You are on page 1of 41

(Original PDF) Technology In Action

Complete (15th Edition)


Visit to download the full and correct content document:
https://ebooksecure.com/download/original-pdf-technology-in-action-complete-15th-e
dition/
TECHNOLOGY 15E
EVANS
MARTIN
POATSY

MyLab ™
IN ACTION COMPLETE

TECHNOLOGY IN ACTION
Improving Results
ALAN EVANS
A proven way to help individual students achieve
the goals that educators set for their course. KENDALL MARTIN
MARY ANNE POATSY
Engaging Experiences
Dynamic, engaging experiences that personalize
and activate learning for each student.

An Experienced Partner
From Pearson, a long-term partner
with a true grasp of the subject,
excellent content, and an eye on the
future of education.

COMPLETE
www.pearson.com
15E
Power Management and Ergonomics................................................................................................................. 70
Power Controls and Power Management.............................................................................................................. 70
Objective 2.13 Describe how to manage power consumption on computing devices.
BITS&BYTES: Sleep Better and Avoid Eyestrain: Use Less Blue LIght................................................................. 72
Setting It All Up: Ergonomics................................................................................................................................ 73
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
SOLVE THIS: Technology Wish List..................................................................................................................... 83

Chapter 3
Using the Internet: Making the Most of the Web’s Resources..................................... 84
Part 1: Collaborating and Working on the Web.................................................................................................................. 86
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works............................................................................................................................ 86
The Origin of the Internet...................................................................................................................................... 86
Objective 3.1 Describe how the Internet got its start.
How the Internet Works........................................................................................................................................ 88
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web.................................................................................................. 89
Collaborating with Web Technologies................................................................................................................... 89
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps............................................................................................................... 91
SOUND BYTE: Blogging......................................................................................................................................................... 91
Communicating over the Web.............................................................................................................................. 94
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web........................................................................................................................ 97
Conducting Business Online................................................................................................................................. 97
Objective 3.5 Describe how business is conducted using the Internet.
DIG DEEPER: How Cloud Computing Works...................................................................................................... 98
BITS&BYTES: Looking for Extra Money? Try a Side Hustle.................................................................................. 99
E-Commerce Safeguards..................................................................................................................................... 99
Objective 3.6 Summarize precautions you should take when doing business online.
HELPDESK: Doing Business Online...................................................................................................................................... 100
BITS&BYTES: Bitcoin: A Form of Virtual Currency............................................................................................. 101
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud................................................................. 103
MAKE THIS: MAKE: A Web-Capable App......................................................................................................... 104
Part 2: Using the Web Effectively....................................................................................................................................... 105
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web........................................................................................................... 105
Web Browsers.................................................................................................................................................... 105
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names................................................................................................................ 107
Objective 3.8 Explain what a URL is, and discuss its main parts.
Navigating the Web............................................................................................................................................ 108
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web.......................................................................... 109
Searching the Web Effectively............................................................................................................................ 110
Using Search Engines........................................................................................................................................ 110
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.

vi Contents

A01_EVAN7871_15_SE_FM.indd 6 17/01/18 3:17 PM


BITS&BYTES: Digital Assistants and Predictive Search...................................................................................... 111
Evaluating Websites........................................................................................................................................... 113
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
SOUND BYTE: Finding Information on the Web..................................................................................................................... 113
HELPDESK: Evaluating Websites.......................................................................................................................................... 113
TRENDS IN IT: Linked Data and the Semantic Web.......................................................................................... 114
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?........................................ 115
Using the Web Ethically...................................................................................................................................... 115
Digital Activism................................................................................................................................................... 115
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation........................................................................................................................................................ 116
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare?.................................................117
ETHICS IN IT: Cyber Harassment...................................................................................................................... 118
SOLVE THIS: Create a Report: Conducting Research on the Web..................................................................... 125

Chapter 4
Application Software: Programs That Let You Work and Play.............................. 126
Part 1: Accessing, Using, and Managing Software........................................................................................................... 128
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage
your software.
Software Basics................................................................................................................................................... 128
Application vs. System Software......................................................................................................................... 128
Objective 4.1 Compare application software and system software.
Distributing Software.......................................................................................................................................... 128
Objective 4.2 Explain the differences between commercial software and open source software, and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software........................................................................................................ 129
Managing Your Software.................................................................................................................................... 129
Purchasing Software.......................................................................................................................................... 129
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce.................................................................. 130
HELPDESK: Buying and Installing Software........................................................................................................................... 131
Installing and Uninstalling Software..................................................................................................................... 131
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of “Bloat”............................................................................................... 131
Upgrading Software........................................................................................................................................... 132
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work....................................................................................................... 132
SOUND BYTE: Where Does Binary Show Up?...................................................................................................................... 133
Software Licenses.............................................................................................................................................. 134
Objective 4.6 Explain how software licenses function.
ETHICS IN IT: Can I Borrow Software That I Don’t Own?.................................................................................. 135
TRY THIS: Citing Website Sources.................................................................................................................... 137
MAKE THIS: MAKE: A More Powerful App........................................................................................................ 138
Part 2: Application Software.............................................................................................................................................. 139
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software.................................................................................................................. 139
Productivity Software.......................................................................................................................................... 139
Objective 4.7 Categorize the types of application software used to enhance productivity, and describe their uses and features.

Contents vii

A01_EVAN7871_15_SE_FM.indd 7 17/01/18 3:17 PM


BITS&BYTES: Productivity Software Tips and Tricks.......................................................................................... 139
BITS&BYTES: How to Open Unknown File Types.............................................................................................. 140
BITS&BYTES: Going Beyond PowerPoint.......................................................................................................... 144
SOUND BYTE: Programming for End Users.......................................................................................................................... 146
Business Software.............................................................................................................................................. 148
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools............................................................ 150
Multimedia and Educational Software............................................................................................................... 150
Digital Multimedia Software................................................................................................................................ 150
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software........................................................................................................................................ 152
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software............................................................................................................................................ 153
App Creation Software....................................................................................................................................... 154
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror…........................................................................................................................... 155
Educational and Reference Software.................................................................................................................. 155
Objective 4.12 Categorize educational and reference software, and explain their features.
SOLVE THIS: Analyzing Benchmark Data.......................................................................................................... 163

Chapter 5
System Software: The Operating System, Utility Programs, and
File Management..................................................................................................... 164
Part 1: Understanding System Software........................................................................................................................... 166
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals....................................................................................................................... 166
Operating System Basics................................................................................................................................... 166
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use.................................................................................................................. 167
Objective 5.2 Explain the most common operating systems for personal use.
BITS&BYTES: Why Isn’t Everyone Using Linux?................................................................................................ 168
BITS&BYTES: Operating Systems for the Home................................................................................................ 169
Operating Systems for Machinery, Networks, and Business............................................................................... 169
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows?................................................................... 171
What the Operating System Does...................................................................................................................... 172
The User Interface.............................................................................................................................................. 172
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination...................................................................................................................................... 173
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage,
and peripheral devices.
SOUND BYTE: Using Windows Task Manager to Evaluate System Performance................................................................... 173
Software Application Coordination...................................................................................................................... 175
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human?................................................................... 176
Starting Your Computer...................................................................................................................................... 177
The Boot Process............................................................................................................................................... 177
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.

viii Contents

A01_EVAN7871_15_SE_FM.indd 8 17/01/18 3:17 PM


HELPDESK: Starting the Computer: The Boot Process......................................................................................................... 179
TRY THIS: Using Virtual Desktops in Windows 10............................................................................................. 182
MAKE THIS: MAKE: A Notification Alert............................................................................................................. 183
Part 2: Using System Software.......................................................................................................................................... 184
Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file
management capabilities, and utility programs.
The Windows Interface....................................................................................................................................... 184
Using Windows 10............................................................................................................................................. 184
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: The Snipping Tool....................................................................................................................... 185
File Management................................................................................................................................................. 187
Organizing Your Files.......................................................................................................................................... 187
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud............................................................................................................... 189
BITS&BYTES: Tips for Organizing Your Files...................................................................................................... 190
HELPDESK: Organizing Your Computer: File Management.................................................................................................... 191
Utility Programs................................................................................................................................................... 193
Windows Administrative Utilities.......................................................................................................................... 194
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work....................................................................................... 196
SOUND BYTE: Hard Disk Anatomy....................................................................................................................................... 196
SOLVE THIS: Mobile Operating Systems: Changing Market Share..................................................................... 205

Chapter 6
Understanding and Assessing Hardware: Evaluating Your System..................... 206
Part 1: Evaluating Key Subsystems................................................................................................................................... 208
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the
CPU and memory subsystems.
Your Ideal Computing Device............................................................................................................................. 208
Moore’s Law...................................................................................................................................................... 208
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device............................................................................................................................ 209
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem.......................................................................................................................... 211
How the CPU Works.......................................................................................................................................... 211
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling............................................................................................................................ 215
Measuring CPU Performance............................................................................................................................. 215
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle..................................................................................................................... 217
Evaluating the Memory Subsystem................................................................................................................... 218
Random Access Memory................................................................................................................................... 218
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM....................................................................................................................................................... 220
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM.......................................................................................................................... 220
SOUND BYTE: Installing RAM............................................................................................................................................... 221

Contents ix

A01_EVAN7871_15_SE_FM.indd 9 17/01/18 3:17 PM


TRY THIS: Measure Your System Performance.................................................................................................. 223
MAKE THIS: MAKE: A Location-Aware App...................................................................................................... 224
Part 2: Evaluating Other Subsystems and Making a Decision........................................................................................ 225
Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem.................................................................................................................... 225
Types of Storage Drives...................................................................................................................................... 225
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 226
DIG DEEPER: How Storage Devices Work........................................................................................................ 227
Storage Needs................................................................................................................................................... 228
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Much Storage to Buy?........................................................................................................ 230
Evaluating the Media Subsystems..................................................................................................................... 231
Video Cards....................................................................................................................................................... 231
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Graphics Cards with SSD on Board............................................................................................ 233
TRENDS IN IT: USB 3.1 and USB-C................................................................................................................. 234
Sound Cards...................................................................................................................................................... 235
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components....................................................................................................... 235
Evaluating System Reliability and Moving On.................................................................................................. 237
Maintaining System Reliability............................................................................................................................. 237
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer...................................................................................................................... 239
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All.................................................................................................................. 240
SOLVE THIS: Laptop Alternatives...................................................................................................................... 247

Chapter 7
Networking: Connecting Computing Devices........................................................ 248
Part 1: How Networks Function......................................................................................................................................... 250
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals.................................................................................................................................. 250
Understanding Networks.................................................................................................................................... 250
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking................................................................................................................................ 251
Network Architectures........................................................................................................................................ 252
Network Designs................................................................................................................................................ 252
Objective 7.2 Explain the different ways networks are defined.
BITS&BYTES: The Rise of Wearable Technology............................................................................................... 254
Network Components......................................................................................................................................... 255
Transmission Media............................................................................................................................................ 255
Objective 7.3 Describe the types of transmission media used in networks.
SOUND BYTE: Installing a Home Computer Network............................................................................................................ 255
Basic Network Hardware.................................................................................................................................... 258
Objective 7.4 Describe the basic hardware devices necessary for networks.
Network Software............................................................................................................................................... 259
Objective 7.5 Describe the type of software necessary for networks.

x Contents

A01_EVAN7871_15_SE_FM.indd 10 17/01/18 3:17 PM


TRENDS IN IT: How Smart Is Your Home?........................................................................................................ 260
Connecting to the Internet.................................................................................................................................. 260
Broadband Internet Connections........................................................................................................................ 260
Objective 7.6 Summarize the broadband options available to access the Internet.
Wireless Internet Access.................................................................................................................................... 262
Objective 7.7 Summarize how to access the Internet wirelessly.
BITS&BYTES: Net Neutrality.............................................................................................................................. 262
BITS&BYTES: 5G Is Coming—Is It Worth the Wait?.......................................................................................... 263
BITS&BYTES: Is Dial-Up Still an Option?........................................................................................................... 264
ETHICS IN IT: Ethical Challenges of the Internet of Things................................................................................. 264
TRY THIS: Testing Your Internet Connection Speed........................................................................................... 266
MAKE THIS: MAKE: Networked Devices........................................................................................................... 267
Part 2: Your Home Network................................................................................................................................................ 268
Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home network and
how to manage and secure a wireless network.
Installing and Configuring Home Networks...................................................................................................... 268
Planning Your Home Network............................................................................................................................. 268
Objective 7.8 Explain what should be considered before creating a home network.
Connecting Devices to a Network...................................................................................................................... 269
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative................................................................................... 270
BITS&BYTES: Analyzing Network Problems...................................................................................................... 273
Configuring Software for Your Home Network.................................................................................................... 273
Objective 7.10 Summarize how to configure home network software.
DIG DEEPER: P2P File Sharing......................................................................................................................... 275
Managing and Securing Wireless Networks..................................................................................................... 275
Troubleshooting Wireless Network Problems...................................................................................................... 275
Objective 7.11 Describe the potential problems with wireless networks and means to avoid them.
Securing Wireless Networks............................................................................................................................... 276
Objective 7.12 Describe how to secure wireless home networks.
SOUND BYTE: Securing Wireless Networks.......................................................................................................................... 278
HELPDESK: Managing and Securing Your Wireless Network...................................................................................... 278
SOLVE THIS: Home Networking Guide.............................................................................................................. 285

Chapter 8
Managing a Digital Lifestyle: Media and Ethics.................................................... 286
Part 1: The Impact of Digital Information......................................................................................................................... 288
Learning Outcome 8.1 You will be able to describe the nature of digital signals and how digital technology is used to
produce and distribute digital texts, music, and video.
Digital Basics....................................................................................................................................................... 288
Digital Convergence........................................................................................................................................... 288
Objective 8.1 Describe how digital convergence has evolved.
Digital vs. Analog................................................................................................................................................ 289
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing................................................................................................................................................. 291
E-Readers.......................................................................................................................................................... 291
Objective 8.3 Describe the different types of e-readers.
Using e-Texts...................................................................................................................................................... 292
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media..................................................................................................................................... 292

Contents xi

A01_EVAN7871_15_SE_FM.indd 11 17/01/18 3:17 PM


Digital Music........................................................................................................................................................ 293
Creating and Storing Digital Music...................................................................................................................... 293
Objective 8.5 Describe how digital music is created and stored.
BITS&BYTES: Digital Music Creation................................................................................................................. 295
Distributing Digital Music.................................................................................................................................... 295
Objective 8.6 Summarize how to listen to and publish digital music.
BITS&BYTES: Need Money for Your Band? Try Crowdfunding.......................................................................... 296
Digital Media........................................................................................................................................................ 296
Digital Photography............................................................................................................................................ 296
Objective 8.7 Explain how best to create, print, and share digital photos.
BITS&BYTES: Photo Edit on Your Phone........................................................................................................... 298
SOUND BYTE: Enhancing Photos with Image-Editing Software............................................................................................ 298
Digital Video....................................................................................................................................................... 299
Objective 8.8 Describe how to create, edit, and distribute digital video.
BITS&BYTES: Fly-By Drone Video..................................................................................................................... 300
TRENDS IN IT: Digital Asset Managers Needed!............................................................................................... 302
TRY THIS: Creating and Publishing a Movie....................................................................................................... 304
MAKE THIS: MAKE: A Video-Playing App......................................................................................................... 305
Part 2: Ethical Issues of Living in the Digital Age............................................................................................................ 306
Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain your
digital reputation.
Protection of Digital Property............................................................................................................................. 306
Intellectual Property............................................................................................................................................ 306
Objective 8.9 Describe the various types of intellectual property.
Copyright Basics................................................................................................................................................ 307
Objective 8.10 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright............................................................................................ 309
Copyright Infringement....................................................................................................................................... 310
Objective 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you
can legally use copyrighted material.
BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying................................................. 312
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission!........................................................... 314
Living Ethically in the Digital Era........................................................................................................................ 315
Plagiarism.......................................................................................................................................................... 315
Objective 8.12 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation......................................................................................................................... 317
Objective 8.13 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property............................................................................................................... 317
Protecting Your Online Reputation...................................................................................................................... 320
Objective 8.14 Describe what comprises your online reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights..................................................................................................... 322
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do................................................................ 323
SOLVE THIS: Intellectual Property and Copyright Basics.................................................................................. 331

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices........................ 332
Part 1: Threats to Your Digital Assets................................................................................................................................ 334
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers................................................................................................................................. 334

xii Contents

A01_EVAN7871_15_SE_FM.indd 12 17/01/18 3:17 PM


Identity Theft...................................................................................................................................................... 335
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
Hacking.............................................................................................................................................................. 335
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Hacking for Security................................................................................................................... 336
Computer Viruses................................................................................................................................................ 339
Virus Basics........................................................................................................................................................ 339
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus,
and the symptoms it may display.
SOUND BYTE: Protecting Your Computer............................................................................................................................. 340
Types of Viruses................................................................................................................................................. 341
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering..................................................................................................... 343
Online Annoyances............................................................................................................................................. 343
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering.............................................................................................................................................. 346
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter . . . Now What?........................................................................ 346
Scareware.......................................................................................................................................................... 347
ETHICS IN IT: You’re Being Watched . . . But Are You Aware You’re Being Watched?..............................................348
HELPDESK: Threats to Your Digital Life................................................................................................................... 348
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches............................................................................. 349
TRY THIS: Testing Your Network Security.......................................................................................................... 351
MAKE THIS: MAKE: A Password Generator...................................................................................................... 352
Part 2: Protecting Your Digital Property............................................................................................................................. 353
Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Access to Your Digital Assets......................................................................................................... 353
Firewalls............................................................................................................................................................. 353
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
HELPDESK: Understanding Firewalls.................................................................................................................................... 355
Preventing Virus Infections.................................................................................................................................. 355
Objective 9.8 Explain how to protect your computer from virus infection.
Authentication: Passwords and Biometrics......................................................................................................... 358
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots............................................................................ 359
Anonymous Web Surfing: Hiding from Prying Eyes............................................................................................. 361
Objective 9.10 Describe ways to surf the web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords!..................................................... 363
Keeping Your Data Safe...................................................................................................................................... 363
Protecting Your Personal Information.................................................................................................................. 363
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools........................................................................................ 363
Backing Up Your Data........................................................................................................................................ 364
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places
you can store backup files.
Protecting Your Physical Computing Assets.................................................................................................... 368
Environmental Factors and Power Surges........................................................................................................... 368
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft............................................................................................................................ 368
Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems.
DIG DEEPER: Computer Forensics: How It Works............................................................................................ 370
SOLVE THIS: Computer Security....................................................................................................................... 379

Contents xiii

A01_EVAN7871_15_SE_FM.indd 13 17/01/18 3:17 PM


Chapter 10
Behind the Scenes: Software Programming.......................................................... 380
Part 1: Understanding Programming................................................................................................................................ 382
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System.................................................................................................................. 382
Importance of Programming............................................................................................................................... 382
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle......................................................................................................................... 382
Objective 10.2 Summarize the stages of the system development life cycle (SDLC).
BITS&BYTES: Let Them See Your Work............................................................................................................ 384
Life Cycle of a Program....................................................................................................................................... 384
The Program Development Life Cycle................................................................................................................. 384
Objective 10.3 Define programming and list the steps in the program development life cycle (PDLC).
The Problem Statement...................................................................................................................................... 385
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 385
HELPDESK: Understanding Software Programming.............................................................................................................. 386
Algorithm Development...................................................................................................................................... 387
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Hackathons................................................................................................................................ 390
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and
Operators...................................................................................................................................................... 392
Coding............................................................................................................................................................... 392
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment (IDE) in coding.
Debugging......................................................................................................................................................... 399
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display....................................................................................................... 400
Testing and Documentation................................................................................................................................ 400
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona................................................................................................................ 402
MAKE THIS: MAKE: A Notepad........................................................................................................................ 403
Part 2: Programming Languages....................................................................................................................................... 404
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages......................................................................................................................... 404
Need for Diverse Languages.............................................................................................................................. 404
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language................................................................................................. 404
Selecting the Right Language............................................................................................................................. 405
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Coding for Zombies.................................................................................................................... 405
ETHICS IN IT: When Software Runs Awry......................................................................................................... 406
Exploring Programming Languages.................................................................................................................. 407
Tour of Modern Languages................................................................................................................................. 407
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Your Software Portfolio............................................................................................................... 411
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools.............................................. 415
Future of Programming Languages..................................................................................................................... 415
Objective 10.12 State key principles in the development of future programming languages.

xiv Contents

A01_EVAN7871_15_SE_FM.indd 14 17/01/18 3:17 PM


HELPDESK: A Variety of Programming Languages................................................................................................................ 416
SOLVE THIS: Time Sheets................................................................................................................................. 423

Chapter 11
Behind the Scenes: Databases and Information Systems.................................... 424
Part 1: Database Fundamentals......................................................................................................................................... 426
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
Database Advantages......................................................................................................................................... 426
The Need for Databases..................................................................................................................................... 426
Objective 11.1 Explain what a database is and why databases are useful.
HELPDESK: Using Databases............................................................................................................................................... 428
Advantages of Using Databases......................................................................................................................... 429
Objective 11.2 Discuss the benefits of using a database.
Database Types................................................................................................................................................... 430
Relational Databases.......................................................................................................................................... 431
Objective 11.3 Describe features of relational databases.
Object-Oriented Databases................................................................................................................................ 432
Objective 11.4 Describe features of object-oriented databases.
Multidimensional Databases............................................................................................................................... 432
Objective 11.5 Describe features of multidimensional databases.
TRENDS IN IT: Emerging Technologies: Can Your Business Partner Deliver the Goods? Enhanced
Databases Can Help You Decide!.................................................................................................................. 433
Database Basics.................................................................................................................................................. 433
Database Components and Functions................................................................................................................ 433
Objective 11.6 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................ 437
BITS&BYTES: Music Streaming Services Use Databases.................................................................................. 437
Inputting and Managing Data.............................................................................................................................. 438
Objective 11.7 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL).............................................................................................. 443
BITS&BYTES: Data Dashboards: Useful Visualization Tools............................................................................... 445
TRY THIS: Using Excel’s Database Functions.................................................................................................... 447
MAKE THIS: MAKE: A Family Shopping List...................................................................................................... 448
Part 2: How Businesses Use Databases............................................................................................................................ 449
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data
mining to manage data and how business information systems and business intelligence are used to make business
decisions.
Data Warehousing and Storage......................................................................................................................... 449
Data Warehouses and Data Marts...................................................................................................................... 449
Objective 11.8 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases....................................................................................................................... 449
BITS&BYTES: Data Warehouses Are Going to the Cloud.................................................................................. 451
Data Mining........................................................................................................................................................ 451
Objective 11.9 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed................................................................................. 453
ETHICS IN IT: Data, Data Everywhere, but Is It Protected?................................................................................ 454
Using Databases to Make Business Decisions................................................................................................ 455
Business Information Systems............................................................................................................................ 455
Objective 11.10 Describe the main types of business information systems and how they are used by business managers.

Contents xv

A01_EVAN7871_15_SE_FM.indd 15 17/01/18 3:17 PM


BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web....................................................... 456
SOUND BYTE: Analyzing Data with Microsoft Power BI Suite................................................................................................ 460
TRENDS IN IT: Mobile Business Intelligence...................................................................................................... 461
SOLVE THIS: College Database......................................................................................................................... 469

Chapter 12
Behind the Scenes: Networking and Security in the Business World.........................470
Part 1: Client/Server Networks and Topologies................................................................................................................ 472
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on
them, and network topologies used to construct them.
Client/Server Network Basics............................................................................................................................ 472
Networking Advantages..................................................................................................................................... 472
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks......................................................................................... 473
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks......................................................................................................................... 474
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Your Car Network Can Be Hacked.............................................................................................. 477
Servers and Network Topologies....................................................................................................................... 478
Servers............................................................................................................................................................... 478
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers.................................................................................................................................................... 479
TRENDS IN IT: Virtualization: Making Servers Work Harder............................................................................... 480
Network Topologies............................................................................................................................................ 481
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
SOUND BYTE: Network Topology and Navigation Devices.................................................................................................... 483
TRY THIS: Sharing Folders on a Home Network Using Windows....................................................................... 488
MAKE THIS: MAKE: An App That Shares.......................................................................................................... 489
Part 2: Setting Up Business Networks.............................................................................................................................. 490
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and
network navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media............................................................................................................................................ 490
Wired and Wireless Transmission Media............................................................................................................. 490
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Go Green with Mobile Apps........................................................................................................ 492
Network Adapters and Navigation Devices...................................................................................................... 492
Network Adapters.............................................................................................................................................. 492
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses................................................................................................................................................. 494
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers......................................................................................................................... 495
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and Network Adapters....................................................................................................... 496
Network Operating Systems and Network Security........................................................................................ 496
Network Operating Systems............................................................................................................................... 497
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Smart Lighting for Smart Homes................................................................................................ 497
Client/Server Network Security........................................................................................................................... 498
Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards.............................................................................. 499
SOUND BYTE: A Day in the Life of a Network Technician...................................................................................................... 500
xvi Contents

A01_EVAN7871_15_SE_FM.indd 16 17/01/18 3:17 PM


ETHICS IN IT: How Should Companies Handle Data Breaches?....................................................................... 502
BITS&BYTES: Are Your Photos Helping Criminals Target You?.......................................................................... 503
SOLVE THIS: Cyber Security Flyer and Mail Merge............................................................................................ 511

Chapter 13
Behind the Scenes: How the Internet Works......................................................... 512
Part 1: Inner Workings of the Internet.............................................................................................................................. 514
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking.............................................................................................................. 514
Management...................................................................................................................................................... 514
Objective 13.1 Describe the management of the Internet.
Networking Components.................................................................................................................................... 515
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission.............................................................................................................................................. 516
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You............................................................................................ 516
Internet Identity.................................................................................................................................................... 519
IP Addresses...................................................................................................................................................... 519
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols............................................................................ 519
BITS&BYTES: What’s Your IP Address?............................................................................................................ 520
BITS&BYTES: Internet of Things Goes Shopping............................................................................................... 520
SOUND BYTE: Creating Web Pages with Squarespace........................................................................................................ 521
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols............................................................... 522
Domain Names.................................................................................................................................................. 523
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
BITS&BYTES: Server in the Cloud..................................................................................................................... 524
TRY THIS: Ping Me............................................................................................................................................ 527
MAKE THIS: Make: An Earthquake Detector..................................................................................................... 528
Part 2: Coding and Communicating on the Internet........................................................................................................ 529
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies............................................................................................................................................... 529
Web Development.............................................................................................................................................. 529
Objective 13.6 Compare and contrast a variety of web development languages.
BITS&BYTES: CodePen: An Editing Community for Web Designers.................................................................. 530
SOUND BYTE: Client-Side Web Page Development.............................................................................................................. 533
Application Architecture...................................................................................................................................... 533
Objective 13.7 Compare and contrast server-side and client-side application software.
BITS&BYTES: Free Code Camp........................................................................................................................ 535
Communications over the Internet.................................................................................................................... 535
Types of Internet Communication....................................................................................................................... 535
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
BITS&BYTES: Google Inbox.............................................................................................................................. 537
Encryption.......................................................................................................................................................... 538
Objective 13.9 Explain how data encryption improves security.
BITS&BYTES: Numbers: We Wouldn’t Have Encryption Without Them!............................................................ 539
ETHICS IN IT: Do We Really Want Strong Encryption?...................................................................................... 540
HELPDESK: Keeping E-Mail Secure...................................................................................................................................... 540

Contents xvii

A01_EVAN7871_15_SE_FM.indd 17 17/01/18 3:17 PM


TRENDS IN IT: Cognitive Computing................................................................................................................ 541
SOLVE THIS: Creating an HTML Document...................................................................................................... 549

Appendix A
The History of the Personal Computer................................................................... A-1

Appendix B
Careers in IT.............................................................................................................B-1
Glossary........................................................................................................................................................................ G-1
Index............................................................................................................................................................................... I-1

xviii Contents

A01_EVAN7871_15_SE_FM.indd 18 17/01/18 3:17 PM


About the Authors

Alan Evans, MS, CPA


aevans@mc3.edu
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer science
and business courses. He holds a BS in accounting from Rider University and
an MS in information systems from Drexel University, and he is a certified public
accountant. After a successful career in business, Alan finally realized that his
true calling is education. He has been teaching at the college level since 2000. Alan enjoys attending
technical conferences and exploring new methods of engaging students.

Kendall Martin, PhD


kmartin@mc3.edu
Kendall is a professor of Computer Science at Montgomery County Community
College with teaching experience at both the undergraduate and graduate levels at
a number of institutions, including Villanova University, DeSales University, Ursinus
College, and Arcadia University.
Kendall’s education includes a BS in electrical engineering from the University of
Rochester and an MS and a PhD in engineering from the University of Pennsylvania. She has industrial
experience in research and development environments (AT&T Bell Laboratories) as well as experience
with several start-up technology firms.

Mary Anne Poatsy, MBA


mpoatsy@mc3.edu
Mary Anne is a senior faculty member at Montgomery County Community
College, teaching various computer application and concepts courses
in face-to-face and online environments. She enjoys speaking at various
professional conferences about innovative classroom strategies. She holds a
BA in psychology and education from Mount Holyoke College and an MBA in
finance from Northwestern University’s Kellogg Graduate School of Management.
Mary Anne has been in teaching since 1997, ranging from elementary and secondary education to
Montgomery County Community College, Gwynedd-Mercy College, Muhlenberg College, and Bucks
County Community College, as well as training in the professional environment. Before teaching,
she was a vice president at Shearson Lehman Hutton in the Municipal Bond Investment Banking
Department.

About the Authors xix

A01_EVAN7871_15_SE_FM.indd 19 11/11/17 5:41 PM


Dedication

For my wife, Patricia, whose patience, understanding, and support continue to make this work possible …
especially when I stay up past midnight writing! And to my parents, Jackie and Dean, who taught me the
best way to achieve your goals is to constantly strive to improve yourself through education.
Alan Evans
For all the teachers, mentors, and gurus who have popped in and out of my life.
Kendall Martin
For my husband, Ted, who unselfishly continues to take on more than his fair share to support me
throughout this process, and for my children, Laura, Carolyn, and Teddy, whose encouragement and love
have been inspiring.
Mary Anne Poatsy

Acknowledgments

First, we would like to thank our students. We constantly learn from them while teaching, and they are a continu-
al source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and children made
sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience, a few individuals
deserve special mention. The constant support and encouragement we receive from Jenifer Niles, Executive
Portfolio Product Manager, and Andrew Gilfillan, VP, Editorial Director, continually make this book grow and
change. Our heartfelt thanks go to Shannon LeMay-Finn, our Developmental Editor. Her creativity, drive, and
management skills helped make this book a reality. We also would like to extend our appreciation to Pearson
Content Producers, particularly Laura Burgess, and the vendor teams, who work tirelessly to ensure that our
book is published on time and looks fabulous. The timelines are always short, the art is complex, and there are
many people with whom they have to coordinate tasks. But they make it look easy! We’d like to extend our
thanks to the media and MyLab IT team—Eric Hakanson, Becca Golden, Amanda Losonsky, and Heather
Darby for all of their hard work and dedication.
There are many people whom we do not meet at Pearson and elsewhere who make significant contributions
by designing the book, illustrating, composing the pages, producing the media, and securing permissions. We
thank them all.
And finally, we would like to thank the reviewers and the many others who contribute their time, ideas, and
talents to this project. We appreciate their time and energy, as their comments help us turn out a better product
each edition. A special thanks goes to Rick Wolff, a wonderfully talented infographic designer who helped by
creating the infographics for this text.

xx Acknowledgments

A01_EVAN7871_15_SE_FM.indd 20 11/11/17 5:41 PM


Letter from the Authors

Our 15th Edition—A Letter from the Authors


Why We Wrote This Book
The pace of technological change is ever increasing.
In education, we have seen this impact us more than
ever recently—the Maker movement, MOOCs, touch-
screen mobile delivery, and Hangouts are now fixed
parts of our environment.
Even the most agile of learners and educators need
support in keeping up with this pace of change. We have
responded by integrating material to help students develop
skills for web application and mobile programming. We
see the incredible value of these skills and their popularity
with students, and have included Make This exercises for each chapter. These exercises gently bring
the concepts behind mobile app development to life. In addition, there is a Solve This exercise in each
chapter that reinforces chapter content while also applying Microsoft Office skills. These projects help to
promote students’ critical thinking and problem-solving skills, which employers highly value.
We have introduced eight new Helpdesk training modules and two new IT Simulations to continue to
provide students with an active learning environment in which they can reinforce their learning of chapter
objectives. In addition, in this edition we have focused more on artificial intelligence and its impact on
how we will use technology ethically. We also continue to emphasize the many aspects of ethics in
technology debates. Some of the new Helpdesks and IT Simulations support instruction on how to
conduct thoughtful and respectful discussion on complex ethical issues.
Our combined 50 years of teaching computer concepts have coincided with sweeping innovations
in computing technology that have affected every facet of society. From iPads to Web 2.0, computers
are more than ever a fixture of our daily lives—and the lives of our students. But although today’s stu-
dents have a much greater comfort level with their digital environment than previous generations, their
knowledge of the machines they use every day is still limited.
Part of the student-centered focus of our book has to do with making the material truly engaging to
students. From the beginning, we have written Technology in Action to focus on what matters most to
today’s student. Instead of a history lesson on the microchip, we focus on tasks students can accom-
plish with their computing devices and skills they can apply immediately in the workplace, the class-
room, and at home.
We strive to keep the text as current as publishing timelines allow, and we are constantly looking for
the next technology trend or gadget. We have augmented the text with weekly technology updates to
help you keep on top of the latest breaking developments and continue to include a number of multi-
media components to enrich the classroom and student learning experience. The result is a learning
system that sparks student interest by focusing on the material they want to learn (such as how to
integrate computing devices into a home network) while teaching the material they need to learn (such
as how networks work). The sequence of topics is carefully set up to mirror the typical student learning
experience.
As they read through this text, your students will progress through stages and learning outcomes of
increasing difficulty:
1. Thinking about how technology offers them the power to change their society and their
world and examining why it’s important to be computer fluent
2. Understanding the basic components of computing devices
3. Connecting to and exploring the Internet
4. Exploring application software
5. Learning the operating system and personalizing their computer

Letter from the Authors xxi

A01_EVAN7871_15_SE_FM.indd 21 11/11/17 5:41 PM


6. Evaluating and upgrading computing devices
7. Understanding home networking options
8. Creating digital assets and understanding how to legally distribute them
9. Keeping computing devices safe from hackers
10. Going behind the scenes, looking at technology in greater detail
We strive to structure the book in a way that makes navigation easy and reinforces key concepts. We
continue to design the text around learning outcomes and objectives, making them a prominent part
of the chapter structure. Students will see the learning outcomes and objectives in the chapter opener,
throughout the text itself, as well as in the summary so they understand just what they are expected to
learn.
We continue to structure the book in a progressive manner, intentionally introducing on a basic level
in the earlier chapters concepts that students traditionally have trouble with and then later expanding
on those concepts in more detail when students have become more comfortable with them. Thus, the
focus of the early chapters is on practical uses for the computer, with real-world examples to help the
students place computing in a familiar context.
For example, we introduce basic hardware components in Chapter 2, and then we go into increas-
ingly greater detail on some hardware components in Chapter 6. The Behind the Scenes chapters ven-
ture deeper into the realm of computing through in-depth explanations of how programming, networks,
the Internet, and databases work. They are specifically designed to keep more experienced students
engaged and to challenge them with interesting research assignments.
In addition to extensive review, practice, and assessment content, each chapter contains several
problem-solving, hands-on activities that can be carried out in the classroom or as homework:
• The Try This exercises lead students to explore a particular computing feature related to
the chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to reinforce the
material taught in the text and to support both classroom lectures and distance learning:
• The Helpdesk training content, created specifically for Technology in Action, enables students
to take on the role of a helpdesk staffer fielding questions posed by computer users.
• Exciting Sound Byte multimedia—fully updated and integrated with the text—expand student
mastery of complex topics.
• IT Simulations are detailed, interactive scenarios covering the core chapter topic. As
students work through the simulation, they apply what they have learned and demonstrate
understanding in an active learning environment.
• The TechBytes Weekly blog delivers the latest technology news stories to you for use in your
classroom. Each is accompanied by specific discussion topics and activities to expand on what is
within the textbook materials.
This book is designed to reach the students of the twenty-first century and prepare them for the
role they can take in their own community and the world. It has been an honor to work with you over
the past 15 years to present and explain new technologies to students, and to show them the rapidly
growing importance of technology in our world.

xxii Letter from the Authors

A01_EVAN7871_15_SE_FM.indd 22 11/11/17 5:41 PM


What’s New

Technology in Action, 15th Edition


Welcome to the Fifteenth Edition of Technology in Action!
The best-selling Technology in Action continues to deliver an engaging approach to teaching the topics and skills students need
to be digitally literate. Using practical content, hands-on projects, and interactive simulation lessons, students are engaged in
learning.
For Technology in Action 15th edition, we have added innovative and important content updates, including new coverage of emerg-
ing technologies and artificial intelligence, especially in Chapter 1. The technology used throughout the text has been updated and
expanded, including 8 new Helpdesk training modules and 2 new IT Simulations. Each chapter now has two Helpdesk trainings, two
Sound Byte lessons, and one IT Sim to provide students with a consistent learning experience from chapter to chapter.
Using these resources and the practical content, students will be prepared for academic, professional, and personal success. And,
if they are using MyLab IT, they can earn the Digital Competency badge to easily demonstrate their skills to potential employers.

Highlights of What’s New


• New and updated content throughout
• New Helpdesk modules in Chapters 1, 7, 8, 9, 10, 11, and 12 ensure that each chapter offers two Helpdesks for a consistent
learning experience
• New IT Simulations for Chapter 1 and Chapter 12 to ensure all chapters have one
• Updated content with new artificial intelligence and emerging technologies coverage
• New images and updated quizzes throughout

Explore the Hallmarks and Features of Technology in Action, 15th Edition


INSTRUCTION: Engage all types of learners with a PRACTICE: Hands-on resources and simulations
variety of instructional resources allow students to demonstrate understanding
• Pearson Text 2.0 students interact with the learning • Try This Projects are hands-on projects students complete
resources directly and receive immediate feedback. to practice and demonstrate proficiency with important
• Chapter Overview Videos provide students with a quick topics. Each project is accompanied by a how-to video.
look at what they will learn in the chapter. • Solve This! Projects put the concepts students are
• PowerPoint and Audio Presentations can be used in learning into action through real-world problem solving
class for lecture or assigned to students, particularly online using Microsoft Word, Access, and Excel. Grader versions
students, for instruction and review. of some of these projects are in MyLab IT.

• TechBytes Weekly is a weekly blog that helps you keep • Helpdesks are interactive lessons based on chapter
your course current by providing interesting and relevant objectives. Students play the role of a helpdesk staffer
news items and ready-to-use discussion questions. assisting customers via a live chat, decision-based simulation.

• Make This! Projects provide activities where students build • Sound Bytes provide an audio/visual lesson on additional
programs that run on their mobile devices. Most of the topics related to the chapter, including a brief quiz at the end.
chapters use App Inventor to build Android apps that can • IT Simulations provide 13 individual scenarios that
be installed on any Android device or emulated for students students work through in an active learning environment.
using iOS devices. Each project includes instructions and a
REVIEW: Self-check resources keep learning
how-to video.
on track
  Annotated Instructor Chapter Tabs provide teaching tips,
• Chapter Overview Videos for Parts 1 and 2 of the chapter
homework and assessment suggestions, brief overviews of
provide an objective-based review of what students should
each chapter’s Try This, Make This, and Solve This
have learned. Videos have a short quiz and can be
exercises, as well as select Sound Byte talking points and
accessed from mobile devices for a quick review.
ethics debate starters.

What’s New xxiii

A01_EVAN7871_15_SE_FM.indd 23 11/11/17 5:41 PM


Another random document with
no related content on Scribd:
accusation by appeal to the emperor, after the example of the
blessed Paul the Apostle. But Paul, when accused by his own nation
before the princes of Judaea, but not as yet judged, appealed to
Caesar, and by the princes he was sent to Caesar to be judged. That
does not at all coincide with the present case. For this cleric of evil
repute was accused, and judged, and sent to prison, and thence
escaped, and contrary to law entered the basilica, which he ought
not to have entered till after he had done penance, and still—it is
said—ceases not to live perversely; this man you say has appealed
to Caesar in the same manner as Paul. But he certainly is not
coming to Caesar as Paul did.
“We have given orders to Bishop Theodulf, by whom he was
judged and sent to prison, and from whose custody he escaped, that
he be brought back; and the bishop must bring him to our audience,
whether he speaks truth or falsehood; for it consists not with our
dignity that for such a man as this there should be any change of our
original order.
“We greatly wonder that to you alone it should seem fit to go
against our authoritative sanction and decree, when it is quite clear,
both from ancient custom and from the constitution, that the decrees
of enactments ought to be unalterable, and that to no one is it
permitted to disregard their edicts and statutes. And herein we can
not sufficiently marvel that you have preferred to yield to the
entreaties of that wretch, rather than to our authoritative commands.
“Now you yourselves, who are called the congregation of this
monastery and the servants of God, yea the true God, know how
your life is now frequently evil spoken of by many, and not without
cause. You declare yourselves sometimes to be monks, sometimes
canons, sometimes neither. And we, acting for your good and to
remove your evil repute, looked out a suitable master and rector for
you and invited him to come from a distant province. He by his words
and admonitions, and—for that he is a religious man—by his
example of good conversation, could have amended the manner of
your life. But—ah, the grief of it—all has turned out the other way.
The devil has found you as his ministers for sowing discord exactly
in the wrong place, namely, between wise men and doctors of the
church. And those who ought to correct and chastise sinners you
drive into the sin of envy and wrath. But they, by God’s mercy, will
not lend an ear to your evil suggestions.
“And you, who stand out as contemners of our command, whether
you be called canons or monks,[218] know that at our pleasure, as
our present messenger will indicate to you, you must appear before
us; and although a letter sent to us here excuses you of actual
sedition, you must come and wipe out your unjust crime by condign
amends.”
Alcuin’s reply was more than twice as long.
“To the lord most excellent, and of all honour Ep. 184.
most worthy, Charles, king, emperor, and most
victorious most great most good and most serene Augustus, Albinus
his servitor wishes the welfare of present prosperity, and of future
beatitude, eternal in Christ the Lord God.
“On the first face of this letter I see that thanks from my whole
heart must be given by me to our Lord God for your safety and
welfare, not to me only but to all Christians most necessary. Next,
with prostrate body, contrite heart, tearful voice, mercy must be
begged of the piety of your goodness for the brethren of St. Martin,
to whose service your goodness delegated me however little worthy.
I call God as the witness of my conscience that never have I
understood the brethren to be such as I hear that they are called by
some who are more ready to accuse than to save. As far as can be
seen and known, they worthily perform the office in the churches of
Christ, and I most truly bear witness that never any where have I
seen other men celebrating more perfectly or more diligently, in daily
course interceding for your safety and the stability of the Christian
empire. Of their life and conversation you can learn from a perfect
man, an incorrupt judge, and a faithful messenger, Wido [Count of
the shore of Britany]. He has looked into all their affairs and knows
what they have done and how they have lived.
“I have not been slow to admonish them concerning the strictness
of the monastic life, as they themselves will testify, if any one will
accept their testimony. And I do not know what faults they have
committed against their accusers, that they should pursue them with
such hatred.
“It is a matter of wonder why they[219] wish to push themselves,
contrary to the edict of the law, into another’s harvest. The illustrious
doctor forbids this where he says[220] Who art thou that judgest
another man’s servant? To his own master he standeth or falleth.
Yea he shall stand, for God is able to make him stand. For the city of
Tours has a pastor [Joseph, the Archbishop], in his life elect, in
preaching devout, who knows how best to give to the family of Christ
their portion of meat. Let each shepherd watch over his own flock,
that no member of it lack the grace of God; that when the shepherd
of all shall come He may find them worthy of eternal reward.
“With regard to the concourse and tumult which arose in the
church of St. Martin, or without in the atrium, I testify in the sight of
Him that knows the heart of each that it took place without any
incitement or foreknowledge or even wish of mine. And I confess that
never was I in greater trouble for other men’s offences than then.
Nor, as far as I have been able to understand or to hear, was any
thing done by design of the brethren. I have not even been able to
learn that they wished it; and there can be no doubt that no one who
fears God and cares for his own salvation, should—I will not say do
such a thing but—even think of it.
“Did not the venerable man Teotbert, sent by your authority, spend
nineteen days among them for the purpose of this enquiry? Whom
he would, he flogged; whom he would, he put in chains; whom he
would, he put on oath; whom he pleased, he summoned to your
presence.
“In vain have I so long time served my Lord Jesus Christ if His
mercy and providence have so forsaken me that I should fall into this
impious wickedness in the days of my old age....
“The true cause of this tumult, as far as I have been able to
understand, I am not ashamed to lay before your excellency, sparing
no one, so that I may produce testimony to the truth.
“It appears to me that in the doing of this impious deed no one has
offended more gravely than the guard of this wretch, from whose
negligence so many evils came. If I may say so to those who hear
this letter read, I think it would be more just that he by whose
negligence the accused man escaped from his bonds should suffer
the same bonds, than that the fugitive to the protection of Christ our
God and of His saints, should be sent back from the church into the
same bonds. I will not put this on my own opinion, I am supported by
the word of God who bade[221] the prophet say to the king of Israel
who had let go out of his hand the king of Syria, Thus saith the Lord,
Because thou hast let go a man worthy of death, thy life shall be for
his life.
“In the second place, I take it that the men were the cause of the
tumult who came armed in larger number than was necessary from
Orleans to Tours; especially because the report ran through the
populace that they had come to carry off with violence a man who
had fled to the protection of the Church of Christ and St. Martin. For
all men everywhere take it ill that their holy ones are dishonoured.
Perhaps, too, the miserable man had called upon the rustics who
came to his dwelling in their cups to defend the church of St. Martin
and not allow him to be snatched from it.
“There was a third cause of the tumult. Our holy father and pontiff
[Archbishop Joseph] inopportunely, the people being present,
entered the church along with the men who were supposed to have
come to drag away the man. He may have done this in the simplicity
of his heart, not imagining that any harm could come.[222] When the
ignorant people, always doing thoughtlessly inconvenient things, saw
this, they cried out, they took to their clubs; some energetic men ran
out when they heard the bells sound. They were rung by unskilled
hands; your own judges ascertained that, and our accusers
themselves allowed that it was so, for in their presence the holy
Gospel was brought; there was laid upon it the wood of the holy
Cross; they made such of the brethren as they chose, swear by that.
When the brethren heard the bells, they rushed out of the refectory
to learn why they were being rung. As I am informed, they did what
they could to allay the tumult; only some youths, who were found
and sent to your presence, were the offenders in the concourse.
From them it can be learned what they did; they have sworn that
they acted on the prompting of no man, only on the impulse of their
own folly. Not one of the servants of St. Martin was there, except a
man called Amalgarius, who was with me at the moment. Him I sent
at once with the other brethren to appease the tumult, and to
extricate the men of the venerable bishop from the hands of the
people, so that no harm should be done them. As soon as the tumult
was appeased, they were brought into the monastery, where they
were safe. These men were so burning with wrath against me that
they turned a kindness I had ordered to be done to them into evil,
saying that it was in insult that I had sent them some food.[223] This
was absolutely false. They did not know that I was imbued with the
Lord’s command, Do good unto them that hate you.
“Let your holy piety, most pious lord, consider these facts and
recognize the truth. Be favourable to thy servants in the love of God
omnipotent and in the honour of the holy Martin your intercessor,
who always has been honoured in the kingdom and by the kings of
the Franks.
“We are wont to say in confessing our sins, If thou, Lord, wilt be
extreme to mark what is done amiss, O Lord, who may abide it? And
to thee we may say, forasmuch as we know thee to be a member of
that same Head, if thou wilt be extreme to mark what is done amiss,
who, lord, may abide it? Above all, because the special virtue,
goodness, and praise of emperors has always been their clemency
towards their subjects; in so much that the most noble emperor Titus
said that no one should leave the presence of the emperor sad.
Rejoice the minds of thy servants by the highest gift of thy mercy; let
mercy rejoice against judgement. Men who have been guilty of the
greatest crimes of perfidy against your authority you have been able
to pardon with laudable piety; overlook our infelicity, in accordance
with the most pious nobility of your most holy disposition, which I
have always known to abound in a marvellous degree in the mind of
your wisdom. We read how David, the ancestor of Christ, was
praised in the greatness of his mercy and the justness of his
judgements. In like manner we know that your blessedness is, by the
gift of Christ, always worthy of all laudation and praise for these two
great merits.
“May the omnipotent God the Father, by His only Son our Lord
Jesus Christ, illumine, fill, and rejoice the heart of your blessedness
with all blessing and wisdom in the Spirit the Comforter, and deign to
grant to your most noble offspring, for the welfare of a Christian
people, perpetual prosperity, most dearly loved lord, best and most
august father of the fatherland.”
We know no more than this. There appears to be no possibility of
carrying the investigation further. Reading between the lines we
seem to see signs of ecclesiastical tension between the archbishop,
seated at his cathedral church of St. Gatian, and Abbat Alcuin of St.
Martin’s. Until the time of Alcuin’s penultimate predecessor, the
abbat of St. Martin’s had been the archbishop of Tours, and, as we
have seen, there are curious references to a claim of St. Martin’s to
have bishops of its own. This may have caused tension, beyond that
which was not very improbable under the ordinary conditions.
Theodulf of Orleans was an old friend of Alcuin, and an admirer.
He gives to Alcuin a large place in his description of the court of
Charlemagne. Theodulf was a laudatory poet, and his poem was
very properly meant to please those whom he described. Of the king
himself he says—

O face, face more shining than gold thrice refined,


Happy he who always is with thee.
The head illustrious, the chin, the neck so beautiful,
The hands of gold, that banish poverty.
The breast, the legs, the feet, all laudable,[224]
All shining forth in beauty and in strength.

The latest wife of the king, Luitgard, has eight pretty lines devoted to
her, after an inauspicious opening address to “the fair virago,
Luitgard”. This dates the poem before 801, in which year Luitgard
died at Tours. The tower of St. Martin’s, now called the tower of
Charlemagne, was raised over her tomb.[225]
Alcuin was evidently a very prominent figure at court, keeping
things alive by his knowledge and wit and subtleties.

And Flaccus too is there, the glory of our poets,


Who pours forth many things in lyric foot.
An able sophist, a poet, too, melodious,
Able in mind and able in practice alike.
He brings forth pious lessons from Holy Writ,
And solves the puzzles of numbers with favouring jest.
He puts an easy question now, and then a hard;
Of this world now, then of the world above.
The king alone, of many that fain would,
Can solve the skilful puzzles Flaccus sets.

There was evidently no standing ill-feeling against the Abbat of St.


Martin’s on the part of the Bishop of Orleans.
CHAPTER XV
Alcuin’s letters to Charlemagne’s sons.—Recension of the Bible.—The “Alcuin
Bible” at the British Museum.—Other supposed “Alcuin Bibles”.—Anglo-Saxon
Forms of Coronation used at the coronations of French kings.

There is in the Bibliothèque Nationale in Paris a letter headed “In


nomine Dei summi incipit scriptum Albini magistri ad Karolum
imperatorem”. It is, however, held to be uncertain whether the letter
is addressed to the emperor or to his son Charles, who died some
three years before his father. The internal evidence appears to be
decidedly against its having been addressed to the emperor. Alcuin
could not have denied himself the pleasure of referring to the
emperor when he mentions king David as the authority for his
advice, and we have no letter of Alcuin to the emperor so completely
free from honorific titles and phrases, with nothing but the simple vos
throughout. It is to be said on the other hand that the author of the
Life of the blessed Alchuin the Abbat, with which we dealt fully in
Chapters I and II, refers[226] to a libellus which Alcuin wrote for
Charlemagne, setting forth the psalms which he was to use
according as penitence, tribulation, or joy, was his theme.
The interest of the letter in question fortunately lies in its advice,
not in the person to whom the advice is given. This is the letter, with
its ordinary heading:—
“Alcuin dedicates to Charles the Emperor a Ep. 244.
breviary[227] of prayer to God.
“The blessed David, the great king and servant of God most high,
gave us the rule of singing, how man should pour forth prayers to
God at certain stated hours. ‘Seven times a day,’ he says, ‘do I
praise Thee,’—that is, at the first hour of the day, the second, third,
sixth, ninth, the evening hour, and the twelfth. David the king, then,
gave praise to God at these seven hours. The holy Daniel, the
prophet, at the third, sixth, and ninth hour of the day, went into his
chamber to pray to the Lord, and with hands stretched upward to
Heaven entreated God for himself and for the people of Israel. The
same David said[228] further, ‘I will make mention of Thy
righteousness only.’ And again, ‘At midnight I will rise to give thanks
unto thee,’ that is, at the hour of night. And again he says, ‘I have
thought upon Thy name in the night season,’ that is, at cock-crow.
And, ‘Have I not remembered Thee in my bed, and thought upon
Thee when I was waking?’ Here are three courses of the office
during the night, and seven by day, making the ten courses which we
sing, following the number of the ten laws of Moses. But you have
asked me to write to you in a net form the order in which a layman in
active life should pray to God at the stated hours. You live after a
Christian fashion, and you desire to do Christian deeds; you are not
ignorant how prayer should be made to the Lord; but at your request
I will briefly state my opinion. When you have risen from your bed,
say first ‘O Lord Jesu Christ, son of the living God, in Thy name will I
lift up my hands, make haste to deliver me.’ Say this thrice, with the
psalm ‘Ponder my words, O Lord, consider my meditation. O
hearken thou unto the voice of my calling, my king and my God, for
unto Thee will I make my prayer. My voice shalt thou hear betimes,
O Lord, early in the morning will I direct my prayer unto Thee.’ Then,
‘Our Father,’ and the prayers, ‘Vouchsafe O Lord to keep us this
day,’ ‘Perfect my steps,’ ‘Praised be the Lord daily,’ ‘Direct and
sanctify,’ ‘O Lord let Thy mercy lighten upon us.’ Then, rising, begin
the verse ‘Thou shalt open my lips, O Lord’. When that is ended, with
the Gloria, begin the psalm ‘Lord how are they increased’. Then
follows ‘God be merciful unto me’. Then ‘O come, let us sing unto the
Lord’. Then psalms, as many as you will.”
We have two letters of Alcuin which were certainly written to
Charles the king, the eldest son of Charlemagne. The first was
written in 801 to congratulate Charles on his anointment as king by
Leo III on the same day (Christmas Day, 800) that saw his father
crowned as emperor.
“I have heard from the lord apostolic [Leo III] that Ep. 162.
with the consent of the most excellent Lord David
[Charlemagne] the title of king and the crown of kingly dignity have
been conferred upon you. I greatly rejoice in the honour both of the
title and of the power. I pray that your dignity and nobleness may be
for the safety of many peoples, nations, and churches of Christ; may
be glorious in the world and terrible to the adversaries of the
Christian religion; may be vigorous and strong through a long season
of prosperity; and with the blessing of God may always follow after
better things, ascend to higher, and grow even unto the perfect day
of eternal blessedness.
“Do justice, my best-loved son, and mercy, among Christian
people, for it is these, as Solomon testifies, that exalt the throne of a
kingdom and render the kingly power laudable and pleasing to God.
Have as counsellors men good, pious, prudent, and god-fearing;
men in whom truth reigns, not covetousness, for the gift blindeth the
wise and perverteth the words of the righteous.[229] Never allow the
dishonesty of others to sully the name of your dignity, nor permit
others to do with wicked mind in covetousness that which you would
not yourself do; the fault of the subject is often imputed to the ruler.
Let not the impious will of some, under the name of thy beatitude, fill
their money-bags with the mammon of unrighteousness.
“Good examples are not far to seek. In the home in which you
were brought up you have the best examples of all goodness. You
may have perfect confidence that you will by the gift of God attain to
the blessing of that most excellent and in all honour most noble
father of thine, ruler and emperor of a Christian people, if you strive
to imitate the manner of his nobility and piety and complete
discretion; and will most fully obtain the mercy of God, which is
better than all the glory of the world.
“Wheresoever your way may lead, may the footsteps of piety ever
follow thee, that you may have praise of men and eternal reward with
God.”
Alcuin must needs end a congratulatory letter to a royalty with
hexameter and pentameter:—

Prosperous even for ever be thou great hope of the nations.


Be to thee Christ as love, light, way, and safety, and life.

The next letter to King Charles was probably later. It seems to


indicate some anxiety on the part of Alcuin, and, indeed, Charles
was not as fine a character as his brother Louis, who is mentioned in
this letter. Alcuin would appear to have kept a copy of the former
letter, and to have made a good deal of it do service a second time.
“I rejoice, my dearest son, in the devotion of your Ep. 245.
good will which Osulf your attendant has narrated
to me, whether as regards the largeness of your alms-giving, or as
regards the gentleness of your rule. Know of a surety that all this is
greatly pleasing to God, and deserves at the hand of His mercy
perpetual blessing. Do thou, my son, my dearest son, always to the
utmost of your power work for the honour of God Almighty in all
goodness and piety; following the example of your most excellent
father in all honesty and sobriety, that the divine clemency of Christ
the God may grant to thee to possess his blessing by right of
inheritance.
“Be a pious hearer of the wretched, and judge their cause with the
utmost justness. Do not permit the judges who are under you to
judge for presents and gifts; for gifts, it is said in Holy Scripture, blind
the hearts of the wise, and subvert the words of the just. Hold in
honour the servants of Christ, those who are true servants of God,
for some come in sheeps’ clothing but inwardly are ravening wolves.
The Truth says, By their fruits ye shall know them. Have as
counsellors wise men, who fear God; not flatterers, for a flatterer, as
it is said, is a bland enemy and often seduces those who consent
unto him. Be prudent in thought and cautious in speech; always
setting your hope on God, for He never faileth them whose hope is
set on Him.
“Would that it were allowed me more frequently to address a letter
of advice to thy benignity, as the most noble youth Louis your brother
has asked me to do frequently for him. This I have done, and, if God
will, I shall continue to do; he reads my letters with great humility.
“My greatest joy is when I hear—as, indeed, it is right that I should
hear—of a good manner of life on your part. For this is the gift of
God, the prosperity of a kingdom, that the rulers of a Christian
people live most strict lives, and have their conversation among men
in a way pleasing to God. Thus a blessing from heaven is certain to
come on the nation and kingdom, which may God vouchsafe to grant
eternally to your nobility.
“May you flourish, grow, and be strong, advancing in all that is
good and prosperous, to the exaltation of His Holy Church, my
dearest son.”
We have only one of Alcuin’s letters to King Pepin, who died
young, leaving a son Bernard who became king on his father’s
death.
“To the most noble and beloved son Pippin Ep. 77.
Albinus sends greeting in the love of Christ.
“We give thanks to thy benevolence and to the piety of the lord
King who has piously consented to our petition concerning the
redemption of captives. I know that in such works of piety you earn
blessing and a long and prosperous reign.
“And do thou, most excellent youth, study to adorn nobility of birth
by nobility of conduct. Strive with all thy power to fulfil the will and the
honour of the omnipotent God, that His ineffable piety may exalt the
throne of thy kingdom and extend its bounds, and subject the nations
to thy power. Be liberal to the wretched, good to foreigners, devout in
the service of Christ, treating honourably His servants and His
churches that their sedulous prayer may aid thee. Be clean in
conversation, chaste in body. Rejoice with the wife of thy youth and
let not other women have any part in thee, that the blessing granted
unto thee may lead to a long posterity of descendants.
“Be strong against adversaries, faithful to friends, humble to
Christians, terrible to pagans, affable to the wretched, provident in
council. Use the advice of the old men, the service of the young. Let
equity be the judgement in thy kingdom. Let the praise of God
everywhere resound at the fitting hours, and especially in the
presence of thy piety. This kind of devotion to the offices of the
church will render thee loveable to God and honoured among men.
Let thoughts of sobriety be in your heart, words of truth in your
mouth, examples of honour in your conduct, that the divine clemency
may in all ways exalt and preserve thee.
“I pray you let this letter go with you as a testimony of my love.
Though it be not worthy to be hung at the girdle of thy veneration, yet
let its admonition be worthy to be stored in the mind of thy wisdom.”
We must now say something on the part which Alcuin played in
connexion with the revision of the manuscripts of the Bible.
Alcuin is credited with a revision of the whole of the Latin Bible,
both the Old Testament and the New. We have a letter of his in
which he states in precise terms that he had been commissioned by
Karl to correct the corrupted text. The letter is addressed to Gisla,
Abbess of Chelles, Karl’s sister, and Rotruda, Karl’s daughter, whom
he addresses as Columba, the Dove.
“I have sent for the solace of your sanctity a Ep. 136. a.d. 800.
small book, written in short sections, that you may
use it during these days[230] for your holy devotion. In such study
you best spend these most holy days, and especially in the Gospel
of the blessed John, wherein are the deeper mysteries of divinity,
and the most holy words of our Lord Jesus Christ which He spoke on
that night when He willed to be betrayed for the salvation of the
world.
“I might have sent you an exposition of the whole Gospel, if I had
not been occupied, by the command of the lord king, in the
emendation of the Old and the New Testament. But if life last and
God help, I will, when occasion serves, finish the task now begun,
and dedicate the completed work to your name.”
Gisla and Rotruda sent him a delightfully Ep. 137.
affectionate and bright letter in reply. They liken
Alcuin to Jerome sending the Scriptures from his cave in Bethlehem
to Rome; and in begging him to send the rest of the commentary on
St. John they remind him that the shallow Loire is crossed with less
danger than the Tuscan Sea, and that a messenger gets more easily
from Tours to Paris than from Bethlehem to Rome.
It is certain from the dedicatory verses of Alcuin’s which have been
preserved, that at least four complete copies of the whole Bible had
been corrected by him or under his direction, and sent to the
emperor. Of these, not one is known to be still in existence. Of one of
them Alcuin makes definite mention in the following letter:—
“To the most desired and entirely loveable David Ep. 205. a.d. 801-
the king Albinus wishes present prosperity and 3.
eternal beatitude in Christ.
“I have long deliberated upon the question what could the devotion
of my mind think of as worthy to be given towards the splendour of
your imperial power and the increase of your most rich treasury. I
feared lest the poor intelligence of my mind should remain torpid in
empty idleness, while others were offering various rich gifts, and the
messenger of my littleness should come before the presence of your
beatitude with empty hands. I have at length, by the inspiration of the
Holy Spirit, found something which it is fitting that I should send and
it may be agreeable to your prudence to receive.
“In the most sacred solicitude of your piety it is clear beyond doubt
what the Holy Spirit works through you for the safety of the whole
Church, and how earnestly all faithful people should pray that your
empire be extended to full glory, and be loved at home by all God’s
people, and terrible abroad to all the enemies of His Son. To my
questioning and desiring mind, nothing seemed more worthy of your
most peace-giving honour than a present of the divine books, which
by the dictation of the Holy Spirit and the ministration of Christ God
have been written by the pen of divine grace for the salvation of the
whole race of man. These, brought together into the sanctity of one
most clear body, and diligently emended, I have sent to your most
lofty authority by this dearest son of ours and faithful servant of
yours, that with full hands he may with most joyous service stand
before your dignity. He has been ill for a long time, but now that by
God’s mercy he has to some extent recovered, he has with the
greatest satisfaction hastened to approach your piety.
“The small gifts of my tears I send by faithful promise in prayer to
St. Martin for the ardently desired prosperity of your authority. Let my
messenger serve the most pious lord as is fitting; I will pray for the
most loved lord as the visitation of the Holy Spirit shall deign to
illumine my heart. If the devotion of my mind could have found
anything better, I would with ready will offer it towards the increase of
your honour.”
The messenger was Nathanael, that is, Fredegisus. We learn this
from Letter 206, which commences “Albinus greets Nathanael”, and
after addressing him as though he were the real Nathanael who was
seen under the fig-tree by Jesus, proceeds thus:—
“Salute Lucia my sister and Columba our Ep. 206.
daughter.[231] Pray them to be mindful of my old
age in sacred prayers and of their own salvation in good works. And
hide not from them the beauty of your wisdom, but irrigate the flower-
beds of good will in them. What is more beautiful than the flowers of
wisdom, which never fade? What is richer than the wealth of
knowledge, which is never exhausted? To this exhort them. Let them
live day and night in meditation on the law of God, that they may find
Him of whom Moses in the law wrote, and the prophets. Bid them
hold Him and not let Him go till they are led into the chambers of the
Kings glory to be supported by flowers of eternal blessedness, the
Bridegroom’s left hand of present prosperity under their head, and
the right hand of eternal bliss embracing them.[232]
“Convey the letter of my littleness, with the most holy gift of divine
Scripture and peaceful words of salutation, to my lord David. To him
we owe as many thanks and praises for all his goodness to me and
to my sons as this Book has syllables; to him may God give as many
blessings as in this Book there are letters.”
The natural supposition is that Alcuin brought—or had sent—from
York accurate copies of the Scriptures, from which he corrected the
faulty manuscripts of France and Germany, to use modern names.
Errors were due, probably, at least as much to mispronunciation on
the part of the person who dictated to the writers, or to mis-hearing
on their part, as to carelessness in transcribing. We have to
remember that the practice was for one monk to read out word by
word the sentence which the writers in the scriptorium were to take
down, so that in this way twenty or thirty—it is said as many as two
hundred—copies of a poem or a book could be written at the same
time. This practice gave many opportunities for error.
We have at the British Museum a magnificent Bible, one of the
largest manuscripts in existence, called Alcuin’s Bible. It contains
449 sheets of very fine parchment, 20 by 14½ inches. It was
purchased for the Museum in 1836 for £750, the price asked at first
being £12,000, reduced to £6,500 as “an immense sacrifice”. The
story of its acquisition, and the question of its date and its connexion
with Alcuin, were stated and discussed by Sir F. Madden in the
Gentleman’s Magazine for 1836, pages 358 to 363, 468 to 477, 580
to 587. That able archaeologist believed it to be of Alcuin’s own time,
and, indeed, to be the very copy which Alcuin presented to
Charlemagne in 801, on the completion of the recension which Karl
had entrusted to him. The evidence in favour of this view is found on
the last page of the MS., in some elegiac verses composed by
Alcuin. The verses begin with an appeal from the book itself to its
readers that it may be called a Pandect, and not a Bibliotheca,[233]
and after eight more verses, in which it is called a Codex, they end
as follows:—

Mercedes habeat, Christo donante, per aevum


Is Carolus qui iam scribere iussit eum.
Haec dator aeternus cunctorum, Christe, bonorum
Munera de donis accipe sancta tuis,
Quae Pater Albinus, devoto pectore supplex,
Nominis ad laudes obtulit ecce tui;
Quem tua perpetuis conservet dextra diebus,
Ut felix tecum vivat in arce poli.
Pro me quisque legas versus orare memento,
Alchuine dicor ego. Tu sine fine vale.

“May Charles, who bade this book be written, receive eternal


rewards. May the giver of all good accept this offering of His own
gifts, which Father Albinus has made, whom may Thy hand preserve
to live with Thee. Thou who readest these verses, remember to pray
for me; my name is Alchuine; mayest thou for ever fare well.”
That these verses were written in the great Pandect of Alcuin’s
recension, which Alcuin presented to Charlemagne, we may take to
be certain. But we may also take it as certain that they would be
written also in copies made from that special Pandect; and it has
been decided by the most competent modern critics that the Bible in
the Museum was not written till a generation had passed away after
Alcuin’s death.
That the verses were entered in other copies also is certain. The
Fathers of the Oratory della Vallicella at Rome had a copy of this
recension, which was believed to be written by Alcuin’s own hand
and presented to Charlemagne. In it there is a long copy of verses,
including those in the Museum Bible, but with curious alterations and
additions, which make it probable that the Vallicella Bible was written
for Charlemagne’s grandson, Charles le Chauve. Quae Pater
Albinus devoto pectore supplex is altered into Quae tibi devoto
Carolus rex pectore supplex, and verses are added, stating that the
Bible was written for a new church which Charles had just built. The
alteration cuts out the personal note of Alcuin, and the addition cuts
out Charlemagne and points to another Charles. This is far from
being the only case in which confusion is caused by the fact that
Charlemagne was himself for many years Charles the king; that his
oldest son was Charles the king; that his grandson was Charles the
king; as also two great grandsons, a great great grandson, and even
two generations further still.
Others besides Alcuin and the royal family were interested in the
various versions of Scripture. For example, his contemporary
Theodulf, the learned bishop of Orleans, sent to his own daughter
Gisla a psalter, radiant with silver and gold, with both the earlier and
the later versions of Jerome.
Our use of the word Graduale for the book containing the words
and the music sung by the choir at the service of the Mass is an
evidence of the large part played by the Gallican Church in the
arrangement and improvement of the early mediaeval service books.
Rome spoke of the Antiphonale Missarum and Antiphonale Horarum,
while Gaul spoke of the Graduale for Mass Music and Antiphonale
for the Music of the Hours. Under Alcuin’s guiding hand, the
influence of Charlemagne and his times upon the services was wide
and deep. In the document described as Ep. 31, a.d. 794, Karl has a
good deal to say about the success of his own efforts to put down
irregular methods of singing the services, and to bring all into
general accord with the Roman method.[234] Alcuin’s work re-acted
upon the Roman use itself, and is understood to have been the
operating cause of the mark left upon it.
Alcuin had strong opinions as to the best manner Ep. 72. a.d. 796.
of singing the services. In a letter to Eanbald II, he
writes thus, for the benefit of the Church of York:—“Let the clergy
chant with moderated voice, striving to please God rather than men.
An immoderate exaltation of voice is a sign of boastfulness. And let
them not be above learning the Roman Orders of Service, that they
may have eternal benediction from the blessed Peter, chief of the
Apostles, whom Our Lord Jesus Christ made the head of His elect
flock.”
Alcuin was versed in secular music also. We learn from Ep. 100
that Karl had asked him to write peaceful and soothing songs, both
words and music, for soldiers to sing when engaged in the horrors of
war, and that he complied with the request.
We have some very interesting evidences of the borrowing of
Anglo-Saxon manuscripts for use in France, and of the influence of
Anglo-Saxon forms on French services. There are two Anglo-Saxon
forms for the coronation of a king. One of these is found in the
Pontifical of Ecgbert, the Bishop and later the Archbishop of York, to
which a date of about 745 may be given. It is merely the supplement
to the Mass on the occasion of a coronation, and accordingly it does
not give the details of the ceremony. The other is a later form, and it
gives at length the details of the ceremony, one of the longest
prayers describing the king as raised to the royal throne of the
Angles and Saxons. But, curiously enough, we learn the most
interesting parts of the ceremony of crowning an Anglo-Saxon king,
not from this manuscript, but from three manuscripts of the form for
the coronation of a king of the French. The first of these to be
mentioned is a manuscript form of an Abbat of Corbie. In it we find
the prayer for “This thy servant whom with suppliant devotion we
elect equally to the kingdom of the whole of Albion, that is to say, of
the Franks ... That he may nourish and teach the Church of the
whole of Albion, with the peoples committed to his charge”. Here it
would appear that a marginal note had been added to the Anglo-
Saxon form at the first mention of “Albion”, “that is to say, of the
Franks,” and has afterwards been incorporated in one place and not
in the other. The “elect equally” indicates that the form was used for
an Anglo-Saxon king who claimed to be king of the whole land, while
yet the old division into three main nations was fresh in mind.[235] It
is a further evidence in favour of this being an Anglo-Saxon form,
that the only saint mentioned besides the Blessed Virgin and St.
Peter is “Holy Gregory, Apostolic of the Angles”. In the preparation of
the Sens Order, to be mentioned later, this flaw had been
discovered, and St. Denys and St. Remy put in the place of St.
Gregory.
In a manuscript in the National Library of Paris, we have a second
Order for the Coronation of a King of the Franks, which is indubitably
an Anglo-Saxon Order. The following phrases occur: “This thy
servant whom with suppliant devotion we elect equally ... That the
sceptre desert not the royal throne, that is to say, of the Saxons,
Mercians, and Northumbrians (Nordanchimbrorum) ... That
supported by the due subjection of both of these peoples...”
In a third Order for the Coronation of French Kings, from the
Pontifical of the illustrious Church of Sens, we find the prayer “that
the sceptre desert not the royal throne, that is to say, of the Saxons,
Mercians, and Northumbrians (Nordan Cymbrorum)”, and “that the
king, supported by the due subjection of both these peoples....”
It may be added that the French Benedictional of Archbishop
Robert, now at Rouen, has the form “Angles and Saxons”. So late as
1364 Charles V of France was crowned with a form which named the
throne as that of the Saxons, Mercians, and Northchimbrians; while
at the same time the peers of Guienne swore to protect him against
the king of England, his people, and allies.[236]

You might also like