Chapter 7: Refining Your Writing: How Do I Improve My Writing Technique?

7.1 Sentence Variety

Learning Objectives

  1. Identify ways to vary sentence structure.
  2. Write and revise sentence structure at the beginning of sentences.
  3. Write and revise sentence structure by connecting ideas.

Have you ever ordered a dish in a restaurant and been not happy with its taste, even though it contained most of your favorite ingredients? Just as a meal might lack the finishing touches needed to spice it up, so too might a paragraph contain all the basic components but still lack the stylistic finesse required to engage a reader. Sometimes writers have a tendency to reuse the same sentence pattern throughout their writing. Like any repetitive task, reading text that contains too many sentences with the same length and structure can become monotonous and boring. Experienced writers mix it up by using an assortment of sentence patterns, rhythms, and lengths.

In this chapter, you will follow a student named Naomi who has written a draft of an essay but needs to refine her writing. This section discusses how to introduce sentence variety into writing, how to open sentences using a variety of techniques, and how to use different types of sentence structure when connecting ideas. You can use these techniques when revising a paper to bring life and rhythm to your work. They will also make reading your work more enjoyable.

Incorporating Sentence Variety

Experienced writers incorporate sentence varietyUse of an assortment of sentence patterns, rhythms, and lengths to reduce repetition and emphasize important points in a text. into their writing by varying sentence style and structure. Using a mixture of different sentence structures reduces repetition and adds emphasis to important points in the text. Read the following example:

During my time in office I have achieved several goals. I have helped increase funding for local schools. I have reduced crime rates in the neighborhood. I have encouraged young people to get involved in their community. My competitor argues that she is the better choice in the upcoming election. I argue that it is ridiculous to fix something that isn’t broken. If you reelect me this year, I promise to continue to serve this community.

In this extract from an election campaign, the writer uses short, simple sentences of a similar length and style. Writers often mistakenly believe that this technique makes the text more clear for the reader, but the result is a choppy, unsophisticated paragraph that does not grab the audience’s attention. Now read the revised paragraph with sentence variety:

During my time in office, I have helped increase funding for local schools, reduced crime rates in the neighborhood, and encouraged young people to get involved in their community. Why fix what isn’t broken? If you reelect me this year, I will continue to achieve great things for this community. Don’t take a chance on an unknown contender; vote for the proven success.

Notice how introducing a short rhetorical question among the longer sentences in the paragraph is an effective means of keeping the reader’s attention. In the revised version, the writer combines the choppy sentences at the beginning into one longer sentence, which adds rhythm and interest to the paragraph.

Tip

Effective writers often implement the “rule of three,” which is basically the thought that things that contain three elements are more memorable and more satisfying to readers than any other number. Try to use a series of three when providing examples, grouping adjectives, or generating a list.

Exercise 1

Combine each set of simple sentences into a compound or a complex sentence. Write the combined sentence on your own sheet of paper.

  1. Heroin is an extremely addictive drug. Thousands of heroin addicts die each year.
  2. Shakespeare’s writing is still relevant today. He wrote about timeless themes. These themes include love, hate, jealousy, death, and destiny.
  3. Gay marriage is now legal in six states. Iowa, Massachusetts, Connecticut, Vermont, New Hampshire, and Maine all permit same-sex marriage. Other states are likely to follow their example.
  4. Prewriting is a vital stage of the writing process. Prewriting helps you organize your ideas. Types of prewriting include outlining, brainstorming, and idea mapping.
  5. Mitch Bancroft is a famous writer. He also serves as a governor on the local school board. Mitch’s two children attend the school.

Collaboration

Please share with a classmate and compare your answers.

Using Sentence Variety at the Beginning of Sentences

Read the following sentences and consider what they all have in common:

John and Amanda will be analyzing this week’s financial report.

The car screeched to a halt just a few inches away from the young boy.

Students rarely come to the exam adequately prepared.

If you are having trouble figuring out why these sentences are similar, try underlining the subject in each. You will notice that the subject is positioned at the beginning of each sentence—John and Amanda, the car, students. Since the subject-verb-object pattern is the simplest sentence structure, many writers tend to overuse this technique, which can result in repetitive paragraphs with little sentence variety.

Naomi wrote an essay about the 2008 government bailout. Read this excerpt from Naomi’s essay:

This section examines several ways to introduce sentence variety at the beginning of sentences, using Naomi’s essay as an example.

Starting a Sentence with an Adverb

One technique you can use so as to avoid beginning a sentence with the subject is to use an adverb. An adverbA word that describes a verb, adjective, or other adverb and often ends in -ly. is a word that describes a verb, adjective, or other adverb and often ends in –ly. Examples of adverbs include quickly, softly, quietly, angrily, and timidly. Read the following sentences:

She slowly turned the corner and peered into the murky basement.

Slowly, she turned the corner and peered into the murky basement.

In the second sentence, the adverb slowly is placed at the beginning of the sentence. If you read the two sentences aloud, you will notice that moving the adverb changes the rhythm of the sentence and slightly alters its meaning. The second sentence emphasizes how the subject moves—slowly—creating a buildup of tension. This technique is effective in fictional writing.

Note that an adverb used at the beginning of a sentence is usually followed by a comma. A comma indicates that the reader should pause briefly, which creates a useful rhetorical device. Read the following sentences aloud and consider the effect of pausing after the adverb:

Cautiously, he unlocked the kennel and waited for the dog’s reaction.

Solemnly, the policeman approached the mayor and placed him under arrest.

Suddenly, he slammed the door shut and sprinted across the street.

In an academic essay, moving an adverb to the beginning of a sentence serves to vary the rhythm of a paragraph and increase sentence variety.

Naomi has used two adverbs in her essay that could be moved to the beginning of their respective sentences. Notice how the following revised version creates a more varied paragraph:

Tip

Adverbs of time—adverbs that indicate when an action takes place—do not always require a comma when used at the beginning of a sentence. Adverbs of time include words such as yesterday, today, later, sometimes, often, and now.

Exercise 2

On your own sheet of paper, rewrite the following sentences by moving the adverbs to the beginning.

  1. The red truck sped furiously past the camper van, blaring its horn.
  2. Jeff snatched at the bread hungrily, polishing off three slices in under a minute.
  3. Underage drinking typically results from peer pressure and lack of parental attention.
  4. The firefighters bravely tackled the blaze, but they were beaten back by flames.
  5. Mayor Johnson privately acknowledged that the budget was excessive and that further discussion was needed.

Collaboration

Please share with a classmate and compare your answers.

Starting a Sentence with a Prepositional Phrase

A prepositional phraseA group of words that begins with a preposition. is a group of words that behaves as an adjective or an adverb, modifying a noun or a verb. Prepositional phrases contain a prepositionA word that connects a noun, pronoun, or verb to another word that describes or modifies it. Common prepositions include in, on, under, near, by, with, and about. (a word that specifies place, direction, or time) and an object of the prepositionA noun phrase or pronoun that follows a preposition and completes its meaning. (a noun phrase or pronoun that follows the preposition).

Table 7.1 Common Prepositions

above beneath into till
across beside like toward
against between near under
after beyond off underneath
among by on until
around despite over up
at except past with
before for since without
behind from through
below inside throughout

Read the following sentence:

The terrified child hid underneath the table.

In this sentence, the prepositional phrase is underneath the table. The preposition underneath relates to the object that follows the preposition—the table. Adjectives may be placed between the preposition and the object in a prepositional phrase.

The terrified child hid underneath the heavy wooden table.

Some prepositional phrases can be moved to the beginning of a sentence in order to create variety in a piece of writing. Look at the following revised sentence:

Underneath the heavy wooden table, the terrified child hid.

Notice that when the prepositional phrase is moved to the beginning of the sentence, the emphasis shifts from the subject—the terrified child—to the location in which the child is hiding. Words that are placed at the beginning or end of a sentence generally receive the greatest emphasis. Take a look at the following examples. The prepositional phrase is underlined in each:

The bandaged man waited in the doctor’s office.

In the doctor’s office, the bandaged man waited.

My train leaves the station at 6:45 a.m.

At 6:45 a.m., my train leaves the station.

Teenagers exchange drugs and money under the railway bridge.

Under the railway bridge, teenagers exchange drugs and money.

Prepositional phrases are useful in any type of writing. Take another look at Naomi’s essay on the government bailout.

Now read the revised version.

The underlined words are all prepositional phrases. Notice how they add additional information to the text and provide a sense of flow to the essay, making it less choppy and more pleasurable to read.

Unmovable Prepositional Phrases

Not all prepositional phrases can be placed at the beginning of a sentence. Read the following sentence:

I would like a chocolate sundae without whipped cream.

In this sentence, without whipped cream is the prepositional phrase. Because it describes the chocolate sundae, it cannot be moved to the beginning of the sentence. “Without whipped cream I would like a chocolate sundae” does not make as much (if any) sense. To determine whether a prepositional phrase can be moved, we must determine the meaning of the sentence.

Overuse of Prepositional Phrases

Experienced writers often include more than one prepositional phrase in a sentence; however, it is important not to overload your writing. Using too many modifiers in a paragraph may create an unintentionally comical effect as the following example shows:

The treasure lay buried under the old oak tree, behind the crumbling fifteenth-century wall, near the schoolyard, where children played merrily during their lunch hour, unaware of the riches that remained hidden beneath their feet.

A sentence is not necessarily effective just because it is long and complex. If your sentence appears cluttered with prepositional phrases, divide it into two shorter sentences. The previous sentence is far more effective when written as two simpler sentences:

The treasure lay buried under the old oak tree, behind the crumbling fifteenth-century wall. In the nearby schoolyard, children played merrily during their lunch hour, unaware of the riches that remained hidden beneath their feet.

Writing at Work

The overuse of prepositional phrases often occurs when our thoughts are jumbled and we are unsure how concepts or ideas relate to one another. If you are preparing a report or a proposal, take the time to organize your thoughts in an outline before writing a rough draft. Read the draft aloud, either to yourself or to a colleague, and identify areas that are rambling or unclear. If you notice that a particular part of your report contains several sentences over twenty words, you should double check that particular section to make certain that it is coherent and does not contain unnecessary prepositional phrases. Reading aloud sometimes helps detect unclear and wordy sentences. You can also ask a colleague to paraphrase your main points to ensure that the meaning is clear.

Starting a Sentence by Inverting Subject and Verb

As we noted earlier, most writers follow the subject-verb-object sentence structure. In an inverted sentenceA sentence that inverts the traditional subject-verb-object structure so that the verb follows the subject., the order is reversed so that the subject follows the verb. Read the following sentence pairs:

  1. A truck was parked in the driveway.
  2. Parked in the driveway was a truck.
  1. A copy of the file is attached.
  2. Attached is a copy of the file.

Notice how the second sentence in each pair places more emphasis on the subject—a truck in the first example and the file in the second. This technique is useful for drawing the reader’s attention to your primary area of focus. We can apply this method to an academic essay. Take another look at Naomi’s paragraph.

To emphasize the subject in certain sentences, Naomi can invert the traditional sentence structure. Read her revised paragraph:

Notice that in the first underlined sentence, the subject (some economists) is placed after the verb (argued). In the second underlined sentence, the subject (the government) is placed after the verb (expects).

Exercise 3

On your own sheet of paper, rewrite the following sentences as inverted sentences.

  1. Teresa will never attempt to run another marathon.
  2. A detailed job description is enclosed with this letter.
  3. Bathroom facilities are across the hall to the left of the water cooler.
  4. The well-dressed stranger stumbled through the doorway.
  5. My colleagues remain unconvinced about the proposed merger.

Collaboration

Please share with a classmate and compare your answers.

Connecting Ideas to Increase Sentence Variety

Reviewing and rewriting the beginning of sentences is a good way of introducing sentence variety into your writing. Another useful technique is to connect two sentences using a modifier, a relative clause, or an appositive. This section examines how to connect ideas across several sentences in order to increase sentence variety and improve writing.

Joining Ideas Using an –ing Modifier

Sometimes it is possible to combine two sentences by converting one of them into a modifier using the –ing verb form—singing, dancing, swimming. A modifierA word or phrase that qualifies the meaning of another element in a sentence. is a word or phrase that qualifies the meaning of another element in the sentence. Read the following example:

Original sentences: Steve checked the computer system. He discovered a virus.

Revised sentence: Checking the computer system, Steve discovered a virus.

To connect two sentences using an –ing modifier, add –ing to one of the verbs in the sentences (checking) and delete the subject (Steve). Use a comma to separate the modifier from the subject of the sentence. It is important to make sure that the main idea in your revised sentence is contained in the main clause, not in the modifier. In this example, the main idea is that Steve discovered a virus, not that he checked the computer system.

In the following example, an –ing modifier indicates that two actions are occurring at the same time:

  1. Noticing the police car, she shifted gears and slowed down.

    This means that she slowed down at the same time she noticed the police car.

  2. Barking loudly, the dog ran across the driveway.

    This means that the dog barked as it ran across the driveway.

You can add an –ing modifier to the beginning or the end of a sentence, depending on which fits best.

Beginning: Conducting a survey among her friends, Amanda found that few were happy in their jobs.

End: Maria filed the final report, meeting her deadline.

Dangling Modifiers

A common mistake when combining sentences using the –ing verb form is to misplace the modifier so that it is not logically connected to the rest of the sentence. This creates a dangling modifierA modifier that is not logically connected to the rest of the sentence.. Look at the following example:

Jogging across the parking lot, my breath grew ragged and shallow.

In this sentence, jogging across the parking lot seems to modify my breath. Since breath cannot jog, the sentence should be rewritten so that the subject is placed immediately after the modifier or added to the dangling phrase.

Jogging across the parking lot, I felt my breath grow ragged and shallow.

For more information on dangling modifiers, see Chapter 2 “Writing Basics: What Makes a Good Sentence?”.

Joining Ideas Using an –ed Modifier

Some sentences can be combined using an –ed verb form—stopped, finished, played. To use this method, one of the sentences must contain a form of be as a helping verb in addition to the –ed verb form. Take a look at the following example:

Original sentences: The Jones family was delayed by a traffic jam. They arrived several hours after the party started.

Revised sentence: Delayed by a traffic jam, the Jones family arrived several hours after the party started.

In the original version, was acts as a helping verbA verb that is used with a main verb to describe mood or tense. The helping verb is usually a form of be, do, or have.—it has no meaning by itself, but it serves a grammatical function by placing the main verb (delayed) in the perfect tense.

To connect two sentences using an –ed modifier, drop the helping verb (was) and the subject (the Jones family) from the sentence with an –ed verb form. This forms a modifying phrase (delayed by a traffic jam) that can be added to the beginning or end of the other sentence according to which fits best. As with the –ing modifier, be careful to place the word that the phrase modifies immediately after the phrase in order to avoid a dangling modifier.

Using –ing or –ed modifiers can help streamline your writing by drawing obvious connections between two sentences. Take a look at how Naomi might use modifiers in her paragraph.

The revised version of the essay uses the –ing modifier opting to draw a connection between the government’s decision to bail out the banks and the result of that decision—the acquisition of the mortgage-backed securities.

Joining Ideas Using a Relative Clause

Another technique that writers use to combine sentences is to join them using a relative clause. A relative clauseA group of words that contains a subject and a verb and describes a noun. A relative clause functions as an adjective in a sentence. is a group of words that contains a subject and a verb and describes a noun. Relative clauses function as adjectives by answering questions such as which one? or what kind? Relative clauses begin with a relative pronoun, such as who, which, where, why, or when. Read the following examples:

Original sentences: The managing director is visiting the company next week. He lives in Seattle.

Revised sentence: The managing director, who lives in Seattle, is visiting the company next week.

To connect two sentences using a relative clause, substitute the subject of one of the sentences (he) for a relative pronoun (who). This gives you a relative clause (who lives in Seattle) that can be placed next to the noun it describes (the managing director). Make sure to keep the sentence you want to emphasize as the main clause. For example, reversing the main clause and subordinate clause in the preceding sentence emphasizes where the managing director lives, not the fact that he is visiting the company.

Revised sentence: The managing director, who is visiting the company next week, lives in Seattle.

Relative clauses are a useful way of providing additional, nonessential information in a sentence. Take a look at how Naomi might incorporate relative clauses into her essay.

Notice how the underlined relative clauses can be removed from Naomi’s essay without changing the meaning of the sentence.

Tip

To check the punctuation of relative clauses, assess whether or not the clause can be taken out of the sentence without changing its meaning. If the relative clause is not essential to the meaning of the sentence, it should be placed in commas. If the relative clause is essential to the meaning of the sentence, it does not require commas around it.

Joining Ideas Using an Appositive

An appositiveA word or group of words that describes or renames a noun or pronoun. is a word or group of words that describes or renames a noun or pronoun. Incorporating appositives into your writing is a useful way of combining sentences that are too short and choppy. Take a look at the following example:

Original sentences: Harland Sanders began serving food for hungry travelers in 1930. He is Colonel Sanders or “the Colonel.”

Revised sentence: Harland Sanders, “the Colonel,” began serving food for hungry travelers in 1930.

In the revised sentence, “the Colonel” is an appositive because it renames Harland Sanders. To combine two sentences using an appositive, drop the subject and verb from the sentence that renames the noun and turn it into a phrase. Note that in the previous example, the appositive is positioned immediately after the noun it describes. An appositive may be placed anywhere in a sentence, but it must come directly before or after the noun to which it refers:

Appositive after noun: Scott, a poorly trained athlete, was not expected to win the race.

Appositive before noun: A poorly trained athlete, Scott was not expected to win the race.

Unlike relative clauses, appositives are always punctuated by a comma or a set commas. Take a look at the way Naomi uses appositives to include additional facts in her essay.

Exercise 4

On your own sheet of paper, rewrite the following sentence pairs as one sentence using the techniques you have learned in this section.

  1. Baby sharks are called pups. Pups can be born in one of three ways.
  2. The Pacific Ocean is the world’s largest ocean. It extends from the Arctic in the north to the Southern Ocean in the south.
  3. Michael Phelps won eight gold medals in the 2008 Olympics. He is a champion swimmer.
  4. Ashley introduced her colleague Dan to her husband, Jim. She speculated that the two of them would have a lot in common.
  5. Cacao is harvested by hand. It is then sold to chocolate-processing companies at the Coffee, Sugar, and Cocoa Exchange.

Collaboration

Please share with a classmate and compare your answers.

Writing at Work

In addition to varying sentence structure, consider varying the types of sentences you are using in a report or other workplace document. Most sentences are declarative, but a carefully placed question, exclamation, or command can pique colleagues’ interest, even if the subject material is fairly dry. Imagine that you are writing a budget analysis. Beginning your report with a rhetorical question, such as “Where is our money going?” or “How can we increase sales?” encourages people to continue reading to find out the answers. Although they should be used sparingly in academic and professional writing, questions or commands are effective rhetorical devices.

Key Takeaways

  • Sentence variety reduces repetition in a piece of writing and adds emphasis to important points in the text.
  • Sentence variety can be introduced to the beginning of sentences by starting a sentence with an adverb, starting a sentence with a prepositional phrase, or by inverting the subject and verb.
  • Combine ideas, using modifiers, relative clauses, or appositives, to achieve sentence variety.

7.2 Coordination and Subordination

Learning Objectives

  1. Identify coordination and subordination in writing.
  2. Combine sentences and ideas using coordination.
  3. Combine sentences and ideas using subordination.

In the previous section, we learned how to use different patterns to create sentence variety and to add emphasis to important points in our writing. Next, we will examine two ways in which we can join sentences with related ideas:

  • CoordinationIt joins two related ideas of equal importance.. Joining two related ideas of equal importance.
  • SubordinationIt joins two related ideas of unequal importance.. Joining two related ideas of unequal importance.

Connecting sentences with coordinate or subordinate clauses creates more coherent paragraphs, and in turn, produces more effective writing. In this section, you will read excerpts from Naomi’s classmate named Joshua, who drafted an essay about wine production. Read this excerpt from Joshua’s essay.

This section examines several ways to combine sentences with coordination and subordination, using Joshua’s essay as an example.

Coordination

Coordination joins two independent clauses that contain related ideas of equal importance.

Original sentences: I spent my entire paycheck last week. I am staying home this weekend.

In their current form, these sentences contain two separate ideas that may or may not be related. Am I staying home this week because I spent my paycheck, or is there another reason for my lack of enthusiasm to leave the house? To indicate a relationship between the two ideas, we can use the coordinating conjunction so:

Revised sentence: I spent my entire paycheck last week, so I am staying home this weekend.

The revised sentence illustrates that the two ideas are connected. Notice that the sentence retains two independent clauses (I spent my entire paycheck; I am staying home this weekend) because each can stand alone as a complete idea.

Coordinating Conjunctions

A coordinating conjunctionA linking word that joins two independent clauses. The seven common coordinating conjunctions are for, and, nor, but, or, yet, and, so. is a word that joins two independent clauses. The most common coordinating conjunctions are for, and, nor, but, or, yet, and so. Note that a comma precedes the coordinating conjunction when joining two clauses.

Independent Clause Coordinating Conjunction Independent Clause Revised Sentence
I will not be attending the dance. for (indicates a reason or cause) I have no one to go with. I will not be attending the dance, for I have no one to go with.
I plan to stay home. and (joins two ideas) I will complete an essay for class. I plan to stay home, and I will complete an essay for class.
Jessie isn’t going to be at the dance. nor (indicates a negative) Tom won’t be there either. Jessie isn’t going to be at the dance, nor will Tom be there.
The fundraisers are hoping for a record-breaking attendance. but (indicates a contrast) I don’t think many people are going. The fundraisers are hoping for a record-breaking attendance, but I don’t think many people are going.
I might go to the next fundraising event. or (offers an alternative) I might donate some money to the cause. I might go to the next fundraising event, or I might donate some money to the cause.
My parents are worried that I am antisocial. yet (indicates a reason) I have many friends at school. My parents are worried that I am antisocial, yet I have many friends at school.
Buying a new dress is expensive. so (indicates a result) By staying home I will save money. Buying a new dress is expensive, so by staying home I will save money.

Tip

To help you remember the seven coordinating conjunctions, think of the acronym FANBOYS: for, and, nor, but, or, yet, so. Remember that when you use a coordinating conjunction in a sentence, a comma should precede it.

Conjunctive Adverbs

Another method of joining two independent clauses with related and equal ideas is to use a conjunctive adverb and a semicolon (see Chapter 2 “Writing Basics: What Makes a Good Sentence?” for information on semicolon usage). A conjunctive adverbAn adverb that connects two clauses by describing the relationship between them. is a linking word that demonstrates a relationship between two clauses. Read the following sentences:

Original sentences: Bridget wants to take part in the next Olympics. She trains every day.

Since these sentences contain two equal and related ideas, they may be joined using a conjunctive adverb. Now, read the revised sentence:

Revised sentence: Bridget wants to take part in the next Olympics; therefore, she trains every day.

The revised sentence explains the relationship between Bridget’s desire to take part in the next Olympics and her daily training. Notice that the conjunctive adverb comes after a semicolon that separates the two clauses and is followed by a comma.

Review the following chart of some common conjunctive adverbs with examples of how they are used:

Function Conjunctive Adverb Example
Addition also, furthermore, moreover, besides Alicia was late for class and stuck in traffic; furthermore, her shoe heel had broken and she had forgotten her lunch.
Comparison similarly, likewise Recycling aluminum cans is beneficial to the environment; similarly, reusing plastic bags and switching off lights reduces waste.
Contrast instead, however, conversely Most people do not walk to work; instead, they drive or take the train.
Emphasis namely, certainly, indeed The Siberian tiger is a rare creature; indeed, there are fewer than five hundred left in the wild.
Cause and Effect accordingly, consequently, hence, thus I missed my train this morning; consequently, I was late for my meeting.
Time finally, next, subsequently, then Tim crossed the barrier, jumped over the wall, and pushed through the hole in the fence; finally, he made it to the station.

Take a look at Joshua’s essay on wine production and identify some areas in which he might use coordination.

Now look at Joshua’s revised essay. Did you coordinate the same sentences? You may find that your answers are different because there are usually several ways to join two independent clauses.

Exercise 1

Combine each sentence pair into a single sentence using either a coordinating conjunction or a conjunctive adverb. Then copy the combined sentence onto your own sheet of paper.

  1. Pets are not allowed in Mr. Taylor’s building. He owns several cats and a parrot.
  2. New legislation prevents drivers from sending or reading text messages while driving. Many people continue to use their phones illegally.
  3. The coroner concluded that the young man had taken a lethal concoction of drugs. By the time his relatives found him, nothing could be done.
  4. Amphibians are vertebrates that live on land and in the water. Flatworms are invertebrates that live only in water.
  5. Ashley carefully fed and watered her tomato plants all summer. The tomatoes grew juicy and ripe.
  6. When he lost his car key, Simon attempted to open the door with a wire hanger, a credit card, and a paper clip. He called the manufacturer for advice.

Collaboration

Please share with a classmate and compare your answers.

Writing at Work

When writing an essay or a report, it is important that you do not use excessive coordination. Workplace documents should be clear and concise, so only join two clauses that are logically connected and can work together to make one main point. If you repeat the same coordinating conjunction several times in a sentence, you are probably including more than one idea. This may make it difficult for readers to pick out the most important information in each sentence.

Subordination

Subordination joins two sentences with related ideas by merging them into a main clauseA group of words that contain a subject and a verb and can stand alone as a complete thought. (a complete sentence) and a dependent clauseA group of words that contain a subject and verb but cannot stand alone as a complete thought. (a construction that relies on the main clause to complete its meaning). Coordination allows a writer to give equal weight to the two ideas that are being combined, and subordination enables a writer to emphasize one idea over the other. Take a look at the following sentences:

Original sentences: Tracy stopped to help the injured man. She would be late for work.

To illustrate that these two ideas are related, we can rewrite them as a single sentence using the subordinating conjunction even though.

Revised sentence: Even though Tracy would be late for work, she stopped to help the injured man.

In the revised version, we now have an independent clause (she stopped to help the injured man) that stands as a complete sentence and a dependent clause (even though Tracy would be late for work) that is subordinate to the main clause. Notice that the revised sentence emphasizes the fact that Tracy stopped to help the injured man, rather than the fact she would be late for work. We could also write the sentence this way:

Revised sentence: Tracy stopped to help the injured man even though she would be late for work.

The meaning remains the same in both sentences, with the subordinating conjunction even though introducing the dependent clause.

Tip

To punctuate sentences correctly, look at the position of the main clause and the subordinate clause. If a subordinate clause precedes the main clause, use a comma. If the subordinate clause follows the main cause, no punctuation is required.

Subordinating Conjunctions

A subordinating conjunctionA word that connects a subordinate (dependent) clause to an independent (main) clause. is a word that joins a subordinate (dependent) clause to a main (independent) clause. Review the following chart of some common subordinating conjunctions and examples of how they are used:

Function Subordinating Conjunction Example
Concession although, while, though, whereas, even though Sarah completed her report even though she had to stay late to get it done.
Condition if, unless, until Until we know what is causing the problem, we will not be able to fix it.
Manner as if, as, though Everyone in the conference room stopped talking at once, as though they had been stunned into silence.
Place where, wherever Rita is in San Jose where she has several important client meetings.
Reason because, since, so that, in order that Because the air conditioning was turned up so high, everyone in the office wore sweaters.
Time after, before, while, once, when After the meeting had finished, we all went to lunch.

Take a look at the excerpt from Joshua’s essay and identify some areas in which he might use subordination.

Now look at Joshua’s revised essay and compare your answers. You will probably notice that there are many different ways to subordinate sentences.

Exercise 2

Combine each sentence pair into a single sentence using a subordinating conjunction and then copy the combined sentence onto your own sheet of paper.

  1. Jake is going to Mexico. There are beautiful beaches in Mexico.
  2. A snowstorm disrupted traffic all over the east coast. There will be long delivery delays this week.
  3. My neighbor had his television volume turned up too high. I banged on his door and asked him to keep the noise down.
  4. Jessica prepared the potato salad and the sautéed vegetables. Ashley marinated the chicken.
  5. Romeo poisons himself. Juliet awakes to find Romeo dead and stabs herself with a dagger.

Exercise 3

Copy the paragraph from Joshua’s essay onto your own sheet of paper. Then edit using the techniques you have learned in this section. Join the underlined sentences using coordination or subordination. Check your revised sentences for punctuation.

Key Takeaways

  • Coordination and subordination join two sentences with related ideas.
  • Coordination joins sentences with related and equal ideas, whereas subordination joins sentences with related but unequal ideas.
  • Sentences can be coordinated using either a coordinating conjunction and a comma or a conjunctive adverb and a semicolon.
  • Subordinate sentences are characterized by the use of a subordinate conjunction.
  • In a subordinate sentence, a comma is used to separate the main clause from the dependent clause if the dependent clause is placed at the beginning of the sentence.

7.3 Parallelism

Learning Objectives

  1. Identify sentences that are parallel and not parallel.
  2. Identify ways to create parallelism in writing.
  3. Write and revise sentences using parallelism.

Earlier in this chapter, we learned that increasing sentence variety adds interest to a piece of writing and makes the reading process more enjoyable for others. Using a mixture of sentence lengths and patterns throughout an essay is an important writing technique. However, it is equally important to avoid introducing variation within individual sentences. A strong sentence is composed of balanced parts that all have the same structure. In this section, we will examine how to create a balanced sentence structure by using parallelismUsing the same grammatical structure to express equal ideas in a sentence. Parallelism may occur at the word, phrase, or clause level..

Using Parallelism

Parallelism is the use of similar structure in related words, clauses, or phrases. It creates a sense of rhythm and balance within a sentence. As readers, we often correct faulty parallelismA failure to create grammatically parallel structures in a sentence.—a lack of parallel structure—intuitively because an unbalanced sentence sounds awkward and poorly constructed. Read the following sentences aloud:

Faulty parallelism: Kelly had to iron, do the washing, and shopping before her parents arrived.

Faulty parallelism: Driving a car requires coordination, patience, and to have good eyesight.

Faulty parallelism: Ali prefers jeans to wearing a suit.

All of these sentences contain faulty parallelism. Although they are factually correct, the construction is clunky and confusing. In the first example, three different verb forms are used. In the second and third examples, the writer begins each sentence by using a noun (coordination, jeans), but ends with a phrase (to have good eyesight, wearing a suit). Now read the same three sentences that have correct parallelism.

Correct parallelism: Kelly had to do the ironing, washing, and shopping before her parents arrived.

Correct parallelism: Driving a car requires coordination, patience, and good eyesight.

Correct parallelism: Ali prefers wearing jeans to wearing a suit.

When these sentences are written using a parallel structure, they sound more aesthetically pleasing because they are balanced. Repetition of grammatical construction also minimizes the amount of work the reader has to do to decode the sentence. This enables the reader to focus on the main idea in the sentence and not on how the sentence is put together.

Tip

A simple way to check for parallelism in your writing is to make sure you have paired nouns with nouns, verbs with verbs, prepositional phrases with prepositional phrases, and so on. Underline each element in a sentence and check that the corresponding element uses the same grammatical form.

Creating Parallelism Using Coordinating Conjunctions

When you connect two clauses using a coordinating conjunction (for, and, nor, but, or, yet, so), make sure that the same grammatical structure is used on each side of the conjunction. Take a look at the following example:

Faulty parallelism: When I walk the dog, I like to listen to music and talking to friends on the phone.

Correct parallelism: When I walk the dog, I like listening to music and talking to friends on the phone.

The first sentence uses two different verb forms (to listen, talking). In the second sentence, the grammatical construction on each side of the coordinating conjunction (and) is the same, creating a parallel sentence.

The same technique should be used for joining items or lists in a series:

Faulty parallelism: This committee needs to decide whether the company should reduce its workforce, cut its benefits, or lowering workers’ wages.

Correct parallelism: This committee needs to decide whether the company should reduce its workforce, cut its benefits, or lower workers’ wages.

The first sentence contains two items that use the same verb construction (reduce, cut) and a third item that uses a different verb form (lowering). The second sentence uses the same verb construction in all three items, creating a parallel structure.

Exercise 1

On your own sheet of paper, revise each of the following sentences to create parallel structure using coordinating conjunctions.

  1. Mr. Holloway enjoys reading and to play his guitar at weekends.
  2. The doctor told Mrs. Franklin that she should either eat less or should exercise more.
  3. Breaking out of the prison compound, the escapees moved carefully, quietly, and were quick on their feet.
  4. I have read the book, but I have not watched the movie version.
  5. Deal with a full inbox first thing in the morning, or by setting aside short periods of time in which to answer e-mail queries.

Collaboration

Please share with a classmate and compare your answers.

Creating Parallelism Using Than or As

When you are making a comparison, the two items being compared should have a parallel structure. Comparing two items without using parallel structure can lead to confusion about what is being compared. Comparisons frequently use the words than or as, and the items on each side of these comparison words should be parallel. Take a look at the following example:

Faulty parallelism: Swimming in the ocean is much tougher than a pool.

Correct parallelism: Swimming in the ocean is much tougher than swimming in a pool.

In the first sentence, the elements before the comparison word (than) are not equal to the elements after the comparison word. It appears that the writer is comparing an action (swimming) with a noun (a pool). In the second sentence, the writer uses the same grammatical construction to create a parallel structure. This clarifies that an action is being compared with another action.

To correct some instances of faulty parallelism, it may be necessary to add or delete words in a sentence.

Faulty parallelism: A brisk walk is as beneficial to your health as going for a run.

Correct parallelism: Going for a brisk walk is as beneficial to your health as going for a run.

In this example, it is necessary to add the verb phrase going for to the sentence in order to clarify that the act of walking is being compared to the act of running.

Exercise 2

On your own sheet of paper, revise each of the following sentences to create parallel structure using than or as.

  1. I would rather work at a second job to pay for a new car than a loan.
  2. How you look in the workplace is just as important as your behavior.
  3. The firefighter spoke more of his childhood than he talked about his job.
  4. Indian cuisine is far tastier than the food of Great Britain.
  5. Jim’s opponent was as tall as Jim and he carried far more weight.

Collaboration

Please share with a classmate and compare your answers.

Creating Parallelism Using Correlative Conjunctions

A correlative conjunctionA paired conjunction that connects two equal parts of a sentence and shows the relationship between them. Common correlative conjunctions include both…and, neither…nor, and either…or. is a paired conjunction that connects two equal parts of a sentence and shows the relationship between them. Common correlative conjunctions include the following:

  • either…or
  • not only…but also
  • neither…nor
  • whether…or
  • rather…than
  • both…and

Correlative conjunctions should follow the same grammatical structure to create a parallel sentence. Take a look at the following example:

Faulty parallelism: We can neither wait for something to happen nor can we take evasive action.

Correct parallelism: We can neither wait for something to happen nor take evasive action.

When using a correlative conjunction, the words, phrases, or clauses following each part should be parallel. In the first sentence, the construction of the second part of the sentence does not match the construction of the first part. In the second sentence, omitting needless words and matching verb constructions create a parallel structure. Sometimes, rearranging a sentence corrects faulty parallelism.

Faulty parallelism: It was both a long movie and poorly written.

Correct parallelism: The movie was both long and poorly written.

Tip

To see examples of parallelism in use, read some of the great historical speeches by rhetoricians such as Abraham Lincoln and Martin Luther King Jr. Notice how they use parallel structures to emphasize important points and to create a smooth, easily understandable oration.

Here is a link to text, audio, video, and the music of Martin Luther King’s speech “I Have a Dream”: http://www.mlkonline.net/dream.html.

Writing at Work

Speechwriters use parallelism not only within sentences but also throughout paragraphs and beyond. Repeating particular key phrases throughout a speech is an effective way of tying a paragraph together as a cohesive whole and creating a sense of importance. This technique can be adapted to any piece of writing, but it may be especially useful for creating a proposal or other type of persuasive workplace document.

Note that the spelling and grammar checker on most word processors will not draw attention to faulty parallelism. When proofreading a document, read it aloud and listen for sentences that sound awkward or poorly phrased.

Exercise 3

On your own sheet of paper, revise each of the following sentences to create parallel structure using correlative conjunctions.

  1. The cyclist owns both a mountain bike and has a racing bike.
  2. The movie not only contained lots of action, but also it offered an important lesson.
  3. My current job is neither exciting nor is it meaningful.
  4. Jason would rather listen to his father than be taking advice from me.
  5. We are neither interested in buying a vacuum cleaner nor do we want to utilize your carpet cleaning service.

Collaboration

Please share with a classmate and compare your answers.

Exercise 4

Read through the following excerpt from Alex’s essay and revise any instances of faulty parallelism. Rewrite the sentences to create a parallel structure.

Key Takeaways

  • Parallelism creates a sense of rhythm and balance in writing by using the same grammatical structure to express equal ideas.
  • Faulty parallelism occurs when elements of a sentence are not balanced, causing the sentence to sound clunky and awkward.
  • Parallelism may be created by connecting two clauses or making a list using coordinating conjunctions; by comparing two items using than or as; or by connecting two parts of a sentence using correlative conjunctions.

7.4 Refining Your Writing: End-of-Chapter Exercises

Learning Objectives

  1. Use the skills you have learned in the chapter.
  2. Work collaboratively with other students.
  3. Work with a variety of academic and on-the-job, real-world examples.

Exercises

  1. Children’s stories are deliberately written in short, simple sentences to avoid confusion. Most sentences are constructed using the standard subject-verb-object format. Choose a children’s story that is suitable for eight- to ten-year-olds. Rewrite a chapter of the story so that it appeals to a slightly older age group, by editing for sentence variety. Experiment with the techniques you learned in Section 7.1 “Sentence Variety”, including the three different ways to vary sentence structure at the beginning of a sentence and the three different ways to connect ideas between sentences. Compare the revised chapter with the original version and consider how sentence variety can be used to target a particular audience.

    Collaboration

    Please share with a classmate and compare your answers.

  2. Compile a selection of real-life writing samples from the workplace or around the home. You might like to choose one of the following: e-mail, junk mail, personal letter, company report, social networking page, local newspaper, bulletin-board posting, or public notice. Choose two samples that lack sentence variety. Highlight areas of each writing sample that you would edit for sentence variety and explain why. Replace any recognizable name with a pseudonym, or a fictitious name.

    Collaboration

    Please share with a classmate and compare your answers.

  3. Group activity. Choose a well-known speech, such as Martin Luther King’s “I Have a Dream” speech, Winston Churchill’s “Blood, Toil, Tears, and Sweat” speech, or Barack Obama’s inaugural address. Make a copy of the speech and, as a group, underline examples of parallelism. Discuss the effects of using parallelism and consider whether it is always used to achieve the same result or whether the writer manipulates parallelism to create a variety of responses among his or her audience.
  4. Group activity. Working in a small group, select a workplace document or academic essay. Examine each paragraph and identify examples of sentence variety, coordination and subordination, and parallelism. Then, choose one particular paragraph and discuss the following questions:

    • Does the writer use sentence variety effectively?
    • Does the writer connect his or her ideas effectively?
    • Does the writer use subordination and coordination correctly?
    • Does the writer use parallelism to emphasize his or her points?

    As a group, identify the weaker areas of the paragraph and rewrite them. Focus on sentence structure and sentence variation. Use coordinating conjunctions and subordinating conjunctions to join sentences.

  5. Choose a college essay or a recent piece of writing from your work or everyday life. Use the techniques you have learned throughout this chapter to edit your writing for sentence variety, appropriate coordination and subordination, and parallelism. When you have finished, compare the two versions and write a brief analysis of how sentence variety, coordination and subordination, and parallelism help refine a piece of writing.

    Collaboration

    Please share with a classmate and compare your answers.

Chapter 6: Writing Paragraphs: Separating Ideas and Shaping Content

6.1 Purpose, Audience, Tone, and Content

Learning Objectives

  1. Identify the four common academic purposes.
  2. Identify audience, tone, and content.
  3. Apply purpose, audience, tone, and content to a specific assignment.

Imagine reading one long block of text, with each idea blurring into the next. Even if you are reading a thrilling novel or an interesting news article, you will likely lose interest in what the author has to say very quickly. During the writing process, it is helpful to position yourself as a reader. Ask yourself whether you can focus easily on each point you make. One technique that effective writers use is to begin a fresh paragraph for each new idea they introduce.

Paragraphs separate ideas into logical, manageable chunks. One paragraph focuses on only one main idea and presents coherent sentences to support that one point. Because all the sentences in one paragraph support the same point, a paragraph may stand on its own. To create longer assignments and to discuss more than one point, writers group together paragraphs.

Three elements shape the content of each paragraph:

  1. PurposeIdentifies the reason(s) why a writer creates a document. The common academic purposes are summary, analysis, synthesis, and evaluation.. The reason the writer composes the paragraph.
  2. ToneIdentifies a writer’s attitude toward his or her subject and audience.. The attitude the writer conveys about the paragraph’s subject.
  3. AudienceIdentifies the individual(s) or group(s) whom the writer intends to address.. The individual or group whom the writer intends to address.

Figure 6.1 Purpose, Audience, Tone, and Content Triangle

The assignment’s purpose, audience, and tone dictate what the paragraph covers and how it will support one main point. This section covers how purpose, audience, and tone affect reading and writing paragraphs.

Identifying Common Academic Purposes

The purpose for a piece of writing identifies the reason you write a particular document. Basically, the purpose of a piece of writing answers the question “Why?” For example, why write a play? To entertain a packed theater. Why write instructions to the babysitter? To inform him or her of your schedule and rules. Why write a letter to your congressman? To persuade him to address your community’s needs.

In academic settings, the reasons for writing fulfill four main purposes: to summarize, to analyze, to synthesize, and to evaluate. You will encounter these four purposes not only as you read for your classes but also as you read for work or pleasure. Because reading and writing work together, your writing skills will improve as you read. To learn more about reading in the writing process, see Chapter 8 “The Writing Process: How Do I Begin?”.

Eventually, your instructors will ask you to complete assignments specifically designed to meet one of the four purposes. As you will see, the purpose for writing will guide you through each part of the paper, helping you make decisions about content and style. For now, identifying these purposes by reading paragraphs will prepare you to write individual paragraphs and to build longer assignments.

Summary Paragraphs

A summaryA purpose for writing that condenses a long piece of writing into a smaller paragraph by extracting only the vital information. Writers use their own words to create summaries. shrinks a large amount of information into only the essentials. You probably summarize events, books, and movies daily. Think about the last blockbuster movie you saw or the last novel you read. Chances are, at some point in a casual conversation with a friend, coworker, or classmate, you compressed all the action in a two-hour film or in a two-hundred-page book into a brief description of the major plot movements. While in conversation, you probably described the major highlights, or the main points in just a few sentences, using your own vocabulary and manner of speaking.

Similarly, a summary paragraph condenses a long piece of writing into a smaller paragraph by extracting only the vital information. A summary uses only the writer’s own words. Like the summary’s purpose in daily conversation, the purpose of an academic summary paragraph is to maintain all the essential information from a longer document. Although shorter than the original piece of writing, a summary should still communicate all the key points and key support. In other words, summary paragraphs should be succinct and to the point.

A summary of the report should present all the main points and supporting details in brief. Read the following summary of the report written by a student:

Notice how the summary retains the key points made by the writers of the original report but omits most of the statistical data. Summaries need not contain all the specific facts and figures in the original document; they provide only an overview of the essential information.

Analysis Paragraphs

An analysisA purpose for writing that separates the individual points in a piece of writing and studies how the points relate to one another. separates complex materials in their different parts and studies how the parts relate to one another. The analysis of simple table salt, for example, would require a deconstruction of its parts—the elements sodium (Na) and chloride (Cl). Then, scientists would study how the two elements interact to create the compound NaCl, or sodium chloride, which is also called simple table salt.

Analysis is not limited to the sciences, of course. An analysis paragraph in academic writing fulfills the same purpose. Instead of deconstructing compounds, academic analysis paragraphs typically deconstruct documents. An analysis takes apart a primary source (an essay, a book, an article, etc.) point by point. It communicates the main points of the document by examining individual points and identifying how the points relate to one another.

Take a look at a student’s analysis of the journal report.

Notice how the analysis does not simply repeat information from the original report, but considers how the points within the report relate to one another. By doing this, the student uncovers a discrepancy between the points that are backed up by statistics and those that require additional information. Analyzing a document involves a close examination of each of the individual parts and how they work together.

Synthesis Paragraphs

A synthesisA purpose for writing that considers the main points from one or more pieces of writing and links them together to create a new point. combines two or more items to create an entirely new item. Consider the electronic musical instrument aptly named the synthesizer. It looks like a simple keyboard but displays a dashboard of switches, buttons, and levers. With the flip of a few switches, a musician may combine the distinct sounds of a piano, a flute, or a guitar—or any other combination of instruments—to create a new sound. The purpose of the synthesizer is to blend together the notes from individual instruments to form new, unique notes.

The purpose of an academic synthesis is to blend individual documents into a new document. An academic synthesis paragraph considers the main points from one or more pieces of writing and links the main points together to create a new point, one not replicated in either document.

Take a look at a student’s synthesis of several sources about underage drinking.

Notice how the synthesis paragraphs consider each source and use information from each to create a new thesis. A good synthesis does not repeat information; the writer uses a variety of sources to create a new idea.

Evaluation Paragraphs

An evaluationA purpose for writing that communicates a writer’s opinion about a document or a topic and the justifications for that opinion. judges the value of something and determines its worth. Evaluations in everyday experiences are often not only dictated by set standards but also influenced by opinion and prior knowledge. For example, at work, a supervisor may complete an employee evaluation by judging his subordinate’s performance based on the company’s goals. If the company focuses on improving communication, the supervisor will rate the employee’s customer service according to a standard scale. However, the evaluation still depends on the supervisor’s opinion and prior experience with the employee. The purpose of the evaluation is to determine how well the employee performs at his or her job.

An academic evaluation communicates your opinion, and its justifications, about a document or a topic of discussion. Evaluations are influenced by your reading of the document, your prior knowledge, and your prior experience with the topic or issue. Because an evaluation incorporates your point of view and reasons for your point of view, it typically requires more critical thinking and a combination of summary, analysis, and synthesis skills. Thus evaluation paragraphs often follow summary, analysis, and synthesis paragraphs. Read a student’s evaluation paragraph.

Notice how the paragraph incorporates the student’s personal judgment within the evaluation. Evaluating a document requires prior knowledge that is often based on additional research.

Tip

When reviewing directions for assignments, look for the verbs summarize, analyze, synthesize, or evaluate. Instructors often use these words to clearly indicate the assignment’s purpose. These words will cue you on how to complete the assignment because you will know its exact purpose.

Exercise 1

Read the following paragraphs about four films and then identify the purpose of each paragraph.

  1. This film could easily have been cut down to less than two hours. By the final scene, I noticed that most of my fellow moviegoers were snoozing in their seats and were barely paying attention to what was happening on screen. Although the director sticks diligently to the book, he tries too hard to cram in all the action, which is just too ambitious for such a detail-oriented story. If you want my advice, read the book and give the movie a miss.
  2. During the opening scene, we learn that the character Laura is adopted and that she has spent the past three years desperately trying to track down her real parents. Having exhausted all the usual options—adoption agencies, online searches, family trees, and so on—she is on the verge of giving up when she meets a stranger on a bus. The chance encounter leads to a complicated chain of events that ultimately result in Laura getting her lifelong wish. But is it really what she wants? Throughout the rest of the film, Laura discovers that sometimes the past is best left where it belongs.
  3. To create the feeling of being gripped in a vice, the director, May Lee, uses a variety of elements to gradually increase the tension. The creepy, haunting melody that subtly enhances the earlier scenes becomes ever more insistent, rising to a disturbing crescendo toward the end of the movie. The desperation of the actors, combined with the claustrophobic atmosphere and tight camera angles create a realistic firestorm, from which there is little hope of escape. Walking out of the theater at the end feels like staggering out of a Roman dungeon.
  4. The scene in which Campbell and his fellow prisoners assist the guards in shutting down the riot immediately strikes the viewer as unrealistic. Based on the recent reports on prison riots in both Detroit and California, it seems highly unlikely that a posse of hardened criminals will intentionally help their captors at the risk of inciting future revenge from other inmates. Instead, both news reports and psychological studies indicate that prisoners who do not actively participate in a riot will go back to their cells and avoid conflict altogether. Examples of this lack of attention to detail occur throughout the film, making it almost unbearable to watch.

Collaboration

Share with a classmate and compare your answers.

Writing at Work

Thinking about the purpose of writing a report in the workplace can help focus and structure the document. A summary should provide colleagues with a factual overview of your findings without going into too much specific detail. In contrast, an evaluation should include your personal opinion, along with supporting evidence, research, or examples to back it up. Listen for words such as summarize, analyze, synthesize, or evaluate when your boss asks you to complete a report to help determine a purpose for writing.

Exercise 2

Consider the essay most recently assigned to you. Identify the most effective academic purpose for the assignment.

My assignment: ____________________________________________

My purpose: ____________________________________________

Identifying the Audience

Imagine you must give a presentation to a group of executives in an office. Weeks before the big day, you spend time creating and rehearsing the presentation. You must make important, careful decisions not only about the content but also about your delivery. Will the presentation require technology to project figures and charts? Should the presentation define important words, or will the executives already know the terms? Should you wear your suit and dress shirt? The answers to these questions will help you develop an appropriate relationship with your audience, making them more receptive to your message.

Now imagine you must explain the same business concepts from your presentation to a group of high school students. Those important questions you previously answered may now require different answers. The figures and charts may be too sophisticated, and the terms will certainly require definitions. You may even reconsider your outfit and sport a more casual look. Because the audience has shifted, your presentation and delivery will shift as well to create a new relationship with the new audience.

In these two situations, the audience—the individuals who will watch and listen to the presentation—plays a role in the development of presentation. As you prepare the presentation, you visualize the audience to anticipate their expectations and reactions. What you imagine affects the information you choose to present and how you will present it. Then, during the presentation, you meet the audience in person and discover immediately how well you perform.

Although the audience for writing assignments—your readers—may not appear in person, they play an equally vital role. Even in everyday writing activities, you identify your readers’ characteristics, interests, and expectations before making decisions about what you write. In fact, thinking about audience has become so common that you may not even detect the audience-driven decisions.

For example, you update your status on a social networking site with the awareness of who will digitally follow the post. If you want to brag about a good grade, you may write the post to please family members. If you want to describe a funny moment, you may write with your friends’ senses of humor in mind. Even at work, you send e-mails with an awareness of an unintended receiver who could intercept the message.

In other words, being aware of “invisible” readers is a skill you most likely already possess and one you rely on every day. Consider the following paragraphs. Which one would the author send to her parents? Which one would she send to her best friend?

Example A

Last Saturday, I volunteered at a local hospital. The visit was fun and rewarding. I even learned how to do cardiopulmonary resuscitation, or CPR. Unfortunately, I think caught a cold from one of the patients. This week, I will rest in bed and drink plenty of clear fluids. I hope I am well by next Saturday to volunteer again.

Example B

OMG! You won’t believe this! My advisor forced me to do my community service hours at this hospital all weekend! We learned CPR but we did it on dummies, not even real peeps. And some kid sneezed on me and got me sick! I was so bored and sniffling all weekend; I hope I don’t have to go back next week. I def do NOT want to miss the basketball tournament!

Most likely, you matched each paragraph to its intended audience with little hesitation. Because each paragraph reveals the author’s relationship with her intended readers, you can identify the audience fairly quickly. When writing your own paragraphs, you must engage with your audience to build an appropriate relationship given your subject. Imagining your readers during each stage of the writing process will help you make decisions about your writing. Ultimately, the people you visualize will affect what and how you write.

Tip

While giving a speech, you may articulate an inspiring or critical message, but if you left your hair a mess and laced up mismatched shoes, your audience would not take you seriously. They may be too distracted by your appearance to listen to your words.

Similarly, grammar and sentence structure serve as the appearance of a piece of writing. Polishing your work using correct grammar will impress your readers and allow them to focus on what you have to say.

Because focusing on audience will enhance your writing, your process, and your finished product, you must consider the specific traits of your audience members. Use your imagination to anticipate the readers’ demographics, education, prior knowledge, and expectations.

  • Demographics. These measure important data about a group of people, such as their age range, their ethnicity, their religious beliefs, or their gender. Certain topics and assignments will require these kinds of considerations about your audience. For other topics and assignments, these measurements may not influence your writing in the end. Regardless, it is important to consider demographics when you begin to think about your purpose for writing.
  • Education. Education considers the audience’s level of schooling. If audience members have earned a doctorate degree, for example, you may need to elevate your style and use more formal language. Or, if audience members are still in college, you could write in a more relaxed style. An audience member’s major or emphasis may also dictate your writing.
  • Prior knowledge. This refers to what the audience already knows about your topic. If your readers have studied certain topics, they may already know some terms and concepts related to the topic. You may decide whether to define terms and explain concepts based on your audience’s prior knowledge. Although you cannot peer inside the brains of your readers to discover their knowledge, you can make reasonable assumptions. For instance, a nursing major would presumably know more about health-related topics than a business major would.
  • Expectations. These indicate what readers will look for while reading your assignment. Readers may expect consistencies in the assignment’s appearance, such as correct grammar and traditional formatting like double-spaced lines and legible font. Readers may also have content-based expectations given the assignment’s purpose and organization. In an essay titled “The Economics of Enlightenment: The Effects of Rising Tuition,” for example, audience members may expect to read about the economic repercussions of college tuition costs.

Exercise 3

On your own sheet of paper, generate a list of characteristics under each category for each audience. This list will help you later when you read about tone and content.

  1. Your classmates

    • Demographics ____________________________________________
    • Education ____________________________________________
    • Prior knowledge ____________________________________________
    • Expectations ____________________________________________
  2. Your instructor

    • Demographics ____________________________________________
    • Education ____________________________________________
    • Prior knowledge ____________________________________________
    • Expectations ____________________________________________
  3. The head of your academic department

    • Demographics ____________________________________________
    • Education ____________________________________________
    • Prior knowledge ____________________________________________
    • Expectations ____________________________________________
  4. Now think about your next writing assignment. Identify the purpose (you may use the same purpose listed in Note 6.12 “Exercise 2”), and then identify the audience. Create a list of characteristics under each category.

    My assignment: ____________________________________________

    My purpose: ____________________________________________

    My audience: ____________________________________________

    • Demographics ____________________________________________
    • Education ____________________________________________
    • Prior knowledge ____________________________________________
    • Expectations ____________________________________________

Collaboration

Please share with a classmate and compare your answers.

Keep in mind that as your topic shifts in the writing process, your audience may also shift. For more information about the writing process, see Chapter 8 “The Writing Process: How Do I Begin?”.

Also, remember that decisions about style depend on audience, purpose, and content. Identifying your audience’s demographics, education, prior knowledge, and expectations will affect how you write, but purpose and content play an equally important role. The next subsection covers how to select an appropriate tone to match the audience and purpose.

Selecting an Appropriate Tone

Tone identifies a speaker’s attitude toward a subject or another person. You may pick up a person’s tone of voice fairly easily in conversation. A friend who tells you about her weekend may speak excitedly about a fun skiing trip. An instructor who means business may speak in a low, slow voice to emphasize her serious mood. Or, a coworker who needs to let off some steam after a long meeting may crack a sarcastic joke.

Just as speakers transmit emotion through voice, writers can transmit through writing a range of attitudes, from excited and humorous to somber and critical. These emotions create connections among the audience, the author, and the subject, ultimately building a relationship between the audience and the text. To stimulate these connections, writers intimate their attitudes and feelings with useful devices, such as sentence structure, word choice, punctuation, and formal or informal language. Keep in mind that the writer’s attitude should always appropriately match the audience and the purpose.

Read the following paragraph and consider the writer’s tone. How would you describe the writer’s attitude toward wildlife conservation?

Many species of plants and animals are disappearing right before our eyes. If we don’t act fast, it might be too late to save them. Human activities, including pollution, deforestation, hunting, and overpopulation, are devastating the natural environment. Without our help, many species will not survive long enough for our children to see them in the wild. Take the tiger, for example. Today, tigers occupy just 7 percent of their historical range, and many local populations are already extinct. Hunted for their beautiful pelt and other body parts, the tiger population has plummeted from one hundred thousand in 1920 to just a few thousand. Contact your local wildlife conservation society today to find out how you can stop this terrible destruction.

Exercise 4

Think about the assignment and purpose you selected in Note 6.12 “Exercise 2”, and the audience you selected in Note 6.16 “Exercise 3”. Now, identify the tone you would use in the assignment.

My assignment: ____________________________________________

My purpose: ____________________________________________

My audience: ____________________________________________

My tone: ____________________________________________

Choosing Appropriate, Interesting Content

ContentAll the written substance in a document. refers to all the written substance in a document. After selecting an audience and a purpose, you must choose what information will make it to the page. Content may consist of examples, statistics, facts, anecdotes, testimonies, and observations, but no matter the type, the information must be appropriate and interesting for the audience and purpose. An essay written for third graders that summarizes the legislative process, for example, would have to contain succinct and simple content.

Content is also shaped by tone. When the tone matches the content, the audience will be more engaged, and you will build a stronger relationship with your readers. Consider that audience of third graders. You would choose simple content that the audience will easily understand, and you would express that content through an enthusiastic tone. The same considerations apply to all audiences and purposes.

Exercise 5

Match the content in the box to the appropriate audience and purpose. On your own sheet of paper, write the correct letter next to the number.

  1. Whereas economist Holmes contends that the financial crisis is far from over, the presidential advisor Jones points out that it is vital to catch the first wave of opportunity to increase market share. We can use elements of both experts’ visions. Let me explain how.
  2. In 2000, foreign money flowed into the United States, contributing to easy credit conditions. People bought larger houses than they could afford, eventually defaulting on their loans as interest rates rose.
  3. The Emergency Economic Stabilization Act, known by most of us as the humungous government bailout, caused mixed reactions. Although supported by many political leaders, the statute provoked outrage among grassroots groups. In their opinion, the government was actually rewarding banks for their appalling behavior.
  1. Audience: An instructor

    Purpose: To analyze the reasons behind the 2007 financial crisis

    Content: ____________________________________________

  2. Audience: Classmates

    Purpose: To summarize the effects of the $700 billion government bailout

    Content: ____________________________________________

  3. Audience: An employer

    Purpose: To synthesize two articles on preparing businesses for economic recovery

    Content: ____________________________________________

Collaboration

Please share with a classmate and compare your answers.

Exercise 6

Using the assignment, purpose, audience, and tone from Note 6.18 “Exercise 4”, generate a list of content ideas. Remember that content consists of examples, statistics, facts, anecdotes, testimonies, and observations.

My assignment: ____________________________________________

My purpose: ____________________________________________

My audience: ____________________________________________

My tone: ____________________________________________

My content ideas: ____________________________________________

Key Takeaways

  • Paragraphs separate ideas into logical, manageable chunks of information.
  • The content of each paragraph and document is shaped by purpose, audience, and tone.
  • The four common academic purposes are to summarize, to analyze, to synthesize, and to evaluate.
  • Identifying the audience’s demographics, education, prior knowledge, and expectations will affect how and what you write.
  • Devices such as sentence structure, word choice, punctuation, and formal or informal language communicate tone and create a relationship between the writer and his or her audience.
  • Content may consist of examples, statistics, facts, anecdotes, testimonies, and observations. All content must be appropriate and interesting for the audience, purpose and tone.

6.2 Effective Means for Writing a Paragraph

Learning Objectives

  1. Identify characteristics of a good topic sentence.
  2. Identify the three parts of a developed paragraph.
  3. Apply knowledge of topic sentences and parts of a developed paragraph in an assignment.

Now that you have identified common purposes for writing and learned how to select appropriate content for a particular audience, you can think about the structure of a paragraph in greater detail. Composing an effective paragraph requires a method similar to building a house. You may have the finest content, or materials, but if you do not arrange them in the correct order, then the final product will not hold together very well.

A strong paragraph contains three distinct components:

  1. Topic sentenceThe sentence in a paragraph that controls the point of the paragraph. A topic sentence is most often located at the beginning of a paragraph, and it makes the structure of a text and the writer’s basic arguments easy to locate and comprehend.. The topic sentence is the main idea of the paragraph.
  2. BodyThe middle part of a paragraph containing supporting sentences. The body of the paragraph provides additional information about the topic sentence.. The body is composed of the supporting sentences that develop the main point.
  3. ConclusionThe final sentence in a paragraph that summarizes the main point.. The conclusion is the final sentence that summarizes the main point.

The foundation of a good paragraph is the topic sentence, which expresses the main idea of the paragraph. The topic sentence relates to the thesis, or main point, of the essay (see Chapter 9 “Writing Essays: From Start to Finish” for more information about thesis statements) and guides the reader by signposting what the paragraph is about. All the sentences in the rest of the paragraph should relate to the topic sentence.

This section covers the major components of a paragraph and examines how to develop an effective topic sentence.

Developing a Topic Sentence

Pick up any newspaper or magazine and read the first sentence of an article. Are you fairly confident that you know what the rest of the article is about? If so, you have likely read the topic sentence. An effective topic sentence combines a main idea with the writer’s personal attitude or opinion. It serves to orient the reader and provides an indication of what will follow in the rest of the paragraph. Read the following example.

Creating a national set of standards for math and English education will improve student learning in many states.

This topic sentence declares a favorable position for standardizing math and English education. After reading this sentence, a reader might reasonably expect the writer to provide supporting details and facts as to why standardizing math and English education might improve student learning in many states. If the purpose of the essay is actually to evaluate education in only one particular state, or to discuss math or English education specifically, then the topic sentence is misleading.

Tip

When writing a draft of an essay, allow a friend or colleague to read the opening line of your first paragraph. Ask your reader to predict what your paper will be about. If he or she is unable to guess your topic accurately, you should consider revising your topic sentence so that it clearly defines your purpose in writing.

Main Idea versus Controlling Idea

Topic sentences contain both a main ideaThe topic discussed throughout the paragraph. (the subject, or topic that the writer is discussing) and a controlling ideaIndicates the writer’s stance on the main idea of a paragraph. The controlling idea appears in the paragraph’s topic sentence. (the writer’s specific stance on that subject). Just as a thesis statement includes an idea that controls a document’s focus (as you will read about in Chapter 8 “The Writing Process: How Do I Begin?”), a topic sentence must also contain a controlling idea to direct the paragraph. Different writers may use the same main idea but can steer their paragraph in a number of different directions according to their stance on the subject. Read the following examples.

  • Marijuana is a destructive influence on teens and causes long-term brain damage.
  • The antinausea properties in marijuana are a lifeline for many cancer patients.
  • Legalizing marijuana would create a higher demand for Class A and Class B drugs.

Although the main idea—marijuana—is the same in all three topic sentences, the controlling idea differs depending on the writer’s viewpoint.

Exercise 1

Circle the main idea and underline the controlling idea in each of the following topic sentences.

  1. Exercising three times a week is the only way to maintain good physical health.
  2. Sexism and racism are still rampant in today’s workplace.
  3. Raising the legal driving age to twenty-one would decrease road traffic accidents.
  4. Owning a business is the only way to achieve financial success.
  5. Dog owners should be prohibited from taking their pets on public beaches.

Characteristics of a Good Topic Sentence

Five characteristics define a good topic sentence:

  1. A good topic sentence provides an accurate indication of what will follow in the rest of the paragraph.

    Weak example. People rarely give firefighters the credit they deserve for such a physically and emotionally demanding job. (The paragraph is about a specific incident that involved firefighters; therefore, this topic sentence is too general.)

    Stronger example. During the October riots, Unit 3B went beyond the call of duty. (This topic sentence is more specific and indicates that the paragraph will contain information about a particular incident involving Unit 3B.)

  2. A good topic sentence contains both a topic and a controlling idea or opinion.

    Weak example. In this paper, I am going to discuss the rising suicide rate among young professionals. (This topic sentence provides a main idea, but it does not present a controlling idea, or thesis.)

    Stronger example. The rising suicide rate among young professionals is a cause for immediate concern. (This topic sentence presents the writer’s opinion on the subject of rising suicide rates among young professionals.)

  3. A good topic sentence is clear and easy to follow.

    Weak example. In general, writing an essay, thesis, or other academic or nonacademic document is considerably easier and of much higher quality if you first construct an outline, of which there are many different types. (This topic sentence includes a main idea and a controlling thesis, but both are buried beneath the confusing sentence structure and unnecessary vocabulary. These obstacles make it difficult for the reader to follow.)

    Stronger example. Most forms of writing can be improved by first creating an outline. (This topic sentence cuts out unnecessary verbiage and simplifies the previous statement, making it easier for the reader to follow.)

  4. A good topic sentence does not include supporting details.

    Weak example. Salaries should be capped in baseball for many reasons, most importantly so we don’t allow the same team to win year after year. (This topic sentence includes a supporting detail that should be included later in the paragraph to back up the main point.)

    Stronger example. Introducing a salary cap would improve the game of baseball for many reasons. (This topic sentence omits the additional supporting detail so that it can be expanded upon later in the paragraph.)

  5. A good topic sentence engages the reader by using interesting vocabulary.

    Weak example. The military deserves better equipment. (This topic sentence includes a main idea and a controlling thesis, but the language is bland and unexciting.)

    Stronger example. The appalling lack of resources provided to the military is outrageous and requires our immediate attention. (This topic sentence reiterates the same idea and controlling thesis, but adjectives such as appalling and immediate better engage the reader. These words also indicate the writer’s tone.)

Exercise 2

Choose the most effective topic sentence from the following sentence pairs.

  1. a. This paper will discuss the likelihood of the Democrats winning the next election.

    b. To boost their chances of winning the next election, the Democrats need to listen to public opinion.

  2. a. The unrealistic demands of union workers are crippling the economy for three main reasons.

    b. Union workers are crippling the economy because companies are unable to remain competitive as a result of added financial pressure.

  3. a. Authors are losing money as a result of technological advances.

    b. The introduction of new technology will devastate the literary world.

  4. a. Rap music is produced by untalented individuals with oversized egos.

    b. This essay will consider whether talent is required in the rap music industry.

Exercise 3

Using the tips on developing effective topic sentences in this section, create a topic sentence on each of the following subjects. Remember to include a controlling idea as well as a main idea. Write your responses on your own sheet of paper.

  1. An endangered species

    ____________________________________________

  2. The cost of fuel

    ____________________________________________

  3. The legal drinking age

    ____________________________________________

  4. A controversial film or novel

    ____________________________________________

Writing at Work

When creating a workplace document, use the “top-down” approach—keep the topic sentence at the beginning of each paragraph so that readers immediately understand the gist of the message. This method saves busy colleagues precious time and effort trying to figure out the main points and relevant details.

Headings are another helpful tool. In a text-heavy document, break up each paragraph with individual headings. These serve as useful navigation aids, enabling colleagues to skim through the document and locate paragraphs that are relevant to them.

Developing Paragraphs That Use Topic Sentences, Supporting Ideas, and Transitions Effectively

Learning how to develop a good topic sentence is the first step toward writing a solid paragraph. Once you have composed your topic sentence, you have a guideline for the rest of the paragraph. To complete the paragraph, a writer must support the topic sentence with additional information and summarize the main point with a concluding sentence.

This section identifies the three major structural parts of a paragraph and covers how to develop a paragraph using transitional words and phrases.

Identifying Parts of a Paragraph

An effective paragraph contains three main parts: a topic sentence, the body, and the concluding sentence. A topic sentence is often the first sentence of a paragraph. This chapter has already discussed its purpose—to express a main idea combined with the writer’s attitude about the subject. The body of the paragraph usually follows, containing supporting details. Supporting sentencesA sentence in the middle part of the paragraph that helps explain, enhance, or prove the topic sentence. help explain, prove, or enhance the topic sentence. The concluding sentenceThe final sentence of a paragraph that summarizes the topic sentence using different words. is the last sentence in the paragraph. It reminds the reader of the main point by restating it in different words.

Figure 6.2 Paragraph Structure Graphic Organizer

Read the following paragraph. The topic sentence is underlined for you.

After reading the new TV guide this week I had just one thought—why are we still being bombarded with reality shows? This season, the plague of reality television continues to darken our airwaves. Along with the return of viewer favorites, we are to be cursed with yet another mindless creation. Prisoner follows the daily lives of eight suburban housewives who have chosen to be put in jail for the purposes of this fake psychological experiment. A preview for the first episode shows the usual tears and tantrums associated with reality television. I dread to think what producers will come up with next season, but if any of them are reading this blog—stop it! We’ve had enough reality television to last us a lifetime!

The first sentence of this paragraph is the topic sentence. It tells the reader that the paragraph will be about reality television shows, and it expresses the writer’s distaste for these shows through the use of the word bombarded.

Each of the following sentences in the paragraph supports the topic sentence by providing further information about a specific reality television show. The final sentence is the concluding sentence. It reiterates the main point that viewers are bored with reality television shows by using different words from the topic sentence.

Paragraphs that begin with the topic sentence move from the general to the specific. They open with a general statement about a subject (reality shows) and then discuss specific examples (the reality show Prisoner). Most academic essays contain the topic sentence at the beginning of the first paragraph.

Now take a look at the following paragraph. The topic sentence is underlined for you.

Last year, a cat traveled 130 miles to reach its family, who had moved to another state and had left their pet behind. Even though it had never been to their new home, the cat was able to track down its former owners. A dog in my neighborhood can predict when its master is about to have a seizure. It makes sure that he does not hurt himself during an epileptic fit. Compared to many animals, our own senses are almost dull.

The last sentence of this paragraph is the topic sentence. It draws on specific examples (a cat that tracked down its owners and a dog that can predict seizures) and then makes a general statement that draws a conclusion from these examples (animals’ senses are better than humans’). In this case, the supporting sentences are placed before the topic sentence and the concluding sentence is the same as the topic sentence.

This technique is frequently used in persuasive writing. The writer produces detailed examples as evidence to back up his or her point, preparing the reader to accept the concluding topic sentence as the truth.

Sometimes, the topic sentence appears in the middle of a paragraph. Read the following example. The topic sentence is underlined for you.

For many years, I suffered from severe anxiety every time I took an exam. Hours before the exam, my heart would begin pounding, my legs would shake, and sometimes I would become physically unable to move. Last year, I was referred to a specialist and finally found a way to control my anxiety—breathing exercises. It seems so simple, but by doing just a few breathing exercises a couple of hours before an exam, I gradually got my anxiety under control. The exercises help slow my heart rate and make me feel less anxious. Better yet, they require no pills, no equipment, and very little time. It’s amazing how just breathing correctly has helped me learn to manage my anxiety symptoms.

In this paragraph, the underlined sentence is the topic sentence. It expresses the main idea—that breathing exercises can help control anxiety. The preceding sentences enable the writer to build up to his main point (breathing exercises can help control anxiety) by using a personal anecdote (how he used to suffer from anxiety). The supporting sentences then expand on how breathing exercises help the writer by providing additional information. The last sentence is the concluding sentence and restates how breathing can help manage anxiety.

Placing a topic sentence in the middle of a paragraph is often used in creative writing. If you notice that you have used a topic sentence in the middle of a paragraph in an academic essay, read through the paragraph carefully to make sure that it contains only one major topic. To read more about topic sentences and where they appear in paragraphs, see Chapter 8 “The Writing Process: How Do I Begin?”.

Implied Topic Sentences

Some well-organized paragraphs do not contain a topic sentence at all. Instead of being directly stated, the main idea is implied in the content of the paragraph. Read the following example:

Heaving herself up the stairs, Luella had to pause for breath several times. She let out a wheeze as she sat down heavily in the wooden rocking chair. Tao approached her cautiously, as if she might crumble at the slightest touch. He studied her face, like parchment; stretched across the bones so finely he could almost see right through the skin to the decaying muscle underneath. Luella smiled a toothless grin.

Although no single sentence in this paragraph states the main idea, the entire paragraph focuses on one concept—that Luella is extremely old. The topic sentence is thus implied rather than stated. This technique is often used in descriptive or narrative writing. Implied topic sentences work well if the writer has a firm idea of what he or she intends to say in the paragraph and sticks to it. However, a paragraph loses its effectiveness if an implied topic sentence is too subtle or the writer loses focus.

Tip

Avoid using implied topic sentences in an informational document. Readers often lose patience if they are unable to quickly grasp what the writer is trying to say. The clearest and most efficient way to communicate in an informational document is to position the topic sentence at the beginning of the paragraph.

Exercise 4

Identify the topic sentence, supporting sentences, and concluding sentence in the following paragraph.

The desert provides a harsh environment in which few mammals are able to adapt. Of these hardy creatures, the kangaroo rat is possibly the most fascinating. Able to live in some of the most arid parts of the southwest, the kangaroo rat neither sweats nor pants to keep cool. Its specialized kidneys enable it to survive on a miniscule amount of water. Unlike other desert creatures, the kangaroo rat does not store water in its body but instead is able to convert the dry seeds it eats into moisture. Its ability to adapt to such a hostile environment makes the kangaroo rat a truly amazing creature.

Collaboration

Please share with a classmate and compare your answers.

Supporting Sentences

If you think of a paragraph as a hamburger, the supporting sentences are the meat inside the bun. They make up the body of the paragraph by explaining, proving, or enhancing the controlling idea in the topic sentence. Most paragraphs contain three to six supporting sentences depending on the audience and purpose for writing. A supporting sentence usually offers one of the following:

  • Reason

    Sentence: The refusal of the baby boom generation to retire is contributing to the current lack of available jobs.

  • Fact

    Sentence: Many families now rely on older relatives to support them financially.

  • Statistic

    Sentence: Nearly 10 percent of adults are currently unemployed in the United States.

  • Quotation

    Sentence: “We will not allow this situation to continue,” stated Senator Johns.

  • Example

    Sentence: Last year, Bill was asked to retire at the age of fifty-five.

The type of supporting sentence you choose will depend on what you are writing and why you are writing. For example, if you are attempting to persuade your audience to take a particular position you should rely on facts, statistics, and concrete examples, rather than personal opinions. Read the following example:

There are numerous advantages to owning a hybrid car. (Topic sentence)

First, they get 20 percent to 35 percent more miles to the gallon than a fuel-efficient gas-powered vehicle. (Supporting sentence 1: statistic)

Second, they produce very few emissions during low speed city driving. (Supporting sentence 2: fact)

Because they do not require gas, hybrid cars reduce dependency on fossil fuels, which helps lower prices at the pump. (Supporting sentence 3: reason)

Alex bought a hybrid car two years ago and has been extremely impressed with its performance. (Supporting sentence 4: example)

“It’s the cheapest car I’ve ever had,” she said. “The running costs are far lower than previous gas powered vehicles I’ve owned.” (Supporting sentence 5: quotation)

Given the low running costs and environmental benefits of owning a hybrid car, it is likely that many more people will follow Alex’s example in the near future. (Concluding sentence)

To find information for your supporting sentences, you might consider using one of the following sources:

  • Reference book
  • Encyclopedia
  • Website
  • Biography/autobiography
  • Map
  • Dictionary
  • Newspaper/magazine
  • Interview
  • Previous experience
  • Personal research

To read more about sources and research, see Chapter 11 “Writing from Research: What Will I Learn?”.

Tip

When searching for information on the Internet, remember that some websites are more reliable than others. websites ending in .gov or .edu are generally more reliable than websites ending in .com or .org. Wikis and blogs are not reliable sources of information because they are subject to inaccuracies.

Concluding Sentences

An effective concluding sentence draws together all the ideas you have raised in your paragraph. It reminds readers of the main point—the topic sentence—without restating it in exactly the same words. Using the hamburger example, the top bun (the topic sentence) and the bottom bun (the concluding sentence) are very similar. They frame the “meat” or body of the paragraph. Compare the topic sentence and concluding sentence from the previous example:

Topic sentence: There are numerous advantages to owning a hybrid car.

Concluding sentence: Given the low running costs and environmental benefits of owning a hybrid car, it is likely that many more people will follow Alex’s example in the near future.

Notice the use of the synonyms advantages and benefits. The concluding sentence reiterates the idea that owning a hybrid is advantageous without using the exact same words. It also summarizes two examples of the advantages covered in the supporting sentences: low running costs and environmental benefits.

You should avoid introducing any new ideas into your concluding sentence. A conclusion is intended to provide the reader with a sense of completion. Introducing a subject that is not covered in the paragraph will confuse the reader and weaken your writing.

A concluding sentence may do any of the following:

  • Restate the main idea.

    Example: Childhood obesity is a growing problem in the United States.

  • Summarize the key points in the paragraph.

    Example: A lack of healthy choices, poor parenting, and an addiction to video games are among the many factors contributing to childhood obesity.

  • Draw a conclusion based on the information in the paragraph.

    Example: These statistics indicate that unless we take action, childhood obesity rates will continue to rise.

  • Make a prediction, suggestion, or recommendation about the information in the paragraph.

    Example: Based on this research, more than 60 percent of children in the United States will be morbidly obese by the year 2030 unless we take evasive action.

  • Offer an additional observation about the controlling idea.

    Example: Childhood obesity is an entirely preventable tragedy.

Exercise 5

On your own paper, write one example of each type of concluding sentence based on a topic of your choice.

Transitions

A strong paragraph moves seamlessly from the topic sentence into the supporting sentences and on to the concluding sentence. To help organize a paragraph and ensure that ideas logically connect to one another, writers use transitional words and phrases. A transitionWords and phrases that show how the ideas in sentences and paragraphs are related. is a connecting word that describes a relationship between ideas. Take another look at the earlier example:

There are numerous advantages to owning a hybrid car. First, they get 20 percent to 35 percent more miles to the gallon than a fuel-efficient gas-powered vehicle. Second, they produce very few emissions during low speed city driving. Because they do not require gas, hybrid cars reduce dependency on fossil fuels, which helps lower prices at the pump. Alex bought a hybrid car two years ago and has been extremely impressed with its performance. “It’s the cheapest car I’ve ever had,” she said. “The running costs are far lower than previous gas-powered vehicles I’ve owned.” Given the low running costs and environmental benefits of owning a hybrid car, it is likely that many more people will follow Alex’s example in the near future.

Each of the underlined words is a transition word. Words such as first and second are transition words that show sequence or clarify order. They help organize the writer’s ideas by showing that he or she has another point to make in support of the topic sentence. Other transition words that show order include third, also, and furthermore.

The transition word because is a transition word of consequence that continues a line of thought. It indicates that the writer will provide an explanation of a result. In this sentence, the writer explains why hybrid cars will reduce dependency on fossil fuels (because they do not require gas). Other transition words of consequence include as a result, so that, since, or for this reason.

To include a summarizing transition in her concluding sentence, the writer could rewrite the final sentence as follows:

In conclusion, given the low running costs and environmental benefits of owning a hybrid car, it is likely that many more people will follow Alex’s example in the near future.

The following chart provides some useful transition words to connect supporting sentences and concluding sentences. See Chapter 8 “The Writing Process: How Do I Begin?” for a more comprehensive look at transitional words and phrases.

Table 6.1 Useful Transitional Words and Phrases

For Supporting Sentences
above all but for instance in particular moreover subsequently
also conversely furthermore later on nevertheless therefore
aside from correspondingly however likewise on one hand to begin with
at the same time for example in addition meanwhile on the contrary
For Concluding Sentences
after all all things considered in brief in summary on the whole to sum up
all in all finally in conclusion on balance thus

Exercise 6

Using your own paper, write a paragraph on a topic of your choice. Be sure to include a topic sentence, supporting sentences, and a concluding sentence and to use transitional words and phrases to link your ideas together.

Collaboration

Please share with a classmate and compare your answers.

Writing at Work

Transitional words and phrases are useful tools to incorporate into workplace documents. They guide the reader through the document, clarifying relationships between sentences and paragraphs so that the reader understands why they have been written in that particular order.

For example, when writing an instructional memo, it may be helpful to consider the following transitional words and phrases: before you begin, first, next, then, finally, after you have completed. Using these transitions as a template to write your memo will provide readers with clear, logical instructions about a particular process and the order in which steps are supposed to be completed.

Key Takeaways

  • A good paragraph contains three distinct components: a topic sentence, body, and concluding sentence.
  • The topic sentence expresses the main idea of the paragraph combined with the writer’s attitude or opinion about the topic.
  • Good topic sentences contain both a main idea and a controlling idea, are clear and easy to follow, use engaging vocabulary, and provide an accurate indication of what will follow in the rest of the paragraph.
  • Topic sentences may be placed at the beginning, middle, or end of a paragraph. In most academic essays, the topic sentence is placed at the beginning of a paragraph.
  • Supporting sentences help explain, prove, or enhance the topic sentence by offering facts, reasons, statistics, quotations, or examples.
  • Concluding sentences summarize the key points in a paragraph and reiterate the main idea without repeating it word for word.
  • Transitional words and phrases help organize ideas in a paragraph and show how these ideas relate to one another.

6.3 Writing Paragraphs: End-of-Chapter Exercises

Exercises

  1. Select one of the following topics or choose a topic of your choice:

    • Drilling for oil in Alaska
    • Health care reform
    • Introducing a four-day work week
    • Bringing pets to work
    • Charging airline passengers to use the in-flight bathroom

    Create a topic sentence based on the topic you chose, remembering to include both a main idea and a controlling idea. Next, write an alternative topic sentence using the same main idea but a different controlling idea. Explain how each fully developed paragraph might differ in tone and content.

    Collaboration

    Please share with a classmate and compare your answers.

  2. At some point during your career, you may be asked to write a report or complete a presentation. Imagine that you have been asked to report on the issue of health and safety in the workplace. Using the information in Section 6.1.2 “Identifying the Audience”, complete an analysis of your intended audience—your fellow office workers. Consider how demographics, education, prior knowledge, and expectations will influence your report and explain how you will tailor it to your audience accordingly.

    Collaboration

    Please share with a classmate and compare your answers.

  3. Group activity. Working in a group of four or five, assign each group member the task of collecting one document each. These documents might include magazine or newspaper articles, workplace documents, academic essays, chapters from a reference book, film or book reviews, or any other type of writing. As a group, read through each document and discuss the author’s purpose for writing. Use the information you have learned in this chapter to decide whether the main purpose is to summarize, analyze, synthesize, or evaluate. Write a brief report on the purpose of each document, using supporting evidence from the text.
  4. Group activity. Working in a small group, select a workplace document or academic essay that has a clear thesis. Examine each paragraph and identify the topic sentence, supporting sentences, and concluding sentence. Then, choose one particular paragraph and discuss the following questions:

    • Is the topic sentence clearly identifiable or is it implied?
    • Do all the supporting sentences relate to the topic sentence?
    • Does the writer use effective transitions to link his or her ideas?
    • Does the concluding sentence accurately summarize the main point of the paragraph?

    As a group, identify the weakest areas of the paragraph and rewrite them. Focus on the relationship among the topic sentence, supporting sentences, and concluding sentence. Use transitions to illustrate the connection between each sentence in the paragraph.

  5. Peer activity. Using the information you have learned in this chapter, write a paragraph about a current event. Underline the topic sentence in your paragraph. Now, rewrite the paragraph, placing the topic sentence in a different part of the paragraph. Read the two paragraphs aloud to a peer and have him or her identify the topic sentence. Discuss which paragraph is more effective and why.

    Collaboration

    Please share with a classmate, compare your answers, and discuss the contrasting results.

Chapter 5: Help for English Language Learners

5.1 Word Order

Learning Objectives

  1. Identify the basic structures of sentences.
  2. Determine ways to turn sentences into questions.
  3. Define adjectives and how they are used.

If your first language is not English, you will most likely need some extra help when writing in Standard, or formal, English. New students of Standard English often make similar kinds of errors. Even if you have been speaking English for a long time, you may not feel as confident in your written English skills. This chapter covers the most common errors made by English language learners and helps you avoid similar mistakes in your writing.

Basic Sentence Structures

The most basic sentence structure in English is a subjectA word that tells what the sentence is about. Subjects are usually nouns or pronouns. plus a verbA word that tells what the subject is doing or links the subject to a describing word.. A subject performs the action in the sentence, and the verb identifies the action. Keep in mind that in some languages, such as Spanish and Italian, an obvious subject does not always perform the action in a sentence; the subject is often implied by the verb. However, every sentence in English must have a subject and a verb to express a complete thought.

Not all sentences are as simple as a subject plus a verb. To form more complex sentences, writers build upon this basic structure. Adding a prepositional phrase to the basic sentence creates a more complex sentence. A prepositionType of word that connects a noun, pronoun, or verb to another word that describes or modifies it. Common prepositions include in, on, under, near, by, with, and about. is a part of speech that relates a noun or a pronoun to another word in a sentence. It also introduces a prepositional phraseA group of words that begins with a preposition.. If you can identify a preposition, you will be able to identify a prepositional phrase.

On is the preposition. On the couch is the prepositional phrase.

Common Prepositions
about beside off
above between on
across by over
after during through
against except to
along for toward
among from under
around in until
at into up
before like with
behind of without

Exercise 1

Copy the following sentences onto your own sheet of paper and underline the prepositional phrases.

  1. Linda and Javier danced under the stars.
  2. Each person has an opinion about the topic.
  3. The fans walked through the gates.
  4. Jamyra ran around the track.
  5. Maria celebrated her birthday in January.

Another sentence structure that is important to understand is subject + verb + object. There are two types of objects: direct objectsA noun or pronoun in a sentence that receives the action of the verb. The direct object answers whom? or what? after the verb in a sentence. and indirect objectsA noun or pronoun in a sentence that answers the question to whom? or to what? after the verb. The indirect object comes before the direct object in a sentence..

A direct object receives the action of the verb.

The letter directly receives the action of the verb writes.

Tip

A quick way to find the direct object is to ask what? or who?

Sentence: Maurice kicked the ball.

What did Maurice kick? The direct object, ball.

Sentence: Maurice kicked Tom by accident.

Who did Maurice kick? The direct object, Tom.

An indirect object does not receive the action of the verb.

The action (writes) is performed for or to the indirect object (me).

Tip

Even though the indirect object is not found after a preposition in English, it can be discovered by asking to whom? or for whom? after the verb.

Sentence: Dad baked the children some cookies.

For whom did Dad bake the cookies? The indirect object, children.

Exercise 2

On a separate sheet of paper, identify the subject, verb, direct object, and indirect object in the following sentences.

  1. Captain Kirk told the crew a story.
  2. Jermaine gave his girlfriend a dozen yellow tulips.
  3. That hospital offers nurses better pay.
  4. Dad served Grandma a delicious dinner.
  5. Mom bought herself a new car.

Exercise 3

On a separate sheet of paper, rewrite the sentences in the correct order. If the sentence is correct as it is, write OK.

  1. The pizza Jeannine burnt.
  2. To the Mexican restaurant we had to go for dinner.
  3. Jeannine loved the food.
  4. So full were we during the walk home.
  5. I will make the pizza next time.

Questions

English speakers rely on the following two common ways to turn sentences into questions:

  1. Move the helping verb and add a question mark.
  2. Add the verb do, does, or did and add a question mark.

Move the helping verb and add a question mark.

Sentence: Sierra can pack these boxes.

Question: Can Sierra pack these boxes?

Add the verb do, does, or did, and add a question mark:

Sentence: Jolene skated across the pond.

Question: Did Jolene skate across the pond?

Exercise 4

On a separate sheet of paper, create questions from the following sentences.

  1. Slumdog Millionaire is a film directed by Danny Boyle.
  2. The story centers on a character named Jamal Malik.
  3. He and his older brother find different ways to escape the slums.
  4. His brother, Salim, pursues a life of crime.
  5. Jamal ends up on the game show Who Wants to Be a Millionaire?

Adjectives

An adjectiveA word that describes a noun or a pronoun. is a kind of descriptive word that describes a noun or a pronoun. It tells which one, what kind, and how many. Adjectives make your writing more lively and interesting. Keep in mind, a common error that English language learners make is misplacing the adjectives in a sentence. It is important to know where to place the adjective in a sentence so that readers are not confused.

If you are using more than one adjective to describe a noun, place the adjectives in the following order before the noun:

  1. Opinion: an interesting book, a boring movie, a fun ride
  2. Size: a large box, a tiny turtle, a tall woman
  3. Shape: a round ball, a long hose, a square field
  4. Age: a new day, an old horse, a modern building
  5. Color: an orange sunset, a green jacket, a red bug
  6. Ethnicity: Italian cheese, French wine, Chinese tea
  7. Material: silk shirt, wool socks, a cotton dress

Tip

Adjectives can also be placed at the end of a sentence if they describe the subject of a sentence and appear after the verb.

Sentence: My English teacher is excellent.

Exercise 5

On a separate sheet of paper, place the following sets of adjectives in the correct order before the noun. The first one has been done for you.

  1. book: old, small, Spanish

    a small old Spanish book (age, size, ethnicity)

  2. photograph: new, strange
  3. suit: wool, green, funny
  4. opinion: refreshing, new
  5. dress: fashionable, purple

Key Takeaways

  • The most basic sentence structure is a subject plus a verb that expresses a complete thought.
  • Adding a prepositional phrase or a direct or indirect object to a sentence makes it more complex.
  • English speakers change a sentence into a question in one of the following two ways: moving the helping verb and adding a question mark or adding the verb do, does, or did and adding a question mark.
  • Adjectives follow a particular order before the noun they describe. The order is opinion, size, shape, age, color, ethnicity, and material.

Writing Application

Write a paragraph about a memorable family trip. Use at least two adjectives to describe each noun in your paragraph. Proofread your paragraph, and then exchange papers with a classmate. Check your classmate’s use of adjectives to make sure they are correct.

5.2 Negative Statements

Learning Objectives

  1. Identify a negative statement.
  2. Write negative statements.

NegativeA sentence or phrase that expresses the opposite of a positive statement. statements are the opposite of positive statements and are necessary to express an opposing idea. The following charts list negative words and helping verbsA verb that is used with a main verb to describe mood or tense. The helping verb is usually a form of be, do, or have. that can be combined to form a negative statement.

Negative Words
never no hardly
nobody none scarcely
no one not barely
nowhere rarely
Common Helping Verbs
am is are
was were be
being been have
has had do
does did can
could may might
must will should
would ought to used to

The following examples show several ways to make a sentence negative in the present tense.

  1. A helping verb used with the negative word not.

    Sentence: My guests are arriving now.

    Negative: My guests are not arriving now.

  2. The negative word no.

    Sentence: Jennie has money.

    Negative: Jennie has no money.

  3. The contraction n’t.

    Sentence: Janetta does miss her mom.

    Negative: Janetta doesn’t miss her mom.

  4. The negative adverb rarely.

    Sentence: I always go to the gym after work.

    Negative: I rarely go to the gym after work.

  5. The negative subject nobody.

    Sentence: Everybody gets the day off.

    Negative: Nobody gets the day off.

Exercise 1

On a separate sheet of paper, rewrite the positive sentences as negative sentences. Be sure to keep the sentences in the present tense.

  1. Everybody is happy about the mandatory lunch.
  2. Deborah likes to visit online dating sites.
  3. Jordan donates blood every six months.
  4. Our writing instructor is very effective.
  5. That beautiful papaya is cheap.

The following sentences show you the ways to make a sentence negative in the past tense.

Sentence: Paul called me yesterday.

Negative: Paul did not call me yesterday.

Sentence: Jamilee went to the grocery store.

Negative: Jamilee never went to the grocery store.

Sentence: Gina laughed when she saw the huge pile of laundry.

Negative: Gina did not laugh when she saw the huge pile of laundry.

Notice that when forming a negative in the past tense, the helping verb did is what signals the past tense, and the main verb laugh does not have an -ed ending.

Exercise 2

Rewrite the following paragraph by correcting the errors in the past-tense negative sentences.

Celeste no did call me when she reached North Carolina. I was worried because she not drove alone before. She was going to meet her friend, Terry, who lived in a town called Asheville, North Carolina. I did never want to worry, but she said she was going to call when she reached there. Finally, four hours later, she called and said, “Mom, I’m sorry I did not call. I lost track of time because I was so happy to see Terry!” I was relieved.

Collaboration

Once you have found all the errors you can, please share with a classmate and compare your answers. Did your partner find an error you missed? Did you find an error your partner missed? Compare with your instructor’s answers.

Double negativesTwo negatives used in the same phrase or sentence. are two negatives used in the same phrase or sentence. They are considered incorrect in Standard English. You should avoid using double negatives in all formal writing. If you want to say something negative, use only one negative word in the sentence. Return to the beginning of this section for a list of negative words, and then study the following examples.

Tip

Ain’t is considered a contraction of am not. Although some may use it in everyday speech, it is considered incorrect in Standard English. Avoid using it when speaking and writing in formal contexts.

Exercise 3

On your own sheet of paper, correct the double negatives and rewrite the following sentences.

  1. Jose didn’t like none of the choices on the menu.
  2. Brittany can’t make no friends with nobody.
  3. The Southwest hardly had no rain last summer.
  4. My kids never get into no trouble.
  5. I could not do nothing about the past.

Key Takeaways

  • Negatives are usually formed using a negative word plus a helping verb.
  • Double negatives are considered incorrect in Standard English.
  • Only one negative word is used to express a negative statement.

Writing Application

Write a paragraph describing your favorite meal. Use rich, colorful language to describe the meal. Exchange papers with a classmate and read his or her paragraph. Then rewrite each sentence of your classmate’s paragraph using negatives. Be sure to avoid double negatives. Share your negative paragraphs with each other.

5.3 Count and Noncount Nouns and Articles

Learning Objectives

  1. Define and use count and noncount nouns.
  2. Recognize and use definite and indefinite articles.

NounsA word that identifies a person, place, thing, or idea. are words that name things, places, people, and ideas. Right now, you may be surrounded by desks, computers, and notebooks. These are called count nounsA noun that can be made plural by adding -s. because you can count the exact number of desks, computers, and notebooks—three desks, one computer, and six notebooks, for example.

On the other hand, you may be carrying a small amount of money in your wallet and sitting on a piece of furniture. These are called noncount nounsA noun that cannot be counted in individual units.. Although you can count the pieces of furniture or the amount of money, you cannot add a number in front of money or furniture and simply add –s to the end of the noun. Instead, you must use other words and phrases to indicate the quantity of money and furniture.

Incorrect: five moneys, two furnitures

Correct: some money, two pieces of furniture

By the end of Section 5.3.1 “Count and Noncount Nouns”, you will grasp the difference between the two types of nouns and be able to use them confidently in speaking and writing.

Count and Noncount Nouns

A count noun refers to people, places, and things that are separate units. You make count nouns plural by adding –s.

Table 5.1 Count Nouns

Count Noun Sentence
Quarter It takes six quarters to do my laundry.
Chair Make sure to push in your chairs before leaving class.
Candidate The two candidates debated the issue.
Adult The three adults in the room acted like children.
Comedian The two comedians made the audience laugh.

A noncount noun identifies a whole object that cannot separate and count individually. Noncount nouns may refer to concrete objects or abstract objects. A concrete nounA noun you can see, taste, touch, or count. identifies an object you can see, taste, touch, or count. An abstract nounA noun that you cannot see, touch, or count. identifies an object that you cannot see, touch, or count. There are some exceptions, but most abstract nouns cannot be made plural, so they are noncount nouns. Examples of abstract nouns include anger, education, melancholy, softness, violence, and conduct.

Table 5.2 Types of Noncount Nouns

Type of Noncount Noun Examples Sentence
Food sugar, salt, pepper, lettuce, rice Add more sugar to my coffee, please.
Solids concrete, chocolate, silver, soap The ice cream was covered in creamy chocolate.
Abstract Nouns peace, warmth, hospitality, information I need more information about the insurance policy.

Exercise 1

On a separate sheet of paper, label each of the following nouns as count or noncount.

  1. Electricity ________
  2. Water ________
  3. Book ________
  4. Sculpture ________
  5. Advice ________

Exercise 2

On a separate sheet of paper, identify whether the italicized noun in the sentence is a count or noncount noun by writing C or NC above the noun.

  1. The amount of traffic on the way home was terrible.
  2. Forgiveness is an important part of growing up.
  3. I made caramel sauce for the organic apples I bought.
  4. I prefer film cameras instead of digital ones.
  5. My favorite subject is history.

Definite and Indefinite Articles

The word the is a definite articleThe word the that refers to one or more specific things.. It refers to one or more specific things. For example, the woman refers to not any woman but a particular woman. The definite article the is used before singular and plural count nouns.

The words a and an are indefinite articlesThe words a and an that refer to one nonspecific thing.. They refer to one nonspecific thing. For example, a woman refers to any woman, not a specific, particular woman. The indefinite article a or an is used before a singular count noun.

Definite Articles (The) and Indefinite Articles (A/An) with Count Nouns

I saw the concert. (singular, refers to a specific concert)

I saw the concerts. (plural, refers to more than one specific concert)

I saw the U2 concert last night. (singular, refers to a specific concert)

I saw a concert. (singular, refers to any nonspecific concert)

Exercise 3

On a separate sheet of paper, write the correct article in the blank for each of the following sentences. Write OK if the sentence is correct.

  1. (A/An/The) camel can live for days without water. ________
  2. I enjoyed (a/an/the) pastries at the Bar Mitzvah. ________
  3. (A/An/The) politician spoke of many important issues. ________
  4. I really enjoyed (a/an/the) actor’s performance in the play. ________
  5. (A/An/The) goal I have is to run a marathon this year. ________

Exercise 4

Correct the misused or missing articles and rewrite the paragraph.

Stars are large balls of spinning hot gas like our sun. The stars look tiny because they are far away. Many of them are much larger than sun. Did you know that a Milky Way galaxy has between two hundred billion and four hundred billion stars in it? Scientists estimate that there may be as many as five hundred billion galaxies in an entire universe! Just like a human being, the star has a life cycle from birth to death, but its lifespan is billions of years long. The star is born in a cloud of cosmic gas and dust called a nebula. Our sun was born in the nebula nearly five billion years ago. Photographs of the star-forming nebulas are astonishing.

Collaboration

Once you have found all the errors you can, share with a classmate and compare your answers. Did your partner find an error you missed? Did you find an error your partner missed? Compare with your instructor’s answers.

Key Takeaways

  • You can make count nouns plural by adding -s.
  • Count nouns are individual people, places, or things that can be counted, such as politicians, deserts, or candles.
  • Noncount nouns refer to whole things that cannot be made plural, such as salt, peace, or happiness.
  • The is a definite article and is used to refer to a specific person, place, or thing, such as the Queen of England.
  • A and an are indefinite articles, and they refer to nonspecific people, places, or things, such as an apple or a bicycle.

Writing Application

Write five sentences using the definite article the. Write five sentences using the indefinite article a or an. Exchange papers with a classmate and check each other’s work.

5.4 Pronouns

Learning Objectives

  1. Recognize subject and object pronouns.
  2. Identify possessive pronouns.
  3. Determine common pronoun errors.

A pronounA word that substitutes for a noun; for example, I, you, he, she, it, we, or they. is a word that can be used in place of the noun. We use pronouns so we do not have to repeat words. For example, imagine writing the following sentence: Afrah put her scarf on because Afrah was cold. The sentence sounds a bit strange because Afrah is named twice; however, if you use a pronoun, the sentence will be shorter and less repetitive. You might rewrite the sentence to something similar to the following: Afrah put her scarf on because she was cold. She refers to Afrah, so you do not have to write the name twice.

Types of Pronouns

Subject pronounsA pronoun that functions as the subject in a sentence; the “who” and the “what” the sentence is about. are often the subject of a sentence—“who” and “what” the sentence is about.

Sentence: She loves the desserts in France.

She is the subject.

Sentence: By lunch time, they were hungry.

They is the subject.

Object pronounsPronoun that functions as the object of a verb or a preposition; the “who” or “what” acted upon. are often the object of the verb— “who” or “what” was acted upon.

Sentence: Melanie’s thoughtfulness touched him.

Him is the object of the verb touched.

Sentence: We lifted it.

It is the object of the verb lifted.

Tip

The masculine subject pronoun is he, and the masculine object pronoun is him. The feminine subject pronoun is she, and the feminine object pronoun is her.

A pronoun that shows possession or ownership is called a possessive pronounA pronoun that shows possession or ownership..

Sentence: The teacher took her apple and left.

The pronoun her shows the teacher owns the apple.

Sentence: The hikers spotted their guide on the trail.

The pronoun their shows the hikers follow the guide who was assigned to the hikers.

Table 5.3 Pronouns

Subject Pronouns I, you, he, she, it, we, they
Object Pronouns me, you, him, her, it, us, them
Possessive Pronouns my (mine), your(s), his, hers, its, our(s), their(s)

Exercise 1

On a separate sheet of paper, complete the following sentences by circling the correct pronoun.

  1. Unfortunately, the house was too expensive for (we, us, they).
  2. I completed (mine, my, your) research paper, and she completed (his, hers, theirs).
  3. My dog Buster is old, but (he, it, them) is very playful.
  4. That ring belongs to my father, so it is (hers, his, theirs).
  5. I cannot find my textbook, so I think (they, it, he) is lost.

Common Pronoun Errors

English language learners often make the same errors when using pronouns. The following examples illustrate common errors.

Incorrect: Me and Daniela went to the restaurant for lunch.

This sentence is incorrect because an object pronoun (me) is used instead of a subject pronoun.

Correct: Daniela and I went to the restaurant for lunch.

This sentence is now correct because a subject pronoun (I) is used.

Incorrect: Mark put her grocery bag on the counter.

This sentence is incorrect because the pronoun her refers to a female, and Mark is a male.

Correct: Mark put his grocery bag on the counter.

This sentence is now correct because the male pronoun his refers to the male person, Mark.

Incorrect: The woman she went to work earlier than usual.

This sentence is incorrect because the subject the woman is repeated by the pronoun she.

Correct: The woman went to work earlier than usual.

Correct: She went to work earlier than usual.

These sentences are now correct because the unnecessary repeated subject has been removed.

Exercise 2

On a separate sheet of paper, correct the following sentences that have pronoun errors. If the sentence is correct as it is, write OK.

  1. Us are going to the county fair this weekend.
  2. Steven did not want to see a movie because she had a headache.
  3. The teacher congratulated Maria and me.
  4. The eighth grade students they were all behaving mysteriously well.
  5. Derrick and he received the best grade on the grammar test.

Relative Pronouns

A relative pronounA type of pronoun that helps combine two sentences. is a type of pronoun that helps connect details to the subject of the sentence and may often combine two shorter sentences. The relative pronouns are who, whom, whose, which or that.

Sentence: A relative pronoun is a type of pronoun.

The subject of this sentence is a relative pronoun. The clause is a type of pronoun gives some information about the subject.

The relative pronoun that may be added to give more details to the subject.

Sentence using a relative pronoun: A relative pronoun is a type of pronoun that helps connect details to the subject of the sentence.

Tip

Remember the following uses of relative pronouns:

  • Who, whom, and whose refer only to people.
  • Which refers to things.
  • That refers to people or things.

The following examples show how a relative pronoun may be used to connect two sentences and to connect details to the subject.

Sentence 1: Gossip is a form of communication.

Sentence 2: It is a waste of time and energy.

Combination of 1 and 2: Gossip is a form of communication that is a waste of time and energy.

Notice how the relative pronoun that replaces the subject it in sentence 2.

That is called a relative pronoun because it connects the details (is a waste of time and energy) to the subject (Gossip).

Sentence 1: My grandmother is eighty years old.

Sentence 2: She collects seashells.

Combination of 1 and 2: My grandmother, who is eighty years old, collects seashells.

Notice how the relative pronoun who replaces the subject she in sentence 2.

Who is called a relative pronoun because it connects the details (is eighty years old) to the subject (My grandmother).

Exercise 3

On a separate sheet of paper, complete the following sentences by selecting the correct relative pronoun.

  1. He showed me a photo (who, that) upset me.
  2. Soccer is a fast moving game (who, that) has many fans worldwide.
  3. Juan is a man (which, who) has high standards for everything.
  4. Jamaica is a beautiful country (that, who) I would like to visit next year.
  5. My mother only eats bananas (who, that) are green.

Exercise 4

On a separate sheet of paper, combine the two sentences into one sentence using a relative pronoun.

  1. Jeff is a dependable person. He will never let you down.
  2. I rode a roller coaster. It was scary.
  3. At the beach, I always dig my feet into the sand. It protects them from the hot sun.
  4. Jackie is trying not to use so many plastic products. They are not good for the environment.
  5. My Aunt Sherry is teaching me how to drive. She has never been in accident or gotten a ticket.

Key Takeaways

  • A pronoun is used in place of a noun.
  • There are several types of pronouns, including subject and object pronouns, possessive pronouns, and relative pronouns.
  • Subject pronouns are the “who” and “what” the sentence is about.
  • Object pronouns are the “who” and “what” that receives the action.
  • A possessive pronoun is a pronoun showing ownership.
  • Common pronoun errors include mixing up subject, object, and gender pronouns, and repeating the subject of a sentence with a pronoun.
  • Relative pronouns help combine two separate sentences.

Writing Application

Proofread a piece of your writing for the types of pronoun errors discussed in this section. Correct any errors you come across.

5.5 Verb Tenses

Learning Objectives

  1. Identify simple verb tenses.
  2. Recognize to be, to have, and to do verbs.
  3. Use perfect verb tenses.
  4. Apply progressive verb tenses.
  5. Define gerunds and infinitives.

You must always use a verbA word that tells what the subject is doing or links the subject to a describing word. in every sentence you write. Verbs are parts of speech that indicate actions or states of being. The most basic sentence structure is a subject followed by a verb.

Simple Verb Tenses

Verb tensesA verb form that identifies the time of action described in a sentence. tell the reader when the action takes place. The action could be in the past, present, or future.

Past ← Present → Future
Yesterday I jumped. Today I jump. Tomorrow I will jump.

Simple presentVerb tense that describes things that are generally true, indicates that an action takes place in the present, or indicates that the action is something that happens regularly. verbs are used in the following situations:

  1. When the action takes place now

    I drink the water greedily.

  2. When the action is something that happens regularly

    I always cross my fingers for good luck.

  3. When describing things that are generally true

    College tuition is very costly.

Table 5.4 Regular Simple Present Tense Verbs

Verb I He/She/It You We They
ask ask asks ask ask ask
bake bake bakes bake bake bake
cook cook cooks cook cook cook
cough cough coughs cough cough cough
clap clap claps clap clap clap
dance dance dances dance dance dance
erase erase erases erase erase erase
kiss kiss kisses kiss kiss kiss
push push pushes push push push
wash wash washes wash wash wash

When it is he, she, or it doing the present tense action, remember to add –s, or –es to the end of the verb or to change the y to –ies.

Simple pastVerb tense that is used when the action has already taken place and is now finished. verbs are used when the action has already taken place and is now finished:

  • I washed my uniform last night.
  • I asked for more pie.
  • I coughed loudly last night.

Table 5.5 Regular Simple Past Tense Verbs

Verb I He/She/It You We They
ask asked asked asked asked asked
bake baked baked baked baked baked
cook cooked cooked cooked cooked cooked
cough coughed coughed coughed coughed coughed
clap clapped clapped clapped clapped clapped
dance danced danced danced danced danced
erase erased erased erased erased erased
kiss kissed kissed kissed kissed kissed
push pushed pushed pushed pushed pushed
wash washed washed washed washed washed

When he, she, or it is doing the action in the past tense, remember to add –d or –ed to the end of regular verbs.

Simple futureVerb tense that is used when the action has not yet taken place. verbs are used when the action has not yet taken place:

  • I will work late tomorrow.
  • I will kiss my boyfriend when I see him.
  • I will erase the board after class.

Table 5.6 Regular Simple Future Tense Verbs

Verb I He/She/It You We They
ask will ask will ask will ask will ask will ask
bake will bake will bake will bake will bake will bake
cook will cook will cook will cook will cook will cook
cough will cough will cough will cough will cough will cough
clap will clap will clap will clap will clap will clap
dance will dance will dance will dance will dance will dance
erase will erase will erase will erase will erase will erase
kiss will kiss will kiss will kiss will kiss will kiss
push will push will push will push will push will push
wash will wash will wash will wash will wash will wash

Going to can also be added to the main verb to make it future tense:

  • I am going to go to work tomorrow.

Exercise 1

On a separate sheet of paper, complete the following sentences by adding the verb in the correct simple tense.

  1. Please do not (erase, erased, will erase) what I have written on the board.
  2. They (dance, danced, will dance) for hours after the party was over.
  3. Harrison (wash, washed, will wash) his laundry after several weeks had passed.
  4. Yesterday Mom (ask, asked, will ask) me about my plans for college.
  5. I (bake, baked, will bake) several dozen cookies for tomorrow’s bake sale.

Exercise 2

Correct the verb tense mistakes in the following paragraph.

Last summer, I walk around Walden Pond. Walden Pond is in Concord, Massachusetts. It is where the philosopher Henry David Thoreau will live during the mid-nineteenth century. During his time there, he wrote a book called Walden. Walden is a book of Thoreau’s reflections on the natural environment. It will be consider a classic in American literature. I did not know that Walden Pond is consider the birthplace of the environmental movement. It was very relaxing there. I will listen to birds, frogs, and crickets, not to mention the peaceful sound of the pond itself.

Collaboration

Once you have found all the errors you can, please share with a classmate and compare your answers. Did your partner find an error you missed? Did you find an error your partner missed? Compare with your instructor’s answers.

To Be, To Do, and To Have

There are some irregular verbs in English that are formed in special ways. The most common of these are the verbs to be, to have, and to do.

Table 5.7 Verb Forms of To Be, To Do, and To Have

Base Form Present Tense Form Past Tense Form Future Tense Form
be am/is/are was/were will be
do do/does did will do
have have/has had will have

Tip

Memorize the present tense forms of to be, to do, and to have. A song or rhythmic pattern will make them easier to memorize.

Review these examples of to be, to do, and to have used in sentences.

Past ← Present → Future
To Be
Yesterday I was angry. Today I am not angry. Tomorrow I will be angry.
To Do
I did my best yesterday. I do my best every day. Tomorrow I will do my best.
To Have
Yesterday I had ten dollars. Today I have ten dollars. Tomorrow I will have ten dollars.

Remember the following uses of to be, to have and to do:

To Be

  • I → am/was/will be
  • you/we/they → are/were/will be
  • he/she/it → is/was/will be

To Have

  • I/you/we/they → have/had/will have
  • he/she/it → has/had/will have

To Do

  • I/you/we/they → do/did/will do
  • he/she/it → does/did/will do

Tip

Remember, if you have a compound subject like Marie and Jennifer, think of the subject as they to determine the correct verb form.

  • Marie and Jennifer (they) have a house on Bainbridge Island.

Similarly, single names can be thought of as he, she, or it.

  • LeBron (he) has scored thirty points so far.

Exercise 3

On a separate sheet of paper, complete the following sentences by circling the correct form of the verbs to be, to have, and to do in the three simple tenses.

  1. Stefan always (do, does, will do) his taxes the day before they are due.
  2. We (are, is, was) planning a surprise birthday party for my mother.
  3. Turtles (have, had, has) the most beautiful patterns on their shells.
  4. I always (do, did, will do) my homework before dinner, so I can eat in peace.
  5. You (is, are, was) so much smarter than you think!

Perfect Verb Tenses

Up to this point, we have studied the three simple verb tenses—simple present, simple past, and simple future. Now we will add three more tenses, which are called perfect tenses. They are present perfectVerb tense that describe a continuing situation or something that has just happened., past perfectVerb tenses that describe a continuing situation in the past., and future perfectVerb tense used when anticipating completing an event in the future, but the event is not completed yet.. These are the three basic tenses of English. A past participleOften called the –ed form of the verb, it is formed by adding –d or –ed to the base form of regular verbs. is often called the –ed form of a verb because it is formed by adding –d or –ed to the base form of regular verbs. Past participles can also end in -t or -en. Keep in mind, however, the past participle is also formed in various other ways for irregular verbs. The past participle can be used to form the present perfect tense.

Review the following basic formula for the present perfect tense:

Subject + has or have + past participle
I have helped

The present perfect tense has a connection with the past and the present.

Use the present perfect tense to describe a continuing situation and to describe an action that has just happened.

  • I have worked as a caretaker since June.

    This sentence tells us that the subject has worked as a caretaker in the past and is still working as a caretaker in the present.

  • Dmitri has just received an award from the Dean of Students.

    This sentence tells us that Dmitri has very recently received the award. The word just emphasizes that the action happened very recently.

Study the following basic formula for the past perfect tense:

Subject + had or have + past participle
I had listened
  • The bus had left by the time Theo arrived at the station.

    Notice that both actions occurred entirely in the past, but one action occurred before the other. At some time in the past, Theo arrived (simple past tense) at the station, but at some time before that, the bus had left (past perfect).

Look at the following basic formula for the future perfect tense:

Subject + will have + past participle
I will have graduated

The future perfect tense describes an action from the past in the future, as if the past event has already occurred. Use the future perfect tense when you anticipate completing an event in the future, but you have not completed it yet.

  • You will have forgotten me after you move to London.

    Notice that both actions occur in the future, but one action will occur before the other. At some time in the future, the subject (you) will move (future tense) to London, and at some time after that, the subject will have forgotten (future perfect tense) the speaker, me.

Exercise 4

On a separate sheet of paper, complete the following sentences by using the correct perfect verb tense for the verb in parentheses.

  1. I plan to start a compost bin because I ________ (to want) one for a long time now.
  2. My brother told me he ________ (to argue) with his friend about politics.
  3. By the time we reach the mountain top the sun ________ (to set).
  4. Denise ________ (to walk) several miles in the past three hours.
  5. His mother ________ (to offer) to pay him to work in her office.

Progressive Verb Tenses

Progressive verb tensesVerb tenses that describe a continuing or unfinished action. describe a continuing or unfinished action, such as I am going, I was going, or I will be going.

The present progressive tense describes an action or state of being that takes place in the present and that continues to take place.

To make verbs in the present progressive tense, combine these two parts:

Present tense form of to be + -ing (present participle)
am/is/are help helping

You should use the present progressive tense to describe a planned activity, to describe an activity that is recurring right now, and to describe an activity that is in progress, although not actually occurring at the time of speaking:

  • Preeti is starting school on Tuesday.

    This sentence describes a planned activity.

  • Janetta is getting her teeth cleaned right now.

    This sentence describes an activity that is occurring right now.

  • I am studying ballet at school.

    This sentence describes an activity that is in progress but not actually occurring at the time of speaking.

The past progressive tense describes an action or state of being that took place in the past and that continues to take place.

To make verbs in the past progressive tense, combine these two parts:

Past tense form of to be + -ing (present participle)
was/were helping

You should use the past progressive tense to describe a continuous action in the past, to describe a past activity in progress while another activity occurred, or to describe two past activities in progress at the same time:

  • Ella and I were planning a vacation.

    This sentence describes a continuous action in the past.

  • I was helping a customer when I smelled delicious fried chicken.

    This sentence describes a past activity in progress while another activity occurred.

  • While I was finishing my homework, my wife was talking on the phone.

    This sentence describes two past activities in progress at the same time.

The future progressive tense describes an action or state of being that will take place in the future and that will continue to take place. The action will have started at that future moment, but it will not have finished at that moment.

To make verbs in the future progressive tense, combine these parts:

Future tense form of to be + -ing (present participle)
will be helping

Use the future progressive tense to describe an activity that will be in progress in the future:

  • Samantha and I will be dancing in the school play next week.
  • Tomorrow Agnes will be reading two of her poems.

Exercise 5

On a separate sheet of paper, revise the following sentences, written in simple tenses, using the progressive tenses indicated in parentheses.

  1. He prepared the food while I watched. (past progressive tense)
  2. Jonathan will speak at the conference. (future progressive)
  3. Josie traveled to Egypt last July. (past progressive tense)
  4. My foot aches, so I know it will rain. (present progressive tense)
  5. Micah will talk a lot when I see him. (future progressive)
  6. I yawn a lot because I feel tired. (present progressive tense)

Similar to the present perfect tense, the present perfect progressive tense is used to indicate an action that was begun in the past and continues into the present. However, the present perfect progressive is used when you want to stress that the action is ongoing.

To make verbs in the present perfect progressive tense, combine the following parts:

Present tense form of to have + Been + -ing (present participle)
has or have been helping
  • She has been talking for the last hour.

    This sentence indicates that she started talking in the past and is continuing to talk in the present.

  • I have been feeling tired lately.

    This sentence indicates that I started feeling tired in the past, and I continue to feel tired in the present. Instead of indicating time, as in the first sentence, the second sentence uses the adverb lately. You can also use the adverb recently when using the present perfect progressive tense.

Similar to the past perfect tense, the past perfect progressive tense is used to indicate an action that was begun in the past and continued until another time in the past. The past perfect progressive does not continue into the present but stops at a designated moment in the past.

To make verbs in the past perfect progressive tense, combine the following parts:

Past tense form of to have + been + -ing (present participle)
had been helping
  • The employees had been talking until their boss arrived.

    This sentence indicates that the employees were talking in the past and they stopped talking when their boss arrived, which also happened in the past.

  • I had been working all day.

    This sentence implies that I was working in the past. The action does not continue into the future, and the sentence implies that the subject stopped working for unstated reasons.

The future perfect progressive tense is rarely used. It is used to indicate an action that will begin in the future and will continue until another time in the future.

To make verbs in the future perfect progressive tense, combine the following parts:

Future tense form of to have + been + -ing (present participle)
will have Been helping
  • By the end of the meeting, I will have been hearing about mortgages and taxes for eight hours.

    This sentence indicates that in the future I will hear about mortgages and taxes for eight hours, but it has not happened yet. It also indicates the action of hearing will continue until the end of the meeting, something that is also in the future.

Gerunds

A gerundA verb form ending in -ing that is used as a noun, such as running, writing, or celebrating. is a form of a verb that is used as a noun. All gerunds end in -ing. Since gerunds function as nouns, they occupy places in a sentence that a noun would, such as the subject, direct object, and object of a preposition.

You can use a gerund in the following ways:

  1. As a subject

    Traveling is Cynthia’s favorite pastime.

  2. As a direct object

    I enjoy jogging.

  3. As an object of a proposition

    The librarian scolded me for laughing.

Often verbs are followed by gerunds. Study Table 5.8 “Gerunds and Verbs” for examples.

Table 5.8 Gerunds and Verbs

Gerund Verb Followed by a Gerund
moving Denise considered moving to Paris.
cleaning I hate cleaning the bathroom.
winning Nate imagines winning an Oscar one day.
worrying Mom says she has stopped worrying.
taking She admitted taking the pumpkin.

Infinitives

An infinitiveA verb form that combines the word to with a verb, such as to buy, to go, or to gather. is a form of a verb that comes after the word to and acts as a noun, adjective, or adverb.

to + verb = infinitive

Examples of infinitives include to move, to sleep, to look, to throw, to read, and to sneeze.

Often verbs are followed by infinitives. Study Table 5.9 “Infinitives and Verbs” for examples.

Table 5.9 Infinitives and Verbs

Infinitive Verb Followed by Infinitive
to help Jessica offered to help her move.
to arrive Mick expects to arrive early.
to win Sunita wants to win the writing contest.
to close He forgot to close the curtains.
to eat She likes to eat late.

You may wonder which verbs can be followed by gerunds and which verbs can be followed by infinitives. With the following verbs, you can use either a gerund or an infinitive.

Table 5.10 Infinitives and Gerunds Verbs

Base Form of Verb Sentences with Verbs Followed by Gerunds and Infinitives
begin 1. John began crying.
2. John began to cry.
hate 1. Marie hated talking on the phone.
2. Marie hated to talk on the phone.
forget 1. Wendell forgot paying the bills.
2. Wendell forgot to pay the bills.
like 1. I liked leaving messages.
2. I liked to leave messages.
continue 1. He continued listening to the news.
2. He continued to listen to the news.
start 1. I will start recycling immediately.
2. I will start to recycle immediately.
try 1. Mikhail will try climbing the tree.
2. Mikhail will try to climb the tree.
prefer 1. I prefer baking.
2. I prefer to bake.
love 1. Josh loves diving.
2. Josh loves to dive.

Exercise 6

On your own sheet of paper, complete the following sentences by choosing the correct infinitive or gerund.

  1. I meant ________ (to kiss, kissing) my kids before they left for school.
  2. The children hoped (to go, going) to a restaurant for dinner.
  3. Do you intend ________ (to eat, eating) the entire pie?
  4. Crystal postponed ________ (to get dressed, getting dressed) for the party.
  5. When we finish ________ (to play, playing) this game, we will go home.

Key Takeaways

  • Verb tenses tell the reader when the action takes place.
  • Actions could be in the past, present, or future.
  • There are some irregular verbs in English that are formed in special ways. The most common of these irregular verbs are the verbs to be, to have, and to do.
  • There are six main verb tenses in English: simple present, simple past, simple future, present perfect, past perfect, and future perfect.
  • Verbs can be followed by either gerunds or infinitives.

Writing Application

Write about a lively event that is either remembered or imagined. Ask yourself the following three questions: What happened during the event? What happened after the event? Looking back, what do you think of the event now? Answer each question in a separate paragraph to keep the present, past, and future tense verbs separate.

5.6 Modal Auxiliaries

Learning Objectives

  1. Define and identify modal auxiliaries.
  2. Learn how and when to use modal auxiliaries.

We all need to express our moods and emotions, both in writing and in our everyday life. We do this by using modal auxiliariesA type of helping verb that is only used with a main verb to help express its mood..

Modal Auxiliaries

Modal auxiliaries are a type of helping verb that are used only with a main verb to help express its mood.

The following is the basic formula for using a modal auxiliary:

Subject + modal auxiliary + main verb
James may call

There are ten main modal auxiliaries in English.

Table 5.11 Modal Auxiliaries

Modal Auxiliary Use Modal Auxiliary + Main Verb
can Expresses an ability or possibility I can lift this forty-pound box. (ability)
We can embrace green sources of energy. (possibility)
could Expresses an ability in the past; a present possibility; a past or future permission I could beat you at chess when we were kids. (past ability)
We could bake a pie! (present possibility)
Could we pick some flowers from the garden? (future permission)
may Expresses uncertain future action; permission; ask a yes-no question I may attend the concert. (uncertain future action)
You may begin the exam. (permission)
May I attend the concert? (yes-no questions)
might Expresses uncertain future action I might attend the concert (uncertain future action—same as may)
shall Expresses intended future action I shall go to the opera. (intended future action)
should Expresses obligation; ask if an obligation exists I should mail my RSVP. (obligation, same as ought to)
Should I call my mother? (asking if an obligation exists)
will Expresses intended future action; ask a favor; ask for information I will get an A in this class. (intended future action)
Will you buy me some chocolate? (favor)
Will you be finished soon? (information)
would States a preference; request a choice politely; explain an action; introduce habitual past actions I would like the steak, please. (preference)
Would you like to have breakfast in bed? (request a choice politely)
I would go with you if I didn’t have to babysit tonight. (explain an action)
He would write to me every week when we were dating. (habitual past action)
must Expresses obligation We must be on time for class.
ought to Expresses obligation I ought to mail my RSVP. (obligation, same as may)

Tip

Use the following format to form a yes-no question with a modal auxiliary:

Modal auxiliary + subject + main verb
Should I drive?

Be aware of these four common errors when using modal auxiliaries:

  1. Using an infinitive instead of a base verb after a modal

    Incorrect: I can to move this heavy table.

    Correct: I can move this heavy table.

  2. Using a gerund instead of an infinitive or a base verb after a modal

    Incorrect: I could moving to the United States.

    Correct: I could move to the United States.

  3. Using two modals in a row

    Incorrect: I should must renew my passport.

    Correct: I must renew my passport.

    Correct: I should renew my passport.

  4. Leaving out a modal

    Incorrect: I renew my passport.

    Correct: I must renew my passport.

Exercise 1

Edit the following paragraph by correcting the common modal auxiliary errors.

I may to go to France on vacation next summer. I shall might visit the Palace of Versailles. I would to drive around the countryside. I could imagining myself living there; however, I will not move to France because my family should miss me very much.

Modals and Present Perfect Verbs

In the previous section, we defined present perfect verb tense as describing a continuing situation or something that has just happened.

Remember, when a sentence contains a modal auxiliary before the verb, the helping verb is always have.

Be aware of the following common errors when using modal auxiliaries in the present perfect tense:

  1. Using had instead of have

    Incorrect: Jamie would had attended the party, but he was sick.

    Correct: Jamie would have attended the party, but he was sick.

  2. Leaving out have

    Incorrect: Jamie would attended the party, but he was sick.

    Correct: Jamie would have attended the party, but he was sick.

Exercise 2

On a separate sheet of paper, complete the following sentences by changing the given verb form to a modal auxiliary in present perfect tense.

  1. The man ________ (laugh).
  2. The frogs ________ (croak).
  3. My writing teacher ________ (smile).
  4. The audience ________ (cheer) all night.
  5. My best friend ________ (giggled).

Key Takeaways

  • The basic formula for using a modal auxiliary is

    subject + modal auxiliary + main verb
  • There are ten main modal auxiliaries in English: can, could, may, might, shall, should, will, would, must, and ought to.
  • The four common types of errors when using modals include the following: using an infinitive instead of a base verb after a modal, using a gerund instead of an infinitive or a base verb after a modal, using two modals in a row, and leaving out a modal.
  • In the present perfect tense, when a sentence has a modal auxiliary before the verb, the helping verb is always have.
  • The two common errors when using modals in the present perfect tense include using had instead of have and leaving out have.

Writing Application

On a separate sheet of paper, write ten original sentences using modal auxiliaries.

5.7 Prepositions

Learning Objectives

  1. Identify prepositions.
  2. Learn how and when to use prepositions.

A prepositionType of word that connects a noun, pronoun, or verb to another word that describes or modifies it. Common prepositions include in, on, under, near, by, with, and about. is a word that connects a noun or a pronoun to another word in a sentence. Most prepositions such as above, below, and behind usually indicate a location in the physical world, but some prepositions such as during, after, and until show location in time.

In, At, and On

The prepositions in, at, and on are used to indicate both location and time, but they are used in specific ways. Study Table 5.12, Table 5.13, and Table 5.14 to learn when to use each one.

Table 5.12 In

Preposition Time Example Place Example
in year in 1942 country in Zimbabwe
month in August state in California
season in the summer city in Chicago
time of day (not with night) in the afternoon

Table 5.13 On

Preposition Time Example Place Example
on day on Monday surfaces on the table
date on May 23 streets on 124th Street
specific days/dates on Monday modes of transportation on the bus

Table 5.14 At

Preposition Time Example Place Example
at time at five o’clock addresses at 1600 Pennsylvania Avenue
with night at night location at Rooney’s Grill

Exercise 1

Edit the following letter from a resident to her landlord by correcting errors with in, at, and on.

Dear Mrs. Salazar,

I am writing this letter to inform you that I will be vacating apartment 2A in 356 Maple Street at Wednesday, June 30, 2010. I will be cleaning the apartment at the Monday before I leave. I will return the keys to you on 5 p.m., sharp, at June 30. If you have any questions or specific instructions for me, please contact me in my office. I have enjoyed living at Austin, Texas, but I want to explore other parts of the country now.

Sincerely,

Milani Davis

Prepositions after Verbs

Prepositions often follow verbs to create expressions with distinct meanings. These expressions are sometimes called prepositional verbs. It is important to remember that these expressions cannot be separated.

Table 5.15 Verbs + Prepositions

Verb + Preposition Meaning Example
agree with to agree with something or someone My husband always agrees with me.
apologize for to express regret for something, to say sorry about something I apologize for being late.
apply for to ask for something formally I will apply for that job.
believe in to have a firm conviction in something; to believe in the existence of something I believe in educating the world’s women.
care about to think that someone or something is important I care about the health of our oceans.
hear about to be told about something or someone I heard about the teachers’ strike.
look after to watch or to protect someone or something Will you look after my dog while I am on vacation?
talk about to discuss something We will talk about the importance of recycling.
speak to, with to talk to/with someone I will speak to his teacher tomorrow.
wait for to await the arrival of someone or something I will wait for my package to arrive.

Tip

It is a good idea to memorize these combinations of verbs plus prepositions. Write them down in a notebook along with the definition and practice using them when you speak.

Exercise 2

On a separate sheet of paper, complete the following sentences by writing the correct preposition after the verb.

  1. Charlotte does not ________ (apologize for, believe in) aliens or ghosts.
  2. It is impolite to ________ (hear about, talk about) people when they are not here.
  3. Herman said he was going to ________ (believe in, apply for) the internship.
  4. Jonas would not ________ (talk about, apologize for) eating the last piece of cake.
  5. I ________ (care about, agree with) the environment very much.

Prepositions after Adjectives

Similar to prepositions after verbs, prepositions after adjectives create expressions with distinct meanings unique to English. Remember, like prepositional verbs, these expressions also cannot be separated.

Table 5.16 Adjectives + Prepositions

Adjective + Preposition Meaning Example
angry at, about to feel or show anger toward (or about) someone or something I am angry about the oil spill in the ocean.
confused about to be unable to think with clarity about someone or something. Shawn was confused about the concepts presented at the meeting.
disappointed in, with to feel dissatisfaction with someone or something I was disappointed in my husband because he voted for that candidate.
dressed in to clothe the body He was dressed in a pin-striped suit.
happy for to show happiness for someone or something I was happy for my sister who graduated from college.
interested in giving attention to something, expressing interest I am interested in musical theater.
jealous of to feel resentful or bitter toward someone or something (because of their status, possessions, or ability) I was jealous of her because she always went on vacation.
thankful for to express thanks for something I am thankful for my wonderful friends.
tired of to be disgusted with, have a distaste for I was tired of driving for hours without end.
worried about to express anxiety or worry about something I am worried about my father’s health.

Exercise 3

On a separate sheet of paper, complete the following sentences by writing the correct preposition after the verb.

  1. Meera was deeply ________ (interested in, thankful for) marine biology.
  2. I was ________ (jealous of, disappointed in) the season finale of my favorite show.
  3. Jordan won the race, and I am ________ (happy for, interested in) him.
  4. The lawyer was ________ (thankful for, confused about) the details of the case.
  5. Chloe was ________ (dressed in, tired of) a comfortable blue tunic.

Tip

The following adjectives are always followed by the preposition at:

  • Good

    She is really good at chess.

  • Excellent

    Henry is excellent at drawing.

  • Brilliant

    Mary Anne is brilliant at playing the violin.

Key Takeaways

  • The prepositions in, at, and on are used to indicate both location and time, but they are used in specific ways.
  • The preposition in is used when expressing the following: year, month, season, time of day (not with night), country, state, and city.
  • The preposition on is used to express day, date, and specific days or dates and surfaces, streets, and transportation modes.
  • The preposition at is used for expressions of time, with night, and with addresses and locations.
  • Prepositions often follow verbs to create expressions with distinct meanings that are unique to English.
  • Prepositions also follow adjectives to create expressions with distinct meanings that are unique to English.

Writing Application

Write about a happy childhood memory using as many prepositions followed by verbs and adjectives as you can. Use at least ten. When you are finished, exchange papers with a classmate and correct any preposition errors you find.

5.8 Slang and Idioms

Learning Objectives

  1. Recognize slang and idioms.
  2. Learn to avoid using slang and idioms in formal writing.

Words are the basis of how a reader or listener judges you, the writer and speaker. When you write an academic paper or speak in a business interview, you want to be sure to choose your words carefully. In our casual, everyday talk, we often use a lot of “ums,” “likes,” “yeahs,” and so on. This everyday language is not appropriate for formal contexts, such as academic papers and business interviews. You should switch between different ways of speaking and writing depending on whether the context is formal or informal.

Slang

Hey guys, let’s learn about slang and other cool stuff like that! It will be awesome, trust me. This section is off the hook!

What do you notice about the previous paragraph? You might notice that the language sounds informal, or casual, like someone might talk with a friend or family member. The paragraph also uses a lot of slangInformal words that are considered nonstandard English.. Slang is a type of language that is informal and playful. It often changes over time. The slang of the past is different than the slang of today, but some slang has carried over into the present. Slang also varies by region and culture. The important thing to understand is that slang is casual talk, and you should avoid using it in formal contexts. There are literally thousands of slang words and expressions. Table 5.17 “Slang Expressions” explains just a few of the more common terms.

Table 5.17 Slang Expressions

Slang Word or Phrase Meaning
check it out, check this out v. look at, watch, examine
chocoholic, workaholic, shopaholic n. a person who loves, is addicted to chocolate/work/shopping
stuff n. things (used as a singular, noncount noun)
taking care of business doing things that need to be done
pro n. a person who is a professional
crack up v. to laugh uncontrollably
veg (sounds like the veg in vegetable) v. relax and do nothing
dude, man n. person, man
all-nighter n. studying all night
cool adj. good, fashionable
gross, nasty adj. disgusting
pig out v. eat a lot, overeat
screw up v. make a mistake
awesome adj. great

Exercise 1

Edit the business e-mail by replacing any slang words and phrases with more formal language.

Dear Ms. O’Connor:

I am writing to follow up on my interview from last week. First of all, it was awesome to meet you. You are a really cool lady. I believe I would be a pro at all the stuff you mentioned that would be required of me in this job. I am not a workaholic, but I do work hard and “take care of business.” Haha. Please contact me if you have any questions or concerns.

Sincerely,

M. Ernest Anderson

Idioms

IdiomsExpressions that have a meaning different from the dictionary definitions of the individual words that make them up. are expressions that have a meaning different from the dictionary definitions of the individual words in the expression. Because English contains many idioms, nonnative English speakers have difficulties making logical sense of idioms and idiomatic expressions. The more you are exposed to English, however, the more idioms you will come to understand. Until then, memorizing the more common idioms may be of some help.

Table 5.18 Idioms

Idiom Definition
a blessing in disguise a good thing you do not recognize at first
a piece of cake easy to do
better late than never it is better to do something late than not at all
get over it recover from something (like a perceived insult)
I have no idea I don’t know
not a chance it will definitely not happen
on pins and needles very nervous about something that is happening
on top of the world feeling great
pulling your leg making a joke by tricking another person
the sky is the limit the possibilities are endless

What if you come across an idiom that you do not understand? There are clues that can help you. They are called context cluesWords or phrases in a text that help clarify the meaning of an unfamiliar word.. Context clues are words or phrases around the unknown word or phrase that may help you decipher its meaning.

  1. Definition or explanation clue. An idiom may be explained immediately after its use.

    Sentence: I felt like I was sitting on pins and needles I was so nervous.

  2. Restatement or synonym clues. An idiom may be simplified or restated.

    Sentence: The young girl felt as though she had been sent to the dog house when her mother punished her for fighting in school.

  3. Contrast or Antonym clues. An idiom may be clarified by a contrasting phrase or antonym that is near it.

    Sentence: Chynna thought the 5k marathon would be a piece of cake, but it turned out to be very difficult.

Pay attention to the signal word but, which tells the reader that an opposite thought or concept is occurring.

Key Takeaways

  • Informal language is not appropriate in formal writing or speaking contexts.
  • Slang and idioms might not make logical sense to nonnative speakers of English.
  • It is good to be aware of slang and idioms so they do not appear in your formal writing.

Writing Application

Write a short paragraph about yourself to a friend. Write another paragraph about yourself to an employer. Examine and discuss the differences in language between the two paragraphs.

5.9 Help for English Language Learners: End-of-Chapter Exercises

Learning Objectives

  1. Use the skills you have learned in the chapter.
  2. Work collaboratively with other students.

Exercises

  1. On a separate sheet of paper, create questions from the following sentences.

    1. My daughter will have to think about her college options.
    2. Otto is waiting in the car for his girlfriend.
    3. The article talks about conserving energy.
    4. We need to reduce our needs.
    5. Rusha is always complaining about her work.
  2. Underline the prepositional phrase in each of the following sentences.

    1. Monica told us about her trip.
    2. I hope we have sunshine throughout the summer.
    3. The panther climbed up the tree.
    4. The little boy was standing behind his mother’s legs.
    5. We stayed awake until dawn.
  3. Place the following sets of adjectives in the correct order before the noun.

    1. eyes: black, mesmerizing
    2. jacket: vintage, orange, suede
    3. pineapple: ripe, yellow, sweet
    4. vacation: fun, skiing
    5. movie: hilarious, independent
  4. On a separate sheet of paper, rewrite the positive sentences as negative sentences. Be sure to keep the sentences in the present tense.

    1. Sometimes I work on Saturdays.
    2. The garden attracts butterflies and bees.
    3. He breathes loudly at night.
    4. I chew on blades of grass in the summer time.
    5. I communicate well with my husband.
  5. On a separate sheet of paper, rewrite the following paragraph by correcting the double negatives.

    That morning it was so hot Forrest felt like he couldn’t hardly breathe. Ain’t nothing would get him out the door into that scorching heat. Then he remembered his dog, Zeus, who started whining right then. Zeus was whining and barking so much that Forrest didn’t have no choice but to get off the couch and face the day. That dog didn’t do nothing but sniff around the bushes and try to stay in the shade while Forrest was sweating in the sun holding the leash. He couldn’t not wait for winter to come.

Collaboration

Once you have found all the errors you can, please share with a classmate and compare your answers. Did your partner find an error you missed? Did you find an error your partner missed? Compare with your instructor’s answers.

Chapter 4: Working with Words: Which Word Is Right?

4.1 Commonly Confused Words

Learning Objectives

  1. Identify commonly confused words.
  2. Use strategies to avoid commonly confused words.

Just as a mason uses bricks to build sturdy homes, writers use words to build successful documents. Consider the construction of a building. Builders need to use tough, reliable materials to build a solid and structurally sound skyscraper. From the foundation to the roof and every floor in between, every part is necessary. Writers need to use strong, meaningful words from the first sentence to the last and in every sentence in between.

You already know many words that you use everyday as part of your writing and speaking vocabularyA collection of spoken and written words used by individuals or groups.. You probably also know that certain words fit better in certain situations. Letters, e-mails, and even quickly jotted grocery lists require the proper selection of vocabulary. Imagine you are writing a grocery list to purchase the ingredients for a recipe but accidentally write down cilantro when the recipe calls for parsley. Even though cilantro and parsley look remarkably alike, each produces a very different effect in food. This seemingly small error could radically alter the flavor of your dish!

Having a solid everyday vocabulary will help you while writing, but learning new words and avoiding common word errors will make a real impression on your readers. Experienced writers know that deliberate, careful word selection and usage can lead to more polished, more meaningful work. This chapter covers word choice and vocabulary-building strategies that will improve your writing.

Commonly Confused Words

Some words in English cause trouble for speakers and writers because these words share a similar pronunciation, meaning, or spelling with another word. These words are called commonly confused wordsWords that share a similar pronunciation, meaning, or spelling.. For example, read aloud the following sentences containing the commonly confused words new and knew:

I liked her new sweater.

I knew she would wear that sweater today.

These words may sound alike when spoken, but they carry entirely different usages and meanings. New is an adjective that describes the sweater, and knew is the past tense of the verb to know. To read more about adjectives, verbs, and other parts of speech see Chapter 2 “Writing Basics: What Makes a Good Sentence?”.

Recognizing Commonly Confused Words

New and knew are just two of the words that can be confusing because of their similarities. Familiarize yourself with the following list of commonly confused words. Recognizing these words in your own writing and in other pieces of writing can help you choose the correct word.

Commonly Confused Words

A, An, And

  • A (article). Used before a word that begins with a consonant.

    a key, a mouse, a screen

  • An (article). Used before a word that begins with a vowel.

    an airplane, an ocean, an igloo

  • And (conjunction). Connects two or more words together.

    peanut butter and jelly, pen and pencil, jump and shout

Accept, Except

  • Accept (verb). Means to take or agree to something offered.

    They accepted our proposal for the conference.

  • Except (conjunction). Means only or but.

    We could fly there except the tickets cost too much.

Affect, Effect

  • Affect (verb). Means to create a change.

    Hurricane winds affect the amount of rainfall.

  • Effect (noun). Means an outcome or result.

    The heavy rains will have an effect on the crop growth.

Are, Our

  • Are (verb). A conjugated form of the verb to be.

    My cousins are all tall and blonde.

  • Our (pronoun). Indicates possession, usually follows the pronoun we.

    We will bring our cameras to take pictures.

By, Buy

  • By (preposition). Means next to.

    My glasses are by the bed.

  • Buy (verb). Means to purchase.

    I will buy new glasses after the doctor’s appointment.

Its, It’s

  • Its (pronoun). A form of it that shows possession.

    The butterfly flapped its wings.

  • It’s (contraction). Joins the words it and is.

    It’s the most beautiful butterfly I have ever seen.

Know, No

  • Know (verb). Means to understand or possess knowledge.

    I know the male peacock sports the brilliant feathers.

  • No. Used to make a negative.

    I have no time to visit the zoo this weekend.

Loose, Lose

  • Loose (adjective). Describes something that is not tight or is detached.

    Without a belt, her pants are loose on her waist.

  • Lose (verb). Means to forget, to give up, or to fail to earn something.

    She will lose even more weight after finishing the marathon training.

Of, Have

  • Of (preposition). Means from or about.

    I studied maps of the city to know where to rent a new apartment.

  • Have (verb). Means to possess something.

    I have many friends to help me move.

  • Have (linking verb). Used to connect verbs.

    I should have helped her with that heavy box.

Quite, Quiet, Quit

  • Quite (adverb). Means really or truly.

    My work will require quite a lot of concentration.

  • Quiet (adjective). Means not loud.

    I need a quiet room to complete the assignments.

  • Quit (verb). Means to stop or to end.

    I will quit when I am hungry for dinner.

Right, Write

  • Right (adjective). Means proper or correct.

    When bowling, she practices the right form.

  • Right (adjective). Also means the opposite of left.

    The ball curved to the right and hit the last pin.

  • Write (verb). Means to communicate on paper.

    After the team members bowl, I will write down their scores.

Set, Sit

  • Set (verb). Means to put an item down.

    She set the mug on the saucer.

  • Set (noun). Means a group of similar objects.

    All the mugs and saucers belonged in a set.

  • Sit (verb). Means to lower oneself down on a chair or another place

    I’ll sit on the sofa while she brews the tea.

Suppose, Supposed

  • Suppose (verb). Means to think or to consider

    I suppose I will bake the bread, because no one else has the recipe.

  • Suppose (verb). Means to suggest.

    Suppose we all split the cost of the dinner.

  • Supposed (verb). The past tense form of the verb suppose, meaning required or allowed.

    She was supposed to create the menu.

Than, Then

  • Than (conjunction). Used to connect two or more items when comparing

    Registered nurses require less schooling than doctors.

  • Then (adverb). Means next or at a specific time.

    Doctors first complete medical school and then obtain a residency.

Their, They’re, There

  • Their (pronoun). A form of they that shows possession.

    The dog walker feeds their dogs everyday at two o’clock.

  • They’re (contraction). Joins the words they and are.

    They’re the sweetest dogs in the neighborhood.

  • There (adverb). Indicates a particular place.

    The dogs’ bowls are over there, next to the pantry.

  • There (pronoun). Indicates the presence of something

    There are more treats if the dogs behave.

To, Two, Too

  • To (preposition). Indicates movement.

    Let’s go to the circus.

  • To. A word that completes an infinitive verb.

    to play, to ride, to watch.

  • Two. The number after one. It describes how many.

    Two clowns squirted the elephants with water.

  • Too (adverb). Means also or very.

    The tents were too loud, and we left.

Use, Used

  • Use (verb). Means to apply for some purpose.

    We use a weed whacker to trim the hedges.

  • Used. The past tense form of the verb to use

    He used the lawnmower last night before it rained.

  • Used to. Indicates something done in the past but not in the present

    He used to hire a team to landscape, but now he landscapes alone.

Who’s, Whose

  • Who’s (contraction). Joins the words who and either is or has.

    Who’s the new student? Who’s met him?

  • Whose (pronoun). A form of who that shows possession.

    Whose schedule allows them to take the new student on a campus tour?

Your, You’re

  • Your (pronoun). A form of you that shows possession.

    Your book bag is unzipped.

  • You’re (contraction). Joins the words you and are.

    You’re the girl with the unzipped book bag.

The English language contains so many words; no one can say for certain how many words exist. In fact, many words in English are borrowed from other languages. Many words have multiple meanings and forms, further expanding the immeasurable number of English words. Although the list of commonly confused words serves as a helpful guide, even these words may have more meanings than shown here. When in doubt, consult an expert: the dictionary!

Exercise 1

Complete the following sentences by selecting the correct word.

  1. My little cousin turns ________(to, too, two) years old tomorrow.
  2. The next-door neighbor’s dog is ________(quite, quiet, quit) loud. He barks constantly throughout the night.
  3. ________(Your, You’re) mother called this morning to talk about the party.
  4. I would rather eat a slice of chocolate cake ________(than, then) eat a chocolate muffin.
  5. Before the meeting, he drank a cup of coffee and ________(than, then) brushed his teeth.
  6. Do you have any ________(loose, lose) change to pay the parking meter?
  7. Father must ________(have, of) left his briefcase at the office.
  8. Before playing ice hockey, I was ________(suppose, supposed) to read the contract, but I only skimmed it and signed my name quickly, which may ________(affect, effect) my understanding of the rules.
  9. Tonight she will ________(set, sit) down and ________(right, write) a cover letter to accompany her résumé and job application.
  10. It must be fall, because the leaves ________(are, our) changing, and ________(it’s, its) getting darker earlier.

Strategies to Avoid Commonly Confused Words

When writing, you need to choose the correct word according to its spelling and meaning in the context. Not only does selecting the correct word improve your vocabulary and your writing, but it also makes a good impression on your readers. It also helps reduce confusion and improve clarity. The following strategies can help you avoid misusing confusing words.

  1. Use a dictionary. Keep a dictionary at your desk while you write. Look up words when you are uncertain of their meanings or spellings. Many dictionaries are also available online, and the Internet’s easy access will not slow you down. Check out your cell phone or smartphone to see if a dictionary app is available.
  2. Keep a list of words you commonly confuse. Be aware of the words that often confuse you. When you notice a pattern of confusing words, keep a list nearby, and consult the list as you write. Check the list again before you submit an assignment to your instructor.
  3. Study the list of commonly confused words. You may not yet know which words confuse you, but before you sit down to write, study the words on the list. Prepare your mind for working with words by reviewing the commonly confused words identified in this chapter.

Tip

Figure 4.1 A Commonly Misused Word on a Public Sign

Commonly confused words appear in many locations, not just at work or at school. Be on the lookout for misused words wherever you find yourself throughout the day. Make a mental note of the error and remember its correction for your own pieces of writing.

Writing at Work

All employers value effective communication. From an application to an interview to the first month on the job, employers pay attention to your vocabulary. You do not need a large vocabulary to succeed, but you do need to be able to express yourself clearly and avoid commonly misused words.

When giving an important presentation on the effect of inflation on profit margins, you must know the difference between effect and affect and choose the correct word. When writing an e-mail to confirm deliveries, you must know if the shipment will arrive in to days, too days, or two days. Confusion may arise if you choose the wrong word.

Consistently using the proper words will improve your communication and make a positive impression on your boss and colleagues.

Exercise 2

The following paragraph contains eleven errors. Find each misused word and correct it by adding the proper word.

The original United States Declaration of Independence sets in a case at the Rotunda for the Charters of Freedom as part of the National Archives in Washington, DC. Since 1952, over one million visitors each year of passed through the Rotunda too snap a photograph to capture they’re experience. Although signs state, “No Flash Photography,” forgetful tourists leave the flash on, an a bright light flickers for just a millisecond. This millisecond of light may not seem like enough to effect the precious document, but supposed how much light could be generated when all those milliseconds are added up. According to the National Archives administrators, its enough to significantly damage the historic document. So, now, the signs display quit a different message: “No Photography.” Visitors continue to travel to see the Declaration that began are country, but know longer can personal pictures serve as mementos. The administrators’ compromise, they say, is a visit to the gift shop for a preprinted photograph.

Collaboration

Please share with a classmate and compare your answers.

Key Takeaways

  • In order to write accurately, it is important for writers to be aware of commonly confused words.
  • Although commonly confused words may look alike or sound alike, their meanings are very different.
  • Consulting the dictionary is one way to make sure you are using the correct word in your writing. You may also keep a list of commonly confused words nearby when you write or study the chart in this book.
  • Choosing the proper words leaves a positive impression on your readers.

Writing Application

Review the latest assignment you completed for school or for work. Does it contain any commonly confused words? Circle each example and use the circled words to begin your own checklist of commonly confused words. Continue to add to your checklist each time you complete an assignment and find a misused word.

4.2 Spelling

Learning Objectives

  1. Identify common spelling rules.
  2. Identify commonly misused homonyms.
  3. Identify commonly misspelled words.

One essential aspect of good writing is accurate spelling. With computer spell checkers, spelling may seem simple, but these programs fail to catch every error. Spell checkers identify some errors, but writers still have to consider the flagged words and suggested replacements. Writers are still responsible for the errors that remain.

For example, if the spell checker highlights a word that is misspelled and gives you a list of alternative words, you may choose a word that you never intended even though it is spelled correctly. This can change the meaning of your sentence. It can also confuse readers, making them lose interest. Computer spell checkers are useful editing tools, but they can never replace human knowledge of spelling rules, homonyms, and commonly misspelled words.

Common Spelling Rules

The best way to master new words is to understand the key spelling rules. Keep in mind, however, that some spelling rules carry exceptions. A spell checker may catch these exceptions, but knowing them yourself will prepare you to spell accurately on the first try. You may want to try memorizing each rule and its exception like you would memorize a rhyme or lyrics to a song.

Write i before e except after c, or when pronounced ay like “neighbor” or “weigh.”

  • achieve, niece, alien
  • receive, deceive

When words end in a consonant plus y, drop the y and add an i before adding another ending.

  • happy + er = happier
  • cry + ed = cried

When words end in a vowel plus y, keep the y and add the ending.

  • delay + ed = delayed

Memorize the following exceptions to this rule: day, lay, say, pay = daily, laid, said, paid

When adding an ending that begins with a vowel, such as –able, –ence, –ing, or –ity, drop the last e in a word.

  • write + ing = writing
  • pure + ity = purity

When adding an ending that begins with a consonant, such as –less, –ment, or –ly, keep the last e in a word.

  • hope + less = hopeless
  • advertise + ment = advertisement

For many words ending in a consonant and an o, add –s when using the plural form.

  • photo + s = photos
  • soprano + s = sopranos

Add –es to words that end in s, ch, sh, and x.

  • church + es = churches
  • fax + es = faxes

Exercise 1

Identify and correct the nine misspelled words in the following paragraph.

Sherman J. Alexie Jr. was born in October 1966. He is a Spokane/Coeur d’Alene Indian and an American writer, poet, and filmmaker. Alexie was born with hydrocephalus, or water on the brain. This condition led doctors to predict that he would likly suffer long-term brain damage and possibly mental retardation. Although Alexie survived with no mental disabilitys, he did suffer other serious side effects from his condition that plagud him throughout his childhood. Amazingly, Alexie learned to read by the age of three, and by age five he had read novels such as John Steinbeck’s The Grapes of Wrath. Raised on an Indian reservation, Alexie often felt aleinated from his peers due to his avid love for reading and also from the long-term effects of his illness, which often kept him from socializeing with his peers on the reservation. The reading skills he displaid at such a young age foreshadowed what he would later become. Today Alexie is a prolific and successful writer with several story anthologeis to his credit, noteably The Lone Ranger and Tonto Fistfight in Heaven and The Toughest Indian in the World. Most of his fiction is about contemporary Native Americans who are influenced by pop culture and pow wows and everything in between. His work is sometimes funny but always thoughtful and full of richness and depth. Alexie also writes poetry, novels, and screenplays. His latest collection of storys is called War Dances, which came out in 2009.

Collaboration

Please share with a classmate and compare your answers.

Tip

Eight Tips to Improve Spelling Skills

  1. Read the words in your assignment carefully, and avoid skimming over the page. Focusing on your written assignment word by word will help you pay close attention to each word’s spelling. Skimming quickly, you may overlook misspelled words.
  2. Use mnemonic devices to remember the correct spelling of words. Mnemonic devices, or memory techniques and learning aids, include inventive sayings or practices that help you remember. For example, the saying “It is important to be a beautiful person inside and out” may help you remember that beautiful begins with “be a.” The practice of pronouncing the word Wednesday Wed-nes-day may help you remember how to spell the word correctly.
  3. Use a dictionary. Many professional writers rely on the dictionary—either in print or online. If you find it difficult to use a regular dictionary, ask your instructor to help you find a “poor speller’s dictionary.”
  4. Use your computer’s spell checker. The spell checker will not solve all your spelling problems, but it is a useful tool. See the introduction to this section for cautions about spell checkers.
  5. Keep a list of frequently misspelled words. You will often misspell the same words again and again, but do not let this discourage you. All writers struggle with the spellings of certain words; they become aware of their spelling weaknesses and work to improve. Be aware of which words you commonly misspell, and you can add them to a list to learn to spell them correctly.
  6. Look over corrected papers for misspelled words. Add these words to your list and practice writing each word four to five times each. Writing teachers will especially notice which words you frequently misspell, and it will help you excel in your classes if they see your spelling improve.
  7. Test yourself with flashcards. Sometimes the old-fashioned methods are best, and for spelling, this tried and true technique has worked for many students. You can work with a peer or alone.
  8. Review the common spelling rules explained in this chapter. Take the necessary time to master the material; you may return to the rules in this chapter again and again, as needed.

Tip

Remember to focus on spelling during the editing and revising step of the writing process. Start with the big ideas such as organizing your piece of writing and developing effective paragraphs, and then work your way down toward the smaller—but equally important—details like spelling and punctuation. To read more about the writing process and editing and revising, see Chapter 8 “The Writing Process: How Do I Begin?”.

Homonyms

HomonymsA word that sounds like another word but has a different meaning. are words that sound like one another but have different meanings.

Commonly Misused Homonyms

Principle, Principal

  • Principle (noun). A fundamental concept that is accepted as true.

    The principle of human equality is an important foundation for all nations.

  • Principal (noun). The original amount of debt on which interest is calculated.

    The payment plan allows me to pay back only the principal amount, not any compounded interest.

  • Principal (noun). A person who is the main authority of a school.

    The principal held a conference for both parents and teachers.

Where, Wear, Ware

  • Where (adverb). The place in which something happens.

    Where is the restaurant?

  • Wear (verb). To carry or have on the body.

    I will wear my hiking shoes when go on a climb tomorrow morning.

  • Ware (noun). Articles of merchandise or manufacture (usually, wares).

    When I return from shopping, I will show you my wares.

Lead, Led

  • Lead (noun). A type of metal used in pipes and batteries.

    The lead pipes in my homes are old and need to be replaced.

  • Led (verb). The past tense of the verb lead.

    After the garden, she led the patrons through the museum.

Which, Witch

  • Which (pronoun). Replaces one out of a group.

    Which apartment is yours?

  • Witch (noun). A person who practices sorcery or who has supernatural powers.

    She thinks she is a witch, but she does not seem to have any powers.

Peace, Piece

  • Peace (noun). A state of tranquility or quiet.

    For once, there was peace between the argumentative brothers.

  • Piece (noun). A part of a whole.

    I would like a large piece of cake, thank you.

Passed, Past

  • Passed (verb). To go away or move.

    He passed the slower cars on the road using the left lane.

  • Past (noun). Having existed or taken place in a period before the present.

    The argument happened in the past, so there is no use in dwelling on it.

Lessen, Lesson

  • Lessen (verb). To reduce in number, size, or degree.

    My dentist gave me medicine to lessen the pain of my aching tooth.

  • Lesson (noun). A reading or exercise to be studied by a student.

    Today’s lesson was about mortgage interest rates.

Patience, Patients

  • Patience (noun). The capacity of being patient (waiting for a period of time or enduring pains and trials calmly).

    The novice teacher’s patience with the unruly class was astounding.

  • Patients (plural noun). Individuals under medical care.

    The patients were tired of eating the hospital food, and they could not wait for a home-cooked meal.

Sees, Seas, Seize

  • Sees (verb). To perceive with the eye.

    He sees a whale through his binoculars.

  • Seas (plural noun). The plural of sea, a great body of salt water.

    The tidal fluctuation of the oceans and seas are influenced by the moon.

  • Seize (verb). To possess or take by force.

    The king plans to seize all the peasants’ land.

Threw, Through

  • Threw (verb). The past tense of throw.

    She threw the football with perfect form.

  • Through (preposition). A word that indicates movement.

    She walked through the door and out of his life.

Exercise 2

Complete the following sentences by selecting the correct homonym.

  1. Do you agree with the underlying ________(principle, principal) that ensures copyrights are protected in the digital age?
  2. I like to ________(where, wear, ware) unique clothing from thrift stores that do not have company logos on them.
  3. Marjorie felt like she was being ________(led, lead) on a wild goose chase, and she did not like it one bit.
  4. Serina described ________(witch, which) house was hers, but now that I am here, they all look the same.
  5. Seeing his friend without a lunch, Miguel gave her a ________(peace, piece) of his apple.
  6. Do you think that it is healthy for mother to talk about the ________(passed, past) all the time?
  7. Eating healthier foods will ________(lessen, lesson) the risk of heart disease.
  8. I know it sounds cliché, but my father had the ________(patients, patience) of a saint.
  9. Daniela ________(sees, seas, seize) possibilities in the bleakest situations, and that it is why she is successful.
  10. Everyone goes ________(through, threw) hardships in life regardless of who they are.

Commonly Misspelled Words

Below is a list of commonly misspelled words. You probably use these words every day in either speaking or writing. Each word has a segment in bold type, which indicates the problem area of the word that is often spelled incorrectly. If you can, use this list as a guide before, during, and after you write.

Tip

Use the following two tricks to help you master these troublesome words:

  1. Copy each word a few times and underline the problem area.
  2. Copy the words onto flash cards and have a friend test you.

Table 4.1 Commonly Misspelled Words

across disappoint integration particular separate
address disapprove intelligent perform similar
answer doesn’t interest perhaps since
argument eighth interfere personnel speech
athlete embarrass jewelry possess strength
beginning environment judgment possible success
behavior exaggerate knowledge prefer surprise
calendar familiar maintain prejudice taught
career finally mathematics privilege temperature
conscience government meant probably thorough
crowded grammar necessary psychology thought
definite height nervous pursue tired
describe illegal occasion reference until
desperate immediately opinion rhythm weight
different important optimist ridiculous written

Exercise 3

Identify and correct the ten commonly misspelled words in the following paragraph.

Brooklyn is one of the five boroughs that make up New York City. It is located on the eastern shore of Long Island directly accross the East River from the island of Manhattan. Its beginings stretch back to the sixteenth century when it was founded by the Dutch who originally called it “Breuckelen.” Immedietely after the Dutch settled Brooklyn, it came under British rule. However, neither the Dutch nor the British were Brooklyn’s first inhabitants. When European settlers first arrived, Brooklyn was largely inhabited by the Lenapi, a collective name for several organized bands of Native American people who settled a large area of land that extended from upstate New York through the entire state of New Jersey. They are sometimes referred to as the Delaware Indians. Over time, the Lenapi succumbed to European diseases or conflicts between European settlers or other Native American enemies. Finalley they were pushed out of Brooklyn completely by the British.

In 1776, Brooklyn was the site of the first importent battle of the American Revolution known as the Battle of Brooklyn. The colonists lost this battle, which was led by George Washington, but over the next two years they would win the war, kicking the British out of the colonies once and for all.

By the end of the nineteenth century, Brooklyn grew to be a city in its own right. The completion of the Brooklyn Bridge was an ocasion for celebration; transportation and commerce between Brooklyn and Manhattan now became much easier. Eventually, in 1898, Brooklyn lost its seperate identity as an independent city and became one of five boroughs of New York City. However, in some people’s opinien, the intagration into New York City should have never happened; they though Brooklyn should have remained an independent city.

Collaboration

Please share with a classmate and compare your answers.

Writing at Work

In today’s job market, writing e-mails has become a means by which many people find employment. E-mails to prospective employers require thoughtful word choice, accurate spelling, and perfect punctuation. Employers’ inboxes are inundated with countless e-mails daily. If even the subject line of an e-mail contains a spelling error, it will likely be overlooked and someone else’s e-mail will take priority.

The best thing to do after you proofread an e-mail to an employer and run the spell checker is to have an additional set of eyes go over it with you; one of your teachers may be able to read the e-mail and give you suggestions for improvement. Most colleges and universities have writing centers, which may also be able to assist you.

Key Takeaways

  • Accurate, error-free spelling enhances your credibility with the reader.
  • Mastering the rules of spelling may help you become a better speller.
  • Knowing the commonly misused homonyms may prevent spelling errors.
  • Studying the list of commonly misspelled words in this chapter, or studying a list of your own, is one way to improve your spelling skills.

Writing Application

What is your definition of a successful person? Is it based on a person’s profession or is it based on his or her character? Perhaps success means a combination of both. In one paragraph, describe in detail what you think makes a person successful. When you are finished, proofread your work for spelling errors. Exchange papers with a partner and read each other’s work. See if you catch any spelling errors that your partner missed.

4.3 Word Choice

Learning Objectives

  1. Identify the reasons why using a dictionary and thesaurus is important when writing.
  2. Identify how to use proper connotations.
  3. Identify how to avoid using slang, clichés, and overly general words in your writing.

Effective writing involves making conscious choices with words. When you prepare to sit down to write your first draft, you likely have already completed some freewriting exercises, chosen your topic, developed your thesis statement, written an outline, and even selected your sources. When it is time to write your first draft, start to consider which words to use to best convey your ideas to the reader.

Some writers are picky about word choice as they start drafting. They may practice some specific strategies, such as using a dictionary and thesaurus, using words and phrases with proper connotations, and avoiding slang, clichés, and overly general words.

Once you understand these tricks of the trade, you can move ahead confidently in writing your assignment. Remember, the skill and accuracy of your word choice is a major factor in developing your writing style. Precise selection of your words will help you be more clearly understood—in both writing and speaking.

Using a Dictionary and Thesaurus

Even professional writers need help with the meanings, spellings, pronunciations, and uses of particular words. In fact, they rely on dictionaries to help them write better. No one knows every word in the English language and their multiple uses and meanings, so all writers, from novices to professionals, can benefit from the use of dictionaries.

Most dictionaries provide the following information:

  • Spelling. How the word and its different forms are spelled.
  • Pronunciation. How to say the word.
  • Part of speech. The function of the word.
  • Definition. The meaning of the word.
  • Synonyms. Words that have similar meanings.
  • Etymology. The history of the word.

Look at the following sample dictionary entry and see which of the preceeding information you can identify:

myth, mith, n. [Gr. mythos, a word, a fable, a legend.] A fable or legend embodying the convictions of a people as to their gods or other divine beings, their own beginnings and early history and the heroes connected with it, or the origin of the world; any invented story; something or someone having no existence in fact.—myth • ic, myth • i • cal

Like a dictionary, a thesaurus is another indispensable writing tool. A thesaurus gives you a list of synonyms, words that have the same (or very close to the same) meaning as another word. It also lists antonyms, words with the opposite meaning of the word. A thesaurus will help you when you are looking for the perfect word with just the right meaning to convey your ideas. It will also help you learn more words and use the ones you already know more correctly.

precocious adj, She’s such a precocious little girl!: uncommonly smart, mature, advanced, smart, bright, brilliant, gifted, quick, clever, apt.

Ant. slow, backward, stupid.

Using Proper Connotations

A denotationThe dictionary definition of a word. is the dictionary definition of a word. A connotationThe emotional or cultural meaning attached to a word., on the other hand, is the emotional or cultural meaning attached to a word. The connotation of a word can be positive, negative, or neutral. Keep in mind the connotative meaning when choosing a word.

Scrawny

  • Denotation: Exceptionally thin and slight or meager in body or size.
  • Word used in a sentence: Although he was a premature baby and a scrawny child, Martin has developed into a strong man.
  • Connotation: (Negative) In this sentence the word scrawny may have a negative connotation in the readers’ minds. They might find it to mean a weakness or a personal flaw; however, the word fits into the sentence appropriately.

Skinny

  • Denotation: Lacking sufficient flesh, very thin.
  • Word used in a sentence: Skinny jeans have become very fashionable in the past couple of years.
  • Connotation: (Positive) Based on cultural and personal impressions of what it means to be skinny, the reader may have positive connotations of the word skinny.

Lean

  • Denotation: Lacking or deficient in flesh; containing little or no fat.
  • Word used in a sentence: My brother has a lean figure, whereas I have a more muscular build.
  • Connotation: (Neutral) In this sentence, lean has a neutral connotation. It does not call to mind an overly skinny person like the word scrawny, nor does imply the positive cultural impressions of the word skinny. It is merely a neutral descriptive word.

Notice that all the words have a very similar denotation; however, the connotations of each word differ.

Exercise 1

In each of the following items, you will find words with similar denotations. Identify the words’ connotations as positive, negative, or neutral by writing the word in the appropriate box. Copy the chart onto your own piece of paper.

  1. curious, nosy, interested
  2. lazy, relaxed, slow
  3. courageous, foolhardy, assured
  4. new, newfangled, modern
  5. mansion, shack, residence
  6. spinster, unmarried woman, career woman
  7. giggle, laugh, cackle
  8. boring, routine, prosaic
  9. noted, notorious, famous
  10. assertive, confident, pushy
Positive Negative Neutral
           
   
   
   
   
   
   
   
   
   

Avoiding Slang

SlangInformal words that are considered nonstandard English. describes informal words that are considered nonstandard English. Slang often changes with passing fads and may be used by or familiar to only a specific group of people. Most people use slang when they speak and in personal correspondences, such as e-mails, text messages, and instant messages. Slang is appropriate between friends in an informal context but should be avoided in formal academic writing.

Writing at Work

Frequent exposure to media and popular culture has desensitized many of us to slang. In certain situations, using slang at work may not be problematic, but keep in mind that words can have a powerful effect. Slang in professional e-mails or during meetings may convey the wrong message or even mistakenly offend someone.

Exercise 2

Edit the following paragraph by replacing the slang words and phrases with more formal language. Rewrite the paragraph on your own sheet of paper.

I felt like such an airhead when I got up to give my speech. As I walked toward the podium, I banged my knee on a chair. Man, I felt like such a klutz. On top of that, I kept saying “like” and “um,” and I could not stop fidgeting. I was so stressed out about being up there. I feel like I’ve been practicing this speech 24/7, and I still bombed. It was ten minutes of me going off about how we sometimes have to do things we don’t enjoy doing. Wow, did I ever prove my point. My speech was so bad I’m surprised that people didn’t boo. My teacher said not to sweat it, though. Everyone gets nervous his or her first time speaking in public, and she said, with time, I would become a whiz at this speech giving stuff. I wonder if I have the guts to do it again.

Collaboration

Please share with a classmate and compare your answers.

Avoiding Clichés

ClichésA descriptive expression that has lost its effectiveness because it is overused. are descriptive expressions that have lost their effectiveness because they are overused. Writing that uses clichés often suffers from a lack of originality and insight. Avoiding clichés in formal writing will help you write in original and fresh ways.

  • Clichéd: Whenever my brother and I get into an argument, he always says something that makes my blood boil.
  • Plain: Whenever my brother and I get into an argument, he always says something that makes me really angry.
  • Original: Whenever my brother and I get into an argument, he always says something that makes me want to go to the gym and punch the bag for a few hours.

Tip

Think about all the cliché phrases that you hear in popular music or in everyday conversation. What would happen if these clichés were transformed into something unique?

Exercise 3

On your own sheet of paper, revise the following sentences by replacing the clichés with fresh, original descriptions.

  1. She is writing a memoir in which she will air her family’s dirty laundry.
  2. Fran had an ax to grind with Benny, and she planned to confront him that night at the party.
  3. Mr. Muller was at his wit’s end with the rowdy class of seventh graders.
  4. The bottom line is that Greg was fired because he missed too many days of work.
  5. Sometimes it is hard to make ends meet with just one paycheck.
  6. My brain is fried from pulling an all-nighter.
  7. Maria left the dishes in the sink all week to give Jeff a taste of his own medicine.
  8. While they were at the carnival Janice exclaimed, “Time sure does fly when you are having fun!”
  9. Jeremy became tongue-tied after the interviewer asked him where he saw himself in five years.
  10. Jordan was dressed to the nines that night.

Avoiding Overly General Words

Specific words and images make your writing more interesting to read. Whenever possible, avoid overly general words in your writing; instead, try to replace general language with particular nouns, verbs, and modifiers that convey details and that bring yours words to life. Add words that provide color, texture, sound, and even smell to your writing.

  • General: My new puppy is cute.
  • Specific: My new puppy is a ball of white fuzz with the biggest black eyes I have ever seen.
  • General: My teacher told us that plagiarism is bad.
  • Specific: My teacher, Ms. Atwater, created a presentation detailing exactly how plagiarism is illegal and unethical.

Exercise 4

Revise the following sentences by replacing the overly general words with more precise and attractive language. Write the new sentences on your own sheet of paper.

  1. Reilly got into her car and drove off.
  2. I would like to travel to outer space because it would be amazing.
  3. Jane came home after a bad day at the office.
  4. I thought Milo’s essay was fascinating.
  5. The dog walked up the street.
  6. The coal miners were tired after a long day.
  7. The tropical fish are pretty.
  8. I sweat a lot after running.
  9. The goalie blocked the shot.
  10. I enjoyed my Mexican meal.

Key Takeaways

  • Using a dictionary and thesaurus as you write will improve your writing by improving your word choice.
  • Connotations of words may be positive, neutral, or negative.
  • Slang, clichés, and overly general words should be avoided in academic writing.

Writing Application

Review a piece of writing that you have completed for school. Circle any sentences with slang, clichés, or overly general words and rewrite them using stronger language.

4.4 Prefixes and Suffixes

Learning Objectives

  1. Identify the meanings of common prefixes.
  2. Become familiar with common suffix rules.

The English language contains an enormous and ever-growing number of words. Enhancing your vocabulary by learning new words can seem overwhelming, but if you know the common prefixes and suffixes of English, you will understand many more words.

Mastering common prefixes and suffixes is like learning a code. Once you crack the code, you can not only spell words more correctly but also recognize and perhaps even define unfamiliar words.

Prefixes

A prefixA word part added to the beginning of a word to create a new meaning. is a word part added to the beginning of a word to create a new meaning. Study the common prefixes in Table 4.2 “Common Prefixes”.

Tip

The main rule to remember when adding a prefix to a word is not to add letters or leave out any letters. See Table 4.2 “Common Prefixes” for examples of this rule.

Table 4.2 Common Prefixes

Prefix Meaning Example
dis not, opposite of dis + satisfied = dissatisfied
mis wrongly mis + spell = misspell
un not un + acceptable = unacceptable
re again re + election = reelection
inter between inter + related = interrelated
pre before pre + pay = prepay
non not non + sense = nonsense
super above super + script = superscript
sub under sub + merge = submerge
anti against, opposing anti + bacterial = antibacterial

Exercise 1

Identify the five words with prefixes in the following paragraph, and write their meanings on a separate sheet of paper.

At first, I thought one of my fuzzy, orange socks disappeared in the dryer, but I could not find it in there. Because it was my favorite pair, nothing was going to prevent me from finding that sock. I looked all around my bedroom, under the bed, on top of the bed, and in my closet, but I still could not find it. I did not know that I would discover the answer just as I gave up my search. As I sat down on the couch in the family room, my Dad was reclining on his chair. I laughed when I saw that one of his feet was orange and the other blue! I forgot that he was color-blind. Next time he does laundry I will have to supervise him while he folds the socks so that he does not accidentally take one of mine!

Collaboration

Please share with a classmate and compare your answers.

Exercise 2

Add the correct prefix to the word to complete each sentence. Write the word on your own sheet of paper.

  1. I wanted to ease my stomach ________comfort, so I drank some ginger root tea.
  2. Lenny looked funny in his ________matched shirt and pants.
  3. Penelope felt ________glamorous at the party because she was the only one not wearing a dress.
  4. My mother said those ________aging creams do not work, so I should not waste my money on them.
  5. The child’s ________standard performance on the test alarmed his parents.
  6. When my sister first saw the meteor, she thought it was a ________natural phenomenon.
  7. Even though she got an excellent job offer, Cherie did not want to ________locate to a different country.
  8. With a small class size, the students get to ________act with the teacher more frequently.
  9. I slipped on the ice because I did not heed the ________cautions about watching my step.
  10. A ________combatant is another word for civilian.

Suffixes

A suffixA word part added to the end of a word to create a new meaning. is a word part added to the end of a word to create a new meaning. Study the suffix rules in the following boxes.

Rule 1

When adding the suffixes –ness and –ly to a word, the spelling of the word does not change.

Examples:

  • dark + ness = darkness
  • scholar + ly = scholarly

Exceptions to Rule 1

When the word ends in y, change the y to i before adding –ness and –ly.

Examples:

  • ready + ly = readily
  • happy + ness = happiness

Rule 2

When the suffix begins with a vowel, drop the silent e in the root word.

Examples:

  • care + ing = caring
  • use + able = usable

Exceptions to Rule 2

When the word ends in ce or ge, keep the silent e if the suffix begins with a or o.

Examples:

  • replace + able = replaceable
  • courage + ous = courageous

Rule 3

When the suffix begins with a consonant, keep the silent e in the original word.

Examples:

  • care + ful = careful
  • care + less = careless

Exceptions to Rule 3

Examples:

  • true + ly = truly
  • argue + ment = argument

Rule 4

When the word ends in a consonant plus y, change the y to i before any suffix not beginning with i.

Examples:

  • sunny + er = sunnier
  • hurry + ing = hurrying

Rule 5

When the suffix begins with a vowel, double the final consonant only if (1) the word has only one syllable or is accented on the last syllable and (2) the word ends in a single vowel followed by a single consonant.

Examples:

  • tan + ing = tanning (one syllable word)
  • regret + ing = regretting (The accent is on the last syllable; the word ends in a single vowel followed by a single consonant.)
  • cancel + ed = canceled (The accent is not on the last syllable.)
  • prefer + ed = preferred

Exercise 3

On your own sheet of paper, write correctly the forms of the words with their suffixes.

  1. refer + ed
  2. refer + ence
  3. mope + ing
  4. approve + al
  5. green + ness
  6. benefit + ed
  7. resubmit + ing
  8. use + age
  9. greedy + ly
  10. excite + ment

Key Takeaways

  • A prefix is a word part added to the beginning of a word that changes the word’s meaning.
  • A suffix is a word part added to the end of a word that changes the word’s meaning.
  • Learning the meanings of prefixes and suffixes will help expand your vocabulary, which will help improve your writing.

Writing Application

Write a paragraph describing one of your life goals. Include five words with prefixes and five words with suffixes. Exchange papers with a classmate and circle the prefixes and suffixes in your classmate’s paper. Correct each prefix or suffix that is spelled incorrectly.

4.5 Synonyms and Antonyms

Learning Objectives

  1. Recognize how synonyms improve writing.
  2. Identify common antonyms to increase your vocabulary.

As you work with your draft, you will want to pay particular attention to the words you have chosen. Do they express exactly what you are trying to convey? Can you choose better, more effective words? Familiarity with synonyms and antonyms can be helpful in answering these questions.

Synonyms

SynonymsWords that have the same, or almost the same, meaning as another word. are words that have the same, or almost the same, meaning as another word. You can say an “easy task” or a “simple task” because easy and simple are synonyms. You can say Hong Kong is a “large city” or a “metropolis” because city and metropolis are synonyms.

However, it is important to remember that not all pairs of words in the English language are so easily interchangeable. The slight but important differences in meaning between synonyms can make a big difference in your writing. For example, the words boring and insipid may have similar meanings, but the subtle differences between the two will affect the message your writing conveys. The word insipid evokes a scholarly and perhaps more pretentious message than boring.

The English language is full of pairs of words that have subtle distinctions between them. All writers, professionals and beginners alike, face the challenge of choosing the most appropriate synonym to best convey their ideas. When you pay particular attention to synonyms in your writing, it comes across to your reader. The sentences become much more clear and rich in meaning.

Writing at Work

Any writing you do at work involves a careful choice of words. For example, if you are writing an e-mail to your employer regarding your earnings, you can use the word pay, salary, or hourly wage. There are also other synonyms to choose from. Just keep in mind that the word you choose will have an effect on the reader, so you want to choose wisely to get the desired effect.

Exercise 1

Replace the underlined words in the paragraph with appropriate synonyms. Write the new paragraph on your own sheet of paper.

When most people think of the Renaissance, they might think of artists like Michelangelo, Raphael, or Leonardo da Vinci, but they often overlook one of the very important figures of the Renaissance: Filippo Brunelleschi. Brunelleschi was born in Florence, Italy in 1377. He is considered the very best architect and engineer of the Renaissance. His impressive accomplishments are a testament to following one’s dreams, persevering in the face of obstacles, and realizing one’s vision.

The most difficult undertaking of Brunelleschi’s career was the dome of Florence Cathedral, which took sixteen years to construct. A major blow to the progress of the construction happened in 1428. Brunelleschi had designed a special ship to carry the one hundred tons of marble needed for the dome. He felt this would be the most inexpensive way to transport the marble, but the unthinkable happened. The ship went down to the bottom of the water, taking all the marble with it to the bottom of the river. Brunelleschi was really sad. Nevertheless, he did not give up. He held true to his vision of the completed dome. Filippo Brunelleschi completed construction of the dome of Florence Cathedral in 1446. His influence on artists and architects alike was felt strongly during his lifetime and can still be felt in this day and age.

Collaboration

Please share with a classmate and compare your answers.

Exercise 2

On your own sheet of paper, write a sentence with each of the following words that illustrates the specific meaning of each synonym.

  1. leave, abandon
  2. mad, insane
  3. outside, exterior
  4. poor, destitute
  5. quiet, peaceful
  6. riot, revolt
  7. rude, impolite
  8. talk, conversation
  9. hug, embrace
  10. home, residence

Collaboration

Please share with a classmate and compare your answers.

Antonyms

AntonymsWords that have the opposite meaning of a given word. are words that have the opposite meaning of a given word. The study of antonyms will not only help you choose the most appropriate word as you write; it will also sharpen your overall sense of language. Table 4.3 “Common Antonyms” lists common words and their antonyms.

Table 4.3 Common Antonyms

Word Antonym    Word Antonym
absence presence frequent seldom
accept refuse harmful harmless
accurate inaccurate horizontal vertical
advantage disadvantage imitation genuine
ancient modern inhabited uninhabited
abundant scarce inferior superior
artificial natural intentional accidental
attractive repulsive justice injustice
borrow lend knowledge ignorance
bravery cowardice landlord tenant
create destroy, demolish likely unlikely
bold timid, meek minority majority
capable incapable miser spendthrift
combine separate obedient disobedient
conceal reveal optimist pessimist
common rare permanent temporary
decrease increase plentiful scarce
definite indefinite private public
despair hope prudent imprudent
discourage encourage qualified unqualified
employer employee satisfactory unsatisfactory
expand contract tame wild
forget remember vacant occupied

Tip

Learning antonyms is an effective way to increase your vocabulary. Memorizing words in combination with or in relation to other words often helps us retain them.

Exercise 3

Correct the following sentences by replacing the underlined words with an antonym. Write the antonym on your own sheet of paper.

  1. The pilot who landed the plane was a coward because no one was injured.
  2. Even though the botany lecture was two hours long, Gerard found it incredibly dull.
  3. My mother says it is impolite to say thank you like you really mean it.
  4. Although I have learned a lot of information through textbooks, it is life experience that has given me ignorance.
  5. When our instructor said the final paper was compulsory, it was music to my ears!
  6. My only virtues are coffee, video games, and really loud music.
  7. Elvin was so bold when he walked in the classroom that he sat in the back row and did not participate.
  8. Maria thinks elephants who live in freedom have a sad look in their eyes.
  9. The teacher filled her students’ minds with gloomy thoughts about their futures.
  10. The guest attended to every one of our needs.

Key Takeaways

  • Synonyms are words that have the same, or almost the same, meaning as another word.
  • Antonyms are words that have the opposite meaning of another word.
  • Choosing the right synonym refines your writing.
  • Learning common antonyms sharpens your sense of language and expands your vocabulary.

Writing Application

Write a paragraph that describes your favorite dish or food. Use as many synonyms as you can in the description, even if it seems too many. Be creative. Consult a thesaurus, and take this opportunity to use words you have never used before. Be prepared to share your paragraph.

4.6 Using Context Clues

Learning Objectives

  1. Identify the different types of context clues.
  2. Practice using context clues while reading.

Context cluesWords or phrases in a text that help clarify the meaning of an unfamiliar word. are bits of information within a text that will assist you in deciphering the meaning of unknown words. Since most of your knowledge of vocabulary comes from reading, it is important that you recognize context clues. By becoming more aware of particular words and phrases surrounding a difficult word, you can make logical guesses about its meaning. The following are the different types of context clues:

  • Brief definition or restatement
  • Synonyms and antonyms
  • Examples

Brief Definition or Restatement

Sometimes a text directly states the definition or a restatement of the unknown word. The brief definition or restatement is signaled by a word or a punctuation mark. Consider the following example:

If you visit Alaska, you will likely see many glaciers, or slow moving masses of ice.

In this sentence, the word glaciers is defined by the phrase that follows the signal word or, which is slow moving masses of ice.

In other instances, the text may restate the meaning of the word in a different way, by using punctuation as a signal. Look at the following example:

Marina was indignant—fuming mad—when she discovered her brother had left for the party without her.

Although fuming mad is not a formal definition of the word indignant, it does serve to define it. These two examples use signals—the word or and the punctuation dashes—to indicate the meaning of the unfamiliar word. Other signals to look for are the words is, as, means, known as, and refers to.

Synonyms and Antonyms

Sometimes a text gives a synonym of the unknown word to signal the meaning of the unfamiliar word:

When you interpret an image, you actively question and examine what the image connotes and suggests.

In this sentence the word suggests is a synonym of the word connotes. The word and sometimes signals synonyms.

Likewise, the word but may signal a contrast, which can help you define a word by its antonym.

I abhor clothes shopping, but I adore grocery shopping.

The word abhor is contrasted with its opposite: adore. From this context, the reader can guess that abhor means to dislike greatly.

Examples

Sometimes a text will give you an example of the word that sheds light on its meaning:

I knew Mark’s ailurophobia was in full force because he began trembling and stuttering when he saw my cat, Ludwig, slink out from under the bed.

Although ailurophobia is an unknown word, the sentence gives an example of its effects. Based on this example, a reader could confidently surmise that the word means a fear of cats.

Tip

Look for signal words like such as, for instance, and for example. These words signal that a word’s meaning may be revealed through an example.

Exercise 1

Identify the context clue that helps define the underlined words in each of the following sentences. Write the context clue on your own sheet of paper.

  1. Lucinda is very adroit on the balance beam, but Constance is rather clumsy.
  2. I saw the entomologist, a scientist who studies insects, cradle the giant dung beetle in her palm.
  3. Lance’s comments about politics were irrelevant and meaningless to the botanist’s lecture on plant reproduction.
  4. Before I left for my trip to the Czech Republic, I listened to my mother’s sage advice and made a copy of my passport.
  5. His rancor, or hatred, for socializing resulted in a life of loneliness and boredom.
  6. Martin was mortified, way beyond embarrassment, when his friends teamed up to shove him into the pool.
  7. The petulant four-year-old had a baby sister who was, on the contrary, not grouchy at all.
  8. The philosophy teacher presented the students with several conundrums, or riddles, to solve.
  9. Most Americans are omnivores, people that eat both plants and animals.
  10. Elena is effervescent, as excited as a cheerleader, for example, when she meets someone for the first time.

Exercise 2

On your own sheet of paper, write the name of the context clue that helps to define the underlined words.

Maggie was a precocious child to say the least. She produced brilliant watercolor paintings by the age of three. At first, her parents were flabbergasted—utterly blown away—by their daughter’s ability, but soon they got used to their little painter. Her preschool teacher said that Maggie’s dexterity, or ease with which she used her hands, was something she had never before seen in such a young child. Little Maggie never gloated or took pride in her paintings; she just smiled contentedly when she finished one and requested her parents give it to someone as a gift. Whenever people met Maggie for the first time they often watched her paint with their mouths agape, but her parents always kept their mouths closed and simply smiled over their “little Monet.”

Collaboration

Please share with a classmate and compare your answers.

Tip

In addition to context clues to help you figure out the meaning of a word, examine the following word parts: prefixes, roots, and suffixes.

Writing at Work

Jargon a type of shorthand communication often used in the workplace. It is the technical language of a special field. Imagine it is your first time working as a server in a restaurant and your manager tells you he is going to “eighty-six” the roasted chicken. If you do not realize that “eighty-six” means to remove an item from the menu, you could be confused.

When you first start a job, no matter where it may be, you will encounter jargon that will likely be foreign to you. Perhaps after working the job for a short time, you too will feel comfortable enough to use it. When you are first hired, however, jargon can be baffling and make you feel like an outsider. If you cannot decipher the jargon based on the context, it is always a good policy to ask.

Key Takeaways

  • Context clues are words or phrases within a text that help clarify vocabulary that is unknown to you.
  • There are several types of context clues including brief definition and restatement, synonyms and antonyms, and example.

Writing Application

Write a paragraph describing your first job. In the paragraph, use five words previously unknown to you. These words could be jargon words or you may consult a dictionary or thesaurus to find a new word. Make sure to provide a specific context clue for understanding each word. Exchange papers with a classmate and try to decipher the meaning of the words in each other’s paragraphs based on the context clues.

4.7 Working with Words: End-of-Chapter Exercises

Learning Objectives

  1. Use the skills you have learned in the chapter.
  2. Work collaboratively with other students.

Exercises

  1. Proofread the paragraph and correct any commonly confused words and misspelled words.

    Grunge, or the Seattle sound, is a type of rock music that became quiet popular in the late 1980s and early 1990s. It began in Seattle, Washington. Grunge musicians rejected the dramatic an expensive stage productions that were trendy at the time. There music was striped down with an emphasis on distorted electric guitars. Grunge musicians did not ware makeup or sport extravagent hairstyles like many of the day’s rock musicians and bands. Many grunge musicians would by they’re clothes from secondhand stores. The lyrics too grunge songs were also quit different compared two what was populer at the time. Grunge lyrics are charecterized by dark or socially conscience themes. Grunge music is still admired today buy music lovers of all ages.

  2. Complete the following sentences by filling in the blank line with the correct homonym or frequently misspelled word.

    1. Kevin asked me a serious question and ________(then, than) interrupted me when I attempted to answer.
    2. A hot compress will ________(lessen, lesson) the pain of muscle cramps.
    3. Jason was not a graceful ________(looser, loser) because he knocked his chair over and stormed off the basketball court.
    4. Please consider the ________(effects, affects) of not getting enough green vegetables in your diet.
    5. ________(Except, Accept) for Ajay, we all had our tickets to the play.
    6. I am ________(threw, through) with this magazine, so you can read it if you like.
    7. I don’t care ________(whose, who’s) coming to the party and ________(whose, who’s) not.
    8. Crystal could ________(sea, see) the soaring hawk through her binoculars.
    9. The ________(principal, principle) gave the students a very long lecture about peer pressure.
    10. Dr. Frankl nearly lost his ________(patience, patients) with one of his ________(patience, patients).
  3. Rewrite the following personal essay by replacing the slang, clichés, and overly general language with stronger, more precise language.

    My biggest regret happened in high school. I had always felt like a fish out of water, so during my sophomore year I was determined to fit in with the cool people. Man, was that an uphill battle. I don’t even know why I tried, but hindsight is 20/20 I guess. The first thing I did was change the way I dressed. I went from wearing clothes I was comfortable in to wearing stuff that was so not me. Then I started wearing a ton of makeup, and my brother was all like, “What happened to your face?” Not only did my looks change, my personality changed a lot too. I started to act all stuck up and bossy with my friends, and they didn’t know how to respond to this person that used to be me. Luckily, this phase didn’t last more than a couple of months. I decided it was more fun to be me than to try to be someone else. I guess you can’t fit a square peg in a round hole after all.

  4. Write the correct synonym for each word.

    1. lenient ________(relaxed, callous)
    2. abandon ________(vacate, deceive)
    3. berate ________(criticize, encourage)
    4. experienced ________(callow, matured)
    5. spiteful ________(malevolent, mellow)
    6. tame ________(subdued, wild)
    7. tasty ________(savory, bland)
    8. banal ________(common, interesting)
    9. contradict ________(deny, revolt)
    10. vain ________(boastful, simple)

Chapter 3: Punctuation

Suppose you are presenting a speech. If you speak too quickly, your audience will not be able to understand what you are saying. It is important to stop and take a breath a few times as you read from your notes. But how do you know where to pause, where to change your voice, and where to stop? The answer is easy. You can use the punctuation marks you encounter as a guide for your pacing.

Punctuation marks provide visual clues to readers, telling them how they should read the sentence. Some punctuation marks tell you that you are reading a list of items while other marks tell you that a sentence contains two independent ideas. Punctuation marks tell you not only when a sentence ends but also what kind of sentence you have read. This chapter covers different types of punctuation and the meanings they convey.

3.1 Commas

Learning Objectives

  1. Identify the uses of commas.
  2. Correctly use commas in sentences.

One of the punctuation clues to reading you may encounter is the commaA punctuation mark that tells the reader when to pause or when a word is part of a list.. The comma is a punctuation mark that indicates a pause in a sentence or a separation of things in a list. Commas can be used in a variety of ways. Look at some of the following sentences to see how you might use a comma when writing a sentence.

  • Introductory word: Personally, I think the practice is helpful.
  • Lists: The barn, the tool shed, and the back porch were destroyed by the wind.
  • Coordinating adjectives: He was tired, hungry, and late.
  • Conjunctions in compound sentences: The bedroom door was closed, so the children knew their mother was asleep.
  • Interrupting words: I knew where it was hidden, of course, but I wanted them to find it themselves.
  • Dates, addresses, greetings, and letters: The letter was postmarked December 8, 1945.

Commas after an Introductory Word or Phrase

You may notice a comma that appears near the beginning of the sentence, usually after a word or phrase. This comma lets the reader know where the introductory word or phrase ends and the main sentence begins.

Without spoiling the surprise, we need to tell her to save the date.

In this sentence, without spoiling the surprise is an introductory phrase, while we need to tell her to save the date is the main sentence. Notice how they are separated by a comma. When only an introductory word appears in the sentence, a comma also follows the introductory word.

Ironically, she already had plans for that day.

Exercise 1

Look for the introductory word or phrase. On your own sheet of paper, copy the sentence and add a comma to correct the sentence.

  1. Suddenly the dog ran into the house.
  2. In the blink of an eye the kids were ready to go to the movies.
  3. Confused he tried opening the box from the other end.
  4. Every year we go camping in the woods.
  5. Without a doubt green is my favorite color.
  6. Hesitating she looked back at the directions before proceeding.
  7. Fortunately the sleeping baby did not stir when the doorbell rang.
  8. Believe it or not the criminal was able to rob the same bank three times.

Commas in a List of Items

When you want to list several nouns in a sentence, you separate each word with a comma. This allows the reader to pause after each item and identify which words are included in the grouping. When you list items in a sentence, put a comma after each noun, then add the word and before the last item. However, you do not need to include a comma after the last item.

We’ll need to get flour, tomatoes, and cheese at the store.

The pizza will be topped with olives, peppers, and pineapple chunks.

Commas and Coordinating Adjectives

You can use commas to list both adjectives and nouns. A string of adjectives that describe a noun are called coordinating adjectivesA series of adjectives that come before the noun they describe.. These adjectives come before the noun they modify and are separated by commas. One important thing to note, however, is that unlike listing nouns, the word and does not always need to be before the last adjective.

It was a bright, windy, clear day.

Our kite glowed red, yellow, and blue in the morning sunlight.

Exercise 2

On your own sheet of paper, use what you have learned so far about comma use to add commas to the following sentences.

  1. Monday Tuesday and Wednesday are all booked with meetings.
  2. It was a quiet uneventful unproductive day.
  3. We’ll need to prepare statements for the Franks Todds and Smiths before their portfolio reviews next week.
  4. Michael Nita and Desmond finished their report last Tuesday.
  5. With cold wet aching fingers he was able to secure the sails before the storm.
  6. He wrote his name on the board in clear precise delicate letters.

Commas before Conjunctions in Compound Sentences

Commas are sometimes used to separate two independent clauses. The comma comes after the first independent clause and is followed by a conjunction, such as for, and, or but. For a full list of conjunctions, see Chapter 2 “Writing Basics: What Makes a Good Sentence?”.

He missed class today, and he thinks he will be out tomorrow, too.

He says his fever is gone, but he is still very tired.

Exercise 3

On your own sheet of paper, create a compound sentence by combining the two independent clauses with a comma and a coordinating conjunction.

  1. The presentation was scheduled for Monday. The weather delayed the presentation for four days.

    ________________________________________________________________

  2. He wanted a snack before bedtime. He ate some fruit.

    ________________________________________________________________

  3. The patient is in the next room. I can hardly hear anything.

    ________________________________________________________________

  4. We could go camping for vacation. We could go to the beach for vacation.

    ________________________________________________________________

  5. I want to get a better job. I am taking courses at night.

    ________________________________________________________________

  6. I cannot move forward on this project. I cannot afford to stop on this project.

    ________________________________________________________________

  7. Patrice wants to stop for lunch. We will take the next exit to look for a restaurant.

    ________________________________________________________________

  8. I’ve got to get this paper done. I have class in ten minutes.

    ________________________________________________________________

  9. The weather was clear yesterday. We decided to go on a picnic.

    ________________________________________________________________

  10. I have never dealt with this client before. I know Leonardo has worked with them. Let’s ask Leonardo for his help.

    ________________________________________________________________

Commas before and after Interrupting Words

In conversations, you might interrupt your train of thought by giving more details about what you are talking about. In a sentence, you might interrupt your train of thought with a word or phrase called interrupting wordsWords or phrases that describe a noun, separated from the rest of the sentence by commas. Interrupters can come before or after the noun they describe.. Interrupting words can come at the beginning or middle of a sentence. When the interrupting words appear at the beginning of the sentence, a comma appears after the word or phrase.

If you can believe it, people once thought the sun and planets orbited around Earth.

Luckily, some people questioned that theory.

When interrupting words come in the middle of a sentence, they are separated from the rest of the sentence by commas. You can determine where the commas should go by looking for the part of the sentence that is not essential for the sentence to make sense.

An Italian astronomer, Galileo, proved that Earth orbited the sun.

We have known, for hundreds of years now, that the Earth and other planets exist in a solar system.

Exercise 4

On your own sheet of paper, copy the sentence and insert commas to separate the interrupting words from the rest of the sentence.

  1. I asked my neighbors the retired couple from Florida to bring in my mail.
  2. Without a doubt his work has improved over the last few weeks.
  3. Our professor Mr. Alamut drilled the lessons into our heads.
  4. The meeting is at noon unfortunately which means I will be late for lunch.
  5. We came in time for the last part of dinner but most importantly we came in time for dessert.
  6. All of a sudden our network crashed and we lost our files.
  7. Alex hand the wrench to me before the pipe comes loose again.

Collaboration

Please share with a classmate and compare your answers.

Commas in Dates, Addresses, and the Greetings and Closings of Letters

You also use commas when you write the date, such as in cover letters and e-mails. Commas are used when you write the date, when you include an address, and when you greet someone.

If you are writing out the full date, add a comma after the day and before the year. You do not need to add a comma when you write the month and day or when you write the month and the year. If you need to continue the sentence after you add a date that includes the day and year, add a comma after the end of the date.

The letter is postmarked May 4, 2001.

Her birthday is May 5.

He visited the country in July 2009.

I registered for the conference on March 7, 2010, so we should get our tickets soon.

You also use commas when you include addresses and locations. When you include an address in a sentence, be sure to place a comma after the street and after the city. Do not place a comma between the state and the zip code. Like a date, if you need to continue the sentence after adding the address, simply add a comma after the address.

We moved to 4542 Boxcutter Lane, Hope, Missouri 70832.

After moving to Boston, Massachusetts, Eric used public transportation to get to work.

Greetings are also separated by commas. When you write an e-mail or a letter, you add a comma after the greeting word or the person’s name. You also need to include a comma after the closing, which is the word or phrase you put before your signature.

Hello,

I would like more information about your job posting.

Thank you,

Anita Al-Sayf


Dear Mrs. Al-Sayf,

Thank you for your letter. Please read the attached document for details.

Sincerely,

Jack Fromont

Exercise 5

On your own sheet of paper, use what you have learned about using commas to edit the following letter.

 

March 27 2010

Alexa Marché

14 Taylor Drive Apt. 6

New Castle Maine 90342

Dear Mr. Timmons

Thank you for agreeing to meet with me. I am available on Monday the fifth. I can stop by your office at any time. Is your address still 7309 Marcourt Circle #501? Please get back to me at your earliest convenience.

Thank you

Alexa

Exercise 6

On your own sheet of paper, use what you have learned about comma usage to edit the following paragraphs.

  1. My brother Nathaniel is a collector of many rare unusual things. He has collected lunch boxes limited edition books and hatpins at various points of his life. His current collection of unusual bottles has over fifty pieces. Usually he sells one collection before starting another.
  2. Our meeting is scheduled for Thursday March 20. In that time we need to gather all our documents together. Alice is in charge of the timetables and schedules. Tom is in charge of updating the guidelines. I am in charge of the presentation. To prepare for this meeting please print out any e-mails faxes or documents you have referred to when writing your sample.
  3. It was a cool crisp autumn day when the group set out. They needed to cover several miles before they made camp so they walked at a brisk pace. The leader of the group Garth kept checking his watch and their GPS location. Isabelle Raoul and Maggie took turns carrying the equipment while Carrie took notes about the wildlife they saw. As a result no one noticed the darkening sky until the first drops of rain splattered on their faces.
  4. Please have your report complete and filed by April 15 2010. In your submission letter please include your contact information the position you are applying for and two people we can contact as references. We will not be available for consultation after April 10 but you may contact the office if you have any questions. Thank you HR Department.

Collaboration

Please share with a classmate and compare your answers.

Key Takeaways

  • Punctuation marks provide visual cues to readers to tell them how to read a sentence. Punctuation marks convey meaning.
  • Commas indicate a pause or a list in a sentence.
  • A comma should be used after an introductory word to separate this word from the main sentence.
  • A comma comes after each noun in a list. The word and is added before the last noun, which is not followed by a comma.
  • A comma comes after every coordinating adjective except for the last adjective.
  • Commas can be used to separate the two independent clauses in compound sentences as long as a conjunction follows the comma.
  • Commas are used to separate interrupting words from the rest of the sentence.
  • When you write the date, you add a comma between the day and the year. You also add a comma after the year if the sentence continues after the date.
  • When they are used in a sentence, addresses have commas after the street address, and the city. If a sentence continues after the address, a comma comes after the zip code.
  • When you write a letter, you use commas in your greeting at the beginning and in your closing at the end of your letter.

3.2 Semicolons

Learning Objectives

  1. Identify the uses of semicolons.
  2. Properly use semicolons in sentences.

Another punctuation mark that you will encounter is the semicolon (;)A punctuation mark that indicates a pause and joins two independent clauses or separates a list when the list already requires commas.. Like most punctuation marks, the semicolon can be used in a variety of ways. The semicolon indicates a break in the flow of a sentence, but functions differently than a period or a comma. When you encounter a semicolon while reading aloud, this represents a good place to pause and take a breath.

Semicolons to Join Two Independent Clauses

Use a semicolon to combine two closely related independent clauses. Relying on a period to separate the related clauses into two shorter sentences could lead to choppy writing. Using a comma would create an awkward run-on sentence.

Correct: Be sure to wear clean, well-pressed clothes to the interview; appearances are important.

Choppy: Be sure to wear clean, well-pressed clothes to the interview. Appearances are important.

Incorrect: Be sure to wear clean, well-pressed clothes to the interview, appearances are important.

In this case, writing the independent clauses as two sentences separated by a period is correct. However, using a semicolon to combine the clauses can make your writing more interesting by creating a variety of sentence lengths and structures while preserving the flow of ideas.

Semicolons to Join Items in a List

You can also use a semicolon to join items in a list when the items in the list already require commas. Semicolons help the reader distinguish between items in the list.

Correct: The color combinations we can choose from are black, white, and grey; green, brown, and black; or red, green, and brown.

Incorrect: The color combinations we can choose from are black, white, and grey, green, brown, and black, or red, green, and brown.

By using semicolons in this sentence, the reader can easily distinguish between the three sets of colors.

Tip

Use semicolons to join two main clauses. Do not use semicolons with coordinating conjunctions such as and, or, and but.

Exercise 1

On your own sheet of paper, correct the following sentences by adding semicolons. If the sentence is correct as it is, write OK.

  1. I did not notice that you were in the office I was behind the front desk all day.
  2. Do you want turkey, spinach, and cheese roast beef, lettuce, and cheese or ham, tomato, and cheese?
  3. Please close the blinds there is a glare on the screen.
  4. Unbelievably, no one was hurt in the accident.
  5. I cannot decide if I want my room to be green, brown, and purple green, black, and brown or green, brown, and dark red.
  6. Let’s go for a walk the air is so refreshing.

Key Takeaways

  • Use a semicolon to join two independent clauses.
  • Use a semicolon to separate items in a list when those items already require a comma.

3.3 Colons

Learning Objectives

  1. Identify the uses of colons.
  2. Properly use colons in sentences.

The colon (:)A punctuation mark that is used to indicate a full stop. Colons can introduce lists, quotes, examples, and explanations. is another punctuation mark used to indicate a full stop. Use a colon to introduce lists, quotes, examples, and explanations. You can also use a colon after the greeting in business letters and memos.

Dear Hiring Manager:

To: Human Resources

From: Deanna Dean

Colons to Introduce a List

Use a colon to introduce a list of items. Introduce the list with an independent clause.

The team will tour three states: New York, Pennsylvania, and Maryland.

I have to take four classes this semester: Composition, Statistics, Ethics, and Italian.

Colons to Introduce a Quote

You can use a colon to introduce a quote.

Mark Twain said it best: “When in doubt, tell the truth.”

If a quote is longer than forty words, skip a line after the colon and indent the left margin of the quote five spaces. Because quotations longer than forty words use line spacing and indentation to indicate a quote, quotation marks are not necessary.

My father always loved Mark Twain’s words:

There are basically two types of people. People who accomplish things, and people who claim to have accomplished things. The first group is less crowded.

Tip

Long quotations, which are forty words or more, are called block quotations. Block quotations frequently appear in longer essays and research papers. For more information about block quotations, see Chapter 11 “Writing from Research: What Will I Learn?”.

Colons to Introduce Examples or Explanations

Use a colon to introduce an example or to further explain an idea presented in the first part of a sentence. The first part of the sentence must always be an independent clause; that is, it must stand alone as a complete thought with a subject and verb. Do not use a colon after phrases like such as or for example.

Correct: Our company offers many publishing services: writing, editing, and reviewing.

Incorrect: Our company offers many publishing services, such as: writing, editing, and reviewing.

Tip

Capitalize the first letter following a colon for a proper noun, the beginning of a quote, or the first letter of another independent clause. Do NOT capitalize if the information following the colon is not a complete sentence.

Proper noun: We visited three countries: Belize, Honduras, and El Salvador.

Beginning of a quote: My mother loved this line from Hamlet: “To thine own self be true.”

Two independent clauses: There are drawbacks to modern technology: My brother’s cell phone died and he lost a lot of phone numbers.

Incorrect: The recipe is simple: Tomato, basil, and avocado.

Exercise 1

On your own sheet of paper, correct the following sentences by adding semicolons or colons where needed. If the sentence does not need a semicolon or colon, write OK.

  1. Don’t give up you never know what tomorrow brings.

    ________________________________________________________________

  2. Our records show that the patient was admitted on March 9, 2010 January 13, 2010 and November 16, 2009.

    ________________________________________________________________

  3. Allow me to introduce myself I am the greatest ice-carver in the world.

    ________________________________________________________________

  4. Where I come from there are three ways to get to the grocery store by car, by bus, and by foot.

    ________________________________________________________________

  5. Listen closely you will want to remember this speech.

    ________________________________________________________________

  6. I have lived in Sedona, Arizona Baltimore, Maryland and Knoxville, Tennessee.

    ________________________________________________________________

  7. The boss’s message was clear Lateness would not be tolerated.

    ________________________________________________________________

  8. Next semester, we will read some more contemporary authors, such as Vonnegut, Miller, and Orwell.

    ________________________________________________________________

  9. My little sister said what we were all thinking “We should have stayed home.”

    ________________________________________________________________

  10. Trust me I have done this before.

    ________________________________________________________________

Key Takeaways

  • Use a colon to introduce a list, quote, or example.
  • Use a colon after a greeting in business letters and memos.

3.4 Quotes

Learning Objectives

  1. Identify the uses of quotes.
  2. Correctly use quotes in sentences.

Quotation marks (“ ”)Punctuation marks that are used in pairs to enclose direct quotations and titles of short works. set off a group of words from the rest of the text. Use quotation marks to indicate direct quotations of another person’s words or to indicate a title. Quotation marks always appear in pairs.

Direct Quotations

A direct quotationAn exact account of what someone said or wrote. Direct quotations must be enclosed in quotation marks. is an exact account of what someone said or wrote. To include a direct quotation in your writing, enclose the words in quotation marks. An indirect quotationA restatement of what someone said or wrote. An indirect quotation does not use the person’s exact words. You do not need to use quotation marks for indirect quotations. is a restatement of what someone said or wrote. An indirect quotation does not use the person’s exact words. You do not need to use quotation marks for indirect quotations.

Direct quotation: Carly said, I’m not ever going back there again.

Indirect quotation: Carly said that she would never go back there.

Writing at Work

Most word processsing software is designed to catch errors in grammar, spelling, and punctuation. While this can be a useful tool, it is better to be well acquainted with the rules of punctuation than to leave the thinking to the computer. Properly punctuated writing will convey your meaning clearly. Consider the subtle shifts in meaning in the following sentences:

  • The client said he thought our manuscript was garbage.
  • The client said, “He thought our manuscript was garbage.”

The first sentence reads as an indirect quote in which the client does not like the manuscript. But did he actually use the word “garbage”? (This would be alarming!) Or has the speaker paraphrased (and exaggerated) the client’s words?

The second sentence reads as a direct quote from the client. But who is “he” in this sentence? Is it a third party?

Word processing software would not catch this because the sentences are not grammatically incorrect. However, the meanings of the sentences are not the same. Understanding punctuation will help you write what you mean, and in this case, could save a lot of confusion around the office!

Punctuating Direct Quotations

Quotation marks show readers another person’s exact words. Often, you will want to identify who is speaking. You can do this at the beginning, middle, or end of the quote. Notice the use of commas and capitalized words.

Beginning: Madison said, “Let’s stop at the farmers market to buy some fresh vegetables for dinner.

Middle: “Let’s stop at the farmers market,” Madison said, “to buy some fresh vegetables for dinner.

End: “Let’s stop at the farmers market to buy some fresh vegetables for dinner,” Madison said.

Speaker not identified: “Let’s stop at the farmers market to buy some fresh vegetables for dinner.

Always capitalize the first letter of a quote even if it is not the beginning of the sentence. When using identifying words in the middle of the quote, the beginning of the second part of the quote does not need to be capitalized.

Use commas between identifying words and quotes. Quotation marks must be placed after commas and periods. Place quotation marks after question marks and exclamation points only if the question or exclamation is part of the quoted text.

Question is part of quoted text: The new employee asked, “When is lunch?”

Question is not part of quoted text: Did you hear her say you were the next Picasso”?

Exclamation is part of quoted text: My supervisor beamed, “Thanks for all of your hard work!”

Exclamation is not part of quoted text: He said I single-handedly saved the company thousands of dollars”!

Quotations within Quotations

Use single quotation marks (‘ ’)Punctuation marks that are always used in pairs to enclose a quotation within a quotation. to show a quotation within in a quotation.

Theresa said, I wanted to take my dog to the festival, but the man at the gate said, No dogs allowed.’”

When you say, I can’t help it, what exactly does that mean?

The instructions say, Tighten the screws one at a time.’”

Titles

Use quotation marks around titles of short works of writing, such as essays, songs, poems, short stories, and chapters in books. Usually, titles of longer works, such as books, magazines, albums, newspapers, and novels, are italicized.

Annabelle Lee is one of my favorite romantic poems.

The New York Times has been in publication since 1851.

Writing at Work

In many businesses, the difference between exact wording and a paraphrase is extremely important. For legal purposes, or for the purposes of doing a job correctly, it can be important to know exactly what the client, customer, or supervisor said. Sometimes, important details can be lost when instructions are paraphrased. Use quotes to indicate exact words where needed, and let your coworkers know the source of the quotation (client, customer, peer, etc.).

Exercise 1

Copy the following sentences onto your own sheet of paper, and correct them by adding quotation marks where necessary. If the sentence does not need any quotation marks, write OK.

  1. Yasmin said, I don’t feel like cooking. Let’s go out to eat.

    ________________________________________________________________

  2. Where should we go? said Russell.

    ________________________________________________________________

  3. Yasmin said it didn’t matter to her.

    ________________________________________________________________

  4. I know, said Russell, let’s go to the Two Roads Juice Bar.

    ________________________________________________________________

  5. Perfect! said Yasmin.

    ________________________________________________________________

  6. Did you know that the name of the Juice Bar is a reference to a poem? asked Russell.

    ________________________________________________________________

  7. I didn’t! exclaimed Yasmin. Which poem?

    ________________________________________________________________

  8. The Road Not Taken, by Robert Frost Russell explained.

    ________________________________________________________________

  9. Oh! said Yasmin, Is that the one that starts with the line, Two roads diverged in a yellow wood?

    ________________________________________________________________

  10. That’s the one said Russell.

    ________________________________________________________________

Key Takeaways

  • Use quotation marks to enclose direct quotes and titles of short works.
  • Use single quotation marks to enclose a quote within a quote.
  • Do not use any quotation marks for indirect quotations.

3.5 Apostrophes

Learning Objectives

  1. Identify the uses of apostrophes.
  2. Correctly use apostrophes in sentences.

An apostrophe (’)A punctuation mark that is used with a noun to show possession or to indicate where a letter has been left out to form a contraction. is a punctuation mark that is used with a noun to show possession or to indicate where a letter has been left out to form a contraction.

Possession

An apostrophe and the letter s indicate who or what owns something. To show possession with a singular noun, add ’s.

Jen’s dance routine mesmerized everyone in the room.

The dog’s leash is hanging on the hook beside the door.

Jess’s sister is also coming to the party.

Notice that singular nouns that end in s still take the apostrophe s (’s) ending to show possession.

To show possession with a plural noun that ends in s, just add an apostrophe (’). If the plural noun does not end in s, add an apostrophe and an s (’s).

Plural noun that ends in s: The drummers sticks all moved in the same rhythm, like a machine.

Plural noun that does not end in s: The people’s votes clearly showed that no one supported the management decision.

Contractions

A contractionA word that is formed by combining two words. In a contraction, an apostrophe shows where one or more letters have been left out. is a word that is formed by combining two words. In a contraction, an apostrophe shows where one or more letters have been left out. Contractions are commonly used in informal writing but not in formal writing.

I do not like ice cream.

I don’t like ice cream.

Notice how the words do and not have been combined to form the contraction don’t. The apostrophe shows where the o in not has been left out.

We will see you later.

We’ll see you later.

Look at the chart for some examples of commonly used contractions.

aren’t are not
can’t cannot
doesn’t does not
don’t do not
isn’t is not
he’ll he will
I’ll I will
she’ll she will
they’ll they will
you’ll you will
it’s it is, it has
let’s let us
she’s she is, she has
there’s there is, there has
who’s who is, who has

Tip

Be careful not to confuse it’s with its. It’s is a contraction of the words it and is. Its is a possessive pronoun.

It’s cold and rainy outside. (It is cold and rainy outside.)

The cat was chasing its tail. (Shows that the tail belongs to the cat.)

When in doubt, substitute the words it is in a sentence. If sentence still makes sense, use the contraction it’s.

Exercise 1

On your own sheet of paper, correct the following sentences by adding apostrophes. If the sentence is correct as it is, write OK.

  1. “What a beautiful child! She has her mothers eyes.”
  2. My brothers wife is one of my best friends.
  3. I couldnt believe it when I found out that I got the job!
  4. My supervisors informed me that I wouldnt be able to take the days off.
  5. Each of the students responses were unique.
  6. Wont you please join me for dinner tonight?

Key Takeaways

  • Use apostrophes to show possession. Add ’s to singular nouns and plural nouns that do not end in s. Add to plural nouns that end in s.
  • Use apostrophes in contractions to show where a letter or letters have been left out.

3.6 Parentheses

Learning Objectives

  1. Identify the uses of parentheses.
  2. Properly use parentheses in sentences.

Parentheses ( )Punctuation marks that are used in pairs to contain information that is secondary to the meaning of a sentence. are punctuation marks that are always used in pairs and contain material that is secondary to the meaning of a sentence. Parentheses must never contain the subject or verb of a sentence. A sentence should make sense if you delete any text within parentheses and the parentheses.

Attack of the Killer Potatoes has to be the worst movie I have seen (so far).

Your spinach and garlic salad is one of the most delicious (and nutritious) foods I have ever tasted!

Exercise 1

On your own sheet of paper, clarify the following sentences by adding parentheses. If the sentence is clear as it is, write OK.

  1. Are you going to the seminar this weekend I am?
  2. I recommend that you try the sushi bar unless you don’t like sushi.
  3. I was able to solve the puzzle after taking a few moments to think about it.
  4. Please complete the questionnaire at the end of this letter.
  5. Has anyone besides me read the assignment?
  6. Please be sure to circle not underline the correct answers.

Key Takeaways

  • Parentheses enclose information that is secondary to the meaning of a sentence.
  • Parentheses are always used in pairs.

3.7 Dashes

Learning Objectives

  1. Identify the uses of dashes.
  2. Correctly use dashes in sentences.

A dash (—)A punctuation mark used to set off information in a sentence for emphasis. is a punctuation mark used to set off information in a sentence for emphasis. You can enclose text between two dashes, or use just one dash. To create a dash in Microsoft Word, type two hyphens together. Do not put a space between dashes and text.

Arrive to the interview earlybut not too early.

Any of the suitsexcept for the purple oneshould be fine to wear.

Exercise 1

On your own sheet of paper, clarify the following sentences by adding dashes. If the sentence is clear as it is, write OK.

  1. Which hairstyle do you prefer short or long?
  2. I don’t know I hadn’t even thought about that.
  3. Guess what I got the job!
  4. I will be happy to work over the weekend if I can have Monday off.
  5. You have all the qualities that we are looking for in a candidate intelligence, dedication, and a strong work ethic.

Key Takeaways

  • Dashes indicate a pause in text.
  • Dashes set off information in a sentence to show emphasis.

3.8 Hyphens

Learning Objectives

  1. Identify the uses of hyphens.
  2. Properly use hyphens in sentences.

A hyphen (-)A punctuation mark that combines words that work together to form a single description, or it breaks a word across two lines of text. looks similar to a dash but is shorter and used in different ways.

Hyphens between Two Adjectives That Work as One

Use a hyphen to combine words that work together to form a single description.

The fiftyfiveyearold athlete was just as qualified for the marathon as his younger opponents.

My doctor recommended against taking the medication, since it can be habitforming.

My study group focused on preparing for the midyear review.

Hyphens When a Word Breaks at the End of a Line

Use a hyphen to divide a word across two lines of text. You may notice that most word-processing programs will do this for you. If you have to manually insert a hyphen, place the hyphen between two syllables. If you are unsure of where to place the hyphen, consult a dictionary or move the entire word to the next line.

My supervisor was concerned that the team meet

ing would conflict with the client meeting.

Key Takeaways

  • Hyphens join words that work as one adjective.
  • Hyphens break words across two lines of text.

3.9 Punctuation: End-of-Chapter Exercises

Learning Objectives

  1. Use the skills you have learned in this chapter.
  2. Work collaboratively with other students.

Exercises

  1. Each sentence contains a punctuation error. On your own sheet of paper, correct each sentence by adding the correct punctuation. The headings will let you know which type of punctuation mistakes to look for. If the sentence does not need corrections, write OK.

    Commas

    1. The wedding will be July 13 2012.
    2. The date by the way is the anniversary of the day that they met.
    3. The groom the bride and their parents are all planning the event.
    4. Actually all of their friends and relatives are involved in the planning.
    5. The bride is a baker so she will be making the wedding cake herself.
    6. The photography the catering and the music will all be friends.

    Semicolons

    1. Some people spend a lot of money hiring people for wedding services they are lucky to have such talented friends.
    2. The flowers will be either roses, daisies, and snapdragons orchids, tulips, and irises or peonies and lilies.

    Colons

    1. There will be three colors for the wedding: white, black, and gold.
    2. They’ve finally narrowed down the dinner choices salmon, steak, and a vegan stew.
    3. Their wedding invitations contained the following quote from the Roman poet Ovid If you want to be loved, be lovable.

    Quotes

    1. The invitations said that the wedding would be “outdoor casual.”
    2. “What exactly does ‘outdoor casual’ mean?” I asked the bride.
    3. She told me to dress comfortably and wear shoes that do not sink into the ground.

    Apostrophes

    1. On the day of the wedding, were going to rent a limo.
    2. My brothers wife will make the arrangements.
    3. Shes a great party organizer.

    Parentheses

    1. On the day of the wedding, the bride looked more beautiful than ever and I’ve known her for fifteen years.
    2. All the details were perfect in my opinion.

    Dashes

    1. Everyone danced at the wedding except my mother.
    2. It was to be expected she just had hip surgery.

    Hyphens

    1. The groom danced with his new mother in law.
    2. It was a spectacular, fun filled day for everyone.
  2. Each sentence contains a punctuation error. On your own sheet of paper, correct each sentence by adding commas, semicolons, colons, apostrophes, parentheses, hyphens, and dashes as needed.

    1. My mothers garden is full of beautiful flowers.
    2. She has carefully planted several species of roses peonies and irises.
    3. She is especially proud of her thirty year old Japanese maple tree.
    4. I am especially proud of the sunflowers I planted them!
    5. You should see the birds that are attracted to the garden hummingbirds, finches, robins, and sparrows.
    6. I like to watch the hummingbirds they are my favorite.
    7. We spend a lot of time in the garden planting weeding and just enjoying the view.
    8. Each flower has its own personality some seem shy and others seem bold.
    9. Arent gardens wonderful?
    10. You should come visit sometime Do you like to garden?
  3. The following paragraph contains errors in punctuation. On your own sheet of paper, correct the paragraph by adding commas, semicolons, colons, apostrophes, parentheses, hyphens, and dashes as needed. There may be more than one way to correct the paragraph.

    May 18 2011

    Dear Hiring Manager

    Allow me to introduce myself in my previous position I was known as the King of Sales. I hope to earn the same title within your company. My name is Frances Fortune. I have thirteen years experience in corporate sales and account management. I have been the top rated seller for two years in a row in my previous position. Clients recognize me as dependable honest and resourceful. I have a strong work ethic and great interpersonal skills. I excel at goal setting and time management. However you don’t have to take my word for it I will be happy to provide personal and professional references upon request. Youre welcome to contact my previous employer to inquire about my work performance. I look forward to speaking with you in person in the near future.

    Sincerely

    Frances Fortune

  4. Read the following paragraph. Edit by adding apostrophes, parentheses, dashes, and hyphens where needed. There may be more than one correct way to edit some sentences. Consider how the punctuation you choose affects the meaning of the sentence.

    I was a little nervous about the interview it was my first in years. I had to borrow my roommates suit, but it fit me well. A few days ago, I started to research the companys history and mission. I felt like I was well qualified for the job. When I arrived, I shook hands with the interviewer she had a strong grip! It nearly caught me off guard, but I did my best to smile and relax. I was a little distracted by all the books in the womans office she must have had a hundred books in that tiny room. However, I think my responses to her questions were good. Ill send her an e-mail to thank her for her time. Hopefully shell call me soon about the position.

Collaboration

Please share with a classmate and compare your answers.

Writing Application

Review some of the recent or current assignments you have completed for school or work. Look through recent business and personal e-mails. Does your work contain any errors in punctuation? Correct the errors and compile a list of the types of errors you are correcting (commas, semicolons, colons, apostrophes, quotation marks, parentheses, dashes, hyphens, etc.). Use this list as a reference for the types of punctuation marks that you should review and practice.

If you do not find many errors—great! You can still look for ways to add interest to your writing by using dashes, semicolons, colons, and parentheses to create a variety of sentence lengths and structures.

Chapter 2: Writing Basics: What Makes a Good Sentence?

2.1 Sentence Writing

Learning Objectives

  1. Identify the components of a basic sentence.
  2. Identify the four most serious writing errors.

Imagine you are reading a book for school. You need to find important details that you can use for an assignment. However, when you begin to read, you notice that the book has very little punctuation. Sentences fail to form complete paragraphs and instead form one block of text without clear organization. Most likely, this book would frustrate and confuse you. Without clear and concise sentences, it is difficult to find the information you need.

For both students and professionals, clear communication is important. Whether you are typing an e-mail or writing a report, it is your responsibility to present your thoughts and ideas clearly and precisely. Writing in complete sentences is one way to ensure that you communicate well. This section covers how to recognize and write basic sentence structures and how to avoid some common writing errors.

Components of a Sentence

Clearly written, complete sentences require key information: a subject, a verb and a complete idea. A sentence needs to make sense on its own. Sometimes, complete sentences are also called independent clauses. A clauseA group of words that contains a subject and a verb and may make up a complete sentence. is a group of words that may make up a sentence. An independent clauseA group of words that contains a subject and a verb and can stand alone as a complete, grammatically correct thought. An independent clause is a complete sentence. is a group of words that may stand alone as a complete, grammatically correct thought. The following sentences show independent clauses.

All complete sentences have at least one independent clause. You can identify an independent clause by reading it on its own and looking for the subject and the verb.

Subjects

When you read a sentence, you may first look for the subjectA word that tells who or what the sentence is about. Subjects are usually nouns or pronouns., or what the sentence is about. The subject usually appears at the beginning of a sentence as a nounA word that identifies a person, place, thing, or idea. or a pronounA word that substitutes for a noun; for example, I, you, he, she, it, we, or they.. A noun is a word that identifies a person, place, thing, or idea. A pronoun is a word that replaces a noun. Common pronouns are I, he, she, it, you, they, and we. In the following sentences, the subject is underlined once.

In these sentences, the subject is a person: Malik. The pronoun He replaces and refers back to Malik.

In the first sentence, the subject is a place: computer lab. In the second sentence, the pronoun It substitutes for computer lab as the subject.

In the first sentence, the subject is a thing: project. In the second sentence, the pronoun It stands in for the project.

Tip

In this chapter, please refer to the following grammar key:

Compound Subjects

A sentence may have more than one person, place, or thing as the subject. These subjects are called compound subjectsA subject that contains two or more nouns or pronouns joined by the words and, or, or nor.. Compound subjects are useful when you want to discuss several subjects at once.

Prepositional Phrases

You will often read a sentence that has more than one noun or pronoun in it. You may encounter a group of words that includes a prepositionType of word that connects a noun, pronoun, or verb to another word that describes or modifies it. Common prepositions include in, on, under, near, by, with, and about. with a noun or a pronoun. Prepositions connect a noun, pronoun, or verb to another word that describes or modifies that noun, pronoun, or verb. Common prepositions include in, on, under, near, by, with, and about. A group of words that begin with a preposition is called a prepositional phraseA group of words that begins with a preposition.. A prepositional phrase begins with a preposition and modifies or describes a word. It cannot act as the subject of a sentence. The following circled phrases are examples of prepositional phrases.

Exercise 1

Read the following sentences. Underline the subjects, and circle the prepositional phrases.

  1. The gym is open until nine o’clock tonight.
  2. We went to the store to get some ice.
  3. The student with the most extra credit will win a homework pass.
  4. Maya and Tia found an abandoned cat by the side of the road.
  5. The driver of that pickup truck skidded on the ice.
  6. Anita won the race with time to spare.
  7. The people who work for that company were surprised about the merger.
  8. Working in haste means that you are more likely to make mistakes.
  9. The soundtrack has over sixty songs in languages from around the world.
  10. His latest invention does not work, but it has inspired the rest of us.

Verbs

Once you locate the subject of a sentence, you can move on to the next part of a complete sentence: the verbA word that tells what the subject is doing or links the subject to a describing word.. A verb is often an action word that shows what the subject is doing. A verb can also link the subject to a describing word. There are three types of verbs that you can use in a sentence: action verbs, linking verbs, or helping verbs.

Action Verbs

A verb that connects the subject to an action is called an action verbA verb that identifies the action the subject performs.. An action verb answers the question what is the subject doing? In the following sentences, the words underlined twice are action verbs.

Linking Verbs

A verb can often connect the subject of the sentence to a describing word. This type of verb is called a linking verbA verb that connects or links the subject of a sentence to a noun or adjective. because it links the subject to a describing word. In the following sentences, the words underlined twice are linking verbs.

If you have trouble telling the difference between action verbs and linking verbs, remember that an action verb shows that the subject is doing something, whereas a linking verb simply connects the subject to another word that describes or modifies the subject. A few verbs can be used as either action verbs or linking verbs.

Although both sentences use the same verb, the two sentences have completely different meanings. In the first sentence, the verb describes the boy’s action. In the second sentence, the verb describes the boy’s appearance.

Helping Verbs

A third type of verb you may use as you write is a helping verbVerbs that are used with a main verb to describe mood or tense. The helping verb is usually a form of be, do, or have.. Helping verbs are verbs that are used with the main verb to describe a mood or tense. Helping verbs are usually a form of be, do, or have. The word can is also used as a helping verb.

Tip

Whenever you write or edit sentences, keep the subject and verb in mind. As you write, ask yourself these questions to keep yourself on track:

Subject: Who or what is the sentence about?

Verb: Which word shows an action or links the subject to a description?

Exercise 2

Copy each sentence onto your own sheet of paper and underline the verb(s) twice. Name the type of verb(s) used in the sentence in the space provided (LV, HV, or V).

  1. The cat sounds ready to come back inside. ________
  2. We have not eaten dinner yet. ________
  3. It took four people to move the broken-down car. ________
  4. The book was filled with notes from class. ________
  5. We walked from room to room, inspecting for damages. ________
  6. Harold was expecting a package in the mail. ________
  7. The clothes still felt damp even though they had been through the dryer twice. ________
  8. The teacher who runs the studio is often praised for his restoration work on old masterpieces. ________

Sentence Structure, Including Fragments and Run-ons

Now that you know what makes a complete sentence—a subject and a verb—you can use other parts of speech to build on this basic structure. Good writers use a variety of sentence structures to make their work more interesting. This section covers different sentence structures that you can use to make longer, more complex sentences.

Sentence Patterns

Six basic subject-verb patterns can enhance your writing. A sample sentence is provided for each pattern. As you read each sentence, take note of where each part of the sentence falls. Notice that some sentence patterns use action verbs and others use linking verbs.

Subject–Verb

Subject–Linking Verb–Noun

Subject–Linking Verb–Adjective

Subject–Verb–Adverb

Subject–Verb–Direct Object

When you write a sentence with a direct object (DO), make sure that the DO receives the action of the verb.

Subject–Verb–Indirect Object–Direct Object

In this sentence structure, an indirect objectA noun or pronoun in a sentence that answers to whom or to what the action is being done. The indirect object comes before the direct object in a sentence. explains to whom or to what the action is being done. The indirect object is a noun or pronoun, and it comes before the direct object in a sentence.

Exercise 3

Use what you have learned so far to bring variety in your writing. Use the following lines or your own sheet of paper to write six sentences that practice each basic sentence pattern. When you have finished, label each part of the sentence (S, V, LV, N, Adj, Adv, DO, IO).

  1. ________________________________________________________________
  2. ________________________________________________________________
  3. ________________________________________________________________
  4. ________________________________________________________________
  5. ________________________________________________________________
  6. ________________________________________________________________

Collaboration

Find an article in a newspaper, a magazine, or online that interests you. Bring it to class or post it online. Then, looking at a classmate’s article, identify one example of each part of a sentence (S, V, LV, N, Adj, Adv, DO, IO). Please share or post your results.

Fragments

The sentences you have encountered so far have been independent clauses. As you look more closely at your past writing assignments, you may notice that some of your sentences are not complete. A sentence that is missing a subject or a verb is called a fragmentAn incomplete sentence that results when a subject or a verb is missing.. A fragment may include a description or may express part of an idea, but it does not express a complete thought.

Fragment: Children helping in the kitchen.

Complete sentence: Children helping in the kitchen often make a mess.

You can easily fix a fragment by adding the missing subject or verb. In the example, the sentence was missing a verb. Adding often make a mess creates an S-V-N sentence structure.

Figure 2.1 Editing Fragments That Are Missing a Subject or a Verb

See whether you can identify what is missing in the following fragments.

Fragment: Told her about the broken vase.

Complete sentence: I told her about the broken vase.

Fragment: The store down on Main Street.

Complete sentence: The store down on Main Street sells music.

Common Sentence Errors

Fragments often occur because of some common error, such as starting a sentence with a preposition, a dependent word, an infinitiveA verb form that combines the word to with a verb, such as to buy, to go, or to gather., or a gerundA verb form ending in –ing that is used as a noun, such as running, writing, or celebrating.. If you use the six basic sentence patterns when you write, you should be able to avoid these errors and thus avoid writing fragments.

When you see a preposition, check to see that it is part of a sentence containing a subject and a verb. If it is not connected to a complete sentence, it is a fragment, and you will need to fix this type of fragment by combining it with another sentence. You can add the prepositional phrase to the end of the sentence. If you add it to the beginning of the other sentence, insert a comma after the prepositional phrase.

Figure 2.2 Editing Fragments That Begin with a Preposition

Example A

Example B

Clauses that start with a dependent wordThe first word in a dependent clause. Common dependent words are since, because, without, unless, and so on.—such as since, because, without, or unless—are similar to prepositional phrases. Like prepositional phrases, these clauses can be fragments if they are not connected to an independent clause containing a subject and a verb. To fix the problem, you can add such a fragment to the beginning or end of a sentence. If the fragment is added at the beginning of a sentence, add a comma.

When you encounter a word ending in -ing in a sentence, identify whether or not this word is used as a verb in the sentence. You may also look for a helping verb. If the word is not used as a verb or if no helping verb is used with the -ing verb form, the verb is being used as a noun. An -ing verb form used as a noun is called a gerund.

Once you know whether the -ing word is acting as a noun or a verb, look at the rest of the sentence. Does the entire sentence make sense on its own? If not, what you are looking at is a fragment. You will need to either add the parts of speech that are missing or combine the fragment with a nearby sentence.

Figure 2.3 Editing Fragments That Begin with Gerunds

Incorrect: Taking deep breaths. Saul prepared for his presentation.

Correct: Taking deep breaths, Saul prepared for his presentation.

Correct: Saul prepared for his presentation. He was taking deep breaths.

Incorrect: Congratulating the entire team. Sarah raised her glass to toast their success.

Correct: She was congratulating the entire team. Sarah raised her glass to toast their success.

Correct: Congratulating the entire team, Sarah raised her glass to toast their success.

Another error in sentence construction is a fragment that begins with an infinitive. An infinitive is a verb paired with the word to; for example, to run, to write, or to reach. Although infinitives are verbs, they can be used as nouns, adjectives, or adverbs. You can correct a fragment that begins with an infinitive by either combining it with another sentence or adding the parts of speech that are missing.

Incorrect: We needed to make three hundred more paper cranes. To reach the one thousand mark.

Correct: We needed to make three hundred more paper cranes to reach the one thousand mark.

Correct: We needed to make three hundred more paper cranes. We wanted to reach the one thousand mark.

Exercise 4

Copy the following sentences onto your own sheet of paper and circle the fragments. Then combine the fragment with the independent clause to create a complete sentence.

  1. Working without taking a break. We try to get as much work done as we can in an hour.
  2. I needed to bring work home. In order to meet the deadline.
  3. Unless the ground thaws before spring break. We won’t be planting any tulips this year.
  4. Turning the lights off after he was done in the kitchen. Robert tries to conserve energy whenever possible.
  5. You’ll find what you need if you look. On the shelf next to the potted plant.
  6. To find the perfect apartment. Deidre scoured the classifieds each day.

Run-on Sentences

Just as short, incomplete sentences can be problematic, lengthy sentences can be problematic too. Sentences with two or more independent clauses that have been incorrectly combined are known as run-on sentencesA sentence made up of two or more independent clauses that have been incorrectly combined.. A run-on sentence may be either a fused sentence or a comma splice.

Fused sentence: A family of foxes lived under our shed young foxes played all over the yard.

Comma splice: We looked outside, the kids were hopping on the trampoline.

When two complete sentences are combined into one without any punctuation, the result is a fused sentenceA run-on sentence created by two complete sentences combined into one without any punctuation.. When two complete sentences are joined by a comma, the result is a comma spliceA run-on sentence created by two complete sentences separated only by a single comma.. Both errors can easily be fixed.

Punctuation

One way to correct run-on sentences is to correct the punctuation. For example, adding a period will correct the run-on by creating two separate sentences.

Using a semicolon between the two complete sentences will also correct the error. A semicolon allows you to keep the two closely related ideas together in one sentence. When you punctuate with a semicolon, make sure that both parts of the sentence are independent clauses. For more information on semicolons, see Section 2.4.2 “Capitalize Proper Nouns”.

Run-on: The accident closed both lanes of traffic we waited an hour for the wreckage to be cleared.

Complete sentence: The accident closed both lanes of traffic; we waited an hour for the wreckage to be cleared.

When you use a semicolon to separate two independent clauses, you may wish to add a transition word to show the connection between the two thoughts. After the semicolon, add the transition word and follow it with a comma. For more information on transition words, see Chapter 8 “The Writing Process: How Do I Begin?”.

Run-on: The project was put on hold we didn’t have time to slow down, so we kept working.

Complete sentence: The project was put on hold; however, we didn’t have time to slow down, so we kept working.

Coordinating Conjunctions

You can also fix run-on sentences by adding a comma and a coordinating conjunctionA word that links two independent clauses. Common coordinating conjunctions are for, and, nor, but, or, yet, and so.. A coordinating conjunction acts as a link between two independent clauses.

Tip

These are the seven coordinating conjunctions that you can use: for, and, nor, but, or, yet, and so. Use these words appropriately when you want to link the two independent clauses. The acronym FANBOYS will help you remember this group of coordinating conjunctions.

Run-on: The new printer was installed, no one knew how to use it.

Complete sentence: The new printer was installed, but no one knew how to use it.

Dependent Words

Adding dependent words is another way to link independent clauses. Like the coordinating conjunctions, dependent words show a relationship between two independent clauses.

Run-on: We took the elevator, the others still got there before us.

Complete sentence: Although we took the elevator, the others got there before us.

Run-on: Cobwebs covered the furniture, the room hadn’t been used in years.

Complete sentence: Cobwebs covered the furniture because the room hadn’t been used in years.

Writing at Work

Figure 2.4 Sample e-mail

Isabelle’s e-mail opens with two fragments and two run-on sentences containing comma splices. The e-mail ends with another fragment. What effect would this e-mail have on Mr. Blankenship or other readers? Mr. Blankenship or other readers may not think highly of Isaebelle’s communication skills or—worse—may not understand the message at all! Communications written in precise, complete sentences are not only more professional but also easier to understand. Before you hit the “send” button, read your e-mail carefully to make sure that the sentences are complete, are not run together, and are correctly punctuated.

Exercise 5

A reader can get lost or lose interest in material that is too dense and rambling. Use what you have learned about run-on sentences to correct the following passages:

  1. The report is due on Wednesday but we’re flying back from Miami that morning. I told the project manager that we would be able to get the report to her later that day she suggested that we come back a day early to get the report done and I told her we had meetings until our flight took off. We e-mailed our contact who said that they would check with his boss, she said that the project could afford a delay as long as they wouldn’t have to make any edits or changes to the file our new deadline is next Friday.
  2. Anna tried getting a reservation at the restaurant, but when she called they said that there was a waiting list so she put our names down on the list when the day of our reservation arrived we only had to wait thirty minutes because a table opened up unexpectedly which was good because we were able to catch a movie after dinner in the time we’d expected to wait to be seated.
  3. Without a doubt, my favorite artist is Leonardo da Vinci, not because of his paintings but because of his fascinating designs, models, and sketches, including plans for scuba gear, a flying machine, and a life-size mechanical lion that actually walked and moved its head. His paintings are beautiful too, especially when you see the computer enhanced versions researchers use a variety of methods to discover and enhance the paintings’ original colors, the result of which are stunningly vibrant and yet delicate displays of the man’s genius.

Key Takeaways

  • A sentence is complete when it contains both a subject and verb. A complete sentence makes sense on its own.
  • Every sentence must have a subject, which usually appears at the beginning of the sentence. A subject may be a noun (a person, place, or thing) or a pronoun.
  • A compound subject contains more than one noun.
  • A prepositional phrase describes, or modifies, another word in the sentence but cannot be the subject of a sentence.
  • A verb is often an action word that indicates what the subject is doing. Verbs may be action verbs, linking verbs, or helping verbs.
  • Variety in sentence structure and length improves writing by making it more interesting and more complex.
  • Focusing on the six basic sentence patterns will enhance your writing.
  • Fragments and run-on sentences are two common errors in sentence construction.
  • Fragments can be corrected by adding a missing subject or verb. Fragments that begin with a preposition or a dependent word can be corrected by combining the fragment with another sentence.
  • Run-on sentences can be corrected by adding appropriate punctuation or adding a coordinating conjunction.

Writing Application

Using the six basic sentence structures, write one of the following:

  1. A work e-mail to a coworker about a presentation.
  2. A business letter to a potential employer.
  3. A status report about your current project.
  4. A job description for your résumé.

2.2 Subject-Verb Agreement

Learning Objectives

  1. Define subject-verb agreement.
  2. Identify common errors in subject-verb agreement.

In the workplace, you want to present a professional image. Your outfit or suit says something about you when meeting face-to-face, and your writing represents you in your absence. Grammatical mistakes in your writing or even in speaking make a negative impression on coworkers, clients, and potential employers. Subject-verb agreement is one of the most common errors that people make. Having a solid understanding of this concept is critical when making a good impression, and it will help ensure that your ideas are communicated clearly.

Agreement

AgreementRefers to the proper grammatical match between words and phrases. in speech and in writing refers to the proper grammatical match between words and phrases. Parts of sentences must agreeTo match parts of speech in number, case, gender or person., or correspond with other parts, in number, person, case, and gender.

  • Number. All parts must match in singular or plural forms.
  • Person. All parts must match in first person (I), second person (you), or third person (he, she, it, they) forms.
  • Case. All parts must match in subjective (I, you, he, she, it, they, we), objective (me, her, him, them, us), or possessive (my, mine, your, yours, his, her, hers, their, theirs, our, ours) forms. For more information on pronoun case agreement, see Section 2.5.1 “Pronoun Agreement”.
  • Gender. All parts must match in male or female forms.

Subject-verb agreement describes the proper match between subjects and verbs.

Because subjects and verbs are either singular or plural, the subject of a sentence and the verb of a sentence must agree with each other in number. That is, a singular subject belongs with a singular verb form, and a plural subject belongs with a plural verb form. For more information on subjects and verbs, see Section 2.1 “Sentence Writing”.

Regular Verbs

Regular verbsVerbs that follow a predictable pattern when shifting tenses, such as from the present to the past tense. follow a predictable pattern. For example, in the third person singular, regular verbs always end in -s. Other forms of regular verbs do not end in -s. Study the following regular verb forms in the present tense.

Singular Form Plural Form
First Person I live. We live.
Second Person You live. You live.
Third Person He/She/It lives. They live.

Tip

Add an -es to the third person singular form of regular verbs that end in -sh, -x, -ch, and -s. (I wish/He wishes, I fix/She fixes, I watch/It watches, I kiss/He kisses.)

In these sentences, the verb form stays the same for the first person singular and the first person plural.

In these sentences, the verb form stays the same for the second person singular and the second person plural. In the singular form, the pronoun you refers to one person. In the plural form, the pronoun you refers to a group of people, such as a team.

In this sentence, the subject is mother. Because the sentence only refers to one mother, the subject is singular. The verb in this sentence must be in the third person singular form.

In this sentence, the subject is friends. Because this subject refers to more than one person, the subject is plural. The verb in this sentence must be in the third person plural form.

Tip

Many singular subjects can be made plural by adding an -s. Most regular verbs in the present tense end with an –s in the third person singular. This does not make the verbs plural.

Exercise 1

On your own sheet of paper, write the correct verb form for each of the following sentences.

  1. I (brush/brushes) my teeth twice a day.
  2. You (wear/wears) the same shoes every time we go out.
  3. He (kick/kicks) the soccer ball into the goal.
  4. She (watch/watches) foreign films.
  5. Catherine (hide/hides) behind the door.
  6. We (want/wants) to have dinner with you.
  7. You (work/works) together to finish the project.
  8. They (need/needs) to score another point to win the game.
  9. It (eat/eats) four times a day.
  10. David (fix/fixes) his own motorcycle.

Irregular Verbs

Not all verbs follow a predictable pattern. These verbs are called irregular verbsVerbs that do not follow a predictable pattern when shifting tenses, such as from the present to the past tense.. Some of the most common irregular verbs are be, have, and do. Learn the forms of these verbs in the present tense to avoid errors in subject-verb agreement.

Be

Study the different forms of the verb to be in the present tense.

Singular Form Plural Form
First Person I am. We are.
Second Person You are. You are.
Third Person He/She/It is. They are.

Have

Study the different forms of the verb to have in the present tense.

Singular Form Plural Form
First Person I have. We have.
Second Person You have. You have.
Third Person He/She/It has. They have.

Do

Study the different forms of the verb to do in the present tense.

Singular Form Plural Form
First Person I do. We do.
Second Person You do. You do.
Third person He/She/It does. They do.

Exercise 2

Complete the following sentences by writing the correct present tense form of be, have, or do. Use your own sheet of paper to complete this exercise.

  1. I ________ sure that you will succeed.
  2. They ________ front-row tickets to the show.
  3. He ________ a great Elvis impersonation.
  4. We ________ so excited to meet you in person!
  5. She ________ a fever and a sore throat.
  6. You ________ not know what you are talking about.
  7. You ________ all going to pass this class.
  8. She ________ not going to like that.
  9. It ________ appear to be the right size.
  10. They ________ ready to take this job seriously.

Errors in Subject-Verb Agreement

Errors in subject-verb agreement may occur when

  • a sentence contains a compound subject;
  • the subject of the sentence is separate from the verb;
  • the subject of the sentence is an indefinite pronoun, such as anyone or everyone;
  • the subject of the sentence is a collective noun, such as team or organization;
  • the subject appears after the verb.

Recognizing the sources of common errors in subject-verb agreement will help you avoid these errors in your writing. This section covers the subject-verb agreement errors in more detail.

Compound Subjects

A compound subjectA subject that is formed when two or more nouns are linked by the coordinating conjunctions and, or, or nor. is formed by two or more nouns and the coordinating conjunctions and, or, or nor. A compound subject can be made of singular subjects, plural subjects, or a combination of singular and plural subjects.

Compound subjects combined with and take a plural verb form.

Compound subjects combined with or and nor are treated separately. The verb must agree with the subject that is nearest to the verb.

Tip

If you can substitute the word they for the compound subject, then the sentence takes the third person plural verb form.

Separation of Subjects and Verbs

As you read or write, you may come across a sentence that contains a phrase or clause that separates the subject from the verb. Often, prepositional phrases or dependent clauses add more information to the sentence and appear between the subject and the verb. However, the subject and the verb must still agree.

If you have trouble finding the subject and verb, cross out or ignore the phrases and clauses that begin with prepositions or dependent words. The subject of a sentence will never be in a prepositional phrase or dependent clause.

The following is an example of a subject and verb separated by a prepositional phrase:

The following is an example of a subject and verb separated by a dependent clause:

Indefinite Pronouns

Indefinite pronounsA pronoun that refers to an unspecified person, thing, or number. refer to an unspecified person, thing, or number. When an indefinite pronoun serves as the subject of a sentence, you will often use a singular verb form.

However, keep in mind that exceptions arise. Some indefinite pronouns may require a plural verb form. To determine whether to use a singular or plural verb with an indefinite pronoun, consider the noun that the pronoun would refer to. If the noun is plural, then use a plural verb with the indefinite pronoun. View the chart to see a list of common indefinite pronouns and the verb forms they agree with.

Indefinite Pronouns That Always Take a Singular Verb Indefinite Pronouns That Can Take a Singular or Plural Verb
anybody, anyone, anything All
each Any
everybody, everyone, everything None
much Some
many
nobody, no one, nothing
somebody, someone, something

The indefinite pronoun everybody takes a singular verb form because everybody refers to a group performing the same action as a single unit.

The indefinite pronoun all takes a plural verb form because all refers to the plural noun people. Because people is plural, all is plural.

In this sentence, the indefinite pronoun all takes a singular verb form because all refers to the singular noun cake. Because cake is singular, all is singular.

Collective Nouns

A collective nounA noun that identifies more than one person, place, or thing and treats those people, places, or things as a singular unit. is a noun that identifies more than one person, place, or thing and considers those people, places, or things one singular unit. Because collective nouns are counted as one, they are singular and require a singular verb. Some commonly used collective nouns are group, team, army, flock, family, and class.

In this sentence, class is a collective noun. Although the class consists of many students, the class is treated as a singular unit and requires a singular verb form.

The Subject Follows the Verb

You may encounter sentences in which the subject comes after the verb instead of before the verb. In other words, the subject of the sentence may not appear where you expect it to appear. To ensure proper subject-verb agreement, you must correctly identify the subject and the verb.

Here or There

In sentences that begin with here or there, the subject follows the verb.

If you have trouble identifying the subject and the verb in sentences that start with here or there; it may help to reverse the order of the sentence so the subject comes first.

Questions

When you ask questions, a question word (who, what, where, when, why, or how) appears first. The verb and then the subject follow.

Tip

If you have trouble finding the subject and the verb in questions, try answering the question being asked.

Exercise 3

Correct the errors in subject-verb agreement in the following sentences. If there are no errors in subject-verb agreement, write OK. Copy the corrected sentence or the word OK on your own sheet of notebook paper.

  1. My dog and cats chases each other all the time.

    ________________________________________________________________

  2. The books that are in my library is the best I have ever read.

    ________________________________________________________________

  3. Everyone are going to the concert except me.

    ________________________________________________________________

  4. My family are moving to California.

    ________________________________________________________________

  5. Here is the lake I told you about.

    ________________________________________________________________

  6. There is the newspapers I was supposed to deliver.

    ________________________________________________________________

  7. Which room is bigger?

    ________________________________________________________________

  8. When are the movie going to start?

    ________________________________________________________________

  9. My sister and brother cleans up after themselves.

    ________________________________________________________________

  10. Some of the clothes is packed away in the attic.

    ________________________________________________________________

Exercise 4

Correct the errors in subject-verb agreement in the following paragraph. Copy the paragraph on a piece of notebook paper and make corrections.

Dear Hiring Manager,

I feels that I am the ideal candidate for the receptionist position at your company. I has three years of experience as a receptionist in a company that is similar to yours. My phone skills and written communication is excellent. These skills, and others that I have learned on the job, helps me understand that every person in a company helps make the business a success. At my current job, the team always say that I am very helpful. Everyone appreciate when I go the extra mile to get the job done right. My current employer and coworkers feels that I am an asset to the team. I is efficient and organized. Is there any other details about me that you would like to know? If so, please contact me. Here are my résumé. You can reach me by e-mail or phone. I looks forward to speaking with you in person.

Thanks,

Felicia Fellini

Writing at Work

Figure 2.5 Advertisement

Imagine that you are a prospective client and that you saw this ad online. Would you call Terra Services to handle your next project? Probably not! Mistakes in subject-verb agreement can cost a company business. Paying careful attention to grammatical details ensures professionalism that clients will recognize and respect.

Key Takeaways

  • Parts of sentences must agree in number, person, case, and gender.
  • A verb must always agree with its subject in number. A singular subject requires a singular verb; a plural subject requires a plural verb.
  • Irregular verbs do not follow a predictable pattern in their singular and plural forms. Common irregular verbs are to be, to have, and to do.
  • A compound subject is formed when two or more nouns are joined by the words and, or, or nor.
  • In some sentences, the subject and verb may be separated by a phrase or clause, but the verb must still agree with the subject.
  • Indefinite pronouns, such as anyone, each, everyone, many, no one, and something, refer to unspecified people or objects. Most indefinite pronouns are singular.
  • A collective noun is a noun that identifies more than one person, place, or thing and treats those people, places, or things one singular unit. Collective nouns require singular verbs.
  • In sentences that begin with here and there, the subject follows the verb.
  • In questions, the subject follows the verb.

Writing Application

Use your knowledge of subject-verb agreement to write one of the following:

  1. An advertisement for a potential company
  2. A memo to all employees of a particular company
  3. A cover letter describing your qualifications to a potential employer

Be sure to include at least the following:

  • One collective noun
  • One irregular verb
  • One question

2.3 Verb Tense

Learning Objectives

  1. Use the correct regular verb tense in basic sentences.
  2. Use the correct irregular verb tense in basic sentences.

Suppose you must give an oral presentation about what you did last summer. How do you make it clear that you are talking about the past and not about the present or the future? Using the correct verb tense can help you do this.

It is important to use the proper verb tense. Otherwise, your listener might judge you harshly. Mistakes in tense often leave a listener or reader with a negative impression.

Regular Verbs

Verbs indicate actions or states of being in the past, present, or future using tenses. Regular verbsVerbs whose endings follow regular patterns when shifting from the present to past tense. follow regular patterns when shifting from the present to past tense. For example, to form a past-tense or past-participle verb form, add -ed or -d to the end of a verb. You can avoid mistakes by understanding this basic pattern.

Verb tenseA verb form that identifies the time of action described in a sentence. identifies the time of action described in a sentence. Verbs take different forms to indicate different tenses. Verb tenses indicate

  • an action or state of being in the present,
  • an action or state of being in the past,
  • an action or state of being in the future.

Helping verbs, such as be and have, also work to create verb tenses, such as the future tense.

Exercise 1

Complete the following sentences by selecting the correct form of the verb in simple present, simple past, or simple future tenses. Write the corrected sentence on your own sheet of paper.

  1. The Dust Bowl (is, was, will be) a name given to a period of very destructive dust storms that occurred in the United States during the 1930s.
  2. Historians today (consider, considered, will consider) The Dust Bowl to be one of the worst weather of events in American history.
  3. The Dust Bowl mostly (affects, affected, will affect) the states of Kansas, Colorado, Oklahoma, Texas, and New Mexico.
  4. Dust storms (continue, continued, will continue) to occur in these dry regions, but not to the devastating degree of the 1930s.
  5. The dust storms during The Dust Bowl (cause, caused, will cause) irreparable damage to farms and the environment for a period of several years.
  6. When early settlers (move, moved, will move) into this area, they (remove, removed, will remove) the natural prairie grasses in order to plant crops and graze their cattle.
  7. They did not (realize, realized, will realize) that the grasses kept the soil in place.
  8. There (is, was, will be) also a severe drought that (affects, affected, will affect) the region.
  9. The worst dust storm (happens, happened, will happen) on April 14, 1935, a day called Black Sunday.
  10. The Dust Bowl era finally came to end in 1939 when the rains (arrive, arrived, will arrive).
  11. Dust storms (continue, continued, will continue) to affect the region, but hopefully they will not be as destructive as the storms of the 1930s.

Irregular Verbs

The past tense of irregular verbsVerbs whose endings do not follow regular patterns when shifting from present to past tense. is not formed using the patterns that regular verbs follow. Study Table 2.1 “Irregular Verbs”, which lists the most common irregular verbs.

Tip

The best way to learn irregular verbs is to memorize them. With the help of a classmate, create flashcards of irregular verbs and test yourselves until you master them.

Table 2.1 Irregular Verbs

Simple Present Past Simple Present Past
be was, were lose lost
become became make made
begin began mean meant
blow blew meet met
break broke pay paid
bring brought put put
build built quit quit
burst burst read read
buy bought ride rode
catch caught ring rang
choose chose rise rose
come came run ran
cut cut say said
dive dove (dived) see saw
do did seek sought
draw drew sell sold
drink drank send sent
drive drove set set
eat ate shake shook
fall fell shine shone (shined)
feed fed shrink shrank (shrunk)
feel felt sing sang
fight fought sit sat
find found sleep slept
fly flew speak spoke
forget forgot spend spent
forgive forgave spring sprang
freeze froze stand stood
get got steal stole
give gave strike struck
go went swim swam
grow grew swing swung
have had take took
hear heard teach taught
hide hid tear tore
hold held tell told
hurt hurt think thought
keep kept throw threw
know knew understand understood
lay laid wake woke
lead led wear wore
leave left win won
let let wind wound

Here we consider using irregular verbs.

Exercise 2

Complete the following sentences by selecting the correct form of the irregular verb in simple present, simple past, or simple future tense. Copy the corrected sentence onto your own sheet of paper.

  1. Marina finally (forgived, forgave, will forgive) her sister for snooping around her room.
  2. The house (shook, shaked, shakes) as the airplane rumbled overhead.
  3. I (buyed, bought, buy) several items of clothing at the thrift store on Wednesday.
  4. She (put, putted, puts) the lotion in her shopping basket and proceeded to the checkout line.
  5. The prized goose (layed, laid, lay) several golden eggs last night.
  6. Mr. Batista (teached, taught, taughted) the class how to use correct punctuation.
  7. I (drink, drank, will drink) several glasses of sparkling cider instead of champagne on New Year’s Eve next year.
  8. Although Hector (growed, grew, grows) three inches in one year, we still called him “Little Hector.”
  9. Yesterday our tour guide (lead, led, will lead) us through the maze of people in Times Square.
  10. The rock band (burst, bursted, bursts) onto the music scene with their catchy songs.

Exercise 3

On your own sheet of paper, write a sentence using the correct form of the verb tense shown below.

  1. Throw (past)
  2. Paint (simple present)
  3. Smile (future)
  4. Tell (past)
  5. Share (simple present)

Maintaining Consistent Verb Tense

Consistent verb tenseUsing the same verb tense throughout a sentence or paragraph. means the same verb tense is used throughout a sentence or a paragraph. As you write and revise, it is important to use the same verb tense consistently and to avoid shifting from one tense to another unless there is a good reason for the tense shift. In the following box, see whether you notice the difference between a sentence with consistent tense and one with inconsistent tense.

Tip

In some cases, clear communication will call for different tenses. Look at the following example:

If the time frame for each action or state is different, a tense shift is appropriate.

Exercise 4

Edit the following paragraph by correcting the inconsistent verb tense. Copy the corrected paragraph onto your own sheet of paper.

In the Middle Ages, most people lived in villages and work as agricultural laborers, or peasants. Every village has a “lord,” and the peasants worked on his land. Much of what they produce go to the lord and his family. What little food was leftover goes to support the peasants’ families. In return for their labor, the lord offers them protection. A peasant’s day usually began before sunrise and involves long hours of backbreaking work, which includes plowing the land, planting seeds, and cutting crops for harvesting. The working life of a peasant in the Middle Ages is usually demanding and exhausting.

Writing at Work

Read the following excerpt from a work e-mail:

The inconsistent tense in the e-mail will very likely distract the reader from its overall point. Most likely, your coworkers will not correct your verb tenses or call attention to grammatical errors, but it is important to keep in mind that errors such as these do have a subtle negative impact in the workplace.

Key Takeaways

  • Verb tense helps you express when an event takes place.
  • Regular verbs follow regular patterns when shifting from present to past tense.
  • Irregular verbs do not follow regular, predictable patterns when shifting from present to past tense.
  • Using consistent verb tense is a key element to effective writing.

Writing Application

Tell a family story. You likely have several family stories to choose from, but pick the one that you find most interesting to write about. Use as many details as you can in the telling. As you write and proofread, make sure your all your verbs are correct and the tenses are consistent.

2.4 Capitalization

Learning Objectives

  1. Learn the basic rules of capitalization.
  2. Identify common capitalization errors.

Text messages, casual e-mails, and instant messages often ignore the rules of capitalizationUsing a capital letter as the first letter of a word.. In fact, it can seem unnecessary to capitalize in these contexts. In other, more formal forms of communication, however, knowing the basic rules of capitalization and using capitalization correctly gives the reader the impression that you choose your words carefully and care about the ideas you are conveying.

Capitalize the First Word of a Sentence

Capitalize Proper Nouns

Proper nouns—the names of specific people, places, objects, streets, buildings, events, or titles of individuals—are always capitalized.

Tip

Always capitalize nationalities, races, languages, and religions. For example, American, African American, Hispanic, Catholic, Protestant, Jewish, Muslim, Hindu, Buddhist, and so on.

Do not capitalize nouns for people, places, things, streets, buildings, events, and titles when the noun is used in general or common way. See the following chart for the difference between proper nouns and common nouns.

Common Noun Proper Noun
museum The Art Institute of Chicago
theater Apollo Theater
country Malaysia
uncle Uncle Javier
doctor Dr. Jackson
book Pride and Prejudice
college Smith College
war the Spanish-American War
historical event The Renaissance

Exercise 1

On your own sheet of paper, write five proper nouns for each common noun that is listed. The first one has been done for you.

Common noun: river

  1. Nile River
  2.  
  3.  
  4.  
  5.  

Common noun: musician

  1.  
  2.  
  3.  
  4.  
  5.  

Common noun: magazine

  1.  
  2.  
  3.  
  4.  
  5.  

Collaboration

Please share with a classmate and compare your answers.

Capitalize Days of the Week, Months of the Year, and Holidays

Capitalize Titles

Tip

Computer-related words such as “Internet” and “World Wide Web” are usually capitalized; however, “e-mail” and “online” are never capitalized.

Exercise 2

Edit the following sentences by correcting the capitalization of the titles or names.

  1. The prince of england enjoys playing polo.
  2. “Ode to a nightingale” is a sad poem.
  3. My sister loves to read magazines such as the new yorker.
  4. The house on Mango street is an excellent novel written by Sandra Cisneros.
  5. My physician, dr. alvarez, always makes me feel comfortable in her office.

Exercise 3

Edit the following paragraphs by correcting the capitalization.

david grann’s the lost City of Z mimics the snake-like winding of the amazon River. The three distinct Stories that are introduced are like twists in the River. First, the Author describes his own journey to the amazon in the present day, which is contrasted by an account of percy fawcett’s voyage in 1925 and a depiction of James Lynch’s expedition in 1996. Where does the river lead these explorers? the answer is one that both the Author and the reader are hungry to discover.

The first lines of the preface pull the reader in immediately because we know the author, david grann, is lost in the amazon. It is a compelling beginning not only because it’s thrilling but also because this is a true account of grann’s experience. grann has dropped the reader smack in the middle of his conflict by admitting the recklessness of his decision to come to this place. the suspense is further perpetuated by his unnerving observation that he always considered himself A Neutral Witness, never getting personally involved in his stories, a notion that is swiftly contradicted in the opening pages, as the reader can clearly perceive that he is in a dire predicament—and frighteningly involved.

Writing at Work

Did you know that, if you use all capital letters to convey a message, the capital letters come across like shouting? In addition, all capital letters are actually more difficult to read and may annoy the reader. To avoid “shouting” at or annoying your reader, follow the rules of capitalization and find other ways to emphasize your point.

Key Takeaways

  • Learning and applying the basic rules of capitalization is a fundamental aspect of good writing.
  • Identifying and correcting errors in capitalization is an important writing skill.

Writing Application

Write a one-page biography. Make sure to identify people, places, and dates and use capitalization correctly.

2.5 Pronouns

Learning Objectives

  1. Identify pronouns and their antecedents.
  2. Use pronouns and their antecedents correctly.

If there were no pronouns, all types of writing would be quite tedious to read. We would soon be frustrated by reading sentences like Bob said that Bob was tired or Christina told the class that Christina received an A. Pronouns help a writer avoid constant repetition. Knowing just how pronouns work is an important aspect of clear and concise writing.

Pronoun Agreement

A pronounA word that substitutes for a noun; for example, I, you, he, she, it, we, or they. is a word that takes the place of (or refers back to) a noun or another pronoun. The word or words a pronoun refers to is called the antecedentThe noun that a pronoun refers to. of the pronoun.

  1. Lani complained that she was exhausted.

    • She refers to Lani.
    • Lani is the antecedent of she.
  2. Jeremy left the party early, so I did not see him until Monday at work.

    • Him refers to Jeremy.
    • Jeremy is the antecedent of him.
  3. Crina and Rosalie have been best friends ever since they were freshman in high school.

    • They refers to Crina and Rosalie.
    • Crina and Rosalie is the antecedent of they.

Pronoun agreementWhen the pronoun and the antecedent match or agree with each other. errors occur when the pronoun and the antecedent do not match or agree with each other. There are several types of pronoun agreement.

Agreement in Number

If the pronoun takes the place of or refers to a singular noun, the pronoun must also be singular.

Agreement in Person

Singular Pronouns Plural Pronouns
First Person I me my (mine) we us our (ours)
Second Person you you your (yours) you you your (your)
Third Person he, she, it him, her, it his, her, its they them their (theirs)

If you use a consistent person, your reader is less likely to be confused.

Exercise 1

Edit the following paragraph by correcting pronoun agreement errors in number and person.

Over spring break I visited my older cousin, Diana, and they took me to a butterfly exhibit at a museum. Diana and I have been close ever since she was young. Our mothers are twin sisters, and she is inseparable! Diana knows how much I love butterflies, so it was their special present to me. I have a soft spot for caterpillars too. I love them because something about the way it transforms is so interesting to me. One summer my grandmother gave me a butterfly growing kit, and you got to see the entire life cycle of five Painted Lady butterflies. I even got to set it free. So when my cousin said they wanted to take me to the butterfly exhibit, I was really excited!

Indefinite Pronouns and Agreement

Indefinite pronounsDoes not refer to a specific person or thing and is usually singular. do not refer to a specific person or thing and are usually singular. Note that a pronoun that refers to an indefinite singular pronoun should also be singular. The following are some common indefinite pronouns.

Common Indefinite Pronouns
all each one few nothing several
any each other many one some
anybody either neither one another somebody
anything everybody nobody oneself someone
both everyone none other something
each everything no one others anyone

Collective Nouns

Collective nounsA noun that identifies more than one person, place, or thing and treats those people, places, or things as a singular unit. suggest more than one person but are usually considered singular. Look over the following examples of collective nouns.

Common Collective Nouns
audience faculty public
band family school
class government society
committee group team
company jury tribe

Exercise 2

Complete the following sentences by selecting the correct pronoun. Copy the completed sentence onto your own sheet of paper. Then circle the noun the pronoun replaces.

  1. In the current economy, nobody wants to waste ________ money on frivolous things.
  2. If anybody chooses to go to medical school, ________ must be prepared to work long hours.
  3. The plumbing crew did ________ best to repair the broken pipes before the next ice storm.
  4. If someone is rude to you, try giving ________ a smile in return.
  5. My family has ________ faults, but I still love them no matter what.
  6. The school of education plans to train ________ students to be literacy tutors.
  7. The commencement speaker said that each student has a responsibility toward ________.
  8. My mother’s singing group has ________ rehearsals on Thursday evenings.
  9. No one should suffer ________ pains alone.
  10. I thought the flock of birds lost ________ way in the storm.

Subject and Object Pronouns

Subject pronounsPronoun that functions as the subject in a sentence. function as subjects in a sentence. Object pronounsPronoun that functions as the object of a verb or a preposition. function as the object of a verb or of a preposition.

Singular Pronouns Plural Pronouns
Subject Object Subject Object
I me we us
you you you you
he, she, it him, her, it they them

The following sentences show pronouns as subjects:

  1. She loves the Blue Ridge Mountains in the fall.
  2. Every summer, they picked up litter from national parks.

The following sentences show pronouns as objects:

  1. Marie leaned over and kissed him.
  2. Jane moved it to the corner.

Tip

Note that a pronoun can also be the object of a preposition.

Near them, the children played.

My mother stood between us.

The pronouns us and them are objects of the prepositions near and between. They answer the questions near whom? And between whom?

Compound subject pronounsTwo or more pronouns joined by a conjunction or preposition that function as the subject of the sentence. are two or more pronouns joined by a conjunction or a preposition that function as the subject of the sentence.

The following sentences show pronouns with compound subjects:

Incorrect: Me and Harriet visited the Grand Canyon last summer.

Correct: Harriet and I visited the Grand Canyon last summer.

Correct: Jenna accompanied Harriet and me on our trip.

Tip

Note that object pronouns are never used in the subject position. One way to remember this rule is to remove the other subject in a compound subject, leave only the pronoun, and see whether the sentence makes sense. For example, Me visited the Grand Canyon last summer sounds immediately incorrect.

Compound object pronounsTwo or more pronouns joined by a conjunction or preposition that function as the object of the sentence. are two or more pronouns joined by a conjunction or a preposition that function as the object of the sentence.

Incorrect: I have a good feeling about Janice and I.

Correct: I have a good feeling about Janice and me.

Tip

It is correct to write Janice and me, as opposed to me and Janice. Just remember it is more polite to refer to yourself last.

Writing at Work

In casual conversation, people sometimes mix up subject and object pronouns. For instance, you might say, “Me and Donnie went to a movie last night.” However, when you are writing or speaking at work or in any other formal situation, you need to remember the distinctions between subject and object pronouns and be able to correct yourself. These subtle grammar corrections will enhance your professional image and reputation.

Exercise 3

Revise the following sentences in which the subject and object pronouns are used incorrectly. Copy the revised sentence onto your own sheet of paper. Write a C for each sentence that is correct.

  1. Meera and me enjoy doing yoga together on Sundays.

    ________________________________________________________________

  2. She and him have decided to sell their house.

    ________________________________________________________________

  3. Between you and I, I do not think Jeffrey will win the election.

    ________________________________________________________________

  4. Us and our friends have game night the first Thursday of every month.

    ________________________________________________________________

  5. They and I met while on vacation in Mexico.

    ________________________________________________________________

  6. Napping on the beach never gets boring for Alice and I.

    ________________________________________________________________

  7. New Year’s Eve is not a good time for she and I to have a serious talk.

    ________________________________________________________________

  8. You exercise much more often than me.

    ________________________________________________________________

  9. I am going to the comedy club with Yolanda and she.

    ________________________________________________________________

  10. The cooking instructor taught her and me a lot.

    ________________________________________________________________

Who versus Whom

Who or whoever is always the subject of a verb. Use who or whoever when the pronoun performs the action indicated by the verb.

Who won the marathon last Tuesday?

I wonder who came up with that terrible idea!

On the other hand, whom and whomever serve as objects. They are used when the pronoun does not perform an action. Use whom or whomever when the pronoun is the direct object of a verb or the object of a preposition.

Whom did Frank marry the third time? (direct object of verb)

From whom did you buy that old record player? (object of preposition)

Tip

If you are having trouble deciding when to use who and whom, try this trick. Take the following sentence:

Who/Whom do I consider my best friend?

Reorder the sentence in your head, using either he or him in place of who or whom.

I consider him my best friend.

I consider he my best friend.

Which sentence sounds better? The first one, of course. So the trick is, if you can use him, you should use whom.

Exercise 4

Complete the following sentences by adding who or whom. Copy the completed sentence onto your own sheet of paper.

  1. ________ hit the home run?
  2. I remember ________ won the Academy Award for Best Actor last year.
  3. To ________ is the letter addressed?
  4. I have no idea ________ left the iron on, but I am going to find out.
  5. ________ are you going to recommend for the internship?
  6. With ________ are you going to Hawaii?
  7. No one knew ________ the famous actor was.
  8. ________ in the office knows how to fix the copy machine?
  9. From ________ did you get the concert tickets?
  10. No one knew ________ ate the cake mom was saving.

Key Takeaways

  • Pronouns and their antecedents need to agree in number and person.
  • Most indefinite pronouns are singular.
  • Collective nouns are usually singular.
  • Pronouns can function as subjects or objects.
  • Subject pronouns are never used as objects, and object pronouns are never used as subjects.
  • Who serves as a subject of a verb.
  • Whom serves as an object of a sentence or the object of a preposition.

Writing Application

Write about what makes an ideal marriage or long-term relationship. Provide specific details to back up your assertions. After you have written a few paragraphs, go back and proofread your paper for correct pronoun usage.

2.6 Adjectives and Adverbs

Learning Objectives

  1. Identify adjectives and adverbs.
  2. Use adjectives and adverbs correctly.

Adjectives and adverbs are descriptive words that bring your writing to life.

Adjectives and Adverbs

An adjectiveA word that describes a noun or a pronoun. is a word that describes a noun or a pronoun. It often answers questions such as which one, what kind, or how many?

  1. The green sweater belongs to Iris.
  2. She looks beautiful.

    • In sentence 1, the adjective green describes the noun sweater.
    • In sentence 2, the adjective beautiful describes the pronoun she.

    An adverbA word that describes a verb, adjective, or other adverb and often ends in -ly. is a word that describes a verb, an adjective, or another adverb. Adverbs frequently end in -ly. They answer questions such as how, to what extent, why, when, and where.

  3. Bertrand sings horribly.
  4. My sociology instructor is extremely wise.
  5. He threw the ball very accurately.

    • In sentence 3, horribly describes the verb sings. How does Bertrand sing? He sings horribly.
    • In sentence 4, extremely describes the adjective wise. How wise is the instructor? Extremely wise.
    • In sentence 5, very describes the adverb accurately. How accurately did he throw the ball? Very accurately.

Exercise 1

Complete the following sentences by adding the correct adjective or adverb from the list in the previous section. Identify the word as an adjective or an adverb (Adj, Adv).

  1. Frederick ________ choked on the piece of chicken when he saw Margaret walk through the door.
  2. His ________ eyes looked at everyone and everything as if they were specimens in a biology lab.
  3. Despite her pessimistic views on life, Lauren believes that most people have ________ hearts.
  4. Although Stefan took the criticism ________, he remained calm.
  5. The child developed a ________ imagination because he read a lot of books.
  6. Madeleine spoke ________ while she was visiting her grandmother in the hospital.
  7. Hector’s most ________ possession was his father’s bass guitar from the 1970s.
  8. My definition of a ________ afternoon is walking to the park on a beautiful day, spreading out my blanket, and losing myself in a good book.
  9. She ________ eyed her new coworker and wondered if he was single.
  10. At the party, Denise ________ devoured two pieces of pepperoni pizza and a several slices of ripe watermelon.

Comparative versus Superlative

ComparativeAdjectives and adverbs used to compare two things. adjectives and adverbs are used to compare two people or things.

  1. Jorge is thin.
  2. Steven is thinner than Jorge.

    • Sentence 1 describes Jorge with the adjective thin.
    • Sentence 2 compares Jorge to Steven, stating that Steven is thinner. So thinner is the comparative form of thin.

Form comparatives in one of the following two ways:

  1. If the adjective or adverb is a one syllable word, add -er to it to form the comparative. For example, big, fast, and short would become bigger, faster, and shorter in the comparative form.
  2. If the adjective or adverb is a word of two or more syllables, place the word more in front of it to form the comparative. For example, happily, comfortable, and jealous would become more happily, more comfortable, and more jealous in the comparative.

SuperlativeAdjectives and adverbs used to compare more than two people or two things. adjectives and adverbs are used to compare more than two people or two things.

  1. Jackie is the loudest cheerleader on the squad.
  2. Kenyatta was voted the most confident student by her graduating class.

    • Sentence 1 shows that Jackie is not just louder than one other person, but she is the loudest of all the cheerleaders on the squad.
    • Sentence 2 shows that Kenyatta was voted the most confident student of all the students in her class.

Form superlatives in one of the following two ways:

  1. If the adjective or adverb is a one-syllable word, add -est to form the superlative. For example, big, fast, and short would become biggest, fastest, and shortest in the superlative form.
  2. If the adjective or adverb is a word of two or more syllables, place the word most in front of it. For example, happily, comfortable, and jealous would become most happily, most comfortable, and most jealous in the superlative form.

Tip

Remember the following exception: If the word has two syllables and ends in -y, change the -y to an -i and add -est. For example, happy would change to happiest in the superlative form; healthy would change to healthiest.

Exercise 2

Edit the following paragraph by correcting the errors in comparative and superlative adjectives.

Our argument started on the most sunny afternoon that I have ever experienced. Max and I were sitting on my front stoop when I started it. I told him that my dog, Jacko, was more smart than his dog, Merlin. I could not help myself. Merlin never came when he was called, and he chased his tail and barked at rocks. I told Max that Merlin was the most dumbest dog on the block. I guess I was angrier about a bad grade that I received, so I decided to pick on poor little Merlin. Even though Max insulted Jacko too, I felt I had been more mean. The next day I apologized to Max and brought Merlin some of Jacko’s treats. When Merlin placed his paw on my knee and licked my hand, I was the most sorry person on the block.

Collaboration

Share and compare your answers with a classmate.

Irregular Words: Good, Well, Bad, and Badly

Good, well, bad, and badly are often used incorrectly. Study the following chart to learn the correct usage of these words and their comparative and superlative forms.

Comparative Superlative
Adjective good better best
Adverb well better best
Adjective bad worse worst
Adverb badly worse worst

Good versus Well

Good is always an adjective—that is, a word that describes a noun or a pronoun. The second sentence is correct because well is an adverb that tells how something is done.

Incorrect: Cecilia felt that she had never done so good on a test.

Correct: Cecilia felt that she had never done so well on a test.

Well is always an adverb that describes a verb, adverb, or adjective. The second sentence is correct because good is an adjective that describes the noun score.

Incorrect: Cecilia’s team received a well score.

Correct: Cecilia’s team received a good score.

Bad versus Badly

Bad is always an adjective. The second sentence is correct because badly is an adverb that tells how the speaker did on the test.

Incorrect: I did bad on my accounting test because I didn’t study.

Correct: I did badly on my accounting test because I didn’t study.

Badly is always an adverb. The second sentence is correct because bad is an adjective that describes the noun thunderstorm.

Incorrect: The coming thunderstorm looked badly.

Correct: The coming thunderstorm looked bad.

Better and Worse

The following are examples of the use of better and worse:

Tyra likes sprinting better than long distance running.

The traffic is worse in Chicago than in Atlanta.

Best and Worst

The following are examples of the use of best and worst:

Tyra sprints best of all the other competitors.

Peter finished worst of all the runners in the race.

Tip

Remember better and worse compare two persons or things. Best and worst compare three or more persons or things.

Exercise 3

Write good, well, bad, or badly to complete each sentence. Copy the completed sentence onto your own sheet of paper.

  1. Donna always felt ________ if she did not see the sun in the morning.
  2. The school board president gave a ________ speech for once.
  3. Although my dog, Comet, is mischievous, he always behaves ________ at the dog park.
  4. I thought my back injury was ________ at first, but it turned out to be minor.
  5. Steve was shaking ________ from the extreme cold.
  6. Apple crisp is a very ________ dessert that can be made using whole grains instead of white flour.
  7. The meeting with my son’s math teacher went very ________.
  8. Juan has a ________ appetite, especially when it comes to dessert.
  9. Magritte thought the guests had a ________ time at the party because most people left early.
  10. She ________ wanted to win the writing contest prize, which included a trip to New York.

Exercise 4

Write the correct comparative or superlative form of the word in parentheses. Copy the completed sentence onto your own sheet of paper.

  1. This research paper is ________ (good) than my last one.
  2. Tanaya likes country music ________ (well) of all.
  3. My motorcycle rides ________ (bad) than it did last summer.
  4. That is the ________ (bad) joke my father ever told.
  5. The hockey team played ________ (badly) than it did last season.
  6. Tracey plays guitar ________ (well) than she plays the piano.
  7. It will go down as one of the ________ (bad) movies I have ever seen.
  8. The deforestation in the Amazon is ________ (bad) than it was last year.
  9. Movie ticket sales are ________ (good) this year than last.
  10. My husband says mystery novels are the ________ (good) types of books.

Writing at Work

The irregular words good, well, bad, and badly are often misused along with their comparative and superlative forms better, best, worse, and worst. You may not hear the difference between worse and worst, and therefore type it incorrectly. In a formal or business-like tone, use each of these words to write eight separate sentences. Assume these sentences will be seen and judged by your current or future employer.

Key Takeaways

  • Adjectives describe a noun or a pronoun.
  • Adverbs describe a verb, adjective, or another adverb.
  • Most adverbs are formed by adding -ly to an adjective.
  • Comparative adjectives and adverbs compare two persons or things.
  • Superlative adjectives or adverbs compare more than two persons or things.
  • The adjectives good and bad and the adverbs well and badly are unique in their comparative and superlative forms and require special attention.

Writing Application

Using the exercises as a guide, write your own ten-sentence quiz for your classmate(s) using the concepts covered in this section. Try to include two questions from each subsection in your quiz. Exchange papers and see whether you can get a perfect score.

2.7 Misplaced and Dangling Modifiers

Learning Objectives

  1. Identify modifiers.
  2. Learn how to correct misplaced and dangling modifiers.

A modifierA word or phrase that qualifies the meaning of another element in a sentence. is a word, phrase, or clause that clarifies or describes another word, phrase, or clause. Sometimes writers use modifiers incorrectly, leading to strange and unintentionally humorous sentences. The two common types of modifier errors are called misplaced modifiers and dangling modifiers. If either of these errors occurs, readers can no longer read smoothly. Instead, they become stumped trying to figure out what the writer meant to say. A writer’s goal must always be to communicate clearly and to avoid distracting the reader with strange sentences or awkward sentence constructions. The good news is that these errors can be easily overcome.

Misplaced Modifiers

A misplaced modifierA modifier that is placed too far away from the word or words it modifies. is a modifier that is placed too far from the word or words it modifies. Misplaced modifiers make the sentence awkward and sometimes unintentionally humorous.

Incorrect: She wore a bicycle helmet on her head that was too large.

Correct: She wore a bicycle helmet that was too large on her head.

  • Notice in the incorrect sentence it sounds as if her head was too large! Of course, the writer is referring to the helmet, not to the person’s head. The corrected version of the sentence clarifies the writer’s meaning.

Look at the following two examples:

Incorrect: They bought a kitten for my brother they call Shadow.

Correct: They bought a kitten they call Shadow for my brother.

  • In the incorrect sentence, it seems that the brother’s name is Shadow. That’s because the modifier is too far from the word it modifies, which is kitten.

Incorrect: The patient was referred to the physician with stomach pains.

Correct: The patient with stomach pains was referred to the physician.

  • The incorrect sentence reads as if it is the physician who has stomach pains! What the writer means is that the patient has stomach pains.

Tip

Simple modifiers like only, almost, just, nearly, and barely often get used incorrectly because writers often stick them in the wrong place.

Confusing: Tyler almost found fifty cents under the sofa cushions.

Repaired: Tyler found almost fifty cents under the sofa cushions.

  • How do you almost find something? Either you find it or you do not. The repaired sentence is much clearer.

Exercise 1

On a separate sheet of paper, rewrite the following sentences to correct the misplaced modifiers.

  1. The young lady was walking the dog on the telephone.
  2. I heard that there was a robbery on the evening news.
  3. Uncle Louie bought a running stroller for the baby that he called “Speed Racer.”
  4. Rolling down the mountain, the explorer stopped the boulder with his powerful foot.
  5. We are looking for a babysitter for our precious six-year-old who doesn’t drink or smoke and owns a car.
  6. The teacher served cookies to the children wrapped in aluminum foil.
  7. The mysterious woman walked toward the car holding an umbrella.
  8. We returned the wine to the waiter that was sour.
  9. Charlie spotted a stray puppy driving home from work.
  10. I ate nothing but a cold bowl of noodles for dinner.

Dangling Modifiers

A dangling modifierA word, phrase, or clause that describes or modifies something that has been left out of the sentence. is a word, phrase, or clause that describes something that has been left out of the sentence. When there is nothing that the word, phrase, or clause can modify, the modifier is said to dangle.

Incorrect: Riding in the sports car, the world whizzed by rapidly.

Correct: As Jane was riding in the sports car, the world whizzed by rapidly.

  • In the incorrect sentence, riding in the sports car is dangling. The reader is left wondering who is riding in the sports car. The writer must tell the reader!

Incorrect: Walking home at night, the trees looked like spooky aliens.

Correct: As Jonas was walking home at night, the trees looked like spooky aliens.

Correct: The trees looked like spooky aliens as Jonas was walking home at night.

  • In the incorrect sentence walking home at night is dangling. Who is walking home at night? Jonas. Note that there are two different ways the dangling modifier can be corrected.

Incorrect: To win the spelling bee, Luis and Gerard should join our team.

Correct: If we want to win the spelling bee this year, Luis and Gerard should join our team.

  • In the incorrect sentence, to win the spelling bee is dangling. Who wants to win the spelling bee? We do!

Tip

The following three steps will help you quickly spot a dangling modifier:

  1. Look for an -ing modifier at the beginning of your sentence or another modifying phrase:

    Painting for three hours at night, the kitchen was finally finished by Maggie. (Painting is the -ing modifier.)

  2. Underline the first noun that follows it:

    Painting for three hours at night, the kitchen was finally finished by Maggie.

  3. Make sure the modifier and noun go together logically. If they do not, it is very likely you have a dangling modifier.

    After identifying the dangling modifier, rewrite the sentence.

    Painting for three hours at night, Maggie finally finished the kitchen.

Exercise 2

Rewrite the following the sentences onto your own sheet of paper to correct the dangling modifiers.

  1. Bent over backward, the posture was very challenging.
  2. Making discoveries about new creatures, this is an interesting time to be a biologist.
  3. Walking in the dark, the picture fell off the wall.
  4. Playing a guitar in the bedroom, the cat was seen under the bed.
  5. Packing for a trip, a cockroach scurried down the hallway.
  6. While looking in the mirror, the towel swayed in the breeze.
  7. While driving to the veterinarian’s office, the dog nervously whined.
  8. The priceless painting drew large crowds when walking into the museum.
  9. Piled up next to the bookshelf, I chose a romance novel.
  10. Chewing furiously, the gum fell out of my mouth.

Exercise 3

Rewrite the following paragraph correcting all the misplaced and dangling modifiers.

I bought a fresh loaf of bread for my sandwich shopping in the grocery store. Wanting to make a delicious sandwich, the mayonnaise was thickly spread. Placing the cold cuts on the bread, the lettuce was placed on top. I cut the sandwich in half with a knife turning on the radio. Biting into the sandwich, my favorite song blared loudly in my ears. Humming and chewing, my sandwich went down smoothly. Smiling, my sandwich will be made again, but next time I will add cheese.

Collaboration

Please share with a classmate and compare your answers.

Key Takeaways

  • Misplaced and dangling modifiers make sentences difficult to understand.
  • Misplaced and dangling modifiers distract the reader.
  • There are several effective ways to identify and correct misplaced and dangling modifiers.

Writing Application

See how creative and humorous you can get by writing ten sentences with misplaced and dangling modifiers. This is a deceptively simple task, but rise to the challenge. Your writing will be stronger for it. Exchange papers with a classmate, and rewrite your classmate’s sentences to correct any misplaced modifiers.

2.8 Writing Basics: End-of-Chapter Exercises

Learning Objectives

  1. Use the skills you have learned in the chapter.
  2. Work collaboratively with other students.

Exercises

  1. On your own sheet of paper, identify each sentence as a fragment, a run-on, or correct (no error). Then rewrite the paragraph by correcting the sentence fragments and run-ons.

    My favorite book is Brave New World by Aldous Huxley, he was born in 1894 and died in 1963 ________. Written in 1931 ________. A futuristic society where humans are born out of test tubes and kept in rigid social classes ________. This may not seem like a humorous premise for a novel, but Huxley uses satire, which is a type of humor that is used to make a serious point ________. The humans in Brave New World learn through sleep teaching, Huxley calls this “hypnopedia” ________. Everyone is kept “happy” in the brave new world by taking a pill called soma, there is one character named John the Savage who does not take soma ________. because he comes from a different part of the world where there is no technology, and he believes in natural ways of living ________. It turns out that John has a big problem with the brave new world and how people live there ________. Will he be able to survive living there, well you will have to read the novel to find out ________. Brave New World is considered a classic in English literature, it is one of the best novels I have ever read ________.

  2. Each sentence contains an error in subject-verb agreement, irregular verb form, or consistent verb tense. Identify the type of error. Then, on your own sheet of paper, rewrite the sentence correctly.

    1. Maria and Ty meets me at the community center for cooking classes on Tuesdays.

      ________________________________________________________________

    2. John’s ability to laugh at almost anything amaze me.

      ________________________________________________________________

    3. Samantha and I were walking near the lake when the large, colorful bird appears.

      ________________________________________________________________

    4. I builded my own telescope using materials I bought at the hardware store.

      ________________________________________________________________

    5. My mother freezed the remaining tomatoes from her garden so that she could use them during the winter.

      ________________________________________________________________

    6. Bernard asked the stranger sitting next to him for the time, and she says it was past midnight.

      ________________________________________________________________

    7. My mother and brother wears glasses, but my father and sister do not.

      ________________________________________________________________

    8. We held our noses as the skunk runs away.

      ________________________________________________________________

    9. Neither Soren nor Andrew are excited about the early morning swim meet.

      ________________________________________________________________

    10. My hands hurted at the thought of transcribing all those notes.

      ________________________________________________________________

    11. The police questioned the suspect for hours but she gives them no useful information.

      ________________________________________________________________

    12. Terry takes short weekend trips because her job as a therapist was very emotionally draining.

      ________________________________________________________________

    13. She criticize delicately, making sure not to hurt anyone’s feelings.

      ________________________________________________________________

    14. Davis winded the old clock and set it atop his nightstand.

      ________________________________________________________________

    15. Cherie losed four poker hands in a row before realizing that she was playing against professionals.

      ________________________________________________________________

    16. Janis and Joan describes their trip to the Amazon in vivid detail.

      ________________________________________________________________

    17. You should decides for yourself whether or not to reduce the amount of processed foods in your diet.

      ________________________________________________________________

    18. The oil rig exploded and spills millions of gallons of oil into the ocean.

      ________________________________________________________________

    19. The handsome vampire appeared out of nowhere and smiles at the smitten woman.

      ________________________________________________________________

    20. The batter swinged at the ball several times but never hit it.

      ________________________________________________________________

  3. Correct the capitalization errors in the following fictional story. Copy the corrected paragraph onto your own sheet of paper.

    lance worthington signed a Recording Contract with Capitol records on june 15, 2007. Despite selling two million copies of his Debut Album, nothing to lose, lance lost quite a bit as his tax returns from the irs revealed. lance did not think it was fair that the Record Company kept so much of his earnings, so he decided to hire robert bergman, a prominent music Attorney with a Shark-like reputation. bergman represented lance all the way to the supreme court, where lance won the case against capitol records. Lance worthington was instrumental in changing intellectual property rights and long standing Record Company practices. All artists and musicians can thank him for his brave stance against record companies. Lance subsequently formed his own independent record label called worthy records. worthy is now a successful Label based out of chicago, illinois, and its Artists have appeared on well known shows such as The tonight show and Saturday night live. Lance worthington is a model for success in the do-it-yourself World that has become the Music Industry.

    Collaboration

    Please share with a classmate and compare your answers.

  4. Complete the following sentences by selecting the correct comparative or superlative adjective or adverb. Then copy the completed sentence onto your own sheet of paper.

    1. Denise has a (cheerful) ________ outlook on life than her husband.
    2. I don’t mean to brag, but I think I am the (good) ________ cook in my family.
    3. Lydia is the (thoughtful) ________ person I know.
    4. Italy experienced the (bad) ________ heat wave in its history last year.
    5. My teacher, Ms. Beckett, is the (strange) ________ person I know, and I like that.
    6. Dorian’s drawing skills are (good) ________ this semester than last.
    7. My handwriting is the (sloppy) ________ of all my classmates.
    8. Melvin’s soccer team played (badly) ________ than it did last season.
    9. Josie’s pen writes (smooth) ________ than mine.
    10. I felt (lucky) ________ than my sister because I got in to the college of my choice.

Chapter 1: Introduction to Writing

1.1 Reading and Writing in College

Learning Objectives

  1. Understand the expectations for reading and writing assignments in college courses.
  2. Understand and apply general strategies to complete college-level reading assignments efficiently and effectively.
  3. Recognize specific types of writing assignments frequently included in college courses.
  4. Understand and apply general strategies for managing college-level writing assignments.
  5. Determine specific reading and writing strategies that work best for you individually.

As you begin this chapter, you may be wondering why you need an introduction. After all, you have been writing and reading since elementary school. You completed numerous assessments of your reading and writing skills in high school and as part of your application process for college. You may write on the job, too. Why is a college writing course even necessary?

When you are eager to get started on the coursework in your major that will prepare you for your career, getting excited about an introductory college writing course can be difficult. However, regardless of your field of study, honing your writing skills—and your reading and critical-thinking skills—gives you a more solid academic foundation.

In college, academic expectations change from what you may have experienced in high school. The quantity of work you are expected to do is increased. When instructors expect you to read pages upon pages or study hours and hours for one particular course, managing your work load can be challenging. This chapter includes strategies for studying efficiently and managing your time.

The quality of the work you do also changes. It is not enough to understand course material and summarize it on an exam. You will also be expected to seriously engage with new ideas by reflecting on them, analyzing them, critiquing them, making connections, drawing conclusions, or finding new ways of thinking about a given subject. Educationally, you are moving into deeper waters. A good introductory writing course will help you swim.

Table 1.1 “High School versus College Assignments” summarizes some of the other major differences between high school and college assignments.

Table 1.1 High School versus College Assignments

High School College
Reading assignments are moderately long. Teachers may set aside some class time for reading and reviewing the material in depth. Some reading assignments may be very long. You will be expected to come to class with a basic understanding of the material.
Teachers often provide study guides and other aids to help you prepare for exams. Reviewing for exams is primarily your responsibility.
Your grade is determined by your performance on a wide variety of assessments, including minor and major assignments. Not all assessments are writing based. Your grade may depend on just a few major assessments. Most assessments are writing based.
Writing assignments include personal writing and creative writing in addition to expository writing. Outside of creative writing courses, most writing assignments are expository.
The structure and format of writing assignments is generally stable over a four-year period. Depending on the course, you may be asked to master new forms of writing and follow standards within a particular professional field.
Teachers often go out of their way to identify and try to help students who are performing poorly on exams, missing classes, not turning in assignments, or just struggling with the course. Often teachers will give students many “second chances.” Although teachers want their students to succeed, they may not always realize when students are struggling. They also expect you to be proactive and take steps to help yourself. “Second chances” are less common.

This chapter covers the types of reading and writing assignments you will encounter as a college student. You will also learn a variety of strategies for mastering these new challenges—and becoming a more confident student and writer.

Throughout this chapter, you will follow a first-year student named Crystal. After several years of working as a saleswoman in a department store, Crystal has decided to pursue a degree in elementary education and become a teacher. She is continuing to work part-time, and occasionally she finds it challenging to balance the demands of work, school, and caring for her four-year-old son. As you read about Crystal, think about how you can use her experience to get the most out of your own college experience.

Exercise 1

Review Table 1.1 “High School versus College Assignments” and think about how you have found your college experience to be different from high school so far. Respond to the following questions:

  1. In what ways do you think college will be more rewarding for you as a learner?
  2. What aspects of college do you expect to find most challenging?
  3. What changes do you think you might have to make in your life to ensure your success in college?

Reading Strategies

Your college courses will sharpen both your reading and your writing skills. Most of your writing assignments—from brief response papers to in-depth research projects—will depend on your understanding of course reading assignments or related readings you do on your own. And it is difficult, if not impossible, to write effectively about a text that you have not understood. Even when you do understand the reading, it can be hard to write about it if you do not feel personally engaged with the ideas discussed.

This section discusses strategies you can use to get the most out of your college reading assignments. These strategies fall into three broad categories:

  1. Planning strategies. To help you manage your reading assignments.
  2. Comprehension strategies. To help you understand the material.
  3. Active reading strategies. To take your understanding to a higher and deeper level.

Planning Your Reading

Have you ever stayed up all night cramming just before an exam? Or found yourself skimming a detailed memo from your boss five minutes before a crucial meeting? The first step in handling college reading successfully is planning. This involves both managing your time and setting a clear purpose for your reading.

Managing Your Reading Time

You will learn more detailed strategies for time management in Section 1.2 “Developing Study Skills”, but for now, focus on setting aside enough time for reading and breaking your assignments into manageable chunks. If you are assigned a seventy-page chapter to read for next week’s class, try not to wait until the night before to get started. Give yourself at least a few days and tackle one section at a time.

Your method for breaking up the assignment will depend on the type of reading. If the text is very dense and packed with unfamiliar terms and concepts, you may need to read no more than five or ten pages in one sitting so that you can truly understand and process the information. With more user-friendly texts, you will be able to handle longer sections—twenty to forty pages, for instance. And if you have a highly engaging reading assignment, such as a novel you cannot put down, you may be able to read lengthy passages in one sitting.

As the semester progresses, you will develop a better sense of how much time you need to allow for the reading assignments in different subjects. It also makes sense to preview each assignment well in advance to assess its difficulty level and to determine how much reading time to set aside.

Tip

College instructors often set aside reserve readings for a particular course. These consist of articles, book chapters, or other texts that are not part of the primary course textbook. Copies of reserve readings are available through the university library; in print; or, more often, online. When you are assigned a reserve reading, download it ahead of time (and let your instructor know if you have trouble accessing it). Skim through it to get a rough idea of how much time you will need to read the assignment in full.

Setting a Purpose

The other key component of planning is setting a purpose. Knowing what you want to get out of a reading assignment helps you determine how to approach it and how much time to spend on it. It also helps you stay focused during those occasional moments when it is late, you are tired, and relaxing in front of the television sounds far more appealing than curling up with a stack of journal articles.

Sometimes your purpose is simple. You might just need to understand the reading material well enough to discuss it intelligently in class the next day. However, your purpose will often go beyond that. For instance, you might also read to compare two texts, to formulate a personal response to a text, or to gather ideas for future research. Here are some questions to ask to help determine your purpose:

  • How did my instructor frame the assignment? Often your instructors will tell you what they expect you to get out of the reading:

    • Read Chapter 2 and come to class prepared to discuss current teaching practices in elementary math.
    • Read these two articles and compare Smith’s and Jones’s perspectives on the 2010 health care reform bill.
    • Read Chapter 5 and think about how you could apply these guidelines to running your own business.
  • How deeply do I need to understand the reading? If you are majoring in computer science and you are assigned to read Chapter 1, “Introduction to Computer Science,” it is safe to assume the chapter presents fundamental concepts that you will be expected to master. However, for some reading assignments, you may be expected to form a general understanding but not necessarily master the content. Again, pay attention to how your instructor presents the assignment.
  • How does this assignment relate to other course readings or to concepts discussed in class? Your instructor may make some of these connections explicitly, but if not, try to draw connections on your own. (Needless to say, it helps to take detailed notes both when in class and when you read.)
  • How might I use this text again in the future? If you are assigned to read about a topic that has always interested you, your reading assignment might help you develop ideas for a future research paper. Some reading assignments provide valuable tips or summaries worth bookmarking for future reference. Think about what you can take from the reading that will stay with you.

Improving Your Comprehension

You have blocked out time for your reading assignments and set a purpose for reading. Now comes the challenge: making sure you actually understand all the information you are expected to process. Some of your reading assignments will be fairly straightforward. Others, however, will be longer or more complex, so you will need a plan for how to handle them.

For any expository writingWriting that conveys facts or descriptions.—that is, nonfiction, informational writing—your first comprehension goal is to identify the main points and relate any details to those main points. Because college-level texts can be challenging, you will also need to monitor your reading comprehension. That is, you will need to stop periodically and assess how well you understand what you are reading. Finally, you can improve comprehension by taking time to determine which strategies work best for you and putting those strategies into practice.

Identifying the Main Points

In college, you will read a wide variety of materials, including the following:

  • Textbooks. These usually include summaries, glossaries, comprehension questions, and other study aids.
  • Nonfiction trade books. These are less likely to include the study features found in textbooks.
  • Popular magazine, newspaper, or web articles. These are usually written for a general audience.
  • Scholarly books and journal articles. These are written for an audience of specialists in a given field.

Regardless of what type of expository text you are assigned to read, your primary comprehension goal is to identify the main pointThe most important idea that a writer wants to communicate, often stated early in the writing.: the most important idea that the writer wants to communicate and often states early on. Finding the main point gives you a framework to organize the details presented in the reading and relate the reading to concepts you learned in class or through other reading assignments. After identifying the main point, you will find the supporting pointsDetails, facts, and explanations that develop and clarify a writer’s main point., the details, facts, and explanations that develop and clarify the main point.

Some texts make that task relatively easy. Textbooks, for instance, include the aforementioned features as well as headings and subheadings intended to make it easier for students to identify core concepts. Graphic features, such as sidebars, diagrams, and charts, help students understand complex information and distinguish between essential and inessential points. When you are assigned to read from a textbook, be sure to use available comprehension aids to help you identify the main points.

Trade books and popular articles may not be written specifically for an educational purpose; nevertheless, they also include features that can help you identify the main ideas. These features include the following:

  • Trade books. Many trade books include an introduction that presents the writer’s main ideas and purpose for writing. Reading chapter titles (and any subtitles within the chapter) will help you get a broad sense of what is covered. It also helps to read the beginning and ending paragraphs of a chapter closely. These paragraphs often sum up the main ideas presented.
  • Popular articles. Reading the headings and introductory paragraphs carefully is crucial. In magazine articles, these features (along with the closing paragraphs) present the main concepts. Hard news articles in newspapers present the gist of the news story in the lead paragraph, while subsequent paragraphs present increasingly general details.

At the far end of the reading difficulty scale are scholarly books and journal articles. Because these texts are written for a specialized, highly educated audience, the authors presume their readers are already familiar with the topic. The language and writing style is sophisticated and sometimes dense.

When you read scholarly books and journal articles, try to apply the same strategies discussed earlier. The introduction usually presents the writer’s thesisA sentence that presents the controlling idea of an essay. A thesis statement is often one sentence long, and it states the writer’s point of view., the idea or hypothesis the writer is trying to prove. Headings and subheadings can help you understand how the writer has organized support for his or her thesis. Additionally, academic journal articles often include a summary at the beginning, called an abstract, and electronic databases include summaries of articles, too.

For more information about reading different types of texts, see Chapter 12 “Writing a Research Paper”.

Monitoring Your Comprehension

Finding the main idea and paying attention to text features as you read helps you figure out what you should know. Just as important, however, is being able to figure out what you do not know and developing a strategy to deal with it.

Textbooks often include comprehension questions in the margins or at the end of a section or chapter. As you read, stop occasionally to answer these questions on paper or in your head. Use them to identify sections you may need to reread, read more carefully, or ask your instructor about later.

Even when a text does not have built-in comprehension features, you can actively monitor your own comprehension. Try these strategies, adapting them as needed to suit different kinds of texts:

  1. Summarize. At the end of each section, pause to summarize the main points in a few sentences. If you have trouble doing so, revisit that section.
  2. Ask and answer questions. When you begin reading a section, try to identify two to three questions you should be able to answer after you finish it. Write down your questions and use them to test yourself on the reading. If you cannot answer a question, try to determine why. Is the answer buried in that section of reading but just not coming across to you? Or do you expect to find the answer in another part of the reading?
  3. Do not read in a vacuum. Look for opportunities to discuss the reading with your classmates. Many instructors set up online discussion forums or blogs specifically for that purpose. Participating in these discussions can help you determine whether your understanding of the main points is the same as your peers’.

These discussions can also serve as a reality check. If everyone in the class struggled with the reading, it may be exceptionally challenging. If it was a breeze for everyone but you, you may need to see your instructor for help.

As a working mother, Crystal found that the best time to get her reading done was in the evening, after she had put her four-year-old to bed. However, she occasionally had trouble concentrating at the end of a long day. She found that by actively working to summarize the reading and asking and answering questions, she focused better and retained more of what she read. She also found that evenings were a good time to check the class discussion forums that a few of her instructors had created.

Exercise 2

Choose any text that that you have been assigned to read for one of your college courses. In your notes, complete the following tasks:

  1. Summarize the main points of the text in two to three sentences.
  2. Write down two to three questions about the text that you can bring up during class discussion.

Tip

Students are often reluctant to seek help. They feel like doing so marks them as slow, weak, or demanding. The truth is, every learner occasionally struggles. If you are sincerely trying to keep up with the course reading but feel like you are in over your head, seek out help. Speak up in class, schedule a meeting with your instructor, or visit your university learning center for assistance.

Deal with the problem as early in the semester as you can. Instructors respect students who are proactive about their own learning. Most instructors will work hard to help students who make the effort to help themselves.

Taking It to the Next Level: Active Reading

Now that you have acquainted (or reacquainted) yourself with useful planning and comprehension strategies, college reading assignments may feel more manageable. You know what you need to do to get your reading done and make sure you grasp the main points. However, the most successful students in college are not only competent readers but active, engaged readers.

Using the SQ3R Strategy

One strategy you can use to become a more active, engaged reader is the SQ3R strategyA widely used reading process that involves surveying the text and forming questions before reading; reading to answer questions, predict test material, and form new questions and predictions; reciting or recording the main points of the text; and reviewing and reflecting upon the material., a step-by-step process to follow before, during, and after reading. You may already use some variation of it. In essence, the process works like this:

  1. Survey the text in advance.
  2. Form questions before you start reading.
  3. Read the text.
  4. Recite and/or record important points during and after reading.
  5. Review and reflect on the text after you read.

Before you read, you survey, or preview, the text. As noted earlier, reading introductory paragraphs and headings can help you begin to figure out the author’s main point and identify what important topics will be covered. However, surveying does not stop there. Look over sidebars, photographs, and any other text or graphic features that catch your eye. Skim a few paragraphs. Preview any boldfaced or italicized vocabulary terms. This will help you form a first impression of the material.

Next, start brainstorming questions about the text. What do you expect to learn from the reading? You may find that some questions come to mind immediately based on your initial survey or based on previous readings and class discussions. If not, try using headings and subheadings in the text to formulate questions. For instance, if one heading in your textbook reads “Medicare and Medicaid,” you might ask yourself these questions:

  • When was Medicare and Medicaid legislation enacted? Why?
  • What are the major differences between these two programs?

Although some of your questions may be simple factual questions, try to come up with a few that are more open-ended. Asking in-depth questions will help you stay more engaged as you read.

The next step is simple: read. As you read, notice whether your first impressions of the text were correct. Are the author’s main points and overall approach about the same as what you predicted—or does the text contain a few surprises? Also, look for answers to your earlier questions and begin forming new questions. Continue to revise your impressions and questions as you read.

While you are reading, pause occasionally to recite or record important points. It is best to do this at the end of each section or when there is an obvious shift in the writer’s train of thought. Put the book aside for a moment and recite aloud the main points of the section or any important answers you found there. You might also record ideas by jotting down a few brief notes in addition to, or instead of, reciting aloud. Either way, the physical act of articulating information makes you more likely to remember it.

After you have completed the reading, take some time to review the material more thoroughly. If the textbook includes review questions or your instructor has provided a study guide, use these tools to guide your review. You will want to record information in a more detailed format than you used during reading, such as in an outline or a list.

As you review the material, reflect on what you learned. Did anything surprise you, upset you, or make you think? Did you find yourself strongly agreeing or disagreeing with any points in the text? What topics would you like to explore further? Jot down your reflections in your notes. (Instructors sometimes require students to write brief response papers or maintain a reading journal. Use these assignments to help you reflect on what you read.)

Exercise 3

Choose another text that that you have been assigned to read for a class. Use the SQ3R process to complete the reading. (Keep in mind that you may need to spread the reading over more than one session, especially if the text is long.)

Be sure to complete all the steps involved. Then, reflect on how helpful you found this process. On a scale of one to ten, how useful did you find it? How does it compare with other study techniques you have used?

Using Other Active Reading Strategies

The SQ3R process encompasses a number of valuable active reading strategies: previewing a text, making predictions, asking and answering questions, and summarizing. You can use the following additional strategies to further deepen your understanding of what you read.

  • Connect what you read to what you already know. Look for ways the reading supports, extends, or challenges concepts you have learned elsewhere.
  • Relate the reading to your own life. What statements, people, or situations relate to your personal experiences?
  • Visualize. For both fiction and nonfiction texts, try to picture what is described. Visualizing is especially helpful when you are reading a narrative text, such as a novel or a historical account, or when you read expository text that describes a process, such as how to perform cardiopulmonary resuscitation (CPR).
  • Pay attention to graphics as well as text. Photographs, diagrams, flow charts, tables, and other graphics can help make abstract ideas more concrete and understandable.
  • Understand the text in context. Understanding context means thinking about who wrote the text, when and where it was written, the author’s purpose for writing it, and what assumptions or agendas influenced the author’s ideas. For instance, two writers might both address the subject of health care reform, but if one article is an opinion piece and one is a news story, the context is different.
  • Plan to talk or write about what you read. Jot down a few questions or comments in your notebook so you can bring them up in class. (This also gives you a source of topic ideas for papers and presentations later in the semester.) Discuss the reading on a class discussion board or blog about it.

As Crystal began her first semester of elementary education courses, she occasionally felt lost in a sea of new terms and theories about teaching and child development. She found that it helped to relate the reading to her personal observations of her son and other kids she knew.

Writing at Work

Many college courses require students to participate in interactive online components, such as a discussion forum, a page on a social networking site, or a class blog. These tools are a great way to reinforce learning. Do not be afraid to be the student who starts the discussion.

Remember that when you interact with other students and teachers online, you need to project a mature, professional image. You may be able to use an informal, conversational tone, but complaining about the work load, using off-color language, or “flaming” other participants is inappropriate.

Active reading can benefit you in ways that go beyond just earning good grades. By practicing these strategies, you will find yourself more interested in your courses and better able to relate your academic work to the rest of your life. Being an interested, engaged student also helps you form lasting connections with your instructors and with other students that can be personally and professionally valuable. In short, it helps you get the most out of your education.

Common Writing Assignments

College writing assignments serve a different purpose than the typical writing assignments you completed in high school. In high school, teachers generally focus on teaching you to write in a variety of modes and formats, including personal writing, expository writing, research papers, creative writing, and writing short answers and essays for exams. Over time, these assignments help you build a foundation of writing skills.

In college, many instructors will expect you to already have that foundation.

Your college composition courses will focus on writing for its own sake, helping you make the transition to college-level writing assignments. However, in most other college courses, writing assignments serve a different purpose. In those courses, you may use writing as one tool among many for learning how to think about a particular academic discipline.

Additionally, certain assignments teach you how to meet the expectations for professional writing in a given field. Depending on the class, you might be asked to write a lab report, a case study, a literary analysis, a business plan, or an account of a personal interview. You will need to learn and follow the standard conventions for those types of written products.

Finally, personal and creative writing assignments are less common in college than in high school. College courses emphasize expository writing, writing that explains or informs. Often expository writing assignments will incorporate outside research, too. Some classes will also require persuasive writing assignments in which you state and support your position on an issue. College instructors will hold you to a higher standard when it comes to supporting your ideas with reasons and evidence.

Table 1.2 “Common Types of College Writing Assignments” lists some of the most common types of college writing assignments. It includes minor, less formal assignments as well as major ones. Which specific assignments you encounter will depend on the courses you take and the learning objectives developed by your instructors.

Table 1.2 Common Types of College Writing Assignments

Assignment Type Description Example
Personal Response Paper Expresses and explains your response to a reading assignment, a provocative quote, or a specific issue; may be very brief (sometimes a page or less) or more in-depth For an environmental science course, students watch and write about President Obama’s June 15, 2010, speech about the BP oil spill in the Gulf of Mexico.
Summary Restates the main points of a longer passage objectively and in your own words For a psychology course, students write a one-page summary of an article about a man suffering from short-term memory loss.
Position Paper States and defends your position on an issue (often a controversial issue) For a medical ethics course, students state and support their position on using stem cell research in medicine.
Problem-Solution Paper Presents a problem, explains its causes, and proposes and explains a solution For a business administration course, a student presents a plan for implementing an office recycling program without increasing operating costs.
Literary Analysis States a thesis about a particular literary work (or works) and develops the thesis with evidence from the work and, sometimes, from additional sources For a literature course, a student compares two novels by the twentieth-century African American writer Richard Wright.
Research Review or Survey Sums up available research findings on a particular topic For a course in media studies, a student reviews the past twenty years of research on whether violence in television and movies is correlated with violent behavior.
Case Study or Case Analysis Investigates a particular person, group, or event in depth for the purpose of drawing a larger conclusion from the analysis For an education course, a student writes a case study of a developmentally disabled child whose academic performance improved because of a behavioral-modification program.
Laboratory Report Presents a laboratory experiment, including the hypothesis, methods of data collection, results, and conclusions For a psychology course, a group of students presents the results of an experiment in which they explored whether sleep deprivation produced memory deficits in lab rats.
Research Journal Records a student’s ideas and findings during the course of a long-term research project For an education course, a student maintains a journal throughout a semester-long research project at a local elementary school.
Research Paper Presents a thesis and supports it with original research and/or other researchers’ findings on the topic; can take several different formats depending on the subject area For examples of typical research projects, see Chapter 12 “Writing a Research Paper”.

Writing at Work

Part of managing your education is communicating well with others at your university. For instance, you might need to e-mail your instructor to request an office appointment or explain why you will need to miss a class. You might need to contact administrators with questions about your tuition or financial aid. Later, you might ask instructors to write recommendations on your behalf.

Treat these documents as professional communications. Address the recipient politely; state your question, problem, or request clearly; and use a formal, respectful tone. Doing so helps you make a positive impression and get a quicker response.

Key Takeaways

  • College-level reading and writing assignments differ from high school assignments not only in quantity but also in quality.
  • Managing college reading assignments successfully requires you to plan and manage your time, set a purpose for reading, practice effective comprehension strategies, and use active reading strategies to deepen your understanding of the text.
  • College writing assignments place greater emphasis on learning to think critically about a particular discipline and less emphasis on personal and creative writing.

1.2 Developing Study Skills

Learning Objectives

  1. Use strategies for managing time effectively as a college student.
  2. Understand and apply strategies for taking notes efficiently.
  3. Determine the specific time-management, study, and note-taking strategies that work best for you individually.

By now, you have a general idea of what to expect from your college courses. You have probably received course syllabi, started on your first few assignments, and begun applying the strategies you learned about in Section 1.1 “Reading and Writing in College”.

At the beginning of the semester, your work load is relatively light. This is the perfect time to brush up on your study skills and establish good habits. When the demands on your time and energy become more intense, you will have a system in place for handling them.

This section covers specific strategies for managing your time effectively. You will also learn about different note-taking systems that you can use to organize and record information efficiently.

As you work through this section, remember that every student is different. The strategies presented here are tried and true techniques that work well for many people. However, you may need to adapt them slightly to develop a system that works well for you personally. If your friend swears by her smartphone, but you hate having to carry extra electronic gadgets around, then using a smartphone will not be the best organizational strategy for you.

Read with an open mind, and consider what techniques have been effective (or ineffective) for you in the past. Which habits from your high school years or your work life could help you succeed in college? Which habits might get in your way? What changes might you need to make?

Understanding Yourself as a Learner

To succeed in college—or any situation where you must master new concepts and skills—it helps to know what makes you tick. For decades, educational researchers and organizational psychologists have examined how people take in and assimilate new information, how some people learn differently than others, and what conditions make students and workers most productive. Here are just a few questions to think about:

  • What is your learning style? For the purposes of this chapter, learning styleThe way a learner prefers to take in new information. refers to the way you prefer to take in new information, by seeing, by listening, or through some other channel. For more information, see the section on learning styles.
  • What times of day are you most productive? If your energy peaks early, you might benefit from blocking out early morning time for studying or writing. If you are a night owl, set aside a few evenings a week for schoolwork.
  • How much clutter can you handle in your work space? Some people work fine at a messy desk and know exactly where to find what they need in their stack of papers; however, most people benefit from maintaining a neat, organized space.
  • How well do you juggle potential distractions in your environment? If you can study at home without being tempted to turn on the television, check your e-mail, fix yourself a snack, and so on, you may make home your work space. However, if you need a less distracting environment to stay focused, you may be able to find one on your college’s campus or in your community.
  • Does a little background noise help or hinder your productivity? Some people work better when listening to background music or the low hum of conversation in a coffee shop. Others need total silence.
  • When you work with a partner or group, do you stay on task? A study partner or group can sometimes be invaluable. However, working this way takes extra planning and effort, so be sure to use the time productively. If you find that group study sessions turn into social occasions, you may study better on your own.
  • How do you manage stress? Accept that at certain points in the semester, you will feel stressed out. In your day-to-day routine, make time for activities that help you reduce stress, such as exercising, spending time with friends, or just scheduling downtime to relax.

Learning Styles

Most people have one channel that works best for them when it comes to taking in new information. Knowing yours can help you develop strategies for studying, time management, and note taking that work especially well for you.

To begin identifying your learning style, think about how you would go about the process of assembling a piece of furniture. Which of these options sounds most like you?

  1. You would carefully look over the diagrams in the assembly manual first so you could picture each step in the process.
  2. You would silently read the directions through, step by step, and then look at the diagrams afterward.
  3. You would read the directions aloud under your breath. Having someone explain the steps to you would also help.
  4. You would start putting the pieces together and figure out the process through trial and error, consulting the directions as you worked.

Now read the following explanations. Again, think about whether each description sounds like you.

  • If you chose (a), you may be a visual learnerSomeone who learns best when information is presented in a highly visual format.. You understand ideas best when they are presented in a visual format, such as a flowchart, a diagram, or text with clear headings and many photos or illustrations.
  • If you chose (b), you may be a verbal learnerSomeone who learns best by reading or writing about new ideas.. You understand ideas best through reading and writing about them and taking detailed notes.
  • If you chose (c), you may be an auditory learnerSomeone who learns best through listening.. You understand ideas best through listening. You learn well from spoken lectures or books on tape.
  • If you chose (d), you may be a kinesthetic learnerSomeone who learns best through hands-on activities.. You learn best through doing and prefer hands-on activities. In long lectures, fidgeting may help you focus.

Your learning style does not completely define you as a student. Auditory learners can comprehend a flow chart, and kinesthetic learners can sit still long enough to read a book. However, if you do have one dominant learning style, you can work with it to get the most out of your classes and study time. Table 1.3 “Learning Style Strategies” lists some tips for maximizing your learning style.

Table 1.3 Learning Style Strategies

Learning Style Strategies
Visual
  • When possible, represent concepts visually—in charts, diagrams, or sketches.
  • Use a visual format for taking notes on reading assignments or lectures.
  • Use different-colored highlighters or pens to color-code information as you read.
  • Use visual organizers, such as maps, flowcharts, and so forth, to help you plan writing assignments.
  • Use colored pens, highlighters, or the review feature of your word-processing program to revise and edit writing.
Verbal
  • Use the instructional features in course texts—summaries, chapter review questions, glossaries, and so on—to aid your studying.
  • Take notes on your reading assignments.
  • Rewrite or condense reading notes and lecture notes to study.
  • Summarize important ideas in your own words.
  • Use informal writing techniques, such as brainstorming, freewriting, blogging, or posting on a class discussion forum to generate ideas for writing assignments.
  • Reread and take notes on your writing to help you revise and edit.
Auditory
  • Ask your instructor’s permission to tape-record lectures to supplement your notes.
  • Read parts of your textbook or notes aloud when you study.
  • If possible, obtain an audiobook version of important course texts. Make use of supplemental audio materials, such as CDs or DVDs.
  • Talk through your ideas with other students when studying or when preparing for a writing assignment.
  • Read your writing aloud to help you draft, revise, and edit.
Kinesthetic
  • When you read or study, use techniques that will keep your hands in motion, such as highlighting or taking notes.
  • Use tactile study aids, such as flash cards or study guides you design yourself.
  • Use self-stick notes to record ideas for writing. These notes can be physically reorganized easily to help you determine how to shape your paper.
  • Use a physical activity, such as running or swimming, to help you break through writing blocks.
  • Take breaks during studying to stand, stretch, or move around.

Tip

The material presented here about learning styles is just the tip of the iceberg. There are numerous other variations in how people learn. Some people like to act on information right away while others reflect on it first. Some people excel at mastering details and understanding concrete, tried and true ideas while others enjoy exploring abstract theories and innovative, even impractical ideas. For more information about how you learn, visit your school’s academic resource center.

Time Management

In college you have increased freedom to structure your time as you please. With that freedom comes increased responsibility. High school teachers often take it upon themselves to track down students who miss class or forget assignments. College instructors, however, expect you to take full responsibility for managing yourself and getting your work done on time.

Getting Started: Short- and Long-Term Planning

At the beginning of the semester, establish a weekly routine for when you will study and write. A general guideline is that for every hour spent in class, students should expect to spend another two to three hours on reading, writing, and studying for tests. Therefore, if you are taking a biology course that meets three times a week for an hour at a time, you can expect to spend six to nine hours per week on it outside of class. You will need to budget time for each class just like an employer schedules shifts at work, and you must make that study time a priority.

That may sound like a lot when taking multiple classes, but if you plan your time carefully, it is manageable. A typical full-time schedule of fifteen credit hours translates into thirty to forty-five hours per week spent on schoolwork outside of class. All in all, a full-time student would spend about as much time on school each week as an employee spends on work. Balancing school and a job can be more challenging, but still doable.

In addition to setting aside regular work periods, you will need to plan ahead to handle more intense demands, such as studying for exams and writing major papers. At the beginning of the semester, go through your course syllabi and mark all major due dates and exam dates on a calendar. Use a format that you check regularly, such as your smartphone or the calendar feature in your e-mail. (In Section 1.3 “Becoming a Successful College Writer” you will learn strategies for planning out major writing assignments so you can complete them on time.)

Tip

The two- to three-hour rule may sound intimidating. However, keep in mind that this is only a rule of thumb. Realistically, some courses will be more challenging than others, and the demands will ebb and flow throughout the semester. You may have trouble-free weeks and stressful weeks. When you schedule your classes, try to balance introductory-level classes with more advanced classes so that your work load stays manageable.

Crystal knew that to balance a job, college classes, and a family, it was crucial for her to get organized. For the month of September, she drew up a week-by-week calendar that listed not only her own class and work schedules but also the days her son attended preschool and the days her husband had off from work. She and her husband discussed how to share their day-to-day household responsibilities so she would be able to get her schoolwork done. Crystal also made a note to talk to her supervisor at work about reducing her hours during finals week in December.

Exercise 1

Now that you have learned some time-management basics, it is time to apply those skills. For this exercise, you will develop a weekly schedule and a semester calendar.

  1. Working with your class schedule, map out a week-long schedule of study time. Try to apply the “two- to three-hour” rule. Be sure to include any other nonnegotiable responsibilities, such as a job or child care duties.
  2. Use your course syllabi to record exam dates and due dates for major assignments in a calendar (paper or electronic). Use a star, highlighting, or other special marking to set off any days or weeks that look especially demanding.

Staying Consistent: Time Management Dos and Don’ts

Setting up a schedule is easy. Sticking with it, however, may create challenges. A schedule that looked great on paper may prove to be unrealistic. Sometimes, despite students’ best intentions, they end up procrastinating or pulling all-nighters to finish a paper or study for an exam.

Keep in mind, however, that your weekly schedule and semester calendar are time-management tools. Like any tools, their effectiveness depends on the user: you. If you leave a tool sitting in the box unused (e.g., if you set up your schedule and then forget about it), it will not help you complete the task. And if, for some reason, a particular tool or strategy is not getting the job done, you need to figure out why and maybe try using something else.

With that in mind, read the list of time-management dos and don’ts. Keep this list handy as a reference you can use throughout the semester to “troubleshoot” if you feel like your schoolwork is getting off track.

Dos

  1. Set aside time to review your schedule or calendar regularly and update or adjust them as needed.
  2. Be realistic when you schedule study time. Do not plan to write your paper on Friday night when everyone else is out socializing. When Friday comes, you might end up abandoning your plans and hanging out with your friends instead.
  3. Be honest with yourself about where your time goes. Do not fritter away your study time on distractions like e-mail and social networking sites.
  4. Accept that occasionally your work may get a little off track. No one is perfect.
  5. Accept that sometimes you may not have time for all the fun things you would like to do.
  6. Recognize times when you feel overextended. Sometimes you may just need to get through an especially demanding week. However, if you feel exhausted and overworked all the time, you may need to scale back on some of your commitments.
  7. Have a plan for handling high-stress periods, such as final exam week. Try to reduce your other commitments during those periods—for instance, by scheduling time off from your job. Build in some time for relaxing activities, too.

Don’ts

  1. Do not procrastinate on challenging assignments. Instead, break them into smaller, manageable tasks that can be accomplished one at a time.
  2. Do not fall into the trap of “all-or-nothing” thinking: “There is no way I can fit in a three-hour study session today, so I will just wait until the weekend.” Extended periods of free time are hard to come by, so find ways to use small blocks of time productively. For instance, if you have a free half hour between classes, use it to preview a chapter or brainstorm ideas for an essay.
  3. Do not fall into the trap of letting things slide and promising yourself, “I will do better next week.” When next week comes, the accumulated undone tasks will seem even more intimidating, and you will find it harder to get them done.
  4. Do not rely on caffeine and sugar to compensate for lack of sleep. These stimulants may temporarily perk you up, but your brain functions best when you are rested.

Exercise 2

The key to managing your time effectively is consistency. Completing the following tasks will help you stay on track throughout the semester.

  1. Establish regular times to “check in” with yourself to identify and prioritize tasks and plan how to accomplish them. Many people find it is best to set aside a few minutes for this each day and to take some time to plan at the beginning of each week.
  2. For the next two weeks, focus on consistently using whatever time-management system you have set up. Check in with yourself daily and weekly, stick to your schedule, and take note of anything that interferes. At the end of the two weeks, review your schedule and determine whether you need to adjust it.
  3. Review the preceeding list of dos and don’ts.

    1. Identify at least two habits from the “Dos” list that you could use to improve your time-management skills.
    2. Identify the habit from the “Don’ts” list that you are most likely to slip into as the semester gets busier. What could you do to combat this habit?

Writing at Work

If you are part of the workforce, you have probably established strategies for accomplishing job-related tasks efficiently. How could you adapt these strategies to help you be a successful student? For instance, you might sync up your school and work schedules on an electronic calendar. Instead of checking in with your boss about upcoming work deadlines, establish a buddy system where you check in with a friend about school projects. Give school the same priority you give to work.

Note-Taking Methods

One final valuable tool to have in your arsenal as a student is a good note-taking system. Just the act of converting a spoken lecture to notes helps you organize and retain information, and of course, good notes also help you review important concepts later. Although taking good notes is an essential study skill, many students enter college without having received much guidance about note taking.

These sections discuss different strategies you can use to take notes efficiently. No matter which system you choose, keep the note-taking guidelines in mind.

General Note-Taking Guidelines

  1. Before class, quickly review your notes from the previous class and the assigned reading. Fixing key terms and concepts in your mind will help you stay focused and pick out the important points during the lecture.
  2. Come prepared with paper, pens, highlighters, textbooks, and any important handouts.
  3. Come to class with a positive attitude and a readiness to learn. During class, make a point of concentrating. Ask questions if you need to. Be an active participant.
  4. During class, capture important ideas as concisely as you can. Use words or phrases instead of full sentences and abbreviate when possible.
  5. Visually organize your notes into main topics, subtopics, and supporting points, and show the relationships between ideas. Leave space if necessary so you can add more details under important topics or subtopics.
  6. Record the following:

    1. Ideas that the instructor repeats frequently or points out as key ideas
    2. Ideas the instructor lists on a whiteboard or transparency
    3. Details, facts, explanations, and lists that develop main points
    4. Definitions of key terms
  7. Review your notes regularly throughout the semester, not just before exams.

Organizing Ideas in Your Notes

A good note-taking system needs to help you differentiate among major points, related subtopics, and supporting details. It visually represents the connections between ideas. Finally, to be effective, your note-taking system must allow you to record and organize information fairly quickly. Although some students like to create detailed, formal outlines or concept maps when they read, these may not be good strategies for class notes, because spoken lectures may not allow time for elaborate notes.

Instead, focus on recording content simply and quickly to create organized, legible notes. Try one of the following techniques.

Modified Outline Format

A modified outline format uses indented spacing to show the hierarchy of ideas without including roman numerals, lettering, and so forth. Just use a dash or bullet to signify each new point unless your instructor specifically presents a numbered list of items.

The first example shows Crystal’s notes from a developmental psychology class about an important theorist in this field. Notice how the line for the main topic is all the way to the left. Subtopics are indented, and supporting details are indented one level further. Crystal also used abbreviations for terms like development and example.

Idea Mapping

If you discovered in this section that you learn best with visual presentations, you may prefer to use a more graphic format for notes, such as an idea map. The next example shows how Crystal’s lecture notes could be set up differently. Although the format is different, the content and organization are the same.

Charting

If the content of a lecture falls into a predictable, well-organized pattern, you might choose to use a chart or table to record your notes. This system works best when you already know, either before class or at the beginning of class, which categories you should include. The next figure shows how this system might be used.

The Cornell Note-Taking System

In addition to the general techniques already described, you might find it useful to practice a specific strategy known as the Cornell note-taking system. This popular format makes it easy not only to organize information clearly but also to note key terms and summarize content.

To use the Cornell system, begin by setting up the page with these components:

  • The course name and lecture date at the top of the page
  • A narrow column (about two inches) at the left side of the page
  • A wide column (about five to six inches) on the right side of the page
  • A space of a few lines marked off at the bottom of the page

During the lecture, you record notes in the wide column. You can do so using the traditional modified outline format or a more visual format if you prefer.

Then, as soon as possible after the lecture, review your notes and identify key terms. Jot these down in the narrow left-hand column. You can use this column as a study aid by covering the notes on the right-hand side, reviewing the key terms, and trying to recall as much as you can about them so that you can mentally restate the main points of the lecture. Uncover the notes on the right to check your understanding. Finally, use the space at the bottom of the page to summarize each page of notes in a few sentences.

Using the Cornell system, Crystal’s notes would look like the following:

Writing at Work

Often, at school or in the workplace, a speaker will provide you with pregenerated notes summarizing electronic presentation slides. You may be tempted not to take notes at all because much of the content is already summarized for you. However, it is a good idea to jot down at least a few notes. Doing so keeps you focused during the presentation, allows you to record details you might otherwise forget, and gives you the opportunity to jot down questions or reflections to personalize the content.

Exercise 3

Over the next few weeks, establish a note-taking system that works for you.

  1. If you are not already doing so, try using one of the aforementioned techniques. (Remember that the Cornell system can be combined with other note-taking formats.)
  2. It can take some trial and error to find a note-taking system that works for you. If you find that you are struggling to keep up with lectures, consider whether you need to switch to a different format or be more careful about distinguishing key concepts from unimportant details.
  3. If you find that you are having trouble taking notes effectively, set up an appointment with your school’s academic resource center.

Key Takeaways

  • Understanding your individual learning style and preferences can help you identify the study and time-management strategies that will work best for you.
  • To manage your time effectively, it is important to look at the short term (daily and weekly schedules) and the long term (major semester deadlines).
  • To manage your time effectively, be consistent about maintaining your schedule. If your schedule is not working for you, make adjustments.
  • A good note-taking system must differentiate among major points, related subtopics, and supporting details, and it must allow you to record and organize information fairly quickly. Choose the format that is most effective for you.

1.3 Becoming a Successful College Writer

Learning Objectives

  1. Identify strategies for successful writing.
  2. Demonstrate comprehensive writing skills.
  3. Identify writing strategies for use in future classes.

In the preceding sections, you learned what you can expect from college and identified strategies you can use to manage your work. These strategies will help you succeed in any college course. This section covers more about how to handle the demands college places upon you as a writer. The general techniques you will learn will help ensure your success on any writing task, whether you complete a bluebook exam in an hour or an in-depth research project over several weeks.

Putting It All Together: Strategies for Success

Writing well is difficult. Even people who write for a living sometimes struggle to get their thoughts on the page. Even people who generally enjoy writing have days when they would rather do anything else. For people who do not like writing or do not think of themselves as good writers, writing assignments can be stressful or even intimidating. And of course, you cannot get through college without having to write—sometimes a lot, and often at a higher level than you are used to.

No magic formula will make writing quick and easy. However, you can use strategies and resources to manage writing assignments more easily. This section presents a broad overview of these strategies and resources. The remaining chapters of this book provide more detailed, comprehensive instruction to help you succeed at a variety of assignments. College will challenge you as a writer, but it is also a unique opportunity to grow.

Using the Writing Process

To complete a writing project successfully, good writers use some variation of the following process.

The Writing Process

  • Prewriting. In this step, the writer generates ideas to write about and begins developing these ideas.
  • Outlining a structure of ideas. In this step, the writer determines the overall organizational structure of the writing and creates an outline to organize ideas. Usually this step involves some additional fleshing out of the ideas generated in the first step.
  • Writing a rough draft. In this step, the writer uses the work completed in prewriting to develop a first draft. The draft covers the ideas the writer brainstormed and follows the organizational plan that was laid out in the first step.
  • Revising. In this step, the writer revisits the draft to review and, if necessary, reshape its content. This stage involves moderate and sometimes major changes: adding or deleting a paragraph, phrasing the main point differently, expanding on an important idea, reorganizing content, and so forth.
  • Editing. In this step, the writer reviews the draft to make additional changes. Editing involves making changes to improve style and adherence to standard writing conventions—for instance, replacing a vague word with a more precise one or fixing errors in grammar and spelling. Once this stage is complete, the work is a finished piece and ready to share with others.

Chances are, you have already used this process as a writer. You may also have used it for other types of creative projects, such as developing a sketch into a finished painting or composing a song. The steps listed above apply broadly to any project that involves creative thinking. You come up with ideas (often vague at first), you work to give them some structure, you make a first attempt, you figure out what needs improving, and then you refine it until you are satisfied.

Most people have used this creative process in one way or another, but many people have misconceptions about how to use it to write. Here are a few of the most common misconceptions students have about the writing process:

  • “I do not have to waste time on prewriting if I understand the assignment.” Even if the task is straightforward and you feel ready to start writing, take some time to develop ideas before you plunge into your draft. FreewritingA prewriting strategy in which writers write freely about any topic for a set amount of time (usually three to five minutes).—writing about the topic without stopping for a set period of time—is one prewriting technique you might try in that situation.
  • “It is important to complete a formal, numbered outline for every writing assignment.” For some assignments, such as lengthy research papers, proceeding without a formal outline can be very difficult. However, for other assignments, a structured set of notes or a detailed graphic organizer may suffice. The important thing is that you have a solid plan for organizing ideas and details.
  • “My draft will be better if I write it when I am feeling inspired.” By all means, take advantage of those moments of inspiration. However, understand that sometimes you will have to write when you are not in the mood. Sit down and start your draft even if you do not feel like it. If necessary, force yourself to write for just one hour. By the end of the hour, you may be far more engaged and motivated to continue. If not, at least you will have accomplished part of the task.
  • “My instructor will tell me everything I need to revise.” If your instructor chooses to review drafts, the feedback can help you improve. However, it is still your job, not your instructor’s, to transform the draft to a final, polished piece. That task will be much easier if you give your best effort to the draft before submitting it. During revision, do not just go through and implement your instructor’s corrections. Take time to determine what you can change to make the work the best it can be.
  • “I am a good writer, so I do not need to revise or edit.” Even talented writers still need to revise and edit their work. At the very least, doing so will help you catch an embarrassing typo or two. Revising and editing are the steps that make good writers into great writers.

For a more thorough explanation of the steps of the writing process as well as for specific techniques you can use for each step, see Chapter 8 “The Writing Process: How Do I Begin?”.

Tip

The writing process also applies to timed writing tasks, such as essay exams. Before you begin writing, read the question thoroughly and think about the main points to include in your response. Use scrap paper to sketch out a very brief outline. Keep an eye on the clock as you write your response so you will have time to review it and make any needed changes before turning in your exam.

Managing Your Time

In Section 1.2 “Developing Study Skills”, you learned general time-management skills. By combining those skills with what you have learned about the writing process, you can make any writing assignment easier to manage.

When your instructor gives you a writing assignment, write the due date on your calendar. Then work backward from the due date to set aside blocks of time when you will work on the assignment. Always plan at least two sessions of writing time per assignment, so that you are not trying to move from step 1 to step 5 in one evening. Trying to work that fast is stressful, and it does not yield great results. You will plan better, think better, and write better if you space out the steps.

Ideally, you should set aside at least three separate blocks of time to work on a writing assignment: one for prewriting and outlining, one for drafting, and one for revising and editing. Sometimes those steps may be compressed into just a few days. If you have a couple of weeks to work on a paper, space out the five steps over multiple sessions. Long-term projects, such as research papers, require more time for each step.

Tip

In certain situations you may not be able to allow time between the different steps of the writing process. For instance, you may be asked to write in class or complete a brief response paper overnight. If the time available is very limited, apply a modified version of the writing process (as you would do for an essay exam). It is still important to give the assignment thought and effort. However, these types of assignments are less formal, and instructors may not expect them to be as polished as formal papers. When in doubt, ask the instructor about expectations, resources that will be available during the writing exam, and if they have any tips to prepare you to effectively demonstrate your writing skills.

Each Monday in Crystal’s Foundations of Education class, the instructor distributed copies of a current news article on education and assigned students to write a one-and-one-half- to two-page response that was due the following Monday. Together, these weekly assignments counted for 20 percent of the course grade. Although each response took just a few hours to complete, Crystal found that she learned more from the reading and got better grades on her writing if she spread the work out in the following way:

For more detailed guidelines on how to plan for a long-term writing project, see Chapter 11 “Writing from Research: What Will I Learn?”.

Setting Goals

One key to succeeding as a student and as a writer is setting both short- and long-term goals for yourself. You have already glimpsed the kind of short-term goals a student might set. Crystal wanted to do well in her Foundations of Education course, and she realized that she could control how she handled her weekly writing assignments. At 20 percent of her course grade, she reasoned, those assignments might mean the difference between a C and a B or between a B and an A.

By planning carefully and following through on her daily and weekly goals, Crystal was able to fulfill one of her goals for the semester. Although her exam scores were not as high as she had hoped, her consistently strong performance on writing assignments tipped her grade from a B+ to an A−. She was pleased to have earned a high grade in one of the required courses for her major. She was also glad to have gotten the most out of an introductory course that would help her become an effective teacher.

How does Crystal’s experience relate to your own college experience?

To do well in college, it is important to stay focused on how your day-to-day actions determine your long-term success. You may not have defined your career goals or chosen a major yet. Even so, you surely have some overarching goals for what you want out of college: to expand your career options, to increase your earning power, or just to learn something new. In time, you will define your long-term goals more explicitly. Doing solid, steady work, day by day and week by week, will help you meet those goals.

Exercise 1

In this exercise, make connections between short- and long-term goals.

  1. For this step, identify one long-term goal you would like to have achieved by the time you complete your degree. For instance, you might want a particular job in your field or hope to graduate with honors.
  2. Next, identify one semester goal that will help you fulfill the goal you set in step one. For instance, you may want to do well in a particular course or establish a connection with a professional in your field.
  3. Review the goal you determined in step two. Brainstorm a list of stepping stones that will help you meet that goal, such as “doing well on my midterm and final exams” or “talking to Professor Gibson about doing an internship.” Write down everything you can think of that would help you meet that semester goal.
  4. Review your list. Choose two to three items, and for each item identify at least one concrete action you can take to accomplish it. These actions may be recurring (meeting with a study group each week) or one time only (calling the professor in charge of internships).
  5. Identify one action from step four that you can do today. Then do it.

Using College Resources

One reason students sometimes find college overwhelming is that they do not know about, or are reluctant to use, the resources available to them. Some aspects of college will be challenging. However, if you try to handle every challenge alone, you may become frustrated and overwhelmed.

Universities have resources in place to help students cope with challenges. Your student fees help pay for resources such as a health center or tutoring, so use these resources if you need them. The following are some of the resources you might use if you find you need help:

  • Your instructor. If you are making an honest effort but still struggling with a particular course, set up a time to meet with your instructor and discuss what you can do to improve. He or she may be able to shed light on a confusing concept or give you strategies to catch up.
  • Your academic counselor. Many universities assign students an academic counselor who can help you choose courses and ensure that you fulfill degree and major requirements.
  • The academic resource center. These centers offer a variety of services, which may range from general coaching in study skills to tutoring for specific courses. Find out what is offered at your school and use the services that you need.
  • The writing center. These centers employ tutors to help you manage college-level writing assignments. They will not write or edit your paper for you, but they can help you through the stages of the writing process. (In some schools, the writing center is part of the academic resource center.)
  • The career resource center. Visit the career resource center for guidance in choosing a career path, developing a résumé, and finding and applying for jobs.
  • Counseling services. Many universities offer psychological counseling for free or for a low fee. Use these services if you need help coping with a difficult personal situation or managing depression, anxiety, or other problems.

Students sometimes neglect to use available resources due to limited time, unwillingness to admit there is a problem, or embarrassment about needing to ask for help. Unfortunately, ignoring a problem usually makes it harder to cope with later on. Waiting until the end of the semester may also mean fewer resources are available, since many other students are also seeking last-minute help.

Exercise 2

Identify at least one college resource that you think could be helpful to you and you would like to investigate further. Schedule a time to visit this resource within the next week or two so you can use it throughout the semester.

Overview: College Writing Skills

You now have a solid foundation of skills and strategies you can use to succeed in college. The remainder of this book will provide you with guidance on specific aspects of writing, ranging from grammar and style conventions to how to write a research paper.

For any college writing assignment, use these strategies:

  • Plan ahead. Divide the work into smaller, manageable tasks, and set aside time to accomplish each task in turn.
  • Make sure you understand the assignment requirements, and if necessary, clarify them with your instructor. Think carefully about the purpose of the writing, the intended audience, the topics you will need to address, and any specific requirements of the writing form.
  • Complete each step of the writing process. With practice, using this process will come automatically to you.
  • Use the resources available to you. Remember that most colleges have specific services to help students with their writing.

For help with specific writing assignments and guidance on different aspects of writing, you may refer to the other chapters in this book. The table of contents lists topics in detail. As a general overview, the following paragraphs discuss what you will learn in the upcoming chapters.

Chapter 2 “Writing Basics: What Makes a Good Sentence?” through Chapter 7 “Refining Your Writing: How Do I Improve My Writing Technique?” will ground you in writing basics: the “nuts and bolts” of grammar, sentence structure, and paragraph development that you need to master to produce competent college-level writing. Chapter 2 “Writing Basics: What Makes a Good Sentence?” reviews the parts of speech and the components of a sentence. Chapter 3 “Punctuation” explains how to use punctuation correctly. Chapter 4 “Working with Words: Which Word Is Right?” reviews concepts that will help you use words correctly, including everything from commonly confused words to using context clues.

Chapter 5 “Help for English Language Learners” provides guidance for students who have learned English as a second language. Then, Chapter 6 “Writing Paragraphs: Separating Ideas and Shaping Content” guides you through the process of developing a paragraph while Chapter 7 “Refining Your Writing: How Do I Improve My Writing Technique?” has tips to help you refine and improve your sentences.

Chapter 8 “The Writing Process: How Do I Begin?” through Chapter 10 “Rhetorical Modes” are geared to help you apply those basics to college-level writing assignments. Chapter 8 “The Writing Process: How Do I Begin?” shows the writing process in action with explanations and examples of techniques you can use during each step of the process. Chapter 9 “Writing Essays: From Start to Finish” provides further discussion of the components of college essays—how to create and support a thesis and how to organize an essay effectively. Chapter 10 “Rhetorical Modes” discusses specific modes of writing you will encounter as a college student and explains how to approach these different assignments.

Chapter 11 “Writing from Research: What Will I Learn?” through Chapter 14 “Creating Presentations: Sharing Your Ideas” focus on how to write a research paper. Chapter 11 “Writing from Research: What Will I Learn?” guides students through the process of conducting research, while Chapter 12 “Writing a Research Paper” explains how to transform that research into a finished paper. Chapter 13 “APA and MLA Documentation and Formatting” explains how to format your paper and use a standard system for documenting sources. Finally, Chapter 14 “Creating Presentations: Sharing Your Ideas” discusses how to transform your paper into an effective presentation.

Many of the chapters in this book include sample student writing—not just the finished essays but also the preliminary steps that went into developing those essays. Chapter 15 “Readings: Examples of Essays” of this book provides additional examples of different essay types.

Key Takeaways

  • Following the steps of the writing process helps students complete any writing assignment more successfully.
  • To manage writing assignments, it is best to work backward from the due date, allotting appropriate time to complete each step of the writing process.
  • Setting concrete long- and short-term goals helps students stay focused and motivated.
  • A variety of university resources are available to help students with writing and with other aspects of college life.

1.4 Introduction to Writing: End-of-Chapter Exercises

Exercises

  1. Find out more about your learning style by visiting your academic resource center or doing Internet research. Take note of strategies that are recommended for different types of learners. Which strategies do you already use? Which strategies could you incorporate into your routine?
  2. Apply the following comprehension and active reading strategies to an assigned reading:

    • Locate the writer’s main idea and major supporting points. (Use text features to gather clues.)
    • Apply the SQ3R strategy: Survey, Question, Read, Recite and Record, and Review and Reflect.
    • Apply at least one other active reading strategy appropriate for the text, such as visualizing or connecting the text to personal experiences.
  3. After reviewing your syllabus, map out a timeline of major assignments in the course. Describe the steps you anticipate needing to follow in order to complete these assignments.
  4. Take a few minutes to skim through the remaining chapters of this book, whose contents are described in Section 1.3 “Becoming a Successful College Writer”. Use self-stick notes or flags to mark any sections that you expect to consult frequently when you write, such as a grammar guide or guidelines for a particular essay format. You may wish to similarly make notes in other writing handbooks you own and any other reference books you will need to use frequently.

Chapter 14: Google: Search, Online Advertising, and Beyond

14.1 Introduction

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the extent of Google’s rapid rise and its size and influence when compared with others in the media industry.
  2. Recognize the shift away from traditional advertising media to Internet advertising.
  3. Gain insight into the uniqueness and appeal of Google’s corporate culture.

Google has been called a one-trick pony,C. Li, “Why Google’s One-Trick Pony Struggles to Learn New Tricks,” Harvard Business Publishing, May 2009. but as tricks go, it’s got an exquisite one. Google’s “trick” is matchmaking—pairing Internet surfers with advertisers and taking a cut along the way. This cut is substantial—about $23 billion in 2009. In fact, as Wired’s Steve Levy puts it, Google’s matchmaking capabilities may represent “the most successful business idea in history.”S. Levy, “The Secrets of Googlenomics,” Wired, June 2009. For perspective, consider that as a ten-year-old firm, and one that had been public for less than five years, Google had already grown to earn more annual advertising dollars than any U.S. media company. No television network, no magazine group, no newspaper chain brings in more ad bucks than Google. And none is more profitable. While Google’s stated mission is “to organize the world’s information and make it universally accessible and useful,” advertising drives profits and lets the firm offer most of its services for free.

Figure 14.1 U.S. Advertising Spending (by selected media)

Online advertising represents the only advertising category trending with positive growth. Figures for 2009 and beyond are estimates.

Figure 14.2 U.S. Online Ad Spending (by format)

Search captures the most online ad dollars, and Google dominates search advertising. Figures for 2009 and beyond are estimates.

As more people spend more time online, advertisers are shifting spending away from old channels to the Internet; and Google is swallowing the lion’s share of this funds transfer.J. Pontin, “But Who’s Counting?” Technology Review, March/April 2009. By some estimates Google has 76 percent of the search advertising business.C. Sherman, “Report: Google Leads U.S. Search Advertising Market With 76% Market Share,” Search Engine Land, January 20, 2009. Add to that Google’s lucrative AdSense network that serves ads to sites ranging from small time bloggers to the New York Times, plus markets served by Google’s acquisition of display ad leader DoubleClick, and the firm controls in the neighborhood of 70 percent of all online advertising dollars.L. Baker, “Google Now Controls 69% of Online Advertising Market,” Search Engine Journal, March 31, 2008. Google has the world’s strongest brandL. Rao, “Guess Which Brand Is Now Worth $100 Billion?” TechCrunch, April 30, 2009. (its name is a verb—just Google it). It is regularly voted among the best firms to work for in America (twice topping Fortune’s list). While rivals continue to innovate (see Note 14.85 “Search: Google Rules, but It Ain’t Over”) through Q1 2009, Google continues to dominate the search market.

Figure 14.3 U.S. Search Market Share (Volume of Searches, March 2010)Adapted from Experian Hitwise, “Top Search Engine Volume, All Categories, 4 Weeks Ending March 27, 2010.”

Wall Street has rewarded this success. The firm’s market capitalization (market cap)The value of a firm calculated by multiplying its share price by the number of shares., the value of the firm calculated by multiplying its share price by the number of shares, makes Google the most valuable media company on the planet. By early 2009, Google’s market cap was greater than that of News Corp (which includes Fox, MySpace, and the Wall Street Journal), Disney (including ABC, ESPN, theme parks, and Pixar), Time Warner (Fortune, Time, Sports Illustrated, CNN, and Warner Bros.), Viacom (MTV, VH1, and Nickelodeon), CBS, and the New York Times—combined! Not bad for a business started by two twenty-something computer science graduate students. By 2007 that duo, Sergey Brin and Larry Page, were billionaires, tying for fifth on the Forbes 400 list of wealthiest Americans.

Genius Geeks and Plum Perks

Brin and Page have built a talent magnet. At the Googleplex, the firm’s Mountain View, California headquarters, geeks are lavished with perks that include on-site laundry, massage, carwash, bicycle repair, free haircuts, state of the art gyms, and Wi-FiA term used to brand wireless local-area networking devices. Devices typically connect to an antenna-equipped base station or hotspot, which is then connected to the Internet. Wi-Fi devices use standards known as IEEE 802.11, and various version of this standard (e.g., b, g, n) may operate in different frequency bands and have access ranges. equipped shuttles that ferry employees between Silicon Valley and the San Francisco Bay area. The Googleplex is also pretty green. The facility gets 30 percent of its energy from solar cells, representing the largest corporate installation of its kind.D. Weldon, “Google’s Power Play,” EnergyDigital, August 30, 2007.

The firm’s quirky tech-centric culture is evident everywhere. A T-Rex skeleton looms near the volleyball court. Hanging from the lobby ceiling is a replica of SpaceShipOne, the first commercial space vehicle. And visitors to the bathroom will find “testing on the toilet,” coding problems or other brainteasers to keep gray matter humming while seated on one of the firm’s $800 remote-controlled Japanese commodes. Staff also enjoy an A-list lecture series attracting luminaries ranging from celebrities to heads of state.

And of course there’s the food—all of it free. The firm’s founders felt that no employee should be more than 100 feet away from nourishment, and a tour around Google offices will find espresso bars, snack nooks, and fully stocked beverage refrigerators galore. There are eleven gourmet cafeterias on-site, the most famous being “Charlie’s Place,” first run by the former executive chef for the Grateful Dead.

CEO Eric Schmidt says the goal of all this is “to strip away everything that gets in our employees’ way.”L. Wolgemuth, “Forget the Recession, I Want a Better Chair,” U.S. News and World Report, April 28, 2008. And the perks, culture, and sense of mission have allowed the firm to assemble one of the most impressive rosters of technical talent anywhere. The Googleplex is like a well-fed Manhattan project, and employee ranks include a gaggle of geniuses that helped invent critical technologies such as the Macintosh user interface, the python programming language, the XML standard, and even the protocols that underlie the Internet itself.

Engineers find Google a particularly attractive place to work, in part due to a corporate policy of offering “20 percent time,” the ability to work the equivalent of one day a week on new projects that interest them. It’s a policy that has fueled innovation. Google Vice President Marissa Mayer (who herself regularly ranks among Fortune’s most powerful women in business) has stated that roughly half of Google products got their start in 20 percent time.B. Casnocha, “Success on the Side,” The American: The Journal of the American Enterprise Institute, April 24, 2009.

Studying Google gives us an idea of how quickly technology-fueled market disruptions can happen, and how deeply these disruptions penetrate various industries. We’ll also study the underlying technologies that power search, online advertising, and customer profiling. We’ll explore issues of strategy, privacy, fraud, and discuss other opportunities and challenges the firm faces going forward.

Key Takeaways

  • Online advertising represents the only advertising category trending with positive growth.
  • Google dominates Internet search volume and controls the lion’s share of the Internet search advertising business and online advertising dollars. The firm also earns more total advertising revenue than any other firm, online or off.
  • Google’s market cap makes it the most valuable media company in the world; it has been rated as having the world’s strongest brand.

Questions and Exercises

  1. List the reasons why Google has been considered a particularly attractive firm to work for. Are all of these associated with perks?
  2. Market capitalization and market share change frequently. Investigate Google’s current market cap and compare it with other media companies. Do patterns suggested in this case continue to hold? Why or why not?
  3. Search industry numbers presented are through March 2010. Research online to find out the most current Google versus Bing versus Yahoo! market share. Does Google’s position seem secure to you? Why or why not?

14.2 Understanding Search

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the mechanics of search, including how Google indexes the Web and ranks its organic search results.
  2. Examine the infrastructure that powers Google and how its scale and complexity offer key competitive advantages.

Before diving into how the firm makes money, let’s first understand how Google’s core service, search, works.

Perform a search (or querySearch.) on Google or another search engine, and the results you’ll see are referred to by industry professionals as organic or natural searchSearch engine results returned and ranked according to relevance.. Search engines use different algorithms for determining the order of organic search results, but at Google the method is called PageRankAlgorithm developed by Google cofounder Larry Page to rank Web sites. (a bit of a play on words, it ranks Web pages, and was initially developed by Google cofounder Larry Page). Google does not accept money for placement of links in organic search results. Instead, PageRank results are a kind of popularity contest. Web pages that have more pages linking to them are ranked higher.

Figure 14.4

The query for “Toyota Prius” triggers organic search results, flanked top and right by sponsored link advertisements.

The process of improving a page’s organic search results is often referred to as search engine optimization (SEO)The process of improving a page’s organic search results.. SEO has become a critical function for many marketing organizations since if a firm’s pages aren’t near the top of search results, customers may never discover its site.

Google is a bit vague about the specifics of precisely how PageRank has been refined, in part because many have tried to game the system. In addition to in-bound links, Google’s organic search results also consider some two hundred other signals, and the firm’s search quality team is relentlessly analyzing user behavior for clues on how to tweak the system to improve accuracy.S. Levy, “Inside the Box,” Wired, March 2010. The less scrupulous have tried creating a series of bogus Web sites, all linking back to the pages they’re trying to promote (this is called link fraudAlso called “spamdexing” or “link farming.” The process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote., and Google actively works to uncover and shut down such efforts). We do know that links from some Web sites carry more weight than others. For example, links from Web sites that Google deems as “influential,” and links from most “.edu” Web sites, have greater weight in PageRank calculations than links from run-of-the-mill “.com” sites.

Spiders and Bots and Crawlers—Oh My!

When performing a search via Google or another search engine, you’re not actually searching the Web. What really happens is that the major search engines make what amounts to a copy of the Web, storing and indexing the text of online documents on their own computers. Google’s index considers over one trillion URLs.A. Wright, “Exploring a ‘Deep Web’ That Google Can’t Grasp,” New York Times, February 23, 2009. The upper right-hand corner of a Google query shows you just how fast a search can take place (in the example above, rankings from over eight million results containing the term “Toyota Prius” were delivered in less than two tenths of a second).

To create these massive indexes, search firms use software to crawl the Web and uncover as much information as they can find. This software is referred to by several different names—software robots, spiders, Web crawlersSoftware that traverses available Web links in an attempt to perform a given task. Search engines use spiders to discover documents for indexing and retrieval.—but they all pretty much work the same way. In order to make its Web sites visible, every online firm provides a list of all of the public, named servers on its network, known as domain name service (DNS)Internet directory service that allows devices and services to be named and discoverable. The DNS, for example, helps your browser locate the appropriate computers when entering an address like http://finance.google.com. listings. For example, Yahoo! has different servers that can be found at http://www.yahoo.com, sports.yahoo.com, weather.yahoo.com, finance.yahoo.com, and so on. Spiders start at the first page on every public server and follow every available link, traversing a Web site until all pages are uncovered.

Google will crawl frequently updated sites, like those run by news organizations, as often as several times an hour. Rarely updated, less popular sites might only be reindexed every few days. The method used to crawl the Web also means that if a Web site isn’t the first page on a public server, or isn’t linked to from another public page, then it’ll never be found.Most Web sites do have a link where you can submit a Web site for indexing, and doing so can help promote the discovery of your content. Also note that each search engine also offers a page where you can submit your Web site for indexing.

While search engines show you what they’ve found on their copy of the Web’s contents; clicking a search result will direct you to the actual Web site, not the copy. But sometimes you’ll click a result only to find that the Web site doesn’t match what the search engine found. This happens if a Web site was updated before your search engine had a chance to reindex the changes. In most cases you can still pull up the search engine’s copy of the page. Just click the “Cached” link below the result (the term cacheA temporary storage space used to speed computing tasks. refers to a temporary storage space used to speed computing tasks).

But what if you want the content on your Web site to remain off limits to search engine indexing and caching? Organizations have created a set of standards to stop the spider crawl, and all commercial search engines have agreed to respect these standards. One way is to put a line of HTML code invisibly embedded in a Web site that tells all software robots to stop indexing a page, stop following links on the page, or stop offering old page archives in a cache. Users don’t see this code, but commercial Web crawlers do. For those familiar with HTML code (the language used to describe a Web site), the command to stop Web crawlers from indexing a page, following links, and listing archives of cached pages looks like this:

〈META NAME=“ROBOTS” CONTENT=“NOINDEX, NOFOLLOW, NOARCHIVE”〉

There are other techniques to keep the spiders out, too. Web site administrators can add a special file (called robots.txt) that provides similar instructions on how indexing software should treat the Web site. And a lot of content lies inside the “dark WebInternet content that can’t be indexed by Google and other search engines.,” either behind corporate firewalls or inaccessible to those without a user account—think of private Facebook updates no one can see unless they’re your friend—all of that is out of Google’s reach.

What’s It Take to Run This Thing?

Sergey Brin and Larry Page started Google with just four scavenged computers.M. Liedtke, “Google Reigns as World’s Most Powerful 10-Year-Old,” Associated Press, September 5, 2008. But in a decade, the infrastructure used to power the search sovereign has ballooned to the point where it is now the largest of its kind in the world.David F. Carr, “How Google Works,” Baseline, July 6, 2006. Google doesn’t disclose the number of servers it uses, but by some estimates, it runs over 1.4 million servers in over a dozen so-called server farmsA massive network of computer servers running software to coordinate their collective use. Server farms provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services. worldwide.R. Katz, “Tech Titans Building Boom,” IEEE Spectrum 46, no. 2 (February 1, 2009). In 2008, the firm spent $2.18 billion on capital expenditures, with data centers, servers, and networking equipment eating up the bulk of this cost.Google, “Google Announces Fourth Quarter and Fiscal Year 2008 Results,” press release, January 22, 2009. Building massive server farms to index the ever-growing Web is now the cost of admission for any firm wanting to compete in the search market. This is clearly no longer a game for two graduate students working out of a garage.

Google’s Container Data Center

(click to see video)

Take a virtual tour of one of Google’s data centers.

The size of this investment not only creates a barrier to entry, it influences industry profitability, with market-leader Google enjoying huge economies of scale. Firms may spend the same amount to build server farms, but if Google has nearly 70 percent of this market (and growing) while Microsoft’s search draws less than one-seventh the traffic, which do you think enjoys the better return on investment?

The hardware components that power Google aren’t particularly special. In most cases the firm uses the kind of Intel or AMD processors, low-end hard drives, and RAM chips that you’d find in a desktop PC. These components are housed in rack-mounted servers about 3.5 inches thick, with each server containing two processors, eight memory slots, and two hard drives.

In some cases, Google mounts racks of these servers inside standard-sized shipping containers, each with as many as 1,160 servers per box.S. Shankland, “Google Unlocks Once-Secret Server,” CNET, April 1, 2009. A given data center may have dozens of these server-filled containers all linked together. Redundancy is the name of the game. Google assumes individual components will regularly fail, but no single failure should interrupt the firm’s operations (making the setup what geeks call fault-tolerantCapable of continuing operation even if a component fails.). If something breaks, a technician can easily swap it out with a replacement.

Each server farm layout has also been carefully designed with an emphasis on lowering power consumption and cooling requirements. And the firm’s custom software (much of it built upon open source products) allows all this equipment to operate as the world’s largest grid computer.

Web search is a task particularly well suited for the massively parallel architecture used by Google and its rivals. For an analogy of how this works, imagine that working alone, you need try to find a particular phrase in a hundred-page document (that’s a one server effort). Next, imagine that you can distribute the task across five thousand people, giving each of them a separate sentence to scan (that’s the multi-server grid). This difference gives you a sense of how search firms use massive numbers of servers and the divide-and-conquer approach of grid computing to quickly find the needles you’re searching for within the Web’s haystack. (For more on grid computing, see Chapter 5 “Moore’s Law: Fast, Cheap Computing and What It Means for the Manager”, and for more on server farms, see Chapter 10 “Software in Flux: Partly Cloudy and Sometimes Free”.)

Figure 14.5

The Google Search Appliance is a hardware product that firms can purchase in order to run Google search technology within the privacy and security of an organization’s firewall.

Google will even sell you a bit of its technology so that you can run your own little Google in-house without sharing documents with the rest of the world. Google’s line of search appliances are rack-mounted servers that can index documents within a corporation’s Web site, even specifying password and security access on a per-document basis. Selling hardware isn’t a large business for Google, and other vendors offer similar solutions, but search appliances can be vital tools for law firms, investment banks, and other document-rich organizations.

Trendspotting with Google

Google not only gives you search results, it lets you see aggregate trends in what its users are searching for, and this can yield powerful insights. For example, by tracking search trends for flu symptoms, Google’s Flu Trends Web site can pinpoint outbreaks one to two weeks faster than the Centers for Disease Control and Prevention.S. Bruce, “Google Says User Data Aids Flu Detection,” eHealthInsider, May 25, 2009. Want to go beyond the flu? Google’s Trends, and Insights for Search services allow anyone to explore search trends, breaking out the analysis by region, category (image, news, product), date, and other criteria. Savvy managers can leverage these and similar tools for competitive analysis, comparing a firm, its brands, and its rivals.

Figure 14.6

Google Insights for Search can be a useful tool for competitive analysis and trend discovery. The chart above shows a comparison (over a twelve-month period, and geographically) of search interest in the terms Wii, Playstation, and Xbox.

Key Takeaways

  • Ranked search results are often referred to as organic or natural search. PageRank is Google’s algorithm for ranking search results. PageRank orders organic search results based largely on the number of Web sites linking to them, and the “weight” of each page as measured by its “influence.”
  • Search engine optimization (SEO) is the process of using natural or organic search to increase a Web site’s traffic volume and visitor quality. The scope and influence of search has made SEO an increasingly vital marketing function.
  • Users don’t really search the Web; they search an archived copy built by crawling and indexing discoverable documents.
  • Google operates from a massive network of server farms containing hundreds of thousands of servers built from standard, off-the-shelf items. The cost of the operation is a significant barrier to entry for competitors. Google’s share of search suggests the firm can realize economies of scales over rivals required to make similar investments while delivering fewer results (and hence ads).
  • Web site owners can hide pages from popular search engine Web crawlers using a number of methods, including HTML tags, a no-index file, or ensuring that Web sites aren’t linked to other pages and haven’t been submitted to Web sites for indexing.

Questions and Exercises

  1. How do search engines discover pages on the Internet? What kind of capital commitment is necessary to go about doing this? How does this impact competitive dynamics in the industry?
  2. How does Google rank search results? Investigate and list some methods that an organization might use to improve its rank in Google’s organic search results. Are there techniques Google might not approve of? What risk does a firm run if Google or another search firm determines that it has used unscrupulous SEO techniques to try to unfairly influence ranking algorithms?
  3. Sometimes Web sites returned by major search engines don’t contain the words or phrases that initially brought you to the site. Why might this happen?
  4. What’s a cache? What other products or services have a cache?
  5. What can be done if you want the content on your Web site to remain off limits to search engine indexing and caching?
  6. What is a “search appliance?” Why might an organization choose such a product?
  7. Become a better searcher: Look at the advanced options for your favorite search engine. Are there options you hadn’t used previously? Be prepared to share what you learn during class discussion.
  8. Visit Google Trends and Google Insights for Search. Explore the tool as if you were comparing a firm with its competitors. What sorts of useful insights can you uncover? How might businesses use these tools?

14.3 Understanding the Increase in Online Ad Spending

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand how media consumption habits are shifting.
  2. Be able to explain the factors behind the growth and appeal of online advertising.

For several years, Internet advertising has been the only major media ad category to show significant growth. There are three factors driving online ad growth trends: (1) increased user time online, (2) improved measurement and accountability, and (3) targeting.

American teenagers (as well as the average British, Australian, and New Zealander Web surfer) now spend more time on the Internet than watching television.“American Teenagers Spend More Time Online Than Watching Television,” MediaWeek, June 19, 2008; A. Hendry, “Connected Aussies Spend More Time Online Than Watching TV,” Computerworld Australia, May 21, 2008; and “Brits Spend More Time Online Than Watching TV,” BigMouthMedia, July 12, 2007. They’re reading fewer print publications, and radio listening among the iPod generation is down 30 percent.M. Tobias, “Newspapers under Siege,” Philstar, May 18, 2009. So advertisers are simply following the market. Online channels also provide advertisers with a way to reach consumers at work—something that was previously much more difficult to do.

Many advertisers have also been frustrated by how difficult it’s been to gauge the effectiveness of traditional ad channels such as TV, print, and radio. This frustration is reflected in the old industry saying, “I know that half of my advertising is working—I just don’t know which half.” Well, with the Internet, now you know. While measurement technologies aren’t perfect, advertisers can now count ad impressionsEach time an ad is served to a user for viewing. (the number of times an ad appears on a Web site), whether a user clicks on an ad, and the product purchases or other Web site activity that comes from those clicks.For a more detailed overview of the limitations in online ad measurement, see L. Rao, “Guess Which Brand Is Now Worth $100 Billion?” TechCrunch, April 30, 2009. And as we’ll see, many online ad payment schemes are directly linked to ad performance.

Various technologies and techniques also make it easier for firms to target users based on how likely a person is to respond to an ad. In theory a firm can use targeting to spend marketing dollars only on those users deemed to be its best prospects. Let’s look at a few of these approaches in action.

Key Takeaways

  • There are three reasons driving online ad growth trends: (1) increasing user time online, (2) improved measurement and accountability, and (3) targeting.
  • Digital media is decreasing time spent through traditional media consumption channels (e.g., radio, TV, newspapers), potentially lowering the audience reach of these old channels and making them less attractive for advertisers.
  • Measurement techniques allow advertisers to track the performance of their ads—indicating things such as how often an ad is displayed, how often an ad is clicked, where an ad was displayed when it was clicked, and more. Measurement metrics can be linked to payment schemes, improving return on investment (ROI) and accountability compared to many types of conventional advertising.
  • Advertising ROI can be improved through targeting. Targeting allows a firm to serve ads to specific categories of users, so firms can send ads to groups it is most interested in reaching, and those that are most likely to respond to an effort.

Questions and Exercises

  1. How does your media time differ from your parents? Does it differ among your older or younger siblings, or other relatives? Which media are you spending more time with? Less time with?
  2. Put yourself in the role of a traditional media firm that is seeing its market decline. What might you do to address decline concerns? Have these techniques been attempted by other firms? Do you think they’ve worked well? Why or why not?
  3. Put yourself in the role of an advertiser for a product or service that you’re interested in. Is the Internet an attractive channel for you? How might you use the Internet to reach customers you are most interested in? Where might you run ads? Who might you target? Who might you avoid? How might the approach you use differ from traditional campaigns you’d run in print, TV, or radio? How might the size (money spent, attempted audience reach) and timing (length of time run, time between campaigns) of ad campaigns online differ from offline campaigns?
  4. List ways in which you or someone you know has been targeted in an Internet ad campaign. Was it successful? How do you feel about targeting?

14.4 Search Advertising

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand Google’s search advertising revenue model.
  2. Know the factors that determine the display and ranking of advertisements appearing on Google’s search results pages.
  3. Be able to describe the uses and technologies behind geotargeting.

The practice of running and optimizing search engine ad campaigns is referred to as search engine marketing (SEM)The practice of designing, running and optimizing search engine ad campaigns..S. Elliott, “More Agencies Investing in Marketing with a Click,” New York Times, March 14, 2006. SEM is a hot topic in an increasingly influential field, so it’s worth spending some time learning how search advertising works on the Internet’s largest search engine.

Roughly two-thirds of Google’s revenues come from ads served on its own sites, and the vast majority of this revenue comes from search engine ads.Google, “Google Announces Fourth Quarter and Fiscal Year 2008 Results,” press release, January 22, 2009. During Google’s early years, the firm actually resisted making money through ads. In fact, while at Stanford, Brin and Page even coauthored a paper titled “The Evils of Advertising.”D. Vise, “Google’s Decade,” Technology Review, September 12, 2008. But when Yahoo! and others balked at buying Google’s search technology (offered for as little as $500,000), Google needed to explore additional revenue streams. It wasn’t until two years after incorporation that Google ran ads alongside organic search results. That first ad, one for “Live Mail Order Lobsters,” appeared just minutes after the firm posted a link reading “See Your Ad Here”).S. Levy, “The Secrets of Googlenomics,” Wired, June 2009.

Google has only recently begun incorporating video and image ads into search. For the most part, the ads you’ll see to the right (and sometimes top) of Google’s organic search results appear as keyword advertisingAdvertisements that are targeted based on a user’s query., meaning they’re targeted based on a user’s query. Advertisers bid on the keywords and phrases that they’d like to use to trigger the display of their ad. Linking ads to search was a brilliant move, since the user’s search term indicates an overt interest in a given topic. Want to sell hotel stays in Tahiti? Link your ads to the search term “Tahiti Vacation.”

Not only are search ads highly targeted, advertisers only pay for results. Text ads appearing on Google search pages are billed on a pay-per-click (PPC)A concept where advertisers don’t pay unless someone clicks on their ad. basis, meaning that advertisers don’t spend a penny unless someone actually clicks on their ad. Note that the term pay-per-click is sometimes used interchangeably with the term cost-per-click (CPC)The maximum amount of money an advertiser is willing to pay for each click on their ad..

Not Entirely Google’s Idea

Google didn’t invent pay-for-performance search advertising. A firm named GoTo.com (later renamed Overture) pioneered pay-per-click ads and bidding systems and held several key patents governing the technology. Overture provided pay-per-click ad services to both Yahoo! and Microsoft, but it failed to refine and match the killer combination of ad auctions and search technology that made Google a star. Yahoo! eventually bought Overture and sued Google for patent infringement. In 2004, the two firms settled, with Google giving Yahoo! 2.7 million shares in exchange for a “fully paid, perpetual license” to over sixty Overture patents.S. Olsen, “Google, Yahoo Bury the Legal Hatchet,” CNET, August 9, 2004.

If an advertiser wants to display an ad on Google search, they can set up a Google AdWords advertising account in minutes, specifying just a single ad, or multiple ad campaigns that trigger different ads for different keywords. Advertisers also specify what they’re willing to pay each time an ad is clicked, how much their overall ad budget is, and they can control additional parameters, such as the timing and duration of an ad campaign.

If no one clicks on an ad, Google doesn’t make money, advertisers don’t attract customers, and searchers aren’t seeing ads they’re interested in. So in order to create a winning scenario for everyone, Google has developed a precise ad ranking formula that rewards top performing ads by considering two metrics: the maximum CPC that an advertiser is willing to pay, and the advertisement’s quality score—a broad measure of ad performance. Create high quality ads and your advertisements might appear ahead of competition, even if your competitors bid more than you. But if ads perform poorly they’ll fall in rankings or even drop from display consideration.

Below is the formula used by Google to determine the rank order of sponsored links appearing on search results pages.

Ad Rank = Maximum CPC × Quality Score

One factor that goes into determining an ad’s quality score is the click-through rate (CTR)The number of users who clicked an ad divided by the number of times the ad was delivered (the impressions). The CTR measures the percentage of people who clicked on an ad to arrive at a destination-site. for the ad, the number of users who clicked an ad divided by the number of times the ad was delivered (the impressions). The CTR measures the percentage of people who clicked on an ad to arrive at a destination-site. Also included in a quality score are the overall history of click performance for the keywords linked to the ad, the relevance of an ad’s text to the user’s query, and Google’s automated assessment of the user experience on the landing pageThe Web site displayed when a user clicks on an advertisement.—the Web site displayed when a user clicks on the ad. Ads that don’t get many clicks, ad descriptions that have nothing to do with query terms, and ads that direct users to generic pages that load slowly or aren’t strongly related to the keywords and descriptions used in an ad, will all lower an ad’s chance of being displayed.Google, Marketing and Advertising Using Google: Targeting Your Advertising to the Right Audience (Boston: Cengage Learning, 2007).

When an ad is clicked, advertisers don’t actually pay their maximum CPC; Google discounts ads to just one cent more than the minimum necessary to maintain an ad’s position on the page. So if you bid one dollar per click, but the ad ranked below you bids ninety cents, you’ll pay just ninety-one cents if the ad is clicked. Discounting was a brilliant move. No one wants to get caught excessively overbidding rivals, so discounting helps reduce the possibility of this so-called bidder’s remorse. And with this risk minimized, the system actually encouraged higher bids!S. Levy, “The Secrets of Googlenomics,” Wired, June 2009.

Ad ranking and cost-per-click calculations take place as part of an automated auction that occurs every time a user conducts a search. Advertisers get a running total of ad performance statistics so that they can monitor the return on their investment and tweak promotional efforts for better results. And this whole system is automated for self-service—all it takes is a credit card, an ad idea, and you’re ready to go.

How Much Do Advertisers Pay per Click?

Google rakes in billions on what amounts to pocket change earned one click at a time. Most clicks bring in between thirty cents and one dollar. However, costs can vary widely depending on industry, current competition, and perceived customer value. Table 14.1 “10 Most Expensive Industries for Keyword Ads” shows some of the highest reported CPC rates. But remember, any values fluctuate in real time based on auction participants.

Table 14.1 10 Most Expensive Industries for Keyword Ads

Business/Industry Keywords in the Top 25 Avg. CPC
Structured Settlements 2 $51.97
Secured Loans 2 $50.67
Buying Endowments 1 $50.35
Mesothelioma Lawyers 5 $50.30
DUI Lawyers 4 $49.78
Conference Call Companies 1 $49.64
Car Insurance Quotes 3 $49.61
Student Loan Consolidation 3 $49.44
Data Recovery 2 $49.43
Remortgages 2 $49.42

Since rates are based on auctions, top rates reflect what the market is willing to bear. As an example, law firms, which bring in big bucks from legal fees, decisions, and settlement payments often justify higher customer acquisition costs. And firms that see results will keep spending. Los Angeles–based Chase Law Group has said that it brings in roughly 60 percent of its clients through Internet advertising.C. Mann, “How Click Fraud Could Swallow the Internet,” Wired, January 2006.

IP Addresses and Geotargeting

GeotargetingIdentifying a user’s physical location (sometimes called geolocation) for the purpose of delivering tailored ads or other content. occurs when computer systems identify a user’s physical location (sometimes called the geolocation) for the purpose of delivering tailored ads or other content. On Google AdWords, for example, advertisers can specify that their ads only appear for Web surfers located in a particular country, state, metropolitan region, or a given distance around a precise locale. They can even draw a custom ad-targeting region on a map and tell Google to only show ads to users detected inside that space.

Ads in Google Search are geotargeted based on IP addressA value used to identify a device that is connected to the Internet. IP addresses are usually expressed as four numbers (from 0 to 255), separated by periods.. Every device connected to the Internet has a unique IP address assigned by the organization connecting the device to the network. Normally you don’t see your IP address (a set of four numbers, from 0 to 255, separated by periods; e.g., 136.167.2.220). But the range of IP addresses “owned” by major organizations and Internet service providers (ISPs) is public knowledge. In many cases it’s possible to make an accurate guess as to where a computer, laptop, or mobile phone is located simply by cross-referencing a device’s current IP address with this public list.

For example, it’s known that all devices connected to the Boston College network contain IP addresses starting with the numbers 136.167. If a search engine detects a query coming from an IP address that begins with those two numbers, it can be fairly certain that the person using that device is in the greater Boston area.

Figure 14.7

Figure 14.8

In this geotargeting example, the same search term is used at roughly the same time on separate computers located in Silicon Valley area (top) and Boston (bottom). Note how geotargeting impacts results.

IP addresses will change depending on how and where you connect to the Internet. Connect your laptop to a hotel’s Wi-Fi when visiting a new city, and you’re likely to see ads specific to that location. That’s because your Internet service provider has changed, and the firm serving your ads has detected that you are using an IP address known to be associated with your new location.

Geotargeting via IP address is fairly accurate, but it’s not perfect. For example, some Internet service providers may provide imprecise or inaccurate information on the location of their networks. Others might be so vague that it’s difficult to make a best guess at the geography behind a set of numbers (values assigned by a multinational corporation with many locations, for example). And there are other ways locations are hidden, such as when Internet users connect to proxy serversA third-party computer that passes traffic to and from a specific address without revealing the address of the connected user., third-party computers that pass traffic to and from a specific address without revealing the address of the connected users.

What’s My IP Address?

While every operating system has a control panel or command that you can use to find your current IP address, there are also several Web sites that will quickly return this value (and a best guess at your current location). One such site is http://ip-adress.com (note the spelling has only one “d”). Visit this or a similar site with a desktop, laptop, and mobile phone. Do the results differ and are they accurate? Why?

Geotargeting Evolves Beyond the IP Address

There are several other methods of geotargeting. Firms like Skyhook Wireless can identify a location based on its own map of Wi-FiA term used to brand wireless local-area networking devices. Devices typically connect to an antenna-equipped base station or hotspot, which is then connected to the Internet. Wi-Fi devices use standards known as IEEE 802.11, and various version of this standard (e.g., b, g, n) may operate in different frequency bands and have access ranges. hotspots and nearby cell towers. Many mobile devices come equipped with global positioning system (GPS)A network of satellites and supporting technologies used to identify a device’s physical location. chips (identifying location via the GPS satellite network). And if a user provides location values such as a home address or zip code to a Web site, then that value might be stored and used again to make a future guess at a user’s location.

Key Takeaways

  • Roughly two-thirds of Google’s revenues come from ads served on its own sites, and the vast majority of this revenue comes from search engine ads.
  • Advertisers choose and bid on the keywords and phrases that they’d like to use to trigger the display of their ad.
  • Advertisers pay for cost-per-click advertising only if an ad is clicked on. Google makes no money on CPC ads that are displayed but not clicked.
  • Google determines ad rank by multiplying CPC by Quality Score. Ads with low ranks might not display at all.
  • Advertisers usually don’t pay their maximum CPC. Instead, Google discounts ads to just one cent more than the minimum necessary to maintain an ad’s position on the page—a practice that encourages higher bids.
  • Geotargeting occurs when computer systems identify a user’s physical location (sometimes called geolocation) for the purpose of delivering tailored ads or other content.
  • Google uses IP addresses to target ads.
  • Geotargeting can also be enabled by the satellite-based global positioning system (GPS) or based on estimating location from cell phone towers or Wi-Fi hotspots.

Questions and Exercises

  1. Which firm invented pay-per-click advertising? Why does Google dominate today and not this firm?
  2. How are ads sold via Google search superior to conventional advertising media such as TV, radio, billboard, print, and yellow pages? Consider factors like the available inventory of space to run ads, the cost to run ads, the cost to acquire new advertisers, and the appeal among advertisers.
  3. Are there certain kinds of advertising campaigns and goals where search advertising wouldn’t be a good fit? Give examples and explain why.
  4. Can a firm buy a top ad ranking? Why or why not?
  5. List the four factors that determine an ad’s quality score.
  6. How much do firms typically pay for a single click?
  7. Sites like SpyFu.com and KeywordSpy.com provide a list of the keywords with the highest cost per click. Visit the Top Lists page at SpyFu, KeywordSpy, or a comparable site, to find estimates of the current highest paying cost per click. Which keywords pay the most? Why do you think firms are willing to spend so much?
  8. What is bidder’s remorse? How does Google’s ad discounting impact this phenomenon?
  9. Visit http://www.ip-adress.com/ using a desktop, laptop, and mobile phone (work with a classmate or friend if you don’t have access to one of these devices). How do results differ? Why? Are they accurate? What factors go into determining the accuracy of IP-based geolocation?
  10. List and briefly describe other methods of geotargeting besides IP address, and indicate the situations and devices where these methods would be more and less effective.
  11. The field of search engine marketing (SEM) is relatively new and rising in importance. And since the field is so new and constantly changing, there are plenty of opportunities for young, knowledgeable professionals. Which organizations, professional certification, and other resources are available to SEM professionals? Spend some time searching for these resources online and be prepared to share your findings with your class.

14.5 Ad Networks—Distribution beyond Search

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand ad networks, and how ads are distributed and served based on Web site content.
  2. Recognize how ad networks provide advertiser reach and support niche content providers.
  3. Be aware of content adjacency problems and their implications.
  4. Know the strategic factors behind ad network appeal and success.

Google runs ads not just in search, but also across a host of Google-owned sites like Gmail, Google News, and Blogger. It will even tailor ads for its map products and for mobile devices. But about 30 percent of Google’s revenues come from running ads on Web sites that the firm doesn’t even own.Google, “Google Announces Fourth Quarter and Fiscal Year 2008 Results,” press release, January 22, 2009.

Next time you’re surfing online, look around the different Web sites that you visit and see how many sport boxes labeled “Ads by Google.” Those Web sites are participating in Google’s AdSense ad network, which means they’re running ads for Google in exchange for a cut of the take. Participants range from small-time bloggers to some of the world’s most highly trafficked sites. Google lines up the advertisers, provides the targeting technology, serves the ads, and handles advertiser payment collection. To participate, content providers just sign up online, put a bit of Google-supplied HTML code on their pages, and wait for Google to send them cash (Web sites typically get about seventy to eighty cents for every AdSense dollar that Google collects).B. Tedeschi, “Google’s Shadow Payroll Is Not Such a Secret Anymore,” New York Times, January 16, 2006.

Google originally developed AdSense to target ads based on keywords automatically detected inside the content of a Web site. A blog post on your favorite sports team, for example, might be accompanied by ads from ticket sellers or sports memorabilia vendors. AdSense and similar online ad networks provide advertisers with access to the long tail of niche Web sites by offering both increased opportunities for ad exposure as well as more-refined targeting opportunities.

Figure 14.9

The images above show advertising embedded around a story on the New York Times Web site. The page runs several ads provided by different ad networks. For example, the WebEx banner ad above the article’s headline was served by AOL-owned Platform-A/Tacoda. The “Ads by Google” box appeared at the end of the article. Note how the Google ads are related to the content of the Times article.

Running ads on your Web site is by no means a guaranteed path to profits. The Internet graveyard is full of firms that thought they’d be able to sustain their businesses on ads alone. But for many Web sites, ad networks can be like oxygen, sustaining them with revenue opportunities they’d never be able to achieve on their own.

For example, AdSense provided early revenue for the popular social news site Digg, as well as the multimillion-dollar TechCrunch media empire. It supports Disaboom, a site run by physician and quadriplegic Dr. Glen House. And it continues to be the primary revenue generator for AskTheBuilder.com. That site’s founder, former builder Tim Carter, had been writing a handyman’s column syndicated to some thirty newspapers. The newspaper columns didn’t bring in enough to pay the bills, but with AdSense he hit pay dirt, pulling in over $350,000 in ad revenue in just his first year!R. Rothenberg, “The Internet Runs on Ad Billions,” BusinessWeek, April 10, 2008.

Figure 14.10

Tim Carter’s Ask the Builder Web site runs ads from Google and other ad networks. Note different ad formats surrounding the content. Video ads are also integrated into many of the site’s video tutorials.

Beware the Content Adjacency Problem

Contextual advertisingAdvertising based on a Web site’s content. based on keywords is lucrative, but like all technology solutions it has its limitations. Vendors sometimes suffer from content adjacency problemsA situation where ads appear alongside text the advertiser would like to avoid. when ads appear alongside text they’d prefer to avoid. In one particularly embarrassing example, a New York Post article detailed a gruesome murder where hacked up body parts were stowed in suitcases. The online version of the article included contextual advertising and was accompanied by…luggage ads.A. Overholt, “Search for Tomorrow,” Fast Company, December 19, 2007.

To combat embarrassment, ad networks provide opportunities for both advertisers and content providers to screen out potentially undesirable pairings based on factors like vendor, Web site, and category. Advertisers can also use negative keywords, which tell networks to avoid showing ads when specific words appear (e.g., setting negative keywords to “murder” or “killer” could have spared luggage advertisers from the embarrassing problem mentioned above). Ad networks also refine ad-placement software based on feedback from prior incidents (for more on content adjacency problems, see Chapter 8 “Facebook: Building a Business from the Social Graph”).

Google launched AdSense in 2003, but Google is by no means the only company to run an ad network, nor was it the first to come up with the idea. Rivals include the Yahoo! Publisher Network, Microsoft’s adCenter, and AOL’s Platform-A. Others, like Quigo, don’t even have a consumer Web site yet manage to consolidate enough advertisers to attract high-traffic content providers such as ESPN, Forbes, Fox, and USA Today. Advertisers also aren’t limited to choosing just one ad network. In fact, many content provider Web sites will serve ads from several ad networks (as well as exclusive space sold by their own sales force), oftentimes mixing several different offerings on the same page.

Ad Networks and Competitive Advantage

While advertisers can use multiple ad networks, there are several key strategic factors driving the industry. For Google, its ad network is a distribution play. The ability to reach more potential customers across more Web sites attracts more advertisers to Google. And content providers (the Web sites that distribute these ads) want there to be as many advertisers as possible in the ad networks that they join, since this should increase the price of advertising, the number of ads served, and the accuracy of user targeting. If advertisers attract content providers, which in turn attract more advertisers, then we’ve just described network effects! More participants bringing in more revenue also help the firm benefit from scale economies—offering a better return on investment from its ad technology and infrastructure. No wonder Google’s been on such a tear—the firm’s loaded with assets for competitive advantage!

Google’s Ad Reach Gets Bigger

While Google has the largest network specializing in distributing text ads, it had been a laggard in graphical display ads (sometimes called image ads). That changed in 2008, with the firm’s $3.1 billion acquisition of display ad network and targeting company DoubleClick. Now in terms of the number of users reached, Google controls both the largest text ad network and the largest display ad network.L. Baker, “Google Now Controls 69% of Online Advertising Market,” Search Engine Journal, March 31, 2008.

Key Takeaways

  • Google also serves ads through non-Google partner sites that join its ad network. These partners distribute ads for Google in exchange for a percentage of the take.
  • AdSense ads are targeted based on keywords that Google detects inside the content of a Web site.
  • AdSense and similar online ad networks provide advertisers with access to the long tail of niche Web sites.
  • Ad networks handle advertiser recruitment, ad serving, and revenue collection, opening up revenue earning possibilities to even the smallest publishers.

Questions and Exercises

  1. On a percentage basis, how important is AdSense to Google’s revenues?
  2. Why do ad networks appeal to advertisers? What do they appeal to content providers? What functions are assumed by the firm overseeing the ad network?
  3. What factors determine the appeal of an ad network to advertisers and content providers? Which of these factors are potentially sources of competitive advantage?
  4. Do dominant ad networks enjoy strong network effects? Are there also strong network effects that drive consumers to search? Why or why not?
  5. How difficult is it for a Web site to join an ad network? What does this imply about ad network switching costs? Does it have to exclusively choose one network over another? Does ad network membership prevent a firm from selling its own online advertising, too?
  6. What is the content adjacency problem? Why does it occur? What classifications of Web sites might be particularly susceptible to the content adjacency problem? What can advertisers do to minimize the likelihood that a content adjacency problem will occur?

14.6 More Ad Formats and Payment Schemes

Learning Objectives

After studying this section you should be able to do the following:

  1. Know the different formats and media types that Web ads can be displayed in.
  2. Know the different ways ads are sold.
  3. Know that games can be an ad channel under the correct conditions.

Online ads aren’t just about text ads billed in CPC. Ads running through Google AdSense, through its DoubleClick subsidiary, or on most competitor networks can be displayed in several formats and media types, and can be billed in different ways. The specific ad formats supported depend on the ad network but can include the following: image (or display) adsGraphical advertising (as opposed to text ads). (such as horizontally oriented banners, smaller rectangular buttons, and vertically oriented “skyscraper” ads); rich media adsOnline ads that include animation, audio, or video. (which can include animation or video); and interstitialsAds that run before a user arrives at a Web site’s contents. (ads that run before a user arrives at a Web site’s contents). The industry trade group, the Internet Advertising Bureau (IAB)A nonprofit industry trade group for the interactive advertising industry. The IAB evaluates and recommends interactive advertising standards and practices and also conducts research, education, and legislative lobbying. sets common standards for display ads so that a single creative (the design and content of the advertisement) can run unmodified across multiple ad networks and Web sites.See Interactive Advertising Bureau Ad Unit Guidelines for details at http://www.iab.net/iab_products_and_industry_services/1421/1443/1452.

And there are lots of other ways ads are sold besides cost-per-click. Most graphical display ads are sold according to the number of times the ad appears (the impression). Ad rates are quoted in CPMCost per thousand impressions (the M representing the roman numeral for one thousand)., meaning cost per thousand impressions (the M representing the roman numerical for one thousand). Display ads sold on a CPM basis are often used as part of branding campaigns targeted more at creating awareness than generating click-throughs. Such techniques often work best for promoting products like soft drinks, toothpaste, or movies.

Cost-per-action (CPA)A method of charging for advertising whenever a user performs a specified action such as signing up for a service, requesting material, or making a purchase. ads pay whenever a user clicks through and performs a specified action such as signing up for a service, requesting material, or making a purchase. Affiliate programsA cost-per-action program, where program sponsors (e.g., Amazon.com, iTunes) pay referring Web sites a percentage of revenue earned from the referral. are a form of cost-per-action, where vendors share a percentage of revenue with Web sites that direct purchasing customers to their online storefronts. Amazon runs the world’s largest affiliate program, and referring sites can earn 4 percent to 15 percent of sales generated from these click-throughs. Purists might not consider affiliate programs as advertising (rather than text or banner ads, Amazon’s affiliates offer links and product descriptions that point back to Amazon’s Web site), but these programs can be important tools in a firm’s promotional arsenal.

And rather than buying targeted ads, a firm might sometimes opt to become an exclusive advertiser on a site. For example, a firm could buy access to all ads served on a site’s main page; it could secure exclusive access to a region of the page (such as the topmost banner ad); or it may pay to sponsor a particular portion or activity on a Web site (say a parenting forum, or a “click-to-print” button). Such deals can be billed based on a flat rate, CPM, CPC, or any combination of metrics.

Ads in Games?

As consumers spend more time in video games, it’s only natural that these products become ad channels, too. Finding a sensitive mix that introduces ads without eroding the game experience can be a challenge. Advertising can work in racing or other sports games (in 2008 the Obama campaign famously ran virtual billboards in EA’s Burnout Paradise), but ads make less sense for games set in the past, future, or on other worlds. Branding ads often work best, since click-throughs are typically not something you want disrupting your gaming experience.

Advertisers have also explored sponsorships of Web-based and mobile games. Sponsorships often work best with casual games, such as those offered on Yahoo! Games or EA’s Pogo. Firms have also created online mini games (so-called advergames) for longer term, immersive brand engagement (e.g., Mini Cooper’s Slide Parking and Stride Gum’s Chew Challenge). Others have tried a sort of virtual product placement integrated into experiences. A version of The Sims, for example, included virtual replicas of real-world inventory from IKEA and H&M.

Figure 14.11 Obama Campaign’s Virtual Billboard in EA’s Burnout Paradise

In-game ad-serving technology also lacks the widely accepted standards of Web-based ads, so it’s unlikely that ads designed for a Wii sports game could translate into a PS3 first-person shooter. Also, one of the largest in-game ad networks, Massive, is owned by Microsoft. That’s good if you want to run ads on Xbox, but Microsoft isn’t exactly a firm that Nintendo or Sony want to play nice with.

In-game advertising shows promise, but the medium is considerably more complicated than conventional Web site ads. That complexity lowers relative ROI and will likely continue to constrain growth.

Key Takeaways

  • Web ad formats include, but are not limited to, the following: image (or display) ads (such as horizontally oriented banners, smaller rectangular buttons, and vertically oriented skyscraper ads), rich media ads (which can include animation or video), and interstitials (ads that run before a user arrives at a Web site’s contents).
  • In addition to cost-per-click, ads can be sold based on the number of times the ad appears (impressions), whenever a user performs a specified action such as signing up for a service, requesting material, or making a purchase (cost-per-action), or on an exclusive basis which may be billed at a flat rate.
  • In-game advertising shows promise, with successful branding campaigns run as part of sports games, through in-game product placement, or via sponsorship of casual games, or in brand-focused advergames.
  • A lack of standards, concerns regarding compatibility with gameplay, and the cost of developing and distributing games are all stifling the growth of in-game ads.

Questions and Exercises

  1. What is the IAB and why is it necessary?
  2. What are the major ad format categories?
  3. What’s an interstitial? What’s a rich media ad? Have you seen these? Do you think they are effective? Why or why not?
  4. List four major methods for billing online advertising.
  5. Which method is used to bill most graphical advertising? What’s the term used for this method and what does it stand for?
  6. How many impressions are recorded if a single user is served the same ad one thousand times? How many if one thousand users are served the same ad once?
  7. Imagine the two scenarios below. Decide which type of campaign would be best for each: text-based CPC advertising or image ads paid for on a CPM basis). Explain your reasoning.

    1. Netflix is looking to attract new customers by driving traffic to its Web site and increase online subscriptions.
    2. Zara has just opened a new clothing store in major retailing area in your town. The company doesn’t offer online sales; rather, the majority of its sales come from stores.
  8. Which firm runs the world’s largest affiliate program? Why is this form of advertising particularly advantageous to the firm (think about the ROI for this sort of effort)?
  9. Given examples where in-game advertising might work and those where it might be less desirable. List key reasons why in-game advertising has not be as successful as other forms Internet-distributed ads.

14.7 Customer Profiling and Behavioral Targeting

Learning Objectives

After studying this section you should be able to do the following:

  1. Be familiar with various tracking technologies and how they are used for customer profiling and ad targeting.
  2. Understand why customer profiling is both valuable and controversial.
  3. Recognize steps that organizations can take to help ease consumer and governmental concerns.

Advertisers are willing to pay more for ads that have a greater chance of reaching their target audience, and online firms have a number of targeting tools at their disposal. Much of this targeting occurs whenever you visit a Web site, where a behind-the-scenes software dialogue takes place between Web browser and Web server that can reveal a number of pieces of information, including IP address, the type of browser used, the computer type, its operating system, and unique identifiers, called cookiesA line of identifying text, assigned and retrieved by a given Web server and stored by your browser..

And remember, any server that serves you content can leverage these profiling technologies. You might be profiled not just by the Web site that you’re visiting (e.g., nytimes.com), but also by any ad networks that serve ads on that site (e.g., Platform-A, DoubleClick, Google AdSense, Microsoft adCenter).

IP addresses are leveraged extensively in customer profiling. An IP address not only helps with geolocation, it can also indicate a browser’s employer or university, which can be further matched with information such as firm size or industry. IBM has used IP targeting to tailor its college recruiting banner ads to specific schools, for example, “There Is Life After Boston College, Click Here to See Why.” That campaign garnered click-through rates ranging from 5.0 to 30 percentM. Moss, “These Web Sites Know Who You Are,” ZDNet UK, October 13, 1999. compared to average rates that are currently well below 1 percent for untargeted banner ads. DoubleClick once even served a banner that included a personal message for an executive at then-client Modem Media. The ad, reading “Congratulations on the twins, John Nardone,” was served across hundreds of sites, but was only visible from computers on the Modem Media corporate network.M. Moss, “These Web Sites Know Who You Are,” ZDNet UK, October 13, 1999.

The ability to identify a surfer’s computer, browser, or operating system can also be used to target tech ads. For example, Google might pitch its Chrome browser to users detected running Internet Explorer, Firefox, or Safari; while Apple could target those “I’m a Mac” ads just to Windows users.

But perhaps the greatest degree of personalization and targeting comes from cookies. Visit a Web site for the first time, and in most cases, a behind-the-scenes dialogue takes place that goes something like this:

Server: Have I seen you before?

Browser: No.

Server: Then take this unique string of numbers and letters (called a cookie). I’ll use it to recognize you from now on.

The cookie is just a line of identifying text assigned and retrieved by a given Web server and stored on your computer by your browser. Upon accepting this cookie your browser has been tagged, like an animal. As you surf around the firm’s Web site, that cookie can be used to build a profile associated with your activities. If you’re on a portal like Yahoo! you might type in your zip code, enter stocks that you’d like to track, and identify the sports teams you’d like to see scores for. The next time you return to the Web site, your browser responds to the server’s “Have I see you before?” question with the equivalent of “Yes, you know me;,” and it presents the cookie that the site gave you earlier. The site can then match this cookie against your browsing profile, showing you the weather, stock quotes, sports scores, and other info that it thinks you’re interested in.

Cookies are used for lots of purposes. Retail Web sites like Amazon use cookies to pay attention to what you’ve shopped for and bought, tailoring Web sites to display products that the firm suspects you’ll be most interested in. Sites also use cookies to keep track of what you put in an online “shopping cart,” so if you quit browsing before making a purchase, these items will reappear the next time you visit. And many Web sites also use cookies as part of a “remember me” feature, storing user IDs and passwords. Beware this last one! If you check the “remember me” box on a public Web browser, the next person who uses that browser is potentially using your cookie, and can log in as you!

An organization can’t read cookies that it did not give you. So businessweek.com can’t tell if you’ve also got cookies from forbes.com. But you can see all of the cookies in your browser. Take a look and you’ll almost certainly see cookies from dozens of Web sites that you’ve never visited before. These are third-party cookiesSometimes called “tracking cookies” and are served by ad networks or other customer profiling firms. Tracking cookies are used to identify users and record behavior across multiple Web sites. (sometimes called tracking cookies), and they are usually served by ad networks or other customer profiling firms.

Figure 14.12

The Preferences setting in most Web browsers allows you to see its cookies. This browser has received cookies from several ad networks, media sites, and the University of Minnesota Carlson School of Management.

By serving and tracking cookies in ads shown across partner sites, ad networks can build detailed browsing profiles that include sites visited, specific pages viewed, duration of visit, and the types of ads you’ve seen and responded to. And that surfing might give an advertising network a better guess at demographics like gender, age, marital status, and more. Visit a new parent site and expect to see diaper ads in the future, even when you’re surfing for news or sports scores!

But What If I Don’t Want a Cookie!

If all of this creeps you out, remember that you’re in control. The most popular Web browsers allow you to block all cookies, block just third-party cookies, purge your cookie file, or even ask for your approval before accepting a cookie. Of course, if you block cookies, you block any benefits that come along with them, and some Web site features may require cookies to work properly. Also note that while deleting a cookie breaks a link between your browser and that Web site, if you supply identifying information in the future (say by logging into an old profile), the site might be able to assign your old profile data to the new cookie.

While the Internet offers targeting technologies that go way beyond traditional television, print, and radio offerings, none of these techniques is perfect. Since users are regularly assigned different IP addresses as they connect and disconnect from various physical and Wi-Fi networks, IP targeting can’t reliably identify individual users. Cookies also have their weaknesses. They’re assigned by browsers and associated with a log-in account profile on that computer. That means that if several people use the same browser on the same computer without logging on to that machine as separate users, then all their Web surfing activity may be mixed into the same cookie profile. (One solution is to create different log-in accounts on that computer. Your PC will then keep separate cookies for each account.) Some users might also use different browsers on the same machine, or use different computers. Unless a firm has a way to match up these different cookies with a single user account or other user-identifying information, a site may be working with multiple, incomplete profiles.

Key Takeaways

  • The communication between Web browser and Web server can identify IP address, the type of browser used, the computer type, its operating system, time and date of access, and duration of Web page visit, and can read and assign unique identifiers, called cookies—all of which can be used in customer profiling and ad targeting.
  • An IP address not only helps with geolocation; it can also be matched against other databases to identify the organization providing the user with Internet access (such as a firm or university), that organization’s industry, size, and related statistics.
  • A cookie is a unique line of identifying text, assigned and retrieved by a given Web server and stored on a computer by the browser, that can be used to build a profile associated with your Web activities.
  • The most popular Web browsers allow you to block all cookies, block just third-party cookies, purge your cookie file, or even ask for your approval before accepting a cookie.

Questions and Exercises

  1. Give examples of how the ability to identify a surfer’s computer, browser, or operating system can be used to target tech ads.
  2. Describe how IBM targeted ad delivery for its college recruiting efforts. What technologies were used? What was the impact on click-through rates?
  3. What is a cookie? How are cookies used? Is a cookie a computer program? Which firms can read the cookies in your Web browser?
  4. Does a cookie accurately identify a user? Why or why not?
  5. What is the danger of checking the “remember me” box on a public Web browser?
  6. What’s a third-party cookie? What kinds of firms might use these? How are they used?
  7. How can users restrict cookie use on their Web browsers? What is the downside of blocking cookies?
  8. Work with a faculty member and join the Google Online Marketing Challenge (held spring of every year—see http://www.google.com/onlinechallenge). Google offers ad credits for student teams to develop and run online ad campaigns for real clients and offers prizes for winning teams. Some of the experiences earned in the Google Challenge can translate to other ad networks as well; and first-hand client experience has helped many students secure jobs, internships, and even start their own businesses.

14.8 Profiling and Privacy

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the privacy concerns that arise as a result of using third-party or tracking cookies to build user profiles.
  2. Be aware of the negative consequences that could result from the misuse of third-party or tracking cookies.
  3. Know the steps Google has taken to demonstrate its sensitivity to privacy issues.
  4. Know the kinds of user information that Google stores, and the steps Google takes to protect the privacy of that information.

While AdSense has been wildly successful, contextual advertising has its limits. For example, what kind of useful targeting can firms really do based on the text of a news item on North Korean nuclear testing?R. Singel, “Online Behavioral Targeting Targeted by Feds, Critics,” Wired News, June 3, 2009. So in March 2009, Google announced what it calls “interest-based ads.” Google AdSense would now issue a third-party cookie and would track browsing activity across AdSense partner sites, and Google-owned YouTube (the firm had not previously used tracking cookies on its AdSense network). AdSense would build a profile, initially identifying users within thirty broad categories and six hundred subcategories. Says one Google project manager, “We’re looking to make ads even more interesting.”R. Hof, “Behavioral Targeting: Google Pulls Out the Stops,” BusinessWeek, March 11, 2009.

Of course, there’s a financial incentive to do this too. Ads deemed more interesting should garner more clicks, meaning more potential customer leads for advertisers, more revenue for Web sites that run AdSense, and more money for Google.

But while targeting can benefit Web surfers, users will resist if they feel that they are being mistreated, exploited, or put at risk. Negative backlash might also result in a change in legislation. The U.S. Federal Trade Commission has already called for more transparency and user control in online advertising and for requesting user consent (opt-inProgram (typically a marketing effort) that requires customer consent. This program is contrasted with opt-out programs, which enroll all customers by default.) when collecting sensitive data.R. Singel, “Online Behavioral Targeting Targeted by Feds, Critics,” Wired News, June 3, 2009. Mishandled user privacy could curtail targeting opportunities, limiting growth across the online advertising field. And with less ad support, many of the Internet’s free services could suffer.

Google’s roll-out of interest-based ads shows the firm’s sensitivity to these issues. First, while major rivals have all linked query history to ad targeting, Google steadfastly refuses to do this. Other sites often link registration data (including user-submitted demographics such as gender and age) with tracking cookies, but Google avoids this practice as well.

Figure 14.13

Here’s an example of one user’s interests, as tracked by Google’s “Interest-based Ads” and displayed in the firm’s “Ad Preferences Manager.”

Google has also placed significant control in the hands of users, with options at program launch that were notably more robust than those of its competitors.S. Hansell, “A Guide to Google’s New Privacy Controls,” New York Times, March 12, 2009. Each interest-based ad is accompanied by an “Ads by Google” link that will bring users to a page describing Google advertising and which provides access to the company’s “Ads Preferences Manager.” This tool allows surfers to see any of the hundreds of potential categorizations that Google has assigned to that browser’s tracking cookie. Users can remove categorizations, and even add interests if they want to improve ad targeting. Some topics are too sensitive to track, and the technology avoids profiling race, religion, sexual orientation, health, political or trade union affiliation, and certain financial categories.R. Mitchell, “What Google Knows about You,” Computerworld, May 11, 2009.

Google also allows users to install a cookie that opts them out of interest-based tracking. And since browser cookies can expire or be deleted, the firm has gone a step further, offering a browser plug-inA small computer program that extends the feature set or capabilities of another application. that will remain permanent, even if a user’s opt-outPrograms that enroll all customers by default, but that allow consumers to discontinue participation if they want to. cookie is purged.

Google, Privacy Advocates, and the Law

Google’s moves are meant to demonstrate transparency in its ad targeting technology, and the firm’s policies may help raise the collective privacy bar for the industry. While privacy advocates have praised Google’s efforts to put more control in the hands of users, many continue to voice concern over what they see as the increasing amount of information that the firm houses.M. Helft, “BITS; Google Lets Users See a Bit of Selves” New York Times, November 9, 2009. For an avid user, Google could conceivably be holding e-mail (Gmail), photos (Picasa), a Web surfing profile (AdSense and DoubleClick), medical records (Google Health), location (Google Latitude), appointments (Google Calendar), transcripts of phone messages (Google Voice), work files (Google Docs), and more.

Google insists that reports portraying it as a data-hoarding Big Brother are inaccurate. The firm is adamant that user data exists in silos that aren’t federated (linked) in any way, nor are employees permitted access to multiple data archives without extensive clearance and monitoring. Data is not sold to third parties. Activities in Gmail, Docs, or most other services isn’t added to targeting profiles. And any targeting is fully disclosed, with users empowered to opt out at all levels.R. Mitchell, “What Google Knows about You,” Computerworld, May 11, 2009. But critics counter that corporate intentions and data use policies (articulated in a Web site’s Terms of Service) can change over time, and that a firm’s good behavior today is no guarantee of good behavior in the future.R. Mitchell, “What Google Knows about You,” Computerworld, May 11, 2009.

Google does enjoy a lot of user goodwill, and it is widely recognized for its unofficial motto “Don’t Be Evil.” However, some worry that even though Google might not be evil, it could still make a mistake, and that despite its best intentions, a security breach or employee error could leave data dangerously or embarrassingly exposed.

Such gaffes and oversights have happened. A March 2009 system flaw inadvertently shared some Google Docs with contacts who were never granted access to them.J. Kincaid, “Google Privacy Blunder Shares Your Docs without Permission,” TechCrunch, March 7, 2009. And when the firm introduced its Google Buzz social networking service in early 2010, many users were horrified that their most frequently used Gmail contacts were automatically added to Buzz, allowing others to see who you’re communicating with. As one report explained, “Suddenly, journalists’ clandestine contacts were exposed, secret affairs became dramatically less secret, and stalkers obtained a new tool to harass their victims. Oops.”A. Gold, “Keep Your Buzz to Yourself: Google Misjudged Its Users’ Right to Privacy,” The Harvard Crimson, February 22, 2010. Eleven congressmen subsequently asked the U.S. Federal Trade Commission to investigate the Google Buzz for possible breaches of consumer privacy.G. Gross, “Lawmakers Ask for FTC Investigation of Google Buzz,” PCWorld, March 29, 2010.

Privacy advocates also worry that the amount of data stored by Google serves as one-stop shopping for litigators and government investigators. The counter argument points to the fact that Google has continually reflected an aggressive defense of data privacy in court cases. When Viacom sued Google over copyright violations in YouTube, the search giant successfully fought the original subpoena, which had requested user-identifying information.R. Mitchell, “What Google Knows about You,” Computerworld, May 11, 2009. And Google was the only one of the four largest search engines to resist a 2006 Justice Department subpoena for search queries.A. Broache, “Judge: Google Must Give Feds Limited Access to Records,” CNET, March 17, 2006.

Google is increasingly finding itself in precedent-setting cases where the law is vague. Google’s Street View, for example, has been the target of legal action in the United States, Canada, Japan, Greece, and the United Kingdom. Varying legal environments create a challenge to the global rollout of any data-driven initiative.L. Sumagaysay, “Not Everyone Likes the (Google Street) View,” Good Morning Silicon Valley, May 20, 2009.

Ad targeting brings to a head issues of opportunity, privacy, security, risk, and legislation. Google is now taking a more active public relations and lobbying role to prevent misperceptions and to be sure its positions are understood. While the field continues to evolve, Google’s experience will lay the groundwork for the future of personalized technology and provide a case study for other firms that need to strike the right balance between utility and privacy. Despite differences, it seems clear to Google, its advocates, and its detractors that with great power comes great responsibility.

Key Takeaways

  • Possible consequences resulting from the misuse of customer tracking and profiling technologies include user resistance and legislation. Mishandled user privacy could curtail targeting opportunities and limit growth in online advertising. With less ad support, many of the Internet’s free services could suffer.
  • Google has taken several steps to protect user privacy and has thus far refused to link query history or registration data to ad targeting.
  • Google’s “Ads Preferences Manager” allows surfers to see, remove, and add to, any of the categorizations that Google has assigned to that browser’s tracking cookie. The technology also avoids targeting certain sensitive topics.
  • Google allows users to install a cookie or plug-in that opts them out of interest-based tracking.
  • Some privacy advocates have voiced concern over what they see as the increasing amount of information that Google houses.
  • Even the best-intentioned and most competent firms can have a security breach that compromises stored information. Google has suffered privacy breaches from product flaws and poorly planned feature rollouts. Such issues may lead to further investigation, legislation, and regulation.

Questions and Exercises

  1. Gmail uses contextual advertising. The service will scan the contents of e-mail messages and display ads off to the side. Test the “creep out” factor in Gmail—create an account (if you don’t already have one), and send messages to yourself with controversial terms in them. Which ones showed ads? Which ones didn’t?
  2. Google has never built user profiles based on Gmail messages. Ads are served based on a real-time scanning of keywords. Is this enough to make you comfortable with Google’s protection of your own privacy? Why or why not?
  3. List the negative consequences that could result from the misuse of tracking cookies.
  4. What steps has Google taken to give users control over the ads they wish to see?
  5. Which topics does “Ads Preferences Manager” avoid in its targeting system?
  6. Visit Google’s Ad Preferences page. Is Google tracking your interests? Do you think the list of interests is accurate? Browse the categories under the “Ad Interest” button. Would you add any of these categories to your profile? Why or why not? What do you gain or lose by taking advantage of Google’s “Opt Out” option? Visit rival ad networks. Do you have a similar degree of control? More or less?
  7. List the types of information that Google might store for an individual. Do you feel that Google is a fair and reliable steward for this information? Are there Google services or other online efforts that you won’t use due to privacy concerns? Why?
  8. What steps does Google take to protect the privacy of user information?
  9. Google’s “interest-based advertising” was launched as an opt-out effort. What are the pros and cons for Google, users, advertisers, and AdSense partner sites if Google were to switch to an opt-in system? How would these various constituencies be impacted if the government mandated that users explicitly opt in to third-party cookies and other behavior-tracking techniques?
  10. What is Google’s unofficial motto?
  11. What is “Street View”? Where and on what grounds is it being challenged?
  12. Cite two court cases where Google has mounted a vigorous defense of data privacy.
  13. Wired News quoted a representative of privacy watchdog group, The Center for Digital Democracy, who offered a criticism of online advertising. The representative suggested that online firms were trying to learn “everything about individuals and manipulate their weaknesses” and that the federal government should “investigate the role [that online ads] played in convincing people to take out mortgages they should not have.”R. Singel, “Online Behavioral Targeting Targeted by Feds, Critics,” Wired News, June 3, 2009. Do you think online advertising played a significant role in the mortgage crisis? What role do advertisers, ad networks, and content providers have in online advertising oversight? Should this responsibility be any different from oversight in traditional media (television, print, radio)? What guidelines would you suggest?
  14. Even well-intentioned firms can compromise user privacy. How have Google’s missteps compromised user privacy? As a manager, what steps would you take in developing and deploying information systems that might prevent these kinds of problems from occurring?

14.9 Search Engines, Ad Networks, and Fraud

Learning Objectives

After studying this section you should be able to do the following:

  1. Be able to identify various types of online fraud, as well as the techniques and technologies used to perpetrate these crimes.
  2. Understand how firms can detect, prevent, and prosecute fraudsters.

There’s a lot of money to be made online, and this has drawn the attention of criminals and the nefarious. Online fraudsters may attempt to steal from advertisers, harm rivals, or otherwise dishonestly game the system. But bad guys beware—such attempts violate terms-of-service agreements and may lead to prosecution and jail time.

Studying ad-related fraud helps marketers, managers, and technologists understand potential vulnerabilities, as well as the methods used to combat them. This process also builds tech-centric critical thinking, valuation, and risk assessment skills.

Some of the more common types of fraud that are attempted in online advertising include the following:

  • Enriching click fraudGenerating bogus clicks, either for financial gain (enriching fraud), or to attack rivals by draining their online ad budget (depleting fraud).—when site operators generate bogus ad clicks to earn PPC income.
  • Enriching impression fraud—when site operators generate false page views (and hence ad impressions) in order to boost their site’s CPM earnings.
  • Depleting click fraud—clicking a rival’s ads to exhaust their PPC advertising budget.
  • Depleting impression fraud—generating bogus impressions to exhaust a rival’s CPM ad budget.
  • Rank-based impression fraud—on-sites where ad rank is based on click performance, fraudsters repeatedly search keywords linked to rival ads or access pages where rival ads appear. The goal is to generate impressions without clicks. This process lowers the performance rank (quality score) of a rival’s ads, possibly dropping ads from rank results, and allowing fraudsters to subsequently bid less for the advertising slots previously occupied by rivals.
  • Disbarring fraud—attempting to frame a rival by generating bogus clicks or impressions that appear to be associated with the rival, in hopes that this rival will be banned from an ad network or punished in search engine listings.
  • Link fraud (also known as spamdexing or link farming)—creating a series of bogus Web sites, all linking back to a page, in hopes of increasing that page’s results in organic search.
  • Keyword stuffing—packing a Web site with unrelated keywords (sometimes hidden in fonts that are the same color as a Web site’s background) in hopes of either luring users who wouldn’t normally visit a Web site, or attracting higher-value contextual ads.

Disturbing stuff, but firms are after the bad guys and they’ve put their best geeks on the case. Widespread fraud would tank advertiser ROI and crater the online advertising market, so Google and rivals are diligently working to uncover and prosecute the crooks.

Busting the Bad Guys

On the surface, enriching click fraud seems the easiest to exploit. Just set up a Web site, run PPC ads on the page, and click like crazy. Each click should ring the ad network cash register, and a portion of those funds will be passed on to the perpetrating site owner—ka ching! But remember, each visitor is identified by an IP address, so lots of clicks from a single IP make the bad guys easy to spot.

So organized crime tried to raise the bar, running so-called click farmsRecruiting a network of users to engage in click fraud with the goal of spreading IP addresses across several systems and make a fraud effort more difficult to detect. to spread fraud across dozens of IP addresses. The Times of India uncovered one such effort where Indian housewives were receiving up to twenty-five cents for each ad click made on fraudster-run Web sites.N. Vidyasagar, “India’s Secret Army of Online Ad ‘Clickers,’” Times of India, May 3, 2004. But an unusually large number of clicks from Indian IP addresses foiled these schemes as well.

Fraudsters then moved on to use zombie networksSometimes called “clickbots” or “bot nets,” these are hordes of surreptitiously infiltrated computers, linked and controlled remotely. This technique is used to perpetrate click fraud, as well as a variety of other computer security crimes.—hordes of surreptitiously infiltrated computers, linked and controlled by rogue software.C. Mann, “How Click Fraud Could Swallow the Internet,” Wired, January 2006. To create zombie networks (sometimes called bot nets), hackers exploit security holes, spread viruses, or use so-called phishing techniques to trick users into installing software that will lie dormant, awaiting commands from a central location. The controlling machine then sends out tasks for each zombie, instructing them to visit Web sites and click on ads in a way that mimics real traffic. Zombie bot nets can be massive. Dutch authorities once took down a gang that controlled some 1.5 million machines.T. Sanders, “Dutch Botnet Gang Facing Jail,” IT News Australia, January 18, 2007; and N. Daswani and M. Stoppleman, “The Anatomy of Clickbot” (paper, Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, April 11–13, 2007).

Scary, but this is where scale, expertise, and experience come in. The more activity an ad network can monitor, the greater the chance that it can uncover patterns that are anomalous. Higher click-through rates than comparable sites? Caught. Too many visits to a new or obscure site? Caught. Clicks that don’t fit standard surfing patterns for geography, time, and day? Caught.

Sometimes the goal isn’t theft, but sabotage. Google’s Ad Traffic Quality Team backtracked through unusual patterns to uncover a protest effort targeted at Japanese credit card firms. Ad clicks were eventually traced to an incendiary blogger who incited readers to search for the Japanese word kiyashinku (meaning cashing credit, or credit cards), and to click the credit card firm ads that show up, depleting firm search marketing budgets. Sneaky, but uncovered and shut down, without harm to the advertisers.M. Jakobsson and Z. Ramzan, Crimeware: Understanding New Attacks and Defenses (Cupertino, CA: Symantec Press, 2008).

Search firm and ad network software can use data patterns and other signals to ferret out most other types of fraud, too, including rank-based impression fraud, spamdexing, and keyword stuffing. While many have tried to up the stakes with increasingly sophisticated attacks, large ad networks have worked to match them, increasing their anomaly detection capabilities across all types of fraud.M. Jakobsson and Z. Ramzan, Crimeware: Understanding New Attacks and Defenses (Cupertino, CA: Symantec Press, 2008). Here we see another scale and data-based advantage for Google. Since the firm serves more search results and advertisements than its rivals do, it has vastly more information on online activity. And if it knows more about what’s happening online than any other firm, it’s likely to be first to shut down anyone who tries to take advantage of the system.

Click Fraud: How Bad Is It?

Accounts on the actual rate of click fraud vary widely. Some third-party firms contend that nearly one in five clicks is fraudulent.S. Hamner, “Pay-per-Click Advertisers Combat Costly Fraud,” New York Times, May 12, 2009. But Google adamantly disputes these headline-grabbing numbers, claiming that many such reports are based on-site logs that reflect false data from conditions that Google doesn’t charge for (e.g., double counting a double click, or adding up repeated use of the browser back button in a way that looks like multiple clicks have occurred). The firm also offers monitoring, analytics, and reporting tools that can uncover this kind of misperceived discrepancy.

Google contends that all invalid clicks (mistakes and fraud) represent less than 10 percent of all clicks, that the vast majority of these clicks are filtered out, and that Google doesn’t charge advertisers for clicks flagged as mistakes or suspicious.M. Lafsky, “Google and Click Fraud: Behind the Numbers,” New York Times, February 27, 2008. In fact, Google says their screening bar is so high and so accurate that less than 0.02 percent of clicks are reactively classified as invalid and credited back to advertisers.M. Jakobsson and Z. Ramzan, Crimeware: Understanding New Attacks and Defenses (Cupertino, CA: Symantec Press, 2008).

So who’s right? While it’s impossible to identify the intention behind every click, the market ultimately pays for performance. And advertisers are continuing to flock to PPC ad networks (and to Google in particular). While that doesn’t mean that firms can stop being vigilant, it does suggest that for most firms, Google seems to have the problem under control.

Key Takeaways

  • Fraud can undermine the revenue model behind search engines, ad networks, and the ad-based Internet. It also threatens honest competition among rivals that advertise online.
  • There are many forms of online fraud, including enriching fraud (meant to line the pockets of the perpetrators), depleting fraud (meant to waste the ad budgets of rivals), disbarring fraud (meant to frame the innocent as fraudsters), and methods to lower rival ad rank performance, or gain search engine ranking algorithms.
  • While fraudsters have devised ingenious ways to exploit the system (including click farms and zombie attacks), IP addresses and detailed usage pattern monitoring increasingly reveal bogus activity.
  • Fraud rates are widely disputed. However, it is clear that if widespread fraud were allowed to occur, advertisers would see lower ROI from online ad efforts, and Internet business models would suffer. The continued strength of the online advertising market suggests that while fraud may be impossible to stop completely, most fraud is under control.

Questions and Exercises

  1. Why is it difficult for an unscrupulous individual to pull off enriching click fraud simply by setting up a Web site, running ad network ads, and clicking?
  2. Why did hackers develop zombie networks? What advantage do they offer the criminals? How are they detected? Why do larger ad networks have an advantage in click fraud detection?
  3. How can you prevent zombies from inhabiting your computers? Are you reasonably confident you are “zombie-free?” Why or why not?
  4. What are spamdexing and keyword stuffing? What risks does a legitimate business run if it engages in these practices, and if they are discovered by search engines? What would this mean for the career of the manager who thought he could game the system?
  5. Which types of fraud can be attempted against search advertising? Which are perpetrated over its ad network?
  6. What are the consequences if click fraud were allowed to continue? Does this ultimately help or hurt firms that run ad networks? Why?

14.10 The Battle Unfolds

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the challenges of maintaining growth as a business and industry mature.
  2. Recognize how the businesses of many firms in a variety of industries are beginning to converge.
  3. Critically evaluate the risks and challenges of businesses that Google, Microsoft, and other firms are entering.
  4. Appreciate the magnitude of this impending competition, and recognize the competitive forces that will help distinguish winners from losers.

Google has been growing like gangbusters, but the firm’s twin engines of revenue growth—ads served on search and through its ad networks—will inevitably mature. And it will likely be difficult for Google to find new growth markets that are as lucrative as these. Emerging advertising outlets such as social networks and mobile have lower click-through rates than conventional advertising, suggesting that Google will have to work harder for less money.

For a look at what can happen when maturity hits, check out Microsoft. The House that Gates Built is more profitable than Google, and continues to dominate the incredibly lucrative markets served by Windows and Office. But these markets haven’t grown much for over a decade. In industrialized nations, most Windows and Office purchases come not from growth, but when existing users upgrade or buy new machines. And without substantial year-on-year growth, the stock price doesn’t move.

Figure 14.14 A Comparison of Roughly Five Years of Stock Price Change—Google (GOOG) versus Microsoft (MSFT)

For big firms like Microsoft and Google, pushing stock price north requires not just new markets, but billion-dollar ones. Adding even $100 million in new revenues doesn’t do much for firms bringing in $24 billion and $58 billion a year, respectively. That’s why you see Microsoft swinging for the fences, investing in the uncertain, but potentially gargantuan markets of video games, mobile phone software, cloud computing (see Chapter 10 “Software in Flux: Partly Cloudy and Sometimes Free”), music and video, and of course, search and everything else that fuels online ad revenue.

Search: Google Rules, but It Ain’t Over

PageRank is by no means the last word in search, and offerings from Google and its rivals continue to evolve. Google supplements PageRank results with news, photos, video, and other categorizations (click the “Show options…” link above your next Google search). Yahoo! is continually refining its search algorithms and presentation (click the little “down” arrow at the top of the firm’s search results for additional categorizations and suggestions). And Microsoft’s third entry into the search market, the “decision engine” Bing, sports nifty tweaks for specific kinds of queries. Restaurant searches in Bing are bundled with ratings stars, product searches show up with reviews and price comparisons, and airline flight searches not only list flight schedules and fares, but also a projection on whether those fares are likely go up or down. Bing also comes with a one-hundred-million-dollar marketing budget, showing that Microsoft is serious about moving its search market share out of the single digits. And in the weeks following Bing’s mid-2009 introduction, the search engine did deliver Microsoft’s first substantive search engine market share gain in years.

New tools like the Wolfram Alpha “knowledge engine” (and to a lesser extent, Google’s experimental Google Squared service) move beyond Web page rankings and instead aggregate data for comparison, formatting findings in tables and graphs. Web sites are also starting to wrap data in invisible tags that can be recognized by search engines, analysis tools, and other services. If a search engine can tell that a number on a restaurant’s Web site is, for example, either a street address, an average entrée price, or the seating capacity, it will be much easier for computer programs to accurately categorize, compare, and present this information. This is what geeks are talking about when they refer to the semantic WebSites that wrap data in invisible tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare, and present this information.. All signs point to more innovation, more competition, and an increasingly more useful Internet!

Both Google and Microsoft are on a collision course. But there’s also an impressive roster of additional firms circling this space, each with the potential to be competitors, collaborators, merger partners, or all of the above. While wounded and shrinking, Yahoo! is still a powerhouse, ranking ahead of Google in some overall traffic statistics. Google’s competition with Apple in the mobile phone business prompted Google CEO Eric Schmidt to resign from Apple’s board of directors. Meanwhile, Google’s three-quarters-of-a-billion-dollar purchase of the leading mobile advertiser AdMob was quickly followed by Apple snapping up number two mobile ad firm Quattro Wireless for $275 million. Add in eBay, Facebook, Twitter, Amazon, Salesforce.com, Netflix, the video game industry, telecom and mobile carriers, cable firms, and the major media companies, and the next few years have the makings of a big, brutal fight.

Strategic Issues

Google’s scale advantages in search and its network effects advantages in advertising were outlined earlier. The firm also leads in search/ad experience and expertise and continues to offer a network reach that’s unmatched. But the strength of Google’s other competitive resources is less clear.

Within Google’s ad network, there are switching costs for advertisers and for content providers. Google partners have set up accounts and are familiar with the firm’s tools and analytics. Content providers would also need to modify Web sites to replace AdSense or DoubleClick ads with rivals. But choosing Google doesn’t cut out the competition. Many advertisers and content providers participate in multiple ad networks, making it easier to shift business from one firm to another. That likely means that Google will have to retain its partners by offering superior value.

Another vulnerability may exist with search consumers. While Google’s brand is strong, switching costs for search users are incredibly low. Move from Google.com to Bing.com and you actually save two letters of typing!

Still, there are no signs that Google’s search leadership is in jeopardy. So far users have been creatures of habit, returning to Google despite heavy marketing by rivals. And in Google’s first decade, no rival has offered technology compelling enough to woo away the googling masses—the firm’s share has only increased. Defeating Google with some sort of technical advantage will be difficult, since Web-based innovation can often be quickly imitated. Google now rolls out over 550 tweaks to its search algorithm annually, with many features mimicking or outdoing innovations from rivals.S. Levy, “Inside the Box,” Wired, March 2010.

The Google Toolbar helps reinforce search habits among those who have it installed, and Google has paid the Mozilla foundation (the folks behind the Firefox browser) upwards of $66 million a year to serve as its default search option for the open source browser.S. Shankland, “Thanks, Google: Mozilla Revenue Hits $75 Million,” CNET, November 19, 2008. But Google’s track record in expanding reach through distribution deals is mixed. The firm spent nearly $1 billion to have MySpace run AdSense ads, but Google has publicly stated that social network advertising has not been as lucrative as it had hoped (see Chapter 8 “Facebook: Building a Business from the Social Graph”). The firm has also spent nearly $1 billion to have Dell preinstall its computers with the Google browser toolbar and Google desktop search products. But in 2009, Microsoft inked deals that displaced Google on Dell machines, and it also edged Google out in a five-year search contract with Verizon Wireless.N. Wingfield, “Microsoft Wins Key Search Deals,” Wall Street Journal, January 8, 2009.

How Big Is Too Big?

Microsoft could benefit from embedding its Bing search engine into its most popular products (imagine putting Bing in the right-mouseclick menu alongside cut, copy, and paste). But with Internet Explorer market share above 65 percent, Office above 80 percent, and Windows at roughly 90 percent,Data source: http://marketshare.hitslink.com; and E. Montalbano, “Forrester: Microsoft Office in No Danger from Competitors,” InfoWorld, June 4, 2009. this seems unlikely.

European antitrust officials have already taken action against Redmond’s bundling Windows Media Player and Internet Explorer with Windows. Add in a less favorable antitrust climate in the United States, and tying any of these products to Bing is almost certainly out of bounds. What’s not clear is whether regulators would allow Bing to be bundled with less dominant Microsoft offerings, such as mobile phone software, Xbox, and MSN.

But increasingly, Google is also an antitrust target. Microsoft has itself raised antitrust concerns against Google, unsuccessfully lobbying both U.S. and European authorities to block the firm’s acquisition of DoubleClick.A. Broach, “On Capitol Hill, Google and Microsoft Spar over DoubleClick,” CNET, September 27, 2007; and D. Kawamoto and A. Broach, “EU Extends Review of Google-DoubleClick Merger,” CNET, November 13, 2007. Google was forced to abandoned a fall 2008 search advertising partnership with Yahoo! after the Justice Department indicated its intention to block the agreement (Yahoo! and Microsoft have since inked a deal to share search technology and ad sales). The Justice Department is also investigating a Google settlement with the Authors’ Guild, a deal in which critics have suggested that Google scored a near monopoly on certain book scanning, searching, and data serving rights.S. Wildstrom, “Google Book Search and the Dog in the Manger,” BusinessWeek, April 18, 2009. And yet another probe is investigating whether Google colluded with Apple, Yahoo! and other firms to limit efforts to hire away top talent.E. Buskirk, “Antitrust Probe to Review Hiring Practices at Apple, Google, Yahoo: Report,” Wired News, June 3, 2009.

Of course, being big isn’t enough to violate U.S. antitrust law. Harvard Law’s Andrew Gavil says, “You’ve got to be big, and you have to be bad. You have to be both.”S. Lohr and M. Helft, “New Mood in Antitrust May Target Google,” New York Times, May 18, 2009. This may be a difficult case to make against a firm that has a history of being a relentless supporter of open computing standards. And as mentioned earlier, there is little forcing users to stick with Google—the firm must continue to win this market on its own merits. Some suggest regulators may see Google’s search dominance as an unfair advantage in promoting its related properties such as YouTube and Google Maps over those offered by rivalsF. Vogelstein, “Why Is Obama’s Top Antitrust Cop Gunning for Google?” Wired, July 20, 2009.—an advantage not unlike Microsoft’s use of Windows to promote Media Player and Internet Explorer. While Google may escape all of these investigations, increased antitrust scrutiny is a downside that comes along with the advantages of market-dominating scale.

More Ads, More Places, More Formats

Google has been a champion of increased Internet access. But altruism aside, more Net access also means a greater likelihood of ad revenue.

Google’s effort to catalyze Internet use worldwide comes through on multiple fronts. In the United States, Google has supported (with varying degrees of success) efforts to offer free Wi-Fi in San Francisco and Mountain View. In early 2010, Google announced it would offer high-speed, fiber-optic Net access to homes in select U.S. cities. The experimental network would offer competitively priced Internet access of up to 1GB per second—that’s a speed some one hundred times faster than many Americans have access to today. The networks are meant to be open to other service providers and Google hopes to learn and share insights on how to build high-speed networks more efficiently. Google will also be watching to see how access to ultrahigh-speed networks impacts user behavior and fuels innovation. Globally, Google is also a major backer (along with Liberty Global and HSBC) of the O3b satellite network. O3b stands for “the other three billion” of the world’s population who currently lack Internet access. O3b plans to have sixteen satellites circling the globe, blanketing underserved regions with low latencyLow delay. (low delay), high-speed Internet access.O. Malik, “Google Invests in Satellite Broadband Startup,” GigaOM, September 9, 2008. With Moore’s Law dropping computing costs as world income levels rise, Google hopes to empower the currently disenfranchised masses to start surfing. Good for global economies, good for living standards, and good for Google.

Another way Google can lower the cost of surfing is by giving mobile phone software away for free. That’s the thinking behind the firm’s Android offering. With Android, Google provides mobile phone vendors with a Linux-based operating system, supporting tools, standards, and an application marketplace akin to Apple’s AppStore. Android itself isn’t ad-supported—there aren’t Google ads embedded in the OS. But the hope is that if handset manufacturers don’t have to write their own software, the cost of wireless mobile devices will go down. And cheaper devices mean that more users will have access to the mobile Internet, adding more ad-serving opportunities for Google and its partner sites.

Developers are now leveraging tailored versions of Android on a wide range of devices, including e-book readers, tablets, televisions, set-top boxes, and automobiles. Google has dabbled in selling ads for television (as well as radio and print), and there may be considerable potential in bringing variants of ad targeting technology, search, and a host of other services across these devices. In 2009, Google also announced the Chrome operating system—a direct strike at challenge to Windows in the Netbook PC market. Powered by a combination of open source Linux and Google’s open source Chrome browser, the Chrome OS is specifically designed to provide a lightweight, but consistent user interface for applications that otherwise live in the cloud, preferably residing on Google’s server farms (see Chapter 10 “Software in Flux: Partly Cloudy and Sometimes Free”).

Google has also successfully lobbied the U.S. government to force wireless telecom carriers to be more open, dismantling what are known in the industry as walled gardensA closed network or single set of services controlled by one dominant firm. Term is often applied to mobile carriers that act as gatekeepers, screening out hardware providers and software services from their networks.. Before Google’s lobbying efforts, mobile carriers could act as gatekeepers, screening out hardware providers and software services from their networks. Now, paying customers of carriers that operate over the recently allocated U.S. wireless spectrum will have access to a choice of hardware and less restrictive access to Web sites and services. And Google hopes this expands its ability to compete without obstruction.

YouTube

Then there’s Internet video, with Google in the lead here too. It’s tough to imagine any peer-produced video site displacing YouTube. Users go to YouTube because there’s more content, while amateur content providers go there seeking more users (classic two-sided network effects). This critical advantage was the main reason why, in 2006, Google paid $1.65 billion for what was then just a twenty-month-old start-up.

That popularity comes at a price. Even with falling bandwidth and storage costs, at twenty hours of video uploaded to YouTube every minute, the cost to store and serve this content is cripplingly large.E. Nakashima, “YouTube Ordered to Release User Data,” Washington Post, July 4, 2008. Credit Suisse estimates that in 2009, YouTube will bring in roughly $240 million in ad revenue, pitted against $711 million in operating expenses. That’s a shortfall of more than $470 million. Analysts estimate that for YouTube to break even, it would need to achieve an ad CPM of $9.48 on each of the roughly seventy-five billion streams it’ll serve up this year. A tough task. For comparison, Hulu (a site that specializes in offering ad-supported streams of television shows and movies) earns CPM rates of thirty dollars and shares about 70 percent of this with copyright holders. Most user-generated content sports CPM rates south of a buck.B. Wayne, “YouTube Is Doomed,” Silicon Alley Insider, April 9, 2009. Some differ with the Credit Suisse report—RampRate pegs the losses at $174 million. In fact, it may be in Google’s interest to allow others to think of YouTube as more of a money pit than it really is. That perception might keep rivals away longer, allowing the firm to solidify its dominant position while getting the revenue model right. Even as a public company, Google can keep mum about YouTube specifics. Says the firm’s CFO, “We know our cost position, but nobody else does.”“How Can YouTube Survive?” Independent, July 7, 2009.

The explosion of video uploading is also adding to costs as more cell phones become Net-equipped video cameras. YouTube’s mobile uploads were up 400 percent in just the first week following the launch of the video-capturing iPhone 3GS.J. Kincaid, “YouTube Mobile Uploads Up 400% Since iPhone 3GS Launch,” TechCrunch, June 25, 2009. Viewing will also skyrocket as mobile devices and television sets ship with YouTube access, adding to revenue potential. The firm is still experimenting with ad models—these include traditional banner and text ads, plus ads transparently layered across the bottom 20 percent of the screen, preroll commercials that appear before the selected video, and more. Google has both the money and time to invest in nurturing this market, and it continues to be hesitant in saturating the media with ads that may annoy users and constrain adoption.

Apps and Innovation

In 2007 the firm announced a tagline to sum up its intentions: “search, ads, and apps.” Google is king of the first two, but this last item hasn’t matured to the point where it impacts the firm’s financials.

Experimentation and innovation are deeply ingrained in Google’s tech-centric culture, and this has led to a flood of product offerings. Google released more than 360 products in 2008, and another 120 in Q1 2009.M. Shiels, “Google Unveils ‘Smarter Search,’” BBC News, May 13, 2009. It’s also cancelled several along the way, including Jaiku (which couldn’t beat Twitter), Google Video (which was superseded by the YouTube acquisition), and a bunch more you’ve likely not heard of, like Dodgeball, Notebook, Catalog Search, and Mashup Editor.R. Needleman, “Google Killing Jaiku, Dodgeball, Notebook, Other Projects,” CNET, January 14, 2009.

What’s Google Up To?

With all this innovation, it’s tough to stay current with Google’s cutting edge product portfolio. But the company does offer “beta” releases of some projects, and invites the public to try out and comment on its many experiments. To see some of these efforts in action, visit Google Labs at http://googlelabs.com. And to see a current list of more mature offerings, check out http://www.google.com/options.

Google’s “Apps” are mostly Web-based software-as-a-service offerings. Apps include an Office-style suite that sports a word processor, presentation tool, and spreadsheet, all served through a browser. While initially clunky, the products are constantly being refined. The spreadsheet product, for example, has been seeing new releases every two weeks, with features such as graphing and pivot tables inching it closer in capabilities to desktop alternatives.D. Girouard, “Google Inc. Presentation” (Bank of America and Merrill Lynch 2009 Technology Conference, New York, June 4, 2009). And new browser standards, such as HTML 5, will make it even easier for what lives in the browser to mimic what you’re currently using on your desktop, even allowing apps to be used offline when Net access isn’t available. That’ll be critical as long as Internet access is less reliable than your hard drive, but online collaboration is where these products can really excel (no pun intended). Most Google apps allow not only group viewing, but also collaborative editing, common storage, and version control. Google’s collaboration push also includes its wiki-like Google Sites tool, and a new platform called Wave, billed as a sort of next-step evolving beyond e-mail and instant messaging.

Unknown is how much money Google will make off all of this. Consumers and small businesses have free access to these products, with usage for up to fifty users funded by in-app ads. But is there much of a market serving ads to people working on spreadsheets? Enterprises can gain additional, ad-free licenses for a fee. While users have been reluctant to give up Microsoft Office, many have individually migrated to Google’s Web-based e-mail and calendar tools. Google’s enterprise apps group will now do the same thing for organizations, acting as a sort of outsourcer by running e-mail, calendar, and other services for a firm; all while handling upgrades, spam screening, virus protection, backup, and other administrative burdens. Arizona State University, biotech giant Genentech, and auto parts firm Valeo are among the Google partners that have signed on to make the firm’s app offerings available to thousands.S. Coughlin, “Google’s E-mail for Universities,” BBC News, June 11, 2007; Q. Hardy, “Google Muscles Further into Business Software,” Forbes, February 28, 2008; and T. Claburn, “Google’s Cloud Evangelism Converts Enterprise Customers,” InformationWeek, May 13, 2009.

And of course, Microsoft won’t let Google take this market without a fight. Office 10 was announced along with a simplified, free, ad-supported, Web-based, online options for Word, Excel, PowerPoint, and OneNote; and Microsoft can also migrate applications like e-mail and calendaring off corporate computers and onto Microsoft’s server farms.

Google’s Global Reach and the Censorship Challenge

In the spring of 2010, Google clashed publicly with the government of China, a nation that many consider to be the world’s most potentially lucrative market. For the previous four years and at the request of the Chinese government, Google had censored results returned from the firm’s google.cn domain (e.g., an image search on the term “Tiananmen” showed kite flying on google.cn, but protestors confronting tanks on google.com). However, when reports surfaced of Chinese involvement in hacking attempts against Google and at least twenty other U.S. companies and human rights dissidents, the firm began routing google.cn traffic outside the country. The days that followed saw access to a variety of Google services blocked within China, restricted by what many call the government’s “Great Firewall of China.”

Speaking for Google, the firm’s deputy counsel Nicole Wong states, “We are fundamentally guided by the belief that more information for our users is ultimately better.” But even outside of China, Google continues to be challenged by its interest in providing unfettered access to information on one hand, and the radically divergent laws, regulations, and cultural expectations of host nations on the other. Google has been prompted to block access to its services at some point in at least twenty-five of one hundred countries the firm operates in.

The kind of restriction varies widely. French, German, and Polish law requires Google to prohibit access to Nazi content. Turkish law requires Google to block access to material critical of the nation’s founder. Access in Thailand is similarly blocked from content mocking that nation’s king. In India, Google has been prompted to edit forums or remove comments flagged by the government as violating restrictions against speech that threatens public order or is otherwise considered indecent or immoral. At the extreme end of the spectrum, Vietnam, Saudi Arabia, and Iran, have aggressively moved to restrict access to wide swaths of Internet content.

Google usually waits for governments to notify it that offensive content must be blocked. This moves the firm from actively to reactively censoring access. Still, this doesn’t isolate the company from legal issues. Italian courts went after YouTube executives after a video showing local teenagers tormenting an autistic child remained online long enough to garner thousands of views.

In the United States, Google’s organic results often reveal content that would widely be viewed as offensive. In the most extreme cases, the firm has run ads alongside these results with the text, “Offensive Search Results: We’re disturbed about these results as well. Please read our note here.”

Other Internet providers have come under similar scrutiny, and technology managers will continue to confront similar ethically charged issues as they consider whether to operate in new markets. But Google’s dominant position puts it at the center of censorship concerns. The threat is ultimately that the world’s chief information gateway might also become “the Web’s main muzzle.”

It’s not until considered in its entirety that one gets a sense of what Google has the potential to achieve. It’s possible that increasing numbers of users worldwide will adopt light, cheap netbooks and other devices powered by free Google software (Android, Google’s Chrome browser and Chrome OS). Productivity apps, e-mail, calendaring, and collaboration tools will all exist in the cloud, accessible through any browser, with files stored on Google’s servers in a way that minimizes hard drive needs. Google will entertain you, help you find the information you need, help you shop, handle payment (Google Checkout), and more. And the firms you engage online may increasingly turn to Google to replace their existing hardware and software infrastructure with corporate computing platforms like Google Apps Engine (see Chapter 10 “Software in Flux: Partly Cloudy and Sometimes Free”). All of this would be based on open standards, but switching costs, scale, and increasing returns from expertise across these efforts could yield enormous advantages.

Studying Google allowed us to learn about search and the infrastructure that powers this critical technology. We’ve studied the business of ads, covering search advertising, ad networks, and ad targeting in a way that blends strategic and technology issues. And we’ve covered the ethical, legal, growth, and competitive challenges that Google and its rivals face. Studying Google in this context should not only help you understand what’s happening today, it should also help you develop critical thinking skills for assessing the opportunities and threats that will emerge across industries as technologies continue to evolve.

Key Takeaways

  • For over a decade, Google’s business has been growing rapidly, but that business is maturing.
  • Slower growth will put pressure on the firm’s stock price, so a firm Google’s size will need to pursue very large, risky, new markets—markets that are also attractive to well-financed rivals, smaller partners, and entrepreneurs.
  • Rivals continue to innovate in search. Competing with technology is extremely difficult, since it is often easy for a firm to mimic the innovations of a pioneer with a substitute offering. Microsoft, with profits to invest in infrastructure, advertising, and technology, may pose Google’s most significant, conventional threat.
  • Although Microsoft has many distribution channels (Windows, Internet Explorer, Office) for its search and other services, European and U.S. regulators will likely continue to prevent the firm from aggressive product and service bundling.
  • Google is investing heavily in methods that promote wider Internet access. These include offering free software to device manufacturers, and several telecommunications and lobbying initiatives meant to lower the cost of getting online. The firm hopes that more users spending more time online will allow it to generate more revenue through ads and perhaps other services.
  • YouTube demonstrates how a firm can create a large and vastly influential business in a short period of time, but that businesses that host and serve large files of end-user content can be costly.
  • Google, Microsoft, and smaller rivals are also migrating applications to the Web, allowing Office-style software to execute within a browser, with portions of this computing experience and storage happening off a user’s computer, “in the cloud” of the Internet. Revenue models for this business are also uncertain.
  • With scale and influence comes increased governmental scrutiny. Google has increasingly become a target of antitrust regulators. The extent of this threat is unclear. Google’s extreme influence is clear. However, the firm’s software is based on open standards; competitors have a choice in ad networks, search engines, and other services; switching costs are relatively low; users and advertisers aren’t locked into exclusive contracts for the firm’s key products and services; and there is little evidence of deliberate, predatory pricing or other “red-flag” activity that usually brings government regulation.

Questions and Exercises

  1. Perform identical queries on both Google and on rival search engines. Try different categories (research for school projects, health, business, sports, entertainment, local information). Which sites do you think give you the better results? Why? Would any of these results cause you to switch to one search engine versus the other?
  2. Investigate new services that attempt to extend the possibilities for leveraging online content. Visit Bing, Google Squared, Wolfram Alpha, and any other such efforts that intrigue you. Assume the role of a manager and use these engines to uncover useful information. Assume your role as a student and see if these tools provide valuable information for this or other classes. Are you likely to use these tools in the future? Why or why not? Under what circumstances are they useful and when do they fall short?
  3. Assume the role of an industry analyst: Consider the variety of firms mentioned in this section that may become competitors or partners. Create a chart listing your thoughts on which firms are likely to collaborate and work together, and which firms are likely to compete. What are the advantages or risks in these collaborations for the partners involved? Do you think any of these firms are “acquisition bait?” Defend your predictions and be prepared to discuss them with your class.
  4. Assume the role of an IT manager: to the extent that you can, evaluate online application offerings by Google, Microsoft, and rivals. In your opinion, are these efforts ready for prime time? Why or why not? Would you recommend that a firm choose these applications? Are there particular firms or users that would find these alternatives particularly appealing? Would you ever completely replace desktop offerings with online ones? Why or why not?
  5. Does it make sense for organizations to move their e-mail and calendaring services off their own machines and pay Google, Microsoft, or someone else to run them? Why or why not?
  6. What are Chrome, the Chrome OS, and Android? Are these software products successful in their respective categories? Investigate the state of the market for products that leverage any of these software offerings. Would you say that they are successful? Why or why not? What do you think the outlook is for Chrome, the Chrome OS, and Android? As an IT manager, would you recommend products based on this software? As an investor, do you think it continues to make sense for Google to develop these efforts? Why or why not?
  7. Google’s unofficial motto is “Don’t be evil.” But sometimes it’s challenging for managers to tell what path is “most right” or “least wrong.” Google operates in countries that require the firm to screen and censor results. Short term, this is clearly a limitation on freedom of speech. But long-term, access to the Internet could catalyze economic development and spread information in a way that leads to more democratization. Investigate and consider both of these arguments and be prepared to argue the case either for limiting work in speech-limiting countries, or in working within them as a potential agent of change. What other pressures is a publicly traded firm under to choose one path or the other? Which path would you choose and why?

Chapter 13: Information Security: Barbarians at the Gateway

13.1 Introduction

Learning Objectives

After studying this section you should be able to do the following:

  1. Recognize that information security breaches are on the rise.
  2. Understand the potentially damaging impact of security breaches.
  3. Recognize that information security must be made a top organizational priority.

Sitting in the parking lot of a Minneapolis Marshalls, a hacker armed with a laptop and a telescope-shaped antenna infiltrated the store’s network via an insecure Wi-Fi base station.Particular thanks goes to my Boston College colleague, Professor Sam Ransbotham, whose advice, guidance, and suggestions were invaluable in creating this chapter. Any errors or omissions are entirely my own. The attack launched what would become a billion-dollar-plus nightmare scenario for TJX, the parent of retail chains that include Marshalls, Home Goods, and T. J. Maxx. Over a period of several months, the hacker and his gang stole at least 45.7 million credit and debit card numbers and pilfered driver’s licenses and other private information from an additional 450,000 customers.R. King, “Lessons from the Data Breach at Heartland,” BusinessWeek, July 6, 2009.

TJX, at the time a $17.5 billion Fortune 500 firm, was left reeling from the incident. The attack deeply damaged the firm’s reputation. It burdened customers and banking partners with the time and cost of reissuing credit cards. And TJX suffered under settlement costs, payouts from court-imposed restitution, legal fees, and more. The firm estimated that it spent more than $150 million to correct security problems and settle with consumers affected by the breach, and that was just the tip of the iceberg. Estimates peg TJX’s overall losses from this incident at between $1.35 billion and $4.5 billion.A. Matwyshyn, Harboring Data: Information Security, Law, and the Corporation (Palo Alto, CA: Stanford University Press, 2009).

A number of factors led to and amplified the severity of the TJX breach. There was a personnel betrayal: the mastermind was an alleged FBI informant who previously helped bring down a massive credit card theft scheme but then double-crossed the Feds and used insider information to help his gang outsmart the law and carry out subsequent hacks.D. Goldman, “Cybercrime: A Secret Underground Economy,” CNNMoney, September 17, 2009. There was a technology lapse: TJX made itself an easy mark by using WEP, a wireless security technology less secure than the stuff many consumers use in their homes—one known for years to be trivially compromised by the kind of “drive-by” hacking initiated by the perpetrators. And there was a procedural gaffe: retailers were in the process of rolling out a security rubric known as the Payment Card Industry Data Security Standard. Despite an industry deadline, however, TJX had requested and received an extension, delaying the rollout of mechanisms that might have discovered and plugged the hole before the hackers got in.G. Anthes, “The Grill: Security Guru Ira Winkler Takes the Hot Seat,” Computerworld, July 28, 2008.

The massive impact of the TJX breach should make it clear that security must be a top organizational priority. Attacks are on the rise. In 2008, more electronic records were breached than in the previous four years combined.R. King, “Lessons from the Data Breach at Heartland,” BusinessWeek, July 6, 2009. While the examples and scenarios presented here are shocking, the good news is that the vast majority of security breaches can be prevented. Let’s be clear from the start: no text can provide an approach that will guarantee that you’ll be 100 percent secure. And that’s not the goal of this chapter. The issues raised in this brief introduction can, however, help make you aware of vulnerabilities; improve your critical thinking regarding current and future security issues; and help you consider whether a firm has technologies, training, policies, and procedures in place to assess risks, lessen the likelihood of damage, and respond in the event of a breach. A constant vigilance regarding security needs to be part of your individual skill set and a key component in your organization’s culture. An awareness of the threats and approaches discussed in this chapter should help reduce your chance of becoming a victim.

As we examine security issues, we’ll first need to understand what’s happening, who’s doing it, and what their motivation is. We’ll then examine how these breaches are happening with a focus on technologies and procedures. Finally, we’ll sum up with what can be done to minimize the risks of being victimized and quell potential damage of a breach for both the individual and the organization.

Key Takeaways

  • Information security is everyone’s business and needs to be made a top organizational priority.
  • Firms suffering a security breach can experience direct financial loss, exposed proprietary information, fines, legal payouts, court costs, damaged reputations, plummeting stock prices, and more.
  • Information security isn’t just a technology problem; a host of personnel and procedural factors can create and amplify a firm’s vulnerability.

Questions and Exercises

  1. As individuals or in groups assigned by your instructor, search online for recent reports on information security breaches. Come to class prepared to discuss the breach, its potential impact, and how it might have been avoided. What should the key takeaways be for managers studying your example?
  2. Think of firms that you’ve done business with online. Search to see if these firms have experienced security breaches in the past. What have you found out? Does this change your attitude about dealing with the firm? Why or why not?
  3. What factors were responsible for the TJX breach? Who was responsible for the breach? How do you think the firm should have responded?

13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the source and motivation of those initiating information security attacks.
  2. Relate examples of various infiltrations in a way that helps raise organizational awareness of threats.

Thieves, vandals, and other bad guys have always existed, but the environment has changed. Today, nearly every organization is online, making any Internet-connected network a potential entry point for the growing worldwide community of computer criminals. Software and hardware solutions are also more complex than ever. Different vendors, each with their own potential weaknesses, provide technology components that may be compromised by misuse, misconfiguration, or mismanagement. Corporations have become data packrats, hoarding information in hopes of turning bits into bucks by licensing databases, targeting advertisements, or cross-selling products. And flatter organizations also mean that lower-level employees may be able to use technology to reach deep into corporate assets—amplifying threats from operator error, a renegade employee, or one compromised by external forces.

There are a lot of bad guys out there, and motivations vary widely, including the following:

  • Account theft and illegal funds transfer
  • Stealing personal or financial data
  • Compromising computing assets for use in other crimes
  • Extortion
  • Espionage
  • Cyberwarfare
  • Terrorism
  • Pranksters
  • Protest hacking (hacktivism)
  • Revenge (disgruntled employees)

Criminals have stolen more than $100 million from U.S. banks in the first three quarters of 2009, and they did it “without drawing a gun or passing a note to a teller.”S. Kroft, “Cyberwar: Sabotaging the System,” 60 Minutes, November 8, 2009. While some steal cash for their own use, other resell their hacking take to others. There is a thriving cybercrime underworld market in which data harvestersCybercriminals who infiltrate systems and collect data for illegal resale. sell to cash-out fraudstersFirms that purchase assets from data harvesters. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.: criminals who might purchase data from the harvesters in order to buy (then resell) goods using stolen credit cards or create false accounts via identity theft. These collection and resale operations are efficient and sophisticated. Law enforcement has taken down sites like DarkMarket and ShadowCrew, in which card thieves and hacking tool peddlers received eBay-style seller ratings vouching for the “quality” of their wares.R. Singel, “Underground Crime Economy Health, Security Group Finds,” Wired, November 24, 2008.

Hackers might also infiltrate computer systems to enlist hardware for subsequent illegal acts. A cybercrook might deliberately hop through several systems to make his path difficult to follow, slowing cross-border legal pursuit or even thwarting prosecution if launched from nations without extradition agreements.

In fact, your computer may be up for rent by cyber thieves right now. BotnetsHordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks of zombie computers (networks of infiltrated and compromised machines controlled by a central command) are used for all sorts of nefarious activity. This includes sending spam from thousands of difficult-to-shut-down accounts, launching tough-to-track click fraud efforts or staging what’s known as distributed denial of service (DDoS)An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets. attacks (effectively shutting down Web sites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines). Botnets have been discovered that are capable of sending out 100 billion spam messages a day,K. J. Higgins, “SecureWorks Unveils Research on Spamming Botnets,” DarkReading, April 9, 2008. and botnets as large as 10 million zombies have been identified. Such systems theoretically control more computing power than the world’s fastest supercomputers.B. Krebs, “Storm Worm Dwarfs World’s Top Supercomputer,” Washington Post, August 31, 2007.

Extortionists might leverage botnets or hacked data to demand payment to avoid retribution. Three eastern European gangsters used a botnet and threatened DDoS to extort $4 million from UK sports bookmakers,Trend Micro, “Web Threats Whitepaper,” March 2008. while an extortion plot against the state of Virginia threatened to reveal names, Social Security numbers, and prescription information stolen from a medical records database.S. Kroft, “Cyberwar: Sabotaging the System,” 60 Minutes, November 8, 2009. Competition has also lowered the price to inflict such pain. BusinessWeek reports that the cost of renting out ten thousand machines, enough to cripple a site like Twitter, has tumbled to just $200 a day.J. Schectman, “Computer Hacking Made Easy,” BusinessWeek, August 13, 2009.

Corporate espionage might be performed by insiders, rivals, or even foreign governments. Gary Min, a scientist working for DuPont, was busted when he tried to sell information valued at some $400 million, including R&D documents and secret data on proprietary products.J. Vijayan, “Software Consultant Who Stole Data on 110,000 People Gets Five-Year Sentence,” Computerworld, July 10, 2007. Spies also breached the $300 billion U.S. Joint Strike Fighter project, siphoning off terabytes of data on navigation and other electronics systems.S. Gorman, A. Cole, and Y. Dreazen. “Computer Spies Breach Fighter-Jet Project,” Wall Street Journal, April 21, 2009.

Cyberwarfare has become a legitimate threat, with several attacks demonstrating how devastating technology disruptions by terrorists or a foreign power might be. Brazil has seen hacks that cut off power to millions.

The 60 Minutes news program showed a demonstration by “white hat” hackers that could compromise a key component in an oil refinery, force it to overheat, and cause an explosion. Taking out key components of the vulnerable U.S. power grid may be particularly devastating, as the equipment is expensive, much of it is no longer made in the United States, and some components may take three to four months to replace.S. Kroft, “Cyberwar: Sabotaging the System,” 60 Minutes, November 8, 2009.

“Hacker”: Good or Bad?

The terms hackerA term that, depending on the context, may be applied to either 1) someone who breaks into computer systems, or 2) to a particularly clever programmer. and hackA term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution. are widely used, but their meaning is often based on context. When referring to security issues, the media widely refers to hackers as bad guys who try to break into (hack) computer systems. Some geezer geeks object to this use, as the term hack in computer circles originally referred to a clever (often technical) solution and the term hacker referred to a particularly skilled programmer. Expect to see the terms used both positively and negatively.

You might also encounter the terms white hat hackersSomeone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security. and black hat hackersA computer criminal.. The white hats are the good guys who probe for weaknesses, but don’t exploit them. Instead, they share their knowledge in hopes that the holes they’ve found will be plugged and security will be improved. Many firms hire consultants to conduct “white hat” hacking expeditions on their own assets as part of their auditing and security process. “Black hats” are the bad guys. Some call them “crackers.” There’s even a well-known series of hacker conventions known as the Black Hat conference.

Other threats come from malicious pranksters, like the group that posted seizure-inducing images on Web sites frequented by epilepsy sufferers.M. Schwartz, “The Trolls among Us,” New York Times, August 3, 2008. Others are hacktivistsA protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage., targeting firms, Web sites, or even users as a protest measure. In 2009, Twitter was brought down and Facebook and LiveJournal were hobbled as Russian-sympathizing hacktivists targeted the social networking and blog accounts of the Georgian blogger known as Cyxymu. The silencing of millions of accounts was simply collateral damage in a massive DDoS attack meant to mute this single critic of the Russian government.J. Schectman, “Computer Hacking Made Easy,” BusinessWeek, August 13, 2009.

And as power and responsibility is concentrated in the hands of a few revenge-seeking employees can do great damage. The San Francisco city government lost control of a large portion of its own computer network over a ten-day period when a single disgruntled employee refused to divulge critical passwords.J. Vijayan, “After Verdict, Debate Rages in Terry Childs Case,” Computerworld, April 28, 2010.

The bad guys are legion and the good guys often seem outmatched and underresourced. Law enforcement agencies dealing with computer crime are increasingly outnumbered, outskilled, and underfunded. Many agencies are staffed with technically weak personnel who were trained in a prior era’s crime fighting techniques. Governments can rarely match the pay scale and stock bonuses offered by private industry. Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

Key Takeaways

  • Computer security threats have moved beyond the curious teen with a PC and are now sourced from a number of motivations, including theft, leveraging compromised computing assets, extortion, espionage, warfare, terrorism, pranks, protest, and revenge.
  • Threats can come from both within the firm as well as from the outside.
  • Cybercriminals operate in an increasingly sophisticated ecosystem where data harvesters and tool peddlers leverage sophisticated online markets to sell to cash-out fraudsters and other crooks.
  • Technical and legal complexity make pursuit and prosecution difficult.
  • Many law enforcement agencies are underfunded, underresourced, and underskilled to deal with the growing hacker threat.

Questions and Exercises

  1. What is a botnet? What sorts of exploits would use a botnet? Why would a botnet be useful to cybercriminals?
  2. Why are threats to the power grid potentially so concerning? What are the implications of power-grid failure and of property damage? Who might execute these kinds of attacks? What are the implications for firms and governments planning for the possibility of cyberwarfare and cyberterror?
  3. Scan the trade press for examples of hacking that apply to the various motivations mentioned in this chapter. What happened to the hacker? Were they caught? What penalties do they face?
  4. Why do cybercriminals execute attacks across national borders? What are the implications for pursuit, prosecution, and law enforcement?
  5. Why do law enforcement agencies struggle to cope with computer crime?
  6. A single rogue employee effectively held the city of San Francisco’s network hostage for ten days. What processes or controls might the city have created that could have prevented this kind of situation from taking place?

13.3 Where Are Vulnerabilities? Understanding the Weaknesses

Learning Objectives

After studying this section you should be able to do the following:

  1. Recognize the potential entry points for security compromise.
  2. Understand infiltration techniques such as social engineering, phishing, malware, Web site compromises (such as SQL injection), and more.
  3. Identify various methods and techniques to thwart infiltration.

Figure 13.1

This diagram shows only some of the potential weaknesses that can compromise the security of an organization’s information systems. Every physical or network “touch point” is a potential vulnerability. Understanding where weaknesses may exist is a vital step toward improved security.

Modern information systems have lots of interrelated components and if one of these components fails, there might be a way in to the goodies. This creates a large attack surface for potential infiltration and compromise, as well as one that is simply vulnerable to unintentional damage and disruption.

User and Administrator Threats

Bad Apples

While some of the more sensational exploits involve criminal gangs, research firm Gartner estimates that 70 percent of loss-causing security incidents involve insiders.J. Mardesich, “Ensuring the Security of Stored Data,” CIO Strategy Center, 2009. Rogue employees can steal secrets, install malware, or hold a firm hostage. Check processing firm Fidelity National Information Services was betrayed when one of its database administrators lifted personal records on 2.3 million of the firm’s customers and illegally sold them to direct marketers.

And it’s not just firm employees. Many firms hire temporary staffers, contract employees, or outsource key components of their infrastructure. Other firms have been compromised by members of their cleaning or security staff. A contract employee working at Sentry Insurance stole information on 110,000 of the firm’s clients.J. Vijayan, “Software Consultant Who Stole Data on 110,000 People Gets Five-Year Sentence,” Computerworld, July 10, 2007.

Social Engineering

As P. T. Barnum is reported to have said, “There’s a sucker born every minute.” Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as social engineering in security circles. In some ways, crooks have never had easier access to background information that might be used to craft a scam. It’s likely that a directory of a firm’s employees, their titles, and other personal details is online right now via social networks like LinkedIn and Facebook. With just a few moments of searching, a skilled con artist can piece together a convincing and compelling story.

A Sampling of Methods Employed in Social Engineering

  • Impersonating senior management, a current or new end user needing help with access to systems, investigators, or staff (fake uniforms, badges)
  • Identifying a key individual by name or title as a supposed friend or acquaintance
  • Making claims with confidence and authority (“Of course I belong at this White House dinner.”)
  • Baiting someone to add, deny, or clarify information that can help an attacker
  • Using harassment, guilt, or intimidation
  • Using an attractive individual to charm others into gaining information, favors, or access
  • Setting off a series of false alarms that cause the victim to disable alarm systems
  • Answering bogus surveys (e.g., “Win a free trip to Hawaii—just answer three questions about your network.”)

Data aggregator ChoicePoint sold private information to criminals who posed as legitimate clients, compromising the names, addresses, and Social Security numbers of some 145,000 individuals. In this breach, not a single computer was compromised. Employees were simply duped into turning data over to crooks. Gaffes like that can be painful. ChoicePoint paid $15 million in a settlement with the Federal Trade Commission, suffered customer loss, and ended up abandoning once lucrative businesses.G. Anthes, “The Grill: Security Guru Ira Winkler Takes the Hot Seat,” Computerworld, July 28, 2008.

Phishing

PhishingA con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. refers to cons executed through technology. The goal of phishing is to leverage the reputation of a trusted firm or friend to trick the victim into performing an action or revealing information. The cons are crafty. Many have masqueraded as a security alert from a bank or e-commerce site (“Our Web site has been compromised, click to log in and reset your password.”), a message from an employer, or even a notice from the government (“Click here to update needed information to receive your tax refund transfer.”). Sophisticated con artists will lift logos, mimic standard layouts, and copy official language from legitimate Web sites or prior e-mails. Gartner estimates that these sorts phishing attacks cost consumers $3.2 billion in 2007.L. Avivah, “Phishing Attacks Escalate, Morph, and Cause Considerable Damage,” Gartner, December 12, 2007.

Other phishing attempts might dupe a user into unwittingly downloading dangerous software (malware) that can do things like record passwords and keystrokes, provide hackers with deeper access to your corporate network, or enlist your PC as part of a botnet. One attempt masqueraded as a message from a Facebook friend, inviting the recipient to view a video. Victims clicking the link were then told they need to install an updated version of the Adobe Flash plug-in to view the clip. The plug in was really a malware program that gave phishers control of the infected user’s computer.B. Krebs, “‘Koobface’ Worm Resurfaces on Facebook, MySpace,” Washington Post, March 2, 2009. Other attempts have populated P2P networks (peer-to-peer file distribution systems such as BitTorrent) with malware-installing files masquerading as video games or other software, movies, songs, and pornography.

So-called spear phishing attacks specifically target a given organization or group of users. In one incident, employees of a medical center received e-mails purportedly from the center itself, indicating that the recipient was being laid off and offering a link to job counseling resources. The link really offered a software payload that recorded and forwarded any keystrokes on the victim’s PC.C. Garretson, “Spam that Delivers a Pink Slip,” NetworkWorld, November 1, 2006. And with this type of phishing, the more you know about a user, the more convincing it is to con them. Phishers using pilfered résumé information from Monster.com crafted targeted and personalized e-mails. The request, seemingly from the job site, advised users to download the “Monster Job Seeker Tool”; this “tool” installed malware that encrypted files on the victim’s PC, leaving a ransom note demanding payment to liberate a victim’s hard disk.T. Wilson, “Trojan On Monster.com Steals Personal Data,” Forbes, August 20, 2007.

Don’t Take the Bait: Recognizing the “Phish Hooks”

Web browser developers, e-mail providers, search engines, and other firms are actively working to curtail phishing attempts. Many firms create blacklists that block access to harmful Web sites and increasingly robust tools screen for common phishing tactics. But it’s still important to have your guard up. Some exploits may be so new that they haven’t made it into screening systems (so-called zero-day exploits).

Never click on a link or download a suspicious, unexpected enclosure without verifying the authenticity of the sender. If something looks suspicious, don’t implicitly trust the “from” link in an e-mail. It’s possible that the e-mail address has been spoofedTerm used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as being “spoofed.” (faked) or that it was sent via a colleague’s compromised account. If unsure, contact the sender or your security staff.

Also know how to read the complete URL to look for tricks. Some firms misspell Web address names (http://wwwyourbank.com—note the missing period), set up subdomains to trick the eye (http://yourbank.com.sneakysite.com—which is hosted at sneakysite.com even though a quick glance looks like yourbank.com), or hijack brands by registering a legitimate firm’s name via foreign top-level domains (http://yourbank.cn).

A legitimate URL might also appear in a phishing message, but an HTML coding trick might make something that looks like http://yourbank.com/login actually link to http://sneakysite.com. Hovering your cursor over the URL or an image connected to a link should reveal the actual URL as a tool tip (just don’t click it, or you’ll go to that site).

Figure 13.2

This e-mail message looks like it’s from Bank of America. However, hovering the cursor above the “Continue to Log In” button reveals the URL without clicking through to the site. Note how the actual URL associated with the link is not associated with Bank of America.

Figure 13.3

This image is from a phishing scheme masquerading as an eBay message. The real destination is a compromised .org domain unassociated with eBay, but the phishers have created a directory at this domain named “signin.ebay.com” in hopes that users will focus on that part of the URL and not recognize they’re really headed to a non-eBay site.

Web 2.0: The Rising Security Threat

Social networks and other Web 2.0 tools are a potential gold mine for crooks seeking to pull off phishing scams. Malware can send messages that seem to come from trusted “friends.” Messages such as status updates and tweets are short, and with limited background information, there are fewer contexts to question a post’s validity. Many users leverage bit.ly or other URL-shortening services that don’t reveal the Web site they link to in their URL, making it easier to hide a malicious link. While the most popular URL-shortening services maintain a blacklist, early victims are threatened by zero-day exploitsAttacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.. Criminals have also been using a variety of techniques to spread malware across sites or otherwise make them difficult to track and catch.

Some botnets have even used Twitter to communicate by sending out coded tweets to instruct compromised machines.UnsafeBits, “Botnets Go Public by Tweeting on Twitter,” Technology Review, August 17, 2009. Social media can also be a megaphone for loose lips, enabling a careless user to broadcast proprietary information to the public domain. A 2009 Congressional delegation to Iraq led by House Minority Leader John Boehner was supposed to have been secret. But Rep. Peter Hoekstra tweeted his final arrival into Baghdad for all to see, apparently unable to contain his excitement at receiving BlackBerry service in Iraq. Hoekstra tweeted, “Just landed in Baghdad. I believe it may be first time I’ve had bb service in Iraq. 11th trip here.” You’d think he would have known better. At the time, Hoekstra was a ranking member of the House Intelligence Committee!

Figure 13.4

A member of the House Intelligence Committee uses Twitter and reveals his locale on a secret trip.

Passwords

Many valuable assets are kept secure via just one thin layer of protection—the password. And if you’re like most users, your password system is a mess.F. Manjoo, “Fix Your Terrible, Insecure Passwords in Five Minutes,” Slate, November 12, 2009. With so many destinations asking for passwords, chances are you’re using the same password (or easily guessed variants) in a way that means getting just one “key” would open many “doors.” The typical Web user has 6.5 passwords, each of which is used at four sites, on average.N. Summers, “Building a Better Password,” Newsweek, October 19, 2009. Some sites force users to change passwords regularly, but this often results in insecure compromises. Users make only minor tweaks (e.g., appending the month or year); they write passwords down (in an unlocked drawer or Post-it note attached to the monitor); or they save passwords in personal e-mail accounts or on unencrypted hard drives.

The challenge questions offered by many sites to automate password distribution and reset are often pitifully insecure. What’s your mother’s maiden name? What elementary school did you attend? Where were you born? All are pretty easy to guess. One IEEE study found acquaintances could correctly answer colleagues’ secret questions 28 percent of the time, and those who did not know the person still guessed right at a rate of 17 percent. Plus, within three to six months, 16 percent of study participants forgot answers to their own security questions.R. Lemos, “Are Your ‘Secret Questions’ Too Easily Answered?” Technology Review, May 18, 2009. In many cases, answers to these questions can be easily uncovered online. Chances are, if you’ve got an account at a site like Ancestry.com, classmates.com, or Facebook, then some of your secret answers have already been exposed—by you! A Tennessee teen hacked into Sarah Palin’s personal Yahoo! account (gov.palin@yahoo.com) in part by correctly guessing where she met her husband. A similar attack hit staffers at Twitter, resulting in the theft of hundreds of internal documents, including strategy memos, e-mails, and financial forecasts, many of which ended up embarrassingly posted online.N. Summers, “Building a Better Password,” Newsweek, October 19, 2009.

Related to the password problem are issues with system setup and configuration. Many vendors sell software with a common default password. For example, for years, leading database products came with the default account and password combination “scott/tiger.” Any firm not changing default accounts and passwords risks having an open door. Other firms are left vulnerable if users set systems for open access—say turning on file sharing permission for their PC. Programmers, take note: well-designed products come with secure default settings, require users to reset passwords at setup, and also offer strong warnings when security settings are made weaker. But unfortunately, there are a lot of legacy products out there, and not all vendors have the insight to design for out-of-the-box security.

Building a Better Password

There’s no simple answer for the password problem. BiometricsTechnologies that measure and analyze human body characteristics for identification or authentication. These might include fingerprint readers, retina scanners, voice and face recognition, and more. are often thought of as a solution, but technologies that replace conventionally typed passwords with things like fingerprint readers, facial recognition, or iris scans are still rarely used, and PCs that include such technologies are widely viewed as novelties. Says Carnegie Mellon University CyLab fellow Richard Power, “Biometrics never caught on and it never will.”N. Summers, “Building a Better Password,” Newsweek, October 19, 2009.

Other approaches leverage technology that distributes single use passwords. These might arrive via external devices like an electronic wallet card, key chain fob, or cell phone. Security firm RSA has even built the technology into BlackBerrys. Enter a user name and receive a phone message with a temporary password. Even if a system was compromised by keystroke capture malware, the password is only good for one session. Lost device? A central command can disable it. This may be a good solution for situations that demand a high level of security, and Wells Fargo and PayPal are among the firms offering these types of services as an option. However, for most consumer applications, slowing down users with a two-tier authentication system would be an impractical mandate.

While you await technical fixes, you can at least work to be part of the solution rather than part of the problem. It’s unlikely you’ve got the memory or discipline to create separate unique passwords for all of your sites, but at least make it a priority to create separate, hard-to-guess passwords for each of your highest priority accounts (e.g., e-mail, financial Web sites, corporate network, and PC). Remember, the integrity of a password shared across Web sites isn’t just up to you. That hot start-up Web service may not have the security resources or experience to protect your special code, and if that Web site’s account is hacked, your user name and password are now in the hands of hackers that can try out those “keys” across the Web’s most popular destinations.

Web sites are increasingly demanding more “secure” passwords, requiring users to create passwords at least eight characters in length and that include at least one number and other nonalphabet character. Beware of using seemingly clever techniques to disguise common words. Many commonly available brute-force password cracking tools run through dictionary guesses of common words or phrases, substituting symbols or numbers for common characters (e.g., “@” for “a,” “+” for “t”). For stronger security, experts often advise basing passwords on a phrase, where each letter makes up a letter in an acronym. For example, the phrase “My first Cadillac was a real lemon so I bought a Toyota” becomes “M1stCwarlsIbaT.”F. Manjoo, “Fix Your Terrible, Insecure Passwords in Five Minutes,” Slate, November 12, 2009. Be careful to choose an original phrase that’s known only by you and that’s easy for you to remember. Studies have shown that acronym-based passwords using song lyrics, common quotes, or movie lines are still susceptible to dictionary-style hacks that build passwords from pop-culture references (in one test, two of 144 participants made password phrases from an acronym of the Oscar Meyer wiener jingle).N. Summers, “Building a Better Password,” Newsweek, October 19, 2009. Finding that balance between something tough for others to guess yet easy for you to remember will require some thought—but it will make you more secure. Do it now!

Technology Threats (Client and Server Software, Hardware, and Networking)

Malware

Any accessible computing device is a potential target for infiltration by malware. Malware (for malicious software) seeks to compromise a computing system without permission. Client PCs and a firm’s servers are primary targets, but as computing has spread, malware now threatens nearly any connected system running software, including mobile phones, embedded devices, and a firm’s networking equipment.

Some hackers will try to sneak malware onto a system via techniques like phishing. In another high-profile hacking example, infected USB drives were purposely left lying around government offices. Those seemingly abandoned office supplies really contained code that attempted to infiltrate government PCs when inserted by unwitting employees.

Machines are constantly under attack. Microsoft’s Internet Safety Enforcement Team claims that the mean time to infection for an unprotected PC is less than five minutes.J. Markoff, “A Robot Network Seeks to Enlist Your Computer,” New York Times, October 20, 2008. Oftentimes malware attempts to compromise weaknesses in software—either bugs, poor design, or poor configuration.

Years ago, most attacks centered on weaknesses in the operating system, but now malware exploits have expanded to other targets, including browsers, plug-ins, and scripting languages used by software. BusinessWeek reports that Adobe has replaced Microsoft as the primary means by which hackers try to infect or take control of PCs. Even trusted Web sites have become a conduit to deliver malware payloads. More than a dozen sites, including those of the New York Times, USA Today, and Nature, were compromised when seemingly honest advertising clients switched on fake ads that exploit Adobe software.A. Ricadela, “Can Adobe Beat Back the Hackers?” BusinessWeek, November 19, 2009. Some attacks were delivered through Flash animations that direct computers to sites that scan PCs, installing malware payloads through whatever vulnerabilities are discovered. Others circulated via e-mail through PDF triggered payloads deployed when a file was loaded via Acrobat Reader. Adobe is a particularly tempting target, as Flash and Acrobat Reader are now installed on nearly every PC, including Mac and Linux machines.

Malware goes by many names. Here are a few of the more common terms you’re likely to encounter.Portions adapted from G. Perera, “Your Guide to Understanding Malware,” LaptopLogic.com, May 17, 2009.

Methods of infection are as follows:

  • Viruses. Programs that infect other software or files. They require an executable (a running program) to spread, attaching to other executables. Viruses can spread via operating systems, programs, or the boot sector or auto-run feature of media such as DVDs or USB drives. Some applications have executable languages (macros) that can also host viruses that run and spread when a file is open.
  • Worms. Programs that take advantage of security vulnerability to automatically spread, but unlike viruses, worms do not require an executable. Some worms scan for and install themselves on vulnerable systems with stunning speed (in an extreme example, the SQL Slammer worm infected 90 percent of vulnerable software worldwide within just ten minutes).M. Broersma, “Slammer—the First ‘Warhol’ Worm?” CNET, February 3, 2003.
  • Trojans. Exploits that, like the mythical Trojan horse, try to sneak in by masquerading as something they’re not. The payload is released when the user is duped into downloading and installing the malware cargo, oftentimes via phishing exploits.

While the terms above cover methods for infection, the terms below address the goal of the malware:

  • Botnets or zombie networks. Hordes of surreptitiously infected computers linked and controlled remotely by a central command. Botnets are used in crimes where controlling many difficult-to-identify PCs is useful, such as when perpetrating click fraud, sending spam, registering accounts that use CAPTCHAsAn acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart. CAPTCHAs are those scrambled character images that many sites require to submit some sort of entry (account setup, ticket buying). CAPTCHAs were developed because computers have difficulty discerning letters that are distorted or mixed inside a jumbled graphic. CAPTCHAs are meant to be a Turing Test—a test to distinguish if a task is being performed by a computer or a human.G. Keizer, “Botnet Busts Newest Hotmail CAPTCHA,” Computerworld, February 19, 2009. (those scrambled character images meant to thwart things like automated account setup or ticket buying), executing “dictionary” password cracking attempts, or launching denial-of-service attacks.
  • Malicious adware. Programs installed without full user consent or knowledge that later serve unwanted advertisements.
  • Spyware. Software that surreptitiously monitors user actions, network traffic, or scans for files.
  • Keylogger. Type of spyware that records user keystrokes. Keyloggers can be either software-based or hardware, such as a recording “dongle” that is plugged in between a keyboard and a PC.
  • Screen capture. Variant of the keylogger approach. This category of software records the pixels that appear on a user’s screen for later playback in hopes of identifying proprietary information.
  • Blended threats. Attacks combining multiple malware or hacking exploits.

All the News Fit to Print (Brought to You by Scam Artists)

In fall 2009, bad guys posing as the telecom firm Vonage signed up to distribute ads through the New York Times Web site. Many firms that display online ads on their Web sites simply create placeholders on their Web pages, with the actual ad content served by the advertisers themselves (see the Google chapter for details). In this particular case, the scam artists posing as Vonage switched off the legitimate-looking ads and switched on code that, according to the New York Times, “took over the browsers of many people visiting the site, as their screens filled with an image that seemed to show a scan for computer viruses. The visitors were then told that they needed to buy antivirus software to fix a problem, but the software was more snake oil than a useful program.”A. Vance, “Times Web Ads Show Security Breach,” New York Times, September 14, 2009. Sites ranging from Fox News, the San Francisco Chronicle, and British tech site The Register have also been hit with ad scams in the past. In the Times case, malware wasn’t distributed directly to user PCs, but by passing through ads from third parties to consumers, the Times became a conduit for a scam. In the same way that manufacturers need to audit their supply chain to ensure that partners aren’t engaged in sweatshop labor or disgraceful pollution, sites that host ads need to audit their partners to ensure they are legitimate and behaving with integrity.

The Virus in Your Pocket

Most mobile phones are really pocket computers, so it’s not surprising that these devices have become malware targets. And there are a lot of pathways to exploit. Malware might infiltrate a smartphone via e-mail, Internet surfing, MMS attachments, or even Bluetooth. The “commwarrior” mobile virus spread to at least eight countries, propagating from a combination of MMS messages and Bluetooth.J. Charney, “Commwarrior Cell Phone Virus Marches On,” CNET, June 5, 2005.

Most smartphones have layers of security to block the spread of malware, so hackers typically hunt for the weakest victims. Easy marks include “jail-broken” iPhones, devices with warranty-voiding modifications in which security restrictions are overridden to allow phones to be used off network, and for the installation of unsanctioned applications. Estimates suggest some 10 percent of iPhones are jail-broken, and early viruses exploiting the compromised devices ranged from a “Rick roll” that replaced the home screen image with a photo of 1980s crooner Rick AstleyS. Steade, “It’s Shameless How They Flirt,” Good Morning Silicon Valley, November 9, 2009. to the more nefarious Ikee.B, which scanned text messages and hunted out banking codes, forwarding the nabbed data to a server in Lithuania.R. Lemos, “Nasty iPhone Worm Hints at the Future,” Technology Review, November 29, 2009.

The upside? Those smart devices are sometimes crime fighters themselves. A Pittsburgh mugging victim turned on Apple’s “Find My iPhone” feature within its MobileMe service, mapping the perpetrator’s path, then sending the law to bust the bad guys while they ate at a local restaurant.J. Murrell, “The iWitness News Roundup: Crime-fighting iPhone,” Good Morning Silicon Valley, August 31, 2009.

Figure 13.5

A “jail-broken” iPhone gets “Rick rolled” by malware.

Compromising Web Sites

Some exploits directly target poorly designed and programmed Web sites. Consider the SQL injection technique. It zeros in on a sloppy programming practice where software developers don’t validate user input.

It works like this. Imagine that you visit a Web site and are asked to enter your user ID in a field on a Web page (say your user ID is smith). A Web site may be programmed to take the data you enter from the Web page’s user ID field (smith), then add it to a database command (creating the equivalent of a command that says “find the account for ‘smith’”). The database then executes that command.

But Web sites that don’t verify user entries and instead just blindly pass along entered data are vulnerable to attack. Hackers with just a rudimentary knowledge of SQL could type actual code fragments into the user ID field, appending this code to statements executed by the site (see sidebar for a more detailed description). Such modified instructions could instruct the Web site’s database software to drop (delete) tables, insert additional data, return all records in a database, or even redirect users to another Web site that will scan clients for weaknesses, then launch further attacks. Security expert Ben Schneier noted a particularly ghastly SQL injection vulnerability in the publicly facing database for the Oklahoma Department of Corrections, where “anyone with basic SQL knowledge could have registered anyone he wanted as a sex offender.”B. Schneier, “Oklahoma Data Leak,” Schneier on Security, April 18, 2008.

Not trusting user input is a cardinal rule of programming, and most well-trained programmers know to validate user input. But there’s a lot of sloppy code out there, which hackers are all too eager to exploit. IBM identifies SQL injection as the fastest growing security threat, with over half a million attack attempts recorded each day.A. Wittmann, “The Fastest-Growing Security Threat,” InformationWeek, November 9, 2009. Some vulnerable systems started life as quickly developed proofs of concepts, and programmers never went back to add the needed code to validate input and block these exploits. Other Web sites may have been designed by poorly trained developers who have moved on to other projects, by staff that have since left the firm, or where development was outsourced to another firm. As such, many firms don’t even know if they suffer from this vulnerability.

SQL injection and other application weaknesses are particularly problematic because there’s not a commercial software patch or easily deployed piece of security software that can protect a firm. Instead, firms have to meticulously examine the integrity of their Web sites to see if they are vulnerable.While some tools exist to automate testing, this is by no means as easy a fix as installing a commercial software patch or virus protection software.

How SQL Injection Works

For those who want to get into some of the geekier details of a SQL injection attack, consider a Web site that executes the code below to verify that an entered user ID is in a database table of usernames. The code executed by the Web site might look something like this:

“SELECT * FROM users WHERE userName = ‘” + userID + “‘;”

The statement above tells the database to SELECT (find and return) all columns (that’s what the “*” means) from a table named users where the database’s userName field equals the text you just entered in the userID field. If the Web site’s visitor entered smith, that text is added to the statement above, and it’s executed as:

“SELECT * FROM users WHERE userName = ‘smith’;”

No problem. But now imagine a hacker gets sneaky and instead of just typing smith, into the Web site’s userID field, they also add some additional SQL code like this:

smith’; DROP TABLE users; DELETE * FROM users WHERE ‘t’ = ‘t

If the programming statement above is entered into the user ID, the Web site adds this code to its own programming to create a statement that is executed as:

SELECT * FROM users WHERE userName = ‘smith’; DELETE * FROM users WHERE ‘t’ = ‘t’;

The semicolons separate SQL statements. That second statement says delete all data in the users table for records where ‘t’ = ‘t’ (this last part, ‘t’ = ‘t,’ is always true, so all records will be deleted). Yikes! In this case, someone entering the kind of code you’d learn in the first chapter of SQL for Dummies could annihilate a site’s entire user ID file using one of the site’s own Web pages as the attack vehicle.B. Schneier, “Oklahoma Data Leak,” Schneier on Security, April 18, 2008.

Related programming exploits go by names such as cross-site scripting attacks and HTTP header injection. We’ll spare you the technical details, but what this means for both the manager and the programmer is that all systems must be designed and tested with security in mind. This includes testing new applications, existing and legacy applications, partner offerings, and SaaS (software as a service) applications—everything. Visa and MasterCard are among the firms requiring partners to rigorously apply testing standards. Firms that aren’t testing their applications will find they’re locked out of business; if caught with unacceptable breaches, such firms may be forced to pay big fines and absorb any costs associated with their weak practices.Knowledge@Wharton, “Information Security: Why Cybercriminals Are Smiling,” August 19, 2009.

Push-Button Hacking

Not only are the list of technical vulnerabilities well known, hackers have created tools to make it easy for the criminally inclined to automate attacks. Chapter 14 “Google: Search, Online Advertising, and Beyond” outlines how Web sites can interrogate a system to find out more about the software and hardware used by visitors. Hacking toolkits can do the same thing. While you won’t find this sort of software for sale on Amazon, a casual surfing of the online underworld (not recommended or advocated) will surface scores of tools that probe systems for the latest vulnerabilities, then launch appropriate attacks. In one example, a $700 toolkit (MPack v. 86) was used to infiltrate a host of Italian Web sites, launching Trojans that infested 15,000 users in just a six-day period.Trend Micro, “Web Threats Whitepaper,” March 2008. As an industry executive in BusinessWeek has stated, “The barrier of entry is becoming so low that literally anyone can carry out these attacks.”J. Schectman, “Computer Hacking Made Easy,” BusinessWeek, August 13, 2009.

Network Threats

The network itself may also be a source of compromise. Recall that the TJX hack happened when a Wi-Fi access point was left open and undetected. A hacker just drove up and performed the digital equivalent of crawling through an open window. The problem is made more challenging since wireless access points are so inexpensive and easy to install. For less than $100, a user (well intentioned or not) could plug in to an access point that could provide entry for anyone. If a firm doesn’t regularly monitor its premises, its network, and its network traffic, it may fall victim.

Other troubling exploits have targeted the very underpinning of the Internet itself. This is the case with so-called DNS cache poisoning. The DNS, or domain name service, is a collection of software that maps an Internet address, such as (http://www.bc.edu), to an IP address, such as 136.167.2.220. 220 (see Chapter 12 “A Manager’s Guide to the Internet and Telecommunications” for more detail). DNS cache poisoning exploits can redirect this mapping and the consequences are huge. Imagine thinking that you’re visiting your bank’s Web site, but instead your network’s DNS server has been poisoned so that you really visit a carefully crafted replica that hackers use to steal your log-in credentials and drain your bank account. A DNS cache poisoning attack launched against one of China’s largest ISPs redirected users to sites that launched malware exploits, targeting weaknesses in RealPlayer, Adobe Flash, and Microsoft’s ActiveX technology, commonly used in browsers.J. London, “China Netcom Falls Prey to DNS Cache Poisoning,” Computerworld, August 22, 2008.

Physical Threats

A firm doesn’t just have to watch out for insiders or compromised software and hardware; a host of other physical threats can grease the skids to fraud, theft, and damage. Most large firms have disaster-recovery plans in place. These often include provisions to backup systems and data to off-site locales, to protect operations and provide a fall back in the case of disaster. Such plans increasingly take into account the potential impact of physical security threats such as terrorism, or vandalism, as well.

Anything valuable that reaches the trash in a recoverable state is also a potential security breach. Hackers and spies sometimes practice dumpster divingCombing through trash to identify valuable assets., sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack. This might include hunting for discarded passwords written on Post-it notes, recovering unshredded printed user account listings, scanning e-mails or program printouts for system clues, recovering tape backups, resurrecting files from discarded hard drives, and more.

Other compromises might take place via shoulder surfingGaining compromising information through observation (as in looking over someone’s shoulder)., simply looking over someone’s shoulder to glean a password or see other proprietary information that might be displayed on a worker’s screen.

Firms might also fall victim to various forms of eavesdropping, such as efforts to listen into or record conversations, transmissions, or keystrokes. A device hidden inside a package might sit inside a mailroom or a worker’s physical inbox, scanning for open wireless connections, or recording and forwarding conversations.J. Robertson, “Hackers Mull Physical Attacks on a Networked World,” San Francisco Chronicle, August 8, 2008. Other forms of eavesdropping can be accomplished via compromised wireless or other network connections, malware keylogger or screen capture programs, as well as hardware devices such as replacement keyboards with keyloggers embedded inside, microphones to capture the slightly unique and identifiable sound of each key being pressed, programs that turn on built-in microphone or cameras that are now standard on many PCs, or even James Bond-style devices using Van Eck techniques that attempt to read monitors from afar by detecting their electromagnetic emissions.

The Encryption Prescription

During a routine physical transfer of backup media, Bank of America lost tapes containing the private information—including Social Security and credit card numbers—of hundreds of thousands of customers.J. Mardesich, “Ensuring the Security of Stored Data,” CIO Strategy Center, 2009. This was potentially devastating fodder for identity thieves. But who cares if someone steals your files if they still can’t read the data? That’s the goal of encryption!

EncryptionScrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. scrambles data, making it essentially unreadable to any program that doesn’t have the descrambling password, known as a keyCode that unlocks encryption.. Simply put, the larger the key, the more difficult it is for a brute-force attack to exhaust all available combinations and crack the code. When well implemented, encryption can be the equivalent of a rock solid vault. To date, the largest known brute-force attacksAn attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer a brute-force attack will take., demonstration hacks launched by grids of simultaneous code-cracking computers working in unison, haven’t come close to breaking the type of encryption used to scramble transmissions that most browsers use when communicating with banks and shopping sites. The problem occurs when data is nabbed before encryption or after decrypting, or in rare cases, if the encrypting key itself is compromised.

Extremely sensitive data—trade secrets, passwords, credit card numbers, and employee and customer information—should be encrypted before being sent or stored.J. Mardesich, “Ensuring the Security of Stored Data,” CIO Strategy Center, 2009. Deploying encryption dramatically lowers the potential damage from lost or stolen laptops, or from hardware recovered from dumpster diving. It is vital for any laptops carrying sensitive information.

Encryption is also employed in virtual private network (VPN) technology, which scrambles data passed across a network. Public wireless connections pose significant security threats—they may be set up by hackers that pose as service providers, while really launching attacks on or monitoring the transmissions of unwitting users. The use of VPN software can make any passed-through packets unreadable. Contact your firm or school to find out how to set up VPN software.

In the Bank of America example above, the bank was burned. It couldn’t verify that the lost tapes were encrypted, so it had to notify customers and incur the cost associated with assuming data had been breached.J. Mardesich, “Ensuring the Security of Stored Data,” CIO Strategy Center, 2009.

Encryption is not without its downsides. Key management is a potentially costly procedural challenge for most firms. If your keys aren’t secure, it’s the equivalent of leaving the keys to a safe out in public. Encryption also requires additional processing to scramble and descramble data—drawing more power and slowing computing tasks. Moore’s Law will speed things along, but it also puts more computing power in the hands of attackers. With hacking threats on the rise, expect to see laws and compliance requirements that mandate encrypted data, standardize encryption regimes, and simplify management.

How Do Web Sites Encrypt Transmissions?

Most Web sites that deal with financial transactions (e.g., banks, online stores) secure transmissions using a method called public key encryptionA two key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key. The private key also cannot be reverse engineered from the public key. By distributing public keys, but keeping the private key, Internet services can ensure transmissions to their site are secure.. The system works with two keys—a public key and a private key. The public key can “lock” or encrypt data, but it can’t unlock it: that can only be performed by the private key. So a Web site that wants you to transmit secure information will send you a public key—you use this to lock the data, and no one that intercepts that transmission can break in unless they’ve got the private key. If the Web site does its job, it will keep the private key out of reach of all potentially prying eyes.

Wondering if a Web site’s transmissions are encrypted? Look at the Web address. If it begins with “https” instead of “http”, it should be secure. Also, look for the padlock icon in the corner of your Web browser to be closed (locked). Finally, you can double click the padlock to bring up a verification of the Web site’s identity (verified by a trusted third party firm, known as a certificate authorityA trusted third party that provides authentication services in public key encryption schemes.). If this matches your URL and indicates the firm you’re doing business with, then you can be pretty sure verified encryption is being used by the firm that you intend to do business with.

Figure 13.6

In this screenshot, a Firefox browser is visiting Bank of America. The padlock icon was clicked to bring up digital certificate information. Note how the Web site’s name matches the URL. The verifying certificate authority is the firm VeriSign.

Key Takeaways

  • An organization’s information assets are vulnerable to attack from several points of weakness, including users and administrators, its hardware and software, its networking systems, and various physical threats.
  • Social engineering attempts to trick or con individuals into providing information, while phishing techniques are cons conducted through technology.
  • While dangerous, a number of tools and techniques can be used to identify phishing scams, limiting their likelihood of success.
  • Social media sites may assist hackers in crafting phishing or social engineering threats, provide information to password crackers, and act as conduits for unwanted dissemination of proprietary information.
  • Most users employ inefficient and insecure password systems; however, techniques were offered to improve one’s individual password regime.
  • Viruses, worms, and Trojans are types of infecting malware. Other types of malware might spy on users, enlist the use of computing assets for committing crimes, steal assets, destroy property, serve unwanted ads, and more.
  • Examples of attacks and scams launched through advertising on legitimate Web pages highlight the need for end-user caution, as well as for firms to ensure the integrity of their participating online partners.
  • SQL injection and related techniques show the perils of poor programming. Software developers must design for security from the start—considering potential security weaknesses, and methods that improve end-user security (e.g., in areas such as installation and configuration).
  • Encryption can render a firm’s data assets unreadable, even if copied or stolen. While potentially complex to administer and resource intensive, encryption is a critical tool for securing an organization’s electronic assets.

Questions and Exercises

  1. Consider your own personal password regime and correct any weaknesses. Share any additional password management tips and techniques with your class.
  2. Why is it a bad idea to use variants of existing passwords when registering for new Web sites?
  3. Relate an example of social engineering that you’ve experienced or heard of. How might the victim have avoided being compromised?
  4. Have you ever seen phishing exploits? Have you fallen for one? Why did you take the bait, or what alerted you to the scam? How can you identify phishing scams?
  5. Have you or has anyone you know fallen victim to malware? Relate the experience—how do you suppose it happened? What damage was done? What, if anything, could be done to recover from the situation?
  6. Why are social media sites such a threat to information security? Give various potential scenarios where social media use might create personal or organizational security compromises.
  7. Some users regularly update their passwords by adding a number (say month or year) to their code. Why is this bad practice?
  8. What kind of features should a programmer build into systems in order to design for security? Think about the products that you use. Are there products that you feel did a good job of ensuring security during setup? Are there products you use that have demonstrated bad security design? How?
  9. Why are SQL injection attacks more difficult to address than the latest virus threat?
  10. How should individuals and firms leverage encryption?
  11. Investigate how you might use a VPN if traveling with your laptop. Be prepared to share your findings with your class and your instructor.

13.4 Taking Action

Learning Objectives

After studying this section you should be able to do the following:

  1. Identify critical steps to improve your individual and organizational information security.
  2. Be a tips, tricks, and techniques advocate, helping make your friends, family, colleagues, and organization more secure.
  3. Recognize the major information security issues that organizations face, as well as the resources, methods, and approaches that can help make firms more secure.

Taking Action as a User

The weakest link in security is often a careless user, so don’t make yourself an easy mark. Once you get a sense of threats, you understand the kinds of precautions you need to take. Security considerations then become more common sense than high tech. Here’s a brief list of major issues to consider:

  • Surf smart. Think before you click—question links, enclosures, download request, and the integrity of Web sites that you visit. Avoid suspicious e-mail attachments and Internet downloads. Be on guard for phishing, and other attempts to con you into letting in malware. Verify anything that looks suspicious before acting. Avoid using public machines (libraries, coffee shops) when accessing sites that contain your financial data or other confidential information.
  • Stay vigilant. Social engineering con artists and rogue insiders are out there. An appropriate level of questioning applies not only to computer use, but also to personal interactions, be it in person, on the phone, or electronically.
  • Stay updated. Turn on software update features for your operating system and any application you use (browsers, applications, plug-ins, and applets), and manually check for updates when needed. Malware toolkits specifically scan for older, vulnerable systems, so working with updated programs that address prior concerns lowers your vulnerable attack surface.
  • Stay armed. Install a full suite of security software. Many vendors offer a combination of products that provide antivirus software that blocks infection, personal firewalls that repel unwanted intrusion, malware scanners that seek out bad code that might already be nesting on your PC, antiphishing software that identifies if you’re visiting questionable Web sites, and more. Such tools are increasingly being built into operating systems, browsers, and are deployed at the ISP or service provider (e-mail firm, social network) level. But every consumer should make it a priority to understand the state of the art for personal protection. In the way that you regularly balance your investment portfolio to account for economic shifts, or take your car in for an oil change to keep it in top running condition, make it a priority to periodically scan the major trade press or end-user computing sites for reviews and commentary on the latest tools and techniques for protecting yourself (and your firm).
  • Be settings smart. Don’t turn on risky settings like unrestricted folder sharing that may act as an invitation for hackers to drop off malware payloads. Secure home networks with password protection and a firewall. Encrypt hard drives—especially on laptops or other devices that might be lost or stolen. Register mobile devices for location identification or remote wiping. Don’t click the “Remember me” or “Save password” settings on public machines, or any device that might be shared or accessed by others. Similarly, if your machine might be used by others, turn off browser settings that auto-fill fields with prior entries—otherwise you make it easy for someone to use that machine to track your entries and impersonate you. And when using public hotspots, be sure to turn on your VPN software to encrypt transmission and hide from network eavesdroppers.
  • Be password savvy. Change the default password on any new products that you install. Update your passwords regularly. Using guidelines outlined earlier, choose passwords that are tough to guess, but easy for you (and only you) to remember. Federate your passwords so that you’re not using the same access codes for your most secure sites. Never save passwords in nonsecured files, e-mail, or written down in easily accessed locations.
  • Be disposal smart. Shred personal documents. Wipe hard drives with an industrial strength software tool before recycling, donating, or throwing away—remember in many cases “deleted” files can still be recovered. Destroy media such as CDs and DVDs that may contain sensitive information. Erase USB drives when they are no longer needed.
  • Back up. The most likely threat to your data doesn’t come from hackers; it comes from hardware failure.C. Taylor, “The Tech Catastrophe You’re Ignoring,” Fortune, October 26, 2009. Yet most users still don’t regularly back up their systems. This is another do-it-now priority. Cheap, plug-in hard drives work with most modern operating systems to provide continual backups, allowing for quick rollback to earlier versions if you’ve accidentally ruined some vital work. And services like EMC’s Mozy provide monthly, unlimited backup over the Internet for less than what you probably spent on your last lunch (a fire, theft, or similar event could also result in the loss of any backups stored on-site, but Internet backup services can provide off-site storage and access if disaster strikes).
  • Check with your administrator. All organizations that help you connect to the Internet—your ISP, firm, or school—should have security pages. Many provide free security software tools. Use them as resources. Remember—it’s in their interest to keep you safe, too!

Taking Action as an Organization

Frameworks, Standards, and Compliance

Developing organizational security is a daunting task. You’re in an arms race with adversaries that are tenacious and constantly on the lookout for new exploits. Fortunately, no firm is starting from scratch—others have gone before you and many have worked together to create published best practices.

There are several frameworks, but perhaps the best known of these efforts comes from the International Organization for Standards (ISO), and is broadly referred to as ISO27k or the ISO 27000 series. According to ISO.org, this evolving set of standards provides “a model for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an Information Security Management System.”

Firms may also face compliance requirements—legal or professionally binding steps that must be taken. Failure to do so could result in fine, sanction, and other punitive measures. At the federal level, examples include HIPAA (the Health Insurance Portability and Accountability Act), which regulates health data; the Graham-Leach-Bliley Act, which regulates financial data; and the Children’s Online Privacy Protection Act, which regulates data collection on minors. U.S. government agencies must also comply with FISMA (the Federal Information Security Management Act), and there are several initiatives at the other government levels. By 2009, some level of state data breach laws had been passed by over thirty states, while multinationals face a growing number of statues throughout the world. Your legal team and trade associations can help you understand your domestic and international obligations. Fortunately, there are often frameworks and guidelines to assist in compliance. For example, the ISO standards include subsets targeted at the telecommunications and health care industries, and major credit card firms have created the PCI (payment card industry) standards. And there are skilled consulting professionals who can help bring firms up to speed in these areas, and help expand their organizational radar as new issues develop.

Here is a word of warning on frameworks and standards: compliance does not equal security. Outsourcing portions security efforts without a complete, organizational commitment to being secure can also be dangerous. Some organizations simply approach compliance as a necessary evil: a sort of checklist that can reduce the likelihood of a lawsuit or other punitive measure.M. Davis, “What Will It Take?” InformationWeek, November 23, 2009. While you want to make sure you’re doing everything in your power not to get sued, this isn’t the goal. The goal is taking all appropriate measures to ensure that your firm is secure for your customers, employees, shareholders, and others. Frameworks help shape your thinking and expose things you should do, but security doesn’t stop there—this is a constant, evolving process that needs to pervade the organization from the CEO suite and board, down to front line workers and potentially out to customers and partners. And be aware of the security issues associated with any mergers and acquisitions. Bringing in new firms, employees, technologies, and procedures means reassessing the security environment for all players involved.

The Heartland Breach

On inauguration day 2009, credit card processor Heartland announced that it had experienced what was one of the largest security breaches in history. The Princeton, New Jersey, based firm was, at the time, the nation’s fifth largest payments processor. Its business was responsible for handling the transfer of funds and information between retailers and cardholders’ financial institutions. That means infiltrating Heartland was like breaking into Fort Knox.

It’s been estimated that as many as 100 million cards issued by more than 650 financial services companies may have been compromised during the Heartland breach. Said the firm’s CEO, this was “the worst thing that can happen to a payments company and it happened to us.”R. King, “Lessons from the Data Breach at Heartland,” BusinessWeek, July 6, 2009. Wall Street noticed. The firm’s stock tanked—within a month, its market capitalization had plummeted over 75 percent, dropping over half a billion dollars in value.T. Claburn, “Payment Card Industry Gets Encryption Religion,” InformationWeek, November 13, 2009.

The Heartland case provides a cautionary warning against thinking that security ends with compliance. Heartland had in fact passed multiple audits, including one conducted the month before the infiltration began. Still, at least thirteen pieces of malware were uncovered on the firm’s servers. Compliance does not equal security. Heartland was complaint, but a firm can be compliant and not be secure. Compliance is not the goal, security is.

Since the breach, the firm’s executives have championed industry efforts to expand security practices, including encrypting card information at the point it is swiped and keeping it secure through settlement. Such “cradle-to-grave” encryption can help create an environment where even compromised networking equipment or intercepting relay systems wouldn’t be able to grab codes.T. Claburn, “Payment Card Industry Gets Encryption Religion,” InformationWeek, November 13, 2009; R. King, “Lessons from the Data Breach at Heartland,” BusinessWeek, July 6, 2009. Recognize that security is a continual process, it is never done, and firms need to pursue security with tenacity and commitment.

Education, Audit, and Enforcement

Security is as much about people, process, and policy, as it is about technology.

From a people perspective, the security function requires multiple levels of expertise. Operations employees are involved in the day-to-day monitoring of existing systems. A group’s R&D function is involved in understanding emerging threats and reviewing, selecting, and implementing updated security techniques. A team must also work on broader governance issues. These efforts should include representatives from specialized security and broader technology and infrastructure functions. It should also include representatives from general counsel, audit, public relations, and human resources. What this means is that even if you’re a nontechnical staffer, you may be brought in to help a firm deal with security issues.

Processes and policies will include education and awareness—this is also everyone’s business. As the Vice President of Product Development at security firm Symantec puts it, “We do products really well, but the next step is education. We can’t keep the Internet safe with antivirus software alone.”D. Goldman, “Cybercrime: A Secret Underground Economy,” CNNMoney, September 17, 2009. Companies should approach information security as a part of their “collective corporate responsibility…regardless of whether regulation requires them to do so.”Knowledge@Wharton, “Information Security: Why Cybercriminals Are Smiling,” August 19, 2009.

For a lesson in how important education is, look no further than the head of the CIA. Former U.S. Director of Intelligence John Deutch engaged in shockingly loose behavior with digital secrets, including keeping a daily journal of classified information—some 1,000+ pages—on memory cards he’d transport in his shirt pocket. He also downloaded and stored Pentagon information, including details of covert operations, at home on computers that his family used for routine Internet access.N. Lewis, “Investigation Of Ex-Chief Of the C.I.A. Is Broadened,” New York Times, September 17, 2000.

Employees need to know a firm’s policies, be regularly trained, and understand that they will face strict penalties if they fail to meet their obligations. Policies without eyes (audit) and teeth (enforcement) won’t be taken seriously. Audits include real-time monitoring of usage (e.g., who’s accessing what, from where, how, and why; sound the alarm if an anomaly is detected), announced audits, and surprise spot checks. This function might also stage white hat demonstration attacks—attempts to hunt for and expose weaknesses, hopefully before hackers find them. Frameworks offer guidelines on auditing, but a recent survey found most organizations don’t document enforcement procedures in their information security policies, that more than one-third do not audit or monitor user compliance with security policies, and that only 48 percent annually measure and review the effectiveness of security policies.A. Matwyshyn, Harboring Data: Information Security, Law, and The Corporation (Palo Alto, CA: Stanford University Press, 2009).

A firm’s technology development and deployment processes must also integrate with the security team to ensure that from the start, applications, databases, and other systems are implemented with security in mind. The team will have specialized skills and monitor the latest threats and are able to advise on precautions necessary to be sure systems aren’t compromised during installation, development, testing, and deployment.

What Needs to Be Protected and How Much Is Enough?

A worldwide study by PricewaterhouseCoopers and Chief Security Officer magazine revealed that most firms don’t even know what they need to protect. Only 33 percent of executives responded that their organizations kept accurate inventory of the locations and jurisdictions where data was stored, and only 24 percent kept inventory of all third parties using their customer data.A. Matwyshyn, Harboring Data: Information Security, Law, and The Corporation (Palo Alto, CA: Stanford University Press, 2009). What this means is that most firms don’t even have an accurate read on where their valuables are kept, let alone how to protect them.

So information security should start with an inventory-style auditing and risk assessment. Technologies map back to specific business risks. What do we need to protect? What are we afraid might happen? And how do we protect it? Security is an economic problem, involving attack likelihood, costs, and prevention benefits. These are complex trade-offs that must consider losses from theft or resources, systems damage, data loss, disclosure of proprietary information, recovery, downtime, stock price declines, legal fees, government and compliance penalties, and intangibles such as damaged firm reputation, loss of customer and partner confidence, industry damage, promotion of adversary, and encouragement of future attacks.

While many firms skimp on security, firms also don’t want to misspend, targeting exploits that aren’t likely, while underinvesting in easily prevented methods to thwart common infiltration techniques. Hacker conventions like DefCon can show some really wild exploits. But it’s up to the firm to assess how vulnerable it is to these various risks. The local donut shop has far different needs than a military installation, law enforcement agency, financial institution, or firm housing other high-value electronic assets. A skilled risk assessment team will consider these vulnerabilities and what sort of countermeasure investments should take place.

Economic decisions usually drive hacker behavior, too. While in some cases attacks are based on vendetta or personal reasons, in most cases exploit economics largely boils down to

Adversary ROI = Asset value to adversary – Adversary cost.

An adversary’s costs include not only the resources, knowledge, and technology required for the exploit, but also the risk of getting caught. Make things tough to get at, and lobbying for legislation that imposes severe penalties on crooks can help raise adversary costs and lower your likelihood of becoming a victim.

Technology’s Role

Technical solutions often involve industrial strength variants of the previously discussed issues individuals can employ, so your awareness is already high. Additionally, an organization’s approach will often leverage multiple layers of protection and incorporate a wide variety of protective measures.

Patch. Firms must be especially vigilant to pay attention to security bulletins and install software updates that plug existing holes, (often referred to as patches). Firms that don’t plug known problems will be vulnerable to trivial and automated attacks. Unfortunately, many firms aren’t updating all components of their systems with consistent attention. With operating systems automating security update installations, hackers have moved on to application targets. But a major study recently found that organizations took at least twice as long to patch application vulnerabilities as they take to patch operating system holes.S. Wildstrom, “Massive Study of Net Vulnerabilities: They’re Not Where You Think They Are,” BusinessWeek, September 14, 2009. And remember, software isn’t limited to conventional PCs and servers. Embedded systems abound, and connected, yet unpatched devices are vulnerable. Malware has infected everything from unprotected ATM machinesP. Lilly, “Hackers Targeting Windows XP-Based ATM Machines,” Maximum PC, June 4, 2009. to restaurant point-of-sale systemsR. McMillan, “Restaurants Sue Vendors after Point-of-Sale Hack,” CIO, December 1, 2009. to fighter plane navigation systems.C. Matyszczyk, “French Planes Grounded by Windows Worm,” CNET, February 8, 2009.

As an example of unpatched vulnerabilities, consider the DNS cache poisoning exploit described earlier in this chapter. The discovery of this weakness was one of the biggest security stories the year it was discovered, and security experts saw this as a major threat. Teams of programmers worldwide raced to provide fixes for the most widely used versions of DNS software. Yet several months after patches were available, roughly one quarter of all DNS servers were still unpatched and exposed.IBM, X-Force Threat Report: 2008 Year in Review, January 2009.

To be fair, not all firms delay patches out of negligence. Some organizations have legitimate concerns about testing whether the patch will break their system or whether the new technology contains a change that will cause problems down the road.For example, the DNS security patch mentioned was incompatible with the firewall software deployed at some firms. And there have been cases where patches themselves have caused problems. Finally, many software updates require that systems be taken down. Firms may have uptime requirements that make immediate patching difficult. But ultimately, unpatched systems are an open door for infiltration.

Lock down hardware. Firms range widely in the security regimes used to govern purchase through disposal system use. While some large firms such as Kraft are allowing employees to select their own hardware (Mac or PC, desktop or notebook, iPhone or BlackBerry),N. Wingfield, “It’s a Free Country…So Why Can’t I Pick the Technology I Use in the Office?” Wall Street Journal, November 15, 2009. others issue standard systems that prevent all unapproved software installation and force file saving to hardened, backed-up, scanned, and monitored servers. Firms in especially sensitive industries such as financial services may regularly reimage the hard drive of end-user PCs, completely replacing all the bits on a user’s hard drive with a pristine, current version—effectively wiping out malware that might have previously sneaked onto a user’s PC. Other lock-down methods might disable the boot capability of removable media (a common method for spreading viruses via inserted discs or USBs), prevent Wi-Fi use or require VPN encryption before allowing any network transmissions, and more. The cloud helps here, too. (See Chapter 10 “Software in Flux: Partly Cloudy and Sometimes Free”.) Employers can also require workers to run all of their corporate applications inside a remote desktop where the actual executing hardware and software is elsewhere (likely hosted as a virtual machine session on the organization’s servers), and the user is simply served an image of what is executing remotely. This seals the virtual PC off in a way that can be thoroughly monitored, updated, backed up, and locked down by the firm.

In the case of Kraft, executives worried that the firm’s previously restrictive technology policies prevented employees from staying in step with trends. Employees opting into the system must sign an agreement promising they’ll follow mandated security procedures. Still, financial services firms, law offices, health care providers, and others may need to maintain stricter control, for legal and industry compliance reasons.

Lock down the network. Network monitoring is a critical part of security, and a host of technical tools can help.

Firms employ firewallsA system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use. to examine traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication. Intrusion detection systemsA system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel. specifically look for unauthorized behavior, sounding the alarm and potentially taking action if something seems amiss. Some firms deploy honeypotsA seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.—bogus offerings meant to distract attackers. If attackers take honeypot bait, firms may gain an opportunity to recognize the hacker’s exploits, identify the IP address of intrusion, and take action to block further attacks and alert authorities.

Many firms also deploy blacklistsPrograms that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.—denying the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions. While blacklists block known bad guys, whitelistsHighly restrictive programs that permit communication only with approved entities and/or in an approved manner. are even more restrictive—permitting communication only with approved entities or in an approved manner.

These technologies can be applied to network technology, specific applications, screening for certain kinds of apps, malware signatures, and hunting for anomalous patterns. The latter is important, as recent malware has become polymorphic, meaning different versions are created and deployed in a way that their signature, a sort of electronic fingerprint often used to recognize malicious code, is slightly altered. This also helps with zero-day exploits, and in situations where whitelisted Web sites themselves become compromised.

Many technical solutions, ranging from network monitoring and response to e-mail screening, are migrating to “the cloud.” This can be a good thing—if network monitoring software immediately shares news of a certain type of attack, defenses might be pushed out to all clients of a firm (the more users, the “smarter” the system can potentially become—again we see the power of network effects in action).

Lock down partners. Insist partner firms are compliant, and audit them to ensure this is the case. This includes technology providers and contract firms, as well as value chain participants such as suppliers and distributors. Anyone who touches your network is a potential point of weakness. Many firms will build security expectations and commitments into performance guarantees known as service level agreements (SLAs).

Lock down systems. Audit for SQL injection and other application exploits. The security team must constantly scan exploits and then probe its systems to see if it’s susceptible, advising and enforcing action if problems are uncovered. This kind of auditing should occur with all of a firm’s partners.

Access controls can also compartmentalize data access on a need-to-know basis. Such tools can not only enforce access privileges, they can help create and monitor audit trails to help verify that systems are not being accessed by the unauthorized, or in suspicious ways.

Audit trails are used for deterring, identifying, and investigating these cases. Recording, monitoring, and auditing access allows firms to hunt for patterns of abuse. Logs can detail who, when, and from where assets are accessed. Giveaways of nefarious activity may include access from unfamiliar IP addresses, from nonstandard times, accesses that occur at higher than usual volumes, and so on. Automated alerts can put an account on hold or call in a response team for further observation of the anomaly.

Single-sign-on tools can help firms offer employees one very strong password that works across applications, is changed frequently (or managed via hardware cards or mobile phone log-in), and can be altered by password management staff.

Multiple administrators should jointly control key systems. Major configuration changes might require approval of multiple staffers, as well as the automatic notification of concerned personnel. And firms should employ a recovery mechanism to regain control in the event that key administrators are incapacitated or uncooperative. This balances security needs with an ability to respond in the event of a crisis. Such a system was not in place in the earlier described case of the rogue IT staffer who held the city of San Francisco’s networks hostage by refusing to give up vital passwords.

Have failure and recovery plans. While firms work to prevent infiltration attempts, they should also have provisions in place that plan for the worst. If a compromise has taken place, what needs to be done? Do stolen assets need to be devalued (e.g., accounts terminated, new accounts issued)? What should be done to notify customers and partners, educate them, and advise them through any necessary responses? Who should work with law enforcement and with the media? Do off-site backups or redundant systems need to be activated? Can systems be reliably restored without risking further damage?

Best practices are beginning to emerge. While postevent triage is beyond the scope of our introduction, the good news is that firms are now sharing data on breaches. Given the potential negative consequences of a breach, organizations once rarely admitted they’d been compromised. But now many are obligated to do so. And the broad awareness of infiltration both reduces organizational stigma in coming forward, and allows firms and technology providers to share knowledge on the techniques used by cybercrooks.

Information security is a complex, continually changing, and vitally important domain. The exploits covered in this chapter seem daunting, and new exploits constantly emerge. But your thinking on key issues should now be broader. Hopefully you’ve now embedded security thinking in your managerial DNA, and you are better prepared to be a savvy system user and a proactive participant working for your firm’s security. Stay safe!

Key Takeaways

  • End users can engage in several steps to improve the information security of themselves and their organizations. These include surfing smart, staying vigilant, updating software and products, using a comprehensive security suite, managing settings and passwords responsibly, backing up, properly disposing of sensitive assets, and seeking education.
  • Frameworks such as ISO27k can provide a road map to help organizations plan and implement an effective security regime.
  • Many organizations are bound by security compliance commitments and will face fines and retribution if they fail to meet these commitments.
  • The use of frameworks and being compliant is not equal to security. Security is a continued process that must be constantly addressed and deeply ingrained in an organization’s culture.
  • Security is about trade-offs—economic and intangible. Firms need to understand their assets and risks in order to best allocate resources and address needs.
  • Information security is not simply a technical fix. Education, audit, and enforcement regarding firm policies are critical. The security team is broadly skilled and constantly working to identify and incorporate new technologies and methods into their organizations. Involvement and commitment is essential from the boardroom to frontline workers, and out to customers and partners.

Questions and Exercises

  1. Visit the security page for your ISP, school, or employer. What techniques do they advocate that we’ve discussed here? Are there any additional techniques mentioned and discussed? What additional provisions do they offer (tools, services) to help keep you informed and secure?
  2. What sorts of security regimes are in use at your university, and at firms you’ve worked or interned for? If you don’t have experience with this, ask a friend or relative for their professional experiences. Do you consider these measures to be too restrictive, too lax, or about right?
  3. While we’ve discussed the risks in having security that is too lax, what risk does a firm run if its security mechanisms are especially strict? What might a firm give up? What are the consequences of strict end-user security provisions?
  4. What risks does a firm face by leaving software unpatched? What risks does it face if it deploys patches as soon as they emerge? How should a firm reconcile these risks?
  5. What methods do firms use to ensure the integrity of their software, their hardware, their networks, and their partners?
  6. An organization’s password management system represents “the keys to the city.” Describe personnel issues that a firm should be concerned with regarding password administration. How might it address these concerns?

Chapter 12: A Manager’s Guide to the Internet and Telecommunications

12.1 Introduction

There’s all sorts of hidden magic happening whenever you connect to the Internet. But what really makes it possible for you to reach servers halfway around the world in just a fraction of a second? Knowing this is not only flat-out fascinating stuff; it’s also critically important for today’s manager to have at least a working knowledge of how the Internet functions.

That’s because the Internet is a platform of possibilities and a business enabler. Understanding how the Internet and networking works can help you brainstorm new products and services and understand roadblocks that might limit turning your ideas into reality. Marketing professionals who know how the Internet reaches consumers have a better understanding of how technologies can be used to find and target customers. Finance firms that rely on trading speed to move billions in the blink of an eye need to master Internet infrastructure to avoid being swept aside by more nimble market movers. And knowing how the Internet works helps all managers understand where their firms are vulnerable. In most industries today, if your network goes down then you might as well shut your doors and go home; it’s nearly impossible to get anything done if you can’t get online. Managers who know the Net are prepared to take the appropriate steps to secure their firms and keep their organization constantly connected.

12.2 Internet 101: Understanding How the Internet Works

Learning Objectives

After studying this section you should be able to do the following:

  1. Describe how the technologies of the Internet combine to answer these questions: What are you looking for? Where is it? And how do we get there?
  2. Interpret a URL, understand what hosts and domains are, describe how domain registration works, describe cybersquatting, and give examples of conditions that constitute a valid and invalid domain-related trademark dispute.
  3. Describe certain aspects of the Internet infrastructure that are fault-tolerant and support load balancing.
  4. Discuss the role of hosts, domains, IP addresses, and the DNS in making the Internet work.

The Internet is a network of networks—millions of them, actually. If the network at your university, your employer, or in your home has Internet access, it connects to an Internet service provider (ISP)An organization or firm that provides access to the Internet.. Many (but not all) ISPs are big telecommunications companies like Verizon, Comcast, and AT&T. These providers connect to one another, exchanging traffic, and ensuring your messages can get to any other computer that’s online and willing to communicate with you.

The Internet has no center and no one owns it. That’s a good thing. The Internet was designed to be redundant and fault-tolerant—meaning that if one network, connecting wire, or server stops working, everything else should keep on running. Rising from military research and work at educational institutions dating as far back as the 1960s, the Internet really took off in the 1990s, when graphical Web browsing was invented, and much of the Internet’s operating infrastructure was transitioned to be supported by private firms rather than government grants.

Figure 12.1

The Internet is a network of networks, and these networks are connected together. In the diagram above, the “state.edu” campus network is connected to other networks of the Internet via two ISPs: Cogent and Verizon.

Enough history—let’s see how it all works! If you want to communicate with another computer on the Internet then your computer needs to know the answer to three questions: What are you looking for? Where is it? And how do we get there? The computers and software that make up Internet infrastructure can help provide the answers. Let’s look at how it all comes together.

The URL: “What Are You Looking For?”

When you type an address into a Web browser (sometimes called a URLOften used interchangeably with “Web address,” URLs identify resources on the Internet along with the application protocol need to retrieve it. for uniform resource locator), you’re telling your browser what you’re looking for. Figure 12.2 “Anatomy of a Web Address” describes how to read a typical URL.

Figure 12.2 Anatomy of a Web Address

The URL displayed really says, “Use the Web (http://) to find a host server named ‘www’ in the ‘nytimes.com’ network, look in the ‘tech’ directory, and access the ‘index.html’ file.”

The http:// you see at the start of most Web addresses stands for hypertext transfer protocolApplication transfer protocol that allows Web browsers and Web servers to communicate with each other.. A protocolEnables communication by defining the format of data and rules for exchange. is a set of rules for communication—sort of like grammar and vocabulary in a language like English. The http protocol defines how Web browser and Web servers communicate and is designed to be independent from the computer’s hardware and operating system. It doesn’t matter if messages come from a PC, a Mac, a huge mainframe, or a pocket-sized smartphone; if a device speaks to another using a common protocol, then it will be heard and understood.

The Internet supports lots of different applications, and many of these applications use their own application transfer protocol to communicate with each other. The server that holds your e-mail uses something called SMTP, or simple mail transfer protocol, to exchange mail with other e-mail servers throughout the world. FTPApplication transfer protocol that is used to copy files from one computer to another., or file transfer protocol, is used for—you guessed it—file transfer. FTP is how most Web developers upload the Web pages, graphics, and other files for their Web sites. Even the Web uses different protocols. When you surf to an online bank or when you’re ready to enter your payment information at the Web site of an Internet retailer, the http at the beginning of your URL will probably change to https (the “s” is for secure). That means that communications between your browser and server will be encrypted for safe transmission. The beauty of the Internet infrastructure is that any savvy entrepreneur can create a new application that rides on top of the Internet.

Hosts and Domain Names

The next part of the URL in our diagram holds the host and domain name. Think of the domain name as the name of the network you’re trying to connect to, and think of the host as the computer you’re looking for on that network.

Many domains have lots of different hosts. For example, Yahoo!’s main Web site is served from the host named “www” (at the address http://www.yahoo.com), but Yahoo! also runs other hosts including those named “finance” (finance.yahoo.com), “sports” (sports.yahoo.com), and “games” (games.yahoo.com).

Host and Domain Names: A Bit More Complex Than That

While it’s useful to think of a host as a single computer, popular Web sites often have several computers that work together to share the load for incoming requests. Assigning several computers to a host name offers load balancingDistributing a computing or networking workload across multiple systems to avoid congestion and slow performance. and fault toleranceThe ability of a system to continue operation even if a component fails., helping ensure that all visits to a popular site like http://www.google.com won’t overload a single computer, or that Google doesn’t go down if one computer fails.

It’s also possible for a single computer to have several host names. This might be the case if a firm were hosting several Web sites on a single piece of computing hardware.

Some domains are also further broken down into subdomains—many times to represent smaller networks or subgroups within a larger organization. For example, the address http://www.rhsmith.umd.edu is a University of Maryland address with a host “www” located in the subdomain “rhsmith” for the Robert H. Smith School of Business. International URLs might also include a second-level domain classification scheme. British URLs use this scheme, for example, with the BBC carrying the commercial (.co) designation—http://www.bbc.co.uk—and the University of Oxford carrying the academic (.ac) designation—http://www.ox.ac.uk. You can actually go 127 levels deep in assigning subdomains, but that wouldn’t make it easy on those who have to type in a URL that long.

Most Web sites are configured to load a default host, so you can often eliminate the host name if you want to go to the most popular host on a site (the default host is almost always named “www”). Another tip: most browsers will automatically add the “http://” for you, too.

Host and domain names are not case sensitive, so you can use a combination of upper and lower case letters and you’ll still get to your destination.

I Want My Own Domain

You can stake your domain name claim in cyberspace by going through a firm called a domain name registrar. You don’t really buy a domain name; you simply pay a registrar for the right to use that name, with the right renewable over time. While some registrars simply register domain names, others act as Web hosting servicesA firm that provides hardware and services to run the Web sites of others. that are able to run your Web site on their Internet-connected servers for a fee.

Registrars throughout the world are accredited by ICANN (Internet Corporation for Assigning Names and Numbers)Nonprofit organization responsible for managing the Internet’s domain and numbering systems., a nonprofit governance and standards-setting body. Each registrar may be granted the ability to register domain names in one or more of the Net’s generic top-level domains (gTLDs), such as “.com,” “.net,” or “.org.” There are dozens of registrars that can register “.com” domain names, the most popular gTLD.

Some generic top-level domain names, like “.com,” have no restrictions on use, while others limit registration. For example, “.edu” is restricted to U.S.-accredited, postsecondary institutions. ICANN has also announced plans to allow organizations to sponsor their own top-level domains (e.g., “.berlin,” or “.coke”).

There are also separate agencies that handle over 250 different two-character country code top-level domains, or ccTLDs (e.g., “.uk” for the United Kingdom and “.jp” for Japan). Servers or organizations generally don’t need to be housed within a country to use a country code as part of their domain names, leading to a number of creatively named Web sites. The URL-shortening site “bit.ly” uses Libya’s “.ly” top-level domain; many physicians are partial to Moldova’s code (“.md”); and the tiny Pacific island nation of Tuvulu might not have a single broadcast television station, but that doesn’t stop it from licensing its country code to firms that want a “.tv” domain name.K. Maney, “Tuvalu’s Sinking, But Its Domain Is on Solid Ground,” USA Today, April 27, 2004. Recent standards also allow domain names in languages that use non-Latin alphabets such as Arabic and Russian.

Domain name registration is handled on a first-come, first-served basis and all registrars share registration data to ensure that no two firms gain rights to the same name. Start-ups often sport wacky names, partly because so many domains with common words and phrases are already registered to others. While some domain names are held by legitimate businesses, others are registered by investors hoping to resell a name’s rights.

Trade in domain names can be lucrative. For example, the “Insure.com” domain was sold to QuinStreet for $16 million in fall 2009.B. Bosker, “The 11 Most Expensive Domain Names Ever,” The Huffington Post, March 10, 2010. But knowingly registering a domain name to profit from someone else’s firm name or trademark is known as cybersquattingAcquiring a domain name that refers to a firm, individual, product, or trademark, with the goal of exploiting it for financial gain. The practice is illegal in many nations, and ICANN has a dispute resolution mechanism that in some circumstances can strip cybersquatters of registered domains. and that’s illegal. The United States has passed the Anticybersquatting Consumer Protection Act (ACPA), and ICANN has the Domain Name Dispute Resolution Policy that can reach across boarders. Try to extort money by holding a domain name that’s identical to (or in some cases, even similar to) a well-known trademark holder and you could be stripped of your domain name and even fined.

Courts and dispute resolution authorities will sometimes allow a domain that uses the trademark of another organization if it is perceived to have legitimate, nonexploitive reasons for doing so. For example, the now defunct site Verizonreallysucks.com was registered as a protest against the networking giant and was considered fair use since owners didn’t try to extort money from the telecom giant.D. Streitfeld, “Web Site Feuding Enters Constitutional Domain,” The Washington Post, September 11, 2000. However, the courts allowed the owner of the PETA trademark (the organization People for the Ethical Treatment of Animals) to claim the domain name peta.org from original registrant, who had been using that domain to host a site called “People Eating Tasty Animals.”D. McCullagh, “Ethical Treatment of PETA Domain,” Wired, August 25, 2001.

Trying to predict how authorities will rule can be difficult. The musician Sting’s name was thought to be too generic to deserve the rights to Sting.com, but Madonna was able to take back her domain name (for the record, Sting now owns Sting.com).R. Konrad and E. Hansen, “Madonna.com Embroiled in Domain Ownership Spat,” CNET, August 21, 2000. Apple executive Jonathan Ive was denied the right to reclaim domain names incorporating his own name, but that had been registered by another party and without his consent. The publicity-shy design guru wasn’t considered enough of a public figure to warrant protection.D. Morson, “Apple VP Ive Loses Domain Name Bid,” MacWorld, May 12, 2009. And sometimes disputing parties can come to an agreement outside of court or ICANN’s dispute resolution mechanisms. When Canadian teenager Michael Rowe registered a site for his part-time Web design business, a firm south of the border took notice of his domain name—Mikerowesoft.com. The two parties eventually settled in a deal that swapped the domain for an Xbox and a trip to the Microsoft Research Tech Fest.M. Kotadia, “MikeRoweSoft Settles for an Xbox,” CNET, January 26, 2004.

Path Name and File Name

Look to the right of the top-level domain and you might see a slash followed by either a path name, a file name, or both. If a Web address has a path and file name, the path maps to a folder location where the file is stored on the server; the file is the name of the file you’re looking for.

Most Web pages end in “.html,” indicating they are in hypertext markup languageLanguage used to compose Web pages.. While http helps browsers and servers communicate, html is the language used to create and format (render) Web pages. A file, however, doesn’t need to be .html; Web servers can deliver just about any type of file: Acrobat documents (.pdf), PowerPoint documents (.ppt or .pptx), Word docs (.doc or .docx), JPEG graphic images (.jpg), and—as we’ll see in Chapter 13 “Information Security: Barbarians at the Gateway (and Just About Everywhere Else)”—even malware programs that attack your PC. At some Web addresses, the file displays content for every visitor, and at others (like amazon.com), a file will contain programs that run on the Web server to generate custom content just for you.

You don’t always type a path or file name as part of a Web address, but there’s always a file lurking behind the scenes. A Web address without a file name will load content from a default page. For example, when you visit “google.com,” Google automatically pulls up a page called “index.html,” a file that contains the Web page that displays the Google logo, the text entry field, the “Google Search” button, and so on. You might not see it, but it’s there.

Butterfingers, beware! Path and file names are case sensitive—amazon.com/books is considered to be different from amazon.com/BOOKS. Mistype your capital letters after the domain name and you might get a 404 error (the very unfriendly Web server error code that means the document was not found).

IP Addresses and the Domain Name System: “Where Is It? And How Do We Get There?”

The IP Address

If you want to communicate, then you need to have a way for people to find and reach you. Houses and businesses have street addresses, and telephones have phone numbers. Every device connected to the Internet has an identifying address, too—it’s called an IP (Internet protocol) address.

A device gets its IP addressA value used to identify a device that is connected to the Internet. IP addresses are usually expressed as four numbers (from 0 to 255), separated by periods. from whichever organization is currently connecting it to the Internet. Connect using a laptop at your university and your school will assign the laptop’s IP address. Connect at a hotel, and the hotel’s Internet service provider lends your laptop an IP address. Laptops and other end-user machines might get a different IP address each time they connect, but the IP addresses of servers rarely change. It’s OK if you use different IP addresses during different online sessions because services like e-mail and Facebook identify you by your username and password. The IP address simply tells the computers that you’re communicating with where they can find you right now. IP addresses can also be used to identify a user’s physical location, to tailor search results, and to customize advertising. See Chapter 14 “Google: Search, Online Advertising, and Beyond” to learn more.

IP addresses are usually displayed as a string of four numbers between 0 and 255, separated by three periods. Want to know which IP address your smartphone or computer is using? Visit a Web site like ip-adress.com (one “d”), whatismyipaddress.com, or ipchicken.com.

The Internet Is Almost Full

If you do the math, four combinations of 0 to 255 gives you a little over four billion possible IP addresses. Four billion sounds like a lot, but the number of devices connecting to the Internet is exploding! Internet access is now baked into smartphones, tablets, televisions, DVD players, video game consoles, utility meters, thermostats, appliances, picture frames, and more. Another problem is a big chunk of existing addresses weren’t allocated efficiently, and these can’t be easily reclaimed from the corporations, universities, and other organizations that initially received them. All of this means that we’re running out of IP addresses. Experts differ on when ICANN will have no more numbers to dole out, but most believe that time will come by 2012, if not sooner.M. Ward, “Internet Approaches Addressing Limit,” BBC News, May 11, 2010.

There are some schemes to help delay the impact of this IP address drought. For example, a technique known as NAT (network address translation)A technique often used to conserve IP addresses by maps devices on a private network to single Internet-connected device that acts on their behalf. uses a gateway that allows multiple devices to share a single IP address. But NAT slows down Internet access and is complex, cumbersome, and expensive to administer.S. Shankland, “Google Tries to Break IPv6 Logjam by Own Example,” CNET, March 27, 2009.

The only long-term solution is to shift to a new IP scheme. Fortunately, one was developed more than a decade ago. IPv6 increases the possible address space from the 232 (4,294,967,296) addresses used in the current system (called IPv4) to a new theoretical limit of 2128 addresses, which is a really big number—bigger than 34 with 37 zeros after it.

But not all the news is good. Unfortunately, IPv6 isn’t backward compatible with IPv4, and the transition to the new standard has been painfully slow. This gives us the equivalent of many islands of IPv6 in a sea of IPv4, with translation between the two schemes happening when these networks come together. While most modern hardware and operating systems providers now support IPv6, converting a network to IPv6 currently involves a lot of cost with little short-term benefit.S. Shankland, “Google Tries to Break IPv6 Logjam by Own Example,” CNET, March 27, 2009. Upgrading may take years and is likely to result in rollout problems. David Conrad, a general manager at Internet Assigned Numbers Authority (IANA), the agency that grants permission to use IP addresses, has said, “I suspect we are actually beyond a reasonable time frame where there won’t be some disruption. It’s just a question of how much.”B. Arnoldy, “IP Address Shortage to Limit Internet Access,” USA Today, August 3, 2007.

Some organizations have stepped up to try to hasten transition. Google has made most of its services IPv6 accessible, the U.S. government has mandated IPv6 support for most agencies, China has spurred conversion within its borders, and Comcast and Verizon have major IPv6 rollouts under way. While the transition will be slow, when wide scale deployment does arrive, IPv6 will offer other benefits, including potentially improving the speed, reliability, and security of the Internet.

The DNS: The Internet’s Phonebook

You can actually type an IP address of a Web site into a Web browser and that page will show up. But that doesn’t help users much because four sets of numbers are really hard to remember.

This is where the domain name service (DNS)Internet directory service that allows devices and services to be named and discoverable. The DNS, for example, helps your browser locate the appropriate computers when entering an address like http://finance.google.com. comes in. The domain name service is a distributed database that looks up the host and domain names that you enter and returns the actual IP address for the computer that you want to communicate with. It’s like a big, hierarchical set of phone books capable of finding Web servers, e-mail servers, and more. These “phone books” are called nameservers—and when they work together to create the DNS, they can get you anywhere you need to go online.

Figure 12.3

When your computer needs to find the IP address for a host or domain name, it sends a message to a DNS resolver, which looks up the IP address starting at the root nameserver. Once the lookup has taken place, that IP address can be saved in a holding space called a cache, to speed future lookups.

To get a sense of how the DNS works, let’s imagine that you type www.yahoo.com into a Web browser. Your computer doesn’t know where to find that address, but when your computer connected to the network, it learned where to find a service on the network called a DNS resolver. The DNS resolver can look up host/domain name combinations to find the matching IP address using the “phone book” that is the DNS. The resolver doesn’t know everything, but it does know where to start a lookup that will eventually give you the address you’re looking for. If this is the first time anyone on that network has tried to find “www.yahoo.com,” the resolver will contact one of thirteen identical root nameservers. The root acts as a lookup starting place. It doesn’t have one big list, but it can point you to a nameserver for the next level, which would be one of the “.com” nameservers in our example. The “.com” nameserver can then find one of the yahoo.com nameservers. The yahoo.com nameserver can respond to the resolver with the IP address for www.yahoo.com, and the resolver passes that information back to your computer. Once your computer knows Yahoo!’s IP address, it’s then ready to communicate directly with www.yahoo.com. The yahoo.com nameserver includes IP addresses for all Yahoo!’s public sites: www.yahoo.com, games.yahoo.com, sports.yahoo.com, finance.yahoo.com, and so on.

The system also remembers what it’s done so the next time you need the IP address of a host you’ve already looked up, your computer can pull this out of a storage space called a cacheA temporary storage space used to speed computing tasks., avoiding all those nameserver visits. Caches are periodically cleared and refreshed to ensure that data referenced via the DNS stays accurate.

Distributing IP address lookups this way makes sense. It avoids having one huge, hard-to-maintain, and ever-changing list. Firms add and remove hosts on their own networks just by updating entries in their nameserver. And it allows host IP addresses to change easily, too. Moving your Web server off-site to a hosting provider? Just update your nameserver with the new IP address at the hosting provider, and the world will invisibly find that new IP address on the new network by using the same old, familiar host/domain name combination. The DNS is also fault-tolerant—meaning that if one nameserver goes down, the rest of the service can function. There are exact copies at each level, and the system is smart enough to move on to another nameserver if its first choice isn’t responding.

But What If the DNS Gets Hacked?

A hacked DNS would be a disaster! Think about it. If bad guys could change which Web sites load when you type in a host and domain name, they could redirect you to impostor Web sites that look like a bank or e-commerce retailer but are really set up to harvest passwords and credit card data.

This exact scenario played out when the DNS of NET Virtua, a Brazilian Internet service provider, was hacked via a technique called DNS cache poisoning. Cache poisoning exploits a hole in DNS software, redirecting users to sites they didn’t request. The Brazilian DNS hack redirected NET Virtua users wishing to visit the Brazilian bank Bradesco to fraudulent Web sites that attempted to steal passwords and install malware. The hack impacted about 1 percent of the bank’s customers before the attack was discovered.D. Godin, “Cache-Poisoning Attack Snares Top Brazilian Bank,” The Register, April 22, 2009.

The exploit showed the importance of paying attention to security updates. A few months earlier, a group that Wired magazine referred to as “A Secret Geek A-Team”J. Davis, “Secret Geek A-Team Hacks Back, Defends Worldwide Web,” Wired, Nov. 24, 2008. had developed a software update that would have prevented the DNS poisoning exploit used against NET Virtua, but administrators at the Brazilian Internet service provider failed to update their software so the hackers got in. An additional upgrade to a DNS system, known as DNSSEC (domain name service security extensions), promises to further limit the likelihood of cache poisoning, but it may take years for the new standards to be rolled out everywhere.J. Hutchinson, “ICANN, Verisign Place Last Puzzle Pieces in DNSSEC Saga,” NetworkWorld, May 2, 2010.

Key Takeaways

  • The Internet is a network of networks. Internet service providers connect with one another to share traffic, enabling any Internet-connected device to communicate with any other.
  • URLs may list the application protocol, host name, domain name, path name, and file name, in that order. Path and file names are case sensitive.
  • A domain name represents an organization. Hosts are public services offered by that organization. Hosts are often thought of as a single computer, although many computers can operate under a single host name and many hosts can also be run off a single computer.
  • You don’t buy a domain name but can register it, paying for a renewable right to use that domain name. Domains need to be registered within a generic top-level domain such as “.com” or “.org” or within a two-character country code top-level domain such as “.uk,” “.ly,” or “.md.”
  • Registering a domain that uses someone else’s trademark in an attempt to extract financial gain is considered cybersquatting. The United States and other nations have anticybersquatting laws, and ICANN has a dispute resolution system that can overturn domain name claims if a registrant is considered to be cybersquatting.
  • Every device connected to the Internet has an IP address. These addresses are assigned by the organization that connects the user to the Internet. An IP address may be assigned temporarily, for use only during that online session.
  • We’re running out of IP addresses. The current scheme (IPv4) is being replaced by IPv6, a scheme that will give us many more addresses and additional feature benefits but is not backward compatible with the IPv4 standard. Transitioning to IPv6 will be costly and take time.
  • The domain name system is a distributed, fault-tolerant system that uses nameservers to map host/domain name combinations to IP addresses.

Questions and Exercises

  1. Find the Web page for your school’s information systems department. What is the URL that gets you to this page? Label the host name, domain name, path, and file for this URL. Are there additional subdomains? If so, indicate them, as well.
  2. Go to a registrar and see if someone has registered your first or last name as a domain name. If so, what’s hosted at that domain? If not, would you consider registering your name as a domain name? Why or why not?
  3. Investigate cases of domain name disputes. Examine a case that you find especially interesting. Who were the parties involved? How was the issue resolved? Do you agree with the decision?
  4. Describe how the DNS is fault-tolerant and promotes load balancing. Give examples of other types of information systems that might need to be fault-tolerant and offer load balancing. Why?
  5. Research DNS poisoning online. List a case, other than the one mentioned in this chapter, where DNS poisoning took place. Which network was poisoned, who were the victims, and how did hackers exploit the poisoned system? Could this exploit have been stopped? How? Whose responsibility is it to stop these kinds of attacks?
  6. Why is the switch from IPv4 to IPv6 so difficult? What key principles, discussed in prior chapters, are slowing migration to the new standard?

12.3 Getting Where You’re Going

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the layers that make up the Internet—application protocol, transmission control protocol, and Internet protocol—and describe why each is important.
  2. Discuss the benefits of Internet architecture in general and TCP/IP in particular.
  3. Name applications that should use TCP and others that might use UDP.
  4. Understand what a router does and the role these devices play in networking.
  5. Conduct a traceroute and discuss the output, demonstrating how Internet interconnections work in getting messages from point to point.
  6. Understand why mastery of Internet infrastructure is critical to modern finance and be able to discuss the risks in automated trading systems.
  7. Describe VoIP, and contrast circuit versus packet switching, along with organizational benefits and limitations of each.

TCP/IP: The Internet’s Secret Sauce

OK, we know how to read a Web address, we know that every device connected to the Net needs an IP address, and we know that the DNS can look at a Web address and find the IP address of the machine that you want to communicate with. But how does a Web page, an e-mail, or an iTunes download actually get from a remote computer to your desktop?

For our next part of the Internet journey, we’ll learn about two additional protocols: TCP and IP. These protocols are often written as TCP/IP and pronounced by reading all five letters in a row, “T-C-P-I-P” (sometimes they’re also referred to as the Internet protocol suite). TCP and IP are built into any device that a user would use to connect to the Internet—from handhelds to desktops to supercomputers—and together TCP/IP make Internet working happen.

Figure 12.4 TCP/IP in Action

In this example, a server on the left sends a Web page to the user on the right. The application (the Web server) passes the contents of the page to TCP (which is built into the server’s operating system). TCP slices the Web page into packets. Then IP takes over, forwarding packets from router to router across the Internet until it arrives at the user’s PC. Packets sometimes take different routes, and occasionally arrive out of order. TCP running on the receiving system on the right checks that all packets have arrived, requests that damaged or lost packets be resent, puts them in the right order, and sends a perfect, exact copy of the Web page to your browser.

TCP and IP operate below http and the other application transfer protocols mentioned earlier. TCP (transmission control protocol)Works at both ends of most Internet communication to ensure a perfect copy of a message is sent. works its magic at the start and endpoint of the trip—on both your computer and on the destination computer you’re communicating with. Let’s say a Web server wants to send you a large Web page. The Web server application hands the Web page it wants to send to its own version of TCP. TCP then slices up the Web page into smaller chunks of data called packets (or datagrams)A unit of data forwarded by a network. All Internet transmissions—URLs, Web pages, e-mails—are divided into one or more packets.. The packets are like little envelopes containing part of the entire transmission—they’re labeled with a destination address (where it’s going) and a source address (where it came from). Now we’ll leave TCP for a second, because TCP on the Web server then hands those packets off to the second half of our dynamic duo, IP.

It’s the job of IP (Internet protocol)Routing protocol that is in charge of forwarding packets on the Internet. to route the packets to their final destination, and those packets might have to travel over several networks to get to where they’re going. The relay work is done via special computers called routersA computing device that connects networks and exchanges data between them., and these routers speak to each other and to other computers using IP (since routers are connected to the Internet, they have IP addresses, too. Some are even named). Every computer on the Internet is connected to a router, and all routers are connected to at least one (and usually more than one) other router, linking up the networks that make up the Internet.

Routers don’t have perfect, end-to-end information on all points in the Internet, but they do talk to each other all the time, so a router has a pretty good idea of where to send a packet to get it closer to where it needs to end up. This chatter between the routers also keeps the Internet decentralized and fault-tolerant. Even if one path out of a router goes down (a networking cable gets cut, a router breaks, the power to a router goes out), as long as there’s another connection out of that router, then your packet will get forwarded. Networks fail, so good, fault-tolerant network design involves having alternate paths into and out of a network.

Once packets are received by the destination computer (your computer in our example), that machine’s version of TCP kicks in. TCP checks that it has all the packets, makes sure that no packets were damaged or corrupted, requests replacement packets (if needed), and then puts the packets in the correct order, passing a perfect copy of your transmission to the program you’re communicating with (an e-mail server, Web server, etc.).

This progression—application at the source to TCP at the source (slice up the data being sent), to IP (for forwarding among routers), to TCP at the destination (put the transmission back together and make sure it’s perfect), to application at the destination—takes place in both directions, starting at the server for messages coming to you, and starting on your computer when you’re sending messages to another computer.

UDP: TCP’s Faster, Less Reliable Sibling

TCP is a perfectionist and that’s what you want for Web transmissions, e-mail, and application downloads. But sometimes we’re willing to sacrifice perfection for speed. You’d make this sacrifice for streaming media applications like Windows Media Player, Real Player, Internet voice chat, and video conferencing. Having to wait to make sure each packet is perfectly sent would otherwise lead to awkward pauses that interrupt real-time listening. It’d be better to just grab the packets as they come and play them, even if they have minor errors. Packets are small enough that if one packet doesn’t arrive, you can ignore it and move on to the next without too much quality disruption. A protocol called UDP (user datagram protocol)Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed. does exactly this, working as a TCP stand-in when you’ve got the need for speed, and are willing to sacrifice quality. If you’ve ever watched a Web video or had a Web-based phone call and the quality got sketchy, it’s probably because there were packet problems, but UDP kept on chugging, making the “get it fast” instead of “get it perfect” trade-off.

VoIP: When Phone Calls Are Just Another Internet Application

The increasing speed and reliability of the Internet means that applications such as Internet phone calls (referred to as VoIP, or voice over Internet protocolTransmission technologies that enable voice communications (phone calls) to take place over the Internet as well as private packet-switched networks.) are becoming more reliable. That doesn’t just mean that Skype becomes a more viable alternative for consumer landline and mobile phone calls; it’s also good news for many businesses, governments, and nonprofits.

Many large organizations maintain two networks—one for data and another for POTS (plain old telephone service). Maintaining two networks is expensive, and while conventional phone calls are usually of a higher quality than their Internet counterparts, POTS equipment is also inefficient. Old phone systems use a technology called circuit switching. A “circuit” is a dedicated connection between two entities. When you have a POTS phone call, a circuit is open, dedicating a specific amount of capacity between you and the party on the other end. You’re using that “circuit” regardless of whether you’re talking. Pause between words or put someone on hold, and the circuit is still in use. Anyone who has ever tried to make a phone call at a busy time (say, early morning on Mother’s Day or at midnight on New Year’s Eve) and received an “all circuits are busy” recording has experienced congestion on an inefficient circuit-switched phone network.

But unlike circuit-switched counterparts, Internet networks are packet-switched networks, which can be more efficient. Since we can slice conversations up into packets, we can squeeze them into smaller spaces. If there are pauses in a conversation or someone’s on hold, applications don’t hold up the network. And that creates an opportunity to use the network’s available capacity for other users. The trade-off is one that swaps circuit switching’s quality of service (QoS) with packet switching’s efficiency and cost savings. Try to have a VoIP call when there’s too much traffic on a portion of the network and your call quality will drop. But packet switching quality is getting much better. Networking standards are now offering special features, such as “packet prioritization,” that can allow voice packets to gain delivery priority over packets for applications like e-mail, where a slight delay is OK.

When voice is digitized, “telephone service” simply becomes another application that sits on top of the Internet, like the Web, e-mail, or FTP. VoIP calls between remote offices can save long distance charges. And when the phone system becomes a computer application, you can do a lot more. Well-implemented VoIP systems allow users’ browsers access to their voice mail inbox, one-click video conferencing and call forwarding, point-and-click conference call setup, and other features, but you’ll still have a phone number, just like with POTS.

What Connects the Routers and Computers?

Routers are connected together, either via cables or wirelessly. A cable connecting a computer in a home or office is probably copper (likely what’s usually called an Ethernet cable), with transmissions sent through the copper via electricity. Long-haul cables, those that carry lots of data over long distances, are usually fiber-optic lines—glass lined cables that transmit light (light is faster and travels farther distances than electricity, but fiber-optic networking equipment is more expensive than the copper-electricity kind). Wireless transmission can happen via Wi-Fi (for shorter distances), or cell phone tower or satellite over longer distances. But the beauty of the Internet protocol suite (TCP/IP) is that it doesn’t matter what the actual transmission media are. As long as your routing equipment can connect any two networks, and as long as that equipment “speaks” IP, then you can be part of the Internet.

In reality, your messages likely transfer via lots of different transmission media to get to their final destination. If you use a laptop connected via Wi-Fi, then that wireless connection finds a base station, usually within about three hundred feet. That base station is probably connected to a local area network (LAN) via a copper cable. And your firm or college may connect to fast, long-haul portions of the Internet via fiber-optic cables provided by that firm’s Internet service provider (ISP).

Most big organizations have multiple ISPs for redundancy, providing multiple paths in and out of a network. This is so that if a network connection provided by one firm goes down, say an errant backhoe cuts a cable, other connections can route around the problem (see Figure 12.1).

In the United States (and in most deregulated telecommunications markets), Internet service providers come in all sizes, from smaller regional players to sprawling international firms. When different ISPs connect their networking equipment together to share traffic, it’s called peeringWhen separate ISPs link their networks to swap traffic on the Internet.. Peering usually takes place at neutral sites called Internet exchange points (IXPs), although some firms also have private peering points. Carriers usually don’t charge one another for peering. Instead, “the money is made” in the ISP business by charging the end-points in a network—the customer organizations and end users that an ISP connects to the Internet. Competition among carriers helps keep prices down, quality high, and innovation moving forward.

Finance Has a Need for Speed

When many folks think of Wall Street trading, they think of the open outcry pit at the New York Stock Exchange (NYSE). But human traders are just too slow for many of the most active trading firms. Over half of all U.S. stock trades and a quarter of worldwide currency trades now happen via programs that make trading decisions without any human intervention.H. Timmons, “A London Hedge Fund that Opts for Engineers, Not M.B.A.’s,” New York Times, August 18, 2006. There are many names for this automated, data-driven frontier of finance—algorithmic trading, black-box trading, or high-frequency trading. And while firms specializing in automated, high-frequency trading represent only about 2 percent of the trading firms operating in the United States, they account for about three quarters of all U.S. equity trading volume.R. Iati, “The Real Story of Trading Software Espionage,” Advanced Trading, July 10, 2009.

Programmers lie at the heart of modern finance. “A geek who writes code—those guys are now the valuable guys” says the former head of markets systems at Fidelity Investments, and that rare breed of top programmer can make “tens of millions of dollars” developing these systems.A. Berenson, “Arrest Over Software Illuminates Wall St. Secret,” New York Times, August 23, 2009. Such systems leverage data mining and other model-building techniques to crunch massive volumes of data and discover exploitable market patterns. Models are then run against real-time data and executed the instant a trading opportunity is detected. (For more details on how data is gathered and models are built, see Chapter 11 “The Data Asset: Databases, Business Intelligence, and Competitive Advantage”.)

Winning with these systems means being quick—very quick. Suffer delay (what techies call latency) and you may have missed your opportunity to pounce on a signal or market imperfection. To cut latency, many trading firms are moving their servers out of their own data centers and into colocation facilities. These facilities act as storage places where a firm’s servers get superfast connections as close to the action as possible. And by renting space in a “colo,” a firm gets someone else to manage the electrical and cooling issues, often providing more robust power backup and lower energy costs than a firm might get on its own.

Equinix, a major publicly traded IXP and colocation firm with facilities worldwide, has added a growing number of high-frequency trading firms to a roster of customers that includes e-commerce, Internet, software, and telecom companies. In northern New Jersey alone (the location of many of the servers where “Wall Street” trading takes place), Equinix hosts some eighteen exchanges and trading platforms as well as the NYSE Secure Financial Transaction Infrastructure (SFTI) access node.

Less than a decade ago, eighty milliseconds was acceptably low latency, but now trading firms are pushing below one millisecond into microseconds.I. Schmerken, “High-Frequency Trading Shops Play the Colocation Game,” Advanced Trading, October 5, 2009. So it’s pretty clear that understanding how the Internet works, and how to best exploit it, is of fundamental and strategic importance to those in finance. But also recognize that this kind of automated trading comes with risks. Systems that run on their own can move many billions in the blink of an eye, and the actions of one system may cascade, triggering actions by others.

The spring 2010 “Flash Crash” resulted in a nearly 1,000-point freefall in the Dow Jones Industrial Index, it’s biggest intraday drop ever. Those black boxes can be mysterious—weeks after the May 6th event, experts were still parsing through trading records, trying to unearth how the flash crash happened.E. Daimler and G. Davis, “‘Flash Crash’ Proves Diversity Needed in Market Mechanisms,” Pittsburgh Post-Gazette, May 29, 2010. Regulators and lawmakers recognize they now need to understand technology, telecommunications, and its broader impact on society so that they can create platforms that fuel growth without putting the economy at risk.

Watching the Packet Path via Traceroute

Want to see how packets bounce from router to router as they travel around the Internet? Check out a tool called traceroute. Traceroute repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.

Traceroute is built into all major desktop operating systems (Windows, Macs, Linux), and several Web sites will run traceroute between locations (traceroute.org and visualroute.visualware.com are great places to explore).

The message below shows a traceroute performed between Irish firm VistaTEC and Boston College. At first, it looks like a bunch of gibberish, but if we look closely, we can decipher what’s going on.

Figure 12.5

The table above shows ten hops, starting at a domain in vistatec.ie and ending in 136.167.9.226 (the table doesn’t say this, but all IP addresses starting with 136.167 are Boston College addresses). The three groups of numbers at the end of three lines shows the time (in milliseconds) of three packets sent out to test that hop of our journey. These numbers might be interesting for network administrators trying to diagnose speed issues, but we’ll ignore them and focus on how packets get from point to point.

At the start of each line is the name of the computer or router that is relaying packets for that leg of the journey. Sometimes routers are named, and sometimes they’re just IP addresses. When routers are named, we can tell what network a packet is on by looking at the domain name. By looking at the router names to the left of each line in the traceroute above, we see that the first two hops are within the vistatec.ie network. Hop 3 shows the first router outside the vistatec.ie network. It’s at a domain named tinet.net, so this must be the name of VistaTEC’s Internet service provider since it’s the first connection outside the vistatec.ie network.

Sometimes routers names suggest their locations (oftentimes they use the same three character abbreviations you’d see in airports). Look closely at the hosts in hops 3 through 7. The subdomains dub20, lon11, lon01, jfk02, and bos01 suggest the packets are going from Dublin, then east to London, then west to New York City (John F. Kennedy International Airport), then north to Boston. That’s a long way to travel in a fraction of a second!

Hop 4 is at tinet.net, but hop 5 is at cogentco.com (look them up online and you’ll find out that cogentco.com, like tinet.net, is also an ISP). That suggests that between those hops peering is taking place and traffic is handed off from carrier to carrier.

Hop 8 is still cogentco.com, but it’s not clear who the unnamed router in hop 9, 38.104.218.10, belongs to. We can use the Internet to sleuth that out, too. Search the Internet for the phrase “IP address lookup” and you’ll find a bunch of tools to track down the organization that “owns” an IP address. Using the tool at whatismyip.com, I found that this number is registered to PSI Net, which is now part of cogentco.com.

Routing paths, ISPs, and peering all revealed via traceroute. You’ve just performed a sort of network “CAT scan” and looked into the veins and arteries that make up a portion of the Internet. Pretty cool!

If you try out traceroute on your own, be aware that not all routers and networks are traceroute friendly. It’s possible that as your trace hits some hops along the way (particularly at the start or end of your journey), three “*” characters will show up at the end of each line instead of the numbers indicating packet speed. This indicates that traceroute has timed out on that hop. Some networks block traceroute because hackers have used the tool to probe a network to figure out how to attack an organization. Most of the time, though, the hops between the source and destination of the traceroute (the steps involving all the ISPs and their routers) are visible.

Traceroute can be a neat way to explore how the Internet works and reinforce the topics we’ve just learned. Search for traceroute tools online or browse the Internet for details on how to use the traceroute command built into your computer.

There’s Another Internet?

If you’re a student at a large research university, there’s a good chance that your school is part of Internet2. Internet2 is a research network created by a consortium of research, academic, industry, and government firms. These organizations have collectively set up a high-performance network running at speeds of up to one hundred gigabits per second to support and experiment with demanding applications. Examples include high-quality video conferencing; high-reliability, high-bandwidth imaging for the medical field; and applications that share huge data sets among researchers.

If your university is an Internet2 member and you’re communicating with another computer that’s part of the Internet2 consortium, then your organization’s routers are smart enough to route traffic through the superfast Internet2 backbone. If that’s the case, you’re likely already using Internet2 without even knowing it!

Key Takeaways

  • TCP/IP, or the Internet protocol suite, helps get perfect copies of Internet transmissions from one location to another. TCP works on the ends of transmission, breaking up transmissions up into manageable packets at the start and putting them back together while checking quality at the end. IP works in the middle, routing packets to their destination.
  • Routers are special computing devices that forward packets from one location to the next. Routers are typically connected with more than one outbound path, so in case one path becomes unavailable, an alternate path can be used.
  • UDP is a replacement for TCP, used when it makes sense to sacrifice packet quality for delivery speed. It’s often used for media streaming.
  • TCP/IP doesn’t care about the transition media. This allows networks of different types—copper, fiber, and wireless—to connect to and participate in the Internet.
  • The ability to swap in new applications, protocols, and media files gives the network tremendous flexibility.
  • Decentralization, fault tolerance, and redundancy help keep the network open and reliable.
  • VoIP allows voice and phone systems to become an application traveling over the Internet. This is allowing many firms to save money on phone calls and through the elimination of old, inefficient circuit-switched networks. As Internet applications, VoIP phone systems can also have additional features that circuit-switched networks lack. The primary limitation of many VoIP systems is quality of service.
  • Many firms in the finance industry have developed automated trading models that analyze data and execute trades without human intervention. Speeds substantially less than one second may be vital to capitalizing on market opportunities, so firms are increasingly moving equipment into collocation facilities that provide high-speed connectivity to other trading systems.

Questions and Exercises

  1. How can the Internet consist of networks of such physically different transmission media—cable, fiber, and wireless?
  2. What is the difference between TCP and UDP? Why would you use one over the other?
  3. Would you recommend a VoIP phone system to your firm or University? Why or why not? What are the advantages? What are the disadvantages? Can you think of possible concerns or benefits not mentioned in this section? Research these concerns online and share your finding with your instructor.
  4. What are the risks in the kinds of automated trading systems described in this section? Conduct research and find an example of where these systems have caused problems for firms and/or the broader market. What can be done to prevent such problems? Whose responsibility is this?
  5. Search the Internet for a traceroute tool, or look online to figure out how to use the traceroute command built into your PC. Run three or more traceroutes to different firms at different locations around the world. List the number of ISPs that show up in the trace. Circle the areas where peering occurs. Do some of the “hops” time out with “*” values returned? If so, why do you think that happened?
  6. Find out if your school or employer is an Internet2 member. If it is, run traceroutes to schools that are and are not members of Internet2. What differences do you see in the results?

12.4 Last Mile: Faster Speed, Broader Access

Learning Objectives

After studying this section you should be able to do the following:

  1. Understand the last-mile problem and be able to discuss the pros and cons of various broadband technologies, including DSL, cable, fiber, and various wireless offerings.
  2. Describe 3G and 4G systems, listing major technologies and their backers.
  3. Understand the issue of Net neutrality and put forth arguments supporting or criticizing the concept.

The Internet backboneHigh-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. is made of fiber-optic lines that carry data traffic over long distances. Those lines are pretty speedy. In fact, several backbone providers, including AT&T and Verizon, are rolling out infrastructure with 100 Gbps transmission speeds (that’s enough to transmit a two-hour high-definition [HD] movie in about eight seconds).T. Spangler, “Cisco Clarifies 100-Gig AT&T Backbone Claim,” Multichannel News, March 9, 2010; Zacks.com, “AT&T Tests 100 Gb Ethernet in Move toward Faster Internet,” SeekingAlpha, March 10, 2010. But when considering overall network speed, remember Amdahl’s LawA system’s speed is determined by its slowest component.: a system’s speed is determined by its slowest component.G. Gilder, Telecosm: How Infinite Bandwidth Will Revolutionize Our World (New York: Free Press, 2000). More often than not, the bottleneck isn’t the backbone but the so-called last mileTechnologies that connect end users to the Internet. The last-mile problem refers to the fact that these connections are usually the slowest part of the network., or the connections that customers use to get online.

High-speed last-mile technologies are often referred to as broadband Internet access (or just broadbandBroadly refers to high-speed Internet connections and is often applied to “last-mile” technologies.). What qualifies as broadband varies. In 2009, the Federal Communications Commission (FCC) redefined broadband as having a minimum speed of 768 Kbps (roughly fourteen times the speed of those old 56 Kbps modems). Other agencies worldwide may have different definitions. But one thing is clear: a new generation of bandwidth-demanding services requires more capacity. As we increasingly consume Internet services like HD streaming, real-time gaming, video conferencing, and music downloads, we are in fact becoming a bunch of voracious, bit-craving gluttons.

With the pivotal role the United States has played in the creation of the Internet, and in pioneering software, hardware, and telecommunications industries, you might expect the United States to lead the world in last-mile broadband access. Not even close. A recent study ranked the United States twenty-sixth in download speeds,S. Lawson, “US Ranks 26th in New Broadband Index,” Computerworld, May 25, 2010. while others have ranked the United States far behind in speed, availability, and price.S. Hansell, “The Broadband Gap: Why Is Theirs Faster?” New York Times, March 10, 2009.

Sounds grim, but help is on the way. A range of technologies and firms are upgrading infrastructure and developing new systems that will increase capacity not just in the United States but also worldwide. Here’s an overview of some of the major technologies that can be used to speed the Internet’s last mile.

Understanding Bandwidth

When folks talk about bandwidthNetwork transmission speeds, typically expressed in some form of bits per second (bps)., they’re referring to data transmission speeds. Bandwidth is often expressed in bits per second, or bps. Prefix letters associated with multiples of bps are the same as the prefixes we mentioned in Chapter 5 “Moore’s Law: Fast, Cheap Computing and What It Means for the Manager” when discussing storage capacity in bytes: Kbps = thousand bits (or kilobits) per second, Mbps = million bits (or megabits) per second, Gbps = billion bits (or gigabits) per second (or terabit), and Tbps = trillion bits (or terabits) per second.

Remember, there are eight bits in a byte, and one byte is a single character. One megabyte is roughly equivalent to one digital book, forty-five seconds of music, or twenty seconds of medium-quality video.R. Farzad, “The Truth about Bandwidth,” BusinessWeek, February 3, 2010. But you can’t just divide the amount of bytes by eight to estimate how many bits you’ll need to transfer. When a file or other transmission is sliced into packets (usually of no more than about 1,500 bytes), there’s some overhead added. Those packets “wrap” data chunks in an envelope surrounded by source and destination addressing and other important information.

Here are some rough demand requirements for streaming media. For streaming audio like Pandora, you’d need at least 150 Kbps for acceptable regular quality, and at least 300 Kbps for high quality.Pandora, “Frequently Asked Questions,” http://blog.pandora.com/faq. For streaming video (via Netflix), at a minimum you’d need 1.5 Mbps, but 3.0 Mbps will ensure decent video and audio. For what Netflix calls HD streaming, you’ll need a minimum of 5 Mbps, but would likely want 8 Mbps or more to ensure the highest quality video and audio.LG Knowledge Base, “Bandwidth Needed for Instant Streaming,” http://lgknowledgebase.com/kb/index.php?View=entry&EntryID=6241.

Cable Broadband

Roughly 90 percent of U.S. homes are serviced by a cable provider, each capable of using a thick copper wire to offer broadband access. That wire (called a coaxial cableInsulated copper cable commonly used by cable television providers. or coax) has shielding that reduces electrical interference, allowing cable signals to travel longer distances without degrading and with less chance of interference than conventional telephone equipment.

One potential weakness of cable technology lies in the fact that most residential providers use a system that requires customers to share bandwidth with neighbors. If the guy next door is a BitTorrent-using bandwidth hog, your traffic could suffer.R. Thompson, “DSL Internet vs. Cable Internet,” High Speed Internet Access Guide, March 23, 2010.

Cable is fast and it’s getting faster. Many cable firms are rolling out a new technology called DOCSIS 3.0 that offers speeds up to and exceeding 50 Mbps (previous high-end speeds were about 16 Mbps and often much less than that). Cable firms are also creating so-called fiber-copper hybrids that run higher-speed fiber-optic lines into neighborhoods, then use lower-cost, but still relatively high-speed, copper infrastructure over short distances to homes.S. Hansell, “The Broadband Gap: Why Is Theirs Faster?” New York Times, March 10, 2009. Those are fast networks, but they are also very expensive to build, since cable firms are laying entirely new lines into neighborhoods instead of leveraging the infrastructure that they’ve already got in place.

DSL: Phone Company Copper

Digital subscriber line (DSL)Broadband technology that uses the wires of a local telephone network. technology uses the copper wire the phone company has already run into most homes. Even as customers worldwide are dropping their landline phone numbers, the wires used to provide this infrastructure can still be used for broadband.

DSL speeds vary depending on the technology deployed. Worldwide speeds may range from 7 Mbps to as much as 100 Mbps (albeit over very short distances).S. Hansell, “The Broadband Gap: Why Is Theirs Faster?” New York Times, March 10, 2009. The Achilles heel of the technology lies in the fact that DSL uses standard copper telephone wiring. These lines lack the shielding used by cable, so signals begin to degrade the further you are from the connecting equipment in telephone company offices. Speeds drop off significantly at less than two miles from a central office or DSL hub. If you go four miles out, the technology becomes unusable. Some DSL providers are also using a hybrid fiber-copper system, but as with cable’s copper hybrids, this is expensive to build.

The superspeedy DSL implementations that are popular in Europe and Asia work because foreign cities are densely populated and so many high-value customers can be accessed over short distances. In South Korea, for example, half the population lives in apartments, and most of those customers live in and around Seoul. This density also impacts costs—since so many people live in apartments, foreign carriers run fewer lines to reach customers, digging up less ground or stringing wires across fewer telephone poles. Their U.S. counterparts by contrast need to reach a customer base sprawled across the suburbs, so U.S. firms have much higher infrastructure costs. S. Hansell, “The Broadband Gap: Why Is Theirs Faster?” New York Times, March 10, 2009.

There’s another company with copper, electricity-carrying cables coming into your home—the electrical utility. BPL, or broadband over power line, technology has been available for years. However, there are few deployments because it is considered to be pricier and less practical than alternatives.R. King, “Telecom Companies Scramble for Funding,” BusinessWeek, August 3, 2009.

Fiber: A Light-Filled Glass Pipe to Your Doorstep

Fiber to the home (FTTH)Broadband service provided via light-transmitting fiber-optic cables. is the fastest last-mile technology around. It also works over long distances. Verizon’s FiOS technology boasts 50 Mbps download speeds but has tested network upgrades that increase speeds by over six times that.S. Higginbotham, “Verizon Tests 10 Gbps to the Home. Yeah, You’ll Have to Share,” GigaOM, December 17, 2009. The problem with fiber is that unlike cable or DSL copper, fiber to the home networks weren’t already in place. That means firms had to build their own fiber networks from scratch.

The cost of this build out can be enormous. Verizon, for example, has spent over $23 billion on its FTTH infrastructure. However, most experts think the upgrade was critical. Verizon has copper into millions of homes, but U.S. DSL is uncompetitive. Verizon’s residential landline business was dying as users switch to mobile phone numbers, and while mobile is growing, Verizon Wireless is a joint venture with the United Kingdom’s Vodaphone, not a wholly owned firm. This means it shares wireless unit profits with its partner. With FiOS, Verizon now offers pay television, competing with cable’s core product. It also offers some of the fastest home broadband services anywhere, and it gets to keep everything it earns.

In 2010, Google also announced plans to bring fiber to the home. Google deems its effort an experiment—it’s more interested in learning how developers and users take advantage of ultrahigh-speed fiber to the home (e.g., what kinds of apps are created and used, how usage and time spent online change), rather than becoming a nationwide ISP itself. Google says it will investigate ways to build and operate networks less expensively and plans to share findings with others. The Google network will be “open,” allowing other service providers to use Google’s infrastructure to resell services to consumers. The firm has pledged to bring speeds of 1 Gbps at competitive prices to at least 50,000 and potentially as many as 500,000 homes. Over 1,100 U.S. communities applied to be part of the Google experimental fiber network.M. Ingersoll and J. Kelly, “Think Big with a Gig: Our Experimental Fiber Network,” The Google Blog, February 2, 2010; L. Rao, “The Final Tally: More Than 1100 Cities Apply for Google’s Fiber Network,” TechCrunch, March 27, 2010.

Wireless

Mobile wireless service from cell phone access providers is delivered via cell towers. While these providers don’t need to build a residential wired infrastructure, they still need to secure space for cell towers, build the towers, connect the towers to a backbone network, and license the wireless spectrumFrequencies used for communication. Most mobile cell phone services have to license spectrum. Some technologies (such as Wi-Fi) use unlicensed public spectrum. (or airwave frequency space) for transmission.

We need more bandwidth for mobile devices, too. AT&T now finds that the top 3 percent of its mobile network users gulp up 40 percent of the network’s capacity (thanks, iPhone users), and network strain will only increase as more people adopt smartphones. These users are streaming Major League Baseball games, exploring the planet with Google Earth, watching YouTube and Netflix, streaming music through Pandora, and more. Get a bunch of iPhone users in a crowded space, like in a college football stadium on game day, and the result is a network-choking data traffic jam. AT&T estimates that it’s not uncommon for 80 percent of game-day iPhone users to take out their phones and surf the Web for stats, snap and upload photos, and more. But cell towers often can’t handle the load.R. Farzad, “AT&T’s iPhone Mess,” BusinessWeek, February 3, 2010. If you’ve ever lost coverage in a crowd, you’ve witnessed mobile network congestion firsthand. Trying to have enough capacity to avoid congestion traffic jams will cost some serious coin. In the midst of customer complaints, AT&T committed to spending $18 billion on network upgrades to address its wireless capacity problem.C. Edwards and O. Kharif, “Sprint’s Bold Play on a 4G Network,” BusinessWeek, March 30, 2010.

Table 12.1 Average Demand Usage by Function

Usage Demand
Voice Calls 4 MB/hr.
iPhone Browsing 40–60 MB/hr.
Net Radio 60 MB/hr.
YouTube 200–400 MB/hr.
Conventional mobile phones use an estimated 100 MB/month, iPhones 560 MB/month, and iPads almost 1 GB/month.

We’re in the midst of transitioning from third generation (3G) to fourth generation (4G) wireless networks. 3G systems offer access speeds usually less than 2 Mbps (often a lot less).K. German, “On Call: Welcome to 4G,” CNET, March 9, 2010. While variants of 3G wireless might employ an alphabet soup of technologies—EV-DO (evolution data optimized), UMTS (universal mobile telecommunications systems), and HSDPA (high-speed downlink packet link access) among them—3G standards can be narrowed down to two camps: those based on the dominant worldwide standard called GSM (global system for mobile communications) and the runner-up standards based on CDMA (code division multiplex access). Most of Europe and a good chunk of the rest of the world use GSM. In the United States, AT&T and T-Mobile use GSM-based 3G. Verizon Wireless and Sprint use the CDMA 3G standard. Typically, handsets designed for one network can’t be used on networks supporting the other standard. CDMA has an additional limitation in not being able to use voice and data at the same time.

But 3G is being replaced by high-bandwidth 4G (fourth-generation) mobile networks. 4G technologies also fall into two standards camps: LTE (Long Term Evolution) and WiMAX (Worldwide Interoperability for Microwave Access).

LTE looks like the global winner. In the United States, every major wireless firm, except for Sprint, is betting on LTE victory. Bandwidth for the service rivals what we’d consider fast cable a few years back. Average speeds range from 5 to 12 Mbps for downloads and 2 to 5 Mbps for upload, although Verizon tests in Boston and Seattle showed download speeds as high as 50 Mbps and upload speeds reaching 25 Mbps.K. German, “On Call: Welcome to 4G,” CNET, March 9, 2010.

Competing with LTE is WiMAX; don’t confuse it with Wi-Fi. As with other 3G and 4G technologies, WiMAX needs cell towers and operators need to have licensed spectrum from their respective governments (often paying multibillion-dollar fees to do so). Average download and upload speeds should start out at 3–6 Mbps and 1 Mbps, respectively, although this may go much higher.N. Lee, “Sprint’s 4G Plans Explained,” CNET, May 19, 2010.

WiMAX looks like a particularly attractive option for cable firms, offering them an opportunity to get into the mobile phone business and offer a “quadruple play” of services: pay television, broadband Internet, home phone, and mobile. Comcast and Time Warner have both partnered with Clearwire (a firm majority-owned by Sprint), to gain access to WiMAX-based 4G mobile.

4G could also rewrite the landscape for home broadband competition. If speeds increase, it may be possible for PCs, laptops, and set-top boxes (STB) to connect to the Internet wirelessly via 4G, cutting into DSL, cable, and fiber markets.

Satellite Wireless

Wireless systems provided by earth-bound base stations like cell phone towers are referred to as terrestrial wireless, but it is possible to provide telecommunications services via satellite. Early services struggled due to a number of problems. For example, the first residential satellite services were only used for downloads, which still needed a modem or some other connection to send any messages from the computer to the Internet. Many early systems also required large antennas and were quite expensive. Finally, some services were based on satellites in geosynchronous earth orbit (GEO). GEO satellites circle the earth in a fixed, or stationary, orbit above a given spot on the globe, but to do so they must be positioned at a distance that is roughly equivalent to the planet’s circumference. That means signals travel the equivalent of an around-the-world trip to reach the satellite and then the same distance to get to the user. The “last mile” became the last 44,000 miles at best. And if you used a service that also provided satellite upload as well as download, double that to about 88,000 miles. All that distance means higher latency (more delay).G. Ou, “Why Satellite Service Is So Slow,” ZDNet, February 23, 2008.

A firm named O3b Networks thinks it might have solved the challenges that plagued early pioneers. O3b has an impressive list of big-name backers that include HSBC bank, cable magnate John Malone, European aerospace firm SES, and Google.

The name O3b stands for the “Other 3 Billion,” of the world’s population who lack broadband Internet access, and the firm hopes to provide “fiber-quality” wireless service to more than 150 countries, specifically targeting underserved portions of the developing world. These “middle earth orbit” satellites will circle closer to the earth to reduce latency (only about 5,000 miles up, less than one-fourth the distance of GEO systems). To maintain the lower orbit, O3b’s satellites orbit faster than the planet spins, but with plans to launch as many as twenty satellites, the system will constantly blanket regions served. If one satellite circles to the other side of the globe, another one will circle around to take its place, ensuring there’s always an O3b “bird” overhead.

Only about 3 percent of the sub-Saharan African population uses the Internet, compared to about 70 percent in the United States. But data rates in the few places served can cost as much as one hundred times the rates of comparable systems in the industrialized world.G. Lamb, “O3b Networks: A Far-Out Plan to Deliver the Web,” Christian Science Monitor, September 24, 2008. O3b hopes to change that equation and significantly lower access rates. O3b customers will be local telecommunication firms, not end users. The plan is for local firms to buy O3b’s services wholesale and then resell it to customers alongside rivals who can do the same thing, collectively providing more consumer access, higher quality, and lower prices through competition. O3b is a big, bold, and admittedly risky plan, but if it works, its impact could be tremendous.

Wi-Fi and Other Hotspots

Many users access the Internet via Wi-FiA term used to brand wireless local-area networking devices. Devices typically connect to an antenna-equipped base station or hotspot, which is then connected to the Internet. Wi-Fi devices use standards known as IEEE 802.11, and various version of this standard (e.g., b, g, n) may operate in different frequency bands and have access ranges. (which stands for wireless fidelity). Computer and mobile devices have Wi-Fi antennas built into their chipsets, but to connect to the Internet, a device needs to be within range of a base station or hotspot. The base station range is usually around three hundred feet (you might get a longer range outdoors and with special equipment; and less range indoors when signals need to pass through solid objects like walls, ceilings, and floors). Wi-Fi base stations used in the home are usually bought by end users, then connected to a cable, DSL, or fiber provider.

And now a sort of mobile phone hotspot is being used to overcome limitations in those services, as well. Mobile providers can also be susceptible to poor coverage indoors. That’s because the spectrum used by most mobile phone firms doesn’t travel well through solid objects. Cell coverage is also often limited in the United States because of a lack of towers, which is a result of the NIMBY problem (not in my backyard). People don’t want an eighty-foot to four-hundred-foot unsightly tower clouding their local landscape, even if it will give their neighborhood better cell phone coverage.G. Dechter and O. Kharif, “How Craig McCaw Built a 4G Network on the Cheap,” BusinessWeek, May 24, 2010. To overcome reception and availability problems, mobile telecom services firms have begun offering fentocells. These devices are usually smaller than a box of cereal and can sell for $150 or less (some are free with specific service contracts). Plug a fentocell into a high-speed Internet connection like an in-home cable or fiber service and you can get “five-bar” coverage in a roughly 5,000-square-foot footprint.C. Mims, “A Personal Cell Phone Tower,” Technology Review, April 7, 2010. That can be a great solution for someone who has an in-home, high-speed Internet connection, but wants to get phone and mobile data service indoors, too.

Net Neutrality: What’s Fair?

Across the world, battle lines are being drawn regarding the topic of Net neutrality. Net neutrality is the principle that all Internet traffic should be treated equally.M. Honan, “Inside Net Neutrality,” MacWorld, February 12, 2008. Sometimes access providers have wanted to offer varying (some say “discriminatory”) coverage, depending on the service used and bandwidth consumed. But where regulation stands is currently in flux. In a pivotal U.S. case, the FCC ordered Comcast to stop throttling (blocking or slowing down) subscriber access to the peer-to-peer file sharing service BitTorrent. BitTorrent users can consume a huge amount of bandwidth—the service is often used to transfer large files, both legitimate (like version of the Linux operating system) and pirated (HD movies). Then in spring 2010, a federal appeals court moved against the FCC’s position, unanimously ruling that the agency did not have the legal authority to dictate terms to Comcast.“What Is Net Neutrality?” The Week, April 7, 2010.

On one side of the debate are Internet service firms, with Google being one of the strongest Net neutrality supporters. In an advocacy paper, Google states, “Just as telephone companies are not permitted to tell consumers who they can call or what they can say, broadband carriers should not be allowed to use their market power to control activity online.”Google, “A Guide to Net Neutrality for Google Users,” 2008, http://www.docstoc.com/docs/1064274/A-Guide-to-Net-Neutrality-for-Google-Users. Many Internet firms also worry that if network providers move away from flat-rate pricing toward usage-based (or metered) schemes, this may limit innovation. Says Google’s Vint Cerf (who is considered one of the “fathers of the Internet” for his work on the original Internet protocol suite) “You are less likely to try things out. No one wants a surprise bill at the end of the month.”M. Jesdanun, “As the Internet Turns 40, Barriers Threaten Growth,” Technology Review, August 31, 2009. Metered billing may limit the use of everything from iTunes to Netflix; after all, if you have to pay for per-bit bandwidth consumption as well as for the download service, then it’s as if you’re paying twice.

The counterargument is that if firms are restricted from charging more for their investment in infrastructure and services, then they’ll have little incentive to continue to make the kinds of multibillion-dollar investments that innovations like 4G and fiber networks require. Telecom industry executives have railed against Google, Microsoft, Yahoo! and others, calling them free riders who earn huge profits by piggybacking off ISP networks, all while funneling no profits back to the firms that provide the infrastructure. One Verizon vice president said, “The network builders are spending a fortune constructing and maintaining the networks that Google intends to ride on with nothing but cheap servers.…It is enjoying a free lunch that should, by any rational account, be the lunch of the facilities providers.”A. Mohammed, “Verizon Executive Calls for End to Google’s ‘Free Lunch,’” Washington Post, February 7, 2006. AT&T’s previous CEO has suggested that Google, Yahoo! and other services firms should pay for “preferred access” to the firm’s customers. The CEO of Spain’s Telefonica has also said the firm is considering charging Google and other Internet service firms for network use.I. Lunden, “Broadband Content Bits: Web Drama Investment, PPL Video Store, Telefonica to Charge?” paidContent:UK, February 11, 2010.

ISPs also lament the relentlessly increasingly bandwidth demands placed on their networks. Back in 2007, YouTube streamed as much data in three months as the world’s radio, cable, and broadcast television channels combined stream in one year,B. Swanson, “The Coming Exaflood,” Wall Street Journal, January 20, 2007. and YouTube has only continued to grow since then. Should ISPs be required to support the strain of this kind of bandwidth hog? And what if this one application clogs network use for other traffic, such as e-mail or Web surfing? Similarly, shouldn’t firms have the right to prioritize some services to better serve customers? Some network providers argue that services like video chat and streaming audio should get priority over, say, e-mail which can afford slight delay without major impact. In that case, there’s a pretty good argument that providers should be able to discriminate against services. But improving efficiency and throttling usage are two different things.

Internet service firms say they create demand for broadband business, broadband firms say Google and allies are ungrateful parasites that aren’t sharing the wealth. The battle lines on the Net neutrality frontier continue to be drawn, and the eventual outcome will impact consumers, investors, and will likely influence the continued expansion and innovation of the Internet.

Summing Up

Hopefully, this chapter helped reveal the mysteries of the Internet. It’s interesting to know how “the cloud” works but it can also be vital. As we’ve seen, the executive office in financial services firms considers mastery of the Internet infrastructure to be critically important to their competitive advantage. Media firms find the Internet both threatening and empowering. The advancement of last-mile technologies and issues of Net neutrality will expose threats and create opportunity. And a manager who knows how the Internet works will be in a better position to make decisions about how to keep the firm and its customers safe and secure, and be better prepared to brainstorm ideas for winning in a world where access is faster and cheaper, and firms, rivals, partners, and customers are more connected.

Key Takeaways

  • The slowest part of the Internet is typically the last mile, not the backbone. While several technologies can offer broadband service over the last mile, the United States continues to rank below many other nations in terms of access speed, availability, and price.
  • Cable firms and phone companies can leverage existing wiring for cable broadband and DSL service, respectively. Cable services are often criticized for shared bandwidth. DSL’s primary limitation is that it only works within a short distance of telephone office equipment.
  • Fiber to the home can be very fast but very expensive to build.
  • An explosion of high-bandwidth mobile applications is straining 3G networks. 4G systems may alleviate congestion by increasing capacities to near-cable speeds. Fentocells are another technology that can improve service by providing a personal mobile phone hotspot that can plug into in-home broadband access.
  • The two major 3G standards (popularly referred to as GSM and CDMA) will be replaced by two unrelated 4G standards (LTE and WiMAX). GSM has been the dominant 3G technology worldwide. LTE looks like it will be the leading 4G technology.
  • Satellite systems show promise in providing high-speed access to underserved parts of the world, but few satellite broadband providers have been successful so far.
  • Net neutrality is the principle that all Internet traffic should be treated equally. Google and other firms say it is vital to maintain the openness of the Internet. Telecommunications firms say they should be able to limit access to services that overtax their networks, and some have suggested charging Google and other Internet firms for providing access to their customers.

Questions and Exercises

  1. Research online for the latest country rankings for broadband service. Where does the United States currently rank? Why?
  2. Which broadband providers can service your home? Which would you choose? Why?
  3. Research the status of Google’s experimental fiber network. Report updated findings to your class. Why do you suppose Google would run this “experiment”? What other Internet access experiments has the firm been involved in?
  4. Show your understanding of the economics and competitive forces of the telecom industry. Discuss why Verizon chose to go with fiber. Do you think this was a wise decision or not? Why? Feel free to do additional research to back up your argument.
  5. Why have other nations enjoyed faster broadband speeds, greater availability, and lower prices?
  6. The iPhone has been called both a blessing and a curse for AT&T. Why do you suppose this is so?
  7. Investigate the status of mobile wireless offerings (3G and 4G). Which firm would you choose? Why? Which factors are most important in your decision?
  8. Name the two dominant 3G standards. What are the differences between the two? Which firms in your nation support each standard?
  9. Name the two dominant 4G standards. Which firms in your nation will support the respective standards?
  10. Have you ever lost communication access—wirelessly or via wired connection? What caused the loss or outage?
  11. What factors shape the profitability of the mobile wireless provider industry? How do these economics compare with the cable and wire line industry? Who are the major players and which would you invest in? Why?
  12. Last-mile providers often advertise very fast speeds, but users rarely see speeds as high as advertised rates. Search online to find a network speed test and try it from your home, office, mobile device, or dorm. How fast is the network? If you’re able to test from home, what bandwidth rates does your ISP advertise? Does this differ from what you experienced? What could account for this discrepancy?
  13. How can 4G technology help cable firms? Why might it hurt them?
  14. What’s the difference between LEO satellite systems and the type of system used by O3b? What are the pros and cons of these efforts? Conduct some additional research. What is the status of O3b and other satellite broadband efforts?
  15. What advantages could broadband offer to underserved areas of the world? Is Internet access important for economic development? Why or why not?
  16. Does your carrier offer a fentocell? Would you use one? Why or why not?
  17. Be prepared to debate the issue of Net neutrality in class. Prepare positions both supporting and opposing Net neutrality. Which do you support and why?
  18. Investigate the status of Net neutrality laws in your nation and report your findings to your instructor. Do you agree with the stance currently taken by your government? Why or why not?