How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Viet - Computer Tech Your Own Question

Viet - Computer Tech
Viet - Computer Tech, Computer Support Specialist
Category: Computer
Satisfied Customers: 25768
Experience:  Ten years of computer support. Microsoft MCP & CompTIA A+ certifications. Windows 8 7 Vista XP etc.
30037186
Type Your Computer Question Here...
Viet - Computer Tech is online now
A new question is answered every 9 seconds

Question 1 1 points Save The co

Customer Question

Question 1 1 pointsSave
The control unit is one component of the:
front side bus.
RAM.
clock.
CPU.



Question 2 1 pointsSave
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements.
HTML tags
Key pairs
Applets
Cascading style sheets (CSS)



Question 3 1 pointsSave
Which of the following was the first widely used operating system installed in personal computers?
Linux
Symbian OS
MS-DOS
Microsoft Windows



Question 4 1 pointsSave
As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as:
quality information assurance.
information safety assurance.
information quality control.
information assurance.



Question 5 1 pointsSave
Which of the following activities is carried out by the ALU?
movement of read/write heads
coordination of all other computer components
creation of virtual memory
completion of all arithmetic calculations



Question 6 1 pointsSave
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
Ethernet cable
the Internet
at least one server
software and hardware



Question 7 1 pointsSave
The location of a file is specified by its:
drive letter.
file extension.
file type.
file path.



Question 8 1 pointsSave
Which of the following is the first step in the boot process?
The BIOS checks that all devices are in place.
The OS is loaded into RAM.
Configuration and customization settings are checked.
The BIOS is activated by powering on the CPU.



Question 9 1 pointsSave
The Internet is:
a large network of networks.
the same as the Web.
a communication system for the U.S. government.
an internal communication system for a business.



Question 10 1 pointsSave
CPU speed is measured in:
gigahertz.
megahertz
kilohertz
bytes per second



Question 11 1 pointsSave
Which of the following are personal video journal entries posted on the Web?
vlogs
podcasts
newsgroups
blogs



Question 12 1 pointsSave
A ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
slot
drive
expansion bus
port



Question 13 1 pointsSave
________ is data that has been organized or presented in a meaningful fashion.
A character
A symbol
A number
Information



Question 14 1 pointsSave
All of the following are examples of multimedia EXCEPT:
MP3 music files.
text.
streaming video.
graphics.



Question 15 1 pointsSave
.com and .org are examples of:
HTML tags.
second-level domains.
network prefixes.
top-level domains.



Question 16 1 pointsSave
________ is the set of computer programs that enables the hardware to perform different tasks.
Data
Software
Hardware
Binary data



Question 17 1 pointsSave
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Upgrade Companion
Migrate Easy
Easy Transfer
Easy Sync



Question 18 1 pointsSave
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called:
podders.
plug-ins.
aggregators.
browsers.



Question 19 1 pointsSave
With regard to computer protection, quarantining is defined as:
deleting the infected file.
updating your antivirus software.
repairing the infected file.
placing a found virus in a secure area on the hard drive.



Question 20 1 pointsSave
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
DDoS
packet sniffer
Trojan horse
backdoor program



Question 21 1 pointsSave
Computers gather data, which means that they allow users to ________ data.
store
present
output
input



Question 22 1 pointsSave
________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
Bluebombing
Bluebugging
Bluestealing
Bluesnarfing



Question 23 1 pointsSave
To make sure your computer performs reliably, you can do all of the following EXCEPT:
clear out unnecessary files.
clean out your Startup folder.
run the Disk Defragmenter.
increase the front side bus speed.



Question 24 1 pointsSave
________ are electronic mailing lists of e-mail addresses of people who are interested in a certain topic or an area of interest.
Threads
Social networking sites
Listservs
Newsgroups



Question 25 1 pointsSave
The amount of RAM recommended for most systems today is measured in:
KB.
megahertz.
gigahertz.
GB.



Question 26 1 pointsSave
Which of the following statements about cookies is NOT true?
Cookies are text files.
Some companies sell the personal information found in cookies to other companies.
Cookies obtain your personal information by searching your hard drive.
Cookies help companies determine the traffic flow through their Web site.



Question 27 8 pointsSave
Each question has one answer.
- A. B. C. D. Which html tag starts the Web Page and ends the Web Page?
- A. B. C. D. Which html tag contains everything that shows up on the browser view of the Web Page?


- A. B. C. D.Which html tag contains the tag?
- A. B. C. D. Which html tag shows up on both the title bar of the browser view, as well as the tab of the browser page?


A.
B.
C.
D. <title




Question 28 1 pointsSave
Which of the following is NOT a step in the boot process?
The operating system is loaded into RAM.
The BIOS is activated by powering on the CPU.
Configuration and customization settings are checked.
The antivirus program checks all files for viruses.



Question 29 1 pointsSave
Flash drives plug into a(n):
serial port.
USB port.
expansion slot.
drive bay.



Question 30 1 pointsSave
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A Trojan horse
Port blocking
A polymorphic virus
A DDoS attack



Question 31 1 pointsSave
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
SSID
IP
network
MAC



Question 32 1 pointsSave
The most essential software in your computer system is the:
security software.
productivity software.
antivirus software.
operating system software.



Question 33 1 pointsSave
Kernel memory is:
permanent memory.
the amount of memory in the memory modules.
RAM memory used by the operating system.
faster than RAM.



Question 34 1 pointsSave
________ uses a dedicated connection between two points that remains active for the duration of transmission.
Circuit switching
Packet switching
An open circuit
A closed circuit



Question 35 1 pointsSave
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
the arithmetic logic unit and the front side bus
the control unit and cache memory
the control unit and the front side bus



Question 36 1 pointsSave
The ________ language consists of just two digits: 0 and 1.
base 10
binary
data processing
application



Question 37 1 pointsSave
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
BIOS
Device Manager
POST
Configuration Utility



Question 38 1 pointsSave
Facebook and MySpace are considered to be:
business-to-business Web sites.
phishing Web sites.
social networking Web sites.
e-commerce Web sites.



Question 39 1 pointsSave
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
disk backup
full backup
image backup
incremental backup



Question 40 1 pointsSave
The text version of a Web site's Internet address is called the:
Uniform Resource Locator (URL).
home page.
protocol.
IP address.



Question 41 1 pointsSave
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
folders.
files.
directories.
drives



Question 42 1 pointsSave
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
external hard drive
network
home server
online storage



Question 43 1 pointsSave
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
Utility
System
Binary
Application



Question 44 1 pointsSave
One or more network switches to which ISPs connect are referred to as:
points of presence.
Internet exchange points (IXPs).
router points.
gateway interfaces.



Question 45 1 pointsSave
The most common type of home network is:
a peer-to-peer (P2P) network.
a client/server network.
a token ring LAN.
a WAN.



Question 46 1 pointsSave
Any computer parts that you can actually touch are considered to be:
platforms.
hardware.
systems.
software.



Question 47 1 pointsSave
In the URL http://www.prenhall.com, the portion labeled http is the:
host.
domain name.
protocol.
top-level domain.



Question 48 1 pointsSave
Which of the following classifications of viruses can change its own code?
multipartite
polymorphic
worm
stealth



Question 49 1 pointsSave
By using a(n) ________, individual Internet users are able to connect to their ISP.
point of presence (POP)
OC line
backbone
T line



Question 50 1 pointsSave
Devices such as monitors and printers that are connected to the computer are called:
system devices.
input devices.
peripheral devices.
processing devices.



Question 51 1 pointsSave
When data is broken into smaller chunks to be sent over various routes at the same time, it is called:
packet switching.
circuit switching.
packaging.
handshaking.



Question 52 1 pointsSave
________ provides high speed information processing by enabling a new set of instructions to start before the previous set has been finished.
Hyperthreading
Overclocking
Multitasking
Cache memory



Question 53 1 pointsSave
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
network interface cards (NICs)
USB ports
firewalls



Question 54 1 pointsSave
The name of the free Internet browser from Mozilla is:
Safari.
Internet Explorer.
Firefox.
Opera.



Question 55 1 pointsSave
A set of rules for exchanging electronic information is called a:
style guide.
communication guide.
connectivity scheme.
protocol.



Question 56 1 pointsSave
Moore's Law is a rule that predicts:
the speed of the front side bus.
the pace at which CPUs improve.
the data transfer rate for a hard drive.
the access time of the read/write head.



Question 57 1 pointsSave
________ are high-speed, fiber-optic communications lines.
T lines
OC lines
DSL lines
Cable lines



Question 58 1 pointsSave
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as:
information recorders.
spy loggers.
keystroke loggers.
keystroke spies



Question 59 1 pointsSave
HTTP is the abbreviation for:
Hyper Transmission Protocol.
Hypertext Transfer Protocol.
Hypertext Protocol.
Hypertext Transmission Protocol.



Question 60 1 pointsSave
A cyberspace ________ is an attempt to make someone believe something that is untrue.
legend
prank
joke
hoax



Question 61 1 pointsSave
Which of the following is NOT one of the four major data-processing functions of a computer?
gathering data
analyzing the data or information
processing data into information
storing the data or information



Question 62 8 pointsSave
There is one answer for each statement.
- A. B. C. D. This html tag(s) will show an animated image on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a hyperlink on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a list on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a personal link on the browser view of the Web Page.
A. bookspaper
B. click here
C.
D. click here




Question 63 1 pointsSave
A computer system becomes memory bound when:
there is not enough RAM installed.
the arithmetic logic unit (ALU) becomes overloaded with data.
there is not enough virtual memory.
the front side bus (FSB) is too fast.



Question 64 1 pointsSave
The ________ contains all of the different configurations used by the OS and by other applications.
kernel
registry
BIOS
CMOS



Question 65 1 pointsSave
When your computer is using virtual memory, the operating system builds a file called the ________ on the hard drive that allows processing to continue.
swap file
page file
RAM file
cache file



Question 66 1 pointsSave
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
Sidebars
Gadgets
Ribbons
Mini-apps



Question 67 1 pointsSave
The hard disk drive is a ________ storage device, meaning that it stores data permanently.
temporary
random
volatile
nonvolatile



Question 68 1 pointsSave
Cache memory levels are determined by:
the speed of the chip.
the chip's proximity to the CPU.
the amount of storage space on the chip.
the physical size of the chip.



Question 69 8 pointsSave
Each statement has one answer.
- A. B. C. D. This html tag(s) will show up in the code and not on the Web Page.
- A. B. C. D. This html tag(s) will create a line across the browser view of a Web Page.
- A. B. C. D.This html tag(s) will change the text color to green.
- A. B. C. D.This html tag(s) will create an email link on a Web Page.
A. click here
B.
C.
D. family




Question 70 1 pointsSave
Which of the following is NOT a function of the operating system?
It provides a user interface.
It provides a way for software applications to work with the CPU.
It manages the removal of spyware.
It manages the processor.



Question 71 1 pointsSave
For Ethernet cables that run more than 100 meters, you can use ________ to boost the signal.
routers
switches
amplifiers
repeaters



Question 72 1 pointsSave
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
FTP
COM
HTTP
WWW



Question 73 1 pointsSave
The agency that first began funding the Internet was called the:
Science Research Projects Agency.
Advanced Research Computing Agency.
National Science Foundation.
Advanced Research Projects Agency.



Question 74 1 pointsSave
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
launch a denial of service (DoS) attack on your computer.
steal your logon and passwords for various accounts.
use your debit card information to purchase items illegally.
assume your identity.



Question 75 1 pointsSave
Network architectures are classified according to:
the speed at which the processor runs.
the bandwidth supplied by the connection.
the distance between the hub and the router.
the way they are controlled and the distance between their nodes.



Question 76 1 pointsSave
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
polymorphic virus
script virus
worm



Question 77 1 pointsSave
One way to increase security on a network is by installing a:
hub.
firewall.
network adapter.
security policy.



Question 78 1 pointsSave
The ________ contains all of the central electronic components of the computer.
peripheral unit.
motherboard.
input unit.
system unit.



Question 79 1 pointsSave
________ binary digits (or bits) combine to create one byte.
Eight
Two
Sixteen
Ten



Question 80 1 pointsSave
All the following are examples of input devices EXCEPT a:
scanner.
mouse.
printer.
keyboard.



Question 81 1 pointsSave
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
switch
hub
amplifier
router



Question 82 1 pointsSave
An expansion card that translates binary data into images is a(n):
video card.
audio card.
game card.
sound card.



Question 83 1 pointsSave
The main paths of the Internet along which data travels the fastest are known collectively as the Internet ________.
highway
spine
backbone
mainline



Question 84 1 pointsSave
Throughput, the actual speed of data transfer that is achieved in a network, is usually:
the same as the data transfer rate.
at least the same as the data transfer rate, but often less.
less than the data transfer rate.
more than the data transfer rate.



Question 85 1 pointsSave
The CPU is connected to the system memory by the:
expansion card.
cache memory.
expansion hub.
front side bus.



Question 86 1 pointsSave
Before upgrading your OS, you should back up your:
BIOS
data files.
ROM.
system files.



Question 87 1 pointsSave
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing:
a packet filter.
a firewall.
a packet sniffer.
antivirus software.



Question 88 1 pointsSave
Which of the following UTP cable types is the cheapest and often used in home networks?
Cat 5E
Cat 4
Cat 6
Cat 7



Question 89 1 pointsSave
Computers running specialized operating systems that enable them to host Web pages and other information are called:
file servers.
Web servers.
commerce servers.
DNS servers.



Question 90 1 pointsSave
At a minimum, what content must all data packets contain?
recipient's address, reassembling instructions, packet size, and data
sender's address, packet type, packet size, and data
sender's address, packet size, reassembling instructions, and data
recipient's address, sender's address, reassembling instructions, and data



Question 91 1 pointsSave
Podcasts enable you to
communicate with friends in real time.
post journal entries on the Web.
broadcast over the Internet using compressed audio files such as MP3s and MP4s.
edit video files over the Web.



Question 92 1 pointsSave
A Webcast is:
a device needed for podcast.
a podcast that is updated automatically.
another name for a podcast.
the broadcast of audio or video content over the Internet.



Question 93 1 pointsSave
________ switching has been used since the early days of the telephone for establishing communication.
Circuit
Static
Dynamic
Packet



Question 94 1 pointsSave
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
time bomb
Trojan horse
boot-sector virus
logic bomb



Question 95 1 pointsSave
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a hub
a DSL/cable router
a switch
a cable



Question 96 1 pointsSave
The basic input/output system is stored on a ________ chip.
RAM
CPU
ROM
CMOS



Question 97 1 pointsSave
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
modems
routers
switches
network interface cards (NICs)



Question 98 1 pointsSave
Which of the following has the greatest bandwidth?
OC lines
T-1 lines
conventional telephone lines
T-3 lines



Question 99 1 pointsSave
The purpose of network address translation (NAT) is to:
dynamically assign IP addresses via an ISP.
translate IP addresses from the Internet.
convert logical ports to physical port configurations.
hide user IP addresses from the Internet.



Question 100 1 pointsSave
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
a power-line adapter
a modem
both a wireless and wired network adapter
a transceiver



Question 101 1 pointsSave
The small circuit boards that hold a series of RAM chips are called:
flash memory cards.
expansion cards.
virtual memory.
memory modules.



Question 102 1 pointsSave
Most ________ allow you to connect wireless and wired computers to the same network.
wireless routers
transceivers
modems
servers



Question 103 1 pointsSave
An IP address that is assigned from an available pool of IP addresses is called a(n):
assigned address.
static address.
mobile address.
dynamic address.



Question 104 1 pointsSave
Which of the following statements about Apple Mac OS is TRUE?
Mac OS was the first OS to use a graphical user interface.
Mac systems are less expensive than Windows-based PCs.
There are more software applications available for the Mac OS than for Windows-based PCs.
Mac OS can be used on Windows-based PCs.



Question 105 1 pointsSave
An IP address that does not change and is usually assigned manually by a network administrator is called a(n):
stationary address.
dynamic address.
fixed address.
static address.



Question 106 1 pointsSave
All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:
you are experiencing interference with a wireless Ethernet network.
power-line networks cost less.
power-line networks can be easier to install.
you don't need to run new wires with a power-line network.



Question 107 1 pointsSave
The protocol that transfers HTML data from servers to browsers is:
FTP.
HTTP.
TCP.
UDP.



Question 108 1 pointsSave
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
virtual
physical
permanent
nonvolatile



Question 109 1 pointsSave
Who funded the development of technologies that would eventually become the Internet?
the United Nations
Russia
Japan
the United States government



Question 110 1 pointsSave
Computers that host software that enables users to purchase goods and services over the Internet are called ________ servers.
commerce
online
shopping
sales



Question 111 1 pointsSave
You can keep track of IM contacts by using a:
breadcrumb trail.
search engine.
people finder.
buddy list.



Question 112 1 pointsSave
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
processor
CMOS
kernel
BIOS



Question 113 1 pointsSave
Rules for creating passwords include all of the following EXCEPT:
change your password XXXXX
create a hard-to-guess password, with a combination of letters and numbers.
keep your password XXXXX down and stored in any easy-to-remember location.
keep your password XXXXX secret.



Question 114 1 pointsSave
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
transmission speed
node speed
throughput



Question 115 1 pointsSave
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
phishing
social networking
hacking



Question 116 1 pointsSave
Some video games require a ________ operating system.
real-time
multiuser
single-user, multitask
single-user, single-task



Question 117 1 pointsSave
Which of the following devices is needed to share an Internet connection on a wireless network?
a modem
a fiber-optic cable
a wireless router
a wireless hub



Question 118 1 pointsSave
In the URL http://www.prenhall.com, the portion labeled .com is the:
host.
domain name.
top-level domain.
protocol.



Question 119 8 pointsSave
Each question has one answer.
- A. B. C. D.What are the points given for a Personal Link on the Final Web Assignment?
- A. B. C. D.What are the points given for all four images (including the alt tag) on the Final Web Page?
- A. B. C. D. What are the points given for the target/anchor on the Final Web Assignment?
- A. B. C. D.What are the points given for the Home Page on the Final Web Assignment?
A. 12 points
B. 5 points
C. 4 points
D. 10 points




Question 120 1 pointsSave
All of the following are terms related to part of the boot process EXCEPT:
ROM.
USB.
BIOS.
RAM.



Question 121 1 pointsSave
All of the following are parts of a URL (Web site address) EXCEPT:
the domain name.
the protocol.
hyperlinks.
WWW.



Question 122 1 pointsSave
Running the Disk Defragmenter utility will:
make the hard drive work more efficiently.
detect and remove spyware.
clear out temporary Internet files.
clean out your Startup folder.



Question 123 1 pointsSave
A unique number that identifies a computer, server, or device connected to the Internet is called a(n):
TCP address.
CGI address.
NetBIOS address.
IP address.



Question 124 1 pointsSave
Running the Disk Cleanup utility is a quick way to:
remove spyware programs.
defrag your hard drive.
clear out unnecessary files.
clean out your Startup folder.



Question 125 1 pointsSave
Which of the following is NOT an example of a network node?
a printer
a computer
a modem
a mouse



Question 126 1 pointsSave
Restarting a computer when it is already powered on is called:
hibernation.
a cold boot.
a warm boot.
standby mode.



Question 127 1 pointsSave
The organization responsible for the Internet's domain name system and IP address allocation is:
IAB.
ICANN.
ISOC.
W3C.



Question 128 1 pointsSave
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
user management
memory management
processor management
software application coordination



Question 129 1 pointsSave
All of the following can be used for backing up data files EXCEPT:
RAM.
DVDs.
external hard drives.
flash drives.



Question 130 1 pointsSave
Each of the following is a computer subsystem EXCEPT the:
data subsystem.
memory subsystem.
storage subsystem.
CPU subsystem.



Question 131 1 pointsSave
Which of the following devices translates electronic data into radio waves?
a receiver
a modem
a fiber-optic cable
a transceiver



Question 132 1 pointsSave
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
RAM
swap
memory
virtual



Question 133 1 pointsSave
Adware and spyware are referred to collectively as:
alertware
firmware.
viruses.
grayware.



Question 134 1 pointsSave
Used since the early days of the telephone, ________ uses a dedicated connection between two points that remains active during transmission.
packet routing
circuit switching
packet switching
TCP/IP



Question 135 1 pointsSave
Podcasts use which of the following technologies?
an open source software application for 3D modeling
Vlog
MSN Messenger
RSS



Question 136 1 pointsSave
Microsoft Windows and Mac OS use a ________ interface.
graphical user
virtual
command-driven
menu-driven



Question 137 1 pointsSave
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
libraries
directories
collections
groups



Question 138 1 pointsSave
The "s" in https stands for:
secure socket layer.
shop secure layer.
secure socket logon.
safety secured logon.



Question 139 1 pointsSave
A set of programs that searches the Web to find information is called a:
phisher.
search engine.
browser.
breadcrumb list.
Submitted: 3 years ago.
Category: Computer
Expert:  Viet - Computer Tech replied 3 years ago.

Viet - Computer Tech :

Hi,

Viet - Computer Tech :

This is the correct amount. Thanks.

Viet - Computer Tech :

I'm trying to answer.

Customer :

hey i think i figured it out haha

Viet - Computer Tech :

Are you going to stay online?

Customer :

yes ill be on

Viet - Computer Tech :

So I can give you answer one by one

Viet - Computer Tech :

and you can ask me any question if needed.

Viet - Computer Tech :

1. CPU.

Customer :

yeah thhat will work

Viet - Computer Tech :

2. Cascading style sheets (CSS)

Viet - Computer Tech :

Is this your homework? 139 questions?

Viet - Computer Tech :

3. MS-DOS

Customer :

yes sir

Viet - Computer Tech :

OK, I'm just keep answer. If you have any question, just interrupt me.

Customer :

ok

Viet - Computer Tech :

4. information assurance.
5. completion of all arithmetic calculations

Viet - Computer Tech :

6. Ethernet cable
7. file path.

Viet - Computer Tech :

8. The BIOS checks that all devices are in place.
9. a large network of networks.
10. gigahertz.

Viet - Computer Tech :

11. vlogs
12. slot
13.Information
14. text.
15. top-level domains.

Viet - Computer Tech :

16. Software
17. Easy Transfer
18. plug-ins.
19. placing a found virus in a secure area on the hard drive.
20.Trojan horse

Viet - Computer Tech :

21. input
22. Bluebugging
23. increase the front side bus speed.
24. Listservs
25. GB.

Viet - Computer Tech :

Only 25 questions done, let me take a break, I'll be back soon.

Viet - Computer Tech :

in about 10 minutes.

Customer :

ok

Viet - Computer Tech :

Don't worry, you don't have to be here, I can just answer you and you can reply back to me any time if you have any question.

Customer :

no its cool im just chillin

Viet - Computer Tech :

great, be right back.

Customer :

hey you back?

Viet - Computer Tech :

Ok, I'm back.

Customer :

k sweet

Viet - Computer Tech :

26. Cookies obtain your personal information by searching your hard drive.

Viet - Computer Tech :

For question, 27., I do not see the option for A. B. C. D.

Viet - Computer Tech :

I only see D. <title>, and A. B. C. is blank.

Viet - Computer Tech :

28. The antivirus program checks all files for viruses.

Viet - Computer Tech :

29. USB port.
30. A DDoS attack

Viet - Computer Tech :

For question # XXXXX please change answer to: XXXXX XXXXX is activated by powering on the CPU.

Customer :

ok for 27 each question has one answer so its matching




























1 Which html tag starts the Web Page and ends the Web Page? Read Answer Items
2

Which html tag contains everything that shows up on the browser view of the Web Page?


Read Answer Items
- 3 Which html tag contains the <title></title> tag? Read Answer Items
- 4

Which html tag shows up on both the title bar of the browser view, as well as the tab of the browser page?


Read Answer Items

Answer



















A.<html></html>
B. <head></head>
C.<body></body>
D. <title</title>

Viet - Computer Tech :

31. MAC
32. operating system software.
33. RAM memory used by the operating system.
34. Circuit switching
35. the control unit and the arithmetic logic unit

Viet - Computer Tech :

# XXXXX <html></html> starts and ends web page,
<body></body> contains everything that shows up on the browser view of the Web Page.
<head></head> Which html tag contains the <title></title> tag?
<title</title> Which html tag shows up on both the title bar of the browser view, as well as the tab of the browser page?

Viet - Computer Tech :

36. binary
37. BIOS
38. social networking Web site
39. full backup
40. Uniform Resource Locator (URL).

Viet - Computer Tech :

41. directories.
42. home server
43. System
44. Internet exchange points (IXPs).
45. a peer-to-peer (P2P) network.

Viet - Computer Tech :

46. hardware.
47. protocol.
48. polymorphic
49.point of presence (POP)
50. peripheral devices.

Viet - Computer Tech :

51. packet switching.
52.Hyperthreading
53. routers and switches
54. Firefox.
55. protocol.

Viet - Computer Tech :

56. the pace at which CPUs improve.
57. OC lines
58. keystroke loggers.
59. Hypertext Transfer Protocol.
60. hoax

Viet - Computer Tech :

61. analyzing the data or information

Viet - Computer Tech :

For # XXXXX can you please list the possible answers. This is all I see.

A. bookspaper
B. click here
C.
D. click here

Customer :








There is one answer for each statement.
Question 62 answers



























- 1This html tag(s) will show an animated image on the browser view of the Web Page. Read Answer Items
- 2This html tag(s) will show a hyperlink on the browser view of the Web Page. Read Answer Items
- 3This html tag(s) will show a list on the browser view of the Web Page. Read Answer Items
- 4This html tag(s) will show a personal link on the browser view of the Web Page. Read Answer Items

Answer



















A.<ul><li>books</li><li>paper</li></ul>
B.<a href="Second_Web_Assignment.html">click here</a>
C.<img src="basketball.gif" alt="sport image" />
D.<a href="http://www.hotmail.com">click here</a>


Viet - Computer Tech :

63. there is not enough RAM installed.
64. registry
65. page file

Viet - Computer Tech :

# XXXXX

- 1 This html tag(s) will show an animated image on the browser view of the Web Page. Read Answer Items
C. <img src="basketball.gif" alt="sport image" />

- 2 This html tag(s) will show a hyperlink on the browser view of the Web Page. Read Answer Items
D. <a href="http://www.hotmail.com">click here</a>

- 3 This html tag(s) will show a list on the browser view of the Web Page. Read Answer Items
A. <ul><li>books</li><li>paper</li></ul>

- 4 This html tag(s) will show a personal link on the browser view of the Web Page. Read Answer Items
B. <a href="Second_Web_Assignment.html">click here</a>

Viet - Computer Tech :

66. Gadgets
67. nonvolatile
68. the speed of the chip.
69. Can you please provide the full possible answers?
70. It manages the removal of spyware.

Viet - Computer Tech :

71. repeaters
72. FTP
73. Advanced Research Projects Agency.
74. launch a denial of service (DoS) attack on your computer.
75. the way they are controlled and the distance between their nodes.

Viet - Computer Tech :

For question #69, Can you please provide the full possible answers?

Viet - Computer Tech :

76. macro virus
77. firewall.
78. motherboard.
79. Eight
80. printer.

Customer :

whhat was question 69?

Viet - Computer Tech :

81. switch
82. video card.
83.backbone
84. less than the data transfer rate.
85. front side bus.

Viet - Computer Tech :

# XXXXX 69 8 pointsSave
Each statement has one answer.
- A. B. C. D. This html tag(s) will show up in the code and not on the Web Page.
- A. B. C. D. This html tag(s) will create a line across the browser view of a Web Page.
- A. B. C. D.This html tag(s) will change the text color to green.
- A. B. C. D.This html tag(s) will create an email link on a Web Page.
A. click here
B.
C.
D. family

Customer :








Each statement has one answer.
Question 69 answers



























- 1This html tag(s) will show up in the code and not on the Web Page. Read Answer Items
- 2This html tag(s) will create a line across the browser view of a Web Page. Read Answer Items
- 3 This html tag(s) will change the text color to green. Read Answer Items
- 4 This html tag(s) will create an email link on a Web Page. Read Answer Items

Answer



















A.<a href="mailtoXXX@XXXXXX.XXX">click here</a>
B.<hr />
C.<!--Rickie Pickett, First Web Assignment, Due 1/24-->
D.<font color="green">family</font>


Viet - Computer Tech :

# XXXXX

- 1 This html tag(s) will show up in the code and not on the Web Page. Read Answer Items
C. <!--Rickie Pickett, First Web Assignment, Due 1/24-->

- 2 This html tag(s) will create a line across the browser view of a Web Page.
B. <hr />

- 3 This html tag(s) will change the text color to green. Read Answer Items
D. <font color="green">family</font>

- 4 This html tag(s) will create an email link on a Web Page.
A. <a href="mailtoXXX@XXXXXX.XXX">click here</a>

Viet - Computer Tech :

86. data files.
87. a firewall.
88. Cat 5E
89. Web servers.
90.recipient's address, sender's address, reassembling instructions, and data

Viet - Computer Tech :

91. broadcast over the Internet using compressed audio files such as MP3s and MP4s.
92. the broadcast of audio or video content over the Internet.
93. Circuit
94. logic bomb
95. DSL/cable router

Viet - Computer Tech :

96. CMOS
97. routers
98. T-3 lines
99. translate IP addresses from the Internet.
100. both a wireless and wired network adapter

Viet - Computer Tech :

101. memory modules.
102. wireless routers
103. dynamic address.
104. Mac OS was the first OS to use a graphical user interface.
105. static address.

Viet - Computer Tech :

106. power-line networks cost less.
107. HTTP.
108. physical
109. the United States government
110.commerce

Viet - Computer Tech :

111. buddy list.
112. kernel
113. keep your password XXXXX down and stored in any easy-to-remember location.
114. data transfer rate
115. cybercrime

Viet - Computer Tech :

116. real-time
117. a wireless router
118. top-level domain.
119. Please provide more details about the question!
120. USB.

Viet - Computer Tech :

Please provide more details on Question #119:

Question 119 8 pointsSave
Each question has one answer.
- A. B. C. D.What are the points given for a Personal Link on the Final Web Assignment?
- A. B. C. D.What are the points given for all four images (including the alt tag) on the Final Web Page?
- A. B. C. D. What are the points given for the target/anchor on the Final Web Assignment?
- A. B. C. D.What are the points given for the Home Page on the Final Web Assignment?
A. 12 points
B. 5 points
C. 4 points
D. 10 points

Viet - Computer Tech :

121. hyperlinks.
122. make the hard drive work more efficiently.
123. IP address.
124. clear out unnecessary files.
125. a mouse

Customer :








Each question has one answer.
Question 119 answers



























1 What are the points given for a Personal Link on the Final Web Assignment? Read Answer Items
2 What are the points given for all four images (including the alt tag) on the Final Web Page? Read Answer Items
3What are the points given for the target/anchor on the Final Web Assignment? Read Answer Items
4 What are the points given for the Home Page on the Final Web Assignment? Read Answer Items

Answer



















A.12 points
B.5 points
C.4 points
D.10 points


Viet - Computer Tech :

Hmm, what are these points?

Customer :

oh i can get this one dont worry about it

Viet - Computer Tech :

ok, thanks

Viet - Computer Tech :

126. a warm boot.
127. ICANN.
128. processor management
129. RAM.
130. data subsystem.

Viet - Computer Tech :

131. a transceiver
132. swap
133. viruses.
134. grayware.
135. circuit switching

Viet - Computer Tech :

* sorry, for 131 to 135, let me redo

Customer :

ok

Viet - Computer Tech :

131. a transceiver
132. swap
133. grayware.
134. circuit switching
135. RSS

Viet - Computer Tech :

136. graphical user
137. libraries
138. secure socket layer.
139. search engine.

Viet - Computer Tech :

whew, finally it's done.

Viet - Computer Tech :

Let me know if you have any question.

Viet - Computer Tech :

Is this homework for one week?

Customer :

yeah thanks thats perfect

Viet - Computer Tech :

Great.

Viet - Computer Tech :

Please click on Accept to show I have assisted you.

Viet - Computer Tech :

Have a good night!

Viet - Computer Tech, Computer Support Specialist
Category: Computer
Satisfied Customers: 25768
Experience: Ten years of computer support. Microsoft MCP & CompTIA A+ certifications. Windows 8 7 Vista XP etc.
Viet - Computer Tech and 14 other Computer Specialists are ready to help you

JustAnswer in the News:

 
 
 
Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.
 
 
 

What Customers are Saying:

 
 
 
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
< Last | Next >
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
  • I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you! RP Austin, TX
  • Hi John, Thank you for your expertise and, more important, for your kindness because they make me, almost, look forward to my next computer problem. After the next problem comes, I'll be delighted to correspond again with you. I'm told that I excel at programing. But system administration has never been one of my talents. So it's great to have an expert to rely on when the computer decides to stump me. God bless, Bill Bill M. Schenectady, New York
  • The Expert answered my Mac question and was patient. He answered in a thorough and timely manner, keeping the response on a level that could understand. Thank you! Frank Canada
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
 
 
 

Meet The Experts:

 
 
 
  • Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
< Last | Next >
  • http://ww2.justanswer.com/uploads/EN/Engineer1010/2012-6-9_132423_jaj12a.64x64.jpg Andy's Avatar

    Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
  • http://ww2.justanswer.com/uploads/BA/barrenrock/2011-10-19_215925_JamesJAFinal.64x64.jpg James's Avatar

    James

    Sr. Computer Support Expert

    Satisfied Customers:

    8376
    20 years of experience building, fixing and servicing PCs and operating systems.
  • http://ww2.justanswer.com/uploads/zeyank/2009-09-26_154244_P8110079.png Ryan H.'s Avatar

    Ryan H.

    Computer Support Specialist

    Satisfied Customers:

    1741
    A+ Certified Technician - 10 Years experience working with all types of computer systems.
  • http://ww2.justanswer.com/uploads/JA/jadedangel57/2011-11-8_193134_janenewsm.64x64.jpg Jane Lefler's Avatar

    Jane Lefler

    Sr Prog Analyst / Technician

    Satisfied Customers:

    0
    Computer Programmer / Technician/ Consultant 16+ years
  • http://ww2.justanswer.com/uploads/RO/robmpreston/2013-9-23_233814_mijiFZm.64x64.jpg RPI Solutions's Avatar

    RPI Solutions

    Support Specialist

    Satisfied Customers:

    3476
    5+ Years in IT, BS in Computer Science
  • http://ww2.justanswer.com/uploads/BA/barunrath/2012-7-5_201954_Profilepic2.64x64.jpg B. Rath's Avatar

    B. Rath

    Computer Support Specialist

    Satisfied Customers:

    8671
    Certified Computer/Networking Support Specialist.
  • http://ww2.justanswer.com/uploads/FS/fszcze/2012-6-18_181848_500test.64x64.jpg Frederick S.'s Avatar

    Frederick S.

    Computer Specialist

    Satisfied Customers:

    7240
    Computer technician and founder of a home PC repair company.