Professional Documents
Culture Documents
TRUE/FALSE
1. IT governance is a process that ensures that the organization's IT sustains and extends the
organization's strategies and objectives.
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
4. The system of controls used in this text consists of the control environment, pervasive control plans, IT
general controls, and business process and application control plans.
ANS: T PTS: 1
ANS: F PTS: 1
6. The function composed of people, procedures, and equipment and is typically called the information
systems department, IS department, or the IT department is the information systems organization.
ANS: T PTS: 1
7. The IS function with the responsibility of guiding the IT organization in establishing and meeting user
information requirements is the IT steering committee.
ANS: T PTS: 1
8. The IS function with the principal responsibilities of ensuring the security of all IT resources is data
control.
ANS: F PTS: 1
9. The IS function of quality assurance conducts reviews to ensure the attainment of IT objectives.
ANS: T PTS: 1
10. The chief information officer (CIO) prioritizes and selects IT projects and resources.
ANS: F PTS: 1
11. Within the data center, the data control group is responsible for routing all work into and out of the
data center, correcting errors, and monitoring error correction.
ANS: T PTS: 1
12. The systems development function provides efficient and effective operation of the computer
equipment.
ANS: F PTS: 1
13. Within the data center, the data librarian function grants access to programs, data, and documentation.
ANS: T PTS: 1
14. Combining the functions of authorizing and executing events is a violation of the organizational
control plan known as segregation of duties.
ANS: T PTS: 1
15. Segregation of duties consists of separating the four functions of authorizing events, executing events,
recording events, and safeguarding the resources resulting from consummating the events.
ANS: T PTS: 1
ANS: F PTS: 1
17. A small organization that does not have enough personnel to adequately segregate duties must rely on
alternative controls, commonly called resource controls.
ANS: F PTS: 1
18. The functions of the security officer commonly include assigning passwords and working with human
resources to ensure proper interview practices are conducted during the hiring process.
ANS: T PTS: 1
19. Individual departments coordinate the organizational and IT strategic planning processes and reviews
and approves the strategic IT plan.
ANS: F PTS: 1
20. The policy of requiring an employee to alternate jobs periodically is known as forced vacations.
ANS: F PTS: 1
21. Forced vacations is a policy of requiring an employee to take leave from the job and substitute another
employee in his or her place.
ANS: T PTS: 1
22. A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its
employees.
ANS: T PTS: 1
23. The WebTrust family of services offers best practices and e-business solutions related exclusively to
B2B electronic commerce.
ANS: F PTS: 1
24. Data encryption is a process that codes data to make it readable to human eye.
ANS: F PTS: 1
25. Systems documentation provides an overall description of the application, including the system's
purpose; an overview of system procedures; and sample source documents, outputs, and reports.
ANS: T PTS: 1
26. Program documentation provides a description of an application program and usually includes the
program's purpose, program flowcharts, and source code listings.
ANS: T PTS: 1
27. The user manual gives detailed instructions to computer operators and to data control about a
particular application.
ANS: F PTS: 1
28. The operations run manual describes user procedures for an application and assists the user in
preparing inputs and using outputs.
ANS: F PTS: 1
29. Training materials help users learn their jobs and perform consistently in those jobs.
ANS: T PTS: 1
30. Program change controls provide assurance that all modifications to programs are authorized and
documented, and that the changes are completed, tested, and properly implemented.
ANS: T PTS: 1
31. Business continuity planning is the process that identifies events that may threaten an organization and
provide a framework whereby the organization will continue to operate when the threatened event
occurs or resume operations with a minimum of disruption.
ANS: T PTS: 1
ANS: F PTS: 1
33. With continuous data protection (CDP) all data changes are data stamped and saved to secondary
systems as the changes are happening.
ANS: T PTS: 1
34. The disaster backup and recovery technique known as electronic vaulting is a service whereby data
changes are automatically transmitted over the Internet on a continuous basis to an off-site server
maintained by a third party.
ANS: T PTS: 1
35. The disaster recovery strategy known as a cold site is a fully equipped data center that is made
available to client companies for a monthly subscriber fee.
ANS: F PTS: 1
36. A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and
computer ports, into which a subscriber can move equipment, is called a hot site.
ANS: F PTS: 1
37. In a logic bomb attack, a Web site is overwhelmed by an intentional onslaught of thousands of
simultaneous messages, making it impossible for the attacked site to engage in its normal activities.
ANS: F PTS: 1
38. Biometric identification systems identify authorized personnel through some unique physical trait such
as fingers, hands, voice, eyes, face, or writing dynamics.
ANS: T PTS: 1
39. Antivirus is a technique to protect one network from another "untrusted" network.
ANS: F PTS: 1
40. The most common biometric devices perform retinal eye scans.
ANS: F PTS: 1
41. Access control software ensures that only authorized users gain access to a system through a process
of identification and authentication.
ANS: T PTS: 1
42. Threat monitoring is a technique to protect one network from another "untrusted" network.
ANS: F PTS: 1
ANS: F PTS: 1
44. An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.
ANS: T PTS: 1
45. Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the
organization.
ANS: T PTS: 1
46. Periodic cleaning, testing, and adjusting of computer equipment is referred to as preventative
maintenance.
ANS: T PTS: 1
47. Computer hacking and cracking is the intentional, unauthorized access to an organization's computer
system, accomplished by bypassing the system's access security controls.
ANS: T PTS: 1
MULTIPLE CHOICE
2. Top 10 management concerns about IT's capability to support an organization's vision and strategy
include all except the following:
a. decline in IT investments during recession
b. overall security of IT assets
c. the Internet
d. need for project management leadership
ANS: C PTS: 1
3. Top security concerns reported by IT security professionals include all the following except:
a. data breaches
b. cyber crimes and cyber attacks
c. data backup
d. workforce mobility
ANS: C PTS: 1
6. The department or function that develops and operates an organization's information systems is often
called the:
a. information systems organization
b. computer operations department
c. controller's office
d. computer technology branch
ANS: A PTS: 1
7. A policy:
a. is a plan or process put in place to guide actions and achieve goals.
b. can compel behavior and enforce penalties for failure to follow.
c. can be used to prevent fraud in an organization.
d. all of the above.
ANS: A PTS: 1
10. This IT function's key control concern is that organization and IT strategic objectives are misaligned:
a. CIO
b. quality assurance
c. IT steering committee
d. systems development manager
ANS: C PTS: 1
11. ____ can consist of many computers and related equipment connected together via a network.
a. PCs
b. Servers
c. LAN
d. Firewall
ANS: C PTS: 1
12. In an information systems organization, which of the following reporting relationships makes the least
sense?
a. The data center manager reports to the CIO.
b. The systems development manager reports to the data center manager.
c. Database administration reports to the technical services manager.
d. The data librarian reports to the data center manager.
ANS: B PTS: 1
13. In an information systems organization, all of the following functions might logically report to the data
center manager except:
a. data control
b. computer operations
c. data librarian
d. quality assurance
ANS: D PTS: 1
14. Managing functional units such as networks, CAD/CAM and systems programming typically is a
major duty of:
a. data center manager
b. systems development
c. technical services manager
d. database administrator
ANS: C PTS: 1
15. From the standpoint of achieving the operations system control goal of security of resources, which of
the following segregation of duties possibilities is least important?
a. between systems programming and computer operations
b. between data control and data preparation personnel
c. between systems development and computer operators
d. between technical services and data center
ANS: B PTS: 1
16. A key control concern is that certain people within an organization have easy access to applications
programs and data files. The people are:
a. data librarians
b. systems programmers
c. systems development
d. data center managers
ANS: B PTS: 1
17. Which of the following has the major duties of prioritizing and selecting IT projects and resources?
a. steering committee
b. security officer
c. CIO
d. systems development manager
ANS: A PTS: 1
18. Which of the following has the responsibility to ensure the security of all IT resources?
a. steering committee
b. security officer
c. CIO
d. systems development manager
ANS: B PTS: 1
19. Which of the following has the responsibility of efficient and effective operation of IT?
a. steering committee
b. security officer
c. CIO
d. systems development manager
ANS: C PTS: 1
20. In an information systems organizational structure, the function of ____ is the central point from
which to control data and is a central point of vulnerability.
a. data control
b. data entry
c. data librarian
d. database administration
ANS: D PTS: 1
21. The control concern that there will be a high risk of data conversion errors relates primarily to which
of the following information systems functions?
a. data control
b. data entry
c. data librarian
d. database administration
ANS: B PTS: 1
22. The controlled access to data, programs, and documentation is a principal responsibility of which of
the following functions?
a. data control
b. data preparation (data entry)
c. data librarian
d. computer operator
ANS: C PTS: 1
23. Which of the following is not one of COBIT's four broad IT control process domains?
a. plan and organize
b. acquire and implement
c. repair and replace
d. monitor and evaluate
ANS: C PTS: 1
25. Which one of the following personnel is not involved in safeguarding resources resulting from
consummating events?
a. security officer
b. technical service manager
c. database administrator
d. CIO
ANS: D PTS: 1
26. The segregation of duties control plan consists of separating all of the following event-processing
functions except:
a. planning events
b. authorizing events
c. executing events
d. recording events
ANS: A PTS: 1
27. A warehouse clerk manually completing an order document and forwarding it to purchasing for
approval is an example of:
a. authorizing events
b. executing events
c. recording events
d. safeguarding resources
ANS: B PTS: 1
28. Specifications for availability, reliability, performance, capacity for growth, levels of user support,
disaster recovery, security, minimal system functionality, and service charges are included in:
a. application documentation
b. service-level requirements
c. business continuity plan
d. security plan
ANS: B PTS: 1
29. Approving a customer credit purchase would be an example of which basic events processing
function?
a. authorizing events
b. executing events
c. recording events
d. safeguarding resources
ANS: A PTS: 1
31. An outside auditing firm annually supervises a physical count of the items in a retail store's shelf
inventory. This is an example of:
a. authorizing events
b. executing events
c. recording events
d. safeguarding resources
ANS: D PTS: 1
32. A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs
it approving the removal of the items from the warehouse. The supervisor is performing which
functions?
a. authorizing events and safeguarding of resources
b. executing and recording events
c. authorizing and executing events
d. authorizing and recording events
ANS: C PTS: 1
33. A clerk receives checks and customer receipts in the mail. He endorses the checks, fills out the deposit
slip, and posts the checks to the cash receipts events data. The clerk is exercising which functions?
a. recording and executing events
b. authorizing and executing events
c. recording and authorizing events
d. safeguarding of resources and authorizing events
ANS: A PTS: 1
34. When segregation of duties cannot be effectively implemented because the organization is too small,
we may rely on a more intensive implementation of other control plans such as personnel control
plans. This is called:
a. collusion controls
b. compensatory controls
c. authorizing controls
d. inventory controls
ANS: B PTS: 1
35. COBIT 5:
a. shifts the center of attention from IT to governance.
b. can be implemented by updating from COBIT 4.1.
c. does not have the enablers used in COBIT 4.1
d. all of the above.
ANS: A PTS: 1
36. Which of the following control plans is not a retention control plan?
a. creative and challenging work opportunities
b. occasional performance evaluations
c. competitive reward structure
d. viable career paths
ANS: B PTS: 1
37. Personnel development control plans consist of each of the following except:
a. checking employment references
b. providing sufficient and timely training
c. supporting employee educational interests and pursuits
d. performing scheduled evaluations
ANS: A PTS: 1
38. The primary reasons for performing regular employee performance reviews include all of the
following except:
a. determine whether an employee is satisfying the requirements indicated by a job
description
b. assess an employee's strengths and weaknesses
c. assist management in determining salary adjustments, promotions, or terminations
d. develop a strategy for filling necessary positions
ANS: D PTS: 1
40. A control plan that is designed to detect a fraud by having one employee periodically do the job of
another employee is called:
a. segregation of duties
b. forced vacations
c. periodic audits
d. management control
ANS: B PTS: 1
41. A mechanism by which a company is reimbursed for any loss that occurs when an employee commits
fraud is called a:
a. segregation of duties
b. fidelity bond
c. personnel planning control
d. termination control plan
ANS: B PTS: 1
42. Which of the following personnel security control plans is corrective in nature as opposed to being a
preventive or detective control plan?
a. rotation of duties
b. fidelity bonding
c. forced vacations
d. performing scheduled evaluations
ANS: B PTS: 1
43. Personnel termination control plans might include all of the following except:
a. require immediate separation
b. identify the employee's reasons for leaving
c. establish a policy of forced vacations
d. collect the employee's keys, badges, etc.
ANS: C PTS: 1
44. Instructions for computer setup, required data, restart procedures, and error messages are typically
contained in a(n):
a. systems development standards manual
b. program documentation manual
c. operations run manual
d. application documentation manual
ANS: C PTS: 1
45. Application documentation that describes the application and contains instructions for preparing inputs
and using outputs is a(n):
a. operations run manual
b. user manual
c. program documentation
d. systems documentation
ANS: B PTS: 1
46. Alternative names for contingency planning include all of the following except:
a. disaster recovery planning
b. business interruption planning
c. business disaster planning
d. business continuity planning
ANS: C PTS: 1
47. A data replication strategy where all data changes are data stamped and saved to secondary systems as
the changes are happening is called:
a. mirror site
b. electronic vaulting
c. continuous data protection (CDP)
d. Dumping
ANS: C PTS: 1
48. All of the following are components of a backup and recovery strategy except:
a. echo checking
b. mirror site
c. electronic vaulting
d. hot site
ANS: A PTS: 1
49. Which of the following statements related to denial of service attacks is false?
a. Insurance is available to offset the losses suffered by denial of service attacks.
b. A denial of service attack is designed to overwhelm a Web site, making it incapable of
performing normal functions.
c. Web sites can employ filters to sense multiple messages from a single site.
d. The most effective attacks originate from a small cluster of computers in a remote
geographic region.
ANS: D PTS: 1
50. In an on-line computer system, restricting user access to programs and data files includes all of the
following except:
a. user identification
b. user authentication
c. determining user access rights
d. wearing identification badges
ANS: D PTS: 1
51. Sending out an e-mail pretending to be a legitimate business asking for information about a person's
account is called:
a. dumpster diving
b. phishing
c. smoozing
d. shoulder surfing
ANS: B PTS: 1
52. Which of the following controls restrict access to programs, data, and documentation?
a. library controls
b. password controls
c. authentication controls
d. program change controls
ANS: A PTS: 1
53. This logs and monitors who is on or trying to access an organization's network.
a. biometrics
b. electronic vaulting
c. intrusion detection systems (IDS)
d. firewall
ANS: C PTS: 1
54. Protecting resources against environmental hazards might include all of the following control plans
except:
a. fire alarms and smoke detectors
b. waterproof ceilings
c. voltage regulators
d. rotation of duties
ANS: D PTS: 1
55. Searching through rubbish for system information such as passwords is called:
a. scavenging
b. phishing
c. smoozing
d. shoulder surfing
ANS: A PTS: 1
COMPLETION
ANS: IT governance
PTS: 1
PTS: 1
PTS: 1
PTS: 1
ANS: Monitoring
PTS: 1
6. The function composed of people, procedures, and equipment and is typically called the information
systems department, IS department, or IT department is the ______________________________.
ANS:
information systems organization
IS organization
PTS: 1
PTS: 1
PTS: 1
ANS:
quality assurance
quality assurance (QA)
QA
PTS: 1
10. The ______________________________ group is responsible for routing all work in to and out of the
data center, correcting errors, and monitoring all error correction.
PTS: 1
11. The ______________________________ function provides efficient and effective operation of the
computer equipment by performing tasks such as mounting tapes, disks, and other media and
monitoring equipment operation.
PTS: 1
12. The ______________________________ maintains custody of and controls access to programs, files,
and documentation.
PTS: 1
Another random document with
no related content on Scribd:
MRS. GASKELL
I
WE think of her habitually—do we not?—by her married title of “Mrs.
Gaskell.” Who Mr. Gaskell was this generation does not, in an
ordinary way, pause to enquire: a neglect which does injustice to a
gentleman of fine presence, noble manners and high culture. She
was a beautiful woman: they married in 1832, and had children, and
lived most happily.
So it is as “Mrs. Gaskell” that we think of her: and I dare to wager
that most of you think of her as Mrs. Gaskell, authoress of Cranford.
Now heaven forbid that anything I say this morning should daunt
your affection for Cranford, as heaven knows how long and sincerely
I have adored it. I have adored it at least long enough and well
enough to understand its devotees—for Cranford has not only
become popular in the sense, more or less, that Omar Khayyam has
become popular—by which I mean that, at this season or
thereabouts, numbers of people buy a copy in limp suède, with Hugh
Thomson’s illustrations, and only hesitate over sending it to the So-
and-So’s with best wishes on a chilling doubt that they sent it last
year, with the identical good wishes—if indeed they are not returning
the identical volume they received! Well, let us be merry and
careless!—in the course of a week or two these soft bricks will be
dropping on every hearth.
But seriously, one finds devotees of Cranford everywhere; and
especially, in my experience, among scholarly old men. They have
Cranford written on their hearts, sometimes hardly covering a
cherished solution of The Mystery of Edwin Drood. Cranford and the
novels of Jane Austen—you never know how many delightful
persons cherish them, have them by heart, pore over their text as
over an Ode of Pindar’s. And they are fierce, these devotees, as the
noble new edition of Jane Austen by Mr. Chapman of the Oxford
Press has recently been teaching us. Here are five volumes edited
with all the care that study and affection can lavish on the task. Yet
from here, there and everywhere lovers start up from firesides—
scattered widowers of this dear maiden—challenging over variae
lectiones, feeling for the hilt on the old hip to champion (we’ll say)
“screen” as the right word against “scene” as printed—
II
The sin is the worse because every one acknowledges the Life
of Charlotte Brontë to be—after Boswell’s Life of Johnson, admittedly
beyond competition—among the two or three best biographies in our
language. Conceive the Brontës—not Charlotte alone, but the whole
family—the whole of that terrible family in that terrible parsonage at
Haworth—as this staid lady, wife of a Unitarian minister, faithfully
depicts them—the wastrel son, Branwell: through long nights tearing
his own heart out, with his stern old father’s, in the bedroom they
had, for safety, to occupy together: in the end pulling himself up to
die standing: the shuddering sisters listening on the stairs; Emily,
doomed and fierce, she too in her turn standing up to die. Consider
—I will not say Wuthering Heights, or Charlotte’s well-known
magnificent description, in Villette, of Rachel and her tortured acting
—but consider if only by illustration of contrast this most maddened
poem by Emily—and there are others as tragic—
The Prisoner
Consider, I say, that the authoress of Cranford not only lived with
these fierce women and comforted them as their benign friend, with
a comfort that no soul can give to another without understanding, but
portrayed them (their struggles ended) in a book that combines the
English (even the Victorian English) with the Greek, a fidelity to awful
fact with a serene judgment, a tender mercy—the two so discovering
and covering all, that—whether it be in charity or in justice—its core
of truth has never been challenged: that it stands yet among the
noblest few of English biographies. I put it to you that, if you but set
together those two books—Cranford and the Life of Charlotte Brontë
—at once you must recognise the operating hand—the quietly
operating hand—of genius. But this, even when Mrs. Gaskell’s
longer novels are thrown into the scale, has avoided, I think—
because she herself is so equable, so temperate—its right
recognition. Yes, her very portrait has a Hellenic look, so beautiful it
is, so penetrating its calm gaze.
III
Yet maybe you think it strange that I find so much of high
Hellenic quality in this quiet lady—born a Stevenson, to be sure—but
christened Elizabeth Cleghorn, names not to us reminiscential of
Hybla or the Ilissus. Her father was a Unitarian minister, who
preached in that capacity, in Dob Lane Chapel, Manchester—which
again does not suggest the Acropolis. In 1832 she married a
Unitarian minister, son of a prosperous manufacturer, minister to a
Chapel in Cross Street, Manchester, and prominent on the Home
Missionary Board. For these and some particulars that follow I go to
4
the best sources known to me.
4
Sir Adolphus Ward’s various Introductions to
the Knutsford Edition (8 volumes, published by
John Murray) and the article on her in the
Dictionary of National Biography, by the same
writer, whose scholarship, when devoted to this
dead lady, reaches to a religious note of chivalry.
5
The curious may read it in Blackwood’s
Magazine, Vol. XLI, No. CCIV, or in Sir Adolphus
Ward’s Biographical Introduction.
So you see that she had already made Manchester her home,
and was already interested in the poor.
Also one may interpose here that (without evidence of her
portrait) she was acknowledged by all who met her to be a person of
quite remarkable beauty, and as little conscious of it as any beautiful
woman has any right to be: since as Jaques noted:
if ladies be but young and fair,
They have the gift to know it.
Above all, she had the ineffable charm of being the least
assertive, the most concerned with others, in any company. I think
that of her rather than of any other writing-woman one may quote
Mrs. Browning’s lines on her Kate—
Such a woman, as I trace her portrait, was Mrs. Gaskell, and I think
the end of the story will confirm my reading of her. She made no
show: without interfering she saw beauty in the lives of the poor: she
lived with the misery of Manchester and pitied it; and across a
personal bereavement—or (shall we say?) out of the very anguish of
her own breast—she relieved her heart in her first long book in pity
for that place.
In 1844 Mr. and Mrs. Gaskell revisited Festiniog, in North Wales,
a halt of their wedding tour. They took their children with them; and
at the inn there the eldest daughter caught the scarlet fever. Mrs.
Gaskell removed her with her infant brother to Portmadoc, where he
sickened of the fever and died. It was in search of an anodyne for
sorrow that the mother began to write Mary Barton. Read that book
with just these two or three facts in your mind, and you will find an
illustration—though it almost shames me to give you one so poignant
—of the way in which the sincerest art is begotten and brought forth:
that is, by lifting one’s own experience up to a Universal, and then
bringing it back to reclothe it in imaginary, particular, men and
women.
IV
In two previous lectures, Gentlemen, I have given you—it may
well be ad nauseam—the conditions of life among the industrial poor
of that period as they can be gathered from Blue Books and out of
Hansard. In my last lecture I tried to indicate how they affected the
ambitious (and to that extent selfish) but yet chivalrous mind of
Disraeli. I shall be shorter with Mrs. Gaskell, who invents no political
novel, but just tells the tale and passes on. But she tells it, and I
select here to read to you a passage to illustrate rather how gently
and charitably she tells it than to make out the worst of the case,
which yet may be found in her pages.
6
I should mention here, by the way, on Sir
Adolphus Ward’s authority, the virtual certainty
that before writing her own novel she “had
remained quite unacquainted with both
Coningsby and Sybil.”
She did not go on to exploit that success, that effect. She had
said what she had to say; and having found, in the saying of it, her
gift as a writer, she passed on to other things. A very beautiful
necklace of novels was the result. But this serene indifference to
what might with others have meant a very strong “literary” temptation
implied no failing devotion to the poor whose woes the book had,
once for all, championed. Some eighteen years later, in 1862–3, a
time of trouble came over Manchester and South-west Lancashire in
general, which
called forth one of the most notable, and certainly one of the
best-organized efforts of goodwill and charity which this country
has ever seen. In the long struggle between masters and men,
the times of the Lancashire Cotton Famine, due to the outbreak
and continuance of the American Civil War, brought about a
protracted truce, in which the kindly feelings inspired by the self-
sacrificing efforts of many leading employers of manufacturing
labour cannot but have counted for much.
VI
I shall pass the catalogue of these writings very quickly in review.
The authoress of Mary Barton was hailed at that time, when novels
were yet few and even poetry but beginning to recover its strength,
by great men and by Dickens especially, who engaged her pen for
the first number of his serial adventure, Household Words. In 1853
appeared her second important novel, Ruth (which possibly
influenced Dickens’ own Hard Times, published a year later). Then in
June, 1853, came Cranford, made into a book from papers
contributed to Household Words between December, 1851, and
May, 1853. North and South ran in Household Words from
September, 1854, to January, 1855, and appeared as a book, with
some slight alterations, in that year. In that year also (on March 31st)
Charlotte Brontë died and Mrs. Gaskell consented, at the old father’s
urgent request, to write the Biography. She gave herself up to the
work and finished it in the spring of 1857. The strictures on it—truth,
as Milton says, never comes into the world but as a bastard—broke
her spirit for a while for all but occasional writing: and then came the
cotton famine, of which I have spoken, to tax all her energies. But
after the stress of this they revived. In 1863 appeared Sylvia’s
Lovers, in 1863–4 Cousin Phillis in the pages of the Cornhill
Magazine. In this magazine (August, 1864–January, 1866) followed
her last story, Wives and Daughters, published soon after in that
year as an unfinished work. So you see the whole tale of it lies within
the central years of the last century, beginning with Mary Barton in
1848 and ending sharply just eighteen years after.
VII
I do not propose to discuss the toll of her work this morning. I
wish that those of you who aspire to write, and are here learning to
write, would study it—for two reasons. For the first, while I admit
many flaws, it seems to me elementally of the best literary breeding,
so urbane it is, so disposedly truthful; so much of the world, quizzing
it; so well aware, all the while, of another. For my second, that here
you have, refuting, an exception to all hasty generalisations about
the nineteenth century, the Victorian Age, horsehair sofas, the
Evangelicals, the Prince Consort, the Great Exhibition of 1851 and
all that bagful of cheap rubbish. In 1851 this lady was writing
Cranford: in 1863 she was writing Cousin Phillis: and considering
that most lovely idyll, I am moved to ask, “Do you, at any rate, know
it, this Sicilian yet most English thing of the mid-nineteenth century?”
I am moved to say, “Yes, Keats is lovely, and was lovely to me alas!
before ever you were born: but quit your gushing and your talk about
‘romantic revivals’—which are but figments invented by fellows who
walk round and round a Grecian urn, appraising it scholastically. Quit
it, and try to make a Grecian urn. The horses on the frieze of the
Parthenon are good horses: but you have as good to study to-day or
to-morrow if you will but take a short journey out to Newmarket and
study them. Which is better?—to watch a gallop between two colts
on a heath, or to bend a congested nose over Ferrex and Porrex?”
To be classical is not to copy the classics: to be classical is to
learn the intelligence of the classics and apply just that to this
present world and particularly to this island of ours so familiar and
yet so romantic.
VIII
I spoke, a while back, of three masterpieces of Mrs. Gaskell,
naming two, leaving you to guess the third. Lay by your Cranford,
and take up and study Cousin Phillis.
I suppose its underlying sadness has kept it out of popular
esteem—this tale of scarcely more than a hundred pages—a pale
and shadowy sister of Cranford. It has none, or little of Cranford’s
pawky fun: it has not Cranford’s factitious happy ending. But it beats
me to guess how any true critic can pass it over and neglect a thing
with all that is best in Theocritus moving in rustic English hearts. And
it is not invented. It has in all its movements the suggestion of things
actually seen—of small things that could not have occurred to any
mind save that of an eye-witness—of small recognitions, each in its
turn a little flash of light upon the steady background of rural
England. It is England and yet pure Virgil—as purely Virgilian as the
vignette, in the Fourth Georgic, of the old man of Corycus tilling his
scanty acres:
who yet brought home his own-grown vegetables at night and cast
them on the table, in his mind equal to the wealth of kings. I shall
read you two passages—the first of young Paul’s introduction, by his
cousin Phillis, to her father the ex-minister and Virgilian scholar
turned farmer and labouring with his hinds—
And now let me read you this exquisite passage—there are many
almost as lovely—of Phillis in love, walking with her cousin Paul—
alas! not her beloved.
My eyes, to be sure, are not what they were: but to them the
prose of this shimmers with beauty. In Mrs. Gaskell, as with many
another ageing writer, one can detect towards the close a certain
sunset softness—a haze, we may call it—in which many hard
experiences are reconciled. To take the highest, we agree that it so
happened to Shakespeare. To step down to the man with whom for a
study in the differences of literary genius starting from a like
incentive—the woes of the poor, and operating in the same literary
form, the novel—I have been—I hope, Gentlemen, not whimsically—
contrasting this very noble lady, we know that in his later days, in
Endymion, Disraeli saw his youth so, casting back to it. And you,
maybe, will say that these sunset softening colours are all a mirage.
Well, a great deal of it all is that. I believe that, as you grow older,
you will find yourselves more and more tending to make less, and
still less, account of definitions, of sharp outlines and judgments
based on them; of anybody’s positive assertions, be he never so
young.
IX
I have been speaking, however, to-day of one whose measure in
any light has never to my thinking been accurately taken. The crew
of Odysseus were Greeks. They beached their ship (says Homer) on
the isle of the Laestrygonians: and there came down to them the
Queen of the Laestrygonians, “a woman as tall as a mountain,” and
they hated her. The Victorian Age lent itself to excess; and its
excessive figures are our statues for some to deface or bedaub. But
I, who have purposely compared Elizabeth Gaskell with her most
ornate contemporary, dare to prophesy that when criticism has sifted
all out, she will come to her own, as a woman of genius, sweetly
proportioned as a statue, yet breathing; one of these writers we call
by that vain word—so vain, so pathetic even when used of the
greatest poet—“immortal.”
ANTHONY TROLLOPE
THE BARSETSHIRE NOVELS
I
A few months ago I asked a publisher if he had ever thought of
venturing on a complete edition of Trollope, and was answered that
he had thought of it often, but doubted it would not pay. A few weeks
ago I referred this answer to an eminent bookseller, and he praised
the publisher’s judgment. I retain my belief that the pair of them are
mistaken: for let the name of Trollope be mentioned in any company
of novel-lovers, almost to a certainty one or two will kindle, avow a
passion for him, and start a chorus of lament that there exists no
complete worthy edition of him.
“All Balzac’s novels occupy one shelf”—and all Trollope’s would
occupy a plaguey long one. Some of them, too, are hasty, baddish
novels. None the less, I see that shelf as one of trusted and familiar
resort for such a number of my fellows as would fill a respectable
subscription-list: and, anyhow, it remains a scandal that certain good
works of his—The Eustace Diamonds, for instance—are
unprocurable save by advertising for second-hand copies. Mr.
Humphrey Milford, of the Oxford University Press, has recently
printed The Claverings and The Belton Estate in the World’s
Classics, with the Autobiography, which did, as it happened, about
as much harm as a perfectly honest book could do to an honest
man’s fame. Messrs. Chatto & Windus—whom, as Cicero would say,
“I name for the sake of honour,” as publishers who respect their
moral contract to keep an author’s books alive while they can—have
kept on sale some eight or nine, including The American Senator,
The Way We Live Now, and The Golden Lion of Grandpré; and the
famous Barsetshire six, of which Messrs. George Bell now offer us a
7
cheap and pleasant reprint, have always been (as they say in
Barset) “come-at-able” in some form or another. But while three full
editions of Stevenson have been subscribed for since his death in
1894 (the first of them fetching far more than the original price), and
his sale in cheaper editions has been high and constant, Trollope,
who died in 1882, has, in these forty-odd years, received no
gratitude of public recognition at all answerable to his deserts.
7
Trollope’s Barsetshire Novels: (1) The
Warden, (2) Barchester Towers, (3) Dr. Thorne,
(4) Framley Parsonage, (5) The Small House at
Allington (2 vols.), (6) The Last Chronicle of
Barset (2 vols.) 8 vols. 25s. the set. (Bell &
Sons.)