Friday 29 December 2017

Comp129 full course latest 2015 october [ all discussions all Quiz and course proj ]


  Comp129 full course latest 2015 october [ all discussions all Quiz and course proj ]

Click Link Below To Buy:

http://hwcampus.com/shop/comp129-full-course/

Contact Us:
Hwcoursehelp@gmail.com

 

Devry Comp129 Week 1, Discusssion 1 & 2 Letast 2015 october
Disussion 1

In this discussion, we will look at the basics of both hardware and operating systems. To begin this discussion, let's first define the difference between hardware and software. What is hardware? What is software? What are the purposes of hardware and software?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.



Discussion 2

In this discussion, we will look at power supplies and form factors. What is the purpose of a power supply? What is a form factor? How do power supplies and form factors relate to one another?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.







Devry Comp129 Week 2, Discusssion 1 & 2 Letast 2015 october

Discussion 1
Take some time this week to open up your computer (or better yet, an old junky one), and take a look inside (be sure to unplug your machine and not to touch any of the components—look but don't touch). Based on your readings, what kind of motherboard is being used? What form factor? How did you know?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

Discussion 2
What is a CPU? What is the purpose of the CPU?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.







Devry Comp129 Week 3 Discusssion 1 & 2 Letast 2015 october



Dicussion 1

Describe the Windows operating system. Discuss some of your favorite Windows features.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts


Discussion 2
Have you ever had a problem with your Windows operating system? What happened, and what was the result?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.






Devry Comp129 Week 4 Discusssion 1 & 2 Letast 2015 october


Discussion 1

Identify and discuss some peripherals that ordinary desktop PC users would normally use. Discuss how they work and their purposes.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.




Discussion 2
Discuss backup strategies and devices that you can use with your PC at home or in the workplace. How does the device connect? What standards does it use?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.





Discussion 1

What are the basic components required to set up a network? How do you add a PC to a network?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.


Discussion 2
What is one of your favorite applications that utilizes the Internet? Discuss what happens behind the scenes in the network that enables your PC to implement that application.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.


Discussion 1
What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.




Discussion 2
What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.




Discussion 1
What is troubleshooting? How can you find the cause(s) of the problem quickly when you have limited experience? Why is it important to keep a computer healthy?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.



discussion 2
We have studied the CLI for both Windows and Linux. The real power in using commands comes with scripting. What are some repetitive tasks you can think of that could be done more easily with a well-written script?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

quizes

wek 1
1. Question : (TCO 2) Why is having the correct device driver so important?
Student Answer: It enables a specific operating system to run as multiple machines.
It enables multiple computers to share devices.
It enables a device to work in both a powered and unpowered state.
It enables a specific operating system to control a specific piece of hardware.
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port?
Student Answer: 1.5 Mbps
3 Mbps
10 Mbps
480 Mbps
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 2) What is the primary purpose of the power supply?
Student Answer: Controls internal computer temperature
Converts AC to DC
Provides power to external devices
Supplies AC electricity to the computer parts
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 2) What atmospheric condition
can increase the potential for static electricity?
Student Answer: High temperatures
Low temperatures
Low humidity
None; atmospheric conditions have little impact on static electricity
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 2) A _____ is required
before software from the BIOS is executed.
Student Answer: power good signal
password
surge protector good signal
power down signal
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 2) Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times?
Student Answer: A UPS
A surge protector
An upgrade power supply
A line conditioner
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 1) Refer to the provided figure. What type of cable would have this symbol?
Student Answer: Radio frequency (RF)
USB 3.0
Bluetooth
FireWire
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 1) Jane decides to restart her computer by pressing the Ctrl+Alt+Delete combination keys. This procedure
is called a _____.
Student Answer: shutdown
warm boot
quick start
mistake
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 1) Why is it best not to start cleaning a computer by using compressed
air?
Student Answer: Some people may be sensitive to the dust blown into the air.
Pressure may damage the fragile electronic
equipment.
Heavy dirt cannot be moved by the compressed air.
The turbulence from the compressed air causes an RFI disturbance.
Instructor Explanation: Schmidt, Chapter 4
Points Received: 0 of 4
Comments:
Question 10. Question : (TCO 11) After a problem is solved, a technician must _____ findings, actions, and outcomes.
Student Answer: tell his or her boss the
document
memorize
e-mail
Instructor Explanation: Schmidt, Soft Skills, Ch.4
Points Received: 4 of 4
Comments:



Devry Comp129 Wee

 

k 2 Quiz Letast 2015 october

1. Question : (TCO 3) Major microprocessor manufacturers are _____.
Student Answer: Apple, Gateway, and Dell
Intel, Motorola, and AMD
Maxtor, Seagate, and Sony
Microsoft, 3-Com, and Oracle
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 3) What does quad core mean in relation of processors?
Student Answer: The main CPU is clocked at four times the static rate.
Four processors are installed in one or two sockets on the motherboard.
Four pipelines are used inside the processor for simultaneous instruction execution.
Four core system processes can be executed upon simultaneously.
Instructor Explanation: Schmidt, Chapter 2
Points Received: 0 of 4
Comments:
Question 3. Question : (TCO 3) An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor's computer?
Student Answer: PCI
PCI-X
AGP
PCIe
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 3) Most motherboards use _____ for RAM.
Student Answer: DIMMs
RIMMs
VCMs
DIPs
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 3) Double-sided memory _____.
Student Answer: is two memory modules in the same physical module
is required to do dual-channeling
is most often used with Rambus
provides faster throughput
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 3) Dual channeling _____.
Student Answer: requires more cache memory
requires more RAM
requires dual CPUs
requires matched modules
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 3) Where are mini PCIe cards normally installed?
Student Answer: In tablet computers
On the bottom of a laptop
In a slot adjacent to the processor
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 2) Which of the following will most likely contain SO-DIMM memory?
Student Answer: Servers
Desktop workstations
Notebook computers
Printers
Instructor Explanation: Week 2 Lecture and LabSims
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 2) A physical problem with a memory chip will often cause a(n) _____ error.
Student Answer: out of memory
bad sector
POST
Task Manager
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Bill and John are overloaded. They have to install more than 50 access points. Joni hears their frustration and offers to help. This is an example of _____.
Student Answer: tag teaming
consolidation
teamwork
outsourcing
Instructor Explanation: Schmidt, Soft Skills, Chapter 6
Points Received: 4 of 4
Comments:





Devry Comp129 Week 3 Quiz Letast 2015 october

1. Question : (TCO 4) Linux has a variety of _____ that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mvcommand for moving files, the vi editor for editing a text file, and so on.
Student Answer: DOS commands
utilities
batch files
GUI tools
Instructor Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 4) What is a home screen on a mobile device?
Student Answer: Where you have to be to see what applications are currently running
Where the physical volume control is normally located
Where photo files are stored
Where app icons are found
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 4) Consider the following directory structure from the C: drive root directory.
2014_Term (directory)
CompRepair (subdirectory)
Opsys (subdirectory)
Cisco8 (subdirectory)
VOIP (subdirectory)
If the prompt is C:2014_Term> and you wanted to move into theCisco8
subdirectory, what
command do you type?
Student Answer: CD Cisco8
CD..
CD Cisco8
CD C:Cisco8
Instructor Explanation: Schmidt, Chapter 11
Points Received: 0 of 4
Comments:
Question 4. Question : (TCO 4) List three items commonly found in a dialog box.
Student Answer: Properties, Close button, Font button
OK button,
Cancel button, Make new file button
Help button, Close button, OK button
Help button, Close button, Restart button
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware and configuration information for your computer?
Student Answer: The System applet in Control Panel
Msinfo32
Msconfig.exe
Event Viewer
Instructor Explanation: TestOut PC Pro Section 9
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 4) Who is given credit for the GNU initiative?
Student Answer: Richard Stallman
Bill Gates
Linus Torvald
All of the above
Instructor Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 4) Which user type was available
in Windows XP but is not available
for Windows Vista and 7?
Student Answer: Guest
Administrator
Standard User
Power User
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) What Windows 7 feature speeds up file searches?
Student Answer: Shadow Copy
Indexing
Sharing
ReadyBoost
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 4) What is the default location for 64-bit application files in Windows 7?
Student Answer: The Windows folder
The Program Files folder
The SysWOW64 folder
The System64 folder
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Learning the next-generation features of the most recent smartphones is an example of _____.
Student Answer: OS maintenance
staying current with technology
leveraging documentation
working out a solution
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)





week 4

Devry CoMP129 Week 4 Quiz Latest 2015 October

1. Question : (TCO 5) A laptop normally has an _____ type of hard drive installed.
Student Answer: internal SCSI
external SCSI
external SATA
internal SATA
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 6) Why is backing up data to a different partition on the same hard drive not a good idea?
Student Answer: The data perform at a slower rate.
Other users who have rights to save files can retrieve the backup, install to a different computer or drive, and potentially see others’ data.
If the drive fails, both the data and the backup are potentially unusable.
The backup takes longer.
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 6) Which backup type would back up all the user's data and set the archive bit for each file?
Student Answer: Comprehensive
Full
Differential
Incremental
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 5) Which optical medium has the greatest storage capacity?
Student Answer: Compact disc
Dual-layer, single-sided DVD
Single-layer, single-sided Blu-ray disc
Dual-layer, double-sided DVD
Instructor Explanation: TestOut PC Pro A+, Section 5.6
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 5) For internal optical drives, what is the most common type of internal interface found today?
Student Answer: SCSI
IDE
USB
Firewire
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 6) What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound?
Student Answer: Analog-to-digital conversion rate
Power rating
Frequency response
Signal to noise ratio
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 5) What Android app could be used to see saved photos?
Student Answer: Settings
Gallery
Photos
Video
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 5) What happens when you press the Fn key along
with a function key on a laptop computer?
Student Answer: You allow the computer
to be placed in one of four power modes, which helps with video troubleshooting.
You allow the computer
to be placed in diagnostic
mode, which is especially useful when troubleshooting video problems.
You get additional features depending
on the key you press.
You refresh the monitor.
Instructor Explanation: Schmidt, Chapter 9
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work area across two monitors.
What would be the best solution for this user?
Student Answer: Use an integrated VGA port and a DVI port on an adapter.
Install a video card with two ports if two ports are not available on the motherboard.
Use a KVM switch.
Use a video splitter.
Instructor Explanation: Schmidt, Chapter 9
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) What should you do when speaking on the phone with a customer who is very upset and yelling at you?
Student Answer: Stay calm but raise your voice level a little to show the importance and professionalism of your technical question.
Ask the caller whether you can put him or her on hold while he or she calms down.
Hang up on the caller.
Speak to the customer using a calm, professional tone.
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:




week 5

DevrDevry Comp129 Week 6 Quiz Latest 2015 October

1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4


week 6

Devry Comp129 Week 6 Quiz Latest 2015 October

1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4
Comments:


week 7

(TCO 4) You have been asked to temporarily fill in for a Linux administrator who has just been fired. This administrator was known to take a lax view of security and it is suspected that passwords are still kept in the /etc/passwd file. When viewing that file, which entry below would indicate that the passwords are there?

kolson:85yxir:430:0:Back Door:/root:/bin/bash
badams:x:341:52:Brent Adams:/users/badams:/bin/bash
dclifford:x:689:306:non secure user:/root:
tmurphy:x:100:100:/users/tmurphy:/bin/bash
Question 2. Question :
(TCO 11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When he inserts the disc and closes the drive tray, the drive turns, but he does not hear any music. What type of problem would a technician say this is?
The technician would say that it is a hardware problem.
The technician would say that it is a software problem.
The technician would say that it is an error of the user.
The technician would not be able to draw a conclusion from the description given.
Question 3. Question :
(TCO 10) In which troubleshooting step do you complete a help-desk ticket by typing the solution and closing the ticket?
Document findings, actions, and outcomes.
Identify the problem.
Verify full system functionality and, if applicable, implement preventive measures.
Establish a plan of action to resolve the problem and implement the solution.
Question 4. Question :
(TCO 10) The audio beeps heard during the boot process are caused by the _____.
RAM
processor
CMOS
BIOS
Question 5. Question :
(TCO 10) Hardware errors are often obvious _____.
during POST
during printing
when saving a file
during RAM access
Question 6. Question :
(TCO 10) What component is most likely to be included in an audio and video editing PC design?
RAID
Powerful GPU
Multiple processors
Video capture card
Question 7. Question :
(TCO 10) Which of the following would most likely be a design consideration for a gaming PC rather than a computer used for virtualization?

No comments:

Post a Comment