How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Andy Your Own Question

Andy
Andy, Computer Consultant
Category: Computer
Satisfied Customers: 5311
Experience:  11yr exp, Comp Engg, Internet expert, Web developer, SEO
16465236
Type Your Computer Question Here...
Andy is online now
A new question is answered every 9 seconds

I actually have a lot of questions I need to get answered can

Customer Question

I actually have a lot of questions I need to get answered can I post them and you tell me how many you are willing to answer and for how much? I think 14 bucks should be more than just one question, I ask that last one to see how this website worked but know I see that the question do get answered right away and that this website acutely work so can we make an arrangement how the price and amount of question?
Submitted: 4 years ago.
Category: Computer
Expert:  John P replied 4 years ago.

Tell me how many questions you have and I'll work out a deal with you.

Customer: replied 4 years ago.
a lot of multiple chose question. 7X86= about 602 maybe a little less.
Expert:  John P replied 4 years ago.

602 Questions? What do you think is a fair price?

Customer: replied 4 years ago.

i don't really know, i mean how long will it take you? time is important also. the questions are computer level. what's a good price for you? im sure that with the high qualifications you have as a computer engineer these questions will be easy for you, nothing that you will have to send to much time looking up.

 

Expert:  John P replied 4 years ago.

It depends on if you are scanning the questions or writing them and the complexity, multiple choice makes things easier. A quarter a question would be around $150.00 do you think that's acceptable (you can use the bonus function after I've answered the questions)? If not, let me know as I genuinely do not know how much time this will take as I haven't seen the questions.

 

Thanks,

John

Customer: replied 4 years ago.
well here is an example of the questions so you can see if they are difficult or not. i can cut and paste them all in this box. i was hoping not to spend more than 100. do you think you can consider lowing the price a bit? also if you can please let me know about how long it will take to finish i will truly appreciate it, i apologies if i sound pushy or like if im rushing you but i am on a time crunch.

 

 

1. Which of the following is NOT an example of a network node?

  • a) a modem
  • b) a printer
  • c) a computer
  • d) an NOS

 

2. A computer network is defined as two or more computers connected with __________ so that they can communicate with each other.

  • a) the Internet
  • b) software
  • c) hardware
  • d) software and hardware

 

3. Networks allow users to share?

  • a) peripherals.
  • b) flash drives.
  • c) paper.
  • d) phones.

 

4. A(n) __________ allows sharing of a broadband Internet connection.

  • a) phone cord
  • b) hub
  • c) adapter
  • d) router

 

5. Network architectures are classified according to?

  • a) the way they are controlled and the distance between their nodes.
  • b) the distance between the hub and the router.
  • c) the bandwidth supplied by the connection.
  • d) the speed at which the processor runs.

 

6. Due to the expansion of media files on home computers, __________ options are now being marketed; however, they are not as full featured as their business-world counterparts.

  • a) external hard drive
  • b) home server
  • c) mega flash drives
  • d) online storage

 

7. Most computers today contain network adapters installed inside as expansion cards. Such adapters are referred to as:

  • a) network adapter cards.
  • b) network expansion cards.
  • c) network interface cards.
  • d) ethernet cards.

 

8. Normal telephone wire is:

  • a) fiber-optic cable.
  • b) coaxial cable.
  • c) twisted-pair cable.
  • d) ethernet cable.

 

9. The most common type of network is:

  • a) a token ring LAN.
  • b) a peer-to-peer (P2P) network.
  • c) a client/server network.
  • d) a WAN.

 

10. In a client/server network, there are usually many more __________ than __________.

  • a) servers, clients
  • b) printers, computers
  • c) clients, servers
  • d) clients, computers

 

11. A network that has ten or more nodes is usually configured as a:

  • a) client/server network.
  • b) home network.
  • c) peer-to-peer network.
  • d) WAN

 

12. Which of the following is NOT an example of a WAN?

  • a) LANs connected in a single building
  • b) a LAN at the main university campus connected with a LAN at the university extension site
  • c) a computer at a bank's main branch connected with a LAN at the bank's branch office across town
  • d) the computers in a lab at your school connected to the computers in a lab at another school in your town

 

13. Which transmission medium is able to transmit data the fastest?

  • a) twisted-pair cable
  • b) coaxial cable
  • c) fiber-optic cable
  • d) wireless

 

14. The data transfer rate of a wireless network is usually measured in?

  • a) Kbps.
  • b) Gbps.
  • c) Tbps.
  • d) Mbps.

 

15. Throughput, the actual speed of data transfer that is achieved in a network, is usually?

  • a) more than the data transfer rate.
  • b) the same as the data transfer rate.
  • c) less than the data transfer rate.
  • d) dependent on the cable's bend radius.

 

16. Network adapters:

  • a) enable nodes in a network to communicate with each other.
  • b) are built into the motherboard on each node.
  • c) are always Ethernet NICs.
  • d) are necessary only on servers in a client/server network.

 

17. Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?

  • a) USB ports
  • b) firewalls
  • c) network interface cards (NICs)
  • d) routers and switches

 

18. Client/server networks are controlled by a central server that runs a specialized piece of software called?

  • a) Windows Vista.
  • b) a network operating system(NOS).
  • c) a firewall.
  • d) NetWare.

 

19. The major difference in types of P2P networks is the __________ by which the nodes are connected.

  • a) software
  • b) port
  • c) network interface card
  • d) transmission medium

 

20. Ethernet networks are named for?

  • a) the type of NIC installed in every node.
  • b) the protocol used.
  • c) the type of transmission medium used.
  • d) the type of operating system installed on every node.

 

21. An Ethernet adapter is a:

  • a) specific type of NIC.
  • b) specific type of router.
  • c) transmission medium.
  • d) device that uses a simple algorithm to move data.

 

22. The most popular transmission medium option for wired Ethernet networks is:

  • a) unshielded twisted-pair cable (UTP).
  • b) fiber-optic cable.
  • c) power-line cable.
  • d) coaxial cable.

 

23. Maximum cable run (length) for Ethernet networks using UTP cable is approximately:

  • a) 50 feet.
  • b) 328 feet.
  • c) 550 feet.
  • d) 1,100 feet.

 

24. Which of the following is necessary to send data between a home network and the Internet?

  • a) a cable
  • b) a hub
  • c) a switch
  • d) a router

 

25. A wireless network uses which of the following as its transmission medium?

  • a) laser waves
  • b) fiber-optic waves
  • c) sound waves
  • d) radio waves

 

26. Which of the following devices translates electronic data into radio waves?

  • a) a modem
  • b) a fiber-optic cable
  • c) a transceiver
  • d) a receiver

 

27. Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?

  • a) a wireless network adapter
  • b) a power-line adapter
  • c) a transceiver
  • d) a modem

 

28. Which of the following devices is needed to share an Internet connection on a wireless network?

  • a) a wireless hub
  • b) a fiber-optic cable
  • c) a wireless router
  • d) a modem

 

29. If you frequently transfer large data files between nodes on a network, which of the following networks would be the best choice?

  • a) dial-up
  • b) power-line
  • c) Ethernet
  • d) wireless

 

30. To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT:

  • a) reposition the computer you are using.
  • b) move the computers in the network closer together.
  • c) move your computer next to a cement wall.
  • d) add a wireless access point (WAP) to the network.

 

31. Most __________ allow you to connect wireless and wired computers to the same network.

  • a) wireless routers
  • b) servers
  • c) transceivers
  • d) modems

 

32. Most __________ allow you to connect wireless and wired computers to the same network.

  • a) wireless routers
  • b) servers
  • c) transceivers
  • d) modems

 

33. Public places where you can wirelessly connect to the Internet are known as?

  • a) links.
  • b) hotspots.
  • c) wired spots.
  • d) gateways.

 

34. All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:

  • a) power-line networks cost less.
  • b) you don't need to run new wires with a power-line network.
  • c) you are experiencing interference with a wireless Ethernet network.
  • d) power-line networks can be easier to install.

 

35. When setting up a network, you should set up any computers running the Microsoft Vista operating system:

  • a) first.
  • b) last.
  • c) only before any computers running Linux.
  • d) The order does not matter.

 

36. The weakest link in any computer security system is:

  • a) the operating system.
  • b) the network.
  • c) USB ports.
  • d) the users.

 

37. What is the best thing a company can do to prevent its electronic data from being stolen?

  • a) establish detailed security policies
  • b) disconnect employees' computers from the Internet
  • c) shut off access on computers to flash drives
  • d) install hidden cameras

 

38. Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

  • a) social networking
  • b) cybercrime
  • c) phishing
  • d) hacking

 

39. A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:

  • a) use your debit card information to purchase items illegally.
  • b) assume your identity.
  • c) steal your logon and passwords for various accounts.
  • d) launch a denial of service (DoS) attack on your computer.

 

40. Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background?

  • a) a virus
  • b) a Trojan horse
  • c) a worm
  • d) a zombie

 

41. Distributed denial of service (DDoS) attacks have been associated with:

  • a) attacks on famous blogs, eBay, and Amazon.com.
  • b) identity theft.
  • c) misuse of credit card information.
  • d) theft of financial data at the IRS.

 

42. The most likely method a hacker would use to access a computer is:

  • a) sitting down at a computer and installing hacking software.
  • b) overhearing your password XXXXX log-on information.
  • c) entering through a company intranet.
  • d) entering through the Internet.

 

43. Rules for creating passwords include all of the following EXCEPT:

  • a) keep your password XXXXX secret.
  • b) keep your password XXXXX down, and put it in your wallet.
  • c) change your password XXXXX
  • d) create a hard-to-guess password, with a combination of letters and numbers.

 

44. One can thwart most hacking problems by installing a:

  • a) network.
  • b) firewall.
  • c) hub.
  • d) security policy.

 

45. __________ makes broadband users more vulnerable to attacks.

  • a) Dynamic addressing
  • b) IP addressing
  • c) Static addressing
  • d) Greater bandwidth

 

46. The purpose of Network Address Translation is to?

  • a) translate IP addresses from the Internet.
  • b) hide user IP addresses from the Internet.
  • c) convert logical ports to physical port configurations.
  • d) dynamically assign IP addresses via an ISP.

 

47. Manufacturers such as Linksys, D-Link, and Netgear make which of the following devices that can double as firewalls?

  • a) networks
  • b) NICs
  • c) modems
  • d) routers

 

48. To secure a wireless network, you should take all the following precautions EXCEPT:

  • a) changing your network name.
  • b) changing the default password XXXXX your router.
  • c) turning your computer off at night.
  • d) disabling SSID broadcast.

 

49. How many viruses and virus variants exist today?

  • a) tens
  • b) hundreds
  • c) thousands
  • d) millions

 

50. Which type of virus was the famous Michelangelo virus?

  • a) a time bomb
  • b) a worm
  • c) a script virus
  • d) an e-mail virus

 

51. Which of the following classifications of viruses changes its own code?

  • a) stealth
  • b) polymorphic
  • c) multipartite
  • d) worm

 

52. Quarantining with regard to computer protection is defined as:

  • a) placing a found virus in a secure area on the hard drive.
  • b) updating your antivirus software.
  • c) repairing the infected file.
  • d) deleting the infected file.

 

 

True/False: Determine if the statement is true or false.

 

53. It is not possible to configure a client/server network for home use.

 

54. A client computer is the computer on which users accomplish specific tasks.

 

55. A single computer can function as both a client and a server, but performance will be degraded.

 

56. Most desktop and notebook systems sold today are network ready.

 

57. MAN stands for mobile area network.

 

58. When a network is sponsored by a government entity to provide Internet access to a specific geographic area, that network will generally be designated as a MAN.

 

59. The cost of a P2P network is slightly greater than the cost of a client/server network.

 

60. P2P networks are more commonly used in small businesses than in homes.

 

61. Wireless networks are more vulnerable to attack than wired networks.

 

62. A network-ready device is a device that may be attached to a network but still has to connect to a networked computer first.


63. A wireless NIC from one manufacturer may not work with a DSL router from another manufacturer, even when both devices claim to be developed using the same standards.

 

64. The 802.11g standard supports transfer rates of up to 30 Mbps.

 

65. 802.11 devices are less susceptible to interference than 802.11g devices are.


66. Wireless networks are no more vulnerable to packet sniffers than any other type of network.

 

67. SMTP uses port 21.

 

68. SMTP stands for Simple Mail Transfer Protocol.

 

69. The practice of piggybacking is illegal.

 

70. The majority of investigations related to cybercrime involve debit card fraud.

 

71. The Master Boot Record executes every time a computer boots up.

 

72. Extreme G and Enhanced G standards were both based on 802.11g standards but used proprietary hardware and software tweaks to increase performance.

 

73. 802.11g devices have a faster throughput than 802.11n devices.

 

74. The Internet is an example of a client/server network.


75. Cybercriminals are usually security individuals who work in large corporations with a vast knowledge base of computing and networking.

 

76. In a peer-to-peer network, one computer acts as the server.

 

77. One can have both wired and wireless nodes on a single P2P network.

 

78. Data transfer rate does NOT affect the speed at which a user can download a file from a WAN.

 

79. Switches receive data packets and send them to the node for which they are intended on the same network.

 

80. A P2P network needs network operating system software installed on every node.

 

81. Ethernet networks are always connected using twisted-pair cable technology.

 

82. The Mac OS does NOT support P2P networking.


83. Most computers today come with Ethernet adapters already installed.

 

84. Repeaters can extend a network's range by amplifying the signal.

 

85. When configured correctly, network firewalls can help protect your network.

 

86. White-hat hackers perform a needed legal service for society.

 

Expert:  John P replied 4 years ago.
I'll start on it and see how long these take, but if it takes a long time, I'll have to be firm on my price. If it is short I'll accept the $100. It will depend though on how long this takes, some may be specific to your book.
Customer: replied 4 years ago.
k, i will accept your price. you are right it is fair enough. it is a lot of questions. my only worry is that we run out of time do you think you could get this done within a few hours? or will it take you days? how would you like me to pay? half now and half after completion? or do i pay at the end?
Expert:  John P replied 4 years ago.

Just bonus $141 at the end when I'm done (since this question is worth $9). I'll work on it until we are done tonight. Don't post any more until I post back the answers to the first 86.

 

Thanks,

John

Customer: replied 4 years ago.
so you are charging me 9 dollars a question?
Expert:  John P replied 4 years ago.

No, not at all, just keep posting here until we finish all of them. We'll do all of them in this thread. We don't need a new thread to do all the questions. Does that make sense?

 

Here's the first set:

 

1 D
2 D
3 A
4 D
5 A
6 B
7 C
8 C
9 A
10 C
11 A
12 A
13 C
14 D
15 C
16 A
17 D
18 B
19 A
20 B
21 A
22 A
23 B
24 D
25 D
26 C
27 A
28 C
29 C
30 C
31 A
32 A (this is a repost of number 31 question)
33 B
34 A
35 D
36 D
37 A
38 B
39 D
40 B
41 A
42 D
43 B
44 B
45 C
46 A
47 D
48 C
49 D
50 B
51 B
52 A
53 F
54 T
55 T
56 T
57 F
58 T
59 F
60 F
61 T
62 F
63 F
64 F
65 F
66 F
67 F
68 T
69 T
70 T
71 T
72 T
73 F
74 T
75 F
76 F
77 T
78 F
79 F
80 T
81 F
82 F
83 T
84 T
85 T
86 T

 

 

Expert:  John P replied 4 years ago.
After rereading your previous post, I'll take a minute to explain how this site works. I don't get paid until you click accept. For that to happen, I need to post an Answer first for you to accept. Since there are so many questions, I won't post that until the last post to make it easier. Secondly, once you click accept, no matter how much information is in this thread, it's only $9 (the question value you assigned when you opened the question.) After I've answered the questions, you've clicked accept, you can then bonus the additional $141.00 to make it an even $150 total. Does that clarify things for you?
Customer: replied 4 years ago.

 

 

So how much are you charging me in total?

  1. A combination of a phone and a PDA is referred to as a:
  • a) smartphone.
  • b) combo-phone.
  • c) cellular phone.
  • d) personal digital assistant phone.

 

  1. __________ are electronic tools such as cell phones, portable media players, and notebooks.
  • a) Mobile computing devices.
  • b) Portable digital assistants.
  • c) Smart tools.

 

  1. Microsoft __________ is an example of personal information management software that allows you to track your schedule or your address book.
  • a) Excel.
  • b) Word.
  • c) Access.
  • d) Outlook.

 

  1. Which of the following is NOT an advantage of using mobile devices?.
  • a) You can access your files wherever you are.
  • b) You can keep in contact with others via e-mail or phone wherever you are.
  • c) You can access the Internet at faster speeds.
  • d) You can access the Internet wherever you are.

 

  1. If a mobile device can access the Internet through a wireless network, it is considered?
  • a) Web-connected.
  • b) Web-featured.
  • c) Web-enhanced.
  • d) Web-enabled.

 

  1. Which of the following is NOT a limitation of mobile computing?
  • a) the length of battery life.
  • b) whether the screen is available in color.
  • c) the size of the screen.
  • d) the speed of the Internet connection.

 

  1. Which of the following allows you to carry media files?
  • a) PMP.
  • b) PDQ.
  • c) PIM.
  • d) POM.

 

  1. A smartphone is the result of __________, which is a combination of the tools found in more than one portable device?
  • a) combination.
  • b) unification.
  • c) convergence.
  • d) blending.

 

  1. A __________ runs a full-featured operating system and weighs less than two pounds?
  • a) PDA .
  • b) PIM.
  • c) smartphone.
  • d) subnotebook.

 

  1. Symbian is?
  • a) an operating system for cell phones.
  • b) a type of application software.
  • c) a utility program for PDA/smartphone.
  • d) a form of antivirus software.

 

  1. The Apple iPhone uses a version of __________ as an operating system?
  • a) OS X.
  • b) Windows Mobile.
  • c) Linux.
  • d) Red Hat.

 

  1. ROM is?
  • a) volatile memory.
  • b) flash memory.
  • c) nonvolatile memory.
  • d) temporary storage.

 

  1. The operating system of a cell phone is stored in?
  • a) RAM.
  • b) the CPU.
  • c) the transceiver.
  • d) ROM.

 

  1. An analog-to-digital converter chip.
  • a) converts digital sound waves into analog sound waves.
  • b) converts the sound waves from a voice into a digital signal.
  • c) converts written data into sound waves.
  • d) converts letters from the keyboard into digital format.

 

  1. Which of the following is a new program being tested by Apple and Starbucks that will allow iPhone users to identify, purchase, and download a song they are currently listening to at a Starbucks.
  • a) Music ID.
  • b) Get It.
  • c) Now Playing.
  • d) Audio Delivery.

 

  1. Your cell phone call may be disconnected or dropped if:
  • a) the distance between the two phones is too great.
  • b) the distance between the two phones is too small.
  • c) the distance between the base stations is too large.
  • d) the distance between the base stations is too small.

 

  1. A base transceiver station receives a request for cellular service and passes that request to a central location called a:
  • a) cellular request station.
  • b) mobile switching center.
  • c) mobile conversion station.
  • d) cellular switching tower.

 

  1. Text messaging is also called:
  • a) test messaging system (TMS).
  • b) sending messages shortly (SMS).
  • c) short message service (SMS).
  • d) short text messaging (STM).

 

  1. Text prediction __________ provide a list of popular words and save typing time when using text messaging.
  • a) dictionaries.
  • b) algorithms.
  • c) services.
  • d) accessories.

 

  1. Which of the following allows users to send text, sound, images, and video clips to other phones or e-mail addresses?
  • a) SMS.
  • b) MMS.
  • c) MSM.
  • d) SSM.

 

  1. SMS delivers messages to the appropriate mobile device using __________ technology.
  • a) receive and forward.
  • b) MMS.
  • c) store and forward.
  • d) Bluetooth.

 

  1. Which of the following refers to options given for connectivity to the Internet and usually covers text messages that are sent or received?
  • a) connectivity plans.
  • b) Internet plans.
  • c) data plans.
  • d) message plans.

 

  1. Which of the following is specialized software made to display Web pages on a cell phone?
  • a) minibrowser.
  • b) microbrowser.
  • c) cell browser.
  • d) online browser.

  1. Opera Mobile is an example of?
  • a) a microbrowser.
  • b) SmartMedia.
  • c) a smartphone.
  • d) a wireless ISP.

 

  1. Which of the following is similar to HTML except that it is geared toward making Web pages that are viewable on mobile devices?
  • a) WTML (wireless text markup language).
  • b) WML (wireless markup language).
  • c) SGML (standard generalized markup language).
  • d) WTL (wireless text language).

 

  1. LogMeIn is an example of a?
  • a) voice-recognition system.
  • b) GPS system.
  • c) remote access service for mobile devices.
  • d) type of smartphone.

 

  1. An iPod is an example of a?
  • a) PMP.
  • b) PDA/smartphone.
  • c) PIM.
  • d) MPD.

 

  1. An iPod with an 80-GB hard drive can hold how many songs?
  • a) up to 80.
  • b) up to 20,000.
  • c) up to 160,000.
  • d) up to 8 million.

  1. A portable media player can play files with all of the following file extensions EXCEPT:
  • a) AVI.
  • b) MP3.
  • c) DOC.
  • d) MPEG-4.

 

  1. Flash memory is a type of:
  • a) volatile memory.
  • b) nonvolatile memory.
  • c) vibrant memory.
  • d) nonvibrant memory.

 

  1. To transfer files from your computer to a portable media player (PMP), most newer PMPs use a __________ port or a FireWire port.
  • a) multimedia.
  • b) serial.
  • c) parallel.
  • d) USB 2.0.

 

  1. Which of the following describes the number of times, usually in Kbps, that music can be measured and converted into a digital format?
  • a) converting rate.
  • b) sampling rate.
  • c) conversion rate.
  • d) simplifying rate.

 

  1. Which of the following is the process of sharing files between two or more computers?
  • a) direct sharing (DS).
  • b) peer-to-peer (P2P) sharing.
  • c) computer-to-computer (C2C) sharing.
  • d) person-to-person (P2P) sharing.

 

  1. Which of the following is the ability to download and play music with restrictions enforced about its use?
  • a) purchased downloads.
  • b) secure digital downloads.
  • c) tethered downloads.
  • d) tied-down downloads.

 

 

  1. Ensuring that two devices--for example, a PC and a PDA/smartphone--have the same data is the process of?
  • a) simplifying.
  • b) synchronizing.
  • c) unifying.
  • d) standardizing.

  1. Which of the following tools is used to make entries into a handheld device via a touch-sensitive screen?
  • a) a pen.
  • b) a pencil.
  • c) a keyboard.
  • d) a stylus.

 

  1. Which process compares task time on similar devices to help judge performance levels?
  • a) beta testing.
  • b) beta testing.
  • c) benchmarking.
  • d) device profiling.

 

  1. __________ was originally called Pocket PC.
  • a) Palm OS.
  • b) Symbian.
  • c) Linux Mobile.
  • d) Windows Mobile.

 

  1. All of the following Microsoft application programs, specifically designed for mobile devices, are currently available EXCEPT:
  • a) Outlook.
  • b) Word.
  • c) Access.
  • d) Excel.

 

  1. Which of the following is a way for portable devices to send messages wirelessly, via radio waves, over a range of less than 30 feet?
  • a) beaming.
  • b) Bluetooth.
  • c) infrared.
  • d) cell phone.

 

  1. A device that combines portable device capabilities, such as those of a PDA, cell phone, and PMP, is called a?
  • a) multifunction phone.
  • b) CPP (cell/PDA/PMP).
  • c) combophone.
  • d) smartphone.

  1. A tablet PC is all of the following EXCEPT?
  • a) a computer that allows you to write notes on the pressure-sensitive screen using a stylus.
  • b) lightweight and portable.
  • c) like a clipboard when in "tablet" mode.
  • d) less expensive than a regular size notebook.

  1. When a stylus is used to input information on a tablet PC, the user is using an entry system referred to as?
  • a) digital ink.
  • b) virtual ink.
  • c) tablet ink.
  • d) stylus ink.

 

  1. GPS refers to?
  • a) goals performance system.
  • b) global positioning system.
  • c) global parts system.
  • d) ground position system.

 

 

  1. Which of the following allows you to connect a monitor, printer, and so on to a notebook computer via one connection as opposed to connecting individual devices?
  • a) a connect-all.
  • b) an all-in-one.
  • c) a docking station.
  • d) a connector station.

 

  1. The more _________ a battery has, the greater its capacity.
  • a) cells.
  • b) power.
  • c) amps.
  • d) voltage.

 

  1. __________ is the text-entry system for drawing images and entering text by writing on the surface of a tablet PC.
  • a) Grafitti text.
  • b) Digital annotation.
  • c) Digital ink.
  • d) Mobile write.

  1. The measurement of battery life for a notebook computer is listed in:
  • a) clock hours.
  • b) clock minutes.
  • c) ampere-hours.
  • d) ampere-minutes.

  1. A fully charged, high-performance notebook battery can last up to:
  • a) 1 hour.
  • b) 3 hours.
  • c) 5 hours.
  • d) 10 hours.

 

  1. A category of notebook computers that weigh less than two pounds is the:
  • a) ultramobile computer.
  • b) mini-computer.
  • c) ultraportable computer.
  • d) micro-computer.

 

  1. The new standard for expansion slots on PCs is called:
  • a) expansion cards.
  • b) add-in cards.
  • c) ExpressCards.
  • d) QuickCards.

 

  1. Which of the following terms refers to the amount of space on a desk or table that a computer uses?
  • a) base size.
  • b) footprint.
  • c) foot size.
  • d) baseprint.

 

True/False: Determine if the statement is true or false.

 

  1. Outlook is an example of PIM software.

 

  1. Battery life and size of screen should be considered when choosing a mobile device.

  1. A notebook computer is a high-cost option for having a mobile device for communicating.

 

  1. Subnotebooks are more powerful than PDAs/smartphones, but they cannot run a full-featured operating system.

 

  1. PDAs/smartphones are just as powerful as notebooks.

  1. PDAs/smartphones can run Microsoft Office software.

  1. Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages.

 

  1. The Apple iPhone uses a Microsoft operating system.

 

  1. You can send messages that include text, sound, images, and video clips using SMS.

  1. MMS stands for Multimedia Message Service.

  1. MMS allows you to save all, none, or part of a message.

 

  1. Text prediction algorithms provide a list of popular words and save typing time when using text messaging.

 

  1. Cell phones do not require special service providers to connect to the Internet.

 

  1. Cell phones can fall victim to viruses.

  1. Currently, cell phone connection speeds probably won't exceed 200 to 300 Kbps.

 

  1. WTML refers to the text-based format, similar to HTML, geared toward mobile device Web browsers.

 

  1. Most portable e-mail devices use "pull" technology, which means your e-mail will be delivered to your phone automatically so that your e-mail finds you whether you are thinking about it or not.

 

  1. WiFi is less susceptible to interference than EDGE or EDVO is.

 

  1. MP3 files can be played only on iPods.

 

  1. Not all PMP devices are necessarily just music players.

 

  1. There are cameras on the market that can play both music and videos.

 

  1. Some GPS systems can play MP3 files and display photos.

  1. Flash memory is volatile.

 

  1. The conversion rate is the number of times per second music is measured and converted into a digital value.

 

  1. A Secure Digital memory card is faster and more secure than a Compact Flash memory card.

 

  1. DRM-free music is music that has been released without any digital rights management.

 

  1. DRM-free music can legally be moved from system to system.

 

  1. PDAs/smartphones use both ROM and RAM in their daily operation.

 

  1. Tablet PCs use a text-entry system, called Digital Annotation, that allows users to write directly on the tablet screen.

 

  1. You can synchronize a PDA/smartphone to a PC but not to a cell phone.

  1. You can transfer a file from some PDAs/smartphones to other PDAs/smartphones using an infrared port.

 

  1. Currently, there is no productivity software available for mobile devices.

  1. PDAs/smartphones store application programs and data in ROM.

 

  1. PDA/smartphone processor speed is measured in hertz.

 

  1. Notebooks, because of their small size, are a better value than desktops.

 

  1. A disadvantage of ultramobile computers is that they have tiny, cramped keyboards.

  1. Benchmarking is a process in which task time is compared on similar devices and the results are used to judge performance.

 

  1. You can add memory to some, but not all, PDA/smartphone devices.

  1. You can connect printers, scanners, and full-size monitors to a docking station.

 

  1. PC cards are faster than ExpressCards.

 

  1. The amount of space a system takes up on a desk or table is referred to as its footprint.

 

  1. Nanology is the study of molecules and structures the size of which range from 1 to 100 nanometers.

 

  1. Nanology is the study of molecules and structures the size of which range from 1 to 100 nanometers.

 

 

 

 

Expert:  John P replied 4 years ago.
That would be the $150 in total, this is going to take a few more hours probably 4 or so. Could you repost the previous questions with numbering so that we don't get out of sync? I'd hate to miss a question and throw all the following answers off.
Customer: replied 4 years ago.
k im sorry about that
Expert:  John P replied 4 years ago.

Did it anyway without the numbering, remember to use this thread for all the questions.

 

1 A
2 A
3 D
4 C
5 D
6 D
7 A
8 C
9 D
10 A
11 A
12 C
13 D
14 B
15 D
16 C
17 B
18 C
19 B
20 B
21 C
22 C
23 B
24 A
25 B
26 C
27 A
28 B
29 C
30 A
31 D
32 B
33 B
34 B
35 B
36 D
37 C
38 D
39 C
40 B
41 C
42 D
43 A
44 B
45 C
46 A
47 B
48 C
49 D
50 C
51 C
52 B

53 T
54 T
55 F
56 F
57 F
58 T
59 T
60 F
61 F
62 T
63 T
64 T
65 F
66 F
67 F
68 F
69 T
70 F
71 F
72 T
73 T
74 T
75 T
76 F
77 T
78 T
79 T
80 T
81 T
82 F
83 T
84 F
85 F
86 T
87 F
88 T
89 T
90 T
91 T
92 F
93 T
94 T
95 T

 

 

 

Expert:  John P replied 4 years ago.
Have you viewed my post?
Expert:  John P replied 4 years ago.
I'll be here for a few more hours if you return to this thread to continue the questions.
Expert:  John P replied 4 years ago.

Okay, I've waited 3 hours. I'm off to bed soon unless I hear from you. Return to this thread when you want to finish. The first two are completed.

 

Thanks,

John

Expert:  John P replied 4 years ago.

Don't know if you still need help, but I'm online again.

 

John

JustAnswer in the News:

 
 
 
Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.
 
 
 

What Customers are Saying:

 
 
 
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
< Last | Next >
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
  • I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you! RP Austin, TX
  • Hi John, Thank you for your expertise and, more important, for your kindness because they make me, almost, look forward to my next computer problem. After the next problem comes, I'll be delighted to correspond again with you. I'm told that I excel at programing. But system administration has never been one of my talents. So it's great to have an expert to rely on when the computer decides to stump me. God bless, Bill Bill M. Schenectady, New York
  • The Expert answered my Mac question and was patient. He answered in a thorough and timely manner, keeping the response on a level that could understand. Thank you! Frank Canada
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
 
 
 

Meet The Experts:

 
 
 
  • Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
< Last | Next >
  • http://ww2.justanswer.com/uploads/EN/Engineer1010/2012-6-9_132423_jaj12a.64x64.jpg Andy's Avatar

    Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
  • http://ww2.justanswer.com/uploads/BA/barrenrock/2011-10-19_215925_JamesJAFinal.64x64.jpg James's Avatar

    James

    Sr. Computer Support Expert

    Satisfied Customers:

    8376
    20 years of experience building, fixing and servicing PCs and operating systems.
  • http://ww2.justanswer.com/uploads/zeyank/2009-09-26_154244_P8110079.png Ryan H.'s Avatar

    Ryan H.

    Computer Support Specialist

    Satisfied Customers:

    1741
    A+ Certified Technician - 10 Years experience working with all types of computer systems.
  • http://ww2.justanswer.com/uploads/JA/jadedangel57/2011-11-8_193134_janenewsm.64x64.jpg Jane Lefler's Avatar

    Jane Lefler

    Sr Prog Analyst / Technician

    Satisfied Customers:

    0
    Computer Programmer / Technician/ Consultant 16+ years
  • http://ww2.justanswer.com/uploads/RO/robmpreston/2013-9-23_233814_mijiFZm.64x64.jpg RPI Solutions's Avatar

    RPI Solutions

    Support Specialist

    Satisfied Customers:

    3476
    5+ Years in IT, BS in Computer Science
  • http://ww2.justanswer.com/uploads/BA/barunrath/2012-7-5_201954_Profilepic2.64x64.jpg B. Rath's Avatar

    B. Rath

    Computer Support Specialist

    Satisfied Customers:

    8671
    Certified Computer/Networking Support Specialist.
  • http://ww2.justanswer.com/uploads/FS/fszcze/2012-6-18_181848_500test.64x64.jpg Frederick S.'s Avatar

    Frederick S.

    Computer Specialist

    Satisfied Customers:

    7240
    Computer technician and founder of a home PC repair company.
 
 
 

Related Computer Questions

Chat Now With A Tech Support Specialist
Andy
Andy
Tech Support Specialist
5311 Satisfied Customers
11yr exp, Comp Engg, Internet expert, Web developer, SEO