Professional Documents
Culture Documents
Download New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons Test Bank all chapters
Download New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons Test Bank all chapters
https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2014-comprehensive-17th-edition-parsons-test-bank/
https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2016-comprehensive-18th-edition-parsons-test-bank/
https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2018-comprehensive-20th-edition-parsons-test-bank/
https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2013-comprehensive-1st-edition-parsons-test-bank/
New Perspectives on Computer Concepts 2018 Introductory
20th Edition Parsons Test Bank
https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2018-introductory-20th-edition-parsons-test-bank/
https://testbankfan.com/product/new-perspectives-computer-
concepts-enhanced-comprehensive-2016-19th-edition-parsons-test-
bank/
https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2018-introductory-20th-edition-parsons-solutions-manual/
https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2010-comprehensive-1st-edition-parsons-test-bank/
https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2010-comprehensive-1st-edition-parsons-solutions-manual/
Chapter 6: The Internet
TRUE/FALSE
6. You may use an analog modem even if your phone service is digital.
7. With a voiceband modem, actual data transfer speeds are affected by factors such as the quality of your
phone line and connection.
11. To use portable satellite technology you must take your satellite with you.
14. Cloud computing is the term given to analyzing cloud patterns and, with the help of the computer,
predicting the weather.
15. Cell phones that offer Wi-Fi are not capable of making VoIP calls.
16. FTP is a protocol used by Internet phone companies for free long distance.
17. P2P file sharing allows users to obtain files from other users on the Internet.
18. BitTorrent protocols dissect files into small chunks that might reside on different computers.
19. One of the most common ways of gaining unauthorized access to a network is by looking for open
ports.
20. Most firewall software is preconfigured to block only unnecessarily open ports targeted by hackers.
MODIFIED TRUE/FALSE
ANS: F, always-on
2. A domain name ends with an extension that indicates its top-level domain.
_________________________
3. Downstream speed is the rate of data transmitted from your computer to the Internet.
_________________________
ANS: F, Upstream
PTS: 1 REF: 310
4. Mobile Internet access allows you to easily move your access device, as in the case of
vehicle-mounted satellite dishes that can be deployed when the vehicle is parked.
_________________________
ANS: F, Portable
5. Current dial-up technology can transport data at speeds up to 6 MB downstream for a distance of about
1.25 miles. _________________________
ANS: F, DSL
6. DSL is digital, so data doesn't need to be changed into analog signals and then back to digital.
_________________________
7. Wi-Fi handoffs from one Wi-Fi network to another are clumsy and prone to packet loss.
_________________________
8. The big bonus of portable WiMAX is that you use the same Internet service provider whether you are
at home or on the road. _________________________
9. Some cell phones can act as a Wi-Fi hotspot by becoming the router for a wireless network.
_________________________
10. Google Apps provides a glimpse of what grid computing has to offer for productivity applications.
_________________________
ANS: F, cloud
12. Distributed grids tap into thousands of PCs and Macs with Internet connections whose owners rent
their computer’s idle hours to a grid processing task. _________________________
ANS: F, donate
ANS: F, firewall
14. NATs are intended to work within LANs to monitor and direct packets being transported from one
device to another. _________________________
ANS: F, Routers
ANS: F
difficult
hard
nontrivial
MULTIPLE CHOICE
6. The accompanying figure represents the connection of your computer to the Internet; the router
marked B should belong to a(n) ____.
a. ISP c. company
b. NSP d. none of the above
ANS: B PTS: 1 REF: 304
9. Most Internet servers have an easy to remember name that is known as a(n) ____.
a. domain address c. FQDN
b. ISP d. NAP address
ANS: C PTS: 1 REF: 307
10. ____ is a valid top-level domain.
a. .ca c. .gog
b. .can d. .aol
ANS: A PTS: 1 REF: 307
11. Every domain name corresponds to a unique IP address that has been entered into the ____.
a. domain database c. name server
b. Domain Name System d. Internet Name Server
ANS: B PTS: 1 REF: 308
12. Until domain names are added to the DNS database, new sites can only be accessed by entering their
numeric ____.
a. ports c. protocols
b. domain names d. IP addresses
ANS: D PTS: 1 REF: 308
13. DNS cache ____ has been used by governments to keep citizens away from Web sites that supply
politically or culturally inflammatory information.
a. diversion c. poisoning
b. rerouting d. distraction
ANS: C PTS: 1 REF: 308
15. Technical management of the Internet's Domain Name System is coordinated by ____.
a. the government c. CANN
b. ICANN d. the Internet
ANS: B PTS: 1 REF: 309
16. The elapsed time for data to make a round trip from point A to point B and back is called ____.
a. speed c. mHz
b. latency d. access time
ANS: B PTS: 1 REF: 309
17. The rate of data that is transmitted from your computer to the Internet is ____.
a. downstream speed c. download speed
b. upstream speed d. upload speed
ANS: B PTS: 1 REF: 310
19. A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection.
a. dial-up c. DSL
b. fixed d. ISDN
ANS: A PTS: 1 REF: 312
20. In the accompanying figure, the type of signal represented by A is a(n) ____.
a. digital signal c. sine signal
b. analog signal d. cosine signal
ANS: A PTS: 1 REF: 313
21. In the accompanying figure, the type of signal represented by B is a(n) ____.
a. digital signal c. sine signal
b. analog signal d. cosine signal
ANS: B PTS: 1 REF: 313
22. Digital telephone systems open up the possibilities for digital data transport options such as ____.
a. cable Internet service c. WiMAX
b. DSL d. Both B and C
ANS: B PTS: 1 REF: 313
23. ____ service offered slightly faster service than dial-up but has today been replaced by DSL.
a. ISDN c. Cable Internet
b. WiMAX d. Satellite Internet
ANS: A PTS: 1 REF: 313
25. A ____ is a device that connects a computer to a telephone line and converts computer data signals
into signals compatible with DSL.
a. DSL filter c. DSL modem
b. DSL converter d. DSL adapter
ANS: C PTS: 1 REF: 315
28. Satellite data transport is subject to ____ delays of one second or more, which occur as your data is
routed between your computer and a satellite that orbits 22,200 miles above the Earth.
a. latency c. frequency
b. conditional d. concatenation
ANS: A PTS: 1 REF: 318
30. ____ wireless Internet service is designed to offer Internet access to homes and businesses by
broadcasting data signals over areas large enough to cover most cities and outlying areas.
a. Mobile c. WiFi
b. Cellular d. Fixed
ANS: D PTS: 1 REF: 319
32. Portable Internet access includes all of the following EXCEPT ____.
a. WiFi c. portable WiMAX
b. portable satellite d. cellular
ANS: D PTS: 1 REF: 321
33. The ability to easily move your Internet service from one location to another is considered ____
Internet service.
a. mobile c. moving
b. portable d. cellular
ANS: B PTS: 1 REF: 321
34. ____ is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow
seamless handoff between one tower and another.
a. WiMAX c. Portable WiMAX
b. Mobile WiMAX d. Mobile WiFi
ANS: B PTS: 1 REF: 324
35. Data transport rates depend on the technology of the cellular system. The generation of cellular
technology associated with analog voice service is ____.
a. 1G c. 2.5G
b. 2G d. 3G
ANS: A PTS: 1 REF: 325
36. Sending computer data over a ____ system required a voiceband modem to convert digital data into
audible signals.
a. 1G c. 3G
b. 2G d. Both A and B
ANS: D PTS: 1 REF: 325
37. ____ replaced analog technology with digital technology and added support for text messages.
a. 1G c. 3G
b. 2G d. 4G
ANS: B PTS: 1 REF: 325
38. ____ technologies support digital transmission for both voice and data.
a. 1G c. 3G
b. 2G d. None of the above
ANS: C PTS: 1 REF: 325
41. Interim 4G technologies such as ____ have been deployed since 2009.
a. LTE c. EV-DO
b. ITE d. none of the above
ANS: A PTS: 1 REF: 325
42. A communications protocol that provides Internet access from handheld devices is ____.
a. WAP c. HAP
b. WIP d. HIP
ANS: A PTS: 1 REF: 325
44. With ____ you can easily assemble a small network just about anywhere.
a. RF c. EVDO
b. MiFi d. All of the above
ANS: B PTS: 1 REF: 327
45. ____ computing depends on a grid of servers, storage devices, and protocols that offer
Internet-accessible computing services ranging from consumer-level media sharing to office
productivity applications and complex corporate data processing.
a. Cloud c. Ambient
b. Disperse d. Client
ANS: A PTS: 1 REF: 330
47. Messaging and chat protocols include all of the following EXCEPT ____.
a. IRC c. Jabber
b. MSNP d. Talkie
ANS: D PTS: 1 REF: 331
50. To set up free VoIP, you and the people you communicate with can install free VoIP clients such as
____.
a. SysIP c. Presto
b. Blink d. none of these
ANS: B PTS: 1 REF: 332
51. The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network.
a. ftp c. P2P
b. http d. GRID
ANS: A PTS: 1 REF: 335
52. The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location
pointed to by box B.
a. downloaded c. redirected
b. uploaded d. remastered
ANS: B PTS: 1 REF: 336
53. The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated by
box C.
a. index c. progress
b. resolution d. accuracy
ANS: C PTS: 1 REF: 336
54. The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box
A.
a. uploaded c. reloaded
b. downloaded d. remastered
ANS: A PTS: 1 REF: 336
55. ____ is a file sharing protocol that distributes the role of the file server across a collection of dispersed
computers.
a. ftp c. P2P
b. http d. BitTorrent
ANS: D PTS: 1 REF: 337
56. With BitTorrent, as more computers request the file, they become part of a ____ that uses peer-to-peer
technology to exchange file pieces with each other.
a. swarm c. leech
b. seed d. choker
ANS: A PTS: 1 REF: 337
58. Network services such as the Web, ftp, and e-mail operate from ____.
a. routers c. ports
b. gateways d. portals
ANS: C PTS: 1 REF: 340
59. The use of automated software to locate computers that are vulnerable to unauthorized access is a port
____.
a. search c. dig
b. probe d. pry
ANS: B PTS: 1 REF: 340
60. The average “survival time” for an unprotected computer to remain uncompromised is only ____.
a. nine seconds c. nine hours
b. nine minutes d. nine days
ANS: B PTS: 1 REF: 340
62. ____ are intended to work within LANs to monitor and direct packets being transported from one
device to another.
a. Routers c. Filters
b. Gateways d. Firewalls
ANS: A PTS: 1 REF: 342
63. A ____ IP address is one which can be accessed by packets on the Internet.
a. static c. routable
b. dynamic d. private
ANS: C PTS: 1 REF: 343
64. The accompanying figure represents a virtual private network. In this figure, A points to ____ data.
a. encrypted c. routed
b. remote d. nonencrypted
ANS: A PTS: 1 REF: 345
65. The accompanying figure represents a virtual private network. In this figure, B points to a(n) ____.
a. corporate network c. router
b. remote access server d. ISP
ANS: C PTS: 1 REF: 345
66. The accompanying figure represents a virtual private network. In this figure, C points to a(n) ____
server.
a. unencrypted c. public
b. VPN d. channel
ANS: B PTS: 1 REF: 345
67. The accompanying figure represents a virtual private network. In this figure, D points to ____ data.
a. nonencrypted c. wireless
b. encrypted d. public
ANS: A PTS: 1 REF: 345
68. The accompanying figure represents a virtual private network. In this figure, E points to ____.
a. a server c. an Internet channel
b. the Internet d. an ISP
ANS: B PTS: 1 REF: 345
70. One important security precaution when connecting your computer to public networks is to install a(n)
____.
a. router c. office suite
b. repeater d. remote PC
ANS: A PTS: 1 REF: 345
Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs
and ties up his phone line. He is looking for an alternative and has come to you for help.
71. Tom wants to know which Internet access is the fastest. You tell him ____.
a. DSL c. satellite
b. ISDN d. cable
ANS: D PTS: 1 REF: 316 TOP: Critical Thinking
72. Tom wants to know which of the services uses his existing telephone lines. You tell him ____.
a. DSL c. satellite
b. cable Internet service d. WiMAX
ANS: A PTS: 1 REF: 314 TOP: Critical Thinking
73. Tom wants to know what kind of service to opt for if cable Internet service is not available, or proves
slower or less dependable than expected. You tell him the next choice would be ____.
a. dial-up c. ISDN
b. DSL d. satellite
ANS: B PTS: 1 REF: 320 TOP: Critical Thinking
Sally often travels for her business. She needs a way to access the Internet while away from home. She
has come to you for help.
74. Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has heard
that there are some public WiFi options but she knows there are some limitations. You tell her ____.
a. they are very expensive
b. access speed is slow
c. wireless eavesdroppers can access personal info
d. all of the above
ANS: C PTS: 1 REF: 323 TOP: Critical Thinking
76. Another option Sally is considering is a portable satellite system. She asks you about the details and
you tell her ____.
a. a vehicle-mounted satellite dish can be deployed from a control panel inside the vehicle
b. signals can no longer be captured dependably if a fixed satellite dish moves out of
alignment
c. the challenge is to make sure the dish is correctly aimed from the location where it is used
d. all of the above
ANS: D PTS: 1 REF: 324 TOP: Critical Thinking
77. Sally has heard that cellular data service has poor quality. You tell her ____.
a. that it is always poor
b. that it is never poor
c. that it depends on the generation of technology being used
d. that it depends totally on the carrier
ANS: C PTS: 1 REF: 325 TOP: Critical Thinking
Harry is concerned about Internet security. He knows very little about the subject but does know it has
been in the news a great deal lately. He needs your advice.
78. You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says
he has one that came with his virus protection. He should ____.
a. disable both
b. use only the one that came with Windows
c. not enable the Windows firewall if his antivirus software firewall is activated
d. use both
ANS: C PTS: 1 REF: 341 TOP: Critical Thinking
79. Harry’s grandson has been coming to his house and downloading music. His grandson turned “file
sharing” on. He is concerned this causes security problems. Harry should ____.
a. deactivate it when not needed c. get an additional firewall
b. get anti-sharing software d. forget it and not worry
ANS: A PTS: 1 REF: 342 TOP: Critical Thinking
80. Harry’s daughter has a personal VPN. He has decided he wants to be current and wants one also. You
tell him ____.
a. that you will go buy one
b. that he already has one as a part of Windows
c. that he needs a specialist to install it
d. that it would provide extra security if he intends to use public Wi-Fi hotspots
ANS: D PTS: 1 REF: 345 TOP: Critical Thinking
COMPLETION
ANS:
network access points
NAPs
network access points (NAPs)
NAPs (network access points)
ANS: backbone
ANS:
ISP
Internet Service Provider
ISP (Internet Service Provider)
Internet Service Provider (ISP)
4. A(n) ____________________ contains circuitry that converts various data-carrying signals from your
computer to signals that can travel over various communications channels.
ANS: modem
5. The primary protocol suite responsible for message transmission on the Internet is
____________________.
ANS:
TCP/IP
Transmission Control Protocol/Internet Protocol
TCP/IP (Transmission Control Protocol/Internet Protocol)
Transmission Control Protocol/Internet Protocol (TCP/IP)
7. The type of Internet access that allows you to send an e-mail from your cellphone as you ride on a
high-speed train is ____________________.
ANS: mobile
8. A fixed Internet connection that uses a voiceband modem and telephone line to transport data is
____________________.
ANS: dial-up
9. A high-speed, digital, always-on, Internet access technology that runs over standard phone lines is
____________________.
ANS:
DSL
Digital Subscriber Line
DSL (Digital Subscriber Line)
Digital Subscriber Line (DSL)
10. A DSL ____________________ prevents voiceband signals from interfering with DSL signals.
ANS: filter
11. An area in which the public can access a Wi-Fi network is called a(n) ____________________.
ANS:
hotspot
Wi-Fi hotspot
12. A communications protocol that provides Internet access from handheld devices is called
____________________.
ANS:
WAP
Wireless Access Protocol
WAP (Wireless Access Protocol)
Wireless Access Protocol (WAP)
ANS: broadband
14. An Internet ____________________ is a Web-based online discussion site where participants post
comments to discussion threads.
ANS: forum
15. A(n) ____________________ is similar to an online diary that contains a series of entries on one or
more topics.
ANS:
blog
Web log
16. A(n) ____________________ is a short message of 140 characters or less, posted to the Twitter Web
site.
ANS: tweet
17. A computing system in which a network of computers are harnessed together to perform processing
tasks is called a(n) ____________________ computing system.
ANS: grid
18. Any access to data or programs by hackers, criminals, or other unauthorized persons is called
____________________.
ANS: intrusion
19. A(n) ____________________ IP address is a non-routable IP address that can be used within a LAN,
but not for Internet data transport.
ANS: private
20. The process your router uses to keep track of packets and their corresponding private or public IP
addresses is network address ____________________.
ANS: translation
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
a. anonymous FTP g. asymmetric Internet connection
b. private IP address h. VPN
c. symmetric Internet connection i. NAP
d. static IP address j. dynamic IP address
e. Ping k. Internet backbone
f. routable IP address l. fixed wireless Internet service
1. Provides the main routes for data traffic across the Internet
2. An Internet utility that sends a signal to a specific Internet address and waits for a reply
3. Upstream and downstream speeds are the same
4. Wireless broadband service
5. Does not use a password
6. Upstream and downstream speeds are different
7. Non-routable IP address
8. Temporarily assigned address
9. Permanently assigned address
10. Tie network links together
11. Can be accessed by packets on the Internet
12. A corporate solution for Internet security
ESSAY
1. Explain the difference between portable Internet access and mobile Internet access.
ANS:
Portable Internet access is defined as the ability to easily move your Internet service from one location
to another. The required device is light and compact enough to easily carry. However, you must
remain in one location while you use the service.
Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus,
car, train, or plane. It is very similar in concept to cellular phone service that allows you to move freely
within the coverage area as it seamlessly hands off your signal from one tower to the next. Mobile
Internet access includes Wi-Fi, mobile WiMAX, and cellular broadband service.
ANS:
VoIP (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet
connection is used to place telephone calls instead of the regular phone system. It is based on SIP
(Session Initiation Protocol), so VoIP software is sometimes referred to as a SIP client. The earliest
VoIP connections were computer-to-computer connections. Both the person initiating the call and the
person receiving the call had to have computers with microphones and headsets or speakers. You
could only call people who were using the same VoIP software and who happened to be online when
you wanted to call them. These early VoIP systems worked more like instant messaging with voice
than a traditional phone call. You can still use VoIP to make calls from one computer to another, but
today’s VoIP systems allow you to use a standard telephone handset to make or receive calls. They
also allow you to receive calls from land line telephones and to place calls to these telephones.
Today’s VoIP systems convert voice communications to data packets. An IP address is attached to
each packet. If you are calling a friend with computer-based VoIP, for example, your friend’s IP
address will be attached to the packets. If you are calling a land line or other destination without its
own IP address, your VoIP packets will carry an IP address of a service that can route your packets to
their destination using land lines where necessary.
ANS:
BitTorrent is a file sharing protocol that distributes the role of file server across a collection of
dispersed computers. BitTorrent is, in some sense, an offshoot of grid computing concepts, in which an
ad-hoc collection of personal computers located anywhere on the Internet can cooperate to complete a
task normally handled by monolithic servers or supercomputers.
A BitTorrent network is designed to reduce the bandwidth bottleneck that occurs when many people
attempt to download the same very large file, such as a feature-length film, application software, or an
interactive 3-D computer game.
Suppose that 100 computers request a film at about the same time. A server breaks the movie file into
pieces and begins to download those pieces to the first computer that requested the movie. As more
computers request the file, they become part of a “swarm” that uses peer-to-peer technology to
exchange file pieces with each other. After the server has downloaded all the file pieces to the swarm,
its job is complete and it can service other requests. The swarm continues to exchange file pieces until
every computer in the swarm has the entire file.
ōb,
325
Obelisk of Shalmaneser II,
122, 206
Oblations (tᵉrūmāh)
314
Obsolete English words:
At (after verbs of asking), 241
Grave (verb = carve), 174
Magnifical, 134
Play (= dance), 96, 106
Polls (= heads), 137
Skill (verb), 174, 333
Oded,
229, 295 f.
ōhel,
197, 274
Omar, the Mosque of,
181
‘ōnēn,
325
Onyx,
164
Ophel,
291, 328
Ophir,
164, 202, 257
Oracle, the,
180, 185, 187
Ornan,
131, 177
Osorkon,
226
Overseers,
173, 176, 333
P, or “Priestly” narrative,
xx, 2 f.
paḥōth,
205
Palace, the,
163, 166
Palmyra,
199
Paphos, the temple of,
180
Parbar,
151
Parvaim,
178
Passover, the,
of Hezekiah, 308 ff.;
of Josiah, 310, 320, 339 ff.
Pelethites,
120, 167
Pentateuch, the,
xiv, xx, 238, 337 ff.
Perfect heart, a,
93, 160, 165 f., 231, 248
Pestilence,
130 f.
Petrie, W. M. Flinders,
History of Egypt, 226, 344
Philistines,
the original seats of the, 7;
war with the, 74, 99 ff., 126, 286 f., 297;
invasion by, 262 f.
Phinehas,
69
Phœnician language,
173
Physicians,
235
Pillar,
271
Pillars (Jachin and Boaz),
179 f., 184
Plague,
193
Play on words,
15, 57, 254, 282
Poll-tax,
274, 347
Porch of the Temple,
177
Porters, see Doorkeepers
Posts (= runners),
309
Precious stones,
178
Priesthood, the double,
102, 167
Priests,
51 f., 303, 307, 312 ff.;
courses of, 66;
sons of the, 71;
David’s organisation of the, 141 ff.
Princes of the sanctuary,
142
Princes of the tribes of Israel,
155
Prophetess,
335
Psaltery,
96, 103, 146, 188, 204
Psalms xcvi, cv, cvi,
107
Pul,
34, 37
Punt (Put),
6
Rabbah,
121, 125
Ramoth-gilead,
51, 240, 245
Rechabites, the,
21
Recorder (= chronicler),
120, 332
Rehoboam,
211 ff.
Rephaim,
126 f.;
valley of, 81, 99
Rhodians,
5
River, the (= the Euphrates),
13, 206
Robertson Smith, W.,
Old Testament in the Jewish Church, 16;
Religion of the Semites, 83, 180, 213, 219, 224
Robinson’s Arch,
150
Ruler of the house of God, the,
66, 315, 340
Ryle,
Genesis, referred to, 2 f., 6;
(on Ezra and Nehemiah), 143, 163, 273, 296, 334 f.;
Prayer of Manasses, 328
Sabbath,
351
Sackcloth,
131
Sacrifice,
consumed by fire from heaven, 195;
daily morning and evening, 141, 276;
sevenfold, made by Hezekiah, 304;
of thank offerings and burnt offerings, 306 f.;
of peace offerings, 106, 132, 307, 328
St Mary’s Well,
323 f., 327
Salt,
covenant of, 219;
the valley of, 119, 281
Samaria,
266, 309
Samaritan schism, the,
xxi, xxxviii
Samuel,
the descent of, 41;
the seer, 70, 168, 234
Sargon,
309, 317
Satan (= the Adversary),
128
Saul,
genealogy of, 62 f., 72;
defeat, death and burial of, 73 ff.
Saws,
126
Scorpion,
209
Scribe,
120, 142, 157
Sea of the Temple, the,
119, 181 f., 184, 300
Seer,
70, 168, 234
Sennacherib, threatened invasion by,
316 ff.
sēpher hattōrah,
338
Septuagint, the, version of Chronicles,
lviii f.
Shalmaneser,
122, 206, 309
Sharon,
35;
the great maritime plain, 156
Sheba,
6 f.;
Queen of, 202 ff.
shēbhet,
83
Shechem,
48, 56, 207
shelaḥ,
270, 319
shĕlāṭīm,
118, 270
Shemaiah,
210, 215
Sheminith,
set to the, 104
Shephēlāh,
156, 172, 207, 288, 298
Shewbread,
71 f., 139, 141, 162, 174, 221, 304
Shields of gold,
118, 205, 270, 323
Shihor, brook of,
96
Shishak, invasion by,
214 ff.
Siloam, the Lower Pool of,
318
Singers, the families of the,
xvi, xlii, 38, 42, 104, 145 ff., 341
ṣinnah,
205
sippim,
269
Slings,
288
Smith, G. A.,
Historical Geography of the Holy Land, 74 f., 81, 83,
171, 184, 192, 207, 212, 226, 249 f., 255, 294,
297;
Jerusalem, 78 f., 163, 288, 291, 318 f., 324, 327;
(in Encyclopedia Biblia), 118;
Early Poetry of Israel, 294
Sojourners,
165 f.
Solomon,
133 ff., 160 ff.;
twice crowned, 167;
great sacrifice of, 169 f.;
vision of, 170 f.;
horses and chariots of, 171 f.;
makes preparations for building the Temple, 173 ff.;
begins to build the Temple, 176 ff.;
brings the Ark into the sanctuary, 186 f.;
blessing and prayer of, 189 ff.;
the night vision of, 197 f.;
cities of, 198 ff.;
arrangements of, for the Temple worship, 201 f.;
the fleet of, 202;
the greatness of, 204 ff.
Sorcery,
325
Spices,
204, 235
Stir up the spirit,
37, 262, 352
Store cities,
233, 238
Strangers, see Aliens
Suburbs,
47, 95, 212, 316
Sun-images,
224, 331
Sycomore,
156, 172, 207
Syria, Syrians,
9, 17, 116, 124;
invasion by, 278
Syriac Version, the,
lix
Syro-Ephraimite war, the,
294 f.
Tabali,
5
Tabernacle,
70, 94, 133, 274 f.
Tabor,
50
Tadmor,
199
Tamar,
199
ṭaph,
252
Tarshish (= Tartessus),
5, 54, 205 f., 257 f.
Tarsus,
5
Task-work,
126, 134, 200
Tekoa,
18, 26, 254
Tell el-Amarna letters,
5, 58, 78, 121, 212
Teman,
11
Temple, the,
gates of, 68, 268 f., 272 f., 291;
David’s preparations for building, 133 ff.;
measurements of, 134, 177;
the pattern of, 161 ff.;
Solomon prepares to build, 173 ff.;
description of, 176 ff.;
dedication of, 186;
restoration of, 274 ff.;
cleansing of, 301 ff.;
repair of, 332 ff.;
Cyrus decrees the rebuilding of, 351 f.
Tenderhearted,
220
Tent,
69, 94, 101, 106, 186, 274
tĕrū‘ah,
106, 230
tĕrūmāh,
314
Testimony, the,
270 f., 274
Text of Chronicles, the,
xxii, lviii, 7, 13, 15, 16, 18, 21, 27, 28, 35, 41, 42, 46,
49, 54, 55, 56, 58, 59, 60, 68, 82, 85, 115, 182,
214, 217, 227, 248, 255, 259, 323, 336
Thistle (= thorn),
283
Threshing-floor,
97, 131 f., 242
Thucydides referred to,
xlviii
Tigris,
122
Tilgath-pilneser (Tiglath-pileser),
34, 37, 292, 297 ff., 309
Times (= changes, opportunities),
93, 168
Tisri, the seventh month,
186
Tithe,
313 f.
Titus, Arch of,
230
tōrah,
191, 228, 338
Torrey, C. C.,
Ezra Studies, xxxiii f., xlvi, lviii, lx, 38, 218, 237, 264 f.,
343, 345
Treasuries, the,
161
Trees, large,
76, 294
Tree-worship,
224
Trumpets, silver,
105, 112, 188, 196, 221, 230, 305
Tyre,
5, 8, 134
Tyrseni,
5
Uriah,
86, 120
Urim and Thummim,
99
Uzziah,
285 ff.
Zadok,
39 f., 92, 102, 111, 142, 155, 167, 314
Zechariah, martyrdom of,
277
Zedekiah the king,
349 f.
Zedekiah the prophet,
242, 244
Zemaraim, the battle of,
218 ff.
Zerah the Ethiopian,
225 f.
Zidon, Zidonians,
8, 134
Ziz,
252
Zobah,
116 f., 122, 124, 199