(Ebooks PDF) Download Computing Essentials 2019 27th Edition (Ebook PDF) Full Chapters
(Ebooks PDF) Download Computing Essentials 2019 27th Edition (Ebook PDF) Full Chapters
com
https://ebooksecure.com/product/computing-
essentials-2019-27th-edition-ebook-pdf/
http://ebooksecure.com/product/original-pdf-computing-
essentials-2019-27th-edition-by-timothy-oleary/
http://ebooksecure.com/product/computing-essentials-2017-26th-
edition-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-computing-
essentials-2021-28th-edition/
http://ebooksecure.com/product/ebook-pdf-computing-
essentials-2017-complete-26th-by-oleary/
Computing Essentials 2023: Making IT Work for You -
eBook PDF
https://ebooksecure.com/download/computing-
essentials-2023-making-it-work-for-you-ebook-pdf/
http://ebooksecure.com/product/original-pdf-payroll-
accounting-2017-27th-edition/
https://ebooksecure.com/download/accounting-ebook-pdf/
https://ebooksecure.com/download/progress-in-heterocyclic-
chemistry-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-translational-medicine-
in-cns-drug-development-volume-29/
Contents
Web Utilities 32
1 Filters 32
File Transfer Utilities 32
INFORMATION TECHNOLOGY, Internet Security Suites 33
THE INTERNET, AND YOU 2 Communication 34
Social Networking 34
Introduction 4 Blogs, Microblogs, Webcasts,
Information Systems 4 Podcasts, and Wikis 35
People 6 E-mail 37
Software 7 Messaging 38
System Software 7 Search Tools 39
Application Software 8 Search Engines 39
Specialized Search Engines 39
Making IT work for you: Content Evaluation 40
Free Antivirus Program 9 Electronic Commerce 40
Security 41
Hardware 10 Cloud Computing 42
Types of Computers 10 The Internet of Things 43
Personal Computer Hardware 11 Careers in IT 44
Data 13
A Look to the Future: Let the Computer Take
Connectivity and the Mobile Internet 14
the Wheel 45
Careers in IT 15
A Look to the Future: Using and Understanding
Information Technology 16 Visual Summary 46
Key Terms 50
Multiple Choice 51
Visual Summary 17 Matching 52
Key Terms 20 Open-Ended 52
Multiple Choice 21 Discussion 53
Matching 22
Open-Ended 22
Discussion 23
3
APPLICATION SOFTWARE 54
2 Introduction 56
THE INTERNET, THE WEB, Application Software 56
User Interface 56
AND ELECTRONIC
Common Features 58
COMMERCE 24 General-Purpose Applications 58
Introduction 26 Word Processors 58
The Internet and the Web 26 Spreadsheets 61
Presentation Software 63
Making IT work for you: Database Management Systems 64
Specialized Applications 65
Online Entertainment 28 Graphics 65
Internet Access 30 Video Game Design Software 67
Providers 30 Web Authoring Programs 67
Browsers 30 Other Specialized Applications 68
vii
Mobile Apps 68
Apps 68
App Stores 69
5
Software Suites 70 THE SYSTEM UNIT 106
Office Suites 70
Introduction 108
Cloud Computing 70
Specialized and Utility Suites 70
System Unit 108
Desktops 108
Careers in IT 71
Laptops 108
Tablets 109
Making IT work for you:
Working Together Online 72 Making IT work for you:
A Look to the Future: VR and AR Applications Gaming 110
in the Workplace 74 Smartphones 112
Wearable Computers 112
Visual Summary 75 Components 112
Key Terms 78 System Board 113
Multiple Choice 79 Microprocessor 114
Matching 80 Microprocessor Chips 115
Open-Ended 80 Specialty Processors 115
Discussion 81 Memory 116
RAM 116
ROM 116
Flash Memory 116
4 Expansion Slots and Cards 117
Bus Lines 118
SYSTEM SOFTWARE 82 Expansion Buses 118
Introduction 84 Ports 119
Standard Ports 120
System Software 84
Specialized Ports 120
Operating Systems 85
Cables 120
Functions 85
Features 86
Power Supply 121
Categories 87 Electronic Data and Instructions 122
Numeric Representation 122
Mobile Operating Systems 88
Character Encoding 122
Desktop Operating Systems 89
Windows 89
Careers in IT 123
macOS 89 A Look to the Future: Brain–Computer
UNIX and Linux 90 Interfaces 124
Virtualization 90
Utilities 91 Visual Summary 125
Key Terms 128
Making IT work for you: Multiple Choice 129
Virtual Assistant 92 Matching 130
Open-Ended 130
Windows Utilities 94 Discussion 131
Utility Suites 97
Careers in IT 97
A Look to the Future: Making Better Computers
by Making Them More Human 98 6
INPUT AND OUTPUT 132
Visual Summary 99
Key Terms 102 Introduction 134
Multiple Choice 103 What Is Input? 134
Matching 104 Keyboard Entry 134
Open-Ended 104 Keyboards 135
Discussion 105
viii CONTENTS
Pointing Devices 136
Mouse 136 7
Touch Screen 136
Game Controllers 136 SECONDARY STORAGE 162
Stylus 137
Introduction 164
Scanning Devices 137
Storage 164
Optical Scanners 137
Card Readers 138
Hard Disks 165
Internal Hard Disk 166
Bar Code Readers 138
External Hard Drives 166
RFID Readers 139
Performance Enhancements 166
Character and Mark Recognition
Devices 139 Solid-State Storage 168
Solid-State Drives 168
Image Capturing Devices 139
Flash Memory Cards 168
Digital Cameras 140
USB Drives 168
Webcams 140
Audio-Input Devices 140 Optical Discs 169
Voice Recognition Systems 140 Cloud Storage 170
What Is Output? 141
Making IT work for you:
Monitors 141
Features 141 Cloud Storage 172
Flat-Panel Monitors 142
E-book Readers 142
Mass Storage Devices 174
Enterprise Storage System 174
Other Monitors 143
Storage Area Network 175
Printers 144
Features 144
Careers in IT 175
Inkjet Printers 145 A Look to the Future:
Laser Printers 145 Next-Generation Storage 176
3D Printers 145
Other Printers 145 Visual Summary 177
Audio-Output Devices 146 Key Terms 180
Combination Input and Output Multiple Choice 180
Devices 146 Matching 181
Headsets 146 Open-Ended 182
Multifunctional Devices 147 Discussion 182
Virtual Reality Head-Mounted Displays
and Controllers 147
Drones 147
CONTENTS ix
Networks 195 Careers in IT 231
Terms 195 A Look to the Future:
Network Types 197 End of Anonymity 232
Local Area Networks 197
Home Networks 197
Wireless LAN 198 Visual Summary 233
Personal Area Network 198 Key Terms 236
Metropolitan Area Networks 198 Multiple Choice 237
Wide Area Networks 199 Matching 238
Network Architecture 199 Open-Ended 238
Topologies 200 Discussion 239
Strategies 201
Organizational Networks 201
Internet Technologies 201
Network Security 202 10
Careers in IT 203 INFORMATION SYSTEMS 242
A Look to the Future: Telepresence
Lets You Be There without Actually Introduction 244
Being There 204 Organizational Information Flow 244
Functions 244
Management Levels 246
Visual Summary 205 Information Flow 247
Key Terms 208 Computer-Based Information
Multiple Choice 209
Systems 248
Matching 210
Transaction Processing Systems 249
Open-Ended 210
Discussion 211 Management Information Systems 251
Decision Support Systems 252
Executive Support Systems 253
Other Information Systems 255
9 Expert Systems 256
Careers in IT 256
PRIVACY, SECURITY, A Look to the Future: IBM’s Watson: The
AND ETHICS 212 Ultimate Information-Finding Machine 257
Introduction 214
People 214 Visual Summary 258
Privacy 214 Key Terms 260
Large Databases 215 Multiple Choice 261
Private Networks 217 Matching 262
The Internet and the Web 217 Open-Ended 262
Online Identity 220 Discussion 263
Major Laws on Privacy 221
Security 221
Cybercrime 221
Social Engineering 223 11
Malicious Software 223
Malicious Hardware 223 DATABASES 264
Measures to Protect Computer Introduction 266
Security 224 Data 266
Ethics 228 Data Organization 267
Copyright and Digital Rights Key Field 268
Management 228 Batch versus Real-Time Processing 268
Databases 269
Making IT work for you:
Need for Databases 270
Security and Technology 229 Database Management 270
Cyberbullying 230
Plagiarism 230
x CONTENTS
DBMS Structure 272 Prototyping 301
Hierarchical Database 272 Rapid Applications Development 301
Network Database 273 Careers in IT 302
Relational Database 273 A Look to the Future: The Challenge of Keeping
Multidimensional Database 274 Pace 303
Object-Oriented Database 275
Types of Databases 276
Individual 276 Visual Summary 304
Company 276 Key Terms 308
Distributed 276 Multiple Choice 309
Commercial 277 Matching 310
Database Uses and Issues 278 Open-Ended 310
Strategic Uses 278 Discussion 311
Security 278
Careers in IT 279
A Look to the Future: The Future of Crime
Databases 280
13
PROGRAMMING
Visual Summary 281 AND LANGUAGES 312
Key Terms 284
Multiple Choice 285
Introduction 314
Matching 286 Programs and Programming 314
Open-Ended 286 What Is a Program? 314
Discussion 287 What Is Programming? 314
Step 1: Program Specification 316
Program Objectives 316
Desired Output 316
Input Data 316
12 Processing Requirements 317
Program Specifications Document 317
SYSTEMS ANALYSIS Step 2: Program Design 318
AND DESIGN 288 Top-Down Program Design 318
Pseudocode 319
Introduction 290 Flowcharts 319
Systems Analysis and Design 290 Logic Structures 321
Phase 1: Preliminary Investigation 292 Step 3: Program Code 322
Defining the Problem 292 The Good Program 322
Suggesting Alternative Systems 293 Coding 322
Preparing a Short Report 293 Step 4: Program Test 324
Phase 2: Systems Analysis 294 Syntax Errors 324
Gathering Data 294 Logic Errors 324
Analyzing the Data 294 Testing Process 324
Documenting Systems Analysis 296 Step 5: Program Documentation 326
Phase 3: Systems Design 296 Step 6: Program Maintenance 327
Designing Alternative Systems 296 Operations 327
Selecting the Best System 297 Changing Needs 327
Writing the Systems Design Report 297 CASE and OOP 328
Phase 4: Systems Development 298 CASE Tools 328
Acquiring Software 298 Object-Oriented Software
Acquiring Hardware 298 Development 329
Testing the New System 299 Generations of Programming
Phase 5: Systems Implementation 299 Languages 330
Types of Conversion 299 Machine Languages: The First
Training 300 Generation 330
Phase 6: Systems Maintenance 300 Assembly Languages: The Second
Prototyping and Rapid Applications Generation 330
Development 301 High-Level Procedural Languages: The Third
Generation 330
CONTENTS xi
Task-Oriented Languages: The Fourth The Evolution of the Computer
Generation 331 Age 343
Problem and Constraint Languages: The Fifth
Generation 332
The Computer Buyer’s Guide 354
Careers in IT 333
A Look to the Future: Your Own Programmable Glossary 358
Robot 334
Index 379
Visual Summary 335
Key Terms 339
Multiple Choice 340
Matching 341
Open-Ended 341
Discussion 342
xii CONTENTS
New to Computing Essentials 2019
Every chapter’s Making IT Work for You, Privacy, Ethics, and Environment features have been carefully revaluated,
enhanced, and/or replaced. Additionally, every chapter’s Look to the Future has been revised to show that the expected
breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the following:
Chapter 1: Revised Figure 1-1 Parts of an Information System to include (1) mobile devices (tablets and s martphones)
and (2) Windows 10 operating system
Chapter 2: Expanded coverage of Web 1.0, 2.0, and 3.0
Added coverage of the use of the Internet for online/social media news
Updated tips for personalizing your Internet browser
Added PHP to discussion of website technologies
Added coverage on social media features
Added WhatsApp to Instant Messenger Apps
Expanded coverage of Twitter
Added coverage of bitcoin
Chapter 3: Improved coverage of the Ribbon GUI
Updated layout of database management systems
Updated layout of specialized applications
Updated video game design software and video editor software tools
Expanded information on collaborative and online office suites
Chapter 4: Expanded coverage of Windows 10 Mobile
Added coverage of macOS High Sierra operating system
Expanded OS Utilities to include Virtual Assistants, Cortana, and Siri
Added coverage of Windows 10 Storage utility
Chapter 5: Expanded discussion of gaming computers
Added coverage of USB-C and improvements over USB-A
Increased discussion of safe practices of powerful batteries in modern mobile devices
Added popular microprocessors to include AMD’s Zen, Apple’s A10 Fusion, and Intel’s Kaby Lake
Chapter 6: Updated voice recognition systems devices to include Amazon’s Echo and Google’s Home
Removed curved and 3D monitors
Added monitor resolutions standard 8K and tips for monitor calibration
Increased coverage of VR hardware, including head-mounted displays and controllers
Increased coverage of drones and robotics
Chapter 7 Updated Cloud Storage Services to include Microsoft OneDrive
Added coverage on cloud storage features
Chapter 8 Added 5G to wireless communications
Added information on mobile/personal hotspots
Chapter 9 Updated browser security figures to use latest version of Chrome
Improved and expanded cybercrime information
Updated Common Internet Scams
Improved and updated Measures to Protect Computer Security
Improved discussion of security suites and antivirus software
Improved discussion of security best practices
Added information about cyberbullying
Chapter 13 Updated and expanded description of popular programming languages
xiii
Preface
T
he 20th century brought us the dawn of the digital informa-
tion age and unprecedented changes in information technology.
In fact, the rate of change is clearly increasing. As we begin the
21st century, computer literacy is undoubtedly becoming a prerequisite
in whatever career you choose.
The goal of Computing Essentials is to provide you with the basis for
understanding the concepts necessary for success. Computing Essentials
also endeavors to instill an appreciation for the effect of information
technology on people, privacy, ethics, and our environment and to
give you a basis for building the necessary skill set to succeed in the
21st century.
At the beginning of each chapter, we carefully lay out why and how the
chapter’s content is relevant to your life today and critical to your future.
Within each chapter, we present practical tips related to key concepts
through the demonstration of interesting applications that are relevant
to your lives. Topics presented focus first on outputs rather than pro-
cesses. Then, we discuss the concepts and processes.
Motivation and relevance are the keys. This text has several features
specifically designed to engage and demonstrate the relevance of tech-
nology in your lives. These elements are combined with a thorough
coverage of the concepts and sound pedagogical devices.
xiv
Visual Learning
VISUAL CHAPTER OPENERS
©Chesky/Shutterstock
Wi-Fi, smartphones, and tablets.
• Applications—how to get ahead using social networking, stream-
ing technology, and cloud computing.
ter’s relevance to the reader’s cur-
Learning Objectives
rent and future life in the digital
After you have read this chapter, you should be able to:
1 Explain the origins of the Internet and the web.
world. Then a list of chapter learn-
ing objectives is presented provid-
2 Explain how to access the web using providers and browsers.
3 Compare different web utilities, including filters, file transfer utilities, and Internet security suites.
4 Compare different Internet communications, including social networking, blogs, microblogs, webcasts,
podcasts, wikis, e-mail, text messaging, and instant messaging.
5 Describe search tools, including search engines and specialized search engines.
6 Evaluate the accuracy of information presented on the web. ing a brief introduction to what
7 Identify electronic commerce, including B2C, C2C, B2B, and security issues.
8 Describe cloud computing, including the three-way interaction of clients, Internet, and service
providers.
9 Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow everyday
will be covered in the chapter.
objects to send and receive data.
©Elnur/Shutterstock
25
VISUAL SUMMARIES
To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be
able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand
Visual summaries appear at the The Internet, the Web, and Electronic Commerce
WEB UTILITIES COMMUNICATION
end of every chapter and sum- INTERNET AND WEB INTERNET ACCESS
Social networking
Web utilities are specialized utility programs that make
meaningful way.
Internet service providers are connected to the Internet, (uploading) your computer. There are three types • Blogs (web logs) are typically personal websites to
provides a multimedia interface to Internet resources. Three keep in touch with friends and family. Some are like
generations: Web 1.0 (links existing information, search
providing a path for individuals to access the Internet. • File transfer protocol (FTP) and secure file transfer
Connection technologies include DSL, cable, and wire- protocol (SFTP) allow you to efficiently copy files online diaries. Businesses, newspapers, and others
engines), Web 2.0 (creates dynamic content and social inter- also use blogs as a quick publishing method.
less modems. across the Internet.
action, social media sites), and Web 3.0 (identifies relation-
• BitTorrent distributes file transfers across many differ- • Microblogs, unlike traditional blogs, use only short
ships between data).
browsers ent computers. sentences that take only a few seconds to write.
Browsers provide access to web resources. Some related Twitter is the most popular microblogging site.
Common Uses • Web-based file transfer services make use of a web
terms are A Twitter message is known as a tweet.
The most common uses of the Internet and the web browser to upload and download files.
• URLs—locations or addresses to web resources; two • Webcasts deliver media content over the Internet.
include
parts are protocol and domain name; top-level domain Internet Security Suite Using streaming technology (audio and video files
• Communication—the most popular Internet activity. (TLD) or web suffix identifies type of organization. continuously downloaded while you are listening to
• Shopping—one of the fastest-growing Internet An Internet security suite is a collection of utility pro-
• HTML—commands to display web pages; hyperlinks and/or viewing the file content), no files remain on
activities. grams designed to protect your privacy and security on
(links) are connections. your computer at the conclusion of the webcast.
the Internet.
• Searching—access libraries and local, national, and • Podcasts, like webcasts, deliver media content but do
Technologies providing interactive, animated websites
international news. not use streaming technology. Before content can be
include cascading style sheets, or CSS (to control the
• Education—e-learning or taking online courses. appearance of web pages); JavaScript (executes on the accessed, the entire media file has to be downloaded
• Entertainment—music, movies, magazines, and com- user’s computer to trigger interactive features); and PHP and saved to your computer.
puter games. (like JavaScript except executes on website’s computer). • A wiki is a website designed to allow visitors to use
Mobile browsers run on portable devices. their browsers to add, edit, or delete the site’s content.
Wikipedia is one of the most popular wikis.
xv
Unique Content
MAKING IT WORK FOR YOU
1 • Visit http://free.avg.com and click the Download button. You will be asked to click “save” to save the
installation file to your computer.
3 • Select Install Basic to install the antivirus software. Once the program is installed, it will open
automatically.
using AVg Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.
privacy
include hours of operations, upcoming sales, and information about their products.
“ hi, I’m Liz, and I’m a computer technician. I’d Why are some computers more powerful than others? The answer lies in
mation when using a free Wi-Fi network or when in one of those videos. Without
privacy settings, images and
• News
applications.
feed is the first page you see after logging into a social networking site. It
Sometime you may get the chance to watch when a technician opens
typically consists
up a personal of aYou
computer. collection
will see thatofitrecent posts
is basically from friends,
a collection of trending topics on
videos posted to these sites theelectronic
site, people’s responses
circuitry. Although there istonoyour
need toposts, andhow
understand advertisements.
all these
computers.
regarding where and/or how
products are manufactured? is designed to be placed either horizontally or vertically. Desktop system units that are
placed vertically are sometimes referred to as a tower unit or tower computer. (See
Figure 5-1.)
Some desktop computers, like Apple’s iMac, have their monitor and system unit
Figure 2-10 Facebook profilehoused together in the same case. These computers are known as an all-in-one. (See
Figure 5-2.)
Source: Facebook
Laptops
Although typically not as powerful as desktops, laptops are portable and much
smaller. Their system units are housed with selected secondary storage devices and
34 ChApTEr 2 input devices (keyboard and pointing device). Located outside the system unit, the
monitor is attached by hinges.
assignments focusing on applying specific technologies into 1 Making IT Work for You: ONLINE ENTERTAINMENT
Review the Making IT Work for You: Online Entertainment on pages 28–29 and then respond to the fol-
a student’s day-to-day life. They are designed to expand a lowing: (1) Do you currently use online entertainment? If so, which ones? If not, do you plan on using one
in the future? Why or why not? (2) What are the advantages and disadvantages of online entertainment
options compared to traditional sources? Be specific. (3) Compare news feeds to traditional newspa-
student’s awareness of technology applications. pers. Which would be better for exposing you to new ideas? Which one would be better at challenging
your point of view? Be specific and defend your position.
PRIVACY When a Facebook friend posts a picture, video, or text that includes you, who can view that post? Review
the Privacy box on page 34, and respond to the following: (a) Who should be responsible for ensuring
privacy on social networking sites? Defend your position. (b) Do you think that most people are aware of
their privacy settings on Facebook? Have you ever checked your settings? Why or why not? (c) Investi-
gate and then summarize the default security settings for a social networking website such as Facebook
or Google+.
Privacy discussion questions are carefully integrated with 3 Ethics: MONITORING CONTENT
in-class discussion or written assignments focusing on specific and defend your position.
critical privacy issues. They are designed to develop a 4 Environment: DIGITAL NEWS
student’s ability to think critically and communicate Review the Environment box on page 34 and then respond to the following: (1) Does the publisher of your
favorite newspaper have a website? If so, does it include the news and features that you would find in
your daily paper? (2) Go to the website of a national newspaper or magazine that also publishes online.
effectively. Do they offer a digital subscription? How does the digital edition differ from the print edition? How does
the digital edition price compare to the print edition price? (3) Do you currently have a digital newspaper
or magazine? If so, what ones do you subscribe to? If not, would you consider switching to digital sub-
scriptions? Why or why not?
ETHICS
ChApTEr 2 53
DISCUSSION
Respond to each of the following questions. Ethics discussion questions are carefully integrated with
1 Making IT Work for You the chapter’s marginal Ethics boxes. The questions facili-
tate in-class discussion or written assignments focusing on
Making it a habit of keeping current with technology applications can be a key to your success. Numerous
full-page spreads identified as Making IT Work for You are presented in the following chapters. These
sections address some of today’s most interesting and useful applications. They include online entertain-
ment in Chapter 2, online office suites in Chapter 3, and cloud storage in Chapter 7. Select one that you
find the most interesting and then respond to the following: (a) Why did you select this application? (b)
Have you used this application? If so, when and how? If not, do you plan to in the near future? (c) Go to
ethical issues relating to technology. They are designed to
the chapter containing your selected application, and locate the application’s Making IT Work for You
coverage. Review and briefly describe its contents. (d) Did you find the coverage useful? Why or why not?
develop a student’s ability to think critically and communi-
2 Privacy
Privacy is one of the most critical issues facing society today. Numerous Privacy boxes appear in the
margins of the upcoming chapters presenting a variety of privacy issues. These issues include apps that
cate effectively.
constantly track your movements without your knowledge or consent in Chapter 3; public Wi-Fi connections
that record all of your personal communications in Chapter 8; and protection of personal privacy while using
social networking sites such as Facebook in Chapter 9. Select one that you find the most interesting, and
then respond to the following: (a) Why did you select this issue? (b) Do you have knowledge of or experience
with the issue? If so, describe your knowledge or experience. If not, do you consider the issue to be impor-
tant for protecting your privacy? (c) Go to the chapter containing your selected issue, locate the Privacy box,
read it, and describe its contents. (d) Did you find the coverage thought-provoking? Why or why not?
Ethics
ENVIRONMENT
3
Computer ethics are guidelines for the morally acceptable use of computers in our society. Numerous
Ethics boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These
issues include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized
monitoring or eavesdropping of Internet activity in Chapter 8. Select one issue that you find the most inter-
esting and then respond to the following: (a) Why did you select this issue? (b) Do you have knowledge of or
experience with the issue? If so, describe your knowledge or experience. If not, do you consider the issue
critical for individuals or organizations? (c) Go to the chapter containing your selected issue, locate the Eth-
ics box, read it, and describe its contents. (d) Did you find the coverage thought-provoking? Why or why not?
Environment discussion questions are carefully integrated
4 Environment
Almost everyone agrees that protecting our environment today is more important than ever before.
with the chapter’s marginal Environment boxes. The ques-
Numerous Environment boxes appear in the margins of the upcoming chapters. These boxes present
a variety of environmental topics, including digital media benefits in Chapter 2, operating systems
reducing energy consumption in Chapter 4, and recycling old inkjet cartridges in Chapter 6. Select one
that you find the most interesting and then respond to the following: (a) Why did you select this topic?
tions facilitate in-class discussion or written assignments
(b) Go to the chapter containing your selected topic, locate the Environment box, read it, and describe its
contents. (c) Did you find the coverage thought-provoking? Why or why not? focusing on environmental issues relating to technology.
Design Elements: Concept Check icons: ©Dizzle52/Getty Images;
Making IT Work for You: ©Shutterstock/cifotart
They are designed to develop a student’s ability to think
chApTer 1 23
critically and communicate effectively.
xvii
Reinforcing Key Concepts
CONCEPT CHECKS
environment People
Recycling last year reduced
our landfills by over 10 million KEY TERMS
People are surely the most important part of any information system. Our lives are
touched every day by computers and information systems. Many times the contact
tons. This success is largely
KEY TERMS due to voluntary participation is direct and obvious,
address (31) pages (34) of people across the country, such as when we create
Advanced Research Project Agency podcast (38)
who have made “reduce, documents using a word
processingThroughout
program or the text, the most important terms
Network (ARPANET) (26) PHP (31)
attachment (37)
BitTorrent (33)
profiles (34)
protocol (31)
reuse, and recycle” a personal
blog (35) search engine (39) commitment. This includes when we are presented
connect to the in bold and are defined within the
browser (30) search service (39)
business-to-business (B2B) (41) secure file transfer protocol (SFTP) (33)recycling old computers, cell Internet. (See Figure 1-2.)
business-to-consumer (B2C) (41)
cable (30)
share settings (34)
signature (37)
phones, printers, and displays. Other times,text.theYou
contactwill also find a list of key terms at the end
SMS (short messaging service) (38) Your participation in recycling
cascading style sheets (CSS) (31)
is not as obvious.
client-based e-mail system (37)
cloud computing (42)
social networking (34)
spam (38) means fewer one-use products, of each
Throughout this book chapter and in the glossary at the end of
consumer-to-consumer (C2C) (41) spam blocker (38) cleaner water, and cleaner air.
you will find a variety of fea-
digital cash (41)
domain name (31)
downloading (32)
spam filter (38)
specialized search engine (39)
spider (39)
But recycling may someday pay the book.
tures designed to help you
DSL (30) streaming (36)
off financially too. Many now
e-commerce (40) subject (37) see waste as a resource, and become an efficient and
e-learning (27)
electronic commerce (40)
texting (38)
text messaging (38) one that we shouldn’t squander effective end user. These
electronic mail (37)
e-mail (37)
top-level domain (TLD) (31)
tweet (35)
by filling up the garbage can features include Making
e-mail client (37) Twitter (35) instead of the recycling bin. IT Work for You, Tips, Pri-
Facebook (39) uniform resource locator (URL) (31)
file transfer protocol (FTP) (33) uploading (32) Imagine a future where the vacy, Environment, Ethics, figure 1-2 people and computers
filter (32)
friend (34)
virus (38)
web (26)
garbage collector drops off a and Careers in IT. ©Fancy Photography/Veer
groups (34) Web 1.0 (26) check for your contributions to
header (37)
hyperlink (31)
Web 2.0 (26)
Web 3.0 (26) going green. • Making IT Work for You. Throughout this book you will find Making IT Work for
Hypertext Markup Language (HTML)
instant messaging (IM) (38)
(31) web auction (41)
web-based e-mail system (37)
You features that present numerous interesting and practical IT applications. For
Internet (26) web-based file transfer services (32) just a few of the Making IT Work for You topics, see Figure 1-3.
Internet of Things (IoT) (43) webcasts (36)
Internet security suite (33)
Internet service provider (ISP) (30)
web log (41)
webmail (37)
• Tips. We all can benefit from a few tips or suggestions. Throughout this book
JavaScript (31) webmail client (37) you will find numerous tips to make your computing safer, more efficient, and
link (31) webmaster (44)
more effective. These tips range from the basics of keeping your computer system
LinkedIn (40)
location (31)
message (37)
web page (31)
web suffix (31)
web utility (32)
MULTIPLE CHOICE
microblog (35) wiki (36) Circle the correct answer.
MMS (multimedia messaging Wikipedia (36)
service) (38) wireless modem (30)
mobile browser (31) World Wide Web (26)
Application description
1. The network that connects computers all over the world.
news feed (34) WWW (26) a. ARPANET c. LAN
online (27) Free Antivirus Program Protect your computer by installing
b. Internet and using a free antivirus
d. web
program. See
2. The page
rules 9.
for exchanging data between computers.
a. DSL c. web
50 ChApTEr 2
Online Office Suites Create and collaborate with others
b. protocols online to make better
d. WWW
documents and
3. Using filepresentations. Seeyoupage
transfer utility software, 72.files to your computer from specially
can copy
configured servers on the Internet. This is called:
a. downloading c. blogging
Gaming Delve intob. the world of video games
filtering
and find the best video game
d. uploading
hardware for you. See page 110.
CHAPTER REVIEW
4. Communities of individuals who share a common interest typically create Facebook:
a. clients c. pages
Cloud Storage Move your b. files
groupsonline to synch files between devices or free up
d. profiles
space 5.onType
your digital devices. See page 172.
of e-mail account that does not require an e-mail program to be installed on a
user’s computer is:
The Mobile Office Get work a.done on the road; whether
blog-based a business trip or your daily
c. utility-based
commute,b.these tools will help youd. make
client-based the most of your time.
web-based
Following the Visual Summary, the chapter review includes See page
6. The192.
most popular microblogging site:
a. LinkedIn c. Twitter
understanding of information presented in the chapter, 9. The continuing Internet development that allows objects to send and receive data over
the Internet.
a. HTML c. search engines
matching exercises to test your recall of terminology pre- b. IoT d. Web 2.0
10. Three basic components to cloud computing are clients, Internet, and _____.
sented in the chapter, and open-ended questions or state- a. CSS
b. service providers
c. streaming
d. Web 3.0
ChApTEr 2 51
xviii
The Future of Information Technology
CAREERS IN IT
• Cloud computing uses the Internet and the web to shift many computer activities
from a user’s computer to computers on the Internet. Rather than relying solely on
their computer, users can now use the Internet to connect to the cloud and access
more powerful computers, software, and storage.
• Wireless communication has changed the way we communicate with one another.
The rapid development and widespread use of wireless communication devices like
tablets, smartphones, and wearable devices has led many experts to predict that
wireless applications are just the beginning of the wireless revolution, a revolution
that will dramatically affect the way we communicate and use computer technology.
• The Internet of Things (IoT) is the continuing development of the Internet that
Careers in IT
ranges. Among the careers covered are webmaster, soft-
“ now that you know the basic outline and
important features of this book, we would like
to talk about some of the most exciting and
As mentioned previously, each of the following chapters highlights a
specific career in information technology. Each provides specific job
descriptions, salary ranges, advancement opportunities, and more. For
ware engineer, and database administrator. You will learn
well-paid careers in information technology.
” a partial list of these careers, see Figure 1-18.
how the material you are studying relates directly to a
career description
Webmaster
Software engineer
Develops and maintains websites and web
resources. See page 44.
ing informed.
and mobile applications are presented in Chapter 3. System
Are the times changing any faster now than they ever
software is presented in Chapter 4.
have? Almost everyone thinks so. Whatever the answer,
it is clear we live in a fast-paced age. The Evolution of the
powerful hardware Computer Age section presented at the end of this book
Personal computers are now much more powerful than they tracks the major developments since computers were first
used to be. Smartphones, tablets, and communication tech- introduced.
nologies such as wireless networks are dramatically chang- After reading this book, you will be in a very favorable
ing the ways to connect to other computers, networks, and position compared with many other people in industry today.
the Internet. However, despite the rapid change of specific You will learn not only the basics of hardware, software, con-
equipment, their essential features remain unchanged. To nectivity, the Internet, and the web, but also the most cur-
become an efficient and effective end user, you should focus rent technology. You will be able to use these tools to your
on these features. Chapters 5 through 8 explain what you advantage.
16
xix
McGraw-Hill Connect® is a highly reliable, easy-to-
use homework and learning management solution
that utilizes learning science and award-winning
adaptive tools to improve student results.
73% of instructors
who use Connect
Quality Content and Learning Resources require it; instructor
satisfaction increases
by 28% when Connect
▪ Connect content is authored by the world’s best subject is required.
matter experts, and is available to your class through a
simple and intuitive interface.
▪ The Connect eBook makes it easy for students to
access their reading material on smartphones
and tablets. They can study on the go and don’t
need internet access to use the eBook as a
reference, with full functionality.
▪ Multimedia content such as videos, simulations,
and games drive student engagement and critical
thinking skills.
©McGraw-Hill Education
Another random document with
no related content on Scribd:
Quando ella gli parlò nel modo ingiurioso che abbiamo detto, egli,
per conseguenza, si sentì risvegliare in cuore tutti i suoi più atroci
divisamenti e, ghermendola per un braccio:
— Bada, Olimpia — le disse — che noi qui siamo soli e che io posso
fare a mia posta di te!... è ormai da troppo lunga pezza che ti prendi
giuoco dell’amore che io ti porto: sinchè la ho stimata verecondia e
castimonia di onorata fanciulla, io ho saputo impor freno al foco che
mi divora; ho saputo farti olocausto de’ miei impeti più irresistibili e
rispettarti sempre; ma oggi che, alla tua ritrosia, aggiugni il dispregio
e l’insulto, o vivaddio, non ho più nulla che mi trattenga: oggi sarai
mia ad ogni costo!
Olimpia lo ascoltò senza scomporsi, quindi, scoppiando in una cinica
risata!
— Ah! ah! — gli rispose — tu la pigli in cotesto tono tutt’altro che da
paladino?... ma, Giovanni mio caro, e perchè strapazzare così la tua
Olimpiuccia, che t’ha sempre voluto un bene dell’anima?... ti piace
che io mi stia teco?... e ci starò; non iscaldarti il sangue per
questo!... oh, non è già mio intendimento il tener teco il broncio e
fare la bocca brincia, perchè m’hai tolto a Castell’Arquato e al pazzo
umore di monsignor duca di Castro!... t’ho detto che colassù ci stavo
oppipare, ed è verità genuina, vangelio; ma poi.... sai come son fatta
io!.... l’aqua di Lete è sempre a mio servigio.... non c’è che di te
cattivo, che mai ho potuto dimenticarmi!
E gli gittò languidamente le braccia intorno al collo e lo baciò su la
bocca.
Tutto lo sdegno dell’Anguissola sbollì, svaporò, come per incanto, al
suono di quelle affettuose parole al contatto di quell’amplesso, allo
scoccar di quel bacio; egli era già più che conquiso.
Nello slancio della sua gioia, fece egli pure per abbracciarla e
stringersela al seno.
Ma ella — respingendolo dolcemente e sorridendogli di un procace
sorriso:
— No, no, Giovanni — gli disse in tono di preghiera — lasciami cheta
per ora.... le emozioni di questa notte d’inferno mi hanno stanca,
spossata: ho bisogno di un po’ di riposo.... voglio dormire!
E, nel dir ciò, si ricacciava stesa sul letto e adagiava il capo su i
guanciali, con quella grazia felina tutta propria alle movenze de’
gatti.
Il conte, sedotto, ammaliato, richiamato da quell’amorevole
contegno, a’ suoi sentimenti di tenerezza e di ossequio, non seppe
più far altro chè sfiorarle le guance con le labra e ritirarsi in silenzio.
Un desiderio di quella donna era per lui una legge.
Sola a pena, Olimpia balzò giù dal suo giaciglio; si rivestì in fretta in
fretta; corse alla finestra, la aperse con cautela e guardò per ogni
intorno.
Le campagne s’irradiavano allora de’ primi chiarori dell’alba;
Erano dunque trascorsi tre anni dai casi che abbiam narrato nella
precedente parte di questa nostra istoria, il che ci porta all’anno
1543.
Durante il tempo intercorso, quella scaltrita volpe di papa Paolo III
non aveva smesso un attimo solo dall’adoprarsi, con ogni maniera
avvedimenti e girandole, per sgrandire semprepiù le dovizie e la
potenza della propria già doviziosissima e potentissima famiglia.
Egli era papa: sua figlia Costanza, signora di Castell’Arquato e dei
dazi della Rochetta; Guid’Ascanio, il primogenito de’ costei figli, era
cardinale già da nove anni e, da otto, vescovo di Parma; Carlo, il
secondogenito, Gran Priore di Lombardia e Generale delle così dette
Galee della Religione; Sforza, il terzogenito ed erede, governatore di
Parma e di Piacenza, e, pel suo matrimonio con Luigia Pallavicino,
signore di Torchiara e Felino; Paolo, il quarto, ed Alessandro, il
quintogenito, scrittori di lettere apostoliche, a sei anni il primo e ad
otto il secondo; Alessandro, il primonato legittimo di Pierluigi, era
cardinale sino dal 1534; Ottavio, il cadetto ed erede, marito a
Margherita d’Austria e duca di Camerino; Ranuccio, il terzogenito, nel
procinto d’essere nominato arcivescovo di Napoli e cardinale;
Vittoria, l’unica figliuola, duchessa d’Urbino; Orazio, il bastardo,
militante in Francia e promesso ad una figlia naturale di Francesco I
e di Diana di Poitiers; il loro padre Pierluigi, poi, era duca di Castro e
di Nepi, marchese di Novara, gonfaloniere e capitano generale della
Chiesa.
Ma tutto ciò non bastava al cupido Vicario di Cristo. In ispecie, pel
suo prediletto ed idolatrato sterpone e’ vagheggiava assai più; voleva
la ducea di Milano, ch’era sempre di Spagna, governata dal nepote di
Vittoria Colonna, quel don Alfonso d’Avalos marchese di Pescara e
del Vasto, che, in quello istess’anno aveva fugato da Nizza il corsaro
Barbarossa e il conte Francesco d’Enghien, per essere quindi
sconfitto da quest’ultimo a Ceresole.
Paolo III se l’era fisso in animo risolutamente e, malgrado il primo
scacco subito a Nizza, in occasione del suo primo colloquio con
quell’altra volpe dello imperatore Carlo V, voleva ad ogni costo
ritentarne la prova.
Nessuna variazione era intervenuta nel riparto e nel reggimento de’
varî stati d’Italia e dell’estero da quanto ci siamo ingegnati di divisare
sino dal principio di questa nostra narrazione, senonchè, ai 20 di
genaio del 1539, morto il benemerito Andrea Gritti, il corno dogale
della republica di Venezia era passato sul capo di Pietro Lando e, ai
28 giugno del 1540, aveva cessato di vivere il duca di Mantova,
Federico II Gonzaga «lasciando dietro di sè Francesco III,
primogenito, che a lui succedette nel ducato; Guglielmo, che dopo
Francesco regnò; Lodovico, che, passato in Francia, divenne duca di
Nevers; e Federico che fu poi cardinale; i quali erano tutti in età
pupillare, per cui il cardinale Ercole, loro zio, con la duchessa
Margherita, loro madre, prese il governo di quegli Stati.» L’Europa
civile riassumevasi sempre in quella grande rivalità che manteneva
Francesco I di Francia in continua lotta con Carlo V di Spagna,
oscitando fra’ quali, a mo’ di pendolo, come aveva ognor fatto,
l’astuto pontefice prefiggevasi aumentare ogni dì più la esorbitante
influenza della sua casa.
Laonde — quando, nel principio del 1543, dopo le non troppo felici
sue imprese contra de’ fiaminghi e de’ barbareschi, l’imperatore
venne a sbarcare a Genova — egli provide subito a mandargli
incontro, per complimentarlo e sollecitarlo di un nuovo colloquio, lo
stesso suo diletto figliuolo, che vi andò con grande pompa e
numeroso seguito, del quale, oltre al Filareto ed a’ capitani
Anguissola ed Osca, faceva parte il suo nuovo segretario Annibal
Caro, da pochi mesi entrato al suo servizio.
Poche parole rispose Carlo V alle felicitazioni e meno ancora alle
suppliche, che Pierluigi gli rivolse in nome del proprio padre. Tra un
silenzio e l’altro, gli promise tuttavia di trovarsi nella primavera o
nella state a Bologna, a Parma, od a Piacenza, dove sarebbesi potuto
effettuare il desiderato convegno.
Già, nello intermezzo, ne aveva avuto luogo un altro a Lucca il 10
settembre 1541. Ivi — con l’imperatore e col papa — erano pure
accorsi Ercole II d’Este, duca di Ferrara, e Cosimo de’ Medici, duca di
Firenze, i quali rischiarono metter la città e le corti a subbuglio, per
un litigio insorto fra loro circa alla precedenza nell’ossequiare Carlo V.
Ercole volle passare il primo e Cosimo se ne imbizzarrì in siffatto
modo che — malgrado la nota sua cautela e prudenza — non seppe
astenersi dal suscitare uno scandalo. Il che prova come spesso
anche i grandi uomini sieno molto piccini.
Carlo V «portava una cappa di panno nero, un saio simile senza
alcun fornimento, e in capo un cappelluccio di feltro, e stivali in
gamba, coprendo con quest’abito modestissimo — come osserva il
Segni — un’ambizione superiore a quella di Ottavio Augusto,
monarca del mondo.»
E tra papa Farnese e Carlo di Borgogna — vuoi per ambizione, vuoi
per astuzia — l’andava, come suol dirsi da galeotto a marinaio. Il
francese Luigi XI e lo spagnuolo Roderico Borgia non avevano, per
nulla, spinto a sì eminente grado quell’arte del simulare e
dissimulare, che ha poi assunto il dignitoso nome di diplomazia. Que’
due avevano studiato bene addentro cotesti loro archetipi e
perfezionatone l’arte, cosicchè, se l’uno era fino, l’altro non l’era
manco.
Come già a Nizza, tra il maggio e il giugno del 1538, Carlo V seppe
così lavorare di scherma anche in questa seconda occasione, che
tutte le armi insidiose del gran prete di Roma gli caddero ai piedi
spuntate, senza neppure scalfirgli la «cappa di panno nero.»
Paolo III — camuffandosi, come voleva il suo sacro carattere, a
semplice e disinteressato paciere — tornò più volte a trarre in campo
il retaggio di Valentina Visconti, siccome quello che costituiva la
cagione precipua de’ dissensi e delle guerre tra la casa di Francia e
la casa di Spagna, proponendo — quale unico mezzo per comporre
tale rivalità — il cederlo ad altri; mettere, insomma, in pratica il vieto
proverbio che, fra i due litiganti, il terzo gode. Nè questo terzo
meglio si poteva trascegliere che nell’amato suo Pierluigi, il quale —
per rendere servigio al proprio padre ed aiutarlo nel pietoso còmpito
di rappaciare l’Europa — sarebbesi volonteroso addossato l’onere di
governare quelle provincie.
Un freddo risolino tutto peculiare all’ibrido dominatore della Spagna,
della Fiandra e della Germania, accoglieva quelle strane proposte e
rilevava, col trasformarsi in tagliente soghigno, tutti i sottintesi, che
si chiudevano nel loro pretenzioso carattere di mansuetudine e di
sacrificio.
Quel ghigno sembrava dire:
— Lo credo anch’io che il tuo beniamino si sobbarcherebbe, senza
troppe schifiltà, al governo di quelle provincie, che sono una delle
più belle gemme della mia corona!
E però — senza risponder mai nè affermativamente, nè
negativamente — lasciava cascar nell’aqua la conversazione; mutava
quasi inavertitamente soggetto e faceva menare il can per l’aia al
desolato pontefice, il quale — rodendosi di rabbia, ma occultando il
proprio dispetto sotto quella vernice di indifferenza e di bonomia, in
cui era sommo maestro il fondatore della Compagnia di Gesù —
dovette ritornarsene a Roma con le pive nel sacco.
Non si scosse, per altro, dal suo proponimento, al quale tornò, come
abbiamo detto, con anche maggiore insistenza di prima, due anni
dopo aver subìto quella seconda sconfitta.
Il 1542 trascorse senza gran che di rimarchevole. «Provossi in questi
tempi — come ce ne informa l’Isnardi nel Diario Ferrarese — il
flagello delle locuste, specialmente in Lombardia» — morì a
Edimburgo re Giacomo V Stuard, e ne fu erede quella disgraziata sua
figlia Maria, per la quale il trono di Scozia doveva rimutarsi in un
ceppo patibolare; — l’imperatore sanzionò l’acquisto che, due anni
prima, don Ferrante Gonzaga aveva fatto di Guastalla, pagandola
ventiduemila dugent’ottanta scudi di oro a quella nuova Messalina,
che fu la figlia di Ercole Gonzaga, conte di Novellara, il quale se n’era
reso padrone nel 1522, scannandone il legittimo signore, Achille
Torelli, per sospetto d’adulterio con la propria moglie; — a Piacenza il
legato pontificio monsignor Vegerio venne sostituito dal cardinale
Oberto Gambara da Brescia legato della Gallia Cispadana; — ed il
cardinale Guid’Ascanio Sforza di Santafiora, vescovo di Parma,
cedette i propri feudi al fratello Sforza Sforza, signore di
Castell’Arquato, con che questi si assumesse di sostenere e definire
le gravi liti, ch’egli medesimo aveva iniziato con la possente casata
dei Rossi di San Secondo.
Del resto, ripetiamo, nulla intervenne in detto anno meritevole di
particolare rimarco, senonchè Francesco I di Francia — irridendo al
proprio agnome di Cristianissimo, con lo stringersi in alleanza
all’islamita Solimano, il Grande, il Conquistatore, il Magnifico od il
Legislatore, che si voglia chiamarlo — ruppe nuovamente guerra allo
imperatore Carlo V, ed inviò in Piemonte, contro il marchese del
Vasto, l’ammiraglio Claudio d’Annebaut, barone di Retz, con un
grosso di truppe, che da’ cesarei venne, in breve, battuto, sconfitto,
disperso.
D’un tale rinfocolarsi delle ire franco-spagnuole pensò novellamente
il papa poter fare suo pro’, ritornando alla carica onde ottenere pel
suo prediletto figliuolo l’agognata ducea di Milano, ed intanto mise
fuori ed accreditò la voce ch’egli intendesse nominarlo signore di
Parma e di Piacenza.
Sino dai primi giorni del 1543 Luca Contile, infatti, scrivendo a
Ippolito Curzio: «Non mi accade dirvi — annunziava — che il signor
duca di Castro è fatto duca di Piacenza, et di Parma. Io me ne
rallegro per più rispetti, primieramente perchè sono affetionatissimo
alla casa Farnese, et perchè verranno in coteste bande una schiera
di virtuosi amici miei.» De’ quali rallegramenti noi non possiamo
troppo rallegrarci con la memoria di messer Luca Contile.
Tale voce, tuttavia, non è facile lo appurare per qual vero fine fosse
posta inanzi dal furbo pontefice. Chi riteneva avess’egli renunziato
alla vagheggiata speranza di ottenere la ducea milanese pel duca di
Castro, onde farne investire il costui figliuolo Ottavio, assegnando
realmente a quello, in compenso, i possessi pontifici di Piacenza e di
Parma; chi opinava, invece, non fosse quella che un’abile manovra
per intimidire l’imperatore e forzargli la mano: e questa era la
versione più universalmente accettata.
Forte della favorevole risposta che lo stesso Pierluigi gli aveva recato
da Genova, Paolo III, si mise subito in moto per tradurre in atto i
propri progetti, e, corse su le tracce dell’imperatore, col quale voleva
ad ogni costo conferire; ma che sempre sguizzavagli di mano come
pesce nell’aqua.
Nella prima domenica di aprile ricorrente il dì 8 giunse a Piacenza,
accompagnato da’ suoi nepoti cardinali Alessandro Farnese e
Guid’Ascanio Sforza, dal legato Oberto Gambara, dai cardinali Pisani,
Santacroce e Savelli e da interminabile processione di vescovi e
prelati.
La domenica successiva recavasi a Castell’Arquato a render visita alla
propria figliuola Costanza di Santafiora.
Poco dopo transitava per Parma, dove il buon cardinale Michele
Ghisleri, che cinse poi, a sua volta, la tiara, col nome di Pio V,
arrovellavasi nel sostenere publicamente le famose trenta questioni
controverse risguardanti l’autorità papale: prova questa che, sin
d’allora, degl’anti-infallibilisti ce n’era più d’uno.
Passò, quindi, a Ferrara, dove fece solenne ingresso nella domenica
successiva.
Finalmente, non essendo mai riuscito ad aggavignare la sacra ed
imperial persona di Carlo V, se ne ritornò, ad aspettare gli eventi, in
Bologna, d’onde sguinzagliò, per ogni intorno, lettere ed emissari,
cospiranti tutti al sospirato suo scopo.
E dàlli e dàlli riuscì infine a conseguirlo.
Carlo V accondiscese ad un novello convegno pel quale venne
prescelta la rôcca di Busseto.
Capitolo XL.
Gli esploratori.