Full Download Using Information Technology 10th Edition Williams Test Bank All Chapter 2024 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Using Information Technology 10th

Edition Williams Test Bank


Go to download the full and correct content document:
https://testbankfan.com/product/using-information-technology-10th-edition-williams-te
st-bank/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Using Information Technology 10th Edition Williams


Solutions Manual

https://testbankfan.com/product/using-information-
technology-10th-edition-williams-solutions-manual/

Using Information Technology 11th Edition Williams Test


Bank

https://testbankfan.com/product/using-information-
technology-11th-edition-williams-test-bank/

MGMT 10th Edition Williams Test Bank

https://testbankfan.com/product/mgmt-10th-edition-williams-test-
bank/

Information Technology Auditing 3rd Edition Hall Test


Bank

https://testbankfan.com/product/information-technology-
auditing-3rd-edition-hall-test-bank/
Information Technology Auditing 4th Edition Hall Test
Bank

https://testbankfan.com/product/information-technology-
auditing-4th-edition-hall-test-bank/

Managing Information Technology 7th Edition Brown Test


Bank

https://testbankfan.com/product/managing-information-
technology-7th-edition-brown-test-bank/

Using Financial Accounting Information The Alternative


to Debits and Credits 10th Edition Porter Test Bank

https://testbankfan.com/product/using-financial-accounting-
information-the-alternative-to-debits-and-credits-10th-edition-
porter-test-bank/

Information Technology Project Management 9th Edition


Schwalbe Test Bank

https://testbankfan.com/product/information-technology-project-
management-9th-edition-schwalbe-test-bank/

Information Technology for Managers 1st Edition


Reynolds Test Bank

https://testbankfan.com/product/information-technology-for-
managers-1st-edition-reynolds-test-bank/
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.


A. continuous
B. digital
C. sequential
D. analog

2. Each zero and one signal represents a ________.


A. bit
B. byte
C. kilobyte
D. megabyte

3. Which of the following is NOT an analog device?


A. speedometer
B. tire-pressure gauge
C. thermometer
D. computer

4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be
A. spontaneous
B. digital
C. sequential
D. analog

6-1
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer

6. A person sending a document over a phone line by converting digital signals to analog
signals uses a ________.
A. printer
B. scanner
C. digitizer
D. modem

7. A ________ is a system of interconnected computers, telephones, or communications


devices that can communicate and share resources.
A. terminal
B. router
C. network
D. server

8. A network that covers a wide geographical area is called a ________.


A. LAN
B. WAN
C. MAN
D. HAN

9. A network that covers a city or a suburb is called a(n) ________.


A. WAN
B. LAN
C. MAN
D. Internet

6-2
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

10. Networks are structured in two principle ways: client/server and ________.
A. intranet
B. host computer
C. extranet
D. peer-to-peer

11. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

12. A computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is the ________ server.
A. file
B. web
C. host
D. mail

13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.
A. extranet
B. intranet
C. LAN
D. MAN

14. A virtual private network may include ________.


A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

6-3
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

15. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.
A. host
B. protocol
C. database
D. packet

16. A mainframe computer that controls a large network is called the ________ computer.
A. slave
B. host
C. client
D. node

17. Any device that is attached to a network is referred to as a ________.


A. server
B. host
C. node
D. router

18. A ________ is a fixed-length block of data for transmission.


A. node
B. protocol
C. packet
D. backbone

19. A common connection device that connects computers to a network is called a ________.
A. router
B. gateway
C. switch
D. bridge

6-4
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

20. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host

21. A special device that joins multiple wired and/or wireless networks is a ________.
A. node
B. router
C. bridge
D. firewall

22. In an organization, all computer networks are connected to the Internet by a "main
highway" called a ________.
A. skeleton
B. backbone
C. gateway
D. router

23. Which of these is NOT a network topology?


A. ring
B. bus
C. hub
D. star

24. In the ________ network topology, communications devices are connected to a single
cable with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer

6-5
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

25. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?
A. ring
B. bus
C. star
D. peer-to-peer

26. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer

27. ________ is the most common and most widely used LAN technology; it can be used
with almost any kind of computer; most microcomputers come with a port for this type of
network connection.
A. fiber-optic
B. Internet
C. token ring
D. Ethernet

28. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition telephone
systems, is known as ________.
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

6-6
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

29. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?
A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

30. A type of wired communications technology used to connect equipment in a home


network is the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

31. What wired communications medium consists of dozens or hundreds of thin strands of
glass or plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

32. The ________ is the basis for ALL telecommunications signals.


A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

33. The ________ is the range of frequencies that a transmission medium (channel) can carry
in a particular period of time.
A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

6-7
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

34. What set of rules is used to link nearly all mobile devices to a telecommunications
wireless network?
A. LAN
B. WAN
C. WAP
D. HAN

35. Which of the following is NOT a type of wireless communications media?


A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

36. What form of wireless transmission sends data to an AM or FM receiver?


A. broadcast radio
B. infrared
C. fiber-optic
D. microwave

37. Which of these types of wireless transmission is limited to line-of-sight communications?


A. broadcast radio
B. broadband
C. microwave
D. fiber-optic

38. Transmitting a signal from a ground station to a satellite is called ________.


A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

6-8
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

39. The highest level that a satellite can occupy in space is known as ________.
A. geostationary earth orbit (GEO)
B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (EEO)

40. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used
to identify earth locations.
A. GEO
B. MEO
C. LEO
D. HEO

41. Which of the following is NOT a type of long-distance wireless two-way communications
device?
A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

42. Broadband technology (wireless digital services) is also referred to as ________-


generation wireless services.
A. first
B. second
C. third
D. fourth

43. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?
A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

6-9
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

44. What short-distance wireless standard is used to link cell phones, PDAs, and computers at
distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

45. A ________ attack disables a computer system or network by making so many requests of
it that it overloads and keeps other users from accessing it.
A. worm
B. virus
C. denial-of-service
D. Trojan horse

46. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk drive.
A. worm
B. rootkit
C. Trojan horse
D. patch

47. Which of these is NOT a type of malware?


A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

48. Which type of virus is set to go off when a certain event occurs within a computer
system?
A. boot-sector virus
B. multipartite virus
C. file virus
D. logic bomb

6-10
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

49. A botmaster uses malware to hijack hundreds or thousands of computers and controls
them remotely; the controlled computers are called ________.
A. robots
B. zombies
C. worms
D. logic bombs

50. Which of the following is NOT a way to spread a virus?


A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

51. A person who gains unauthorized access to computer or telecommunications systems


without malicious intent is called a ________.
A. cracker
B. hacker
C. hoaxer
D. script kiddie

52. A person who illegally breaks into computers for malicious purposes is called a
________.
A. cracker
B. hacker
C. thrill-seeker
D. hoaxer

53. Antivirus software protects files and computer systems in all of these ways EXCEPT
which one?
A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

6-11
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

54. What protects a computer's hardware and/or software (or network) from intruders?
A. antivirus software
B. antispam software
C. firewall
D. white-hat hackers

55. What is the science, often used in computer security systems, of measuring individual
body characteristics?
A. encryption
B. decryption
C. password
D. biometrics

56. Fingerprint scanners, face-recognition systems, and iris-recognition systems are based on
________.
A. encryption
B. decryption
C. password protection
D. biometrics

57. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?
A. encryption
B. decryption
C. password
D. biometrics

58. Which of these is NOT an example of public-key encryption?


A. PGP (Pretty Good Privacy)
B. RSA encryption
C. DES (DataEncryption Standard)
D. Fortezza

6-12
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

59. ____________ encryption uses the same secret key to encrypt and decrypt a message.
A. Public-key
B. Digital technology
C. Differential coding
D. Private-key

60. RSA encryption is an example of ________ technology.


A. public-key encryption
B. private-key encryption
C. password protection
D. biometric

True / False Questions

61. Analog refers to communications signals represented in a binary format.


True False

62. Signals such as sound and temperature, which continuously vary in strength and quality,
are said to be digital.
True False

63. A thermometer and a speedometer are examples of analog devices.


True False

64. Telephones have always been digital devices.


True False

6-13
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

65. A modem converts digital signals into analog signals so they can be sent over a telephone
line.
True False

66. "Modem" is short for modulate/demodulate.


True False

67. Capturing music digitally means that one has an exact duplicate of the music.
True False

68. A network is a system of interconnected computers and communications devices that can
communicate and share resources.
True False

69. The Internet is a WAN.


True False

70. A LAN is a type of network that covers a wide geographical area.


True False

71. A home area network (HAN) uses wired, cable, or wireless connections to link a
household's digital devices.
True False

72. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.
True False

6-14
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

73. The computer that acts like a disk drive, storing the programs and data files shared by
users on a LAN, is called a file server.
True False

74. "File server" and "database server" are different names for the same type of server.
True False

75. Virtual private networks (VPNs) are private networks that use a public network (usually
the Internet) instead of private, leased (expensive) lines to connect remote sites.
True False

76. In a network, communications protocols specify the type of electrical connections, the
timing of message exchanges, and error-detection techniques.
True False

77. Routers join multiple wired and/or wireless networks.


True False

78. A gateway is an interface device permitting communication between similar networks.


True False

79. An interface device used to connect the same types of networks is called a node.
True False

80. The backbone is the main communications route in a bus network topology.
True False

6-15
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

81. In a bus network, all computers and communications devices are connected in a
continuous loop.
True False

82. Traditional landline telephone systems use twisted-pair wire as their communications
medium.
True False

83. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.
True False

84. A wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology.
True False

85. Most microcomputers come with Ethernet capability.


True False

86. All wired and wireless communications media use the electromagnetic spectrum of
radiation.
True False

87. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.
True False

88. The two general classes of bandwidth are long and short.
True False

6-16
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

89. The radio-frequency spectrum is part of the electromagnetic spectrum of radiation; it


carries most communications signals.
True False

90. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.
True False

91. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.
True False

92. Infrared transmission is a type of low-frequency wireless transmission that is short-range


and line-of-sight.
True False

93. GPS satellites use medium-Earth-orbits.


True False

94. Bluetooth is a short-range wireless (microwave) connection-up to 33 feet.


True False

95. Analog cellphones were 1G phones.


True False

6-17
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

96. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.
True False

97. Communications satellites are microwave relay stations in orbit around the earth.
True False

98. Satellite orbits are at three levels: GEO, MEO, and LEO.
True False

99. A larger number of geostationary earth orbit (GEO) satellites are required for global
coverage than mid-earth orbit (MEO) satellites.
True False

100. GPS uses MEO satellites that continuously transmit timed radio signals used to identify
earth locations.
True False

101. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
True False

102. Analog cellphones are 2G (second-generation) phones.


True False

103. Cellphones are basically two-way radios.


True False

6-18
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

104. 2G and 3G cellphones are digital, not analog.


True False

105. The short-range, wireless communications method aimed at linking hand-held devices at
high speeds and at distances of 100-228 feet is called Wi-Fi.
True False

106. A Wi-Fi enabled laptop computer accesses the available network (say, at an airport)
through an access point, which is connected to a land-based Internet connection.
True False

107. The latest version of Wi-Fi (IEEE 802.11 standard) is version a.


True False

108. Wi-Fi connections are always secure; no one can steal your data when you are online.
True False

109. Bluetooth is a short-range, wireless communications method for linking cellphones,


PDAs, computers, and some other peripherals up to distances of 30 feet.
True False

110. A denial-of-service attack uses a virus to crash your computer.


True False

111. Worms, viruses, and Trojan horse are all malware.


True False

6-19
Ch 006: Communications, Networks, and Safeguards The Wired and Wireless
World

112. A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.
True False

113. A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.
True False

114. A virus is capable of destroying or corrupting data.


True False

115. Cellphones do not get infected by malware.


True False

116. Sneakers are people who gain unauthorized access to computer or telecommunications
systems, often just for the challenge of it.
True False

117. People who illegally break into computers for malicious purposes to obtain information
for financial gain, shut down hardware, pirate software, or alter or destroy data are known as
hackers.
True False

118. If you have more than one computer linked to the Internet by a cable modem, you need a
software firewall to protect your system.
True False

6-20
Another random document with
no related content on Scribd:
High Frequency Sound Projector is merely a device for producing,
focussing and projecting supersonic vibrations, or waves which are
similar to sound, but have enormously greater frequencies. No doubt
you know that vibrations which are audible to the human ear range
from 24 per second to about 40,000 per second. My device develops
frequencies as high as a million vibrations per second."
"Did you originate the idea?" Verger asked.
"Indeed not," Anderson hastened to state. "All I did was to carry on
the work of other scientists. Early in the Twentieth Century, during
the so-called 'World War,' supersonics were used to detect the
presence of hostile submarines. While these high-frequency sound-
waves were being employed for this purpose, thousands of dead
fishes were found floating on the surface of the ocean. It was
suggested that these fishes might have been killed by the supersonic
vibrations, and this assumption was subsequently verified by
laboratory experiments."
"And is that what your dohickey is for—just to kill fishes?" Verger
asked.
"It ought to do a great deal more than that," Anderson smiled. "The
supersonics which killed small fishes had relatively low frequencies
—only about 50,000 vibrations per second. My device develops
frequencies of over a million vibrations per second."
"Does that mean that your gimmick will kill larger animals?"
The scientist answered, "I haven't tested it yet. But, reasoning by
analogy, I believe it would be absolutely fatal to any larger animal,
such as a human being, an elephant, or—"
"Or one of those Callisto devils!" the captain exclaimed. "Jumping
Jupiter! Maybe you've got something there, Professor! No weapon
that has been tried so far has been able to stop one of those babies;
but perhaps your supersonic thing-a-ma-gig will do the trick!"
"That is a possibility," Anderson agreed. "However, since we have
only one Super-Sonic Projector, I'm afraid we cannot wage a
successful war against the entire population of Callisto."
"Not very well," Verger had to admit. "Nevertheless, I still have a
hunch that your little dohickey is going to enable us to make our
getaway."

Professor Anderson was about to ask Verger what he had in mind,


when he heard a knock on the door of the stateroom. In response to
his invitation to enter, one of the women came in. It was Helen
Green, the bass-drummer.
Startled by the expression on her face, the scientist said, "What's
wrong, Mrs. Green? Why aren't you playing with the rest of the
band?"
"I got fired!" was her astonishing statement.
"You got fired?" Anderson exclaimed. "What in the Universe are you
raving about?"
"You know how it is," she grinned. "Unskilled labor is always the first
to feel the pinch of unemployment. Anyone can play the bass drum.
That's why I lost my job."
In a tone of exasperation which he tried hard to disguise, the
professor said, "Please be more explicit, Mrs. Green. This is no time
for facetiousness."
"I'm not trying to be funny," she assured him. "If you don't think I
meant it when I said I got fired, take a look at the individual that
copped my job!"
Following her suggestion, Anderson and Verger stepped to the door
and looked into the main cabin. Just beyond the entrance they were
astonished to see one of the slug-men. Armed with the padded
drum-stick, it was pounding lustily on the bass drum.
Nine or ten more of the Callisto natives were crowding the
musicians. With their weird, telescopic eyes, the slug-men were
intently watching all the movements which the girls were making.
"I believe I get the idea," Verger remarked. "Apparently they think
that if they watch the musicians closely enough, they will learn how
to play all the instruments themselves. Then they will organize a
band of their own. As soon as they are able to get along without the
human musicians, they will—"
Anderson kicked him in the shin just in time to stop him from
finishing the sentence. If Helen noticed this by-play, she did not
mention it. Instead she said, "Why don't you toss those kibitzers out,
Captain?"
Despite the seriousness of the situation, Verger couldn't help smiling.
"We can't very well toss them out, Mrs. Green, any more than a hired
orchestra could evict the sponsor of a television program who took a
notion to play with the instruments during a broadcast for which he
was footing the bill."
By that time the enormous, fantastically glowing globe of Jupiter,
upon which the daughter-moon of Callisto depended for light and
warmth, had rolled down the sky until only a small portion of it was
visible above the horizon. Evidently the slug-men abhorred being
away from home after nightfall. At any rate, they departed as soon
as the light began to wane, leaving behind them twenty tired,
frightened girls and three worried men.

CHAPTER V
The Dying Tentacle

Half an hour later, Verger, Anderson, and LeDoux stole forth from the
rocket-ship. Each of the men had a box-shaped object strapped on
his back. All three of them carried coils of insulated wire, which they
unwound as they advanced.
When they were about a mile from the Goddard, Anderson removed
the burden from his back and opened the package. It was a small
but remarkably efficient phonograph, which was equipped with a
powerful loud speaker and a device for automatically changing
records.
After Professor Anderson had attached one of the wires to the
phonograph and had adjusted the mechanism, he covered it with
vines. Then they walked for approximately another mile in a direction
which took them away from the space-ship at a slightly different
angle. At this point, which happened to be in the midst of a thicket,
they unpacked the second phonograph and connected it up to one of
the insulated wires. The third phonograph was similarly installed and
camouflaged at a point about three miles distant from the Goddard.
Guided by the wires, the three Earthmen tramped back to the space-
ship. They had scarcely reached their destination when ghostly
tongues of magenta, orange and lavender began to flame above the
distant horizon, giving warning of the impending dawn of Jupiter.
"Hurry, fellows," Captain Verger cried. "Al, will you please wake up
the ladies? Tell them we're going for a little hike and that each one of
them must bring her own instrument. Professor, will you please get
your ultra-sound device? I'll carry the storage batteries."
"What's the idea?" LeDoux demanded.
"I'll tell you later. Time's a-wasting, so let's get going!"
A few moments later he was leading the entire party toward a thickly
wooded forest which was about two hundred meters distant, on the
opposite side of the space-ship from the places where the
phonographs had been concealed.
In accordance with Verger's instructions, LeDoux carried the three
coils of wire, unwinding them as he advanced.
When they had penetrated the woods far enough to be completely
concealed, the captain called a halt and proceeded to elucidate his
peculiar orders.
"This is just a little game of hide and seek," he explained. "All you
have to do is keep out of sight and notice what happens."
Peeping through the spongy foliage at the edge of the forest, he
watched the slug-men as they emerged from their homes and
flocked toward the space-ship. He waited until twenty or thirty of
them had entered the Goddard and had subsequently poured out
again, rushing about in apparent excitement. Then he connected one
of the wires to the storage battery.
From the distant loud-speaker came the faint but unmistakable
sounds of a brass band playing a stirring march in six-eight time. The
slug-men must have heard it, for they all stopped and turned their
heads in the direction of the concealed phonograph.
For an instant they hesitated; then, like rats following the Pied Piper,
they all trooped after the mysterious music, which they obviously
assumed was being produced by the band of Earth-Folk.
Verger glanced at his wrist-watch, estimating the amount of time
which the Callisto natives would require to reach the first
phonograph. Then he disconnected the wires, waited a while, and
switched the current to the second phonograph. In a similar manner
he timed the intervening interval before connecting the third
phonograph to the battery.
Having thus tricked the enemy into a wild goose chase, Captain
Verger herded his party back toward the space-ship.
"Don't go in yet, ladies," he ordered. Then to Anderson he said,
"Let's see what your supersonic dohickey will do to that tentacle
thing that's holding our ship down."

Acting on this suggestion, Anderson aimed his invention at the thick


coil of sinew which held the Goddard captive, adjusted the
mechanism carefully, and turned on the power.
The thing began to writhe like a python in its death throes. Captain
Verger fancied he could almost hear his beloved rocket-ship groan
as the massive coils tightened convulsively around it. But the
staunch plates of super-alloy, built to withstand the terrific pressures
incident to interplanetary travel, held firm.
Bracing himself to keep from falling to the ground, which was
trembling like a miniature earthquake, Anderson continued to shoot
the powerful waves at the struggling tentacle. Finally, as the
vibrations cut through the massive tissues, the folds which encircled
the ship uncoiled and slithered inertly to the ground.
As he jumped backward to escape being hit by the dying thing,
Anderson collided with Helen Green who had been standing right
behind him.
He helped her to her feet and then said angrily, "What are you doing
here? Why didn't you stand back where you belong, with the other
girls?"
"I'm sorry," she apologized. "I wanted to find out how that new gun of
yours works, so I stood right behind you and watched you operate
it."
A second later, when Captain Verger rushed into the Goddard's
control compartment, he was nearly startled out of his wits. Barring
his way was an enormous slug-man, who had obviously been left
behind to guard the space-ship.
With a beastly snarl which sent cold shivers racing along the
Earthman's spine, the creature seized him in its slimy arms and lifted
his two hundred pound body as easily as if he had been a baby.
Verger had barely time enough to shout a warning, "Look out, Al!" to
LeDoux, when the monster whirled him about and crashed his head
against the metal floor of the space-ship.
Drawing his ray-gun, LeDoux fired point-blank at the slug-man. The
powerful blast, which would have instantly disintegrated the body of
a human being or other mammal, seemed to have absolutely no
effect on the boneless body of the Callistonian. One of its weird,
three-fingered hands shot out, grabbed the weapon and wrenched it
out of LeDoux's grasp. Then it turned the ray-gun on the Earthman.
The mechanism, of course, was unfamiliar to the monstrosity, and
this undoubtedly saved the space-pilot's life. After fumbling for a
second or two in an unsuccessful attempt to operate the weapon, the
creature dropped it with a grunt of disgust and tackled LeDoux with
its powerful, sinuous arms.
Attracted by the noise, Helen Green and two of the other girls rushed
to the door of the control room. One of them uttered a low moan and
fainted dead away. The second girl ran screaming out of the space-
ship. Helen was the only one who kept her head. Turning to
Professor Anderson, who was right behind her, she snatched the
Supersonic Projector out of his hand, thrust its muzzle into the slug-
man's side and squeezed the trigger.
Like a deflated balloon, the huge body collapsed, flopping to the floor
in a shapeless mass. Into it plumped LeDoux, his fall cushioned as if
he had dropped into a quivering heap of jelly.
Although he was trembling like an ash-tree in an earthquake,
LeDoux, thanks to his long experience in facing emergencies,
instantly took command of the situation.
"Quick, Anderson!" he shouted. "Make sure all the women are inside!
Then close the hatch and clamp it tight! Girls! Climb into your
hammocks instantly!"
As he was strapping himself into the control seat, he glanced
through the observation ports. What he saw put extra speed into his
fumbling fingers.
Already the natives of Callisto were rushing back to the Goddard.
Apparently the tremors of the dying tentacle had told them that they
had been outwitted. Although they were still nearly a mile away, they
were racing along at such a rapid speed that their arrival was only a
matter of minutes. On they came—thousands of them. Even at a
distance, LeDoux could sense the menace of their furious features
and their threatening movements.
Nevertheless, LeDoux made sure that all the women were safe in
their hammocks before he snapped on the gravity-nullifier and sent
the Goddard rocketing through Callisto's stratosphere.
CHAPTER VI
An Amazing Revelation
Three days later, Captain Verger recovered consciousness. His head
heavily bandaged, he was lying on a cot in a small white-walled
room. The sickening odor of ether was in the air. Bending over him,
he was surprised to see the kindly features of Professor Anderson.
"Where am I? What happened?" he asked tritely.
"You're in the Interplanetary Mining Company's hospital on
Ganymede," Anderson told him. "I suppose you recall what
happened to you on Callisto."
"The last thing I remember is when that blasted devil of a slug-man
bashed my head against the floor of the Goddard."
Anderson nodded and said, "Luckily for you, your skull turned out to
be a thick one. Instead of being cracked wide open as any ordinary
head would have been under the circumstances, your cranium was
only dented. The doctor says you'll recover from the concussion, but
it will be at least a month before you will be able to pilot a space-
ship."
"And what about the others—LeDoux, Helen Green and the girls of
the band?"
"All of them are safe and sound." Then Anderson told him about the
courage and resourcefulness which Helen had displayed when she
saved the Earth-People from the Callistonian guard.
"Mrs. Green sure is a swell girl," Verger murmured.
"You don't know the half of it," the Professor declared. "It was Helen
who risked her life to give you first aid while we were taking off from
Callisto. All the rest of us were strapped into our hammocks and
seats to protect ourselves against the rapid acceleration. Doctor
Williams told me that you owe your life to the way she took care of
you both on the Goddard and here."
"Do you mean to say that Helen has been my nurse at this hospital?"
"That's right," Anderson smiled, "and I wouldn't be surprised if that
was Helen coming down the corridor right now!"
As Helen Green entered the dimly lighted room, her beaming,
radiant face and her lustrous, red hair reminded Verger of noon-day
sunshine on dear old Earth.
Without making a sound, Anderson tiptoed out of the room, leaving
Verger alone with his beautiful nurse.
Her first actions and words astonished the hardened bachelor.
Kneeling at his bedside with bowed head, she whispered, "Thank
heaven you are all right!"
For a moment or two, neither of them spoke. Then Verger reached
out and reverently stroked the lustrous, red curls which were pressed
against the counterpane just above his chest.
"You're a wonderful woman, Mrs. Green," he murmured. "The lucky
chap who married you sure drew a prize."
She surprised him by saying, "My name is not Mrs. Green—and I am
not married."
"Then how did you get into the band, which was supposed to be
composed exclusively of exiles' wives?" he demanded.
"Oh, that was easy. You see, the real Mrs. Green is a friend of mine.
She was selected to join the band and fly to her husband, who is one
of the miners here. At the showdown, she lost her nerve. Apparently,
she lacked the—the intestinal fortitude that it takes to embark on a
space voyage. When I heard she was going to quit, I got her to let
me take her place. So here I am."
"But I still don't understand," Verger said. "If you haven't a husband
here, why did you go on a journey which you must have known
would be full of discomfort and danger?"
She grinned and replied, "Oh, I don't know. I guess it must have
been the gypsy in my soul."
"Haven't you ever been married?" he asked.
"Never," she smiled. "I'm one of those things that's commonly called
a spinster."
"That reminds me of a gag I heard a long time ago," Verger rejoined.
"It seems that a high school girl, when asked to define that word,
said, 'A spinster is the wife of a bachelor'." Then he added, "I guess
you know that I am a bachelor, don't you?"
Helen laughed and replied, "How could I help knowing that?
Everyone tells me that you are an incurable woman-hater. And that's
the truth, isn't it, Captain Verger?"
"All except the tense of the verb," he corrected her. "They should
have told you that I was a woman-hater until I met you—you plucky,
red-headed angel, you!"
THE END
*** END OF THE PROJECT GUTENBERG EBOOK RHYTHM
RIDES THE ROCKET ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no

You might also like