100% found this document useful (6 votes)
36 views

Using Information Technology 11th Edition Williams Test Bankpdf download

The document provides links to various test banks and solutions manuals for different editions of textbooks related to information technology and management. It includes multiple-choice and true/false questions focused on communications, networks, and cyber threats. The content covers topics such as digital and analog signals, network types, and security measures.

Uploaded by

fervinomphi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
36 views

Using Information Technology 11th Edition Williams Test Bankpdf download

The document provides links to various test banks and solutions manuals for different editions of textbooks related to information technology and management. It includes multiple-choice and true/false questions focused on communications, networks, and cyber threats. The content covers topics such as digital and analog signals, network types, and security measures.

Uploaded by

fervinomphi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Using Information Technology 11th Edition

Williams Test Bank pdf download

https://testbankfan.com/product/using-information-
technology-11th-edition-williams-test-bank/
We believe these products will be a great fit for you. Click
the link to download now, or visit testbankfan.com
to discover even more!

Using Information Technology 10th Edition Williams Test


Bank

https://testbankfan.com/product/using-information-
technology-10th-edition-williams-test-bank/

Using Information Technology 10th Edition Williams


Solutions Manual

https://testbankfan.com/product/using-information-
technology-10th-edition-williams-solutions-manual/

Information Technology for Management 11th Edition


Turban Test Bank

https://testbankfan.com/product/information-technology-for-
management-11th-edition-turban-test-bank/

Foundations of Business 5th Edition Pride Solutions


Manual

https://testbankfan.com/product/foundations-of-business-5th-
edition-pride-solutions-manual/
Organisational Change Development and Transformation
Australia 6th Edition Waddell Test Bank

https://testbankfan.com/product/organisational-change-
development-and-transformation-australia-6th-edition-waddell-
test-bank/

Strategic Management An Integrated Approach 10th


Edition Hill Test Bank

https://testbankfan.com/product/strategic-management-an-
integrated-approach-10th-edition-hill-test-bank/

Comparative Health Information Management 4th Edition


Peden Solutions Manual

https://testbankfan.com/product/comparative-health-information-
management-4th-edition-peden-solutions-manual/

Advanced Accounting 4th Edition Jeter Solutions Manual

https://testbankfan.com/product/advanced-accounting-4th-edition-
jeter-solutions-manual/

Money Banking and the Financial System 2nd Edition


Hubbard Test Bank

https://testbankfan.com/product/money-banking-and-the-financial-
system-2nd-edition-hubbard-test-bank/
Economics Today The Micro View 17th Edition Miller Test
Bank

https://testbankfan.com/product/economics-today-the-micro-
view-17th-edition-miller-test-bank/
Chapter 06

Communications, Networks, and Cyberthreats: The Wired and


Wireless World

Multiple Choice Questions

1. Communications signals represented in a binary format are said to be ________.

A. continuous
B. digital
C. sequential
D. analog

2. Each zero and one signal represents a ________.

A. bit
B. byte
C. kilobyte
D. megabyte

3. Which of the following is NOT an analog device?

A. speedometer
B. tire-pressure gauge
C. thermometer
D. smartphone

6-1
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
4. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be _________.

A. spontaneous
B. digital
C. sequential
D. analog

5. The ________ is a device that converts digital computer signals into analog signals so that
they can be sent over a telephone line.

A. printer
B. scanner
C. modem
D. digitizer

6. A person sending a document over a phone line by converting a computer's digital signals to
analog signals uses a ________.

A. printer
B. scanner
C. digitizer
D. modem

7. A ________ is a system of interconnected computers, telephones, or communications devices


that can communicate and share resources.

A. terminal
B. router
C. network
D. server

6-2
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8. A network that covers a wide geographical area is called a ________.

A. LAN
B. WAN
C. MAN
D. HAN

9. A network that covers a city or a suburb is called a ________.

A. WAN
B. LAN
C. MAN
D. Internet

10. Networks are structured in two principle ways: client/server and ________.

A. intranet
B. host computer
C. extranet
D. peer to peer

11. A network that operates without relying on a server is the ________ network.

A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave

6-3
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. A computer that acts like a disk drive, storing the programs and data files shared by users on
a LAN, is the ________ server.

A. file
B. web
C. host
D. mail

13. If an organization's internal private network uses the same infrastructure and standards of
the Internet, then the private network is a(n) ________.

A. extranet
B. intranet
C. LAN
D. MAN

14. A virtual private network may include ________.

A. a company intranet
B. a company extranet
C. a company LAN
D. any of these

15. A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.

A. VPN
B. intranet
C. firewall
D. protocol

6-4
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
16. A ________ is the set of rules that govern the exchange of data between hardware and/or
software components in a communications network.

A. host
B. protocol
C. database
D. packet

17. A mainframe computer that controls a large network is called the ________ computer.

A. slave
B. host
C. client
D. node

18. Any device that is attached to a network is referred to as a ________.

A. server
B. host
C. node
D. router

19. A ________ is a fixed-length block of data for transmission.

A. node
B. protocol
C. packet
D. backbone

6-5
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. A common connection device that connects computers to a network and that sends
messages (checks packets) between sender and receiver nodes is called a ________.

A. router
B. gateway
C. switch
D. bridge

21. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.

A. router
B. gateway
C. hub
D. host

22. A device that joins multiple wired and/or wireless networks in a home office is a ________.

A. node
B. router
C. bridge
D. firewall

23. In an organization, all computer networks are connected to the Internet by a "main highway"
called a ________.

A. skeleton
B. backbone
C. gateway
D. router

6-6
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. Which of these is NOT a network topology?

A. ring
B. bus
C. hub
D. star

25. In the ________ network topology, communications devices are connected to a single cable
with two endpoints.

A. ring
B. bus
C. star
D. peer-to-peer

26. What kind of topology (layout) is used by a network that connects all computers and
communications devices in a continuous loop?

A. ring
B. bus
C. star
D. peer-to-peer

27. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?

A. ring
B. bus
C. star
D. peer-to-peer

6-7
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
28. ________ is the most common and most widely used LAN technology, with networked devices
in close proximity; it can be used with almost any kind of computer. Most microcomputers
come with a port for this type of network connection, which uses cable.

A. Fiber-optic
B. Internet
C. Token ring
D. Ethernet

29. A communications medium is a channel; there are three types of wired communications
media. The one consisting of two strands of insulated copper wire, used by tradition
telephone systems, is known as ________.

A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

30. What wired channel, commonly used for cable TV, consists of an insulated copper wire
wrapped in a solid or braided shield placed in an external cover?

A. twisted-pair
B. coaxial
C. straight wire
D. fiber-optic

31. A type of wired communications technology used to connect equipment in a home network is
the following:

A. Ethernet
B. HomePNA
C. HomePlug
D. any of these

6-8
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. What wired communications medium consists of dozens or hundreds of thin strands of glass
or plastic?

A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire

33. The ________ is the basis for ALL telecommunications signals.

A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

34. The ________ is the range of frequencies that a transmission medium (channel) can carry in a
particular period of time.

A. bandwidth
B. electromagnetic spectrum
C. radio-frequency spectrum
D. wireless application protocol

35. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
wireless network and content providers?

A. LAN
B. WAN
C. WAP
D. HAN

6-9
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. Which of the following is NOT a type of wireless communications media?

A. infrared transmission
B. satellite
C. coaxial
D. microwave radio

37. What form of wireless transmission sends data to an AM or FM receiver?

A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio

38. Which of these types of wireless transmission is limited to line-of-sight communications?

A. broadcast radio
B. broadband
C. microwave
D. WAP

39. Transmitting a signal from a ground station to a satellite is called ________.

A. broadcasting
B. high-frequency
C. uplinking
D. downlinking

6-10
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. The highest level that a satellite can occupy in space is known as ________.

A. geostationary earth orbit (GEO)


B. high-earth orbit (HEO)
C. medium-earth orbit (MEO)
D. low-earth orbit (LEO)

41. GPS uses satellites orbiting at a(n) ________ level; they transmit timed radio signals used to
identify earth locations.

A. GEO
B. MEO
C. LEO
D. HEO

42. Broadband technology (wireless digital services) is also referred to as ________-generation


wireless services.

A. first
B. second
C. third
D. fourth

43. Which of the following is NOT a type of long-distance wireless two-way communications
device?

A. Bluetooth
B. CDMA
C. 1G analog cellular phone
D. 2G digital cellphone

6-11
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. What short-distance wireless standard is used to link portable computers and handheld
wireless devices so they may communicate at high speeds at distances of 100-228 feet?

A. Bluetooth
B. HomeRF
C. Wi-Fi
D. 3G

45. What short-distance wireless standard is used to link cell phones, computers, and
peripherals at distances of up to about 33 feet?

A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP

46. A ________ attack disables a computer system or network by making so many requests of it
that it overloads it and keeps other users from accessing it.

A. worm
B. virus
C. denial-of-service
D. Trojan horse

47. A ________ is a program that copies itself repeatedly into a computer's memory or onto a
disk/flash drive.

A. worm
B. rootkit
C. Trojan horse
D. patch

6-12
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. Which of these is NOT a type of malware?

A. worm
B. virus
C. Trojan horse
D. denial-of-service attack

49. A botmaster uses malware to hijack hundreds or thousands of computers and controls them
remotely; the controlled computers are called ________.

A. robots
B. zombies
C. worms
D. logic bombs

50. Which of the following is NOT a way to spread a virus?

A. flash drives
B. scanning a picture
C. e-mail attachment
D. downloaded games or other software

51. Antivirus software protects files and computer systems in all of these ways EXCEPT which
one?

A. scans the hard drive for signatures that uniquely identify a virus
B. looks for suspicious viruslike behavior
C. goes out on the Internet and looks for viruses
D. destroys the virus

6-13
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. What is the science, often used in computer security systems, of measuring individual body
characteristics?

A. encryption
B. decryption
C. rootkit
D. biometrics

53. What is the process of altering readable data (plain text) into unreadable form to prevent
unauthorized access?

A. encryption
B. decryption
C. password
D. biometrics

True / False Questions

54. Analog refers to communications signals represented in a binary format.

True False

55. Signals such as sound and temperature, which continuously vary in strength and quality, are
said to be digital.

True False

56. A thermometer and a speedometer are examples of analog devices.

True False

6-14
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Telephones have always been digital devices.

True False

58. A modem converts digital signals into analog signals so they can be sent over a telephone
line.

True False

59. "Modem" is short for modulate/demodulate.

True False

60. Capturing music digitally means that one has an exact duplicate of the music.

True False

61. A network is a system of interconnected computers and communications devices that can
communicate and share resources.

True False

62. The Internet is a WAN.

True False

63. A LAN is a type of network that covers a wide geographical area.

True False

64. Client/server networks and peer-to-peer networks are the same except that the first type of
network uses a mainframe and the second type uses only microcomputers.

True False

6-15
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
65. The computer that acts like a disk drive, storing the programs and data files shared by users
on a LAN, is called a file server.

True False

66. "File server" and "database server" are different names for the same type of server.

True False

67. Peer-to-peer networks are less stable than client-server networks because in the former
certain shared resources reside on each user's machine.

True False

68. Virtual private networks (VPNs) are private networks that use a public network (usually the
Internet) instead of private, leased (expensive) lines to connect remote sites.

True False

69. If you have one computer, you need firewall hardware; if you have more than one (networked)
computer, then a software firewall should be used.

True False

70. In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.

True False

71. Routers join multiple wired and/or wireless networks commonly in offices and home offices.

True False

72. A gateway is an interface device permitting communication between similar networks.

True False

6-16
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. An interface device used to connect the same types of networks is called a node.

True False

74. The backbone is the main communications route in a bus network topology.

True False

75. In a bus network, all computers and communications devices are connected in a continuous
loop.

True False

76. Traditional landline telephone systems use twisted-pair wire as their communications
medium.

True False

77. A cable that is made up of dozens of thin strands of glass and transmits pulsating beams of
light is called a coaxial cable.

True False

78. Ethernet is a long-distance wireless communications connection.

True False

79. One wired communications standard that allows users to send data over a home's existing
electrical (AC) power lines is called HomePlug technology; it uses existing electrical lines.

True False

80. All wired and wireless communications media use the electromagnetic spectrum of radiation.

True False

6-17
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
81. The smaller the bandwidth of a medium, the more frequencies it can use to transmit data.

True False

82. The two general classes of bandwidth are long and short.

True False

83. The radio-frequency (RF) spectrum is part of the electromagnetic spectrum of radiation; it
carries most communications signals.

True False

84. The frequency of an electromagnetic wave is the number of times the wave repeats, or
makes a cycle, in a second.

True False

85. Both digital narrowband and broadband transmission speeds are measured in megabits or
gigabits per second.

True False

86. Infrared transmission is a type of low-frequency wireless transmission that is short-range


and line-of-sight.

True False

87. Satellite transmission uses in-orbit satellites and earth stations. Transmitting from the
ground to the satellite is called downlinking, and transmitting from the satellite to the ground
station called uplinking.

True False

88. Communications satellites are microwave relay stations in orbit around the earth.

True False

6-18
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
89. Satellite orbits are at three levels: GEO, MEO, and LEO.

True False

90. A larger number of geostationary earth orbit (GEO) satellites are required for global coverage
than mid-earth orbit (MEO) satellites.

True False

91. GPS uses MEO satellites that continuously transmit timed radio signals used to identify earth
locations.

True False

92. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.

True False

93. GPS satellites use Medium-Earth-Orbits.

True False

94. Cellphones are cellular radios.

True False

95. Analog cellphones were 1G phones.

True False

96. Analog cellphones are 2G (second-generation) phones.

True False

97. Cellphones are basically two-way radios.

True False

6-19
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. 2G and 3G cellphones are digital, not analog.

True False

99. Wi-Fi is a short-range wireless connection for LANs.

True False

100.The short-range, wireless communications method aimed at linking hand-held devices at


high speeds and at distances of 100-228 feet is called Wi-Fi.

True False

101.A Wi-Fi enabled laptop computer accesses the available network (say, at an airport) through
an access point, which is connected to a land-based Internet connection.

True False

102.The latest version of Wi-Fi (IEEE 802.11 standard) is version a.

True False

103.Wi-Fi connections are always secure; no one can steal your data when you are online.

True False

104.Bluetooth is a short-range, wireless communications method for linking cellphones,


computers, and some other peripherals up to distances of 33 feet.

True False

105.Malware consists of safeguards for protecting information technology against unauthorized


access, system failures, and disaster that can result in damage or loss.

True False

6-20
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
106.A denial-of-service attack uses a virus to crash your computer.

True False

107.Worms, viruses, and Trojan horse are all malware.

True False

108.A Trojan horse pretends to be a useful program, such as a game or a screen saver, but it
carries a virus that replicates in your computer over and over until your computer crashes.

True False

109.A virus is a "deviant" program that is stored on a computer hard drive and can cause
unexpected and undesirable effects.

True False

110.A virus is capable of destroying or corrupting data.

True False

111.Cellphones do not get infected by malware.

True False

112.Encryption is the process of altering—via software—readable data into unreadable form to


prevent unauthorized access.

True False

Fill in the Blank Questions

6-21
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
113._________ is the gradual merger of computing and communications into a new information
environment, in which the same information is exchanged among many kinds of equipment,
using the language of computers.

________________________________________

114.Most of the word's natural phenomena use signals that continuously vary in strength and
quality, called ________ signals.

________________________________________

115.Communications signals represented in a binary electronic format are ________ signals.

________________________________________

116.So they can be sent over a telephone line, analog signals are converted into digital signals,
and then back again, by using ________.

________________________________________

117.A _________ is a communications network covering a city or a suburb.

________________________________________

118.A peer-to-peer (P2P) network operates without relying on a central ________.

________________________________________

119.Private networks that use a public network, usually the Internet, to connect remote sites are
called ________.

________________________________________

120.A private intranet that allows access to selected outside users is a(n) ________.

________________________________________

6-22
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121.A _________ is a system of hardware and/or software that protects a computer or a network
from intruders.

________________________________________

122.A client-server network has a _________ computer, a central computer that controls the
network; The devices connected to the network are called _________.

________________________________________

123.A set of conventions that govern how data is exchanged between devices on a network is
known as a communications ________.

________________________________________

124.Electronic messages are sent as ________, fixed-length blocks of data for transmission.

________________________________________

125.A _________ is a network that connects computers to a network; data can be sent in both
directions at the same time.

________________________________________

126.A(n) ________ is an interface (linking device) used to connect the same types of networks,
whereas a(n) ________ is an interface permitting communications between dissimilar
networks.

________________________________________

127.________ are physical devices that join multiple wired and/or wireless networks; their primary
job is to provide connectivity, and they are often used in small office networks, cafés,
airports, hotels, and home networks.

________________________________________

6-23
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
128.The ________ consists of the main "highway" that connects all computer networks in an
organization.

________________________________________

129.A motherboard expansion card called a _________ enables a computer to send and receive
messages over a network.

________________________________________

130.The system software that manages the activity of a network is called the ________.

________________________________________

131.A network can be laid out in different ways. The layout, or shape, of a network is called a
________.

________________________________________

132.A ________ network topology is one in which all microcomputers and other devices are
connected in a continuous loop.

________________________________________

133.A ________ network topology is one in which all microcomputers and other communications
devices are connected directly to a central network switch.

________________________________________

134.The Internet uses the ________ network topology.

________________________________________

6-24
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
135.In small LANs, messages may bump into one another. The most popular protocol, or
technology, which uses cabling and special ports on microcomputers, that prevents collisions
is ________. It can be used with almost any kind of computer and with different network
topologies.

________________________________________

136.Wired communications media include three main types. The kind used for tradition telephone
lines is a ________.

________________________________________

137.Telecommuting means using a computer and networks to work from ________; telework
means working from ________.

________________________________________

138.Wired communications media include three main types. Insulated copper wire wrapped in a
solid or braided shield and then an external cover is called ________ cable.

________________________________________

139.Wired communications media include three main types. The kind used for transmitting pulses
of light is called a ________ cable.

________________________________________

140.HomePlug technology is a wired communications standard that allows users to connect


equipment within the home using the house's own ________ wiring.

________________________________________

141.The range of frequencies that a transmission medium can carry in a given period of time is
called its ________.

________________________________________

6-25
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Random documents with unrelated
content Scribd suggests to you:
Mahomet II., i, 106, 256; ii, 293

Mai, Cardinal, ii, 118; iii, 269

Maitani, ii, 187 note

Maitland, Mr. Fuller, ii, 232

Maiuola, i, 78, 144


— surrender of, i, 411
— surprised, ii, 13
— siege of, ii, 369
— given to Florence, ii, 406, 420
— restored, ii, 456

Majolica, authorities for, iii, 404


— origin of, iii, 405
— made at Urbino, iii, 406
— made at Pesaro, iii, 406, 408-12, 416
— made at Gubbio, ii, 406
— mottoes on, iii, 416, 417
— processes of, iii, 409
— qualities of, iii, 410
— drug-vases of Loreto, iii, 411
— uses of, iii, 416, 418, 474
— artists of, iii, 413, 419-24
— decline of, iii, 412
— collections of, iii, 408 note, 411, 415-7, 421
— prices of, iii, 424
— artists in, petition Guidobaldo II., iii, 472

Malalbergo, i, 473

Malatesta, the, i, 333


— plural form, Florentine, i, 71 note
— arms of, i, 71 note, 76 note
— legitimation of the, i, 10
— sway of, i, 17
— seigneuries of, i, 18, 75
— fief of, i, 75
— their devolution to the Holy See, i, 179, 195
— medallions of, ii, 99

Malatesta, Antonia, i, 75 note

Malatesta, Carlo, i, 380, 388


— legitimises his brother's children, i, 10 note
— prisoner of di Montone, i, 43 note
— ransom of, i, 43

Malatesta degli Sonetti, i, 40, 83, 427

Malatesta, Domenico Novello, Lord of Cesena, i, 48, 75 note, 145


— death of, i, 180
— patron of letters, i, 140 note; ii, 100

Malatesta, Elisabetta, Lady of Camerino, i, 41, 216, 299 note


— carried off from her convent, i, 411

Malatesta, Galeazzo, Lord of Pesaro, i, 39, 83, 84


— expelled, i, 40
— sells Fossombrone, i, 23, 90
— sells Pesaro, i, 40, 89

Malatesta, Galeotto, Lord of Rimini, i, 45


— legitimised, i, 10 note, 75 note, 290
— captive of Braccio, i, 43 note
— patrimony of, i, 83

Malatesta, Ginevra, iii, 298

Malatesta, Giovanni, i, 140


Malatesta, Isotta, i, 71 note, 77, 191, 192 note
— resists Paul II., i, 195
— death of, i, 192 note, i, 196 note

Malatesta, Pandolfo, ii, 420

Malatesta, Rainiero, i, 71, note

Malatesta, Rengarda, i, 45

Malatesta, Roberto, i, 137, 299 note; iii, 410


— gains influence at Naples, i, 111
— surrenders Fano, i, 143
— seizes Cesena, i, 180
— supposed murderer of Isotta, i, 192 note, 196 note
— marriage of, i, 194 note, 203
— covets Rimini, i, 192 note, 195
— re-establishes Malatestan sovereignty, i, 200
— invested by Sixtus IV., i, 202
— his title of Magnifico, i, 203 note
— deserts to the Florentines, i, 247
— commands ecclesiastical forces, i, 260
— death of, i, 269
— marriage of, i, 289
— his children, i, 380

Malatesta, Sallustio, i, 195

Malatesta, Sigismondo Pandolfo, ii, 420; iii, 408


— legitimised, i, 10 note
— Lord of Rimini, i, 388; ii, 425 note
— arms of, i, 193
— receives Golden Rose, i, 45 note
— corrupts Duke Oddantonio, i, 53, 89
— knighted by Sigismund, i, 71 note
— his contest with Duke Federigo, i, 75-80, 83, 93-9
— marriage of, i, 80
— challenges Duke Federigo, i, 83
— his perfidy, i, 98, 99, 100
— his interviews with Duke Federigo, i, 99, 110, 119
— bought over by Sforza, i, 103
— treachery to Alfonso, i, 109
— intrigues with Naples, i, 111
— humbled by Federigo, i, 112
— supported by Sforza, i, 114
— reproved by Pius II., i, 117
— seizes Mondavio, i, 131
— burnt in effigy, i, 132
— defeated at Cesano, i, 137
— allied with Venice, i, 141, 142
— loses many Rimini fiefs, i, 144
— humiliation of, i, 145
— his losses, i, 146
— his campaign in the Morea, i, 194
— death of, i, 191, 194, 195
— character of, i, 191-4
— patron of letters, i, 191-4; ii, 98, 99, 133
— patron of arts, i, 17 note, 191-4; ii, 43
— portrait of, i, 193; ii, 208
— Dennistoun's mistakes concerning, i, 114 note, 192 note

Malatesta, Violante, i, 180

Malavolti, Historia, i, 98 note

Malcolm, Earl of Lennox, i, xiii

Maldonato, ii, 380


— treason of, ii, 393-5

Malines, treaty of, ii, 355


Malombra, the, house of, i, 424

Malpiedi, the, iii, 379

Malvasia, ii, 216; iii, 419

Mammarelli, Domenico, iii, 53 note

Mammiani, Count Francesco Maria, iii, 196, 212, 214

Manara, Ricci, ii, 265 note

Mancini, ii, 203 note

Manerola, Teodora, ii, 281

Manfred, i, 323

Manfredi, the, i, 258


— Faenza, Seigneury of, i, 18

Manfredi, Astorre, i, 109, 381; ii, 10


— Lord of Faenza, deserts to Venetians, i, 186
— strangled, i, 389

Manfredi, Guidantonio, i, 47, 53


— marriage of, i, 74

Manfredi, Ottaviano, i, 381

Manfredi, Taddeo, i, 236 note; ii, 284


— surrenders Imola, i, 238

Manfredonia, i, 247
Manso, iii, 312, 327

Mantegna, Andrea, i, 347; ii, 200, 217, 265


— portrait ascribed to, i, 286
— on Gem, ii, 297

Mantua, i, 44; ii, 409; iii, 311


— Marquis of, i, 48, 247, 311; ii, 51; iii, 26, 304
— congress at, i, 116, 124
— defends Ferrara, i, 259
— Federigo at, i, 264
— Guidobaldo I. at, i, 406, 408
— Marchioness of, iii, 18, 431
— palace of, iii, 352

Manutius, Aldus, i, 449; ii, 87

Maramaldo, Cardinal, i, 42 note

Marc Antonio, burin of, ii, 240; iii, 287, 409

Marcellus II., iii, 104, 260

Marchese, Padre, i, 287

Marchesini, ii, 74 note

Marciana, Caterina, ii, 280

Marcolini, St. d. Prov. di Pesaro e Urbino, i, 54 note

Marcone, iii, 442

Marcucci, ii, 292, note


— Francesco Maria I., ii, 313 note
Maremma, the, i, 98, 103
— campaign in, i, 103-6

Margaret of Austria, marriage of, iii, 93


— her influence with Paul III., iii, 93

Margaretta of Bavaria, i, 311

Margaritone, style of, ii, 186

Maricourt, Le Procès des Borgia, ii, 19 note

Mariello, ii, 44 note

Marignano, ii, 439


— battle of, ii, 363

Marino, i, 330; iii, 291 note

Marini, ii, 14, 204 note


— Benedetto, iii, 380
— Saggio di ragioni della città di S. Leo, i, 78 note; iii, 184

Mariotti, Signor, his Italy, i, xxxi, 21 note; ii, 277 note; iii, 25 note,
48 note, 253 note
— his mistakes, i, xxxi
— on republicanism, i, 20
— on Malatesta, i, 191

Marliani, ii, 51 note, 470

Marryat, History of Pottery and Porcelain, iii, 404 note


— on majolica, iii, 411, 415, 416, 421, 423

Marsciano, Nardo da, i, 126


Marseilles, i, 124, 348, 373

Marso, Paola, i, 228

Martin IV., i, 26; iii, 181

Martin V., i, 40; ii, 291


— creates countship of Castel Durante, i, 23
— arrives in Italy, i, 44
— his difficulties, i, 44, 45
— death of, i, 46
— legitimises Duke Federigo, i, 62
— letter to, i, 428

Martinate, ii, 51 note

Martinengo, ii, 425; iii, 77

Martini, Simone, ii, 185 note, 188 note; iii, 336 note

Martino of Siena, i, 152; ii, 212

Maruccelli MSS., iii, 229 note, 240 note, 246 note

Mary, Queen of England, iii, 303

Marza, Ventura, iii, 378

Marzio, at S. Leo, ii, 14

Masaccio, ii, 172, 187, 199, 208


— in Rome, ii, 288

Mascherino, iii, 485

Maso di Bosco, iii, 385


Massa, i, 3; ii, 389

Massa collection, iii, 416, 417, 424

Massa Trabaria, ii, 368


— obtained by the Montefeltri, i, 23

Massa Vaccareccia, i, 51 note

Masse, ii, 27 note, 298 note


— on the papacy, i, 316

Massa Carrara, iii, 81

Massini, Domenico de', iii, 6, 431

Mastei, Antonio, i, 173

Matarazzo, Chronicle of Perugia, i, 369 note

Matelica, iii, 68

Matilda, Countess, donations of, i, 5, 12

Mattei Palace, iii, 356

Mavorelli, Signor, iii, 424

Maximilian, Emperor, ii, 343, 407


— organises the lanzknechts, i, 331
— supports Il Moro, i, 353
— enters Italy, ii, 321

Maximilian II., iii, 132


Mazio, Relazione a Urbano VIII., i, 78 note

Mazzatinti, Prof. Giuseppe, i, 22 note, 35 note


— Cronaca, i, 23 note
— Di alcune legge, i, 23 note
— Documenti, ii, 190 note

Mazzola, i, 209

Mazzoni, Giacomo, iii, 122, 135, 318 note


— his funeral oration on Guidobaldo II., iii, 122
— Vittoria Colonna, iii, 291 note

Mazzuchelli, i, 191 note; ii, 51 note; iii, 294

M'Crie, Dr., iii, 276

Medici, the, allies of, i, 243, 247


— expelled from Florence, i, 349-50; iii, 43
— scheme to re-enter Florence, i, 370, 393
— patrons of art and letters, ii, 43, 99
— return to Florence, ii, 347; iii, 43
— visit Urbino, ii, 351

Medici, Alessandro de', Duke of Florence, marriage of, iii, 62

Medici, Caterina de', ii, 152, 406, 414 note, 415; iii, 34, 391 note
— marriage of, iii, 62

Medici, Clarice de', ii, 53, 365

Medici, Cosimo de', Pater Patriæ, i, 92


— Ruler of Florence, i, 98
— library of, i, 163
— on crusade of Pius II., i, 177
— death of, i, 184
— adopts Platonic philosophy, ii, 105

Medici, Cosimo I. de', iii, 111, 198

Medici, Francesco Maria, Cardinal de', iii, 239


— letters to, iii, 137-9

Medici, Giovanni de', i, 381, 384; ii, 384; iii, 76

Medici, Giovanni, delle Bande nere, i, 384; ii, 414, 416, 436, 438; iii,
288, 431
— death of, ii, 446

Medici, Giovanni Gaston, iii, 239

Medici, Giuliano de', i, 238


— murder of, i, 235 note, 240

Medici, Giuliano de', ii, 53, 127; iii, 78, 283


— life of, ii, 56, 57
— at Urbino, ii, 56, 57, 232, 351, 361
— his influence with Leo X., ii, 56
— as a poet, ii, 57 note
— portrait of, ii, 234
— reconciled with Julius II., ii, 329
— aspires to Naples, ii, 358-65
— death of, ii, 365
— monument of, iii, 389

Medici, Cardinal Giulio de', ii, 414, 416, see Clement VII.

Medici, Cardinal Ippolito, ii, 57

Medici, Cardinal Lorenzo de', ii, 233

Medici, Lorenzo de', the Magnificent, i, 51 note, 157, 185, 209, 262,
299; iii, 409
— gardens of, i, 174 note
— attempted murder of, i, 235 note, 240-3
— in favour with Sixtus IV., i, 237
— policy of, i, 238, 251
— excommunicated, i, 242
— appeals to Ferdinand, i, 252
— defends Ferrara, i, 259, 263
— intrigues of, i, 307
— death of, i, 326
— tutor of, ii, 113
— supports Platonism, iii, 34, 256

Medici, Lorenzo de', Duke of Urbino, character of, ii, 365


— gains and loses Urbino, ii, 367-80
— challenged by Francesco Maria I., ii, 381-3
— shot at Mondolfo, ii, 385
— marriage of, ii, 405
— letter to, from Wolsey, ii, 484
— at Urbino, iii, 283
— monument of, iii, 389

Medici, Madalena de', i, 331

Medici, Mary de', iii, 488

Medici, Pasqualino de', ii, 57

Medici, Pietro de', i, 184, 185, 195, 201; iii, 389


— succession of, i, 327
— frustrates negotiations for Italian league, i, 328
— surrenders Sarzana, i, 349
— expelled, i, 350

Medicine, science of, in 15th century, i, 313 note


Medina del Campo, ii, 30

Meldola, i, 27, 406; ii, 453


— ceded to Roberto Malatesta, i, 180

Mellara, i, 262

Melozzo da Forlì, ii, 210, 218, 260


— his work, ii, 290

Mende, bishop of, ii, 282 note

Mercatello, Countship of, i, 18, 63; iii, 201, 400


— obtained by the Montefeltri, i, 23
— palace of, i, 174
— built by Giorgio, ii, 213
— S. Francesco, ii, 201, 208

Mercatello, Francesco di, ii, 265 note

Merlini, Guido, iii, 422

Merula, Giorgio, ii, 51 note

Messina, ii, 62; iii, 452

Metauro river, the, iii, 321, 413

Mez de Silva, Ruggo, iii, 133

Michelotto, Don, i, 395, 415, 418; ii, 21


— at Sinigaglia, ii, 4, 11; iii, 63

Michiels, ii, 268

Milan, i, 37, 67
— accepts Sforza as duke, i, 97
— court of, i, 121
— defends Ferrara, i, 259
— Charles VIII. at, i, 348
— siege of, ii, 282, 425
— taken by Francis I., ii, 431
— held by Sforza, ii, 435, 437-41
— restored to the Sforza, ii, 346, 410
— Ariosto at, iii, 281

Milesio, Maestro Benedetto, iii, 73

Militia instituted by the Duke Francesco Maria I., iii, 61, 94

Milton, John, iii, 327

Minims, order of Friars, iii, 182, 224, 225, 240, 243

Minio, despatches of, ii, 277, 384, 392, 399, 404


— his conversation with Leo X., ii, 395-7, 400, 404

Minzocchi, Francesco, iii, 350

Mirafiori, iii, 180

Mirandola, Pico della, i, 313 note

Mirandola, siege of, ii, 305, 334, 335

Modena, i, 381; ii, 362, 397; iii, 23, 37, 164


— capture of, ii, 345
— purchase of, ii, 359

Modula, Bishop of, on the sack of Rome, iii, 429

Mola di Gaeta, i, 330


Molinella, battle of, i, 339

Molini, ii, 408 note, 445 note


— Documenti, iii, 25 note

Molino, Ludovico del, ii, 211 note

Molmenti, ii, 73 note

Molza, Monsignor, i, 446; iii, 275

Monaldin, Victoria de, i, 435

Moncada, Don Ugo de, i, 418; ii, 396, 401; iii, 27, 442, 451
— succeeds Lannoy, iii, 25
— intrigues with Colonna, ii, 426, 444, 453

Moncenigo, iii, 113, 464


— on Guidobaldo I., ii, 88
— on Francesco Maria II., iii, 135, 136
— on Lucrezia d'Este, iii, 136

Mond, Mr. Ludwig, ii, 224 note

Mondaino, i, 23, 140; ii, 292

Mondavio, i, 23, 119, 131; ii, 213, 291


— passes to della Rovere, i, 222

Mondolfo, i, 137, 144; ii, 213, 291, 378; iii, 160, 199
— siege of, ii, 384-7

Monopoli, i, 394

Monreale, Cardinal of, i, 345


— Archbishop of, iii, 162

Montaigne on Tasso, iii, 326

Montalto, ii, 213

Mont'Amiata, iii, 109 note

Montanari, iii, 404 note

Montano, Cola, i, 234

Montano, Marco, iii, 295, 298

Monte Asdrualdo, ii, 260

Montebaroccio, ii, 211 note, 380, 388; iii, 262


— sack of, ii, 383

Monte Bartolo, ii, 357, 388; iii, 49

Montebello, Count of, iii, 150

Monte Berticchio, iii, 182

Montecalvo, i, 418

Monte, Cardinal del, iii, 432

Monte Carlo, i, 423

Monte Carpegna, i, 160

Monte Catria, i, 160; ii, 78

Monte del Cavallo, i, 160


Montechio, iii, 80

Montecirignone, ii, 213

Monte Copiolo, i, 25, 405

Monte Corciano, iii, 180

Montefabri, Castle of, iii, 264

Montefalcone, Serafino da, i, 126

Montefeltrano, invested Count by Barbarossa, i, 25

Montefeltro, ii, 389


— see of, ii, 314
— given to Florence, ii, 406
— plunder of, ii, 415

Montefeltro, Counts of, beneficent sway of the, i, 17


— receive investiture of Urbino, i, 18, 22
— supplant Ceccardi in Cagli, i, 22, 37
— supplant Gabrielli in Gubbio, i, 22, 37
— created by Barbarossa, i, 24, 25
— arms of, i, 25 note, 76 note
— Ghibelline principles of, i, 24-6, 35
— feuds of, i, 35
— patrons of letters, ii, 98, 107, 109
— patrons of art, ii, 192

Montefeltro, house of, antiquity of, i, 124


— branches of, i, 25

Montefeltro, Agnesina di, i, 48, 289; ii, 419; iii, 291


— marriage of, i, 222
Montefeltro, Anna, Aura, or Laura di, i, 39, 49
— marriage of, i, 39 note

Montefeltro, Antonio di, i, 61 note, 290, 355, 466; ii, 47 note, 75


— legitimation of, i, 120
— knighted by Ferdinand, i, 223

Montefeltro, Battista, see Battista, Countess of Urbino


— see Sforza

Montefeltro, Battista di, her marriage, i, 39


— marriage contract of, i, 40 note
— her accomplishments, i, 39, 122, 216; ii, 129
— becomes a nun, i, 40
— descent of, i, 41
— death of, i, 90
— sonnets of, i, 428

Montefeltro, Bernardino, i, 120, 291

Montefeltro, Bianca, Lady of Faenza, i, 47

Montefeltro, Brigida, Sueva di, unhappy marriage of, i, 48 note


— becomes a Franciscan abbess, i, 48 note
— articles taken by her into the convent, i, 433

Montefeltro, Buonconte, i, 120, 290

Montefeltro, Caterina, Princess of Salerno, i, 255

Montefeltro, Chiara, i, 290

Montefeltro, Costanza, i, 290

Montefeltro, Elisabetta, or Isabella, i, 289


— marriage of, i, 203

Montefeltro, Gentile, i, 291; ii, 58

Montefeltro, Giovanna di, i, 222, 289; ii, 282, 291, 419


— escapes from Sinigaglia, ii, 300

Montefeltro, Guido Ubaldo, see Guidobaldo I., Duke of Urbino

Montefeltro, Violante di, Lady of Cesena, i, 48, 58 note, 290


— assumed rights of, i, 76

Montefiascone, iii, 5

Montefiore, i, 423
— counts of, i, 51 note
— siege of, i, 140

Monte Giordano, ii, 21

Monte l'Abbate, iii, 265

Montelocco, i, 77

Monte Luce, nuns of, ii, 230

Monteluro, battle of, i, 82

Monte Mario, iii, 21

Monte Nerone, i, 160

Monterosi, iii, 34

Monte Rotondo, iii, 21


Monte Sansovino, siege of, i, 244, 246, 247

Montevarchi, iii, 9

Montevecchio, Count of, i, 404

Montferrat, Marquis of, i, 260

Monti, Pietro, ii, 71

Montjoy, Lord, i, 224

Montoni, the, i, 333

Montorio, Count of, iii, 109

Montpellier, ii, 234

Montpensier, i, 355
— Gilbert, Count de, ii, 449

Montucla, on Comandino, iii, 262

Monzoni, ii, 123

Morat, i, 337

Morata, Olympia, iii, 125

Morea, the, i, 194

Moresca, the, ii, 49

Moresino, Alessandro, iii, 429

Morgarten, i, 337

You might also like