
113._________ is the gradual merger of computing and communications into a new information
environment, in which the same information is exchanged among many kinds of equipment,
using the language of computers.

________________________________________

114.Most of the word's natural phenomena use signals that continuously vary in strength and
quality, called ________ signals.

________________________________________

115.Communications signals represented in a binary electronic format are ________ signals.

________________________________________

116.So they can be sent over a telephone line, analog signals are converted into digital signals,
and then back again, by using ________.

________________________________________

117.A _________ is a communications network covering a city or a suburb.

________________________________________

118.A peer-to-peer (P2P) network operates without relying on a central ________.

________________________________________

119.Private networks that use a public network, usually the Internet, to connect remote sites are
called ________.

________________________________________

120.A private intranet that allows access to selected outside users is a(n) ________.

________________________________________

6-22
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121.A _________ is a system of hardware and/or software that protects a computer or a network
from intruders.

________________________________________

122.A client-server network has a _________ computer, a central computer that controls the
network; The devices connected to the network are called _________.

________________________________________

123.A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.

________________________________________

124.Electronic messages are sent as ________, fixed-length blocks of data for transmission.

________________________________________

125.A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.

________________________________________

126.A(n) ________ is an interface (linking device) used to connect the same types of networks,
whereas a(n) ________ is an interface permitting communications between dissimilar
networks.

________________________________________

127.________ are physical devices that join multiple wired and/or wireless networks; their primary
job is to provide connectivity, and they are often used in small office networks, cafés,
airports, hotels, and home networks.

________________________________________

6-23
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
128.The ________ consists of the main "highway" that connects all computer networks in an
organization.

________________________________________

129.A motherboard expansion card called a _________ enables a computer to send and receive
messages over a network.

________________________________________

130.The system software that manages the activity of a network is called the ________.

________________________________________

131.A network can be laid out in different ways. The layout, or shape, of a network is called a
________.

________________________________________

132.A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.

________________________________________

133.A ________ network topology is one in which all microcomputers and other communications
devices are connected directly to a central network switch.

________________________________________

134.The Internet uses the ________ network topology.

________________________________________

6-24
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135.In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and with different network
topologies.

________________________________________

136.Wired communications media include three main types. The kind used for tradition telephone
lines is a ________.

________________________________________

137.Telecommuting means using a computer and networks to work from ________; telework
means working from ________.

________________________________________

138.Wired communications media include three main types. Insulated copper wire wrapped in a
solid or braided shield and then an external cover is called ________ cable.

________________________________________

139.Wired communications media include three main types. The kind used for transmitting pulses
of light is called a ________ cable.

________________________________________

140.HomePlug technology is a wired communications standard that allows users to connect


equipment within the home using the house's own ________ wiring.

________________________________________

141.The range of frequencies that a transmission medium can carry in a given period of time is
called its ________.

________________________________________

6-25
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
142.The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.

________________________________________

143.Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.

________________________________________

144.The highest level that a satellite can occupy is the ________ earth orbit.

________________________________________

145.Global Positioning Systems use ________ to continuously transmit signals to identify earth
locations.

________________________________________

146.The Global Positioning System is an example of a ________-way long-distance


communications system.

________________________________________

147.Simple one-way radio receivers that receive data (but not voice messages) are called
________; they are often used in hospital environments.

________________________________________

148.1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.

________________________________________

149._________ is an international standard widely adopted in the U.S.A., Europe, and Asia that
supports fast cellphone data transfer rate; this standard has not been adopted yet by all
carriers.

________________________________________

6-26
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
150.Public wireless access points are called _________.

________________________________________

151.The short-range, wireless digital standard aimed at linking hand-held devices up to 33 feet
apart is called ________.

________________________________________

152._________ is similar to Wi-Fi but has a far greater range.

________________________________________

153.The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.

________________________________________

154.Trolls, spies, hackers, and thieves are kinds of _________.

________________________________________

155.A _________ is a person who posts intentionally offensive, incendiary, or off-topic comments
online.

________________________________________

156.Worms, viruses, Trojan horses, and rootkits are all types of programs called ________.

________________________________________

157.A(n) ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive and that can cause the computer to crash.

________________________________________

6-27
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
158.Almost all viruses are attached to an _________ file.

________________________________________

159.A ________ is a program that pretends to be a useful program, usually free, such as a game or
screen saver, but carries viruses, or destructive instructions that cause problems without
your knowledge.

________________________________________

160.A(n) ________ uses malware to hijack hundreds or thousands of computers, called ________,
and to remotely control them all.

________________________________________

161.________ software can be used to scan a computer's hard disk, CDs, and main memory to
detect viruses.

________________________________________

162.The process of altering readable data into unreadable form to prevent unauthorized access is
known as ________.

________________________________________

163.A message sent in its original undisguised, readable form is ________.

________________________________________

Essay Questions

6-28
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
164.How do analog and digital devices interpret electrical signals?

165.What is the primary purpose of the modem?

166.What are the main differences between a WAN, a MAN, and a LAN?

6-29
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
167.What is the difference between a client/server network and a peer-to-peer network?

168.Describe what a packet is and what it does.

169.Describe the network topology used by the Internet.

6-30
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
170.Distinguish between narrowband and broadband.

171.What are some of the uses and limitations of GPS?

172.Basically, how does Wi-Fi work?

6-31
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
173.What are the four types of cyberintruders?

174.List at least three threats to online privacy.

175.List at least five ways to protect yourself from Internet snoops.

6-32
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 06 Communications, Networks, and Cyberthreats: The Wired
and Wireless World Answer Key

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.


(p. 306)

A. continuous
B. digital
C. sequential
D. analog

The term "digital" describes any system based on discontinuous data or events. In the
case of computers, it refers to communications signals represented in a two-state or
binary way.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

2. Each zero and one signal represents a ________.


(p. 306)

A. bit
B. byte
C. kilobyte
D. megabyte

A bit represents a one or zero signal (on or off).

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy

6-33
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

3. Which of the following is NOT an analog device?


(p. 305-
308)

A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone

Smartphones are digital devices.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

4. Signals such as sound and temperature, which continuously vary in strength and quality,
(p. 305- are said to be _________.
306)

A. spontaneous
B. digital
C. sequential
D. analog

Analog signals are continually changing.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

6-34
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
5. The ________ is a device that converts digital computer signals into analog signals so that
(p. 306) they can be sent over a telephone line.

A. printer
B. scanner
C. modem
D. digitizer

A sending modem modulates a computer's digital signals into the telephone line's analog
signals. A receiving modem demodulates analog signals into digital signals.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

6. A person sending a document over a phone line by converting a computer's digital signals
(p. 306) to analog signals uses a ________.

A. printer
B. scanner
C. digitizer
D. modem

A modem converts a computer's digital signals into the telephone line's analog signals.
The receiving modem converts analog signals into digital signals.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

6-35
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
7. A ________ is a system of interconnected computers, telephones, or communications
(p. 308) devices that can communicate and share resources.

A. terminal
B. router
C. network
D. server

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

8. A network that covers a wide geographical area is called a ________.


(p. 310)

A. LAN
B. WAN
C. MAN
D. HAN

A wide area network (WAN) is a communications network that covers a wide geographical
area, such as a country or even the world. It uses many types of media to make the
connections.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

6-36
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. A network that covers a city or a suburb is called a ________.
(p. 310)

A. WAN
B. LAN
C. MAN
D. Internet

MAN (metropolitan area network); many cellphone systems are MANs.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

10. Networks are structured in two principle ways: client/server and ________.
(p. 312)

A. intranet
B. host computer
C. extranet
D. peer to peer

The client/server structure uses main computers (servers) to fulfill requests of connected
computers (clients); the peer-to-peer (P2P) structure uses an arrangement of equality,
wherein all computers communicate directly, without going through a server.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-37
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
11. A network that operates without relying on a server is the ________ network.
(p. 313)

A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly


with one another without relying on a server.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

12. A computer that acts like a disk drive, storing the programs and data files shared by users
(p. 312) on a LAN, is the ________ server.

A. file
B. web
C. host
D. mail

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-38
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
13. If an organization's internal private network uses the same infrastructure and standards of
(p. 314) the Internet, then the private network is a(n) ________.

A. extranet
B. intranet
C. LAN
D. MAN

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

14. A virtual private network may include ________.


(p. 314)

A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) to connect remote sites. Company intranets, extranets, and LANs can all be
parts of a VPN.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

6-39
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
15. A(n) ________ is a system of hardware and/or software that protects a computer or a
(p. 314) network from intruders.

A. VPN
B. intranet
C. firewall
D. protocol

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

16. A ________ is the set of rules that govern the exchange of data between hardware and/or
(p. 316) software components in a communications network.

A. host
B. protocol
C. database
D. packet

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-40
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
17. A mainframe computer that controls a large network is called the ________ computer.
(p. 316)

A. slave
B. host
C. client
D. node

A host computer is a mainframe or midsize central computer that controls the network.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

18. Any device that is attached to a network is referred to as a ________.


(p. 316)

A. server
B. host
C. node
D. router

A node is any device, such as a microcomputer, a terminal, or a printer, that is attached to


a network.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

6-41
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
19. A ________ is a fixed-length block of data for transmission.
(p. 316)

A. node
B. protocol
C. packet
D. backbone

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

20. A common connection device that connects computers to a network and that sends
(p. 316) messages (checks packets) between sender and receiver nodes is called a ________.

A. router
B. gateway
C. switch
D. bridge

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

21. To create larger networks, a bridge connects the same types of networks, and a ________
(p. 316) connects dissimilar networks.

A. router
B. gateway
C. hub
D. host

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 3 Hard

6-42
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-02 Networks
Topic: Networks

22. A device that joins multiple wired and/or wireless networks in a home office is a ________.
(p. 316)

A. node
B. router
C. bridge
D. firewall

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

23. In an organization, all computer networks are connected to the Internet by a "main
(p. 317) highway" called a ________.

A. skeleton
B. backbone
C. gateway
D. router

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

6-43
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?
(p. 318-
321)

A. ring
B. bus
C. hub
D. star

The basic network topologies are star, ring, bus, tree, and mesh. A hub is a common
connection point for devices in a network.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

25. In the ________ network topology, communications devices are connected to a single cable
(p. 320) with two endpoints.

A. ring
B. bus
C. star
D. peer-to-peer

The single wire or cable is called the bus.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

6-44
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
26. What kind of topology (layout) is used by a network that connects all computers and
(p. 319) communications devices in a continuous loop?

A. ring
B. bus
C. star
D. peer-to-peer

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

27. What kind of topology (layout) is used by a network that connects all its computers and
(p. 319) communications devices to a central server?

A. ring
B. bus
C. star
D. peer-to-peer

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

28. ________ is the most common and most widely used LAN technology, with networked
(p. 321) devices in close proximity; it can be used with almost any kind of computer. Most

microcomputers come with a port for this type of network connection, which uses cable.

A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet

Accessibility: Keyboard Navigation

6-45
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

29. A communications medium is a channel; there are three types of wired communications
(p. 324) media. The one consisting of two strands of insulated copper wire, used by tradition

telephone systems, is known as ________.

A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
(p. 324) wrapped in a solid or braided shield placed in an external cover?

A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

6-46
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
31. A type of wired communications technology used to connect equipment in a home network
(p. 325) is the following:

A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

32. What wired communications medium consists of dozens or hundreds of thin strands of
(p. 334) glass or plastic?

A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

A fiber-optic cable transmits light signals.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

6-47
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
33. The ________ is the basis for ALL telecommunications signals.
(p. 324-
325)

A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

34. The ________ is the range of frequencies that a transmission medium (channel) can carry
(p. 337) in a particular period of time.

A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-48
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
(p. 329) wireless network and content providers?

A. LAN
B. WAN
C. WAP
D. HAN

WAP = Wireless Application Protocol

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

36. Which of the following is NOT a type of wireless communications media?


(p. 324,
329-
330)
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

Coaxial uses cable.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-49
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
37. What form of wireless transmission sends data to an AM or FM receiver?
(p. 329)

A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

38. Which of these types of wireless transmission is limited to line-of-sight communications?


(p. 330)

A. broadcast radio
B. broadband
C. microwave
D. WAP

Microwaves cannot bend around corners or follow the earth's curvature.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

39. Transmitting a signal from a ground station to a satellite is called ________.


(p. 330)

A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy

6-50
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

40. The highest level that a satellite can occupy in space is known as ________.
(p. 330-
331)

A. geostationary earth orbit (GEO)


B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (LEO)

The geostationary earth orbit is 22,300 miles and above and is always directly above the
equator.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
(p. 331) to identify earth locations.

A. GEO
B. MEO
C. LEO
D. HEO

MEO = Medium-Earth Orbit

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-51
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
42. Broadband technology (wireless digital services) is also referred to as ________-generation
(p. 337) wireless services.

A. first
B. second
C. third
D. fourth

3G services support smartphones (e.g., iPhone); 4G and 5G are the newer versions.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

43. Which of the following is NOT a type of long-distance wireless two-way communications
(p. 340) device?

A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

Bluetooth is used for distances of up to only 30 feet (short range).

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-52
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
(p. 338) wireless devices so they may communicate at high speeds at distances of 100-228 feet?

A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

Wi-Fi = wireless fidelity

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

45. What short-distance wireless standard is used to link cell phones, computers, and
(p. 340) peripherals at distances of up to about 33 feet?

A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-53
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
46. A ________ attack disables a computer system or network by making so many requests of
(p. 347) it that it overloads it and keeps other users from accessing it.

A. worm
B. virus
C. denial-of-service
D. Trojan horse

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
(p. 348) disk/flash drive.

A. worm
B. rootkit
C. Trojan horse
D. patch

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

6-54
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?
(p. 347-
350)

A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

A denial-of-service attack is an action, not a form of malicious code (malware).

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
(p. 349) them remotely; the controlled computers are called ________.

A. robots
B. zombies
C. worms
D. logic bombs

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

50. Which of the following is NOT a way to spread a virus?


(p. section
06-06)

A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

Accessibility: Keyboard Navigation

6-55
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
(p. 350) one?

A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

Antivirus software looks for viruses only on the computer on which it is installed.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

52. What is the science, often used in computer security systems, of measuring individual
(p. 351- body characteristics?
352)

A. encryption
B. decryption
C. rootkit
D. biometrics

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

6-56
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
53. What is the process of altering readable data (plain text) into unreadable form to prevent
(p. 352) unauthorized access?

A. encryption
B. decryption
C. password
D. biometrics

Encryption uses powerful mathematical concepts to create coded messages that are
virtually impossible to break. The receiver of the encrypted data has an encryption key to
decode it and make it readable again.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

True / False Questions

54. Analog refers to communications signals represented in a binary format.


(p. 304-
305)
FALSE

Analog means continuously varying (wavelike); binary is digital = either on or off (0 or 1).

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

6-57
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
55. Signals such as sound and temperature, which continuously vary in strength and quality,
(p. 304- are said to be digital.
305)

FALSE

They are analog.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

56. A thermometer and a speedometer are examples of analog devices.


(p. 305)

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

57. Telephones have always been digital devices.


(p. 306-
308)
FALSE

Until recently, telephones have all been analog devices; wired landline-phones still are.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

58. A modem converts digital signals into analog signals so they can be sent over a telephone
(p. 306- line.
307)

TRUE

Accessibility: Keyboard Navigation

6-58
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

59. "Modem" is short for modulate/demodulate.


(p. 306)

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

60. Capturing music digitally means that one has an exact duplicate of the music.
(p. 308)

FALSE

Digital recording uses sampling—the recording of representative selections, or samples, of


the sounds and converts these analog samples into streams of numbers that the computer
uses to express the sounds.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

61. A network is a system of interconnected computers and communications devices that can
(p. 308) communicate and share resources.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

6-59
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
62. The Internet is a WAN.
(p. 310)

TRUE

The Internet is the biggest wide area network.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

63. A LAN is a type of network that covers a wide geographical area.


(p. 311)

FALSE

LAN = local area network, which connects computers and devices in a limited geographic
area, such as one office, one campus, or one building.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

64. Client/server networks and peer-to-peer networks are the same except that the first type
(p. 312- of network uses a mainframe and the second type uses only microcomputers.
313)

FALSE

The first network structure has clients that request services/data and servers, which are
computers that fulfill the requests. The second network structure's computers are all on
an equal basis and communicate directly with one another.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

6-60
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by
(p. 312) users on a LAN, is called a file server.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

66. "File server" and "database server" are different names for the same type of server.
(p. 312)

FALSE

A file server stores both programs and data; a database server stores only data.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

67. Peer-to-peer networks are less stable than client-server networks because in the former
(p. 313) certain shared resources reside on each user's machine.

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

68. Virtual private networks (VPNs) are private networks that use a public network (usually
(p. 314) the Internet) instead of private, leased (expensive) lines to connect remote sites.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy

6-61
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-02 Networks
Topic: Networks

69. If you have one computer, you need firewall hardware; if you have more than one
(p. 315) (networked) computer, then a software firewall should be used.

FALSE

The reverse is true.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

70. In a network, communications protocols specify the type of electrical connections, the
(p. 316) timing of message exchanges, and error-detection techniques.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

71. Routers join multiple wired and/or wireless networks commonly in offices and home
(p. 316) offices.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

6-62
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
72. A gateway is an interface device permitting communication between similar networks.
(p. 316)

FALSE

Bridges are used for the same type of network; gateways are used for dissimilar networks.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

73. An interface device used to connect the same types of networks is called a node.
(p. 316)

FALSE

This is a bridge.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

74. The backbone is the main communications route in a bus network topology.
(p. 317)

FALSE

The backbone is the main "highway" for all devices on a network; the Internet has the
largest backbone. A bus is the connecting line in the bus network topology.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-63
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
75. In a bus network, all computers and communications devices are connected in a
(p. 319- continuous loop.
320)

FALSE

This is a ring network.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

76. Traditional landline telephone systems use twisted-pair wire as their communications
(p. 324) medium.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams
(p. 3324-of light is called a coaxial cable.
325)

FALSE

This is a fiber-optic cable.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

6-64
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
78. Ethernet is a long-distance wireless communications connection.
(p. 324)

FALSE

Ethernet is wired and is a relatively short-distance connection.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

79. One wired communications standard that allows users to send data over a home's existing
(p. 325) electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

80. All wired and wireless communications media use the electromagnetic spectrum of
(p. 327) radiation.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-65
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
(p. 327)

FALSE

The wider a medium's bandwidth, the more frequencies it can use to transmit data and
thus the faster the transmission.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

82. The two general classes of bandwidth are long and short.
(p. 327)

FALSE

They are narrowband and broadband.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
(p. 327) carries most communications signals.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-66
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
(p. 327) makes a cycle, in a second.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

85. Both digital narrowband and broadband transmission speeds are measured in megabits or
(p. 327- gigabits per second.
328)

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

86. Infrared transmission is a type of low-frequency wireless transmission that is short-range


(p. 329) and line-of-sight.

TRUE

Infrared transmission is commonly used between computers and printers. TV remotes use
this technology.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-67
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
(p. 330) ground to the satellite is called downlinking, and transmitting from the satellite to the

ground station called uplinking.

FALSE

The reverse is true.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

88. Communications satellites are microwave relay stations in orbit around the earth.
(p. 330)

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

89. Satellite orbits are at three levels: GEO, MEO, and LEO.
(p. 330-
331)
TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-68
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
90. A larger number of geostationary earth orbit (GEO) satellites are required for global
(p. 330- coverage than mid-earth orbit (MEO) satellites.
331)

FALSE

The reverse is true.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
(p. 332) earth locations.

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
(p. 332)

FALSE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

93. GPS satellites use Medium-Earth-Orbits.


(p. 332)

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media

6-69
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Wireless Communications Media

94. Cellphones are cellular radios.


(p. 335)

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

95. Analog cellphones were 1G phones.


(p. 335)

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

96. Analog cellphones are 2G (second-generation) phones.


(p. 335-
336)
FALSE

They were 1G devices.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

97. Cellphones are basically two-way radios.


(p. 335-
336)
TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-70
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.
(p. 335-
336)
TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

99. Wi-Fi is a short-range wireless connection for LANs.


(p. 338)

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

100. The short-range, wireless communications method aimed at linking hand-held devices at
(p. 338) high speeds and at distances of 100-228 feet is called Wi-Fi.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

101. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
(p. 338- through an access point, which is connected to a land-based Internet connection.
340)

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-71
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
102. The latest version of Wi-Fi (IEEE 802.11 standard) is version a.
(p. 338-
340)
FALSE

It is version n.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

103. Wi-Fi connections are always secure; no one can steal your data when you are online.
(p. 340)

FALSE

Use a firewall and other security software!

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

104. Bluetooth is a short-range, wireless communications method for linking cellphones,


(p. 340) computers, and some other peripherals up to distances of 33 feet.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-72
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
105. Malware consists of safeguards for protecting information technology against
(p. 343) unauthorized access, system failures, and disaster that can result in damage or loss.

FALSE

This is "security."

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: Unit 6B
Topic: Cyberthreats, Security, and Privacy Issues

106. A denial-of-service attack uses a virus to crash your computer.


(p. 347)

FALSE

This kind of attack is not a virus; it is an action (cyber threat) whereby a computer or
network is made inaccessible to users via repeated requests that cause system overload.

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

107. Worms, viruses, and Trojan horse are all malware.


(p. 347)

TRUE

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

6-73
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
108. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
(p. 348- carries a virus that replicates in your computer over and over until your computer crashes.
349)

FALSE

The Trojan horse does pretend to be a useful program, but it carries a virus that does
damage without your knowledge—such as recording personal data and sending it over the
Internet to "evil" computers for fraudulent use. (A worm is the replicating malware.)

Accessibility: Keyboard Navigation


Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

109. A virus is a "deviant" program that is stored on a computer hard drive and can cause
(p. 348) unexpected and undesirable effects.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

110. A virus is capable of destroying or corrupting data.


(p. 348)

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

6-74
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
111. Cellphones do not get infected by malware.
(p. 350)

FALSE

Internet downloads are a common source of malware infection in cellphones.

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

112. Encryption is the process of altering—via software—readable data into unreadable form to
(p. 352) prevent unauthorized access.

TRUE

Accessibility: Keyboard Navigation


Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

Fill in the Blank Questions

113. _________ is the gradual merger of computing and communications into a new information
(p. 304) environment, in which the same information is exchanged among many kinds of

equipment, using the language of computers.

Digital convergence or Convergence

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: Unit 6A
Topic: Networks and Wired and Wireless Media

6-75
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
114. Most of the word's natural phenomena use signals that continuously vary in strength and
(p. 305) quality, called ________ signals.

analog

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

115. Communications signals represented in a binary electronic format are ________ signals.
(p. 306)

digital

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

116. So they can be sent over a telephone line, analog signals are converted into digital signals,
(p. 306) and then back again, by using ________.

modems

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

117. A _________ is a communications network covering a city or a suburb.


(p. 310)

metropolitan area network or MAN

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

118. A peer-to-peer (P2P) network operates without relying on a central ________.


(p. 313)

server

Blooms: Remember

6-76
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

119. Private networks that use a public network, usually the Internet, to connect remote sites
(p. 314) are called ________.

virtual private networks or virtual private network or VPNs or VPN

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

120. A private intranet that allows access to selected outside users is a(n) ________.
(p. 314)

extranet

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

121. A _________ is a system of hardware and/or software that protects a computer or a


(p. 314) network from intruders.

firewall

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

122. A client-server network has a _________ computer, a central computer that controls the
(p. 315) network; The devices connected to the network are called _________.

host or nodes

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-77
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
123. A set of conventions that govern how data is exchanged between devices on a network is
(p. 316) known as a communications ________.

protocol or protocols

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

124. Electronic messages are sent as ________, fixed-length blocks of data for transmission.
(p. 316)

packets

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

125. A _________ is a network that connects computers to a network; data can be sent in both
(p. 316) directions at the same time.

switch

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

126. A(n) ________ is an interface (linking device) used to connect the same types of networks,
(p. 316) whereas a(n) ________ is an interface permitting communications between dissimilar

networks.

bridge or gateway

Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-78
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
127. ________ are physical devices that join multiple wired and/or wireless networks; their
(p. 316) primary job is to provide connectivity, and they are often used in small office networks,

cafés, airports, hotels, and home networks.

Routers or Router

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

128. The ________ consists of the main "highway" that connects all computer networks in an
(p. 317) organization.

backbone

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

129. A motherboard expansion card called a _________ enables a computer to send and receive
(p. 317) messages over a network.

network interface card or NIC

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

130. The system software that manages the activity of a network is called the ________.
(p. 317)

network operating system or NOS

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-79
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
131. A network can be laid out in different ways. The layout, or shape, of a network is called a
(p. 318) ________.

topology

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

132. A ________ network topology is one in which all microcomputers and other devices are
(p. 319) connected in a continuous loop.

ring

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

133. A ________ network topology is one in which all microcomputers and other
(p. 319) communications devices are connected directly to a central network switch.

star

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-02 Networks
Topic: Networks

134. The Internet uses the ________ network topology.


(p. 321)

mesh

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-80
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135. In small LANs, messages may bump into one another. The most popular protocol, or
(p. 321) technology, which uses cabling and special ports on microcomputers, that prevents

collisions is ________. It can be used with almost any kind of computer and with different
network topologies.

Ethernet

Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

136. Wired communications media include three main types. The kind used for tradition
(p. 324) telephone lines is a ________.

twisted-pair wire or twisted-pair or twisted pair wire or twisted pair

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

137. Telecommuting means using a computer and networks to work from ________; telework
(p. 323) means working from ________.

home or anywhere

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

138. Wired communications media include three main types. Insulated copper wire wrapped in
(p. 324) a solid or braided shield and then an external cover is called ________ cable.

coaxial or coax

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

6-81
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
139. Wired communications media include three main types. The kind used for transmitting
(p. 324) pulses of light is called a ________ cable.

fiber-optic or fiber optic

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

140. HomePlug technology is a wired communications standard that allows users to connect
(p. 325) equipment within the home using the house's own ________ wiring.

electrical or electric

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-03 Wired Communications Media
Topic: Wired Communications Media

141. The range of frequencies that a transmission medium can carry in a given period of time is
(p. 327) called its ________.

bandwidth

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

142. The ________ a transmission medium's bandwidth, the more frequencies it can use to
(p. 327) transmit data and the faster it is.

wider

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-82
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
143. Infrared and microwave transmission signals cannot work around obstacles or travel in
(p. 329- curved lines, so they are called _________.
330)

line-of-sight or line of sight

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

144. The highest level that a satellite can occupy is the ________ earth orbit.
(p. 330)

geostationary or GEO

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

145. Global Positioning Systems use ________ to continuously transmit signals to identify earth
(p. 332) locations.

satellites

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

146. The Global Positioning System is an example of a ________-way long-distance


(p. 332) communications system.

one or 1

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-83
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
147. Simple one-way radio receivers that receive data (but not voice messages) are called
(p. 335) ________; they are often used in hospital environments.

pagers

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

148. 1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
(p. 336-
338)
analog or digital

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

149. _________ is an international standard widely adopted in the U.S.A., Europe, and Asia that
(p. 338) supports fast cellphone data transfer rate; this standard has not been adopted yet by all

carriers.

LTE or Long-Term Evolution

Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

150. Public wireless access points are called _________.


(p. 340)

hotspots

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-84
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
151. The short-range, wireless digital standard aimed at linking hand-held devices up to 33 feet
(p. 340) apart is called ________.

Bluetooth

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

152. _________ is similar to Wi-Fi but has a far greater range.


(p. 340)

WiMax or Worldwide Interoperability for Microwave Access

Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

153. The three short-range wireless standards used in home automation networks, for linking
(p. 341) switches and sensors around the house and yard, are Insteon, ZigBee, and _________.

Z-Wave or Z Wave

Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

154. Trolls, spies, hackers, and thieves are kinds of _________.


(p. 343)

cyberintruders or cyberattacks

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-05 Cyberintruders: Trolls, Spys, Hackers, and Thieves
Topic: Cyberintruders: Trolls, Spys, Hackers, and Thieves

6-85
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
155. A _________ is a person who posts intentionally offensive, incendiary, or off-topic
(p. 343) comments online.

troll

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-05 Cyberintruders: Trolls, Spys, Hackers, and Thieves
Topic: Cyberintruders: Trolls, Spys, Hackers, and Thieves

156. Worms, viruses, Trojan horses, and rootkits are all types of programs called ________.
(p. 348-
350)
malware

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

157. A(n) ________ is a program that copies itself repeatedly into a computer's memory or onto
(p. 348) a disk drive and that can cause the computer to crash.

worm

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

158. Almost all viruses are attached to an _________ file.


(p. 348)

executable or exe

Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

6-86
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
159. A ________ is a program that pretends to be a useful program, usually free, such as a game
(p. 349) or screen saver, but carries viruses, or destructive instructions that cause problems

without your knowledge.

Trojan horse or Trojan

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

160. A(n) ________ uses malware to hijack hundreds or thousands of computers, called
(p. 349) ________, and to remotely control them all.

botnet or zombies

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

161. ________ software can be used to scan a computer's hard disk, CDs, and main memory to
(p. 350) detect viruses.

Antivirus

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

162. The process of altering readable data into unreadable form to prevent unauthorized
(p. 352) access is known as ________.

encryption

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

6-87
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
163. A message sent in its original undisguised, readable form is ________.
(p. 352)

plain text

Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-06 Cyberattacks and Malware
Topic: Cyberattacks and Malware

Essay Questions

164. How do analog and digital devices interpret electrical signals?


(p. 304-
306)

Analog devices interpret electrical signals as continuous waves varying in strength and/or
quality; digital devices interpret electrical signals as discontinuous bursts of
electrical/light pulses represented in a binary way (on or off).

Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age

165. What is the primary purpose of the modem?


(p. 306-
308)

The primary purpose of the modem ("modulate/demodulate") is to change the computer's


digital signals into analog signals and, at the receiving end, analog signals back into digital
signals so that communications can take place between computers using a standard
copper-wire telephone network or other transmission media that can transmit only analog
signals.

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-01 From the Analog to the Digital Age

6-88
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: From the Analog to the Digital Age

166. What are the main differences between a WAN, a MAN, and a LAN?
(p. 310-
311)

A wide area network (WAN) covers a wide geographic area, such as a country or, in the
case of the Internet, the world. A metropolitan area network (MAN) covers a city or a
suburb. A local area network (LAN) covers a limited geographic area, such as one office,
one building, or a small group of buildings, such as on a college campus.

Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

167. What is the difference between a client/server network and a peer-to-peer network?
(p. 312-
313)

A client/server network consists of clients, which are microcomputers that request data,
and servers, which are central computers used to supply data. In the client/server scheme,
central servers handle all security and file transactions; they are powerful microcomputers
that also manage shared devices. They may run server software for applications such as
email and web browsing, or they may just host a database or be a file server or other kind
of server; different servers may be used to manage different tasks.
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly
with one another without relying on a server; in peer-to-peer networks, which are
relatively inexpensive to set up, each machine shares its own resources and handles its
own security. Every computer can share files and peripherals with all other computers on
the network, given that all are granted access privileges. Peer-to-peer networks are less
expensive than client/server networks and work effectively for up to 25 computers.
Beyond that, they slow down under heavy use. They are appropriate for small networks,
such as small businesses and home networks.

Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-02 Networks
Topic: Networks

6-89
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
168. Describe what a packet is and what it does.
(p. 316)

Electronic messages are sent as packets. A packet is a fixed-length block of data for
transmission. A sending computer uses a protocol (the TCP layer of TCP/IP, Chapter 2) to
break an electronic message apart into packets, each of which typically contains 1,000-
1,500 bytes. The various packets are sent through a communications packet-switching
network, such as the Internet—often using different (and most expedient) routes, at
different speeds, and sandwiched in between packets from other messages. Once the
packets arrive at their destination, the receiving computer reassembles them(called
packet switching) into proper sequence to complete the message.

Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

169. Describe the network topology used by the Internet.


(p. 321)

In a mesh network topology, messages sent to the destination can take any possible
shortest, easiest route to reach its destination. There must be at least two paths to any
individual computer to create a mesh network. (Wireless networks are often implemented
as a mesh.) In the previous topologies, star and bus, messages are usually broadcast to
every computer, especially in bus topology. In the ring topology, messages can travel in
only one direction—clockwise or counterclockwise. The Internet employs the mesh
topology, and the message, with the help of routers, finds its route for its destination.

Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-02 Networks
Topic: Networks

6-90
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
170. Distinguish between narrowband and broadband.
(p. 327-
328)

Narrowband, also known as voiceband, is used for regular telephone communications and
is usually 1.5 megabits per second or less. Broadband is used to transmit high-speed data
and high-quality audio and video and transmits at up to 1 gigabit per second or more. DSL,
cable, satellite, T1, etc. are broadband.

Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

171. What are some of the uses and limitations of GPS?


(p. 334)

Uses: Assistance for visually impaired people; detection of equipment and sites in military
engagement; tracking trucks, buses, and taxis; tracking people who have their cellphones
on; locating stolen cars; orienting hikers/locating lost hikers; aiding in surveying;
monitoring dangerous geological sites, such as volcanoes; finding lost pets; geocaching;
getting map directions on computers and in cars; determining E911 locations of people
making 911 calls.
Limitations: Not all GPS services are reliable; maps are sometime inaccurate; E911
locations are not always accurate; tracking cellphone users could violate privacy.

Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

6-91
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
172. Basically, how does Wi-Fi work?
(p. 338-
340)

A land-based Internet connection (DSL, cable, satellite, T1 line) is connected to an


antenna (access point). The access point (hotspot) translates the Internet signals into
short-range, wireless radio waves and broadcasts them over an area about the size of a
house (distances of 100-228 feet). Anyone within range who has a receiving antenna,
usually on a notebook computer or a 3G/4G cellphone, can pick up the signals. Sometimes
the user must enter a password to access the Wi-Fi signal. The later versions of Wi-Fi
(e.g., n) are faster than the earlier versions (e.g., b, a, g).

Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 06-04 Wireless Communications Media
Topic: Wireless Communications Media

173. What are the four types of cyberintruders?


(p. 343)

Trolls, spies, hackers, and thieves.

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-05 Cyberintruders: Trolls, Spys, Hackers, and Thieves
Topic: Cyberintruders: Trolls, Spys, Hackers, and Thieves

174. List at least three threats to online privacy.


(p. 353-
354)

1. Name migration
2. Résumé "rustling" and snooping
3. Government prying and spying
4. ID theft

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-07 Concerns about Privacy and Identity Theft

6-92
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Concerns about Privacy and Identity Theft

175. List at least five ways to protect yourself from Internet snoops.
(p. 357)

1. Use public computers.


2. Use multiple browsers.
3. Adjust browsers privacy settings.
4. Adjust network privacy settings.
5. Get rid of cookies.
6. Create social network accounts without personal information.
7. Use many email addresses.
8. Use an anonymous network (e.g., Tor).
9. Use a prepaid phone.
10. Turn off your phone's tracking function.
11. Pay cash.

Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 06-07 Concerns about Privacy and Identity Theft
Topic: Concerns about Privacy and Identity Theft

6-93
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Another random document with
no related content on Scribd:
un port de commerce très fréquenté, dont les exportations tendent à
s’accroître rapidement. Mais là s’arrêtent les ressemblances. Pour
quiconque vient du Brésil, l’arrivée à Montevideo est une surprise
complète.
Le long des côtes, plus de ces masses altières de pics rocheux
ou de collines aux versants boisés. Nous avions pris l’habitude de
regarder en l’air pour contempler les montagnes, il faut la perdre ici ;
les éminences décorées du nom de sierras et de cerros sont des
ondulations qui, le plus souvent, ne dépassent pas deux ou trois
cents mètres au-dessus de la mer.
Ayant atterri dans la nuit du 16 au 17 sur l’île de Lobos, sentinelle
avancée qui marque l’entrée du Rio de la Plata, nous avons passé à
l’heure du déjeuner près de Florès, îlot bas et aride, et bientôt nous
pûmes distinguer la ville de Montevideo, située sur une petite
presqu’île rocailleuse, à la partie orientale de la baie qui porte son
nom. De l’autre côté, nous apercevons le fameux Cerro (colline),
dont les Montévidéens sont très fiers, bien qu’il n’ait que 150 mètres
d’élévation [2] . A l’horizon, semblable à celui d’une mer, aucune
chaîne de montagnes, aucun pic ; on devine qu’au delà de cette
ligne presque droite s’étend la plaine à peine ondulée, uniforme, la
plus grande qui soit au monde. C’est là, en effet, que commencent
les Pampas, ces steppes de l’Amérique du Sud, où l’Indien recule
sans cesse devant le moderne gaucho, et qui n’ont d’autres limites
que le détroit de Magellan au sud, et à l’ouest la Cordillère des
Andes.
[2] Monte-Video : Je vois une montagne.

Nous avançons lentement vers le mouillage, en sondant


continuellement ; bien loin encore de la ville, nous trouvons des
fonds de dix mètres, et la hauteur de l’eau diminue graduellement à
mesure que nous approchons. A un mille et demi environ de terre et
presque au milieu de la ligne qui joint les deux extrémités de la baie,
le timonier crie : « Six mètres ! » Impossible d’avancer davantage
sans échouer ; la Junon mouille successivement ses deux ancres,
reçoit aussitôt les visites de la direction du port et du service de la
santé ; une heure après, nous étions tous à terre.
On débarque au quai de la Douane, le long duquel sont
construits de vastes entrepôts. Nous voici dans la ville. Les rues se
coupent toutes à angle droit, formant ainsi une quantité de carrés
réguliers. C’est un immense échiquier, comprenant trois à quatre
cents cases, qu’on nomme cuadras, et sur lequel sont élevées plus
de 11,000 maisons.
De couleur locale, point. Cependant la ville a un aspect plus « à
son aise » que Rio-de-Janeiro. Les voies sont larges, assez bien
pavées, les maisons surtout mieux construites, affectant parfois un
caractère architectural simple et confortable. Toutes sont édifiées
dans le goût européen moderne, façon italienne, mais sans aucun
cachet d’originalité ; par les cours grandes ouvertes, nous
remarquons le soin et la grâce avec lesquels l’intérieur de ces
habitations est arrangé : propreté parfaite, fleurs en profusion,
escaliers spacieux de marbre blanc et noir, légères grilles en fer
forgé d’un travail élégant, tout cet ensemble donne aux maisons des
« bourgeois » de Montevideo un air riant qui indique la vie de famille
et prévient en leur faveur.
Les rues principales sont bordées de jolis magasins, assez bien
approvisionnés, où nous rencontrons pour la première fois des
dispositions rappelant les inimitables étalages de nos boutiques
parisiennes. Une grande partie de ce commerce paraît être entre les
mains de nos compatriotes.
Dans les rues adjacentes, nous remarquons que la plupart des
maisons n’ont pas de toiture ; elles seront surhaussées au fur et à
mesure de l’accroissement de la population.
On se perdrait en parcourant tous ces carrés pareils les uns aux
autres, si l’on n’avait presque constamment des échappées de vue
sur l’Océan, le Cerro et le fond de la baie ; et bien certainement, de
tels horizons, auxquels les habitants des capitales sont rarement
accoutumés, contribuent beaucoup à donner un aspect gai à cette
ville dont le plan est si uniforme. Elle n’est pas, d’ailleurs, tellement
grande, qu’on ne puisse s’y retrouver en traversant quelques places,
entre autres celle de la cathédrale, dont les deux tours fort élevées
servent d’amers aux vaisseaux venant du large.
Je ne répéterai pas à propos de Montevideo ce que j’ai dit des
tramways de Rio. Comme ceux de la capitale du Brésil, les
tramways ici s’en vont jusqu’à plus de deux lieues dans la
campagne ; le service en est très bien fait, et la population urbaine
de toutes classes en fait un constant usage.
Pendant ma première journée, j’ai voulu aussi visiter quelques
monuments, afin de me débarrasser le plus tôt possible du tribut que
tout voyageur consciencieux doit payer à la curiosité officielle et
obligatoire. Pour être sincère, je dois vous dire, lecteur, que je
réserve ma vraie curiosité pour les choses qui ne se voient pas aussi
facilement que les églises ou les bibliothèques et qui laissent des
impressions alors que toutes les bâtisses du monde (je ne parle pas
des œuvres d’art) laissent à peine des souvenirs.
Des édifices de Montevideo, je ferais tout aussi bien, sans doute,
de ne vous point parler. C’est bien fait, c’est pratique, moderne,
civilisé, commode, intelligent ; vous voyez que je ne leur marchande
pas les éloges, mais ce n’est pas plus que ce que je viens de dire.
Aucune critique n’est cachée sous mon approbation, si laconique
qu’elle soit ; je me borne à constater qu’une description de la Poste,
de la Bourse, du Palais du gouvernement, des marchés, voire même
des églises et autres… curiosités de la capitale de l’Uruguay aurait
de grandes chances de ne pas vous intéresser.
Je ne mentionnerai le Teatro Solis, fort belle salle
confortablement installée et ornée avec goût, que parce que nous
avons eu la satisfaction d’y entendre une œuvre nouvelle,
dénommée sur l’affiche « la tan aplaudida opera Parisina, por el
maestro Garibaldi. » Le maestro Garibaldi, de Montevideo (et non de
Caprera), nous a paru agir sagement en faisant représenter sa pièce
sur les bords de l’océan Austral ; non que la musique n’en soit
admirable, ce que j’ignore, car, en ce temps de batailles entre les
dilettanti, il est difficile de savoir à quoi s’en tenir en pareille matière,
mais tout uniment parce que, au rebours du proverbe, il est prophète
en son pays et ne le serait peut-être pas ailleurs. Parisina a donc été
« tan aplaudida » en notre présence, que, pour ne pas manquer aux
lois de la politesse, nous avons dû joindre nos impartiales
manifestations au bruyant enthousiasme de nos voisins.
Résumant mes impressions sur le Théâtre Solis, son
architecture, l’arrangement de la salle, l’œuvre représentée et
l’interprétation des chanteurs, je puis assurer que ce qui m’a paru le
plus intéressant et le plus artistique, c’est la beauté des femmes
montévidéennes, groupées comme de frais bouquets de printemps
aux deux premiers rangs des loges.
Elles ont le type espagnol, avec son éclat incomparable, son
originalité, sa grâce d’un ordre tout particulier, sa hardiesse, pleine
cependant de langueur et d’indolence ; mais, plus affiné, plus
régulier, un peu français, parfois presque parisien. Les attitudes sont
aisées et simples, les physionomies sont aimables, et le jeu de
l’éventail n’a pas, grâce à Dieu, pris cette allure mécanique à
laquelle un Castillan ne s’habituerait pas ; mais, s’il n’est pas moins
expressif, il est cependant plus réservé et moins rapide.
En sorte que, tout compte fait, nous avons emporté du Théâtre
Solis, de l’opéra nouveau, et de notre soirée, un fort agréable
souvenir.
Le lendemain, nous avons été reçus au Cercle français avec la
plus franche et la plus cordiale hospitalité. Tous les renseignements
utiles sur le pays ont été mis à notre disposition, et toutes les
excursions possibles nous ont été offertes par l’obligeance de nos
compatriotes, qui nous ont reproché amèrement de ne faire auprès
d’eux qu’un séjour de trop courte durée.
Après les félicitations, les poignées de main, une heure ou deux
de conversations à bâtons rompus, dans lesquelles nous ne parlons
que de l’Uruguay, et où on ne nous parle que de la France, nous
voici en route pour une promenade aux environs. Il ne s’agit encore
que d’aller dans une quinta (maison de campagne), à quelques
lieues de là, goûter la cuisine des gauchos [3] ; mais on a projeté
pour demain une excursion à l’un des saladeros [4] situés sur le
versant du Cerro.
[3] Le gaucho est l’homme de la campagne, produit du
mélange de l’Indien avec l’Espagnol.
[4] Abattoirs.

Notre expédition est dirigée par M. Charles Garet, le vice-


président du Cercle, directeur du journal la France. Une demi-
douzaine de calèches nous entraînent rapidement hors de la ville ;
en arrière, rebondit un fourgon bourré de victuailles, parmi
lesquelles, et comme pièces de résistance, quatre ou cinq
churrascos, ou énormes quartiers de bœuf, destinés à être rôtis tout
entiers. On a comblé les vides du fourgon à l’aide de petites caisses,
renfermant un nombre respectable de bouteilles de bon bordeaux, et
joint à ces éléments dignes d’intérêt tout un outillage de fourchettes
et de couteaux, car nous mangerons en plein air, dans la pampa.
Ce n’est pas ainsi, je le reconnais, que se font les explorations
scientifiques ; mais voyageant, comme dit le programme, pour notre
instruction et pour notre plaisir, il faut bien de temps en temps nous
conformer à cette seconde partie du règlement.
Le faubourg que nous traversons d’abord est d’aspect fort gai et
surtout extrêmement varié. C’est un nid à maisons de campagne
dans le genre de Passy, mais pas une seule d’entre elles qui
ressemble à sa voisine. Il y en a de gothiques, de grecques,
d’italiennes, de mauresques, de chinoises… Quelques-unes sont de
haute fantaisie. Tout cela, peint des couleurs les plus tendres, est
d’un affreux mauvais goût, comme vous pensez bien. — « Les
architectes de ce pays sont donc doués d’une trop riche
imagination ? » — Erreur. C’est un Français, un seul, qui a dirigé la
construction de toutes ces villas. Informé par un ami des idées
particulières des gens de Montevideo, il avait débarqué un beau
matin portant sous son bras un album complet tout rempli de
temples, de kiosques, de châteaux forts, de pagodes, de chalets et
autres pièces montées. Au bout de six semaines, il ne suffisait plus à
l’ouvrage. Voyez ce que vaut un bon renseignement.
Ces artistiques cottages, heureusement, sont entourés de
charmants jardins. Nous sommes au plus fort du printemps, en
pleine saison des fleurs ; si bien que les hautes charmilles, les
grands arbres déjà touffus, en cachant une bonne partie des
beautés architecturales qui défilent sous nos yeux, nous permettent
de louer sans trop de réticences cette série de paysages de
convention.
Après deux heures de route, nous arrivons à la quinta du señor
Herrosa. C’est une grande propriété, admirablement tenue, avec
château et dépendances, parterres, serres, jardins et bois. Aux
confins de ce magnifique parc s’étend la plaine indéfinie, dont nous
ne sommes séparés que par la petite rivière du Miguelete.
A l’ombre de saules gigantesques, on procède aux préparatifs du
churrasco. En un instant, les énormes quartiers de viande ont été
embrochés et déjà rôtissent devant nous, à l’entour d’un énorme
brasier, où s’entassent en guise de bûches des arbres entiers garnis
de leurs feuilles.
Pendant ce temps, nous attaquons les réserves ; la conversation
prend une allure plus vive, les souvenirs viennent plus pressés à la
mémoire ; ce grand air, cet horizon immense, ce repas original,
quoique excellent, nous mettent dans la meilleure disposition du
monde. Ce n’est pas la bonne humeur voulue des gens qui
s’amusent « quand même » et pensent que le bruit fera venir la
gaieté, sous prétexte que la gaieté amène souvent le bruit. C’est une
satisfaction intime et complète, qui se traduit par un continuel
échange de questions, de réflexions plus bizarres les unes que les
autres, faites en toute sincérité, accueillies avec la meilleure bonne
grâce.
Nous causons d’abord des choses de ce pays ; mais bientôt la
curiosité s’envole, et c’est un véritable voyage en France que nous
faisons avec nos nouveaux amis. On se raconte les histoires
d’autrefois, on redit les vers de Musset, de Hugo ; on chante les
immortelles vieilleries de Béranger. L’Uruguay ! où est l’Uruguay ? à
deux mille lieues assurément de ce groupe en vestes et en
chapeaux ronds, d’où s’échappent des refrains de Lecocq, des
hémistiches de Murger, et qui, entre deux gorgées de vin de
Champagne, trouve place pour une saillie d’une gauloiserie bien
authentique.
Que nos aimables hôtes de Montevideo en restent bien certains,
nous n’oublierons pas le « voyage autour d’un churrasco. »
Je ne vous dirai pas le retour au triple galop, par un tout autre
chemin, et notre rentrée triomphale, et les joyeux « événements » de
la soirée.
Le lendemain, malgré les fatigues de la veille, nous étions à
cheval au lever du soleil pour aller visiter un de ces établissements
d’abattage de bœufs qu’on nomme « saladeros. » Ce sont les great
attractions du pays. En une heure et demie, nous avons franchi les
quatorze kilomètres qui nous séparaient du but de notre excursion.
Malheureusement (heureusement pour les âmes sensibles) on ne
travaille au saladero qu’en été, c’est-à-dire dans quelques
semaines ; il faudra donc nous contenter des explications qui nous
seront fournies par le propriétaire du lieu. Tâchons d’être aussi clair
et plus bref qu’il le fut.
« Saladero », endroit où l’on sale. Il n’y a pas à s’y tromper ;
endroit aussi où on fait disparaître un bœuf comme un
prestidigitateur une muscade. Voici comment :
La tuerie commence au point du jour. Les animaux prêts à être
abattus sont amenés dans une enceinte qu’on appelle le « brette »,
vingt par vingt. Cette sorte de chambre circulaire est pavée de dalles
glissantes. En un point du mur est fixée une poutre horizontale ; à
côté d’elle une poulie dans laquelle passe une petite cordelette ; sur
cette poutre est assis un homme armé d’un couteau large, court et
aigu.
Non loin de là, un autre homme, monté sur une petite estrade,
tient l’une des extrémités de la corde qui passe dans la poulie et
n’est autre chose qu’un lasso, dont l’autre extrémité est fixée à la
selle d’un cheval monté.
Les bêtes sont introduites ; l’homme qui tient le lasso le jette sur
l’animal qui lui paraît le mieux à portée, le cheval part au galop. Ainsi
traîné par les cornes, le bœuf glisse sur les dalles de la brette et va
infailliblement frapper de la tête la poutre où l’attend l’homme au
couteau. Un seul coup sur la nuque, le même que porte le cachetero
dans une corrida, quand l’épée de l’espada n’a pas tué raide le
taureau, et l’animal tombe foudroyé, non pas sur le sol, mais sur un
wagon dont la surface est au niveau du sol.
En un clin d’œil le lasso est enlevé, une porte s’ouvre, le wagon
glisse et disparaît sous un hangar, où le dépècement se fait sans
désemparer. En six minutes environ, un bœuf de forte taille est
« lassé », tué, saigné, écorché et dépecé. La chair s’en va au Brésil
ou à La Havane, à moins qu’on n’en fasse, sur les lieux mêmes,
comme à Fray-Bentos, de l’extrait de Liebig ; les cuirs et le suif sont
envoyés à Anvers, à Liverpool ou au Havre ; les os, les cornes et les
sabots sont expédiés en Angleterre.
Dans le corral du saladero que nous visitions se trouvaient
quelques bœufs. Pensant nous intéresser davantage, le propriétaire
en fit abattre un devant nous ; les diverses phases de l’opération
furent terminées en six minutes et demie.
On ne tue que pendant quatre mois de l’année ; mais les
établissements de quelque importance abattent en moyenne mille
têtes par jour, chacun. Détail curieux : le desnucador, c’est-à-dire
celui qui est chargé du coup de couteau, lequel demande un sang-
froid et une sûreté de main extraordinaires, n’est payé que 10 à 12
francs par cent bœufs abattus. Ceux qui touchent la solde la plus
forte sont les charqueadores, chargés de découper en tranches de
quatre à cinq centimètres d’épaisseur les parties destinées à être
expédiées comme salaisons.
Assez de boucherie, n’est-ce pas ? Je gagerais que vous trouvez
mes impressions sur Montevideo peu intéressantes. Un déjeuner et
la visite d’un abattoir, voilà de plaisants récits de voyages ! Vous
m’excuseriez peut-être d’inventer, comme tant d’autres, une
anecdote quelconque, pour… corser ma narration. Je n’en ferai rien.
Permettez-moi seulement de vous dire, comme les orateurs qui
croient apercevoir quelques traces de fatigue sur les physionomies
de leur auditoire : encore quelques mots, et je termine !
« Pour qu’on puisse peupler les deux importants postes de
Montevideo et de Maldonado, j’ai donné les ordres nécessaires afin
qu’on vous envoie, par les navires indiqués, cinquante familles, dont
vingt-cinq du royaume de Galice et vingt-cinq des îles Canaries. »
Tel était le texte de l’ordonnance royale adressée d’Aranjuez, le 16
avril 1725, au gouverneur de Buenos-Ayres.
Maldonado n’a pris que fort peu de développement ; quant à
Montevideo, elle a aujourd’hui plus de 100,000 habitants, dont
65,000 nationaux, ce qui prouve que les vingt-cinq familles de Galice
n’avaient pas été mal choisies et comprenaient les devoirs que leur
imposait la volonté souveraine.
On pourrait croire que c’est sous la protection d’un gouvernement
stable, dans une ère de calme et de travail que la population a pu
prendre un aussi rapide essor. Loin de là. Pendant près d’un siècle,
le pays fut relativement tranquille ; mais soumis à la domination de
l’Espagne, bientôt impatient d’en secouer le joug, il ne jouissait pas
de plus de liberté que le Brésil à la même époque et ne prospérait
guère. En 1810, la Banda orientale (c’est l’ancien nom, encore très
employé, de la république de l’Uruguay) commence à s’émanciper et
parvient, en 1828, à se constituer en État indépendant.
Ayant atteint la réalisation de leurs plus chères espérances, les
Montévidéens exprimèrent leur satisfaction en se livrant à des
guerres civiles non interrompues, auxquelles vint s’ajouter la guerre
contre Buenos-Ayres, de 1843 à 1852. Pendant presque tout ce
temps, Montevideo fut assiégée par les troupes du dictateur Rosas,
et ne dut son salut qu’à l’intervention de Garibaldi. Le combat de
San-Antonio, où le célèbre patriote italien battit 1,000 cavaliers et
300 fantassins avec ses 200 légionnaires, a passé à l’état de
légende, du moins dans ce pays.
En 1857, nouvelle guerre civile jusqu’en 1860. Les
révolutionnaires, battus, laissent enfin s’établir la présidence de
Bernardo Berro, sous laquelle le pays est pacifié et s’occupe
uniquement de ses propres affaires. Cela dure trois ans. En 1863, la
dispute avec Buenos-Ayres recommence de plus belle. Le général
argentin Florès tient la campagne contre les gens de l’Uruguay
jusqu’à la fin de 1864 et s’allie alors avec le Brésil, qui profite tout
naturellement de l’occasion pour entrer en scène. Second siège de
Montevideo, bloquée par une escadre brésilienne ; menace de
bombardement, panique. Le président Villalba, qu’on a beaucoup
blâmé depuis, mais qu’on appelait alors « le vertueux président »,
livre la ville, le 19 février 1865, au général Florès, « dans l’intérêt de
la paix publique, de la sécurité et du bien-être de la cité. » Ce sont
les expressions qu’il emploie lui-même dans une lettre de
remerciement à l’amiral français Chaigneau, dont l’habileté et
l’énergique attitude avaient fait éviter d’irréparables malheurs.
Tout est fini ? Nullement. Le nouveau gouverneur, docile
instrument de la politique brésilienne, signe un traité d’alliance avec
l’empire esclavagiste et la république Argentine, pour
l’envahissement du Paraguay.
Le fameux dictateur Lopez défend son pays pied à pied pendant
cinq ans contre les trois puissances alliées et meurt, assassiné, dit-
on, ce qui met fin à une guerre qu’un peuple décimé ne pouvait,
d’ailleurs, prolonger davantage.
Vers cette époque, deux partis se dessinent nettement dans
l’Urugay : ce sont les colorados, ou rouges, et les blancos qui
s’intitulent aussi restauradores de las leyes. Leur but est bien net,
sinon bien avoué : rester au pouvoir quand ils y sont, et y arriver
quand ils n’y sont pas.
En 1868, Florès est assassiné. En 1870, les colorados, alors
maîtres de la ville, sont vivement attaqués par les blancos et
parviennent à s’en débarrasser. Mais ce n’est que pour peu de
temps, la lutte recommence bientôt. Enfin, en 1872, les deux partis
semblent réconciliés : enthousiasme général.
Nous arrivons aux événements tout à fait récents qui ont amené
la situation politique actuelle. On pourrait en retrouver d’analogues
dans l’histoire de certains pays d’Europe ; cependant elle ne laisse
pas que d’être assez originale.
Vous avez deviné ou pressenti qu’au fond de ces querelles faites
au nom de la liberté, de l’ordre, du progrès, de la loi, etc., les
questions financières étaient de fait seules en jeu. « Être ou ne pas
être » est bien le dilemme terrible qui s’impose aux pays troublés ;
mais les politiciens le traduisent : « Avoir ou ne pas avoir ». Je
retourne sur les bords du Rio de la Plata, si vous avez pu supposer
que je les aie quittés, et je continue.
Vers la fin de 1874, l’avocat Jose Ellauri, président depuis près
de deux ans, ayant soumis des projets d’emprunt qui rencontraient
une vive opposition dans les Chambres, hésitait à les faire agréer
par la force. Cependant, le déficit étant considérable, il était urgent
de prendre une décision. Pendant qu’il discute et tergiverse, un
jeune chef de bataillon, M. Latorre, harangue la garnison, l’entraîne,
dépose le président et fait nommer M. Pedro Varela, qui lui confie le
portefeuille de la guerre, en témoignage de sa reconnaissance.
Mais M. Varela n’était pas homme à pouvoir arranger des affaires
aussi embarrassées que celles de l’Uruguay. Le désarroi était
complet, le désordre à son comble, le pays écrasé par une dette de
papier-monnaie de 12 millions de piastres, c’est-à-dire environ de 60
millions de francs. Des troubles surgissent à l’intérieur ; Latorre, de
plus en plus nécessaire, parcourt le pays, prêche la concorde et le
patriotisme, frappe rudement, mais adroitement sur les plus
compromis, et revient à Montevideo.
En son absence, la situation était devenue ce que deviennent
généralement les situations mauvaises, quand on n’y applique pas
quelque remède énergique : elle avait empiré. M. Varela, impuissant
à la modifier, inquiet, indécis, ne tenait plus à ce pouvoir dont il
n’avait pas su se servir. Pour le quitter, il suffisait qu’une
manifestation populaire l’y autorisât ; elle eut lieu, cela va sans dire,
et, le 10 mars 1876, l’autorité suprême passait, sans discussion, aux
mains de l’homme indispensable, du sauveur, le colonel don
Lorenzo Latorre, qui régit et gouverne à son gré depuis cette époque
les destinées de la république démocratique et représentative de
l’Uruguay.
La constitution pourvoit le pays de sénateurs et de députés ; elle
est très libérale et très parlementaire, mais, pour le moment, il n’y a
dans la « Banda Oriental »
Ni représentants,
Ni sénateurs,
Ni président.
Il y a le dictateur Latorre, accepté, reconnu, acclamé, qui
promulgue ainsi ses décrets :
« Le gouverneur provisoire de la République, de par les facultés
ordinaires et extraordinaires qu’il revêt, en conseil des ministres, a
résolu et décrète, etc. »
Ne croyez pas que M. le gouverneur provisoire ne s’occupe que
de l’expédition des affaires courantes et ménage ostensiblement les
partis contraires pour rester plus longtemps au pouvoir ; M. Lorenzo
Latorre, je l’ai dit, gouverne. Il a rétabli la discipline dans l’armée,
purgé l’administration, fait rendre gorge à ceux qui avaient trop
impudemment pillé les caisses de l’État ; il supprime les journaux qui
lui déplaisent et met en prison les raisonneurs. M. Latorre n’est peut-
être pas un économiste de premier ordre ; cependant, depuis deux
ans et demi, il a amorti sept millions de piastres de papier-monnaie,
tandis que la dette de la république Argentine s’est accrue d’à peu
près autant dans le même temps.
Le nouveau maître de l’Uruguay s’est bien gardé de violer la
constitution. Il y eût risqué de recevoir un coup de couteau. En
prenant le pouvoir, il a convoqué les électeurs pour 1877 ; mais une
pétition des départements l’ayant engagé à continuer sa dictature,
c’est au mois de novembre 1878 qu’auront lieu les élections. Leur
résultat n’est pas douteux, et, jusqu’à ce qu’un plus avisé que lui
trouve moyen de dépopulariser le dictateur, M. Latorre continuera à
tenir l’Uruguay dans sa main. L’histoire lui donnera-t-elle tort ou
raison ? C’est ce que chacun ignore, et je n’aurais garde de me
prononcer sur un point aussi délicat.
BUENOS-AYRES

La rade. — Débarquement en voiture. — La sortie de la messe. — Visite à M.


le comte Amelot de Chaillou. — De Buenos-Ayres à Azul. — Chasse dans la
pampa. — Les gauchos. — Une colonie russe-allemande. — Complications
politiques. — Influence des étrangers.

Buenos-Ayres, 25 septembre.

On sait que le Rio de la Plata est un immense bras de mer de


plus de cent milles de long et cinquante de large, où se jettent les
deux grands fleuves le Parana et l’Uruguay, tous deux venant du
nord et prenant leur source au Brésil, le premier à l’ouest, le second
à l’est. Montevideo est sur la côte nord, tout près de l’entrée ;
Buenos-Ayres, sur la côte sud, tout près du fond.
Ces deux villes se ressemblent beaucoup, et presque toutes les
particularités de la première se retrouvent plus accentuées dans la
seconde. Montevideo est située sur un terrain à peine ondulé ;
Buenos-Ayres, sur un terrain absolument plat. Nous avons vu que
les grands navires doivent, à Montevideo, mouiller à près d’une lieue
de terre, sous peine d’échouer ; c’est à trois lieues qu’il leur faut
s’arrêter lorsqu’ils vont à Buenos-Ayres. Découpée en petits carrés
comme la capitale de l’Uruguay, celle de la république Argentine a
été construite sur un plan analogue, mais plus régulier encore. C’est
une très grande ville, qui a bien tournure de capitale, et qui, au
contraire de celle que je viens de quitter, est plus imposante que
gracieuse.
Mais procédons par ordre. Je reprends le cours de mon récit.
Arrivés de fort bonne heure dimanche dernier avec le Saturno, le
soleil, en se levant, nous montra, sur une longue ligne jaune très
fine, une autre longue ligne blanche et jaune s’étendant sur un
développement de près de quatre kilomètres. Au-dessus, quelques
coupoles, quelques tours carrées ; sur la gauche un peu de verdure :
c’est Buenos-Ayres.
Auprès de nous, fort peu de navires, cinq ou six petits vapeurs de
la taille du Saturno et quelques grosses barques de faible tonnage.
Où sont donc les paquebots, les clippers, les grands trois-mâts ?…
Un de mes compagnons me fait tourner le dos à la ville et me
montre à l’horizon, encore tout embrumé, les mâtures des navires de
commerce qui paraissent au loin comme une haie de pieux plantés
au hasard.
Les bâtiments du service local, construits de manière à ne caler
que très peu d’eau, peuvent, comme le Saturno, venir aussi près de
Buenos-Ayres que la Junon l’est de Montevideo ; mais les autres
restent hors de la portée de la vue et n’ont d’autre horizon que la
mer, en sorte que cette relâche doit être pour eux mortellement
ennuyeuse et incommode.
Nous embarquons, non sans peine, dans des canots de
passage, car il règne sur toute la rade un clapotis assez fort et une
brise que nos souvenirs du Brésil nous font trouver bien fraîche.
Arrivés à un demi-kilomètre de la plage, nous voyons des charrettes
à grandes roues, traînées par deux chevaux, venir au-devant des
embarcations. C’est qu’il n’y a pas assez d’eau pour que les plus
petits bateaux puissent accoster le rivage. Nous nous transbordons
dans ces véhicules, et nous roulons lentement vers la côte à travers
les eaux, sur un sable tellement dur que les roues de ces charrettes
n’y laissent qu’une faible trace.
Bientôt nous voici débarqués, et nous nous rendons à la douane
pour faire visiter nos valises.
Il paraît que, lorsque le « pampero », terrible tempête du sud-
ouest au sud-est, très fréquente dans ces parages, a soufflé pendant
longtemps, le rivage reste parfois découvert sur une étendue de
plusieurs milles ; les bâtiments demeurent alors à sec, et les marins
peuvent se promener à leur aise autour de leurs navires. On raconte
même qu’il y a quelques années, en pareille circonstance, le
gouvernement dépêcha un escadron de cavalerie pour se rendre
maître d’une canonnière montée par le général révolutionnaire
Urquiza. Cette petite expédition n’eut pas, cependant, tout le succès
qu’on en attendait ; les canons braqués contre la cavalerie
l’obligèrent à se replier avant qu’elle eût fait la moitié du chemin, en
sorte que les « loups » de mer n’eurent même pas à repousser
l’attaque des « chevaux » marins.
Après un rapide déjeuner à l’européenne, sinon tout à fait à la
française, je veux d’abord courir un peu au hasard dans la ville.
Je vous ai dit que c’était dimanche, et nous sommes à l’heure où
l’on sort des églises. Me voici de nouveau sous l’impression que
m’ont laissée les loges du théâtre de Montevideo, impression
charmante et qui me remplit d’indulgence pour les rues monotones
et mal pavées, pour les édifices sans grâce, pour le terrain tout plat,
pour les nuages de poussière que soulève la moindre brise. Buenos-
Ayres ! une ville ennuyeuse ! Non, il n’y a pas de ville ennuyeuse là
où il suffit d’aller se planter à la porte de la première église venue
pour en voir sortir un flot d’élégantes et gracieuses jeunes femmes à
l’air aimable, à la physionomie ouverte, aux grands yeux expressifs.
Je n’étais pas tout seul à regarder ce joli spectacle. Un assez
grand nombre de jeunes gens, qui certes n’étaient pas des
étrangers, en jouissaient comme moi, et même bien mieux que moi,
car c’étaient des saluts, des sourires, des bonjours, à n’en plus finir.
Tout ce monde paraissait fort satisfait et de belle humeur. N’ayant
de compliments et de coups de chapeau à adresser à personne, je
commençai à éprouver cette sensation désagréable de la solitude au
milieu de la foule, et je sautai dans un tramway qui passait, sans
m’enquérir de l’endroit où il se proposait de me mener.
Un quart d’heure après, j’étais hors des voies fréquentées, dans
un faubourg aristocratique nommé Florès. J’aperçus quelques
jardins, entourant de somptueuses maisons de campagne, mais pas
l’ombre de pittoresque, pas même la fantaisie artificielle et voulue
des quintas de Montevideo.
Une courte promenade suffit cependant à chasser mes idées
noires, et je rentrai dans la ville, l’heure étant venue d’aller rendre
visite à notre ministre de France, M. le comte Amelot de Chaillou.
J’appris qu’il demeurait à la campagne, un peu plus loin que ce
même faubourg où ma mauvaise humeur m’avait jeté. Plusieurs de
nos compagnons se joignirent à moi, et nous voilà de nouveau partis
dans un immense landau de louage, roulant assez grand train.
L’accueil de notre ministre fut aussi cordial et sympathique qu’il est
possible de l’imaginer. Il eut la bonté de mettre à notre disposition,
non seulement sa grande expérience du pays, mais aussi tous les
moyens dont il disposait pour nous faciliter une excursion dans
l’intérieur.
Notre premier projet était de remonter le Parana jusqu’à Rosario
et de nous enfoncer alors dans la pampa pour y faire quelque
grande chasse à l’indienne. Il nous fallut y renoncer, faute de temps.
Le comte Amelot nous proposa alors un petit voyage par le chemin
de fer jusqu’à une ville nommée Azul, située à soixante et quelques
lieues au sud de Buenos-Ayres. Faisant ce trajet dans la journée,
nous verrions bien le pays : à Azul même, nous assisterions aux
travaux de la campagne, nous verrions prendre et dompter les
chevaux sauvages, nous tirerions des coups de fusil tant qu’il nous
plairait, et après avoir vécu deux jours de la vie de l’estancia, nous
reviendrions assez à temps pour ne pas manquer le bateau du 25.
Ce plan accepté avec enthousiasme, M. le comte Amelot fit tout
préparer lui-même, si bien que le lendemain, à la pointe du jour,
nous n’eûmes d’autre peine que de nous installer dans un wagon
spécial que la compagnie du chemin de fer avait mis gracieusement
à notre disposition. Un instant après, le train filait à toute vapeur sur
la plaine unie du territoire argentin.
A peu de distance de la ville, et après avoir dépassé quelques
champs de maïs, nous avions déjà sous les yeux l’aspect de la
pampa, s’étendant devant nous, immense, sans limites, sans
variété, comme l’Océan ; rarement accidentée par quelques plis de
terrain qui rendent la comparaison plus juste encore en rappelant la
longue houle de l’Atlantique. A l’avant de la machine, on a fixé une
sorte de treillis formé de grosses barres de fer, inclinées à droite et à
gauche, c’est un chasse-bœufs destiné à culbuter en dehors de la
voie les animaux errants. Parfois la machine siffle, ralentit et même
s’arrête pour laisser passer un troupeau, ou bien ce sont des bandes
de chevaux qui s’enfuient en un galop désordonné, effrayés par
notre passage et le bruit de la locomotive.
Nous courons ainsi toute la journée à travers l’immensité
verdâtre des plaines, nous arrêtant à de longs intervalles devant
quelques pauvres villages, pour laisser monter et descendre des
familles de paysans.
A moitié chemin à peu près, nous faisons une halte pour
déjeuner et pour laisser passer le train qui vient d’Azul, car la voie
est unique. Il n’y a d’ailleurs qu’un départ par jour, et les trains ne
marchent pas la nuit. A partir de là, les villages deviennent rares.
Nous ne voyons plus que de pauvres ranchos aux toits de chaume,
soutenus par quelques murs en pisé, avec une porte basse, souvent
sans fenêtres, et de loin en loin quelques estancias enveloppées
dans des bouquets de verdure. Le paysage n’est animé que par la
rencontre de gauchos voyageant au galop de leurs petits chevaux.
Ce sont de beaux hommes, vigoureusement découplés, cavaliers
incomparables. Tous portent le même costume : le traditionnel
puncho, tunique sans manches, avec un trou pour passer la tête ; sa
couleur varie du jaune au brun.
Le puncho est fait de laine de guanaque ; c’est un excellent et
solide vêtement qui ne manque pas d’une certaine grâce ; un large
pantalon blanc, ne descendant qu’à mi-jambe, des bottes en cuir,
ornées d’énormes éperons, un feutre mou sur la tête : voilà tout
l’habillement du gaucho.
Notre route se poursuit au milieu d’innombrables troupeaux de
moutons, de bœufs et de chevaux, qui paissent en liberté ; mais
quand une bête s’écarte trop, elle est immédiatement saisie et
ramenée à l’aide du lasso. Nos regards se fatiguent à la longue de
ces plaines immenses et uniformes, qui n’attirent par aucun charme
et qui semblent ne donner aucune promesse, malgré cette
extraordinaire fertilité qui leur permettrait de nourrir le bétail de toute
l’Amérique.
L’aspect est bien différent, paraît-il, dans les territoires au nord de
La Plata, où la végétation est entretenue par l’humidité des grands
fleuves qui les arrosent et parfois les inondent. Mais ici nous
sommes dans la basse pampa, où l’on ne trouve ni fleurs, ni arbres,
ni montagnes, véritable désert de verdure empreint d’une poésie
triste et monotone. Pas un buisson ne se dessine sur l’azur pâle du
ciel. Les abords de la voie ferrée et les rares chemins, seulement
tracés par le passage des troupeaux, sont bordés de milliers de
squelettes, funèbres jalons que nous avons constamment sous les
yeux. Nous rencontrons aussi des marais ou lagunes, formés par
des dépressions de terrain où l’eau des pluies a pu se conserver. Ce
sont les seuls abreuvoirs des animaux de la pampa.
Enfin, nous atteignons Azul au coucher du soleil.
L’aspect tout européen de cette petite ville surprend le voyageur,
surtout s’il a été prévenu qu’à quelques lieues seulement au delà il
peut rencontrer des tribus indiennes, vivant encore à l’état sauvage,
et n’ayant pas fait leur soumission. La plupart des maisons ne
comprennent qu’un rez-de-chaussée ; elles sont construites en
brique et assez bien tenues. Les rues sont larges, tirées au cordeau,
non pavées, mais garnies de trottoirs formés de larges dalles. Çà et
là quelques bouquets d’arbres, entre autres sur la grande place, où
est édifiée l’église.
Nous trouvons bonne table et bon gîte dans le principal, je n’ose
dire le seul hôtel de l’endroit, et après une courte promenade, assez
fatigués tous de notre journée en chemin de fer, nous allons nous
reposer.
Le lendemain matin, nous recevons la visite d’un Français, M.
Theers, qui a fondé cette colonie il y a une vingtaine d’années ; notre
compatriote est maintenant grand propriétaire et, de plus, remplit les
honorables et délicates fonctions de juge de paix. Il nous offre fort
aimablement ses services et nous donne d’abord quelques
renseignements sur la ville.
Azul compte aujourd’hui environ 6,000 habitants, y compris les
gauchos et les Indiens. En 1875, ces derniers campaient encore
autour de la ville ; mais, après une révolte presque générale des
tribus, des renforts considérables furent envoyés de Buenos-Ayres,
et les Indiens, repoussés jusqu’à cinquante lieues de distance,
durent établir leurs campements aux lieux où ils avaient été refoulés.
Ces tribus, derniers vestiges des Indiens Pehuenches et des Indiens
Pampas, tendent à disparaître. On estime que, sur tout le territoire
de la république Argentine, il ne reste plus guère que dix mille
Indiens insoumis, dont une fraction seulement, celle qui confine aux
terres exploitées, peut causer quelque appréhension. Cependant, ce
n’est pas un mince travail pour les troupes du gouvernement que de
garder une ligne de frontières de plus de cent lieues d’étendue, où
elles sont obligées de se protéger par de larges fossés, sortes de
barrières que l’on ne manque pas d’avancer chaque fois que
l’occasion s’en présente.
Des détachements de cavalerie sont continuellement en marche
pour observer les mouvements des Indiens et prévenir des surprises
d’autant plus dangereuses que les prisonniers sont rarement
épargnés. Les tribus insoumises ne font pas de quartier et torturent
longuement leurs victimes avant de les mettre à mort, c’est-à-dire
avant de les scalper. Moins la torture et le scalp, les troupes
argentines répondent par des représailles analogues.
Le but des opérations militaires actuelles est de refouler les
indigènes jusqu’au delà du rio Negro, à la hauteur du 40e degré de
latitude sud. Depuis longtemps, ce fleuve est indiqué sur les cartes
comme séparant la république Argentine de la Patagonie. Les
prétentions des Argentins ne s’arrêtent même pas là ; ne voyant
aucune raison pour que le mouvement commencé ne se continue
pas, ils prétendent déjà avoir des droits sur la Patagonie elle-même ;
mais comme le Chili affiche également les mêmes prétentions, que
chaque pays prend la chose fort au sérieux et n’en veut, sous aucun
prétexte, démordre, on ne sait comment sera tranché le différend.
Ce qui est bien assuré pour l’instant, c’est que la Patagonie est
non seulement à conquérir, mais à explorer, et que, par conséquent,
elle appartient sans contestation de fait… aux Patagons. Je
reviendrai sans doute sur cette grave affaire quand j’aurai pris mes
renseignements dans le détroit de Magellan et entendu la partie
adverse — au Chili.

Notre excellent compatriote nous présente à un aimable


Hollandais, M. Freers, propriétaire d’une grande estancia des
environs, qui nous invite à venir chasser sur ses terres. Nous voilà
bientôt tous armés jusqu’aux dents et galopant dans la pampa.
Arrivés à un quart d’heure de la ville, le carnage commence ; si nous
avons été obligés de renoncer à tirer l’autruche et le guanaque,
qu’on ne rencontre guère près des habitations, nous nous rattrapons
en revanche sur un gibier moins remarquable, mais plus abondant.
En moins de deux heures, plus de trois cents pièces sont abattues :
ce sont des vanneaux, des poules d’eau, des canards d’espèces
variées, sans parler des perdrix, des bécasses…; nous avons même
tué des chats-huants. Au bruit de nos détonations, des bandes
ailées disparaissent à tire-d’aile, emplissant l’air de leurs cris. Nous
avons le regret de laisser échapper quelques chevreuils, hors de la
portée de notre tir, ainsi que des flamants et de beaux cygnes à col
noir qu’il est impossible d’approcher.
Les incidents comiques ne manquent pas. Ce terrain, tout coupé
de lagunes, est un véritable marécage, et nous nous trouvons
parfois dans l’eau jusqu’à mi-jambe. Plusieurs d’entre nous vont
ramasser leurs victimes jusqu’au milieu des mares, avec le faible
espoir d’être garantis par leurs bottes : ils sont bientôt aussi trempés
que les canards qu’ils rapportent.
En revenant de cette brillante mitraillade, chargés d’assez de
victuailles pour approvisionner tout un marché, on nous conduit au
grand corral de l’estancia. C’est là qu’on amène les troupeaux qui

You might also like