How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Viet - Computer Tech Your Own Question

Viet - Computer Tech
Viet - Computer Tech, Computer Support Specialist
Category: Computer
Satisfied Customers: 26913
Experience:  Ten years of computer support. Microsoft MCP & CompTIA A+ certifications. Windows 8 7 Vista XP etc.
30037186
Type Your Computer Question Here...
Viet - Computer Tech is online now
A new question is answered every 9 seconds

Question 1 1 points Save The control unit is one

Customer Question

Question 1 1 points Save
The control unit is one component of the:
front side bus.
RAM.
clock.
CPU.



Question 2 1 points Save
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements.
HTML tags
Key pairs
Applets
Cascading style sheets (CSS)



Question 3 1 points Save
Which of the following was the first widely used operating system installed in personal computers?
Linux
Symbian OS
MS-DOS
Microsoft Windows



Question 4 1 points Save
As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as:
quality information assurance.
information safety assurance.
information quality control.
information assurance.



Question 5 1 points Save
Which of the following activities is carried out by the ALU?
movement of read/write heads
coordination of all other computer components
creation of virtual memory
completion of all arithmetic calculations



Question 6 1 points Save
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
Ethernet cable
the Internet
at least one server
software and hardware



Question 7 1 points Save
The location of a file is specified by its:
drive letter.
file extension.
file type.
file path.



Question 8 1 points Save
Which of the following is the first step in the boot process?
The BIOS checks that all devices are in place.
The OS is loaded into RAM.
Configuration and customization settings are checked.
The BIOS is activated by powering on the CPU.



Question 9 1 points Save
The Internet is:
a large network of networks.
the same as the Web.
a communication system for the U.S. government.
an internal communication system for a business.



Question 10 1 points Save
CPU speed is measured in:
gigahertz.
megahertz
kilohertz
bytes per second



Question 11 1 points Save
Which of the following are personal video journal entries posted on the Web?
vlogs
podcasts
newsgroups
blogs



Question 12 1 points Save
A ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
slot
drive
expansion bus
port



Question 13 1 points Save
________ is data that has been organized or presented in a meaningful fashion.
A character
A symbol
A number
Information



Question 14 1 points Save
All of the following are examples of multimedia EXCEPT:
MP3 music files.
text.
streaming video.
graphics.



Question 15 1 points Save
.com and .org are examples of:
HTML tags.
second-level domains.
network prefixes.
top-level domains.



Question 16 1 points Save
________ is the set of computer programs that enables the hardware to perform different tasks.
Data
Software
Hardware
Binary data



Question 17 1 points Save
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Upgrade Companion
Migrate Easy
Easy Transfer
Easy Sync



Question 18 1 points Save
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called:
podders.
plug-ins.
aggregators.
browsers.



Question 19 1 points Save
With regard to computer protection, quarantining is defined as:
deleting the infected file.
updating your antivirus software.
repairing the infected file.
placing a found virus in a secure area on the hard drive.



Question 20 1 points Save
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
DDoS
packet sniffer
Trojan horse
backdoor program



Question 21 1 points Save
Computers gather data, which means that they allow users to ________ data.
store
present
output
input



Question 22 1 points Save
________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
Bluebombing
Bluebugging
Bluestealing
Bluesnarfing



Question 23 1 points Save
To make sure your computer performs reliably, you can do all of the following EXCEPT:
clear out unnecessary files.
clean out your Startup folder.
run the Disk Defragmenter.
increase the front side bus speed.



Question 24 1 points Save
________ are electronic mailing lists of e-mail addresses of people who are interested in a certain topic or an area of interest.
Threads
Social networking sites
Listservs
Newsgroups



Question 25 1 points Save
The amount of RAM recommended for most systems today is measured in:
KB.
megahertz.
gigahertz.
GB.



Question 26 1 points Save
Which of the following statements about cookies is NOT true?
Cookies are text files.
Some companies sell the personal information found in cookies to other companies.
Cookies obtain your personal information by searching your hard drive.
Cookies help companies determine the traffic flow through their Web site.



Question 27 8 points Save
Each question has one answer.
- A. B. C. D. Which html tag starts the Web Page and ends the Web Page?
- A. B. C. D. Which html tag contains everything that shows up on the browser view of the Web Page?


- A. B. C. D. Which html tag contains the tag?
- A. B. C. D. Which html tag shows up on both the title bar of the browser view, as well as the tab of the browser page?


A.
B.
C.
D. <title




Question 28 1 points Save
Which of the following is NOT a step in the boot process?
The operating system is loaded into RAM.
The BIOS is activated by powering on the CPU.
Configuration and customization settings are checked.
The antivirus program checks all files for viruses.



Question 29 1 points Save
Flash drives plug into a(n):
serial port.
USB port.
expansion slot.
drive bay.



Question 30 1 points Save
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A Trojan horse
Port blocking
A polymorphic virus
A DDoS attack



Question 31 1 points Save
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
SSID
IP
network
MAC



Question 32 1 points Save
The most essential software in your computer system is the:
security software.
productivity software.
antivirus software.
operating system software.



Question 33 1 points Save
Kernel memory is:
permanent memory.
the amount of memory in the memory modules.
RAM memory used by the operating system.
faster than RAM.



Question 34 1 points Save
________ uses a dedicated connection between two points that remains active for the duration of transmission.
Circuit switching
Packet switching
An open circuit
A closed circuit



Question 35 1 points Save
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
the arithmetic logic unit and the front side bus
the control unit and cache memory
the control unit and the front side bus



Question 36 1 points Save
The ________ language consists of just two digits: 0 and 1.
base 10
binary
data processing
application



Question 37 1 points Save
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
BIOS
Device Manager
POST
Configuration Utility



Question 38 1 points Save
Facebook and MySpace are considered to be:
business-to-business Web sites.
phishing Web sites.
social networking Web sites.
e-commerce Web sites.



Question 39 1 points Save
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
disk backup
full backup
image backup
incremental backup



Question 40 1 points Save
The text version of a Web site's Internet address is called the:
Uniform Resource Locator (URL).
home page.
protocol.
IP address.



Question 41 1 points Save
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
folders.
files.
directories.
drives



Question 42 1 points Save
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
external hard drive
network
home server
online storage



Question 43 1 points Save
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
Utility
System
Binary
Application



Question 44 1 points Save
One or more network switches to which ISPs connect are referred to as:
points of presence.
Internet exchange points (IXPs).
router points.
gateway interfaces.



Question 45 1 points Save
The most common type of home network is:
a peer-to-peer (P2P) network.
a client/server network.
a token ring LAN.
a WAN.



Question 46 1 points Save
Any computer parts that you can actually touch are considered to be:
platforms.
hardware.
systems.
software.



Question 47 1 points Save
In the URL http://www.prenhall.com, the portion labeled http is the:
host.
domain name.
protocol.
top-level domain.



Question 48 1 points Save
Which of the following classifications of viruses can change its own code?
multipartite
polymorphic
worm
stealth



Question 49 1 points Save
By using a(n) ________, individual Internet users are able to connect to their ISP.
point of presence (POP)
OC line
backbone
T line



Question 50 1 points Save
Devices such as monitors and printers that are connected to the computer are called:
system devices.
input devices.
peripheral devices.
processing devices.



Question 51 1 points Save
When data is broken into smaller chunks to be sent over various routes at the same time, it is called:
packet switching.
circuit switching.
packaging.
handshaking.



Question 52 1 points Save
________ provides high speed information processing by enabling a new set of instructions to start before the previous set has been finished.
Hyperthreading
Overclocking
Multitasking
Cache memory



Question 53 1 points Save
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
network interface cards (NICs)
USB ports
firewalls



Question 54 1 points Save
The name of the free Internet browser from Mozilla is:
Safari.
Internet Explorer.
Firefox.
Opera.



Question 55 1 points Save
A set of rules for exchanging electronic information is called a:
style guide.
communication guide.
connectivity scheme.
protocol.



Question 56 1 points Save
Moore's Law is a rule that predicts:
the speed of the front side bus.
the pace at which CPUs improve.
the data transfer rate for a hard drive.
the access time of the read/write head.



Question 57 1 points Save
________ are high-speed, fiber-optic communications lines.
T lines
OC lines
DSL lines
Cable lines



Question 58 1 points Save
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as:
information recorders.
spy loggers.
keystroke loggers.
keystroke spies



Question 59 1 points Save
HTTP is the abbreviation for:
Hyper Transmission Protocol.
Hypertext Transfer Protocol.
Hypertext Protocol.
Hypertext Transmission Protocol.



Question 60 1 points Save
A cyberspace ________ is an attempt to make someone believe something that is untrue.
legend
prank
joke
hoax



Question 61 1 points Save
Which of the following is NOT one of the four major data-processing functions of a computer?
gathering data
analyzing the data or information
processing data into information
storing the data or information



Question 62 8 points Save
There is one answer for each statement.
- A. B. C. D. This html tag(s) will show an animated image on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a hyperlink on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a list on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a personal link on the browser view of the Web Page.
A.
  • books
  • paper

B. click here
C. sport image
D. click here




Question 63 1 points Save
A computer system becomes memory bound when:
there is not enough RAM installed.
the arithmetic logic unit (ALU) becomes overloaded with data.
there is not enough virtual memory.
the front side bus (FSB) is too fast.



Question 64 1 points Save
The ________ contains all of the different configurations used by the OS and by other applications.
kernel
registry
BIOS
CMOS



Question 65 1 points Save
When your computer is using virtual memory, the operating system builds a file called the ________ on the hard drive that allows processing to continue.
swap file
page file
RAM file
cache file



Question 66 1 points Save
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
Sidebars
Gadgets
Ribbons
Mini-apps



Question 67 1 points Save
The hard disk drive is a ________ storage device, meaning that it stores data permanently.
temporary
random
volatile
nonvolatile



Question 68 1 points Save
Cache memory levels are determined by:
the speed of the chip.
the chip's proximity to the CPU.
the amount of storage space on the chip.
the physical size of the chip.



Question 69 8 points Save
Each statement has one answer.
- A. B. C. D. This html tag(s) will show up in the code and not on the Web Page.
- A. B. C. D. This html tag(s) will create a line across the browser view of a Web Page.
- A. B. C. D. This html tag(s) will change the text color to green.
- A. B. C. D. This html tag(s) will create an email link on a Web Page.
A. click here
B.

C.
D. family




Question 70 1 points Save
Which of the following is NOT a function of the operating system?
It provides a user interface.
It provides a way for software applications to work with the CPU.
It manages the removal of spyware.
It manages the processor.



Question 71 1 points Save
For Ethernet cables that run more than 100 meters, you can use ________ to boost the signal.
routers
switches
amplifiers
repeaters



Question 72 1 points Save
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
FTP
COM
HTTP
WWW



Question 73 1 points Save
The agency that first began funding the Internet was called the:
Science Research Projects Agency.
Advanced Research Computing Agency.
National Science Foundation.
Advanced Research Projects Agency.



Question 74 1 points Save
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
launch a denial of service (DoS) attack on your computer.
steal your logon and passwords for various accounts.
use your debit card information to purchase items illegally.
assume your identity.



Question 75 1 points Save
Network architectures are classified according to:
the speed at which the processor runs.
the bandwidth supplied by the connection.
the distance between the hub and the router.
the way they are controlled and the distance between their nodes.



Question 76 1 points Save
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
polymorphic virus
script virus
worm



Question 77 1 points Save
One way to increase security on a network is by installing a:
hub.
firewall.
network adapter.
security policy.



Question 78 1 points Save
The ________ contains all of the central electronic components of the computer.
peripheral unit.
motherboard.
input unit.
system unit.



Question 79 1 points Save
________ binary digits (or bits) combine to create one byte.
Eight
Two
Sixteen
Ten



Question 80 1 points Save
All the following are examples of input devices EXCEPT a:
scanner.
mouse.
printer.
keyboard.



Question 81 1 points Save
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
switch
hub
amplifier
router



Question 82 1 points Save
An expansion card that translates binary data into images is a(n):
video card.
audio card.
game card.
sound card.



Question 83 1 points Save
The main paths of the Internet along which data travels the fastest are known collectively as the Internet ________.
highway
spine
backbone
mainline



Question 84 1 points Save
Throughput, the actual speed of data transfer that is achieved in a network, is usually:
the same as the data transfer rate.
at least the same as the data transfer rate, but often less.
less than the data transfer rate.
more than the data transfer rate.



Question 85 1 points Save
The CPU is connected to the system memory by the:
expansion card.
cache memory.
expansion hub.
front side bus.



Question 86 1 points Save
Before upgrading your OS, you should back up your:
BIOS
data files.
ROM.
system files.



Question 87 1 points Save
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing:
a packet filter.
a firewall.
a packet sniffer.
antivirus software.



Question 88 1 points Save
Which of the following UTP cable types is the cheapest and often used in home networks?
Cat 5E
Cat 4
Cat 6
Cat 7



Question 89 1 points Save
Computers running specialized operating systems that enable them to host Web pages and other information are called:
file servers.
Web servers.
commerce servers.
DNS servers.



Question 90 1 points Save
At a minimum, what content must all data packets contain?
recipient's address, reassembling instructions, packet size, and data
sender's address, packet type, packet size, and data
sender's address, packet size, reassembling instructions, and data
recipient's address, sender's address, reassembling instructions, and data



Question 91 1 points Save
Podcasts enable you to
communicate with friends in real time.
post journal entries on the Web.
broadcast over the Internet using compressed audio files such as MP3s and MP4s.
edit video files over the Web.



Question 92 1 points Save
A Webcast is:
a device needed for podcast.
a podcast that is updated automatically.
another name for a podcast.
the broadcast of audio or video content over the Internet.



Question 93 1 points Save
________ switching has been used since the early days of the telephone for establishing communication.
Circuit
Static
Dynamic
Packet



Question 94 1 points Save
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
time bomb
Trojan horse
boot-sector virus
logic bomb



Question 95 1 points Save
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a hub
a DSL/cable router
a switch
a cable



Question 96 1 points Save
The basic input/output system is stored on a ________ chip.
RAM
CPU
ROM
CMOS



Question 97 1 points Save
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
modems
routers
switches
network interface cards (NICs)



Question 98 1 points Save
Which of the following has the greatest bandwidth?
OC lines
T-1 lines
conventional telephone lines
T-3 lines



Question 99 1 points Save
The purpose of network address translation (NAT) is to:
dynamically assign IP addresses via an ISP.
translate IP addresses from the Internet.
convert logical ports to physical port configurations.
hide user IP addresses from the Internet.



Question 100 1 points Save
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
a power-line adapter
a modem
both a wireless and wired network adapter
a transceiver



Question 101 1 points Save
The small circuit boards that hold a series of RAM chips are called:
flash memory cards.
expansion cards.
virtual memory.
memory modules.



Question 102 1 points Save
Most ________ allow you to connect wireless and wired computers to the same network.
wireless routers
transceivers
modems
servers



Question 103 1 points Save
An IP address that is assigned from an available pool of IP addresses is called a(n):
assigned address.
static address.
mobile address.
dynamic address.



Question 104 1 points Save
Which of the following statements about Apple Mac OS is TRUE?
Mac OS was the first OS to use a graphical user interface.
Mac systems are less expensive than Windows-based PCs.
There are more software applications available for the Mac OS than for Windows-based PCs.
Mac OS can be used on Windows-based PCs.



Question 105 1 points Save
An IP address that does not change and is usually assigned manually by a network administrator is called a(n):
stationary address.
dynamic address.
fixed address.
static address.



Question 106 1 points Save
All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:
you are experiencing interference with a wireless Ethernet network.
power-line networks cost less.
power-line networks can be easier to install.
you don't need to run new wires with a power-line network.



Question 107 1 points Save
The protocol that transfers HTML data from servers to browsers is:
FTP.
HTTP.
TCP.
UDP.



Question 108 1 points Save
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
virtual
physical
permanent
nonvolatile



Question 109 1 points Save
Who funded the development of technologies that would eventually become the Internet?
the United Nations
Russia
Japan
the United States government



Question 110 1 points Save
Computers that host software that enables users to purchase goods and services over the Internet are called ________ servers.
commerce
online
shopping
sales



Question 111 1 points Save
You can keep track of IM contacts by using a:
breadcrumb trail.
search engine.
people finder.
buddy list.



Question 112 1 points Save
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
processor
CMOS
kernel
BIOS



Question 113 1 points Save
Rules for creating passwords include all of the following EXCEPT:
change your password frequently.
create a hard-to-guess password, with a combination of letters and numbers.
keep your password written down and stored in any easy-to-remember location.
keep your password a secret.



Question 114 1 points Save
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
transmission speed
node speed
throughput



Question 115 1 points Save
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
phishing
social networking
hacking



Question 116 1 points Save
Some video games require a ________ operating system.
real-time
multiuser
single-user, multitask
single-user, single-task



Question 117 1 points Save
Which of the following devices is needed to share an Internet connection on a wireless network?
a modem
a fiber-optic cable
a wireless router
a wireless hub



Question 118 1 points Save
In the URL http://www.prenhall.com, the portion labeled .com is the:
host.
domain name.
top-level domain.
protocol.



Question 119 8 points Save
Each question has one answer.
- A. B. C. D. What are the points given for a Personal Link on the Final Web Assignment?
- A. B. C. D. What are the points given for all four images (including the alt tag) on the Final Web Page?
- A. B. C. D. What are the points given for the target/anchor on the Final Web Assignment?
- A. B. C. D. What are the points given for the Home Page on the Final Web Assignment?
A. 12 points
B. 5 points
C. 4 points
D. 10 points




Question 120 1 points Save
All of the following are terms related to part of the boot process EXCEPT:
ROM.
USB.
BIOS.
RAM.



Question 121 1 points Save
All of the following are parts of a URL (Web site address) EXCEPT:
the domain name.
the protocol.
hyperlinks.
WWW.



Question 122 1 points Save
Running the Disk Defragmenter utility will:
make the hard drive work more efficiently.
detect and remove spyware.
clear out temporary Internet files.
clean out your Startup folder.



Question 123 1 points Save
A unique number that identifies a computer, server, or device connected to the Internet is called a(n):
TCP address.
CGI address.
NetBIOS address.
IP address.



Question 124 1 points Save
Running the Disk Cleanup utility is a quick way to:
remove spyware programs.
defrag your hard drive.
clear out unnecessary files.
clean out your Startup folder.



Question 125 1 points Save
Which of the following is NOT an example of a network node?
a printer
a computer
a modem
a mouse



Question 126 1 points Save
Restarting a computer when it is already powered on is called:
hibernation.
a cold boot.
a warm boot.
standby mode.



Question 127 1 points Save
The organization responsible for the Internet's domain name system and IP address allocation is:
IAB.
ICANN.
ISOC.
W3C.



Question 128 1 points Save
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
user management
memory management
processor management
software application coordination



Question 129 1 points Save
All of the following can be used for backing up data files EXCEPT:
RAM.
DVDs.
external hard drives.
flash drives.



Question 130 1 points Save
Each of the following is a computer subsystem EXCEPT the:
data subsystem.
memory subsystem.
storage subsystem.
CPU subsystem.



Question 131 1 points Save
Which of the following devices translates electronic data into radio waves?
a receiver
a modem
a fiber-optic cable
a transceiver



Question 132 1 points Save
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
RAM
swap
memory
virtual



Question 133 1 points Save
Adware and spyware are referred to collectively as:
alertware
firmware.
viruses.
grayware.



Question 134 1 points Save
Used since the early days of the telephone, ________ uses a dedicated connection between two points that remains active during transmission.
packet routing
circuit switching
packet switching
TCP/IP



Question 135 1 points Save
Podcasts use which of the following technologies?
an open source software application for 3D modeling
Vlog
MSN Messenger
RSS



Question 136 1 points Save
Microsoft Windows and Mac OS use a ________ interface.
graphical user
virtual
command-driven
menu-driven



Question 137 1 points Save
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
libraries
directories
collections
groups



Question 138 1 points Save
The "s" in https stands for:
secure socket layer.
shop secure layer.
secure socket logon.
safety secured logon.



Question 139 1 points Save
A set of programs that searches the Web to find information is called a:
phisher.
search engine.
browser.
breadcrumb list.
Submitted: 3 years ago.
Category: Computer
Expert:  Viet - Computer Tech replied 3 years ago.

Viet - Computer Tech :

Hi,

Viet - Computer Tech :

There are 139 questions in this, and it's only for $16. This would take too much time, please increase amount.

Customer :

ok how?

Viet - Computer Tech :

You can create another question and put in the amount. I will tell the moderator to close this question. Also, can you attach the questions in a document or text file to JustAnswer, or http://www.mediafire.com. It's easy to read that way.

Viet - Computer Tech :

Let me know the new link to the question. Or you can just wait until our moderator request you to increase the price.

Customer :

ok hold on

Viet - Computer Tech :

ok

Viet - Computer Tech :

Please stay on this question (please do not reply on your new question as it's still $16). The moderator will contact you about the price later.

Viet - Computer Tech :

This is a long issue, so it will take me some time to answer.

Viet - Computer Tech :

You can bookmark this web page to get back to me:
http://www.justanswer.com/computer/4b5l1-question-points-save-control-unit-one.html

Viet - Computer Tech :

Please do not create any more question.

Viet - Computer Tech :

Please stay on this question.

Viet - Computer Tech :

I will reply you when I have all the answers.

Viet - Computer Tech :

I will request this question to be closed as it is resolved on the other question:
http://www.justanswer.com/computer/4b5rq-question-points-save-the-co.html?L=T

Viet - Computer Tech :

Thanks.

Expert:  Viet - Computer Tech replied 3 years ago.
What Happens Now?

Your chat has ended, but you can still work with your Expert to get an answer to your question if you have not yet received one.

Come back to this page at any time to see additional information from your Expert.  You will also receive an email when your question is updated.  If you want to send a message to your Expert, use the box below.

If you have already received a satisfactory answer to your question, click the Accept button above.  Experts are credited for each accepted answer they provide.

JustAnswer in the News:

 
 
 
Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.
 
 
 

What Customers are Saying:

 
 
 
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
< Last | Next >
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
  • I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you! RP Austin, TX
  • Hi John, Thank you for your expertise and, more important, for your kindness because they make me, almost, look forward to my next computer problem. After the next problem comes, I'll be delighted to correspond again with you. I'm told that I excel at programing. But system administration has never been one of my talents. So it's great to have an expert to rely on when the computer decides to stump me. God bless, Bill Bill M. Schenectady, New York
  • The Expert answered my Mac question and was patient. He answered in a thorough and timely manner, keeping the response on a level that could understand. Thank you! Frank Canada
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
 
 
 

Meet The Experts:

 
 
 
  • Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
< Last | Next >
  • http://ww2.justanswer.com/uploads/EN/Engineer1010/2012-6-9_132423_jaj12a.64x64.jpg Andy's Avatar

    Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
  • http://ww2.justanswer.com/uploads/BA/barrenrock/2011-10-19_215925_JamesJAFinal.64x64.jpg James's Avatar

    James

    Sr. Computer Support Expert

    Satisfied Customers:

    8376
    20 years of experience building, fixing and servicing PCs and operating systems.
  • http://ww2.justanswer.com/uploads/zeyank/2009-09-26_154244_P8110079.png Ryan H.'s Avatar

    Ryan H.

    Computer Support Specialist

    Satisfied Customers:

    1741
    A+ Certified Technician - 10 Years experience working with all types of computer systems.
  • http://ww2.justanswer.com/uploads/JA/jadedangel57/2011-11-8_193134_janenewsm.64x64.jpg Jane Lefler's Avatar

    Jane Lefler

    Sr Prog Analyst / Technician

    Satisfied Customers:

    0
    Computer Programmer / Technician/ Consultant 16+ years
  • http://ww2.justanswer.com/uploads/RO/robmpreston/2013-9-23_233814_mijiFZm.64x64.jpg RPI Solutions's Avatar

    RPI Solutions

    Support Specialist

    Satisfied Customers:

    3476
    5+ Years in IT, BS in Computer Science
  • http://ww2.justanswer.com/uploads/BA/barunrath/2012-7-5_201954_Profilepic2.64x64.jpg B. Rath's Avatar

    B. Rath

    Computer Support Specialist

    Satisfied Customers:

    8671
    Certified Computer/Networking Support Specialist.
  • http://ww2.justanswer.com/uploads/FS/fszcze/2012-6-18_181848_500test.64x64.jpg Frederick S.'s Avatar

    Frederick S.

    Computer Specialist

    Satisfied Customers:

    7240
    Computer technician and founder of a home PC repair company.
 
 
 

Related Computer Questions

Chat Now With A Tech Support Specialist
Viet - Computer Tech
Viet - Computer Tech
Tech Support Specialist
26913 Satisfied Customers
Ten years of computer support. Microsoft MCP & CompTIA A+ certifications. Windows 8 7 Vista XP etc.