Visit https://testbankdeal.com to download the full version and
explore more testbank or solutions manual
Essentials of MIS 12th Edition Laudon Solutions
Manual
_____ Click the link below to download _____
https://testbankdeal.com/product/essentials-of-mis-12th-
edition-laudon-solutions-manual/
Explore and download more testbank or solutions manual at testbankdeal.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Essentials of MIS 12th Edition Laudon Test Bank
https://testbankdeal.com/product/essentials-of-mis-12th-edition-
laudon-test-bank/
Essentials of MIS 10th Edition Laudon Solutions Manual
https://testbankdeal.com/product/essentials-of-mis-10th-edition-
laudon-solutions-manual/
Essentials of MIS 13th Edition laudon Solutions Manual
https://testbankdeal.com/product/essentials-of-mis-13th-edition-
laudon-solutions-manual/
Business Driven Information Systems Canadian 4th Edition
Baltzan Solutions Manual
https://testbankdeal.com/product/business-driven-information-systems-
canadian-4th-edition-baltzan-solutions-manual/
Anatomy And Physiology 9th Edition Patton Solutions Manual
https://testbankdeal.com/product/anatomy-and-physiology-9th-edition-
patton-solutions-manual/
Management Canadian 12th Edition Robbins Solutions Manual
https://testbankdeal.com/product/management-canadian-12th-edition-
robbins-solutions-manual/
Educational Psychology 14th Edition Woolfolk Test Bank
https://testbankdeal.com/product/educational-psychology-14th-edition-
woolfolk-test-bank/
Created Equal A History of the United States Volume 1 5th
Edition Jones Test Bank
https://testbankdeal.com/product/created-equal-a-history-of-the-
united-states-volume-1-5th-edition-jones-test-bank/
Principles of Taxation for Business and Investment
Planning 16th Edition Jones Test Bank
https://testbankdeal.com/product/principles-of-taxation-for-business-
and-investment-planning-16th-edition-jones-test-bank/
Marketing 4th Edition Grewal Test Bank
https://testbankdeal.com/product/marketing-4th-edition-grewal-test-
bank/
Copyright © 2017 Pearson Education, Inc.
1
Chapter 7
Telecommunications, the Internet, and Wireless Technology
Learning Objectives
7-1 What are the principal components of telecommunications networks and key networking
technologies?
7-2 What are the different types of networks?
7-3 How do the Internet and Internet technology work and how do they support communication
and e-business?
7-4 What are the principal technologies and standards for wireless networking, communication,
and Internet access?
Learning Catalytics is a “bring your own device” student engagement, assessment, and
classroom intelligence system. It allows instructors to engage students in class with real-time
diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to
access it. For more information on using Learning Catalytics in your course, contact your
Pearson Representative.
Chapter Outline
7-1 What are the principal components of telecommunications networks and key networking
technologies?
Networking and Communication Trends
What is a Computer Network?
Key Digital Networking Technologies
7-2 What are the different types of networks?
Signals: Digital vs. Analog
Types of Networks
Transmission Media and Transmission Speed
7-3 How do the Internet and Internet technology work and how do they support
communication and e-business?
What is the Internet?
Internet Addressing and Architecture
Internet Services and Communication Tools
The Web
7-4 What are the principal technologies and standards for wireless networking,
communication, and Internet access?
Cellular Systems
Wireless Computer Networks and Internet Access
RFID and Wireless Sensor Networks
Copyright © 2017 Pearson Education, Inc.
2
Key Terms
The following alphabetical list identifies the key terms discussed in this chapter. The page
number for each key term is provided.
3G networks, 254 Personal-area networks (PANs), 254
4G networks, 254 Predictive search, 249
Bandwidth, 236 Protocol, 233
Blog, 251 Radio frequency identification (RFID), 256
Blogosphere, 252 Router, 231
Bluetooth, 254 RSS, 252
Broadband, 230 Search engines, 247
Cable Internet connections, 237 Search engine marketing, 250
Chat, 242 Semantic search, 248
Digital subscriber line (DSL), 237 Shopping bots, 250
Domain name, 238 Smart phones, 253
Domain name systems (DNS), 238 Social networking, 252
E-mail, 242 Social search, 249
File Transfer Protocol (FTP), 242 Software-defined networking, 231
Hertz, 236 Switch, 231
Hotspots, 256 T1 lines, 237
Hubs, 231 Telnet, 242
Hypertext Transfer Protocol (HTTP), 247 Search engine optimization (SEO), 251
Instant messaging, 242 Transmission Control Protocol/Internet Protocol
(TCP/IP), 233
Internet of Things, 253 Unified communications, 245
Internet Protocol (IP) address, 237 Uniform resource locator (URL), 247
Internet service provider (ISP), 236 Virtual private network (VPN), 246
Internet2, 241 Visual Web, 250
IPv6, 241 Voice over IP (VoIP), 243
Local-area network (LAN), 235 Web 2.0, 251
Metropolitan-area network (MAN), 236 Web 3.0, 253
Microblogging, 252 Web site, 2246
Modem, 234 Wide-area networks (WAN), 236
Network operating system (NOS), 230 Wi-Fi, 255
Packet switching, 232 Wiki, 252
Peer-to-peer, 235 WiMax, 256
Wireless sensor networks (WSNs), 258
Copyright © 2017 Pearson Education, Inc.
3
Teaching Suggestions
Chapter 7 presents crucial concepts and terminology since telecommunications, networks, and
the Internet are now introducing fundamental changes in businesses. The opening case,
“Wireless Technology makes Dundee Precious Metals Good as Gold,” illustrates some of the
new capabilities and opportunities provided by contemporary networking technology.
Dundee implemented an underground wireless Wi-Fi network that allows electronic devices to
exchange data wirelessly to monitor the location of equipment, people, and ore throughout the
mine’s tunnels and facilities. The company also uses Wi-Fi radio frequency identification
(RFID) technology to track workers, equipment, and vehicles in underground gold mines.
Dundee has decreased equipment downtime and utilizes its resources more efficiently. It uses
data from the underground wireless network in its mine management software and mobile
planning software. Now the company can more closely account for its mine workers, making
them more safe and the workers can communicate more closely with the mine’s control room.
Control room staff can actually see the location of machinery and direct traffic more effectively,
quickly identify problems and respond more rapidly to emergencies.
The opening vignette provides an example of how businesses are adapting to new technologies
based on the Internet. It shows how companies must continually evolve as technology improves.
Section 7-1, “What are the principal components of telecommunications networks and key
networking technologies?” Telecommunications and networks are vital to the majority of
businesses today, and this section explains why. Because telecommunications technology serves
as the foundation for electronic commerce and the digital economy, the concepts and
terminology in Chapter 7 are important for both MIS and business majors. This section explains
the basic configuration of networks, regardless of their size.
You may want to contrast the origin and history of telephone networks and computer networks.
Then diagram how the two are converging into one pipeline for all types of communication
transmissions. Convergence is leading to more efficient transmission traffic and ubiquitous
communications thanks to the Internet.
A contemporary corporate network infrastructure relies on both public and private infrastructures
to support the movement of information across diverse technological platforms. It includes the
traditional telephone system, mobile cellular communications, wireless local area networks,
videoconferencing systems, a corporate website, intranets, extranets, and an array of local and
wide area networks, including the Internet.
Contemporary networks have been shaped by the rise of client/server computing, the use of
packet switching, and the adoption of TCP/IP as a universal communications standard for linking
disparate networks and computers. Client/server networks have distributed much of the
organization’s computing power to the desktop and factory floor. Packet switching makes more
Copyright © 2017 Pearson Education, Inc.
4
efficient use of network communications capacity by breaking messages into small packets that
are sent independently along different paths in a network and then reassembled at their
destination. Protocols provide a common set of rules that enable communication among diverse
components in a telecommunications network. TCP/IP is a suite of protocols that has become
the dominant model of achieving connectivity among different networks and computers. It is the
connectivity model used in the Internet.
One exercise you may try to help show how much we rely on communications today is to ask
students to count the number of text messages, phone calls, e-mails, and IM messages they either
sent or received in the last 24 hours or the last week. You could even go so far as to ask them to
not send or receive any of these communications for a day to prove how reliant we’ve become on
telecommunications.
Section 7-2, “What are the different types of networks?” It may help for you to bring several
props to show the different transmission media explained in this section. For example, bring
twisted wire, coaxial cable, and fiber-optic cable to show to the class and discuss the advantages
and disadvantages of each type of media. Students should note the different ranges (frequencies)
of wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this
is a critical concept today. Table 7.1 compares the range of four different area networks.
This section describes the different network topologies and how they pass data across a network.
If you have students working in business, ask them to identify the network topologies used in
their organizations.
Section 7-3, “How do the Internet and Internet technology work and how do they support
communication and e-business?” Most students are familiar with the Internet and motivated to
discuss it. You might begin this section by asking students how they spend their time on the
Internet and how their online activities have changed since they started using the Internet. Also,
ask them to identify which client platforms they currently use or have used. Ask your students to
identify several of the many benefits that the Internet offers to organizations. Ask them to
provide specific examples that they have read about in the text or have personally observed.
The principal Internet services and communication tools are e-mail, chatting, instant messaging,
newsgroups, telnet, file transfer protocol, and the web. Most students will probably be familiar
with these services, having used them in their personal life. What they may not understand or
relate to quite yet is how effective the tools are in a business setting. These tools reduce time and
cost when firms must manage organizational activities and communicate with many employees.
If you have students working in businesses, ask them to discuss the communications tools their
organization uses. This section introduces a fairly new concept of unified communications. It
also compares Web 2.0 with Web 3.0 that is now in the conceptual stage.
Make students aware that while the new information technology infrastructure provides many
benefits and capabilities, it does require careful management and planning. Challenges posed by
networking and the Internet include loss of management control over information systems; the
need for organizational change; and the difficulty of ensuring infrastructure scalability and
reliability.
Copyright © 2017 Pearson Education, Inc.
5
Interactive Session: Organizations: The Battle over Net Neutrality
Case Study Questions
1. What is network neutrality? Why has the Internet operated under net neutrality up to
this point in time?
Network neutrality is the idea that Internet service providers must allow customers equal access
to content and applications, regardless of the source or nature of the content. Presently the
Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by
Internet backbone owners. The Internet is neutral because it was built on phone lines, which are
subject to ‘common carriage’ laws. These laws require phone companies to treat all calls and
customers equally. They cannot offer extra benefits to customers willing to pay higher premiums
for faster or clearer calls, a model known as tiered service.
2. Who’s in favor of network neutrality? Who’s opposed? Why?
Those in favor of network neutrality include organizations like MoveOn.org, the Christian
Coalition, the American Library Association, every major consumer group, many bloggers and
small businesses, and some large Internet companies like Google and Amazon. Verizon and
Google proposed a split proposition – enforce net neutrality on wired connections, but not on
wireless networks. Some members of the U.S. Congress also support network neutrality. This
group argues that the risk of censorship increases when network operators can selectively block
or slow access to certain content. Others are concerned about the effect of slower transmission
rates on their business models if users can’t download or access content in a speedy fashion.
Those who oppose network neutrality include telecommunications and cable companies who
want to be able to charge differentiated prices based on the amount of bandwidth consumed by
content being delivered over the Internet. Some companies report that five percent of their
customers use about half the capacity on local lines without paying any more than low-usage
customers. They state that metered pricing is “the fairest way” to finance necessary investments
in its network infrastructure. Internet service providers point to the upsurge in piracy of
copyrighted materials over the Internet as a reason to oppose network neutrality. Comcast
reported that illegal file sharing of copyrighted material was consuming 50 percent of its network
capacity. The company posits that if network transmission rates were slower for this type of
content, users would be less likely to download or access it. Those who oppose network
neutrality argue that it removes the incentive for network providers to innovate, provide new
capabilities, and upgrade to new technology.
3. What would be the impact on individual users, businesses, and government if Internet
providers switched to a tiered service model for transmission over landlines as well as
wireless?
Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate
without permission from the phone and cable companies or other authorities. A more level
Copyright © 2017 Pearson Education, Inc.
6
playing field spawns countless new businesses. Allowing unrestricted information flow becomes
essential to free markets and democracy as commerce and society increasingly move online.
Heavy users of network bandwidth would pay higher prices without necessarily experiencing
better service. Even those who use less bandwidth could run into the same situation.
Network owners believe regulation like the bills proposed by net neutrality advocates will
impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from
‘discriminatory’ network practices. U.S. Internet service already lags behind other nations in
overall speed, cost, and quality of service, adding credibility to the providers’ arguments.
Obviously, by increasing the cost of heavy users of network bandwidth, telecommunication and
cable companies and Internet service providers stand to increase their profit margins.
4. It has been said that net neutrality is the most important issue facing the Internet since
the advent of the Internet. Discuss the implications of this statement.
Under current conditions, the Internet is neutral; all Internet traffic is treated equally on a first-
come, first-served basis by Internet backbone owners. Proponents of net neutrality say that
changing anything would disrupt normal service for users and begin a trend of discrimination
based on the types of Internet usage.
Network owners believe regulation to enforce net neutrality will impede U.S. competitiveness by
discouraging capital expenditure for new networks and curbing their networks’ ability to cope
with the exploding demand for Internet and wireless traffic.
Internet service providers (ISPs) assert that network congestion is a serious problem and that
expanding their networks would require passing on burdensome costs to consumers. These
companies believe differential pricing methods, which include data caps and metered use—
charging based on the amount of bandwidth consumed—are the fairest way to finance necessary
investments in their network infrastructures.
5. Are you in favor of legislation enforcing network neutrality? Why or why not?
Student answers will vary. Some components and principles to consider in answering this
question include:
• Price differentials: how much more would heavy bandwidth users pay than those who
consume less bandwidth?
• Speed: how much faster would network transmissions be with a tiered service model?
• Stifle innovation: would a tiered service model stifle innovation by charging more for
heavy bandwidth use or would it free up bandwidth thus allowing more innovation?
• Censorship: would telecommunication and cable companies and Internet service
providers increase censorship of content transmitted over networks?
• Discrimination by carriers: would the end of network neutrality be the beginning of more
discrimination?
Interactive Session: People: Monitoring Employees on Networks: Unethical or Good
Business?
Copyright © 2017 Pearson Education, Inc.
7
Case Study Questions
1. Should managers monitor employee e-mail and Internet usage? Why or why not?
Student answers will vary on this question. The case study statistics show that corporate misuse
and abuse of e-mail for personal reasons is exploding. Simply stated, employees who use
company resources for work not related to the company are, in essence, engaged in “service
theft.” They are being paid to work for the company, and this does not include abusing corporate
resources for personal time. Companies are in business to generate profits for their shareholders.
Managers certainly should be concerned with the loss of time and employee productivity, the
additional traffic it creates on their networks that inhibits the efficiency for real business
purposes, lost revenue or missed opportunities, as well as overcharging clients because of lost
employee efficiencies. The company itself is responsible for the use of its resources and what
employees do while using them. Adverse publicity can seriously affect a company and could
even result in expensive lawsuits. Companies also fear e-mail leakage of trade secrets. Other
legal and regulatory problems involve the safe keeping of all e-mails that are generated on
corporate equipment. This information must be retained for specific time periods and may be
requested as evidence in a lawsuit.
2. Describe an effective e-mail and web use policy for a company.
Like all policies, an effective e-mail and web use policy must be carefully designed and clearly
communicated to all persons who use these corporate resources. There are a number of different
policies in existence. Some companies allow absolutely no personal use of corporate networks,
whereas others allow some degree of activity that is easily monitored. A good policy will detail
exactly what type of activity is acceptable and what is not allowed. The policy should clearly
articulate sanctions that will be followed for any and all offenses in relation to the policy. Most
of all, rules for Internet usage should be tailored to specific business needs and organizational
cultures.
As an instructor you might wish to show students an example of the University of South
Australia’s policy at http://www.unisa.edu.au/policies/policies/corporate/C22.asp
3. Should managers inform employees that their web behavior is being monitored? Or
should managers monitor secretly? Why or why not?
Opinions will vary according to personal values and workplace experiences. However, most
students will probably answer that managers should inform employees that their web behavior is
being monitored as a way to foster open communications and trust between both sides. Many
consultants believe companies should write corporate policies on employee e-mail and Internet
use. The policies should include explicit ground rules that state, by position or level, under what
circumstances employees can use company facilities for e-mail, blogging, or web surfing. The
policies should also inform employees whether these activities are monitored and explain why.
Section 7-4, “What are the principal technologies and standards for wireless networking,
communication, and Internet access?” Ask your students how many of them use cellular
Copyright © 2017 Pearson Education, Inc.
8
phones, smartphones, wireless laptops, tablet computers, or wireless e-book readers. Most
students are excited to demonstrate their “latest devices,” and you may wish to ask one of them
to discuss the capabilities of theirs. Ask them to discuss what they like or dislike about the
features found on their appliance.
If you have the class time, you can ask the campus IT director to discuss the telecommunications
technology used on your campus, take a tour of the campus facilities, or invite an IT director
from a local company to discuss his company’s telecommunications technology. Ask your
students to find out what their university does in order to support mobile wireless
communications. Have them investigate applications where Bluetooth, Wi-FI, or hotspot
technology is used and how it benefits them. Are they able to use their own personal appliances
to connect and utilize these technologies on their campus?
Review Questions
7-1 What are the principal components of telecommunications networks and key
networking technologies?
Describe the features of a simple network and the network infrastructure for a large
company.
A simple network consists of two or more connected computers. Basic network components
include computers, network interfaces, a connection medium, network operating system
software, and either a hub or a switch. The networking infrastructure for a large company
relies on both public and private infrastructures to support the movement of information
across diverse technological platforms. It includes the traditional telephone system, mobile
cellular communication, wireless local-area networks, videoconferencing systems, a
corporate website, intranets, extranets, and an array of local and wide-area networks,
including the Internet. This collection of networks evolved from two fundamentally different
types of networks: telephone networks and computer networks. (Learning Objective 1: What
are the principal components of telecommunications networks and key networking
technologies?, AACSB: Application of knowledge.)
Name and describe the principal technologies and trends that have shaped
contemporary telecommunications systems.
Client/server computing, the use of packet switching, and the development of widely used
communications standards such as TCP/IP are the three technologies that have shaped
contemporary telecommunications systems.
Client/server computing has extended to networking departments, workgroups, factory
floors, and other parts of the business that could not be served by a centralized architecture.
The Internet is based on client/server computing. Packet switching technology allows nearly
full use of almost all available lines and capacity. This was not possible with the traditional
dedicated circuit-switching techniques that were used in the past. TCP/IP is a suite of
protocols that has become the dominant standard of network communications. Having a set
Copyright © 2017 Pearson Education, Inc.
9
of protocols for connecting diverse hardware and software components has provided a
universally agreed upon method for data transmission. (Learning Objective 1: What are the
principal components of telecommunications networks and key networking technologies?,
AACSB: Application of knowledge.)
7-2 What are the different types of networks?
Define an analog and a digital signal.
Analog: a continuous waveform that passes through a communications medium and has been
used for voice communication. Traditionally used by telephone handsets, computer speakers,
or earphones.
Digital: a discrete, binary waveform, rather than a continuous waveform, represented by
strings of two states: one bit and zero bits, which are represented as on-off electrical pulses.
Computers use digital signals and require a modem to convert these digital signals into
analog signals that are transmitted across telephone lines, cable lines, or wireless media.
(Learning Objective 2: What are the different types of networks?, AACSB: Application of
knowledge.)
Distinguish between a LAN, MAN, and WAN.
LAN (Local Area Network): a telecommunications network that is designed to connect
personal computers and other digital devices within a half-mile or 500-meter radius. LANs
typically connect a few computers in a small office, all the computers in one building, or all
the computers in several buildings in close proximity. LANs require their own dedicated
channels.
MAN (Metropolitan Area Network): a network that spans a metropolitan area, usually a
city and its major suburbs. Its geographic scope falls between a WAN and a LAN.
WAN (Wide Area Network): spans broad geographical distances – entire regions, states,
continents, or the entire globe. The most universal and powerful WAN is the Internet.
Computers connect to a WAN through public networks, such as the telephone system or
private cable systems, or through leased lines or satellites. (Learning Objective 2: What are
the different types of networks?, AACSB: Application of knowledge.)
7-3 How do the Internet and Internet technology work and how do they support
communication and e-business?
Define the Internet, describe how it works, and explain how it provides business value.
The Internet is a vast network of computers that connects millions of people all over the
world. The Internet uses the client/server model of computing and the TCP/IP network
reference model. Every computer on the Internet is assigned a unique numeric IP address. No
one owns the Internet, and it has no formal management organization. However, worldwide
Internet policies are established by organizations and government bodies, such as the Internet
Copyright © 2017 Pearson Education, Inc.
10
Architecture Board and the World Wide Web Consortium. The Internet must also conform to
the laws of the sovereign nation-states in which it operates, as well as the technical
infrastructure that exists within the nation-state.
The Internet enables employees to gain remote access to the company’s internal systems
through its website. They are able to better service customers and suppliers, improve
operational efficiency, increase productivity, lower operational costs, have a broader market
base, and reach more individual customers on a global scale by establishing a web presence.
The cost of email and other Internet services tend to be far lower than equivalent voice,
postal, or over night delivery costs, making the Internet a very inexpensive communication
medium. It is also a very fast method of communication, with messages arriving anywhere in
the world in a matter of seconds or minutes. (Learning Objective 3: How do the Internet and
Internet technology work and how do they support communication and e-business?, AACSB:
Application of knowledge.)
Explain how the Domain Name System (DNS) and IP addressing system work.
The Internet is based on the TCP/IP networking protocol suite. Every computer on the
Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit
number represented by four strings of numbers ranging from 0 to 255 separated by periods.
A domain name is the English-like name that corresponds to the unique 32-bit numeric IP
address for each computer connected to the Internet. The Domain Name System (DNS)
converts IP addresses to domain names so that users only need to specify a domain name to
access a computer on the Internet, instead of typing the numeric IP address. DNS servers
maintain a database containing IP addresses mapped to their corresponding domain names.
When a user sends a message to another user on the Internet, the message is first decomposed
into packets using the TCP protocol. Each packet contains its destination address. The
packets are then sent from the client to the network server and from there on to as many other
servers as necessary to arrive at a specific computer with a known address. At the destination
address, the packets are reassembled into the original message. (Learning Objective 3: How
do the Internet and Internet technology work and how do they support communication and e-
business?, AACSB: Analytical thinking.)
List and describe the principal Internet services.
Table 7-2 lists and describes the major Internet services:
• Email—person-to-person messaging; document sharing.
• Newsgroups—discussion groups on electronic bulletin boards.
• Chatting and instant messaging—interactive conversations.
• Telnet—logging on to one computer system and doing work on another.
• File Transfer Protocol (FTP)—transferring files from computer to computer.
• World Wide Web—retrieving, formatting, and displaying information (including text,
audio, graphics, and video) using hypertext links.
Copyright © 2017 Pearson Education, Inc.
11
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
Define and describe VoIP and virtual private networks and explain how they provide
value to businesses.
• Voice over Internet Protocol (VoIP) enables Internet technology to be used for
telephone voice transmission over the Internet or private networks. VoIP offers the
advantage of avoiding tolls charged by local and long-distance telephone networks.
VoIP provides businesses an opportunity to reduce costs because they no longer have
to maintain separate networks or provide support services and personnel for each
different type of network. It gives organizations flexibility because phones can be
added or moved to different offices without rewiring or reconfiguring networks.
• Virtual private networks are secure, encrypted, private networks that have been
configured within a public network to take advantage of the economies of scale and
management facilities of large networks, such as the Internet. VPNs are low-cost
alternatives to private WANs. VPNs give businesses a more efficient network
infrastructure for combining voice and data networks.
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
List and describe alternative ways of locating information on the web.
• Search engines are a facility on the web that helps you find sites with the information
and/or services you want. Examples: Google, Yahoo!, and MSN.
• Intelligent agent shopping bots use intelligent agent software for searching the
Internet for shopping information. Examples: MySimon and Froogle.
• Blogs are informal yet structured websites where subscribing individuals can publish
stories, opinions, and links to other websites of interest.
• Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to
have content they want pulled from websites and fed automatically to their
computers, where it can be stored for later viewing. It’s commonly used with blogs.
• Wikis are collaborative websites where visitors can add, delete, or modify content on
the site, including the work of previous authors.
• Web 2.0 provides second-generation interactive Internet-based services that enable
people to collaborate, share information, and create new services online. Web 2.0
software applications run on the web itself instead of the desktop and bring the vision
of web-based computing closer to realization.
• Web 3.0 (Semantic Web) reduces the amount of human involvement in searching for
and processing web information. It’s still in its infancy but promises to establish
specific meanings for data on the web, categories for classifying the data, and
relationships between classification categories.
Copyright © 2017 Pearson Education, Inc.
12
(Learning Objective 3: How do the Internet and Internet technology work and how do they
support communication and e-business?, AACSB: Application of knowledge.)
Describe how online search technologies are used for marketing.
Search engine marketing monetizes the value of the search process. Searching is one of the
web’s most popular activities with billions of queries performed each month. Search engines
are the foundation for the most lucrative form of online marketing and advertising. When
users enter a search term in a search engine, they receive two types of listings: sponsored
links, for which advertisers have paid to be listed, and unsponsored organic search results.
Advertisers can also purchase small text boxes on the side of search results pages. Paid,
sponsored advertisements are the fastest growing form of Internet advertising and are
powerful new marketing tools that precisely match consumer interests with advertising
messages at the right moment. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, AACSB:
Application of knowledge.)
7-4 What are the principal technologies and standards for wireless networking,
communications, and Internet access?
Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks.
Standards for wireless computer networks include Bluetooth (802.15) for small personal-area
networks (PANs), Wi-Fi (802.11) for local-area networks (LANs), and WiMax (802.16) for
metropolitan-area networks (MANs). Bluetooth can link up to eight devices within a 10-
meter area using low-power, radio-based communication and can transmit up to 722 Kbps in
the 2.4 GHz band. Wireless phones, keyboards, computers, printers, and PDAs using
Bluetooth can communicate with each other and even operate each other without direct user
intervention.
Wi-Fi is useful for creating wireless LANs and for providing wireless Internet access. Its
access range is limited to anywhere between 300 feet and three miles. Hotspots are public
access points individuals use to obtain high speed Internet access.
WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75
Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and
cable lines. The 802.16 specification also has robust security and quality-of-service features
to support voice and video.
3G is a short term for third-generation wireless technology, especially mobile
communications. Cellular networks have evolved from slow-speed (1G) analog networks to
high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with
speeds ranging from 144 Kbps to more than 2 Mbps for data transmission.
4G is a short term for fourth-generation wireless technology. It is entirely packet-switched
and capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal
Copyright © 2017 Pearson Education, Inc.
13
conditions), with premium quality and high security. Voice, data, and high-quality streaming
video are available to users anywhere, anytime. (Learning Objective 4: What are the
principal technologies and standards for wireless networking, communications, and Internet
access?, AACSB: Application of knowledge.)
Describe the capabilities of each and for which types of applications each is best suited.
• Bluetooth: Access very limited; useful for creating small personal-area networks.
• Wi-Fi: Access is limited to 30–50 meters; useful for creating small local area
networks.
• WiMax: Access is limited to a range up to 31 miles: useful for creating wide area
networks.
• 3G networks: Access is available on major cellular telephone carriers that have
configured their networks for 3G services.
• 4G networks: Provides premium quality for voice, data, and streaming video from
cellular telephone carriers.
(Learning Objective 4: What are the principal technologies and standards for wireless
networking, communications, and Internet access?, AACSB: Application of knowledge.)
Define RFID, explain how it works, and describe how it provides value to businesses.
Mobile wireless technology facilitates supply chain management by capturing data on the
movement of goods as these events take place and by providing detailed, immediate
information as goods move among supply chain partners. Radio frequency identification
(RFID) systems provide a microchip that contains data about an item and its location. The
tags transmit radio signals over a short distance to special RFID readers. The RFID readers
then pass the data over a network to a computer for processing.
RFID gives businesses an opportunity to further automate their supply chain networks. The
technology allows more data on an RFID chip than typical barcodes. RFID systems track
each pallet, lot, or unit item in a shipment. The technology helps companies improve
receiving and storage operations by improving their ability to “see” exactly what stock is
stored in warehouses or on retail store shelves. (Learning Objective 4: What are the principal
technologies and standards for wireless networking, communications, and Internet access?,
AACSB: Application of knowledge.)
Define WSNs, explain how they work, and describe the kinds of applications that use
them.
Wireless sensor networks (WSNs) are networks of interconnected wireless devices with
some processing and radio-transmitting capability that are embedded into the physical
environment to provide measurements of many points over large spaces.
Wireless sensor networks are valuable for monitoring environmental changes, traffic
patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
Copyright © 2017 Pearson Education, Inc.
14
in the field for years without any maintenance or human intervention. That reduces costs to
businesses using them. (Learning Objective 4: What are the principal technologies and
standards for wireless networking, communications, and Internet access?, AACSB:
Application of knowledge.)
Discussion Questions
7-5 It has been said that within the next few years, smartphones will become the single most
important digital device we own. Discuss the implications of this statement.
Student answers to this question will vary.
7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why
not?
Student answers to this question will vary.
7-7 What are some of the issues to consider in determining whether the Internet would
provide your business with a competitive advantage?
Student answers to this question will vary.
Hands-On MIS Projects
Management Decision Problems
7-8 Floor tile company: Asked by major retailing customers to begin using RFID to improve
management of products. Use the web to identify the cost of hardware, software, and
networking components for an RFID system for your company. What factors should be
considered? What are the key decisions that have to be made in determining whether your
firm should adopt this technology?
(The following information was copied from www.zebra.com, Nov 2010)
What is the estimated incremental cost for adopting RFID?
If one is discussing incremental costs over and above what was invested in your bar code
infrastructure, then you can say that you will be making an investment in tags,
printer/encoders, readers, middleware, and professional services to integrate these
components into your bar code legacy environment. If you are not working with bar codes
already, obviously you will need to make an investment in back-office, manufacturing, or
WMS systems to use RFID data.
What is a ballpark figure for implementing RFID in a warehouse and distribution process?
According to Forrester Research, a typical supplier that attempts to comply with a mandate
Copyright © 2017 Pearson Education, Inc.
15
can expect to spend as much as $9 million on RFID—depending on the size of its
distribution network and Walmart volume. According to this research, the largest
expenditures are tag costs and additional warehouse labor. Again, it is stressed that this
figure is derived from studying one company seeking compliance with the Walmart mandate.
However, this study provides a good perspective on the areas from which costs will derive.
How do smart label costs compare to conventional thermal/thermal-transfer printed labels?
A smart label runs in the vicinity of about $0.50 per label vs. about $0.01 for a conventional
label. This is mainly due to the addition of the tag. This cost is also variable based on the
total volume printed and the economies of scale associated with large quantities.
What companies are currently developing RFID software? Is it all customized or are there
off-the-shelf solutions?
Numerous start-up and established software providers—including those who provide ERP
software—have developed applications to deal with RFID reader and printer/encoder
management, plus “tag data capture event” management. As with most business applications
software, packages are typically customized to meet customers’ requirements rather than
being ready to go “off the shelf.”
How will RFID integrate with EDI software?
EDI messages contain data about business transactions. While the format of an EDI message
may change to accommodate “new data” (such as an EPC by comparison with a GTIN),
fundamentally EDI message processors are unaware of the source of the data contained in
messages. So there should be no reason that RFID cannot integrate with EDI software,
provided the data structures are fundamentally the same. However, one area of difference is
that many EDI systems typically deliver data in periodic batch mode; in contrast, the strength
of RFID is its ability to deliver real-time data, so systems are up-to-the-minute.
Key decisions that a company needs to make when considering adopting RFID include:
• Hardware and software costs
• Implementation costs
• Return on investments
• How technology fits into overall business strategy
(Learning Objective 4: What are the principal technologies and standards for wireless
networking, communications, and Internet access?, AACSB: Analytical thinking,
Application of knowledge.)
7-9 BestMed Medical Supplies Corporation: Sells products and equipment from over 700
different manufacturers to hospitals, health clinics, and medical offices. The company
employs 500 people at seven different locations. Management is considering adopting a
unified communications system. What factors should be considered? What are the key
Copyright © 2017 Pearson Education, Inc.
16
decisions that have to be made in determining whether to adopt this technology? Use the
web, if necessary, to find out more about unified communications and its costs.
Because the costs of purchasing and implementing a unified communication system will vary
based on the chosen system, so too will student answers.
(The following information was copied from www.networkworld.com, Nov 2010)
From a broad perspective, Verizon Business suggests that organizations need to evaluate and
measure how UC&C will benefit their organizations, determine whether the enterprise has
adequate in-house technical resources, personnel and network capacity; and define how to
integrate UC&C into business processes to align the deployment with critical business
initiatives.
At a more detailed level, Verizon Business suggested that in preparation for UC&C,
enterprises should:
• Invest in advanced IP networks because “UC&C starts with a capabilities-rich IP
infrastructure. . . [and] flexible and expansive IP networks serve as the foundation of
a successful UC&C deployment.”
• Inventory technology and personnel resources to better understand the technological
scope of UC&C deployments and “help identify potential network, equipment, and
application gaps.” Verizon Business also recommends a skills-assessment of technical
staff “to identify possible new hires and individuals requiring additional training.”
• Align technology with business objectives to “make purchasing decisions with a
focus on meeting specific business goals.” Any deployment should be designed to
maximize the impact of UC&C on business processes. The enterprise should also
establish benchmarks for success to better understand its ultimate objectives.
• Create a comprehensive roadmap that is “far reaching and covers areas such as
technology and finances, as well as detailed deployment and implementation plans.”
• Tackle security at the onset, with a design that integrates “seamlessly with a business’
current network and leverage existing technology investments.”
• Determine capabilities for ongoing management and decide “whether in-house staff
has the skills and time required to effectively manage and troubleshoot performance
issues.” As needed, enterprise should “select a managed services provider with the
people, tools, and processes to help provide consistent performance of UC&C
applications.”
• Develop support systems and processes so that the corporate IT staff is prepared to
address end-user performance issues and questions.
• Train and educate end users “to help users adopt and embrace these new tools so they
can work more efficiently and productively.”
• Measure and modify, with built-in milestones planned that “go beyond reliability and
availability measurements to assess the impact of UC&C from a financial, customer
service, business process, and end-user satisfaction perspective.”
Copyright © 2017 Pearson Education, Inc.
17
(Learning Objective 3: How do the Internet and Internet technology work and how do
they support communication and e-business?, AACSB: Analytical thinking, Reflective
thinking, Application of knowledge.)
Improving Decision Making: Using Spreadsheet Software to Evaluate Wireless Services
Software skills: Spreadsheet formulas, formatting
Business skills: Analyzing telecommunications services and costs
7-10 You would like to equip your sales force of 35, based in St. Louis, Missouri with mobile
phones that have capabilities for voice transmission, text messaging, Internet access, and taking
and sending photos. Use the web to select two wireless providers that offer nationwide voice and
data service as well as good service in your home area. Examine the features of the mobile
handsets and wireless plans offered by each of these vendors. Assume that each of the 35
salespeople will need to spend three hours per weekday between 8 a.m. and 6 p.m. on mobile
voice communication, send 30 text messages per weekday, use 1 gigabyte of data per month, and
send five photos per week. Use your spreadsheet software to determine the wireless service and
handset that will offer the best pricing per user over a two-year period. For the purposes of this
exercise, you do not need to consider corporate discounts.
Answers will vary, since plan rates and costs of mobile phones are constantly changing. The
answer to this question can be found in the sample solution found in the Microsoft Excel file
named MIS14ch07solutionfile.xls. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, AACSB: Analytical
thinking, Reflective thinking, Application of knowledge.)
Achieving Operational Excellence: Using Web Search Engines for Business Research
Software skills: Web search tools
Business skills: Researching new technologies
7-11 Use Google and Bing to obtain information about ethanol as an alternative fuel for motor
vehicles. If you wish, try some other search engines as well. Compare the volume and quality of
information you find with each search tool. Which tool is the easiest to use? Which produced the
best results for your research? Why?
Answers will vary according to the search phrases students enter in the search engines. The
object of this question should be for students to explore new search engines and web services and
not stick with “what they already know.” To that end, encourage students to use a different
search engine than what they normally use and explore how their search results are framed—
sponsored links or organic listings. Also encourage them to search for audio and video files,
blogs, wikis, and Web 2.0 services about the subject. Is the information more useful, less useful,
pertinent, or trustworthy? Do they prefer simple text documents or do they find the newer web
services more helpful? (Learning Objective 3: How do the Internet and Internet technology work
and how do they support communication and e-business?, AACSB: Analytical thinking,
Reflective thinking, Application of knowledge.)
Copyright © 2017 Pearson Education, Inc.
18
Collaboration and Teamwork Project
7-12. In MyMISLab, you will find a Collaboration and Teamwork Project dealing with the
concepts in this chapter. You will be able to use Google Drive, Google Docs, Google Sites,
Google +, or other open source collaboration tools to complete the assignment.
Case Study: Google, Apple, and Facebook Battle for Your Internet Experience
7-13 Compare the business models and core competencies of Google, Apple, and Facebook.
Google: Its business model has always focused on the Internet and the web. It began as one
of many search engines. It quickly ran away from the pack with its copyrighted PageRank
search algorithm which returns superior search results for web users. It also has developed
extensive online advertising services for businesses of all sizes. Google provides value to the
user by using an inexpensive, flexible infrastructure to speed up web searches and provide its
users with a vast array of web-based services and software tools.
Apple: Its business model focuses on centralized control of almost all aspects of its hardware
and software. It believes smartphones and tablets should have proprietary standards and be
tightly controlled. It only allows apps from its App store that have been vetted by the
company to be loaded to its products. Apple has a very loyal user base that has steadily
grown and most likely will stay with Apple products in the future.
Facebook: Facebook has built its business around social networking better than any other
company. It has more worldwide users than any other company. Facebook Platform enables
developers to build applications and websites that integrate with Facebook to reach its global
network of users and to build pesonalized and social products. (Learning Objective 3: How
do the Internet and Internet technology work and how do they support communication and e-
business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
7-14 Why is mobile computing so important to these three firms? Evaluate the mobile
strategies of each firm.
This case demonstrates the fundamental paradigm shift from primarily desktop PC
computing to mobile computing devices accessing services through the Internet that is
currently taking place. This environment is projected to be a $400 billion e-commerce
marketplace where the major access device will be a mobile smartphone or tablet computer.
Each company is vying for the lead in a world of ubiquitous computing based on Internet
access. The leader stands to make untold profits from advertising but in order to do that, the
leader needs to claim the largest user base.
Apps greatly enrich the experience of using a mobile device. Whoever creates the most
appealing set of devices and applications will derive a significant competitive advantage over
rival companies.
Copyright © 2017 Pearson Education, Inc.
19
Google: Aggressively follows eyeballs. It has introduced the Android mobile operating
system for a host of non-Apple devices. The Droid system adds features that Apple devices
don’t have – the ability to run multiple apps at the same time. Uses an open non-proprietary
system that allows users to grab apps from any source. Command of the smartphone
operating system market provides built-in channels for serving ads to mobile devices. Google
has successfully tailored its search results to respond to mobile searchers needs and
accommodate smartphone functionality.
Apple: By far the current leader in the number of apps users can download – over one
million. Apple takes a 30% cut of every app purchased. Uses a closed proprietary system
and apps that only provide “one way in.” It unveiled Siri in 2011 that has the potential to
serve as a market disruption technology by combining search, navigation, and personal
assistant tools.
Facebook: Realized that much of its advertising revenue will come from mobile device
searches. Introduced Sponsored Stories as a way to triple its revenue. It overhauled its home
page to increase the size of both photos and links and allow users to create topical streams. It
de-cluttered smartphone screens. It gave advertisers more opportunties and more interesting
information with which to target markets. Facrbook has a mobile application suite that
replaces the typical smartphone home screen. It essentially turns an Android mobile device
into a Facebook phone. (Learning Objective 4: What are the principal technologies and
standards for wireless networking, communication, and Internet access?, AACSB: Analytical
thinking, Reflective thinking, Application of knowledge.)
7-15 What is the significance of search to the success or failure of mobile computing? How
have Apple and Facebook attempted to compete with Google? Will their strategies
succeed?
Mobile computing is eclipsing desktop computing as the main entry point to the Internet.
Today, people spend more than half their time online using mobile devices. Mobile devices
take advantage of a growing cloud of computing capacity available to anyone with a
smartphone and Internet connectivity.
Apple’s attempt to compete with Google came in the form of Siri, a combined search,
navigation, and personal assistant app. Siri uses Yelp for local business searches, tapping into
its user recommendations and ratings. It uses Wolfram Alpha for factual and mathematical
questions. It only uses Google search when all else fails.
Facebook is attempting to create a Graph Search feature to rival Google’s search. It mines
Facebook’s vast repository of user-generated data and delivers results based on social signals
such as Facebook ‘likes’ and friend recommendations. If the desire for friend-based
recommendations outweighs users’ reluctance to divulge more personal information, Graph
Search may be a winner. However, Facebook has an uphill battle in its efforts to convince
users to trust it with their Facebook activities. (Learning Objective 3: How do the Internet
and Internet technology work and how do they support communication and e-business?,
AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
Copyright © 2017 Pearson Education, Inc.
20
7-16 Which company and business model do you think is most likely to dominate the
Internet and why?
Students should consider these principles in their answers:
• The size, complexity, and bureaucracy of organizations affect the ability of any
company to continue to innovate, grow, and expand its reach. (see Chapter 3) As all
three companies try to expand into mobile computing, their ability to “turn on a
dime” in the face of other competitors may be in serious jeopardy.
• Google currently has the major share of the web-based advertising market, however
Facebook and other market entrants will be a major threat to them. Apple has had a
significant lead in mobile computing for several years. However, as more companies,
Google, Facebook, and others, continue to expand into the arena, its lead will be
threatened. Legal and regulatory compliance will be a major issue as this market
grows and more concerns are expressed from external environments.
• History is not on anyone’s side. Every major company that’s been a force in
technology in one era has lost its lead in the next era. For example, IBM was king of
mainframe computing in the 1940s and 1950s. DEC was king in the mini-computer
era during the 1970s. Microsoft was king in the 1980s and 1990s during the reign of
desktop computers. Google reigns in the 2000s with its web-based services. Apple
began as king of mobile computing devices. Will it remain on top as technology
continues to evolve? (Learning Objective 1: What are the principal components of
telecommunications networks and key networking technologies?, Learning Objective
3: How do the Internet and Internet technology work and how do they support
communication and e-business?, AACSB: Analytical thinking, Reflective thinking,
Application of knowledge.)
7-17 What difference would it make to a business or to an individual consumer if Apple,
Google, or Facebook dominated the Internet experience? Explain your answer.
Right now, Apple leads Google in the number of apps available to users. That gap is closing
quickly thanks to Google’s improvements of the Android operating system and its
encouragement to app developers. Open, non-proprietary systems historically have beat
closed, proprietary systems because developers and users have a wider range of choices.
Business managers must try to forecast which platform will provide the right choices for
employees. Consumers must choose which platform will best fulfill their personal needs for
the next two to three years. Switching costs play into both scenarios, not just in terms of
phone purchases but the price of apps. Once a user purchases and adjusts to using a certain
platform, it’s difficult and expensive to switch to a whole different system.
Apps greatly enrich the experience of using a mobile device, and without them, the
predictions for the future of mobile Internet would not be nearly as bright. Whoever creates
the most appealing set of devices and applications will derive a significant competitive
advantage over rival companies. (Learning Objective 3: How do the Internet and Internet
technology work and how do they support communication and e-business?, Learning
Objective 4: What are the principal technologies and standards for wireless networking,
Another Random Scribd Document
with Unrelated Content
It was indeed remarkable. A blood-red sun was shouldering his way
in and out of a wide dull mass of gray cloud that was unrelieved by a
single fleck of color.
Rose looked at the sky, and Vesper looked at her, and thought of a
grieving Madonna. She had been so gay and cheerful lately. What
had happened to call that expression of divine tenderness and
sympathy to her face? He had never seen her so ethereal and so
spiritually beautiful, not even when she was bending over his sick-
bed. What a rest and a pleasure to weary eyes she was, in her black
artistic garments, and how pure was the oval of her face, how
becoming the touch of brownness on the fair skin. The silk
handkerchief knotted under her chin and pulled hood-wise over the
shock of flaxen hair combed up from the forehead, which two or
three little curls caressed daintily, gave the finishing touch of
quaintness and out-of-the-worldness to her appearance.
"You are feeling slightly blue this evening, are you not?" he asked.
"Blue,—that means one's thoughts are black?" said Rose, bringing
her glance back to him.
"Yes."
"Then I am a very little blue," she said, frankly. "This inn is like the
world to me. When those about me are sad, I, too, am sad.
Sometimes I grieve when strangers go,—for days in advance I have
a weight at heart. When they leave, I shut myself in my room. For
others I do not care."
"And are you melancholy this evening because you are thinking that
my mother and I must soon leave?"
Her eyes filled with tears. "No; I did not think of that, but I do now."
"Then what was wrong with you?"
"Nothing, since you are again cheerful," she said, in tones so doleful
that Vesper burst into one of his rare laughs, and Rose, laughing
with him, brushed the tears from her face.
"There was something running in my mind that made me feel
gloomy," he said, after a short silence. "It has been haunting me all
day."
Her eager glance was a prayer to him to share the cause of his
unhappiness with her, and he recited, in a low, penetrating voice,
the lines:
"Mon Dieu, pour fuir la mort n'est-il aucun
moyen?
Quoi? Dans un jour peut-être immobile et
glacé....
Aujourd'hui avenir, le monde, la pensée
Et puis, demain, ... plus rien."
Rose had never heard anything like this, and she was troubled, and
turned her blue eyes to the sky, where a trailing white cloud was
soaring above the dark cloud-bank below. "It is like a soul going up
to our Lord," she murmured, reverently.
Vesper would not shock her further with his heterodoxy. "Forget
what I said," he went on, lightly, "and let me beg you never to put
anything on your head but that handkerchief. You Acadien women
wear it with such an air."
"But it is because we know how to tie it. Look,—this is how the
Italian women in Boston carry those colored ones," and, pulling the
piece of silk from her head, she arranged it in severe lines about her
face.
"A decided difference," Vesper was saying, when Agapit came
around the corner of the house, driving Toochune, who was attached
to a shining dog-cart.
"Are you going with us?" he called out.
"I have not yet been asked."
"Thou naughty Rose," exclaimed Agapit; but she had already hurried
up-stairs to invite Mrs. Nimmo to accompany them. "Madame, your
mother, prefers to read," she said, when she came back, "therefore
Narcisse will come."
"Mount beside me," said Agapit to Vesper; "Rose and Narcisse will sit
in the background."
"No," said Vesper, and he calmly assisted Rose to the front seat,
then extended a hand to swing Narcisse up beside her. The child,
however, clung to him, and Vesper was obliged to take him in the
back seat, where he sat nodding his head and looking like a big
perfumed flower in his drooping hat and picturesque pink trousers.
"You smile," said Agapit, who had suddenly twisted his head around.
"I always do," said Vesper, "for the space of five minutes after
getting into this cart."
"But why?"
"Well—an amusing contrast presents itself to my mind."
"And the contrast, what is it?"
"I am driving with a modern Evangeline, who is not the owner of the
rough cart that I would have fancied her in, a few weeks ago, but of
a trap that would be an ornament to Commonwealth Avenue."
"Am I the modern Evangeline?" said Agapit, in his breakneck
fashion.
"To my mind she was embodied in the person of your cousin," and
Vesper bowed in a sidewise fashion towards his landlady.
Rose crimsoned with pleasure. "But do you think I am like
Evangeline,—she was so dark, so beautiful?"
"You are passable, Rose, passable," interjected Agapit, "but you lack
the passion, the fortitude of the heroine of Mr. Nimmo's immortal
countryman, whom all Acadiens venerate. Alas! only the poets and
story-tellers have been true to Acadie. It is the historians who lie."
"Why do you think your cousin is lacking in passion and fortitude?"
asked Vesper, who had either lost his gloomy thoughts, or had
completely subdued them, and had become unusually vivacious.
"She has never loved,—she cannot. Rose, did you love your husband
as I did la belle Marguerite?"
"My husband was older,—he was as a father," stammered Rose.
"Certainly I did not tear my hair, I did not beat my foot on the
ground when he died, as you did when la belle married the miller."
"Have you ever loved any man?" pursued Agapit, unmercifully.
"Oh, shut up, Agapit," muttered Vesper; "don't bully a woman."
Agapit turned to stare at him,—not angrily, but rather as if he had
discovered something new and peculiar in the shape of young
manhood. "Hear what she always says when young men, and often
old men, drive up and say, 'Rose à Charlitte, will you marry me?' She
says, 'Love,—it is all nonsense. You make all that.' Is it not so,
Rose?"
"Yes," she replied, almost inaudibly; "I have said it."
"You make all that," repeated Agapit, triumphantly. "They can rave
and cry,—they can say, 'My heart is breaking;' and she responds,
'Love,—there is no such thing. You make all that.' And yet you call
her an Evangeline, a martyr of love who laid her life on its holy
altar."
Rose was goaded into a response, and turned a flushed and puzzled
face to her cousin. "Agapit, I will explain that lately I do not care to
say 'You make all that.' I comprehend—possibly because the
blacksmith talks so much to me of his wish towards my sister—that
one does not make love. It is something that grows slowly, in the
breast, like a flower. Therefore, do not say that I am of ice or stone."
"But you do not care to marry,—you just come from telling me so."
"Yes; I am not for marriage," she said, modestly, "yet do not say
that I understand not. It is a beautiful thing to love."
"It is," said Agapit, "yet do not think of it, since thou dost not care
for a husband. Let thy thoughts run on thy cooking. Thou wert born
for that. I think that thou must have arrived in this world with a little
stew-pan in thy hand, a tasting fork hanging at thy girdle. Do not
wish to be an Evangeline or to read books. Figure to yourself, Mr.
Nimmo,"—and he turned his head to the back seat,—"that last night
she came to my room, she begged me for an English book,—she
who says often to Narcisse, 'I will shake thee, my little one, if thou
usest English words.' She says now that she wishes to learn,—she
finds herself forgetful of many things that she learned in the
convent. I said, 'Go to bed, thou silly fool. Thy eyes are burning and
have black rings around them the color of thy stove,' and she
whimpered like a baby."
"Your cousin is an egotist, Mrs. Rose," said Vesper, over his shoulder.
"I will lend you some books."
"Agapit is as a brother," she replied, simply.
"I have been a good brother to thee," he said, "and I will never
forget thee; not even when I go out into the world. Some day I will
send for thee to live with me and my wife."
"Perhaps thy wife will not let me," she said, demurely.
"Then she may leave me; I detest women who will not obey."
For some time the cousins chattered on and endeavored to snatch a
glimpse, in "time's long and dark prospective glass," of Agapit's
future wife, while Vesper listened to them with as much indulgence
as if they had been two children. He was just endeavoring to fathom
the rationale of their curious interchange of thou and you, when
Agapit said, "If it is agreeable to you, we will drive back in the
woods to the Concession. We have a cousin who is ill there,—see,
here we pass the station," and he pointed his whip at the gabled
roof near them.
The wheels of the dog-cart rolled smoothly over the iron rails, and
they entered upon a road bordered by sturdy evergreens that
emitted a deliciously resinous odor and occasioned Mrs. Rose to
murmur, reverently, "It is like mass; for from trees like these the
altar boys get the gum for incense."
Wild gooseberry and raspberry bushes lined the roadside, and under
their fruit-laden branches grew many wild flowers. A man who
stopped Agapit to address a few remarks to him gathered a handful
of berries and a few sprays of wild roses and tossed them in
Narcisse's lap.
The child uttered a polite, "Merci, monsieur" (thank you, sir), then
silently spread the flowers and berries on the lap rug and allowed
tears from his beautiful eyes to drop on them.
Vesper took some of the berries in his hand, and carefully explained
to the sorrowing Narcisse that the sensitive shrubs did not shiver
when their clothes were stripped from them and their hats pulled off.
They were rather shaking their sides in laughter that they could give
pleasure to so good and gentle a boy. And the flowers that bowed so
meekly when one wished to behead them, were trembling with
delight to think that they should be carried, for even a short time, by
one who loved them so well.
Narcisse at last was comforted, and, drying his tears, he soberly ate
the berries, and presented the roses to his mother in a brilliant
nosegay, keeping only one that he lovingly fastened in his neck,
where it could brush against his cheek.
Soon they were among the clearings in the forest. Back of every
farm stood grim trees in serried rows, like soldiers about to close in
on the gaps made in their ranks by the diligent hands of the Acadien
farmers. The trees looked inexorable, but the farmers were more so.
Here in the backwoods so quiet and still, so favorable for farming,
the forest must go as it had gone near the shore.
About every farmhouse, men and women were engaged in driving in
cows, tying up horses, shutting up poultry, feeding pigs, and
performing the hundred and one duties that fall to the lot of a
farmer's family. Everywhere were children. Each farmer seemed to
have a quiver full of these quiet, well-behaved little creatures, who
gazed shyly and curiously at the dog-cart as it went driving by.
When they came to a brawling, noisy river, having on its banks a
saw-mill deserted for the night, Agapit exclaimed, "We are at last
arrived!"
Close to the mill was a low, old-fashioned house, situated in the
midst of an extensive apple orchard in which the fruit was already
taking on size and color.
"They picked four hundred barrels from it last year," said Agapit,
"our cousins, the Kessys, who live here. They are rich, but very
simple," and springing out, he tied Toochune's head to the gatepost.
"Now let us enter," he said, and he ushered Vesper into a small, dull
room where an old woman of gigantic stature sat smoking by an
open fireplace.
Another tall woman, with soft black eyes, and wearing on her breast
a medal of the congregation of St. Anne, took Rose away to the sick-
room, while Agapit led Vesper and Narcisse to the fireplace. "Cousin
grandmother, will you not tell this gentleman of the commencement
of the Bay?"
The old woman, who was nearly sightless, took her pipe from her
mouth, and turned her white head. "Does he speak French?"
"Yes, yes," said Agapit, joyfully.
A light came into her face,—a light that Vesper noticed always came
into the faces of Acadiens, no matter how fluent their English, if he
addressed them in their mother tongue.
"I was born en haut de la Baie" (up the Bay), she began, softly.
"Further than Sleeping Water,—towards Digby," said Agapit, in an
undertone.
"Near Bleury," she continued, "where there were only eight families.
In the morning my mother would look out at the neighbors'
chimneys; where she saw smoke she would send me, saying, 'Go,
child, and borrow fire.' Ah! those were hard days. We had no roads.
We walked over the beach fifteen miles to Pointe à l'Eglise to hear
mass sung by the good Abbé.
"There were plenty of fish, plenty of moose, but not so many boats
in those days. The hardships were great, so great that the weak
died. Now when my daughter sits and plays on the organ, I think of
it. David Kessy, my father, was very big. Once our wagon, loaded
with twenty bushels of potatoes, stuck in the mud. He put his
shoulder against it and lifted it. Nowadays we would rig a jack, but
my father was strong, so strong that he took insults, though he
trembled, for he knew a blow from his hand would kill a man."
The Acadienne paused, and fell into a gentle reverie, from which
Agapit, who was stepping nimbly in and out of the room with jelly
and other delicacies that he had brought for the invalid, soon roused
her.
"Tell him about the derangement, cousin grandmother," he
vociferated in her ear, "and the march from Annapolis."
CHAPTER XI
NEWS OF THE FIERY FRENCHMAN.
"Below me winds the river to the sea,
On whose brown slope stood wailing, homeless maids;
Stood exiled sons; unsheltered hoary heads;
And sires and mothers dumb in agony.
The awful glare of burning homes, where free
And happy late they dwelt, breaks on the shades,
Encompassing the sailing fleet; then fades,
With tumbling roof, upon the night-bound sea.
How deep is hope in sorrow sunk! How harsh
The stranger voice; and loud the hopeless wail!
Then silence came to dwell; the tide fell low;
The embers died. On the deserted marsh,
Where grain and grass stirred only to the gale,
The moose unchased dare cross the Gaspereau."
J. F. Herbin.
An extraordinary change came over the aged woman at Agapit's
words. Some color crept to her withered cheeks. She straightened
herself, and, no longer leaning on her cane, said, in a loud, firm
voice, to Vesper, "The Acadiens were not all stolen from Annapolis at
the derangement. Did you think they were?"
"I don't know that I ever thought about it, madame," he said,
courteously; "but I should like to know."
"About fifty families ran to the wood," she said, with mournful
vivacity; "they spent the winter there; I have heard the old people
talk of it when I was young. They would sit by the fire and cry. I
would try not to cry, but the tears would come. They said their good
homes were burnt. Only at night could they revisit them, lest
soldiers would catch them. They dug their vegetables from the
ground. They also got one cow and carried her back. Ah, she was a
treasure! There was one man among them who was only half
French, and they feared him, so they watched. One day he went out
of the woods,—the men took their guns and followed. Soon he
returned, fifty soldiers marching behind him. 'Halt!' cried the
Acadiens. They fired, they killed, and the rest of the soldiers ran.
'Discharge me! discharge me!' cried the man, whom they had
caught. 'Yes, we will discharge you,' they said, and they put his back
against a tree, and once more they fired, but very sadly. At the end
of the winter some families went away in ships, but the Comeaus,
Thibaudeaus, and Melançons said, 'We cannot leave Acadie; we will
find a quiet place.' So they began a march, and one could trace
them by the graves they dug. I will not tell you all, for why should
you be sad? I will say that the Indians were good, but sometimes
the food went, and they had to boil their moccasins. One woman,
who had a young baby, got very weak. They lifted her up, they
shook the pea-straw stuffing from the sack she lay on, and found
her a handful of peas, which they boiled, and she got better.
"They went on and on, they crossed streams, and carried the little
ones, until they came here to the Bay,—to Grosses Coques,—where
they found big clams, and the tired women said, 'Here is food; let us
stay.'
"The men cut a big pine and hollowed a boat, in which they went to
the head of the Bay for the cow they had left there. They threw her
down, tied her legs, and brought her to Grosses Coques. Little by
little they carried also other things to the Bay, and made themselves
homes.
"Then the families grew, and now they cover all the Bay. Do you
understand now about the march from Annapolis?"
"Thank you, yes," said Vesper, much moved by the sight of tears
trickling down her faded face.
"What reason did the old people give for this expulsion from their
homes?"
"Always the same, always, always," said Madame Kessy, with energy.
"They would not take the oath, because the English would not put in
it that they need not fight against the French."
"But now you are happy under English rule?"
"Yes, now,—but the past? What can make up for the weeping of the
old people?"
Nothing could, and Vesper hastened to introduce a new subject of
conversation. "I have heard much about the good Abbé that you
speak of. Did you ever see him?"
"See him,—ah, sir, he was an angel of God, on this Bay, and he a
gentleman out of France. We were all his children, even the poor
Indians, whom he gathered around him and taught our holy religion,
till their fine voices would ring over the Bay, in hymns to the ever
blessed Virgin. He denied himself, he paid our doctors' bills, even to
twenty pounds at a time,—ah, there was mourning when he died.
When my bans were published in church the good Abbé rode no
more on horseback along the Bay. He lay a corpse, and I could
scarcely hold up my head to be married."
"In speaking of those old days," said Vesper, "can you call to mind
ever hearing of a LeNoir of Grand Pré called the Fiery Frenchman?"
"Of Etex LeNoir," cried the old woman, in trumpet tones, "of the
martyr who shamed an Englishman, and was murdered by him?"
"Yes, that is the man."
"I have heard of him often, often. The old ones spoke of it to me.
His heart was broken,—the captain, who was more cruel than
Winslow, called him a papist dog, and struck him down, and the
sailors threw him into the sea. He laid a curse on the wicked captain,
but I cannot remember his name."
"Did you ever hear anything of the wife and child of Etex LeNoir?"
"No," she said, absently, "there was only the husband Etex that I
had heard of. Would not his wife come back to the Bay? I do not
know," and she relapsed into the dullness from which her temporary
excitement had roused her.
"He was called the Fiery Frenchman," she muttered, presently, but
so low that Vesper had to lean forward to hear her. "The old ones
said that there was a mark like flame on his forehead, and he was
like fire himself."
"Agapit, is it not time that we embark?" said Rose, gliding from an
inner room. "It will soon be dark."
Agapit sprang up. Vesper shook hands with Madame Kessy and her
daughter, and politely assured them, in answer to their urgent
request, that he would be sure to call again, then took his seat in
the dog-cart, where in company with his new friends he was soon
bowling quickly over a bit of smooth and newly repaired road.
Away ahead, under the trees, they soon heard snatches of a lively
song, and presently two young men staggered into view supporting
each other, and having much difficulty in keeping to their side of the
road.
Agapit, with angry mutterings, drove furiously by the young men,
with his head well in the air, although they saluted him as their dear
cousin from the Bay.
Rose did not speak, but she hung her head, and Vesper knew that
she was blushing to the tips of the white ears inside her black
handkerchief.
No one ventured a remark until they reached a place where four
roads met, when Agapit ejaculated, desperately, "The devil is also
here!"
Vesper turned around. The sun had gone down, the twilight was
nearly over, but he possessed keen sight and could plainly discover
against the dull blue evening sky the figures of a number of men
and boys, some of whom were balancing themselves on the top of a
zigzag fence, while others stood with hands in their pockets,—all
vociferously laughing and jeering at a man who staggered to and fro
in their midst with clenched fists, and light shirt-sleeves spotted with
red.
"This is abominable," said Agapit, in a rage, and he was about to lay
his whip on Toochune's back when Vesper suggested mildly that he
was in danger of running down some of his countrymen.
Agapit pulled up the horse with a jerk, and Rose immediately sprang
to the road and ran up to the young man, who had plainly been
fighting and was about to fight again.
Vesper slipped from his seat and stood by the wheel.
"Do not follow her," exclaimed Agapit; "they will not hurt her. They
would beat you."
"I know it."
"She is my cousin, thou impatient one," pursued Agapit, irritably. "I
would not allow her to be insulted."
"I know that, too," said Vesper, calmly, and he watched the young
men springing off the fences and hurrying up to Rose, who had
taken the pugilist by the hand.
"Isidore," she said, sorrowfully, and as unaffectedly as if they had
been alone, "hast thou been fighting again?"
"It is her second cousin," growled Agapit; "that is why she
interferes."
"Écoute-moi, écoute-moi, Rose" (listen to me), stammered the
young man in the blood-stained shirt. "They all set upon me. I was
about to be massacred. I struck out but a little, and I got some taps
here and there. I was drunk at first, but I am not very drunk now."
"Poor Isidore, I will take thee home; come with me."
The crowd of men and boys set up a roar. They were quarrelsome
and mischievous, and had not yet got their fill of rowdyism.
"Va-t'ang, va-t'ang" (go away), "Rose à Charlitte. We want no
women here. Go home about thy business. If Big Fists wishes to
fight, we will fight."
Among all the noisy, discordant voices this was the only insulting
one, and Rose turned and fixed her mild gaze on the offender, who
was one of the oldest men present, and the chief mischief-maker of
the neighborhood. "But it is not well for all to fight one man," she
said, gently.
"We fight one by one. Isidore is big,—he has never enough. Go
away, or there will yet be a bigger row," and he added a sentence of
gross abuse.
Vesper made a step forward, but Isidore, the young bully, who was
of immense height and breadth, and a son of the old Acadienne that
they had just quitted, was before him.
"You wish to fight, my friends," he said, jocularly; "here, take this,"
and, lifting his big foot, he quickly upset the offender, and kicked
him towards some men in the crowd who were also relatives of
Rose.
One of them sprang forward, and, with his dark face alight with glee
at the chance to avenge the affront offered to his kinswoman, at
once proceeded to beat the offender calmly and systematically, and
to roll him under the fence.
Rose, in great distress, attempted to go to his rescue, but the young
giant threw his arm around her. "This is only fun, my cousin. Thou
must not spoil everything. Come, I will return with thee."
"Nâni" (no), cried Agapit, furiously, "thou wilt not. Fit company art
thou for strangers!"
Isidore stared confusedly at him, while Vesper settled the question
by inviting him in the back seat and installing Rose beside him. Then
he held out his arms to Narcisse, who had been watching the
disturbance with drowsy interest, fearful only that the Englishman
from Boston might leave him to take a hand in it.
As soon as Vesper mounted the seat beside him, Agapit jerked the
reins, and set off at a rapid pace; so rapid that Vesper at first caught
only snatches of the dialogue carried on behind him, that was tearful
on the part of Rose, and meek on that of Isidore.
Soon Agapit sobered down, and Rose's words could be
distinguished. "My cousin, how canst thou? Think only of thy mother
and thy wife; and the good priest,—suppose he had come!"
"Then thou wouldst have seen running like that of foxes," replied
Isidore, in good-natured, semi-interested tones.
"Thou wast not born a drunkard. When sober thou art good, but
there could not be a worse man when drunk. Such a pile of cursing
words to go up to the sky,—and such a volley of fisting. Ah, how
thou wast wounding Christ!"
Isidore held on tightly, for Agapit was still driving fast, and uttered
an inaudible reply.
"Tell me where thou didst get that liquor," said Rose.
"It was a stolen cask, my cousin."
"Isidore!"
"But I did not steal it. It came from thy charming Bay. Thou didst not
know that, shortly ago, a captain sailed to Sleeping Water with five
casks of rum. He hired a man from the Concession to help him hide
them, but the man stole one cask. Imagine the rage of the captain,
but he could not prosecute, for it was smuggled. Since then we have
fun occasionally."
"Who is that bad man? If I knew where was his cask, I would take a
little nail and make a hole in it."
"Rose, couldst thou expect me to tell thee?"
"Yes," she said, warmly. Then, remembering that she had been
talking English to his French, she suddenly relapsed into low, swift
sentences in her own tongue, which Vesper could not understand.
He caught their import, however. She was still inveighing against the
sin of drunkenness and was begging him to reform, and her voice
did not flag until they reached his home, where his wife—a young
woman with magnificent eyes and a straight, queenly figure—stood
by the gate.
"Bon soir (good evening), Claudine," called out Agapit. "We have
brought home Isidore, who, hearing that a distinguished stranger
was about to pass through the Concession, thoughtfully put himself
on exhibition at the four roads. You had better keep him at home
until La Guerrière goes back to Saint Pierre."
"It was La Guerrière that brought the liquor," said Rose, suddenly, to
Isidore.
He did not contradict her, and she said, firmly, "Never shall that
captain darken my doors again."
The young Acadien beauty gave Vesper a fleeting glance, then she
said, bitterly, "It should rather be Saint Judas, for from there the evil
one sends stuff to torture us women—Here enter," and half
scornfully, half affectionately, she extended a hand to her huge
husband, who was making a wavering effort to reach the gateway.
He clung to her as if she had been an anchor, and when she asked
him what had happened to his shirt he stuttered, regretfully, "Torn,
Claudine,—torn again."
"How many times should one mend a shirt?" she asked, turning her
big blazing eyes on Rose.
"Charlitte never became drunk," said Rose, in a plaintive voice, "but
I have mended the shirts of my brothers at least a hundred times."
"Then I have but one more time," said the youthful Madame Kessy.
"After that I shall throw it in the fire. Go into the house, my
husband. I was a fool to have married thee," she added, under her
breath.
Isidore stood tottering on his feet, and regarded her with tipsy
gravity. "And thou shalt come with me, my pretty one, and make me
a hot supper and sing me a song."
"I will not do that. Thou canst eat cold bread, and I will sing thee a
song with my tongue that will not please thee."
"The priest married us," said Isidore, doggedly, and in momentary
sobriety he stalked to the place where she stood, picked her up,
and, putting her under his arm, carried her into the house, she
meanwhile protesting and laughing hysterically while she shrieked
out something to Rose about the loan of a sleeve pattern.
"Yes, yes, I understand," called Rose, "the big sleeve, with many
folds; I will send it. Make thy husband his supper and come soon to
see me."
"Rose," said Agapit, severely, as they drove away, "is it a good thing
to make light of that curse of curses?"
"To make light of it! Mon Dieu, you do not understand. It is men
who make women laugh even when their hearts are breaking."
Agapit did not reply, and, as they were about to enter a thick wood,
he passed the reins to Vesper and got out to light the lamps.
While he was fidgeting with them, Rose moved around so that she
could look into the front seat.
"Your child is all right," said Vesper, gazing down at the head laid
confidingly against his arm. "He is sound asleep,—not a bit alarmed
by that fuss."
"It does not frighten him when human beings cry out. He only
sorrows for things that have no voices, and he is always right when
with you. It is not that; I wish to ask you—to ask you to forgive me."
"For what?"
"But you know—I told you what was not true."
"Do not speak of it. It was a mere bagatelle."
"It is not a bagatelle to make untruths," she said, wearily, "but I
often do it,—most readily when I am frightened. But you did not
frighten me."
Vesper did not reply except by a reassuring glance, which in her
preoccupation she lost, and, catching her breath, she went on, "I
think so often of a sentence from an Englishman that the sisters of a
convent used to say to us,—it is about the little lies as well as the
big ones that come from the pit."
"Do you mean Ruskin?" said Vesper, curiously, "when he speaks of
'one falsity as harmless, and another as slight, and another as
unintended,—cast them all aside; they may be light and accidental,
but they are ugly soot from the smoke of the pit for all that?'"
"Yes, yes, it is that,—will you write it for me?—and remember," she
continued, hurriedly, as she saw Agapit preparing to reënter the cart,
"that I did not say what I did to make a fine tale, but for my people
whom I love. You were a stranger, and I supposed you would linger
but a day and then proceed, and it is hard for me to say that the
Acadiens are no better than the English,—that they will get drunk
and fight. I did not imagine that you would see them, yet I should
not have told the story," and with her flaxen head drooping on her
breast she turned away from him.
"When is lying justifiable?" asked Vesper of Agapit.
The young Acadien plunged into a long argument that lasted until
they reached the top of the hill overlooking Sleeping Water. Then he
paused, and as he once more saw above him the wide expanse of
sky to which he was accustomed, and knew that before him lay the
Bay, wide, open, and free, he drew a long breath.
"Ah, but I am glad to arrive home. When I go to the woods it is as if
a large window through which I had been taking in the whole world
had been closed."
No one replied to him, and he soon swung them around the corner
and up to the inn door. Rose led her sleepy boy into the kitchen,
where bright lights were burning, and where the maid Célina
seemed to be entertaining callers. Vesper took the lantern and
followed Agapit to the stable.
"Is it a habit of yours to give your hotel guests drives?" he asked,
hanging the lantern on a hook and assisting Agapit in unbuckling
straps.
"Yes, whenever it pleases us. Many, also, hire our horse and pony.
You see that we have no common horse in Toochune."
"Yes, I know he is a thoroughbred."
"Rose, of course, could not buy such an animal. He was a gift from
her uncle in Louisiana. He also sent her this dog-cart and her organ.
He is rich, very rich. He went South as a boy, and was adopted by an
old farmer; Rose is the daughter of his favorite sister, and I tell her
that she will inherit from him, for his wife is dead and he is alone,
but she says not to count on what one does not know."
Vesper had already been favored with these items of information by
his mother, so he said nothing, and assisted Agapit in his task of
making long-legged Toochune comfortable for the night. Having
finished, and being rewarded by a grateful glance from the animal's
lustrous eyes, they both went to the pump outside and washed their
hands.
"It is too fine for the house," said Agapit. "Are you too fatigued to
walk? If agreeable I will take you to Sleeping Water River, where you
have not yet been, and tell you how it accumulated its name. There
is no one inside," he continued, as Vesper cast a glance at the
kitchen windows, "but the miller and his wife, in whom I no longer
take pleasure, and the mail-driver who tells so long stories."
"So long that you have no chance."
"Exactly," said Agapit, fumbling in his pocket. "See what I bought to-
day of a travelling merchant. Four cigars for ten cents. Two for you,
and two for me. Shall we smoke them?"
Vesper took the cigars, slipped them in his pocket, and brought out
one of his own, then with Agapit took the road leading back from
the village to the river.
CHAPTER XII.
AN UNHAPPY RIVER.
"Pools and shadows merge
Beneath the branches, where the rushes lean
And stumble prone; and sad along the verge
The marsh-hen totters. Strange the branches
play
Above the snake-roots in the dark and wet,
Adown the hueless trunks, this summer day.
Strange things the willows whisper."
J. F. H.
"There is a story among the old people," said Agapit, "that a band of
Acadiens, who evaded the English at the time of the expulsion,
sailed into this Bay in a schooner. They anchored opposite Sleeping
Water, and some of the men came ashore in a boat. Not knowing
that an English ship lay up yonder, hidden by a point of land, they
pressed back into the woods towards Sleeping Water Lake. Some of
the English, also, were on their way to this lake, for it is historic. The
Acadiens found traces of them and turned towards the shore, but
the English pursued over the marshes by the river, which at last the
Acadiens must cross. They threw aside their guns and jumped in,
and, as one head rose after another, the English, standing on the
bank, shot until all but one were killed. This one was a Le Blanc, a
descendant of René Le Blanc, that one reads of in 'Evangeline.'
Rising up on the bank, he found himself alone. Figure the anguish of
his heart,—his brothers and friends were dead. He would never see
them again, and he turned and stretched out a hand in a supreme
adieu. The English, who would not trouble to swim, fired at him, and
called, 'Go to sleep with your comrades in the river.'
"'They sleep,' he cried, 'but they will rise again in their children,' and,
quite untouched by their fire, he ran to his boat, and, reaching the
ship, set sail to New Brunswick; and in later years his children and
the children of the murdered ones came back to the Bay, and began
to call the river Sleeping Water, and, in time, the lake, which was
Queen Anne's Lake, was also changed to Sleeping Water Lake."
"And the soldiers?"
"Ah! you look for vengeance, but does vengeance always come?
Remember the Persian distich:
"'They came, conquered, and burned,
Pillaged, murdered, and went.'"
"I do not understand this question thoroughly," said Vesper, with
irritation, "yet from your conversation it seems not so barbarous a
thing that the Acadiens should have been transported as that those
who remained should have been so persecuted."
"Now is your time to read 'Richard.' I have long been waiting for
your health to be restored, for it is exciting."
"That is the Acadien historian you have spoken of?"
"Yes; and when you read him you will understand my joy at the
venerable letter you showed me. You will see why we blame the
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
testbankdeal.com

Essentials of MIS 12th Edition Laudon Solutions Manual

  • 1.
    Visit https://testbankdeal.com todownload the full version and explore more testbank or solutions manual Essentials of MIS 12th Edition Laudon Solutions Manual _____ Click the link below to download _____ https://testbankdeal.com/product/essentials-of-mis-12th- edition-laudon-solutions-manual/ Explore and download more testbank or solutions manual at testbankdeal.com
  • 2.
    Here are somerecommended products that we believe you will be interested in. You can click the link to download. Essentials of MIS 12th Edition Laudon Test Bank https://testbankdeal.com/product/essentials-of-mis-12th-edition- laudon-test-bank/ Essentials of MIS 10th Edition Laudon Solutions Manual https://testbankdeal.com/product/essentials-of-mis-10th-edition- laudon-solutions-manual/ Essentials of MIS 13th Edition laudon Solutions Manual https://testbankdeal.com/product/essentials-of-mis-13th-edition- laudon-solutions-manual/ Business Driven Information Systems Canadian 4th Edition Baltzan Solutions Manual https://testbankdeal.com/product/business-driven-information-systems- canadian-4th-edition-baltzan-solutions-manual/
  • 3.
    Anatomy And Physiology9th Edition Patton Solutions Manual https://testbankdeal.com/product/anatomy-and-physiology-9th-edition- patton-solutions-manual/ Management Canadian 12th Edition Robbins Solutions Manual https://testbankdeal.com/product/management-canadian-12th-edition- robbins-solutions-manual/ Educational Psychology 14th Edition Woolfolk Test Bank https://testbankdeal.com/product/educational-psychology-14th-edition- woolfolk-test-bank/ Created Equal A History of the United States Volume 1 5th Edition Jones Test Bank https://testbankdeal.com/product/created-equal-a-history-of-the- united-states-volume-1-5th-edition-jones-test-bank/ Principles of Taxation for Business and Investment Planning 16th Edition Jones Test Bank https://testbankdeal.com/product/principles-of-taxation-for-business- and-investment-planning-16th-edition-jones-test-bank/
  • 4.
    Marketing 4th EditionGrewal Test Bank https://testbankdeal.com/product/marketing-4th-edition-grewal-test- bank/
  • 5.
    Copyright © 2017Pearson Education, Inc. 1 Chapter 7 Telecommunications, the Internet, and Wireless Technology Learning Objectives 7-1 What are the principal components of telecommunications networks and key networking technologies? 7-2 What are the different types of networks? 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? Learning Catalytics is a “bring your own device” student engagement, assessment, and classroom intelligence system. It allows instructors to engage students in class with real-time diagnostics. Students can use any modern, web-enabled device (smartphone, tablet, or laptop) to access it. For more information on using Learning Catalytics in your course, contact your Pearson Representative. Chapter Outline 7-1 What are the principal components of telecommunications networks and key networking technologies? Networking and Communication Trends What is a Computer Network? Key Digital Networking Technologies 7-2 What are the different types of networks? Signals: Digital vs. Analog Types of Networks Transmission Media and Transmission Speed 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? What is the Internet? Internet Addressing and Architecture Internet Services and Communication Tools The Web 7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access? Cellular Systems Wireless Computer Networks and Internet Access RFID and Wireless Sensor Networks
  • 6.
    Copyright © 2017Pearson Education, Inc. 2 Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. 3G networks, 254 Personal-area networks (PANs), 254 4G networks, 254 Predictive search, 249 Bandwidth, 236 Protocol, 233 Blog, 251 Radio frequency identification (RFID), 256 Blogosphere, 252 Router, 231 Bluetooth, 254 RSS, 252 Broadband, 230 Search engines, 247 Cable Internet connections, 237 Search engine marketing, 250 Chat, 242 Semantic search, 248 Digital subscriber line (DSL), 237 Shopping bots, 250 Domain name, 238 Smart phones, 253 Domain name systems (DNS), 238 Social networking, 252 E-mail, 242 Social search, 249 File Transfer Protocol (FTP), 242 Software-defined networking, 231 Hertz, 236 Switch, 231 Hotspots, 256 T1 lines, 237 Hubs, 231 Telnet, 242 Hypertext Transfer Protocol (HTTP), 247 Search engine optimization (SEO), 251 Instant messaging, 242 Transmission Control Protocol/Internet Protocol (TCP/IP), 233 Internet of Things, 253 Unified communications, 245 Internet Protocol (IP) address, 237 Uniform resource locator (URL), 247 Internet service provider (ISP), 236 Virtual private network (VPN), 246 Internet2, 241 Visual Web, 250 IPv6, 241 Voice over IP (VoIP), 243 Local-area network (LAN), 235 Web 2.0, 251 Metropolitan-area network (MAN), 236 Web 3.0, 253 Microblogging, 252 Web site, 2246 Modem, 234 Wide-area networks (WAN), 236 Network operating system (NOS), 230 Wi-Fi, 255 Packet switching, 232 Wiki, 252 Peer-to-peer, 235 WiMax, 256 Wireless sensor networks (WSNs), 258
  • 7.
    Copyright © 2017Pearson Education, Inc. 3 Teaching Suggestions Chapter 7 presents crucial concepts and terminology since telecommunications, networks, and the Internet are now introducing fundamental changes in businesses. The opening case, “Wireless Technology makes Dundee Precious Metals Good as Gold,” illustrates some of the new capabilities and opportunities provided by contemporary networking technology. Dundee implemented an underground wireless Wi-Fi network that allows electronic devices to exchange data wirelessly to monitor the location of equipment, people, and ore throughout the mine’s tunnels and facilities. The company also uses Wi-Fi radio frequency identification (RFID) technology to track workers, equipment, and vehicles in underground gold mines. Dundee has decreased equipment downtime and utilizes its resources more efficiently. It uses data from the underground wireless network in its mine management software and mobile planning software. Now the company can more closely account for its mine workers, making them more safe and the workers can communicate more closely with the mine’s control room. Control room staff can actually see the location of machinery and direct traffic more effectively, quickly identify problems and respond more rapidly to emergencies. The opening vignette provides an example of how businesses are adapting to new technologies based on the Internet. It shows how companies must continually evolve as technology improves. Section 7-1, “What are the principal components of telecommunications networks and key networking technologies?” Telecommunications and networks are vital to the majority of businesses today, and this section explains why. Because telecommunications technology serves as the foundation for electronic commerce and the digital economy, the concepts and terminology in Chapter 7 are important for both MIS and business majors. This section explains the basic configuration of networks, regardless of their size. You may want to contrast the origin and history of telephone networks and computer networks. Then diagram how the two are converging into one pipeline for all types of communication transmissions. Convergence is leading to more efficient transmission traffic and ubiquitous communications thanks to the Internet. A contemporary corporate network infrastructure relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communications, wireless local area networks, videoconferencing systems, a corporate website, intranets, extranets, and an array of local and wide area networks, including the Internet. Contemporary networks have been shaped by the rise of client/server computing, the use of packet switching, and the adoption of TCP/IP as a universal communications standard for linking disparate networks and computers. Client/server networks have distributed much of the organization’s computing power to the desktop and factory floor. Packet switching makes more
  • 8.
    Copyright © 2017Pearson Education, Inc. 4 efficient use of network communications capacity by breaking messages into small packets that are sent independently along different paths in a network and then reassembled at their destination. Protocols provide a common set of rules that enable communication among diverse components in a telecommunications network. TCP/IP is a suite of protocols that has become the dominant model of achieving connectivity among different networks and computers. It is the connectivity model used in the Internet. One exercise you may try to help show how much we rely on communications today is to ask students to count the number of text messages, phone calls, e-mails, and IM messages they either sent or received in the last 24 hours or the last week. You could even go so far as to ask them to not send or receive any of these communications for a day to prove how reliant we’ve become on telecommunications. Section 7-2, “What are the different types of networks?” It may help for you to bring several props to show the different transmission media explained in this section. For example, bring twisted wire, coaxial cable, and fiber-optic cable to show to the class and discuss the advantages and disadvantages of each type of media. Students should note the different ranges (frequencies) of wireless media. Also, you should discuss bandwidth and its connection to frequencies, as this is a critical concept today. Table 7.1 compares the range of four different area networks. This section describes the different network topologies and how they pass data across a network. If you have students working in business, ask them to identify the network topologies used in their organizations. Section 7-3, “How do the Internet and Internet technology work and how do they support communication and e-business?” Most students are familiar with the Internet and motivated to discuss it. You might begin this section by asking students how they spend their time on the Internet and how their online activities have changed since they started using the Internet. Also, ask them to identify which client platforms they currently use or have used. Ask your students to identify several of the many benefits that the Internet offers to organizations. Ask them to provide specific examples that they have read about in the text or have personally observed. The principal Internet services and communication tools are e-mail, chatting, instant messaging, newsgroups, telnet, file transfer protocol, and the web. Most students will probably be familiar with these services, having used them in their personal life. What they may not understand or relate to quite yet is how effective the tools are in a business setting. These tools reduce time and cost when firms must manage organizational activities and communicate with many employees. If you have students working in businesses, ask them to discuss the communications tools their organization uses. This section introduces a fairly new concept of unified communications. It also compares Web 2.0 with Web 3.0 that is now in the conceptual stage. Make students aware that while the new information technology infrastructure provides many benefits and capabilities, it does require careful management and planning. Challenges posed by networking and the Internet include loss of management control over information systems; the need for organizational change; and the difficulty of ensuring infrastructure scalability and reliability.
  • 9.
    Copyright © 2017Pearson Education, Inc. 5 Interactive Session: Organizations: The Battle over Net Neutrality Case Study Questions 1. What is network neutrality? Why has the Internet operated under net neutrality up to this point in time? Network neutrality is the idea that Internet service providers must allow customers equal access to content and applications, regardless of the source or nature of the content. Presently the Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by Internet backbone owners. The Internet is neutral because it was built on phone lines, which are subject to ‘common carriage’ laws. These laws require phone companies to treat all calls and customers equally. They cannot offer extra benefits to customers willing to pay higher premiums for faster or clearer calls, a model known as tiered service. 2. Who’s in favor of network neutrality? Who’s opposed? Why? Those in favor of network neutrality include organizations like MoveOn.org, the Christian Coalition, the American Library Association, every major consumer group, many bloggers and small businesses, and some large Internet companies like Google and Amazon. Verizon and Google proposed a split proposition – enforce net neutrality on wired connections, but not on wireless networks. Some members of the U.S. Congress also support network neutrality. This group argues that the risk of censorship increases when network operators can selectively block or slow access to certain content. Others are concerned about the effect of slower transmission rates on their business models if users can’t download or access content in a speedy fashion. Those who oppose network neutrality include telecommunications and cable companies who want to be able to charge differentiated prices based on the amount of bandwidth consumed by content being delivered over the Internet. Some companies report that five percent of their customers use about half the capacity on local lines without paying any more than low-usage customers. They state that metered pricing is “the fairest way” to finance necessary investments in its network infrastructure. Internet service providers point to the upsurge in piracy of copyrighted materials over the Internet as a reason to oppose network neutrality. Comcast reported that illegal file sharing of copyrighted material was consuming 50 percent of its network capacity. The company posits that if network transmission rates were slower for this type of content, users would be less likely to download or access it. Those who oppose network neutrality argue that it removes the incentive for network providers to innovate, provide new capabilities, and upgrade to new technology. 3. What would be the impact on individual users, businesses, and government if Internet providers switched to a tiered service model for transmission over landlines as well as wireless? Proponents of net neutrality argue that a neutral Internet encourages everyone to innovate without permission from the phone and cable companies or other authorities. A more level
  • 10.
    Copyright © 2017Pearson Education, Inc. 6 playing field spawns countless new businesses. Allowing unrestricted information flow becomes essential to free markets and democracy as commerce and society increasingly move online. Heavy users of network bandwidth would pay higher prices without necessarily experiencing better service. Even those who use less bandwidth could run into the same situation. Network owners believe regulation like the bills proposed by net neutrality advocates will impede U.S. competitiveness by stifling innovation and hurt customers who will benefit from ‘discriminatory’ network practices. U.S. Internet service already lags behind other nations in overall speed, cost, and quality of service, adding credibility to the providers’ arguments. Obviously, by increasing the cost of heavy users of network bandwidth, telecommunication and cable companies and Internet service providers stand to increase their profit margins. 4. It has been said that net neutrality is the most important issue facing the Internet since the advent of the Internet. Discuss the implications of this statement. Under current conditions, the Internet is neutral; all Internet traffic is treated equally on a first- come, first-served basis by Internet backbone owners. Proponents of net neutrality say that changing anything would disrupt normal service for users and begin a trend of discrimination based on the types of Internet usage. Network owners believe regulation to enforce net neutrality will impede U.S. competitiveness by discouraging capital expenditure for new networks and curbing their networks’ ability to cope with the exploding demand for Internet and wireless traffic. Internet service providers (ISPs) assert that network congestion is a serious problem and that expanding their networks would require passing on burdensome costs to consumers. These companies believe differential pricing methods, which include data caps and metered use— charging based on the amount of bandwidth consumed—are the fairest way to finance necessary investments in their network infrastructures. 5. Are you in favor of legislation enforcing network neutrality? Why or why not? Student answers will vary. Some components and principles to consider in answering this question include: • Price differentials: how much more would heavy bandwidth users pay than those who consume less bandwidth? • Speed: how much faster would network transmissions be with a tiered service model? • Stifle innovation: would a tiered service model stifle innovation by charging more for heavy bandwidth use or would it free up bandwidth thus allowing more innovation? • Censorship: would telecommunication and cable companies and Internet service providers increase censorship of content transmitted over networks? • Discrimination by carriers: would the end of network neutrality be the beginning of more discrimination? Interactive Session: People: Monitoring Employees on Networks: Unethical or Good Business?
  • 11.
    Copyright © 2017Pearson Education, Inc. 7 Case Study Questions 1. Should managers monitor employee e-mail and Internet usage? Why or why not? Student answers will vary on this question. The case study statistics show that corporate misuse and abuse of e-mail for personal reasons is exploding. Simply stated, employees who use company resources for work not related to the company are, in essence, engaged in “service theft.” They are being paid to work for the company, and this does not include abusing corporate resources for personal time. Companies are in business to generate profits for their shareholders. Managers certainly should be concerned with the loss of time and employee productivity, the additional traffic it creates on their networks that inhibits the efficiency for real business purposes, lost revenue or missed opportunities, as well as overcharging clients because of lost employee efficiencies. The company itself is responsible for the use of its resources and what employees do while using them. Adverse publicity can seriously affect a company and could even result in expensive lawsuits. Companies also fear e-mail leakage of trade secrets. Other legal and regulatory problems involve the safe keeping of all e-mails that are generated on corporate equipment. This information must be retained for specific time periods and may be requested as evidence in a lawsuit. 2. Describe an effective e-mail and web use policy for a company. Like all policies, an effective e-mail and web use policy must be carefully designed and clearly communicated to all persons who use these corporate resources. There are a number of different policies in existence. Some companies allow absolutely no personal use of corporate networks, whereas others allow some degree of activity that is easily monitored. A good policy will detail exactly what type of activity is acceptable and what is not allowed. The policy should clearly articulate sanctions that will be followed for any and all offenses in relation to the policy. Most of all, rules for Internet usage should be tailored to specific business needs and organizational cultures. As an instructor you might wish to show students an example of the University of South Australia’s policy at http://www.unisa.edu.au/policies/policies/corporate/C22.asp 3. Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not? Opinions will vary according to personal values and workplace experiences. However, most students will probably answer that managers should inform employees that their web behavior is being monitored as a way to foster open communications and trust between both sides. Many consultants believe companies should write corporate policies on employee e-mail and Internet use. The policies should include explicit ground rules that state, by position or level, under what circumstances employees can use company facilities for e-mail, blogging, or web surfing. The policies should also inform employees whether these activities are monitored and explain why. Section 7-4, “What are the principal technologies and standards for wireless networking, communication, and Internet access?” Ask your students how many of them use cellular
  • 12.
    Copyright © 2017Pearson Education, Inc. 8 phones, smartphones, wireless laptops, tablet computers, or wireless e-book readers. Most students are excited to demonstrate their “latest devices,” and you may wish to ask one of them to discuss the capabilities of theirs. Ask them to discuss what they like or dislike about the features found on their appliance. If you have the class time, you can ask the campus IT director to discuss the telecommunications technology used on your campus, take a tour of the campus facilities, or invite an IT director from a local company to discuss his company’s telecommunications technology. Ask your students to find out what their university does in order to support mobile wireless communications. Have them investigate applications where Bluetooth, Wi-FI, or hotspot technology is used and how it benefits them. Are they able to use their own personal appliances to connect and utilize these technologies on their campus? Review Questions 7-1 What are the principal components of telecommunications networks and key networking technologies? Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large company relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communication, wireless local-area networks, videoconferencing systems, a corporate website, intranets, extranets, and an array of local and wide-area networks, including the Internet. This collection of networks evolved from two fundamentally different types of networks: telephone networks and computer networks. (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, AACSB: Application of knowledge.) Name and describe the principal technologies and trends that have shaped contemporary telecommunications systems. Client/server computing, the use of packet switching, and the development of widely used communications standards such as TCP/IP are the three technologies that have shaped contemporary telecommunications systems. Client/server computing has extended to networking departments, workgroups, factory floors, and other parts of the business that could not be served by a centralized architecture. The Internet is based on client/server computing. Packet switching technology allows nearly full use of almost all available lines and capacity. This was not possible with the traditional dedicated circuit-switching techniques that were used in the past. TCP/IP is a suite of protocols that has become the dominant standard of network communications. Having a set
  • 13.
    Copyright © 2017Pearson Education, Inc. 9 of protocols for connecting diverse hardware and software components has provided a universally agreed upon method for data transmission. (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, AACSB: Application of knowledge.) 7-2 What are the different types of networks? Define an analog and a digital signal. Analog: a continuous waveform that passes through a communications medium and has been used for voice communication. Traditionally used by telephone handsets, computer speakers, or earphones. Digital: a discrete, binary waveform, rather than a continuous waveform, represented by strings of two states: one bit and zero bits, which are represented as on-off electrical pulses. Computers use digital signals and require a modem to convert these digital signals into analog signals that are transmitted across telephone lines, cable lines, or wireless media. (Learning Objective 2: What are the different types of networks?, AACSB: Application of knowledge.) Distinguish between a LAN, MAN, and WAN. LAN (Local Area Network): a telecommunications network that is designed to connect personal computers and other digital devices within a half-mile or 500-meter radius. LANs typically connect a few computers in a small office, all the computers in one building, or all the computers in several buildings in close proximity. LANs require their own dedicated channels. MAN (Metropolitan Area Network): a network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN. WAN (Wide Area Network): spans broad geographical distances – entire regions, states, continents, or the entire globe. The most universal and powerful WAN is the Internet. Computers connect to a WAN through public networks, such as the telephone system or private cable systems, or through leased lines or satellites. (Learning Objective 2: What are the different types of networks?, AACSB: Application of knowledge.) 7-3 How do the Internet and Internet technology work and how do they support communication and e-business? Define the Internet, describe how it works, and explain how it provides business value. The Internet is a vast network of computers that connects millions of people all over the world. The Internet uses the client/server model of computing and the TCP/IP network reference model. Every computer on the Internet is assigned a unique numeric IP address. No one owns the Internet, and it has no formal management organization. However, worldwide Internet policies are established by organizations and government bodies, such as the Internet
  • 14.
    Copyright © 2017Pearson Education, Inc. 10 Architecture Board and the World Wide Web Consortium. The Internet must also conform to the laws of the sovereign nation-states in which it operates, as well as the technical infrastructure that exists within the nation-state. The Internet enables employees to gain remote access to the company’s internal systems through its website. They are able to better service customers and suppliers, improve operational efficiency, increase productivity, lower operational costs, have a broader market base, and reach more individual customers on a global scale by establishing a web presence. The cost of email and other Internet services tend to be far lower than equivalent voice, postal, or over night delivery costs, making the Internet a very inexpensive communication medium. It is also a very fast method of communication, with messages arriving anywhere in the world in a matter of seconds or minutes. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Explain how the Domain Name System (DNS) and IP addressing system work. The Internet is based on the TCP/IP networking protocol suite. Every computer on the Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods. A domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet. The Domain Name System (DNS) converts IP addresses to domain names so that users only need to specify a domain name to access a computer on the Internet, instead of typing the numeric IP address. DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. When a user sends a message to another user on the Internet, the message is first decomposed into packets using the TCP protocol. Each packet contains its destination address. The packets are then sent from the client to the network server and from there on to as many other servers as necessary to arrive at a specific computer with a known address. At the destination address, the packets are reassembled into the original message. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e- business?, AACSB: Analytical thinking.) List and describe the principal Internet services. Table 7-2 lists and describes the major Internet services: • Email—person-to-person messaging; document sharing. • Newsgroups—discussion groups on electronic bulletin boards. • Chatting and instant messaging—interactive conversations. • Telnet—logging on to one computer system and doing work on another. • File Transfer Protocol (FTP)—transferring files from computer to computer. • World Wide Web—retrieving, formatting, and displaying information (including text, audio, graphics, and video) using hypertext links.
  • 15.
    Copyright © 2017Pearson Education, Inc. 11 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Define and describe VoIP and virtual private networks and explain how they provide value to businesses. • Voice over Internet Protocol (VoIP) enables Internet technology to be used for telephone voice transmission over the Internet or private networks. VoIP offers the advantage of avoiding tolls charged by local and long-distance telephone networks. VoIP provides businesses an opportunity to reduce costs because they no longer have to maintain separate networks or provide support services and personnel for each different type of network. It gives organizations flexibility because phones can be added or moved to different offices without rewiring or reconfiguring networks. • Virtual private networks are secure, encrypted, private networks that have been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet. VPNs are low-cost alternatives to private WANs. VPNs give businesses a more efficient network infrastructure for combining voice and data networks. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) List and describe alternative ways of locating information on the web. • Search engines are a facility on the web that helps you find sites with the information and/or services you want. Examples: Google, Yahoo!, and MSN. • Intelligent agent shopping bots use intelligent agent software for searching the Internet for shopping information. Examples: MySimon and Froogle. • Blogs are informal yet structured websites where subscribing individuals can publish stories, opinions, and links to other websites of interest. • Rich Site Summary or Really Simple Syndication (RSS) is a simple way for people to have content they want pulled from websites and fed automatically to their computers, where it can be stored for later viewing. It’s commonly used with blogs. • Wikis are collaborative websites where visitors can add, delete, or modify content on the site, including the work of previous authors. • Web 2.0 provides second-generation interactive Internet-based services that enable people to collaborate, share information, and create new services online. Web 2.0 software applications run on the web itself instead of the desktop and bring the vision of web-based computing closer to realization. • Web 3.0 (Semantic Web) reduces the amount of human involvement in searching for and processing web information. It’s still in its infancy but promises to establish specific meanings for data on the web, categories for classifying the data, and relationships between classification categories.
  • 16.
    Copyright © 2017Pearson Education, Inc. 12 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) Describe how online search technologies are used for marketing. Search engine marketing monetizes the value of the search process. Searching is one of the web’s most popular activities with billions of queries performed each month. Search engines are the foundation for the most lucrative form of online marketing and advertising. When users enter a search term in a search engine, they receive two types of listings: sponsored links, for which advertisers have paid to be listed, and unsponsored organic search results. Advertisers can also purchase small text boxes on the side of search results pages. Paid, sponsored advertisements are the fastest growing form of Internet advertising and are powerful new marketing tools that precisely match consumer interests with advertising messages at the right moment. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Application of knowledge.) 7-4 What are the principal technologies and standards for wireless networking, communications, and Internet access? Define Bluetooth, Wi-Fi, WiMax, and 3G and 4G networks. Standards for wireless computer networks include Bluetooth (802.15) for small personal-area networks (PANs), Wi-Fi (802.11) for local-area networks (LANs), and WiMax (802.16) for metropolitan-area networks (MANs). Bluetooth can link up to eight devices within a 10- meter area using low-power, radio-based communication and can transmit up to 722 Kbps in the 2.4 GHz band. Wireless phones, keyboards, computers, printers, and PDAs using Bluetooth can communicate with each other and even operate each other without direct user intervention. Wi-Fi is useful for creating wireless LANs and for providing wireless Internet access. Its access range is limited to anywhere between 300 feet and three miles. Hotspots are public access points individuals use to obtain high speed Internet access. WiMax has a wireless access range of up to 31 miles and a data transfer rate of up to 75 Mbps, making it suitable for providing broadband Internet access in areas lacking DSL and cable lines. The 802.16 specification also has robust security and quality-of-service features to support voice and video. 3G is a short term for third-generation wireless technology, especially mobile communications. Cellular networks have evolved from slow-speed (1G) analog networks to high-speed, high-bandwidth, digital packet-switched, third-generation (3G) networks with speeds ranging from 144 Kbps to more than 2 Mbps for data transmission. 4G is a short term for fourth-generation wireless technology. It is entirely packet-switched and capable of 100 Mbps transmission speed (which can reach 1 Gbps under optimal
  • 17.
    Copyright © 2017Pearson Education, Inc. 13 conditions), with premium quality and high security. Voice, data, and high-quality streaming video are available to users anywhere, anytime. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Describe the capabilities of each and for which types of applications each is best suited. • Bluetooth: Access very limited; useful for creating small personal-area networks. • Wi-Fi: Access is limited to 30–50 meters; useful for creating small local area networks. • WiMax: Access is limited to a range up to 31 miles: useful for creating wide area networks. • 3G networks: Access is available on major cellular telephone carriers that have configured their networks for 3G services. • 4G networks: Provides premium quality for voice, data, and streaming video from cellular telephone carriers. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Define RFID, explain how it works, and describe how it provides value to businesses. Mobile wireless technology facilitates supply chain management by capturing data on the movement of goods as these events take place and by providing detailed, immediate information as goods move among supply chain partners. Radio frequency identification (RFID) systems provide a microchip that contains data about an item and its location. The tags transmit radio signals over a short distance to special RFID readers. The RFID readers then pass the data over a network to a computer for processing. RFID gives businesses an opportunity to further automate their supply chain networks. The technology allows more data on an RFID chip than typical barcodes. RFID systems track each pallet, lot, or unit item in a shipment. The technology helps companies improve receiving and storage operations by improving their ability to “see” exactly what stock is stored in warehouses or on retail store shelves. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Define WSNs, explain how they work, and describe the kinds of applications that use them. Wireless sensor networks (WSNs) are networks of interconnected wireless devices with some processing and radio-transmitting capability that are embedded into the physical environment to provide measurements of many points over large spaces. Wireless sensor networks are valuable for monitoring environmental changes, traffic patterns, security incidents, or supply chain events. Wireless sensor networks can be placed
  • 18.
    Copyright © 2017Pearson Education, Inc. 14 in the field for years without any maintenance or human intervention. That reduces costs to businesses using them. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Application of knowledge.) Discussion Questions 7-5 It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement. Student answers to this question will vary. 7-6 Should all major retailing and manufacturing companies switch to RFID? Why or why not? Student answers to this question will vary. 7-7 What are some of the issues to consider in determining whether the Internet would provide your business with a competitive advantage? Student answers to this question will vary. Hands-On MIS Projects Management Decision Problems 7-8 Floor tile company: Asked by major retailing customers to begin using RFID to improve management of products. Use the web to identify the cost of hardware, software, and networking components for an RFID system for your company. What factors should be considered? What are the key decisions that have to be made in determining whether your firm should adopt this technology? (The following information was copied from www.zebra.com, Nov 2010) What is the estimated incremental cost for adopting RFID? If one is discussing incremental costs over and above what was invested in your bar code infrastructure, then you can say that you will be making an investment in tags, printer/encoders, readers, middleware, and professional services to integrate these components into your bar code legacy environment. If you are not working with bar codes already, obviously you will need to make an investment in back-office, manufacturing, or WMS systems to use RFID data. What is a ballpark figure for implementing RFID in a warehouse and distribution process? According to Forrester Research, a typical supplier that attempts to comply with a mandate
  • 19.
    Copyright © 2017Pearson Education, Inc. 15 can expect to spend as much as $9 million on RFID—depending on the size of its distribution network and Walmart volume. According to this research, the largest expenditures are tag costs and additional warehouse labor. Again, it is stressed that this figure is derived from studying one company seeking compliance with the Walmart mandate. However, this study provides a good perspective on the areas from which costs will derive. How do smart label costs compare to conventional thermal/thermal-transfer printed labels? A smart label runs in the vicinity of about $0.50 per label vs. about $0.01 for a conventional label. This is mainly due to the addition of the tag. This cost is also variable based on the total volume printed and the economies of scale associated with large quantities. What companies are currently developing RFID software? Is it all customized or are there off-the-shelf solutions? Numerous start-up and established software providers—including those who provide ERP software—have developed applications to deal with RFID reader and printer/encoder management, plus “tag data capture event” management. As with most business applications software, packages are typically customized to meet customers’ requirements rather than being ready to go “off the shelf.” How will RFID integrate with EDI software? EDI messages contain data about business transactions. While the format of an EDI message may change to accommodate “new data” (such as an EPC by comparison with a GTIN), fundamentally EDI message processors are unaware of the source of the data contained in messages. So there should be no reason that RFID cannot integrate with EDI software, provided the data structures are fundamentally the same. However, one area of difference is that many EDI systems typically deliver data in periodic batch mode; in contrast, the strength of RFID is its ability to deliver real-time data, so systems are up-to-the-minute. Key decisions that a company needs to make when considering adopting RFID include: • Hardware and software costs • Implementation costs • Return on investments • How technology fits into overall business strategy (Learning Objective 4: What are the principal technologies and standards for wireless networking, communications, and Internet access?, AACSB: Analytical thinking, Application of knowledge.) 7-9 BestMed Medical Supplies Corporation: Sells products and equipment from over 700 different manufacturers to hospitals, health clinics, and medical offices. The company employs 500 people at seven different locations. Management is considering adopting a unified communications system. What factors should be considered? What are the key
  • 20.
    Copyright © 2017Pearson Education, Inc. 16 decisions that have to be made in determining whether to adopt this technology? Use the web, if necessary, to find out more about unified communications and its costs. Because the costs of purchasing and implementing a unified communication system will vary based on the chosen system, so too will student answers. (The following information was copied from www.networkworld.com, Nov 2010) From a broad perspective, Verizon Business suggests that organizations need to evaluate and measure how UC&C will benefit their organizations, determine whether the enterprise has adequate in-house technical resources, personnel and network capacity; and define how to integrate UC&C into business processes to align the deployment with critical business initiatives. At a more detailed level, Verizon Business suggested that in preparation for UC&C, enterprises should: • Invest in advanced IP networks because “UC&C starts with a capabilities-rich IP infrastructure. . . [and] flexible and expansive IP networks serve as the foundation of a successful UC&C deployment.” • Inventory technology and personnel resources to better understand the technological scope of UC&C deployments and “help identify potential network, equipment, and application gaps.” Verizon Business also recommends a skills-assessment of technical staff “to identify possible new hires and individuals requiring additional training.” • Align technology with business objectives to “make purchasing decisions with a focus on meeting specific business goals.” Any deployment should be designed to maximize the impact of UC&C on business processes. The enterprise should also establish benchmarks for success to better understand its ultimate objectives. • Create a comprehensive roadmap that is “far reaching and covers areas such as technology and finances, as well as detailed deployment and implementation plans.” • Tackle security at the onset, with a design that integrates “seamlessly with a business’ current network and leverage existing technology investments.” • Determine capabilities for ongoing management and decide “whether in-house staff has the skills and time required to effectively manage and troubleshoot performance issues.” As needed, enterprise should “select a managed services provider with the people, tools, and processes to help provide consistent performance of UC&C applications.” • Develop support systems and processes so that the corporate IT staff is prepared to address end-user performance issues and questions. • Train and educate end users “to help users adopt and embrace these new tools so they can work more efficiently and productively.” • Measure and modify, with built-in milestones planned that “go beyond reliability and availability measurements to assess the impact of UC&C from a financial, customer service, business process, and end-user satisfaction perspective.”
  • 21.
    Copyright © 2017Pearson Education, Inc. 17 (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) Improving Decision Making: Using Spreadsheet Software to Evaluate Wireless Services Software skills: Spreadsheet formulas, formatting Business skills: Analyzing telecommunications services and costs 7-10 You would like to equip your sales force of 35, based in St. Louis, Missouri with mobile phones that have capabilities for voice transmission, text messaging, Internet access, and taking and sending photos. Use the web to select two wireless providers that offer nationwide voice and data service as well as good service in your home area. Examine the features of the mobile handsets and wireless plans offered by each of these vendors. Assume that each of the 35 salespeople will need to spend three hours per weekday between 8 a.m. and 6 p.m. on mobile voice communication, send 30 text messages per weekday, use 1 gigabyte of data per month, and send five photos per week. Use your spreadsheet software to determine the wireless service and handset that will offer the best pricing per user over a two-year period. For the purposes of this exercise, you do not need to consider corporate discounts. Answers will vary, since plan rates and costs of mobile phones are constantly changing. The answer to this question can be found in the sample solution found in the Microsoft Excel file named MIS14ch07solutionfile.xls. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) Achieving Operational Excellence: Using Web Search Engines for Business Research Software skills: Web search tools Business skills: Researching new technologies 7-11 Use Google and Bing to obtain information about ethanol as an alternative fuel for motor vehicles. If you wish, try some other search engines as well. Compare the volume and quality of information you find with each search tool. Which tool is the easiest to use? Which produced the best results for your research? Why? Answers will vary according to the search phrases students enter in the search engines. The object of this question should be for students to explore new search engines and web services and not stick with “what they already know.” To that end, encourage students to use a different search engine than what they normally use and explore how their search results are framed— sponsored links or organic listings. Also encourage them to search for audio and video files, blogs, wikis, and Web 2.0 services about the subject. Is the information more useful, less useful, pertinent, or trustworthy? Do they prefer simple text documents or do they find the newer web services more helpful? (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
  • 22.
    Copyright © 2017Pearson Education, Inc. 18 Collaboration and Teamwork Project 7-12. In MyMISLab, you will find a Collaboration and Teamwork Project dealing with the concepts in this chapter. You will be able to use Google Drive, Google Docs, Google Sites, Google +, or other open source collaboration tools to complete the assignment. Case Study: Google, Apple, and Facebook Battle for Your Internet Experience 7-13 Compare the business models and core competencies of Google, Apple, and Facebook. Google: Its business model has always focused on the Internet and the web. It began as one of many search engines. It quickly ran away from the pack with its copyrighted PageRank search algorithm which returns superior search results for web users. It also has developed extensive online advertising services for businesses of all sizes. Google provides value to the user by using an inexpensive, flexible infrastructure to speed up web searches and provide its users with a vast array of web-based services and software tools. Apple: Its business model focuses on centralized control of almost all aspects of its hardware and software. It believes smartphones and tablets should have proprietary standards and be tightly controlled. It only allows apps from its App store that have been vetted by the company to be loaded to its products. Apple has a very loyal user base that has steadily grown and most likely will stay with Apple products in the future. Facebook: Facebook has built its business around social networking better than any other company. It has more worldwide users than any other company. Facebook Platform enables developers to build applications and websites that integrate with Facebook to reach its global network of users and to build pesonalized and social products. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e- business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) 7-14 Why is mobile computing so important to these three firms? Evaluate the mobile strategies of each firm. This case demonstrates the fundamental paradigm shift from primarily desktop PC computing to mobile computing devices accessing services through the Internet that is currently taking place. This environment is projected to be a $400 billion e-commerce marketplace where the major access device will be a mobile smartphone or tablet computer. Each company is vying for the lead in a world of ubiquitous computing based on Internet access. The leader stands to make untold profits from advertising but in order to do that, the leader needs to claim the largest user base. Apps greatly enrich the experience of using a mobile device. Whoever creates the most appealing set of devices and applications will derive a significant competitive advantage over rival companies.
  • 23.
    Copyright © 2017Pearson Education, Inc. 19 Google: Aggressively follows eyeballs. It has introduced the Android mobile operating system for a host of non-Apple devices. The Droid system adds features that Apple devices don’t have – the ability to run multiple apps at the same time. Uses an open non-proprietary system that allows users to grab apps from any source. Command of the smartphone operating system market provides built-in channels for serving ads to mobile devices. Google has successfully tailored its search results to respond to mobile searchers needs and accommodate smartphone functionality. Apple: By far the current leader in the number of apps users can download – over one million. Apple takes a 30% cut of every app purchased. Uses a closed proprietary system and apps that only provide “one way in.” It unveiled Siri in 2011 that has the potential to serve as a market disruption technology by combining search, navigation, and personal assistant tools. Facebook: Realized that much of its advertising revenue will come from mobile device searches. Introduced Sponsored Stories as a way to triple its revenue. It overhauled its home page to increase the size of both photos and links and allow users to create topical streams. It de-cluttered smartphone screens. It gave advertisers more opportunties and more interesting information with which to target markets. Facrbook has a mobile application suite that replaces the typical smartphone home screen. It essentially turns an Android mobile device into a Facebook phone. (Learning Objective 4: What are the principal technologies and standards for wireless networking, communication, and Internet access?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) 7-15 What is the significance of search to the success or failure of mobile computing? How have Apple and Facebook attempted to compete with Google? Will their strategies succeed? Mobile computing is eclipsing desktop computing as the main entry point to the Internet. Today, people spend more than half their time online using mobile devices. Mobile devices take advantage of a growing cloud of computing capacity available to anyone with a smartphone and Internet connectivity. Apple’s attempt to compete with Google came in the form of Siri, a combined search, navigation, and personal assistant app. Siri uses Yelp for local business searches, tapping into its user recommendations and ratings. It uses Wolfram Alpha for factual and mathematical questions. It only uses Google search when all else fails. Facebook is attempting to create a Graph Search feature to rival Google’s search. It mines Facebook’s vast repository of user-generated data and delivers results based on social signals such as Facebook ‘likes’ and friend recommendations. If the desire for friend-based recommendations outweighs users’ reluctance to divulge more personal information, Graph Search may be a winner. However, Facebook has an uphill battle in its efforts to convince users to trust it with their Facebook activities. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.)
  • 24.
    Copyright © 2017Pearson Education, Inc. 20 7-16 Which company and business model do you think is most likely to dominate the Internet and why? Students should consider these principles in their answers: • The size, complexity, and bureaucracy of organizations affect the ability of any company to continue to innovate, grow, and expand its reach. (see Chapter 3) As all three companies try to expand into mobile computing, their ability to “turn on a dime” in the face of other competitors may be in serious jeopardy. • Google currently has the major share of the web-based advertising market, however Facebook and other market entrants will be a major threat to them. Apple has had a significant lead in mobile computing for several years. However, as more companies, Google, Facebook, and others, continue to expand into the arena, its lead will be threatened. Legal and regulatory compliance will be a major issue as this market grows and more concerns are expressed from external environments. • History is not on anyone’s side. Every major company that’s been a force in technology in one era has lost its lead in the next era. For example, IBM was king of mainframe computing in the 1940s and 1950s. DEC was king in the mini-computer era during the 1970s. Microsoft was king in the 1980s and 1990s during the reign of desktop computers. Google reigns in the 2000s with its web-based services. Apple began as king of mobile computing devices. Will it remain on top as technology continues to evolve? (Learning Objective 1: What are the principal components of telecommunications networks and key networking technologies?, Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, AACSB: Analytical thinking, Reflective thinking, Application of knowledge.) 7-17 What difference would it make to a business or to an individual consumer if Apple, Google, or Facebook dominated the Internet experience? Explain your answer. Right now, Apple leads Google in the number of apps available to users. That gap is closing quickly thanks to Google’s improvements of the Android operating system and its encouragement to app developers. Open, non-proprietary systems historically have beat closed, proprietary systems because developers and users have a wider range of choices. Business managers must try to forecast which platform will provide the right choices for employees. Consumers must choose which platform will best fulfill their personal needs for the next two to three years. Switching costs play into both scenarios, not just in terms of phone purchases but the price of apps. Once a user purchases and adjusts to using a certain platform, it’s difficult and expensive to switch to a whole different system. Apps greatly enrich the experience of using a mobile device, and without them, the predictions for the future of mobile Internet would not be nearly as bright. Whoever creates the most appealing set of devices and applications will derive a significant competitive advantage over rival companies. (Learning Objective 3: How do the Internet and Internet technology work and how do they support communication and e-business?, Learning Objective 4: What are the principal technologies and standards for wireless networking,
  • 25.
    Another Random ScribdDocument with Unrelated Content
  • 26.
    It was indeedremarkable. A blood-red sun was shouldering his way in and out of a wide dull mass of gray cloud that was unrelieved by a single fleck of color. Rose looked at the sky, and Vesper looked at her, and thought of a grieving Madonna. She had been so gay and cheerful lately. What had happened to call that expression of divine tenderness and sympathy to her face? He had never seen her so ethereal and so spiritually beautiful, not even when she was bending over his sick- bed. What a rest and a pleasure to weary eyes she was, in her black artistic garments, and how pure was the oval of her face, how becoming the touch of brownness on the fair skin. The silk handkerchief knotted under her chin and pulled hood-wise over the shock of flaxen hair combed up from the forehead, which two or three little curls caressed daintily, gave the finishing touch of quaintness and out-of-the-worldness to her appearance. "You are feeling slightly blue this evening, are you not?" he asked. "Blue,—that means one's thoughts are black?" said Rose, bringing her glance back to him. "Yes." "Then I am a very little blue," she said, frankly. "This inn is like the world to me. When those about me are sad, I, too, am sad. Sometimes I grieve when strangers go,—for days in advance I have a weight at heart. When they leave, I shut myself in my room. For others I do not care." "And are you melancholy this evening because you are thinking that my mother and I must soon leave?" Her eyes filled with tears. "No; I did not think of that, but I do now." "Then what was wrong with you?" "Nothing, since you are again cheerful," she said, in tones so doleful that Vesper burst into one of his rare laughs, and Rose, laughing
  • 27.
    with him, brushedthe tears from her face. "There was something running in my mind that made me feel gloomy," he said, after a short silence. "It has been haunting me all day." Her eager glance was a prayer to him to share the cause of his unhappiness with her, and he recited, in a low, penetrating voice, the lines: "Mon Dieu, pour fuir la mort n'est-il aucun moyen? Quoi? Dans un jour peut-être immobile et glacé.... Aujourd'hui avenir, le monde, la pensée Et puis, demain, ... plus rien." Rose had never heard anything like this, and she was troubled, and turned her blue eyes to the sky, where a trailing white cloud was soaring above the dark cloud-bank below. "It is like a soul going up to our Lord," she murmured, reverently. Vesper would not shock her further with his heterodoxy. "Forget what I said," he went on, lightly, "and let me beg you never to put anything on your head but that handkerchief. You Acadien women wear it with such an air." "But it is because we know how to tie it. Look,—this is how the Italian women in Boston carry those colored ones," and, pulling the piece of silk from her head, she arranged it in severe lines about her face. "A decided difference," Vesper was saying, when Agapit came around the corner of the house, driving Toochune, who was attached to a shining dog-cart. "Are you going with us?" he called out. "I have not yet been asked."
  • 28.
    "Thou naughty Rose,"exclaimed Agapit; but she had already hurried up-stairs to invite Mrs. Nimmo to accompany them. "Madame, your mother, prefers to read," she said, when she came back, "therefore Narcisse will come." "Mount beside me," said Agapit to Vesper; "Rose and Narcisse will sit in the background." "No," said Vesper, and he calmly assisted Rose to the front seat, then extended a hand to swing Narcisse up beside her. The child, however, clung to him, and Vesper was obliged to take him in the back seat, where he sat nodding his head and looking like a big perfumed flower in his drooping hat and picturesque pink trousers. "You smile," said Agapit, who had suddenly twisted his head around. "I always do," said Vesper, "for the space of five minutes after getting into this cart." "But why?" "Well—an amusing contrast presents itself to my mind." "And the contrast, what is it?" "I am driving with a modern Evangeline, who is not the owner of the rough cart that I would have fancied her in, a few weeks ago, but of a trap that would be an ornament to Commonwealth Avenue." "Am I the modern Evangeline?" said Agapit, in his breakneck fashion. "To my mind she was embodied in the person of your cousin," and Vesper bowed in a sidewise fashion towards his landlady. Rose crimsoned with pleasure. "But do you think I am like Evangeline,—she was so dark, so beautiful?" "You are passable, Rose, passable," interjected Agapit, "but you lack the passion, the fortitude of the heroine of Mr. Nimmo's immortal
  • 29.
    countryman, whom allAcadiens venerate. Alas! only the poets and story-tellers have been true to Acadie. It is the historians who lie." "Why do you think your cousin is lacking in passion and fortitude?" asked Vesper, who had either lost his gloomy thoughts, or had completely subdued them, and had become unusually vivacious. "She has never loved,—she cannot. Rose, did you love your husband as I did la belle Marguerite?" "My husband was older,—he was as a father," stammered Rose. "Certainly I did not tear my hair, I did not beat my foot on the ground when he died, as you did when la belle married the miller." "Have you ever loved any man?" pursued Agapit, unmercifully. "Oh, shut up, Agapit," muttered Vesper; "don't bully a woman." Agapit turned to stare at him,—not angrily, but rather as if he had discovered something new and peculiar in the shape of young manhood. "Hear what she always says when young men, and often old men, drive up and say, 'Rose à Charlitte, will you marry me?' She says, 'Love,—it is all nonsense. You make all that.' Is it not so, Rose?" "Yes," she replied, almost inaudibly; "I have said it." "You make all that," repeated Agapit, triumphantly. "They can rave and cry,—they can say, 'My heart is breaking;' and she responds, 'Love,—there is no such thing. You make all that.' And yet you call her an Evangeline, a martyr of love who laid her life on its holy altar." Rose was goaded into a response, and turned a flushed and puzzled face to her cousin. "Agapit, I will explain that lately I do not care to say 'You make all that.' I comprehend—possibly because the blacksmith talks so much to me of his wish towards my sister—that one does not make love. It is something that grows slowly, in the breast, like a flower. Therefore, do not say that I am of ice or stone."
  • 30.
    "But you donot care to marry,—you just come from telling me so." "Yes; I am not for marriage," she said, modestly, "yet do not say that I understand not. It is a beautiful thing to love." "It is," said Agapit, "yet do not think of it, since thou dost not care for a husband. Let thy thoughts run on thy cooking. Thou wert born for that. I think that thou must have arrived in this world with a little stew-pan in thy hand, a tasting fork hanging at thy girdle. Do not wish to be an Evangeline or to read books. Figure to yourself, Mr. Nimmo,"—and he turned his head to the back seat,—"that last night she came to my room, she begged me for an English book,—she who says often to Narcisse, 'I will shake thee, my little one, if thou usest English words.' She says now that she wishes to learn,—she finds herself forgetful of many things that she learned in the convent. I said, 'Go to bed, thou silly fool. Thy eyes are burning and have black rings around them the color of thy stove,' and she whimpered like a baby." "Your cousin is an egotist, Mrs. Rose," said Vesper, over his shoulder. "I will lend you some books." "Agapit is as a brother," she replied, simply. "I have been a good brother to thee," he said, "and I will never forget thee; not even when I go out into the world. Some day I will send for thee to live with me and my wife." "Perhaps thy wife will not let me," she said, demurely. "Then she may leave me; I detest women who will not obey." For some time the cousins chattered on and endeavored to snatch a glimpse, in "time's long and dark prospective glass," of Agapit's future wife, while Vesper listened to them with as much indulgence as if they had been two children. He was just endeavoring to fathom the rationale of their curious interchange of thou and you, when Agapit said, "If it is agreeable to you, we will drive back in the woods to the Concession. We have a cousin who is ill there,—see,
  • 31.
    here we passthe station," and he pointed his whip at the gabled roof near them. The wheels of the dog-cart rolled smoothly over the iron rails, and they entered upon a road bordered by sturdy evergreens that emitted a deliciously resinous odor and occasioned Mrs. Rose to murmur, reverently, "It is like mass; for from trees like these the altar boys get the gum for incense." Wild gooseberry and raspberry bushes lined the roadside, and under their fruit-laden branches grew many wild flowers. A man who stopped Agapit to address a few remarks to him gathered a handful of berries and a few sprays of wild roses and tossed them in Narcisse's lap. The child uttered a polite, "Merci, monsieur" (thank you, sir), then silently spread the flowers and berries on the lap rug and allowed tears from his beautiful eyes to drop on them. Vesper took some of the berries in his hand, and carefully explained to the sorrowing Narcisse that the sensitive shrubs did not shiver when their clothes were stripped from them and their hats pulled off. They were rather shaking their sides in laughter that they could give pleasure to so good and gentle a boy. And the flowers that bowed so meekly when one wished to behead them, were trembling with delight to think that they should be carried, for even a short time, by one who loved them so well. Narcisse at last was comforted, and, drying his tears, he soberly ate the berries, and presented the roses to his mother in a brilliant nosegay, keeping only one that he lovingly fastened in his neck, where it could brush against his cheek. Soon they were among the clearings in the forest. Back of every farm stood grim trees in serried rows, like soldiers about to close in on the gaps made in their ranks by the diligent hands of the Acadien farmers. The trees looked inexorable, but the farmers were more so.
  • 32.
    Here in thebackwoods so quiet and still, so favorable for farming, the forest must go as it had gone near the shore. About every farmhouse, men and women were engaged in driving in cows, tying up horses, shutting up poultry, feeding pigs, and performing the hundred and one duties that fall to the lot of a farmer's family. Everywhere were children. Each farmer seemed to have a quiver full of these quiet, well-behaved little creatures, who gazed shyly and curiously at the dog-cart as it went driving by. When they came to a brawling, noisy river, having on its banks a saw-mill deserted for the night, Agapit exclaimed, "We are at last arrived!" Close to the mill was a low, old-fashioned house, situated in the midst of an extensive apple orchard in which the fruit was already taking on size and color. "They picked four hundred barrels from it last year," said Agapit, "our cousins, the Kessys, who live here. They are rich, but very simple," and springing out, he tied Toochune's head to the gatepost. "Now let us enter," he said, and he ushered Vesper into a small, dull room where an old woman of gigantic stature sat smoking by an open fireplace. Another tall woman, with soft black eyes, and wearing on her breast a medal of the congregation of St. Anne, took Rose away to the sick- room, while Agapit led Vesper and Narcisse to the fireplace. "Cousin grandmother, will you not tell this gentleman of the commencement of the Bay?" The old woman, who was nearly sightless, took her pipe from her mouth, and turned her white head. "Does he speak French?" "Yes, yes," said Agapit, joyfully. A light came into her face,—a light that Vesper noticed always came into the faces of Acadiens, no matter how fluent their English, if he addressed them in their mother tongue.
  • 33.
    "I was bornen haut de la Baie" (up the Bay), she began, softly. "Further than Sleeping Water,—towards Digby," said Agapit, in an undertone. "Near Bleury," she continued, "where there were only eight families. In the morning my mother would look out at the neighbors' chimneys; where she saw smoke she would send me, saying, 'Go, child, and borrow fire.' Ah! those were hard days. We had no roads. We walked over the beach fifteen miles to Pointe à l'Eglise to hear mass sung by the good Abbé. "There were plenty of fish, plenty of moose, but not so many boats in those days. The hardships were great, so great that the weak died. Now when my daughter sits and plays on the organ, I think of it. David Kessy, my father, was very big. Once our wagon, loaded with twenty bushels of potatoes, stuck in the mud. He put his shoulder against it and lifted it. Nowadays we would rig a jack, but my father was strong, so strong that he took insults, though he trembled, for he knew a blow from his hand would kill a man." The Acadienne paused, and fell into a gentle reverie, from which Agapit, who was stepping nimbly in and out of the room with jelly and other delicacies that he had brought for the invalid, soon roused her. "Tell him about the derangement, cousin grandmother," he vociferated in her ear, "and the march from Annapolis." CHAPTER XI NEWS OF THE FIERY FRENCHMAN. "Below me winds the river to the sea, On whose brown slope stood wailing, homeless maids;
  • 34.
    Stood exiled sons;unsheltered hoary heads; And sires and mothers dumb in agony. The awful glare of burning homes, where free And happy late they dwelt, breaks on the shades, Encompassing the sailing fleet; then fades, With tumbling roof, upon the night-bound sea. How deep is hope in sorrow sunk! How harsh The stranger voice; and loud the hopeless wail! Then silence came to dwell; the tide fell low; The embers died. On the deserted marsh, Where grain and grass stirred only to the gale, The moose unchased dare cross the Gaspereau." J. F. Herbin. An extraordinary change came over the aged woman at Agapit's words. Some color crept to her withered cheeks. She straightened herself, and, no longer leaning on her cane, said, in a loud, firm voice, to Vesper, "The Acadiens were not all stolen from Annapolis at the derangement. Did you think they were?" "I don't know that I ever thought about it, madame," he said, courteously; "but I should like to know." "About fifty families ran to the wood," she said, with mournful vivacity; "they spent the winter there; I have heard the old people talk of it when I was young. They would sit by the fire and cry. I would try not to cry, but the tears would come. They said their good homes were burnt. Only at night could they revisit them, lest soldiers would catch them. They dug their vegetables from the ground. They also got one cow and carried her back. Ah, she was a treasure! There was one man among them who was only half French, and they feared him, so they watched. One day he went out of the woods,—the men took their guns and followed. Soon he returned, fifty soldiers marching behind him. 'Halt!' cried the Acadiens. They fired, they killed, and the rest of the soldiers ran. 'Discharge me! discharge me!' cried the man, whom they had
  • 35.
    caught. 'Yes, wewill discharge you,' they said, and they put his back against a tree, and once more they fired, but very sadly. At the end of the winter some families went away in ships, but the Comeaus, Thibaudeaus, and Melançons said, 'We cannot leave Acadie; we will find a quiet place.' So they began a march, and one could trace them by the graves they dug. I will not tell you all, for why should you be sad? I will say that the Indians were good, but sometimes the food went, and they had to boil their moccasins. One woman, who had a young baby, got very weak. They lifted her up, they shook the pea-straw stuffing from the sack she lay on, and found her a handful of peas, which they boiled, and she got better. "They went on and on, they crossed streams, and carried the little ones, until they came here to the Bay,—to Grosses Coques,—where they found big clams, and the tired women said, 'Here is food; let us stay.' "The men cut a big pine and hollowed a boat, in which they went to the head of the Bay for the cow they had left there. They threw her down, tied her legs, and brought her to Grosses Coques. Little by little they carried also other things to the Bay, and made themselves homes. "Then the families grew, and now they cover all the Bay. Do you understand now about the march from Annapolis?" "Thank you, yes," said Vesper, much moved by the sight of tears trickling down her faded face. "What reason did the old people give for this expulsion from their homes?" "Always the same, always, always," said Madame Kessy, with energy. "They would not take the oath, because the English would not put in it that they need not fight against the French." "But now you are happy under English rule?"
  • 36.
    "Yes, now,—but thepast? What can make up for the weeping of the old people?" Nothing could, and Vesper hastened to introduce a new subject of conversation. "I have heard much about the good Abbé that you speak of. Did you ever see him?" "See him,—ah, sir, he was an angel of God, on this Bay, and he a gentleman out of France. We were all his children, even the poor Indians, whom he gathered around him and taught our holy religion, till their fine voices would ring over the Bay, in hymns to the ever blessed Virgin. He denied himself, he paid our doctors' bills, even to twenty pounds at a time,—ah, there was mourning when he died. When my bans were published in church the good Abbé rode no more on horseback along the Bay. He lay a corpse, and I could scarcely hold up my head to be married." "In speaking of those old days," said Vesper, "can you call to mind ever hearing of a LeNoir of Grand Pré called the Fiery Frenchman?" "Of Etex LeNoir," cried the old woman, in trumpet tones, "of the martyr who shamed an Englishman, and was murdered by him?" "Yes, that is the man." "I have heard of him often, often. The old ones spoke of it to me. His heart was broken,—the captain, who was more cruel than Winslow, called him a papist dog, and struck him down, and the sailors threw him into the sea. He laid a curse on the wicked captain, but I cannot remember his name." "Did you ever hear anything of the wife and child of Etex LeNoir?" "No," she said, absently, "there was only the husband Etex that I had heard of. Would not his wife come back to the Bay? I do not know," and she relapsed into the dullness from which her temporary excitement had roused her.
  • 37.
    "He was calledthe Fiery Frenchman," she muttered, presently, but so low that Vesper had to lean forward to hear her. "The old ones said that there was a mark like flame on his forehead, and he was like fire himself." "Agapit, is it not time that we embark?" said Rose, gliding from an inner room. "It will soon be dark." Agapit sprang up. Vesper shook hands with Madame Kessy and her daughter, and politely assured them, in answer to their urgent request, that he would be sure to call again, then took his seat in the dog-cart, where in company with his new friends he was soon bowling quickly over a bit of smooth and newly repaired road. Away ahead, under the trees, they soon heard snatches of a lively song, and presently two young men staggered into view supporting each other, and having much difficulty in keeping to their side of the road. Agapit, with angry mutterings, drove furiously by the young men, with his head well in the air, although they saluted him as their dear cousin from the Bay. Rose did not speak, but she hung her head, and Vesper knew that she was blushing to the tips of the white ears inside her black handkerchief. No one ventured a remark until they reached a place where four roads met, when Agapit ejaculated, desperately, "The devil is also here!" Vesper turned around. The sun had gone down, the twilight was nearly over, but he possessed keen sight and could plainly discover against the dull blue evening sky the figures of a number of men and boys, some of whom were balancing themselves on the top of a zigzag fence, while others stood with hands in their pockets,—all vociferously laughing and jeering at a man who staggered to and fro
  • 38.
    in their midstwith clenched fists, and light shirt-sleeves spotted with red. "This is abominable," said Agapit, in a rage, and he was about to lay his whip on Toochune's back when Vesper suggested mildly that he was in danger of running down some of his countrymen. Agapit pulled up the horse with a jerk, and Rose immediately sprang to the road and ran up to the young man, who had plainly been fighting and was about to fight again. Vesper slipped from his seat and stood by the wheel. "Do not follow her," exclaimed Agapit; "they will not hurt her. They would beat you." "I know it." "She is my cousin, thou impatient one," pursued Agapit, irritably. "I would not allow her to be insulted." "I know that, too," said Vesper, calmly, and he watched the young men springing off the fences and hurrying up to Rose, who had taken the pugilist by the hand. "Isidore," she said, sorrowfully, and as unaffectedly as if they had been alone, "hast thou been fighting again?" "It is her second cousin," growled Agapit; "that is why she interferes." "Écoute-moi, écoute-moi, Rose" (listen to me), stammered the young man in the blood-stained shirt. "They all set upon me. I was about to be massacred. I struck out but a little, and I got some taps here and there. I was drunk at first, but I am not very drunk now." "Poor Isidore, I will take thee home; come with me." The crowd of men and boys set up a roar. They were quarrelsome and mischievous, and had not yet got their fill of rowdyism.
  • 39.
    "Va-t'ang, va-t'ang" (goaway), "Rose à Charlitte. We want no women here. Go home about thy business. If Big Fists wishes to fight, we will fight." Among all the noisy, discordant voices this was the only insulting one, and Rose turned and fixed her mild gaze on the offender, who was one of the oldest men present, and the chief mischief-maker of the neighborhood. "But it is not well for all to fight one man," she said, gently. "We fight one by one. Isidore is big,—he has never enough. Go away, or there will yet be a bigger row," and he added a sentence of gross abuse. Vesper made a step forward, but Isidore, the young bully, who was of immense height and breadth, and a son of the old Acadienne that they had just quitted, was before him. "You wish to fight, my friends," he said, jocularly; "here, take this," and, lifting his big foot, he quickly upset the offender, and kicked him towards some men in the crowd who were also relatives of Rose. One of them sprang forward, and, with his dark face alight with glee at the chance to avenge the affront offered to his kinswoman, at once proceeded to beat the offender calmly and systematically, and to roll him under the fence. Rose, in great distress, attempted to go to his rescue, but the young giant threw his arm around her. "This is only fun, my cousin. Thou must not spoil everything. Come, I will return with thee." "Nâni" (no), cried Agapit, furiously, "thou wilt not. Fit company art thou for strangers!" Isidore stared confusedly at him, while Vesper settled the question by inviting him in the back seat and installing Rose beside him. Then he held out his arms to Narcisse, who had been watching the
  • 40.
    disturbance with drowsyinterest, fearful only that the Englishman from Boston might leave him to take a hand in it. As soon as Vesper mounted the seat beside him, Agapit jerked the reins, and set off at a rapid pace; so rapid that Vesper at first caught only snatches of the dialogue carried on behind him, that was tearful on the part of Rose, and meek on that of Isidore. Soon Agapit sobered down, and Rose's words could be distinguished. "My cousin, how canst thou? Think only of thy mother and thy wife; and the good priest,—suppose he had come!" "Then thou wouldst have seen running like that of foxes," replied Isidore, in good-natured, semi-interested tones. "Thou wast not born a drunkard. When sober thou art good, but there could not be a worse man when drunk. Such a pile of cursing words to go up to the sky,—and such a volley of fisting. Ah, how thou wast wounding Christ!" Isidore held on tightly, for Agapit was still driving fast, and uttered an inaudible reply. "Tell me where thou didst get that liquor," said Rose. "It was a stolen cask, my cousin." "Isidore!" "But I did not steal it. It came from thy charming Bay. Thou didst not know that, shortly ago, a captain sailed to Sleeping Water with five casks of rum. He hired a man from the Concession to help him hide them, but the man stole one cask. Imagine the rage of the captain, but he could not prosecute, for it was smuggled. Since then we have fun occasionally." "Who is that bad man? If I knew where was his cask, I would take a little nail and make a hole in it." "Rose, couldst thou expect me to tell thee?"
  • 41.
    "Yes," she said,warmly. Then, remembering that she had been talking English to his French, she suddenly relapsed into low, swift sentences in her own tongue, which Vesper could not understand. He caught their import, however. She was still inveighing against the sin of drunkenness and was begging him to reform, and her voice did not flag until they reached his home, where his wife—a young woman with magnificent eyes and a straight, queenly figure—stood by the gate. "Bon soir (good evening), Claudine," called out Agapit. "We have brought home Isidore, who, hearing that a distinguished stranger was about to pass through the Concession, thoughtfully put himself on exhibition at the four roads. You had better keep him at home until La Guerrière goes back to Saint Pierre." "It was La Guerrière that brought the liquor," said Rose, suddenly, to Isidore. He did not contradict her, and she said, firmly, "Never shall that captain darken my doors again." The young Acadien beauty gave Vesper a fleeting glance, then she said, bitterly, "It should rather be Saint Judas, for from there the evil one sends stuff to torture us women—Here enter," and half scornfully, half affectionately, she extended a hand to her huge husband, who was making a wavering effort to reach the gateway. He clung to her as if she had been an anchor, and when she asked him what had happened to his shirt he stuttered, regretfully, "Torn, Claudine,—torn again." "How many times should one mend a shirt?" she asked, turning her big blazing eyes on Rose. "Charlitte never became drunk," said Rose, in a plaintive voice, "but I have mended the shirts of my brothers at least a hundred times." "Then I have but one more time," said the youthful Madame Kessy. "After that I shall throw it in the fire. Go into the house, my
  • 42.
    husband. I wasa fool to have married thee," she added, under her breath. Isidore stood tottering on his feet, and regarded her with tipsy gravity. "And thou shalt come with me, my pretty one, and make me a hot supper and sing me a song." "I will not do that. Thou canst eat cold bread, and I will sing thee a song with my tongue that will not please thee." "The priest married us," said Isidore, doggedly, and in momentary sobriety he stalked to the place where she stood, picked her up, and, putting her under his arm, carried her into the house, she meanwhile protesting and laughing hysterically while she shrieked out something to Rose about the loan of a sleeve pattern. "Yes, yes, I understand," called Rose, "the big sleeve, with many folds; I will send it. Make thy husband his supper and come soon to see me." "Rose," said Agapit, severely, as they drove away, "is it a good thing to make light of that curse of curses?" "To make light of it! Mon Dieu, you do not understand. It is men who make women laugh even when their hearts are breaking." Agapit did not reply, and, as they were about to enter a thick wood, he passed the reins to Vesper and got out to light the lamps. While he was fidgeting with them, Rose moved around so that she could look into the front seat. "Your child is all right," said Vesper, gazing down at the head laid confidingly against his arm. "He is sound asleep,—not a bit alarmed by that fuss." "It does not frighten him when human beings cry out. He only sorrows for things that have no voices, and he is always right when with you. It is not that; I wish to ask you—to ask you to forgive me."
  • 43.
    "For what?" "But youknow—I told you what was not true." "Do not speak of it. It was a mere bagatelle." "It is not a bagatelle to make untruths," she said, wearily, "but I often do it,—most readily when I am frightened. But you did not frighten me." Vesper did not reply except by a reassuring glance, which in her preoccupation she lost, and, catching her breath, she went on, "I think so often of a sentence from an Englishman that the sisters of a convent used to say to us,—it is about the little lies as well as the big ones that come from the pit." "Do you mean Ruskin?" said Vesper, curiously, "when he speaks of 'one falsity as harmless, and another as slight, and another as unintended,—cast them all aside; they may be light and accidental, but they are ugly soot from the smoke of the pit for all that?'" "Yes, yes, it is that,—will you write it for me?—and remember," she continued, hurriedly, as she saw Agapit preparing to reënter the cart, "that I did not say what I did to make a fine tale, but for my people whom I love. You were a stranger, and I supposed you would linger but a day and then proceed, and it is hard for me to say that the Acadiens are no better than the English,—that they will get drunk and fight. I did not imagine that you would see them, yet I should not have told the story," and with her flaxen head drooping on her breast she turned away from him. "When is lying justifiable?" asked Vesper of Agapit. The young Acadien plunged into a long argument that lasted until they reached the top of the hill overlooking Sleeping Water. Then he paused, and as he once more saw above him the wide expanse of sky to which he was accustomed, and knew that before him lay the Bay, wide, open, and free, he drew a long breath.
  • 44.
    "Ah, but Iam glad to arrive home. When I go to the woods it is as if a large window through which I had been taking in the whole world had been closed." No one replied to him, and he soon swung them around the corner and up to the inn door. Rose led her sleepy boy into the kitchen, where bright lights were burning, and where the maid Célina seemed to be entertaining callers. Vesper took the lantern and followed Agapit to the stable. "Is it a habit of yours to give your hotel guests drives?" he asked, hanging the lantern on a hook and assisting Agapit in unbuckling straps. "Yes, whenever it pleases us. Many, also, hire our horse and pony. You see that we have no common horse in Toochune." "Yes, I know he is a thoroughbred." "Rose, of course, could not buy such an animal. He was a gift from her uncle in Louisiana. He also sent her this dog-cart and her organ. He is rich, very rich. He went South as a boy, and was adopted by an old farmer; Rose is the daughter of his favorite sister, and I tell her that she will inherit from him, for his wife is dead and he is alone, but she says not to count on what one does not know." Vesper had already been favored with these items of information by his mother, so he said nothing, and assisted Agapit in his task of making long-legged Toochune comfortable for the night. Having finished, and being rewarded by a grateful glance from the animal's lustrous eyes, they both went to the pump outside and washed their hands. "It is too fine for the house," said Agapit. "Are you too fatigued to walk? If agreeable I will take you to Sleeping Water River, where you have not yet been, and tell you how it accumulated its name. There is no one inside," he continued, as Vesper cast a glance at the
  • 45.
    kitchen windows, "butthe miller and his wife, in whom I no longer take pleasure, and the mail-driver who tells so long stories." "So long that you have no chance." "Exactly," said Agapit, fumbling in his pocket. "See what I bought to- day of a travelling merchant. Four cigars for ten cents. Two for you, and two for me. Shall we smoke them?" Vesper took the cigars, slipped them in his pocket, and brought out one of his own, then with Agapit took the road leading back from the village to the river. CHAPTER XII. AN UNHAPPY RIVER. "Pools and shadows merge Beneath the branches, where the rushes lean And stumble prone; and sad along the verge The marsh-hen totters. Strange the branches play Above the snake-roots in the dark and wet, Adown the hueless trunks, this summer day. Strange things the willows whisper." J. F. H. "There is a story among the old people," said Agapit, "that a band of Acadiens, who evaded the English at the time of the expulsion, sailed into this Bay in a schooner. They anchored opposite Sleeping Water, and some of the men came ashore in a boat. Not knowing that an English ship lay up yonder, hidden by a point of land, they pressed back into the woods towards Sleeping Water Lake. Some of the English, also, were on their way to this lake, for it is historic. The
  • 46.
    Acadiens found tracesof them and turned towards the shore, but the English pursued over the marshes by the river, which at last the Acadiens must cross. They threw aside their guns and jumped in, and, as one head rose after another, the English, standing on the bank, shot until all but one were killed. This one was a Le Blanc, a descendant of René Le Blanc, that one reads of in 'Evangeline.' Rising up on the bank, he found himself alone. Figure the anguish of his heart,—his brothers and friends were dead. He would never see them again, and he turned and stretched out a hand in a supreme adieu. The English, who would not trouble to swim, fired at him, and called, 'Go to sleep with your comrades in the river.' "'They sleep,' he cried, 'but they will rise again in their children,' and, quite untouched by their fire, he ran to his boat, and, reaching the ship, set sail to New Brunswick; and in later years his children and the children of the murdered ones came back to the Bay, and began to call the river Sleeping Water, and, in time, the lake, which was Queen Anne's Lake, was also changed to Sleeping Water Lake." "And the soldiers?" "Ah! you look for vengeance, but does vengeance always come? Remember the Persian distich: "'They came, conquered, and burned, Pillaged, murdered, and went.'" "I do not understand this question thoroughly," said Vesper, with irritation, "yet from your conversation it seems not so barbarous a thing that the Acadiens should have been transported as that those who remained should have been so persecuted." "Now is your time to read 'Richard.' I have long been waiting for your health to be restored, for it is exciting." "That is the Acadien historian you have spoken of?" "Yes; and when you read him you will understand my joy at the venerable letter you showed me. You will see why we blame the
  • 47.
    Welcome to ourwebsite – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! testbankdeal.com