Using Information Technology 11th Edition Williams Test Bank download
Using Information Technology 11th Edition Williams Test Bank download
https://testbankdeal.com/product/using-information-
technology-11th-edition-williams-test-bank/
https://testbankdeal.com/product/using-information-technology-10th-
edition-williams-test-bank/
testbankdeal.com
https://testbankdeal.com/product/using-information-technology-10th-
edition-williams-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/information-technology-for-
management-11th-edition-turban-test-bank/
testbankdeal.com
https://testbankdeal.com/product/elementary-linear-algebra-with-
applications-9th-edition-kolman-solutions-manual/
testbankdeal.com
American Government Brief 14th Edition Ansolabehere Test
Bank
https://testbankdeal.com/product/american-government-brief-14th-
edition-ansolabehere-test-bank/
testbankdeal.com
https://testbankdeal.com/product/introduction-to-algorithms-2nd-
edition-cormen-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/elementary-statistics-picturing-the-
world-7th-edition-larson-solutions-manual/
testbankdeal.com
https://testbankdeal.com/product/financial-and-managerial-accounting-
the-basis-for-business-decisions-17th-edition-williams-test-bank/
testbankdeal.com
https://testbankdeal.com/product/contemporary-linguistics-6th-edition-
ogrady-solutions-manual/
testbankdeal.com
Strategic Management Planning for Domestic and Global
Competition 14th Edition Pearce Solutions Manual
https://testbankdeal.com/product/strategic-management-planning-for-
domestic-and-global-competition-14th-edition-pearce-solutions-manual/
testbankdeal.com
Chapter 06
A. continuous
B. digital
C. sequential
D. analog
A. bit
B. byte
C. kilobyte
D. megabyte
A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone
6-1
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be _________.
A. spontaneous
B. digital
C. sequential
D. analog
5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
6. A person sending a document over a phone line by converting a computer's digital signals to
analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
A. terminal
B. router
C. network
D. server
6-2
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8. A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN
A. WAN
B. LAN
C. MAN
D. Internet
10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer to peer
11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
6-3
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. A computer that acts like a disk drive, storing the programs and data files shared by users on
a LAN, is the ________ server.
A. file
B. web
C. host
D. mail
13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these
15. A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.
A. VPN
B. intranet
C. firewall
D. protocol
6-4
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
16. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet
17. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node
A. server
B. host
C. node
D. router
A. node
B. protocol
C. packet
D. backbone
6-5
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. A common connection device that connects computers to a network and that sends
messages (checks packets) between sender and receiver nodes is called a ________.
A. router
B. gateway
C. switch
D. bridge
21. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
22. A device that joins multiple wired and/or wireless networks in a home office is a ________.
A. node
B. router
C. bridge
D. firewall
23. In an organization, all computer networks are connected to the Internet by a "main highway"
called a ________.
A. skeleton
B. backbone
C. gateway
D. router
6-6
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?
A. ring
B. bus
C. hub
D. star
25. In the ________ network topology, communications devices are connected to a single cable
with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
26. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer
27. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
6-7
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
28. ________ is the most common and most widely used LAN technology, with networked devices
in close proximity; it can be used with almost any kind of computer. Most microcomputers
come with a port for this type of network connection, which uses cable.
A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet
29. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition
telephone systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic
31. A type of wired communications technology used to connect equipment in a home network is
the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
6-8
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. What wired communications medium consists of dozens or hundreds of thin strands of glass
or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
34. The ________ is the range of frequencies that a transmission medium (channel) can carry in a
particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol
35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
wireless network and content providers?
A. LAN
B. WAN
C. WAP
D. HAN
6-9
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. Which of the following is NOT a type of wireless communications media?
A. infrared transmission
B. satellite
C. coaxial
D. microwave radio
A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio
A. broadcast radio
B. broadband
C. microwave
D. WAP
A. broadcasting
B. high-frequency
C. uplinking
D. downlinking
6-10
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. The highest level that a satellite can occupy in space is known as ________.
41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used to
identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO
A. first
B. second
C. third
D. fourth
43. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone
6-11
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G
45. What short-distance wireless standard is used to link cell phones, computers, and
peripherals at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
46. A ________ attack disables a computer system or network by making so many requests of it
that it overloads it and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse
47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk/flash drive.
A. worm
B. rootkit
C. Trojan horse
D. patch
6-12
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?
A. worm
B. virus
C. Trojan horse
D. denial-of-service attack
49. A botmaster uses malware to hijack hundreds or thousands of computers and controls them
remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs
A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software
51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus
6-13
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. What is the science, often used in computer security systems, of measuring individual body
characteristics?
A. encryption
B. decryption
C. rootkit
D. biometrics
53. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics
True False
55. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be digital.
True False
True False
6-14
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Telephones have always been digital devices.
True False
58. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False
True False
60. Capturing music digitally means that one has an exact duplicate of the music.
True False
61. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False
True False
True False
64. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False
6-15
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is called a file server.
True False
66. "File server" and "database server" are different names for the same type of server.
True False
67. Peer-to-peer networks are less stable than client-server networks because in the former
certain shared resources reside on each user's machine.
True False
68. Virtual private networks (VPNs) are private networks that use a public network (usually the
Internet) instead of private, leased (expensive) lines to connect remote sites.
True False
69. If you have one computer, you need firewall hardware; if you have more than one (networked)
computer, then a software firewall should be used.
True False
70. In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.
True False
71. Routers join multiple wired and/or wireless networks commonly in offices and home offices.
True False
True False
6-16
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. An interface device used to connect the same types of networks is called a node.
True False
74. The backbone is the main communications route in a bus network topology.
True False
75. In a bus network, all computers and communications devices are connected in a continuous
loop.
True False
76. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False
77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False
True False
79. One wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.
True False
80. All wired and wireless communications media use the electromagnetic spectrum of radiation.
True False
6-17
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False
82. The two general classes of bandwidth are long and short.
True False
83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.
True False
84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False
85. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False
True False
87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False
88. Communications satellites are microwave relay stations in orbit around the earth.
True False
6-18
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
89. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False
90. A larger number of geostationary earth orbit (GEO) satellites are required for global coverage
than mid-earth orbit (MEO) satellites.
True False
91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify earth
locations.
True False
92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False
True False
True False
True False
True False
True False
6-19
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.
True False
True False
True False
101.A Wi-Fi enabled laptop computer accesses the available network (say, at an airport) through
an access point, which is connected to a land-based Internet connection.
True False
True False
103.Wi-Fi connections are always secure; no one can steal your data when you are online.
True False
True False
True False
6-20
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
106.A denial-of-service attack uses a virus to crash your computer.
True False
True False
108.A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False
109.A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False
True False
True False
True False
6-21
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
113._________ is the gradual merger of computing and communications into a new information
environment, in which the same information is exchanged among many kinds of equipment,
using the language of computers.
________________________________________
114.Most of the word's natural phenomena use signals that continuously vary in strength and
quality, called ________ signals.
________________________________________
________________________________________
116.So they can be sent over a telephone line, analog signals are converted into digital signals,
and then back again, by using ________.
________________________________________
________________________________________
________________________________________
119.Private networks that use a public network, usually the Internet, to connect remote sites are
called ________.
________________________________________
120.A private intranet that allows access to selected outside users is a(n) ________.
________________________________________
6-22
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121.A _________ is a system of hardware and/or software that protects a computer or a network
from intruders.
________________________________________
122.A client-server network has a _________ computer, a central computer that controls the
network; The devices connected to the network are called _________.
________________________________________
123.A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.
________________________________________
124.Electronic messages are sent as ________, fixed-length blocks of data for transmission.
________________________________________
125.A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.
________________________________________
126.A(n) ________ is an interface (linking device) used to connect the same types of networks,
whereas a(n) ________ is an interface permitting communications between dissimilar
networks.
________________________________________
127.________ are physical devices that join multiple wired and/or wireless networks; their primary
job is to provide connectivity, and they are often used in small office networks, cafés,
airports, hotels, and home networks.
________________________________________
6-23
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
128.The ________ consists of the main "highway" that connects all computer networks in an
organization.
________________________________________
129.A motherboard expansion card called a _________ enables a computer to send and receive
messages over a network.
________________________________________
130.The system software that manages the activity of a network is called the ________.
________________________________________
131.A network can be laid out in different ways. The layout, or shape, of a network is called a
________.
________________________________________
132.A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.
________________________________________
133.A ________ network topology is one in which all microcomputers and other communications
devices are connected directly to a central network switch.
________________________________________
________________________________________
6-24
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135.In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and with different network
topologies.
________________________________________
136.Wired communications media include three main types. The kind used for tradition telephone
lines is a ________.
________________________________________
137.Telecommuting means using a computer and networks to work from ________; telework
means working from ________.
________________________________________
138.Wired communications media include three main types. Insulated copper wire wrapped in a
solid or braided shield and then an external cover is called ________ cable.
________________________________________
139.Wired communications media include three main types. The kind used for transmitting pulses
of light is called a ________ cable.
________________________________________
________________________________________
141.The range of frequencies that a transmission medium can carry in a given period of time is
called its ________.
________________________________________
6-25
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
142.The ________ a transmission medium's bandwidth, the more frequencies it can use to
transmit data and the faster it is.
________________________________________
143.Infrared and microwave transmission signals cannot work around obstacles or travel in
curved lines, so they are called _________.
________________________________________
144.The highest level that a satellite can occupy is the ________ earth orbit.
________________________________________
145.Global Positioning Systems use ________ to continuously transmit signals to identify earth
locations.
________________________________________
________________________________________
147.Simple one-way radio receivers that receive data (but not voice messages) are called
________; they are often used in hospital environments.
________________________________________
148.1G cellphones are __________; 2G, 3G, and 4G cellphones are _________.
________________________________________
149._________ is an international standard widely adopted in the U.S.A., Europe, and Asia that
supports fast cellphone data transfer rate; this standard has not been adopted yet by all
carriers.
________________________________________
6-26
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
150.Public wireless access points are called _________.
________________________________________
151.The short-range, wireless digital standard aimed at linking hand-held devices up to 33 feet
apart is called ________.
________________________________________
________________________________________
153.The three short-range wireless standards used in home automation networks, for linking
switches and sensors around the house and yard, are Insteon, ZigBee, and _________.
________________________________________
________________________________________
155.A _________ is a person who posts intentionally offensive, incendiary, or off-topic comments
online.
________________________________________
156.Worms, viruses, Trojan horses, and rootkits are all types of programs called ________.
________________________________________
157.A(n) ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive and that can cause the computer to crash.
________________________________________
6-27
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
158.Almost all viruses are attached to an _________ file.
________________________________________
159.A ________ is a program that pretends to be a useful program, usually free, such as a game or
screen saver, but carries viruses, or destructive instructions that cause problems without
your knowledge.
________________________________________
160.A(n) ________ uses malware to hijack hundreds or thousands of computers, called ________,
and to remotely control them all.
________________________________________
161.________ software can be used to scan a computer's hard disk, CDs, and main memory to
detect viruses.
________________________________________
162.The process of altering readable data into unreadable form to prevent unauthorized access is
known as ________.
________________________________________
________________________________________
Essay Questions
6-28
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
164.How do analog and digital devices interpret electrical signals?
166.What are the main differences between a WAN, a MAN, and a LAN?
6-29
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
167.What is the difference between a client/server network and a peer-to-peer network?
6-30
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
170.Distinguish between narrowband and broadband.
6-31
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
173.What are the four types of cyberintruders?
6-32
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 06 Communications, Networks, and Cyberthreats: The Wired
and Wireless World Answer Key
A. continuous
B. digital
C. sequential
D. analog
The term "digital" describes any system based on discontinuous data or events. In the
case of computers, it refers to communications signals represented in a two-state or
binary way.
A. bit
B. byte
C. kilobyte
D. megabyte
6-33
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 06-01 From the Analog to the Digital Age
Topic: From the Analog to the Digital Age
A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone
4. Signals such as sound and temperature, which continuously vary in strength and quality,
(p. 305- are said to be _________.
306)
A. spontaneous
B. digital
C. sequential
D. analog
6-34
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
5. The ________ is a device that converts digital computer signals into analog signals so that
(p. 306) they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
A sending modem modulates a computer's digital signals into the telephone line's analog
signals. A receiving modem demodulates analog signals into digital signals.
6. A person sending a document over a phone line by converting a computer's digital signals
(p. 306) to analog signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem
A modem converts a computer's digital signals into the telephone line's analog signals.
The receiving modem converts analog signals into digital signals.
6-35
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Another Random Scribd Document
with Unrelated Content
"Elävä maailma" on ihmeellisen ansiokas kirja. Sen tarkoitusperä
on mitä ylevin — se tahtoo yhdistää taaskin yhdeksi tiedon ja
hengen, jotka niin kauan ovat olleet erillään toisistaan. Se oli
anatomin kuvaus ihmisruumiista suoritettuna ylevimmällä runollisella
lennolla. Ei voi lukea mitään uljaanylväämpää ja loistoisampaa kuin
tätä esitystä aineesta, joka tavallisessa käsittelyssä on niin
kuivakiskoista ja vastenmielistä. Hän näki luonnon, "joka kiersi
ikuisena kierteenä rattain, jotka eivät ikinä kuivu, ja akselein, jotka
eivät ikinä kitise," ja koetti toisinaan "löytää ne salaiset lymypaikat,
joissa Luonto työskentelee tuliensa ääressä työpajojensa
syvyydessä," samalla kuin hänen kuvauksensa arvoa kohottaa se
kiinteä uskollisuus, jolla se perustuu anatomisiin kokeisiin. On
huomattava, että tämä ylevä nero ehdottomasti asettaa analyyttisen,
jäsentelevän tutkimustavan etusijalle synteettiseen, yhdistävään,
kokonaisesti havaitsevaan nähden ja että hän kirjassa, jonka koko
sävy on uljasta runollista kokonaisnäkemistä, vetoomalla vetoo
siihen, että hän aina nojautuu tarkkaan kokemukseen.
Lib. I. 835.