Computer

For Online Computer Support, Ask a Computer Technician

Ask a Computer Expert,
Get an Answer ASAP!

Computer

I actually have a lot of questions I need to get answered can

Customer Question
I post them and you...
I actually have a lot of questions I need to get answered can I post them and you tell me how many you are willing to answer and for how much? I think 14 bucks should be more than just one question, I ask that last one to see how this website worked but know I see that the question do get answered right away and that this website acutely work so can we make an arrangement how the price and amount of question?
Submitted: 8 years ago.Category: Computer
Show More
Show Less
Ask Your Own Computer Question
Answered in 1 minute by:
12/13/2009
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago
John P
John P, Information Systems Architect
Category: Computer
Satisfied Customers: 451
Experience: 13+ Years of Cutting Edge Systems Engineering, Consulting (Fortune 100 and SMB), and Architecture
Verified

Tell me how many questions you have and I'll work out a deal with you.

Ask Your Own Computer Question
Customer reply replied 8 years ago
a lot of multiple chose question. 7X86= about 602 maybe a little less.
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

602 Questions? What do you think is a fair price?

Ask Your Own Computer Question
Customer reply replied 8 years ago

i don't really know, i mean how long will it take you? time is important also. the questions are computer level. what's a good price for you? im sure that with the high qualifications you have as a computer engineer these questions will be easy for you, nothing that you will have to send to much time looking up.

 

Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

It depends on if you are scanning the questions or writing them and the complexity, multiple choice makes things easier. A quarter a question would be around $150.00 do you think that's acceptable (you can use the bonus function after I've answered the questions)? If not, let me know as I genuinely do not know how much time this will take as I haven't seen the questions.

 

Thanks,

John

Ask Your Own Computer Question
Customer reply replied 8 years ago
well here is an example of the questions so you can see if they are difficult or not. i can cut and paste them all in this box. i was hoping not to spend more than 100. do you think you can consider lowing the price a bit? also if you can please let me know about how long it will take to finish i will truly appreciate it, i apologies if i sound pushy or like if im rushing you but i am on a time crunch.

 

 

1. Which of the following is NOT an example of a network node?

  • a) a modem
  • b) a printer
  • c) a computer
  • d) an NOS

 

2. A computer network is defined as two or more computers connected with __________ so that they can communicate with each other.

  • a) the Internet
  • b) software
  • c) hardware
  • d) software and hardware

 

3. Networks allow users to share?

  • a) peripherals.
  • b) flash drives.
  • c) paper.
  • d) phones.

 

4. A(n) __________ allows sharing of a broadband Internet connection.

  • a) phone cord
  • b) hub
  • c) adapter
  • d) router

 

5. Network architectures are classified according to?

  • a) the way they are controlled and the distance between their nodes.
  • b) the distance between the hub and the router.
  • c) the bandwidth supplied by the connection.
  • d) the speed at which the processor runs.

 

6. Due to the expansion of media files on home computers, __________ options are now being marketed; however, they are not as full featured as their business-world counterparts.

  • a) external hard drive
  • b) home server
  • c) mega flash drives
  • d) online storage

 

7. Most computers today contain network adapters installed inside as expansion cards. Such adapters are referred to as:

  • a) network adapter cards.
  • b) network expansion cards.
  • c) network interface cards.
  • d) ethernet cards.

 

8. Normal telephone wire is:

  • a) fiber-optic cable.
  • b) coaxial cable.
  • c) twisted-pair cable.
  • d) ethernet cable.

 

9. The most common type of network is:

  • a) a token ring LAN.
  • b) a peer-to-peer (P2P) network.
  • c) a client/server network.
  • d) a WAN.

 

10. In a client/server network, there are usually many more __________ than __________.

  • a) servers, clients
  • b) printers, computers
  • c) clients, servers
  • d) clients, computers

 

11. A network that has ten or more nodes is usually configured as a:

  • a) client/server network.
  • b) home network.
  • c) peer-to-peer network.
  • d) WAN

 

12. Which of the following is NOT an example of a WAN?

  • a) LANs connected in a single building
  • b) a LAN at the main university campus connected with a LAN at the university extension site
  • c) a computer at a bank's main branch connected with a LAN at the bank's branch office across town
  • d) the computers in a lab at your school connected to the computers in a lab at another school in your town

 

13. Which transmission medium is able to transmit data the fastest?

  • a) twisted-pair cable
  • b) coaxial cable
  • c) fiber-optic cable
  • d) wireless

 

14. The data transfer rate of a wireless network is usually measured in?

  • a) Kbps.
  • b) Gbps.
  • c) Tbps.
  • d) Mbps.

 

15. Throughput, the actual speed of data transfer that is achieved in a network, is usually?

  • a) more than the data transfer rate.
  • b) the same as the data transfer rate.
  • c) less than the data transfer rate.
  • d) dependent on the cable's bend radius.

 

16. Network adapters:

  • a) enable nodes in a network to communicate with each other.
  • b) are built into the motherboard on each node.
  • c) are always Ethernet NICs.
  • d) are necessary only on servers in a client/server network.

 

17. Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?

  • a) USB ports
  • b) firewalls
  • c) network interface cards (NICs)
  • d) routers and switches

 

18. Client/server networks are controlled by a central server that runs a specialized piece of software called?

  • a) Windows Vista.
  • b) a network operating system(NOS).
  • c) a firewall.
  • d) NetWare.

 

19. The major difference in types of P2P networks is the __________ by which the nodes are connected.

  • a) software
  • b) port
  • c) network interface card
  • d) transmission medium

 

20. Ethernet networks are named for?

  • a) the type of NIC installed in every node.
  • b) the protocol used.
  • c) the type of transmission medium used.
  • d) the type of operating system installed on every node.

 

21. An Ethernet adapter is a:

  • a) specific type of NIC.
  • b) specific type of router.
  • c) transmission medium.
  • d) device that uses a simple algorithm to move data.

 

22. The most popular transmission medium option for wired Ethernet networks is:

  • a) unshielded twisted-pair cable (UTP).
  • b) fiber-optic cable.
  • c) power-line cable.
  • d) coaxial cable.

 

23. Maximum cable run (length) for Ethernet networks using UTP cable is approximately:

  • a) 50 feet.
  • b) 328 feet.
  • c) 550 feet.
  • d) 1,100 feet.

 

24. Which of the following is necessary to send data between a home network and the Internet?

  • a) a cable
  • b) a hub
  • c) a switch
  • d) a router

 

25. A wireless network uses which of the following as its transmission medium?

  • a) laser waves
  • b) fiber-optic waves
  • c) sound waves
  • d) radio waves

 

26. Which of the following devices translates electronic data into radio waves?

  • a) a modem
  • b) a fiber-optic cable
  • c) a transceiver
  • d) a receiver

 

27. Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?

  • a) a wireless network adapter
  • b) a power-line adapter
  • c) a transceiver
  • d) a modem

 

28. Which of the following devices is needed to share an Internet connection on a wireless network?

  • a) a wireless hub
  • b) a fiber-optic cable
  • c) a wireless router
  • d) a modem

 

29. If you frequently transfer large data files between nodes on a network, which of the following networks would be the best choice?

  • a) dial-up
  • b) power-line
  • c) Ethernet
  • d) wireless

 

30. To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT:

  • a) reposition the computer you are using.
  • b) move the computers in the network closer together.
  • c) move your computer next to a cement wall.
  • d) add a wireless access point (WAP) to the network.

 

31. Most __________ allow you to connect wireless and wired computers to the same network.

  • a) wireless routers
  • b) servers
  • c) transceivers
  • d) modems

 

32. Most __________ allow you to connect wireless and wired computers to the same network.

  • a) wireless routers
  • b) servers
  • c) transceivers
  • d) modems

 

33. Public places where you can wirelessly connect to the Internet are known as?

  • a) links.
  • b) hotspots.
  • c) wired spots.
  • d) gateways.

 

34. All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:

  • a) power-line networks cost less.
  • b) you don't need to run new wires with a power-line network.
  • c) you are experiencing interference with a wireless Ethernet network.
  • d) power-line networks can be easier to install.

 

35. When setting up a network, you should set up any computers running the Microsoft Vista operating system:

  • a) first.
  • b) last.
  • c) only before any computers running Linux.
  • d) The order does not matter.

 

36. The weakest link in any computer security system is:

  • a) the operating system.
  • b) the network.
  • c) USB ports.
  • d) the users.

 

37. What is the best thing a company can do to prevent its electronic data from being stolen?

  • a) establish detailed security policies
  • b) disconnect employees' computers from the Internet
  • c) shut off access on computers to flash drives
  • d) install hidden cameras

 

38. Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

  • a) social networking
  • b) cybercrime
  • c) phishing
  • d) hacking

 

39. A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:

  • a) use your debit card information to purchase items illegally.
  • b) assume your identity.
  • c) steal your logon and passwords for various accounts.
  • d) launch a denial of service (DoS) attack on your computer.

 

40. Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background?

  • a) a virus
  • b) a Trojan horse
  • c) a worm
  • d) a zombie

 

41. Distributed denial of service (DDoS) attacks have been associated with:

  • a) attacks on famous blogs, eBay, and Amazon.com.
  • b) identity theft.
  • c) misuse of credit card information.
  • d) theft of financial data at the IRS.

 

42. The most likely method a hacker would use to access a computer is:

  • a) sitting down at a computer and installing hacking software.
  • b) overhearing your password XXXXX log-on information.
  • c) entering through a company intranet.
  • d) entering through the Internet.

 

43. Rules for creating passwords include all of the following EXCEPT:

  • a) keep your password XXXXX secret.
  • b) keep your password XXXXX down, and put it in your wallet.
  • c) change your password XXXXX
  • d) create a hard-to-guess password, with a combination of letters and numbers.

 

44. One can thwart most hacking problems by installing a:

  • a) network.
  • b) firewall.
  • c) hub.
  • d) security policy.

 

45. __________ makes broadband users more vulnerable to attacks.

  • a) Dynamic addressing
  • b) IP addressing
  • c) Static addressing
  • d) Greater bandwidth

 

46. The purpose of Network Address Translation is to?

  • a) translate IP addresses from the Internet.
  • b) hide user IP addresses from the Internet.
  • c) convert logical ports to physical port configurations.
  • d) dynamically assign IP addresses via an ISP.

 

47. Manufacturers such as Linksys, D-Link, and Netgear make which of the following devices that can double as firewalls?

  • a) networks
  • b) NICs
  • c) modems
  • d) routers

 

48. To secure a wireless network, you should take all the following precautions EXCEPT:

  • a) changing your network name.
  • b) changing the default password XXXXX your router.
  • c) turning your computer off at night.
  • d) disabling SSID broadcast.

 

49. How many viruses and virus variants exist today?

  • a) tens
  • b) hundreds
  • c) thousands
  • d) millions

 

50. Which type of virus was the famous Michelangelo virus?

  • a) a time bomb
  • b) a worm
  • c) a script virus
  • d) an e-mail virus

 

51. Which of the following classifications of viruses changes its own code?

  • a) stealth
  • b) polymorphic
  • c) multipartite
  • d) worm

 

52. Quarantining with regard to computer protection is defined as:

  • a) placing a found virus in a secure area on the hard drive.
  • b) updating your antivirus software.
  • c) repairing the infected file.
  • d) deleting the infected file.

 

 

True/False: Determine if the statement is true or false.

 

53. It is not possible to configure a client/server network for home use.

 

54. A client computer is the computer on which users accomplish specific tasks.

 

55. A single computer can function as both a client and a server, but performance will be degraded.

 

56. Most desktop and notebook systems sold today are network ready.

 

57. MAN stands for mobile area network.

 

58. When a network is sponsored by a government entity to provide Internet access to a specific geographic area, that network will generally be designated as a MAN.

 

59. The cost of a P2P network is slightly greater than the cost of a client/server network.

 

60. P2P networks are more commonly used in small businesses than in homes.

 

61. Wireless networks are more vulnerable to attack than wired networks.

 

62. A network-ready device is a device that may be attached to a network but still has to connect to a networked computer first.


63. A wireless NIC from one manufacturer may not work with a DSL router from another manufacturer, even when both devices claim to be developed using the same standards.

 

64. The 802.11g standard supports transfer rates of up to 30 Mbps.

 

65. 802.11 devices are less susceptible to interference than 802.11g devices are.


66. Wireless networks are no more vulnerable to packet sniffers than any other type of network.

 

67. SMTP uses port 21.

 

68. SMTP stands for Simple Mail Transfer Protocol.

 

69. The practice of piggybacking is illegal.

 

70. The majority of investigations related to cybercrime involve debit card fraud.

 

71. The Master Boot Record executes every time a computer boots up.

 

72. Extreme G and Enhanced G standards were both based on 802.11g standards but used proprietary hardware and software tweaks to increase performance.

 

73. 802.11g devices have a faster throughput than 802.11n devices.

 

74. The Internet is an example of a client/server network.


75. Cybercriminals are usually security individuals who work in large corporations with a vast knowledge base of computing and networking.

 

76. In a peer-to-peer network, one computer acts as the server.

 

77. One can have both wired and wireless nodes on a single P2P network.

 

78. Data transfer rate does NOT affect the speed at which a user can download a file from a WAN.

 

79. Switches receive data packets and send them to the node for which they are intended on the same network.

 

80. A P2P network needs network operating system software installed on every node.

 

81. Ethernet networks are always connected using twisted-pair cable technology.

 

82. The Mac OS does NOT support P2P networking.


83. Most computers today come with Ethernet adapters already installed.

 

84. Repeaters can extend a network's range by amplifying the signal.

 

85. When configured correctly, network firewalls can help protect your network.

 

86. White-hat hackers perform a needed legal service for society.

 

Tech Support Specialist: John P, Information Systems Architect replied 8 years ago
I'll start on it and see how long these take, but if it takes a long time, I'll have to be firm on my price. If it is short I'll accept the $100. It will depend though on how long this takes, some may be specific to your book.
Ask Your Own Computer Question
Customer reply replied 8 years ago
k, i will accept your price. you are right it is fair enough. it is a lot of questions. my only worry is that we run out of time do you think you could get this done within a few hours? or will it take you days? how would you like me to pay? half now and half after completion? or do i pay at the end?
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

Just bonus $141 at the end when I'm done (since this question is worth $9). I'll work on it until we are done tonight. Don't post any more until I post back the answers to the first 86.

 

Thanks,

John

Ask Your Own Computer Question
Customer reply replied 8 years ago
so you are charging me 9 dollars a question?
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

No, not at all, just keep posting here until we finish all of them. We'll do all of them in this thread. We don't need a new thread to do all the questions. Does that make sense?

 

Here's the first set:

 

1 D
2 D
3 A
4 D
5 A
6 B
7 C
8 C
9 A
10 C
11 A
12 A
13 C
14 D
15 C
16 A
17 D
18 B
19 A
20 B
21 A
22 A
23 B
24 D
25 D
26 C
27 A
28 C
29 C
30 C
31 A
32 A (this is a repost of number 31 question)
33 B
34 A
35 D
36 D
37 A
38 B
39 D
40 B
41 A
42 D
43 B
44 B
45 C
46 A
47 D
48 C
49 D
50 B
51 B
52 A
53 F
54 T
55 T
56 T
57 F
58 T
59 F
60 F
61 T
62 F
63 F
64 F
65 F
66 F
67 F
68 T
69 T
70 T
71 T
72 T
73 F
74 T
75 F
76 F
77 T
78 F
79 F
80 T
81 F
82 F
83 T
84 T
85 T
86 T

 

 

Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago
After rereading your previous post, I'll take a minute to explain how this site works. I don't get paid until you click accept. For that to happen, I need to post an Answer first for you to accept. Since there are so many questions, I won't post that until the last post to make it easier. Secondly, once you click accept, no matter how much information is in this thread, it's only $9 (the question value you assigned when you opened the question.) After I've answered the questions, you've clicked accept, you can then bonus the additional $141.00 to make it an even $150 total. Does that clarify things for you?
Ask Your Own Computer Question
Customer reply replied 8 years ago

 

 

So how much are you charging me in total?

  1. A combination of a phone and a PDA is referred to as a:
  • a) smartphone.
  • b) combo-phone.
  • c) cellular phone.
  • d) personal digital assistant phone.

 

  1. __________ are electronic tools such as cell phones, portable media players, and notebooks.
  • a) Mobile computing devices.
  • b) Portable digital assistants.
  • c) Smart tools.

 

  1. Microsoft __________ is an example of personal information management software that allows you to track your schedule or your address book.
  • a) Excel.
  • b) Word.
  • c) Access.
  • d) Outlook.

 

  1. Which of the following is NOT an advantage of using mobile devices?.
  • a) You can access your files wherever you are.
  • b) You can keep in contact with others via e-mail or phone wherever you are.
  • c) You can access the Internet at faster speeds.
  • d) You can access the Internet wherever you are.

 

  1. If a mobile device can access the Internet through a wireless network, it is considered?
  • a) Web-connected.
  • b) Web-featured.
  • c) Web-enhanced.
  • d) Web-enabled.

 

  1. Which of the following is NOT a limitation of mobile computing?
  • a) the length of battery life.
  • b) whether the screen is available in color.
  • c) the size of the screen.
  • d) the speed of the Internet connection.

 

  1. Which of the following allows you to carry media files?
  • a) PMP.
  • b) PDQ.
  • c) PIM.
  • d) POM.

 

  1. A smartphone is the result of __________, which is a combination of the tools found in more than one portable device?
  • a) combination.
  • b) unification.
  • c) convergence.
  • d) blending.

 

  1. A __________ runs a full-featured operating system and weighs less than two pounds?
  • a) PDA .
  • b) PIM.
  • c) smartphone.
  • d) subnotebook.

 

  1. Symbian is?
  • a) an operating system for cell phones.
  • b) a type of application software.
  • c) a utility program for PDA/smartphone.
  • d) a form of antivirus software.

 

  1. The Apple iPhone uses a version of __________ as an operating system?
  • a) OS X.
  • b) Windows Mobile.
  • c) Linux.
  • d) Red Hat.

 

  1. ROM is?
  • a) volatile memory.
  • b) flash memory.
  • c) nonvolatile memory.
  • d) temporary storage.

 

  1. The operating system of a cell phone is stored in?
  • a) RAM.
  • b) the CPU.
  • c) the transceiver.
  • d) ROM.

 

  1. An analog-to-digital converter chip.
  • a) converts digital sound waves into analog sound waves.
  • b) converts the sound waves from a voice into a digital signal.
  • c) converts written data into sound waves.
  • d) converts letters from the keyboard into digital format.

 

  1. Which of the following is a new program being tested by Apple and Starbucks that will allow iPhone users to identify, purchase, and download a song they are currently listening to at a Starbucks.
  • a) Music ID.
  • b) Get It.
  • c) Now Playing.
  • d) Audio Delivery.

 

  1. Your cell phone call may be disconnected or dropped if:
  • a) the distance between the two phones is too great.
  • b) the distance between the two phones is too small.
  • c) the distance between the base stations is too large.
  • d) the distance between the base stations is too small.

 

  1. A base transceiver station receives a request for cellular service and passes that request to a central location called a:
  • a) cellular request station.
  • b) mobile switching center.
  • c) mobile conversion station.
  • d) cellular switching tower.

 

  1. Text messaging is also called:
  • a) test messaging system (TMS).
  • b) sending messages shortly (SMS).
  • c) short message service (SMS).
  • d) short text messaging (STM).

 

  1. Text prediction __________ provide a list of popular words and save typing time when using text messaging.
  • a) dictionaries.
  • b) algorithms.
  • c) services.
  • d) accessories.

 

  1. Which of the following allows users to send text, sound, images, and video clips to other phones or e-mail addresses?
  • a) SMS.
  • b) MMS.
  • c) MSM.
  • d) SSM.

 

  1. SMS delivers messages to the appropriate mobile device using __________ technology.
  • a) receive and forward.
  • b) MMS.
  • c) store and forward.
  • d) Bluetooth.

 

  1. Which of the following refers to options given for connectivity to the Internet and usually covers text messages that are sent or received?
  • a) connectivity plans.
  • b) Internet plans.
  • c) data plans.
  • d) message plans.

 

  1. Which of the following is specialized software made to display Web pages on a cell phone?
  • a) minibrowser.
  • b) microbrowser.
  • c) cell browser.
  • d) online browser.

  1. Opera Mobile is an example of?
  • a) a microbrowser.
  • b) SmartMedia.
  • c) a smartphone.
  • d) a wireless ISP.

 

  1. Which of the following is similar to HTML except that it is geared toward making Web pages that are viewable on mobile devices?
  • a) WTML (wireless text markup language).
  • b) WML (wireless markup language).
  • c) SGML (standard generalized markup language).
  • d) WTL (wireless text language).

 

  1. LogMeIn is an example of a?
  • a) voice-recognition system.
  • b) GPS system.
  • c) remote access service for mobile devices.
  • d) type of smartphone.

 

  1. An iPod is an example of a?
  • a) PMP.
  • b) PDA/smartphone.
  • c) PIM.
  • d) MPD.

 

  1. An iPod with an 80-GB hard drive can hold how many songs?
  • a) up to 80.
  • b) up to 20,000.
  • c) up to 160,000.
  • d) up to 8 million.

  1. A portable media player can play files with all of the following file extensions EXCEPT:
  • a) AVI.
  • b) MP3.
  • c) DOC.
  • d) MPEG-4.

 

  1. Flash memory is a type of:
  • a) volatile memory.
  • b) nonvolatile memory.
  • c) vibrant memory.
  • d) nonvibrant memory.

 

  1. To transfer files from your computer to a portable media player (PMP), most newer PMPs use a __________ port or a FireWire port.
  • a) multimedia.
  • b) serial.
  • c) parallel.
  • d) USB 2.0.

 

  1. Which of the following describes the number of times, usually in Kbps, that music can be measured and converted into a digital format?
  • a) converting rate.
  • b) sampling rate.
  • c) conversion rate.
  • d) simplifying rate.

 

  1. Which of the following is the process of sharing files between two or more computers?
  • a) direct sharing (DS).
  • b) peer-to-peer (P2P) sharing.
  • c) computer-to-computer (C2C) sharing.
  • d) person-to-person (P2P) sharing.

 

  1. Which of the following is the ability to download and play music with restrictions enforced about its use?
  • a) purchased downloads.
  • b) secure digital downloads.
  • c) tethered downloads.
  • d) tied-down downloads.

 

 

  1. Ensuring that two devices--for example, a PC and a PDA/smartphone--have the same data is the process of?
  • a) simplifying.
  • b) synchronizing.
  • c) unifying.
  • d) standardizing.

  1. Which of the following tools is used to make entries into a handheld device via a touch-sensitive screen?
  • a) a pen.
  • b) a pencil.
  • c) a keyboard.
  • d) a stylus.

 

  1. Which process compares task time on similar devices to help judge performance levels?
  • a) beta testing.
  • b) beta testing.
  • c) benchmarking.
  • d) device profiling.

 

  1. __________ was originally called Pocket PC.
  • a) Palm OS.
  • b) Symbian.
  • c) Linux Mobile.
  • d) Windows Mobile.

 

  1. All of the following Microsoft application programs, specifically designed for mobile devices, are currently available EXCEPT:
  • a) Outlook.
  • b) Word.
  • c) Access.
  • d) Excel.

 

  1. Which of the following is a way for portable devices to send messages wirelessly, via radio waves, over a range of less than 30 feet?
  • a) beaming.
  • b) Bluetooth.
  • c) infrared.
  • d) cell phone.

 

  1. A device that combines portable device capabilities, such as those of a PDA, cell phone, and PMP, is called a?
  • a) multifunction phone.
  • b) CPP (cell/PDA/PMP).
  • c) combophone.
  • d) smartphone.

  1. A tablet PC is all of the following EXCEPT?
  • a) a computer that allows you to write notes on the pressure-sensitive screen using a stylus.
  • b) lightweight and portable.
  • c) like a clipboard when in "tablet" mode.
  • d) less expensive than a regular size notebook.

  1. When a stylus is used to input information on a tablet PC, the user is using an entry system referred to as?
  • a) digital ink.
  • b) virtual ink.
  • c) tablet ink.
  • d) stylus ink.

 

  1. GPS refers to?
  • a) goals performance system.
  • b) global positioning system.
  • c) global parts system.
  • d) ground position system.

 

 

  1. Which of the following allows you to connect a monitor, printer, and so on to a notebook computer via one connection as opposed to connecting individual devices?
  • a) a connect-all.
  • b) an all-in-one.
  • c) a docking station.
  • d) a connector station.

 

  1. The more _________ a battery has, the greater its capacity.
  • a) cells.
  • b) power.
  • c) amps.
  • d) voltage.

 

  1. __________ is the text-entry system for drawing images and entering text by writing on the surface of a tablet PC.
  • a) Grafitti text.
  • b) Digital annotation.
  • c) Digital ink.
  • d) Mobile write.

  1. The measurement of battery life for a notebook computer is listed in:
  • a) clock hours.
  • b) clock minutes.
  • c) ampere-hours.
  • d) ampere-minutes.

  1. A fully charged, high-performance notebook battery can last up to:
  • a) 1 hour.
  • b) 3 hours.
  • c) 5 hours.
  • d) 10 hours.

 

  1. A category of notebook computers that weigh less than two pounds is the:
  • a) ultramobile computer.
  • b) mini-computer.
  • c) ultraportable computer.
  • d) micro-computer.

 

  1. The new standard for expansion slots on PCs is called:
  • a) expansion cards.
  • b) add-in cards.
  • c) ExpressCards.
  • d) QuickCards.

 

  1. Which of the following terms refers to the amount of space on a desk or table that a computer uses?
  • a) base size.
  • b) footprint.
  • c) foot size.
  • d) baseprint.

 

True/False: Determine if the statement is true or false.

 

  1. Outlook is an example of PIM software.

 

  1. Battery life and size of screen should be considered when choosing a mobile device.

  1. A notebook computer is a high-cost option for having a mobile device for communicating.

 

  1. Subnotebooks are more powerful than PDAs/smartphones, but they cannot run a full-featured operating system.

 

  1. PDAs/smartphones are just as powerful as notebooks.

  1. PDAs/smartphones can run Microsoft Office software.

  1. Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages.

 

  1. The Apple iPhone uses a Microsoft operating system.

 

  1. You can send messages that include text, sound, images, and video clips using SMS.

  1. MMS stands for Multimedia Message Service.

  1. MMS allows you to save all, none, or part of a message.

 

  1. Text prediction algorithms provide a list of popular words and save typing time when using text messaging.

 

  1. Cell phones do not require special service providers to connect to the Internet.

 

  1. Cell phones can fall victim to viruses.

  1. Currently, cell phone connection speeds probably won't exceed 200 to 300 Kbps.

 

  1. WTML refers to the text-based format, similar to HTML, geared toward mobile device Web browsers.

 

  1. Most portable e-mail devices use "pull" technology, which means your e-mail will be delivered to your phone automatically so that your e-mail finds you whether you are thinking about it or not.

 

  1. WiFi is less susceptible to interference than EDGE or EDVO is.

 

  1. MP3 files can be played only on iPods.

 

  1. Not all PMP devices are necessarily just music players.

 

  1. There are cameras on the market that can play both music and videos.

 

  1. Some GPS systems can play MP3 files and display photos.

  1. Flash memory is volatile.

 

  1. The conversion rate is the number of times per second music is measured and converted into a digital value.

 

  1. A Secure Digital memory card is faster and more secure than a Compact Flash memory card.

 

  1. DRM-free music is music that has been released without any digital rights management.

 

  1. DRM-free music can legally be moved from system to system.

 

  1. PDAs/smartphones use both ROM and RAM in their daily operation.

 

  1. Tablet PCs use a text-entry system, called Digital Annotation, that allows users to write directly on the tablet screen.

 

  1. You can synchronize a PDA/smartphone to a PC but not to a cell phone.

  1. You can transfer a file from some PDAs/smartphones to other PDAs/smartphones using an infrared port.

 

  1. Currently, there is no productivity software available for mobile devices.

  1. PDAs/smartphones store application programs and data in ROM.

 

  1. PDA/smartphone processor speed is measured in hertz.

 

  1. Notebooks, because of their small size, are a better value than desktops.

 

  1. A disadvantage of ultramobile computers is that they have tiny, cramped keyboards.

  1. Benchmarking is a process in which task time is compared on similar devices and the results are used to judge performance.

 

  1. You can add memory to some, but not all, PDA/smartphone devices.

  1. You can connect printers, scanners, and full-size monitors to a docking station.

 

  1. PC cards are faster than ExpressCards.

 

  1. The amount of space a system takes up on a desk or table is referred to as its footprint.

 

  1. Nanology is the study of molecules and structures the size of which range from 1 to 100 nanometers.

 

  1. Nanology is the study of molecules and structures the size of which range from 1 to 100 nanometers.

 

 

 

 

Tech Support Specialist: John P, Information Systems Architect replied 8 years ago
That would be the $150 in total, this is going to take a few more hours probably 4 or so. Could you repost the previous questions with numbering so that we don't get out of sync? I'd hate to miss a question and throw all the following answers off.
Ask Your Own Computer Question
Customer reply replied 8 years ago
k im sorry about that
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

Did it anyway without the numbering, remember to use this thread for all the questions.

 

1 A
2 A
3 D
4 C
5 D
6 D
7 A
8 C
9 D
10 A
11 A
12 C
13 D
14 B
15 D
16 C
17 B
18 C
19 B
20 B
21 C
22 C
23 B
24 A
25 B
26 C
27 A
28 B
29 C
30 A
31 D
32 B
33 B
34 B
35 B
36 D
37 C
38 D
39 C
40 B
41 C
42 D
43 A
44 B
45 C
46 A
47 B
48 C
49 D
50 C
51 C
52 B

53 T
54 T
55 F
56 F
57 F
58 T
59 T
60 F
61 F
62 T
63 T
64 T
65 F
66 F
67 F
68 F
69 T
70 F
71 F
72 T
73 T
74 T
75 T
76 F
77 T
78 T
79 T
80 T
81 T
82 F
83 T
84 F
85 F
86 T
87 F
88 T
89 T
90 T
91 T
92 F
93 T
94 T
95 T

 

 

 

Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago
Have you viewed my post?
Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago
I'll be here for a few more hours if you return to this thread to continue the questions.
Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

Okay, I've waited 3 hours. I'm off to bed soon unless I hear from you. Return to this thread when you want to finish. The first two are completed.

 

Thanks,

John

Ask Your Own Computer Question
Tech Support Specialist: John P, Information Systems Architect replied 8 years ago

Don't know if you still need help, but I'm online again.

 

John

Ask Your Own Computer Question
Ask Andy Your Own Question
Andy
Andy
Andy, Computer Consultant
Category: Computer
Satisfied Customers: 5,316
5,316 Satisfied Customers
Experience: 11yr exp, Comp Engg, Internet expert, Web developer, SEO

Andy is online now

A new question is answered every 9 seconds

How JustAnswer works:

  • Ask an ExpertExperts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional AnswerVia email, text message, or notification as you wait on our site. Ask follow up questions if you need to.
  • 100% Satisfaction GuaranteeRate the answer you receive.

JustAnswer in the News:

Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.

What Customers are Saying:

My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed.

One Happy CustomerNew York

I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you!

RPAustin, TX

Hi John, Thank you for your expertise and, more important, for your kindness because they make me, almost, look forward to my next computer problem. After the next problem comes, I'll be delighted to correspond again with you. I'm told that I excel at programing. But system administration has never been one of my talents. So it's great to have an expert to rely on when the computer decides to stump me. God bless, Bill

Bill M.Schenectady, New York

The Expert answered my Mac question and was patient. He answered in a thorough and timely manner, keeping the response on a level that could understand. Thank you!

FrankCanada

Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help.

Mary C.Freshfield, Liverpool, UK

This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!!

AlexLos Angeles, CA

Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult.

GPHesperia, CA

< Previous | Next >

Meet the Experts:

Andy

Andy

Computer Consultant

5,316 satisfied customers

11yr exp, Comp Engg, Internet expert, Web developer, SEO

Engineer John C.

Engineer John C.

Computer Science Engineer

3,228 satisfied customers

Computer Science Engineer with 10 years of experience in Computer Support, and Microsoft, A+ and Cisco certified

Ryan H.

Ryan H.

Computer Support Specialist

1,741 satisfied customers

A+ Certified Technician - 10 Years experience working with all types of computer systems.

Jane Lefler

Jane Lefler

Sr Prog Analyst / Technician

2 satisfied customers

Computer Programmer / Technician/ Consultant 16+ years

Frederick S.

Frederick S.

Computer Specialist

7,241 satisfied customers

Computer technician and founder of a home PC repair company.

lifesaver

lifesaver

Computer Software Engineer

4,288 satisfied customers

Engineering degree in Computer science,Microsoft Certified Professional.JA computer expert.

Sudipto

Sudipto

Hardware Engineer

4,167 satisfied customers

Certificate Course In Computer Maintenance

< Previous | Next >

Related Computer Questions
I can't get into my Emails-password not accepted even though
I can't get into my Emails-password ***** accepted even though I said to … read more
Kamil Anwar
Kamil Anwar
IT Consultant / Systems Engineer
Bachelor\u0027s Degree
435 satisfied customers
Gateway GT5682. A little ancient......usb ports not working.
Gateway GT5682. A little ancient......usb ports not working. Keyboard is a ps/2 plug in. So keyboard works. … read more
Russell H.
Russell H.
computer technology consultant
Vocational, Technical or Trade Scho
781 satisfied customers
Nothing...want to cancel my SKYPE contract and phone# Have
nothing...want to cancel my SKYPE contract and phone# … read more
ChrisC
ChrisC
PC Technician
Associate Degree
660 satisfied customers
I purchased Office 365 yesterday from a Staples outlet but I
My name is ***** ***** I purchased Office 365 yesterday from a Staples outlet but I cant seem to get it to load. I have the 5 user edition … read more
Kamil Anwar
Kamil Anwar
IT Consultant / Systems Engineer
Bachelor\u0027s Degree
435 satisfied customers
I bought Microsoft Office 365 at WalMart the same day I
I bought Microsoft Office 365 at WalMart the same day I bought a Lenovo computer. The computer has had a catastrophic failure and the only thing I have is the Product Key. What do I need to do to get … read more
Kamil Anwar
Kamil Anwar
IT Consultant / Systems Engineer
Bachelor\u0027s Degree
435 satisfied customers
It won't connect with the internet. I get a stop code:
It won't connect with the internet. I get a stop code: inaccessible boot device message. … read more
David L.
David L.
Bachelor\u0027s Degree
6 satisfied customers
I have a Kodak Easyshare DX6340 that works perfectly. I
Hi! I have a Kodak Easyshare DX6340 that works perfectly. I upgraded to Windows 10 and find the camera is not compatible. Outside of getting a new camera, is there any way to make it work? Thanks! … read more
Viet - Computer Tech
Viet - Computer Tech
Computer Technican
Bachelor\u0027s Degree
953 satisfied customers
I have the required (or newer) versions of Chrome, Firefox
I have the required (or newer) versions of Chrome, Firefox and Safari but can't stream a prime tv series … read more
Mike Taylor
Mike Taylor
40 satisfied customers
Microsoft called and said do not uses my computer,and have
Microsoft called and said do not uses my computer,and have someone look into the problem … read more
Michelle
Michelle
Manager operations
Bachelor\u0027s Degree
1,275 satisfied customers
I can't get in to open a account. When I get to the app
Never I just installed it a few minutes ago my son gave me a iPad for xmas … read more
Mike Taylor
Mike Taylor
40 satisfied customers
HiI have forgoten my password. I'm trying to change access
HiI have forgoten my password JA: What exactly are you having trouble accessing? Customer: I'm trying to change access my apple code JA: When did you last change your password ***** Apple ID? Customer… read more
Viet - Computer Tech
Viet - Computer Tech
Computer Technican
Bachelor\u0027s Degree
953 satisfied customers
My sound driver disappeared when i downloaded an intel
Hi my sound driver disappeared when i downloaded an intel upgrade. … read more
Kamil Anwar
Kamil Anwar
IT Consultant / Systems Engineer
Bachelor\u0027s Degree
435 satisfied customers
How do I make a formal complaint to google about a google
How do I make a formal complaint to google about a google employee who was rude and disconnected me without saying why just because I was asking why gmail won't let me change my number so I can sign i… read more
Josh
Josh
It Support Specialist
Associate Degree
5,140 satisfied customers
My message account on facebook seems to be being used by a
my message account on facebook seems to be being used by a bot sending false and damaging messages. How do I change my password? … read more
Viet - Computer Tech
Viet - Computer Tech
Computer Technican
Bachelor\u0027s Degree
953 satisfied customers
I've got an old email address with Apple I've no idea of my
Hi I've got an old email address with Apple I've no idea of my password ***** log in and I desperately need an app installed … read more
Moses C
Moses C
Bsc
347 satisfied customers
Have Kingston USB flash, 16 Gb. last week made a photo in
Hello, have Kingston USB flash, 16 Gb. last week made a photo in photo salon, and they downloaded photo on it. don't know how they did that. But now when I'm using it, I noticed that name of my flash … read more
Richard
Richard
IT Manager
IT Manager, Consultant
3,282 satisfied customers
The billing platform for ceasar's slots is locked on the UK.
The billing platform for ceasar's slots is locked on the UK. I cannot purchase coins with my credit card as I don't live in the UK … read more
Josh
Josh
It Support Specialist
Associate Degree
5,140 satisfied customers
Many times my computer was urged to very important updated.
Many times my computer was urged to very important updated. But many time when I get updated the computer was hang up. The updated still not finished. The screen was black out, just like tonight. What… read more
Cody
Cody
Computer Science
1,723 satisfied customers
Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Show MoreShow Less

Ask Your Question

x