(eBook PDF) Invitation to Computer Science 8th Edition download
(eBook PDF) Invitation to Computer Science 8th Edition download
https://ebookluna.com/product/ebook-pdf-invitation-to-computer-
science-8th-edition/
https://ebookluna.com/product/ebook-pdf-invitation-to-computer-
science-8th-edition/
ebookluna.com
https://ebookluna.com/download/invitation-to-computer-science-ebook-
pdf/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-invitation-to-computer-
science-7th-edition/
ebookluna.com
https://ebookluna.com/product/invitation-to-computer-science-7th-
edition-ebook-pdf/
ebookluna.com
(eBook PDF) Prego! An Invitation to Italian 8th Edition
https://ebookluna.com/product/ebook-pdf-prego-an-invitation-to-
italian-8th-edition/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-introduction-to-computer-
science-by-perry-donham/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-computer-science-
illuminated-6th-edition/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-computer-science-
illuminated-7th-edition/
ebookluna.com
LEVEL 5 Applications 636
Chapter 13 Simulation and
Modeling 638
Chapter 14 Ecommerce, Databases,
and Data Science 670
Chapter 15 Artificial Intelligence 712
Chapter 16 Computer Graphics and
Entertainment: Movies,
Games, and Virtual
Communities 758
Online Chapters
This text includes five language-specific online-only downloadable
chapters on Ada, C++, C#, Java, and Python, available on the com-
panion site for this text (www.cengage.com) and in MindTap.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202 vii
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii Contents
Practice Problems 51
Special Interest Box: From Little Primitives Mighty
Algorithms Grow 60
2.3 Examples of Algorithmic Problem Solving 60
2.3.1 Example 1: Go Forth and Multiply 60
Practice Problems 61
Practice Problems 64
2.3.2 Example 2: Looking, Looking,
Looking 65
Laboratory Experience 2 70
2.3.3 Example 3: Big, Bigger, Biggest 70
Practice Problems 76
Laboratory Experience 3 76
2.3.4 Example 4: Meeting Your Match 77
Special Interest Box: Hidden Figures 84
2.4 Conclusion 84
Practice Problems 85
EXERCISES 86
CHALLENGE WORK 89
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents xiii
Online Chapters
This text includes five language-specific online-only downloadable
chapters on Ada, C++, C#, Java, and Python, available on the com-
panion site for this text (www.cengage.com) and in MindTap.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv Contents
Practice Problems 600
12.4 A Model of an Algorithm 602
12.5 Turing Machine Examples 604
12.5.1 A Bit Inverter 605
Practice Problems 607
12.5.2 A Parity Bit Machine 607
12.5.3 Machines for Unary Incrementing 610
Practice Problem 610
12.5.4 A Unary Addition Machine 614
Practice Problems 616
Laboratory Experience 16 616
12.6 The Church–Turing Thesis 617
Special Interest Box: The Turing Award 618
12.7 Unsolvable Problems 621
Special Interest Box: Couldn’t Do, Can’t Do, Never
Will Be Able to . . . 626
Practice Problems 626
Laboratory Experience 17 627
12.8 Conclusion 627
12.9 Summary of Level 4 628
EXERCISES 629
CHALLENGE WORK 633
LEVEL 5 Applications 636
Chapter 13 Simulation and Modeling 638
Introduction 638
13.1
Computational Modeling 639
13.2
Introduction
13.2.1 to Systems and Models 639
Computational
13.2.2 Models, Accuracy,
and Errors 642
13.2.3 An Example of Model Building 644
Practice Problems 653
Laboratory Experience 18 654
13.3 Running the Model and Visualizing Results 654
13.4 Conclusion 664
Special Interest Box: The Mother of All
Computations! 664
EXERCISES 665
CHALLENGE WORK 667
Decisions, Decisions 673
14.2.1
Anatomy of a Transaction 675
14.2.2
Special Interest Box: A Rose by Any Other Name. . . 677
14.2.3 Designing Your Website 680
Special Interest Box: Less Is More 682
14.2.4 Behind the Scenes 682
Practice Problems 683
14.2.5 Other Ecommerce Models 683
14.2.6 Electronic Payment Systems 685
Special Interest Box: Blockchain: A New Revolution? 687
14.3 Databases 688
14.3.1 Data Organization 688
14.3.2 Database Management Systems 690
14.3.3 Other Considerations 696
Special Interest Box: SQL, NoSQL, NewSQL 697
Practice Problems 698
Laboratory Experience 19 699
14.4 Data Science 699
14.4.1 Tools 700
Special Interest Box: Algorithm Bias 703
Practice Problem 704
14.4.2 Personal Privacy 704
Special Interest Box: What Your Smartphone
Photo Knows 705
14.4.3 For the Greater Good 706
14.5 Conclusion 707
EXERCISES 708
CHALLENGE WORK 711
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents xvii
Practice Problems 739
15.5.5 The Games We Play 739
15.6 Robots and Drones 744
15.6.1 Robots 744
Special Interest Box: Wait—Where Am I? 746
15.6.2 Drones 749
15.7 Conclusion 751
EXERCISES 752
CHALLENGE WORK 754
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xviii Contents
17.2.2 Case
2: Legalized Snooping—Privacy vs.
Security 801
Special Interest Box: Hero or Traitor? 803
Practice Problems 809
Case 3: Hackers—Public Enemies
17.2.3
or Gadflies? 809
Practice Problems 815
17.2.4 Case 4: Genetic Information
and Medical Research 815
Special Interest Box: Professional Codes of Conduct 821
17.3 Personal Privacy and Social Media 822
Practice Problems 826
17.4 Fake News, Politics, and Social Media 827
17.5 Conclusion 830
17.6 Summary of Level 6 830
EXERCISES 831
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface to the Eighth
Edition
Overview
This text is intended for a one-semester introductory course in computer
science. It presents a broad-based overview of the discipline that assumes
no prior background in computer science, programming, or mathematics. It
would be appropriate for a college or university service course for students
not majoring in computer science, as well as for schools that implement
their first course for majors using a breadth-first approach that surveys the
fundamental aspects of computer science. It would be highly suitable for
a high school computer science course, especially the AP Computer Sci-
ence Principles course created by the College Board in cooperation with
the National Science Foundation and colleges and universities around the
United States.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202 xix
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xx Preface to the Eighth Edition
productivity software. They have been using word processors and search
engines since elementary school and are familiar with social media, online
retailing, and email; many have designed webpages and even manage their
own websites and blogs. In today’s world, a course that focuses on comput-
ing applications would be of little or no interest.
But a more important reason for rethinking the structure of the CS 0
service course, and the primary reason why we authored this book, is the
following observation:
Most computer science service courses do not teach students the foun-
dations and fundamental concepts of computer science!
We believe that students in a computer science service course should receive
a solid grounding in the fundamental concepts of the discipline, just as
introductory courses in biology, physics, and geology present the central
concepts of their fields. Topics in a breadth-first computer science service
course would not be limited to “fun” applications such as webpage creation,
blogging, game design, and interactive graphics, but would also cover foun-
dational issues such as algorithms, abstraction, hardware, computer organi-
zation, system software, language models, and the social and ethical issues
of computing. An introduction to these core ideas exposes students to the
overall richness and beauty of the field and allows them not only to use
computers and software effectively, but also to understand and appreciate
the basic ideas underlying the discipline of computer science and the cre-
ation of computational artifacts. As a side benefit, students who complete
such a course will have a much better idea of what a major or a minor in
computer science will entail.
This last point was the primary reason for the development of the AP
Computer Science Principles high school course, which is quite similar to
the breadth-first overview model just described. By learning about the field
in its entirety, rather than seeing only the small slice of it called “program-
ming,” high school students will be in a better position to decide if computer
science is a subject they wish to study when they begin college.
A Hierarchy of Abstractions
The central theme of this book is that computer science is the study of
algorithms. Our hierarchy utilizes this definition by initially looking at the
algorithmic foundations of computer science and then moving upward from
this central theme to higher-level issues such as hardware, systems, software,
applications, and ethics.
The six levels in our computer science hierarchy are:
Level 1. The Algorithmic Foundations of Computer Science
Level 2. The Hardware World
Level 3. The Virtual Machine
Level 4. The Software World
Level 5. Applications
Level 6. Social Issues in Computing
Level 1
Following an introductory chapter, Level 1 (Chapters 2–3) introduces “The
Algorithmic Foundations of Computer Science,” the bedrock on which all
other aspects of the discipline are built. It presents fundamental ideas such as
the design of algorithms, algorithmic problem solving, abstraction, pseudo-
code, and iteration and illustrates these ideas using well-known examples. It
also introduces the concepts of algorithm efficiency and asymptotic growth
and demonstrates that not all algorithms are, at least in terms of running
time, created equal.
The discussions in Level 1 assume that our algorithms are executed by
something called a “computing agent,” an abstract concept for any entity
that can carry out the instructions in our solution.
Level 2
However, in Level 2 (Chapters 4–5), “The Hardware World,” we want our
algorithms to be executed by “real” computers to produce “real” results.
Thus begins our discussion of hardware, logic design, and computer orga-
nization. The initial discussion introduces the basic building blocks of com-
puter systems—binary numbers, Boolean logic, gates, and circuits. It then
shows how these elementary concepts can be combined to construct a real
computer using the Von Neumann architecture, composed of processors,
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xxii Preface to the Eighth Edition
Level 3
This complexity is the motivation for the material contained in Level 3
(Chapters 6–8), “The Virtual Machine.” This section describes how system
software is used to create a user-friendly, user-oriented problem-solving
environment that hides many of the ugly hardware details just described.
Level 3 looks at the same problems discussed in Level 2, encoding and
executing algorithms, but shows how this can be done easily in a virtual
environment containing helpful tools like a graphical user interface, editors,
language translators, file systems, and debuggers. This section discusses the
services and responsibilities of the operating system and how it has evolved.
It investigates one of the most important virtual environments in current
use, computer networks, and shows how technologies such as Ethernet, the
Internet, and the web link together independent systems via transmission
media and communications software. This creates a virtual environment in
which we seamlessly and transparently use not only the computer on our
desk or in our hand, but also computing devices located around the world.
This transparency has progressed to the point where we can now use sys-
tems located “in the cloud” without regard for where they are, how they
provide their services, and even whether they exist as real physical entities.
Level 3 concludes with a look at one of the most important services provided
by a virtual machine, namely information security, and describes algorithms
for protecting the user and the system from accidental or malicious damage.
Level 4
Once we have created this powerful user-oriented virtual environment, what
do we want to do with it? Most likely we want to write programs to solve
interesting problems. This is the motivation for Level 4 (Chapters 9–12), “The
Software World.” Although this book should not be viewed as a program-
ming text, it contains an overview of the features found in modern procedural
programming languages. This gives students an appreciation for the inter-
esting and challenging task of the computer programmer and the power of
the problem-solving environment created by a modern high-level language.
(More detailed introductions to five important high-level programming lan-
guages are available via online, downloadable chapters accessible through
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface to the Eighth Edition xxiii
Level 5
We now have a high-level programming environment in which it is possible
to write programs to solve important problems. In Level 5 (Chapters 13–16),
“Applications,” we take a look at some important uses of computers. There is
no way to cover more than a fraction of the many applications of computers
and information technology in a single section. We have included applica-
tions drawn from the sciences and engineering (simulation and modeling),
business and finance (ecommerce, databases, data science), the social sci-
ences (artificial intelligence), and everyday life (computer-generated imag-
ery, video gaming, virtual communities). Our goal is to show students that
these applications are not “magic boxes” whose inner workings are totally
unfathomable. Rather, they are the direct result of building upon the core
concepts of computer science presented in the previous chapters.
Level 6
Finally, we reach the highest level of study, Level 6 (Chapter 17), “Social
Issues in Computing,” which addresses the social, ethical, moral, and legal
issues raised by pervasive computer technology. This section, based on con-
tributions by Professor Bo Brinkman of Miami University, examines issues
such as the theft of intellectual property, national security concerns, the
erosion of personal privacy, and the political impact of the proliferation of
fake news distributed using social media. This chapter does not attempt to
provide easy solutions to these many-faceted problems. Instead, it focuses
on techniques that students can use to think about ethical issues and reach
their own conclusions. Our goal in this final section is to make students
aware of the enormous impact that information technology is having on our
society and to give them tools for making informed decisions.
This, then, is the hierarchical structure of our text. It begins with the
algorithmic foundations of the discipline and works its way from lower-
level hardware concepts through virtual machine environments, high-level
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-202
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Other documents randomly have
different content
The Project Gutenberg eBook of The Oyster:
Where, How and When to Find, Breed, Cook
and Eat It
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
Title: The Oyster: Where, How and When to Find, Breed, Cook
and Eat It
Language: English
LONDON:
TRÜBNER & CO., 60, PATERNOSTER ROW.
MDCCCLXI.
LONDON:
WILLIAM STEVENS, PRINTER, 37, BELL YARD,
TEMPLE BAR.
CONTENTS.
CHAPTER I.
CHAPTER II.
CHAPTER III.
CHAPTER IV.
CHAPTER V.
CHAPTER VI.
CHAPTER VII.
CHAPTER VIII.
CHAPTER IX.
CHAPTER X.
sings John Keats. Oh, if he had been but an oyster-eater, that article
from the "Quarterly," savage and slaughterly, would not have killed
him; but it is also very sweet to gaze upon a turkey, a leash of birds,
a brace of pheasants, and, as Mrs. Tibbetts hath it, "a real country
hare." Such a present is promptly repaid by a fine cod packed in ice,
and two barrels of oysters. How sweet are these when eaten at a
country home, and opened by yourselves, the barrel being paraded
on the table with its top knocked out, and with the whitest of
napkins round it, as we shall presently have occasion to show. How
sweet it is, too, to open some of the dear natives for your pretty
cousin, and to see her open her sweet little mouth about as wide as
Lesbia's sparrow did for his lump of—not sugar, it was not then
invented—but lump of honey! How sweet it is, after the young lady
has swallowed her half dozen, to help yourself! The oyster never
tastes sweeter than when thus operated on by yourself, so that you
do not "job" the knife into your hand! True labour has a dignity
about it. The only time when I, who have seen most people, from
Tom Thumb to the Benicia Boy, from Madame Doche to the Empress
Eugenie, and from manly, sea-going Prince Alfred to the Staleybridge
Infant and Jemmy Shaw's "Spider"—the only time, I say, that I have
ever seen a nobleman look like a nobleman, was when a noble duke,
a peer not only of England and Scotland, but of la belle France also,
owned that he could do two things better than most people, and
that was, open oysters and polish his own boots. I, like Othello,
when he upbraided Iago for the last time, "looked down to his feet,"
but found that it was no fable.
So important is our illustrious bivalve as an article of trade, that it
is protected by law. It is said that the only two things that George
the Fourth ever did—the great Georgius, whom Mr. Thackeray envies
and satirises—were to invent a shoe-buckle and an exquisite hair-
dye. The brains of the black Brunswicker could do no more. But
there is one act also—an Act of Parliament[3]—which was passed in
his reign, for which he is to be thanked. The man who was at once
the Lucullus and Apicius of his times must have had some hand in
the framing of that Act.
CHAPTER II.
The Ancients; Oysters a Greek and Roman Luxury; Sergius Orata and the
Oyster-beds of Baia; Immense Consumption at Rome; Failure of the Circean and
Lucrinian Oyster-beds under Domitian, and Introduction of Rutupians from Britain;
Agricola, Constantine, and Helena; Athenian Oysters and Aristides.
H orace, Martial, and Juvenal, Cicero and Seneca, Pliny, Ætius, and
the old Greek doctor Oribasius, whom Julian the Apostate
delighted to honour, and other men of taste amongst the ancients,
have enlarged upon the various qualities of the oyster; and was it
not to Sergius Orata that we owe our present oyster-beds; for he it
was who introduced layers or stews for oysters at Baia, the Brighton
of ancient Rome, as we have them at present. That was in the days
when luxury was rampant, and when men of great wealth, like
Licinius Crassus, the leviathan slave merchant, rose to the highest
honours; for this dealer in human flesh in the boasted land of liberty,
served the office of consul along with Pompey the Great, and on one
occasion required no less than 10,000 tables to accommodate all his
guests. How many barrels of oysters were eaten at that celebrated
dinner, the "Ephemerides"—as Plutarch calls "The Times" and
"Morning Post" of that day—have omitted to state; but as oysters
then took the place that turtle-soup now does at our great City
feeds, imagination may busy itself if it likes with the calculation. All
we know is, that oysters then fetched very long prices at Rome, as
the author of the "Tabella Cibaria" has not failed to tell us; and then,
as now, the high price of any luxury of the table was sure to make a
liberal supply of it necessary, when a man like Crassus entertained
half the city as his guests, to rivet his popularity.
But the Romans had a weakness for the "breedy creatures," as our
dear old friend Christopher North calls them in his inimitable
"Noctes." In the time of Nero, some sixty years later, the
consumption of oysters in the "Imperial City" was nearly as great as
it now is in the "World's Metropolis;" and there is a statement, which
I recollect to have read somewhere, that during the reign of
Domitian, the last of the twelve Cæsars, a greater number of millions
of bushels were annually consumed at Rome than I should care to
swear to. These oysters, however, were but Mediterranean produce
—the small fry of Circe, and the smaller Lucrinians; and this
unreasonable demand upon them quite exhausted the beds in that
great fly-catcher's reign; and it was not till under the wise
administration of Agricola in Britain, when the Romans got their far-
famed Rutupians from the shores of Kent, from Richborough and the
Reculvers—the Rutupi Portus of the "Itinerary," of which the latter,
the Regulbium, near Whitstable, in the mouth of the Thames, was
the northern boundary—that Juvenal praised them as he does; and
he was right: for in the whole world there are no oysters like them;
and of all the "breedy creatures" that glide, or have ever glided down
the throats of the human race, our "Natives" are probably the most
delectable. Can we wonder, then, when Macrobius tells us that the
Roman pontiffs in the fourth century never failed to have these
Rutupians at table, particularly, feeling sure that Constantine the
Great, and his mother, the pious Helena, must have carried their
British tastes with them to Rome at that period.
The Greeks have not said much in praise of oysters; but then they
knew nothing of Britain beyond its name, and looked upon it very
much in the same light as we now regard the regions of the
Esquimaux; and as to the little dabs of watery pulps found in the
Mediterranean, what are they but oysters in name? Indeed, the best
use the Athenians could make of them was to use their shells to
ostracise any good citizen who, like Aristides, was too virtuous for a
"Greek." However, on the plea that oysters are oysters, we presume
—for it could not be on account of their flavour—"oysters," says the
author of the "Tabella Cibaria," "were held in great esteem by the
Athenians." No doubt when Constantine moved the seat of the
Empire from Rome to Constantinople, he did not forget to have his
Rutupians regularly forwarded; so, perhaps, after all it was our
"Natives," which thus found their way into Greece, that they
delighted in; and if so, the good taste of the Athenians need not be
called into question; but, as in literature and the arts, in oyster-
eating too, it deserves to be held up to commendation.
CHAPTER III.
Fall of the Rutupian Supremacy; Louis IV. and William of Normandy; Conquest
of England, and Revival of Oyster-eating in England; The Oyster under Legal
Protection; American Oysters.
W ith the fall of the Empire came also the fall of the Rutupian
supremacy; and even the Roman Britons, driven into Brittany
and the mountains of Wales by their truculent Saxon persecutors,
had to forego these luxuries of the table, unless, perhaps, Prince
Arthur and his knights may now and then have opened a bushel
when they were seated over their wine in that free and easy circle,
which has become so celebrated as to have formed a literature of its
own. From the fourth century, to which Macrobius brought us, to the
reign of Louis IV. of France, the history of the oyster is a blank; but
that king revived the taste for our favourite, and during his captivity
in Normandy brought it again into request with his conqueror, Duke
William; so, when the Normans invaded England under William the
Conqueror—the descendant of that Duke William, little more than a
century later—they were not long in finding out how much Kentish
and Essex oysters were preferable to those of France.
Since then the Oyster has held its own against all comers, as one
of the most welcome accessories to the table of rich and poor, and
has been protected in his rights and immunities by various Acts of
Parliament. "In the month of May oysters cast their spawn," says an
old writer in the "Transactions of the Royal Society," "which the