Comp129 full course latest 2015 october [ all
discussions all Quiz and course proj ]
Click Link Below To Buy:
http://hwcampus.com/shop/comp129-full-course/
Contact Us:
Hwcoursehelp@gmail.com
Devry Comp129 Week 1,
Discusssion 1 & 2 Letast 2015 october
Disussion 1In this discussion, we will look at the basics of both hardware and operating systems. To begin this discussion, let's first define the difference between hardware and software. What is hardware? What is software? What are the purposes of hardware and software?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
In this discussion, we will look at power supplies and form
factors. What is the purpose of a power supply? What is a form factor? How do
power supplies and form factors relate to one another?
Avoid using the Respond button at the top of the discussion. Help keep the
discussion organized by responding only to other posts.Devry Comp129 Week 2, Discusssion 1 & 2 Letast 2015 october
Discussion 1
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
What is a CPU? What is the purpose of the CPU?
Avoid using the Respond button at the top of
the discussion. Help keep the discussion organized by responding only to other
posts.
Devry Comp129 Week 3 Discusssion 1 & 2 Letast 2015 october
Dicussion 1
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts
Discussion 2
Have you ever had a problem with your Windows operating
system? What happened, and what was the result?
Avoid using the Respond button at the top of the discussion. Help keep the
discussion organized by responding only to other posts.Devry Comp129 Week 4 Discusssion 1 & 2 Letast 2015 october
Discussion 1
Avoid using the Respond button at the top of the discussion.
Help keep the discussion organized by responding only to other posts.
Discussion 2
Discuss backup strategies and devices that you can use with your PC at home
or in the workplace. How does the device connect? What standards does it use?Discussion 2
Avoid using the Respond button at the top of the discussion.
Help keep the discussion organized by responding only to other posts.
Discussion 1
Avoid using the Respond button at the top of the discussion.
Help keep the discussion organized by responding only to other posts.
Discussion 2
What is one of your favorite applications that utilizes the Internet?
Discuss what happens behind the scenes in the network that enables your PC to
implement that application.Discussion 2
Avoid using the Respond button
at the top of the discussion. Help keep the discussion organized by responding
only to other posts.
Discussion 1
What are some of the basic precautions a computer owner or network
administrator can take to help make the computing environment secure? What are
some of the basic security threats that a user or administrator might have to
face?Discussion 1
Avoid using the Respond button
at the top of the discussion. Help keep the discussion organized by responding
only to other posts.
Discussion 2
What is Linux? When would you use it? How does it differ from Windows? Are
there different versions of Linux?Discussion 2
Avoid using the Respond button
at the top of the discussion. Help keep the discussion organized by responding
only to other posts.
Discussion 1
What is troubleshooting? How can you find the cause(s) of the problem
quickly when you have limited experience? Why is it important to keep a
computer healthy?Discussion 1
Avoid using the Respond button
at the top of the discussion. Help keep the discussion organized by responding
only to other posts.
discussion 2
We have studied the CLI for both Windows and Linux. The real power in using
commands comes with scripting. What are some repetitive tasks you can think of
that could be done more easily with a well-written script?discussion 2
Avoid using the Respond button
at the top of the discussion. Help keep the discussion organized by responding
only to other posts.
quizes
wek 1
quizes
wek 1
1. Question :
(TCO 2) Why is having the correct device driver so important?
Student
Answer: It enables a specific operating system to run as multiple machines.
It enables
multiple computers to share devices.
It enables a
device to work in both a powered and unpowered state.
It enables a
specific operating system to control a specific piece of hardware.
Instructor
Explanation: Schmidt, Chapter 1
Points
Received: 4 of 4
Comments:
Question 2.
Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port?
Student
Answer: 1.5 Mbps
3 Mbps
10 Mbps
480 Mbps
Instructor
Explanation: Schmidt, Chapter 1
Points
Received: 4 of 4
Comments:
Question 3.
Question : (TCO 2) What is the primary purpose of the power supply?
Student
Answer: Controls internal computer temperature
Converts AC to
DC
Provides power
to external devices
Supplies AC
electricity to the computer parts
Instructor
Explanation: Schmidt, Chapter 1
Points
Received: 4 of 4
Comments:
Question 4.
Question : (TCO 2) What atmospheric condition
can increase
the potential for static electricity?
Student
Answer: High temperatures
Low
temperatures
Low humidity
None;
atmospheric conditions have little impact on static electricity
Instructor
Explanation: Schmidt, Chapter 4
Points
Received: 4 of 4
Comments:
Question 5.
Question : (TCO 2) A _____ is required
before
software from the BIOS is executed.
Student
Answer: power good signal
password
surge
protector good signal
power down
signal
Instructor
Explanation: Schmidt, Chapter 4
Points
Received: 4 of 4
Comments:
Question 6.
Question : (TCO 2) Which unit would you recommend for the help desk people who
sit at a computer for a 24/7 operation where help must be provided at all
times?
Student
Answer: A UPS
A surge
protector
An upgrade
power supply
A line conditioner
Instructor
Explanation: Schmidt, Chapter 4
Points
Received: 4 of 4
Comments:
Question 7.
Question : (TCO 1) Refer to the provided figure. What type of cable would have
this symbol?
Student
Answer: Radio frequency (RF)
USB 3.0
Bluetooth
FireWire
Instructor
Explanation: Schmidt, Chapter 1
Points
Received: 4 of 4
Comments:
Question 8.
Question : (TCO 1) Jane decides to restart her computer by pressing the
Ctrl+Alt+Delete combination keys. This procedure
is called a
_____.
Student
Answer: shutdown
warm boot
quick start
mistake
Instructor
Explanation: Schmidt, Chapter 1
Points
Received: 4 of 4
Comments:
Question 9.
Question : (TCO 1) Why is it best not to start cleaning a computer by using
compressed
air?
Student
Answer: Some people may be sensitive to the dust blown into the air.
Pressure may
damage the fragile electronic
equipment.
Heavy dirt
cannot be moved by the compressed air.
The turbulence
from the compressed air causes an RFI disturbance.
Instructor
Explanation: Schmidt, Chapter 4
Points Received:
0 of 4
Comments:
Question 10.
Question : (TCO 11) After a problem is solved, a technician must _____
findings, actions, and outcomes.
Student
Answer: tell his or her boss the
document
memorize
e-mail
Instructor
Explanation: Schmidt, Soft Skills, Ch.4
Points
Received: 4 of 4
Comments:
Devry Comp129 Wee
k 2 Quiz Letast 2015
october
1. Question :
(TCO 3) Major microprocessor manufacturers are _____.
Student
Answer: Apple, Gateway, and Dell
Maxtor,
Seagate, and Sony
Microsoft,
3-Com, and Oracle
Instructor
Explanation: Schmidt, Chapter 2
Points
Received: 4 of 4
Comments:
Question 2.
Question : (TCO 3) What does quad core mean in relation of processors?
Student
Answer: The main CPU is clocked at four times the static rate.
Four
processors are installed in one or two sockets on the motherboard.
Four pipelines
are used inside the processor for simultaneous instruction execution.
Four core
system processes can be executed upon simultaneously.
Instructor
Explanation: Schmidt, Chapter 2
Points
Received: 0 of 4
Comments:
Question 3.
Question : (TCO 3) An engineering professor teaches CAS at the university.
Which expansion slot would be best for the graphics card in the professor's
computer?
Student
Answer: PCI
PCI-X
AGP
PCIe
Instructor
Explanation: Schmidt, Chapter 2
Points
Received: 4 of 4
Comments:
Question 4.
Question : (TCO 3) Most motherboards use _____ for RAM.
Student
Answer: DIMMs
RIMMs
VCMs
DIPs
Instructor
Explanation: Schmidt, Chapter 6
Points
Received: 4 of 4
Comments:
Question 5.
Question : (TCO 3) Double-sided memory _____.
Student
Answer: is two memory modules in the same physical module
is required to
do dual-channeling
is most often
used with Rambus
provides
faster throughput
Instructor
Explanation: Schmidt, Chapter 6
Points
Received: 4 of 4
Comments:
Question 6.
Question : (TCO 3) Dual channeling _____.
Student
Answer: requires more cache memory
requires more
RAM
requires dual
CPUs
requires
matched modules
Instructor
Explanation: Schmidt, Chapter 6
Points
Received: 4 of 4
Comments:
Question 7.
Question : (TCO 3) Where are mini PCIe cards normally installed?
Student
Answer: In tablet computers
On the bottom
of a laptop
In a slot adjacent
to the processor
Instructor
Explanation: Schmidt, Chapter 2
Points
Received: 4 of 4
Comments:
Question 8.
Question : (TCO 2) Which of the following will most likely contain SO-DIMM
memory?
Student
Answer: Servers
Desktop
workstations
Notebook
computers
Printers
Instructor
Explanation: Week 2 Lecture and LabSims
Points
Received: 4 of 4
Comments:
Question 9.
Question : (TCO 2) A physical problem with a memory chip will often cause a(n)
_____ error.
Student
Answer: out of memory
bad sector
POST
Task Manager
Instructor
Explanation: Schmidt, Chapter 6
Points
Received: 4 of 4
Comments:
Question 10.
Question : (TCO 11) Bill and John are overloaded. They have to install more
than 50 access points. Joni hears their frustration and offers to help. This is
an example of _____.
Student
Answer: tag teaming
consolidation
teamwork
outsourcing
Instructor
Explanation: Schmidt, Soft Skills, Chapter 6
Points
Received: 4 of 4
Comments:
Devry Comp129 Week 3
Quiz Letast 2015 october
1. Question :
(TCO 4) Linux has a variety of _____ that provide the basic functionality that
you are used to when working with an operating system, such as the cp command
for copying files, the mvcommand for moving files, the vi editor for editing a
text file, and so on.
Student
Answer: DOS commands
utilities
batch files
GUI tools
Instructor
Explanation: TestOut Linux+ Section 0.1.3
Points
Received: 4 of 4
Comments:
Question 2.
Question : (TCO 4) What is a home screen on a mobile device?
Student
Answer: Where you have to be to see what applications are currently running
Where the
physical volume control is normally located
Where photo
files are stored
Where app
icons are found
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 4 of 4
Comments:
Question 3.
Question : (TCO 4) Consider the following directory structure from the C: drive
root directory.
2014_Term
(directory)
CompRepair
(subdirectory)
Opsys
(subdirectory)
Cisco8
(subdirectory)
VOIP
(subdirectory)
If the prompt
is C:2014_Term> and you wanted to move into theCisco8
subdirectory,
what
command do you
type?
Student
Answer: CD Cisco8
CD..
CD Cisco8
CD C:Cisco8
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 0 of 4
Comments:
Question 4.
Question : (TCO 4) List three items commonly found in a dialog box.
Student
Answer: Properties, Close button, Font button
OK button,
Cancel button,
Make new file button
Help button,
Close button, OK button
Help button,
Close button, Restart button
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 4 of 4
Comments:
Question 5.
Question : (TCO 4) Which tool can you use to view, but not modify, hardware and
configuration information for your computer?
Student
Answer: The System applet in Control Panel
Msinfo32
Msconfig.exe
Event Viewer
Instructor
Explanation: TestOut PC Pro Section 9
Points
Received: 4 of 4
Comments:
Question 6.
Question : (TCO 4) Who is given credit for the GNU initiative?
Student
Answer: Richard Stallman
Bill Gates
Linus Torvald
All of the
above
Instructor
Explanation: TestOut Linux+ Section 0.1.3
Points
Received: 4 of 4
Comments:
Question 7.
Question : (TCO 4) Which user type was available
in Windows XP
but is not available
for Windows
Vista and 7?
Student
Answer: Guest
Administrator
Standard User
Power User
Instructor
Explanation: Schmidt, Chapter 12
Points
Received: 4 of 4
Comments:
Question 8.
Question : (TCO 4) What Windows 7 feature speeds up file searches?
Student
Answer: Shadow Copy
Indexing
Sharing
ReadyBoost
Instructor
Explanation: Schmidt, Chapter 12
Points
Received: 4 of 4
Comments:
Question 9.
Question : (TCO 4) What is the default location for 64-bit application files in
Windows 7?
Student
Answer: The Windows folder
The Program
Files folder
The SysWOW64
folder
The System64
folder
Instructor
Explanation: Schmidt, Chapter 12
Points Received:
4 of 4
Comments:
Question 10.
Question : (TCO 11) Learning the next-generation features of the most recent smartphones is an example of _____.
Student
Answer: OS maintenance
staying
current with technology
leveraging
documentation
working out a
solution
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 4 of 4
Comments:
* Times are
displayed in (GMT-07:00) Mountain Time (US & Canada)
week 4
Devry CoMP129 Week 4
Quiz Latest 2015 October
1. Question :
(TCO 5) A laptop normally has an _____ type of hard drive installed.
Student
Answer: internal SCSI
external SCSI
external SATA
internal SATA
Instructor
Explanation: Schmidt, Chapter 7
Points
Received: 4 of 4
Comments:
Question 2.
Question : (TCO 6) Why is backing up data to a different partition on the same
hard drive not a good idea?
Student
Answer: The data perform at a slower rate.
Other users
who have rights to save files can retrieve the backup, install to a different
computer or drive, and potentially see others’ data.
If the drive
fails, both the data and the backup are potentially unusable.
The backup
takes longer.
Instructor
Explanation: Schmidt, Chapter 7
Points Received:
4 of 4
Comments:
Question 3.
Question : (TCO 6) Which backup type would back up all the user's data and set
the archive bit for each file?
Student
Answer: Comprehensive
Full
Differential
Incremental
Instructor
Explanation: Schmidt, Chapter 7
Points Received:
4 of 4
Comments:
Question 4.
Question : (TCO 5) Which optical medium has the greatest storage capacity?
Student
Answer: Compact disc
Dual-layer,
single-sided DVD
Single-layer,
single-sided Blu-ray disc
Dual-layer,
double-sided DVD
Instructor
Explanation: TestOut PC Pro A+, Section 5.6
Points
Received: 4 of 4
Comments:
Question 5.
Question : (TCO 5) For internal optical drives, what is the most common type of
internal interface found today?
Student
Answer: SCSI
IDE
USB
Firewire
Instructor Explanation:
Schmidt, Chapter 8
Points
Received: 4 of 4
Comments:
Question 6.
Question : (TCO 6) What term is used to describe the number of samples a sound
card takes to create the reproduction of the original sound?
Student
Answer: Analog-to-digital conversion rate
Power rating
Frequency
response
Signal to
noise ratio
Instructor
Explanation: Schmidt, Chapter 8
Points
Received: 4 of 4
Comments:
Question 7.
Question : (TCO 5) What Android app could be used to see saved photos?
Student
Answer: Settings
Gallery
Photos
Video
Instructor
Explanation: Schmidt, Chapter 8
Points
Received: 4 of 4
Comments:
Question 8.
Question : (TCO 5) What happens when you press the Fn key along
with a
function key on a laptop computer?
Student
Answer: You allow the computer
to be placed
in one of four power modes, which helps with video troubleshooting.
You allow the
computer
to be placed
in diagnostic
mode, which is
especially useful when troubleshooting video problems.
You get
additional features depending
on the key you
press.
You refresh
the monitor.
Instructor
Explanation: Schmidt, Chapter 9
Points
Received: 4 of 4
Comments:
Question 9.
Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work
area across two monitors.
What would be
the best solution for this user?
Student
Answer: Use an integrated VGA port and a DVI port on an adapter.
Install a
video card with two ports if two ports are not available on the motherboard.
Use a KVM
switch.
Use a video
splitter.
Instructor
Explanation: Schmidt, Chapter 9
Points
Received: 4 of 4
Comments:
Question 10.
Question : (TCO 11) What should you do when speaking on the phone with a
customer who is very upset and yelling at you?
Student
Answer: Stay calm but raise your voice level a little to show the importance
and professionalism of your technical question.
Ask the caller
whether you can put him or her on hold while he or she calms down.
Hang up on the
caller.
Speak to the
customer using a calm, professional tone.
Instructor
Explanation: Schmidt, Chapter 7
Points Received:
4 of 4
Comments:
week 5
DevrDevry Comp129
Week 6 Quiz Latest 2015 October
1. Question : (TCO 8) The protocols used to encrypt account names and
passwords are called authentication protocols. The protocol used for Windows is
_____.Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4
week 6
Devry Comp129 Week 6
Quiz Latest 2015 October
1. Question :
(TCO 8) The protocols used to encrypt account names and passwords are called
authentication protocols. The protocol used for Windows is _____.
Student
Answer: Kerberos
Crypto IP
Encapsulation (CIPE)
Internet
Protocol Security (IPsec)
Secure Sockets
Layer (SSL)
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question 2.
Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student
Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question 3.
Question : (TCO 8) A worm _____.
Student
Answer: is a program that can replicate by attaching itself to another program
can spread
copies of itself throughout a network without a host program
does not need
a host program to work; It pretends to be a legitimate program
is dormant
code added to software and triggered by a predetermined event
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question 4.
Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student
Answer: Authentication
Authorization
A background
process
BIOS settings
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question 5.
Question : (TCO 8) The largest security risk for stealing confidential data
comes from ____.
Student
Answer: Russian or Chinese hackers
college
students studying hacking
employees
leaving passwords in full view
disgruntled
employees
Instructor
Explanation: Week 6 Online Lecture
Points
Received: 0 of 4
Comments:
Question 6.
Question : (TCO 8) Which security method would be best to use if extremely
sensitive government information were stored on a hard drive that will no
longer be used?
Student
Answer: Buy 1/0 rewrite software.
Drill holes in
the platters and smash the pieces with a hammer.
Hold a magnet
over each platter.
Repartition
the hard drive into multiple partitions using different file systems.
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question 7.
Question : (TCO 8) The protocols used to encrypt account names and passwords
are called _____ protocols.
Student
Answer: user service
encryption
authentication
authorization
Instructor
Explanation: Schmidt, Chapter 15
Points Received:
4 of 4
Comments:
Question 8.
Question : (TCO 4) Which Linux command shows you what the current directory is?
Student
Answer: more
pwd
dir
ls
Instructor
Explanation: TestOut Linux+, Section 1.1
Points
Received: 4 of 4
Comments:
Question 9.
Question : (TCO 9) What is SSID broadcasting?
Student
Answer: The method the access point uses to reach all wireless NICs with a
single message
A means for
the access point to send the wireless encryption keys to all wireless NICs for
network access
The access point
constantly sending the name of the wireless network into the air
The access
method used for 802.11 a, b, g, and n wireless networks
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question 10.
Question : (TCO 11) Trust between you and your customer begins with _____.
Student
Answer: never lying.
good
communications skills
a new customer
discount
professionalism.
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 0 of 4
Comments:
week 7
(TCO 4) You have been
asked to temporarily fill in for a Linux administrator who has just been fired.
This administrator was known to take a lax view of security and it is suspected
that passwords are still kept in the /etc/passwd file. When viewing that file,
which entry below would indicate that the passwords are there?
kolson:85yxir:430:0:Back
Door:/root:/bin/bash
badams:x:341:52:Brent
Adams:/users/badams:/bin/bash
dclifford:x:689:306:non
secure user:/root:
tmurphy:x:100:100:/users/tmurphy:/bin/bash
Question 2.
Question :
(TCO 11) Mitch
Miller wants to use his optical drive to play a Moody Blues CD. When he inserts
the disc and closes the drive tray, the drive turns, but he does not hear any
music. What type of problem would a technician say this is?
The technician
would say that it is a hardware problem.
The technician
would say that it is a software problem.
The technician
would say that it is an error of the user.
The technician
would not be able to draw a conclusion from the description given.
Question 3.
Question :
(TCO 10) In
which troubleshooting step do you complete a help-desk ticket by typing the
solution and closing the ticket?
Document
findings, actions, and outcomes.
Identify the
problem.
Verify full
system functionality and, if applicable, implement preventive measures.
Establish a
plan of action to resolve the problem and implement the solution.
Question 4.
Question :
(TCO 10) The
audio beeps heard during the boot process are caused by the _____.
RAM
processor
CMOS
BIOS
Question 5.
Question :
(TCO 10)
Hardware errors are often obvious _____.
during POST
during
printing
when saving a
file
during RAM
access
Question 6.
Question :
(TCO 10) What
component is most likely to be included in an audio and video editing PC
design?
RAID
Powerful GPU
Multiple
processors
Video capture
card
Question 7.
Question :
(TCO 10) Which
of the following would most likely be a design consideration for a gaming PC
rather than a computer used for virtualization?
No comments:
Post a Comment