100% found this document useful (2 votes)
109 views65 pages

Instant Download Technology in Action Introductory 13th Edition Alan Evans PDF All Chapters

Action

Uploaded by

szycatkam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
109 views65 pages

Instant Download Technology in Action Introductory 13th Edition Alan Evans PDF All Chapters

Action

Uploaded by

szycatkam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Experience Seamless Full Ebook Downloads for Every Genre at textbookfull.

com

Technology in Action Introductory 13th Edition


Alan Evans

https://textbookfull.com/product/technology-in-action-
introductory-13th-edition-alan-evans/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Technology In Action, Rental Edition, 17th Edition Alan


Evans

https://textbookfull.com/product/technology-in-action-rental-
edition-17th-edition-alan-evans/

textboxfull.com

Frank Wood’s Business Accounting 13th Edition Alan


Sangster

https://textbookfull.com/product/frank-woods-business-accounting-13th-
edition-alan-sangster/

textboxfull.com

Technology in action complete Twelfth Global Edition


Kendall E. Martin

https://textbookfull.com/product/technology-in-action-complete-
twelfth-global-edition-kendall-e-martin/

textboxfull.com

Technology in Mathematics Teaching Selected Papers of the


13th ICTMT Conference Gilles Aldon

https://textbookfull.com/product/technology-in-mathematics-teaching-
selected-papers-of-the-13th-ictmt-conference-gilles-aldon/

textboxfull.com
Information Technology New Generations 13th International
Conference on Information Technology 1st Edition Shahram
Latifi (Eds.)
https://textbookfull.com/product/information-technology-new-
generations-13th-international-conference-on-information-
technology-1st-edition-shahram-latifi-eds/
textboxfull.com

E-Commerce 2017: Business, Technology, Society 13th


Edition Kenneth C. Laudon

https://textbookfull.com/product/e-commerce-2017-business-technology-
society-13th-edition-kenneth-c-laudon/

textboxfull.com

Essential Readings in Light Metals Volume 4 Electrode


Technology for Aluminum Production 1st Edition Alan
Tomsett
https://textbookfull.com/product/essential-readings-in-light-metals-
volume-4-electrode-technology-for-aluminum-production-1st-edition-
alan-tomsett/
textboxfull.com

Disability and Technology: An Interdisciplinary and


International Approach 1st Edition Alan Roulstone (Auth.)

https://textbookfull.com/product/disability-and-technology-an-
interdisciplinary-and-international-approach-1st-edition-alan-
roulstone-auth/
textboxfull.com

Oxford case histories in geriatric medicine 1st Edition


Evans

https://textbookfull.com/product/oxford-case-histories-in-geriatric-
medicine-1st-edition-evans/

textboxfull.com
Technology
in Action
This page intentionally left blank
Technology
in Action
INTRODUCTORY

13th Edition

Alan Evans | Kendall Martin | Mary Anne Poatsy

Boston Columbus Indianapolis New York San Francisco Hoboken


Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City Sâo Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
VP, Editorial Director: Andrew Gilfillan Digital Strategy: Eric Hakanson
Executive Acquisitions Editor: Jenifer Niles Media Project Manager, Production: John Cassar
Production and Program Team Lead: Laura Burgess Art Director: Diane Ernsberger
Project Manager: Holly Haydash Cover Design: Studio Montage
Program Manager: Emily Biberger Cover Art: Tomas Jasinskis/Shutterstock
Editorial Assistant: Michael Campbell Full-Service Project Management: Lumina Datamatics, Inc.
Development Editor: Shannon LeMay-Finn Composition: Lumina Datamatics, Inc.
Director of Marketing: Maggie Waples Printer/Binder: Courier/Kendalville
Marketing Coordinator: Susan Osterlitz Cover Printer: Lehigh-Phoenix Color/Hagerstown
Operations Specialist: Diane Peirano Text Font: 9/11 Helvetica Neue LT W1G
Director of Digital Studio, Worforce Readiness: Blaine
Christine
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the
appropriate page within the text.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents
and related graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is”
without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this
information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular
purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or
consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract,
negligence or other tortious action, arising out of or in connection with the use or performance of information available from the
services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are
periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in
the product(s) and/or the program(s) described herein at any time.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not
sponsored or endorsed by or affiliated with the Microsoft Corporation.

Copyright © 2016, 2015, 2014 Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the
United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior
to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical,
photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to
Pearson Education, Inc., Permissions Department, 1 Lake Street, Upper Saddle River, New Jersey, 07458.
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial
caps or all caps.
Library of Congress Control Number: 2015040435

10 9 8 7 6 5 4 3 2 1

ISBN 10: 0-13-447450-3


ISBN 13: 978-0-13-447450-2
thirteenth
thirteenth

EDITION
13
Contents at a Glance
Chapter 1
Using Technology to Change the World...................................................................................... 2

Chapter 2
Looking at Computers: Understanding the Parts...................................................................... 28

Chapter 3
Using the Internet: Making the Most of the Web’s Resources................................................... 74

Technology in Focus
The History of the Personal Computer.................................................................................... 112

Chapter 4
Application Software: Programs That Let You Work and Play.................................................. 122

Chapter 5
System Software: The Operating System, Utility Programs, and File Management.................. 160

Technology in Focus
Information Technology Ethics................................................................................................ 202
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System.......................................... 222

Chapter 7
Networking: Connecting Computing Devices.......................................................................... 258

Technology in Focus
Under the Hood...................................................................................................................... 296

Chapter 8
Digital Devices and Media: Managing a Digital Lifestyle........................................................... 308

Chapter 9
Securing Your System: Protecting Your Digital Data and Devices............................................ 346

Technology in Focus
Careers in IT........................................................................................................................... 396

Glossary................................................................................................................................. 408
Index...................................................................................................................................... 419

Contents at a Glance v
This page intentionally left blank
thirteenth
thirteenth

EDITION
13
Contents
Chapter 1
Using Technology to Change the World................................ 2
How Will You Put Technology in Action?.......................................................................4
Learning Outcome 1.1 You will be able to discuss the impact of technology on global
and national issues.
Technology on the World Stage...................................................................................... 4
Political Issues................................................................................................................. 4
Objective 1.1 Recognize how becoming proficient with technology can help you understand
and participate in political issues in the world at large.
Other Global Issues......................................................................................................... 5
Objective 1.2 Describe how technology affects social issues in different societies.
Technology and Our Society............................................................................................ 7
Technology Impacts How We Think................................................................................. 7
Objective 1.3 Describe how technology is changing our cognitive processes.
Technology Impacts How We Connect............................................................................ 7
Objective 1.4 Explain how technology is expanding the ways we collaborate.
Technology Impacts How We Consume.......................................................................... 8
Objective 1.5 Summarize how technology has impacted the way we choose and consume products
and services.
Try this: Skyping Around the World........................................................................... 10
MAKE THIS: MAKE: A Virtual Assistant........................................................................ 11
How Will Technology Improve Your Life?....................................................................12
Learning Outcome 1.2 You will be able to discuss personal impacts technology can have
on your life and your career.
Technology at Home....................................................................................................... 12
Computer Literacy......................................................................................................... 12
Objective 1.6 Characterize computer literacy, and list some of its benefits.
ETHICS IN IT: Ethics and Technology........................................................................... 14
Technology and Your Career......................................................................................... 15
Impact of Computer Literacy on Your Career................................................................. 15
Objective 1.7 Characterize the impact computer literacy has on a variety of careers.
DIG DEEPER: Augmentative and Virtual Realities......................................................... 19
SOLVE THIS: How Technology Is Used on the World Stage and
   in My Personal Life................................................................................................... 27

Chapter 2
Looking at Computers: Understanding the Parts................ 28
Understanding Digital Components............................................................................30
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer..................................................................................... 30
Computers Are Data Processing Devices...................................................................... 30
Objective 2.1 Describe the four main functions of a computer system and how they interact with data
and information.

Contents vii
thirteenth
thirteenth
EDITION

13
Bits and Bytes: The Language of Computers................................................................. 31
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
Types of Computers...................................................................................................... 31
Objective 2.3 List common types of computers, and discuss their main features.
Input Devices.................................................................................................................. 34
Keyboards and Touch Screens...................................................................................... 34
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices................................................................................... 36
Objective 2.5 Describe the main types of mice and pointing devices.
Image and Sound Input................................................................................................. 37
Objective 2.6 Explain how images and sounds are input into computing devices.
DIG DEEPER: How Touch Screens Work..................................................................... 38
Output Devices............................................................................................................... 41
Monitors........................................................................................................................ 41
Objective 2.7 Name common types of monitors, and identify important aspects of their quality.
Printers.......................................................................................................................... 43
Objective 2.8 Describe various types of printers, and explain when you would use them.
Sound Output............................................................................................................... 45
Objective 2.9 Discuss options for outputting sound from your computing devices.
Try this: What’s Inside My Computer?...................................................................... 48
MAKE THIS: MAKE: A Mobile App............................................................................... 49
Processing, Storage, and Connectivity........................................................................50
Learning Outcome 2.2 You will be able to describe how computers process and store data and
how devices connect to a computer system.
Processing and Memory on the Motherboard............................................................. 50
The Motherboard and Memory...................................................................................... 50
Objective 2.10 Define motherboard and RAM.
Processing.................................................................................................................... 51
Objective 2.11 Explain the main functions of the CPU.
Storing Data and Information........................................................................................ 52
Hard Drives................................................................................................................... 52
Objective 2.12 List the various types of hard drives.
Cloud Storage............................................................................................................... 52
Objective 2.13 Define cloud storage, and explain how to use it.
Portable and Optical Storage Options............................................................................ 52
Objective 2.14 Describe the various portable and optical storage options.
ETHICS IN IT: What Is Ethical Computing?................................................................... 53
Connecting Peripherals to the Computer.................................................................... 55
Computer Ports............................................................................................................. 55
Objective 2.15 List the common types of ports used today.
TRENDS IN IT: Green Computing (Green IT)................................................................ 56
Adding Ports: Expansion Cards and Hubs..................................................................... 58
Objective 2.16 List the options for adding ports to your device.
Power Controls and Ergonomics.................................................................................. 59
Power Controls.............................................................................................................. 59
Objective 2.17 Describe how to manage power consumption on your computing devices.
Setting It All Up: Ergonomics......................................................................................... 59
Objective 2.18 Define ergonomics, and discuss the ideal physical setup for using computing devices.
TRENDS IN IT: Innovations in Printing.......................................................................... 63
SOLVE THIS: Technology Wish List.............................................................................. 73
viii Contents
thirteenth
thirteenth

EDITION
13
Chapter 3
Using the Internet: Making the Most of the
Web’s Resources.................................................................... 74
Working and Playing on the Web................................................................................76
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is
used for collaboration, communication, commerce, and entertainment purposes.
The Internet and How It Works..................................................................................... 76
The Origin of the Internet............................................................................................... 76
Objective 3.1 Describe how the Internet got its start.
How the Internet Works................................................................................................. 77
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web........................................................... 79
Collaborating with Web 2.0 Tools.................................................................................. 79
Objective 3.3 Discuss the tools and technologies used to collaborate and communicate on the web.
Communicating over the Web....................................................................................... 83
Objective 3.4 Summarize how e-mail and instant messaging are used to communicate over the web.
Business and Entertainment on the Web..................................................................... 85
Types of E-Commerce................................................................................................... 85
Objective 3.5 Describe the different types of e-commerce.
E-Commerce Safeguards.............................................................................................. 86
Objective 3.6 Summarize precautions you should take when doing business online.
Web Entertainment........................................................................................................ 87
Objective 3.7 Describe the types of multimedia files found on the web.
Try this: Create a OneDrive Account to Store and Share
   Your Files in the Cloud.............................................................................................. 90
MAKE THIS: MAKE: A Web-Capable App.................................................................... 91
Using the Web Effectively.............................................................................................92
Learning Outcome 3.2 You will be able to describe the tools and techniques required
to navigate and search the web.
Accessing and Moving Around the Web...................................................................... 92
Web Browsers............................................................................................................... 92
Objective 3.8 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names........................................................................... 93
Objective 3.9 Explain what a URL is, and discuss its main parts.
Navigating the Web....................................................................................................... 94
Objective 3.10 Describe tools used to navigate the web.
Favorites, Live Bookmarks, and Tagging........................................................................ 96
Objective 3.11 Describe tools used to mark websites for future use.
DIG DEEPER: Discovering the Semantic Web.............................................................. 97
Searching the Web Effectively....................................................................................... 98
Using Search Engines................................................................................................... 98
Objective 3.12 Describe the types of tools used to search the web, and summarize strategies used
to refine search results.
Evaluating Websites.................................................................................................... 100
Objective 3.13 Describe how to evaluate a website to ensure it is appropriate to use for
research purposes.
TRENDS IN IT: Doing Business on a Shoestring—Thanks to the Internet................... 101

Contents ix
thirteenth
thirteenth
EDITION

13
Using the Web Ethically............................................................................................... 102
Intellectual Property and Cyberbullying......................................................................... 102
Objective 3.14 Demonstrate an understanding of intellectual property and cyberbullying.
Privacy and Geolocation.............................................................................................. 103
Objective 3.15 Demonstrate an understanding of the ethical issues regarding privacy and geolocation.
ETHICS IN IT: Plagiarism and Copyright Violation: What Can You
   Borrow from the Internet?....................................................................................... 104
SOLVE THIS: Create a Report: Conducting Research on the Web............................. 111

TECHNOLOGY IN FOCUS
The History of the Personal Computer................................................112

Chapter 4
Application Software: Programs That Let You
Work and Play.................................................................... 122
Programs That Let You Work......................................................................................124
Learning Outcome 4.1 You will be able to describe the basic ways to access and use
software and identify the main types of productivity and business software.
The Nuts and Bolts of Software.................................................................................. 124
Software Basics........................................................................................................... 124
Objective 4.1 Describe the differences between application and system software.
Basic Types of Apps and Software............................................................................... 124
Objective 4.2 List different types of apps and software you can use on your computing devices.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce........................... 125
Productivity and Business Software........................................................................... 126
Productivity Software................................................................................................... 126
Objective 4.3 List the types of applications included in productivity software suites, and describe
their uses and features.
Personal Financial Software......................................................................................... 133
Objective 4.4 List software that individuals use to manage their finances.
Business Software....................................................................................................... 134
Objective 4.5 List common types of software that large and small businesses use.
Try this: Citing Website Sources............................................................................. 138
MAKE THIS: MAKE: A More Powerful App................................................................. 139
Programs That Let You Play.......................................................................................140
Learning Outcome 4.2 Describe the different types of multimedia and educational software
available, and discuss how best to manage your software.
Multimedia and Educational Software........................................................................ 140
Digital Image-Editing, Video-Editing, and Drawing Software......................................... 140
Objective 4.6 Describe the uses and features of digital image-editing, video-editing, and drawing software.
Digital Audio Software................................................................................................. 142
Objective 4.7 Describe the uses and features of digital audio software.
DIG DEEPER: How Cloud Computing Works............................................................. 143
App Creation Software................................................................................................ 144
Objective 4.8 Describe the features of app creation software.
Educational and Reference Software........................................................................... 145
Objective 4.9 Describe common types of educational and reference software and their features.

x Contents
thirteenth
thirteenth

EDITION
13
Managing Your Software............................................................................................. 146
Getting Software......................................................................................................... 146
Objective 4.10 Describe where to obtain the main types of software.
Software Licenses....................................................................................................... 148
Objective 4.11 Explain how software licenses function.
ETHICS IN IT: Can I Borrow Software That I Don’t Own?........................................... 149
Getting the Right Software for Your System................................................................. 150
Objective 4.12 Describe how to ensure software you purchase will work on your device.
Installing and Uninstalling Software.............................................................................. 150
Objective 4.13 Describe how to install and uninstall software.
SOLVE THIS: Analyzing Benchmark Data................................................................... 159

Chapter 5
System Software: The Operating System,
Utility Programs, and File Management........................... 160
Understanding System Software................................................................................162
Learning Outcome 5.1 You will be able to explain the types and functions of an operating
system and explain the steps in the boot process.
Operating System Fundamentals................................................................................ 162
Operating System Basics............................................................................................ 162
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Machinery, Networks, and Business........................................ 163
Objective 5.2 Explain the different kinds of operating systems for machines, networks, and business.
Operating Systems for Personal Use........................................................................... 164
Objective 5.3 Explain the most common operating systems for personal use.
What the Operating System Does............................................................................... 167
The User Interface....................................................................................................... 167
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination............................................................................................... 168
Objective 5.5 Explain how the operating system helps manage hardware such as the processor,
memory, storage, and peripheral devices.
ETHICS IN IT: The Great Debate: Is Mac OS X Safer Than Windows?........................ 171
Software Application Coordination............................................................................... 172
Objective 5.6 Explain how the operating system interacts with application software.
Starting Your Computer............................................................................................... 172
The Boot Process........................................................................................................ 172
Objective 5.7 Discuss the process the operating system uses to start up the computer and how
errors in the boot process are handled.
Try this: Using Virtual Desktops in Windows 10...................................................... 176
MAKE THIS: MAKE: A Notification Alert...................................................................... 177
Using System Software...............................................................................................178
Learning Outcome 5.2 You will be able to describe how system software is used, including
managing the user interface, file management, and utility programs.
The Windows Interface................................................................................................ 178
Using Windows 10...................................................................................................... 178
Objective 5.8 Describe the main features of the Windows interface.
File Management.......................................................................................................... 181

Contents xi
thirteenth
thirteenth
EDITION

13
Organizing Your Files................................................................................................... 181
Objective 5.9 Summarize how the operating system helps keep your computer organized.
TRENDS IN IT: Open Source Software: Why Isn’t Everyone Using Linux?.................. 182
Working with Files and Folders.................................................................................... 184
Objective 5.10 Summarize how to view, sort, name, and manage files and folders.
File Compression......................................................................................................... 187
Objective 5.11 Summarize how file compression works.
Utility Programs............................................................................................................ 189
Windows Administrative Utilities................................................................................... 189
Objective 5.12 Outline the tools used to enhance system productivity.
DIG DEEPER: How Disk Defragmenter Utilities Work................................................. 191
File and System Backup Utilities.................................................................................. 192
Objective 5.13 Summarize the utilities used to backup and restore files and the computer system.
Accessibility Utilities..................................................................................................... 192
Objective 5.14 Describe the assistive technology utilities used to make using the computer system easier.
SOLVE THIS: Mobile Operating Systems: Changing Market Share............................. 201

TECHNOLOGY IN FOCUS
Information Technology Ethics...........................................................202

Chapter 6
Understanding and Assessing Hardware:
Evaluating Your System...................................................... 222
Evaluating Key Subsystems.......................................................................................224
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware
functioning.
Your Ideal Computing Device...................................................................................... 224
Moore’s Law............................................................................................................... 224
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Select a Computing Device......................................................................................... 225
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem................................................................................... 226
How the CPU Works................................................................................................... 226
Objective 6.3 Describe how a CPU is designed and how it operates.
Measuring CPU Performance...................................................................................... 228
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
Evaluating the Memory Subsystem............................................................................ 230
Random Access Memory............................................................................................ 230
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM................................................................................................................ 232
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
Evaluating the Storage Subsystem............................................................................. 233
Types of Storage Drives............................................................................................... 233
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
DIG DEEPER: How Hard Drives Work........................................................................ 235
Storage Needs............................................................................................................ 236
Objective 6.8 Evaluate the amount and type of storage needed for a system.

xii Contents
thirteenth
thirteenth

EDITION
13
Try this: Measure Your System Performance........................................................... 240
MAKE THIS: MAKE: A Location-Aware App............................................................... 241
Evaluating Other Subsystems and Making a Decision.............................................242
Learning Outcome 6.2 You will be able to evaluate your system’s reliability and decide
whether to purchase a new system or upgrade an existing one.
Evaluating the Media Subsystems.............................................................................. 242
Video Cards................................................................................................................ 242
Objective 6.9 Describe the features of video cards.
TRENDS IN IT: USB 3.1 and USB-C.......................................................................... 244
Sound Cards............................................................................................................... 245
Objective 6.10 Describe the features of sound cards.
Evaluating System Reliability and Moving On........................................................... 247
Maintaining System Reliability...................................................................................... 247
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer............................................................................... 248
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All........................................................................... 250
SOLVE THIS: Laptop Alternatives............................................................................... 257

Chapter 7
Networking: Connecting Computing Devices................... 258
How Networks Function.............................................................................................260
Learning Outcome 7.1 You will be able to explain the basics of networking, including
the components needed to create networks, and describe the different ways you can
connect networks to the Internet.
Networking Fundamentals........................................................................................... 260
Understanding Networks............................................................................................. 260
Objective 7.1 Explain what a network is and the pros and cons of having one.
Network Architectures................................................................................................. 262
Network Architectures Defined by Distance................................................................. 262
Objective 7.2 Discuss how networks are defined by distance.
Network Architectures Defined by Levels of Administration.......................................... 263
Objective 7.3 Discuss how networks are classified by levels of administration.
Ethernet Protocols....................................................................................................... 264
Objective 7.4 Describe the Ethernet protocols for wired and wireless networks.
Network Components.................................................................................................. 265
Transmission Media..................................................................................................... 265
Objective 7.5 Describe the types of transmission media used in networks.
Basic Network Hardware............................................................................................. 267
Objective 7.6 Describe the basic devices necessary for networks.
Network Software........................................................................................................ 268
Objective 7.7 Describe the type of software necessary for networks.
ETHICS IN IT: Ethical Challenges of the Internet of Things.......................................... 269
Connecting to the Internet........................................................................................... 269
Wired Broadband Internet Connections....................................................................... 269
Objective 7.8 Compare and contrast the broadband options available to access the Internet.
Wireless Internet Access............................................................................................. 271
Objective 7.9 Explain how to access the Internet wirelessly.

Contents xiii
thirteenth
thirteenth
EDITION

13
Dial-Up Connections................................................................................................... 272
Objective 7.10 Summarize the pros and cons of dial-up connections.
Try this: Testing Your Internet Connection Speed.................................................... 274
MAKE THIS: MAKE: Networked Devices.................................................................... 275
Your Home Network....................................................................................................276
Learning Outcome 7.2 You will be able to describe what you need to install and configure
a home network and how to manage and secure a wireless network.
Installing and Configuring Home Networks............................................................... 276
Planning Your Home Network...................................................................................... 276
Objective 7.11 Explain steps you should take before creating a home network.
Connecting Devices to a Network............................................................................... 277
Objective 7.12 Describe what you need in order to connect devices to a network.
Specialized Home Networking Devices........................................................................ 278
Objective 7.13 Describe specialized devices you can add to a home network.
Configuring Software for Your Home Network............................................................. 281
Objective 7.14 Summarize how to configure home network software.
TRENDS IN IT: How Smart Is Your Home?................................................................ 284
Managing and Securing Wireless Networks.............................................................. 285
Troubleshooting Wireless Network Problems............................................................... 285
Objective 7.15 Describe the potential problems with wireless networks and how to avoid them.
Securing Wireless Networks........................................................................................ 285
Objective 7.16 Describe how to secure a wireless home network.
SOLVE THIS: Home Networking Guide....................................................................... 295

TECHNOLOGY IN FOCUS
Under the Hood....................................................................................296

Chapter 8
Digital Devices and Media: Managing a Digital
Lifestyle............................................................................... 308
Mobile Devices...........................................................................................................310
Learning Outcome 8.1 You will be able to discuss the nature of digital signals and how
mobile computing devices are designed and operated.
Digital Basics................................................................................................................ 310
Digital Convergence.................................................................................................... 310
Objective 8.1 Describe how digital convergence has evolved.
Digital vs. Analog......................................................................................................... 311
Objective 8.2 Explain the differences between digital and analog signals.
The Power of Smartphones......................................................................................... 313
Cellular Technology..................................................................................................... 313
Objective 8.3 Describe the technologies used to communicate across cellular networks.
Using Smartphones and Keeping Them Secure.......................................................... 317
Objective 8.4 Explain how to effectively use cellular devices and mobile Internet access and how to keep
your devices secure.
Mobile Computing........................................................................................................ 321
Variety of Devices........................................................................................................ 321

xiv Contents
thirteenth
thirteenth

EDITION
13
Objective 8.5 Demonstrate an understanding of the range of different mobile computing devices.
Selecting a Device....................................................................................................... 322
Objective 8.6 Describe how to evaluate which mobile device is appropriate for a specific user.
Try this: Creating and Publishing a Movie................................................................ 324
MAKE THIS: MAKE: A Video-Playing App.................................................................. 325
The Impact of Digital Information.............................................................................326
Learning Outcome 8.2 You will be able to describe how digital technology is used to
produce and distribute digital texts, music, and video.
Digital Publishing.......................................................................................................... 326
E-Readers................................................................................................................... 326
Objective 8.7 Describe e-readers, and discuss the different types of e-readers that are available.
Using e-Texts............................................................................................................... 327
Objective 8.8 Explain how to purchase, borrow, and publish e-texts.
Digital Music................................................................................................................. 328
Creating and Storing Digital Music............................................................................... 328
Objective 8.9 Describe how digital music is created and stored.
TRENDS IN IT: NFC Chips: Do You Have a Digital Wallet?......................................... 329
Distributing Digital Music............................................................................................. 331
Objective 8.10 Summarize how to stream and publish digital music.
DIG DEEPER: P2P File Sharing.................................................................................. 332
Digital Media................................................................................................................. 333
Digital Photography..................................................................................................... 333
Objective 8.11 Explain how best to create, print, and share digital photographs.
Digital Video................................................................................................................ 334
Objective 8.12 Describe how to create, edit, and distribute digital video.
ETHICS IN IT: Managing Your Copyrights: Copyleft Might Simplify Your Life............... 338
SOLVE THIS: Estimating Cellular Data Usage............................................................. 345

Chapter 9
Securing Your System: Protecting Your Digital
Data and Devices............................................................... 346
Threats to Your Digital Assets.....................................................................................348
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online
annoyances and the threats they pose to your digital security.
Identity Theft and Hackers.......................................................................................... 348
Identity Theft............................................................................................................... 349
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
Hacking....................................................................................................................... 349
Objective 9.2 List and describe the different types of hackers.
Hacking Tools and Attack Types.................................................................................. 350
Objective 9.3 Describe the various tools hackers use and the types of attacks they might launch
against computers.
Computer Viruses......................................................................................................... 353
Virus Basics................................................................................................................. 353
Objective 9.4 Explain what a computer virus is, why they are a threat to your security, how a
computing device catches a virus, and the symptoms it may display.
Types of Viruses.......................................................................................................... 353
Objective 9.5 List the different categories of computer viruses, and describe their behaviors.

Contents xv
thirteenth
thirteenth
EDITION

13
Online Annoyances and Social Engineering.............................................................. 355
Malware: Adware and Spyware................................................................................... 355
Objective 9.6 Explain what malware is, and list the common types of malware.
Spam.......................................................................................................................... 356
Objective 9.7 Define spam, and describe strategies to combat it.
Cookies....................................................................................................................... 358
Objective 9.8 Explain what cookies are and whether they pose a security threat.
Ethics in IT: You’re Being Watched...But Are You Aware You’re Being Watched?..... 359
Social Engineering....................................................................................................... 360
Objective 9.9 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
Trends in IT: Computers in Society: Spear Phishing: The Bane
   of Data Breaches.................................................................................................... 362
Try this: Testing Your Network Security................................................................... 364
MAKE THIS: MAKE: A Password Generator............................................................... 365
Protecting Your Digital Property.................................................................................366
Learning Outcome 9.2 Describe various ways to protect your digital property and data
from theft and corruption.
Restricting Access to Your Digital Assets.................................................................. 366
Firewalls...................................................................................................................... 366
Objective 9.10 Explain what a firewall is and how a firewall protects your computer from hackers.
Preventing Virus Infections........................................................................................... 368
Objective 9.11 Explain how to protect your computer from virus infection.
Authentication: Passwords and Biometrics.................................................................. 370
Objective 9.12 Describe how passwords and biometric characteristics can be used for user
authentication on computer systems.
Anonymous Web Surfing: Hiding from Prying Eyes...................................................... 374
Objective 9.13 Describe ways to surf the web anonymously.
Keeping Your Data Safe............................................................................................... 377
Protecting Your Personal Information........................................................................... 377
Objective 9.14 Describe the types of information you should never share online.
Backing Up Your Data................................................................................................. 377
Objective 9.15 List the various types of backups you can perform on your computing devices,
and explain the various places you can store backup files.
Protecting Your Physical Computing Assets............................................................. 382
Environmental Factors and Power Surges.................................................................... 382
Objective 9.16 Explain the negative effects environment and power surges can have on
computing devices.
Preventing and Handling Theft..................................................................................... 383
Objective 9.17 Describe the major concerns when a device is stolen and strategies for solving
the problems.
DIG DEEPER: Computer Forensics: How It Works..................................................... 385
SOLVE THIS: Computer Security................................................................................ 395

TECHNOLOGY IN FOCUS
Careers in IT.........................................................................................396
Glossary................................................................................................................................. 408
Index...................................................................................................................................... 419

xvi Contents
thirteenth
thirteenth

EDITION
13
About the Authors
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer
science and business courses. He holds a BS in accounting from Rider
University and an MS in information systems from Drexel University, and
he is a certified public accountant. After a successful career in business,
Alan finally realized that his true calling is education. He has been teaching at the college
level since 2000. Alan enjoys attending technical conferences and meets regularly with
faculty and administrators from other colleges to discuss curriculum development and new
methods of engaging students.

Kendall Martin, PhD


[email protected]
Kendall is a professor of Computer Science at Montgomery County
Community College with teaching experience at both the undergraduate
and graduate levels at a number of institutions, including Villanova
University, DeSales University, Ursinus College, and Arcadia University.
Kendall’s education includes a BS in electrical engineering from the
University of Rochester and an MS and a PhD in engineering from the University of
Pennsylvania. She has industrial experience in research and development environments
(AT&T Bell Laboratories), as well as experience with several start-up technology firms.

Mary Anne Poatsy, MBA


[email protected]
Mary Anne is a senior faculty member at Montgomery County
Community College, teaching various computer application and
concepts courses in face-to-face and online environments. She
enjoys speaking at various professional conferences about innovative
classroom strategies. She holds a BA in psychology and education
from Mount Holyoke College and an MBA in finance from Northwestern University’s Kellogg
Graduate School of Management.
Mary Anne has been in teaching since 1997, ranging from elementary and secondary
education to Montgomery County Community College, Gwynedd-Mercy College,
Muhlenberg College, and Bucks County Community College, as well as training in the
professional environment. Before teaching, she was a vice president at Shearson Lehman
Hutton in the Municipal Bond Investment Banking Department.

About the Authors xvii


thirteenth
thirteenth
EDITION

13
Dedication
For my wife, Patricia, whose patience, understanding, and support
continue to make this work possible … especially when I stay up past
midnight writing! And to my parents, Jackie and Dean, who taught me
the best way to achieve your goals is to constantly strive to improve
yourself through education. Alan Evans

For all the teachers, mentors, and gurus who have popped in and out
of my life. Kendall Martin

For my husband, Ted, who unselfishly continues to take on more


than his fair share to support me throughout this process, and for my
children, Laura, Carolyn, and Teddy, whose encouragement and love
have been inspiring. Mary Anne Poatsy

xviii Dedication
thirteenth
thirteenth

EDITION
13
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching,
and they are a continual source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our
spouses and children made sacrifices (mostly in time not spent with us) to permit us to
make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience,
a few individuals deserve special mention. The constant support and encouragement we
receive from Jenifer Niles, Executive Acquisitions Editor, and Andrew Gilfillan, VP, Editorial
Director, continually make this book grow and change. Our heartfelt thanks go to Shannon
LeMay-Finn, our Developmental Editor. Her creativity, drive, and management skills helped
make this book a reality. We also would like to extend our appreciation to Jonathan Cheung
and Holly Haydash, our Editorial and Production Project Managers, who work tirelessly to
­ensure that our book is published on time and looks fabulous. The timelines are always
short, the art is complex, and there are many people with whom they have to coordinate
tasks. But they make it look easy! We’d like to extend our thanks to the media and ­MyITlab
team: Eric Hakanson, Zach Alexander, and John Cassar for all of their hard work and
­dedication.
There are many people whom we do not meet in person at Pearson and elsewhere who
make significant contributions by designing the book, illustrating, composing the pages,
producing multimedia, and securing permissions. We thank them all.
And finally, we would like to thank the reviewers and the many others who contribute
their time, ideas, and talents to this project. We appreciate their time and energy, as their
comments help us turn out a better product each edition. A special thanks goes to ­Elizabeth
McBride, a wonderfully talented graphic designer who helped by creating many new
­graphics for this edition of the text.

Acknowledgments xix
thirteenth
thirteenth
EDITION

13
Technology in Action
Reviewers
Pearson and the authors would like to thank the following people for their help and
time in making this book what it is over the 13 editions. We couldn’t publish this
book without their contributions.

Neale Adams Iowa Central Community College Gerald Burgess Western New Mexico University
Paul Addison Ivy Tech Dave Burgett McLennan
Afrand Agah West Chester Ed Bushman Yavapai College
Jack Alanen CSU-Northridge Marcus Butler West LA
Karen Allen Community College of Rhode Island Eric Cameron Passaic County Community College
Ted Allen Reasoner IUPUI Jill Canine Ivy Tech
Peggy Anderson SUNY at Cortland Gene Carbonara Long Beach Community College
Barry Andrews Mt. SAC Gene Carbonaro Long Beach City College
Lou Ann Stroup Ivy Tech John Carlisle Nashua Community College
Mary Ann Zlotow College of DuPage Glenn Carter Sonoma State
Sabum Anyangwe Harford Community College Steve Carver Ivy Tech
Linda Arnold HACC Patricia Casey Trident Tech
Adnan Atshan Passaic County Community College Joni Catanzaro Louisiana State University
Adeleye Bamkole Passaic County Community College Afi Chamlou NOVA Alexandria
Guarav Bansal Wisconsin-Green Bay Robert Chirwa KCTCS-Bluegrass-Cooper-CIT 105
Susan Barkalow St. Cloud State Debbie Christenberry Randolph Community College
Bill Barnes Catawba Valley Community College Desmond Chun Chabot College
Ricky Barnes Catawba Valley Community College Sherri Clark Ivy Tech
Carolyn Barren Macomb Community College Kevin Cleary SUNY at Buffalo
Tony Basilico Community College of Rhode Island Cynthia Collings Central AZ
Steven Battilana West Chester Mark Connell SUNY at Cortland
Michelle Beets Iowa Central Community College Kae Cooper BCTC/KCTCS
Kourosh Behzadnoori Tarrant SE Dale Craig Fullerton College
Chris Belcher CCAC-South Becky Curtain William Rainer Harper College
Elise Bell CCSF Juliana Cypert Tarrant County College
Julie Bell Delgado Cmty Clg Paul Dadosky Ivy Tech
Robert Benavides Collin Cty Enoch Damson Akron
Garland Berry Columbia College James Dang Tarrant SE
Diane Bittle HACC Marvin Daugherty Ivy Tech
Burton Borlongan Mesa Community College John Dawson IUPUI
Carolyn Borne Louisiana State University Robert Deadman IUPUI
Gina Bowers-Miller HACC-Wildwood Ed Delean NOVA Alexandria
Jeff Bowker Montco Mary Dermody Chabot College
Vicki Brooks Columbia College Don Dershem Mt View

xx Technology in Action Reviewers


thirteenth
thirteenth

EDITION
13
Charles Dessasure Tarrant SE Jerry Gonnella Northern KY
Jeanette Dix Ivy Tech Holly Gould Ivy Tech
Sally Dixon Skagit Valley Community College Deidre Grafel Chandler-Gilbert Community
Gretchen Douglas SUNY at Cortland College
Judy Duff Louisiana Delta College Diedre Grafel Chandler Gilbert Community
College
Stacia Dutton SUNY Canton
Kemit Grafton Oklahoma State University-
Donna Earhart Genesee Community College Oklahoma City
Ed Eill Delaware City Community College Debra Grande Community College of Rhode
Pam Ellis PA College of Technology Island
Sylvia Emerson Rock Valley College Nancy Grant CCAC-South
John Enomoto East LA Wade Graves Grayson
Ron Enz Chattahoochee Tech Natalia Grigoriants Pierce College
Nancy Evans Indiana University-Purdue Glen Grimes Collin Cty
University Indianapolis Toby Gustafson UCR
James Fabrey West Chester Greg Hanson Ivy Tech
Deb Fells Mesa Community College A.C. Chapin Harford Community College
Pat Fenton West Valley Marie Hartlein
Marjorie Feroe Delaware City Community Montco Meng Has
College
Burlington County Lisa Hawkins
Beverly Fite Amarillo College
Carol Fletcher Louisiana Delta College Frederick Community Joan Heise
Barbara Fogle, Stuhr Trident Tech College
Ann Ford Tyson Florida State University Ivy Tech Sue Heistand
coordinator) Iowa Central Jessica Helberg
Tom Foster Chandler Gilbert Community Community College
College Northern Virginia Terri Helfand
Susan Fry Boise State University Community College
Barb Garrell Delaware City Community Chaffey Community Jaime Hicks
College College
Barbara Garrell Delaware County Community Ivy Tech Fred Hills
College McLennan Timothy Hinz
Rich Geglein Ivy Tech Genesee Community Andrew Hobbs
Janet Gelb Grossmont Community College College
Kevin Gentry Ivy Tech Delaware State Kristen Hockman
Ian Gibbons Hillsborough Community University
College-Ybor Univ of Missouri- Susan Hoggard
Columbia
Randy Gibson Indian River State College
Tulsa Community Don Holcomb
Ernie Gines Tarrant SE
College
Rebecca Giorcelli Fairmont State University
KCTCS-Bluegrass- Terry Holleman
Anita Girton PA College of Technology Cooper-CIT 105
Ellen Glazer Broward Community College, Catawba Valley Debbie Holt
South Community College
Cathy Glod Mohawk Valley Cmty College KCTCS-Bluegrass- Barbara Hotta
Valerie Golay Ivy Tech Cooper-CIT 105

Technology in Action Reviewers xxi


thirteenth
thirteenth
EDITION

13
Ellen Kessler HACC-Wildwood Blankenstein Nashua Community College
Allyson Kinney Gateway Community College Denise Nearing Indian River State College
REBECCA KIRK Augusta State University Jean-Claude Ngatchou New Jersey City Univ.
Ronald Kizior Loyola University Chicago Doreen Nicholls Mohawk Valley Cmty College
Meg Kletke Oklahoma State University Brenda Nielsen Mesa Community College
Paul Koester Tarrant County College, Northwest Keith Noe Ivy Tech
Kam Kong Delaware State University Kathy Olson Ivy Tech
Hon-Chung Kwok CCSF Helen Ortmann CCAC-South
Susan LaBrie Northampton Community College Meshack Osiro Ivy Tech
Don Lafond SJRCC (St. John’s River) Shelly Ota Leeward Community College
Rose LaMuraglia San Diego City ChongWoo Park Georgia Gwinnett College
David Lange Grand Valley Lucy Parker CSU-Northridge
Earl Latiolas Delgado Cmty Clg Rachel Pena South TX College
Janet Laubenstein Northampton Cmty Coll Wayne Phillips Chabot College
Lori Laudenbach St. Cloud State Jennifer Pickle Amarillo
Krista Lawrence Delgado Cmty Clg Blanca Polo Leeward Community College
Dr. Kate LeGrand Broward College Jim Poole Honolulu Community College
Kate LeGrand Broward Community College, Brian Powell West Virginia University
South Ernest Proctor LA Trade
Yi Li Zhuang Macomb Community College Diane Puopolo Bunker Hill Community College
Darrell Lindsey SJRCC (St. John’s River) Mike Puopolo Bunker Hill Community College
Bob Lingvall Southwestern James R. Anthos South University-Columbia
Duane Lintner Amarillo David R. Surma Indiana University South Bend
Thomas Liu New Jersey City Univ. Charles R. Whealton Delaware Technical and
Wei Liu Georgia Gwinnett College Community College
Lynne Lyon Durham College Pat Rahmlow Montco
Lydia Macaulay Tarrant SE Michelle Reznick Oakton Community College
Norma Marler Catawba Valley Community Leasa Richards Columbia College
College Kathie Richer Edmonds Community College
Benjamin Marrero Ivy Tech Darrell Riddell Ivy Tech
Ben Martz Northern KY Donald Riggs Schenectady County Community
Lydia Mata Eastern AZ College
Jenny Maurer PA College of Technology Don Riggs Schenectady County Community
John Mayhorne Harford Community College College
Glendora Mays SJRCC (St. John’s River) Terry Rigsby Hill College
James McBride Eastern AZ Amy Roche Northampton Community College
Kari Meck HACC Scott Rosen Santa Rosa Junior College
Doug Medin Western New Mexico University Peter Ross Univ. of Albany
John Messer PA College of Technology Scott Russell Eastern AZ
Hillary Miller Kingwood Amy Rutledge Oakland University
Saeed Molki South TX College Tom Ryan SJRCC (St. John’s River)
Phil Moorhead Ivy Tech Jessie Saldana Cypress
Linda Moulton Montco Lorraine Sauchin Duquesne
Rob Murray Ivy Tech Judy Scheeren Duquesne

xxii Technology in Action Reviewers


thirteenth
thirteenth

EDITION
13
Lois Scheidt Ivy Tech James Taggart Atlantic Cape Community College
Marcia Schlafmitz New Jersey City Univ. Mel Tarnowski Macomb Community College
NAME SCHOOL Juliana.P. Cypert Tarrant County College-NE
Ken Schroeder Ivy Tech Joyce Thompson Lehigh Carbon Community
Todd Schultz Augusta State University College
Dick Schwartz Macomb Community College Janine Tiffany Reading Area Comm College
Francis Seidel Frederick Cmty College Faye Tippey Ivy Tech
Lili Shashaani Duquesne Matthew Trotter South TX College
Emily Shepard Central Carolina Community College Pam Uhlenkamp Iowa Central Community College
Helen Sheran East LA Pat Vacca El Camino College
Cliff Sherrill Yavapai College Nelmy Vasquez Broward Community College,
South
Lisa Simpson-Kyle Yavapai College
Pete Vetere Montco
Noah Singer Tulsa Community College
Susie Viars-Thomas Grayson
Steve Singer Kapiolani Community College
Gabriel Viera South TX College
Ann-Marie Smith Delaware City Community College
Cynthia Wagner McLennan
Will Smith Tulsa Community College
Rod Waller Indian River State College
Michele Smolnik Columbia College
Laurie Wallmark Raritan Valley Community College
Ali Soleymani NOVA Alexandria
Kari Walters Louisiana State University
Steve St. John Tulsa Community College
Stacy Ward Grafton High School
Neal Stenlund Northern Virginia Community
College Karen Weil McLennan
Steve Stepanek CSU-Northridge Charles Whealton Del Tech & Community
College-Dover
Jo Stephens University of AR Community
College -Batesville Deena White Grayson
Dennis Stewart NOVA Alexandria Phil Whitney Bakersfield College
Ben Stonebraker Ivy Tech Casey Wilhelm North Idaho College
Lynne Stuhr Trident Tech Billie Williams San Diego City
Alexis Stull Fairmont State University Melanie Williamson KCTCS-Bluegrass-Cooper-CIT
105
Denise Sullivan Westchester Community College
Xin Xu Georgia Gwinnett College
Dottie Sunio Leeward Community College
Thomas Yip Passaic County Community
Dave Surma IU South Bend College
Michael Swafford Tulsa Community College Roger Young Ivy Tech
Cheryl Sypniewski Macomb Community College Mary Zegarski Northampton Community College
Ann Taff Tulsa Community College

Technology in Action Reviewers xxiii


thirteenth
thirteenth
EDITION

13
Letter from the Authors
Our 13th Edition—A Letter from the Authors

Why We Wrote This Book


The pace of technological change is ever ­increasing.
In education, we have seen this impact us more
than ever in the past year— the Maker movement,
MOOCs, touch-screen mobile delivery, and Hangouts
are now fixed parts of our environment.
Even the most agile of learners and educators need
support in keeping up with this pace of change. We
have responded by integrating material to help students
develop skills for web application and mobile programming. We see the incredible value of these
skills and their popularity with students, and have included Make This exercises for each chapter.
These exercises gently bring the concepts behind mobile app development to life. In addition,
there is a Solve This exercise in each chapter that reinforces chapter content while also
reinforcing Microsoft Office skills. These projects help to promote students’ critical thinking
and problem-solving skills, which employers highly value.
Our combined 50 years of teaching computer concepts have coincided with sweeping
­innovations in computing technology that have affected every facet of society. From iPads to
Web 2.0, computers are more than ever a fixture of our daily lives—and the lives of our students.
But although today’s students have a much greater comfort level with their digital environment
than previous generations, their knowledge of the machines they use every day is still limited.
Part of the student-centered focus of our book has to do with making the material truly
­ ngaging to students. From the beginning, we have written Technology in Action to focus on
e
what matters most to today’s student. Instead of a history lesson on the microchip, we focus
on tasks students can accomplish with their computing devices and skills they can apply
immediately in the workplace, the classroom, and at home.
We strive to keep the text as current as publishing timelines allow, and we are ­constantly
looking for the next technology trend or gadget. We have augmented the text with ­weekly
­technology updates to help you keep your classroom on top of the latest ­breaking ­developments
and continue to include a number of multimedia components to enrich the classroom and
­student learning experience. The result is a learning system that sparks ­student interest by
focusing on the material they want to learn (such as how to integrate computing devices into a
home network) while teaching the material they need to learn (such as how networks work).
The sequence of topics is carefully set up to mirror the typical student learning experience.
As they read through this text, your students will progress through stages and learning
outcomes of increasing difficulty:
1. Thinking about how technology offers them the power to change their society and their
world
2. Examining why it’s important to be computer fluent
3. Understanding the basic components of computing devices
4. Connecting to and exploring the Internet
5. Exploring software
6. Learning the operating system and personalizing their computer

xxiv Letter from the Authors


thirteenth
thirteenth

EDITION
13
7. Evaluating and upgrading computing devices
8. Understanding home networking options and keeping computing devices safe from
hackers
9. Going mobile with smartphones, netbooks, tablets, and laptops
10. Going behind the scenes, looking at technology in greater detail
We strive to structure the book in a way that makes navigation easy and reinforces key
concepts. In this edition, we have designed the text around learning outcomes and ­objectives,
making them a more prominent part of the chapter structure. Students will see the learning
­outcomes and objectives in the chapter opener, throughout the text itself, as well as in the
­summary so they understand just what they are expected to learn.
We continue to structure the book in a “spiraling” manner, intentionally introducing on a basic
level in the earlier chapters concepts that students traditionally have trouble with and then later
expanding on those concepts in more detail when students have become more comfortable
with them. Thus, the focus of the early chapters is on practical uses for the computer, with
­real-world examples to help the students place computing in a familiar context.
For example, we introduce basic hardware components in Chapter 2, and then we go
into increasingly greater detail on some hardware components in Chapter 6 and in the
“Under the Hood” Technology in Focus feature. The Behind the Scenes chapters ­venture
deeper into the realm of computing through in-depth explanations of how ­programming,
networks, the Internet, and databases work. They are specifically designed to keep
more experienced students engaged and to challenge them with interesting research
­assignments.
In addition to extensive review, practice, and assessment content, each chapter contains several
problem-solving, hands-on activities that can carried out in the classroom or as homework:
• The Try This exercises lead students to explore a particular computing feature related to the
chapter.
• The Make This exercises are hands-on activities that lead students to explore mobile app
development.
• The Solve This exercises integrate and reinforce chapter concepts with Microsoft Office skills.
Throughout the years we have also developed a comprehensive multimedia program to
reinforce the material taught in the text and to support both classroom lectures and distance
learning:
• The Helpdesk training content, created specifically for Technology in Action, enables
students to take on the role of a helpdesk staffer fielding questions posed by computer users.
These have been updated to reflect the way in which users access help today.
• Exciting Sound Byte multimedia—fully updated and integrated with the text—expand
student mastery of complex topics.
• The Tech Bytes Weekly updates deliver the latest technology news stories to you for use in
your classroom. Each is accompanied by specific discussion topics and activities to expand
on what is within the textbook materials.
This book is designed to reach the students of the twenty-first century and prepare them
for the role they can take in their own community and the world. It has been an honor to
work with you over the past 13 years to present and explain new technologies to students,
and to show them the rapidly growing importance of technology in our world.

Letter from the Authors xxv


This page intentionally left blank
thirteenth
thirteenth

EDITION
13
What’s New
Technology in Action, 13th Edition

Welcome to the Thirteenth Edition of ­Technology in Action!


In this edition, we have paid special attention to incorporating clearly defined and measurable Learning Outcomes and Objectives, so
that you know what students will be learning and what they will be prepared to do with this new knowledge. As has always been the
case with Technology in Action, the quizzes, review materials, and multiple learning resources are all tied to the content and objec-
tives of the chapter. Using the resources in the chapter, you and your students will know that the key learning objectives are being
achieved. So, explore, discover, and experience technology with the ­immersive and adaptive Technology in Action—the book that
uses technology to teach technology!
Technology in Action is a learning system that pushes the ­envelope of what is possible in technology, and what is helpful in teach-
ing. It is a system that fits the way students are ­learning today and uses rich companion media to engage students in and out of
the classroom while providing essential training on computer concepts.
The optimal way to experience Technology in Action is through MyITLab. All of the instruction, practice, review, and assessment
resources are in one place, allowing you to arrange your course easily, and for students to have a consistent learning experi-
ence from chapter to chapter.

Explore the Hallmarks and New Features of Technology in Action, 13th Edition
Instruction: Engage all types of learners with a Practice: Hands-on resources and simulations allow
variety of instructional resources students to demonstrate understanding
• Interactive e-Text provides an environment in which stu- • Try This Projects are hands-on projects that students
dents can interact with the learning resources directly and complete to practice what they are learning and demon-
receive immediate feedback. strate proficiency with important topics. Each project is
• NEW Preview Videos provide students with a quick look at accompanied by a how-to video.
what they will learn in the chapter. • Solve This! Projects put the concepts students are
• PowerPoint Presentations can be used in class for lecture ­learning into action through real-world problem solving
or assigned to students, particularly online students for ­using Microsoft Word, Access, and Excel. There is a grader
instruction and review. version available for most projects in the Practice folder.

• Audio PowerPoint Presentations deliver audio versions • Newly Redesigned Helpdesks are interactive lessons
of the PowerPoint presentations—an excellent lecture- based on the chapter objectives. Students are fully
replacement option for online students. ­engaged as they play the role of a helpdesk staffer assisting
customers via a live chat, decision-based simulation.
• TechBytes Weekly is a weekly newsfeed that keeps your
course current by providing interesting and relevant news items. • Sound Bytes provide an audio/visual lesson on additional
The articles come with ready-to-use discussion questions. topics related to the chapter, including a brief quiz at the end.

• Make This! Projects address the hot area of mobile app • IT Simulations provide 12 individual scenarios that
creation! Each chapter includes activities where students ­students work through in an active learning environment.
build programs that run on their mobile devices. Most of the • Windows 10 high-fidelity training simulations allow
chapters use App Inventor to build Android apps that can students to explore Windows in a safe, guided ­environment
be installed on any Android device. Even without an Android that provides feedback and Learning Aids (Watch and
device, students can use the emulator and still get creating. ­Practice) to assist them if they need help.
By the end of the course they will have built 11 small apps.
Each project includes instructions and a how-to video. Review: Self-check resources keep learning
  An annotated instructor’s edition provides teaching tips, on track
homework and assessment suggestions, brief overviews of • Replay Videos for Parts 1 and 2 of the chapter provide
each chapter’s Try This, Make This, and Solve This exer- an objective-based review of what students should have
cises, as well as select Sound Byte talking points and ethics learned. Videos have a short quiz and can be accessed
debate starters. from mobile devices for a quick review.

What’s New xxvii


thirteenth
thirteenth
EDITION

13
• Check Your Understanding Quizzes Part 1 and 2 provide Chapter 3
a self-check covering objectives in each part of the chapter • Learning Outcomes and Learning Objectives have been in-
so that students can see how well they are learning the tegrated throughout the chapter and in the Chapter Review.
content.
• Throughout the chapter, text, figures, and photos have
• Adaptive Dynamic Study Modules are adaptive been updated.
­flashcards that provide students with a personalized
• New content about project collaboration (video conferenc-
review based on their strengths and weaknesses.
ing, screen sharing, and project management tools) has
Assessment: Measure performance with ready-to- been added.
use resources • The Bits&Bytes “Making Safe Online Payments” has been
• Chapter Quiz provides a way for students to test that they updated by adding in biometric security measures.
have learned the material from the entire chapter. • A new Bits&Bytes, “Microsoft Edge: The New Browser,” has
• Critical Thinking Questions require that students demon- been added.
strate their understanding through written answers that are • New content on caret browsing has been added.
manually graded.
• A new Bits&Bytes, “Maintain Privacy while Searching the
• Testbank Exams provide customizable prebuilt, auto- Web,” has been added.
graded, objective-based questions covering the chapter
• A new Bits&Bytes, “Digital Agents and Predictive Search,”
objectives.
has been added.
In addition to these changes, all chapters have been • A new ethics section on using the web ethically that
updated with new images, current topics, and state-of-the includes content on intellectual property, cyberbullying,
art technology coverage. Some of the chapter changes privacy, and geolocation has been added.
are listed here:
Technology in Focus: The History of the Personal Computer
Chapter 1
• Learning Outcomes and Learning Objectives have been
• Learning Outcomes and Learning Objectives have been in- integrated throughout the Technology in Focus.
tegrated throughout the chapter and in the Chapter Review.
• Throughout the Technology in Focus, text, figures, and
• Throughout the chapter, text, figures, and photos have photos have been updated.
been updated.
Chapter 4
• New content on the political impact of technology has been
added. • Learning Outcomes and Learning Objectives have been
­integrated throughout the chapter and in the Chapter
• Content on the use of technology in careers has been ­Review.
updated.
• Throughout the chapter, text, figures, and photos have
• New “Dig Deeper: Augmentative and Virtual Realities” has been updated.
been added.
• Next generation smartphone sensor technology is now
• New ethics section on rules for ethical conduct in a global, covered in the “How Cool Is This?” feature.
Internet-enabled world has been added.
• The section on app creation software has been updated.
Chapter 2 • Images and text have been updated to reflect Office 2016
• Learning Outcomes and Learning Objectives have been in- changes.
tegrated throughout the chapter and in the Chapter Review.
Chapter 5
• Throughout the chapter, text, figures, and photos have
• Learning Outcomes and Learning Objectives have been
been updated to reflect Windows 10 changes.
­integrated throughout the chapter and in the Chapter
• The section on voice input has been updated to reflect in- ­Review.
formation on the latest intelligent personal assistants (such
• Microsoft HoloLens is now covered in the “How Cool Is
as Siri and Cortana).
This?” feature.
• A new Bits&Bytes, “Save Power and Avoid Eyestrain: Use
• New “How Cool Is This?” feature has been added on
Blackle,” has been added.
smartwatches.

xxviii What’s New


Random documents with unrelated
content Scribd suggests to you:
master profits by their labors, he should also be responsible for any
damage they may cause.
THE GLORIOUS FLAVIUS RECESVINTUS, KING.
XVI. Concerning such Property as the Husband and Wife
together have Accumulated during their Married Life.
When persons of equal rank marry one another, and, while living
together, either increase or waste their property, where one is more
wealthy than the other; they shall share in common the gains and
losses, in proportion to the amount which each one holds. If the
value of their possessions is the same, neither has a right to assume
superiority over the other. For, it is not unusual, where such property
is equal in amount, for one party, in some way, to take advantage of
the other. And if it should be evident that the possessions of one
exceed those of the other in value, as above stated, there shall be
an apportionment of it made, showing what either shall have the
right to claim after the death of the other, and what either shall have
a right to dispose of to his or her children, or to heirs, or in any
other way that may be desired. This provision shall apply to, and be
observed in, all cases relating to the estates of both husbands and
wives. The distribution and possession of other property concerning
which an agreement in writing has been entered into by both
parties, shall be held and enjoyed by them according to the terms of
that written agreement. If the husband should acquire any property,
either from strangers, or during any public expedition, or by the
donation of the king, or of a patron, or of any of his friends, his
children or his heirs shall have a right to claim it, and shall have
absolute power to dispose of it as they wish. The same rule shall
apply to women who have received gifts from any source.

XVII. In what way a Child may Inherit Property.


Ambiguity frequently produces error where a reasonable
explanation is not given to elucidate a fact that is doubtful. Many
persons deny that a child dead in infancy can have, at any time, a
right to inherit from its parents, and we desire now to put an end to
such disputes. For the origin of nature is such, that he who is born
uses the senses of sight and touch before anything else. Who,
therefore, can inherit any earthly possessions who died almost
before he was sensible to light? And in what way can he be the
possessor or property for whose control he was not destined, and
who has scarcely had the use of the elements of which he was
formed? And he who has hardly been blessed by the light of heaven;
how can the unexpected inheritance of the world enrich him when
suddenly removed by death? With what reason can he claim the
rights of the living, who is more nearly associated with death than
with life, and who thus quickly dying in the midst of light, has fallen
back into darkness? Therefore, that the inheritance of an infant may
belong to its nearest relatives, and the fact that he was living be
clearly proved; and as the child had a right to eternal life, so also
that it may have a right to terrestrial life; we hereby decree that no
child of either sex shall inherit, unless it has been proved that it lived
for the space of ten days after its birth, and shall have received the
holy sacrament of baptism, so that the father or mother of the child
who shall be entitled to its inheritance, may, before its death,
prepare it for its entrance into heaven; and that while still living, it
shall obtain the possessions of the earth with their transitory
benefits. And thus, while heavenly possessions are provided for it, it
shall also be permitted to acquire those of the earth; and although
while dead, it cannot benefit by the things of earth, it can, at least,
enjoy those of heaven.
FLAVIUS CHINTASVINTUS, KING.
XVIII. How the Parents of a Child can Inherit from Him.
Where the father is dead and the son or daughter should have
lived ten days or longer, should have been baptized, and then should
die; whatever either would have inherited from the estate of his or
her father, may be claimed by his or her mother. And, in like manner,
if the mother should die, the father shall not be entitled to the share
of the deceased child, unless he be able to prove that that child has
lived ten days, or longer, and has been baptized. And if neither
father nor mother in whom these rights are vested, should leave any
children, the entire inheritance shall be divided among the other
descendants; but they shall not have the power to give to each
grandchild more than the third part of the aforesaid property. And if
they should wish to give any of it to the Church, or to freedmen, or
to any one else, they shall have the right to dispose of only the fifth
part of it in this manner, as prescribed by a former law. But where
neither children nor grandchildren, nor great-grandchildren should
be living, they shall have the right to make such disposition of their
property as they desire.
If said parents should die intestate, then such other of their
relatives as are next of kin shall be entitled to the aforesaid property.
Thus, if after the death of a child, the father should inherit its estate,
and should die intestate, the inheritance shall belong to those heirs
who are entitled to it by law. In like manner, if the mother should
inherit the estate of her deceased child, and should die intestate, all
interest in that estate shall belong to her nearest heirs; on this
condition, that the grandchildren of the son or daughter who died
while their father and mother were living, shall inherit such a portion
of the estate of their grandfather or grandmother as their own
parents would have inherited had they been living. But if a son
having a wife and children should die during the life of his father,
before his father has given him all that he was entitled to from his
estate, and his sons should also die during the life of their
grandfather, the daughter-in-law shall receive only so much as the
father had formerly set aside for her husband. Nor can the widow
claim any more than this from her father-in-law or any of his
relatives. But if the son had been living with the father, and had not
yet received anything from him; the son’s widow shall then only be
entitled to what she obtained as a dowry at the time of her
marriage. Where the son, in obedience to his father’s wishes,
permitted the latter to retain what he was entitled to from his
mother’s estate, and should bequeath it at his death to his wife, or
to any one else; such bequest for the benefit of the wife or of
others, if made in writing, shall be valid: provided his mother did not
have other sons by the same husband. If, however, other sons
should be living, the provisions of the former law must be carried
out.
FLAVIUS CHINTASVINTUS, KING.
XIX. Concerning Posthumous Children.
We fulfil the injunctions of the Divine Law when we provide for
those who are yet unborn. Therefore, when a man cut off by death,
leaves his wife pregnant, we decree that the child who is born
afterwards shall share equally with those who are already born. But
if he should leave no issue, and should bequeath his property to any
person, the latter shall only be entitled to receive the fourth part of
it. The three remaining parts shall descend, without question, to the
posthumous child. Where a husband and wife before they have
children, enter into a written agreement, mutually bestowing their
property upon one another, and, afterwards, should have children;
such a disposition of property, if their children are living, shall be
void; and the children may take and hold the entire property of their
parents, with the exception of the fifth part, which the parents shall
have the right to dispose of otherwise. But if one of them, that is to
say, either the husband or wife, before the marriage was
consummated, should be proved to have made for the benefit of the
other a written agreement disposing of property, it shall remain in
full force; and such donation cannot, in any way, be overthrown by
children subsequently born of their marriage.
THE GLORIOUS FLAVIUS CHINTASVINTUS, KING.
XX. He who leaves no Children, has full Power to Dispose
of his Property as he Pleases.
Every freeborn man and woman, whether belonging to the
nobility, or of inferior rank, who has no children, grandchildren, or
great-grandchildren, has the unquestionable right to dispose of his
or her estate at will; nor can any arrangement that either may make,
be set aside by any relatives of theirs belonging either to the direct
or to the collateral line. For those belonging to degrees of
relationship other than the above, in the direct line, cannot, in the
order of nature, receive the inheritance. Such relatives can, however,
inherit from the intestate in accordance with the law which defines
their rights.
TITLE III. CONCERNING WARDS AND THEIR GUARDIANS.

I. What a Minor Is.


II. From what date Time is to be Computed in Bringing Lawsuits relating to
Minors.
III. How the Guardianship of Wards shall be Entered upon; what Portion of
their Property they shall Receive, and what Portion shall be Given to
their Guardians.
IV. Guardians shall have no Right to Exact from Wards in their Charge any
Instruments in Writing whatever.

FLAVIUS CHINTASVINTUS, KING.


I. What a Minor Is.
It is a part of the practice of the duties prescribed by law, to so
care for the rights of minors that they shall suffer no loss of their
inheritance. Up to this time, little children left by a father have been
called minors, for the reason that the mother has not less
responsibility and care, on their account, than when both parents
were living; and therefore we now decree, that henceforth any
children left by father or mother, and who have not yet attained the
age of fifteen years, shall be designated minors.
FLAVIUS CHINTASVINTUS, KING.
II. From what date Time is to be Computed in Bringing
Lawsuits relating to Minors.
Where a question arises concerning the time within which an
action at law can be maintained for the recovery of property in
which minors are interested, we decree that an estimate must be
made of the period which has elapsed since the parents have lost
possession of said property; that is to say, it must be determined
whether the entire number of years from that date, when added to
those of the minor shall amount to fifty; and, if the number should
be greater than that, the minor shall not be entitled to recover. And,
moreover, if the parents of the minor in their lifetime, shall have
neglected to assert their rights for the space of thirty years, the said
minor shall not be permitted to prosecute such a claim as their
representative.[21]

III. How the Guardianship of Wards shall be Entered


upon; what Portion of their Property they shall Receive, and
what Portion shall be Given to their Guardians.
After the death of the father, the mother shall have the
guardianship of the minor children, if she should wish it, provided
she remains a widow; and she shall make an inventory of the
property to which the children are entitled, by means of which their
rights to their inheritance may be established. But if the mother
should marry again, any one of the sons who has attained his
majority, that is, who has reached the age of twenty years, may
assume the guardianship of his younger brothers; and shall see that
their property is not alienated, or dissipated through neglect, by
themselves, or by any one else. But, in case he himself should use it
up, or sell it, or give it away, or permit it to be lost through his own
negligence: as soon as his brothers shall have become of age, he
shall be compelled to make restitution out of his own share, of
whatever was wasted by him. He shall, however, be allowed the
tenth part of the income for the purpose of living, to the end that he
may not burden with extravagant expenses what should be reserved
for the minor heirs. Where he spends his own money, or uses his
own property for the necessaries and business of all, and this fact is
brought to the attention of the judge, he shall be reimbursed for his
expenditures out of the entire estate left by his father. If any of the
brothers should not be of lawful age, or of proper character to
undertake the guardianship of orphans, a paternal uncle of a cousin
may assume this duty; and if neither the paternal uncle nor his son
should be found worthy, then a guardian shall be selected by the
other relatives in the presence of the judge.
Where neither the mother, nor any one else, assumes the
guardianship, an inventory of all the property which the father left
shall be drawn up and signed by her and by witnesses, from the
number of three to five, and shall be placed in the keeping of any
bishop or priest whom the relatives may select, to be delivered to
the children when they have attained their majority.
It is also hereby provided that if any suits are brought against
minors, their guardian, should he desire it, has a right to defend
such actions. If, however, he should neglect to do so, a judgment
shall be rendered by the court in favor of the plaintiff, without
prejudice to the rights of the minors to have the matter reviewed,
when they shall become of lawful age. If the party who made the
claim should lose his case when the minor has reached his majority,
he shall be compelled to restore to the minor, or to his relatives, or
to any one who may have a right to it, whatever property he
obtained under the judgment aforesaid, along with any income it
may have produced, and any profits which may have accrued from
its possession; and he shall be compelled to pay ten solidi in
addition, because he has prosecuted a claim which was not valid in
law. Where a guardian desires to defend any action brought against
his ward in court he shall have full authority to do so; but if the
rights of the ward should be affected, or his property impaired or
lost through his neglect, the guardian shall afterwards be compelled
to make restitution.
THE GLORIOUS FLAVIUS RECESVINTUS, KING.
IV. Guardians shall have no Right to Exact from Wards in
their Charge any Instruments in Writing whatever.
As minors are unable to care for themselves or their property, it
has been wisely provided by the laws that they should be subjected
to the authority of guardians, and that their business should be
transacted for them for a stated number of years. For the reason,
however, that certain guardians, by means of either persuasion or
threats, defraud those whose interests it is their duty to carefully
protect, and compel them to enter into agreements that they will not
demand an accounting of their property, or exact bonds or other
written instruments from their wards, by means of which they seek
to prevent inquiry into their actions: therefore, that our solicitude for
the rights of such wards may the better appear in all matters where
such rights are involved, we hereby decree that the following law
must be strictly observed, to wit: that in the case of such wards,
even when they have passed the age of fourteen years, where the
guardian or guardians who had charge of their persons and property
shall be found to have caused the execution of any bond or written
instrument of any description, which enures to the benefit of said
guardians or any person designated by them, then such bond or
instrument shall be void, and of no force whatever in law.
When the time shall come that he who has been under
guardianship shall have the right to assume the management of his
own affairs, the guardian shall give a complete account of the care
of his ward’s property, in the presence of a priest or a judge, and
shall receive from his former ward a full discharge from all
obligations; so that, all restraint being removed, the said ward may
come into full possession of his property, and have the right to
dispose of it at his pleasure. But if it should happen that, while the
guardianship is in force, the ward should be attacked by a dangerous
illness, and should wish to dispose of his property by will, he can do
so, provided he has completed his tenth year, according to the
provisions of a former law.
If the guardian, while living or dying, should give any of the
property belonging to his ward to his own children, or to any
persons whomsoever, and no account of the same was made to the
wards, according to the terms of the inventory which was made at
the time the guardianship was accepted, and proof of this should be
legally established, those who received said property from the
guardian shall make full restitution to the wards. All wards shall have
the benefit of this legal remedy, except where, by the lapse of time,
and having passed the age of fifteen years, their rights shall be
extinguished by law.
TITLE IV.—CONCERNING FOUNDLINGS.

I. Where Anyone Casts Away, or Abandons, a Freeborn Child, he shall Serve


as its Slave.
II. Where a Male or Female Slave shall be proved to have Cast Away a Child,
with, or without the Knowledge of his or her Master.
III. What Compensation for Support anyone shall Receive for the Bringing up
of a Child committed to his Care by its Parents.

I. Where Anyone Casts Away, or Abandons, a Freeborn


Child, he shall Serve as its Slave.
If anyone, induced by compassion, should rescue, and care for a
child, of either sex, who has been abandoned, and such child, after
having been brought up, should be acknowledged by its parents;
where the latter are freeborn persons, they shall either give a slave,
or the price of one, as compensation for the service performed. If
they should neglect to do this, compensation shall be made by order
of the judge of the district; and the parents who have been guilty of
such wickedness shall be condemned to perpetual exile. Where he
who casts away the child has not sufficient property to redeem it, he
shall serve as its slave; and he whom the pity of others has
preserved, shall enjoy complete freedom. It shall be lawful for the
judge both to prosecute and impose sentence for this crime
whenever committed.

II. Where any Male or Female Slave shall be Proved to


have Cast Away a Child, with or without the Knowledge of
his or her Master.
If a slave, of either sex, in order to defraud his or her master,
should expose and abandon their own child, without the knowledge
of said master, and anyone should bring it up, the latter shall be
entitled to receive the third part of its value; but, under such
circumstances, the master must swear or prove that he was ignorant
that his slave had abandoned the child. If, however, it should be
shown that the master was aware of the fact, the child shall become
the slave of him who reared it.
III. What Compensation for Support anyone shall
Receive for the Bringing up of a Child committed to his Care
by its Parents.
If anyone should accept from its parents a little child to be
reared, he shall receive as compensation one solidus every year,
until the child has reached the age of ten; but he shall be entitled to
no further compensation after it has completed its tenth year,
because after that time the services of the child should be sufficient
to pay for its support. And if he who seeks to take the child again
should be unwilling to pay this sum, it shall be held in slavery by him
who reared it.
TITLE V. CONCERNING SUCH PROPERTY AS IS VESTED BY THE LAWS OF
NATURE.

I. Concerning the Disinheriting of Children; and What Disposition Parents


should make of their Property.
II. What Part of her Dowry a Woman has a Right to Bequeath.
III. What Property Parents should Bestow upon their Children, at the Time of
their Marriage.
IV. Concerning Children Born of Different Parents; and What Distinctions
Parents may Make in the Disposition of their Estates.
V. Concerning such Property as Children may have Acquired during the Lives
of their Parents.

I. Concerning the Disinheriting of Children; and What


Disposition Parents should make of their Property.
As soon as we have ascertained that any unlawful acts have been
committed, it behooves us to prevent, by legal measures, similar
occurrences in the future. For many persons living reckless lives,
squander their property upon strangers, either on account of riotous
living, or through the unwise counsel of others, and, as a result of
this, leave their inoffensive children or grandchildren weak and
penniless; for those cannot be of any benefit whatever to the
community upon whom the duty of labor has not been enjoined by
the example and virtues of their parents. And, in order that, under
such circumstances, the rights of the community may not be
sacrificed, or children or grandchildren be deprived of the benefits of
that natural affection which should be bestowed upon them, the law,
by which a father or mother, or grandfather or grandmother, have
the right to give their property to a stranger, should they wish to do
so, or a woman to dispose of her dowry in any way that she pleases,
is hereby abrogated; and we decree that the following more
equitable law shall be observed by all, to wit: that neither parents
nor grandparents shall have the absolute right to dispose of all their
property, nor that children nor grandchildren shall, through an unjust
will, be deprived of the inheritance of their parents and
grandparents; therefore, any father or mother, grandfather or
grandmother, who wish to bestow any of their property upon their
children or grandchildren, must observe the following rule, viz: that
in the bestowal of said gifts upon their children or grandchildren
they do not exceed the third part of their property; nor shall it be
lawful for them to transfer any of their property to any stranger,
unless they should not have any legitimate children or grandchildren
living.
The following, however, we decree shall be observed, as being in
accordance with the dictates of reason: that if the father or mother,
grandfather or grandmother, should decide to bequeath, by any
instrument in writing, any portion of the third part of their property,
as aforesaid, to their children or grandchildren, in compliance with
the laws governing inheritances, all such proceedings shall be
forever inviolable; and whatever bequest concerning said property
may be made, shall have full and uncontrovertible validity. Nor shall
it be lawful for the child or grandchild who has received any of the
said third part of the estate from their parents, to claim anything
more, unless they should prove to be entitled to it by some former
bequest of their parents or grandparents.
If those having children or grandchildren, should wish to bestow
anything upon the Church, or upon freedmen, or upon anyone else,
they shall have the right to dispose of the fifth part of what remains,
after the said third part has been reserved. The authority of such
persons to dispose of the said fifth part is indubitable; but, in such
cases, either the third part of the property which is to be
bequeathed to the children, or the fifth part which is to be otherwise
disposed of, as aforesaid, must be separated from the remaining
property, and a proper estimate made of the same. But whatever
anyone has received through the generosity of the king, shall, under
no circumstances, be included in the estimate of either the third or
the fifth parts of the estate aforesaid; for, according to another law,
whatever anyone has acquired through the royal bounty shall be
absolutely at his disposal.
It has been already provided that children and grandchildren
cannot be disinherited by their parents for any trifling offence. The
grandfather and grandmother, as well as the father and mother, shall
have the right to chastise and restrain their children and
grandchildren, as long as they remain members of the family. And if
a son or daughter, grandson or granddaughter, should attempt to
inflict any serious injury upon their parents or grandparents; that is
to say, if he or she should give any of them a blow with the fist; or a
kick; or strike them with a stone, or with a scourge, or with a whip;
or should insolently seize any of them by the foot, or by the hair, or
even by the hand; or be guilty of any shameless assault upon them;
or should publicly accuse them of crime; then, any child or
grandchild convicted of such an offence, shall receive fifty lashes
with the scourge, in the presence of the judge, and shall forfeit all
claim to the inheritance of its grandparents or parents, should the
latter so desire. But if, repenting of its conduct, it should implore the
pardon of those whom it has offended; and, through the love of its
parents, it should be again received into favor, and designated as an
heir; it shall not be deprived of its inheritance, or be accounted
infamous, on account of the punishment which it has received.
FLAVIUS CHINTASVINTUS, KING.
II. What Part of her Dowry a Woman has a Right to
Bequeath.
For the reason that many women to whom the privilege was
granted of disposing of their dowries as they pleased, have been
found to have bestowed them upon persons with whom they were
living illegally, to the injury of their children or grandchildren;
therefore, we declare it to be both necessary and proper that those
for the rearing of whom the marriage was celebrated, should receive
some benefit from said property. In pursuance whereof we decree
that, if any woman has children or grandchildren, and should wish to
bestow a gift upon the Church, or upon freedmen, or upon any other
person or persons; she shall not have the right to dispose of more
than the fourth part of her dowry in this manner. Three fourths of it
shall be left, without question, to her children or grandchildren,
whether there be one, or many of them. On the other hand, a wife
shall have full power to dispose of her entire dowry, in any way she
pleases, when she leaves no legitimate children or grandchildren.
Nevertheless, it shall not be lawful for any woman who has married
two husbands, or more, to give the dowry she has received from one
husband, to the children or grandchildren of another; but the
children and grandchildren born in a certain line of descent shall,
after the death of their mother, have the entire dowry given by their
father or grandfather.
FLAVIUS CHINTASVINTUS, KING.
III. What Property Parents should Bestow upon their
Children, at the Time of their Marriage.
Wherever wrong is done by parents to the interests of their
children it must be remedied by law. Therefore, because the
duplicity of parents sometimes prompts them to deprive their
children of what they have given them at the time of their marriage,
we hereby declare such acts to be void; and decree that the
following law shall hereafter be observed forever, to wit: that if any
property should be transferred to any person, either by writing, or in
the presence of witnesses, at the time of his or her marriage,
excepting such as is usually given in the way of ornaments or
clothes, as a marriage gift, whether said property consists of slaves,
lands, vineyards, buildings, clothing, or jewels, presented by the
parents to the children, either at the time of the marriage, or after it,
the said children shall have full power to dispose of such property as
they wish, with this exception: that, after the death of their parents,
the inheritance shall belong to the children exclusive of what said
parents have previously given to them according to law, and an
equal distribution of said inheritance shall be made among the heirs;
so that a son or daughter shall have full power to dispose of what
they received from their parents at the time of their marriage,
according to the provisions aforesaid.
After the death of the parents, an inventory shall be made, and
the property which was donated at the time of the marriage shall be
appraised, and the other heirs shall receive an equivalent in value to
the amount of said property; and all shall then share equally in the
remainder of the estate of the parents.
FLAVIUS CHINTASVINTUS, KING.
IV. Concerning Children Born of Different Parents; and
What Distinctions Parents may Make in the Disposition of
their Estates.
If a man marries several wives, and has children by all of them,
and any of his sons or daughters should die intestate, his or her
brothers or sisters shall be entitled to the estate, provided the
decedent left neither children nor grandchildren; and said heirs shall
have a right to claim it after proving that they are descended from
the same father and mother. Where there are children by one father
and by different mothers, those only who are descended from the
same father have a right to an equal division of the property
belonging to him. With regard to those who are sprung from one
mother and different fathers, we prescribe the following regulations,
to wit: that if a woman should have children by different husbands,
only those brothers and sisters who are the children of the same
father and mother shall have a right to the inheritance, descending
either in the paternal or maternal line from such as have died
intestate, or without offspring or descendants. As it has been
established by a former law that the grandchildren shall not be
deprived of the third part of the estate of their grandparents, it shall
be lawful for the grandsons and granddaughters who have lost
either of their parents, to share equally with their paternal or
maternal uncles in the estates of their grandfathers and
grandmothers; that provision only of said law remaining valid, by
which it was decreed that parents and grandparents may bestow
their property upon their children and grandchildren, or may give
away what they please to a stranger.[22]

V. Concerning such Property as Children may have


Acquired during the Lives of their Parents.
Any son who, while his father and mother are living, acquires any
property, either through the favor of the king, or through the
generosity of his patron, shall be entitled to absolute control of the
same, and shall have the right to sell, or give it away to any one he
chooses, as has already been provided by our laws; nor can his
father or mother claim any of said property while the son is living.
Where, on the other hand, a son obtains property, not through royal
generosity, but by his own labor, or during some public expedition;
should he be living with his father at the time, the latter shall be
entitled to the third part of said property, and the other two-thirds
shall belong to the son.
BOOK V.
CONCERNING BUSINESS TRANSACTIONS.
TITLE I. ECCLESIASTICAL AFFAIRS.

I. Concerning Donations to the Church.


II. Concerning the Preservation and Restoration of Property Belonging to the
Church.
III. Concerning Sales and Gifts of Church Property.
IV. Concerning Church Property in Charge of Those Devoted to the Service of
the Church.
V. Concerning the Repairs of Churches, and Divers Other Matters.
VI. Concerning the Arbitrary Conduct of Bishops.
VII. Emancipated Slaves of the Church, who are still Bound to Render it
Service, shall not be Permitted to Marry Persons who are Freeborn.

THE GLORIOUS FLAVIUS RECESVINTUS, KING.


I. Concerning Donations to the Church.
If we are compelled to do justice to the merits of those who
serve us, how much greater reason is there that we should care for
the property set apart for the redemption of our souls and the
worship of God, and preserve it intact by the authority of the law.
Wherefore, we decree that all property which has been given, either
by kings, or by any other believers whomsoever, to houses devoted
to Divine worship, shall eternally and irrevocably belong to said
churches.[23]

II. Concerning the Preservation and Restoration of


Property Belonging to the Church.
We are of the opinion that it vitally concerns the interests of our
kingdom, to provide by our laws that the temporal rights of the
church shall be protected. Therefore, we hereby decree, that, as
soon as a bishop has been consecrated, he shall straightway proceed
to make an inventory of the property of his church in the presence
of five freeborn witnesses; and to this inventory the said witnesses
shall affix their signatures. After the death of a bishop, and as soon
as his successor has been consecrated, the latter shall require a
second inventory of the church property to be made; and if it should
appear that said property had, in any way, been diminished, then
the heirs of said bishop, or those to whom his estate was
bequeathed by will, shall make up the deficiency. If a bishop should
sell any of the property of the church, his successor shall lay claim to
that property, along with all its rents and profits, and restore it to the
church, after having returned the price paid for it to the purchaser,
and no reproach shall attach to such proceedings. And we hereby
decree that this law shall be observed in every respect by priests
and deacons, as well as by bishops.
ANCIENT LAW.
III. Concerning Sales and Gifts of Church Property.
If a priest or bishop, or any other member of the clergy, should
sell or give away any of the property belonging to the church,
without the consent of the other ecclesiastics, we declare that such
a transaction shall not be valid, unless said sale or donation should
have been made in accordance with the holy canons.

IV. Concerning Church Property in Charge of Those


Devoted to the Service of the Church.
Where heirs of a bishop or of other ecclesiastics, who have
placed their sons in the service of the church, obtain lands or any
other property through the generosity of the clergy, and then return
to the laity, or abandon the service of the church whose lands or
other property they hold, they shall at once forfeit all such
possessions. And this provision must also be observed by all the
clergy holding ecclesiastical property, even though they have held it
for a long time; for the reason that the canons have so decreed. The
widows of priests or of other ecclesiastics, who have devoted their
sons to the service of the church, solely through gratitute to the
latter, shall not be deprived of any property possessed by the
fathers, which was originally derived from the church.[24]
FLAVIUS EGICA, KING.

V. Concerning the Repairs of Churches, and Divers Other


Matters.
The different regulations established in former times by the Holy
Fathers concerning ecclesiastical affairs shall be still observed, so far
as they are consistent with the interests of the church. As antiquity,
which has been the cause of the destruction of many lofty buildings,
has not spared the houses of God; it is eminently proper that such of
the latter as are in danger of destruction should be repaired. As a
result of this necessity it has been made a source of reproach to our
organization, that the greed of certain priests has caused their
parishes to be oppressed by repeated forced contributions; and that
many churches have been impoverished under pretence of repairs.
Consequently it has been decreed and confirmed by our Council that
the third part of the ecclesiastical revenues, which the ancient
canons have set apart for that purpose, shall be used for the repairs
of churches, whenever required. And when churches are to be
repaired, it is better to learn this fact from the worshippers
themselves, and the repairs should then be made under the personal
care and direction of the bishop. For, although according to the
provisions of the ancient canons, every bishop has the right to
reserve for himself the third part of the revenues of his diocese, if he
should desire to do so; so, also, he had no right to exact from the
parish churches, by means of arbitrary proceedings, the remaining
two-thirds of the said revenues; nor was he at liberty to give away
any of such property to anyone by way of compensation for services
performed. We deem it necessary to decree that a single priest shall
never have charge of more than one church at a time; nor hold any
other office; nor by ecclesiastical authority act as guardian; nor, in
any way, have charge of the property of wards; and any
congregation which possesses ten pieces of property is entitled to a
priest, but such as have less than ten shall be united with other
churches. And if any bishop should disregard this our regulation, and
should hereafter venture to disobey it, he shall expiate his offence
by two months’ excommunication.[25]
THE GLORIOUS FLAVIUS WAMBA, KING.

VI. Concerning the Arbitrary Conduct of Bishops.


God, the just Judge, who loves right eternally, does not wish that
justice should be subject to time, but rather that time should be
governed by the principles of equity. God himself is the
personification of justice, and to him should be given whatever is
bestowed by the faithful upon the church through motives of
devotion; for God, as mediator, accepts the vows of every true and
sincere worshipper. And vows should never be renounced which are
known to have proceeded from, and been confirmed by, a sense of
justice; and, therefore, he commits a fraud upon God who unjustly
takes from him his property. He also violates the rules of justice who
corruptly interferes with the vows of others. While, as has been said,
God is justice, what madness is it for anyone to remove from God’s
possession any property under the claim of prescription, alleging
that he has held it for thirty years? For many rash bishops, prompted
by avarice, are in the habit of bestowing upon their cathedral
churches, or upon various individuals, or paying out as wages for
labor performed, the donations that have been given to their
dioceses by the faithful, and, in this way, they not only break the
vows of the donors, but are also guilty of sacrilege, in that they
thereby defraud the Church of God; for it has been long established
that to defraud the church is sacrilege. And when they are urged to
make restitution, they decline to do so, because their predecessors
acted in the same manner; or refuse to make amends, because they
claim to have held the property in question for thirty years. Thus
they attempt to maintain their cupidity and rapacity by right of
prescription; and instead of at once making reparation for their fault,
they attempt to confirm and legalize it by the operation of time. He
must be considered a person of great impiety who asserts such a
claim, and acknowledges that, for thirty years, he has done injury to
God, and refuses to make amends for the injury after that period
has elapsed.
Therefore, since these most iniquitous abuses are defended
under a pretence of justice, and as we are not concerned with the
past, but with the future, we shall now proceed to make regulations
applicable to the time of our own reign. For the reason that,
hereafter, all temptation to avarice may be removed, we hereby
decree that it shall not be lawful for a bishop to appropriate any
property belonging to the churches of his diocese; or, if any has
already been appropriated, to allege that he is entitled to the same
on account of his possession for thirty years; but, whenever the
facts have been established, he must make restitution at once. As, in
order that a long period may pass without a claim being made, the
nobility sometimes are guilty of such oppression of ministers of the
church that the latter do not dare to assert their rights against such
eminent persons, concerning property which has been appropriated
by the latter, and lest the voice of the despoiled church remain
forever silent, we decree that hereafter, it shall be lawful, where this
offence has been admitted by the parties or detected by anyone, in
any place, that the claim shall be instituted with all possible speed in
the following manner, to wit: that the heirs of the founders of the
church shall act as prosecutors, if they are present; but, if they
should not be present, and even if they should be, but are unwilling
to act, then the governor of the province, or the governor of the city,
or the deputy of either of them, or anyone else who has legal
cognizance of the matter, shall have the right to act as accuser and
prosecutor.
Where any bishops who, in past times, have committed the
offences hereinbefore mentioned, and have been in adverse
possession of church property for thirty years, and declare that they
hold said property by the right of prescription; such persons we
leave to the justice of God, for we decline to pass judgment upon
them. But whoever, up to the time when this law is promulgated,
shall not have had possession of such property for the space of
thirty years, shall be compelled to restore it intact to the church, but
no penalty shall be required of them. And where any bishop, who
from the day of the adoption of this law, should appropriate anything
given by the faithful to the churches of God, and should use such
property for his own benefit, or for that of his cathedral church, or
should bestow any of it upon any person whomsoever, his act shall
not be confirmed by any lapse of time; and, according to the above-
mentioned decree, whenever he shall have been convicted of the
commission of such acts by anybody, he shall be compelled to
restore the property which he took, along with lawful amends out of
his own possessions, to that church which has been defrauded. If he
should not have the means to make full restitution out of his own
property, on account of his abuse of authority, he shall undergo the
penalty of excommunication prescribed by the canon of the eleventh
Council of Toledo; that is to say, if the property that was
appropriated was worth ten solidi, he shall purge himself of guilt by
twenty days of penance. If the value of the property appropriated
should be greater or less, the proportion of days to be passed in
penance shall always be doubled; and he also shall undergo a similar
penalty who retains possession of any property taken from a
diocesan church, which has been appropriated by his predecessor.
Any judge who neglects to carry out the provisions of this law, or
delays the proceedings without just cause, or does not notify the
king that he may take cognizance of the affair, shall be liable to the
same penalty as the bishop who committed the offence, and shall
pay said penalty out of his own property to the church whose cause
he neglected to decide. This law not only applies to property which
has been bestowed upon minor and diocesan churches, but to that
in which all assemblies included under the general name of churches
are concerned; that is to say, monasteries and convents of men and
women.
We also think it proper to add the following provisions to this
law: that all bishops who ordain priests and rectors in the churches
of their dioceses shall give them instructions concerning the rights of
the churches to which they are ordained; that is to say, if any bishop
should have in his keeping any document defining the rights of any
church in his diocese, he shall show it to the rector of that church,
so that the latter may be familiar with the rights of said church, as
well as with the documents conferring the same, and not be
ordained in ignorance of them, and, what is worse, through the
wickedness and duplicity of the bishop, the will of the benefactor of
the church be not publicly known. It is also decreed that priests and
rectors shall not only have the opportunity to inspect such
documents, but shall also be entitled to copies of the same,
confirmed under the hand of the bishop, to enable them to direct
the affairs of the church committed to their care without any
uncertainty, and to enforce the rights to which it is justly entitled.
Given and confirmed in the name of God, at Toledo, on the tenth
day of the Kalends of January, in the fourth year of our reign.
THE GLORIOUS FLAVIUS WAMBA, KING.
VII. Emancipated Slaves of the Church, who are still
Bound to Render it Service, shall not be Permitted to Marry
Persons who are Freeborn.
Great confusion of lineage results where inequality of rank causes
degradation of offspring; for what is derived from the root is
inevitably found in the fruit of anything. For how indeed can he bear
a title of honor, whose parents are bound by the obligation of
servitude? We refer to this matter because many of the slaves of the
church are set free, but nevertheless do not enjoy absolute liberty;
for the reason that they are still bound to serve the church from
which they deduce their origin; and who, contrary to natural laws,
contract marriages with freeborn women, and seek to have freeborn
children who, in fact, are not so; and thus what ought to enure to
the public good, becomes in fact a burden to it, both in respect to
person and property; as whatever children are born from such an
infamous marriage, following the position inferior in rank, from birth
become the property of the church, along with all their possessions.
Wherefore, that such insolent conduct may be put an end to
hereafter, we decree by this law, that if a slave of any church, while
it is still entitled to his services, should be freed, and accept his
liberty from the priest, he shall not be permitted to marry a freeborn
woman. Those, however, who have been freed in the regular
manner, and are absolutely exempt from all service to the church by
the Canon Law, shall have the right to marry freeborn women, and
shall be entitled to claim all honor and respectability for their
offspring.
But if any of those set free, who are still under the dominion of
the church, should venture hereafter to marry any freewoman; as
soon as the judge shall be apprised of the fact, both parties shall be
scourged three times, as has been provided in a former law
concerning freemen and slaves, and the judge shall cause them to
be immediately separated; and where they are unwilling to be
separated, each shall remain in the condition in which he or she was
previously, and any children born of them shall become slaves to the
king.
Whatever property has been bestowed by any free person upon
any freedman, together with such property as a child of either sex
sprung from them can acquire, possess, or waste, shall belong
entirely to the heirs of said free person at his death; and, if such
heirs should be lacking, it shall become the lawful possession of the
king, to be disposed of absolutely at his pleasure. This law shall not
only apply to men, but also to women; that is to say, where either a
freedman or a freedwoman owing services to the church should be
so bold as to marry a freeborn person.
The following exception shall be observed in the execution of this
law, to wit: whoever shall be born of such parents within thirty years
of its promulgation, shall not follow the condition of that parent who
is bound to give service to the church, but shall be free, along with
all the property inherited from his or her parents, both noble and
plebeian. Given and confirmed at Toledo, on the twelfth Kalends of
January and the fourth year of our reign.
TITLE II. CONCERNING DONATIONS IN GENERAL.

I. A Donation Extorted by Violence is Void.


II. Concerning Royal Donations.
III. Concerning Property Given to a Husband or a Wife by the King.
IV. Concerning Property, in Addition to the Dowry, Given to a Wife by her
Husband.
V. Concerning Property Given to a Husband by his Wife; and Where a Wife
has been Convicted of Adultery.
VI. Concerning Property Donated Verbally, or Conveyed by Instruments in
Writing.
VII. Concerning Gifts Bestowed upon One Another by Husband and Wife.

ANCIENT LAW.
I. A Donation Extorted by Violence is Void.
A gift extorted by force and fear has no validity whatever.

II. Concerning Royal Donations.


Donations conferred by royalty upon any person whomsoever,
shall belong absolutely to him to whom they are given; so that he
who is thus honored by the royal munificence shall have the power
to dispose of any property derived from such a source in any way
that he chooses. If he who received such gifts should die intestate,
the donations aforesaid shall belong to the legal heirs in regular
succession, according to law, and the royal favor can in no way be
infringed upon; because it is not fitting that the will of the prince
should be interfered with, where the recipient of royal bounty has
not been guilty of crime.

III. Concerning Property Given to a Husband or a Wife by


the King.
We especially decree that a wife shall be entitled to no part of
any property presented by the king to her husband, unless the latter
should bestow a portion of it upon her by way of dowry. And,
likewise, should the gift be made to a wife, her husband shall have
no right to any of it; nor can he lay claim to it after her death, unless
his wife should give or bequeath it to him.
ANCIENT LAW.
IV. Concerning Property, in Addition to the Dowry, given
to a Wife by her Husband.
If a wife should, at any time, in addition to her dowry, accept
from her husband property acquired by him as a gift, or by profligate
conduct, or the proceeds of claims collected by him, she shall have
the absolute disposal of said property until the day of her death,
according to the terms of the will of her husband, even though there
be children born of that marriage. She shall have the power to
expend or use the income of such property, just as the testator has
designated by will; and, during her lifetime, she shall enjoy
unhampered possession of all such property, the income of which
shall be used for her expenses. But if the testator should not make
any special disposition of said income, his children shall have the
right to said property after his death; and, upon no occasion, shall
his wife be allowed to alienate any part of it, excepting the income.
Where there are no children by said marriage, the wife shall have
full control of all property given her by her husband, according to the
terms of his will. But if she should die intestate, the said property
shall revert to her husband if he is living, and if he should not be
living, it shall belong to his heirs. And we decree that the same rule
shall apply to husbands who, at any time, have received gifts of
property from their wives.
ANCIENT LAW.
V. Concerning Property given to a Husband by his Wife;
and Where a Wife has been Convicted of Adultery.
If a husband should give any property to his wife, and she, after
his death, should remain chaste, or should marry another husband,
she shall have the power of disposing of the property given her by
her first husband according to the terms of his will, if she should
have no children. If she should die intestate and without children,
the property shall revert to her husband if he is living, and if not, it
shall belong to his heirs. But if she should have been convicted of
adultery, or other meretricious conduct, she shall lose any property
which she obtained from her husband, and it shall belong to his
heirs, or to his legitimate children.
FLAVIUS CHINTASVINTUS, KING.
VI. Concerning Property Donated Verbally, or Conveyed
by Instruments in Writing.
Any property given away in the presence of witnesses can under
no circumstances be reclaimed by the donor. And even if it should
happen that what is given is situated elsewhere, the donation
cannot, for that reason, be revoked, provided it is made in writing;
because it is evident that the gift is absolute, when the instrument
conveying it is in the name of, and for the benefit of him who
receives it. It, however, must be noted, that if the donor should say
that he neither delivered such an instrument nor directed it to be
delivered, but that it was taken from him; then the party to whom
the property was given may prove by witnesses that it was
transferred to him, or directed to be so transferred by the donor, or
placed under his control by the will of the testator; and, when he
shall have produced such testimony, the gift shall be deemed valid.
Where he neglects to introduce competent testimony, he who
executed the instrument shall make oath that he neither delivered it,
nor directed it to be delivered, nor that he voluntarily executed it;
and the instrument shall then be returned to him by whom it was
claimed, and shall remain invalid, if the latter so desires. But it is
proper to add, that if anyone should execute an instrument
disposing of any property for the benefit of any one whomsoever,
and, in his lifetime, should not deliver it to him for whose benefit it
was made, and it should be found after the death of the former; he
for whose benefit the donor has made disposition of said property,
shall have the right to claim it, along with all the property therein
described; for it is evidently just that a document which the donor,
while living, preserved, and which never appeared to be altered in
any way, should have full force in law. If, however, the donor while
living did not relinquish possession of either the instrument or the
property, but kept them, and made other dispositions in his will, the
latter shall be valid; because a will always takes precedence in law of
documents previously executed, but not delivered. If he to whom
the property was given should die before receiving it it shall belong
to the donor or to his heirs. And where the gift should be made
under this condition, to wit, that the donor should have possession
of it during his lifetime, and that, after his death, it should go to him
for whom he intended it, he shall have the privilege of changing his
mind when he wishes, even though he should have suffered no
injury; because the case is similar to that of the execution of a will.
But if he who is deceived by a fraudulent gift, and with the
expectation of profiting by an empty promise, shall expend anything
for the benefit of the donor, he shall be entitled to receive from the
donor himself, or from his heirs, compensation in damages for any
loss he may have sustained on that account. And if anyone should
choose to give away any property he has received, either by ordinary
gift or by the authority of any written document, the party to whom
he gives it shall have the same right to it as the original donor. If he
who received the gift should die during the life of the donor, he shall
have the right to dispose of said gift at his pleasure; and should he
die intestate, the gift shall not revert to the donor, but shall descend
to the heirs of him who received it.
VII. Concerning Gifts Bestowed upon One Another by Husband and Wife.
If a husband should give any property to his wife, he must
describe it in a written instrument and affix his signature or seal
thereto. And, in order that his gift may be valid, it is necessary that
two or three freeborn witnesses should attest the document. This
law shall also apply to a wife who wishes to confer any gift upon her
husband, provided the gift was not extorted by the husband through
violence; to the end that the provisions of the law relating to the
disposition of property may be, in every respect, preserved.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like