Computer

I actually have a lot of questions I need to get answered can…

Customer Question
I actually have a lot...
I actually have a lot of questions I need to get answered can I post them and you tell me how many you are willing to answer and for how much? I think 14 bucks should be more than just one question, I ask that last one to see how this website worked but know I see that the question do get answered right away and that this website acutely work so... Read full answer
I actually have a lot of questions I need to get answered can I post them and you tell me how many you are willing to answer and for how much? I think 14 bucks should be more than just one question, I ask that last one to see how this website worked but know I see that the question do get answered right away and that this website acutely work so can we make an arrangement how the price and amount of question?
Submitted: 9 years ago.Category: Computer
Show More
Show Less
Ask Your Own Computer Question
Answered in 1 minute by:
12/13/2009
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago
John P
John P, Information Systems Architect
Category: Computer
Satisfied Customers: 451
Experience: 13+ Years of Cutting Edge Systems Engineering, Consulting (Fortune 100 and SMB), and Architecture
Verified

Tell me how many questions you have and I'll work out a deal with you.

Ask Your Own Computer Question
Customer reply replied 9 years ago
a lot of multiple chose question. 7X86= about 602 maybe a little less.
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

602 Questions? What do you think is a fair price?

Ask Your Own Computer Question
Customer reply replied 9 years ago

i don't really know, i mean how long will it take you? time is important also. the questions are computer level. what's a good price for you? im sure that with the high qualifications you have as a computer engineer these questions will be easy for you, nothing that you will have to send to much time looking up.

 

Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

It depends on if you are scanning the questions or writing them and the complexity, multiple choice makes things easier. A quarter a question would be around $150.00 do you think that's acceptable (you can use the bonus function after I've answered the questions)? If not, let me know as I genuinely do not know how much time this will take as I haven't seen the questions.

 

Thanks,

John

Ask Your Own Computer Question
Customer reply replied 9 years ago
well here is an example of the questions so you can see if they are difficult or not. i can cut and paste them all in this box. i was hoping not to spend more than 100. do you think you can consider lowing the price a bit? also if you can please let me know about how long it will take to finish i will truly appreciate it, i apologies if i sound pushy or like if im rushing you but i am on a time crunch.

 

 

1. Which of the following is NOT an example of a network node?

  • a) a modem
  • b) a printer
  • c) a computer
  • d) an NOS

 

2. A computer network is defined as two or more computers connected with __________ so that they can communicate with each other.

  • a) the Internet
  • b) software
  • c) hardware
  • d) software and hardware

 

3. Networks allow users to share?

  • a) peripherals.
  • b) flash drives.
  • c) paper.
  • d) phones.

 

4. A(n) __________ allows sharing of a broadband Internet connection.

  • a) phone cord
  • b) hub
  • c) adapter
  • d) router

 

5. Network architectures are classified according to?

  • a) the way they are controlled and the distance between their nodes.
  • b) the distance between the hub and the router.
  • c) the bandwidth supplied by the connection.
  • d) the speed at which the processor runs.

 

6. Due to the expansion of media files on home computers, __________ options are now being marketed; however, they are not as full featured as their business-world counterparts.

  • a) external hard drive
  • b) home server
  • c) mega flash drives
  • d) online storage

 

7. Most computers today contain network adapters installed inside as expansion cards. Such adapters are referred to as:

  • a) network adapter cards.
  • b) network expansion cards.
  • c) network interface cards.
  • d) ethernet cards.

 

8. Normal telephone wire is:

  • a) fiber-optic cable.
  • b) coaxial cable.
  • c) twisted-pair cable.
  • d) ethernet cable.

 

9. The most common type of network is:

  • a) a token ring LAN.
  • b) a peer-to-peer (P2P) network.
  • c) a client/server network.
  • d) a WAN.

 

10. In a client/server network, there are usually many more __________ than __________.

  • a) servers, clients
  • b) printers, computers
  • c) clients, servers
  • d) clients, computers

 

11. A network that has ten or more nodes is usually configured as a:

  • a) client/server network.
  • b) home network.
  • c) peer-to-peer network.
  • d) WAN

 

12. Which of the following is NOT an example of a WAN?

  • a) LANs connected in a single building
  • b) a LAN at the main university campus connected with a LAN at the university extension site
  • c) a computer at a bank's main branch connected with a LAN at the bank's branch office across town
  • d) the computers in a lab at your school connected to the computers in a lab at another school in your town

 

13. Which transmission medium is able to transmit data the fastest?

  • a) twisted-pair cable
  • b) coaxial cable
  • c) fiber-optic cable
  • d) wireless

 

14. The data transfer rate of a wireless network is usually measured in?

  • a) Kbps.
  • b) Gbps.
  • c) Tbps.
  • d) Mbps.

 

15. Throughput, the actual speed of data transfer that is achieved in a network, is usually?

  • a) more than the data transfer rate.
  • b) the same as the data transfer rate.
  • c) less than the data transfer rate.
  • d) dependent on the cable's bend radius.

 

16. Network adapters:

  • a) enable nodes in a network to communicate with each other.
  • b) are built into the motherboard on each node.
  • c) are always Ethernet NICs.
  • d) are necessary only on servers in a client/server network.

 

17. Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?

  • a) USB ports
  • b) firewalls
  • c) network interface cards (NICs)
  • d) routers and switches

 

18. Client/server networks are controlled by a central server that runs a specialized piece of software called?

  • a) Windows Vista.
  • b) a network operating system(NOS).
  • c) a firewall.
  • d) NetWare.

 

19. The major difference in types of P2P networks is the __________ by which the nodes are connected.

  • a) software
  • b) port
  • c) network interface card
  • d) transmission medium

 

20. Ethernet networks are named for?

  • a) the type of NIC installed in every node.
  • b) the protocol used.
  • c) the type of transmission medium used.
  • d) the type of operating system installed on every node.

 

21. An Ethernet adapter is a:

  • a) specific type of NIC.
  • b) specific type of router.
  • c) transmission medium.
  • d) device that uses a simple algorithm to move data.

 

22. The most popular transmission medium option for wired Ethernet networks is:

  • a) unshielded twisted-pair cable (UTP).
  • b) fiber-optic cable.
  • c) power-line cable.
  • d) coaxial cable.

 

23. Maximum cable run (length) for Ethernet networks using UTP cable is approximately:

  • a) 50 feet.
  • b) 328 feet.
  • c) 550 feet.
  • d) 1,100 feet.

 

24. Which of the following is necessary to send data between a home network and the Internet?

  • a) a cable
  • b) a hub
  • c) a switch
  • d) a router

 

25. A wireless network uses which of the following as its transmission medium?

  • a) laser waves
  • b) fiber-optic waves
  • c) sound waves
  • d) radio waves

 

26. Which of the following devices translates electronic data into radio waves?

  • a) a modem
  • b) a fiber-optic cable
  • c) a transceiver
  • d) a receiver

 

27. Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?

  • a) a wireless network adapter
  • b) a power-line adapter
  • c) a transceiver
  • d) a modem

 

28. Which of the following devices is needed to share an Internet connection on a wireless network?

  • a) a wireless hub
  • b) a fiber-optic cable
  • c) a wireless router
  • d) a modem

 

29. If you frequently transfer large data files between nodes on a network, which of the following networks would be the best choice?

  • a) dial-up
  • b) power-line
  • c) Ethernet
  • d) wireless

 

30. To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT:

  • a) reposition the computer you are using.
  • b) move the computers in the network closer together.
  • c) move your computer next to a cement wall.
  • d) add a wireless access point (WAP) to the network.

 

31. Most __________ allow you to connect wireless and wired computers to the same network.

  • a) wireless routers
  • b) servers
  • c) transceivers
  • d) modems

 

32. Most __________ allow you to connect wireless and wired computers to the same network.

  • a) wireless routers
  • b) servers
  • c) transceivers
  • d) modems

 

33. Public places where you can wirelessly connect to the Internet are known as?

  • a) links.
  • b) hotspots.
  • c) wired spots.
  • d) gateways.

 

34. All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:

  • a) power-line networks cost less.
  • b) you don't need to run new wires with a power-line network.
  • c) you are experiencing interference with a wireless Ethernet network.
  • d) power-line networks can be easier to install.

 

35. When setting up a network, you should set up any computers running the Microsoft Vista operating system:

  • a) first.
  • b) last.
  • c) only before any computers running Linux.
  • d) The order does not matter.

 

36. The weakest link in any computer security system is:

  • a) the operating system.
  • b) the network.
  • c) USB ports.
  • d) the users.

 

37. What is the best thing a company can do to prevent its electronic data from being stolen?

  • a) establish detailed security policies
  • b) disconnect employees' computers from the Internet
  • c) shut off access on computers to flash drives
  • d) install hidden cameras

 

38. Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

  • a) social networking
  • b) cybercrime
  • c) phishing
  • d) hacking

 

39. A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:

  • a) use your debit card information to purchase items illegally.
  • b) assume your identity.
  • c) steal your logon and passwords for various accounts.
  • d) launch a denial of service (DoS) attack on your computer.

 

40. Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background?

  • a) a virus
  • b) a Trojan horse
  • c) a worm
  • d) a zombie

 

41. Distributed denial of service (DDoS) attacks have been associated with:

  • a) attacks on famous blogs, eBay, and Amazon.com.
  • b) identity theft.
  • c) misuse of credit card information.
  • d) theft of financial data at the IRS.

 

42. The most likely method a hacker would use to access a computer is:

  • a) sitting down at a computer and installing hacking software.
  • b) overhearing your password XXXXX log-on information.
  • c) entering through a company intranet.
  • d) entering through the Internet.

 

43. Rules for creating passwords include all of the following EXCEPT:

  • a) keep your password XXXXX secret.
  • b) keep your password XXXXX down, and put it in your wallet.
  • c) change your password XXXXX
  • d) create a hard-to-guess password, with a combination of letters and numbers.

 

44. One can thwart most hacking problems by installing a:

  • a) network.
  • b) firewall.
  • c) hub.
  • d) security policy.

 

45. __________ makes broadband users more vulnerable to attacks.

  • a) Dynamic addressing
  • b) IP addressing
  • c) Static addressing
  • d) Greater bandwidth

 

46. The purpose of Network Address Translation is to?

  • a) translate IP addresses from the Internet.
  • b) hide user IP addresses from the Internet.
  • c) convert logical ports to physical port configurations.
  • d) dynamically assign IP addresses via an ISP.

 

47. Manufacturers such as Linksys, D-Link, and Netgear make which of the following devices that can double as firewalls?

  • a) networks
  • b) NICs
  • c) modems
  • d) routers

 

48. To secure a wireless network, you should take all the following precautions EXCEPT:

  • a) changing your network name.
  • b) changing the default password XXXXX your router.
  • c) turning your computer off at night.
  • d) disabling SSID broadcast.

 

49. How many viruses and virus variants exist today?

  • a) tens
  • b) hundreds
  • c) thousands
  • d) millions

 

50. Which type of virus was the famous Michelangelo virus?

  • a) a time bomb
  • b) a worm
  • c) a script virus
  • d) an e-mail virus

 

51. Which of the following classifications of viruses changes its own code?

  • a) stealth
  • b) polymorphic
  • c) multipartite
  • d) worm

 

52. Quarantining with regard to computer protection is defined as:

  • a) placing a found virus in a secure area on the hard drive.
  • b) updating your antivirus software.
  • c) repairing the infected file.
  • d) deleting the infected file.

 

 

True/False: Determine if the statement is true or false.

 

53. It is not possible to configure a client/server network for home use.

 

54. A client computer is the computer on which users accomplish specific tasks.

 

55. A single computer can function as both a client and a server, but performance will be degraded.

 

56. Most desktop and notebook systems sold today are network ready.

 

57. MAN stands for mobile area network.

 

58. When a network is sponsored by a government entity to provide Internet access to a specific geographic area, that network will generally be designated as a MAN.

 

59. The cost of a P2P network is slightly greater than the cost of a client/server network.

 

60. P2P networks are more commonly used in small businesses than in homes.

 

61. Wireless networks are more vulnerable to attack than wired networks.

 

62. A network-ready device is a device that may be attached to a network but still has to connect to a networked computer first.


63. A wireless NIC from one manufacturer may not work with a DSL router from another manufacturer, even when both devices claim to be developed using the same standards.

 

64. The 802.11g standard supports transfer rates of up to 30 Mbps.

 

65. 802.11 devices are less susceptible to interference than 802.11g devices are.


66. Wireless networks are no more vulnerable to packet sniffers than any other type of network.

 

67. SMTP uses port 21.

 

68. SMTP stands for Simple Mail Transfer Protocol.

 

69. The practice of piggybacking is illegal.

 

70. The majority of investigations related to cybercrime involve debit card fraud.

 

71. The Master Boot Record executes every time a computer boots up.

 

72. Extreme G and Enhanced G standards were both based on 802.11g standards but used proprietary hardware and software tweaks to increase performance.

 

73. 802.11g devices have a faster throughput than 802.11n devices.

 

74. The Internet is an example of a client/server network.


75. Cybercriminals are usually security individuals who work in large corporations with a vast knowledge base of computing and networking.

 

76. In a peer-to-peer network, one computer acts as the server.

 

77. One can have both wired and wireless nodes on a single P2P network.

 

78. Data transfer rate does NOT affect the speed at which a user can download a file from a WAN.

 

79. Switches receive data packets and send them to the node for which they are intended on the same network.

 

80. A P2P network needs network operating system software installed on every node.

 

81. Ethernet networks are always connected using twisted-pair cable technology.

 

82. The Mac OS does NOT support P2P networking.


83. Most computers today come with Ethernet adapters already installed.

 

84. Repeaters can extend a network's range by amplifying the signal.

 

85. When configured correctly, network firewalls can help protect your network.

 

86. White-hat hackers perform a needed legal service for society.

 

Tech Support Specialist: John P, Information Systems Architect replied 9 years ago
I'll start on it and see how long these take, but if it takes a long time, I'll have to be firm on my price. If it is short I'll accept the $100. It will depend though on how long this takes, some may be specific to your book.
Ask Your Own Computer Question
Customer reply replied 9 years ago
k, i will accept your price. you are right it is fair enough. it is a lot of questions. my only worry is that we run out of time do you think you could get this done within a few hours? or will it take you days? how would you like me to pay? half now and half after completion? or do i pay at the end?
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

Just bonus $141 at the end when I'm done (since this question is worth $9). I'll work on it until we are done tonight. Don't post any more until I post back the answers to the first 86.

 

Thanks,

John

Ask Your Own Computer Question
Customer reply replied 9 years ago
so you are charging me 9 dollars a question?
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

No, not at all, just keep posting here until we finish all of them. We'll do all of them in this thread. We don't need a new thread to do all the questions. Does that make sense?

 

Here's the first set:

 

1 D
2 D
3 A
4 D
5 A
6 B
7 C
8 C
9 A
10 C
11 A
12 A
13 C
14 D
15 C
16 A
17 D
18 B
19 A
20 B
21 A
22 A
23 B
24 D
25 D
26 C
27 A
28 C
29 C
30 C
31 A
32 A (this is a repost of number 31 question)
33 B
34 A
35 D
36 D
37 A
38 B
39 D
40 B
41 A
42 D
43 B
44 B
45 C
46 A
47 D
48 C
49 D
50 B
51 B
52 A
53 F
54 T
55 T
56 T
57 F
58 T
59 F
60 F
61 T
62 F
63 F
64 F
65 F
66 F
67 F
68 T
69 T
70 T
71 T
72 T
73 F
74 T
75 F
76 F
77 T
78 F
79 F
80 T
81 F
82 F
83 T
84 T
85 T
86 T

 

 

After rereading your previous post, I'll take a minute to explain how this site works. I don't get paid until you click accept. For that to happen, I need to post an Answer first for you to accept. Since there are so many questions, I won't post that until the last post to make it easier. Secondly, once you click accept, no matter how much information is in this thread, it's only $9 (the question value you assigned when you opened the question.) After I've answered the questions, you've clicked accept, you can then bonus the additional $141.00 to make it an even $150 total. Does that clarify things for you?
Ask Your Own Computer Question
Customer reply replied 9 years ago

 

 

So how much are you charging me in total?

  1. A combination of a phone and a PDA is referred to as a:
  • a) smartphone.
  • b) combo-phone.
  • c) cellular phone.
  • d) personal digital assistant phone.

 

  1. __________ are electronic tools such as cell phones, portable media players, and notebooks.
  • a) Mobile computing devices.
  • b) Portable digital assistants.
  • c) Smart tools.

 

  1. Microsoft __________ is an example of personal information management software that allows you to track your schedule or your address book.
  • a) Excel.
  • b) Word.
  • c) Access.
  • d) Outlook.

 

  1. Which of the following is NOT an advantage of using mobile devices?.
  • a) You can access your files wherever you are.
  • b) You can keep in contact with others via e-mail or phone wherever you are.
  • c) You can access the Internet at faster speeds.
  • d) You can access the Internet wherever you are.

 

  1. If a mobile device can access the Internet through a wireless network, it is considered?
  • a) Web-connected.
  • b) Web-featured.
  • c) Web-enhanced.
  • d) Web-enabled.

 

  1. Which of the following is NOT a limitation of mobile computing?
  • a) the length of battery life.
  • b) whether the screen is available in color.
  • c) the size of the screen.
  • d) the speed of the Internet connection.

 

  1. Which of the following allows you to carry media files?
  • a) PMP.
  • b) PDQ.
  • c) PIM.
  • d) POM.

 

  1. A smartphone is the result of __________, which is a combination of the tools found in more than one portable device?
  • a) combination.
  • b) unification.
  • c) convergence.
  • d) blending.

 

  1. A __________ runs a full-featured operating system and weighs less than two pounds?
  • a) PDA .
  • b) PIM.
  • c) smartphone.
  • d) subnotebook.

 

  1. Symbian is?
  • a) an operating system for cell phones.
  • b) a type of application software.
  • c) a utility program for PDA/smartphone.
  • d) a form of antivirus software.

 

  1. The Apple iPhone uses a version of __________ as an operating system?
  • a) OS X.
  • b) Windows Mobile.
  • c) Linux.
  • d) Red Hat.

 

  1. ROM is?
  • a) volatile memory.
  • b) flash memory.
  • c) nonvolatile memory.
  • d) temporary storage.

 

  1. The operating system of a cell phone is stored in?
  • a) RAM.
  • b) the CPU.
  • c) the transceiver.
  • d) ROM.

 

  1. An analog-to-digital converter chip.
  • a) converts digital sound waves into analog sound waves.
  • b) converts the sound waves from a voice into a digital signal.
  • c) converts written data into sound waves.
  • d) converts letters from the keyboard into digital format.

 

  1. Which of the following is a new program being tested by Apple and Starbucks that will allow iPhone users to identify, purchase, and download a song they are currently listening to at a Starbucks.
  • a) Music ID.
  • b) Get It.
  • c) Now Playing.
  • d) Audio Delivery.

 

  1. Your cell phone call may be disconnected or dropped if:
  • a) the distance between the two phones is too great.
  • b) the distance between the two phones is too small.
  • c) the distance between the base stations is too large.
  • d) the distance between the base stations is too small.

 

  1. A base transceiver station receives a request for cellular service and passes that request to a central location called a:
  • a) cellular request station.
  • b) mobile switching center.
  • c) mobile conversion station.
  • d) cellular switching tower.

 

  1. Text messaging is also called:
  • a) test messaging system (TMS).
  • b) sending messages shortly (SMS).
  • c) short message service (SMS).
  • d) short text messaging (STM).

 

  1. Text prediction __________ provide a list of popular words and save typing time when using text messaging.
  • a) dictionaries.
  • b) algorithms.
  • c) services.
  • d) accessories.

 

  1. Which of the following allows users to send text, sound, images, and video clips to other phones or e-mail addresses?
  • a) SMS.
  • b) MMS.
  • c) MSM.
  • d) SSM.

 

  1. SMS delivers messages to the appropriate mobile device using __________ technology.
  • a) receive and forward.
  • b) MMS.
  • c) store and forward.
  • d) Bluetooth.

 

  1. Which of the following refers to options given for connectivity to the Internet and usually covers text messages that are sent or received?
  • a) connectivity plans.
  • b) Internet plans.
  • c) data plans.
  • d) message plans.

 

  1. Which of the following is specialized software made to display Web pages on a cell phone?
  • a) minibrowser.
  • b) microbrowser.
  • c) cell browser.
  • d) online browser.

  1. Opera Mobile is an example of?
  • a) a microbrowser.
  • b) SmartMedia.
  • c) a smartphone.
  • d) a wireless ISP.

 

  1. Which of the following is similar to HTML except that it is geared toward making Web pages that are viewable on mobile devices?
  • a) WTML (wireless text markup language).
  • b) WML (wireless markup language).
  • c) SGML (standard generalized markup language).
  • d) WTL (wireless text language).

 

  1. LogMeIn is an example of a?
  • a) voice-recognition system.
  • b) GPS system.
  • c) remote access service for mobile devices.
  • d) type of smartphone.

 

  1. An iPod is an example of a?
  • a) PMP.
  • b) PDA/smartphone.
  • c) PIM.
  • d) MPD.

 

  1. An iPod with an 80-GB hard drive can hold how many songs?
  • a) up to 80.
  • b) up to 20,000.
  • c) up to 160,000.
  • d) up to 8 million.

  1. A portable media player can play files with all of the following file extensions EXCEPT:
  • a) AVI.
  • b) MP3.
  • c) DOC.
  • d) MPEG-4.

 

  1. Flash memory is a type of:
  • a) volatile memory.
  • b) nonvolatile memory.
  • c) vibrant memory.
  • d) nonvibrant memory.

 

  1. To transfer files from your computer to a portable media player (PMP), most newer PMPs use a __________ port or a FireWire port.
  • a) multimedia.
  • b) serial.
  • c) parallel.
  • d) USB 2.0.

 

  1. Which of the following describes the number of times, usually in Kbps, that music can be measured and converted into a digital format?
  • a) converting rate.
  • b) sampling rate.
  • c) conversion rate.
  • d) simplifying rate.

 

  1. Which of the following is the process of sharing files between two or more computers?
  • a) direct sharing (DS).
  • b) peer-to-peer (P2P) sharing.
  • c) computer-to-computer (C2C) sharing.
  • d) person-to-person (P2P) sharing.

 

  1. Which of the following is the ability to download and play music with restrictions enforced about its use?
  • a) purchased downloads.
  • b) secure digital downloads.
  • c) tethered downloads.
  • d) tied-down downloads.

 

 

  1. Ensuring that two devices--for example, a PC and a PDA/smartphone--have the same data is the process of?
  • a) simplifying.
  • b) synchronizing.
  • c) unifying.
  • d) standardizing.

  1. Which of the following tools is used to make entries into a handheld device via a touch-sensitive screen?
  • a) a pen.
  • b) a pencil.
  • c) a keyboard.
  • d) a stylus.

 

  1. Which process compares task time on similar devices to help judge performance levels?
  • a) beta testing.
  • b) beta testing.
  • c) benchmarking.
  • d) device profiling.

 

  1. __________ was originally called Pocket PC.
  • a) Palm OS.
  • b) Symbian.
  • c) Linux Mobile.
  • d) Windows Mobile.

 

  1. All of the following Microsoft application programs, specifically designed for mobile devices, are currently available EXCEPT:
  • a) Outlook.
  • b) Word.
  • c) Access.
  • d) Excel.

 

  1. Which of the following is a way for portable devices to send messages wirelessly, via radio waves, over a range of less than 30 feet?
  • a) beaming.
  • b) Bluetooth.
  • c) infrared.
  • d) cell phone.

 

  1. A device that combines portable device capabilities, such as those of a PDA, cell phone, and PMP, is called a?
  • a) multifunction phone.
  • b) CPP (cell/PDA/PMP).
  • c) combophone.
  • d) smartphone.

  1. A tablet PC is all of the following EXCEPT?
  • a) a computer that allows you to write notes on the pressure-sensitive screen using a stylus.
  • b) lightweight and portable.
  • c) like a clipboard when in "tablet" mode.
  • d) less expensive than a regular size notebook.

  1. When a stylus is used to input information on a tablet PC, the user is using an entry system referred to as?
  • a) digital ink.
  • b) virtual ink.
  • c) tablet ink.
  • d) stylus ink.

 

  1. GPS refers to?
  • a) goals performance system.
  • b) global positioning system.
  • c) global parts system.
  • d) ground position system.

 

 

  1. Which of the following allows you to connect a monitor, printer, and so on to a notebook computer via one connection as opposed to connecting individual devices?
  • a) a connect-all.
  • b) an all-in-one.
  • c) a docking station.
  • d) a connector station.

 

  1. The more _________ a battery has, the greater its capacity.
  • a) cells.
  • b) power.
  • c) amps.
  • d) voltage.

 

  1. __________ is the text-entry system for drawing images and entering text by writing on the surface of a tablet PC.
  • a) Grafitti text.
  • b) Digital annotation.
  • c) Digital ink.
  • d) Mobile write.

  1. The measurement of battery life for a notebook computer is listed in:
  • a) clock hours.
  • b) clock minutes.
  • c) ampere-hours.
  • d) ampere-minutes.

  1. A fully charged, high-performance notebook battery can last up to:
  • a) 1 hour.
  • b) 3 hours.
  • c) 5 hours.
  • d) 10 hours.

 

  1. A category of notebook computers that weigh less than two pounds is the:
  • a) ultramobile computer.
  • b) mini-computer.
  • c) ultraportable computer.
  • d) micro-computer.

 

  1. The new standard for expansion slots on PCs is called:
  • a) expansion cards.
  • b) add-in cards.
  • c) ExpressCards.
  • d) QuickCards.

 

  1. Which of the following terms refers to the amount of space on a desk or table that a computer uses?
  • a) base size.
  • b) footprint.
  • c) foot size.
  • d) baseprint.

 

True/False: Determine if the statement is true or false.

 

  1. Outlook is an example of PIM software.

 

  1. Battery life and size of screen should be considered when choosing a mobile device.

  1. A notebook computer is a high-cost option for having a mobile device for communicating.

 

  1. Subnotebooks are more powerful than PDAs/smartphones, but they cannot run a full-featured operating system.

 

  1. PDAs/smartphones are just as powerful as notebooks.

  1. PDAs/smartphones can run Microsoft Office software.

  1. Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages.

 

  1. The Apple iPhone uses a Microsoft operating system.

 

  1. You can send messages that include text, sound, images, and video clips using SMS.

  1. MMS stands for Multimedia Message Service.

  1. MMS allows you to save all, none, or part of a message.

 

  1. Text prediction algorithms provide a list of popular words and save typing time when using text messaging.

 

  1. Cell phones do not require special service providers to connect to the Internet.

 

  1. Cell phones can fall victim to viruses.

  1. Currently, cell phone connection speeds probably won't exceed 200 to 300 Kbps.

 

  1. WTML refers to the text-based format, similar to HTML, geared toward mobile device Web browsers.

 

  1. Most portable e-mail devices use "pull" technology, which means your e-mail will be delivered to your phone automatically so that your e-mail finds you whether you are thinking about it or not.

 

  1. WiFi is less susceptible to interference than EDGE or EDVO is.

 

  1. MP3 files can be played only on iPods.

 

  1. Not all PMP devices are necessarily just music players.

 

  1. There are cameras on the market that can play both music and videos.

 

  1. Some GPS systems can play MP3 files and display photos.

  1. Flash memory is volatile.

 

  1. The conversion rate is the number of times per second music is measured and converted into a digital value.

 

  1. A Secure Digital memory card is faster and more secure than a Compact Flash memory card.

 

  1. DRM-free music is music that has been released without any digital rights management.

 

  1. DRM-free music can legally be moved from system to system.

 

  1. PDAs/smartphones use both ROM and RAM in their daily operation.

 

  1. Tablet PCs use a text-entry system, called Digital Annotation, that allows users to write directly on the tablet screen.

 

  1. You can synchronize a PDA/smartphone to a PC but not to a cell phone.

  1. You can transfer a file from some PDAs/smartphones to other PDAs/smartphones using an infrared port.

 

  1. Currently, there is no productivity software available for mobile devices.

  1. PDAs/smartphones store application programs and data in ROM.

 

  1. PDA/smartphone processor speed is measured in hertz.

 

  1. Notebooks, because of their small size, are a better value than desktops.

 

  1. A disadvantage of ultramobile computers is that they have tiny, cramped keyboards.

  1. Benchmarking is a process in which task time is compared on similar devices and the results are used to judge performance.

 

  1. You can add memory to some, but not all, PDA/smartphone devices.

  1. You can connect printers, scanners, and full-size monitors to a docking station.

 

  1. PC cards are faster than ExpressCards.

 

  1. The amount of space a system takes up on a desk or table is referred to as its footprint.

 

  1. Nanology is the study of molecules and structures the size of which range from 1 to 100 nanometers.

 

  1. Nanology is the study of molecules and structures the size of which range from 1 to 100 nanometers.

 

 

 

 

Tech Support Specialist: John P, Information Systems Architect replied 9 years ago
That would be the $150 in total, this is going to take a few more hours probably 4 or so. Could you repost the previous questions with numbering so that we don't get out of sync? I'd hate to miss a question and throw all the following answers off.
Ask Your Own Computer Question
Customer reply replied 9 years ago
k im sorry about that
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

Did it anyway without the numbering, remember to use this thread for all the questions.

 

1 A
2 A
3 D
4 C
5 D
6 D
7 A
8 C
9 D
10 A
11 A
12 C
13 D
14 B
15 D
16 C
17 B
18 C
19 B
20 B
21 C
22 C
23 B
24 A
25 B
26 C
27 A
28 B
29 C
30 A
31 D
32 B
33 B
34 B
35 B
36 D
37 C
38 D
39 C
40 B
41 C
42 D
43 A
44 B
45 C
46 A
47 B
48 C
49 D
50 C
51 C
52 B

53 T
54 T
55 F
56 F
57 F
58 T
59 T
60 F
61 F
62 T
63 T
64 T
65 F
66 F
67 F
68 F
69 T
70 F
71 F
72 T
73 T
74 T
75 T
76 F
77 T
78 T
79 T
80 T
81 T
82 F
83 T
84 F
85 F
86 T
87 F
88 T
89 T
90 T
91 T
92 F
93 T
94 T
95 T

 

 

 

Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago
Have you viewed my post?
Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago
I'll be here for a few more hours if you return to this thread to continue the questions.
Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

Okay, I've waited 3 hours. I'm off to bed soon unless I hear from you. Return to this thread when you want to finish. The first two are completed.

 

Thanks,

John

Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 9 years ago

Don't know if you still need help, but I'm online again.

 

John

Ask Your Own Computer Question
Still looking for an answer to your question? 
Similar Q&As
Wondering if it's worthwhile to upgrade my sons computers so
Wondering if it's worthwhile to upgrade my sons computers so they can experience better graphics when they online game. This is the current set up in the pictures. Thank you… read more
Robert M.
Robert M.
Bachelor's Degree
3,613 satisfied customers
Many thanks I am actually working towards some musics for
Many thanksI am actually working towards some musics for the GYMThis music are set on speed of 120 and matches work out plansIn some tracks there will be motivating words in the music also… read more
Lorenz Vauck
Lorenz Vauck
Computer Expert,
Electrical Engineering
566 satisfied customers
I'm looking to outsource various data entry/MS Excel
I'm looking to outsource various data entry/MS Excel projects to India or other places. I'm looking for expert referrals to affordable companies that offer this service. How affordable is overseas out… read more
Pete
Pete
Senior Engineer,
Bachelor's Degree
3,266 satisfied customers
Stop searching for answers—
When playing games, my in-game chat becomes corrupted, the
When playing games, my in-game chat becomes corrupted, the keyboard 're-maps' so i can't type anything intelligable doesnt happen in desktop applications … read more
Lorenz Vauck
Lorenz Vauck
Computer Expert,
Electrical Engineering
566 satisfied customers
I'm considering purchasing a domain and using GoDaddy's service
I'm considering purchasing a domain and using GoDaddy's service where they offer to contact the owner and negotiate a deal between the two of you. 1. How does it work exactly? 2. How much would an exp… read more
Jins M. N.
Jins M. N.
Systems Administrator,
Diplom
2,153 satisfied customers
Hello - I have a large printed mailing list that I need to
Hello - I have a large printed mailing list that I need to digitize. I've scanned and created a PDF but my understanding is that the current OCR will create a lot of errors and that its just better to… read more
Robert M.
Robert M.
Bachelor's Degree
3,613 satisfied customers
Get a personalized answer to your question. 
I am planning to have a website For my business, where contractors
I am planning to have a website For my business, where contractors from certain countries in the world can buy a membership on my website to provide their services to people traveling to those countri… read more
Freddy M.
Freddy M.
IT Technician,
Vocational, Technical or Trade Scho
5,481 satisfied customers
Hi shopping for a desktop. I watch lots of videos online using
Hi shopping for a desktop. I watch lots of videos online using Flash player. I'm looking for a good/affordable deal. I was looking at those two : http://www.bestbuy.ca/en-CA/product/acer-acer-aspire-x… read more
Hans Uebelhoer
Hans Uebelhoer
Technical Support Manager,
Associate Degree
1,221 satisfied customers
You replied to my request last night but I was asleep and
Hello, you replied to my request last night but I was asleep and was unable to reply. I was wondering if you were still willing or able to fulfill my request.… read more
amit.gzp786
amit.gzp786
28 satisfied customers
Still looking for an answer to your question? 
When I attempt to send an email (to one recipient), I get a
When I attempt to send an email (to one recipient), I get a message that Yahoo is not sending it because of "suspicious activity on my account". There ain't been none, so what are they talking about" … read more
Frederick S.
Frederick S.
Computer Specialist,
High School or GED
7,241 satisfied customers
I just upgrade to Windows 7 and cannot run my Epson scanner
I just upgrade to Windows 7 and cannot run my Epson scanner (Epson Perfection 2450). The necessary drivers do NOT appear on the Windows 7/Epson update website. What should I do? Buy a new scanner? If … read more
Anthony Brewster
Anthony Brewster
I.T.,
High School or GED
5,352 satisfied customers
Hi I bought a laptop Tecra A8 from auction and is bios locked.
Hi I bought a laptop Tecra A8 from auction and is bios locked. Could you help to provide me with the Response Code in time if I give you the Challenge Code and Serial Number? What will be the minimum … read more
Dustin
Dustin
Support Technician,
8,066 satisfied customers
Stop searching for answers—
I need a 512K CF card for a Raymarine GPS Display. The only
I need a 512K CF card for a Raymarine GPS Display. The only cards I can find are 2GB and larger, and my unit cannot accept them. Where can I find these smaller cap cards? Thanks… read more
Adam Lowrance
Adam Lowrance
Senior Technician,
Vocational, Technical or Trade Scho
314 satisfied customers
Where can I buy a magenta print head for hp officejet d145
Where can I buy a magenta print head for hp officejet d145 printer? Also, how much should it cost? Thank you.… read more
lifesaver
lifesaver
Computer Software Engineer,
Bachelor's Degree
4,288 satisfied customers
I have HP Compaq 6710b. Recently, I accidentally drop it while
I have HP Compaq 6710b. Recently, I accidentally drop it while the charger was charging. The result is that the tip of the chrager was broken and, even worse, the tip got stuck inside the the charging… read more
Dennis Mariano
Dennis Mariano
Automotive Master Tech,
Mechanical Engineer
224 satisfied customers
Get a personalized answer to your question. 
Need computer code for powerpoint that will save user input ...
I think I will just have to print the powerpoint and have participants take a hard copy. Thanks for all of the effort.… read more
JC Dill
JC Dill
Professional Photographer, IT Consultant,
Vocational, Technical or Trade Scho
570 satisfied customers
How do I adjust the volume on my computer. A teenager ...
How do I adjust the volume on my computer. A teenager turned it off. I have tried several places and they are all adjusted to maximum but I have no sound.… read more
Bits n Bytes
Bits n Bytes
Home Improvement Repair Consultant,
Vocational, Technical or Trade School
7,358 satisfied customers
I have a question about my 10/2005 HP5139us with ...
I have a question about my 10/2005 HP5139us with Turion 2.0, 2048RAM, 120 HD laptop. Unit presently stopped running with no ac power recharge capable and battery dead. Sent unit to HP for diagnosis an… read more
ARIJIT
ARIJIT
Master's Degree
16 satisfied customers
Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

JustAnswer in the News:

Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.

What Customers are Saying:

My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed.

One Happy CustomerNew York

I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you!

RPAustin, TX

Hi John, Thank you for your expertise and, more important, for your kindness because they make me, almost, look forward to my next computer problem. After the next problem comes, I'll be delighted to correspond again with you. I'm told that I excel at programing. But system administration has never been one of my talents. So it's great to have an expert to rely on when the computer decides to stump me. God bless, Bill

Bill M.Schenectady, New York

The Expert answered my Mac question and was patient. He answered in a thorough and timely manner, keeping the response on a level that could understand. Thank you!

FrankCanada

Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help.

Mary C.Freshfield, Liverpool, UK

This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!!

AlexLos Angeles, CA

Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult.

GPHesperia, CA

< Previous | Next >

Meet the Experts:

Andy

Andy

Computer Consultant

5,316 satisfied customers

11yr exp, Comp Engg, Internet expert, Web developer, SEO

Engineer John C.

Engineer John C.

Computer Science Engineer

3,231 satisfied customers

Computer Science Engineer with 10 years of experience in Computer Support, and Microsoft, A+ and Cisco certified

Ryan H.

Ryan H.

Computer Support Specialist

1,741 satisfied customers

A+ Certified Technician - 10 Years experience working with all types of computer systems.

Jane Lefler

Jane Lefler

Sr Prog Analyst / Technician

3 satisfied customers

Computer Programmer / Technician/ Consultant 16+ years

Frederick S.

Frederick S.

Computer Specialist

7,241 satisfied customers

Computer technician and founder of a home PC repair company.

Sudipto

Sudipto

Hardware Engineer

4,370 satisfied customers

Certificate Course In Computer Maintenance

lifesaver

lifesaver

Computer Software Engineer

4,288 satisfied customers

Engineering degree in Computer science,Microsoft Certified Professional.JA computer expert.

< Previous | Next >

Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Show MoreShow Less
David L.

David L.

Computer Expert

20 years experience as a Computer Engineer. Microsoft & Cisco Certified.

5,752 Satisfied Customers

Pearl avatarPearl, Assistant