Download ebooks file A Guide To Programming in Java Java 2 Platform Standard Edition 5 Beth Brown all chapters
Download ebooks file A Guide To Programming in Java Java 2 Platform Standard Edition 5 Beth Brown all chapters
com
https://ebookgate.com/product/a-guide-to-programming-in-
java-java-2-platform-standard-edition-5-beth-brown/
OR CLICK HERE
DOWLOAD NOW
https://ebookgate.com/product/java-2-micro-edition-java-in-small-
things-james-white/
ebookgate.com
https://ebookgate.com/product/programming-in-java-2nd-edition-edition-
choudhary/
ebookgate.com
https://ebookgate.com/product/java-2-a-beginner-s-guide-2nd-edition-
steven-holzner/
ebookgate.com
https://ebookgate.com/product/java-programming-8th-edition-joyce-
farrell/
ebookgate.com
Java Programming 6th Edition Joyce Farrell
https://ebookgate.com/product/java-programming-6th-edition-joyce-
farrell/
ebookgate.com
https://ebookgate.com/product/functional-programming-in-java-
harnessing-the-power-of-java-8-lambda-expressions-1st-edition-venkat-
subramaniam/
ebookgate.com
https://ebookgate.com/product/component-development-for-the-java-
platform-1st-edition-stuart-dabbs-halloway/
ebookgate.com
https://ebookgate.com/product/pentaho-reporting-3-5-for-java-
developers-gorman/
ebookgate.com
JAVA
™
A GUIDE TO
PROGRAMMING IN
Java™ 2 Platform Standard Edition 5
Beth Brown
A Guide to Programming
in Java™
Java™ 2 Platform Standard Edition 5
Beth Brown
Copyright 2005
by
First Edition
16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
The text is written and published by Lawrenceville Press, Inc. and is in no way
connected with the Sun® Corporation.
Sun®, Sun® Microsystems, and Java™ are trademarks or registered trademarks of
Sun Microsystems, Inc. in the United States and other countries.
Microsoft® Microsoft® Windows®, Visual Basic®, and Microsoft® Calculator are
either registered trademarks or trademarks of Microsoft Corporation in the United
States and/or other countries. Screen Shots and Icons reprinted with permission
from Microsoft® Corporation.
Mac OS® and Tiger™ are registered trademarks of Apple Computer, Inc. in the
United States and other countries.
ExamView is a registered trademark of FSCreations, Inc.
“JUNE BUGS” poem by Avis Harley used with permission from Boyds Mills Press.
Names of all other products mentioned herein are used for identification purposes
only and may be trademarks of their respective owners.
Preface
Preface iii
Design and Features
Programming Concepts This text emphasizes the fundamental concepts
of programming so that this knowledge can be applied to other program-
ming languages.
Problem Solving From the very beginning, students are taught to imple-
ment programming solutions with proper algorithm design and code
conventions.
Programming Style Throughout the text, proper programming style
is emphasized so that students can make their applications easy to read,
modify, and debug.
Demonstration Applications and Runs Many demonstration applica-
tions are included, complete with sample runs, so that students are shown
both proper programming techniques and the output actually produced
by an application.
Reviews Numerous reviews are presented throughout each chapter to
provide immediate reinforcement of newly learned concepts. Solutions to
the reviews are included on the Teacher Resource Materials CD.
Case Studies Most chapters end by stating a problem, developing an
appropriate algorithm, and then implementing the solution. The process
of specification, design, implementation, and debugging and testing is
clearly outlined.
Chapter Summaries Each chapter ends by summarizing the concepts
and statements covered in the chapter.
Vocabulary Sections Each chapter contains a vocabulary section that
defines new terms. A separate section lists Java keywords, statements,
and classes.
Critical Thinking Written response questions that require critical think-
ing from the student are included at the end of each chapter.
Exercises Each chapter includes a large set of exercises of varying diffi-
culty, making them appropriate for students with a range of abilities. Most
exercises include a demonstration run to help make clear what output is
expected from the student’s application. Exercises based on previous work
are marked with a ö symbol. Answers to the exercises are included on
the Teacher Resource Materials CD.
Indexes In addition to a standard index, an index of the applications
presented in the text is also included.
Appendix A chart of Unicode symbols is included.
Online Resources Materials that complement and extend this text are free
for download and distribution in your class. Information about various
Java compilers is available. Supplemental chapters cover operating systems,
personal finances, introduction to computers, and keyboarding skills are
also provided. Students can download all the files needed to complete the
reviews and exercises from www.lpdatafiles.com.
Acknowledgments
Special thanks to the many instructors who used this text in their
classroom as it was being written. I would especially like to thank the
following instructors for their many comments and suggestions:
Paul Massey Hanna-Westside Extension Campus
Edward Sapienza Peabody Veterans Memorial High School
Timothy Strohm Churchville-Chili Senior High School
Jackie Kyger Marine Military Academy
Jan Marrelli, a Lawrenceville Press author and editor, has contributed
much to this text. She has used this text as it was being written in her
classroom. The many comments and suggestions from her and her stu-
dents have helped to make this text so clearly written. Jan, an experienced
instructor, has also written many of the critical thinking questions, exer-
cises, and reviews.
Preface v
Elaine Malfas, senior technical editor at Lawrenceville Press, has pro-
duced the format and layout for this text. The many illustrations have been
created by Elaine as well.
Thanks also to Joseph Dupree in our Customer Relations Department
for some of the original drawings included in this text.
The success of this and all of our texts is due to the efforts of Heidi Crane,
Vice President of Marketing at Lawrenceville Press. Joseph Dupree and
Christina Albanesius run our Customer Relations Department and handle
the thousands of orders we receive in a friendly and efficient manner.
Michael Porter is responsible for the excellent service Lawrenceville Press
offers in the shipping of orders.
Preface vii
Chapter 5 – Conditional Control Chapter 8 – Classes and Object-
Structures Oriented Development
After completing Chapter 5, students After completing Chapter 8, students
will be able to: will be able to:
1. Demonstrate the use of decision structures to 1. Understand and instantiate objects.
control the flow of a program. 2. Design and implement a class.
2. Describe how a roundoff error can occur. 3. Apply functional decomposition.
3. Generate random numbers. 4. Apply appropriate naming conventions to a
4. Write compound Boolean expressions. class.
5. Access methods in the Math class. 5. Explain the difference between accessor,
6. Modify existing code. modifier, and helper methods.
7. Develop code with correct and efficient use of 6. Write constructors.
conditional control structures. 7. Compare and contrast instance and class
8. Select appropriate test data. members.
9. Create and modify solutions to problems. 8. Understand class specifications and the
relationships among the classes.
Chapter 6 – Loop Structures and 9. Understand and implement a given class
hierarchy.
Strings 10. Apply encapsulation.
After completing Chapter 6, students
11. Identify reusable code from existing code.
will be able to:
1. Demonstrate the use of repetition control
structures. Chapter 9 – Inheritance and
2. Explain how infinite loops can occur. Polymorphism
3. Differentiate between counters and After completing Chapter 9, students
accumulators. will be able to:
4. Use various tools and techniques to debug an 1. Extend a class using inheritance.
application. 2. Explain an is-a relationship.
5. Manipulate and compare strings using the 3. Implement a subclass.
String class and its methods. 4. Define and demonstrate polymorphism.
6. Develop code with correct and efficient use of 5. Understand abstract classes.
repetitive control structures. 6. Declare and implement an interface.
7. Apply problem solving strategies. 7. Extend existing code using inheritance.
Preface ix
x A Guide to Programming in Java
Table of Contents
Table of Contents xi
Chapter 3 – Introducing Java Chapter 5 – Conditional Control
Why Program in Java? ............................................ 59 Structures
Objects, Classes, and Packages ............................. 59
The if Statement ..................................................... 105
A Java Application .................................................. 61
Roundoff Error ...................................................... 106
Executing a Java Application ................................. 62
Review: SurfsUp – part 1 of 3 ......................... 106
Review: Greeting................................................ 62
The if-else Statement............................................. 106
Displaying Output ..................................................63
Review: SurfsUp – part 2 of 3 ......................... 107
Review: AboutMe – part 1 of 2 .........................64
Review: CircleCircumference – part 2 of 2... 107
Formatting Output..................................................64
Nested Statements ................................................. 107
Review: AboutMe – part 2 of 2 .........................65
Review: Stages .................................................. 107
Code Conventions ...................................................65
The if-else if Statement ......................................... 108
Algorithm Design ................................................... 66
Review: SurfsUp – part 3 of 3 ......................... 108
Chapter Summary .................................................. 67
Review: Discriminant...................................... 108
Vocabulary ............................................................... 69
The switch Statement............................................ 109
Java ............................................................................ 70
Review: Hurricane ........................................... 110
Critical Thinking ..................................................... 71
Generating Random Numbers ............................ 110
Exercises ................................................................... 72
Review: RandomNum ..................................... 111
Compound Boolean Expressions ........................ 112
Review: Delivery .............................................. 113
Chapter 4 – Variables and The Math Class ...................................................... 113
Review: PerfectSquare ..................................... 114
Constants Chapter 5 Case Study ........................................... 114
Declaring Variables.................................................77 Review: RPS – part 1 of 2 ................................ 118
Using Variables ........................................................ 78 Review: RPS – part 2 of 2 ................................ 118
Review: RectanglePerimeter............................. 79 Chapter Summary ................................................ 119
Primitive Data Types .............................................. 79 Vocabulary ............................................................. 120
Review: Distance – part 1 of 2 .......................... 79 Java .......................................................................... 121
Abstract Data Types ................................................80 Critical Thinking ................................................... 122
Java Packages ...........................................................80 Exercises ................................................................. 123
Obtaining a Value from the User .......................... 81
Review: Distance – part 2 of 2 .......................... 82
Numeric Expressions..............................................83
Review: Digits.....................................................84
Chapter 6 – Loop Structures and
Type Casting ............................................................84 Strings
Review: GradeAvg – part 1 of 2 .......................85
The while Statement ............................................. 131
Review: TempConverter ....................................85
The do-while Statement ....................................... 131
Formatting Numeric Output ................................. 86
Infinite Loops ........................................................ 132
Assignment Operators ........................................... 86
Review: Prompter ............................................ 133
Review: GradeAvg – part 2 of 2 ....................... 87
Counters and Accumulators................................ 133
Using Named Constants ........................................ 87
Review: Evens ................................................... 134
Identifiers and Keywords ...................................... 88
Review: NumbersSum .................................... 134
Review: CircleCircumference – part 1 of 2..... 88
Review: PercentPassing ................................... 134
Programming Errors .............................................. 88
The for Statement .................................................. 135
Chapter 4 Case Study .............................................90
Review: Factorial .............................................. 136
Chapter Summary .................................................. 93
Review: OddSum ............................................. 136
Vocabulary ............................................................... 95
Debugging Techniques ........................................ 136
Java ............................................................................ 96
Review: Variable Trace .................................... 137
Critical Thinking ..................................................... 97
The String Class .................................................... 138
Exercises ................................................................... 99
Review: AccountSetup .................................... 139
Comparing Strings................................................ 140
Review: FormalGreeting ................................. 141
Chapter 7 – Methods
Program Development Using Methods ............. 157
Chapter 9 – Inheritance and
Writing Methods ................................................... 159 Polymorphism
Review: TimeConverter................................... 160
Extending a Class .................................................. 213
Method Parameters............................................... 160
Implementing a Subclass ..................................... 214
Review: SpanishNumbers .............................. 161
Review: Puck – part 1 of 2 ............................... 216
Review: DisplayBox – part 1 of 2 ................... 162
Polymorphism ....................................................... 217
Method Overloading ............................................ 162
Review: Music – part 1 of 2 ............................. 221
Review: DisplayBox – part 2 of 2 ................... 163
Abstract Classes ....................................................222
The return Statement ............................................ 163
Review: Music – part 2 of 2 .............................225
Review: Exponentiation .................................. 164
Interfaces ................................................................225
Documenting Methods ........................................ 164
Review: Disk ..................................................... 227
Review ............................................................... 165
Review: Puck – part 2 of 2 ............................... 227
Chapter 7 Case Study ........................................... 165
Review: Rectangle – part 4 of 4 ...................... 227
Review: GradeConverter ................................. 171
Review: Rectangle – part 4 of 5 ...................... 227
Chapter Summary ................................................ 171
Chapter 9 Case Study ........................................... 227
Vocabulary ............................................................. 173
Review: SalesCenter.........................................234
Java .......................................................................... 173
Chapter Summary ................................................234
Critical Thinking ................................................... 174
Vocabulary ............................................................. 236
Exercises ................................................................. 175
Java .......................................................................... 236
Critical Thinking ................................................... 237
Exercises ................................................................. 238
Chapter 8 – Classes and Object-
Oriented Development
What is an Object? ................................................ 179
Chapter 10 – Arrays
Designing and Writing a Class ........................... 180 Declaring Arrays ................................................... 239
Review: Circle – part 1 of 4 ............................. 182 Using Arrays .......................................................... 240
Review: Coin – part 1 of 2 ............................... 182 Review: StudentRoster .................................... 241
Writing Constructors ............................................ 183 Review: Squares ............................................... 241
Review: Circle – part 2 of 4 ............................. 184 Review: Reverse ............................................... 241
Review: Rectangle – part 1 of 5 ...................... 184 Array Parameters .................................................. 241
Instance and Class Members............................... 184 Arrays with Meaningful Indexes ....................... 242
Review: Circle – part 3 of 4 ............................. 185 Review: DiceRolls – part 1 of 2 ....................... 243
Review: Rectangle – part 2 of 5 ...................... 185 Review: DiceRolls – part 2 of 2 ....................... 243
The Object Class .................................................... 185 Review: NumberCounts.................................. 243
Review: Circle – part 4 of 4 ............................. 187 Characters and Arrays ......................................... 244
Review: Rectangle – part 3 of 5 ...................... 187 Review: CountLetters ...................................... 246
Review: Coin – part 2 of 2 ............................... 187 Review: NameBackwards ............................... 246
Classes Using Classes ........................................... 187 Searching an Array ............................................... 246
Review: Bank .................................................... 191 Review: FindName .......................................... 247
Object-Oriented Development ............................ 191 Two-Dimensional Arrays ..................................... 247
Review: Carnival .............................................. 195 The ArrayList Class .............................................. 252
Appendix A – Unicode
Unicode ................................................................... 381
Index
Index ....................................................................... 383
Table of Contents xv
xvi Table of Contents
Chapter 1
An Introduction to Computers
e
Desktop Computing
pl
TIP Desktop computers are
referred to as either PCs or
MACS.
A desktop computer and its components are designed to fit on or under
a desk:
�������
���������
���������������
����������
�������
m
��������
�����
e
The Intel Pentium 4 (P4) CPU
has a clock rate of 3.06 GHz.
The AMD Opteron CPU has a ����� ������ ������
clock rate of 2.4 GHz. These
CPUs contain more than 40
pl
million transistors on a single
chip.
���
e
forecasting and nuclear energy of hard disk space. The hardware requirements are based on what will
research.
be needed to allow the OS software to properly manage the computer’s
tasks. The term platform is sometimes synonymous with environment.
pl Environment types vary widely and can refer to the computer type or
the way the user interacts with the computer as well as the software/hard-
ware configuration. A desktop environment refers to a desktop or notebook
computer running an OS designed for the typical hardware found in a
desktop or notebook computer. A multiuser environment is sometimes called
time sharing because each user gets a portion of the processor’s “time.”
A distributed environment shares the load of processing among several
computers. When discussing environments, a distinction is usually made
m
between multiprocessing and multitasking. A multiprocessing environment
means that more than one processor is being used for executing an appli-
cation, and a multitasking environment is one in which processing time for
TIP For information on a multiple applications is divided among one processor. Most environments
specific operating system, refer
run an OS with a graphical user interface (GUI):
to the appropriate chapter at
sa
Lvp.com.
e
pl
m
sa
Windows XP Utilities
Mobile Computing
Improved technology has allowed the miniaturization of computer
components and special long-lasting batteries. Computers now come
in many shapes, sizes, and with many levels of features. Among these
Bluetooth computers are notebooks, tablets, handhelds, smart phones, and wearables.
Blueto oth is a wireless Because of their portability, these types of computers are classified as
technology used to allow mobile computing devices:
mobile computing devices to
communicate. • A notebook computer is a portable, lightweight computer with a
CPU, memory, and hard disk space comparable to that of a typical
desktop computer.
• A tablet PC is a computer designed similar to a pad of paper and
a pencil. Users simply “write” on a screen with a device called a
stylus that is shaped like a thin pencil. Handwriting recognition
software is used to interpret a user’s handwriting. A keyboard can
also be attached.
e
and contain other features usually found in a handheld PC.
cross-platform connectivity One issue involved with using so many types of PCs is cross-platform
connectivity, which is the ability for one type of PC to link to and share
data with a different type of PC. Notebook and desktop PCs typically have
instructions.
Programming languages can be classified as low-level and high-level
languages. Low-level programming languages include machine language
and assembly language. Machine language, which is referred to as a first
generation programming language, can be used to communicate directly
with the computer. However, it is difficult to program in machine language
because the language consists of 0s and 1s to represent the status of a
switch (0 for off and 1 for on). Assembly language uses the same instruc-
tions and structure as machine language but the programmer is able to
Fourth and Fifth use meaningful names or abbreviations instead of numbers. Assembly
Generation Languages language is referred to as a second generation programming language.
Fourth generation languages
(4GL), such as SQL, have High-level programming languages, which are often referred to as third
higher English-like instructions generation programming languages (3GL), were first developed in the late
than most high-level languages 1950s. High-level programming languages have English-like instructions
and are typically used to access and are easier to use than machine language. High-level programming
databases. Fifth generation languages include Fortran, C, Basic, COBOL, and Pascal. In order for the
languages are used for artificial
computer to understand a program written in a high-level language, pro-
intelligence.
grammers convert the source code into machine language using a compiler
or an interpreter. A compiler is a program that converts an entire program
Networks
A network is a combination of hardware and software that allows
e
computers to exchange data and share software and devices, such as
printers. Networks are widely used by businesses, universities, and other
organizations because a network:
Area Network) are network large geographical distances. A WAN can be one widespread network or
technologies classified by the it can be a number of LANs linked together.
size of a network. A MAN is a
high-speed network that typi- The computers and other devices in a LAN each contain an expansion
cally connects LANs within a card called a network interface card:
city or town. A HAN is used
to connect personal devices
within the home.
e
bits per second (bps). Each determines how network resources are handled. Two common models are
transmission media has a spe-
peer-to-peer and client/server. In a peer-to-peer network, each computer on
cific length or range restric-
tion, data transmission rate,
the network is considered equal in terms of responsibilities and resource
and cost. sharing. A client/server network consists of a group of computers, called
pl Ethernet
clients, connected to a server. A server is a computer with more RAM, a
larger hard disk, and sometimes multiple CPUs that is used to manage
network functions.
Physical topology refers to the arrangement of the nodes on a network.
A node is a location on the network with a device capable of processing
information, such as a computer or a printer. There are three common
physical topologies:
m
The Ethernet LAN protocol was
• The bus topology is a physical LAN topology that uses a single cen-
developed by Bob Metcalfe in
1976. Ethernet uses a bus or tral cable, called the bus or backbone to attach each node directly:
star topology with twisted-
pair wiring, coaxial cable,
or fiber optic cable transmis-
sion media. Newer protocols
sa
Baseband and
Broadband Technology
Most LANs use baseband
technology which means the
e
transmission media carries one LAN using a star topology
signal at a time. Broadband
technology allows for data • In a ring topology, each node is connected to form a closed loop.
transmission of more than one A LAN with a ring topology can usually cover a greater distance
pl
signal at a time and is found in
cable television transmission.
than a bus or star topology:
m
Wi-Fi
sa
logical topology Another type of topology is logical topology, which refers to the way data
is passed between the nodes on a network. A LAN’s logical topology is
not always the same as its physical topology.
Number Systems
The electrical circuits on an IC have one of two states, off or on. Therefore,
binary number system the binary number system (base 2), which uses only two digits (0 and 1), was
adopted for use in computers. To represent numbers and letters, a code
e
was developed with eight binary digits grouped together to represent a
bit single number or letter. Each 0 or 1 in the binary code is called a bit (BInary
byte digiT) and an 8-bit unit is called a byte.
base 10 Our most familiar number system is the decimal, or base 10, system. It
pl uses ten digits: 0 through 9. Each place represents a power of ten, with
the first place to the left of the decimal point representing 100, the next
place representing 101, the next 102, and so on (remember that any number
raised to the zero power is 1). In the decimal number 485, the 4 represents
4×102, the 8 represents 8×101, and the 5 represents 5×100. The number 485
represents the sum 4×100 + 8×10 + 5×1 (400 + 80 + 5):
Decimal Base 10 Equivalent
m
485 4×102 + 8×101 + 5×100 = 400 + 80 + 5
base 2 The binary, or base 2, system works identically except that each place
represents a power of two instead of a power of ten. For example, the
binary number 101 represents the sum 1×22 + 0×21 + 1×20 or 5 in base ten.
Some decimal numbers and their binary equivalents are:
sa
e
where mega represents 220 or 1,048,576 bytes and GB stands for gigabytes,
which is 230 or 1,073,741,820 bytes.
Data stored in memory is referred to by an address. An address is a
pl unique binary representation of a location in memory. Therefore, data
can be stored, accessed, and retrieved from memory by its address. For
data to be addressable in memory, it must usually be at least one byte in
length. For example, to store JIM in memory each character is converted
to Unicode and stored in two bytes of memory with each memory location
designated by its address:
m
Because JIM is a character string, it will probably be stored in adjacent
memory addresses.
What is a File?
A file is related data stored on a persistent media. A file can be an appli-
cation (program) or the product of an application. For example, a word
File Size Limitations processor application is used to create document files. As another example,
File size can be decreased a digital camera is used to create photo files. A file is stored on a persistent
or compressed using a media so that it is retained even after the computer or computerized device
e
compression program, such
is turned off. A file can be used over and over again whenever the data it
as WinZip. This technique is
often used to accommodate
stores is needed.
storage device and e-mail A file is really just 1s and 0s because it is stored in binary code. Computers
account limitations.
Internal devices are drives mounted inside the PC case. These devices
can include hard disk, CD/DVD, disk, tape, Zip, and Jaz drives. Except for
the Iomega® RRD (Removable Rigid Disk) system, which uses a removable
media, hard drives typically have permanently installed disks that are not
accessible from outside the PC case. Other devices have an external slot
for removable storage media.
e
External devices have a stand-alone drive housing and connect to a
computer’s USB port with a cable. USB (Universal Serial Bus) is a standard-
ized technology with data transfer rates up to 480 Mbs. As many as 127
devices can be connected to a single port with USB hubs.
pl External drives offer the advantage of portability because they can be
easily moved to other computers that support the technology. External
devices include hard disk, RRD, CD/DVD, diskette, tape, Zip, and Jaz
drives. Except for the hard disk drive, these drives have removable
media.
Ultra-portable devices include keychain, watch, mini drive, and mouse
storage to name just a few. These external devices are small and easy-to-
m
use, but currently more expensive than comparable storage devices that
are larger in size. Most ultra-portable devices, including the keychain and
mini drive, have storage media attached directly to a USB plug that is con-
nected to a USB port. The watch and mouse storage devices use a cable
with a USB plug to connect to a USB port. The watch has a short cable and
USB plug hidden in the band. The mouse storage device requires a longer
sa
e
1.44MB (a floppy diskette) to many gigabytes (hard disk drives with many
platters). Optical technology includes CDs that can store about 700MB of
data, while DVDs can store at least 4GB of data. Solid-state devices store
from 64KB of data to many gigabytes.
Storage Media
The capacity of storage media
varies. For example, a disk has
Storage media can be very sensitive. Care should be taken to avoid
damaging files:
• Never attempt to open a case containing a disk.
• Keep magnetic media away from magnets.
• Handle CD/DVDs by the center hole or by the edges.
• Never bend CD/DVDs or other flexible media.
a storage capacity of 1.44 MB,
m
a CD has a storage capacity • Store CD/DVDs in a jewel case or sleeve to prevent scratches.
of 650 MB, and a DVD has a
storage capacity of over 4GB. • Keep media away from moisture and extreme temperatures.
Telecommunications
Telecommunications is the transmitting and receiving of data. Data can be
in various forms including voice and video. Telecommunications requires
e
TIP Access to the Internet a modem or adapter and a line or cable. The speed of data transmission
requires telecommunications
and the use of an Internet
(sending) and receipt (receiving) is measured in Kbps (thousands of bits
Service Provider (ISP). per second) or Mbps (millions of bits per second). Numerous telecommu-
nications options are available, which vary in speed and cost:
pl • A conventional modem uses standard telephone lines to convert
analog signals to digital data. A conventional modem is a 56 Kbps
modem, which transmits data at 28.8 Kbps and 36.6 Kbps, and
receives data at 56 Kbps. Home computers sometimes use a con-
ventional modem.
• A DSL (Digital Subscriber Line) modem uses standard telephone
TIP In a wireless network, a
router/wireless access point is lines with data transmission up to 640 Kbps. Data receipt is from
m
typically connected by a cable 1.5 Mbps to 9 Mbps. A DSL (Asymmetric DSL) is the most common
to a cable or DSL modem. form used.
• A cable modem transmits data through a coaxial cable television
network. Data transmission is from 2 Mbps to 10 Mbps and data
receipt is from 10 Mbps to 36 Mbps.
sa
Blog
e
Blog is short for weblog and is
a type of website where users
can post entries in a journal
format.
pl
m
A web page that is part of the New York Times website
Another widely used Internet service is e-mail or electronic mail, which
is the sending and receiving of messages and computer files over a com-
munications network, such as a LAN (Local Area Network) or the Internet.
sa
E-mail software is also required for sending and receiving e-mail mes-
sages. Examples of e-mail software include Outlook, Outlook Express,
Instant Messaging and Eudora. Browser-based e-mail only requires a web browser and is
Instant messaging is a com- available through sites such as Yahoo! and Hotmail.
munication tool that allows
for real time or immediate text-
based communication.
e
• Be considerate of other people’s beliefs and opinions.
Spam
When sending e-mail at work or school, it is important to remember
Along with personal and
that employers and school administrators have the right to read any e-mail
pl
busine ss me ssage s, most
people also receive a lot of
“junk e-mail” or spam. Most
e -mail sof t ware includes
features to filter and block
messages from spe cif ic
senders.
messages sent over the corporate or school network, as well as the right to
track online activity.
A mailing list server is a server that manages mailing lists for groups of
users. Two mailing list servers are Listserv and Majordomo. Often users
subscribe to mailing lists for discussion purposes. When a subscriber posts
a message to a mailing list server, every subscriber receives a copy of the
message. Subscribers are identified by a single name or e-mail address.
m
Finding Information on the Web and
Downloading Files
sa
e
one word or the other or both teria florida OR hotel returns links to pages containing either of
NOT locates pages that
the words.
include the first word, but not • The – (minus sign) is used to exclude unwanted Web pages. For
the second word
pl
A boolean expression always
evaluates to TRUE or FALSE
with pages that match the
search condition evaluating to
TRUE.
example, the search for shakespeare –play returns hyperlinks to
pages containing the word shakespeare, but eliminates pages that
also contain the word play. NOT can be used in place of – in most
search engines.
Some search engines provide a subject tree, or web directory, which is a
list of sites separated into categories. The term subject tree is used because
many of the categories “branch” off into subcategories. These subcategories
allow the user to narrow down the subject and display a list of appropriate
m
hyperlinks, which are at the lowest level of the tree.
TIP Just because a file is Information on a website is sometimes in the form of a downloadable
available on a website for file. Downloading is the process of copying a file from a website to the
download does not mean that user’s computer. For example, virus definitions can be downloaded from a
it is legal to download the file. antivirus software company’s website and software updates can be down-
sa
Downloading copyrighted loaded from the software company’s website. When a file is downloaded,
files that have not been made
the user specifies where the file should be saved on the local computer.
freely available is a violation of
copyright law.
Files should only be downloaded from known, authentic websites since
downloadable files are often associated with viruses.
If information from a website is to be referenced or quoted in a report,
essay, or other document, a citation must be used to give credit to the
original author and allow the reader to locate the cited information. A
widely accepted form for citation is published by the Modern Language
MLA Association (MLA) in its publication MLA Handbook for Writers of Research
Papers, Fourth Edition.
In general, a citation for material located at a website should look similar
to:
Author's Last Name, First Name MI. Site Title. Access date.
Organization name. <URL>.
e
Spyware technique known as online profiling. When a commercial website is visited,
Spy ware is sof t ware that information about the user may be collected using various methods such
uses the Internet to gather as cookies or web beacons.
personal information from an
pl
unsuspecting user. Spyware
is unknowingly downloaded
and installed with another file,
such as freeware or shareware
programs.
A cookie is a text file created by the server computer when a user enters
information into a website. The cookie file is then stored on the user’s
computer and accessed each time the user visits that website. Cookies
are often created when online purchases are made. Although cookies can
only store information that the user has selected or entered, their use has
raised concerns over privacy issues.
Web beacons, also called web bugs or pixel tags, are tiny, transparent
IP Address graphics located on web pages or in e-mail messages that are used in
m
combination with cookies to collect data about web page users or e-mail
An IP address is an identifier
for a computer or device on a senders. Usually the monitoring is done by an outside advertising company.
TCP/IP network. The information a web beacon collects includes the IP address of the
computer, the URL being visited, the time the web page was viewed, the
type of browser being used, and the cookie file.
sa
TIP A website’s privacy policy Before providing a company with personal information through a
is typically found as a link at website, check the site’s privacy policy. A privacy policy is a legally binding
the bottom of the home page document that explains how any personal information will be used.
of a website.
The Internet has opened up access to many files that were previously
inaccessible. To protect both the privacy of an individual and the accuracy
of data stored about individuals, several laws have been passed:
• The Electronic Communications Privacy Act of 1986 (ECPA)
makes it a crime to access electronic data without authorization.
It also prohibits unauthorized release of such data.
• The Electronic Freedom of Information Act of 1996 (E-FOIA)
NET Act requires federal government agencies to make certain agency
information available for public inspection and is designed to
The NET (No Electronic Theft)
Act of 1997 closed a loophole improve public access to agency records by making more informa-
in the law which allowed copy- tion available online.
righted material to be given • The Children’s Online Privacy Protection Act of 1998 (COPPA)
away on the Internet without
requires commercial websites that collect personal information
any legal penalty.
from children under the age of 13 to obtain parental consent.
e
Internet Filtering • Use appropriate language.
Software
• Do not reveal personal address or phone numbers.
Many schools and organiza-
tions install Internet filtering • Do not access, upload, download, or distribute inappropriate
pl
software to block offensive
material.
materials.
• Do not access another user’s account.
• Use of the network for private business is prohibited.
• Only administrator installed software may be used on the com-
puters. Adding, deleting, or modifying installed software is not
permitted.
m
The Social and Ethical Implications of
Computer Use
The society in which we live has been so profoundly affected by
sa
information age computers that historians refer to the present time as the information age.
This is due to the our ability to store and manipulate large amounts of
information (data) using computers. As an information society, we must
consider both the social and ethical implications of our use of computers.
By ethical questions we mean asking what are the morally right and wrong
ways to use computers.
ergonomics Ergonomics is the science that studies safe work environments. Many
health-related issues, such as carpal tunnel syndrome and computer vision
syndrome (CVS) are related to prolonged computer use.
Power and paper waste are environmental concerns associated with
computer use. Suggestions for eliminating these concerns include recycling
paper and printer toner cartridges and turning off monitors and printers
when not in use.
Employee monitoring is an issue associated with computers in the work-
place. It is legal for employers to install software programs that monitor
employee computer use. As well, e-mail messages can be read without
employee notification.
e
improper use of data stored in computer files:
• The Fair Credit Reporting Act of 1970 gives individuals the right
to see information collected about them for use by credit, insur-
pl ance, and employment agencies. If a person is denied credit they
are allowed to see the files used to make the credit determination.
If any of the information is incorrect, the person has the right to
have it changed. The act also restricts who may access credit files
to only those with a court order or the written permission of the
individual whose credit is being checked.
• The Privacy Act of 1974 restricts the way in which personal data
can be used by federal agencies. Individuals must be permitted
m
access to information stored about them and may correct any infor-
mation that is incorrect. Agencies must insure both the security
and confidentiality of any sensitive information. Although this law
applies only to federal agencies, many states have adopted similar
laws.
sa
e
destroy data when a certain time is reached. A virus is easily duplicated
when the file is copied, which spreads it to other computers.
Trojan horse A Trojan horse program appears as something else, usually a program
that looks trustworthy. Running the program runs the malicious code
pl antivirus programs
and damages files on the computer. A worm is a program that is able to
reproduce itself over a network. Worms are a threat because of the way
they replicate and use system resources, sometimes causing the system
to shut down.
Malicious code has become so widespread that software called antivirus
programs must be installed on computers and networks to detect and
remove the code before it can replicate or damage data. Precautions can
m
also be taken to prevent damage from malicious code:
• Update antivirus software. An antivirus program can only detect
the viruses, Trojan horses, and worms it is aware of. Antivirus
programs have a web link for updating the virus definitions on
the computer containing the antivirus program.
sa
crackers, hackers Newspapers have carried numerous reports of crackers, or hackers, gain-
ing access to large computer systems to perform acts of vandalism. This
malicious act is illegal and can cause expensive damage. The Electronic
Communications Privacy Act of 1986 specifically makes it a federal offense
to access electronic data without authorization. Networks usually include a
firewall, which is a combination of hardware and software, to help prevent
unauthorized access.
The willful destruction of computer data is no different than any other
vandalizing of property. Since the damage is done electronically the
result is often not as obvious as destroying physical property, but the
consequences are much the same. It is estimated that computer crimes
cost billions of dollars each year.
e
have created many new job
opportunities in the IT field. In addition to ensuring system reliability, an IT professional must take
IT careers include data-entry responsibility for the ethical aspects of the career choice. For example,
operator, systems analyst,
IT professionals involved in creating software must ensure, as best he or
p r o g r a m m e r, c o m p u t e r
pl
e n g in e e r, a n d t e c h ni c al
support technician.
she can, the reliability of the computer software. This means the ethical
responsibility of the IT professional includes using the appropriate tools
and methods to test and evaluate programs before distribution. A special
cause for concern is the increased use of computers to control potentially
dangerous devices such as aircraft, nuclear reactors, or sensitive medical
equipment.
IT professionals must also consider the impact they have on computer
users. Web users for example often rely on data from websites providing
m
real-time information. The information displayed is determined with a
program written using a 4GL or other language that accesses a database.
The IT professionals involved in such a project have the ethical respon-
sibility to possibly millions of individuals for ensuring, as best they can,
accurate data retrieval.
sa
Chapter Summary
A desktop computer and its components are designed to fit on or under
a desk. Mobile computers include notebooks, tablets, handhelds, smart
phones, and wearables. A computer must run operating system (OS)
software in order to control processing and peripherals, run application
software, and control input and output, among other tasks.
e
Japanese, Cherokee, and so on) and symbols of every culture (=, @, ½, and
so on) have been given a representation in a digital code called Unicode.
Computer memory, file sizes, and storage device capacities are measured
in bytes. In computers and electronics MB stands for megabytes, GB stands
pl
for gigabytes, and K stands for kilobytes.
The binary representation of an integer number is usually stored in four
bytes of memory. Real numbers are numbers that contain decimal points
and the binary representation of a real number is usually 4 to 8 bytes of
memory.
A file is related data stored on a persistent media. A file is really just 1s
m
and 0s because it is stored in binary code. Computers are programmed to
translate bytes and words into symbols. File types are distinguished by
the extension that comes after the file name. Folders are used to organize
commonly related files.
Storage devices use a persistent media to maintain files. These devices,
which are also referred to as drives, mass storage, and auxiliary storage,
sa
e
tial for the use of computers to invade our right to privacy has prompted
legislation to protect individuals. Piracy is the illegal act of duplicating
software without permission. A virus is a computer file that erases data
and can cause considerable damage.
pl Working as an IT (information technology) professional includes taking
responsibility for the ethical aspects of a career choice. IT professionals
must also consider the impact they have on computer users.
m
sa
Address A unique binary representation of a location Cookie Text file created by the server computer
in memory. when a user enters information into a website.
Address bus Carries memory addresses that indi- Copyright Protects a piece of work from reproduc-
cate data storage locations. tion without permission from the work’s author.
ALU (Arithmetic Logic Unit) The part of the CPU CPU (Central Processing Unit) Processes data and
that handles arithmetic and logic operations. controls the flow of data between the computer’s
other units. Also contains the ALU. Located on the
Antivirus program Software installed on computers
motherboard.
and networks to detect and remove viruses.
Cracker Person who accesses a computer system
Applications software Program written to perform
without authorization.
a specific task.
Cross-platform connectivity The ability of one
Base unit Housing that contains the mother-
type of PC to link to and share data with a different
e
board, CD-RW/DVD drive, disk drive, and hard
type of PC.
disk drive.
Dedicated line See Leased line.
Binary number system Number system used by
computers that uses only digits 0 and 1. Also called Device driver One type of utility program.
pl
base 2.
Bit (BInary digiT) A single 0 or 1 in binary code.
Bus A central network cable. Also a set of circuits
that connect the CPU to other components.
Bus topology A physical LAN topology that uses a
single central cable to attach each node directly.
Downloading The process of copying a file from
a website to the user’s computer.
DSL (Digital Subscriber Line) modem A modem
that uses standard telephone phone lines. ADSL is
the most common form used.
E-mail (electronic mail) The sending and receiving
m
of messages and electronic files over a communica-
Byte A group of 8 bits.
tions network such as a LAN or the Internet.
Cable modem A modem that transmits data through
Environment A computer’s hardware and soft-
a coaxial cable television network.
ware configuration. Also referred to as platform.
Cache High-speed memory used to store frequently Environment types include desktop, multiuser, net-
sa
used data so that it can be quickly retrieved by an work, handheld, distributed, multiprocessing, and
application. multitasking.
Client A computer that is sent information from a Ergonomics The science that studies safe work
server computer. environments.
Client/server network A type of network that Extension Added after a file name to distinguish
consists of a group of computers, called clients con- file types.
nected to a server computer.
Extranet An extended intranet that provides vari-
Clock rate The speed at which a CPU can execute ous levels of access to authorized members of the
instructions, measured in megahertz or gigahertz. public.
Compiler A program that converts an entire pro- Expansion boards Circuit boards that connect to the
gram into machine code before the program is motherboard to add functionality to the computer.
executed.
File A collection of related data stored on a lasting
Control bus Carries control signals. medium.
Conventional modem A modem that uses stan- Firewall A network security system that prevents
dard telephone lines to convert analog signals to unauthorized network access.
digital data.
Handheld computer A mobile computing device. Low-level programming languages First and
second generation programming languages including
Hardware The physical components of the computer, machine language and assembly language.
such as the monitor and system unit.
Mailing list server A server that manages mailing
Hexadecimal system Number system based on 16 lists for groups of users.
digits. Also called base 16.
Magnetic technology Storage device technology that
High-level programming languages Third uses a mechanical drive with tiny electro-magnetic
generation programming languages that have heads for reading and writing data to media.
English-like instructions.
Match A web page that contains the search
Hub A communication device that joins communica-
e
criteria.
tion lines at a central location on the network.
Mbps Millions of bits per second.
Information age Present time characterized
by increasing dependence on the computer’s Megabytes (MB) Approximately one million
pl
ability to store and manipulate large amounts of
information.
Input device Device used to enter data and instruc-
tions into the computer.
Integrated circuits (ICs) A silicon wafer with intri-
bytes.
Megahertz (MHz) Million of cycles per second.
Memory-resident A program that is always in
memory.
Minus sign (–) Used in search criteria to exclude
cate circuits etched into its surface and then coated
unwanted web pages.
with a metallic oxide that fills in the etched circuit
m
patterns. Also called a chip. Modern Language Association (MLA) Organization
that publishes standards used for citations.
Interactive Information accessed as a result of
selections made by the user. Motherboard The main circuit board inside the
base unit.
Internet The largest and most widely accessed
network. Netiquette The etiquette that should be followed
sa
IT (Information Technology) A term that Network operating system Software that allows
encompasses all aspects of computer-related users and devices to communicate over a network.
technology.
Node A location on the network capable of processing
Kbps Thousands of bits per second. information, such as a computer or a printer.
e
Overflow error An error that occurs when the num-
ber of bits that are needed to represent the integer Server A computer used to manage network func-
is greater than four bytes. tions such as communication and data sharing.
Over writes Updates an original file with Smartphone Cellular phone that is able to send and
pl
changes.
Peer-to-peer network A type of network that does
not have a server.
Peripheral device A device attached to a PC.
Phishing The act of sending an e-mail to a user
falsely claiming to be a legitimate business in an
receive e-mail messages and access the Internet.
Solid state technology Storage device technology
that requires no moving parts.
SRAM (Static Random Access Memory) High-
speed memory referred to as cache.
Star topology A physical LAN topology where
m
attempt to trick the user into revealing personal each node is attached to a hub.
information that could be used for crimes such as
identity theft Storage devices Devices that use persistent media
to maintain files. Also referred to as drives, mass
Piracy Illegally copying or distributing software. storage, and auxiliary storage.
Plus sign (+) Used in search criteria to limit a search Subject tree A list of sites separated into
sa
Real numbers Numbers that contain decimal Trojan horse Malicious code in the form of a program
points. that appears as something else, usually a program
that looks trustworthy.
Real time Occurs immediately.
e
Wearable computer A mobile computing device
that is incorporated into clothing, eyewear, wrist-
wear, and other wearables.
Web See World Wide Web.
pl
Web beacon A tiny, transparent graphic located on
a web page used to collect data about the web page
user. Also called a web bug or pixel tag.
Web browser Interprets an HTML document to
display a web page.
Web directory See Subject tree.
m
Wireless network A type of network that does not
require the use of cables.
Word Bits grouped in units of 16 to 64.
World Wide Web The most widely used Internet
sa
3. Describe the flow of data between the compo- 16. List three netiquette rules.
nents of a computer, starting with input.
17. Explain why the binary number system was
4. a) Describe one difference between operating adopted for use in computers.
system software and applications software.
b) Describe three different types of operating 18. a) What is the decimal equivalent of 1112?
e
systems. b) What is the decimal equivalent of 2C16?
c) What does environment refer to?
19. What is Unicode?
5. What is a utility program? Give an example.
20. a) How many bytes of data can 512 MB of RAM
6.
7.
8.
9.
plList four types of mobile computing devices.
13. a) What is a network operating system? 27. List four rules that should be followed to avoid
b) What does a network environment refer damaging files stored on disks or CD/DVDs.
to?
28. a) What is the difference between an intranet
14. Describe two common network architecture and an extranet?
models. b) Who controls the Internet?
e
e) List one example of a browser-based e-mail 42. Locate a website’s privacy policy and document
site. its contents.
33. a) Explain why sending an e-mail message 43. Name and briefly describe one law that helps
pl should be thought of the same as sending a
postcard.
b) List three examples of e-mail etiquette.
35. Write search criteria to locate web pages that 46. a) What is necessary for a federal government
contain the following information: authority to access an individual’s financial
a) restaurants in Los Angeles records?
sa
36. List a search engine that provides a subject 48. What ethical responsibilities does an IT
tree. professional have?
e
j) Information found at a website is always
accurate.
k) The present time is referred to as the
industrial age.
pl
l) Ergonomics is the science that studies safe
work environments.
m) A virus is a harmless computer game.
m
sa
Exercise 1 ——————————————————————————
In this exercise you will research your classroom computer network by answering a series of
questions:
e
g) What operating system is used?
h) Describe your workstation’s environment.
i) What telecommunication option is used?
pl j) Does the school have an intranet?
k) List four rules on the school’s Internet Use Agreement.
Exercise 2 ——————————————————————————
m
In this exercise you will assess the input and output devices you have access to.
Exercise 3 ——————————————————————————
In this exercise you will organize your existing files. You may need to refer to the appropriate operating
system chapter on www.lpdatafiles.com to complete this exercise.
a) Examine the files you currently have saved on your computer. Use the appropriate
operating system command to rename any files that do not have descriptive names.
b) Use the appropriate operating system commands to organize your existing files into
appropriate folders.
a) Conduct a search on the Internet using at least two search engines to find three web
pages that have information about Carpal Tunnel Syndrome.
b) Write a brief description of the injury.
c) In a second paragraph, write about possible treatments for the injury.
d) Write a citation for each source.
Exercise 5 ——————————————————————————
Expand on the information presented in this chapter by researching one of the following topics:
e
• Network Protocols
• Operating Systems
• The History of the Internet
a) Use the Internet, magazines, and books to find at least three sources of information.
b) Write a two page report that summarizes your research.
c) Write a citation for each source.
m
Exercise 6 ——————————————————————————
In this exercise you will research and compare the advantages and cost of obtaining Internet access
through three different telecommunication options.
sa
a) Use the Internet and newspapers to find information about Internet service providers
(ISPs).
b) Compare the costs and the advantages of at least three different telecommunication
options.
c) Write a one paragraph conclusion that explains what telecommunication option would
be the best choice.
d) Write a citation for each source.
Title: It
Language: English
As it stood him up, he tried again. Its punishment made him faint.
But that was a moral victory for him. If it became over-emotional
and killed him, that would be a moral victory too. With the death of
Grimes, he had lost interest in survival, but the thing had not. He
suspected it knew it was the last of its species. Probably its drive for
survival and reproduction was tremendous. If he were to die, the
thing, like the tiny model parasite in his pocket, would be without
means of locomotion. A helpless sack and a mouth, that's all it
would be if he were dead.
It walked his body unerringly through pitch darkness to the
refrigerator room, picked up the rifle by the barrel, ran his fingers
over the smashed front sight, down the barrel, over the electro-coil
and onto the action. When it started pulling the switches while the
muzzle still leaned against his chest, he became hopeful that the end
was in sight. But the safety-catch proved to be on. Finally it released
that. Resting the barrel on his shoulder, it went after the switches
again, while he tried surreptitiously to aim the muzzle where it
should be.
Lightning scorched the back of his neck and the gun clattered to the
floor. But he felt it shaking violently on his back. When he made a
grab for it, he almost caught it off guard. Then it didn't even punish
him, just clung there shaking. Inside his brain, the Captain smiled.
Apparently it was unfamiliar with such weapons. He was surprised its
first move had not been to retrieve some powerful weapon of its
own. Perhaps the planet had been so well organized or even civilized
that there had been no stimulus to invent or use weapons of this
sort?
Cautiously it raised the rifle, this time pointing the muzzle the other
way. Lightning flared. It dropped the rifle. Quickly it picked it up and
fired again and again like a child with a new toy. When it raised his
hand, instead of gouging his eye, it gently stroked his cheek. He
shuddered.
Bending him over, the thing ran his hands over Grimes. It felt
Grimes' wrist, then felt his, then felt Grimes' again. Suddenly it
released him and he sank limp and exhausted across Grimes' body.
Perhaps it wanted to see if he could help Grimes, bring him back to
life, otherwise, why this solicitude? He considered making another
grab for it, but he knew it would be on guard. He would be smarter
to co-operate. He went through the motions of artificial respiration,
then shrugged. What would it make of this gesture? He began to
talk to the thing, then to tap out morse code on the floor, finally to
trace out triangles, squares, pentagons with his fingers: no
response. Without warning he grabbed with both hands.
It did not even bother to punish him. It set his hands to gathering
the small cold bodies of its species. When he was through they
made only a double handful that he carried up a twisted ramp,
through doors that creaked automatically in the darkness, to a
warm, faintly sweet smelling room. Here he laid the bodies on a
corrugated ledge.
In darkness he knelt and beat his knuckles on the floor. Rising, his
fingers pressed a button. Something clicked and it began to swing its
weight rhythmically as if it danced to a sound he could not hear. Or
could it be rhythm received through some other sense perception
unknown to man? After a while he pressed several buttons in rapid
succession. A blinding electric arc leaped from the ceiling, turning
the heap of bodies into a crackling funeral pyre.
The smoky light revealed row on row of strangely carved figures,
model dome-structures and cylindricals, shapes strung from wires
resembling fish, toys like the one in his pocket, and many-creased
forms resembling walnut meats or possibly brains. As the light died
away, it jabbed the Captain's eye as if to make him feel pain in
honor of its dead companions. It jabbed with increasing savagery
until he fainted and ended the ceremony.
When he regained consciousness it set his hands to scraping the
ashes into a smooth bowl. His hands placed this on a shelf and his
feet carried him back down the twisting ramp. As he reached the
bottom he heard the excited voices of Spencer and Kwatahiri, then
Ives' deeper voice as his feet hesitated in the corridor. It clutched his
rifle hard. Turning into a side room it snatched up something that
felt like wire netting. Then it made his feet walk softly down the
main corridor toward the voices, and he mentally cursed his men for
their ill caution. All three fools had crowded into the refrigerator
room. But to his relief his body hurried up the ramp, through the
power room, then up the second ramp to the control room and the
surface.
As the glare of the sun struck the thing, it made a long shudder pass
through the Captain's body. Then it prodded his blind eye as though
it somehow blamed him for the desolation out there. But it prodded
him with finesse as it drew him back out of the sun, for his efficiency
was essential, no matter what its next move.
From below drifted Hogan's hoarse voice crooning of a red-haired
baby with two great big hums. The thing unbuttoned the Captain's
shirt and drew it over his head like a cowl. Then it slung the rifle and
opened out the wire net. After innumerable vacillations and
quiverings it sent him sliding down the rope, unconscious that the
rope was burning through the skin of his hands.
"There you are," Hogan shouted. "I knew Spencer'd pulled a
Templar. What'd you find?" He wasn't going to make anything of the
rabbit punch.
The Captain's legs gave way as they struck the ground and he
sprawled awkwardly.
"Geeze Cap, you really burnt your hands. What's the matter, are you
sick? What happened to your eye?" As he extended his hand, the
Captain's body leaped away. As it lunged forward again, net swung
high, his shirt slipped back, making Hogan's expression change from
surprise to bug-eyed horror. Netting a strong man did not prove as
practical as the thing may have imagined. Mouthing obscenities,
Hogan shook loose, scooped up his rifle and fled. As he reached the
cover of a cylindrical, he whirled, fired, missing an easy, motionless
target in his haste, and fled again. The thing unslung the rifle and
started in pursuit.
Hogan's tracks were easy to follow in the dust, but where whirling
wind from the cross streets had swept them away, the thing followed
as confidently as ever. It was not hunting by sight. After they
exchanged shots and crossed over the trail the party had made on
entering the city, it became obvious that Hogan was leading it
straight to the spheroid. The Captain's brain cursed him silently. The
fool!
As he topped the last rise, the thing stopped him abruptly. There,
gleaming in the sunshine was the spheroid. Before the entry hatch
two tiny figures gesticulated. Hogan was telling Templar all about it.
Shivering, the thing pulled the shirt up over his head again. Then it
dallied, still shivering, obviously searching for a plan of action.
Didn't expect anything like that did you? the Captain thought. He
tried to speak and did manage to drool a little. Then it started him
down the hill, freezing his left hand at waist level long before he
could grab. Real terror struck the Captain now. The thing was going
to try some sort of bluff. It was going to try to take the ship.
"Here he comes," shouted Templar.
It waved the Captain's left arm and broke into a run. Templar ran to
meet it. But Hogan ran after Templar and grabbed his shoulder.
Templar shook him off.
"Stop," Hogan screamed. "I tell you, he's a murdering maniac."
But Templar ran to the Captain.
"Put your arm over my neck, sir. Gee you've hurt your eye terribly."
But the Captain gave no sign of understanding. He pulled back
suspiciously when Templar reached for his arm.
"Sir, are you all right? I think Hogan is almost crazy enough to shoot
us. He's gone absolutely mad."
Covering them with his rifle, Hogan came closer, his dust-streaked
face aquiver with indecision. "He's nuts Temp. Look at his face. Why
doesn't he speak?"
Shoot me you fool, the Captain's brain screamed. Beneath its hood
the thing quivered violently, but it held the Captain's body under
perfect control.
Hogan jammed his rifle muzzle against the Captain's head. "Speak,
damn you, speak. What's on your back? You see Temp, he's so crazy
he can't even speee—"
Violently the Captain's body grappled for possession of the rifle. With
a blinding flash it went off between them. Over and over in the dust
they rolled, while Templar danced about and did nothing. As the
Captain's hands clamped on Hogan's windpipe he saw Templar had
finally picked up the rifle. Surely he must see the thing on his back.
Shoot me, you fool.
Gasping, Hogan tore loose and swung his fist against the Captain's
teeth. Lunging, he drove his knee into the Captain's stomach.
In that moment Templar made his decision. He slammed down the
rifle barrel on Hogan's skull.
Gently, the Captain's hands took the rifle away from Templar. They
pointed the muzzle at his belly and signalled for him to lie down.
When Templar stared uncomprehending, they fired a blast near his
cheek. By the time the Captain's hands had finished trussing Templar
with his own trousers and belt, the blue-eyed young man had
noticed the thing on his Captain's neck—and quietly gone mad.
After binding Hogan's unconscious bulk, it dragged both of them into
the spheroid. There it frantically opened drawers, thumbed through
illustrations in books and manuals, pulled levers and pressed buttons
indiscriminately, as though it was looking for a clue to guide its
further actions. It had dropped its net by the control dome. Now it
seemed to be searching for some more effective means of taking
men alive. The auto-electric gun manual held its attention, especially
the circuit diagrams that showed how the deadly stream of electrons
might be widened into a stunning spray. Unfortunately there was
even a line drawing of a man stunning and tying a venupod. It
stared for a long time at the accompanying frequency tables. The
setting-numbers on the receiver of the gun, the corresponding
numbers on the table, the logic of mathematics made the thing's
inability to read words quite immaterial.
When Spencer clambered through the hatch, the diffusion ray
stunned him in his tracks. Quickly it leaped out and stunned Ives
and Kwatahiri. After the Captain's hands had bound them with
climbing ropes, they lay on the floor of the spheroid, their limp
bodies gradually stiffening with horror as the effects of the ray wore
off. As their voices began to curse and argue and plead, night
descended. But it did not need to turn on the lights.
By morning the men were moaning for water, and the thing seemed
to notice the Captain's increasing weakness. It freed him to see what
he would do to help himself.
The Captain lunged for the water faucet, but, as the cool water
trickled before his eyes and the men on the floor cried out for it, the
Captain was thinking. Taking down the small bottle of poison
intended for zoological specimens, he poured a few drops into a
glass; not much, his stomach would throw back a large dose before
it had time to take effect. He had seen that Ives had already rubbed
his wrist bonds thin. In a few hours Ives would be free to help the
others.
As the Captain raised the glass, the thing quivered and forced his
arms down. It made him kneel beside Hogan, hold the glass to
Hogan's lips. The still-dazed man drank greedily.
While Hogan was dying, a slow process, it savagely punished the
Captain's eye. But he welcomed the pain. Even the thing was unable
to control the heaving of his chest or the tears coursing from his
good eye.
Spencer raised his head: "Captain, if you can hear me, I want you to
know that we understand what has happened. We are still with you,
if you are there. If you have to kill us to beat this thing, that's all
right."
After that, it gave the Captain no more freedom. With much
hesitation and quivering it filled a clean glass and gave his four
surviving men water. Then it carefully examined the food in the
refrigerator. But Ives was the only one who would eat. After a
safety-waiting period, it stuffed the Captain's mouth with only those
kinds of food that Ives had eaten.
When the sun began to slant into the open hatchway, the Captain
felt the thing's body take on a new motion, a slow, regular rolling
motion that increased in speed as it sat his body beside Ives and
bent his back until the thing touched Ives' neck. When Ives ceased
screaming, the Captain's body rose and turned. On Ives' neck clung
a tiny replica of the thing.
By late afternoon it had also made Templar and Kwatahiri hosts.
Only Spencer seemed conscious, his wide gray eyes watching the
Captain's every move. When it tried again to feed him, he clenched
his teeth and turned his head away. But the others chewed and
swallowed mechanically.
When it went back to the refrigerator, the Captain managed to
deflect his left hand so that it drew out a can of beer instead of a
grapefruit. A vague hope arose in the Captain's brain as his hands
clumsily punched a hole in the can. The thing filled a glass and knelt
before Spencer.
Drink it, drink it, drink it, the Captain's brain shouted.
Spencer stared at the Captain's face for a long time as though he
was trying to read something there. Then he opened his lips and
gulped the beer.
When the thing sat the Captain down at the table, he noticed the
grenade lying between the screw driver and the artichoke. So near
but yet so far, if he could only pull the pin. But his hands moved past
the grenade to the screw driver. The screw driver was the thing's
beer can punch. Using the wrench for a hammer, it raised a geyser
of beer. Of its own free will it raised the can to the Captain's lips.
The beer was bitter, stinging pleasure, cold in the throat, warm in
the belly. He put it away fast and reached for another can. After a
slight hesitation it freed his hands to punch the holes, one to take
the gush of beer, one to keep it flowing. It fizzed in his mouth and
bubbled out of the corners and over his chin. A cold stream crept
down his neck to his collar bone. The third can he drank more
daintily. With the fourth he felt the thing relax. Its weight sagged a
bit as though it was feeling the effects of the alcohol in his
bloodstream, and it let his hands relax upon the table.
Gently he glided his left hand toward the grenade, but the hand
froze, then curled back for another can of beer. His right hand was a
trifle unsteady as it raised the can to his lips. On the next can he
forgot to punch the second hole and gulped the golden pleasure in
erratic jets until he was sucking an empty can. Both he and it were
game for another. He could feel the beer bubbling and trying to
come back up. He could feel the tautness of his grinning lips, the
limpness of the weight upon his neck. Gradually he edged his left
hand toward the grenade, but the thing curled it back for another
can.
Opening this can was troublesome and he forgot about the grenade.
His wife smiled at him across the table. Soon they were floating
down through blue warmth toward Earth so green and soft beneath.
"S' bedtime," he mumbled. The sound of his own voice sat him up
straight. He remembered where he was and his smile went away.
Then he felt it coming back again with his teeth hard beneath it.
Very cautiously he slid his right hand up his cheek and back over the
short hair on his neck until his fingers touched the thing's shrinking
tissue. It slid his hand away and quivered in gentle admonition.
"Please," his voice whispered, "it will feel so good." And his hand
tried again, like a gentle lover.
Across the room Spencer's eyes glistened wide in the gathering
dusk. Templar moaned softly in his sleep. The faucet dripped loudly.
And the Captain's fingers closed about something smooth and
yielding, yet plump with blood, a tick ripe for the bursting.
With a great brassy shout he drove his fingers through it. As his nails
gouged through writhing jelly, the agonies of the thing's short-
circuiting nervous system became hammer blows upon the base of
his skull. Frantically, with numbing fingers, he tore at the connecting
nerve links. He was a Siamese twin whose partner was death.
The floor spun by. A blazing nova, then galaxies of stars burned out
his optic nerve and darkness struck. For an instant infinity equalled
zero.
Then his good eye opened and puzzled at the mountain so close its
wrinkled gray surface was a blur. As he raised his cheek from the
floor the mountain became Hogan's trouser leg. The Captain felt his
throat constrict. Painfully word-pictures forced themselves upon him.
Hogan, Grimes, Hogan, Grimes, they whirled in a tightening circle of
hysteria.
"Captain," Spencer's quiet voice broke the chain of self-
recrimination. "Can you hear me, Captain?"
The Captain leaped erect and brushed a nasty mess of skin and jelly
from his shoulder.
Think about it later; let the court of inquiry think about it, he told
himself. You're their Captain, man. Act like one.
Swiftly he untied Spencer. Then, kneeling beside each of the three
unconscious men, he carefully extracted the thing's progeny from
their necks, twisting and bullying the tiny parasites until they drew in
their nerve extensions and came loose in his hands.
In the icebox between the celery and the beer cans they resembled
three over-ripe avocados as their frantic pulsations died away and
the cold made wrinkles in their skins.
"When are you going to kill them?"
"The trans-galactic biology teams will want them alive. We will keep
them in suspended animation the way the thing survived so long
until we reach—" The Captain's voice faltered as he readied
Templar's hypo; Ives was already groaning and trying to sit up, but
he wanted Templar to awaken more gently. "—Earth."
"Earth," Spencer repeated solemnly. "Earth, Earth, Earth." Suddenly
he smiled and the Captain's smile joined him.
They were going home.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookgate.com